@tomei/sso 0.54.1 → 0.55.0
Sign up to get free protection for your applications and to get access to all the features.
- package/.commitlintrc.json +22 -22
- package/.gitlab-ci.yml +16 -16
- package/.husky/commit-msg +15 -15
- package/.husky/pre-commit +7 -7
- package/.prettierrc +4 -4
- package/Jenkinsfile +57 -57
- package/README.md +23 -23
- package/__tests__/unit/components/group/group.spec.ts +79 -79
- package/__tests__/unit/components/group-object-privilege/group-object-privilege.spec.ts +88 -88
- package/__tests__/unit/components/group-privilege/group-privilege.spec.ts +68 -68
- package/__tests__/unit/components/group-reporting-user/group-reporting-user.spec.ts +66 -66
- package/__tests__/unit/components/group-system-access/group-system-access.spec.ts +83 -83
- package/__tests__/unit/components/login-user/l.spec.ts +746 -746
- package/__tests__/unit/components/login-user/login.spec.ts +1164 -1164
- package/__tests__/unit/components/password-hash/password-hash.service.spec.ts +31 -31
- package/__tests__/unit/components/system/system.spec.ts +254 -254
- package/__tests__/unit/components/system-privilege/system-privilege.spec.ts +83 -83
- package/__tests__/unit/components/user-group/user-group.spec.ts +86 -86
- package/__tests__/unit/components/user-object-privilege/user-object-privilege.spec.ts +78 -78
- package/__tests__/unit/components/user-privilege/user-privilege.spec.ts +72 -72
- package/__tests__/unit/components/user-system-access/user-system-access.spec.ts +89 -89
- package/__tests__/unit/redis-client/redis.service.spec.ts +23 -23
- package/__tests__/unit/session/session.service.spec.ts +47 -47
- package/__tests__/unit/system-privilege/system-privilage.spec.ts +91 -91
- package/coverage/clover.xml +1452 -1452
- package/coverage/coverage-final.json +47 -47
- package/coverage/lcov-report/base.css +224 -224
- package/coverage/lcov-report/block-navigation.js +87 -87
- package/coverage/lcov-report/components/group/group.repository.ts.html +117 -117
- package/coverage/lcov-report/components/group/group.ts.html +327 -327
- package/coverage/lcov-report/components/group/index.html +130 -130
- package/coverage/lcov-report/components/group-object-privilege/group-object-privilege.repository.ts.html +117 -117
- package/coverage/lcov-report/components/group-object-privilege/group-object-privilege.ts.html +321 -321
- package/coverage/lcov-report/components/group-object-privilege/index.html +130 -130
- package/coverage/lcov-report/components/group-privilege/group-privilege.repository.ts.html +117 -117
- package/coverage/lcov-report/components/group-privilege/group-privilege.ts.html +303 -303
- package/coverage/lcov-report/components/group-privilege/index.html +130 -130
- package/coverage/lcov-report/components/group-reporting-user/group-reporting-user.repository.ts.html +117 -117
- package/coverage/lcov-report/components/group-reporting-user/group-reporting-user.ts.html +327 -327
- package/coverage/lcov-report/components/group-reporting-user/index.html +130 -130
- package/coverage/lcov-report/components/group-system-access/group-system-access.repository.ts.html +117 -117
- package/coverage/lcov-report/components/group-system-access/group-system-access.ts.html +309 -309
- package/coverage/lcov-report/components/group-system-access/index.html +130 -130
- package/coverage/lcov-report/components/login-history/index.html +115 -115
- package/coverage/lcov-report/components/login-history/login-history.repository.ts.html +117 -117
- package/coverage/lcov-report/components/login-user/index.html +130 -130
- package/coverage/lcov-report/components/login-user/login-user.ts.html +5007 -5007
- package/coverage/lcov-report/components/login-user/user.repository.ts.html +117 -117
- package/coverage/lcov-report/components/password-hash/index.html +115 -115
- package/coverage/lcov-report/components/password-hash/password-hash.service.ts.html +126 -126
- package/coverage/lcov-report/components/system/index.html +130 -130
- package/coverage/lcov-report/components/system/system.repository.ts.html +117 -117
- package/coverage/lcov-report/components/system/system.ts.html +909 -909
- package/coverage/lcov-report/components/system-privilege/index.html +130 -130
- package/coverage/lcov-report/components/system-privilege/system-privilege.repository.ts.html +120 -120
- package/coverage/lcov-report/components/system-privilege/system-privilege.ts.html +390 -390
- package/coverage/lcov-report/components/user-group/index.html +130 -130
- package/coverage/lcov-report/components/user-group/user-group.repository.ts.html +117 -117
- package/coverage/lcov-report/components/user-group/user-group.ts.html +354 -354
- package/coverage/lcov-report/components/user-object-privilege/index.html +130 -130
- package/coverage/lcov-report/components/user-object-privilege/user-object-privilege.repository.ts.html +117 -117
- package/coverage/lcov-report/components/user-object-privilege/user-object-privilege.ts.html +312 -312
- package/coverage/lcov-report/components/user-privilege/index.html +130 -130
- package/coverage/lcov-report/components/user-privilege/user-privilege.repository.ts.html +117 -117
- package/coverage/lcov-report/components/user-privilege/user-privilege.ts.html +306 -306
- package/coverage/lcov-report/components/user-system-access/index.html +130 -130
- package/coverage/lcov-report/components/user-system-access/user-system-access.repository.ts.html +117 -117
- package/coverage/lcov-report/components/user-system-access/user-system-access.ts.html +312 -312
- package/coverage/lcov-report/enum/group-type.enum.ts.html +108 -108
- package/coverage/lcov-report/enum/index.html +160 -160
- package/coverage/lcov-report/enum/index.ts.html +93 -93
- package/coverage/lcov-report/enum/user-status.enum.ts.html +105 -105
- package/coverage/lcov-report/enum/yn.enum.ts.html +96 -96
- package/coverage/lcov-report/index.html +370 -370
- package/coverage/lcov-report/models/group-object-privilege.entity.ts.html +333 -333
- package/coverage/lcov-report/models/group-privilege.entity.ts.html +315 -315
- package/coverage/lcov-report/models/group-reporting-user.entity.ts.html +339 -339
- package/coverage/lcov-report/models/group-system-access.entity.ts.html +324 -324
- package/coverage/lcov-report/models/group.entity.ts.html +435 -435
- package/coverage/lcov-report/models/index.html +310 -310
- package/coverage/lcov-report/models/login-history.entity.ts.html +252 -252
- package/coverage/lcov-report/models/staff.entity.ts.html +411 -411
- package/coverage/lcov-report/models/system-privilege.entity.ts.html +354 -354
- package/coverage/lcov-report/models/system.entity.ts.html +423 -423
- package/coverage/lcov-report/models/user-group.entity.ts.html +354 -354
- package/coverage/lcov-report/models/user-object-privilege.entity.ts.html +330 -330
- package/coverage/lcov-report/models/user-privilege.entity.ts.html +315 -315
- package/coverage/lcov-report/models/user-system-access.entity.ts.html +315 -315
- package/coverage/lcov-report/models/user.entity.ts.html +522 -522
- package/coverage/lcov-report/prettify.css +1 -1
- package/coverage/lcov-report/prettify.js +2 -2
- package/coverage/lcov-report/redis-client/index.html +115 -115
- package/coverage/lcov-report/redis-client/redis.service.ts.html +240 -240
- package/coverage/lcov-report/session/index.html +115 -115
- package/coverage/lcov-report/session/session.service.ts.html +246 -246
- package/coverage/lcov-report/sorter.js +196 -196
- package/coverage/lcov.info +2490 -2490
- package/coverage/test-report.xml +128 -128
- package/create-sso-user.sql +39 -39
- package/dist/__tests__/unit/components/group-privilege/group-privilege.test.d.ts +1 -0
- package/dist/__tests__/unit/components/group-privilege/group-privilege.test.js +71 -0
- package/dist/__tests__/unit/components/group-privilege/group-privilege.test.js.map +1 -0
- package/dist/__tests__/unit/components/login-user/login-user.spec.d.ts +0 -0
- package/dist/__tests__/unit/components/login-user/login-user.spec.js +6 -0
- package/dist/__tests__/unit/components/login-user/login-user.spec.js.map +1 -0
- package/dist/src/components/login-user/interfaces/user-info.interface.d.ts +2 -0
- package/dist/src/components/login-user/login-user.js +2 -0
- package/dist/src/components/login-user/login-user.js.map +1 -1
- package/dist/src/components/login-user/user.d.ts +7 -0
- package/dist/src/components/login-user/user.js +116 -1
- package/dist/src/components/login-user/user.js.map +1 -1
- package/dist/src/models/user.entity.d.ts +2 -0
- package/dist/src/models/user.entity.js +13 -0
- package/dist/src/models/user.entity.js.map +1 -1
- package/dist/tsconfig.tsbuildinfo +1 -1
- package/eslint.config.mjs +58 -58
- package/jest.config.js +14 -14
- package/migrations/20240314080602-create-user-table.js +124 -124
- package/migrations/20240314080603-create-user-group-table.js +85 -85
- package/migrations/20240314080604-create-user-user-group-table.js +55 -55
- package/migrations/20240314080605-create-login-history-table.js +53 -53
- package/migrations/20240527064925-create-system-table.js +78 -78
- package/migrations/20240527064926-create-system-privilege-table.js +71 -71
- package/migrations/20240527065342-create-group-table.js +93 -93
- package/migrations/20240527065633-create-group-reporting-user-table.js +76 -76
- package/migrations/20240528011551-create-group-system-access-table.js +72 -72
- package/migrations/20240528023018-user-system-access-table.js +75 -75
- package/migrations/20240528032229-user-privilege-table.js +76 -76
- package/migrations/20240528063003-create-group-privilege-table.js +76 -76
- package/migrations/20240528063051-create-group-object-privilege-table.js +84 -84
- package/migrations/20240528063107-create-user-object-privilege-table.js +84 -84
- package/migrations/20240528063108-create-api-key-table.js +85 -85
- package/migrations/20241104104802-create-building-table.js +95 -95
- package/migrations/20250108091132-add-area-manager-user-id-to-building-table.js +14 -14
- package/migrations/20250108091133-add-passcode-to-user-table.js +36 -0
- package/package.json +90 -90
- package/sampledotenv +7 -7
- package/sonar-project.properties +22 -22
- package/src/components/login-user/interfaces/user-info.interface.ts +2 -0
- package/src/components/login-user/login-user.ts +2 -0
- package/src/components/login-user/user.ts +147 -1
- package/src/models/user.entity.ts +11 -0
- package/tsconfig.build.json +5 -5
- package/tsconfig.json +23 -23
package/coverage/test-report.xml
CHANGED
@@ -1,129 +1,129 @@
|
|
1
|
-
<?xml version="1.0" encoding="UTF-8"?>
|
2
|
-
<testExecutions version="1">
|
3
|
-
<file path="C:\Work\sso\__tests__\unit\components\login-user\login.spec.ts">
|
4
|
-
<testCase name="LoginUser init should initialize LoginUser with valid userId" duration="5"/>
|
5
|
-
<testCase name="LoginUser init should throw an error when user is not found" duration="20"/>
|
6
|
-
<testCase name="LoginUser checkSession should throw an error if session expired" duration="20"/>
|
7
|
-
<testCase name="LoginUser checkSession should refresh the session duration if session is valid" duration="2"/>
|
8
|
-
<testCase name="LoginUser shouldReleaseLock should return true if autoReleaseYN is "Y" and time difference is greater than minuteToAutoRelease" duration="2"/>
|
9
|
-
<testCase name="LoginUser shouldReleaseLock should return false if autoReleaseYN is "Y" and time difference is less than or equal to minuteToAutoRelease" duration="1"/>
|
10
|
-
<testCase name="LoginUser shouldReleaseLock should return false if autoReleaseYN is "N"" duration="1"/>
|
11
|
-
<testCase name="LoginUser releaseLock should release the lock for a user" duration="1"/>
|
12
|
-
<testCase name="LoginUser checkUserInfoDuplicated should throw an error if duplicate user info is found" duration="1"/>
|
13
|
-
<testCase name="LoginUser checkUserInfoDuplicated should not throw an error if duplicate user info is not found" duration="0"/>
|
14
|
-
<testCase name="LoginUser generateDefaultPassword should generate a default password with the specified length" duration="2"/>
|
15
|
-
<testCase name="LoginUser generateDefaultPassword should generate a default password with at least one capital letter" duration="1"/>
|
16
|
-
<testCase name="LoginUser generateDefaultPassword should generate a default password with at least one number" duration="1"/>
|
17
|
-
<testCase name="LoginUser generateDefaultPassword should generate a default password with at least one special character" duration="1"/>
|
18
|
-
<testCase name="LoginUser generateDefaultPassword should generate a default password without any non-acceptable characters" duration="1"/>
|
19
|
-
<testCase name="LoginUser setPassword should set the password for the user" duration="159"/>
|
20
|
-
<testCase name="LoginUser setPassword should throw an error if the password does not meet the security requirements" duration="13"/>
|
21
|
-
<testCase name="LoginUser create should create a new user record" duration="5"/>
|
22
|
-
<testCase name="LoginUser create should throw an error if user dont have the privilege to create new user" duration="2"/>
|
23
|
-
<testCase name="LoginUser create should throw an error if user email is missing" duration="2"/>
|
24
|
-
<testCase name="LoginUser incrementFailedLoginAttemptCount should increment FailedLoginAttemptCount and update user status" duration="1"/>
|
25
|
-
<testCase name="LoginUser incrementFailedLoginAttemptCount should throw an error if maxFailedLoginAttempts or autoReleaseYN is missing" duration="1"/>
|
26
|
-
<testCase name="LoginUser incrementFailedLoginAttemptCount should lock the user account if the failed login attempts exceed the maximum allowed" duration="1"/>
|
27
|
-
<testCase name="LoginUser incrementFailedLoginAttemptCount should permanently lock the user account if the failed login attempts exceed the maximum allowed and autoReleaseYN is N" duration="1"/>
|
28
|
-
<testCase name="LoginUser combineSystemAccess should combine user and group system access and remove duplicates" duration="1"/>
|
29
|
-
<testCase name="LoginUser checkPrivileges should return true if user has the specified privilege" duration="1"/>
|
30
|
-
<testCase name="LoginUser checkPrivileges should return false if user does not have the specified privilege" duration="1"/>
|
31
|
-
<testCase name="LoginUser checkPrivileges should throw an error if ObjectId is not set" duration="1"/>
|
32
|
-
<testCase name="LoginUser getObjectPrivileges should return an array of privileges" duration="1"/>
|
33
|
-
<testCase name="LoginUser getObjectPrivileges should throw an error if an exception occurs" duration="1"/>
|
34
|
-
<testCase name="LoginUser getUserPersonalPrivileges should return an array of privileges" duration="2"/>
|
35
|
-
<testCase name="LoginUser getUserPersonalPrivileges should throw an error if an error occurs" duration="1"/>
|
36
|
-
<testCase name="LoginUser getInheritedSystemAccess should return group system access with its parent group system access if applicable" duration="3"/>
|
37
|
-
</file>
|
38
|
-
<file path="C:\Work\sso\__tests__\unit\components\system\system.spec.ts">
|
39
|
-
<testCase name="System init should initialize a system when SystemCode is provided" duration="3"/>
|
40
|
-
<testCase name="System init should throw an error when SystemCode is not found" duration="8"/>
|
41
|
-
<testCase name="System init should initialize a new system when SystemCode is not provided" duration="1"/>
|
42
|
-
<testCase name="System createSystem should create a new system" duration="4"/>
|
43
|
-
<testCase name="System createSystem should throw an error when user does not have permission" duration="1"/>
|
44
|
-
<testCase name="System createSystem should throw an error when SystemCode is missing" duration="1"/>
|
45
|
-
<testCase name="System createSystem should throw an error when Name is missing" duration="1"/>
|
46
|
-
<testCase name="System createSystem should throw an error when Description is missing" duration="1"/>
|
47
|
-
<testCase name="System createSystem should throw an error when failed to create system" duration="5"/>
|
48
|
-
<testCase name="System setSystemCode should set the SystemCode when there is no duplicate" duration="1"/>
|
49
|
-
<testCase name="System setSystemCode should throw an error when SystemCode already exists" duration="1"/>
|
50
|
-
<testCase name="System setSystemCode should throw an error when failed to check duplicate SystemCode" duration="1"/>
|
51
|
-
<testCase name="System findAll should find all systems based on filter" duration="2"/>
|
52
|
-
<testCase name="System findAll should find all systems without pagination when page and rows are not provided" duration="1"/>
|
53
|
-
</file>
|
54
|
-
<file path="C:\Work\sso\__tests__\unit\components\group-object-privilege\group-object-privilege.spec.ts">
|
55
|
-
<testCase name="GroupObjectPrivilege should create an instance of GroupObjectPrivilege" duration="2"/>
|
56
|
-
<testCase name="GroupObjectPrivilege should have the correct TableName" duration="0"/>
|
57
|
-
<testCase name="GroupObjectPrivilege should have the correct properties" duration="1"/>
|
58
|
-
<testCase name="GroupObjectPrivilege init should return an instance of GroupObjectPrivilege when GroupObjectPrivilegeId is provided" duration="2"/>
|
59
|
-
<testCase name="GroupObjectPrivilege init should throw an error when GroupObjectPrivilegeId is provided but no GroupObjectPrivilege is found" duration="3"/>
|
60
|
-
<testCase name="GroupObjectPrivilege init should return a new instance of GroupObjectPrivilege when GroupObjectPrivilegeId is not provided" duration="3"/>
|
61
|
-
</file>
|
62
|
-
<file path="C:\Work\sso\__tests__\unit\components\group-system-access\group-system-access.spec.ts">
|
63
|
-
<testCase name="GroupSystemAccess should create a new GroupSystemAccess instance" duration="2"/>
|
64
|
-
<testCase name="GroupSystemAccess init should initialize GroupSystemAccess without GroupSystemAccessId" duration="2"/>
|
65
|
-
<testCase name="GroupSystemAccess init should initialize GroupSystemAccess with GroupSystemAccessId" duration="3"/>
|
66
|
-
<testCase name="GroupSystemAccess init should throw an error if GroupSystemAccessId is not found" duration="5"/>
|
67
|
-
</file>
|
68
|
-
<file path="C:\Work\sso\__tests__\unit\components\group\group.spec.ts">
|
69
|
-
<testCase name="Group should initialize a group with valid GroupCode" duration="4"/>
|
70
|
-
<testCase name="Group should throw an error when initializing a group with invalid GroupCode" duration="5"/>
|
71
|
-
<testCase name="Group should throw an error when initializing a group with an error" duration="2"/>
|
72
|
-
</file>
|
73
|
-
<file path="C:\Work\sso\__tests__\unit\components\group-reporting-user\group-reporting-user.spec.ts">
|
74
|
-
<testCase name="GroupReportingUser init should initialize GroupReportingUser without GroupReportingUserId" duration="3"/>
|
75
|
-
<testCase name="GroupReportingUser init should initialize GroupReportingUser with valid GroupReportingUserId" duration="2"/>
|
76
|
-
<testCase name="GroupReportingUser init should throw ClassError when GroupReportingUser is not found" duration="8"/>
|
77
|
-
<testCase name="GroupReportingUser init should throw ClassError when failed to initialize GroupReportingUser" duration="1"/>
|
78
|
-
</file>
|
79
|
-
<file path="C:\Work\sso\__tests__\unit\components\system-privilege\system-privilege.spec.ts">
|
80
|
-
<testCase name="SystemPrivilege constructor should create a new SystemPrivilege instance" duration="2"/>
|
81
|
-
<testCase name="SystemPrivilege init should initialize SystemPrivilege without PrivilegeCode" duration="1"/>
|
82
|
-
<testCase name="SystemPrivilege init should initialize SystemPrivilege with PrivilegeCode" duration="2"/>
|
83
|
-
<testCase name="SystemPrivilege init should throw an error if PrivilegeCode is not found" duration="4"/>
|
84
|
-
</file>
|
85
|
-
<file path="C:\Work\sso\__tests__\unit\components\user-group\user-group.spec.ts">
|
86
|
-
<testCase name="UserGroup constructor should create a new UserGroup instance" duration="3"/>
|
87
|
-
<testCase name="UserGroup init should initialize UserGroup with valid UserGroupId" duration="2"/>
|
88
|
-
<testCase name="UserGroup init should throw ClassError when UserGroupId is not found" duration="5"/>
|
89
|
-
</file>
|
90
|
-
<file path="C:\Work\sso\__tests__\unit\components\user-object-privilege\user-object-privilege.spec.ts">
|
91
|
-
<testCase name="UserObjectPrivilege constructor should create a new UserObjectPrivilege instance" duration="2"/>
|
92
|
-
<testCase name="UserObjectPrivilege init should initialize UserObjectPrivilege with valid ObjectPrivilegeId" duration="5"/>
|
93
|
-
<testCase name="UserObjectPrivilege init should throw ClassError when ObjectPrivilegeId is not found" duration="4"/>
|
94
|
-
</file>
|
95
|
-
<file path="C:\Work\sso\__tests__\unit\components\group-privilege\group-privilege.spec.ts">
|
96
|
-
<testCase name="GroupPrivilege should initialize with GroupPrivilegeAttr" duration="6"/>
|
97
|
-
<testCase name="GroupPrivilege should throw ClassError when GroupPrivilegeAttr is not found" duration="4"/>
|
98
|
-
<testCase name="GroupPrivilege should initialize with default values" duration="1"/>
|
99
|
-
</file>
|
100
|
-
<file path="C:\Work\sso\__tests__\unit\components\user-system-access\user-system-access.spec.ts">
|
101
|
-
<testCase name="UserSystemAccess constructor should create a new UserSystemAccess instance" duration="2"/>
|
102
|
-
<testCase name="UserSystemAccess init should initialize UserSystemAccess with valid UserSystemAccessId" duration="2"/>
|
103
|
-
<testCase name="UserSystemAccess init should throw ClassError when UserSystemAccessId is not found" duration="1"/>
|
104
|
-
</file>
|
105
|
-
<file path="C:\Work\sso\__tests__\unit\components\user-privilege\user-privilege.spec.ts">
|
106
|
-
<testCase name="UserPrivilege constructor should create a new UserPrivilege instance" duration="2"/>
|
107
|
-
<testCase name="UserPrivilege init should initialize UserPrivilege with valid UserPrivilegeId" duration="2"/>
|
108
|
-
<testCase name="UserPrivilege init should throw ClassError when UserPrivilegeId is not found" duration="4"/>
|
109
|
-
</file>
|
110
|
-
<file path="C:\Work\sso\__tests__\unit\session\session.service.spec.ts">
|
111
|
-
<testCase name="session.service should return session service when instansiated" duration="2"/>
|
112
|
-
<testCase name="session.service should able to write session data" duration="3"/>
|
113
|
-
<testCase name="session.service should able to refresh session data" duration="3"/>
|
114
|
-
</file>
|
115
|
-
<file path="C:\Work\sso\__tests__\unit\system-privilege\system-privilage.spec.ts">
|
116
|
-
<testCase name="SystemPrivilege should be true" duration="2"/>
|
117
|
-
</file>
|
118
|
-
<file path="C:\Work\sso\__tests__\unit\components\password-hash\password-hash.service.spec.ts">
|
119
|
-
<testCase name="password-hash.service should return hash password" duration="2"/>
|
120
|
-
<testCase name="password-hash.service should return true when verify password" duration="1"/>
|
121
|
-
</file>
|
122
|
-
<file path="C:\Work\sso\__tests__\unit\redis-client\redis.service.spec.ts">
|
123
|
-
<testCase name="redis.service should return redis service when instansiated" duration="1"/>
|
124
|
-
<testCase name="redis.service should able to write and read redis" duration="2"/>
|
125
|
-
</file>
|
126
|
-
<file path="C:\Work\sso\__tests__\unit\components\login-user\l.spec.ts">
|
127
|
-
<testCase name="SystemPrivilege should be true" duration="1"/>
|
128
|
-
</file>
|
1
|
+
<?xml version="1.0" encoding="UTF-8"?>
|
2
|
+
<testExecutions version="1">
|
3
|
+
<file path="C:\Work\sso\__tests__\unit\components\login-user\login.spec.ts">
|
4
|
+
<testCase name="LoginUser init should initialize LoginUser with valid userId" duration="5"/>
|
5
|
+
<testCase name="LoginUser init should throw an error when user is not found" duration="20"/>
|
6
|
+
<testCase name="LoginUser checkSession should throw an error if session expired" duration="20"/>
|
7
|
+
<testCase name="LoginUser checkSession should refresh the session duration if session is valid" duration="2"/>
|
8
|
+
<testCase name="LoginUser shouldReleaseLock should return true if autoReleaseYN is "Y" and time difference is greater than minuteToAutoRelease" duration="2"/>
|
9
|
+
<testCase name="LoginUser shouldReleaseLock should return false if autoReleaseYN is "Y" and time difference is less than or equal to minuteToAutoRelease" duration="1"/>
|
10
|
+
<testCase name="LoginUser shouldReleaseLock should return false if autoReleaseYN is "N"" duration="1"/>
|
11
|
+
<testCase name="LoginUser releaseLock should release the lock for a user" duration="1"/>
|
12
|
+
<testCase name="LoginUser checkUserInfoDuplicated should throw an error if duplicate user info is found" duration="1"/>
|
13
|
+
<testCase name="LoginUser checkUserInfoDuplicated should not throw an error if duplicate user info is not found" duration="0"/>
|
14
|
+
<testCase name="LoginUser generateDefaultPassword should generate a default password with the specified length" duration="2"/>
|
15
|
+
<testCase name="LoginUser generateDefaultPassword should generate a default password with at least one capital letter" duration="1"/>
|
16
|
+
<testCase name="LoginUser generateDefaultPassword should generate a default password with at least one number" duration="1"/>
|
17
|
+
<testCase name="LoginUser generateDefaultPassword should generate a default password with at least one special character" duration="1"/>
|
18
|
+
<testCase name="LoginUser generateDefaultPassword should generate a default password without any non-acceptable characters" duration="1"/>
|
19
|
+
<testCase name="LoginUser setPassword should set the password for the user" duration="159"/>
|
20
|
+
<testCase name="LoginUser setPassword should throw an error if the password does not meet the security requirements" duration="13"/>
|
21
|
+
<testCase name="LoginUser create should create a new user record" duration="5"/>
|
22
|
+
<testCase name="LoginUser create should throw an error if user dont have the privilege to create new user" duration="2"/>
|
23
|
+
<testCase name="LoginUser create should throw an error if user email is missing" duration="2"/>
|
24
|
+
<testCase name="LoginUser incrementFailedLoginAttemptCount should increment FailedLoginAttemptCount and update user status" duration="1"/>
|
25
|
+
<testCase name="LoginUser incrementFailedLoginAttemptCount should throw an error if maxFailedLoginAttempts or autoReleaseYN is missing" duration="1"/>
|
26
|
+
<testCase name="LoginUser incrementFailedLoginAttemptCount should lock the user account if the failed login attempts exceed the maximum allowed" duration="1"/>
|
27
|
+
<testCase name="LoginUser incrementFailedLoginAttemptCount should permanently lock the user account if the failed login attempts exceed the maximum allowed and autoReleaseYN is N" duration="1"/>
|
28
|
+
<testCase name="LoginUser combineSystemAccess should combine user and group system access and remove duplicates" duration="1"/>
|
29
|
+
<testCase name="LoginUser checkPrivileges should return true if user has the specified privilege" duration="1"/>
|
30
|
+
<testCase name="LoginUser checkPrivileges should return false if user does not have the specified privilege" duration="1"/>
|
31
|
+
<testCase name="LoginUser checkPrivileges should throw an error if ObjectId is not set" duration="1"/>
|
32
|
+
<testCase name="LoginUser getObjectPrivileges should return an array of privileges" duration="1"/>
|
33
|
+
<testCase name="LoginUser getObjectPrivileges should throw an error if an exception occurs" duration="1"/>
|
34
|
+
<testCase name="LoginUser getUserPersonalPrivileges should return an array of privileges" duration="2"/>
|
35
|
+
<testCase name="LoginUser getUserPersonalPrivileges should throw an error if an error occurs" duration="1"/>
|
36
|
+
<testCase name="LoginUser getInheritedSystemAccess should return group system access with its parent group system access if applicable" duration="3"/>
|
37
|
+
</file>
|
38
|
+
<file path="C:\Work\sso\__tests__\unit\components\system\system.spec.ts">
|
39
|
+
<testCase name="System init should initialize a system when SystemCode is provided" duration="3"/>
|
40
|
+
<testCase name="System init should throw an error when SystemCode is not found" duration="8"/>
|
41
|
+
<testCase name="System init should initialize a new system when SystemCode is not provided" duration="1"/>
|
42
|
+
<testCase name="System createSystem should create a new system" duration="4"/>
|
43
|
+
<testCase name="System createSystem should throw an error when user does not have permission" duration="1"/>
|
44
|
+
<testCase name="System createSystem should throw an error when SystemCode is missing" duration="1"/>
|
45
|
+
<testCase name="System createSystem should throw an error when Name is missing" duration="1"/>
|
46
|
+
<testCase name="System createSystem should throw an error when Description is missing" duration="1"/>
|
47
|
+
<testCase name="System createSystem should throw an error when failed to create system" duration="5"/>
|
48
|
+
<testCase name="System setSystemCode should set the SystemCode when there is no duplicate" duration="1"/>
|
49
|
+
<testCase name="System setSystemCode should throw an error when SystemCode already exists" duration="1"/>
|
50
|
+
<testCase name="System setSystemCode should throw an error when failed to check duplicate SystemCode" duration="1"/>
|
51
|
+
<testCase name="System findAll should find all systems based on filter" duration="2"/>
|
52
|
+
<testCase name="System findAll should find all systems without pagination when page and rows are not provided" duration="1"/>
|
53
|
+
</file>
|
54
|
+
<file path="C:\Work\sso\__tests__\unit\components\group-object-privilege\group-object-privilege.spec.ts">
|
55
|
+
<testCase name="GroupObjectPrivilege should create an instance of GroupObjectPrivilege" duration="2"/>
|
56
|
+
<testCase name="GroupObjectPrivilege should have the correct TableName" duration="0"/>
|
57
|
+
<testCase name="GroupObjectPrivilege should have the correct properties" duration="1"/>
|
58
|
+
<testCase name="GroupObjectPrivilege init should return an instance of GroupObjectPrivilege when GroupObjectPrivilegeId is provided" duration="2"/>
|
59
|
+
<testCase name="GroupObjectPrivilege init should throw an error when GroupObjectPrivilegeId is provided but no GroupObjectPrivilege is found" duration="3"/>
|
60
|
+
<testCase name="GroupObjectPrivilege init should return a new instance of GroupObjectPrivilege when GroupObjectPrivilegeId is not provided" duration="3"/>
|
61
|
+
</file>
|
62
|
+
<file path="C:\Work\sso\__tests__\unit\components\group-system-access\group-system-access.spec.ts">
|
63
|
+
<testCase name="GroupSystemAccess should create a new GroupSystemAccess instance" duration="2"/>
|
64
|
+
<testCase name="GroupSystemAccess init should initialize GroupSystemAccess without GroupSystemAccessId" duration="2"/>
|
65
|
+
<testCase name="GroupSystemAccess init should initialize GroupSystemAccess with GroupSystemAccessId" duration="3"/>
|
66
|
+
<testCase name="GroupSystemAccess init should throw an error if GroupSystemAccessId is not found" duration="5"/>
|
67
|
+
</file>
|
68
|
+
<file path="C:\Work\sso\__tests__\unit\components\group\group.spec.ts">
|
69
|
+
<testCase name="Group should initialize a group with valid GroupCode" duration="4"/>
|
70
|
+
<testCase name="Group should throw an error when initializing a group with invalid GroupCode" duration="5"/>
|
71
|
+
<testCase name="Group should throw an error when initializing a group with an error" duration="2"/>
|
72
|
+
</file>
|
73
|
+
<file path="C:\Work\sso\__tests__\unit\components\group-reporting-user\group-reporting-user.spec.ts">
|
74
|
+
<testCase name="GroupReportingUser init should initialize GroupReportingUser without GroupReportingUserId" duration="3"/>
|
75
|
+
<testCase name="GroupReportingUser init should initialize GroupReportingUser with valid GroupReportingUserId" duration="2"/>
|
76
|
+
<testCase name="GroupReportingUser init should throw ClassError when GroupReportingUser is not found" duration="8"/>
|
77
|
+
<testCase name="GroupReportingUser init should throw ClassError when failed to initialize GroupReportingUser" duration="1"/>
|
78
|
+
</file>
|
79
|
+
<file path="C:\Work\sso\__tests__\unit\components\system-privilege\system-privilege.spec.ts">
|
80
|
+
<testCase name="SystemPrivilege constructor should create a new SystemPrivilege instance" duration="2"/>
|
81
|
+
<testCase name="SystemPrivilege init should initialize SystemPrivilege without PrivilegeCode" duration="1"/>
|
82
|
+
<testCase name="SystemPrivilege init should initialize SystemPrivilege with PrivilegeCode" duration="2"/>
|
83
|
+
<testCase name="SystemPrivilege init should throw an error if PrivilegeCode is not found" duration="4"/>
|
84
|
+
</file>
|
85
|
+
<file path="C:\Work\sso\__tests__\unit\components\user-group\user-group.spec.ts">
|
86
|
+
<testCase name="UserGroup constructor should create a new UserGroup instance" duration="3"/>
|
87
|
+
<testCase name="UserGroup init should initialize UserGroup with valid UserGroupId" duration="2"/>
|
88
|
+
<testCase name="UserGroup init should throw ClassError when UserGroupId is not found" duration="5"/>
|
89
|
+
</file>
|
90
|
+
<file path="C:\Work\sso\__tests__\unit\components\user-object-privilege\user-object-privilege.spec.ts">
|
91
|
+
<testCase name="UserObjectPrivilege constructor should create a new UserObjectPrivilege instance" duration="2"/>
|
92
|
+
<testCase name="UserObjectPrivilege init should initialize UserObjectPrivilege with valid ObjectPrivilegeId" duration="5"/>
|
93
|
+
<testCase name="UserObjectPrivilege init should throw ClassError when ObjectPrivilegeId is not found" duration="4"/>
|
94
|
+
</file>
|
95
|
+
<file path="C:\Work\sso\__tests__\unit\components\group-privilege\group-privilege.spec.ts">
|
96
|
+
<testCase name="GroupPrivilege should initialize with GroupPrivilegeAttr" duration="6"/>
|
97
|
+
<testCase name="GroupPrivilege should throw ClassError when GroupPrivilegeAttr is not found" duration="4"/>
|
98
|
+
<testCase name="GroupPrivilege should initialize with default values" duration="1"/>
|
99
|
+
</file>
|
100
|
+
<file path="C:\Work\sso\__tests__\unit\components\user-system-access\user-system-access.spec.ts">
|
101
|
+
<testCase name="UserSystemAccess constructor should create a new UserSystemAccess instance" duration="2"/>
|
102
|
+
<testCase name="UserSystemAccess init should initialize UserSystemAccess with valid UserSystemAccessId" duration="2"/>
|
103
|
+
<testCase name="UserSystemAccess init should throw ClassError when UserSystemAccessId is not found" duration="1"/>
|
104
|
+
</file>
|
105
|
+
<file path="C:\Work\sso\__tests__\unit\components\user-privilege\user-privilege.spec.ts">
|
106
|
+
<testCase name="UserPrivilege constructor should create a new UserPrivilege instance" duration="2"/>
|
107
|
+
<testCase name="UserPrivilege init should initialize UserPrivilege with valid UserPrivilegeId" duration="2"/>
|
108
|
+
<testCase name="UserPrivilege init should throw ClassError when UserPrivilegeId is not found" duration="4"/>
|
109
|
+
</file>
|
110
|
+
<file path="C:\Work\sso\__tests__\unit\session\session.service.spec.ts">
|
111
|
+
<testCase name="session.service should return session service when instansiated" duration="2"/>
|
112
|
+
<testCase name="session.service should able to write session data" duration="3"/>
|
113
|
+
<testCase name="session.service should able to refresh session data" duration="3"/>
|
114
|
+
</file>
|
115
|
+
<file path="C:\Work\sso\__tests__\unit\system-privilege\system-privilage.spec.ts">
|
116
|
+
<testCase name="SystemPrivilege should be true" duration="2"/>
|
117
|
+
</file>
|
118
|
+
<file path="C:\Work\sso\__tests__\unit\components\password-hash\password-hash.service.spec.ts">
|
119
|
+
<testCase name="password-hash.service should return hash password" duration="2"/>
|
120
|
+
<testCase name="password-hash.service should return true when verify password" duration="1"/>
|
121
|
+
</file>
|
122
|
+
<file path="C:\Work\sso\__tests__\unit\redis-client\redis.service.spec.ts">
|
123
|
+
<testCase name="redis.service should return redis service when instansiated" duration="1"/>
|
124
|
+
<testCase name="redis.service should able to write and read redis" duration="2"/>
|
125
|
+
</file>
|
126
|
+
<file path="C:\Work\sso\__tests__\unit\components\login-user\l.spec.ts">
|
127
|
+
<testCase name="SystemPrivilege should be true" duration="1"/>
|
128
|
+
</file>
|
129
129
|
</testExecutions>
|
package/create-sso-user.sql
CHANGED
@@ -1,40 +1,40 @@
|
|
1
|
-
|
2
|
-
-- example to create sso-user
|
3
|
-
CREATE USER 'sso_user'@'environment' IDENTIFIED BY 'password';
|
4
|
-
|
5
|
-
-- example to grant neccesary access to run migration
|
6
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_authorization_codes TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
7
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_bearer_tokens TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
8
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_building_types TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
9
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_buildings TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
10
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_cities TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
11
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_companies TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
12
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_countries TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
13
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_departments TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
14
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_grouproleprivilege TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
15
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_groupsystemaccess TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
16
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_groupsystemprivilege TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
17
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_groupsystemrole TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
18
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_oauth_tokens TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
19
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_roles TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
20
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_sequelize_meta TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
21
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_staff_types TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
22
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_staffs TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
23
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_states TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
24
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_system_accesses TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
25
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_systemprivilege TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
26
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_systemrole TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
27
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_systemroleprivilege TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
28
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_systems TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
29
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_updated_history TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
30
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_user_roles TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
31
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_usergroup TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
32
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_users TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
33
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_usersystemprivilege TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
34
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_usersystemrole TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
35
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_UserUserGroup TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
36
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production._prisma_migrations TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
37
|
-
|
38
|
-
|
39
|
-
-- Grant user to create, alter, drop, references on the database (required for creating shadow tables)
|
1
|
+
|
2
|
+
-- example to create sso-user
|
3
|
+
CREATE USER 'sso_user'@'environment' IDENTIFIED BY 'password';
|
4
|
+
|
5
|
+
-- example to grant neccesary access to run migration
|
6
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_authorization_codes TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
7
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_bearer_tokens TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
8
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_building_types TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
9
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_buildings TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
10
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_cities TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
11
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_companies TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
12
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_countries TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
13
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_departments TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
14
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_grouproleprivilege TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
15
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_groupsystemaccess TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
16
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_groupsystemprivilege TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
17
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_groupsystemrole TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
18
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_oauth_tokens TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
19
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_roles TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
20
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_sequelize_meta TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
21
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_staff_types TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
22
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_staffs TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
23
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_states TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
24
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_system_accesses TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
25
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_systemprivilege TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
26
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_systemrole TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
27
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_systemroleprivilege TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
28
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_systems TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
29
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_updated_history TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
30
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_user_roles TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
31
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_usergroup TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
32
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_users TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
33
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_usersystemprivilege TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
34
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_usersystemrole TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
35
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_UserUserGroup TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
36
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production._prisma_migrations TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
37
|
+
|
38
|
+
|
39
|
+
-- Grant user to create, alter, drop, references on the database (required for creating shadow tables)
|
40
40
|
GRANT CREATE, ALTER, DROP, REFERENCES ON shadow_database.* TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
@@ -0,0 +1 @@
|
|
1
|
+
export {};
|
@@ -0,0 +1,71 @@
|
|
1
|
+
"use strict";
|
2
|
+
var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {
|
3
|
+
function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); }
|
4
|
+
return new (P || (P = Promise))(function (resolve, reject) {
|
5
|
+
function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }
|
6
|
+
function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } }
|
7
|
+
function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); }
|
8
|
+
step((generator = generator.apply(thisArg, _arguments || [])).next());
|
9
|
+
});
|
10
|
+
};
|
11
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
12
|
+
const group_privilege_1 = require("../../../../src/components/group-privilege/group-privilege");
|
13
|
+
const group_privilege_repository_1 = require("../../../../src/components/group-privilege/group-privilege.repository");
|
14
|
+
const general_1 = require("@tomei/general");
|
15
|
+
describe('GroupPrivilege', () => {
|
16
|
+
afterEach(() => {
|
17
|
+
jest.restoreAllMocks();
|
18
|
+
});
|
19
|
+
it('should initialize with GroupPrivilegeAttr', () => __awaiter(void 0, void 0, void 0, function* () {
|
20
|
+
const mockGroupPrivilegeAttr = {
|
21
|
+
GroupPrivilegeId: 1,
|
22
|
+
GroupCode: 'group1',
|
23
|
+
PrivilegeCode: 'privilege1',
|
24
|
+
Status: 'active',
|
25
|
+
CreatedAt: new Date(),
|
26
|
+
UpdatedAt: new Date(),
|
27
|
+
CreatedById: 1,
|
28
|
+
UpdatedById: 1,
|
29
|
+
};
|
30
|
+
const findOneMock = jest
|
31
|
+
.spyOn(group_privilege_repository_1.GroupPrivilegeRepository.prototype, 'findOne')
|
32
|
+
.mockResolvedValueOnce({ get: jest.fn().mockReturnValue(mockGroupPrivilegeAttr) });
|
33
|
+
const groupPrivilege = yield group_privilege_1.GroupPrivilege.init(null, 1);
|
34
|
+
expect(findOneMock).toBeCalledWith({
|
35
|
+
where: { GroupPrivilegeId: 1 },
|
36
|
+
transaction: null,
|
37
|
+
});
|
38
|
+
expect(groupPrivilege).toBeInstanceOf(group_privilege_1.GroupPrivilege);
|
39
|
+
expect(groupPrivilege.GroupPrivilegeId).toEqual(mockGroupPrivilegeAttr.GroupPrivilegeId);
|
40
|
+
expect(groupPrivilege.GroupCode).toEqual(mockGroupPrivilegeAttr.GroupCode);
|
41
|
+
expect(groupPrivilege.PrivilegeCode).toEqual(mockGroupPrivilegeAttr.PrivilegeCode);
|
42
|
+
expect(groupPrivilege.Status).toEqual(mockGroupPrivilegeAttr.Status);
|
43
|
+
expect(groupPrivilege.CreatedAt).toEqual(mockGroupPrivilegeAttr.CreatedAt);
|
44
|
+
expect(groupPrivilege.UpdatedAt).toEqual(mockGroupPrivilegeAttr.UpdatedAt);
|
45
|
+
expect(groupPrivilege.CreatedById).toEqual(mockGroupPrivilegeAttr.CreatedById);
|
46
|
+
expect(groupPrivilege.UpdatedById).toEqual(mockGroupPrivilegeAttr.UpdatedById);
|
47
|
+
}));
|
48
|
+
it('should throw ClassError when GroupPrivilegeAttr is not found', () => __awaiter(void 0, void 0, void 0, function* () {
|
49
|
+
const findOneMock = jest
|
50
|
+
.spyOn(group_privilege_repository_1.GroupPrivilegeRepository.prototype, 'findOne')
|
51
|
+
.mockResolvedValueOnce(null);
|
52
|
+
yield expect(group_privilege_1.GroupPrivilege.init(null, 1)).rejects.toThrow(general_1.ClassError);
|
53
|
+
expect(findOneMock).toBeCalledWith({
|
54
|
+
where: { GroupPrivilegeId: 1 },
|
55
|
+
transaction: null,
|
56
|
+
});
|
57
|
+
}));
|
58
|
+
it('should initialize with default values', () => __awaiter(void 0, void 0, void 0, function* () {
|
59
|
+
const groupPrivilege = yield group_privilege_1.GroupPrivilege.init();
|
60
|
+
expect(groupPrivilege).toBeInstanceOf(group_privilege_1.GroupPrivilege);
|
61
|
+
expect(groupPrivilege.GroupPrivilegeId).toBeUndefined();
|
62
|
+
expect(groupPrivilege.GroupCode).toBeUndefined();
|
63
|
+
expect(groupPrivilege.PrivilegeCode).toBeUndefined();
|
64
|
+
expect(groupPrivilege.Status).toBeUndefined();
|
65
|
+
expect(groupPrivilege.CreatedAt).toBeUndefined();
|
66
|
+
expect(groupPrivilege.UpdatedAt).toBeUndefined();
|
67
|
+
expect(groupPrivilege.CreatedById).toBeUndefined();
|
68
|
+
expect(groupPrivilege.UpdatedById).toBeUndefined();
|
69
|
+
}));
|
70
|
+
});
|
71
|
+
//# sourceMappingURL=group-privilege.test.js.map
|
@@ -0,0 +1 @@
|
|
1
|
+
{"version":3,"file":"group-privilege.test.js","sourceRoot":"","sources":["../../../../../__tests__/unit/components/group-privilege/group-privilege.test.ts"],"names":[],"mappings":";;;;;;;;;;;AAAA,gGAA4F;AAC5F,sHAAiH;AACjH,4CAA4C;AAE5C,QAAQ,CAAC,gBAAgB,EAAE,GAAG,EAAE;IAC9B,SAAS,CAAC,GAAG,EAAE;QACb,IAAI,CAAC,eAAe,EAAE,CAAC;IACzB,CAAC,CAAC,CAAC;IAEH,EAAE,CAAC,2CAA2C,EAAE,GAAS,EAAE;QACzD,MAAM,sBAAsB,GAAG;YAC7B,gBAAgB,EAAE,CAAC;YACnB,SAAS,EAAE,QAAQ;YACnB,aAAa,EAAE,YAAY;YAC3B,MAAM,EAAE,QAAQ;YAChB,SAAS,EAAE,IAAI,IAAI,EAAE;YACrB,SAAS,EAAE,IAAI,IAAI,EAAE;YACrB,WAAW,EAAE,CAAC;YACd,WAAW,EAAE,CAAC;SACf,CAAC;QAEF,MAAM,WAAW,GAAG,IAAI;aACrB,KAAK,CAAC,qDAAwB,CAAC,SAAS,EAAE,SAAS,CAAC;aACpD,qBAAqB,CAAC,EAAE,GAAG,EAAE,IAAI,CAAC,EAAE,EAAE,CAAC,eAAe,CAAC,sBAAsB,CAAC,EAAS,CAAC,CAAC;QAE5F,MAAM,cAAc,GAAG,MAAM,gCAAc,CAAC,IAAI,CAAC,IAAI,EAAE,CAAC,CAAC,CAAC;QAE1D,MAAM,CAAC,WAAW,CAAC,CAAC,cAAc,CAAC;YACjC,KAAK,EAAE,EAAE,gBAAgB,EAAE,CAAC,EAAE;YAC9B,WAAW,EAAE,IAAI;SAClB,CAAC,CAAC;QACH,MAAM,CAAC,cAAc,CAAC,CAAC,cAAc,CAAC,gCAAc,CAAC,CAAC;QACtD,MAAM,CAAC,cAAc,CAAC,gBAAgB,CAAC,CAAC,OAAO,CAAC,sBAAsB,CAAC,gBAAgB,CAAC,CAAC;QACzF,MAAM,CAAC,cAAc,CAAC,SAAS,CAAC,CAAC,OAAO,CAAC,sBAAsB,CAAC,SAAS,CAAC,CAAC;QAC3E,MAAM,CAAC,cAAc,CAAC,aAAa,CAAC,CAAC,OAAO,CAAC,sBAAsB,CAAC,aAAa,CAAC,CAAC;QACnF,MAAM,CAAC,cAAc,CAAC,MAAM,CAAC,CAAC,OAAO,CAAC,sBAAsB,CAAC,MAAM,CAAC,CAAC;QACrE,MAAM,CAAC,cAAc,CAAC,SAAS,CAAC,CAAC,OAAO,CAAC,sBAAsB,CAAC,SAAS,CAAC,CAAC;QAC3E,MAAM,CAAC,cAAc,CAAC,SAAS,CAAC,CAAC,OAAO,CAAC,sBAAsB,CAAC,SAAS,CAAC,CAAC;QAC3E,MAAM,CAAC,cAAc,CAAC,WAAW,CAAC,CAAC,OAAO,CAAC,sBAAsB,CAAC,WAAW,CAAC,CAAC;QAC/E,MAAM,CAAC,cAAc,CAAC,WAAW,CAAC,CAAC,OAAO,CAAC,sBAAsB,CAAC,WAAW,CAAC,CAAC;IACjF,CAAC,CAAA,CAAC,CAAC;IAEH,EAAE,CAAC,8DAA8D,EAAE,GAAS,EAAE;QAC5E,MAAM,WAAW,GAAG,IAAI;aACrB,KAAK,CAAC,qDAAwB,CAAC,SAAS,EAAE,SAAS,CAAC;aACpD,qBAAqB,CAAC,IAAI,CAAC,CAAC;QAE/B,MAAM,MAAM,CAAC,gCAAc,CAAC,IAAI,CAAC,IAAI,EAAE,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,OAAO,CAAC,oBAAU,CAAC,CAAC;QAEvE,MAAM,CAAC,WAAW,CAAC,CAAC,cAAc,CAAC;YACjC,KAAK,EAAE,EAAE,gBAAgB,EAAE,CAAC,EAAE;YAC9B,WAAW,EAAE,IAAI;SAClB,CAAC,CAAC;IACL,CAAC,CAAA,CAAC,CAAC;IAEH,EAAE,CAAC,uCAAuC,EAAE,GAAS,EAAE;QACrD,MAAM,cAAc,GAAG,MAAM,gCAAc,CAAC,IAAI,EAAE,CAAC;QAEnD,MAAM,CAAC,cAAc,CAAC,CAAC,cAAc,CAAC,gCAAc,CAAC,CAAC;QACtD,MAAM,CAAC,cAAc,CAAC,gBAAgB,CAAC,CAAC,aAAa,EAAE,CAAC;QACxD,MAAM,CAAC,cAAc,CAAC,SAAS,CAAC,CAAC,aAAa,EAAE,CAAC;QACjD,MAAM,CAAC,cAAc,CAAC,aAAa,CAAC,CAAC,aAAa,EAAE,CAAC;QACrD,MAAM,CAAC,cAAc,CAAC,MAAM,CAAC,CAAC,aAAa,EAAE,CAAC;QAC9C,MAAM,CAAC,cAAc,CAAC,SAAS,CAAC,CAAC,aAAa,EAAE,CAAC;QACjD,MAAM,CAAC,cAAc,CAAC,SAAS,CAAC,CAAC,aAAa,EAAE,CAAC;QACjD,MAAM,CAAC,cAAc,CAAC,WAAW,CAAC,CAAC,aAAa,EAAE,CAAC;QACnD,MAAM,CAAC,cAAc,CAAC,WAAW,CAAC,CAAC,aAAa,EAAE,CAAC;IACrD,CAAC,CAAA,CAAC,CAAC;AACL,CAAC,CAAC,CAAC"}
|
File without changes
|
@@ -0,0 +1 @@
|
|
1
|
+
{"version":3,"file":"login-user.spec.js","sourceRoot":"","sources":["../../../../../__tests__/unit/components/login-user/login-user.spec.ts"],"names":[],"mappings":"AAuuBA,QAAQ,CAAC,WAAW,EAAE,GAAG,EAAE;IACvB,EAAE,CAAC,gBAAgB,EAAE,GAAG,EAAE;QACxB,MAAM,CAAC,IAAI,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;IAC1B,CAAC,CAAC,CAAC;AACL,CAAC,CAAC,CAAC"}
|
@@ -63,6 +63,8 @@ class LoginUser extends user_1.User {
|
|
63
63
|
LastFailedLoginAt: user.LastFailedLoginAt,
|
64
64
|
LastPasswordChangedAt: user.LastPasswordChangedAt,
|
65
65
|
NeedToChangePasswordYN: user.NeedToChangePasswordYN,
|
66
|
+
PasscodeHash: user.PasscodeHash,
|
67
|
+
PasscodeUpdatedAt: user.PasscodeUpdatedAt,
|
66
68
|
CreatedById: user.CreatedById,
|
67
69
|
CreatedAt: user.CreatedAt,
|
68
70
|
UpdatedById: user.UpdatedById,
|
@@ -1 +1 @@
|
|
1
|
-
{"version":3,"file":"login-user.js","sourceRoot":"","sources":["../../../../src/components/login-user/login-user.ts"],"names":[],"mappings":";;;;;;;;;;;;AACA,iCAA8B;AAI9B,oEAAgE;AAChE,uDAAmD;AAEnD,4DAA8C;AAG9C,MAAa,SAAU,SAAQ,WAAI;IAAnC;;QACE,YAAO,GAAG;YACR,EAAE,EAAE,IAAI;SACT,CAAC;
|
1
|
+
{"version":3,"file":"login-user.js","sourceRoot":"","sources":["../../../../src/components/login-user/login-user.ts"],"names":[],"mappings":";;;;;;;;;;;;AACA,iCAA8B;AAI9B,oEAAgE;AAChE,uDAAmD;AAEnD,4DAA8C;AAG9C,MAAa,SAAU,SAAQ,WAAI;IAAnC;;QACE,YAAO,GAAG;YACR,EAAE,EAAE,IAAI;SACT,CAAC;IAiJJ,CAAC;IA/IC,MAAM,CAAO,IAAI;6DACf,cAA+B,EAC/B,MAAe,EACf,aAAa,GAAG,IAAI;YAEpB,WAAI,CAAC,aAAa,GAAG,MAAM,4BAAY,CAAC,IAAI,EAAE,CAAC;YAC/C,IAAI,MAAM,EAAE,CAAC;gBACX,IAAI,aAAa,EAAE,CAAC;oBAClB,WAAI,CAAC,WAAW,GAAG,IAAI,gCAAc,EAAE,CAAC;gBAC1C,CAAC;gBACD,MAAM,IAAI,GAAG,MAAM,WAAI,CAAC,WAAW,CAAC,OAAO,CAAC;oBAC1C,KAAK,EAAE;wBACL,MAAM,EAAE,MAAM;qBACf;oBACD,OAAO,EAAE;wBACP;4BACE,KAAK,EAAE,sBAAK;yBACb;qBACF;oBACD,WAAW,EAAE,aAAa;iBAC3B,CAAC,CAAC;gBAEH,IAAI,CAAC,IAAI,EAAE,CAAC;oBACV,MAAM,IAAI,KAAK,CAAC,sBAAsB,CAAC,CAAC;gBAC1C,CAAC;gBAED,IAAI,IAAI,EAAE,CAAC;oBACT,MAAM,QAAQ,GAAc;wBAC1B,MAAM,EAAE,IAAI,CAAC,MAAM;wBACnB,QAAQ,EAAE,IAAI,CAAC,QAAQ;wBACvB,QAAQ,EAAE,CAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,QAAQ,KAAI,IAAI;wBAChC,IAAI,EAAE,CAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,IAAI,KAAI,IAAI;wBACxB,MAAM,EAAE,CAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,MAAM,KAAI,IAAI;wBAC5B,SAAS,EAAE,CAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,SAAS,KAAI,IAAI;wBAClC,KAAK,EAAE,IAAI,CAAC,KAAK;wBACjB,QAAQ,EAAE,IAAI,CAAC,QAAQ;wBACvB,MAAM,EAAE,IAAI,CAAC,MAAM;wBACnB,wBAAwB,EAAE,IAAI,CAAC,wBAAwB;wBACvD,YAAY,EAAE,IAAI,CAAC,YAAY;wBAC/B,WAAW,EAAE,IAAI,CAAC,WAAW;wBAC7B,UAAU,EAAE,IAAI,CAAC,UAAU;wBAC3B,SAAS,EAAE,IAAI,CAAC,SAAS;wBACzB,aAAa,EAAE,IAAI,CAAC,aAAa;wBACjC,uBAAuB,EAAE,IAAI,CAAC,uBAAuB;wBACrD,iBAAiB,EAAE,IAAI,CAAC,iBAAiB;wBACzC,qBAAqB,EAAE,IAAI,CAAC,qBAAqB;wBACjD,sBAAsB,EAAE,IAAI,CAAC,sBAAsB;wBACnD,YAAY,EAAE,IAAI,CAAC,YAAY;wBAC/B,iBAAiB,EAAE,IAAI,CAAC,iBAAiB;wBACzC,WAAW,EAAE,IAAI,CAAC,WAAW;wBAC7B,SAAS,EAAE,IAAI,CAAC,SAAS;wBACzB,WAAW,EAAE,IAAI,CAAC,WAAW;wBAC7B,SAAS,EAAE,IAAI,CAAC,SAAS;wBACzB,MAAM,EAAE,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,KAAK;qBACpB,CAAC;oBAEF,OAAO,IAAI,SAAS,CAAC,cAAc,EAAE,aAAa,EAAE,QAAQ,CAAC,CAAC;gBAChE,CAAC;qBAAM,CAAC;oBACN,MAAM,IAAI,KAAK,CAAC,gBAAgB,CAAC,CAAC;gBACpC,CAAC;YACH,CAAC;YACD,OAAO,IAAI,SAAS,CAAC,cAAc,EAAE,aAAa,CAAC,CAAC;QACtD,CAAC;KAAA;IAEK,eAAe,CACnB,UAAkB,EAClB,aAAqB;;YAErB,IAAI,CAAC;gBACH,IAAI,CAAC,IAAI,CAAC,QAAQ,EAAE,CAAC;oBACnB,MAAM,IAAI,KAAK,CAAC,6BAA6B,CAAC,CAAC;gBACjD,CAAC;gBAED,MAAM,WAAW,GAAG,MAAM,IAAI,CAAC,eAAe,CAAC,mBAAmB,CAChE,IAAI,CAAC,QAAQ,CACd,CAAC;gBAEF,MAAM,WAAW,GAAG,WAAW,CAAC,YAAY,CAAC,IAAI,CAC/C,CAAC,MAAM,EAAE,EAAE,CAAC,MAAM,CAAC,IAAI,KAAK,UAAU,CACvC,CAAC;gBAEF,IAAI,CAAC,WAAW,EAAE,CAAC;oBACjB,OAAO,KAAK,CAAC;gBACf,CAAC;gBAED,MAAM,UAAU,GAAG,WAAW,CAAC,UAAU,CAAC;gBAC1C,MAAM,YAAY,GAAG,UAAU,CAAC,QAAQ,CAAC,aAAa,CAAC,CAAC;gBACxD,OAAO,YAAY,CAAC;YACtB,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,MAAM,KAAK,CAAC;YACd,CAAC;QACH,CAAC;KAAA;IAEK,YAAY,CAChB,UAAkB,EAClB,SAAiB,EACjB,MAAc;;YAEd,IAAI,CAAC;gBACH,MAAM,WAAW,GACf,MAAM,IAAI,CAAC,eAAe,CAAC,mBAAmB,CAAC,MAAM,CAAC,CAAC;gBAEzD,IAAI,WAAW,CAAC,YAAY,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;oBAC1C,MAAM,IAAI,KAAK,CAAC,kBAAkB,CAAC,CAAC;gBACtC,CAAC;gBAED,MAAM,WAAW,GAAG,WAAW,CAAC,YAAY,CAAC,IAAI,CAC/C,CAAC,EAAE,EAAE,EAAE,CAAC,EAAE,CAAC,IAAI,KAAK,UAAU,CAC/B,CAAC;gBAEF,IAAI,CAAC,WAAW,EAAE,CAAC;oBACjB,MAAM,IAAI,KAAK,CAAC,kBAAkB,CAAC,CAAC;gBACtC,CAAC;gBAED,IAAI,WAAW,CAAC,SAAS,KAAK,SAAS,EAAE,CAAC;oBACxC,MAAM,IAAI,KAAK,CAAC,kBAAkB,CAAC,CAAC;gBACtC,CAAC;gBAED,MAAM,IAAI,CAAC,eAAe,CAAC,eAAe,CAAC,MAAM,CAAC,CAAC;gBAEnD,OAAO,WAAW,CAAC;YACrB,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,MAAM,KAAK,CAAC;YACd,CAAC;QACH,CAAC;KAAA;IAEK,MAAM,CAAC,UAAkB;;YAC7B,IAAI,CAAC;gBACH,IAAI,CAAC,IAAI,CAAC,QAAQ,EAAE,CAAC;oBACnB,MAAM,IAAI,KAAK,CAAC,6BAA6B,CAAC,CAAC;gBACjD,CAAC;gBACD,MAAM,WAAW,GAAG,MAAM,IAAI,CAAC,eAAe,CAAC,mBAAmB,CAChE,IAAI,CAAC,QAAQ,CACd,CAAC;gBACF,MAAM,KAAK,GAAG,WAAW,CAAC,YAAY,CAAC,SAAS,CAC9C,CAAC,MAAM,EAAE,EAAE,CAAC,MAAM,CAAC,IAAI,KAAK,UAAU,CACvC,CAAC;gBACF,WAAW,CAAC,YAAY,CAAC,MAAM,CAAC,KAAK,EAAE,CAAC,CAAC,CAAC;gBAC1C,IAAI,CAAC,eAAe,CAAC,cAAc,CAAC,IAAI,CAAC,QAAQ,EAAE,WAAW,CAAC,CAAC;YAClE,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,MAAM,KAAK,CAAC;YACd,CAAC;QACH,CAAC;KAAA;CACF;AApJD,8BAoJC"}
|
@@ -27,6 +27,8 @@ export declare class User extends UserBase {
|
|
27
27
|
private _LastFailedLoginAt;
|
28
28
|
private _LastPasswordChangedAt;
|
29
29
|
private _NeedToChangePasswordYN;
|
30
|
+
private _PasscodeHash;
|
31
|
+
private _PasscodeUpdatedAt;
|
30
32
|
private _CreatedById;
|
31
33
|
private _CreatedAt;
|
32
34
|
private _UpdatedById;
|
@@ -86,6 +88,10 @@ export declare class User extends UserBase {
|
|
86
88
|
private set UpdatedById(value);
|
87
89
|
get UpdatedAt(): Date;
|
88
90
|
private set UpdatedAt(value);
|
91
|
+
get PasscodeHash(): string;
|
92
|
+
private set PasscodeHash(value);
|
93
|
+
get PasscodeUpdatedAt(): Date;
|
94
|
+
private set PasscodeUpdatedAt(value);
|
89
95
|
getDetails(): Promise<{
|
90
96
|
FullName: string;
|
91
97
|
UserName: string;
|
@@ -143,4 +149,5 @@ export declare class User extends UserBase {
|
|
143
149
|
static findById(AuthContext: AuthContext, dbTransaction: any, UserId: string): Promise<User>;
|
144
150
|
static getFullName(dbTransaction: any, UserId: string): Promise<string>;
|
145
151
|
static findByEmail(AuthContext: AuthContext, dbTransaction: any, Email: string): Promise<User>;
|
152
|
+
updatePasscode(loginUser: User, passcode: string, dbTransaction: any): Promise<void>;
|
146
153
|
}
|