@tomei/sso 0.56.1 → 0.56.2

Sign up to get free protection for your applications and to get access to all the features.
Files changed (139) hide show
  1. package/.commitlintrc.json +22 -22
  2. package/.gitlab-ci.yml +16 -16
  3. package/.husky/commit-msg +15 -15
  4. package/.husky/pre-commit +7 -7
  5. package/.prettierrc +4 -4
  6. package/Jenkinsfile +57 -57
  7. package/README.md +23 -23
  8. package/__tests__/unit/components/group/group.spec.ts +79 -79
  9. package/__tests__/unit/components/group-object-privilege/group-object-privilege.spec.ts +88 -88
  10. package/__tests__/unit/components/group-privilege/group-privilege.spec.ts +68 -68
  11. package/__tests__/unit/components/group-reporting-user/group-reporting-user.spec.ts +66 -66
  12. package/__tests__/unit/components/group-system-access/group-system-access.spec.ts +83 -83
  13. package/__tests__/unit/components/login-user/l.spec.ts +746 -746
  14. package/__tests__/unit/components/login-user/login.spec.ts +1164 -1164
  15. package/__tests__/unit/components/password-hash/password-hash.service.spec.ts +31 -31
  16. package/__tests__/unit/components/system/system.spec.ts +254 -254
  17. package/__tests__/unit/components/system-privilege/system-privilege.spec.ts +83 -83
  18. package/__tests__/unit/components/user-group/user-group.spec.ts +86 -86
  19. package/__tests__/unit/components/user-object-privilege/user-object-privilege.spec.ts +78 -78
  20. package/__tests__/unit/components/user-privilege/user-privilege.spec.ts +72 -72
  21. package/__tests__/unit/components/user-system-access/user-system-access.spec.ts +89 -89
  22. package/__tests__/unit/redis-client/redis.service.spec.ts +23 -23
  23. package/__tests__/unit/session/session.service.spec.ts +47 -47
  24. package/__tests__/unit/system-privilege/system-privilage.spec.ts +91 -91
  25. package/coverage/clover.xml +1452 -1452
  26. package/coverage/coverage-final.json +47 -47
  27. package/coverage/lcov-report/base.css +224 -224
  28. package/coverage/lcov-report/block-navigation.js +87 -87
  29. package/coverage/lcov-report/components/group/group.repository.ts.html +117 -117
  30. package/coverage/lcov-report/components/group/group.ts.html +327 -327
  31. package/coverage/lcov-report/components/group/index.html +130 -130
  32. package/coverage/lcov-report/components/group-object-privilege/group-object-privilege.repository.ts.html +117 -117
  33. package/coverage/lcov-report/components/group-object-privilege/group-object-privilege.ts.html +321 -321
  34. package/coverage/lcov-report/components/group-object-privilege/index.html +130 -130
  35. package/coverage/lcov-report/components/group-privilege/group-privilege.repository.ts.html +117 -117
  36. package/coverage/lcov-report/components/group-privilege/group-privilege.ts.html +303 -303
  37. package/coverage/lcov-report/components/group-privilege/index.html +130 -130
  38. package/coverage/lcov-report/components/group-reporting-user/group-reporting-user.repository.ts.html +117 -117
  39. package/coverage/lcov-report/components/group-reporting-user/group-reporting-user.ts.html +327 -327
  40. package/coverage/lcov-report/components/group-reporting-user/index.html +130 -130
  41. package/coverage/lcov-report/components/group-system-access/group-system-access.repository.ts.html +117 -117
  42. package/coverage/lcov-report/components/group-system-access/group-system-access.ts.html +309 -309
  43. package/coverage/lcov-report/components/group-system-access/index.html +130 -130
  44. package/coverage/lcov-report/components/login-history/index.html +115 -115
  45. package/coverage/lcov-report/components/login-history/login-history.repository.ts.html +117 -117
  46. package/coverage/lcov-report/components/login-user/index.html +130 -130
  47. package/coverage/lcov-report/components/login-user/login-user.ts.html +5007 -5007
  48. package/coverage/lcov-report/components/login-user/user.repository.ts.html +117 -117
  49. package/coverage/lcov-report/components/password-hash/index.html +115 -115
  50. package/coverage/lcov-report/components/password-hash/password-hash.service.ts.html +126 -126
  51. package/coverage/lcov-report/components/system/index.html +130 -130
  52. package/coverage/lcov-report/components/system/system.repository.ts.html +117 -117
  53. package/coverage/lcov-report/components/system/system.ts.html +909 -909
  54. package/coverage/lcov-report/components/system-privilege/index.html +130 -130
  55. package/coverage/lcov-report/components/system-privilege/system-privilege.repository.ts.html +120 -120
  56. package/coverage/lcov-report/components/system-privilege/system-privilege.ts.html +390 -390
  57. package/coverage/lcov-report/components/user-group/index.html +130 -130
  58. package/coverage/lcov-report/components/user-group/user-group.repository.ts.html +117 -117
  59. package/coverage/lcov-report/components/user-group/user-group.ts.html +354 -354
  60. package/coverage/lcov-report/components/user-object-privilege/index.html +130 -130
  61. package/coverage/lcov-report/components/user-object-privilege/user-object-privilege.repository.ts.html +117 -117
  62. package/coverage/lcov-report/components/user-object-privilege/user-object-privilege.ts.html +312 -312
  63. package/coverage/lcov-report/components/user-privilege/index.html +130 -130
  64. package/coverage/lcov-report/components/user-privilege/user-privilege.repository.ts.html +117 -117
  65. package/coverage/lcov-report/components/user-privilege/user-privilege.ts.html +306 -306
  66. package/coverage/lcov-report/components/user-system-access/index.html +130 -130
  67. package/coverage/lcov-report/components/user-system-access/user-system-access.repository.ts.html +117 -117
  68. package/coverage/lcov-report/components/user-system-access/user-system-access.ts.html +312 -312
  69. package/coverage/lcov-report/enum/group-type.enum.ts.html +108 -108
  70. package/coverage/lcov-report/enum/index.html +160 -160
  71. package/coverage/lcov-report/enum/index.ts.html +93 -93
  72. package/coverage/lcov-report/enum/user-status.enum.ts.html +105 -105
  73. package/coverage/lcov-report/enum/yn.enum.ts.html +96 -96
  74. package/coverage/lcov-report/index.html +370 -370
  75. package/coverage/lcov-report/models/group-object-privilege.entity.ts.html +333 -333
  76. package/coverage/lcov-report/models/group-privilege.entity.ts.html +315 -315
  77. package/coverage/lcov-report/models/group-reporting-user.entity.ts.html +339 -339
  78. package/coverage/lcov-report/models/group-system-access.entity.ts.html +324 -324
  79. package/coverage/lcov-report/models/group.entity.ts.html +435 -435
  80. package/coverage/lcov-report/models/index.html +310 -310
  81. package/coverage/lcov-report/models/login-history.entity.ts.html +252 -252
  82. package/coverage/lcov-report/models/staff.entity.ts.html +411 -411
  83. package/coverage/lcov-report/models/system-privilege.entity.ts.html +354 -354
  84. package/coverage/lcov-report/models/system.entity.ts.html +423 -423
  85. package/coverage/lcov-report/models/user-group.entity.ts.html +354 -354
  86. package/coverage/lcov-report/models/user-object-privilege.entity.ts.html +330 -330
  87. package/coverage/lcov-report/models/user-privilege.entity.ts.html +315 -315
  88. package/coverage/lcov-report/models/user-system-access.entity.ts.html +315 -315
  89. package/coverage/lcov-report/models/user.entity.ts.html +522 -522
  90. package/coverage/lcov-report/prettify.css +1 -1
  91. package/coverage/lcov-report/prettify.js +2 -2
  92. package/coverage/lcov-report/redis-client/index.html +115 -115
  93. package/coverage/lcov-report/redis-client/redis.service.ts.html +240 -240
  94. package/coverage/lcov-report/session/index.html +115 -115
  95. package/coverage/lcov-report/session/session.service.ts.html +246 -246
  96. package/coverage/lcov-report/sorter.js +196 -196
  97. package/coverage/lcov.info +2490 -2490
  98. package/coverage/test-report.xml +128 -128
  99. package/create-sso-user.sql +39 -39
  100. package/dist/src/components/login-user/login-user.d.ts +4 -0
  101. package/dist/src/components/login-user/login-user.js +61 -0
  102. package/dist/src/components/login-user/login-user.js.map +1 -1
  103. package/dist/src/components/login-user/user.d.ts +4 -4
  104. package/dist/src/components/login-user/user.js +0 -53
  105. package/dist/src/components/login-user/user.js.map +1 -1
  106. package/dist/tsconfig.tsbuildinfo +1 -1
  107. package/eslint.config.mjs +58 -58
  108. package/jest.config.js +14 -14
  109. package/migrations/20240314080602-create-user-table.js +124 -124
  110. package/migrations/20240314080603-create-user-group-table.js +85 -85
  111. package/migrations/20240314080604-create-user-user-group-table.js +55 -55
  112. package/migrations/20240314080605-create-login-history-table.js +53 -53
  113. package/migrations/20240527064925-create-system-table.js +78 -78
  114. package/migrations/20240527064926-create-system-privilege-table.js +71 -71
  115. package/migrations/20240527065342-create-group-table.js +93 -93
  116. package/migrations/20240527065633-create-group-reporting-user-table.js +76 -76
  117. package/migrations/20240528011551-create-group-system-access-table.js +72 -72
  118. package/migrations/20240528023018-user-system-access-table.js +75 -75
  119. package/migrations/20240528032229-user-privilege-table.js +76 -76
  120. package/migrations/20240528063003-create-group-privilege-table.js +76 -76
  121. package/migrations/20240528063051-create-group-object-privilege-table.js +84 -84
  122. package/migrations/20240528063107-create-user-object-privilege-table.js +84 -84
  123. package/migrations/20240528063108-create-api-key-table.js +85 -85
  124. package/migrations/20241104104802-create-building-table.js +95 -95
  125. package/migrations/20250108091132-add-area-manager-user-id-to-building-table.js +14 -14
  126. package/migrations/20250108091133-add-passcode-to-user-table.js +36 -36
  127. package/package.json +90 -90
  128. package/sampledotenv +7 -7
  129. package/sonar-project.properties +22 -22
  130. package/src/components/login-user/login-user.ts +70 -0
  131. package/src/components/login-user/user.ts +2 -76
  132. package/tsconfig.build.json +5 -5
  133. package/tsconfig.json +23 -23
  134. package/dist/__tests__/unit/components/group-privilege/group-privilege.test.d.ts +0 -1
  135. package/dist/__tests__/unit/components/group-privilege/group-privilege.test.js +0 -71
  136. package/dist/__tests__/unit/components/group-privilege/group-privilege.test.js.map +0 -1
  137. package/dist/__tests__/unit/components/login-user/login-user.spec.d.ts +0 -0
  138. package/dist/__tests__/unit/components/login-user/login-user.spec.js +0 -6
  139. package/dist/__tests__/unit/components/login-user/login-user.spec.js.map +0 -1
@@ -1,129 +1,129 @@
1
- <?xml version="1.0" encoding="UTF-8"?>
2
- <testExecutions version="1">
3
- <file path="C:\Work\sso\__tests__\unit\components\login-user\login.spec.ts">
4
- <testCase name="LoginUser init should initialize LoginUser with valid userId" duration="5"/>
5
- <testCase name="LoginUser init should throw an error when user is not found" duration="20"/>
6
- <testCase name="LoginUser checkSession should throw an error if session expired" duration="20"/>
7
- <testCase name="LoginUser checkSession should refresh the session duration if session is valid" duration="2"/>
8
- <testCase name="LoginUser shouldReleaseLock should return true if autoReleaseYN is &quot;Y&quot; and time difference is greater than minuteToAutoRelease" duration="2"/>
9
- <testCase name="LoginUser shouldReleaseLock should return false if autoReleaseYN is &quot;Y&quot; and time difference is less than or equal to minuteToAutoRelease" duration="1"/>
10
- <testCase name="LoginUser shouldReleaseLock should return false if autoReleaseYN is &quot;N&quot;" duration="1"/>
11
- <testCase name="LoginUser releaseLock should release the lock for a user" duration="1"/>
12
- <testCase name="LoginUser checkUserInfoDuplicated should throw an error if duplicate user info is found" duration="1"/>
13
- <testCase name="LoginUser checkUserInfoDuplicated should not throw an error if duplicate user info is not found" duration="0"/>
14
- <testCase name="LoginUser generateDefaultPassword should generate a default password with the specified length" duration="2"/>
15
- <testCase name="LoginUser generateDefaultPassword should generate a default password with at least one capital letter" duration="1"/>
16
- <testCase name="LoginUser generateDefaultPassword should generate a default password with at least one number" duration="1"/>
17
- <testCase name="LoginUser generateDefaultPassword should generate a default password with at least one special character" duration="1"/>
18
- <testCase name="LoginUser generateDefaultPassword should generate a default password without any non-acceptable characters" duration="1"/>
19
- <testCase name="LoginUser setPassword should set the password for the user" duration="159"/>
20
- <testCase name="LoginUser setPassword should throw an error if the password does not meet the security requirements" duration="13"/>
21
- <testCase name="LoginUser create should create a new user record" duration="5"/>
22
- <testCase name="LoginUser create should throw an error if user dont have the privilege to create new user" duration="2"/>
23
- <testCase name="LoginUser create should throw an error if user email is missing" duration="2"/>
24
- <testCase name="LoginUser incrementFailedLoginAttemptCount should increment FailedLoginAttemptCount and update user status" duration="1"/>
25
- <testCase name="LoginUser incrementFailedLoginAttemptCount should throw an error if maxFailedLoginAttempts or autoReleaseYN is missing" duration="1"/>
26
- <testCase name="LoginUser incrementFailedLoginAttemptCount should lock the user account if the failed login attempts exceed the maximum allowed" duration="1"/>
27
- <testCase name="LoginUser incrementFailedLoginAttemptCount should permanently lock the user account if the failed login attempts exceed the maximum allowed and autoReleaseYN is N" duration="1"/>
28
- <testCase name="LoginUser combineSystemAccess should combine user and group system access and remove duplicates" duration="1"/>
29
- <testCase name="LoginUser checkPrivileges should return true if user has the specified privilege" duration="1"/>
30
- <testCase name="LoginUser checkPrivileges should return false if user does not have the specified privilege" duration="1"/>
31
- <testCase name="LoginUser checkPrivileges should throw an error if ObjectId is not set" duration="1"/>
32
- <testCase name="LoginUser getObjectPrivileges should return an array of privileges" duration="1"/>
33
- <testCase name="LoginUser getObjectPrivileges should throw an error if an exception occurs" duration="1"/>
34
- <testCase name="LoginUser getUserPersonalPrivileges should return an array of privileges" duration="2"/>
35
- <testCase name="LoginUser getUserPersonalPrivileges should throw an error if an error occurs" duration="1"/>
36
- <testCase name="LoginUser getInheritedSystemAccess should return group system access with its parent group system access if applicable" duration="3"/>
37
- </file>
38
- <file path="C:\Work\sso\__tests__\unit\components\system\system.spec.ts">
39
- <testCase name="System init should initialize a system when SystemCode is provided" duration="3"/>
40
- <testCase name="System init should throw an error when SystemCode is not found" duration="8"/>
41
- <testCase name="System init should initialize a new system when SystemCode is not provided" duration="1"/>
42
- <testCase name="System createSystem should create a new system" duration="4"/>
43
- <testCase name="System createSystem should throw an error when user does not have permission" duration="1"/>
44
- <testCase name="System createSystem should throw an error when SystemCode is missing" duration="1"/>
45
- <testCase name="System createSystem should throw an error when Name is missing" duration="1"/>
46
- <testCase name="System createSystem should throw an error when Description is missing" duration="1"/>
47
- <testCase name="System createSystem should throw an error when failed to create system" duration="5"/>
48
- <testCase name="System setSystemCode should set the SystemCode when there is no duplicate" duration="1"/>
49
- <testCase name="System setSystemCode should throw an error when SystemCode already exists" duration="1"/>
50
- <testCase name="System setSystemCode should throw an error when failed to check duplicate SystemCode" duration="1"/>
51
- <testCase name="System findAll should find all systems based on filter" duration="2"/>
52
- <testCase name="System findAll should find all systems without pagination when page and rows are not provided" duration="1"/>
53
- </file>
54
- <file path="C:\Work\sso\__tests__\unit\components\group-object-privilege\group-object-privilege.spec.ts">
55
- <testCase name="GroupObjectPrivilege should create an instance of GroupObjectPrivilege" duration="2"/>
56
- <testCase name="GroupObjectPrivilege should have the correct TableName" duration="0"/>
57
- <testCase name="GroupObjectPrivilege should have the correct properties" duration="1"/>
58
- <testCase name="GroupObjectPrivilege init should return an instance of GroupObjectPrivilege when GroupObjectPrivilegeId is provided" duration="2"/>
59
- <testCase name="GroupObjectPrivilege init should throw an error when GroupObjectPrivilegeId is provided but no GroupObjectPrivilege is found" duration="3"/>
60
- <testCase name="GroupObjectPrivilege init should return a new instance of GroupObjectPrivilege when GroupObjectPrivilegeId is not provided" duration="3"/>
61
- </file>
62
- <file path="C:\Work\sso\__tests__\unit\components\group-system-access\group-system-access.spec.ts">
63
- <testCase name="GroupSystemAccess should create a new GroupSystemAccess instance" duration="2"/>
64
- <testCase name="GroupSystemAccess init should initialize GroupSystemAccess without GroupSystemAccessId" duration="2"/>
65
- <testCase name="GroupSystemAccess init should initialize GroupSystemAccess with GroupSystemAccessId" duration="3"/>
66
- <testCase name="GroupSystemAccess init should throw an error if GroupSystemAccessId is not found" duration="5"/>
67
- </file>
68
- <file path="C:\Work\sso\__tests__\unit\components\group\group.spec.ts">
69
- <testCase name="Group should initialize a group with valid GroupCode" duration="4"/>
70
- <testCase name="Group should throw an error when initializing a group with invalid GroupCode" duration="5"/>
71
- <testCase name="Group should throw an error when initializing a group with an error" duration="2"/>
72
- </file>
73
- <file path="C:\Work\sso\__tests__\unit\components\group-reporting-user\group-reporting-user.spec.ts">
74
- <testCase name="GroupReportingUser init should initialize GroupReportingUser without GroupReportingUserId" duration="3"/>
75
- <testCase name="GroupReportingUser init should initialize GroupReportingUser with valid GroupReportingUserId" duration="2"/>
76
- <testCase name="GroupReportingUser init should throw ClassError when GroupReportingUser is not found" duration="8"/>
77
- <testCase name="GroupReportingUser init should throw ClassError when failed to initialize GroupReportingUser" duration="1"/>
78
- </file>
79
- <file path="C:\Work\sso\__tests__\unit\components\system-privilege\system-privilege.spec.ts">
80
- <testCase name="SystemPrivilege constructor should create a new SystemPrivilege instance" duration="2"/>
81
- <testCase name="SystemPrivilege init should initialize SystemPrivilege without PrivilegeCode" duration="1"/>
82
- <testCase name="SystemPrivilege init should initialize SystemPrivilege with PrivilegeCode" duration="2"/>
83
- <testCase name="SystemPrivilege init should throw an error if PrivilegeCode is not found" duration="4"/>
84
- </file>
85
- <file path="C:\Work\sso\__tests__\unit\components\user-group\user-group.spec.ts">
86
- <testCase name="UserGroup constructor should create a new UserGroup instance" duration="3"/>
87
- <testCase name="UserGroup init should initialize UserGroup with valid UserGroupId" duration="2"/>
88
- <testCase name="UserGroup init should throw ClassError when UserGroupId is not found" duration="5"/>
89
- </file>
90
- <file path="C:\Work\sso\__tests__\unit\components\user-object-privilege\user-object-privilege.spec.ts">
91
- <testCase name="UserObjectPrivilege constructor should create a new UserObjectPrivilege instance" duration="2"/>
92
- <testCase name="UserObjectPrivilege init should initialize UserObjectPrivilege with valid ObjectPrivilegeId" duration="5"/>
93
- <testCase name="UserObjectPrivilege init should throw ClassError when ObjectPrivilegeId is not found" duration="4"/>
94
- </file>
95
- <file path="C:\Work\sso\__tests__\unit\components\group-privilege\group-privilege.spec.ts">
96
- <testCase name="GroupPrivilege should initialize with GroupPrivilegeAttr" duration="6"/>
97
- <testCase name="GroupPrivilege should throw ClassError when GroupPrivilegeAttr is not found" duration="4"/>
98
- <testCase name="GroupPrivilege should initialize with default values" duration="1"/>
99
- </file>
100
- <file path="C:\Work\sso\__tests__\unit\components\user-system-access\user-system-access.spec.ts">
101
- <testCase name="UserSystemAccess constructor should create a new UserSystemAccess instance" duration="2"/>
102
- <testCase name="UserSystemAccess init should initialize UserSystemAccess with valid UserSystemAccessId" duration="2"/>
103
- <testCase name="UserSystemAccess init should throw ClassError when UserSystemAccessId is not found" duration="1"/>
104
- </file>
105
- <file path="C:\Work\sso\__tests__\unit\components\user-privilege\user-privilege.spec.ts">
106
- <testCase name="UserPrivilege constructor should create a new UserPrivilege instance" duration="2"/>
107
- <testCase name="UserPrivilege init should initialize UserPrivilege with valid UserPrivilegeId" duration="2"/>
108
- <testCase name="UserPrivilege init should throw ClassError when UserPrivilegeId is not found" duration="4"/>
109
- </file>
110
- <file path="C:\Work\sso\__tests__\unit\session\session.service.spec.ts">
111
- <testCase name="session.service should return session service when instansiated" duration="2"/>
112
- <testCase name="session.service should able to write session data" duration="3"/>
113
- <testCase name="session.service should able to refresh session data" duration="3"/>
114
- </file>
115
- <file path="C:\Work\sso\__tests__\unit\system-privilege\system-privilage.spec.ts">
116
- <testCase name="SystemPrivilege should be true" duration="2"/>
117
- </file>
118
- <file path="C:\Work\sso\__tests__\unit\components\password-hash\password-hash.service.spec.ts">
119
- <testCase name="password-hash.service should return hash password" duration="2"/>
120
- <testCase name="password-hash.service should return true when verify password" duration="1"/>
121
- </file>
122
- <file path="C:\Work\sso\__tests__\unit\redis-client\redis.service.spec.ts">
123
- <testCase name="redis.service should return redis service when instansiated" duration="1"/>
124
- <testCase name="redis.service should able to write and read redis" duration="2"/>
125
- </file>
126
- <file path="C:\Work\sso\__tests__\unit\components\login-user\l.spec.ts">
127
- <testCase name="SystemPrivilege should be true" duration="1"/>
128
- </file>
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <testExecutions version="1">
3
+ <file path="C:\Work\sso\__tests__\unit\components\login-user\login.spec.ts">
4
+ <testCase name="LoginUser init should initialize LoginUser with valid userId" duration="5"/>
5
+ <testCase name="LoginUser init should throw an error when user is not found" duration="20"/>
6
+ <testCase name="LoginUser checkSession should throw an error if session expired" duration="20"/>
7
+ <testCase name="LoginUser checkSession should refresh the session duration if session is valid" duration="2"/>
8
+ <testCase name="LoginUser shouldReleaseLock should return true if autoReleaseYN is &quot;Y&quot; and time difference is greater than minuteToAutoRelease" duration="2"/>
9
+ <testCase name="LoginUser shouldReleaseLock should return false if autoReleaseYN is &quot;Y&quot; and time difference is less than or equal to minuteToAutoRelease" duration="1"/>
10
+ <testCase name="LoginUser shouldReleaseLock should return false if autoReleaseYN is &quot;N&quot;" duration="1"/>
11
+ <testCase name="LoginUser releaseLock should release the lock for a user" duration="1"/>
12
+ <testCase name="LoginUser checkUserInfoDuplicated should throw an error if duplicate user info is found" duration="1"/>
13
+ <testCase name="LoginUser checkUserInfoDuplicated should not throw an error if duplicate user info is not found" duration="0"/>
14
+ <testCase name="LoginUser generateDefaultPassword should generate a default password with the specified length" duration="2"/>
15
+ <testCase name="LoginUser generateDefaultPassword should generate a default password with at least one capital letter" duration="1"/>
16
+ <testCase name="LoginUser generateDefaultPassword should generate a default password with at least one number" duration="1"/>
17
+ <testCase name="LoginUser generateDefaultPassword should generate a default password with at least one special character" duration="1"/>
18
+ <testCase name="LoginUser generateDefaultPassword should generate a default password without any non-acceptable characters" duration="1"/>
19
+ <testCase name="LoginUser setPassword should set the password for the user" duration="159"/>
20
+ <testCase name="LoginUser setPassword should throw an error if the password does not meet the security requirements" duration="13"/>
21
+ <testCase name="LoginUser create should create a new user record" duration="5"/>
22
+ <testCase name="LoginUser create should throw an error if user dont have the privilege to create new user" duration="2"/>
23
+ <testCase name="LoginUser create should throw an error if user email is missing" duration="2"/>
24
+ <testCase name="LoginUser incrementFailedLoginAttemptCount should increment FailedLoginAttemptCount and update user status" duration="1"/>
25
+ <testCase name="LoginUser incrementFailedLoginAttemptCount should throw an error if maxFailedLoginAttempts or autoReleaseYN is missing" duration="1"/>
26
+ <testCase name="LoginUser incrementFailedLoginAttemptCount should lock the user account if the failed login attempts exceed the maximum allowed" duration="1"/>
27
+ <testCase name="LoginUser incrementFailedLoginAttemptCount should permanently lock the user account if the failed login attempts exceed the maximum allowed and autoReleaseYN is N" duration="1"/>
28
+ <testCase name="LoginUser combineSystemAccess should combine user and group system access and remove duplicates" duration="1"/>
29
+ <testCase name="LoginUser checkPrivileges should return true if user has the specified privilege" duration="1"/>
30
+ <testCase name="LoginUser checkPrivileges should return false if user does not have the specified privilege" duration="1"/>
31
+ <testCase name="LoginUser checkPrivileges should throw an error if ObjectId is not set" duration="1"/>
32
+ <testCase name="LoginUser getObjectPrivileges should return an array of privileges" duration="1"/>
33
+ <testCase name="LoginUser getObjectPrivileges should throw an error if an exception occurs" duration="1"/>
34
+ <testCase name="LoginUser getUserPersonalPrivileges should return an array of privileges" duration="2"/>
35
+ <testCase name="LoginUser getUserPersonalPrivileges should throw an error if an error occurs" duration="1"/>
36
+ <testCase name="LoginUser getInheritedSystemAccess should return group system access with its parent group system access if applicable" duration="3"/>
37
+ </file>
38
+ <file path="C:\Work\sso\__tests__\unit\components\system\system.spec.ts">
39
+ <testCase name="System init should initialize a system when SystemCode is provided" duration="3"/>
40
+ <testCase name="System init should throw an error when SystemCode is not found" duration="8"/>
41
+ <testCase name="System init should initialize a new system when SystemCode is not provided" duration="1"/>
42
+ <testCase name="System createSystem should create a new system" duration="4"/>
43
+ <testCase name="System createSystem should throw an error when user does not have permission" duration="1"/>
44
+ <testCase name="System createSystem should throw an error when SystemCode is missing" duration="1"/>
45
+ <testCase name="System createSystem should throw an error when Name is missing" duration="1"/>
46
+ <testCase name="System createSystem should throw an error when Description is missing" duration="1"/>
47
+ <testCase name="System createSystem should throw an error when failed to create system" duration="5"/>
48
+ <testCase name="System setSystemCode should set the SystemCode when there is no duplicate" duration="1"/>
49
+ <testCase name="System setSystemCode should throw an error when SystemCode already exists" duration="1"/>
50
+ <testCase name="System setSystemCode should throw an error when failed to check duplicate SystemCode" duration="1"/>
51
+ <testCase name="System findAll should find all systems based on filter" duration="2"/>
52
+ <testCase name="System findAll should find all systems without pagination when page and rows are not provided" duration="1"/>
53
+ </file>
54
+ <file path="C:\Work\sso\__tests__\unit\components\group-object-privilege\group-object-privilege.spec.ts">
55
+ <testCase name="GroupObjectPrivilege should create an instance of GroupObjectPrivilege" duration="2"/>
56
+ <testCase name="GroupObjectPrivilege should have the correct TableName" duration="0"/>
57
+ <testCase name="GroupObjectPrivilege should have the correct properties" duration="1"/>
58
+ <testCase name="GroupObjectPrivilege init should return an instance of GroupObjectPrivilege when GroupObjectPrivilegeId is provided" duration="2"/>
59
+ <testCase name="GroupObjectPrivilege init should throw an error when GroupObjectPrivilegeId is provided but no GroupObjectPrivilege is found" duration="3"/>
60
+ <testCase name="GroupObjectPrivilege init should return a new instance of GroupObjectPrivilege when GroupObjectPrivilegeId is not provided" duration="3"/>
61
+ </file>
62
+ <file path="C:\Work\sso\__tests__\unit\components\group-system-access\group-system-access.spec.ts">
63
+ <testCase name="GroupSystemAccess should create a new GroupSystemAccess instance" duration="2"/>
64
+ <testCase name="GroupSystemAccess init should initialize GroupSystemAccess without GroupSystemAccessId" duration="2"/>
65
+ <testCase name="GroupSystemAccess init should initialize GroupSystemAccess with GroupSystemAccessId" duration="3"/>
66
+ <testCase name="GroupSystemAccess init should throw an error if GroupSystemAccessId is not found" duration="5"/>
67
+ </file>
68
+ <file path="C:\Work\sso\__tests__\unit\components\group\group.spec.ts">
69
+ <testCase name="Group should initialize a group with valid GroupCode" duration="4"/>
70
+ <testCase name="Group should throw an error when initializing a group with invalid GroupCode" duration="5"/>
71
+ <testCase name="Group should throw an error when initializing a group with an error" duration="2"/>
72
+ </file>
73
+ <file path="C:\Work\sso\__tests__\unit\components\group-reporting-user\group-reporting-user.spec.ts">
74
+ <testCase name="GroupReportingUser init should initialize GroupReportingUser without GroupReportingUserId" duration="3"/>
75
+ <testCase name="GroupReportingUser init should initialize GroupReportingUser with valid GroupReportingUserId" duration="2"/>
76
+ <testCase name="GroupReportingUser init should throw ClassError when GroupReportingUser is not found" duration="8"/>
77
+ <testCase name="GroupReportingUser init should throw ClassError when failed to initialize GroupReportingUser" duration="1"/>
78
+ </file>
79
+ <file path="C:\Work\sso\__tests__\unit\components\system-privilege\system-privilege.spec.ts">
80
+ <testCase name="SystemPrivilege constructor should create a new SystemPrivilege instance" duration="2"/>
81
+ <testCase name="SystemPrivilege init should initialize SystemPrivilege without PrivilegeCode" duration="1"/>
82
+ <testCase name="SystemPrivilege init should initialize SystemPrivilege with PrivilegeCode" duration="2"/>
83
+ <testCase name="SystemPrivilege init should throw an error if PrivilegeCode is not found" duration="4"/>
84
+ </file>
85
+ <file path="C:\Work\sso\__tests__\unit\components\user-group\user-group.spec.ts">
86
+ <testCase name="UserGroup constructor should create a new UserGroup instance" duration="3"/>
87
+ <testCase name="UserGroup init should initialize UserGroup with valid UserGroupId" duration="2"/>
88
+ <testCase name="UserGroup init should throw ClassError when UserGroupId is not found" duration="5"/>
89
+ </file>
90
+ <file path="C:\Work\sso\__tests__\unit\components\user-object-privilege\user-object-privilege.spec.ts">
91
+ <testCase name="UserObjectPrivilege constructor should create a new UserObjectPrivilege instance" duration="2"/>
92
+ <testCase name="UserObjectPrivilege init should initialize UserObjectPrivilege with valid ObjectPrivilegeId" duration="5"/>
93
+ <testCase name="UserObjectPrivilege init should throw ClassError when ObjectPrivilegeId is not found" duration="4"/>
94
+ </file>
95
+ <file path="C:\Work\sso\__tests__\unit\components\group-privilege\group-privilege.spec.ts">
96
+ <testCase name="GroupPrivilege should initialize with GroupPrivilegeAttr" duration="6"/>
97
+ <testCase name="GroupPrivilege should throw ClassError when GroupPrivilegeAttr is not found" duration="4"/>
98
+ <testCase name="GroupPrivilege should initialize with default values" duration="1"/>
99
+ </file>
100
+ <file path="C:\Work\sso\__tests__\unit\components\user-system-access\user-system-access.spec.ts">
101
+ <testCase name="UserSystemAccess constructor should create a new UserSystemAccess instance" duration="2"/>
102
+ <testCase name="UserSystemAccess init should initialize UserSystemAccess with valid UserSystemAccessId" duration="2"/>
103
+ <testCase name="UserSystemAccess init should throw ClassError when UserSystemAccessId is not found" duration="1"/>
104
+ </file>
105
+ <file path="C:\Work\sso\__tests__\unit\components\user-privilege\user-privilege.spec.ts">
106
+ <testCase name="UserPrivilege constructor should create a new UserPrivilege instance" duration="2"/>
107
+ <testCase name="UserPrivilege init should initialize UserPrivilege with valid UserPrivilegeId" duration="2"/>
108
+ <testCase name="UserPrivilege init should throw ClassError when UserPrivilegeId is not found" duration="4"/>
109
+ </file>
110
+ <file path="C:\Work\sso\__tests__\unit\session\session.service.spec.ts">
111
+ <testCase name="session.service should return session service when instansiated" duration="2"/>
112
+ <testCase name="session.service should able to write session data" duration="3"/>
113
+ <testCase name="session.service should able to refresh session data" duration="3"/>
114
+ </file>
115
+ <file path="C:\Work\sso\__tests__\unit\system-privilege\system-privilage.spec.ts">
116
+ <testCase name="SystemPrivilege should be true" duration="2"/>
117
+ </file>
118
+ <file path="C:\Work\sso\__tests__\unit\components\password-hash\password-hash.service.spec.ts">
119
+ <testCase name="password-hash.service should return hash password" duration="2"/>
120
+ <testCase name="password-hash.service should return true when verify password" duration="1"/>
121
+ </file>
122
+ <file path="C:\Work\sso\__tests__\unit\redis-client\redis.service.spec.ts">
123
+ <testCase name="redis.service should return redis service when instansiated" duration="1"/>
124
+ <testCase name="redis.service should able to write and read redis" duration="2"/>
125
+ </file>
126
+ <file path="C:\Work\sso\__tests__\unit\components\login-user\l.spec.ts">
127
+ <testCase name="SystemPrivilege should be true" duration="1"/>
128
+ </file>
129
129
  </testExecutions>
@@ -1,40 +1,40 @@
1
-
2
- -- example to create sso-user
3
- CREATE USER 'sso_user'@'environment' IDENTIFIED BY 'password';
4
-
5
- -- example to grant neccesary access to run migration
6
- GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_authorization_codes TO 'sso_user'@'localhost' WITH GRANT OPTION;
7
- GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_bearer_tokens TO 'sso_user'@'localhost' WITH GRANT OPTION;
8
- GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_building_types TO 'sso_user'@'localhost' WITH GRANT OPTION;
9
- GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_buildings TO 'sso_user'@'localhost' WITH GRANT OPTION;
10
- GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_cities TO 'sso_user'@'localhost' WITH GRANT OPTION;
11
- GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_companies TO 'sso_user'@'localhost' WITH GRANT OPTION;
12
- GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_countries TO 'sso_user'@'localhost' WITH GRANT OPTION;
13
- GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_departments TO 'sso_user'@'localhost' WITH GRANT OPTION;
14
- GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_grouproleprivilege TO 'sso_user'@'localhost' WITH GRANT OPTION;
15
- GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_groupsystemaccess TO 'sso_user'@'localhost' WITH GRANT OPTION;
16
- GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_groupsystemprivilege TO 'sso_user'@'localhost' WITH GRANT OPTION;
17
- GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_groupsystemrole TO 'sso_user'@'localhost' WITH GRANT OPTION;
18
- GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_oauth_tokens TO 'sso_user'@'localhost' WITH GRANT OPTION;
19
- GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_roles TO 'sso_user'@'localhost' WITH GRANT OPTION;
20
- GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_sequelize_meta TO 'sso_user'@'localhost' WITH GRANT OPTION;
21
- GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_staff_types TO 'sso_user'@'localhost' WITH GRANT OPTION;
22
- GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_staffs TO 'sso_user'@'localhost' WITH GRANT OPTION;
23
- GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_states TO 'sso_user'@'localhost' WITH GRANT OPTION;
24
- GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_system_accesses TO 'sso_user'@'localhost' WITH GRANT OPTION;
25
- GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_systemprivilege TO 'sso_user'@'localhost' WITH GRANT OPTION;
26
- GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_systemrole TO 'sso_user'@'localhost' WITH GRANT OPTION;
27
- GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_systemroleprivilege TO 'sso_user'@'localhost' WITH GRANT OPTION;
28
- GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_systems TO 'sso_user'@'localhost' WITH GRANT OPTION;
29
- GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_updated_history TO 'sso_user'@'localhost' WITH GRANT OPTION;
30
- GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_user_roles TO 'sso_user'@'localhost' WITH GRANT OPTION;
31
- GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_usergroup TO 'sso_user'@'localhost' WITH GRANT OPTION;
32
- GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_users TO 'sso_user'@'localhost' WITH GRANT OPTION;
33
- GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_usersystemprivilege TO 'sso_user'@'localhost' WITH GRANT OPTION;
34
- GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_usersystemrole TO 'sso_user'@'localhost' WITH GRANT OPTION;
35
- GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_UserUserGroup TO 'sso_user'@'localhost' WITH GRANT OPTION;
36
- GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production._prisma_migrations TO 'sso_user'@'localhost' WITH GRANT OPTION;
37
-
38
-
39
- -- Grant user to create, alter, drop, references on the database (required for creating shadow tables)
1
+
2
+ -- example to create sso-user
3
+ CREATE USER 'sso_user'@'environment' IDENTIFIED BY 'password';
4
+
5
+ -- example to grant neccesary access to run migration
6
+ GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_authorization_codes TO 'sso_user'@'localhost' WITH GRANT OPTION;
7
+ GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_bearer_tokens TO 'sso_user'@'localhost' WITH GRANT OPTION;
8
+ GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_building_types TO 'sso_user'@'localhost' WITH GRANT OPTION;
9
+ GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_buildings TO 'sso_user'@'localhost' WITH GRANT OPTION;
10
+ GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_cities TO 'sso_user'@'localhost' WITH GRANT OPTION;
11
+ GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_companies TO 'sso_user'@'localhost' WITH GRANT OPTION;
12
+ GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_countries TO 'sso_user'@'localhost' WITH GRANT OPTION;
13
+ GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_departments TO 'sso_user'@'localhost' WITH GRANT OPTION;
14
+ GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_grouproleprivilege TO 'sso_user'@'localhost' WITH GRANT OPTION;
15
+ GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_groupsystemaccess TO 'sso_user'@'localhost' WITH GRANT OPTION;
16
+ GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_groupsystemprivilege TO 'sso_user'@'localhost' WITH GRANT OPTION;
17
+ GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_groupsystemrole TO 'sso_user'@'localhost' WITH GRANT OPTION;
18
+ GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_oauth_tokens TO 'sso_user'@'localhost' WITH GRANT OPTION;
19
+ GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_roles TO 'sso_user'@'localhost' WITH GRANT OPTION;
20
+ GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_sequelize_meta TO 'sso_user'@'localhost' WITH GRANT OPTION;
21
+ GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_staff_types TO 'sso_user'@'localhost' WITH GRANT OPTION;
22
+ GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_staffs TO 'sso_user'@'localhost' WITH GRANT OPTION;
23
+ GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_states TO 'sso_user'@'localhost' WITH GRANT OPTION;
24
+ GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_system_accesses TO 'sso_user'@'localhost' WITH GRANT OPTION;
25
+ GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_systemprivilege TO 'sso_user'@'localhost' WITH GRANT OPTION;
26
+ GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_systemrole TO 'sso_user'@'localhost' WITH GRANT OPTION;
27
+ GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_systemroleprivilege TO 'sso_user'@'localhost' WITH GRANT OPTION;
28
+ GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_systems TO 'sso_user'@'localhost' WITH GRANT OPTION;
29
+ GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_updated_history TO 'sso_user'@'localhost' WITH GRANT OPTION;
30
+ GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_user_roles TO 'sso_user'@'localhost' WITH GRANT OPTION;
31
+ GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_usergroup TO 'sso_user'@'localhost' WITH GRANT OPTION;
32
+ GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_users TO 'sso_user'@'localhost' WITH GRANT OPTION;
33
+ GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_usersystemprivilege TO 'sso_user'@'localhost' WITH GRANT OPTION;
34
+ GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_usersystemrole TO 'sso_user'@'localhost' WITH GRANT OPTION;
35
+ GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_UserUserGroup TO 'sso_user'@'localhost' WITH GRANT OPTION;
36
+ GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production._prisma_migrations TO 'sso_user'@'localhost' WITH GRANT OPTION;
37
+
38
+
39
+ -- Grant user to create, alter, drop, references on the database (required for creating shadow tables)
40
40
  GRANT CREATE, ALTER, DROP, REFERENCES ON shadow_database.* TO 'sso_user'@'localhost' WITH GRANT OPTION;
@@ -2,6 +2,7 @@ import { ILoginUser } from '@tomei/general';
2
2
  import { User } from './user';
3
3
  import { ISystemLogin } from '../../../src/interfaces/system-login.interface';
4
4
  import { ISessionService } from '../../session/interfaces/session-service.interface';
5
+ import UserModel from '../../models/user.entity';
5
6
  export declare class LoginUser extends User implements ILoginUser {
6
7
  session: {
7
8
  Id: any;
@@ -10,4 +11,7 @@ export declare class LoginUser extends User implements ILoginUser {
10
11
  checkPrivileges(systemCode: string, privilegeName: string): Promise<boolean>;
11
12
  checkSession(systemCode: string, sessionId: string, userId: string): Promise<ISystemLogin>;
12
13
  logout(systemCode: string): Promise<void>;
14
+ getProfile(dbTransaction: any): Promise<UserModel>;
15
+ static getGroups(loginUser: User, dbTransaction: any): Promise<import("../../models/user-group.entity").default[]>;
16
+ static getSystems(loginUser: User, dbTransaction: any): Promise<any[]>;
13
17
  }
@@ -11,9 +11,11 @@ var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, ge
11
11
  Object.defineProperty(exports, "__esModule", { value: true });
12
12
  exports.LoginUser = void 0;
13
13
  const user_1 = require("./user");
14
+ const group_entity_1 = require("../../models/group.entity");
14
15
  const redis_service_1 = require("../../redis-client/redis.service");
15
16
  const user_repository_1 = require("./user.repository");
16
17
  const staff_entity_1 = require("../../models/staff.entity");
18
+ const user_entity_1 = require("../../models/user.entity");
17
19
  class LoginUser extends user_1.User {
18
20
  constructor() {
19
21
  super(...arguments);
@@ -138,6 +140,65 @@ class LoginUser extends user_1.User {
138
140
  }
139
141
  });
140
142
  }
143
+ getProfile(dbTransaction) {
144
+ return __awaiter(this, void 0, void 0, function* () {
145
+ const user = yield user_1.User._Repository.findOne({
146
+ where: {
147
+ UserId: this.UserId,
148
+ Status: 'Active',
149
+ },
150
+ include: [
151
+ {
152
+ model: staff_entity_1.default,
153
+ },
154
+ ],
155
+ transaction: dbTransaction,
156
+ });
157
+ return user;
158
+ });
159
+ }
160
+ static getGroups(loginUser, dbTransaction) {
161
+ return __awaiter(this, void 0, void 0, function* () {
162
+ const userGroups = yield user_1.User._UserGroupRepo.findAll({
163
+ where: {
164
+ UserId: loginUser.ObjectId,
165
+ Status: 'Active',
166
+ },
167
+ include: [{ model: user_entity_1.default, as: 'User' }, { model: group_entity_1.default }],
168
+ transaction: dbTransaction,
169
+ });
170
+ return userGroups;
171
+ });
172
+ }
173
+ static getSystems(loginUser, dbTransaction) {
174
+ return __awaiter(this, void 0, void 0, function* () {
175
+ const groups = yield this.getGroups(loginUser, dbTransaction);
176
+ const systemAccess = yield user_1.User.combineSystemAccess(loginUser, dbTransaction, groups);
177
+ const output = [];
178
+ if (systemAccess) {
179
+ for (let i = 0; i < systemAccess.length; i++) {
180
+ const system = yield user_1.User._SystemRepository.findOne({
181
+ where: {
182
+ SystemCode: systemAccess[i].SystemCode,
183
+ Status: 'Active',
184
+ },
185
+ });
186
+ output.push({
187
+ UserSystemAccessId: systemAccess[i].UserSystemAccessId,
188
+ UserId: systemAccess[i].UserId,
189
+ SystemCode: systemAccess[i].SystemCode,
190
+ Status: systemAccess[i].Status,
191
+ CreatedById: systemAccess[i].CreatedById,
192
+ UpdatedById: systemAccess[i].UpdatedById,
193
+ CreatedAt: systemAccess[i].CreatedAt,
194
+ UpdatedAt: systemAccess[i].UpdatedAt,
195
+ System: system,
196
+ });
197
+ }
198
+ }
199
+ return output;
200
+ });
201
+ }
141
202
  }
142
203
  exports.LoginUser = LoginUser;
143
204
  //# sourceMappingURL=login-user.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"login-user.js","sourceRoot":"","sources":["../../../../src/components/login-user/login-user.ts"],"names":[],"mappings":";;;;;;;;;;;;AACA,iCAA8B;AAI9B,oEAAgE;AAChE,uDAAmD;AAEnD,4DAA8C;AAG9C,MAAa,SAAU,SAAQ,WAAI;IAAnC;;QACE,YAAO,GAAG;YACR,EAAE,EAAE,IAAI;SACT,CAAC;IAiJJ,CAAC;IA/IC,MAAM,CAAO,IAAI;6DACf,cAA+B,EAC/B,MAAe,EACf,aAAa,GAAG,IAAI;YAEpB,WAAI,CAAC,aAAa,GAAG,MAAM,4BAAY,CAAC,IAAI,EAAE,CAAC;YAC/C,IAAI,MAAM,EAAE,CAAC;gBACX,IAAI,aAAa,EAAE,CAAC;oBAClB,WAAI,CAAC,WAAW,GAAG,IAAI,gCAAc,EAAE,CAAC;gBAC1C,CAAC;gBACD,MAAM,IAAI,GAAG,MAAM,WAAI,CAAC,WAAW,CAAC,OAAO,CAAC;oBAC1C,KAAK,EAAE;wBACL,MAAM,EAAE,MAAM;qBACf;oBACD,OAAO,EAAE;wBACP;4BACE,KAAK,EAAE,sBAAK;yBACb;qBACF;oBACD,WAAW,EAAE,aAAa;iBAC3B,CAAC,CAAC;gBAEH,IAAI,CAAC,IAAI,EAAE,CAAC;oBACV,MAAM,IAAI,KAAK,CAAC,sBAAsB,CAAC,CAAC;gBAC1C,CAAC;gBAED,IAAI,IAAI,EAAE,CAAC;oBACT,MAAM,QAAQ,GAAc;wBAC1B,MAAM,EAAE,IAAI,CAAC,MAAM;wBACnB,QAAQ,EAAE,IAAI,CAAC,QAAQ;wBACvB,QAAQ,EAAE,CAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,QAAQ,KAAI,IAAI;wBAChC,IAAI,EAAE,CAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,IAAI,KAAI,IAAI;wBACxB,MAAM,EAAE,CAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,MAAM,KAAI,IAAI;wBAC5B,SAAS,EAAE,CAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,SAAS,KAAI,IAAI;wBAClC,KAAK,EAAE,IAAI,CAAC,KAAK;wBACjB,QAAQ,EAAE,IAAI,CAAC,QAAQ;wBACvB,MAAM,EAAE,IAAI,CAAC,MAAM;wBACnB,wBAAwB,EAAE,IAAI,CAAC,wBAAwB;wBACvD,YAAY,EAAE,IAAI,CAAC,YAAY;wBAC/B,WAAW,EAAE,IAAI,CAAC,WAAW;wBAC7B,UAAU,EAAE,IAAI,CAAC,UAAU;wBAC3B,SAAS,EAAE,IAAI,CAAC,SAAS;wBACzB,aAAa,EAAE,IAAI,CAAC,aAAa;wBACjC,uBAAuB,EAAE,IAAI,CAAC,uBAAuB;wBACrD,iBAAiB,EAAE,IAAI,CAAC,iBAAiB;wBACzC,qBAAqB,EAAE,IAAI,CAAC,qBAAqB;wBACjD,sBAAsB,EAAE,IAAI,CAAC,sBAAsB;wBACnD,YAAY,EAAE,IAAI,CAAC,YAAY;wBAC/B,iBAAiB,EAAE,IAAI,CAAC,iBAAiB;wBACzC,WAAW,EAAE,IAAI,CAAC,WAAW;wBAC7B,SAAS,EAAE,IAAI,CAAC,SAAS;wBACzB,WAAW,EAAE,IAAI,CAAC,WAAW;wBAC7B,SAAS,EAAE,IAAI,CAAC,SAAS;wBACzB,MAAM,EAAE,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,KAAK;qBACpB,CAAC;oBAEF,OAAO,IAAI,SAAS,CAAC,cAAc,EAAE,aAAa,EAAE,QAAQ,CAAC,CAAC;gBAChE,CAAC;qBAAM,CAAC;oBACN,MAAM,IAAI,KAAK,CAAC,gBAAgB,CAAC,CAAC;gBACpC,CAAC;YACH,CAAC;YACD,OAAO,IAAI,SAAS,CAAC,cAAc,EAAE,aAAa,CAAC,CAAC;QACtD,CAAC;KAAA;IAEK,eAAe,CACnB,UAAkB,EAClB,aAAqB;;YAErB,IAAI,CAAC;gBACH,IAAI,CAAC,IAAI,CAAC,QAAQ,EAAE,CAAC;oBACnB,MAAM,IAAI,KAAK,CAAC,6BAA6B,CAAC,CAAC;gBACjD,CAAC;gBAED,MAAM,WAAW,GAAG,MAAM,IAAI,CAAC,eAAe,CAAC,mBAAmB,CAChE,IAAI,CAAC,QAAQ,CACd,CAAC;gBAEF,MAAM,WAAW,GAAG,WAAW,CAAC,YAAY,CAAC,IAAI,CAC/C,CAAC,MAAM,EAAE,EAAE,CAAC,MAAM,CAAC,IAAI,KAAK,UAAU,CACvC,CAAC;gBAEF,IAAI,CAAC,WAAW,EAAE,CAAC;oBACjB,OAAO,KAAK,CAAC;gBACf,CAAC;gBAED,MAAM,UAAU,GAAG,WAAW,CAAC,UAAU,CAAC;gBAC1C,MAAM,YAAY,GAAG,UAAU,CAAC,QAAQ,CAAC,aAAa,CAAC,CAAC;gBACxD,OAAO,YAAY,CAAC;YACtB,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,MAAM,KAAK,CAAC;YACd,CAAC;QACH,CAAC;KAAA;IAEK,YAAY,CAChB,UAAkB,EAClB,SAAiB,EACjB,MAAc;;YAEd,IAAI,CAAC;gBACH,MAAM,WAAW,GACf,MAAM,IAAI,CAAC,eAAe,CAAC,mBAAmB,CAAC,MAAM,CAAC,CAAC;gBAEzD,IAAI,WAAW,CAAC,YAAY,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;oBAC1C,MAAM,IAAI,KAAK,CAAC,kBAAkB,CAAC,CAAC;gBACtC,CAAC;gBAED,MAAM,WAAW,GAAG,WAAW,CAAC,YAAY,CAAC,IAAI,CAC/C,CAAC,EAAE,EAAE,EAAE,CAAC,EAAE,CAAC,IAAI,KAAK,UAAU,CAC/B,CAAC;gBAEF,IAAI,CAAC,WAAW,EAAE,CAAC;oBACjB,MAAM,IAAI,KAAK,CAAC,kBAAkB,CAAC,CAAC;gBACtC,CAAC;gBAED,IAAI,WAAW,CAAC,SAAS,KAAK,SAAS,EAAE,CAAC;oBACxC,MAAM,IAAI,KAAK,CAAC,kBAAkB,CAAC,CAAC;gBACtC,CAAC;gBAED,MAAM,IAAI,CAAC,eAAe,CAAC,eAAe,CAAC,MAAM,CAAC,CAAC;gBAEnD,OAAO,WAAW,CAAC;YACrB,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,MAAM,KAAK,CAAC;YACd,CAAC;QACH,CAAC;KAAA;IAEK,MAAM,CAAC,UAAkB;;YAC7B,IAAI,CAAC;gBACH,IAAI,CAAC,IAAI,CAAC,QAAQ,EAAE,CAAC;oBACnB,MAAM,IAAI,KAAK,CAAC,6BAA6B,CAAC,CAAC;gBACjD,CAAC;gBACD,MAAM,WAAW,GAAG,MAAM,IAAI,CAAC,eAAe,CAAC,mBAAmB,CAChE,IAAI,CAAC,QAAQ,CACd,CAAC;gBACF,MAAM,KAAK,GAAG,WAAW,CAAC,YAAY,CAAC,SAAS,CAC9C,CAAC,MAAM,EAAE,EAAE,CAAC,MAAM,CAAC,IAAI,KAAK,UAAU,CACvC,CAAC;gBACF,WAAW,CAAC,YAAY,CAAC,MAAM,CAAC,KAAK,EAAE,CAAC,CAAC,CAAC;gBAC1C,IAAI,CAAC,eAAe,CAAC,cAAc,CAAC,IAAI,CAAC,QAAQ,EAAE,WAAW,CAAC,CAAC;YAClE,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,MAAM,KAAK,CAAC;YACd,CAAC;QACH,CAAC;KAAA;CACF;AApJD,8BAoJC"}
1
+ {"version":3,"file":"login-user.js","sourceRoot":"","sources":["../../../../src/components/login-user/login-user.ts"],"names":[],"mappings":";;;;;;;;;;;;AACA,iCAA8B;AAE9B,4DAAmD;AAEnD,oEAAgE;AAChE,uDAAmD;AAEnD,4DAA8C;AAC9C,0DAAiD;AAGjD,MAAa,SAAU,SAAQ,WAAI;IAAnC;;QACE,YAAO,GAAG;YACR,EAAE,EAAE,IAAI;SACT,CAAC;IAsNJ,CAAC;IApNC,MAAM,CAAO,IAAI;6DACf,cAA+B,EAC/B,MAAe,EACf,aAAa,GAAG,IAAI;YAEpB,WAAI,CAAC,aAAa,GAAG,MAAM,4BAAY,CAAC,IAAI,EAAE,CAAC;YAC/C,IAAI,MAAM,EAAE,CAAC;gBACX,IAAI,aAAa,EAAE,CAAC;oBAClB,WAAI,CAAC,WAAW,GAAG,IAAI,gCAAc,EAAE,CAAC;gBAC1C,CAAC;gBACD,MAAM,IAAI,GAAG,MAAM,WAAI,CAAC,WAAW,CAAC,OAAO,CAAC;oBAC1C,KAAK,EAAE;wBACL,MAAM,EAAE,MAAM;qBACf;oBACD,OAAO,EAAE;wBACP;4BACE,KAAK,EAAE,sBAAK;yBACb;qBACF;oBACD,WAAW,EAAE,aAAa;iBAC3B,CAAC,CAAC;gBAEH,IAAI,CAAC,IAAI,EAAE,CAAC;oBACV,MAAM,IAAI,KAAK,CAAC,sBAAsB,CAAC,CAAC;gBAC1C,CAAC;gBAED,IAAI,IAAI,EAAE,CAAC;oBACT,MAAM,QAAQ,GAAc;wBAC1B,MAAM,EAAE,IAAI,CAAC,MAAM;wBACnB,QAAQ,EAAE,IAAI,CAAC,QAAQ;wBACvB,QAAQ,EAAE,CAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,QAAQ,KAAI,IAAI;wBAChC,IAAI,EAAE,CAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,IAAI,KAAI,IAAI;wBACxB,MAAM,EAAE,CAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,MAAM,KAAI,IAAI;wBAC5B,SAAS,EAAE,CAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,SAAS,KAAI,IAAI;wBAClC,KAAK,EAAE,IAAI,CAAC,KAAK;wBACjB,QAAQ,EAAE,IAAI,CAAC,QAAQ;wBACvB,MAAM,EAAE,IAAI,CAAC,MAAM;wBACnB,wBAAwB,EAAE,IAAI,CAAC,wBAAwB;wBACvD,YAAY,EAAE,IAAI,CAAC,YAAY;wBAC/B,WAAW,EAAE,IAAI,CAAC,WAAW;wBAC7B,UAAU,EAAE,IAAI,CAAC,UAAU;wBAC3B,SAAS,EAAE,IAAI,CAAC,SAAS;wBACzB,aAAa,EAAE,IAAI,CAAC,aAAa;wBACjC,uBAAuB,EAAE,IAAI,CAAC,uBAAuB;wBACrD,iBAAiB,EAAE,IAAI,CAAC,iBAAiB;wBACzC,qBAAqB,EAAE,IAAI,CAAC,qBAAqB;wBACjD,sBAAsB,EAAE,IAAI,CAAC,sBAAsB;wBACnD,YAAY,EAAE,IAAI,CAAC,YAAY;wBAC/B,iBAAiB,EAAE,IAAI,CAAC,iBAAiB;wBACzC,WAAW,EAAE,IAAI,CAAC,WAAW;wBAC7B,SAAS,EAAE,IAAI,CAAC,SAAS;wBACzB,WAAW,EAAE,IAAI,CAAC,WAAW;wBAC7B,SAAS,EAAE,IAAI,CAAC,SAAS;wBACzB,MAAM,EAAE,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,KAAK;qBACpB,CAAC;oBAEF,OAAO,IAAI,SAAS,CAAC,cAAc,EAAE,aAAa,EAAE,QAAQ,CAAC,CAAC;gBAChE,CAAC;qBAAM,CAAC;oBACN,MAAM,IAAI,KAAK,CAAC,gBAAgB,CAAC,CAAC;gBACpC,CAAC;YACH,CAAC;YACD,OAAO,IAAI,SAAS,CAAC,cAAc,EAAE,aAAa,CAAC,CAAC;QACtD,CAAC;KAAA;IAEK,eAAe,CACnB,UAAkB,EAClB,aAAqB;;YAErB,IAAI,CAAC;gBACH,IAAI,CAAC,IAAI,CAAC,QAAQ,EAAE,CAAC;oBACnB,MAAM,IAAI,KAAK,CAAC,6BAA6B,CAAC,CAAC;gBACjD,CAAC;gBAED,MAAM,WAAW,GAAG,MAAM,IAAI,CAAC,eAAe,CAAC,mBAAmB,CAChE,IAAI,CAAC,QAAQ,CACd,CAAC;gBAEF,MAAM,WAAW,GAAG,WAAW,CAAC,YAAY,CAAC,IAAI,CAC/C,CAAC,MAAM,EAAE,EAAE,CAAC,MAAM,CAAC,IAAI,KAAK,UAAU,CACvC,CAAC;gBAEF,IAAI,CAAC,WAAW,EAAE,CAAC;oBACjB,OAAO,KAAK,CAAC;gBACf,CAAC;gBAED,MAAM,UAAU,GAAG,WAAW,CAAC,UAAU,CAAC;gBAC1C,MAAM,YAAY,GAAG,UAAU,CAAC,QAAQ,CAAC,aAAa,CAAC,CAAC;gBACxD,OAAO,YAAY,CAAC;YACtB,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,MAAM,KAAK,CAAC;YACd,CAAC;QACH,CAAC;KAAA;IAEK,YAAY,CAChB,UAAkB,EAClB,SAAiB,EACjB,MAAc;;YAEd,IAAI,CAAC;gBACH,MAAM,WAAW,GACf,MAAM,IAAI,CAAC,eAAe,CAAC,mBAAmB,CAAC,MAAM,CAAC,CAAC;gBAEzD,IAAI,WAAW,CAAC,YAAY,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;oBAC1C,MAAM,IAAI,KAAK,CAAC,kBAAkB,CAAC,CAAC;gBACtC,CAAC;gBAED,MAAM,WAAW,GAAG,WAAW,CAAC,YAAY,CAAC,IAAI,CAC/C,CAAC,EAAE,EAAE,EAAE,CAAC,EAAE,CAAC,IAAI,KAAK,UAAU,CAC/B,CAAC;gBAEF,IAAI,CAAC,WAAW,EAAE,CAAC;oBACjB,MAAM,IAAI,KAAK,CAAC,kBAAkB,CAAC,CAAC;gBACtC,CAAC;gBAED,IAAI,WAAW,CAAC,SAAS,KAAK,SAAS,EAAE,CAAC;oBACxC,MAAM,IAAI,KAAK,CAAC,kBAAkB,CAAC,CAAC;gBACtC,CAAC;gBAED,MAAM,IAAI,CAAC,eAAe,CAAC,eAAe,CAAC,MAAM,CAAC,CAAC;gBAEnD,OAAO,WAAW,CAAC;YACrB,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,MAAM,KAAK,CAAC;YACd,CAAC;QACH,CAAC;KAAA;IAEK,MAAM,CAAC,UAAkB;;YAC7B,IAAI,CAAC;gBACH,IAAI,CAAC,IAAI,CAAC,QAAQ,EAAE,CAAC;oBACnB,MAAM,IAAI,KAAK,CAAC,6BAA6B,CAAC,CAAC;gBACjD,CAAC;gBACD,MAAM,WAAW,GAAG,MAAM,IAAI,CAAC,eAAe,CAAC,mBAAmB,CAChE,IAAI,CAAC,QAAQ,CACd,CAAC;gBACF,MAAM,KAAK,GAAG,WAAW,CAAC,YAAY,CAAC,SAAS,CAC9C,CAAC,MAAM,EAAE,EAAE,CAAC,MAAM,CAAC,IAAI,KAAK,UAAU,CACvC,CAAC;gBACF,WAAW,CAAC,YAAY,CAAC,MAAM,CAAC,KAAK,EAAE,CAAC,CAAC,CAAC;gBAC1C,IAAI,CAAC,eAAe,CAAC,cAAc,CAAC,IAAI,CAAC,QAAQ,EAAE,WAAW,CAAC,CAAC;YAClE,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,MAAM,KAAK,CAAC;YACd,CAAC;QACH,CAAC;KAAA;IAEK,UAAU,CAAC,aAAkB;;YACjC,MAAM,IAAI,GAAG,MAAM,WAAI,CAAC,WAAW,CAAC,OAAO,CAAC;gBAC1C,KAAK,EAAE;oBACL,MAAM,EAAE,IAAI,CAAC,MAAM;oBACnB,MAAM,EAAE,QAAQ;iBACjB;gBACD,OAAO,EAAE;oBACP;wBACE,KAAK,EAAE,sBAAK;qBACb;iBACF;gBACD,WAAW,EAAE,aAAa;aAC3B,CAAC,CAAC;YACH,OAAO,IAAI,CAAC;QACd,CAAC;KAAA;IAEM,MAAM,CAAO,SAAS,CAAC,SAAe,EAAE,aAAkB;;YAI/D,MAAM,UAAU,GAAG,MAAM,WAAI,CAAC,cAAc,CAAC,OAAO,CAAC;gBACnD,KAAK,EAAE;oBACL,MAAM,EAAE,SAAS,CAAC,QAAQ;oBAC1B,MAAM,EAAE,QAAQ;iBACjB;gBACD,OAAO,EAAE,CAAC,EAAE,KAAK,EAAE,qBAAS,EAAE,EAAE,EAAE,MAAM,EAAE,EAAE,EAAE,KAAK,EAAE,sBAAU,EAAE,CAAC;gBAClE,WAAW,EAAE,aAAa;aAC3B,CAAC,CAAC;YAEH,OAAO,UAAU,CAAC;QACpB,CAAC;KAAA;IAEM,MAAM,CAAO,UAAU,CAAC,SAAe,EAAE,aAAkB;;YAIhE,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,SAAS,CAAC,SAAS,EAAE,aAAa,CAAC,CAAC;YAC9D,MAAM,YAAY,GAAG,MAAM,WAAI,CAAC,mBAAmB,CACjD,SAAS,EACT,aAAa,EACb,MAAM,CACP,CAAC;YACF,MAAM,MAAM,GAAG,EAAE,CAAC;YAClB,IAAI,YAAY,EAAE,CAAC;gBACjB,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,YAAY,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;oBAC7C,MAAM,MAAM,GAAG,MAAM,WAAI,CAAC,iBAAiB,CAAC,OAAO,CAAC;wBAClD,KAAK,EAAE;4BACL,UAAU,EAAE,YAAY,CAAC,CAAC,CAAC,CAAC,UAAU;4BACtC,MAAM,EAAE,QAAQ;yBACjB;qBACF,CAAC,CAAC;oBACH,MAAM,CAAC,IAAI,CAAC;wBACV,kBAAkB,EAAE,YAAY,CAAC,CAAC,CAAC,CAAC,kBAAkB;wBACtD,MAAM,EAAE,YAAY,CAAC,CAAC,CAAC,CAAC,MAAM;wBAC9B,UAAU,EAAE,YAAY,CAAC,CAAC,CAAC,CAAC,UAAU;wBACtC,MAAM,EAAE,YAAY,CAAC,CAAC,CAAC,CAAC,MAAM;wBAC9B,WAAW,EAAE,YAAY,CAAC,CAAC,CAAC,CAAC,WAAW;wBACxC,WAAW,EAAE,YAAY,CAAC,CAAC,CAAC,CAAC,WAAW;wBACxC,SAAS,EAAE,YAAY,CAAC,CAAC,CAAC,CAAC,SAAS;wBACpC,SAAS,EAAE,YAAY,CAAC,CAAC,CAAC,CAAC,SAAS;wBACpC,MAAM,EAAE,MAAM;qBACf,CAAC,CAAC;gBACL,CAAC;YACH,CAAC;YAGD,OAAO,MAAM,CAAC;QAChB,CAAC;KAAA;CACF;AAzND,8BAyNC"}
@@ -2,10 +2,12 @@ import { UserBase } from '@tomei/general';
2
2
  import { ISessionService } from '../../session/interfaces/session-service.interface';
3
3
  import { IUserAttr } from './interfaces/user-info.interface';
4
4
  import { UserRepository } from './user.repository';
5
+ import { SystemRepository } from '../system/system.repository';
5
6
  import { UserGroupRepository } from '../user-group/user-group.repository';
6
7
  import { YN } from '../../enum/yn.enum';
7
8
  import { UserStatus } from '../../enum';
8
9
  import GroupModel from '../../models/group.entity';
10
+ import { ISystemAccess } from './interfaces/system-access.interface';
9
11
  import { UserSystemAccessRepository } from '../user-system-access/user-system-access.repository';
10
12
  import GroupSystemAccessModel from '../../models/group-system-access.entity';
11
13
  import { RedisService } from '../../redis-client/redis.service';
@@ -46,7 +48,7 @@ export declare class User extends UserBase {
46
48
  private static _UserPrivilegeRepo;
47
49
  private static _UserObjectPrivilegeRepo;
48
50
  private static _GroupObjectPrivilegeRepo;
49
- private static _SystemRepository;
51
+ protected static _SystemRepository: SystemRepository;
50
52
  protected static _UserSystemAccessRepo: UserSystemAccessRepository;
51
53
  private static _GroupSystemAccessRepo;
52
54
  private static _GroupRepo;
@@ -125,10 +127,8 @@ export declare class User extends UserBase {
125
127
  private incrementFailedLoginAttemptCount;
126
128
  static shouldReleaseLock(LastFailedLoginAt: any): boolean;
127
129
  private static releaseLock;
128
- static getGroups(loginUser: User, dbTransaction: any): Promise<import("../../models/user-group.entity").default[]>;
129
130
  protected static getInheritedSystemAccess(dbTransaction: any, group: GroupModel): Promise<GroupSystemAccessModel[]>;
130
- private static combineSystemAccess;
131
- static getSystems(loginUser: User, dbTransaction: any): Promise<any[]>;
131
+ protected static combineSystemAccess(loginUser: User, dbTransaction: any, groups: any): Promise<ISystemAccess[]>;
132
132
  private static check2FA;
133
133
  static setup2FA(userId: number, dbTransaction: any): Promise<any>;
134
134
  verify2FASetup(userId: number, mfaToken: string, systemCode?: string, dbTransaction?: any): Promise<string | false>;
@@ -23,7 +23,6 @@ const enum_1 = require("../../enum");
23
23
  const config_1 = require("@tomei/config");
24
24
  const sequelize_1 = require("sequelize");
25
25
  const activity_history_1 = require("@tomei/activity-history");
26
- const user_entity_1 = require("../../models/user.entity");
27
26
  const group_entity_1 = require("../../models/group.entity");
28
27
  const group_system_access_repository_1 = require("../group-system-access/group-system-access.repository");
29
28
  const group_repository_1 = require("../group/group.repository");
@@ -1187,24 +1186,6 @@ class User extends general_1.UserBase {
1187
1186
  transaction: dbTransaction,
1188
1187
  });
1189
1188
  }
1190
- static getGroups(loginUser, dbTransaction) {
1191
- return __awaiter(this, void 0, void 0, function* () {
1192
- const systemCode = config_1.ApplicationConfig.getComponentConfigValue('system-code');
1193
- const isPrivileged = yield loginUser.checkPrivileges(systemCode, 'UserGroup - List Own');
1194
- if (!isPrivileged) {
1195
- throw new Error('You do not have permission to list UserGroup.');
1196
- }
1197
- const userGroups = yield User._UserGroupRepo.findAll({
1198
- where: {
1199
- UserId: loginUser.ObjectId,
1200
- Status: 'Active',
1201
- },
1202
- include: [{ model: user_entity_1.default, as: 'User' }, { model: group_entity_1.default }],
1203
- transaction: dbTransaction,
1204
- });
1205
- return userGroups;
1206
- });
1207
- }
1208
1189
  static getInheritedSystemAccess(dbTransaction, group) {
1209
1190
  return __awaiter(this, void 0, void 0, function* () {
1210
1191
  const dataSystemAccesses = yield User._GroupSystemAccessRepo.findAll({
@@ -1252,40 +1233,6 @@ class User extends general_1.UserBase {
1252
1233
  return Array.from(uniqueAccess);
1253
1234
  });
1254
1235
  }
1255
- static getSystems(loginUser, dbTransaction) {
1256
- return __awaiter(this, void 0, void 0, function* () {
1257
- const systemCode = config_1.ApplicationConfig.getComponentConfigValue('system-code');
1258
- const isPrivileged = yield loginUser.checkPrivileges(systemCode, 'System – List Own');
1259
- if (!isPrivileged) {
1260
- throw new Error('You do not have permission to list UserGroup.');
1261
- }
1262
- const groups = yield User.getGroups(loginUser, dbTransaction);
1263
- const systemAccess = yield User.combineSystemAccess(loginUser, dbTransaction, groups);
1264
- const output = [];
1265
- if (systemAccess) {
1266
- for (let i = 0; i < systemAccess.length; i++) {
1267
- const system = yield User._SystemRepository.findOne({
1268
- where: {
1269
- SystemCode: systemAccess[i].SystemCode,
1270
- Status: 'Active',
1271
- },
1272
- });
1273
- output.push({
1274
- UserSystemAccessId: systemAccess[i].UserSystemAccessId,
1275
- UserId: systemAccess[i].UserId,
1276
- SystemCode: systemAccess[i].SystemCode,
1277
- Status: systemAccess[i].Status,
1278
- CreatedById: systemAccess[i].CreatedById,
1279
- UpdatedById: systemAccess[i].UpdatedById,
1280
- CreatedAt: systemAccess[i].CreatedAt,
1281
- UpdatedAt: systemAccess[i].UpdatedAt,
1282
- System: system,
1283
- });
1284
- }
1285
- }
1286
- return output;
1287
- });
1288
- }
1289
1236
  static check2FA(loginUser, dbTransaction) {
1290
1237
  return __awaiter(this, void 0, void 0, function* () {
1291
1238
  try {