@tomei/sso 0.52.1 → 0.52.2

Sign up to get free protection for your applications and to get access to all the features.
Files changed (146) hide show
  1. package/.commitlintrc.json +22 -22
  2. package/.gitlab-ci.yml +16 -16
  3. package/.husky/commit-msg +15 -15
  4. package/.husky/pre-commit +7 -7
  5. package/.prettierrc +4 -4
  6. package/Jenkinsfile +57 -57
  7. package/README.md +23 -23
  8. package/__tests__/unit/components/group/group.spec.ts +79 -79
  9. package/__tests__/unit/components/group-object-privilege/group-object-privilege.spec.ts +88 -88
  10. package/__tests__/unit/components/group-privilege/group-privilege.spec.ts +68 -68
  11. package/__tests__/unit/components/group-reporting-user/group-reporting-user.spec.ts +66 -66
  12. package/__tests__/unit/components/group-system-access/group-system-access.spec.ts +83 -83
  13. package/__tests__/unit/components/login-user/l.spec.ts +746 -746
  14. package/__tests__/unit/components/login-user/login.spec.ts +1164 -1164
  15. package/__tests__/unit/components/password-hash/password-hash.service.spec.ts +31 -31
  16. package/__tests__/unit/components/system/system.spec.ts +254 -254
  17. package/__tests__/unit/components/system-privilege/system-privilege.spec.ts +83 -83
  18. package/__tests__/unit/components/user-group/user-group.spec.ts +86 -86
  19. package/__tests__/unit/components/user-object-privilege/user-object-privilege.spec.ts +78 -78
  20. package/__tests__/unit/components/user-privilege/user-privilege.spec.ts +72 -72
  21. package/__tests__/unit/components/user-system-access/user-system-access.spec.ts +89 -89
  22. package/__tests__/unit/redis-client/redis.service.spec.ts +23 -23
  23. package/__tests__/unit/session/session.service.spec.ts +47 -47
  24. package/__tests__/unit/system-privilege/system-privilage.spec.ts +91 -91
  25. package/coverage/clover.xml +1452 -1452
  26. package/coverage/coverage-final.json +47 -47
  27. package/coverage/lcov-report/base.css +224 -224
  28. package/coverage/lcov-report/block-navigation.js +87 -87
  29. package/coverage/lcov-report/components/group/group.repository.ts.html +117 -117
  30. package/coverage/lcov-report/components/group/group.ts.html +327 -327
  31. package/coverage/lcov-report/components/group/index.html +130 -130
  32. package/coverage/lcov-report/components/group-object-privilege/group-object-privilege.repository.ts.html +117 -117
  33. package/coverage/lcov-report/components/group-object-privilege/group-object-privilege.ts.html +321 -321
  34. package/coverage/lcov-report/components/group-object-privilege/index.html +130 -130
  35. package/coverage/lcov-report/components/group-privilege/group-privilege.repository.ts.html +117 -117
  36. package/coverage/lcov-report/components/group-privilege/group-privilege.ts.html +303 -303
  37. package/coverage/lcov-report/components/group-privilege/index.html +130 -130
  38. package/coverage/lcov-report/components/group-reporting-user/group-reporting-user.repository.ts.html +117 -117
  39. package/coverage/lcov-report/components/group-reporting-user/group-reporting-user.ts.html +327 -327
  40. package/coverage/lcov-report/components/group-reporting-user/index.html +130 -130
  41. package/coverage/lcov-report/components/group-system-access/group-system-access.repository.ts.html +117 -117
  42. package/coverage/lcov-report/components/group-system-access/group-system-access.ts.html +309 -309
  43. package/coverage/lcov-report/components/group-system-access/index.html +130 -130
  44. package/coverage/lcov-report/components/login-history/index.html +115 -115
  45. package/coverage/lcov-report/components/login-history/login-history.repository.ts.html +117 -117
  46. package/coverage/lcov-report/components/login-user/index.html +130 -130
  47. package/coverage/lcov-report/components/login-user/login-user.ts.html +5007 -5007
  48. package/coverage/lcov-report/components/login-user/user.repository.ts.html +117 -117
  49. package/coverage/lcov-report/components/password-hash/index.html +115 -115
  50. package/coverage/lcov-report/components/password-hash/password-hash.service.ts.html +126 -126
  51. package/coverage/lcov-report/components/system/index.html +130 -130
  52. package/coverage/lcov-report/components/system/system.repository.ts.html +117 -117
  53. package/coverage/lcov-report/components/system/system.ts.html +909 -909
  54. package/coverage/lcov-report/components/system-privilege/index.html +130 -130
  55. package/coverage/lcov-report/components/system-privilege/system-privilege.repository.ts.html +120 -120
  56. package/coverage/lcov-report/components/system-privilege/system-privilege.ts.html +390 -390
  57. package/coverage/lcov-report/components/user-group/index.html +130 -130
  58. package/coverage/lcov-report/components/user-group/user-group.repository.ts.html +117 -117
  59. package/coverage/lcov-report/components/user-group/user-group.ts.html +354 -354
  60. package/coverage/lcov-report/components/user-object-privilege/index.html +130 -130
  61. package/coverage/lcov-report/components/user-object-privilege/user-object-privilege.repository.ts.html +117 -117
  62. package/coverage/lcov-report/components/user-object-privilege/user-object-privilege.ts.html +312 -312
  63. package/coverage/lcov-report/components/user-privilege/index.html +130 -130
  64. package/coverage/lcov-report/components/user-privilege/user-privilege.repository.ts.html +117 -117
  65. package/coverage/lcov-report/components/user-privilege/user-privilege.ts.html +306 -306
  66. package/coverage/lcov-report/components/user-system-access/index.html +130 -130
  67. package/coverage/lcov-report/components/user-system-access/user-system-access.repository.ts.html +117 -117
  68. package/coverage/lcov-report/components/user-system-access/user-system-access.ts.html +312 -312
  69. package/coverage/lcov-report/enum/group-type.enum.ts.html +108 -108
  70. package/coverage/lcov-report/enum/index.html +160 -160
  71. package/coverage/lcov-report/enum/index.ts.html +93 -93
  72. package/coverage/lcov-report/enum/user-status.enum.ts.html +105 -105
  73. package/coverage/lcov-report/enum/yn.enum.ts.html +96 -96
  74. package/coverage/lcov-report/index.html +370 -370
  75. package/coverage/lcov-report/models/group-object-privilege.entity.ts.html +333 -333
  76. package/coverage/lcov-report/models/group-privilege.entity.ts.html +315 -315
  77. package/coverage/lcov-report/models/group-reporting-user.entity.ts.html +339 -339
  78. package/coverage/lcov-report/models/group-system-access.entity.ts.html +324 -324
  79. package/coverage/lcov-report/models/group.entity.ts.html +435 -435
  80. package/coverage/lcov-report/models/index.html +310 -310
  81. package/coverage/lcov-report/models/login-history.entity.ts.html +252 -252
  82. package/coverage/lcov-report/models/staff.entity.ts.html +411 -411
  83. package/coverage/lcov-report/models/system-privilege.entity.ts.html +354 -354
  84. package/coverage/lcov-report/models/system.entity.ts.html +423 -423
  85. package/coverage/lcov-report/models/user-group.entity.ts.html +354 -354
  86. package/coverage/lcov-report/models/user-object-privilege.entity.ts.html +330 -330
  87. package/coverage/lcov-report/models/user-privilege.entity.ts.html +315 -315
  88. package/coverage/lcov-report/models/user-system-access.entity.ts.html +315 -315
  89. package/coverage/lcov-report/models/user.entity.ts.html +522 -522
  90. package/coverage/lcov-report/prettify.css +1 -1
  91. package/coverage/lcov-report/prettify.js +2 -2
  92. package/coverage/lcov-report/redis-client/index.html +115 -115
  93. package/coverage/lcov-report/redis-client/redis.service.ts.html +240 -240
  94. package/coverage/lcov-report/session/index.html +115 -115
  95. package/coverage/lcov-report/session/session.service.ts.html +246 -246
  96. package/coverage/lcov-report/sorter.js +196 -196
  97. package/coverage/lcov.info +2490 -2490
  98. package/coverage/test-report.xml +128 -128
  99. package/create-sso-user.sql +39 -39
  100. package/dist/src/components/group/group.js +0 -4
  101. package/dist/src/components/group/group.js.map +1 -1
  102. package/dist/src/components/login-user/user.d.ts +2 -3
  103. package/dist/src/components/login-user/user.js +8 -12
  104. package/dist/src/components/login-user/user.js.map +1 -1
  105. package/dist/src/components/user-system-access/user-system-access.d.ts +12 -0
  106. package/dist/src/components/user-system-access/user-system-access.js +146 -0
  107. package/dist/src/components/user-system-access/user-system-access.js.map +1 -1
  108. package/dist/src/components/user-system-access/user-system-access.repository.d.ts +1 -0
  109. package/dist/src/components/user-system-access/user-system-access.repository.js +17 -0
  110. package/dist/src/components/user-system-access/user-system-access.repository.js.map +1 -1
  111. package/dist/src/types/auth-context.d.ts +1 -2
  112. package/dist/tsconfig.tsbuildinfo +1 -1
  113. package/eslint.config.mjs +58 -58
  114. package/jest.config.js +14 -14
  115. package/migrations/20240314080602-create-user-table.js +124 -124
  116. package/migrations/20240314080603-create-user-group-table.js +85 -85
  117. package/migrations/20240314080604-create-user-user-group-table.js +55 -55
  118. package/migrations/20240314080605-create-login-history-table.js +53 -53
  119. package/migrations/20240527064925-create-system-table.js +78 -78
  120. package/migrations/20240527064926-create-system-privilege-table.js +71 -71
  121. package/migrations/20240527065342-create-group-table.js +93 -93
  122. package/migrations/20240527065633-create-group-reporting-user-table.js +76 -76
  123. package/migrations/20240528011551-create-group-system-access-table.js +72 -72
  124. package/migrations/20240528023018-user-system-access-table.js +75 -75
  125. package/migrations/20240528032229-user-privilege-table.js +76 -76
  126. package/migrations/20240528063003-create-group-privilege-table.js +76 -76
  127. package/migrations/20240528063051-create-group-object-privilege-table.js +84 -84
  128. package/migrations/20240528063107-create-user-object-privilege-table.js +84 -84
  129. package/migrations/20240528063108-create-api-key-table.js +85 -85
  130. package/migrations/20241104104802-create-building-table.js +95 -95
  131. package/package.json +90 -90
  132. package/sampledotenv +7 -7
  133. package/sonar-project.properties +22 -22
  134. package/src/components/group/group.ts +0 -5
  135. package/src/components/login-user/user.ts +24 -29
  136. package/src/components/user-system-access/user-system-access.repository.ts +16 -0
  137. package/src/components/user-system-access/user-system-access.ts +230 -1
  138. package/src/types/auth-context.ts +1 -2
  139. package/tsconfig.build.json +5 -5
  140. package/tsconfig.json +23 -23
  141. package/dist/__tests__/unit/components/group-privilege/group-privilege.test.d.ts +0 -1
  142. package/dist/__tests__/unit/components/group-privilege/group-privilege.test.js +0 -71
  143. package/dist/__tests__/unit/components/group-privilege/group-privilege.test.js.map +0 -1
  144. package/dist/__tests__/unit/components/login-user/login-user.spec.d.ts +0 -0
  145. package/dist/__tests__/unit/components/login-user/login-user.spec.js +0 -6
  146. package/dist/__tests__/unit/components/login-user/login-user.spec.js.map +0 -1
@@ -2,9 +2,12 @@ import { ClassError, ObjectBase } from '@tomei/general';
2
2
  import { UserSystemAccessRepository } from './user-system-access.repository';
3
3
  import { IUserSystemAccess } from '../../interfaces/user-system-access.interface';
4
4
  import { User } from '../login-user/user';
5
- import { System } from '../system/system';
6
5
  import { ApplicationConfig } from '@tomei/config';
7
6
  import SystemModel from '../../models/system.entity';
7
+ import SystemPrivilegeModel from '../../models/system-privilege.entity';
8
+ import UserSystemAccessModel from '../../models/user-system-access.entity';
9
+ import GroupModel from '../../models/group.entity';
10
+ import GroupSystemAccessModel from '../../models/group-system-access.entity';
8
11
  import UserModel from '../../models/user.entity';
9
12
  import { ActionEnum, Activity } from '@tomei/activity-history';
10
13
  import { Op } from 'sequelize';
@@ -182,6 +185,232 @@ export class UserSystemAccess extends ObjectBase {
182
185
  }
183
186
  }
184
187
 
188
+ public static async findAllUsers(
189
+ loginUser: User, //The currently logged-in user initiating the request.
190
+ dbTransaction: any, //The active database transaction to ensure consistency during the query.
191
+ SystemCode: string,
192
+ Page: number,
193
+ Rows: number,
194
+ Search: {
195
+ UserId?: string | number;
196
+ Status?: string;
197
+ },
198
+ ) {
199
+ // Part 1: Privilege Checking
200
+ const systemCode = ApplicationConfig.getComponentConfigValue('system-code');
201
+ const isPrivileged = await loginUser.checkPrivileges(
202
+ systemCode,
203
+ 'USER_SYSTEM_ACCESS_LIST',
204
+ );
205
+
206
+ if (!isPrivileged) {
207
+ throw new ClassError(
208
+ 'UserSystemAccessUser',
209
+ 'UserSystemAccessUserErrMsg01',
210
+ 'You do not have permission to view system access users.',
211
+ );
212
+ }
213
+
214
+ try {
215
+ // Part 2: Retrieve System Access Users and returns
216
+ const queryObj: any = { SystemCode: SystemCode };
217
+
218
+ if (Search) {
219
+ Object.entries(Search).forEach(([key, value]) => {
220
+ queryObj[key] = value;
221
+ });
222
+ }
223
+
224
+ let options: any = {
225
+ where: queryObj,
226
+ distinct: true,
227
+ transaction: dbTransaction,
228
+ };
229
+
230
+ if (Page && Rows) {
231
+ options = {
232
+ ...options,
233
+ limit: Rows,
234
+ offset: Rows * (Page - 1),
235
+ order: [['CreatedAt', 'DESC']],
236
+ include: [
237
+ {
238
+ model: SystemModel,
239
+ attributes: ['Name', 'SystemCode'],
240
+ },
241
+ {
242
+ model: UserModel,
243
+ as: 'User',
244
+ attributes: ['UserId', 'FullName'],
245
+ },
246
+ ],
247
+ };
248
+ }
249
+
250
+ const userSystemAccesses =
251
+ await this._Repository.findAndCountAll(options);
252
+ return userSystemAccesses;
253
+ } catch (error) {
254
+ throw error;
255
+ }
256
+ }
257
+
258
+ public static async findAllUserPrivileges(
259
+ loginUser: User, //The currently logged-in user initiating the request.
260
+ dbTransaction: any, //The active database transaction to ensure consistency during the query.
261
+ SystemCode: string,
262
+ search?: {
263
+ UserId?: string[];
264
+ Status?: string;
265
+ },
266
+ ) {
267
+ // Part 1: Privilege Checking
268
+ const systemCode = ApplicationConfig.getComponentConfigValue('system-code');
269
+ const isPrivileged = await loginUser.checkPrivileges(
270
+ systemCode,
271
+ 'USER_SYSTEM_ACCESS_LIST',
272
+ );
273
+
274
+ if (!isPrivileged) {
275
+ throw new ClassError(
276
+ 'UserSystemAccessUser',
277
+ 'UserSystemAccessUserErrMsg01',
278
+ 'You do not have permission to view system access users.',
279
+ );
280
+ }
281
+
282
+ try {
283
+ //Part 2: Retrieve User System Access Based on Privileges
284
+ let systemWhere: any = {};
285
+
286
+ if (SystemCode) {
287
+ systemWhere = {
288
+ SystemCode: {
289
+ [Op.substring]: SystemCode,
290
+ },
291
+ };
292
+ }
293
+
294
+ const allSystemAccessUsers = await UserSystemAccessModel.findAll({
295
+ include: [
296
+ {
297
+ model: SystemModel,
298
+ where: systemWhere,
299
+ },
300
+ {
301
+ model: UserModel,
302
+ as: 'User',
303
+ attributes: ['UserId', 'FullName'],
304
+ },
305
+ ],
306
+ transaction: dbTransaction,
307
+ });
308
+
309
+ const allPrivileges = await SystemPrivilegeModel.findAll({
310
+ where: systemWhere,
311
+ transaction: dbTransaction,
312
+ });
313
+
314
+ const systemAccessUserPrivileges = allPrivileges.map((privilege) => {
315
+ const filteredUsers = allSystemAccessUsers
316
+ .map((userAccess) => userAccess.User)
317
+ .filter((user) => search.UserId.includes(String(user.UserId)));
318
+
319
+ return {
320
+ ...privilege.get({ plain: true }),
321
+ Users: filteredUsers,
322
+ };
323
+ });
324
+
325
+ return systemAccessUserPrivileges;
326
+ } catch (error) {
327
+ throw error;
328
+ }
329
+ }
330
+
331
+ public static async findAllUserRoles(
332
+ loginUser: User, //The currently logged-in user initiating the request.
333
+ dbTransaction: any, //The active database transaction to ensure consistency during the query.
334
+ SystemCode: string,
335
+ search?: {
336
+ UserId?: string[];
337
+ Status?: string;
338
+ },
339
+ ) {
340
+ // Part 1: Privilege Checking
341
+ const systemCode = ApplicationConfig.getComponentConfigValue('system-code');
342
+ const isPrivileged = await loginUser.checkPrivileges(
343
+ systemCode,
344
+ 'USER_SYSTEM_ACCESS_LIST',
345
+ );
346
+
347
+ if (!isPrivileged) {
348
+ throw new ClassError(
349
+ 'UserSystemAccessUser',
350
+ 'UserSystemAccessUserErrMsg01',
351
+ 'You do not have permission to view system access users.',
352
+ );
353
+ }
354
+
355
+ try {
356
+ //Part 2: Retrieve User System Access Based on Privileges
357
+ let systemWhere: any = {};
358
+
359
+ if (SystemCode) {
360
+ systemWhere = {
361
+ SystemCode: {
362
+ [Op.substring]: SystemCode,
363
+ },
364
+ };
365
+ }
366
+
367
+ const allGroupSystemAccess = await GroupSystemAccessModel.findAll({
368
+ where: systemWhere,
369
+ include: [
370
+ {
371
+ model: GroupModel,
372
+ where: {
373
+ Type: 'Role',
374
+ },
375
+ },
376
+ ],
377
+ transaction: dbTransaction,
378
+ });
379
+
380
+ const allSystemAccessUsers = await UserSystemAccessModel.findAll({
381
+ include: [
382
+ {
383
+ model: SystemModel,
384
+ where: systemWhere,
385
+ },
386
+ {
387
+ model: UserModel,
388
+ as: 'User',
389
+ attributes: ['UserId', 'FullName'],
390
+ },
391
+ ],
392
+ transaction: dbTransaction,
393
+ });
394
+
395
+ const systemAccessUserRoles = allGroupSystemAccess.map(
396
+ (groupSystemAccess) => {
397
+ const filteredUsers = allSystemAccessUsers
398
+ .map((userAccess) => userAccess.User)
399
+ .filter((user) => search.UserId.includes(String(user.UserId)));
400
+
401
+ return {
402
+ ...groupSystemAccess.Group.get({ plain: true }),
403
+ Users: filteredUsers,
404
+ };
405
+ },
406
+ );
407
+
408
+ return systemAccessUserRoles;
409
+ } catch (error) {
410
+ throw error;
411
+ }
412
+ }
413
+
185
414
  public static async createAccess(
186
415
  loginUser: User, //The currently logged-in user initiating the request.
187
416
  dbTransaction: any, //The active database transaction to ensure consistency during the query.
@@ -1,4 +1,3 @@
1
- import { IAPIKeyAttr } from '../interfaces/api-key-attr.interface';
2
1
  import { LoginUser } from '../components/login-user/login-user';
3
2
 
4
3
  export type AuthContext =
@@ -6,5 +5,5 @@ export type AuthContext =
6
5
  loginUser: LoginUser;
7
6
  }
8
7
  | {
9
- apiKey: IAPIKeyAttr;
8
+ apiKey: string;
10
9
  };
@@ -1,6 +1,6 @@
1
- {
2
- "extends": "./tsconfig.json",
3
- "include": ["**/*.ts"],
4
- "exclude": ["node_modules", "__tests__", "dist", "**/*spec.ts"]
5
- }
1
+ {
2
+ "extends": "./tsconfig.json",
3
+ "include": ["**/*.ts"],
4
+ "exclude": ["node_modules", "__tests__", "dist", "**/*spec.ts"]
5
+ }
6
6
 
package/tsconfig.json CHANGED
@@ -1,24 +1,24 @@
1
- {
2
- "compilerOptions": {
3
- "module": "commonjs",
4
- "declaration": true,
5
- "removeComments": true,
6
- "emitDecoratorMetadata": true,
7
- "experimentalDecorators": true,
8
- "allowSyntheticDefaultImports": true,
9
- "moduleResolution": "node",
10
- "target": "es6",
11
- "sourceMap": true,
12
- "outDir": "./dist",
13
- "baseUrl": "./src",
14
- "rootDir": "./",
15
- "incremental": true,
16
- "skipLibCheck": true,
17
- "noImplicitAny": false,
18
- "strictBindCallApply": false,
19
- "forceConsistentCasingInFileNames": false,
20
- "noFallthroughCasesInSwitch": false,
21
- "strictNullChecks": false,
22
- },
23
- "exclude": ["node_modules", "dist"]
1
+ {
2
+ "compilerOptions": {
3
+ "module": "commonjs",
4
+ "declaration": true,
5
+ "removeComments": true,
6
+ "emitDecoratorMetadata": true,
7
+ "experimentalDecorators": true,
8
+ "allowSyntheticDefaultImports": true,
9
+ "moduleResolution": "node",
10
+ "target": "es6",
11
+ "sourceMap": true,
12
+ "outDir": "./dist",
13
+ "baseUrl": "./src",
14
+ "rootDir": "./",
15
+ "incremental": true,
16
+ "skipLibCheck": true,
17
+ "noImplicitAny": false,
18
+ "strictBindCallApply": false,
19
+ "forceConsistentCasingInFileNames": false,
20
+ "noFallthroughCasesInSwitch": false,
21
+ "strictNullChecks": false,
22
+ },
23
+ "exclude": ["node_modules", "dist"]
24
24
  }
@@ -1,71 +0,0 @@
1
- "use strict";
2
- var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {
3
- function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); }
4
- return new (P || (P = Promise))(function (resolve, reject) {
5
- function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }
6
- function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } }
7
- function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); }
8
- step((generator = generator.apply(thisArg, _arguments || [])).next());
9
- });
10
- };
11
- Object.defineProperty(exports, "__esModule", { value: true });
12
- const group_privilege_1 = require("../../../../src/components/group-privilege/group-privilege");
13
- const group_privilege_repository_1 = require("../../../../src/components/group-privilege/group-privilege.repository");
14
- const general_1 = require("@tomei/general");
15
- describe('GroupPrivilege', () => {
16
- afterEach(() => {
17
- jest.restoreAllMocks();
18
- });
19
- it('should initialize with GroupPrivilegeAttr', () => __awaiter(void 0, void 0, void 0, function* () {
20
- const mockGroupPrivilegeAttr = {
21
- GroupPrivilegeId: 1,
22
- GroupCode: 'group1',
23
- PrivilegeCode: 'privilege1',
24
- Status: 'active',
25
- CreatedAt: new Date(),
26
- UpdatedAt: new Date(),
27
- CreatedById: 1,
28
- UpdatedById: 1,
29
- };
30
- const findOneMock = jest
31
- .spyOn(group_privilege_repository_1.GroupPrivilegeRepository.prototype, 'findOne')
32
- .mockResolvedValueOnce({ get: jest.fn().mockReturnValue(mockGroupPrivilegeAttr) });
33
- const groupPrivilege = yield group_privilege_1.GroupPrivilege.init(null, 1);
34
- expect(findOneMock).toBeCalledWith({
35
- where: { GroupPrivilegeId: 1 },
36
- transaction: null,
37
- });
38
- expect(groupPrivilege).toBeInstanceOf(group_privilege_1.GroupPrivilege);
39
- expect(groupPrivilege.GroupPrivilegeId).toEqual(mockGroupPrivilegeAttr.GroupPrivilegeId);
40
- expect(groupPrivilege.GroupCode).toEqual(mockGroupPrivilegeAttr.GroupCode);
41
- expect(groupPrivilege.PrivilegeCode).toEqual(mockGroupPrivilegeAttr.PrivilegeCode);
42
- expect(groupPrivilege.Status).toEqual(mockGroupPrivilegeAttr.Status);
43
- expect(groupPrivilege.CreatedAt).toEqual(mockGroupPrivilegeAttr.CreatedAt);
44
- expect(groupPrivilege.UpdatedAt).toEqual(mockGroupPrivilegeAttr.UpdatedAt);
45
- expect(groupPrivilege.CreatedById).toEqual(mockGroupPrivilegeAttr.CreatedById);
46
- expect(groupPrivilege.UpdatedById).toEqual(mockGroupPrivilegeAttr.UpdatedById);
47
- }));
48
- it('should throw ClassError when GroupPrivilegeAttr is not found', () => __awaiter(void 0, void 0, void 0, function* () {
49
- const findOneMock = jest
50
- .spyOn(group_privilege_repository_1.GroupPrivilegeRepository.prototype, 'findOne')
51
- .mockResolvedValueOnce(null);
52
- yield expect(group_privilege_1.GroupPrivilege.init(null, 1)).rejects.toThrow(general_1.ClassError);
53
- expect(findOneMock).toBeCalledWith({
54
- where: { GroupPrivilegeId: 1 },
55
- transaction: null,
56
- });
57
- }));
58
- it('should initialize with default values', () => __awaiter(void 0, void 0, void 0, function* () {
59
- const groupPrivilege = yield group_privilege_1.GroupPrivilege.init();
60
- expect(groupPrivilege).toBeInstanceOf(group_privilege_1.GroupPrivilege);
61
- expect(groupPrivilege.GroupPrivilegeId).toBeUndefined();
62
- expect(groupPrivilege.GroupCode).toBeUndefined();
63
- expect(groupPrivilege.PrivilegeCode).toBeUndefined();
64
- expect(groupPrivilege.Status).toBeUndefined();
65
- expect(groupPrivilege.CreatedAt).toBeUndefined();
66
- expect(groupPrivilege.UpdatedAt).toBeUndefined();
67
- expect(groupPrivilege.CreatedById).toBeUndefined();
68
- expect(groupPrivilege.UpdatedById).toBeUndefined();
69
- }));
70
- });
71
- //# sourceMappingURL=group-privilege.test.js.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"group-privilege.test.js","sourceRoot":"","sources":["../../../../../__tests__/unit/components/group-privilege/group-privilege.test.ts"],"names":[],"mappings":";;;;;;;;;;;AAAA,gGAA4F;AAC5F,sHAAiH;AACjH,4CAA4C;AAE5C,QAAQ,CAAC,gBAAgB,EAAE,GAAG,EAAE;IAC9B,SAAS,CAAC,GAAG,EAAE;QACb,IAAI,CAAC,eAAe,EAAE,CAAC;IACzB,CAAC,CAAC,CAAC;IAEH,EAAE,CAAC,2CAA2C,EAAE,GAAS,EAAE;QACzD,MAAM,sBAAsB,GAAG;YAC7B,gBAAgB,EAAE,CAAC;YACnB,SAAS,EAAE,QAAQ;YACnB,aAAa,EAAE,YAAY;YAC3B,MAAM,EAAE,QAAQ;YAChB,SAAS,EAAE,IAAI,IAAI,EAAE;YACrB,SAAS,EAAE,IAAI,IAAI,EAAE;YACrB,WAAW,EAAE,CAAC;YACd,WAAW,EAAE,CAAC;SACf,CAAC;QAEF,MAAM,WAAW,GAAG,IAAI;aACrB,KAAK,CAAC,qDAAwB,CAAC,SAAS,EAAE,SAAS,CAAC;aACpD,qBAAqB,CAAC,EAAE,GAAG,EAAE,IAAI,CAAC,EAAE,EAAE,CAAC,eAAe,CAAC,sBAAsB,CAAC,EAAS,CAAC,CAAC;QAE5F,MAAM,cAAc,GAAG,MAAM,gCAAc,CAAC,IAAI,CAAC,IAAI,EAAE,CAAC,CAAC,CAAC;QAE1D,MAAM,CAAC,WAAW,CAAC,CAAC,cAAc,CAAC;YACjC,KAAK,EAAE,EAAE,gBAAgB,EAAE,CAAC,EAAE;YAC9B,WAAW,EAAE,IAAI;SAClB,CAAC,CAAC;QACH,MAAM,CAAC,cAAc,CAAC,CAAC,cAAc,CAAC,gCAAc,CAAC,CAAC;QACtD,MAAM,CAAC,cAAc,CAAC,gBAAgB,CAAC,CAAC,OAAO,CAAC,sBAAsB,CAAC,gBAAgB,CAAC,CAAC;QACzF,MAAM,CAAC,cAAc,CAAC,SAAS,CAAC,CAAC,OAAO,CAAC,sBAAsB,CAAC,SAAS,CAAC,CAAC;QAC3E,MAAM,CAAC,cAAc,CAAC,aAAa,CAAC,CAAC,OAAO,CAAC,sBAAsB,CAAC,aAAa,CAAC,CAAC;QACnF,MAAM,CAAC,cAAc,CAAC,MAAM,CAAC,CAAC,OAAO,CAAC,sBAAsB,CAAC,MAAM,CAAC,CAAC;QACrE,MAAM,CAAC,cAAc,CAAC,SAAS,CAAC,CAAC,OAAO,CAAC,sBAAsB,CAAC,SAAS,CAAC,CAAC;QAC3E,MAAM,CAAC,cAAc,CAAC,SAAS,CAAC,CAAC,OAAO,CAAC,sBAAsB,CAAC,SAAS,CAAC,CAAC;QAC3E,MAAM,CAAC,cAAc,CAAC,WAAW,CAAC,CAAC,OAAO,CAAC,sBAAsB,CAAC,WAAW,CAAC,CAAC;QAC/E,MAAM,CAAC,cAAc,CAAC,WAAW,CAAC,CAAC,OAAO,CAAC,sBAAsB,CAAC,WAAW,CAAC,CAAC;IACjF,CAAC,CAAA,CAAC,CAAC;IAEH,EAAE,CAAC,8DAA8D,EAAE,GAAS,EAAE;QAC5E,MAAM,WAAW,GAAG,IAAI;aACrB,KAAK,CAAC,qDAAwB,CAAC,SAAS,EAAE,SAAS,CAAC;aACpD,qBAAqB,CAAC,IAAI,CAAC,CAAC;QAE/B,MAAM,MAAM,CAAC,gCAAc,CAAC,IAAI,CAAC,IAAI,EAAE,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,OAAO,CAAC,oBAAU,CAAC,CAAC;QAEvE,MAAM,CAAC,WAAW,CAAC,CAAC,cAAc,CAAC;YACjC,KAAK,EAAE,EAAE,gBAAgB,EAAE,CAAC,EAAE;YAC9B,WAAW,EAAE,IAAI;SAClB,CAAC,CAAC;IACL,CAAC,CAAA,CAAC,CAAC;IAEH,EAAE,CAAC,uCAAuC,EAAE,GAAS,EAAE;QACrD,MAAM,cAAc,GAAG,MAAM,gCAAc,CAAC,IAAI,EAAE,CAAC;QAEnD,MAAM,CAAC,cAAc,CAAC,CAAC,cAAc,CAAC,gCAAc,CAAC,CAAC;QACtD,MAAM,CAAC,cAAc,CAAC,gBAAgB,CAAC,CAAC,aAAa,EAAE,CAAC;QACxD,MAAM,CAAC,cAAc,CAAC,SAAS,CAAC,CAAC,aAAa,EAAE,CAAC;QACjD,MAAM,CAAC,cAAc,CAAC,aAAa,CAAC,CAAC,aAAa,EAAE,CAAC;QACrD,MAAM,CAAC,cAAc,CAAC,MAAM,CAAC,CAAC,aAAa,EAAE,CAAC;QAC9C,MAAM,CAAC,cAAc,CAAC,SAAS,CAAC,CAAC,aAAa,EAAE,CAAC;QACjD,MAAM,CAAC,cAAc,CAAC,SAAS,CAAC,CAAC,aAAa,EAAE,CAAC;QACjD,MAAM,CAAC,cAAc,CAAC,WAAW,CAAC,CAAC,aAAa,EAAE,CAAC;QACnD,MAAM,CAAC,cAAc,CAAC,WAAW,CAAC,CAAC,aAAa,EAAE,CAAC;IACrD,CAAC,CAAA,CAAC,CAAC;AACL,CAAC,CAAC,CAAC"}
@@ -1,6 +0,0 @@
1
- describe('LoginUser', () => {
2
- it('should be true', () => {
3
- expect(true).toBe(true);
4
- });
5
- });
6
- //# sourceMappingURL=login-user.spec.js.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"login-user.spec.js","sourceRoot":"","sources":["../../../../../__tests__/unit/components/login-user/login-user.spec.ts"],"names":[],"mappings":"AAuuBA,QAAQ,CAAC,WAAW,EAAE,GAAG,EAAE;IACvB,EAAE,CAAC,gBAAgB,EAAE,GAAG,EAAE;QACxB,MAAM,CAAC,IAAI,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;IAC1B,CAAC,CAAC,CAAC;AACL,CAAC,CAAC,CAAC"}