@tomei/sso 0.49.1 → 0.50.1

Sign up to get free protection for your applications and to get access to all the features.
Files changed (137) hide show
  1. package/.commitlintrc.json +22 -22
  2. package/.eslintrc +16 -16
  3. package/.eslintrc.js +35 -35
  4. package/.gitlab-ci.yml +16 -16
  5. package/.husky/commit-msg +15 -15
  6. package/.husky/pre-commit +7 -7
  7. package/.prettierrc +4 -4
  8. package/Jenkinsfile +57 -57
  9. package/README.md +23 -23
  10. package/__tests__/unit/components/group/group.spec.ts +79 -79
  11. package/__tests__/unit/components/group-object-privilege/group-object-privilege.spec.ts +88 -88
  12. package/__tests__/unit/components/group-privilege/group-privilege.spec.ts +68 -68
  13. package/__tests__/unit/components/group-reporting-user/group-reporting-user.spec.ts +66 -66
  14. package/__tests__/unit/components/group-system-access/group-system-access.spec.ts +83 -83
  15. package/__tests__/unit/components/login-user/l.spec.ts +746 -746
  16. package/__tests__/unit/components/login-user/login.spec.ts +1164 -1164
  17. package/__tests__/unit/components/password-hash/password-hash.service.spec.ts +31 -31
  18. package/__tests__/unit/components/system/system.spec.ts +254 -254
  19. package/__tests__/unit/components/system-privilege/system-privilege.spec.ts +83 -83
  20. package/__tests__/unit/components/user-group/user-group.spec.ts +86 -86
  21. package/__tests__/unit/components/user-object-privilege/user-object-privilege.spec.ts +78 -78
  22. package/__tests__/unit/components/user-privilege/user-privilege.spec.ts +72 -72
  23. package/__tests__/unit/components/user-system-access/user-system-access.spec.ts +89 -89
  24. package/__tests__/unit/redis-client/redis.service.spec.ts +23 -23
  25. package/__tests__/unit/session/session.service.spec.ts +47 -47
  26. package/__tests__/unit/system-privilege/system-privilage.spec.ts +91 -91
  27. package/coverage/clover.xml +1452 -1452
  28. package/coverage/coverage-final.json +47 -47
  29. package/coverage/lcov-report/base.css +224 -224
  30. package/coverage/lcov-report/block-navigation.js +87 -87
  31. package/coverage/lcov-report/components/group/group.repository.ts.html +117 -117
  32. package/coverage/lcov-report/components/group/group.ts.html +327 -327
  33. package/coverage/lcov-report/components/group/index.html +130 -130
  34. package/coverage/lcov-report/components/group-object-privilege/group-object-privilege.repository.ts.html +117 -117
  35. package/coverage/lcov-report/components/group-object-privilege/group-object-privilege.ts.html +321 -321
  36. package/coverage/lcov-report/components/group-object-privilege/index.html +130 -130
  37. package/coverage/lcov-report/components/group-privilege/group-privilege.repository.ts.html +117 -117
  38. package/coverage/lcov-report/components/group-privilege/group-privilege.ts.html +303 -303
  39. package/coverage/lcov-report/components/group-privilege/index.html +130 -130
  40. package/coverage/lcov-report/components/group-reporting-user/group-reporting-user.repository.ts.html +117 -117
  41. package/coverage/lcov-report/components/group-reporting-user/group-reporting-user.ts.html +327 -327
  42. package/coverage/lcov-report/components/group-reporting-user/index.html +130 -130
  43. package/coverage/lcov-report/components/group-system-access/group-system-access.repository.ts.html +117 -117
  44. package/coverage/lcov-report/components/group-system-access/group-system-access.ts.html +309 -309
  45. package/coverage/lcov-report/components/group-system-access/index.html +130 -130
  46. package/coverage/lcov-report/components/login-history/index.html +115 -115
  47. package/coverage/lcov-report/components/login-history/login-history.repository.ts.html +117 -117
  48. package/coverage/lcov-report/components/login-user/index.html +130 -130
  49. package/coverage/lcov-report/components/login-user/login-user.ts.html +5007 -5007
  50. package/coverage/lcov-report/components/login-user/user.repository.ts.html +117 -117
  51. package/coverage/lcov-report/components/password-hash/index.html +115 -115
  52. package/coverage/lcov-report/components/password-hash/password-hash.service.ts.html +126 -126
  53. package/coverage/lcov-report/components/system/index.html +130 -130
  54. package/coverage/lcov-report/components/system/system.repository.ts.html +117 -117
  55. package/coverage/lcov-report/components/system/system.ts.html +909 -909
  56. package/coverage/lcov-report/components/system-privilege/index.html +130 -130
  57. package/coverage/lcov-report/components/system-privilege/system-privilege.repository.ts.html +120 -120
  58. package/coverage/lcov-report/components/system-privilege/system-privilege.ts.html +390 -390
  59. package/coverage/lcov-report/components/user-group/index.html +130 -130
  60. package/coverage/lcov-report/components/user-group/user-group.repository.ts.html +117 -117
  61. package/coverage/lcov-report/components/user-group/user-group.ts.html +354 -354
  62. package/coverage/lcov-report/components/user-object-privilege/index.html +130 -130
  63. package/coverage/lcov-report/components/user-object-privilege/user-object-privilege.repository.ts.html +117 -117
  64. package/coverage/lcov-report/components/user-object-privilege/user-object-privilege.ts.html +312 -312
  65. package/coverage/lcov-report/components/user-privilege/index.html +130 -130
  66. package/coverage/lcov-report/components/user-privilege/user-privilege.repository.ts.html +117 -117
  67. package/coverage/lcov-report/components/user-privilege/user-privilege.ts.html +306 -306
  68. package/coverage/lcov-report/components/user-system-access/index.html +130 -130
  69. package/coverage/lcov-report/components/user-system-access/user-system-access.repository.ts.html +117 -117
  70. package/coverage/lcov-report/components/user-system-access/user-system-access.ts.html +312 -312
  71. package/coverage/lcov-report/enum/group-type.enum.ts.html +108 -108
  72. package/coverage/lcov-report/enum/index.html +160 -160
  73. package/coverage/lcov-report/enum/index.ts.html +93 -93
  74. package/coverage/lcov-report/enum/user-status.enum.ts.html +105 -105
  75. package/coverage/lcov-report/enum/yn.enum.ts.html +96 -96
  76. package/coverage/lcov-report/index.html +370 -370
  77. package/coverage/lcov-report/models/group-object-privilege.entity.ts.html +333 -333
  78. package/coverage/lcov-report/models/group-privilege.entity.ts.html +315 -315
  79. package/coverage/lcov-report/models/group-reporting-user.entity.ts.html +339 -339
  80. package/coverage/lcov-report/models/group-system-access.entity.ts.html +324 -324
  81. package/coverage/lcov-report/models/group.entity.ts.html +435 -435
  82. package/coverage/lcov-report/models/index.html +310 -310
  83. package/coverage/lcov-report/models/login-history.entity.ts.html +252 -252
  84. package/coverage/lcov-report/models/staff.entity.ts.html +411 -411
  85. package/coverage/lcov-report/models/system-privilege.entity.ts.html +354 -354
  86. package/coverage/lcov-report/models/system.entity.ts.html +423 -423
  87. package/coverage/lcov-report/models/user-group.entity.ts.html +354 -354
  88. package/coverage/lcov-report/models/user-object-privilege.entity.ts.html +330 -330
  89. package/coverage/lcov-report/models/user-privilege.entity.ts.html +315 -315
  90. package/coverage/lcov-report/models/user-system-access.entity.ts.html +315 -315
  91. package/coverage/lcov-report/models/user.entity.ts.html +522 -522
  92. package/coverage/lcov-report/prettify.css +1 -1
  93. package/coverage/lcov-report/prettify.js +2 -2
  94. package/coverage/lcov-report/redis-client/index.html +115 -115
  95. package/coverage/lcov-report/redis-client/redis.service.ts.html +240 -240
  96. package/coverage/lcov-report/session/index.html +115 -115
  97. package/coverage/lcov-report/session/session.service.ts.html +246 -246
  98. package/coverage/lcov-report/sorter.js +196 -196
  99. package/coverage/lcov.info +2490 -2490
  100. package/coverage/test-report.xml +128 -128
  101. package/create-sso-user.sql +39 -39
  102. package/dist/src/components/system-privilege/system-privilege.d.ts +17 -0
  103. package/dist/src/components/system-privilege/system-privilege.js +95 -1
  104. package/dist/src/components/system-privilege/system-privilege.js.map +1 -1
  105. package/dist/src/components/system-privilege/system-privilege.repository.d.ts +1 -0
  106. package/dist/src/components/system-privilege/system-privilege.repository.js +17 -0
  107. package/dist/src/components/system-privilege/system-privilege.repository.js.map +1 -1
  108. package/dist/tsconfig.tsbuildinfo +1 -1
  109. package/jest.config.js +14 -14
  110. package/migrations/20240314080602-create-user-table.js +124 -124
  111. package/migrations/20240314080603-create-user-group-table.js +85 -85
  112. package/migrations/20240314080604-create-user-user-group-table.js +55 -55
  113. package/migrations/20240314080605-create-login-history-table.js +53 -53
  114. package/migrations/20240527064925-create-system-table.js +78 -78
  115. package/migrations/20240527064926-create-system-privilege-table.js +71 -71
  116. package/migrations/20240527065342-create-group-table.js +93 -93
  117. package/migrations/20240527065633-create-group-reporting-user-table.js +76 -76
  118. package/migrations/20240528011551-create-group-system-access-table.js +72 -72
  119. package/migrations/20240528023018-user-system-access-table.js +75 -75
  120. package/migrations/20240528032229-user-privilege-table.js +75 -75
  121. package/migrations/20240528063003-create-group-privilege-table.js +85 -85
  122. package/migrations/20240528063051-create-group-object-privilege-table.js +84 -84
  123. package/migrations/20240528063107-create-user-object-privilege-table.js +83 -83
  124. package/migrations/20240528063108-create-api-key-table.js +85 -85
  125. package/package.json +89 -89
  126. package/sampledotenv +7 -7
  127. package/sonar-project.properties +22 -22
  128. package/src/components/system-privilege/system-privilege.repository.ts +7 -0
  129. package/src/components/system-privilege/system-privilege.ts +161 -1
  130. package/tsconfig.build.json +5 -5
  131. package/tsconfig.json +22 -22
  132. package/dist/__tests__/unit/components/group-privilege/group-privilege.test.d.ts +0 -1
  133. package/dist/__tests__/unit/components/group-privilege/group-privilege.test.js +0 -71
  134. package/dist/__tests__/unit/components/group-privilege/group-privilege.test.js.map +0 -1
  135. package/dist/__tests__/unit/components/login-user/login-user.spec.d.ts +0 -0
  136. package/dist/__tests__/unit/components/login-user/login-user.spec.js +0 -6
  137. package/dist/__tests__/unit/components/login-user/login-user.spec.js.map +0 -1
@@ -1,129 +1,129 @@
1
- <?xml version="1.0" encoding="UTF-8"?>
2
- <testExecutions version="1">
3
- <file path="C:\Work\sso\__tests__\unit\components\login-user\login.spec.ts">
4
- <testCase name="LoginUser init should initialize LoginUser with valid userId" duration="5"/>
5
- <testCase name="LoginUser init should throw an error when user is not found" duration="20"/>
6
- <testCase name="LoginUser checkSession should throw an error if session expired" duration="20"/>
7
- <testCase name="LoginUser checkSession should refresh the session duration if session is valid" duration="2"/>
8
- <testCase name="LoginUser shouldReleaseLock should return true if autoReleaseYN is &quot;Y&quot; and time difference is greater than minuteToAutoRelease" duration="2"/>
9
- <testCase name="LoginUser shouldReleaseLock should return false if autoReleaseYN is &quot;Y&quot; and time difference is less than or equal to minuteToAutoRelease" duration="1"/>
10
- <testCase name="LoginUser shouldReleaseLock should return false if autoReleaseYN is &quot;N&quot;" duration="1"/>
11
- <testCase name="LoginUser releaseLock should release the lock for a user" duration="1"/>
12
- <testCase name="LoginUser checkUserInfoDuplicated should throw an error if duplicate user info is found" duration="1"/>
13
- <testCase name="LoginUser checkUserInfoDuplicated should not throw an error if duplicate user info is not found" duration="0"/>
14
- <testCase name="LoginUser generateDefaultPassword should generate a default password with the specified length" duration="2"/>
15
- <testCase name="LoginUser generateDefaultPassword should generate a default password with at least one capital letter" duration="1"/>
16
- <testCase name="LoginUser generateDefaultPassword should generate a default password with at least one number" duration="1"/>
17
- <testCase name="LoginUser generateDefaultPassword should generate a default password with at least one special character" duration="1"/>
18
- <testCase name="LoginUser generateDefaultPassword should generate a default password without any non-acceptable characters" duration="1"/>
19
- <testCase name="LoginUser setPassword should set the password for the user" duration="159"/>
20
- <testCase name="LoginUser setPassword should throw an error if the password does not meet the security requirements" duration="13"/>
21
- <testCase name="LoginUser create should create a new user record" duration="5"/>
22
- <testCase name="LoginUser create should throw an error if user dont have the privilege to create new user" duration="2"/>
23
- <testCase name="LoginUser create should throw an error if user email is missing" duration="2"/>
24
- <testCase name="LoginUser incrementFailedLoginAttemptCount should increment FailedLoginAttemptCount and update user status" duration="1"/>
25
- <testCase name="LoginUser incrementFailedLoginAttemptCount should throw an error if maxFailedLoginAttempts or autoReleaseYN is missing" duration="1"/>
26
- <testCase name="LoginUser incrementFailedLoginAttemptCount should lock the user account if the failed login attempts exceed the maximum allowed" duration="1"/>
27
- <testCase name="LoginUser incrementFailedLoginAttemptCount should permanently lock the user account if the failed login attempts exceed the maximum allowed and autoReleaseYN is N" duration="1"/>
28
- <testCase name="LoginUser combineSystemAccess should combine user and group system access and remove duplicates" duration="1"/>
29
- <testCase name="LoginUser checkPrivileges should return true if user has the specified privilege" duration="1"/>
30
- <testCase name="LoginUser checkPrivileges should return false if user does not have the specified privilege" duration="1"/>
31
- <testCase name="LoginUser checkPrivileges should throw an error if ObjectId is not set" duration="1"/>
32
- <testCase name="LoginUser getObjectPrivileges should return an array of privileges" duration="1"/>
33
- <testCase name="LoginUser getObjectPrivileges should throw an error if an exception occurs" duration="1"/>
34
- <testCase name="LoginUser getUserPersonalPrivileges should return an array of privileges" duration="2"/>
35
- <testCase name="LoginUser getUserPersonalPrivileges should throw an error if an error occurs" duration="1"/>
36
- <testCase name="LoginUser getInheritedSystemAccess should return group system access with its parent group system access if applicable" duration="3"/>
37
- </file>
38
- <file path="C:\Work\sso\__tests__\unit\components\system\system.spec.ts">
39
- <testCase name="System init should initialize a system when SystemCode is provided" duration="3"/>
40
- <testCase name="System init should throw an error when SystemCode is not found" duration="8"/>
41
- <testCase name="System init should initialize a new system when SystemCode is not provided" duration="1"/>
42
- <testCase name="System createSystem should create a new system" duration="4"/>
43
- <testCase name="System createSystem should throw an error when user does not have permission" duration="1"/>
44
- <testCase name="System createSystem should throw an error when SystemCode is missing" duration="1"/>
45
- <testCase name="System createSystem should throw an error when Name is missing" duration="1"/>
46
- <testCase name="System createSystem should throw an error when Description is missing" duration="1"/>
47
- <testCase name="System createSystem should throw an error when failed to create system" duration="5"/>
48
- <testCase name="System setSystemCode should set the SystemCode when there is no duplicate" duration="1"/>
49
- <testCase name="System setSystemCode should throw an error when SystemCode already exists" duration="1"/>
50
- <testCase name="System setSystemCode should throw an error when failed to check duplicate SystemCode" duration="1"/>
51
- <testCase name="System findAll should find all systems based on filter" duration="2"/>
52
- <testCase name="System findAll should find all systems without pagination when page and rows are not provided" duration="1"/>
53
- </file>
54
- <file path="C:\Work\sso\__tests__\unit\components\group-object-privilege\group-object-privilege.spec.ts">
55
- <testCase name="GroupObjectPrivilege should create an instance of GroupObjectPrivilege" duration="2"/>
56
- <testCase name="GroupObjectPrivilege should have the correct TableName" duration="0"/>
57
- <testCase name="GroupObjectPrivilege should have the correct properties" duration="1"/>
58
- <testCase name="GroupObjectPrivilege init should return an instance of GroupObjectPrivilege when GroupObjectPrivilegeId is provided" duration="2"/>
59
- <testCase name="GroupObjectPrivilege init should throw an error when GroupObjectPrivilegeId is provided but no GroupObjectPrivilege is found" duration="3"/>
60
- <testCase name="GroupObjectPrivilege init should return a new instance of GroupObjectPrivilege when GroupObjectPrivilegeId is not provided" duration="3"/>
61
- </file>
62
- <file path="C:\Work\sso\__tests__\unit\components\group-system-access\group-system-access.spec.ts">
63
- <testCase name="GroupSystemAccess should create a new GroupSystemAccess instance" duration="2"/>
64
- <testCase name="GroupSystemAccess init should initialize GroupSystemAccess without GroupSystemAccessId" duration="2"/>
65
- <testCase name="GroupSystemAccess init should initialize GroupSystemAccess with GroupSystemAccessId" duration="3"/>
66
- <testCase name="GroupSystemAccess init should throw an error if GroupSystemAccessId is not found" duration="5"/>
67
- </file>
68
- <file path="C:\Work\sso\__tests__\unit\components\group\group.spec.ts">
69
- <testCase name="Group should initialize a group with valid GroupCode" duration="4"/>
70
- <testCase name="Group should throw an error when initializing a group with invalid GroupCode" duration="5"/>
71
- <testCase name="Group should throw an error when initializing a group with an error" duration="2"/>
72
- </file>
73
- <file path="C:\Work\sso\__tests__\unit\components\group-reporting-user\group-reporting-user.spec.ts">
74
- <testCase name="GroupReportingUser init should initialize GroupReportingUser without GroupReportingUserId" duration="3"/>
75
- <testCase name="GroupReportingUser init should initialize GroupReportingUser with valid GroupReportingUserId" duration="2"/>
76
- <testCase name="GroupReportingUser init should throw ClassError when GroupReportingUser is not found" duration="8"/>
77
- <testCase name="GroupReportingUser init should throw ClassError when failed to initialize GroupReportingUser" duration="1"/>
78
- </file>
79
- <file path="C:\Work\sso\__tests__\unit\components\system-privilege\system-privilege.spec.ts">
80
- <testCase name="SystemPrivilege constructor should create a new SystemPrivilege instance" duration="2"/>
81
- <testCase name="SystemPrivilege init should initialize SystemPrivilege without PrivilegeCode" duration="1"/>
82
- <testCase name="SystemPrivilege init should initialize SystemPrivilege with PrivilegeCode" duration="2"/>
83
- <testCase name="SystemPrivilege init should throw an error if PrivilegeCode is not found" duration="4"/>
84
- </file>
85
- <file path="C:\Work\sso\__tests__\unit\components\user-group\user-group.spec.ts">
86
- <testCase name="UserGroup constructor should create a new UserGroup instance" duration="3"/>
87
- <testCase name="UserGroup init should initialize UserGroup with valid UserGroupId" duration="2"/>
88
- <testCase name="UserGroup init should throw ClassError when UserGroupId is not found" duration="5"/>
89
- </file>
90
- <file path="C:\Work\sso\__tests__\unit\components\user-object-privilege\user-object-privilege.spec.ts">
91
- <testCase name="UserObjectPrivilege constructor should create a new UserObjectPrivilege instance" duration="2"/>
92
- <testCase name="UserObjectPrivilege init should initialize UserObjectPrivilege with valid ObjectPrivilegeId" duration="5"/>
93
- <testCase name="UserObjectPrivilege init should throw ClassError when ObjectPrivilegeId is not found" duration="4"/>
94
- </file>
95
- <file path="C:\Work\sso\__tests__\unit\components\group-privilege\group-privilege.spec.ts">
96
- <testCase name="GroupPrivilege should initialize with GroupPrivilegeAttr" duration="6"/>
97
- <testCase name="GroupPrivilege should throw ClassError when GroupPrivilegeAttr is not found" duration="4"/>
98
- <testCase name="GroupPrivilege should initialize with default values" duration="1"/>
99
- </file>
100
- <file path="C:\Work\sso\__tests__\unit\components\user-system-access\user-system-access.spec.ts">
101
- <testCase name="UserSystemAccess constructor should create a new UserSystemAccess instance" duration="2"/>
102
- <testCase name="UserSystemAccess init should initialize UserSystemAccess with valid UserSystemAccessId" duration="2"/>
103
- <testCase name="UserSystemAccess init should throw ClassError when UserSystemAccessId is not found" duration="1"/>
104
- </file>
105
- <file path="C:\Work\sso\__tests__\unit\components\user-privilege\user-privilege.spec.ts">
106
- <testCase name="UserPrivilege constructor should create a new UserPrivilege instance" duration="2"/>
107
- <testCase name="UserPrivilege init should initialize UserPrivilege with valid UserPrivilegeId" duration="2"/>
108
- <testCase name="UserPrivilege init should throw ClassError when UserPrivilegeId is not found" duration="4"/>
109
- </file>
110
- <file path="C:\Work\sso\__tests__\unit\session\session.service.spec.ts">
111
- <testCase name="session.service should return session service when instansiated" duration="2"/>
112
- <testCase name="session.service should able to write session data" duration="3"/>
113
- <testCase name="session.service should able to refresh session data" duration="3"/>
114
- </file>
115
- <file path="C:\Work\sso\__tests__\unit\system-privilege\system-privilage.spec.ts">
116
- <testCase name="SystemPrivilege should be true" duration="2"/>
117
- </file>
118
- <file path="C:\Work\sso\__tests__\unit\components\password-hash\password-hash.service.spec.ts">
119
- <testCase name="password-hash.service should return hash password" duration="2"/>
120
- <testCase name="password-hash.service should return true when verify password" duration="1"/>
121
- </file>
122
- <file path="C:\Work\sso\__tests__\unit\redis-client\redis.service.spec.ts">
123
- <testCase name="redis.service should return redis service when instansiated" duration="1"/>
124
- <testCase name="redis.service should able to write and read redis" duration="2"/>
125
- </file>
126
- <file path="C:\Work\sso\__tests__\unit\components\login-user\l.spec.ts">
127
- <testCase name="SystemPrivilege should be true" duration="1"/>
128
- </file>
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <testExecutions version="1">
3
+ <file path="C:\Work\sso\__tests__\unit\components\login-user\login.spec.ts">
4
+ <testCase name="LoginUser init should initialize LoginUser with valid userId" duration="5"/>
5
+ <testCase name="LoginUser init should throw an error when user is not found" duration="20"/>
6
+ <testCase name="LoginUser checkSession should throw an error if session expired" duration="20"/>
7
+ <testCase name="LoginUser checkSession should refresh the session duration if session is valid" duration="2"/>
8
+ <testCase name="LoginUser shouldReleaseLock should return true if autoReleaseYN is &quot;Y&quot; and time difference is greater than minuteToAutoRelease" duration="2"/>
9
+ <testCase name="LoginUser shouldReleaseLock should return false if autoReleaseYN is &quot;Y&quot; and time difference is less than or equal to minuteToAutoRelease" duration="1"/>
10
+ <testCase name="LoginUser shouldReleaseLock should return false if autoReleaseYN is &quot;N&quot;" duration="1"/>
11
+ <testCase name="LoginUser releaseLock should release the lock for a user" duration="1"/>
12
+ <testCase name="LoginUser checkUserInfoDuplicated should throw an error if duplicate user info is found" duration="1"/>
13
+ <testCase name="LoginUser checkUserInfoDuplicated should not throw an error if duplicate user info is not found" duration="0"/>
14
+ <testCase name="LoginUser generateDefaultPassword should generate a default password with the specified length" duration="2"/>
15
+ <testCase name="LoginUser generateDefaultPassword should generate a default password with at least one capital letter" duration="1"/>
16
+ <testCase name="LoginUser generateDefaultPassword should generate a default password with at least one number" duration="1"/>
17
+ <testCase name="LoginUser generateDefaultPassword should generate a default password with at least one special character" duration="1"/>
18
+ <testCase name="LoginUser generateDefaultPassword should generate a default password without any non-acceptable characters" duration="1"/>
19
+ <testCase name="LoginUser setPassword should set the password for the user" duration="159"/>
20
+ <testCase name="LoginUser setPassword should throw an error if the password does not meet the security requirements" duration="13"/>
21
+ <testCase name="LoginUser create should create a new user record" duration="5"/>
22
+ <testCase name="LoginUser create should throw an error if user dont have the privilege to create new user" duration="2"/>
23
+ <testCase name="LoginUser create should throw an error if user email is missing" duration="2"/>
24
+ <testCase name="LoginUser incrementFailedLoginAttemptCount should increment FailedLoginAttemptCount and update user status" duration="1"/>
25
+ <testCase name="LoginUser incrementFailedLoginAttemptCount should throw an error if maxFailedLoginAttempts or autoReleaseYN is missing" duration="1"/>
26
+ <testCase name="LoginUser incrementFailedLoginAttemptCount should lock the user account if the failed login attempts exceed the maximum allowed" duration="1"/>
27
+ <testCase name="LoginUser incrementFailedLoginAttemptCount should permanently lock the user account if the failed login attempts exceed the maximum allowed and autoReleaseYN is N" duration="1"/>
28
+ <testCase name="LoginUser combineSystemAccess should combine user and group system access and remove duplicates" duration="1"/>
29
+ <testCase name="LoginUser checkPrivileges should return true if user has the specified privilege" duration="1"/>
30
+ <testCase name="LoginUser checkPrivileges should return false if user does not have the specified privilege" duration="1"/>
31
+ <testCase name="LoginUser checkPrivileges should throw an error if ObjectId is not set" duration="1"/>
32
+ <testCase name="LoginUser getObjectPrivileges should return an array of privileges" duration="1"/>
33
+ <testCase name="LoginUser getObjectPrivileges should throw an error if an exception occurs" duration="1"/>
34
+ <testCase name="LoginUser getUserPersonalPrivileges should return an array of privileges" duration="2"/>
35
+ <testCase name="LoginUser getUserPersonalPrivileges should throw an error if an error occurs" duration="1"/>
36
+ <testCase name="LoginUser getInheritedSystemAccess should return group system access with its parent group system access if applicable" duration="3"/>
37
+ </file>
38
+ <file path="C:\Work\sso\__tests__\unit\components\system\system.spec.ts">
39
+ <testCase name="System init should initialize a system when SystemCode is provided" duration="3"/>
40
+ <testCase name="System init should throw an error when SystemCode is not found" duration="8"/>
41
+ <testCase name="System init should initialize a new system when SystemCode is not provided" duration="1"/>
42
+ <testCase name="System createSystem should create a new system" duration="4"/>
43
+ <testCase name="System createSystem should throw an error when user does not have permission" duration="1"/>
44
+ <testCase name="System createSystem should throw an error when SystemCode is missing" duration="1"/>
45
+ <testCase name="System createSystem should throw an error when Name is missing" duration="1"/>
46
+ <testCase name="System createSystem should throw an error when Description is missing" duration="1"/>
47
+ <testCase name="System createSystem should throw an error when failed to create system" duration="5"/>
48
+ <testCase name="System setSystemCode should set the SystemCode when there is no duplicate" duration="1"/>
49
+ <testCase name="System setSystemCode should throw an error when SystemCode already exists" duration="1"/>
50
+ <testCase name="System setSystemCode should throw an error when failed to check duplicate SystemCode" duration="1"/>
51
+ <testCase name="System findAll should find all systems based on filter" duration="2"/>
52
+ <testCase name="System findAll should find all systems without pagination when page and rows are not provided" duration="1"/>
53
+ </file>
54
+ <file path="C:\Work\sso\__tests__\unit\components\group-object-privilege\group-object-privilege.spec.ts">
55
+ <testCase name="GroupObjectPrivilege should create an instance of GroupObjectPrivilege" duration="2"/>
56
+ <testCase name="GroupObjectPrivilege should have the correct TableName" duration="0"/>
57
+ <testCase name="GroupObjectPrivilege should have the correct properties" duration="1"/>
58
+ <testCase name="GroupObjectPrivilege init should return an instance of GroupObjectPrivilege when GroupObjectPrivilegeId is provided" duration="2"/>
59
+ <testCase name="GroupObjectPrivilege init should throw an error when GroupObjectPrivilegeId is provided but no GroupObjectPrivilege is found" duration="3"/>
60
+ <testCase name="GroupObjectPrivilege init should return a new instance of GroupObjectPrivilege when GroupObjectPrivilegeId is not provided" duration="3"/>
61
+ </file>
62
+ <file path="C:\Work\sso\__tests__\unit\components\group-system-access\group-system-access.spec.ts">
63
+ <testCase name="GroupSystemAccess should create a new GroupSystemAccess instance" duration="2"/>
64
+ <testCase name="GroupSystemAccess init should initialize GroupSystemAccess without GroupSystemAccessId" duration="2"/>
65
+ <testCase name="GroupSystemAccess init should initialize GroupSystemAccess with GroupSystemAccessId" duration="3"/>
66
+ <testCase name="GroupSystemAccess init should throw an error if GroupSystemAccessId is not found" duration="5"/>
67
+ </file>
68
+ <file path="C:\Work\sso\__tests__\unit\components\group\group.spec.ts">
69
+ <testCase name="Group should initialize a group with valid GroupCode" duration="4"/>
70
+ <testCase name="Group should throw an error when initializing a group with invalid GroupCode" duration="5"/>
71
+ <testCase name="Group should throw an error when initializing a group with an error" duration="2"/>
72
+ </file>
73
+ <file path="C:\Work\sso\__tests__\unit\components\group-reporting-user\group-reporting-user.spec.ts">
74
+ <testCase name="GroupReportingUser init should initialize GroupReportingUser without GroupReportingUserId" duration="3"/>
75
+ <testCase name="GroupReportingUser init should initialize GroupReportingUser with valid GroupReportingUserId" duration="2"/>
76
+ <testCase name="GroupReportingUser init should throw ClassError when GroupReportingUser is not found" duration="8"/>
77
+ <testCase name="GroupReportingUser init should throw ClassError when failed to initialize GroupReportingUser" duration="1"/>
78
+ </file>
79
+ <file path="C:\Work\sso\__tests__\unit\components\system-privilege\system-privilege.spec.ts">
80
+ <testCase name="SystemPrivilege constructor should create a new SystemPrivilege instance" duration="2"/>
81
+ <testCase name="SystemPrivilege init should initialize SystemPrivilege without PrivilegeCode" duration="1"/>
82
+ <testCase name="SystemPrivilege init should initialize SystemPrivilege with PrivilegeCode" duration="2"/>
83
+ <testCase name="SystemPrivilege init should throw an error if PrivilegeCode is not found" duration="4"/>
84
+ </file>
85
+ <file path="C:\Work\sso\__tests__\unit\components\user-group\user-group.spec.ts">
86
+ <testCase name="UserGroup constructor should create a new UserGroup instance" duration="3"/>
87
+ <testCase name="UserGroup init should initialize UserGroup with valid UserGroupId" duration="2"/>
88
+ <testCase name="UserGroup init should throw ClassError when UserGroupId is not found" duration="5"/>
89
+ </file>
90
+ <file path="C:\Work\sso\__tests__\unit\components\user-object-privilege\user-object-privilege.spec.ts">
91
+ <testCase name="UserObjectPrivilege constructor should create a new UserObjectPrivilege instance" duration="2"/>
92
+ <testCase name="UserObjectPrivilege init should initialize UserObjectPrivilege with valid ObjectPrivilegeId" duration="5"/>
93
+ <testCase name="UserObjectPrivilege init should throw ClassError when ObjectPrivilegeId is not found" duration="4"/>
94
+ </file>
95
+ <file path="C:\Work\sso\__tests__\unit\components\group-privilege\group-privilege.spec.ts">
96
+ <testCase name="GroupPrivilege should initialize with GroupPrivilegeAttr" duration="6"/>
97
+ <testCase name="GroupPrivilege should throw ClassError when GroupPrivilegeAttr is not found" duration="4"/>
98
+ <testCase name="GroupPrivilege should initialize with default values" duration="1"/>
99
+ </file>
100
+ <file path="C:\Work\sso\__tests__\unit\components\user-system-access\user-system-access.spec.ts">
101
+ <testCase name="UserSystemAccess constructor should create a new UserSystemAccess instance" duration="2"/>
102
+ <testCase name="UserSystemAccess init should initialize UserSystemAccess with valid UserSystemAccessId" duration="2"/>
103
+ <testCase name="UserSystemAccess init should throw ClassError when UserSystemAccessId is not found" duration="1"/>
104
+ </file>
105
+ <file path="C:\Work\sso\__tests__\unit\components\user-privilege\user-privilege.spec.ts">
106
+ <testCase name="UserPrivilege constructor should create a new UserPrivilege instance" duration="2"/>
107
+ <testCase name="UserPrivilege init should initialize UserPrivilege with valid UserPrivilegeId" duration="2"/>
108
+ <testCase name="UserPrivilege init should throw ClassError when UserPrivilegeId is not found" duration="4"/>
109
+ </file>
110
+ <file path="C:\Work\sso\__tests__\unit\session\session.service.spec.ts">
111
+ <testCase name="session.service should return session service when instansiated" duration="2"/>
112
+ <testCase name="session.service should able to write session data" duration="3"/>
113
+ <testCase name="session.service should able to refresh session data" duration="3"/>
114
+ </file>
115
+ <file path="C:\Work\sso\__tests__\unit\system-privilege\system-privilage.spec.ts">
116
+ <testCase name="SystemPrivilege should be true" duration="2"/>
117
+ </file>
118
+ <file path="C:\Work\sso\__tests__\unit\components\password-hash\password-hash.service.spec.ts">
119
+ <testCase name="password-hash.service should return hash password" duration="2"/>
120
+ <testCase name="password-hash.service should return true when verify password" duration="1"/>
121
+ </file>
122
+ <file path="C:\Work\sso\__tests__\unit\redis-client\redis.service.spec.ts">
123
+ <testCase name="redis.service should return redis service when instansiated" duration="1"/>
124
+ <testCase name="redis.service should able to write and read redis" duration="2"/>
125
+ </file>
126
+ <file path="C:\Work\sso\__tests__\unit\components\login-user\l.spec.ts">
127
+ <testCase name="SystemPrivilege should be true" duration="1"/>
128
+ </file>
129
129
  </testExecutions>
@@ -1,40 +1,40 @@
1
-
2
- -- example to create sso-user
3
- CREATE USER 'sso_user'@'environment' IDENTIFIED BY 'password';
4
-
5
- -- example to grant neccesary access to run migration
6
- GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_authorization_codes TO 'sso_user'@'localhost' WITH GRANT OPTION;
7
- GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_bearer_tokens TO 'sso_user'@'localhost' WITH GRANT OPTION;
8
- GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_building_types TO 'sso_user'@'localhost' WITH GRANT OPTION;
9
- GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_buildings TO 'sso_user'@'localhost' WITH GRANT OPTION;
10
- GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_cities TO 'sso_user'@'localhost' WITH GRANT OPTION;
11
- GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_companies TO 'sso_user'@'localhost' WITH GRANT OPTION;
12
- GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_countries TO 'sso_user'@'localhost' WITH GRANT OPTION;
13
- GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_departments TO 'sso_user'@'localhost' WITH GRANT OPTION;
14
- GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_grouproleprivilege TO 'sso_user'@'localhost' WITH GRANT OPTION;
15
- GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_groupsystemaccess TO 'sso_user'@'localhost' WITH GRANT OPTION;
16
- GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_groupsystemprivilege TO 'sso_user'@'localhost' WITH GRANT OPTION;
17
- GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_groupsystemrole TO 'sso_user'@'localhost' WITH GRANT OPTION;
18
- GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_oauth_tokens TO 'sso_user'@'localhost' WITH GRANT OPTION;
19
- GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_roles TO 'sso_user'@'localhost' WITH GRANT OPTION;
20
- GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_sequelize_meta TO 'sso_user'@'localhost' WITH GRANT OPTION;
21
- GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_staff_types TO 'sso_user'@'localhost' WITH GRANT OPTION;
22
- GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_staffs TO 'sso_user'@'localhost' WITH GRANT OPTION;
23
- GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_states TO 'sso_user'@'localhost' WITH GRANT OPTION;
24
- GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_system_accesses TO 'sso_user'@'localhost' WITH GRANT OPTION;
25
- GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_systemprivilege TO 'sso_user'@'localhost' WITH GRANT OPTION;
26
- GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_systemrole TO 'sso_user'@'localhost' WITH GRANT OPTION;
27
- GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_systemroleprivilege TO 'sso_user'@'localhost' WITH GRANT OPTION;
28
- GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_systems TO 'sso_user'@'localhost' WITH GRANT OPTION;
29
- GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_updated_history TO 'sso_user'@'localhost' WITH GRANT OPTION;
30
- GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_user_roles TO 'sso_user'@'localhost' WITH GRANT OPTION;
31
- GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_usergroup TO 'sso_user'@'localhost' WITH GRANT OPTION;
32
- GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_users TO 'sso_user'@'localhost' WITH GRANT OPTION;
33
- GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_usersystemprivilege TO 'sso_user'@'localhost' WITH GRANT OPTION;
34
- GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_usersystemrole TO 'sso_user'@'localhost' WITH GRANT OPTION;
35
- GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_UserUserGroup TO 'sso_user'@'localhost' WITH GRANT OPTION;
36
- GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production._prisma_migrations TO 'sso_user'@'localhost' WITH GRANT OPTION;
37
-
38
-
39
- -- Grant user to create, alter, drop, references on the database (required for creating shadow tables)
1
+
2
+ -- example to create sso-user
3
+ CREATE USER 'sso_user'@'environment' IDENTIFIED BY 'password';
4
+
5
+ -- example to grant neccesary access to run migration
6
+ GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_authorization_codes TO 'sso_user'@'localhost' WITH GRANT OPTION;
7
+ GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_bearer_tokens TO 'sso_user'@'localhost' WITH GRANT OPTION;
8
+ GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_building_types TO 'sso_user'@'localhost' WITH GRANT OPTION;
9
+ GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_buildings TO 'sso_user'@'localhost' WITH GRANT OPTION;
10
+ GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_cities TO 'sso_user'@'localhost' WITH GRANT OPTION;
11
+ GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_companies TO 'sso_user'@'localhost' WITH GRANT OPTION;
12
+ GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_countries TO 'sso_user'@'localhost' WITH GRANT OPTION;
13
+ GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_departments TO 'sso_user'@'localhost' WITH GRANT OPTION;
14
+ GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_grouproleprivilege TO 'sso_user'@'localhost' WITH GRANT OPTION;
15
+ GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_groupsystemaccess TO 'sso_user'@'localhost' WITH GRANT OPTION;
16
+ GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_groupsystemprivilege TO 'sso_user'@'localhost' WITH GRANT OPTION;
17
+ GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_groupsystemrole TO 'sso_user'@'localhost' WITH GRANT OPTION;
18
+ GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_oauth_tokens TO 'sso_user'@'localhost' WITH GRANT OPTION;
19
+ GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_roles TO 'sso_user'@'localhost' WITH GRANT OPTION;
20
+ GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_sequelize_meta TO 'sso_user'@'localhost' WITH GRANT OPTION;
21
+ GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_staff_types TO 'sso_user'@'localhost' WITH GRANT OPTION;
22
+ GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_staffs TO 'sso_user'@'localhost' WITH GRANT OPTION;
23
+ GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_states TO 'sso_user'@'localhost' WITH GRANT OPTION;
24
+ GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_system_accesses TO 'sso_user'@'localhost' WITH GRANT OPTION;
25
+ GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_systemprivilege TO 'sso_user'@'localhost' WITH GRANT OPTION;
26
+ GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_systemrole TO 'sso_user'@'localhost' WITH GRANT OPTION;
27
+ GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_systemroleprivilege TO 'sso_user'@'localhost' WITH GRANT OPTION;
28
+ GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_systems TO 'sso_user'@'localhost' WITH GRANT OPTION;
29
+ GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_updated_history TO 'sso_user'@'localhost' WITH GRANT OPTION;
30
+ GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_user_roles TO 'sso_user'@'localhost' WITH GRANT OPTION;
31
+ GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_usergroup TO 'sso_user'@'localhost' WITH GRANT OPTION;
32
+ GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_users TO 'sso_user'@'localhost' WITH GRANT OPTION;
33
+ GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_usersystemprivilege TO 'sso_user'@'localhost' WITH GRANT OPTION;
34
+ GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_usersystemrole TO 'sso_user'@'localhost' WITH GRANT OPTION;
35
+ GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_UserUserGroup TO 'sso_user'@'localhost' WITH GRANT OPTION;
36
+ GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production._prisma_migrations TO 'sso_user'@'localhost' WITH GRANT OPTION;
37
+
38
+
39
+ -- Grant user to create, alter, drop, references on the database (required for creating shadow tables)
40
40
  GRANT CREATE, ALTER, DROP, REFERENCES ON shadow_database.* TO 'sso_user'@'localhost' WITH GRANT OPTION;
@@ -32,4 +32,21 @@ export declare class SystemPrivilege extends ObjectBase {
32
32
  SystemPrivileges: SystemPrivilege[];
33
33
  }>;
34
34
  static loadAllPrivileges(dbTransaction: any, systemCode: string): Promise<string>;
35
+ update(loginUser: LoginUser, dbTransaction: any, privilege: {
36
+ PrivilegeCode?: string;
37
+ Description?: string;
38
+ SystemCode?: string;
39
+ Status?: string;
40
+ }): Promise<{
41
+ SystemPrivilegeId: string;
42
+ PrivilegeCode: string;
43
+ Description: string;
44
+ SystemCode: string;
45
+ Status: string;
46
+ CreatedById: number;
47
+ CreatedAt: Date;
48
+ UpdatedById: number;
49
+ UpdatedAt: Date;
50
+ }>;
51
+ delete(dbTransaction: any, loginUser: LoginUser): Promise<this>;
35
52
  }
@@ -144,7 +144,7 @@ class SystemPrivilege extends general_1.ObjectBase {
144
144
  activity.Action = activity_history_1.ActionEnum.CREATE;
145
145
  activity.Description = 'Add System Privilege';
146
146
  activity.EntityType = 'SystemPrivilege';
147
- activity.EntityId = newSystemPrivilege.SystemCode;
147
+ activity.EntityId = newSystemPrivilege.SystemPrivilegeId;
148
148
  activity.EntityValueBefore = JSON.stringify(EntityValueBefore);
149
149
  activity.EntityValueAfter = JSON.stringify(EntityValueAfter);
150
150
  yield activity.create(loginUser.ObjectId, dbTransaction);
@@ -235,6 +235,100 @@ class SystemPrivilege extends general_1.ObjectBase {
235
235
  }
236
236
  });
237
237
  }
238
+ update(loginUser, dbTransaction, privilege) {
239
+ return __awaiter(this, void 0, void 0, function* () {
240
+ try {
241
+ const entityValueBefore = {
242
+ SystemPrivilegeId: this.SystemPrivilegeId,
243
+ Description: this.Description,
244
+ PrivilegeCode: this.PrivilegeCode,
245
+ SystemCode: this.SystemCode,
246
+ Status: this.Status,
247
+ CreatedById: this.CreatedById,
248
+ CreatedAt: this.CreatedAt,
249
+ UpdatedById: this.UpdatedById,
250
+ UpdatedAt: this.UpdatedAt,
251
+ };
252
+ yield SystemPrivilege._Repository.update({
253
+ PrivilegeCode: privilege.PrivilegeCode || this.PrivilegeCode,
254
+ Description: privilege.Description || this.Description,
255
+ SystemCode: privilege.SystemCode || this.SystemCode,
256
+ Status: privilege.Status || this.Status,
257
+ UpdatedById: loginUser.UserId,
258
+ UpdatedAt: new Date(),
259
+ }, {
260
+ where: {
261
+ SystemPrivilegeId: this.SystemPrivilegeId,
262
+ },
263
+ transaction: dbTransaction,
264
+ });
265
+ const entityValueAfter = {
266
+ SystemPrivilegeId: this.SystemPrivilegeId,
267
+ PrivilegeCode: privilege.PrivilegeCode || this.PrivilegeCode,
268
+ Description: privilege.Description || this.Description,
269
+ SystemCode: privilege.SystemCode || this.SystemCode,
270
+ Status: privilege.Status || this.Status,
271
+ CreatedById: this.CreatedById,
272
+ CreatedAt: this.CreatedAt,
273
+ UpdatedById: this.UpdatedById,
274
+ UpdatedAt: this.UpdatedAt,
275
+ };
276
+ const activity = new activity_history_1.Activity();
277
+ activity.ActivityId = activity.createId();
278
+ activity.Action = activity_history_1.ActionEnum.UPDATE;
279
+ activity.Description = 'Update System Privilege';
280
+ activity.EntityType = 'SystemPrivilege';
281
+ activity.EntityId = this.SystemPrivilegeId + '';
282
+ activity.EntityValueBefore = JSON.stringify(entityValueBefore);
283
+ activity.EntityValueAfter = JSON.stringify(entityValueAfter);
284
+ yield activity.create(loginUser.ObjectId, dbTransaction);
285
+ return entityValueAfter;
286
+ }
287
+ catch (error) {
288
+ throw error;
289
+ }
290
+ });
291
+ }
292
+ delete(dbTransaction, loginUser) {
293
+ return __awaiter(this, void 0, void 0, function* () {
294
+ try {
295
+ const systemCode = config_1.ApplicationConfig.getComponentConfigValue('system-code');
296
+ const isPrivileged = yield loginUser.checkPrivileges(systemCode, 'PRIVILEGE_DELETE');
297
+ if (!isPrivileged) {
298
+ throw new general_1.ClassError('SystemPrivilege', 'SystemPrivilegeErrMsg0X', 'You do not have permission to delete system privileges');
299
+ }
300
+ if (!this.SystemPrivilegeId) {
301
+ throw new general_1.ClassError('SystemPrivilege', 'SystemPrivilegeErrMsg02', 'System Privilege Id is required');
302
+ }
303
+ yield SystemPrivilege._Repository.delete(this.SystemPrivilegeId, dbTransaction);
304
+ const EntityValueBefore = {
305
+ SystemPrivilegeId: this.ObjectId,
306
+ PrivilegeCode: this.PrivilegeCode,
307
+ SystemCode: this.SystemCode,
308
+ Description: this.Description,
309
+ Status: this.Status,
310
+ CreatedById: this._CreatedById,
311
+ UpdatedById: this._UpdatedById,
312
+ CreatedAt: this._CreatedAt,
313
+ UpdatedAt: this._UpdatedAt,
314
+ };
315
+ const EntityValueAfter = {};
316
+ const activity = new activity_history_1.Activity();
317
+ activity.ActivityId = activity.createId();
318
+ activity.Action = activity_history_1.ActionEnum.DELETE;
319
+ activity.Description = 'Delete System Privilege';
320
+ activity.EntityType = 'SystemPrivilege';
321
+ activity.EntityId = this.SystemPrivilegeId;
322
+ activity.EntityValueBefore = JSON.stringify(EntityValueBefore);
323
+ activity.EntityValueAfter = JSON.stringify(EntityValueAfter);
324
+ yield activity.create(loginUser.ObjectId, dbTransaction);
325
+ return this;
326
+ }
327
+ catch (error) {
328
+ throw error;
329
+ }
330
+ });
331
+ }
238
332
  }
239
333
  exports.SystemPrivilege = SystemPrivilege;
240
334
  SystemPrivilege._Repository = new system_privilege_repository_1.SystemPrivilegeRepository();
@@ -1 +1 @@
1
- {"version":3,"file":"system-privilege.js","sourceRoot":"","sources":["../../../../src/components/system-privilege/system-privilege.ts"],"names":[],"mappings":";;;;;;;;;;;;AAAA,4CAAwD;AACxD,mEAA+D;AAC/D,+EAA0E;AAG1E,0CAAmE;AACnE,6CAA0C;AAC1C,8DAA+D;AAE/D,yCAA+B;AAE/B,MAAa,eAAgB,SAAQ,oBAAU;IAc7C,IAAI,iBAAiB;QACnB,OAAO,IAAI,CAAC,QAAQ,CAAC;IACvB,CAAC;IAED,IAAI,iBAAiB,CAAC,KAAa;QACjC,IAAI,CAAC,QAAQ,GAAG,KAAK,CAAC;IACxB,CAAC;IAED,IAAI,SAAS;QACX,OAAO,IAAI,CAAC,UAAU,CAAC;IACzB,CAAC;IAED,IAAI,SAAS;QACX,OAAO,IAAI,CAAC,UAAU,CAAC;IACzB,CAAC;IAED,IAAI,WAAW;QACb,OAAO,IAAI,CAAC,YAAY,CAAC;IAC3B,CAAC;IAED,IAAI,WAAW;QACb,OAAO,IAAI,CAAC,YAAY,CAAC;IAC3B,CAAC;IAKD,YAAoB,mBAA0C;QAC5D,KAAK,EAAE,CAAC;QAzCV,eAAU,GAAG,iBAAiB,CAAC;QAC/B,cAAS,GAAG,qBAAqB,CAAC;QAyChC,IAAI,mBAAmB,EAAE;YACvB,IAAI,CAAC,iBAAiB,GAAG,mBAAmB,CAAC,iBAAiB,CAAC;YAC/D,IAAI,CAAC,aAAa,GAAG,mBAAmB,CAAC,aAAa,CAAC;YACvD,IAAI,CAAC,UAAU,GAAG,mBAAmB,CAAC,UAAU,CAAC;YACjD,IAAI,CAAC,WAAW,GAAG,mBAAmB,CAAC,WAAW,CAAC;YACnD,IAAI,CAAC,MAAM,GAAG,mBAAmB,CAAC,MAAM,CAAC;YACzC,IAAI,CAAC,YAAY,GAAG,mBAAmB,CAAC,WAAW,CAAC;YACpD,IAAI,CAAC,UAAU,GAAG,mBAAmB,CAAC,SAAS,CAAC;YAChD,IAAI,CAAC,YAAY,GAAG,mBAAmB,CAAC,WAAW,CAAC;YACpD,IAAI,CAAC,UAAU,GAAG,mBAAmB,CAAC,SAAS,CAAC;SACjD;IACH,CAAC;IAED,aAAa,CAAC,mBAAyC;QACrD,IAAI,CAAC,aAAa,GAAG,mBAAmB,CAAC,aAAa,CAAC;QACvD,IAAI,CAAC,iBAAiB,GAAG,mBAAmB,CAAC,iBAAiB,CAAC;QAC/D,IAAI,CAAC,UAAU,GAAG,mBAAmB,CAAC,UAAU,CAAC;QACjD,IAAI,CAAC,WAAW,GAAG,mBAAmB,CAAC,WAAW,CAAC;QACnD,IAAI,CAAC,MAAM,GAAG,mBAAmB,CAAC,MAAM,CAAC;QACzC,IAAI,CAAC,UAAU,GAAG,mBAAmB,CAAC,SAAS,CAAC;QAChD,IAAI,CAAC,UAAU,GAAG,mBAAmB,CAAC,SAAS,CAAC;QAChD,IAAI,CAAC,YAAY,GAAG,mBAAmB,CAAC,WAAW,CAAC;QACpD,IAAI,CAAC,YAAY,GAAG,mBAAmB,CAAC,WAAW,CAAC;IACtD,CAAC;IAED,MAAM,CAAO,IAAI,CAAC,aAAkB,EAAE,iBAA0B;;YAC9D,IAAI;gBACF,MAAM,eAAe,GAAG,IAAI,eAAe,EAAE,CAAC;gBAC9C,IAAI,iBAAiB,EAAE;oBACrB,MAAM,mBAAmB,GAAG,MAAM,IAAI,CAAC,WAAW,CAAC,QAAQ,CACzD,iBAAiB,EACjB;wBACE,WAAW,EAAE,aAAa;qBAC3B,CACF,CAAC;oBACF,IAAI,mBAAmB,EAAE;wBACvB,eAAe,CAAC,aAAa,GAAG,mBAAmB,CAAC,aAAa,CAAC;wBAClE,eAAe,CAAC,QAAQ,GAAG,mBAAmB,CAAC,iBAAiB,CAAC;wBACjE,eAAe,CAAC,UAAU,GAAG,mBAAmB,CAAC,UAAU,CAAC;wBAC5D,eAAe,CAAC,WAAW,GAAG,mBAAmB,CAAC,WAAW,CAAC;wBAC9D,eAAe,CAAC,MAAM,GAAG,mBAAmB,CAAC,MAAM,CAAC;wBACpD,eAAe,CAAC,YAAY,GAAG,mBAAmB,CAAC,WAAW,CAAC;wBAC/D,eAAe,CAAC,UAAU,GAAG,mBAAmB,CAAC,SAAS,CAAC;wBAC3D,eAAe,CAAC,YAAY,GAAG,mBAAmB,CAAC,WAAW,CAAC;wBAC/D,eAAe,CAAC,UAAU,GAAG,mBAAmB,CAAC,SAAS,CAAC;qBAC5D;yBAAM;wBACL,MAAM,IAAI,oBAAU,CAClB,iBAAiB,EACjB,yBAAyB,EACzB,4BAA4B,CAC7B,CAAC;qBACH;iBACF;gBACD,OAAO,eAAe,CAAC;aACxB;YAAC,OAAO,KAAK,EAAE;gBACd,MAAM,KAAK,CAAC;aACb;QACH,CAAC;KAAA;IAED,MAAM,CAAO,MAAM,CACjB,SAAoB,EACpB,aAAkB,EAClB,eAAgC;;YAEhC,IAAI;gBAEF,MAAM,UAAU,GACd,0BAAiB,CAAC,uBAAuB,CAAC,aAAa,CAAC,CAAC;gBAC3D,MAAM,YAAY,GAAG,MAAM,SAAS,CAAC,eAAe,CAClD,UAAU,EACV,kBAAkB,CACnB,CAAC;gBACF,IAAI,CAAC,YAAY,EAAE;oBACjB,MAAM,IAAI,oBAAU,CAClB,iBAAiB,EACjB,yBAAyB,EACzB,wDAAwD,CACzD,CAAC;iBACH;gBAID,IAAI,CAAC,eAAe,CAAC,UAAU,EAAE;oBAC/B,MAAM,IAAI,oBAAU,CAClB,iBAAiB,EACjB,yBAAyB,EACzB,yBAAyB,CAC1B,CAAC;iBACH;gBAED,IAAI,CAAC,eAAe,CAAC,aAAa,EAAE;oBAClC,MAAM,IAAI,oBAAU,CAClB,iBAAiB,EACjB,yBAAyB,EACzB,4BAA4B,CAC7B,CAAC;iBACH;gBAGD,MAAM,eAAM,CAAC,IAAI,CAAC,aAAa,EAAE,eAAe,CAAC,UAAU,CAAC,CAAC;gBAG7D,MAAM,uBAAuB,GAAG,MAAM,IAAI,CAAC,WAAW,CAAC,QAAQ,CAC7D,eAAe,CAAC,aAAa,EAC7B;oBACE,WAAW,EAAE,aAAa;iBAC3B,CACF,CAAC;gBAGF,IAAI,uBAAuB,EAAE;oBAC3B,MAAM,IAAI,oBAAU,CAClB,iBAAiB,EACjB,yBAAyB,EACzB,iCAAiC,CAClC,CAAC;iBACH;gBAID,MAAM,kBAAkB,GAAG,IAAI,eAAe,EAAE,CAAC;gBACjD,kBAAkB,CAAC,QAAQ,GAAG,kBAAkB,CAAC,QAAQ,EAAE,CAAC;gBAC5D,kBAAkB,CAAC,aAAa,GAAG,eAAe,CAAC,aAAa,CAAC;gBACjE,kBAAkB,CAAC,UAAU,GAAG,eAAe,CAAC,UAAU,CAAC;gBAC3D,kBAAkB,CAAC,WAAW,GAAG,eAAe,CAAC,WAAW,CAAC;gBAC7D,kBAAkB,CAAC,MAAM,GAAG,QAAQ,CAAC;gBACrC,kBAAkB,CAAC,YAAY,GAAG,SAAS,CAAC,MAAM,CAAC;gBACnD,kBAAkB,CAAC,YAAY,GAAG,SAAS,CAAC,MAAM,CAAC;gBACnD,kBAAkB,CAAC,UAAU,GAAG,IAAI,IAAI,EAAE,CAAC;gBAC3C,kBAAkB,CAAC,UAAU,GAAG,IAAI,IAAI,EAAE,CAAC;gBAG3C,MAAM,IAAI,CAAC,WAAW,CAAC,MAAM,CAC3B;oBACE,iBAAiB,EAAE,kBAAkB,CAAC,QAAQ;oBAC9C,aAAa,EAAE,kBAAkB,CAAC,aAAa;oBAC/C,UAAU,EAAE,kBAAkB,CAAC,UAAU;oBACzC,WAAW,EAAE,kBAAkB,CAAC,WAAW;oBAC3C,MAAM,EAAE,kBAAkB,CAAC,MAAM;oBACjC,WAAW,EAAE,kBAAkB,CAAC,YAAY;oBAC5C,WAAW,EAAE,kBAAkB,CAAC,YAAY;oBAC5C,SAAS,EAAE,kBAAkB,CAAC,UAAU;oBACxC,SAAS,EAAE,kBAAkB,CAAC,UAAU;iBACzC,EACD;oBACE,WAAW,EAAE,aAAa;iBAC3B,CACF,CAAC;gBAIF,MAAM,iBAAiB,GAAG,EAAE,CAAC;gBAE7B,MAAM,gBAAgB,GAAG,kBAAkB,CAAC;gBAG5C,MAAM,QAAQ,GAAG,IAAI,2BAAQ,EAAE,CAAC;gBAChC,QAAQ,CAAC,UAAU,GAAG,QAAQ,CAAC,QAAQ,EAAE,CAAC;gBAC1C,QAAQ,CAAC,MAAM,GAAG,6BAAU,CAAC,MAAM,CAAC;gBACpC,QAAQ,CAAC,WAAW,GAAG,sBAAsB,CAAC;gBAC9C,QAAQ,CAAC,UAAU,GAAG,iBAAiB,CAAC;gBACxC,QAAQ,CAAC,QAAQ,GAAG,kBAAkB,CAAC,UAAU,CAAC;gBAClD,QAAQ,CAAC,iBAAiB,GAAG,IAAI,CAAC,SAAS,CAAC,iBAAiB,CAAC,CAAC;gBAC/D,QAAQ,CAAC,gBAAgB,GAAG,IAAI,CAAC,SAAS,CAAC,gBAAgB,CAAC,CAAC;gBAG7D,MAAM,QAAQ,CAAC,MAAM,CAAC,SAAS,CAAC,QAAQ,EAAE,aAAa,CAAC,CAAC;gBAEzD,OAAO,kBAAkB,CAAC;aAC3B;YAAC,OAAO,KAAK,EAAE;gBACd,MAAM,KAAK,CAAC;aACb;QACH,CAAC;KAAA;IAEM,MAAM,CAAO,OAAO,CACzB,SAAoB,EACpB,aAAkB,EAClB,IAAa,EACb,GAAY,EACZ,MAA+B;;YAE/B,IAAI;gBAEF,MAAM,UAAU,GACd,0BAAiB,CAAC,uBAAuB,CAAC,aAAa,CAAC,CAAC;gBAC3D,MAAM,YAAY,GAAG,MAAM,SAAS,CAAC,eAAe,CAClD,UAAU,EACV,gBAAgB,CACjB,CAAC;gBAEF,IAAI,CAAC,YAAY,EAAE;oBACjB,MAAM,IAAI,oBAAU,CAClB,iBAAiB,EACjB,yBAAyB,EACzB,sDAAsD,CACvD,CAAC;iBACH;gBAGD,MAAM,OAAO,GAAQ;oBACnB,KAAK,EAAE,CAAC,CAAC,WAAW,EAAE,MAAM,CAAC,CAAC;oBAC9B,WAAW,EAAE,aAAa;iBAC3B,CAAC;gBAEF,IAAI,IAAI,IAAI,GAAG,EAAE;oBACf,MAAM,MAAM,GAAG,GAAG,GAAG,CAAC,IAAI,GAAG,CAAC,CAAC,CAAC;oBAChC,MAAM,KAAK,GAAG,GAAG,CAAC;oBAElB,OAAO,CAAC,MAAM,GAAG,MAAM,CAAC;oBACxB,OAAO,CAAC,KAAK,GAAG,KAAK,CAAC;iBACvB;gBAGD,IAAI,MAAM,EAAE;oBACV,MAAM,QAAQ,GAAQ,EAAE,CAAC;oBACzB,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,GAAG,EAAE,KAAK,CAAC,EAAE,EAAE;wBAC9C,QAAQ,CAAC,GAAG,CAAC,GAAG;4BACd,CAAC,cAAE,CAAC,SAAS,CAAC,EAAE,KAAK;yBACtB,CAAC;oBACJ,CAAC,CAAC,CAAC;oBAEH,OAAO,CAAC,KAAK,GAAG,QAAQ,CAAC;iBAC1B;gBAED,MAAM,MAAM,GAAG,MAAM,eAAe,CAAC,WAAW,CAAC,qBAAqB,CACpE,OAAO,CACR,CAAC;gBAIF,MAAM,gBAAgB,GAAsB,EAAE,CAAC;gBAC/C,KAAK,MAAM,mBAAmB,IAAI,MAAM,CAAC,IAAI,EAAE;oBAC7C,gBAAgB,CAAC,IAAI,CACnB,IAAI,eAAe,CAAC,mBAAmB,CAAC,GAAG,CAAC,EAAE,KAAK,EAAE,IAAI,EAAE,CAAC,CAAC,CAC9D,CAAC;iBACH;gBAED,OAAO;oBACL,KAAK,EAAE,MAAM,CAAC,KAAK;oBACnB,gBAAgB,EAAE,gBAAgB;iBACnC,CAAC;aACH;YAAC,OAAO,KAAK,EAAE;gBACd,MAAM,KAAK,CAAC;aACb;QACH,CAAC;KAAA;IAEM,MAAM,CAAO,iBAAiB,CACnC,aAAkB,EAClB,UAAkB;;YAElB,IAAI;gBAIF,MAAM,eAAM,CAAC,IAAI,CAAC,aAAa,EAAE,UAAU,CAAC,CAAC;gBAM7C,wBAAe,CAAC,mBAAmB,CAAC,oCAAoC,CAAC,CAAC;gBAK1E,MAAM,gBAAgB,GAGhB,wBAAe,CAAC,uBAAuB,CAAC,YAAY,EAAE,YAAY,CAAC,CAAC;gBAI1E,MAAM,YAAY,GAKd,wBAAe,CAAC,uBAAuB,CAAC,YAAY,EAAE,QAAQ,CAAC,CAAC;gBAGpE,MAAM,YAAY,GAAG,YAAY,CAAC,MAAM,CAAC;gBAIzC,MAAM,wBAAwB,GAAG,MAAM,IAAI,CAAC,WAAW,CAAC,OAAO,CAAC;oBAC9D,KAAK,EAAE;wBACL,UAAU,EAAE,UAAU;qBACvB;oBACD,WAAW,EAAE,aAAa;iBAC3B,CAAC,CAAC;gBAGH,MAAM,oBAAoB,GAAG,gBAAgB,CAAC,MAAM,CAClD,CAAC,eAAe,EAAE,EAAE,CAClB,CAAC,wBAAwB,CAAC,IAAI,CAC5B,CAAC,iBAAiB,EAAE,EAAE,CACpB,iBAAiB,CAAC,aAAa,KAAK,eAAe,CAAC,aAAa,CACpE,CACJ,CAAC;gBAGF,MAAM,EAAE,GAAG,IAAI,eAAe,EAAE,CAAC;gBACjC,KAAK,MAAM,eAAe,IAAI,oBAAoB,EAAE;oBAClD,MAAM,IAAI,CAAC,WAAW,CAAC,MAAM,CAC3B;wBACE,iBAAiB,EAAE,EAAE,CAAC,QAAQ,EAAE;wBAChC,aAAa,EAAE,eAAe,CAAC,aAAa;wBAC5C,UAAU,EAAE,UAAU;wBACtB,WAAW,EAAE,eAAe,CAAC,WAAW;wBACxC,MAAM,EAAE,QAAQ;wBAChB,WAAW,EAAE,QAAQ,CAAC,YAAY,CAAC;wBACnC,WAAW,EAAE,QAAQ,CAAC,YAAY,CAAC;wBACnC,SAAS,EAAE,IAAI,IAAI,EAAE;wBACrB,SAAS,EAAE,IAAI,IAAI,EAAE;qBACtB,EACD;wBACE,WAAW,EAAE,aAAa;qBAC3B,CACF,CAAC;iBACH;gBAED,OAAO,mBAAmB,CAAC;aAC5B;YAAC,OAAO,KAAK,EAAE;gBACd,MAAM,KAAK,CAAC;aACb;QACH,CAAC;KAAA;;AAhXH,0CAiXC;AA3UgB,2BAAW,GAAG,IAAI,uDAAyB,EAAE,CAAC;AAC9C,iCAAiB,GAAG,IAAI,oCAAgB,EAAE,CAAC"}
1
+ {"version":3,"file":"system-privilege.js","sourceRoot":"","sources":["../../../../src/components/system-privilege/system-privilege.ts"],"names":[],"mappings":";;;;;;;;;;;;AAAA,4CAAwD;AACxD,mEAA+D;AAC/D,+EAA0E;AAG1E,0CAAmE;AACnE,6CAA0C;AAC1C,8DAA+D;AAE/D,yCAA+B;AAE/B,MAAa,eAAgB,SAAQ,oBAAU;IAc7C,IAAI,iBAAiB;QACnB,OAAO,IAAI,CAAC,QAAQ,CAAC;IACvB,CAAC;IAED,IAAI,iBAAiB,CAAC,KAAa;QACjC,IAAI,CAAC,QAAQ,GAAG,KAAK,CAAC;IACxB,CAAC;IAED,IAAI,SAAS;QACX,OAAO,IAAI,CAAC,UAAU,CAAC;IACzB,CAAC;IAED,IAAI,SAAS;QACX,OAAO,IAAI,CAAC,UAAU,CAAC;IACzB,CAAC;IAED,IAAI,WAAW;QACb,OAAO,IAAI,CAAC,YAAY,CAAC;IAC3B,CAAC;IAED,IAAI,WAAW;QACb,OAAO,IAAI,CAAC,YAAY,CAAC;IAC3B,CAAC;IAKD,YAAoB,mBAA0C;QAC5D,KAAK,EAAE,CAAC;QAzCV,eAAU,GAAG,iBAAiB,CAAC;QAC/B,cAAS,GAAG,qBAAqB,CAAC;QAyChC,IAAI,mBAAmB,EAAE;YACvB,IAAI,CAAC,iBAAiB,GAAG,mBAAmB,CAAC,iBAAiB,CAAC;YAC/D,IAAI,CAAC,aAAa,GAAG,mBAAmB,CAAC,aAAa,CAAC;YACvD,IAAI,CAAC,UAAU,GAAG,mBAAmB,CAAC,UAAU,CAAC;YACjD,IAAI,CAAC,WAAW,GAAG,mBAAmB,CAAC,WAAW,CAAC;YACnD,IAAI,CAAC,MAAM,GAAG,mBAAmB,CAAC,MAAM,CAAC;YACzC,IAAI,CAAC,YAAY,GAAG,mBAAmB,CAAC,WAAW,CAAC;YACpD,IAAI,CAAC,UAAU,GAAG,mBAAmB,CAAC,SAAS,CAAC;YAChD,IAAI,CAAC,YAAY,GAAG,mBAAmB,CAAC,WAAW,CAAC;YACpD,IAAI,CAAC,UAAU,GAAG,mBAAmB,CAAC,SAAS,CAAC;SACjD;IACH,CAAC;IAED,aAAa,CAAC,mBAAyC;QACrD,IAAI,CAAC,aAAa,GAAG,mBAAmB,CAAC,aAAa,CAAC;QACvD,IAAI,CAAC,iBAAiB,GAAG,mBAAmB,CAAC,iBAAiB,CAAC;QAC/D,IAAI,CAAC,UAAU,GAAG,mBAAmB,CAAC,UAAU,CAAC;QACjD,IAAI,CAAC,WAAW,GAAG,mBAAmB,CAAC,WAAW,CAAC;QACnD,IAAI,CAAC,MAAM,GAAG,mBAAmB,CAAC,MAAM,CAAC;QACzC,IAAI,CAAC,UAAU,GAAG,mBAAmB,CAAC,SAAS,CAAC;QAChD,IAAI,CAAC,UAAU,GAAG,mBAAmB,CAAC,SAAS,CAAC;QAChD,IAAI,CAAC,YAAY,GAAG,mBAAmB,CAAC,WAAW,CAAC;QACpD,IAAI,CAAC,YAAY,GAAG,mBAAmB,CAAC,WAAW,CAAC;IACtD,CAAC;IAED,MAAM,CAAO,IAAI,CAAC,aAAkB,EAAE,iBAA0B;;YAC9D,IAAI;gBACF,MAAM,eAAe,GAAG,IAAI,eAAe,EAAE,CAAC;gBAC9C,IAAI,iBAAiB,EAAE;oBACrB,MAAM,mBAAmB,GAAG,MAAM,IAAI,CAAC,WAAW,CAAC,QAAQ,CACzD,iBAAiB,EACjB;wBACE,WAAW,EAAE,aAAa;qBAC3B,CACF,CAAC;oBACF,IAAI,mBAAmB,EAAE;wBACvB,eAAe,CAAC,aAAa,GAAG,mBAAmB,CAAC,aAAa,CAAC;wBAClE,eAAe,CAAC,QAAQ,GAAG,mBAAmB,CAAC,iBAAiB,CAAC;wBACjE,eAAe,CAAC,UAAU,GAAG,mBAAmB,CAAC,UAAU,CAAC;wBAC5D,eAAe,CAAC,WAAW,GAAG,mBAAmB,CAAC,WAAW,CAAC;wBAC9D,eAAe,CAAC,MAAM,GAAG,mBAAmB,CAAC,MAAM,CAAC;wBACpD,eAAe,CAAC,YAAY,GAAG,mBAAmB,CAAC,WAAW,CAAC;wBAC/D,eAAe,CAAC,UAAU,GAAG,mBAAmB,CAAC,SAAS,CAAC;wBAC3D,eAAe,CAAC,YAAY,GAAG,mBAAmB,CAAC,WAAW,CAAC;wBAC/D,eAAe,CAAC,UAAU,GAAG,mBAAmB,CAAC,SAAS,CAAC;qBAC5D;yBAAM;wBACL,MAAM,IAAI,oBAAU,CAClB,iBAAiB,EACjB,yBAAyB,EACzB,4BAA4B,CAC7B,CAAC;qBACH;iBACF;gBACD,OAAO,eAAe,CAAC;aACxB;YAAC,OAAO,KAAK,EAAE;gBACd,MAAM,KAAK,CAAC;aACb;QACH,CAAC;KAAA;IAED,MAAM,CAAO,MAAM,CACjB,SAAoB,EACpB,aAAkB,EAClB,eAAgC;;YAEhC,IAAI;gBAEF,MAAM,UAAU,GACd,0BAAiB,CAAC,uBAAuB,CAAC,aAAa,CAAC,CAAC;gBAC3D,MAAM,YAAY,GAAG,MAAM,SAAS,CAAC,eAAe,CAClD,UAAU,EACV,kBAAkB,CACnB,CAAC;gBACF,IAAI,CAAC,YAAY,EAAE;oBACjB,MAAM,IAAI,oBAAU,CAClB,iBAAiB,EACjB,yBAAyB,EACzB,wDAAwD,CACzD,CAAC;iBACH;gBAID,IAAI,CAAC,eAAe,CAAC,UAAU,EAAE;oBAC/B,MAAM,IAAI,oBAAU,CAClB,iBAAiB,EACjB,yBAAyB,EACzB,yBAAyB,CAC1B,CAAC;iBACH;gBAED,IAAI,CAAC,eAAe,CAAC,aAAa,EAAE;oBAClC,MAAM,IAAI,oBAAU,CAClB,iBAAiB,EACjB,yBAAyB,EACzB,4BAA4B,CAC7B,CAAC;iBACH;gBAGD,MAAM,eAAM,CAAC,IAAI,CAAC,aAAa,EAAE,eAAe,CAAC,UAAU,CAAC,CAAC;gBAG7D,MAAM,uBAAuB,GAAG,MAAM,IAAI,CAAC,WAAW,CAAC,QAAQ,CAC7D,eAAe,CAAC,aAAa,EAC7B;oBACE,WAAW,EAAE,aAAa;iBAC3B,CACF,CAAC;gBAGF,IAAI,uBAAuB,EAAE;oBAC3B,MAAM,IAAI,oBAAU,CAClB,iBAAiB,EACjB,yBAAyB,EACzB,iCAAiC,CAClC,CAAC;iBACH;gBAID,MAAM,kBAAkB,GAAG,IAAI,eAAe,EAAE,CAAC;gBACjD,kBAAkB,CAAC,QAAQ,GAAG,kBAAkB,CAAC,QAAQ,EAAE,CAAC;gBAC5D,kBAAkB,CAAC,aAAa,GAAG,eAAe,CAAC,aAAa,CAAC;gBACjE,kBAAkB,CAAC,UAAU,GAAG,eAAe,CAAC,UAAU,CAAC;gBAC3D,kBAAkB,CAAC,WAAW,GAAG,eAAe,CAAC,WAAW,CAAC;gBAC7D,kBAAkB,CAAC,MAAM,GAAG,QAAQ,CAAC;gBACrC,kBAAkB,CAAC,YAAY,GAAG,SAAS,CAAC,MAAM,CAAC;gBACnD,kBAAkB,CAAC,YAAY,GAAG,SAAS,CAAC,MAAM,CAAC;gBACnD,kBAAkB,CAAC,UAAU,GAAG,IAAI,IAAI,EAAE,CAAC;gBAC3C,kBAAkB,CAAC,UAAU,GAAG,IAAI,IAAI,EAAE,CAAC;gBAG3C,MAAM,IAAI,CAAC,WAAW,CAAC,MAAM,CAC3B;oBACE,iBAAiB,EAAE,kBAAkB,CAAC,QAAQ;oBAC9C,aAAa,EAAE,kBAAkB,CAAC,aAAa;oBAC/C,UAAU,EAAE,kBAAkB,CAAC,UAAU;oBACzC,WAAW,EAAE,kBAAkB,CAAC,WAAW;oBAC3C,MAAM,EAAE,kBAAkB,CAAC,MAAM;oBACjC,WAAW,EAAE,kBAAkB,CAAC,YAAY;oBAC5C,WAAW,EAAE,kBAAkB,CAAC,YAAY;oBAC5C,SAAS,EAAE,kBAAkB,CAAC,UAAU;oBACxC,SAAS,EAAE,kBAAkB,CAAC,UAAU;iBACzC,EACD;oBACE,WAAW,EAAE,aAAa;iBAC3B,CACF,CAAC;gBAIF,MAAM,iBAAiB,GAAG,EAAE,CAAC;gBAE7B,MAAM,gBAAgB,GAAG,kBAAkB,CAAC;gBAG5C,MAAM,QAAQ,GAAG,IAAI,2BAAQ,EAAE,CAAC;gBAChC,QAAQ,CAAC,UAAU,GAAG,QAAQ,CAAC,QAAQ,EAAE,CAAC;gBAC1C,QAAQ,CAAC,MAAM,GAAG,6BAAU,CAAC,MAAM,CAAC;gBACpC,QAAQ,CAAC,WAAW,GAAG,sBAAsB,CAAC;gBAC9C,QAAQ,CAAC,UAAU,GAAG,iBAAiB,CAAC;gBACxC,QAAQ,CAAC,QAAQ,GAAG,kBAAkB,CAAC,iBAAiB,CAAC;gBACzD,QAAQ,CAAC,iBAAiB,GAAG,IAAI,CAAC,SAAS,CAAC,iBAAiB,CAAC,CAAC;gBAC/D,QAAQ,CAAC,gBAAgB,GAAG,IAAI,CAAC,SAAS,CAAC,gBAAgB,CAAC,CAAC;gBAG7D,MAAM,QAAQ,CAAC,MAAM,CAAC,SAAS,CAAC,QAAQ,EAAE,aAAa,CAAC,CAAC;gBAEzD,OAAO,kBAAkB,CAAC;aAC3B;YAAC,OAAO,KAAK,EAAE;gBACd,MAAM,KAAK,CAAC;aACb;QACH,CAAC;KAAA;IAEM,MAAM,CAAO,OAAO,CACzB,SAAoB,EACpB,aAAkB,EAClB,IAAa,EACb,GAAY,EACZ,MAA+B;;YAE/B,IAAI;gBAEF,MAAM,UAAU,GACd,0BAAiB,CAAC,uBAAuB,CAAC,aAAa,CAAC,CAAC;gBAC3D,MAAM,YAAY,GAAG,MAAM,SAAS,CAAC,eAAe,CAClD,UAAU,EACV,gBAAgB,CACjB,CAAC;gBAEF,IAAI,CAAC,YAAY,EAAE;oBACjB,MAAM,IAAI,oBAAU,CAClB,iBAAiB,EACjB,yBAAyB,EACzB,sDAAsD,CACvD,CAAC;iBACH;gBAGD,MAAM,OAAO,GAAQ;oBACnB,KAAK,EAAE,CAAC,CAAC,WAAW,EAAE,MAAM,CAAC,CAAC;oBAC9B,WAAW,EAAE,aAAa;iBAC3B,CAAC;gBAEF,IAAI,IAAI,IAAI,GAAG,EAAE;oBACf,MAAM,MAAM,GAAG,GAAG,GAAG,CAAC,IAAI,GAAG,CAAC,CAAC,CAAC;oBAChC,MAAM,KAAK,GAAG,GAAG,CAAC;oBAElB,OAAO,CAAC,MAAM,GAAG,MAAM,CAAC;oBACxB,OAAO,CAAC,KAAK,GAAG,KAAK,CAAC;iBACvB;gBAGD,IAAI,MAAM,EAAE;oBACV,MAAM,QAAQ,GAAQ,EAAE,CAAC;oBACzB,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,GAAG,EAAE,KAAK,CAAC,EAAE,EAAE;wBAC9C,QAAQ,CAAC,GAAG,CAAC,GAAG;4BACd,CAAC,cAAE,CAAC,SAAS,CAAC,EAAE,KAAK;yBACtB,CAAC;oBACJ,CAAC,CAAC,CAAC;oBAEH,OAAO,CAAC,KAAK,GAAG,QAAQ,CAAC;iBAC1B;gBAED,MAAM,MAAM,GAAG,MAAM,eAAe,CAAC,WAAW,CAAC,qBAAqB,CACpE,OAAO,CACR,CAAC;gBAIF,MAAM,gBAAgB,GAAsB,EAAE,CAAC;gBAC/C,KAAK,MAAM,mBAAmB,IAAI,MAAM,CAAC,IAAI,EAAE;oBAC7C,gBAAgB,CAAC,IAAI,CACnB,IAAI,eAAe,CAAC,mBAAmB,CAAC,GAAG,CAAC,EAAE,KAAK,EAAE,IAAI,EAAE,CAAC,CAAC,CAC9D,CAAC;iBACH;gBAED,OAAO;oBACL,KAAK,EAAE,MAAM,CAAC,KAAK;oBACnB,gBAAgB,EAAE,gBAAgB;iBACnC,CAAC;aACH;YAAC,OAAO,KAAK,EAAE;gBACd,MAAM,KAAK,CAAC;aACb;QACH,CAAC;KAAA;IAEM,MAAM,CAAO,iBAAiB,CACnC,aAAkB,EAClB,UAAkB;;YAElB,IAAI;gBAIF,MAAM,eAAM,CAAC,IAAI,CAAC,aAAa,EAAE,UAAU,CAAC,CAAC;gBAM7C,wBAAe,CAAC,mBAAmB,CAAC,oCAAoC,CAAC,CAAC;gBAK1E,MAAM,gBAAgB,GAGhB,wBAAe,CAAC,uBAAuB,CAAC,YAAY,EAAE,YAAY,CAAC,CAAC;gBAI1E,MAAM,YAAY,GAKd,wBAAe,CAAC,uBAAuB,CAAC,YAAY,EAAE,QAAQ,CAAC,CAAC;gBAGpE,MAAM,YAAY,GAAG,YAAY,CAAC,MAAM,CAAC;gBAIzC,MAAM,wBAAwB,GAAG,MAAM,IAAI,CAAC,WAAW,CAAC,OAAO,CAAC;oBAC9D,KAAK,EAAE;wBACL,UAAU,EAAE,UAAU;qBACvB;oBACD,WAAW,EAAE,aAAa;iBAC3B,CAAC,CAAC;gBAGH,MAAM,oBAAoB,GAAG,gBAAgB,CAAC,MAAM,CAClD,CAAC,eAAe,EAAE,EAAE,CAClB,CAAC,wBAAwB,CAAC,IAAI,CAC5B,CAAC,iBAAiB,EAAE,EAAE,CACpB,iBAAiB,CAAC,aAAa,KAAK,eAAe,CAAC,aAAa,CACpE,CACJ,CAAC;gBAGF,MAAM,EAAE,GAAG,IAAI,eAAe,EAAE,CAAC;gBACjC,KAAK,MAAM,eAAe,IAAI,oBAAoB,EAAE;oBAClD,MAAM,IAAI,CAAC,WAAW,CAAC,MAAM,CAC3B;wBACE,iBAAiB,EAAE,EAAE,CAAC,QAAQ,EAAE;wBAChC,aAAa,EAAE,eAAe,CAAC,aAAa;wBAC5C,UAAU,EAAE,UAAU;wBACtB,WAAW,EAAE,eAAe,CAAC,WAAW;wBACxC,MAAM,EAAE,QAAQ;wBAChB,WAAW,EAAE,QAAQ,CAAC,YAAY,CAAC;wBACnC,WAAW,EAAE,QAAQ,CAAC,YAAY,CAAC;wBACnC,SAAS,EAAE,IAAI,IAAI,EAAE;wBACrB,SAAS,EAAE,IAAI,IAAI,EAAE;qBACtB,EACD;wBACE,WAAW,EAAE,aAAa;qBAC3B,CACF,CAAC;iBACH;gBAED,OAAO,mBAAmB,CAAC;aAC5B;YAAC,OAAO,KAAK,EAAE;gBACd,MAAM,KAAK,CAAC;aACb;QACH,CAAC;KAAA;IAEY,MAAM,CACjB,SAAoB,EACpB,aAAkB,EAClB,SAKC;;YAED,IAAI;gBAQF,MAAM,iBAAiB,GAAG;oBACxB,iBAAiB,EAAE,IAAI,CAAC,iBAAiB;oBACzC,WAAW,EAAE,IAAI,CAAC,WAAW;oBAC7B,aAAa,EAAE,IAAI,CAAC,aAAa;oBACjC,UAAU,EAAE,IAAI,CAAC,UAAU;oBAC3B,MAAM,EAAE,IAAI,CAAC,MAAM;oBACnB,WAAW,EAAE,IAAI,CAAC,WAAW;oBAC7B,SAAS,EAAE,IAAI,CAAC,SAAS;oBACzB,WAAW,EAAE,IAAI,CAAC,WAAW;oBAC7B,SAAS,EAAE,IAAI,CAAC,SAAS;iBAC1B,CAAC;gBAEF,MAAM,eAAe,CAAC,WAAW,CAAC,MAAM,CACtC;oBACE,aAAa,EAAE,SAAS,CAAC,aAAa,IAAI,IAAI,CAAC,aAAa;oBAC5D,WAAW,EAAE,SAAS,CAAC,WAAW,IAAI,IAAI,CAAC,WAAW;oBACtD,UAAU,EAAE,SAAS,CAAC,UAAU,IAAI,IAAI,CAAC,UAAU;oBACnD,MAAM,EAAE,SAAS,CAAC,MAAM,IAAI,IAAI,CAAC,MAAM;oBACvC,WAAW,EAAE,SAAS,CAAC,MAAM;oBAC7B,SAAS,EAAE,IAAI,IAAI,EAAE;iBACtB,EACD;oBACE,KAAK,EAAE;wBACL,iBAAiB,EAAE,IAAI,CAAC,iBAAiB;qBAC1C;oBACD,WAAW,EAAE,aAAa;iBAC3B,CACF,CAAC;gBAEF,MAAM,gBAAgB,GAAG;oBACvB,iBAAiB,EAAE,IAAI,CAAC,iBAAiB;oBACzC,aAAa,EAAE,SAAS,CAAC,aAAa,IAAI,IAAI,CAAC,aAAa;oBAC5D,WAAW,EAAE,SAAS,CAAC,WAAW,IAAI,IAAI,CAAC,WAAW;oBACtD,UAAU,EAAE,SAAS,CAAC,UAAU,IAAI,IAAI,CAAC,UAAU;oBACnD,MAAM,EAAE,SAAS,CAAC,MAAM,IAAI,IAAI,CAAC,MAAM;oBACvC,WAAW,EAAE,IAAI,CAAC,WAAW;oBAC7B,SAAS,EAAE,IAAI,CAAC,SAAS;oBACzB,WAAW,EAAE,IAAI,CAAC,WAAW;oBAC7B,SAAS,EAAE,IAAI,CAAC,SAAS;iBAC1B,CAAC;gBAeF,MAAM,QAAQ,GAAG,IAAI,2BAAQ,EAAE,CAAC;gBAChC,QAAQ,CAAC,UAAU,GAAG,QAAQ,CAAC,QAAQ,EAAE,CAAC;gBAC1C,QAAQ,CAAC,MAAM,GAAG,6BAAU,CAAC,MAAM,CAAC;gBACpC,QAAQ,CAAC,WAAW,GAAG,yBAAyB,CAAC;gBACjD,QAAQ,CAAC,UAAU,GAAG,iBAAiB,CAAC;gBACxC,QAAQ,CAAC,QAAQ,GAAG,IAAI,CAAC,iBAAiB,GAAG,EAAE,CAAC;gBAChD,QAAQ,CAAC,iBAAiB,GAAG,IAAI,CAAC,SAAS,CAAC,iBAAiB,CAAC,CAAC;gBAC/D,QAAQ,CAAC,gBAAgB,GAAG,IAAI,CAAC,SAAS,CAAC,gBAAgB,CAAC,CAAC;gBAC7D,MAAM,QAAQ,CAAC,MAAM,CAAC,SAAS,CAAC,QAAQ,EAAE,aAAa,CAAC,CAAC;gBAIzD,OAAO,gBAAgB,CAAC;aACzB;YAAC,OAAO,KAAK,EAAE;gBACd,MAAM,KAAK,CAAC;aACb;QACH,CAAC;KAAA;IAEY,MAAM,CAAC,aAAkB,EAAE,SAAoB;;YAC1D,IAAI;gBAEF,MAAM,UAAU,GACd,0BAAiB,CAAC,uBAAuB,CAAC,aAAa,CAAC,CAAC;gBAC3D,MAAM,YAAY,GAAG,MAAM,SAAS,CAAC,eAAe,CAClD,UAAU,EACV,kBAAkB,CACnB,CAAC;gBACF,IAAI,CAAC,YAAY,EAAE;oBACjB,MAAM,IAAI,oBAAU,CAClB,iBAAiB,EACjB,yBAAyB,EACzB,wDAAwD,CACzD,CAAC;iBACH;gBAID,IAAI,CAAC,IAAI,CAAC,iBAAiB,EAAE;oBAC3B,MAAM,IAAI,oBAAU,CAClB,iBAAiB,EACjB,yBAAyB,EACzB,iCAAiC,CAClC,CAAC;iBACH;gBAKD,MAAM,eAAe,CAAC,WAAW,CAAC,MAAM,CACtC,IAAI,CAAC,iBAAiB,EACtB,aAAa,CACd,CAAC;gBAIF,MAAM,iBAAiB,GAAG;oBACxB,iBAAiB,EAAE,IAAI,CAAC,QAAQ;oBAChC,aAAa,EAAE,IAAI,CAAC,aAAa;oBACjC,UAAU,EAAE,IAAI,CAAC,UAAU;oBAC3B,WAAW,EAAE,IAAI,CAAC,WAAW;oBAC7B,MAAM,EAAE,IAAI,CAAC,MAAM;oBACnB,WAAW,EAAE,IAAI,CAAC,YAAY;oBAC9B,WAAW,EAAE,IAAI,CAAC,YAAY;oBAC9B,SAAS,EAAE,IAAI,CAAC,UAAU;oBAC1B,SAAS,EAAE,IAAI,CAAC,UAAU;iBAC3B,CAAC;gBAEF,MAAM,gBAAgB,GAAG,EAAE,CAAC;gBAG5B,MAAM,QAAQ,GAAG,IAAI,2BAAQ,EAAE,CAAC;gBAChC,QAAQ,CAAC,UAAU,GAAG,QAAQ,CAAC,QAAQ,EAAE,CAAC;gBAC1C,QAAQ,CAAC,MAAM,GAAG,6BAAU,CAAC,MAAM,CAAC;gBACpC,QAAQ,CAAC,WAAW,GAAG,yBAAyB,CAAC;gBACjD,QAAQ,CAAC,UAAU,GAAG,iBAAiB,CAAC;gBACxC,QAAQ,CAAC,QAAQ,GAAG,IAAI,CAAC,iBAAiB,CAAC;gBAC3C,QAAQ,CAAC,iBAAiB,GAAG,IAAI,CAAC,SAAS,CAAC,iBAAiB,CAAC,CAAC;gBAC/D,QAAQ,CAAC,gBAAgB,GAAG,IAAI,CAAC,SAAS,CAAC,gBAAgB,CAAC,CAAC;gBAG7D,MAAM,QAAQ,CAAC,MAAM,CAAC,SAAS,CAAC,QAAQ,EAAE,aAAa,CAAC,CAAC;gBAEzD,OAAO,IAAI,CAAC;aACb;YAAC,OAAO,KAAK,EAAE;gBACd,MAAM,KAAK,CAAC;aACb;QACH,CAAC;KAAA;;AAhhBH,0CAihBC;AA3egB,2BAAW,GAAG,IAAI,uDAAyB,EAAE,CAAC;AAC9C,iCAAiB,GAAG,IAAI,oCAAgB,EAAE,CAAC"}
@@ -2,4 +2,5 @@ import SystemPrivilege from '../../models/system-privilege.entity';
2
2
  import { RepositoryBase, IRepositoryBase } from '@tomei/general';
3
3
  export declare class SystemPrivilegeRepository extends RepositoryBase<SystemPrivilege> implements IRepositoryBase<SystemPrivilege> {
4
4
  constructor();
5
+ delete(systemPrivilegeId: string, dbTransaction?: any): Promise<number>;
5
6
  }
@@ -1,4 +1,13 @@
1
1
  "use strict";
2
+ var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {
3
+ function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); }
4
+ return new (P || (P = Promise))(function (resolve, reject) {
5
+ function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }
6
+ function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } }
7
+ function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); }
8
+ step((generator = generator.apply(thisArg, _arguments || [])).next());
9
+ });
10
+ };
2
11
  Object.defineProperty(exports, "__esModule", { value: true });
3
12
  exports.SystemPrivilegeRepository = void 0;
4
13
  const system_privilege_entity_1 = require("../../models/system-privilege.entity");
@@ -7,6 +16,14 @@ class SystemPrivilegeRepository extends general_1.RepositoryBase {
7
16
  constructor() {
8
17
  super(system_privilege_entity_1.default);
9
18
  }
19
+ delete(systemPrivilegeId, dbTransaction) {
20
+ return __awaiter(this, void 0, void 0, function* () {
21
+ return yield system_privilege_entity_1.default.destroy({
22
+ where: { SystemPrivilegeId: systemPrivilegeId },
23
+ transaction: dbTransaction,
24
+ });
25
+ });
26
+ }
10
27
  }
11
28
  exports.SystemPrivilegeRepository = SystemPrivilegeRepository;
12
29
  //# sourceMappingURL=system-privilege.repository.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"system-privilege.repository.js","sourceRoot":"","sources":["../../../../src/components/system-privilege/system-privilege.repository.ts"],"names":[],"mappings":";;;AAAA,kFAAmE;AACnE,4CAAiE;AAEjE,MAAa,yBACX,SAAQ,wBAA+B;IAGvC;QACE,KAAK,CAAC,iCAAe,CAAC,CAAC;IACzB,CAAC;CACF;AAPD,8DAOC"}
1
+ {"version":3,"file":"system-privilege.repository.js","sourceRoot":"","sources":["../../../../src/components/system-privilege/system-privilege.repository.ts"],"names":[],"mappings":";;;;;;;;;;;;AAAA,kFAAmE;AACnE,4CAAiE;AAEjE,MAAa,yBACX,SAAQ,wBAA+B;IAGvC;QACE,KAAK,CAAC,iCAAe,CAAC,CAAC;IACzB,CAAC;IAEK,MAAM,CAAC,iBAAyB,EAAE,aAAmB;;YACzD,OAAO,MAAM,iCAAe,CAAC,OAAO,CAAC;gBACnC,KAAK,EAAE,EAAE,iBAAiB,EAAE,iBAAiB,EAAE;gBAC/C,WAAW,EAAE,aAAa;aAC3B,CAAC,CAAC;QACL,CAAC;KAAA;CACF;AAdD,8DAcC"}