@tomei/sso 0.60.4-dev.1 → 0.60.4-dev.11

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (173) hide show
  1. package/.commitlintrc.json +22 -22
  2. package/.gitlab-ci.yml +16 -16
  3. package/.husky/commit-msg +9 -9
  4. package/.husky/pre-commit +7 -7
  5. package/.prettierrc +4 -4
  6. package/Jenkinsfile +57 -57
  7. package/README.md +23 -23
  8. package/__tests__/unit/components/group/group.spec.ts +79 -79
  9. package/__tests__/unit/components/group-object-privilege/group-object-privilege.spec.ts +88 -88
  10. package/__tests__/unit/components/group-privilege/group-privilege.spec.ts +68 -68
  11. package/__tests__/unit/components/group-reporting-user/group-reporting-user.spec.ts +66 -66
  12. package/__tests__/unit/components/group-system-access/group-system-access.spec.ts +83 -83
  13. package/__tests__/unit/components/login-user/l.spec.ts +746 -746
  14. package/__tests__/unit/components/login-user/login.spec.ts +1164 -1164
  15. package/__tests__/unit/components/password-hash/password-hash.service.spec.ts +31 -31
  16. package/__tests__/unit/components/system/system.spec.ts +254 -254
  17. package/__tests__/unit/components/system-privilege/system-privilege.spec.ts +83 -83
  18. package/__tests__/unit/components/user-group/user-group.spec.ts +86 -86
  19. package/__tests__/unit/components/user-object-privilege/user-object-privilege.spec.ts +78 -78
  20. package/__tests__/unit/components/user-privilege/user-privilege.spec.ts +72 -72
  21. package/__tests__/unit/components/user-system-access/user-system-access.spec.ts +89 -89
  22. package/__tests__/unit/redis-client/redis.service.spec.ts +23 -23
  23. package/__tests__/unit/session/session.service.spec.ts +47 -47
  24. package/__tests__/unit/system-privilege/system-privilage.spec.ts +91 -91
  25. package/coverage/clover.xml +1452 -1452
  26. package/coverage/coverage-final.json +47 -47
  27. package/coverage/lcov-report/base.css +224 -224
  28. package/coverage/lcov-report/block-navigation.js +87 -87
  29. package/coverage/lcov-report/components/group/group.repository.ts.html +117 -117
  30. package/coverage/lcov-report/components/group/group.ts.html +327 -327
  31. package/coverage/lcov-report/components/group/index.html +130 -130
  32. package/coverage/lcov-report/components/group-object-privilege/group-object-privilege.repository.ts.html +117 -117
  33. package/coverage/lcov-report/components/group-object-privilege/group-object-privilege.ts.html +321 -321
  34. package/coverage/lcov-report/components/group-object-privilege/index.html +130 -130
  35. package/coverage/lcov-report/components/group-privilege/group-privilege.repository.ts.html +117 -117
  36. package/coverage/lcov-report/components/group-privilege/group-privilege.ts.html +303 -303
  37. package/coverage/lcov-report/components/group-privilege/index.html +130 -130
  38. package/coverage/lcov-report/components/group-reporting-user/group-reporting-user.repository.ts.html +117 -117
  39. package/coverage/lcov-report/components/group-reporting-user/group-reporting-user.ts.html +327 -327
  40. package/coverage/lcov-report/components/group-reporting-user/index.html +130 -130
  41. package/coverage/lcov-report/components/group-system-access/group-system-access.repository.ts.html +117 -117
  42. package/coverage/lcov-report/components/group-system-access/group-system-access.ts.html +309 -309
  43. package/coverage/lcov-report/components/group-system-access/index.html +130 -130
  44. package/coverage/lcov-report/components/login-history/index.html +115 -115
  45. package/coverage/lcov-report/components/login-history/login-history.repository.ts.html +117 -117
  46. package/coverage/lcov-report/components/login-user/index.html +130 -130
  47. package/coverage/lcov-report/components/login-user/login-user.ts.html +5015 -5008
  48. package/coverage/lcov-report/components/login-user/user.repository.ts.html +117 -117
  49. package/coverage/lcov-report/components/password-hash/index.html +115 -115
  50. package/coverage/lcov-report/components/password-hash/password-hash.service.ts.html +126 -126
  51. package/coverage/lcov-report/components/system/index.html +130 -130
  52. package/coverage/lcov-report/components/system/system.repository.ts.html +117 -117
  53. package/coverage/lcov-report/components/system/system.ts.html +909 -909
  54. package/coverage/lcov-report/components/system-privilege/index.html +130 -130
  55. package/coverage/lcov-report/components/system-privilege/system-privilege.repository.ts.html +120 -120
  56. package/coverage/lcov-report/components/system-privilege/system-privilege.ts.html +390 -390
  57. package/coverage/lcov-report/components/user-group/index.html +130 -130
  58. package/coverage/lcov-report/components/user-group/user-group.repository.ts.html +117 -117
  59. package/coverage/lcov-report/components/user-group/user-group.ts.html +354 -354
  60. package/coverage/lcov-report/components/user-object-privilege/index.html +130 -130
  61. package/coverage/lcov-report/components/user-object-privilege/user-object-privilege.repository.ts.html +117 -117
  62. package/coverage/lcov-report/components/user-object-privilege/user-object-privilege.ts.html +312 -312
  63. package/coverage/lcov-report/components/user-privilege/index.html +130 -130
  64. package/coverage/lcov-report/components/user-privilege/user-privilege.repository.ts.html +117 -117
  65. package/coverage/lcov-report/components/user-privilege/user-privilege.ts.html +306 -306
  66. package/coverage/lcov-report/components/user-system-access/index.html +130 -130
  67. package/coverage/lcov-report/components/user-system-access/user-system-access.repository.ts.html +117 -117
  68. package/coverage/lcov-report/components/user-system-access/user-system-access.ts.html +312 -312
  69. package/coverage/lcov-report/enum/group-type.enum.ts.html +108 -108
  70. package/coverage/lcov-report/enum/index.html +160 -160
  71. package/coverage/lcov-report/enum/index.ts.html +93 -93
  72. package/coverage/lcov-report/enum/user-status.enum.ts.html +105 -105
  73. package/coverage/lcov-report/enum/yn.enum.ts.html +96 -96
  74. package/coverage/lcov-report/index.html +370 -370
  75. package/coverage/lcov-report/models/group-object-privilege.entity.ts.html +333 -333
  76. package/coverage/lcov-report/models/group-privilege.entity.ts.html +315 -315
  77. package/coverage/lcov-report/models/group-reporting-user.entity.ts.html +339 -339
  78. package/coverage/lcov-report/models/group-system-access.entity.ts.html +324 -324
  79. package/coverage/lcov-report/models/group.entity.ts.html +435 -435
  80. package/coverage/lcov-report/models/index.html +310 -310
  81. package/coverage/lcov-report/models/login-history.entity.ts.html +252 -252
  82. package/coverage/lcov-report/models/staff.entity.ts.html +411 -411
  83. package/coverage/lcov-report/models/system-privilege.entity.ts.html +354 -354
  84. package/coverage/lcov-report/models/system.entity.ts.html +423 -423
  85. package/coverage/lcov-report/models/user-group.entity.ts.html +354 -354
  86. package/coverage/lcov-report/models/user-object-privilege.entity.ts.html +330 -330
  87. package/coverage/lcov-report/models/user-privilege.entity.ts.html +315 -315
  88. package/coverage/lcov-report/models/user-system-access.entity.ts.html +315 -315
  89. package/coverage/lcov-report/models/user.entity.ts.html +522 -522
  90. package/coverage/lcov-report/prettify.css +1 -1
  91. package/coverage/lcov-report/prettify.js +2 -2
  92. package/coverage/lcov-report/redis-client/index.html +115 -115
  93. package/coverage/lcov-report/redis-client/redis.service.ts.html +240 -240
  94. package/coverage/lcov-report/session/index.html +115 -115
  95. package/coverage/lcov-report/session/session.service.ts.html +246 -246
  96. package/coverage/lcov-report/sorter.js +196 -196
  97. package/coverage/lcov.info +2490 -2490
  98. package/coverage/test-report.xml +128 -128
  99. package/create-sso-user.sql +39 -39
  100. package/dist/__tests__/unit/components/group-privilege/group-privilege.test.d.ts +1 -0
  101. package/dist/__tests__/unit/components/group-privilege/group-privilege.test.js +71 -0
  102. package/dist/__tests__/unit/components/group-privilege/group-privilege.test.js.map +1 -0
  103. package/dist/__tests__/unit/components/login-user/login-user.spec.d.ts +0 -0
  104. package/dist/__tests__/unit/components/login-user/login-user.spec.js +6 -0
  105. package/dist/__tests__/unit/components/login-user/login-user.spec.js.map +1 -0
  106. package/dist/src/components/login-history/index.d.ts +1 -0
  107. package/dist/src/components/login-history/index.js +1 -0
  108. package/dist/src/components/login-history/index.js.map +1 -1
  109. package/dist/src/components/login-history/login-history.d.ts +23 -0
  110. package/dist/src/components/login-history/login-history.js +88 -0
  111. package/dist/src/components/login-history/login-history.js.map +1 -0
  112. package/dist/src/components/login-history/login-history.repository.d.ts +2 -2
  113. package/dist/src/components/login-history/login-history.repository.js.map +1 -1
  114. package/dist/src/components/login-user/interfaces/user-info.interface.d.ts +1 -0
  115. package/dist/src/components/login-user/login-user.js +1 -0
  116. package/dist/src/components/login-user/login-user.js.map +1 -1
  117. package/dist/src/components/login-user/user.d.ts +28 -3
  118. package/dist/src/components/login-user/user.js +357 -14
  119. package/dist/src/components/login-user/user.js.map +1 -1
  120. package/dist/src/components/user-system-access/user-system-access.js +1 -1
  121. package/dist/src/components/user-system-access/user-system-access.js.map +1 -1
  122. package/dist/src/interfaces/login-history-search-attr.interface.d.ts +8 -0
  123. package/dist/src/interfaces/login-history-search-attr.interface.js +3 -0
  124. package/dist/src/interfaces/login-history-search-attr.interface.js.map +1 -0
  125. package/dist/src/interfaces/login-history.interface.d.ts +11 -0
  126. package/dist/src/interfaces/login-history.interface.js +3 -0
  127. package/dist/src/interfaces/login-history.interface.js.map +1 -0
  128. package/dist/src/models/login-history.entity.d.ts +2 -2
  129. package/dist/src/models/login-history.entity.js +13 -13
  130. package/dist/src/models/login-history.entity.js.map +1 -1
  131. package/dist/src/models/user.entity.d.ts +1 -0
  132. package/dist/src/models/user.entity.js +8 -0
  133. package/dist/src/models/user.entity.js.map +1 -1
  134. package/dist/tsconfig.tsbuildinfo +1 -1
  135. package/eslint.config.mjs +58 -58
  136. package/jest.config.js +14 -14
  137. package/migrations/20240314080602-create-user-table.js +124 -124
  138. package/migrations/20240314080603-create-user-group-table.js +85 -85
  139. package/migrations/20240314080604-create-user-user-group-table.js +55 -55
  140. package/migrations/20240314080605-create-login-history-table.js +53 -53
  141. package/migrations/20240527064925-create-system-table.js +78 -78
  142. package/migrations/20240527064926-create-system-privilege-table.js +71 -71
  143. package/migrations/20240527065342-create-group-table.js +93 -93
  144. package/migrations/20240527065633-create-group-reporting-user-table.js +76 -76
  145. package/migrations/20240528011551-create-group-system-access-table.js +72 -72
  146. package/migrations/20240528023018-user-system-access-table.js +75 -75
  147. package/migrations/20240528032229-user-privilege-table.js +76 -76
  148. package/migrations/20240528063003-create-group-privilege-table.js +76 -76
  149. package/migrations/20240528063051-create-group-object-privilege-table.js +84 -84
  150. package/migrations/20240528063107-create-user-object-privilege-table.js +84 -84
  151. package/migrations/20240528063108-create-api-key-table.js +85 -85
  152. package/migrations/20241104104802-create-building-table.js +95 -95
  153. package/migrations/20250108091132-add-area-manager-user-id-to-building-table.js +14 -14
  154. package/migrations/20250108091133-add-passcode-to-user-table.js +36 -36
  155. package/migrations/20250210115636-create-user-reporting-hierarchy.js +76 -76
  156. package/migrations/20250326043818-crate-user-password-history.js +42 -42
  157. package/migrations/20250610070720-added-MFBypassYN-to-sso-user.js +30 -0
  158. package/package.json +90 -90
  159. package/sampledotenv +7 -7
  160. package/src/components/login-history/index.ts +1 -0
  161. package/src/components/login-history/login-history.repository.ts +4 -4
  162. package/src/components/login-history/login-history.ts +124 -0
  163. package/src/components/login-user/interfaces/user-info.interface.ts +1 -0
  164. package/src/components/login-user/login-user.ts +1 -0
  165. package/src/components/login-user/user.ts +435 -16
  166. package/src/components/user-system-access/user-system-access.ts +1 -1
  167. package/src/interfaces/login-history-search-attr.interface.ts +8 -0
  168. package/src/interfaces/login-history.interface.ts +11 -0
  169. package/src/models/login-history.entity.ts +2 -2
  170. package/src/models/user.entity.ts +7 -0
  171. package/tsconfig.build.json +5 -5
  172. package/tsconfig.json +23 -23
  173. package/sonar-project.properties +0 -23
@@ -1,84 +1,84 @@
1
- import { SystemPrivilege } from '../../../../src/components/system-privilege/system-privilege';
2
- import { SystemPrivilegeRepository } from '../../../../src/components/system-privilege/system-privilege.repository';
3
- import { ClassError } from '@tomei/general';
4
-
5
- describe('SystemPrivilege', () => {
6
- let systemPrivilege: SystemPrivilege;
7
- const systemPrivilegeAttr = {
8
- PrivilegeCode: 'test',
9
- SystemCode: 'test',
10
- Name: 'test',
11
- Description: 'test',
12
- Status: 'test',
13
- CreatedById: 1,
14
- CreatedAt: new Date(),
15
- UpdatedById: 1,
16
- UpdatedAt: new Date(),
17
- };
18
-
19
- beforeEach(() => {
20
- jest.resetAllMocks();
21
- });
22
-
23
- describe('constructor', () => {
24
- it('should create a new SystemPrivilege instance', () => {
25
- systemPrivilege = new (SystemPrivilege as any)(systemPrivilegeAttr);
26
-
27
- expect(systemPrivilege).toBeDefined();
28
- expect(systemPrivilege).toBeInstanceOf(SystemPrivilege);
29
- expect(systemPrivilege.PrivilegeCode).toBe(systemPrivilegeAttr.PrivilegeCode);
30
- expect(systemPrivilege.SystemCode).toBe(systemPrivilegeAttr.SystemCode);
31
- expect(systemPrivilege.Description).toBe(systemPrivilegeAttr.Description);
32
- expect(systemPrivilege.Status).toBe(systemPrivilegeAttr.Status);
33
- expect(systemPrivilege.CreatedById).toBe(systemPrivilegeAttr.CreatedById);
34
- expect(systemPrivilege.CreatedAt).toBe(systemPrivilegeAttr.CreatedAt);
35
- expect(systemPrivilege.UpdatedById).toBe(systemPrivilegeAttr.UpdatedById);
36
- expect(systemPrivilege.UpdatedAt).toBe(systemPrivilegeAttr.UpdatedAt);
37
- });
38
- });
39
-
40
- describe('init', () => {
41
- it('should initialize SystemPrivilege without PrivilegeCode', async () => {
42
- const systemPrivilege = await SystemPrivilege.init(null);
43
- expect(systemPrivilege).toBeDefined();
44
- expect(systemPrivilege).toBeInstanceOf(SystemPrivilege);
45
- expect(systemPrivilege.PrivilegeCode).toBeUndefined();
46
- expect(systemPrivilege.SystemCode).toBeUndefined();
47
- expect(systemPrivilege.Description).toBeUndefined();
48
- expect(systemPrivilege.Status).toBeUndefined();
49
- expect(systemPrivilege.CreatedById).toBeUndefined();
50
- expect(systemPrivilege.CreatedAt).toBeUndefined();
51
- expect(systemPrivilege.UpdatedById).toBeUndefined();
52
- expect(systemPrivilege.UpdatedAt).toBeUndefined();
53
- });
54
-
55
- it('should initialize SystemPrivilege with PrivilegeCode', async () => {
56
- const findByPkSpy = jest
57
- .spyOn(SystemPrivilegeRepository.prototype, 'findByPk')
58
- .mockResolvedValue(systemPrivilegeAttr as any);
59
-
60
- const systemPrivilege = await SystemPrivilege.init(null, 'test');
61
- expect(findByPkSpy).toHaveBeenCalledWith('test', {
62
- transaction: null,
63
- });
64
- expect(systemPrivilege).toBeDefined();
65
- expect(systemPrivilege).toBeInstanceOf(SystemPrivilege);
66
- expect(systemPrivilege.PrivilegeCode).toBe(systemPrivilegeAttr.PrivilegeCode);
67
- expect(systemPrivilege.SystemCode).toBe(systemPrivilegeAttr.SystemCode);
68
- expect(systemPrivilege.Description).toBe(systemPrivilegeAttr.Description);
69
- expect(systemPrivilege.Status).toBe(systemPrivilegeAttr.Status);
70
- expect(systemPrivilege.CreatedById).toBe(systemPrivilegeAttr.CreatedById);
71
- expect(systemPrivilege.CreatedAt).toBe(systemPrivilegeAttr.CreatedAt);
72
- expect(systemPrivilege.UpdatedById).toBe(systemPrivilegeAttr.UpdatedById);
73
- expect(systemPrivilege.UpdatedAt).toBe(systemPrivilegeAttr.UpdatedAt);
74
- });
75
-
76
- it('should throw an error if PrivilegeCode is not found', async () => {
77
- jest.spyOn(SystemPrivilegeRepository.prototype, 'findByPk').mockResolvedValue(null);
78
-
79
- await expect(SystemPrivilege.init(null, 'test')).rejects.toThrow(
80
- new ClassError('SystemPrivilege', 'SystemPrivilegeErrMsg00', 'System Privilege Not Found'),
81
- );
82
- });
83
- });
1
+ import { SystemPrivilege } from '../../../../src/components/system-privilege/system-privilege';
2
+ import { SystemPrivilegeRepository } from '../../../../src/components/system-privilege/system-privilege.repository';
3
+ import { ClassError } from '@tomei/general';
4
+
5
+ describe('SystemPrivilege', () => {
6
+ let systemPrivilege: SystemPrivilege;
7
+ const systemPrivilegeAttr = {
8
+ PrivilegeCode: 'test',
9
+ SystemCode: 'test',
10
+ Name: 'test',
11
+ Description: 'test',
12
+ Status: 'test',
13
+ CreatedById: 1,
14
+ CreatedAt: new Date(),
15
+ UpdatedById: 1,
16
+ UpdatedAt: new Date(),
17
+ };
18
+
19
+ beforeEach(() => {
20
+ jest.resetAllMocks();
21
+ });
22
+
23
+ describe('constructor', () => {
24
+ it('should create a new SystemPrivilege instance', () => {
25
+ systemPrivilege = new (SystemPrivilege as any)(systemPrivilegeAttr);
26
+
27
+ expect(systemPrivilege).toBeDefined();
28
+ expect(systemPrivilege).toBeInstanceOf(SystemPrivilege);
29
+ expect(systemPrivilege.PrivilegeCode).toBe(systemPrivilegeAttr.PrivilegeCode);
30
+ expect(systemPrivilege.SystemCode).toBe(systemPrivilegeAttr.SystemCode);
31
+ expect(systemPrivilege.Description).toBe(systemPrivilegeAttr.Description);
32
+ expect(systemPrivilege.Status).toBe(systemPrivilegeAttr.Status);
33
+ expect(systemPrivilege.CreatedById).toBe(systemPrivilegeAttr.CreatedById);
34
+ expect(systemPrivilege.CreatedAt).toBe(systemPrivilegeAttr.CreatedAt);
35
+ expect(systemPrivilege.UpdatedById).toBe(systemPrivilegeAttr.UpdatedById);
36
+ expect(systemPrivilege.UpdatedAt).toBe(systemPrivilegeAttr.UpdatedAt);
37
+ });
38
+ });
39
+
40
+ describe('init', () => {
41
+ it('should initialize SystemPrivilege without PrivilegeCode', async () => {
42
+ const systemPrivilege = await SystemPrivilege.init(null);
43
+ expect(systemPrivilege).toBeDefined();
44
+ expect(systemPrivilege).toBeInstanceOf(SystemPrivilege);
45
+ expect(systemPrivilege.PrivilegeCode).toBeUndefined();
46
+ expect(systemPrivilege.SystemCode).toBeUndefined();
47
+ expect(systemPrivilege.Description).toBeUndefined();
48
+ expect(systemPrivilege.Status).toBeUndefined();
49
+ expect(systemPrivilege.CreatedById).toBeUndefined();
50
+ expect(systemPrivilege.CreatedAt).toBeUndefined();
51
+ expect(systemPrivilege.UpdatedById).toBeUndefined();
52
+ expect(systemPrivilege.UpdatedAt).toBeUndefined();
53
+ });
54
+
55
+ it('should initialize SystemPrivilege with PrivilegeCode', async () => {
56
+ const findByPkSpy = jest
57
+ .spyOn(SystemPrivilegeRepository.prototype, 'findByPk')
58
+ .mockResolvedValue(systemPrivilegeAttr as any);
59
+
60
+ const systemPrivilege = await SystemPrivilege.init(null, 'test');
61
+ expect(findByPkSpy).toHaveBeenCalledWith('test', {
62
+ transaction: null,
63
+ });
64
+ expect(systemPrivilege).toBeDefined();
65
+ expect(systemPrivilege).toBeInstanceOf(SystemPrivilege);
66
+ expect(systemPrivilege.PrivilegeCode).toBe(systemPrivilegeAttr.PrivilegeCode);
67
+ expect(systemPrivilege.SystemCode).toBe(systemPrivilegeAttr.SystemCode);
68
+ expect(systemPrivilege.Description).toBe(systemPrivilegeAttr.Description);
69
+ expect(systemPrivilege.Status).toBe(systemPrivilegeAttr.Status);
70
+ expect(systemPrivilege.CreatedById).toBe(systemPrivilegeAttr.CreatedById);
71
+ expect(systemPrivilege.CreatedAt).toBe(systemPrivilegeAttr.CreatedAt);
72
+ expect(systemPrivilege.UpdatedById).toBe(systemPrivilegeAttr.UpdatedById);
73
+ expect(systemPrivilege.UpdatedAt).toBe(systemPrivilegeAttr.UpdatedAt);
74
+ });
75
+
76
+ it('should throw an error if PrivilegeCode is not found', async () => {
77
+ jest.spyOn(SystemPrivilegeRepository.prototype, 'findByPk').mockResolvedValue(null);
78
+
79
+ await expect(SystemPrivilege.init(null, 'test')).rejects.toThrow(
80
+ new ClassError('SystemPrivilege', 'SystemPrivilegeErrMsg00', 'System Privilege Not Found'),
81
+ );
82
+ });
83
+ });
84
84
  });
@@ -1,87 +1,87 @@
1
- import { UserGroup } from '../../../../src/components/user-group/user-group';
2
- import { UserGroupRepository } from '../../../../src/components/user-group/user-group.repository';
3
- import { ClassError } from '@tomei/general';
4
-
5
- describe('UserGroup', () => {
6
- let userGroup: UserGroup;
7
- const userGroupAttr = {
8
- UserGroupId: 1,
9
- UserId: 1,
10
- GroupCode: 'group1',
11
- Status: 'active',
12
- InheritGroupPrivilegeYN: 'yes',
13
- InheritGroupSystemAccessYN: 'yes',
14
- CreatedById: 1,
15
- CreatedAt: new Date(),
16
- UpdatedById: 1,
17
- UpdatedAt: new Date(),
18
- };
19
-
20
- beforeEach(() => {
21
- userGroup = new (UserGroup as any)(userGroupAttr);
22
- });
23
-
24
- afterEach(() => {
25
- jest.clearAllMocks();
26
- });
27
-
28
- describe('constructor', () => {
29
- it('should create a new UserGroup instance', () => {
30
- expect(userGroup).toBeDefined();
31
- expect(userGroup).toBeInstanceOf(UserGroup);
32
- expect(userGroup.UserGroupId).toBe(userGroupAttr.UserGroupId);
33
- expect(userGroup.UserId).toBe(userGroupAttr.UserId);
34
- expect(userGroup.GroupCode).toBe(userGroupAttr.GroupCode);
35
- expect(userGroup.Status).toBe(userGroupAttr.Status);
36
- expect(userGroup.InheritGroupPrivilegeYN).toBe(
37
- userGroupAttr.InheritGroupPrivilegeYN
38
- );
39
- expect(userGroup.InheritGroupSystemAccessYN).toBe(
40
- userGroupAttr.InheritGroupSystemAccessYN
41
- );
42
- expect(userGroup.CreatedById).toBe(userGroupAttr.CreatedById);
43
- expect(userGroup.CreatedAt).toBe(userGroupAttr.CreatedAt);
44
- expect(userGroup.UpdatedById).toBe(userGroupAttr.UpdatedById);
45
- expect(userGroup.UpdatedAt).toBe(userGroupAttr.UpdatedAt);
46
- });
47
- });
48
-
49
- describe('init', () => {
50
- it('should initialize UserGroup with valid UserGroupId', async () => {
51
- const findOneMock = jest
52
- .spyOn(UserGroupRepository.prototype, 'findOne')
53
- .mockResolvedValueOnce(userGroupAttr as any);
54
-
55
- const result = await UserGroup.init(null, 1);
56
-
57
- expect(findOneMock).toHaveBeenCalledTimes(1);
58
- expect(findOneMock).toHaveBeenCalledWith({
59
- where: { UserGroupId: 1 },
60
- transaction: null,
61
- });
62
- expect(result).toBeInstanceOf(UserGroup);
63
- expect(result.UserGroupId).toBe(userGroupAttr.UserGroupId);
64
- expect(result.UserId).toBe(userGroupAttr.UserId);
65
- expect(result.GroupCode).toBe(userGroupAttr.GroupCode);
66
- expect(result.Status).toBe(userGroupAttr.Status);
67
- expect(result.InheritGroupPrivilegeYN).toBe(
68
- userGroupAttr.InheritGroupPrivilegeYN
69
- );
70
- expect(result.InheritGroupSystemAccessYN).toBe(
71
- userGroupAttr.InheritGroupSystemAccessYN
72
- );
73
- expect(result.CreatedById).toBe(userGroupAttr.CreatedById);
74
- expect(result.CreatedAt).toBe(userGroupAttr.CreatedAt);
75
- expect(result.UpdatedById).toBe(userGroupAttr.UpdatedById);
76
- expect(result.UpdatedAt).toBe(userGroupAttr.UpdatedAt);
77
- });
78
-
79
- it('should throw ClassError when UserGroupId is not found', async () => {
80
- jest
81
- .spyOn(UserGroupRepository.prototype, 'findOne')
82
- .mockResolvedValueOnce(null);
83
-
84
- await expect(UserGroup.init(null, 1)).rejects.toThrow(ClassError);
85
- });
86
- });
1
+ import { UserGroup } from '../../../../src/components/user-group/user-group';
2
+ import { UserGroupRepository } from '../../../../src/components/user-group/user-group.repository';
3
+ import { ClassError } from '@tomei/general';
4
+
5
+ describe('UserGroup', () => {
6
+ let userGroup: UserGroup;
7
+ const userGroupAttr = {
8
+ UserGroupId: 1,
9
+ UserId: 1,
10
+ GroupCode: 'group1',
11
+ Status: 'active',
12
+ InheritGroupPrivilegeYN: 'yes',
13
+ InheritGroupSystemAccessYN: 'yes',
14
+ CreatedById: 1,
15
+ CreatedAt: new Date(),
16
+ UpdatedById: 1,
17
+ UpdatedAt: new Date(),
18
+ };
19
+
20
+ beforeEach(() => {
21
+ userGroup = new (UserGroup as any)(userGroupAttr);
22
+ });
23
+
24
+ afterEach(() => {
25
+ jest.clearAllMocks();
26
+ });
27
+
28
+ describe('constructor', () => {
29
+ it('should create a new UserGroup instance', () => {
30
+ expect(userGroup).toBeDefined();
31
+ expect(userGroup).toBeInstanceOf(UserGroup);
32
+ expect(userGroup.UserGroupId).toBe(userGroupAttr.UserGroupId);
33
+ expect(userGroup.UserId).toBe(userGroupAttr.UserId);
34
+ expect(userGroup.GroupCode).toBe(userGroupAttr.GroupCode);
35
+ expect(userGroup.Status).toBe(userGroupAttr.Status);
36
+ expect(userGroup.InheritGroupPrivilegeYN).toBe(
37
+ userGroupAttr.InheritGroupPrivilegeYN
38
+ );
39
+ expect(userGroup.InheritGroupSystemAccessYN).toBe(
40
+ userGroupAttr.InheritGroupSystemAccessYN
41
+ );
42
+ expect(userGroup.CreatedById).toBe(userGroupAttr.CreatedById);
43
+ expect(userGroup.CreatedAt).toBe(userGroupAttr.CreatedAt);
44
+ expect(userGroup.UpdatedById).toBe(userGroupAttr.UpdatedById);
45
+ expect(userGroup.UpdatedAt).toBe(userGroupAttr.UpdatedAt);
46
+ });
47
+ });
48
+
49
+ describe('init', () => {
50
+ it('should initialize UserGroup with valid UserGroupId', async () => {
51
+ const findOneMock = jest
52
+ .spyOn(UserGroupRepository.prototype, 'findOne')
53
+ .mockResolvedValueOnce(userGroupAttr as any);
54
+
55
+ const result = await UserGroup.init(null, 1);
56
+
57
+ expect(findOneMock).toHaveBeenCalledTimes(1);
58
+ expect(findOneMock).toHaveBeenCalledWith({
59
+ where: { UserGroupId: 1 },
60
+ transaction: null,
61
+ });
62
+ expect(result).toBeInstanceOf(UserGroup);
63
+ expect(result.UserGroupId).toBe(userGroupAttr.UserGroupId);
64
+ expect(result.UserId).toBe(userGroupAttr.UserId);
65
+ expect(result.GroupCode).toBe(userGroupAttr.GroupCode);
66
+ expect(result.Status).toBe(userGroupAttr.Status);
67
+ expect(result.InheritGroupPrivilegeYN).toBe(
68
+ userGroupAttr.InheritGroupPrivilegeYN
69
+ );
70
+ expect(result.InheritGroupSystemAccessYN).toBe(
71
+ userGroupAttr.InheritGroupSystemAccessYN
72
+ );
73
+ expect(result.CreatedById).toBe(userGroupAttr.CreatedById);
74
+ expect(result.CreatedAt).toBe(userGroupAttr.CreatedAt);
75
+ expect(result.UpdatedById).toBe(userGroupAttr.UpdatedById);
76
+ expect(result.UpdatedAt).toBe(userGroupAttr.UpdatedAt);
77
+ });
78
+
79
+ it('should throw ClassError when UserGroupId is not found', async () => {
80
+ jest
81
+ .spyOn(UserGroupRepository.prototype, 'findOne')
82
+ .mockResolvedValueOnce(null);
83
+
84
+ await expect(UserGroup.init(null, 1)).rejects.toThrow(ClassError);
85
+ });
86
+ });
87
87
  });
@@ -1,79 +1,79 @@
1
- import { UserObjectPrivilege } from '../../../../src/components/user-object-privilege/user-object-privilege';
2
- import { UserObjectPrivilegeRepository } from '../../../../src/components/user-object-privilege/user-object-privilege.repository';
3
- import { ClassError } from '@tomei/general';
4
-
5
- describe('UserObjectPrivilege', () => {
6
- let userObjectPrivilege: UserObjectPrivilege;
7
- const userObjectPrivilegeAttr = {
8
- ObjectPrivilegeId: 1,
9
- UserId: 1,
10
- SystemPrivilegeId: 'code1',
11
- ObjectId: 'object1',
12
- ObjectType: 'type1',
13
- CreatedAt: new Date(),
14
- UpdatedAt: new Date(),
15
- CreatedById: 1,
16
- UpdatedById: 1,
17
- };
18
-
19
- beforeEach(() => {
20
- userObjectPrivilege = new (UserObjectPrivilege as any)(userObjectPrivilegeAttr);
21
- });
22
-
23
- afterEach(() => {
24
- jest.clearAllMocks();
25
- });
26
-
27
- describe('constructor', () => {
28
- it('should create a new UserObjectPrivilege instance', () => {
29
- expect(userObjectPrivilege).toBeDefined();
30
- expect(userObjectPrivilege).toBeInstanceOf(UserObjectPrivilege);
31
- expect(userObjectPrivilege.ObjectPrivilegeId).toBe(userObjectPrivilegeAttr.ObjectPrivilegeId);
32
- expect(userObjectPrivilege.UserId).toBe(userObjectPrivilegeAttr.UserId);
33
- expect(userObjectPrivilege.SystemPrivilegeId).toBe(userObjectPrivilegeAttr.SystemPrivilegeId);
34
- expect(userObjectPrivilege.ObjectId).toBe(userObjectPrivilegeAttr.ObjectId);
35
- expect(userObjectPrivilege.ObjectType).toBe(userObjectPrivilegeAttr.ObjectType);
36
- expect(userObjectPrivilege.CreatedAt).toBe(userObjectPrivilegeAttr.CreatedAt);
37
- expect(userObjectPrivilege.UpdatedAt).toBe(userObjectPrivilegeAttr.UpdatedAt);
38
- expect(userObjectPrivilege.CreatedById).toBe(userObjectPrivilegeAttr.CreatedById);
39
- expect(userObjectPrivilege.UpdatedById).toBe(userObjectPrivilegeAttr.UpdatedById);
40
- });
41
- });
42
-
43
- describe('init', () => {
44
- it('should initialize UserObjectPrivilege with valid ObjectPrivilegeId', async () => {
45
- const findOneMock = jest
46
- .spyOn(UserObjectPrivilegeRepository.prototype, 'findOne')
47
- .mockResolvedValueOnce({
48
- ...userObjectPrivilegeAttr,
49
- get: () => userObjectPrivilegeAttr,
50
- } as any);
51
-
52
- const result = await UserObjectPrivilege.init(null, 1);
53
-
54
- expect(findOneMock).toHaveBeenCalledTimes(1);
55
- expect(findOneMock).toHaveBeenCalledWith({
56
- where: { ObjectPrivilegeId: 1 },
57
- transaction: null,
58
- });
59
- expect(result).toBeInstanceOf(UserObjectPrivilege);
60
- expect(result.ObjectPrivilegeId).toBe(userObjectPrivilegeAttr.ObjectPrivilegeId);
61
- expect(result.UserId).toBe(userObjectPrivilegeAttr.UserId);
62
- expect(result.SystemPrivilegeId).toBe(userObjectPrivilegeAttr.SystemPrivilegeId);
63
- expect(result.ObjectId).toBe(userObjectPrivilegeAttr.ObjectId);
64
- expect(result.ObjectType).toBe(userObjectPrivilegeAttr.ObjectType);
65
- expect(result.CreatedAt).toBe(userObjectPrivilegeAttr.CreatedAt);
66
- expect(result.UpdatedAt).toBe(userObjectPrivilegeAttr.UpdatedAt);
67
- expect(result.CreatedById).toBe(userObjectPrivilegeAttr.CreatedById);
68
- expect(result.UpdatedById).toBe(userObjectPrivilegeAttr.UpdatedById);
69
- });
70
-
71
- it('should throw ClassError when ObjectPrivilegeId is not found', async () => {
72
- jest
73
- .spyOn(UserObjectPrivilegeRepository.prototype, 'findOne')
74
- .mockResolvedValueOnce(null);
75
-
76
- await expect(UserObjectPrivilege.init(null, 1)).rejects.toThrow(ClassError);
77
- });
78
- });
1
+ import { UserObjectPrivilege } from '../../../../src/components/user-object-privilege/user-object-privilege';
2
+ import { UserObjectPrivilegeRepository } from '../../../../src/components/user-object-privilege/user-object-privilege.repository';
3
+ import { ClassError } from '@tomei/general';
4
+
5
+ describe('UserObjectPrivilege', () => {
6
+ let userObjectPrivilege: UserObjectPrivilege;
7
+ const userObjectPrivilegeAttr = {
8
+ ObjectPrivilegeId: 1,
9
+ UserId: 1,
10
+ SystemPrivilegeId: 'code1',
11
+ ObjectId: 'object1',
12
+ ObjectType: 'type1',
13
+ CreatedAt: new Date(),
14
+ UpdatedAt: new Date(),
15
+ CreatedById: 1,
16
+ UpdatedById: 1,
17
+ };
18
+
19
+ beforeEach(() => {
20
+ userObjectPrivilege = new (UserObjectPrivilege as any)(userObjectPrivilegeAttr);
21
+ });
22
+
23
+ afterEach(() => {
24
+ jest.clearAllMocks();
25
+ });
26
+
27
+ describe('constructor', () => {
28
+ it('should create a new UserObjectPrivilege instance', () => {
29
+ expect(userObjectPrivilege).toBeDefined();
30
+ expect(userObjectPrivilege).toBeInstanceOf(UserObjectPrivilege);
31
+ expect(userObjectPrivilege.ObjectPrivilegeId).toBe(userObjectPrivilegeAttr.ObjectPrivilegeId);
32
+ expect(userObjectPrivilege.UserId).toBe(userObjectPrivilegeAttr.UserId);
33
+ expect(userObjectPrivilege.SystemPrivilegeId).toBe(userObjectPrivilegeAttr.SystemPrivilegeId);
34
+ expect(userObjectPrivilege.ObjectId).toBe(userObjectPrivilegeAttr.ObjectId);
35
+ expect(userObjectPrivilege.ObjectType).toBe(userObjectPrivilegeAttr.ObjectType);
36
+ expect(userObjectPrivilege.CreatedAt).toBe(userObjectPrivilegeAttr.CreatedAt);
37
+ expect(userObjectPrivilege.UpdatedAt).toBe(userObjectPrivilegeAttr.UpdatedAt);
38
+ expect(userObjectPrivilege.CreatedById).toBe(userObjectPrivilegeAttr.CreatedById);
39
+ expect(userObjectPrivilege.UpdatedById).toBe(userObjectPrivilegeAttr.UpdatedById);
40
+ });
41
+ });
42
+
43
+ describe('init', () => {
44
+ it('should initialize UserObjectPrivilege with valid ObjectPrivilegeId', async () => {
45
+ const findOneMock = jest
46
+ .spyOn(UserObjectPrivilegeRepository.prototype, 'findOne')
47
+ .mockResolvedValueOnce({
48
+ ...userObjectPrivilegeAttr,
49
+ get: () => userObjectPrivilegeAttr,
50
+ } as any);
51
+
52
+ const result = await UserObjectPrivilege.init(null, 1);
53
+
54
+ expect(findOneMock).toHaveBeenCalledTimes(1);
55
+ expect(findOneMock).toHaveBeenCalledWith({
56
+ where: { ObjectPrivilegeId: 1 },
57
+ transaction: null,
58
+ });
59
+ expect(result).toBeInstanceOf(UserObjectPrivilege);
60
+ expect(result.ObjectPrivilegeId).toBe(userObjectPrivilegeAttr.ObjectPrivilegeId);
61
+ expect(result.UserId).toBe(userObjectPrivilegeAttr.UserId);
62
+ expect(result.SystemPrivilegeId).toBe(userObjectPrivilegeAttr.SystemPrivilegeId);
63
+ expect(result.ObjectId).toBe(userObjectPrivilegeAttr.ObjectId);
64
+ expect(result.ObjectType).toBe(userObjectPrivilegeAttr.ObjectType);
65
+ expect(result.CreatedAt).toBe(userObjectPrivilegeAttr.CreatedAt);
66
+ expect(result.UpdatedAt).toBe(userObjectPrivilegeAttr.UpdatedAt);
67
+ expect(result.CreatedById).toBe(userObjectPrivilegeAttr.CreatedById);
68
+ expect(result.UpdatedById).toBe(userObjectPrivilegeAttr.UpdatedById);
69
+ });
70
+
71
+ it('should throw ClassError when ObjectPrivilegeId is not found', async () => {
72
+ jest
73
+ .spyOn(UserObjectPrivilegeRepository.prototype, 'findOne')
74
+ .mockResolvedValueOnce(null);
75
+
76
+ await expect(UserObjectPrivilege.init(null, 1)).rejects.toThrow(ClassError);
77
+ });
78
+ });
79
79
  });
@@ -1,73 +1,73 @@
1
- import { UserPrivilege } from '../../../../src/components/user-privilege/user-privilege';
2
- import { UserPrivilegeRepository } from '../../../../src/components/user-privilege/user-privilege.repository';
3
- import { ClassError } from '@tomei/general';
4
-
5
- describe('UserPrivilege', () => {
6
- let userPrivilege: UserPrivilege;
7
- const userPrivilegeAttr = {
8
- UserPrivilegeId: 1,
9
- UserId: 1,
10
- SystemPrivilegeId: 'privilege1',
11
- Status: 'active',
12
- CreatedById: 1,
13
- CreatedAt: new Date(),
14
- UpdatedById: 1,
15
- UpdatedAt: new Date(),
16
- };
17
-
18
- beforeEach(() => {
19
- userPrivilege = new (UserPrivilege as any)(userPrivilegeAttr);
20
- });
21
-
22
- afterEach(() => {
23
- jest.clearAllMocks();
24
- });
25
-
26
- describe('constructor', () => {
27
- it('should create a new UserPrivilege instance', () => {
28
- expect(userPrivilege).toBeDefined();
29
- expect(userPrivilege).toBeInstanceOf(UserPrivilege);
30
- expect(userPrivilege.UserPrivilegeId).toBe(userPrivilegeAttr.UserPrivilegeId);
31
- expect(userPrivilege.UserId).toBe(userPrivilegeAttr.UserId);
32
- expect(userPrivilege.SystemPrivilegeId).toBe(userPrivilegeAttr.SystemPrivilegeId);
33
- expect(userPrivilege.Status).toBe(userPrivilegeAttr.Status);
34
- expect(userPrivilege.CreatedById).toBe(userPrivilegeAttr.CreatedById);
35
- expect(userPrivilege.CreatedAt).toBe(userPrivilegeAttr.CreatedAt);
36
- expect(userPrivilege.UpdatedById).toBe(userPrivilegeAttr.UpdatedById);
37
- expect(userPrivilege.UpdatedAt).toBe(userPrivilegeAttr.UpdatedAt);
38
- });
39
- });
40
-
41
- describe('init', () => {
42
- it('should initialize UserPrivilege with valid UserPrivilegeId', async () => {
43
- const findOneMock = jest
44
- .spyOn(UserPrivilegeRepository.prototype, 'findOne')
45
- .mockResolvedValueOnce(userPrivilegeAttr as any);
46
-
47
- const result = await UserPrivilege.init(null, 1);
48
-
49
- expect(findOneMock).toHaveBeenCalledTimes(1);
50
- expect(findOneMock).toHaveBeenCalledWith({
51
- where: { UserPrivilegeId: 1 },
52
- transaction: null,
53
- });
54
- expect(result).toBeInstanceOf(UserPrivilege);
55
- expect(result.UserPrivilegeId).toBe(userPrivilegeAttr.UserPrivilegeId);
56
- expect(result.UserId).toBe(userPrivilegeAttr.UserId);
57
- expect(result.SystemPrivilegeId).toBe(userPrivilegeAttr.SystemPrivilegeId);
58
- expect(result.Status).toBe(userPrivilegeAttr.Status);
59
- expect(result.CreatedById).toBe(userPrivilegeAttr.CreatedById);
60
- expect(result.CreatedAt).toBe(userPrivilegeAttr.CreatedAt);
61
- expect(result.UpdatedById).toBe(userPrivilegeAttr.UpdatedById);
62
- expect(result.UpdatedAt).toBe(userPrivilegeAttr.UpdatedAt);
63
- });
64
-
65
- it('should throw ClassError when UserPrivilegeId is not found', async () => {
66
- jest
67
- .spyOn(UserPrivilegeRepository.prototype, 'findOne')
68
- .mockResolvedValueOnce(null);
69
-
70
- await expect(UserPrivilege.init(null, 1)).rejects.toThrow(ClassError);
71
- });
72
- });
1
+ import { UserPrivilege } from '../../../../src/components/user-privilege/user-privilege';
2
+ import { UserPrivilegeRepository } from '../../../../src/components/user-privilege/user-privilege.repository';
3
+ import { ClassError } from '@tomei/general';
4
+
5
+ describe('UserPrivilege', () => {
6
+ let userPrivilege: UserPrivilege;
7
+ const userPrivilegeAttr = {
8
+ UserPrivilegeId: 1,
9
+ UserId: 1,
10
+ SystemPrivilegeId: 'privilege1',
11
+ Status: 'active',
12
+ CreatedById: 1,
13
+ CreatedAt: new Date(),
14
+ UpdatedById: 1,
15
+ UpdatedAt: new Date(),
16
+ };
17
+
18
+ beforeEach(() => {
19
+ userPrivilege = new (UserPrivilege as any)(userPrivilegeAttr);
20
+ });
21
+
22
+ afterEach(() => {
23
+ jest.clearAllMocks();
24
+ });
25
+
26
+ describe('constructor', () => {
27
+ it('should create a new UserPrivilege instance', () => {
28
+ expect(userPrivilege).toBeDefined();
29
+ expect(userPrivilege).toBeInstanceOf(UserPrivilege);
30
+ expect(userPrivilege.UserPrivilegeId).toBe(userPrivilegeAttr.UserPrivilegeId);
31
+ expect(userPrivilege.UserId).toBe(userPrivilegeAttr.UserId);
32
+ expect(userPrivilege.SystemPrivilegeId).toBe(userPrivilegeAttr.SystemPrivilegeId);
33
+ expect(userPrivilege.Status).toBe(userPrivilegeAttr.Status);
34
+ expect(userPrivilege.CreatedById).toBe(userPrivilegeAttr.CreatedById);
35
+ expect(userPrivilege.CreatedAt).toBe(userPrivilegeAttr.CreatedAt);
36
+ expect(userPrivilege.UpdatedById).toBe(userPrivilegeAttr.UpdatedById);
37
+ expect(userPrivilege.UpdatedAt).toBe(userPrivilegeAttr.UpdatedAt);
38
+ });
39
+ });
40
+
41
+ describe('init', () => {
42
+ it('should initialize UserPrivilege with valid UserPrivilegeId', async () => {
43
+ const findOneMock = jest
44
+ .spyOn(UserPrivilegeRepository.prototype, 'findOne')
45
+ .mockResolvedValueOnce(userPrivilegeAttr as any);
46
+
47
+ const result = await UserPrivilege.init(null, 1);
48
+
49
+ expect(findOneMock).toHaveBeenCalledTimes(1);
50
+ expect(findOneMock).toHaveBeenCalledWith({
51
+ where: { UserPrivilegeId: 1 },
52
+ transaction: null,
53
+ });
54
+ expect(result).toBeInstanceOf(UserPrivilege);
55
+ expect(result.UserPrivilegeId).toBe(userPrivilegeAttr.UserPrivilegeId);
56
+ expect(result.UserId).toBe(userPrivilegeAttr.UserId);
57
+ expect(result.SystemPrivilegeId).toBe(userPrivilegeAttr.SystemPrivilegeId);
58
+ expect(result.Status).toBe(userPrivilegeAttr.Status);
59
+ expect(result.CreatedById).toBe(userPrivilegeAttr.CreatedById);
60
+ expect(result.CreatedAt).toBe(userPrivilegeAttr.CreatedAt);
61
+ expect(result.UpdatedById).toBe(userPrivilegeAttr.UpdatedById);
62
+ expect(result.UpdatedAt).toBe(userPrivilegeAttr.UpdatedAt);
63
+ });
64
+
65
+ it('should throw ClassError when UserPrivilegeId is not found', async () => {
66
+ jest
67
+ .spyOn(UserPrivilegeRepository.prototype, 'findOne')
68
+ .mockResolvedValueOnce(null);
69
+
70
+ await expect(UserPrivilege.init(null, 1)).rejects.toThrow(ClassError);
71
+ });
72
+ });
73
73
  });