@tomei/sso 0.51.9 → 0.52.0

Sign up to get free protection for your applications and to get access to all the features.
Files changed (145) hide show
  1. package/.commitlintrc.json +22 -22
  2. package/.gitlab-ci.yml +16 -16
  3. package/.husky/commit-msg +15 -15
  4. package/.husky/pre-commit +7 -7
  5. package/.prettierrc +4 -4
  6. package/Jenkinsfile +57 -57
  7. package/README.md +23 -23
  8. package/__tests__/unit/components/group/group.spec.ts +79 -79
  9. package/__tests__/unit/components/group-object-privilege/group-object-privilege.spec.ts +88 -88
  10. package/__tests__/unit/components/group-privilege/group-privilege.spec.ts +68 -68
  11. package/__tests__/unit/components/group-reporting-user/group-reporting-user.spec.ts +66 -66
  12. package/__tests__/unit/components/group-system-access/group-system-access.spec.ts +83 -83
  13. package/__tests__/unit/components/login-user/l.spec.ts +746 -746
  14. package/__tests__/unit/components/login-user/login.spec.ts +1164 -1164
  15. package/__tests__/unit/components/password-hash/password-hash.service.spec.ts +31 -31
  16. package/__tests__/unit/components/system/system.spec.ts +254 -254
  17. package/__tests__/unit/components/system-privilege/system-privilege.spec.ts +83 -83
  18. package/__tests__/unit/components/user-group/user-group.spec.ts +86 -86
  19. package/__tests__/unit/components/user-object-privilege/user-object-privilege.spec.ts +78 -78
  20. package/__tests__/unit/components/user-privilege/user-privilege.spec.ts +72 -72
  21. package/__tests__/unit/components/user-system-access/user-system-access.spec.ts +89 -89
  22. package/__tests__/unit/redis-client/redis.service.spec.ts +23 -23
  23. package/__tests__/unit/session/session.service.spec.ts +47 -47
  24. package/__tests__/unit/system-privilege/system-privilage.spec.ts +91 -91
  25. package/coverage/clover.xml +1452 -1452
  26. package/coverage/coverage-final.json +47 -47
  27. package/coverage/lcov-report/base.css +224 -224
  28. package/coverage/lcov-report/block-navigation.js +87 -87
  29. package/coverage/lcov-report/components/group/group.repository.ts.html +117 -117
  30. package/coverage/lcov-report/components/group/group.ts.html +327 -327
  31. package/coverage/lcov-report/components/group/index.html +130 -130
  32. package/coverage/lcov-report/components/group-object-privilege/group-object-privilege.repository.ts.html +117 -117
  33. package/coverage/lcov-report/components/group-object-privilege/group-object-privilege.ts.html +321 -321
  34. package/coverage/lcov-report/components/group-object-privilege/index.html +130 -130
  35. package/coverage/lcov-report/components/group-privilege/group-privilege.repository.ts.html +117 -117
  36. package/coverage/lcov-report/components/group-privilege/group-privilege.ts.html +303 -303
  37. package/coverage/lcov-report/components/group-privilege/index.html +130 -130
  38. package/coverage/lcov-report/components/group-reporting-user/group-reporting-user.repository.ts.html +117 -117
  39. package/coverage/lcov-report/components/group-reporting-user/group-reporting-user.ts.html +327 -327
  40. package/coverage/lcov-report/components/group-reporting-user/index.html +130 -130
  41. package/coverage/lcov-report/components/group-system-access/group-system-access.repository.ts.html +117 -117
  42. package/coverage/lcov-report/components/group-system-access/group-system-access.ts.html +309 -309
  43. package/coverage/lcov-report/components/group-system-access/index.html +130 -130
  44. package/coverage/lcov-report/components/login-history/index.html +115 -115
  45. package/coverage/lcov-report/components/login-history/login-history.repository.ts.html +117 -117
  46. package/coverage/lcov-report/components/login-user/index.html +130 -130
  47. package/coverage/lcov-report/components/login-user/login-user.ts.html +5007 -5007
  48. package/coverage/lcov-report/components/login-user/user.repository.ts.html +117 -117
  49. package/coverage/lcov-report/components/password-hash/index.html +115 -115
  50. package/coverage/lcov-report/components/password-hash/password-hash.service.ts.html +126 -126
  51. package/coverage/lcov-report/components/system/index.html +130 -130
  52. package/coverage/lcov-report/components/system/system.repository.ts.html +117 -117
  53. package/coverage/lcov-report/components/system/system.ts.html +909 -909
  54. package/coverage/lcov-report/components/system-privilege/index.html +130 -130
  55. package/coverage/lcov-report/components/system-privilege/system-privilege.repository.ts.html +120 -120
  56. package/coverage/lcov-report/components/system-privilege/system-privilege.ts.html +390 -390
  57. package/coverage/lcov-report/components/user-group/index.html +130 -130
  58. package/coverage/lcov-report/components/user-group/user-group.repository.ts.html +117 -117
  59. package/coverage/lcov-report/components/user-group/user-group.ts.html +354 -354
  60. package/coverage/lcov-report/components/user-object-privilege/index.html +130 -130
  61. package/coverage/lcov-report/components/user-object-privilege/user-object-privilege.repository.ts.html +117 -117
  62. package/coverage/lcov-report/components/user-object-privilege/user-object-privilege.ts.html +312 -312
  63. package/coverage/lcov-report/components/user-privilege/index.html +130 -130
  64. package/coverage/lcov-report/components/user-privilege/user-privilege.repository.ts.html +117 -117
  65. package/coverage/lcov-report/components/user-privilege/user-privilege.ts.html +306 -306
  66. package/coverage/lcov-report/components/user-system-access/index.html +130 -130
  67. package/coverage/lcov-report/components/user-system-access/user-system-access.repository.ts.html +117 -117
  68. package/coverage/lcov-report/components/user-system-access/user-system-access.ts.html +312 -312
  69. package/coverage/lcov-report/enum/group-type.enum.ts.html +108 -108
  70. package/coverage/lcov-report/enum/index.html +160 -160
  71. package/coverage/lcov-report/enum/index.ts.html +93 -93
  72. package/coverage/lcov-report/enum/user-status.enum.ts.html +105 -105
  73. package/coverage/lcov-report/enum/yn.enum.ts.html +96 -96
  74. package/coverage/lcov-report/index.html +370 -370
  75. package/coverage/lcov-report/models/group-object-privilege.entity.ts.html +333 -333
  76. package/coverage/lcov-report/models/group-privilege.entity.ts.html +315 -315
  77. package/coverage/lcov-report/models/group-reporting-user.entity.ts.html +339 -339
  78. package/coverage/lcov-report/models/group-system-access.entity.ts.html +324 -324
  79. package/coverage/lcov-report/models/group.entity.ts.html +435 -435
  80. package/coverage/lcov-report/models/index.html +310 -310
  81. package/coverage/lcov-report/models/login-history.entity.ts.html +252 -252
  82. package/coverage/lcov-report/models/staff.entity.ts.html +411 -411
  83. package/coverage/lcov-report/models/system-privilege.entity.ts.html +354 -354
  84. package/coverage/lcov-report/models/system.entity.ts.html +423 -423
  85. package/coverage/lcov-report/models/user-group.entity.ts.html +354 -354
  86. package/coverage/lcov-report/models/user-object-privilege.entity.ts.html +330 -330
  87. package/coverage/lcov-report/models/user-privilege.entity.ts.html +315 -315
  88. package/coverage/lcov-report/models/user-system-access.entity.ts.html +315 -315
  89. package/coverage/lcov-report/models/user.entity.ts.html +522 -522
  90. package/coverage/lcov-report/prettify.css +1 -1
  91. package/coverage/lcov-report/prettify.js +2 -2
  92. package/coverage/lcov-report/redis-client/index.html +115 -115
  93. package/coverage/lcov-report/redis-client/redis.service.ts.html +240 -240
  94. package/coverage/lcov-report/session/index.html +115 -115
  95. package/coverage/lcov-report/session/session.service.ts.html +246 -246
  96. package/coverage/lcov-report/sorter.js +196 -196
  97. package/coverage/lcov.info +2490 -2490
  98. package/coverage/test-report.xml +128 -128
  99. package/create-sso-user.sql +39 -39
  100. package/dist/__tests__/unit/components/group-privilege/group-privilege.test.d.ts +1 -0
  101. package/dist/__tests__/unit/components/group-privilege/group-privilege.test.js +71 -0
  102. package/dist/__tests__/unit/components/group-privilege/group-privilege.test.js.map +1 -0
  103. package/dist/__tests__/unit/components/login-user/login-user.spec.d.ts +0 -0
  104. package/dist/__tests__/unit/components/login-user/login-user.spec.js +6 -0
  105. package/dist/__tests__/unit/components/login-user/login-user.spec.js.map +1 -0
  106. package/dist/src/components/group/group.d.ts +16 -0
  107. package/dist/src/components/group/group.js +137 -0
  108. package/dist/src/components/group/group.js.map +1 -1
  109. package/dist/src/index.d.ts +1 -0
  110. package/dist/src/index.js +1 -0
  111. package/dist/src/index.js.map +1 -1
  112. package/dist/src/types/auth-context.d.ts +6 -0
  113. package/dist/src/types/auth-context.js +3 -0
  114. package/dist/src/types/auth-context.js.map +1 -0
  115. package/dist/src/types/index.d.ts +1 -0
  116. package/dist/src/types/index.js +18 -0
  117. package/dist/src/types/index.js.map +1 -0
  118. package/dist/tsconfig.tsbuildinfo +1 -1
  119. package/eslint.config.mjs +58 -58
  120. package/jest.config.js +14 -14
  121. package/migrations/20240314080602-create-user-table.js +124 -124
  122. package/migrations/20240314080603-create-user-group-table.js +85 -85
  123. package/migrations/20240314080604-create-user-user-group-table.js +55 -55
  124. package/migrations/20240314080605-create-login-history-table.js +53 -53
  125. package/migrations/20240527064925-create-system-table.js +78 -78
  126. package/migrations/20240527064926-create-system-privilege-table.js +71 -71
  127. package/migrations/20240527065342-create-group-table.js +93 -93
  128. package/migrations/20240527065633-create-group-reporting-user-table.js +76 -76
  129. package/migrations/20240528011551-create-group-system-access-table.js +72 -72
  130. package/migrations/20240528023018-user-system-access-table.js +75 -75
  131. package/migrations/20240528032229-user-privilege-table.js +76 -76
  132. package/migrations/20240528063003-create-group-privilege-table.js +76 -76
  133. package/migrations/20240528063051-create-group-object-privilege-table.js +84 -84
  134. package/migrations/20240528063107-create-user-object-privilege-table.js +84 -84
  135. package/migrations/20240528063108-create-api-key-table.js +85 -85
  136. package/migrations/20241104104802-create-building-table.js +95 -95
  137. package/package.json +90 -90
  138. package/sampledotenv +7 -7
  139. package/sonar-project.properties +22 -22
  140. package/src/components/group/group.ts +234 -0
  141. package/src/index.ts +1 -0
  142. package/src/types/auth-context.ts +9 -0
  143. package/src/types/index.ts +1 -0
  144. package/tsconfig.build.json +5 -5
  145. package/tsconfig.json +23 -23
@@ -1,95 +1,95 @@
1
- 'use strict';
2
-
3
- /** @type {import('sequelize-cli').Migration} */
4
- module.exports = {
5
- up: async (queryInterface, Sequelize) => {
6
- await queryInterface.createTable('sso_Building', {
7
- GroupCode: {
8
- type: Sequelize.STRING(10),
9
- primaryKey: true,
10
- allowNull: false,
11
- references: {
12
- model: 'sso_Group',
13
- key: 'GroupCode',
14
- },
15
- onUpdate: 'CASCADE',
16
- onDelete: 'CASCADE',
17
- },
18
- BuildingType: {
19
- type: Sequelize.ENUM(
20
- 'Outlet',
21
- 'Office',
22
- 'Fulfillment Center',
23
- 'Warehouse',
24
- ),
25
- allowNull: true,
26
- },
27
- Email: {
28
- type: Sequelize.STRING(200),
29
- allowNull: true,
30
- },
31
- Mobile: {
32
- type: Sequelize.STRING(20),
33
- allowNull: true,
34
- },
35
- Phone: {
36
- type: Sequelize.STRING(20),
37
- allowNull: false,
38
- },
39
- Brand: {
40
- type: Sequelize.STRING(10),
41
- allowNull: true,
42
- },
43
- OpeningDate: {
44
- type: Sequelize.DATE,
45
- allowNull: true,
46
- },
47
- CeasedDate: {
48
- type: Sequelize.DATE,
49
- allowNull: true,
50
- },
51
- OpeningHours: {
52
- type: Sequelize.STRING(200),
53
- allowNull: true,
54
- },
55
- CreatedById: {
56
- type: Sequelize.INTEGER,
57
- allowNull: true,
58
- references: {
59
- model: 'sso_User',
60
- key: 'UserId',
61
- },
62
- onDelete: 'CASCADE',
63
- onUpdate: 'CASCADE',
64
- },
65
- CreatedAt: {
66
- allowNull: false,
67
- defaultValue: Sequelize.literal('CURRENT_TIMESTAMP(3)'),
68
- type: Sequelize.DATE,
69
- },
70
- UpdatedById: {
71
- type: Sequelize.INTEGER,
72
- allowNull: true,
73
- references: {
74
- model: 'sso_User',
75
- key: 'UserId',
76
- },
77
- onDelete: 'CASCADE',
78
- onUpdate: 'CASCADE',
79
- },
80
- UpdatedAt: {
81
- allowNull: false,
82
- defaultValue: Sequelize.literal('CURRENT_TIMESTAMP(3)'),
83
- type: Sequelize.DATE,
84
- },
85
- });
86
- },
87
-
88
- down: async (queryInterface) => {
89
- // Drop the trigger before dropping the table
90
- await queryInterface.sequelize.query(
91
- `DROP TRIGGER IF EXISTS update_GroupCode_ObjectId`,
92
- );
93
- await queryInterface.dropTable('sso_Building');
94
- },
95
- };
1
+ 'use strict';
2
+
3
+ /** @type {import('sequelize-cli').Migration} */
4
+ module.exports = {
5
+ up: async (queryInterface, Sequelize) => {
6
+ await queryInterface.createTable('sso_Building', {
7
+ GroupCode: {
8
+ type: Sequelize.STRING(10),
9
+ primaryKey: true,
10
+ allowNull: false,
11
+ references: {
12
+ model: 'sso_Group',
13
+ key: 'GroupCode',
14
+ },
15
+ onUpdate: 'CASCADE',
16
+ onDelete: 'CASCADE',
17
+ },
18
+ BuildingType: {
19
+ type: Sequelize.ENUM(
20
+ 'Outlet',
21
+ 'Office',
22
+ 'Fulfillment Center',
23
+ 'Warehouse',
24
+ ),
25
+ allowNull: true,
26
+ },
27
+ Email: {
28
+ type: Sequelize.STRING(200),
29
+ allowNull: true,
30
+ },
31
+ Mobile: {
32
+ type: Sequelize.STRING(20),
33
+ allowNull: true,
34
+ },
35
+ Phone: {
36
+ type: Sequelize.STRING(20),
37
+ allowNull: false,
38
+ },
39
+ Brand: {
40
+ type: Sequelize.STRING(10),
41
+ allowNull: true,
42
+ },
43
+ OpeningDate: {
44
+ type: Sequelize.DATE,
45
+ allowNull: true,
46
+ },
47
+ CeasedDate: {
48
+ type: Sequelize.DATE,
49
+ allowNull: true,
50
+ },
51
+ OpeningHours: {
52
+ type: Sequelize.STRING(200),
53
+ allowNull: true,
54
+ },
55
+ CreatedById: {
56
+ type: Sequelize.INTEGER,
57
+ allowNull: true,
58
+ references: {
59
+ model: 'sso_User',
60
+ key: 'UserId',
61
+ },
62
+ onDelete: 'CASCADE',
63
+ onUpdate: 'CASCADE',
64
+ },
65
+ CreatedAt: {
66
+ allowNull: false,
67
+ defaultValue: Sequelize.literal('CURRENT_TIMESTAMP(3)'),
68
+ type: Sequelize.DATE,
69
+ },
70
+ UpdatedById: {
71
+ type: Sequelize.INTEGER,
72
+ allowNull: true,
73
+ references: {
74
+ model: 'sso_User',
75
+ key: 'UserId',
76
+ },
77
+ onDelete: 'CASCADE',
78
+ onUpdate: 'CASCADE',
79
+ },
80
+ UpdatedAt: {
81
+ allowNull: false,
82
+ defaultValue: Sequelize.literal('CURRENT_TIMESTAMP(3)'),
83
+ type: Sequelize.DATE,
84
+ },
85
+ });
86
+ },
87
+
88
+ down: async (queryInterface) => {
89
+ // Drop the trigger before dropping the table
90
+ await queryInterface.sequelize.query(
91
+ `DROP TRIGGER IF EXISTS update_GroupCode_ObjectId`,
92
+ );
93
+ await queryInterface.dropTable('sso_Building');
94
+ },
95
+ };
package/package.json CHANGED
@@ -1,90 +1,90 @@
1
- {
2
- "name": "@tomei/sso",
3
- "version": "0.51.9",
4
- "description": "Tomei SSO Package",
5
- "main": "dist/index.js",
6
- "scripts": {
7
- "start:dev": "tsc -w",
8
- "build": "tsc",
9
- "prepare": "husky install",
10
- "format": "prettier --write \"src/**/*.ts\"",
11
- "lint": "npx eslint . --fix",
12
- "test": "jest --forceExit --detectOpenHandles --coverage"
13
- },
14
- "repository": {
15
- "type": "git",
16
- "url": "git+ssh://git@gitlab.com/tomei-package/sso.git"
17
- },
18
- "keywords": [
19
- "tomei",
20
- "sso"
21
- ],
22
- "author": "Tomei",
23
- "license": "ISC",
24
- "bugs": {
25
- "url": "https://gitlab.com/tomei-package/sso/issues"
26
- },
27
- "homepage": "https://gitlab.com/tomei-package/sso#readme",
28
- "devDependencies": {
29
- "@commitlint/cli": "^19.6.0",
30
- "@commitlint/config-conventional": "^19.6.0",
31
- "@eslint/js": "^9.15.0",
32
- "@tsconfig/node18": "^18.2.4",
33
- "@types/bcrypt": "^5.0.2",
34
- "@types/jest": "^29.5.14",
35
- "@types/node": "^22.9.3",
36
- "@types/redis": "^4.0.11",
37
- "@types/validator": "^13.12.2",
38
- "@typescript-eslint/eslint-plugin": "^8.15.0",
39
- "@typescript-eslint/parser": "^8.15.0",
40
- "cls-hooked": "^4.2.2",
41
- "dotenv": "^16.4.5",
42
- "eslint": "^9.15.0",
43
- "eslint-config-prettier": "^9.1.0",
44
- "eslint-plugin-import": "^2.31.0",
45
- "eslint-plugin-prettier": "^5.2.1",
46
- "globals": "^15.12.0",
47
- "husky": "^9.1.7",
48
- "jest": "^29.7.0",
49
- "jest-mock-extended": "^3.0.7",
50
- "jest-sonar-reporter": "^2.0.0",
51
- "lint-staged": "^15.2.10",
52
- "prettier": "^3.3.3",
53
- "redis-mock": "^0.56.3",
54
- "ts-jest": "^29.2.5",
55
- "ts-node": "^10.9.2",
56
- "tsc-watch": "^6.2.1",
57
- "tsconfig-paths": "^4.2.0",
58
- "tslint": "^6.1.3",
59
- "typescript": "^5.7.2",
60
- "typescript-eslint": "^8.15.0"
61
- },
62
- "publishConfig": {
63
- "access": "public"
64
- },
65
- "peerDependencies": {
66
- "@tomei/activity-history": "^0.2.23",
67
- "@tomei/config": "^0.3.21",
68
- "@tomei/general": "^0.21.3",
69
- "@tomei/mailer": "^0.5.21",
70
- "argon2": "^0.41.1",
71
- "redis": "^4.7.0",
72
- "reflect-metadata": "^0.2.2",
73
- "sequelize": "^6.37.5",
74
- "sequelize-cli": "^6.6.2",
75
- "sequelize-typescript": "^2.1.6",
76
- "speakeasy": "^2.0.0",
77
- "uuid": "^11.0.3"
78
- },
79
- "lint-staged": {
80
- "*/**/*.{js,ts,tsx}": [
81
- "prettier --write \"src/**/*.ts\" \"test/**/*.ts\"",
82
- "eslint \"{src,apps,libs,test}/**/*.ts\" --fix"
83
- ]
84
- },
85
- "jestSonar": {
86
- "reportPath": "coverage",
87
- "reportFile": "test-report.xml",
88
- "indent": 2
89
- }
90
- }
1
+ {
2
+ "name": "@tomei/sso",
3
+ "version": "0.52.0",
4
+ "description": "Tomei SSO Package",
5
+ "main": "dist/index.js",
6
+ "scripts": {
7
+ "start:dev": "tsc -w",
8
+ "build": "tsc",
9
+ "prepare": "husky install",
10
+ "format": "prettier --write \"src/**/*.ts\"",
11
+ "lint": "npx eslint . --fix",
12
+ "test": "jest --forceExit --detectOpenHandles --coverage"
13
+ },
14
+ "repository": {
15
+ "type": "git",
16
+ "url": "git+ssh://git@gitlab.com/tomei-package/sso.git"
17
+ },
18
+ "keywords": [
19
+ "tomei",
20
+ "sso"
21
+ ],
22
+ "author": "Tomei",
23
+ "license": "ISC",
24
+ "bugs": {
25
+ "url": "https://gitlab.com/tomei-package/sso/issues"
26
+ },
27
+ "homepage": "https://gitlab.com/tomei-package/sso#readme",
28
+ "devDependencies": {
29
+ "@commitlint/cli": "^19.6.0",
30
+ "@commitlint/config-conventional": "^19.6.0",
31
+ "@eslint/js": "^9.15.0",
32
+ "@tsconfig/node18": "^18.2.4",
33
+ "@types/bcrypt": "^5.0.2",
34
+ "@types/jest": "^29.5.14",
35
+ "@types/node": "^22.9.3",
36
+ "@types/redis": "^4.0.11",
37
+ "@types/validator": "^13.12.2",
38
+ "@typescript-eslint/eslint-plugin": "^8.15.0",
39
+ "@typescript-eslint/parser": "^8.15.0",
40
+ "cls-hooked": "^4.2.2",
41
+ "dotenv": "^16.4.5",
42
+ "eslint": "^9.15.0",
43
+ "eslint-config-prettier": "^9.1.0",
44
+ "eslint-plugin-import": "^2.31.0",
45
+ "eslint-plugin-prettier": "^5.2.1",
46
+ "globals": "^15.12.0",
47
+ "husky": "^9.1.7",
48
+ "jest": "^29.7.0",
49
+ "jest-mock-extended": "^3.0.7",
50
+ "jest-sonar-reporter": "^2.0.0",
51
+ "lint-staged": "^15.2.10",
52
+ "prettier": "^3.3.3",
53
+ "redis-mock": "^0.56.3",
54
+ "ts-jest": "^29.2.5",
55
+ "ts-node": "^10.9.2",
56
+ "tsc-watch": "^6.2.1",
57
+ "tsconfig-paths": "^4.2.0",
58
+ "tslint": "^6.1.3",
59
+ "typescript": "^5.7.2",
60
+ "typescript-eslint": "^8.15.0"
61
+ },
62
+ "publishConfig": {
63
+ "access": "public"
64
+ },
65
+ "peerDependencies": {
66
+ "@tomei/activity-history": "^0.2.23",
67
+ "@tomei/config": "^0.3.21",
68
+ "@tomei/general": "^0.21.3",
69
+ "@tomei/mailer": "^0.5.21",
70
+ "argon2": "^0.41.1",
71
+ "redis": "^4.7.0",
72
+ "reflect-metadata": "^0.2.2",
73
+ "sequelize": "^6.37.5",
74
+ "sequelize-cli": "^6.6.2",
75
+ "sequelize-typescript": "^2.1.6",
76
+ "speakeasy": "^2.0.0",
77
+ "uuid": "^11.0.3"
78
+ },
79
+ "lint-staged": {
80
+ "*/**/*.{js,ts,tsx}": [
81
+ "prettier --write \"src/**/*.ts\" \"test/**/*.ts\"",
82
+ "eslint \"{src,apps,libs,test}/**/*.ts\" --fix"
83
+ ]
84
+ },
85
+ "jestSonar": {
86
+ "reportPath": "coverage",
87
+ "reportFile": "test-report.xml",
88
+ "indent": 2
89
+ }
90
+ }
package/sampledotenv CHANGED
@@ -1,8 +1,8 @@
1
- DATABASE_URL=
2
- SHADOW_DATABASE_URL=
3
- REDIS_URL=
4
- REDIS_PASSWORD=
5
- SMTP_HOST=
6
- SMTP_PORT=
7
- EMAIL_SENDER=
1
+ DATABASE_URL=
2
+ SHADOW_DATABASE_URL=
3
+ REDIS_URL=
4
+ REDIS_PASSWORD=
5
+ SMTP_HOST=
6
+ SMTP_PORT=
7
+ EMAIL_SENDER=
8
8
  EMAIL_PASSWORD=
@@ -1,23 +1,23 @@
1
- sonar.projectKey=all-tomei-projects_sso
2
- sonar.organization=all-tomei-projects
3
- sonar.exclusions=**/*.js,test-data,dist,coverage, node_modules, __tests__, **/*.spec.ts, __mocks__
4
- sonar.scm.provider=git
5
-
6
- sonar.sources=src
7
- sonar.test=__tests__
8
- sonar.test.inclusions=src/**/*.spec.ts
9
-
10
- sonar.javascript.lcov.reportPaths=./coverage/lcov.info
11
- sonar.testExecutionReportPaths=coverage/test-report.xml
12
- sonar.sourceEnconding=UTF-8
13
-
14
- # This is the name and version displayed in the SonarCloud UI.
15
- #sonar.projectName=sso
16
- #sonar.projectVersion=1.0
17
-
18
-
19
- # Path is relative to the sonar-project.properties file. Replace "\" by "/" on Windows.
20
- #sonar.sources=.
21
-
22
- # Encoding of the source code. Default is default system encoding
1
+ sonar.projectKey=all-tomei-projects_sso
2
+ sonar.organization=all-tomei-projects
3
+ sonar.exclusions=**/*.js,test-data,dist,coverage, node_modules, __tests__, **/*.spec.ts, __mocks__
4
+ sonar.scm.provider=git
5
+
6
+ sonar.sources=src
7
+ sonar.test=__tests__
8
+ sonar.test.inclusions=src/**/*.spec.ts
9
+
10
+ sonar.javascript.lcov.reportPaths=./coverage/lcov.info
11
+ sonar.testExecutionReportPaths=coverage/test-report.xml
12
+ sonar.sourceEnconding=UTF-8
13
+
14
+ # This is the name and version displayed in the SonarCloud UI.
15
+ #sonar.projectName=sso
16
+ #sonar.projectVersion=1.0
17
+
18
+
19
+ # Path is relative to the sonar-project.properties file. Replace "\" by "/" on Windows.
20
+ #sonar.sources=.
21
+
22
+ # Encoding of the source code. Default is default system encoding
23
23
  #sonar.sourceEncoding=UTF-8
@@ -754,6 +754,71 @@ export class Group extends TreeNodeBase<Group> {
754
754
  }
755
755
  }
756
756
 
757
+ public static async getSystemAccessRoles(
758
+ loginUser: LoginUser,
759
+ dbTransaction: any,
760
+ SystemCode: string,
761
+ Page: number,
762
+ Rows: number,
763
+ Search: {
764
+ GroupCode?: string;
765
+ Status?: string;
766
+ },
767
+ ) {
768
+ // Part 1: Privilege Checking
769
+ const systemCode = ApplicationConfig.getComponentConfigValue('system-code');
770
+ const isPrivileged = await loginUser.checkPrivileges(
771
+ systemCode,
772
+ 'SYSTEM_ACCESS_VIEW',
773
+ );
774
+
775
+ if (!isPrivileged) {
776
+ throw new ClassError(
777
+ 'Group',
778
+ 'GroupErrMsg06',
779
+ 'You do not have the privilege to view system access',
780
+ );
781
+ }
782
+
783
+ try {
784
+ // Part 2: Retrieve System Access and returns
785
+ const queryObj: any = { SystemCode: SystemCode };
786
+
787
+ if (Search) {
788
+ Object.entries(Search).forEach(([key, value]) => {
789
+ queryObj[key] = value;
790
+ });
791
+ }
792
+
793
+ let options: any = {
794
+ where: queryObj,
795
+ distinct: true,
796
+ transaction: dbTransaction,
797
+ };
798
+
799
+ if (Page && Rows) {
800
+ options = {
801
+ ...options,
802
+ limit: Rows,
803
+ offset: Rows * (Page - 1),
804
+ order: [['CreatedAt', 'DESC']],
805
+ include: {
806
+ model: GroupModel,
807
+ where: {
808
+ Type: 'Role',
809
+ },
810
+ },
811
+ };
812
+ }
813
+
814
+ const systemAccess =
815
+ await Group._GroupSystemAccessRepo.findAndCountAll(options);
816
+ return systemAccess;
817
+ } catch (error) {
818
+ return error;
819
+ }
820
+ }
821
+
757
822
  private static async getInheritedSystemAccess(
758
823
  dbTransaction: any,
759
824
  group: Group,
@@ -1097,6 +1162,175 @@ export class Group extends TreeNodeBase<Group> {
1097
1162
  }
1098
1163
  }
1099
1164
 
1165
+ public static async getSystemPrivilegeRoles(
1166
+ loginUser: LoginUser,
1167
+ dbTransaction: any,
1168
+ SystemCode: string,
1169
+ search?: {
1170
+ GroupCode?: string[];
1171
+ Status?: string;
1172
+ },
1173
+ ) {
1174
+ try {
1175
+ //Part 1: Privilege Checking
1176
+ const systemCode =
1177
+ ApplicationConfig.getComponentConfigValue('system-code');
1178
+ const isPrivileged = await loginUser.checkPrivileges(
1179
+ systemCode,
1180
+ 'GROUP_PRIVILEGE_VIEW',
1181
+ );
1182
+
1183
+ if (!isPrivileged) {
1184
+ throw new ClassError(
1185
+ 'Group',
1186
+ 'GroupErrMsg11',
1187
+ 'You do not have the privilege to view group privileges',
1188
+ );
1189
+ }
1190
+
1191
+ //Part 2: Retrieve Roles Based on Privilege
1192
+ //Retrieve Roles based on privilege on a system
1193
+ let systemWhere: any = {};
1194
+
1195
+ if (search) {
1196
+ if (search.GroupCode.length) {
1197
+ }
1198
+ }
1199
+
1200
+ if (SystemCode) {
1201
+ systemWhere = {
1202
+ SystemCode: {
1203
+ [Op.substring]: SystemCode,
1204
+ },
1205
+ };
1206
+ }
1207
+
1208
+ const groupCodesPrivileges: {
1209
+ SystemPrivilegeId: string;
1210
+ GroupCodes: { Code: string; Name: string }[];
1211
+ }[] = [];
1212
+
1213
+ const allGroupCodePrivileges = await Group._GroupPrivilegeRepo.findAll({
1214
+ include: [
1215
+ {
1216
+ model: SystemPrivilegeModel,
1217
+ where: systemWhere,
1218
+ },
1219
+ {
1220
+ model: GroupModel,
1221
+ where: {
1222
+ Type: 'Role',
1223
+ },
1224
+ },
1225
+ ],
1226
+ transaction: dbTransaction,
1227
+ });
1228
+
1229
+ // Use a Map to group by SystemPrivilegeId
1230
+ const privilegesMap = new Map<string, { Code: string; Name: string }[]>();
1231
+
1232
+ for (const groupCodePrivilege of allGroupCodePrivileges) {
1233
+ const { SystemPrivilegeId, GroupCode, Group } = groupCodePrivilege; // `Group` contains Name from GroupModel
1234
+
1235
+ if (!privilegesMap.has(SystemPrivilegeId)) {
1236
+ // Initialize with an empty array if not already present
1237
+ privilegesMap.set(SystemPrivilegeId, []);
1238
+ }
1239
+
1240
+ // Add the GroupCode and Name to the array if it exists and is not already present
1241
+ if (GroupCode && Group?.Name) {
1242
+ const groupCodes = privilegesMap.get(SystemPrivilegeId);
1243
+ const newGroupEntry = { Code: GroupCode, Name: Group.Name };
1244
+
1245
+ // Ensure no duplicates
1246
+ if (
1247
+ groupCodes &&
1248
+ !groupCodes.some(
1249
+ (g) => g.Code === GroupCode && g.Name === Group.Name,
1250
+ )
1251
+ ) {
1252
+ groupCodes.push(newGroupEntry);
1253
+ }
1254
+ }
1255
+ }
1256
+
1257
+ // Convert the Map to the desired array format
1258
+ privilegesMap.forEach((groupCodes, SystemPrivilegeId) => {
1259
+ groupCodesPrivileges.push({
1260
+ SystemPrivilegeId,
1261
+ GroupCodes: groupCodes,
1262
+ });
1263
+ });
1264
+
1265
+ const allPrivileges = await SystemPrivilegeModel.findAll({
1266
+ where: systemWhere,
1267
+ transaction: dbTransaction,
1268
+ });
1269
+
1270
+ const groupPrivilegeRoles: {
1271
+ SystemPrivilegeId: string;
1272
+ PrivilegeCode: string;
1273
+ Description: string;
1274
+ GroupCodes: { Code: string; Name: string }[];
1275
+ }[] = [];
1276
+
1277
+ // Iterate through allPrivileges to check for matches in groupCodesPrivileges
1278
+ for (const privilege of allPrivileges) {
1279
+ const matchingGroupPrivilege = groupCodesPrivileges.find(
1280
+ (groupPrivilege) =>
1281
+ groupPrivilege.SystemPrivilegeId === privilege.SystemPrivilegeId,
1282
+ );
1283
+
1284
+ if (matchingGroupPrivilege) {
1285
+ // If match is found, push to groupPrivilegeRoles with GroupCodes
1286
+ groupPrivilegeRoles.push({
1287
+ SystemPrivilegeId: privilege.SystemPrivilegeId,
1288
+ PrivilegeCode: privilege.PrivilegeCode,
1289
+ Description: privilege.Description,
1290
+ GroupCodes: matchingGroupPrivilege.GroupCodes,
1291
+ });
1292
+ } else {
1293
+ // If no match is found, push with an empty array of GroupCodes
1294
+ groupPrivilegeRoles.push({
1295
+ SystemPrivilegeId: privilege.SystemPrivilegeId,
1296
+ PrivilegeCode: privilege.PrivilegeCode,
1297
+ Description: privilege.Description,
1298
+ GroupCodes: [],
1299
+ });
1300
+ }
1301
+ }
1302
+
1303
+ const filteredGroupPrivilegeRoles = groupPrivilegeRoles
1304
+ .map((role) => {
1305
+ if (search.GroupCode?.length) {
1306
+ // Filter GroupCodes to only include matching Codes
1307
+ const matchingGroupCodes = role.GroupCodes.filter((groupCode) =>
1308
+ search.GroupCode.includes(groupCode.Code),
1309
+ );
1310
+
1311
+ // If there are no matching GroupCodes, exclude this role
1312
+ if (matchingGroupCodes.length === 0) {
1313
+ return null;
1314
+ }
1315
+
1316
+ // Return the role with filtered GroupCodes
1317
+ return {
1318
+ ...role,
1319
+ GroupCodes: matchingGroupCodes,
1320
+ };
1321
+ }
1322
+
1323
+ // If search.GroupCode is not provided, include all data
1324
+ return role;
1325
+ })
1326
+ .filter(Boolean); // Remove any null values
1327
+
1328
+ return filteredGroupPrivilegeRoles;
1329
+ } catch (error) {
1330
+ throw error;
1331
+ }
1332
+ }
1333
+
1100
1334
  public static async getInheritedSystemPrivileges(
1101
1335
  dbTransaction: any,
1102
1336
  GroupCode: string,
package/src/index.ts CHANGED
@@ -5,3 +5,4 @@ export * from './redis-client';
5
5
  export * from './session';
6
6
  export * from './enum';
7
7
  export * as ssoDb from './database';
8
+ export * from './types';