@tomei/sso 0.46.6 → 0.46.8

Sign up to get free protection for your applications and to get access to all the features.
Files changed (137) hide show
  1. package/.commitlintrc.json +22 -22
  2. package/.eslintrc +16 -16
  3. package/.eslintrc.js +35 -35
  4. package/.gitlab-ci.yml +16 -16
  5. package/.husky/commit-msg +15 -15
  6. package/.husky/pre-commit +7 -7
  7. package/.prettierrc +4 -4
  8. package/Jenkinsfile +57 -57
  9. package/README.md +23 -23
  10. package/__tests__/unit/components/group/group.spec.ts +79 -79
  11. package/__tests__/unit/components/group-object-privilege/group-object-privilege.spec.ts +88 -88
  12. package/__tests__/unit/components/group-privilege/group-privilege.spec.ts +68 -68
  13. package/__tests__/unit/components/group-reporting-user/group-reporting-user.spec.ts +66 -66
  14. package/__tests__/unit/components/group-system-access/group-system-access.spec.ts +83 -83
  15. package/__tests__/unit/components/login-user/l.spec.ts +746 -746
  16. package/__tests__/unit/components/login-user/login.spec.ts +1164 -1164
  17. package/__tests__/unit/components/password-hash/password-hash.service.spec.ts +31 -31
  18. package/__tests__/unit/components/system/system.spec.ts +254 -254
  19. package/__tests__/unit/components/system-privilege/system-privilege.spec.ts +83 -83
  20. package/__tests__/unit/components/user-group/user-group.spec.ts +86 -86
  21. package/__tests__/unit/components/user-object-privilege/user-object-privilege.spec.ts +78 -78
  22. package/__tests__/unit/components/user-privilege/user-privilege.spec.ts +72 -72
  23. package/__tests__/unit/components/user-system-access/user-system-access.spec.ts +89 -89
  24. package/__tests__/unit/redis-client/redis.service.spec.ts +23 -23
  25. package/__tests__/unit/session/session.service.spec.ts +47 -47
  26. package/__tests__/unit/system-privilege/system-privilage.spec.ts +91 -91
  27. package/coverage/clover.xml +1452 -1452
  28. package/coverage/coverage-final.json +47 -47
  29. package/coverage/lcov-report/base.css +224 -224
  30. package/coverage/lcov-report/block-navigation.js +87 -87
  31. package/coverage/lcov-report/components/group/group.repository.ts.html +117 -117
  32. package/coverage/lcov-report/components/group/group.ts.html +327 -327
  33. package/coverage/lcov-report/components/group/index.html +130 -130
  34. package/coverage/lcov-report/components/group-object-privilege/group-object-privilege.repository.ts.html +117 -117
  35. package/coverage/lcov-report/components/group-object-privilege/group-object-privilege.ts.html +321 -321
  36. package/coverage/lcov-report/components/group-object-privilege/index.html +130 -130
  37. package/coverage/lcov-report/components/group-privilege/group-privilege.repository.ts.html +117 -117
  38. package/coverage/lcov-report/components/group-privilege/group-privilege.ts.html +303 -303
  39. package/coverage/lcov-report/components/group-privilege/index.html +130 -130
  40. package/coverage/lcov-report/components/group-reporting-user/group-reporting-user.repository.ts.html +117 -117
  41. package/coverage/lcov-report/components/group-reporting-user/group-reporting-user.ts.html +327 -327
  42. package/coverage/lcov-report/components/group-reporting-user/index.html +130 -130
  43. package/coverage/lcov-report/components/group-system-access/group-system-access.repository.ts.html +117 -117
  44. package/coverage/lcov-report/components/group-system-access/group-system-access.ts.html +309 -309
  45. package/coverage/lcov-report/components/group-system-access/index.html +130 -130
  46. package/coverage/lcov-report/components/login-history/index.html +115 -115
  47. package/coverage/lcov-report/components/login-history/login-history.repository.ts.html +117 -117
  48. package/coverage/lcov-report/components/login-user/index.html +130 -130
  49. package/coverage/lcov-report/components/login-user/login-user.ts.html +5007 -5007
  50. package/coverage/lcov-report/components/login-user/user.repository.ts.html +117 -117
  51. package/coverage/lcov-report/components/password-hash/index.html +115 -115
  52. package/coverage/lcov-report/components/password-hash/password-hash.service.ts.html +126 -126
  53. package/coverage/lcov-report/components/system/index.html +130 -130
  54. package/coverage/lcov-report/components/system/system.repository.ts.html +117 -117
  55. package/coverage/lcov-report/components/system/system.ts.html +909 -909
  56. package/coverage/lcov-report/components/system-privilege/index.html +130 -130
  57. package/coverage/lcov-report/components/system-privilege/system-privilege.repository.ts.html +120 -120
  58. package/coverage/lcov-report/components/system-privilege/system-privilege.ts.html +390 -390
  59. package/coverage/lcov-report/components/user-group/index.html +130 -130
  60. package/coverage/lcov-report/components/user-group/user-group.repository.ts.html +117 -117
  61. package/coverage/lcov-report/components/user-group/user-group.ts.html +354 -354
  62. package/coverage/lcov-report/components/user-object-privilege/index.html +130 -130
  63. package/coverage/lcov-report/components/user-object-privilege/user-object-privilege.repository.ts.html +117 -117
  64. package/coverage/lcov-report/components/user-object-privilege/user-object-privilege.ts.html +312 -312
  65. package/coverage/lcov-report/components/user-privilege/index.html +130 -130
  66. package/coverage/lcov-report/components/user-privilege/user-privilege.repository.ts.html +117 -117
  67. package/coverage/lcov-report/components/user-privilege/user-privilege.ts.html +306 -306
  68. package/coverage/lcov-report/components/user-system-access/index.html +130 -130
  69. package/coverage/lcov-report/components/user-system-access/user-system-access.repository.ts.html +117 -117
  70. package/coverage/lcov-report/components/user-system-access/user-system-access.ts.html +312 -312
  71. package/coverage/lcov-report/enum/group-type.enum.ts.html +108 -108
  72. package/coverage/lcov-report/enum/index.html +160 -160
  73. package/coverage/lcov-report/enum/index.ts.html +93 -93
  74. package/coverage/lcov-report/enum/user-status.enum.ts.html +105 -105
  75. package/coverage/lcov-report/enum/yn.enum.ts.html +96 -96
  76. package/coverage/lcov-report/index.html +370 -370
  77. package/coverage/lcov-report/models/group-object-privilege.entity.ts.html +333 -333
  78. package/coverage/lcov-report/models/group-privilege.entity.ts.html +315 -315
  79. package/coverage/lcov-report/models/group-reporting-user.entity.ts.html +339 -339
  80. package/coverage/lcov-report/models/group-system-access.entity.ts.html +324 -324
  81. package/coverage/lcov-report/models/group.entity.ts.html +435 -435
  82. package/coverage/lcov-report/models/index.html +310 -310
  83. package/coverage/lcov-report/models/login-history.entity.ts.html +252 -252
  84. package/coverage/lcov-report/models/staff.entity.ts.html +411 -411
  85. package/coverage/lcov-report/models/system-privilege.entity.ts.html +354 -354
  86. package/coverage/lcov-report/models/system.entity.ts.html +423 -423
  87. package/coverage/lcov-report/models/user-group.entity.ts.html +354 -354
  88. package/coverage/lcov-report/models/user-object-privilege.entity.ts.html +330 -330
  89. package/coverage/lcov-report/models/user-privilege.entity.ts.html +315 -315
  90. package/coverage/lcov-report/models/user-system-access.entity.ts.html +315 -315
  91. package/coverage/lcov-report/models/user.entity.ts.html +522 -522
  92. package/coverage/lcov-report/prettify.css +1 -1
  93. package/coverage/lcov-report/prettify.js +2 -2
  94. package/coverage/lcov-report/redis-client/index.html +115 -115
  95. package/coverage/lcov-report/redis-client/redis.service.ts.html +240 -240
  96. package/coverage/lcov-report/session/index.html +115 -115
  97. package/coverage/lcov-report/session/session.service.ts.html +246 -246
  98. package/coverage/lcov-report/sorter.js +196 -196
  99. package/coverage/lcov.info +2490 -2490
  100. package/coverage/test-report.xml +128 -128
  101. package/create-sso-user.sql +39 -39
  102. package/dist/src/components/user-system-access/user-system-access.d.ts +12 -0
  103. package/dist/src/components/user-system-access/user-system-access.js +148 -0
  104. package/dist/src/components/user-system-access/user-system-access.js.map +1 -1
  105. package/dist/src/components/user-system-access/user-system-access.repository.d.ts +1 -0
  106. package/dist/src/components/user-system-access/user-system-access.repository.js +25 -0
  107. package/dist/src/components/user-system-access/user-system-access.repository.js.map +1 -1
  108. package/dist/tsconfig.tsbuildinfo +1 -1
  109. package/jest.config.js +14 -14
  110. package/migrations/20240314080602-create-user-table.js +124 -124
  111. package/migrations/20240314080603-create-user-group-table.js +85 -85
  112. package/migrations/20240314080604-create-user-user-group-table.js +55 -55
  113. package/migrations/20240314080605-create-login-history-table.js +53 -53
  114. package/migrations/20240527064925-create-system-table.js +78 -78
  115. package/migrations/20240527064926-create-system-privilege-table.js +71 -71
  116. package/migrations/20240527065342-create-group-table.js +93 -93
  117. package/migrations/20240527065633-create-group-reporting-user-table.js +76 -76
  118. package/migrations/20240528011551-create-group-system-access-table.js +72 -72
  119. package/migrations/20240528023018-user-system-access-table.js +75 -75
  120. package/migrations/20240528032229-user-privilege-table.js +75 -75
  121. package/migrations/20240528063003-create-group-privilege-table.js +85 -85
  122. package/migrations/20240528063051-create-group-object-privilege-table.js +84 -84
  123. package/migrations/20240528063107-create-user-object-privilege-table.js +83 -83
  124. package/migrations/20240528063108-create-api-key-table.js +85 -85
  125. package/package.json +89 -89
  126. package/sampledotenv +7 -7
  127. package/sonar-project.properties +22 -22
  128. package/src/components/user-system-access/user-system-access.repository.ts +14 -0
  129. package/src/components/user-system-access/user-system-access.ts +298 -0
  130. package/tsconfig.build.json +5 -5
  131. package/tsconfig.json +22 -22
  132. package/dist/__tests__/unit/components/group-privilege/group-privilege.test.d.ts +0 -1
  133. package/dist/__tests__/unit/components/group-privilege/group-privilege.test.js +0 -71
  134. package/dist/__tests__/unit/components/group-privilege/group-privilege.test.js.map +0 -1
  135. package/dist/__tests__/unit/components/login-user/login-user.spec.d.ts +0 -0
  136. package/dist/__tests__/unit/components/login-user/login-user.spec.js +0 -6
  137. package/dist/__tests__/unit/components/login-user/login-user.spec.js.map +0 -1
@@ -1,90 +1,90 @@
1
- import { UserSystemAccess } from '../../../../src/components/user-system-access/user-system-access';
2
- import { UserSystemAccessRepository } from '../../../../src/components/user-system-access/user-system-access.repository';
3
- import { ClassError } from '@tomei/general';
4
-
5
- describe('UserSystemAccess', () => {
6
- let userSystemAccess: UserSystemAccess;
7
- const userSystemAccessAttr = {
8
- UserSystemAccessId: 1,
9
- UserId: 1,
10
- SystemCode: 'system1',
11
- Status: 'active',
12
- CreatedById: 1,
13
- CreatedAt: new Date(),
14
- UpdatedById: 1,
15
- UpdatedAt: new Date(),
16
- };
17
-
18
- beforeEach(() => {
19
- userSystemAccess = new (UserSystemAccess as any)(userSystemAccessAttr);
20
- });
21
-
22
- afterEach(() => {
23
- jest.clearAllMocks();
24
- });
25
-
26
- describe('constructor', () => {
27
- it('should create a new UserSystemAccess instance', () => {
28
- expect(userSystemAccess).toBeDefined();
29
- expect(userSystemAccess).toBeInstanceOf(UserSystemAccess);
30
- expect(userSystemAccess.UserSystemAccessId).toBe(
31
- userSystemAccessAttr.UserSystemAccessId
32
- );
33
- expect(userSystemAccess.UserId).toBe(userSystemAccessAttr.UserId);
34
- expect(userSystemAccess.SystemCode).toBe(userSystemAccessAttr.SystemCode);
35
- expect(userSystemAccess.Status).toBe(userSystemAccessAttr.Status);
36
- expect(userSystemAccess.CreatedById).toBe(
37
- userSystemAccessAttr.CreatedById
38
- );
39
- expect(userSystemAccess.CreatedAt).toBe(userSystemAccessAttr.CreatedAt);
40
- expect(userSystemAccess.UpdatedById).toBe(
41
- userSystemAccessAttr.UpdatedById
42
- );
43
- expect(userSystemAccess.UpdatedAt).toBe(userSystemAccessAttr.UpdatedAt);
44
- });
45
- });
46
-
47
- describe('init', () => {
48
- it('should initialize UserSystemAccess with valid UserSystemAccessId', async () => {
49
- const findOneMock = jest
50
- .spyOn(UserSystemAccessRepository.prototype, 'findOne')
51
- .mockResolvedValueOnce({
52
- ...userSystemAccessAttr,
53
- get: () => userSystemAccessAttr,
54
- } as any);
55
-
56
- const result = await UserSystemAccess.init(null, 1);
57
-
58
- expect(findOneMock).toHaveBeenCalledTimes(1);
59
- expect(findOneMock).toHaveBeenCalledWith({
60
- where: { UserSystemAccessId: 1 },
61
- transaction: null,
62
- });
63
- expect(result).toBeInstanceOf(UserSystemAccess);
64
- expect(result.UserSystemAccessId).toBe(
65
- userSystemAccessAttr.UserSystemAccessId
66
- );
67
- expect(result.UserId).toBe(userSystemAccessAttr.UserId);
68
- expect(result.SystemCode).toBe(userSystemAccessAttr.SystemCode);
69
- expect(result.Status).toBe(userSystemAccessAttr.Status);
70
- expect(result.CreatedById).toBe(userSystemAccessAttr.CreatedById);
71
- expect(result.CreatedAt).toBe(userSystemAccessAttr.CreatedAt);
72
- expect(result.UpdatedById).toBe(userSystemAccessAttr.UpdatedById);
73
- expect(result.UpdatedAt).toBe(userSystemAccessAttr.UpdatedAt);
74
- });
75
-
76
- it('should throw ClassError when UserSystemAccessId is not found', async () => {
77
- jest
78
- .spyOn(UserSystemAccessRepository.prototype, 'findOne')
79
- .mockResolvedValueOnce(null);
80
-
81
- try {
82
- await UserSystemAccess.init(null, 1)
83
- expect(false).toBe(true);
84
- } catch (error) {
85
- expect(error).toBeInstanceOf(ClassError);
86
- expect(error.message).toBe('UserSystemAccess not found');
87
- }
88
- });
89
- });
1
+ import { UserSystemAccess } from '../../../../src/components/user-system-access/user-system-access';
2
+ import { UserSystemAccessRepository } from '../../../../src/components/user-system-access/user-system-access.repository';
3
+ import { ClassError } from '@tomei/general';
4
+
5
+ describe('UserSystemAccess', () => {
6
+ let userSystemAccess: UserSystemAccess;
7
+ const userSystemAccessAttr = {
8
+ UserSystemAccessId: 1,
9
+ UserId: 1,
10
+ SystemCode: 'system1',
11
+ Status: 'active',
12
+ CreatedById: 1,
13
+ CreatedAt: new Date(),
14
+ UpdatedById: 1,
15
+ UpdatedAt: new Date(),
16
+ };
17
+
18
+ beforeEach(() => {
19
+ userSystemAccess = new (UserSystemAccess as any)(userSystemAccessAttr);
20
+ });
21
+
22
+ afterEach(() => {
23
+ jest.clearAllMocks();
24
+ });
25
+
26
+ describe('constructor', () => {
27
+ it('should create a new UserSystemAccess instance', () => {
28
+ expect(userSystemAccess).toBeDefined();
29
+ expect(userSystemAccess).toBeInstanceOf(UserSystemAccess);
30
+ expect(userSystemAccess.UserSystemAccessId).toBe(
31
+ userSystemAccessAttr.UserSystemAccessId
32
+ );
33
+ expect(userSystemAccess.UserId).toBe(userSystemAccessAttr.UserId);
34
+ expect(userSystemAccess.SystemCode).toBe(userSystemAccessAttr.SystemCode);
35
+ expect(userSystemAccess.Status).toBe(userSystemAccessAttr.Status);
36
+ expect(userSystemAccess.CreatedById).toBe(
37
+ userSystemAccessAttr.CreatedById
38
+ );
39
+ expect(userSystemAccess.CreatedAt).toBe(userSystemAccessAttr.CreatedAt);
40
+ expect(userSystemAccess.UpdatedById).toBe(
41
+ userSystemAccessAttr.UpdatedById
42
+ );
43
+ expect(userSystemAccess.UpdatedAt).toBe(userSystemAccessAttr.UpdatedAt);
44
+ });
45
+ });
46
+
47
+ describe('init', () => {
48
+ it('should initialize UserSystemAccess with valid UserSystemAccessId', async () => {
49
+ const findOneMock = jest
50
+ .spyOn(UserSystemAccessRepository.prototype, 'findOne')
51
+ .mockResolvedValueOnce({
52
+ ...userSystemAccessAttr,
53
+ get: () => userSystemAccessAttr,
54
+ } as any);
55
+
56
+ const result = await UserSystemAccess.init(null, 1);
57
+
58
+ expect(findOneMock).toHaveBeenCalledTimes(1);
59
+ expect(findOneMock).toHaveBeenCalledWith({
60
+ where: { UserSystemAccessId: 1 },
61
+ transaction: null,
62
+ });
63
+ expect(result).toBeInstanceOf(UserSystemAccess);
64
+ expect(result.UserSystemAccessId).toBe(
65
+ userSystemAccessAttr.UserSystemAccessId
66
+ );
67
+ expect(result.UserId).toBe(userSystemAccessAttr.UserId);
68
+ expect(result.SystemCode).toBe(userSystemAccessAttr.SystemCode);
69
+ expect(result.Status).toBe(userSystemAccessAttr.Status);
70
+ expect(result.CreatedById).toBe(userSystemAccessAttr.CreatedById);
71
+ expect(result.CreatedAt).toBe(userSystemAccessAttr.CreatedAt);
72
+ expect(result.UpdatedById).toBe(userSystemAccessAttr.UpdatedById);
73
+ expect(result.UpdatedAt).toBe(userSystemAccessAttr.UpdatedAt);
74
+ });
75
+
76
+ it('should throw ClassError when UserSystemAccessId is not found', async () => {
77
+ jest
78
+ .spyOn(UserSystemAccessRepository.prototype, 'findOne')
79
+ .mockResolvedValueOnce(null);
80
+
81
+ try {
82
+ await UserSystemAccess.init(null, 1)
83
+ expect(false).toBe(true);
84
+ } catch (error) {
85
+ expect(error).toBeInstanceOf(ClassError);
86
+ expect(error.message).toBe('UserSystemAccess not found');
87
+ }
88
+ });
89
+ });
90
90
  });
@@ -1,24 +1,24 @@
1
- import { RedisService } from "../../../src/redis-client/redis.service";
2
- require('dotenv').config()
3
- // nneed to figure out how to mock redis
4
- describe('redis.service', () => {
5
-
6
- afterEach(() => {
7
- jest.restoreAllMocks()
8
- })
9
-
10
- it('should return redis service when instansiated', async () => {
11
- const redisService = await RedisService.init();
12
- expect(redisService).toBeDefined();
13
- });
14
-
15
- it('should able to write and read redis', async () => {
16
- const data = {
17
- test: 'test'
18
- }
19
- const redisService = await RedisService.init();
20
- await redisService.set("test", data, 60 * 60 * 24 * 1)
21
- const result = await redisService.get("test");
22
- expect(result).toEqual(JSON.stringify(data));
23
- });
1
+ import { RedisService } from "../../../src/redis-client/redis.service";
2
+ require('dotenv').config()
3
+ // nneed to figure out how to mock redis
4
+ describe('redis.service', () => {
5
+
6
+ afterEach(() => {
7
+ jest.restoreAllMocks()
8
+ })
9
+
10
+ it('should return redis service when instansiated', async () => {
11
+ const redisService = await RedisService.init();
12
+ expect(redisService).toBeDefined();
13
+ });
14
+
15
+ it('should able to write and read redis', async () => {
16
+ const data = {
17
+ test: 'test'
18
+ }
19
+ const redisService = await RedisService.init();
20
+ await redisService.set("test", data, 60 * 60 * 24 * 1)
21
+ const result = await redisService.get("test");
22
+ expect(result).toEqual(JSON.stringify(data));
23
+ });
24
24
  });
@@ -1,47 +1,47 @@
1
- import { IUserSession } from '../../../src/interfaces/user-session.interface';
2
- import { SessionService } from '../../../src/session/session.service';
3
- require('dotenv').config()
4
-
5
- describe('session.service', () => {
6
- it('should return session service when instansiated', async () => {
7
- const sessionService = await SessionService.init();
8
- expect(sessionService).toBeDefined();
9
- });
10
-
11
- it('should able to write session data', async () => {
12
- const data: IUserSession = {
13
- systemLogins: [
14
- {
15
- id: '1',
16
- code: 'EZC',
17
- sessionId: 'test1',
18
- privileges: ['PRIVILEGE1', 'PRIVILEGE2'],
19
- },
20
- ],
21
- };
22
- const sessionService = await SessionService.init();
23
- await sessionService.setUserSession("1", data)
24
- const result = await sessionService.retrieveUserSession("1");
25
- expect(result).toEqual(data);
26
- });
27
-
28
- it('should able to refresh session data', async () => {
29
- const setUserSession = jest.spyOn(SessionService.prototype, 'setUserSession');
30
- const retrieveUserSession = jest.spyOn(SessionService.prototype, 'retrieveUserSession');
31
- const data: IUserSession = {
32
- systemLogins: [
33
- {
34
- id: '1',
35
- code: 'EZC',
36
- sessionId: 'test1',
37
- privileges: ['PRIVILEGE1', 'PRIVILEGE2'],
38
- },
39
- ],
40
- };
41
- const sessionService = await SessionService.init();
42
- await sessionService.setUserSession("1", data)
43
- await sessionService.refreshDuration("1");
44
- expect(setUserSession).toBeCalledTimes(2);
45
- expect(retrieveUserSession).toBeCalledTimes(1);
46
- });
47
- });
1
+ import { IUserSession } from '../../../src/interfaces/user-session.interface';
2
+ import { SessionService } from '../../../src/session/session.service';
3
+ require('dotenv').config()
4
+
5
+ describe('session.service', () => {
6
+ it('should return session service when instansiated', async () => {
7
+ const sessionService = await SessionService.init();
8
+ expect(sessionService).toBeDefined();
9
+ });
10
+
11
+ it('should able to write session data', async () => {
12
+ const data: IUserSession = {
13
+ systemLogins: [
14
+ {
15
+ id: '1',
16
+ code: 'EZC',
17
+ sessionId: 'test1',
18
+ privileges: ['PRIVILEGE1', 'PRIVILEGE2'],
19
+ },
20
+ ],
21
+ };
22
+ const sessionService = await SessionService.init();
23
+ await sessionService.setUserSession("1", data)
24
+ const result = await sessionService.retrieveUserSession("1");
25
+ expect(result).toEqual(data);
26
+ });
27
+
28
+ it('should able to refresh session data', async () => {
29
+ const setUserSession = jest.spyOn(SessionService.prototype, 'setUserSession');
30
+ const retrieveUserSession = jest.spyOn(SessionService.prototype, 'retrieveUserSession');
31
+ const data: IUserSession = {
32
+ systemLogins: [
33
+ {
34
+ id: '1',
35
+ code: 'EZC',
36
+ sessionId: 'test1',
37
+ privileges: ['PRIVILEGE1', 'PRIVILEGE2'],
38
+ },
39
+ ],
40
+ };
41
+ const sessionService = await SessionService.init();
42
+ await sessionService.setUserSession("1", data)
43
+ await sessionService.refreshDuration("1");
44
+ expect(setUserSession).toBeCalledTimes(2);
45
+ expect(retrieveUserSession).toBeCalledTimes(1);
46
+ });
47
+ });
@@ -1,91 +1,91 @@
1
- // import { Privilege } from '../../../src/components/system-privilege/privilege';
2
- // import { SystemPrivilegeRepository } from '../../../src/components/system-privilege/system-privilege.repository';
3
- // import { SystemRepository } from '../../../src/components/system/system.repository';
4
- // describe('SystemPrivilege', () => {
5
- // afterEach(async () => {
6
- // jest.restoreAllMocks();
7
- // });
8
- // it('should be able to load single package privileges', async () => {
9
- // let privilegeCalled = 0;
10
- // const findOrCreateMock = jest
11
- // .spyOn(SystemPrivilegeRepository.prototype, 'findOrCreate')
12
- // .mockResolvedValueOnce([{}, true] as any);
13
-
14
- // const systemRepositoryMock = jest
15
- // .spyOn(SystemRepository.prototype, 'findOne')
16
- // .mockResolvedValueOnce({
17
- // id: 175,
18
- // } as any);
19
-
20
- // jest.mock('@tomei/mailer/privileges.json', () => {
21
- // privilegeCalled++;
22
- // return {
23
- // Privileges: [
24
- // {
25
- // Code: 'Privilege1',
26
- // Description: 'This is Privilege1',
27
- // },
28
- // ],
29
- // };
30
- // });
31
-
32
- // await Privilege.loadPrivileges('mailer', 'EZC');
33
- // expect(findOrCreateMock).toBeCalledTimes(1);
34
- // expect(systemRepositoryMock).toBeCalledTimes(1);
35
- // expect(privilegeCalled).toEqual(1);
36
- // });
37
-
38
- // it('should be able to load multiple package privileges', async () => {
39
- // let privilegeCalled = 0;
40
- // const findOrCreateMock = jest
41
- // .spyOn(SystemPrivilegeRepository.prototype, 'findOrCreate')
42
- // .mockResolvedValueOnce([{}, true] as any);
43
-
44
- // const systemRepositoryMock = jest
45
- // .spyOn(SystemRepository.prototype, 'findOne')
46
- // .mockResolvedValueOnce({
47
- // id: 175,
48
- // } as any);
49
-
50
- // jest.mock(
51
- // '@tomei/mailer/privileges.json',
52
- // () => {
53
- // privilegeCalled++;
54
- // return {
55
- // Privileges: [
56
- // {
57
- // Code: 'Privilege1',
58
- // Description: 'This is Privilege1',
59
- // },
60
- // ],
61
- // };
62
- // },
63
- // );
64
-
65
- // jest.mock(
66
- // '@tomei/config/privileges.json',
67
- // () => {
68
- // privilegeCalled++;
69
- // return {
70
- // Privileges: [
71
- // {
72
- // Code: 'Privilege2',
73
- // Description: 'This is Privilege2',
74
- // },
75
- // ],
76
- // };
77
- // },
78
- // );
79
-
80
- // await Privilege.loadPrivileges(['mailer', 'config'], 'EZC');
81
- // expect(findOrCreateMock).toBeCalledTimes(2);
82
- // expect(systemRepositoryMock).toBeCalledTimes(1);
83
- // expect(privilegeCalled).toEqual(2);
84
- // });
85
- // });
86
-
87
- describe('SystemPrivilege', () => {
88
- it('should be true', () => {
89
- expect(true).toBe(true);
90
- });
91
- });
1
+ // import { Privilege } from '../../../src/components/system-privilege/privilege';
2
+ // import { SystemPrivilegeRepository } from '../../../src/components/system-privilege/system-privilege.repository';
3
+ // import { SystemRepository } from '../../../src/components/system/system.repository';
4
+ // describe('SystemPrivilege', () => {
5
+ // afterEach(async () => {
6
+ // jest.restoreAllMocks();
7
+ // });
8
+ // it('should be able to load single package privileges', async () => {
9
+ // let privilegeCalled = 0;
10
+ // const findOrCreateMock = jest
11
+ // .spyOn(SystemPrivilegeRepository.prototype, 'findOrCreate')
12
+ // .mockResolvedValueOnce([{}, true] as any);
13
+
14
+ // const systemRepositoryMock = jest
15
+ // .spyOn(SystemRepository.prototype, 'findOne')
16
+ // .mockResolvedValueOnce({
17
+ // id: 175,
18
+ // } as any);
19
+
20
+ // jest.mock('@tomei/mailer/privileges.json', () => {
21
+ // privilegeCalled++;
22
+ // return {
23
+ // Privileges: [
24
+ // {
25
+ // Code: 'Privilege1',
26
+ // Description: 'This is Privilege1',
27
+ // },
28
+ // ],
29
+ // };
30
+ // });
31
+
32
+ // await Privilege.loadPrivileges('mailer', 'EZC');
33
+ // expect(findOrCreateMock).toBeCalledTimes(1);
34
+ // expect(systemRepositoryMock).toBeCalledTimes(1);
35
+ // expect(privilegeCalled).toEqual(1);
36
+ // });
37
+
38
+ // it('should be able to load multiple package privileges', async () => {
39
+ // let privilegeCalled = 0;
40
+ // const findOrCreateMock = jest
41
+ // .spyOn(SystemPrivilegeRepository.prototype, 'findOrCreate')
42
+ // .mockResolvedValueOnce([{}, true] as any);
43
+
44
+ // const systemRepositoryMock = jest
45
+ // .spyOn(SystemRepository.prototype, 'findOne')
46
+ // .mockResolvedValueOnce({
47
+ // id: 175,
48
+ // } as any);
49
+
50
+ // jest.mock(
51
+ // '@tomei/mailer/privileges.json',
52
+ // () => {
53
+ // privilegeCalled++;
54
+ // return {
55
+ // Privileges: [
56
+ // {
57
+ // Code: 'Privilege1',
58
+ // Description: 'This is Privilege1',
59
+ // },
60
+ // ],
61
+ // };
62
+ // },
63
+ // );
64
+
65
+ // jest.mock(
66
+ // '@tomei/config/privileges.json',
67
+ // () => {
68
+ // privilegeCalled++;
69
+ // return {
70
+ // Privileges: [
71
+ // {
72
+ // Code: 'Privilege2',
73
+ // Description: 'This is Privilege2',
74
+ // },
75
+ // ],
76
+ // };
77
+ // },
78
+ // );
79
+
80
+ // await Privilege.loadPrivileges(['mailer', 'config'], 'EZC');
81
+ // expect(findOrCreateMock).toBeCalledTimes(2);
82
+ // expect(systemRepositoryMock).toBeCalledTimes(1);
83
+ // expect(privilegeCalled).toEqual(2);
84
+ // });
85
+ // });
86
+
87
+ describe('SystemPrivilege', () => {
88
+ it('should be true', () => {
89
+ expect(true).toBe(true);
90
+ });
91
+ });