@tomei/sso 0.60.4-dev.10 → 0.60.4-dev.11
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.commitlintrc.json +22 -22
- package/.gitlab-ci.yml +16 -16
- package/.husky/commit-msg +9 -9
- package/.husky/pre-commit +7 -7
- package/.prettierrc +4 -4
- package/Jenkinsfile +57 -57
- package/README.md +23 -23
- package/__tests__/unit/components/group/group.spec.ts +79 -79
- package/__tests__/unit/components/group-object-privilege/group-object-privilege.spec.ts +88 -88
- package/__tests__/unit/components/group-privilege/group-privilege.spec.ts +68 -68
- package/__tests__/unit/components/group-reporting-user/group-reporting-user.spec.ts +66 -66
- package/__tests__/unit/components/group-system-access/group-system-access.spec.ts +83 -83
- package/__tests__/unit/components/login-user/l.spec.ts +746 -746
- package/__tests__/unit/components/login-user/login.spec.ts +1164 -1164
- package/__tests__/unit/components/password-hash/password-hash.service.spec.ts +31 -31
- package/__tests__/unit/components/system/system.spec.ts +254 -254
- package/__tests__/unit/components/system-privilege/system-privilege.spec.ts +83 -83
- package/__tests__/unit/components/user-group/user-group.spec.ts +86 -86
- package/__tests__/unit/components/user-object-privilege/user-object-privilege.spec.ts +78 -78
- package/__tests__/unit/components/user-privilege/user-privilege.spec.ts +72 -72
- package/__tests__/unit/components/user-system-access/user-system-access.spec.ts +89 -89
- package/__tests__/unit/redis-client/redis.service.spec.ts +23 -23
- package/__tests__/unit/session/session.service.spec.ts +47 -47
- package/__tests__/unit/system-privilege/system-privilage.spec.ts +91 -91
- package/coverage/clover.xml +1452 -1452
- package/coverage/coverage-final.json +47 -47
- package/coverage/lcov-report/base.css +224 -224
- package/coverage/lcov-report/block-navigation.js +87 -87
- package/coverage/lcov-report/components/group/group.repository.ts.html +117 -117
- package/coverage/lcov-report/components/group/group.ts.html +327 -327
- package/coverage/lcov-report/components/group/index.html +130 -130
- package/coverage/lcov-report/components/group-object-privilege/group-object-privilege.repository.ts.html +117 -117
- package/coverage/lcov-report/components/group-object-privilege/group-object-privilege.ts.html +321 -321
- package/coverage/lcov-report/components/group-object-privilege/index.html +130 -130
- package/coverage/lcov-report/components/group-privilege/group-privilege.repository.ts.html +117 -117
- package/coverage/lcov-report/components/group-privilege/group-privilege.ts.html +303 -303
- package/coverage/lcov-report/components/group-privilege/index.html +130 -130
- package/coverage/lcov-report/components/group-reporting-user/group-reporting-user.repository.ts.html +117 -117
- package/coverage/lcov-report/components/group-reporting-user/group-reporting-user.ts.html +327 -327
- package/coverage/lcov-report/components/group-reporting-user/index.html +130 -130
- package/coverage/lcov-report/components/group-system-access/group-system-access.repository.ts.html +117 -117
- package/coverage/lcov-report/components/group-system-access/group-system-access.ts.html +309 -309
- package/coverage/lcov-report/components/group-system-access/index.html +130 -130
- package/coverage/lcov-report/components/login-history/index.html +115 -115
- package/coverage/lcov-report/components/login-history/login-history.repository.ts.html +117 -117
- package/coverage/lcov-report/components/login-user/index.html +130 -130
- package/coverage/lcov-report/components/login-user/login-user.ts.html +5014 -5014
- package/coverage/lcov-report/components/login-user/user.repository.ts.html +117 -117
- package/coverage/lcov-report/components/password-hash/index.html +115 -115
- package/coverage/lcov-report/components/password-hash/password-hash.service.ts.html +126 -126
- package/coverage/lcov-report/components/system/index.html +130 -130
- package/coverage/lcov-report/components/system/system.repository.ts.html +117 -117
- package/coverage/lcov-report/components/system/system.ts.html +909 -909
- package/coverage/lcov-report/components/system-privilege/index.html +130 -130
- package/coverage/lcov-report/components/system-privilege/system-privilege.repository.ts.html +120 -120
- package/coverage/lcov-report/components/system-privilege/system-privilege.ts.html +390 -390
- package/coverage/lcov-report/components/user-group/index.html +130 -130
- package/coverage/lcov-report/components/user-group/user-group.repository.ts.html +117 -117
- package/coverage/lcov-report/components/user-group/user-group.ts.html +354 -354
- package/coverage/lcov-report/components/user-object-privilege/index.html +130 -130
- package/coverage/lcov-report/components/user-object-privilege/user-object-privilege.repository.ts.html +117 -117
- package/coverage/lcov-report/components/user-object-privilege/user-object-privilege.ts.html +312 -312
- package/coverage/lcov-report/components/user-privilege/index.html +130 -130
- package/coverage/lcov-report/components/user-privilege/user-privilege.repository.ts.html +117 -117
- package/coverage/lcov-report/components/user-privilege/user-privilege.ts.html +306 -306
- package/coverage/lcov-report/components/user-system-access/index.html +130 -130
- package/coverage/lcov-report/components/user-system-access/user-system-access.repository.ts.html +117 -117
- package/coverage/lcov-report/components/user-system-access/user-system-access.ts.html +312 -312
- package/coverage/lcov-report/enum/group-type.enum.ts.html +108 -108
- package/coverage/lcov-report/enum/index.html +160 -160
- package/coverage/lcov-report/enum/index.ts.html +93 -93
- package/coverage/lcov-report/enum/user-status.enum.ts.html +105 -105
- package/coverage/lcov-report/enum/yn.enum.ts.html +96 -96
- package/coverage/lcov-report/index.html +370 -370
- package/coverage/lcov-report/models/group-object-privilege.entity.ts.html +333 -333
- package/coverage/lcov-report/models/group-privilege.entity.ts.html +315 -315
- package/coverage/lcov-report/models/group-reporting-user.entity.ts.html +339 -339
- package/coverage/lcov-report/models/group-system-access.entity.ts.html +324 -324
- package/coverage/lcov-report/models/group.entity.ts.html +435 -435
- package/coverage/lcov-report/models/index.html +310 -310
- package/coverage/lcov-report/models/login-history.entity.ts.html +252 -252
- package/coverage/lcov-report/models/staff.entity.ts.html +411 -411
- package/coverage/lcov-report/models/system-privilege.entity.ts.html +354 -354
- package/coverage/lcov-report/models/system.entity.ts.html +423 -423
- package/coverage/lcov-report/models/user-group.entity.ts.html +354 -354
- package/coverage/lcov-report/models/user-object-privilege.entity.ts.html +330 -330
- package/coverage/lcov-report/models/user-privilege.entity.ts.html +315 -315
- package/coverage/lcov-report/models/user-system-access.entity.ts.html +315 -315
- package/coverage/lcov-report/models/user.entity.ts.html +522 -522
- package/coverage/lcov-report/prettify.css +1 -1
- package/coverage/lcov-report/prettify.js +2 -2
- package/coverage/lcov-report/redis-client/index.html +115 -115
- package/coverage/lcov-report/redis-client/redis.service.ts.html +240 -240
- package/coverage/lcov-report/session/index.html +115 -115
- package/coverage/lcov-report/session/session.service.ts.html +246 -246
- package/coverage/lcov-report/sorter.js +196 -196
- package/coverage/lcov.info +2490 -2490
- package/coverage/test-report.xml +128 -128
- package/create-sso-user.sql +39 -39
- package/dist/__tests__/unit/components/group-privilege/group-privilege.test.d.ts +1 -0
- package/dist/__tests__/unit/components/group-privilege/group-privilege.test.js +71 -0
- package/dist/__tests__/unit/components/group-privilege/group-privilege.test.js.map +1 -0
- package/dist/__tests__/unit/components/login-user/login-user.spec.d.ts +0 -0
- package/dist/__tests__/unit/components/login-user/login-user.spec.js +6 -0
- package/dist/__tests__/unit/components/login-user/login-user.spec.js.map +1 -0
- package/dist/src/components/login-user/user.js +1 -1
- package/dist/src/components/login-user/user.js.map +1 -1
- package/dist/tsconfig.tsbuildinfo +1 -1
- package/eslint.config.mjs +58 -58
- package/jest.config.js +14 -14
- package/migrations/20240314080602-create-user-table.js +124 -124
- package/migrations/20240314080603-create-user-group-table.js +85 -85
- package/migrations/20240314080604-create-user-user-group-table.js +55 -55
- package/migrations/20240314080605-create-login-history-table.js +53 -53
- package/migrations/20240527064925-create-system-table.js +78 -78
- package/migrations/20240527064926-create-system-privilege-table.js +71 -71
- package/migrations/20240527065342-create-group-table.js +93 -93
- package/migrations/20240527065633-create-group-reporting-user-table.js +76 -76
- package/migrations/20240528011551-create-group-system-access-table.js +72 -72
- package/migrations/20240528023018-user-system-access-table.js +75 -75
- package/migrations/20240528032229-user-privilege-table.js +76 -76
- package/migrations/20240528063003-create-group-privilege-table.js +76 -76
- package/migrations/20240528063051-create-group-object-privilege-table.js +84 -84
- package/migrations/20240528063107-create-user-object-privilege-table.js +84 -84
- package/migrations/20240528063108-create-api-key-table.js +85 -85
- package/migrations/20241104104802-create-building-table.js +95 -95
- package/migrations/20250108091132-add-area-manager-user-id-to-building-table.js +14 -14
- package/migrations/20250108091133-add-passcode-to-user-table.js +36 -36
- package/migrations/20250210115636-create-user-reporting-hierarchy.js +76 -76
- package/migrations/20250326043818-crate-user-password-history.js +42 -42
- package/migrations/20250610070720-added-MFBypassYN-to-sso-user.js +30 -30
- package/package.json +90 -90
- package/sampledotenv +7 -7
- package/src/components/login-user/user.ts +1 -1
- package/tsconfig.build.json +5 -5
- package/tsconfig.json +23 -23
package/coverage/test-report.xml
CHANGED
@@ -1,129 +1,129 @@
|
|
1
|
-
<?xml version="1.0" encoding="UTF-8"?>
|
2
|
-
<testExecutions version="1">
|
3
|
-
<file path="C:\Work\sso\__tests__\unit\components\login-user\login.spec.ts">
|
4
|
-
<testCase name="LoginUser init should initialize LoginUser with valid userId" duration="5"/>
|
5
|
-
<testCase name="LoginUser init should throw an error when user is not found" duration="20"/>
|
6
|
-
<testCase name="LoginUser checkSession should throw an error if session expired" duration="20"/>
|
7
|
-
<testCase name="LoginUser checkSession should refresh the session duration if session is valid" duration="2"/>
|
8
|
-
<testCase name="LoginUser shouldReleaseLock should return true if autoReleaseYN is "Y" and time difference is greater than minuteToAutoRelease" duration="2"/>
|
9
|
-
<testCase name="LoginUser shouldReleaseLock should return false if autoReleaseYN is "Y" and time difference is less than or equal to minuteToAutoRelease" duration="1"/>
|
10
|
-
<testCase name="LoginUser shouldReleaseLock should return false if autoReleaseYN is "N"" duration="1"/>
|
11
|
-
<testCase name="LoginUser releaseLock should release the lock for a user" duration="1"/>
|
12
|
-
<testCase name="LoginUser checkUserInfoDuplicated should throw an error if duplicate user info is found" duration="1"/>
|
13
|
-
<testCase name="LoginUser checkUserInfoDuplicated should not throw an error if duplicate user info is not found" duration="0"/>
|
14
|
-
<testCase name="LoginUser generateDefaultPassword should generate a default password with the specified length" duration="2"/>
|
15
|
-
<testCase name="LoginUser generateDefaultPassword should generate a default password with at least one capital letter" duration="1"/>
|
16
|
-
<testCase name="LoginUser generateDefaultPassword should generate a default password with at least one number" duration="1"/>
|
17
|
-
<testCase name="LoginUser generateDefaultPassword should generate a default password with at least one special character" duration="1"/>
|
18
|
-
<testCase name="LoginUser generateDefaultPassword should generate a default password without any non-acceptable characters" duration="1"/>
|
19
|
-
<testCase name="LoginUser setPassword should set the password for the user" duration="159"/>
|
20
|
-
<testCase name="LoginUser setPassword should throw an error if the password does not meet the security requirements" duration="13"/>
|
21
|
-
<testCase name="LoginUser create should create a new user record" duration="5"/>
|
22
|
-
<testCase name="LoginUser create should throw an error if user dont have the privilege to create new user" duration="2"/>
|
23
|
-
<testCase name="LoginUser create should throw an error if user email is missing" duration="2"/>
|
24
|
-
<testCase name="LoginUser incrementFailedLoginAttemptCount should increment FailedLoginAttemptCount and update user status" duration="1"/>
|
25
|
-
<testCase name="LoginUser incrementFailedLoginAttemptCount should throw an error if maxFailedLoginAttempts or autoReleaseYN is missing" duration="1"/>
|
26
|
-
<testCase name="LoginUser incrementFailedLoginAttemptCount should lock the user account if the failed login attempts exceed the maximum allowed" duration="1"/>
|
27
|
-
<testCase name="LoginUser incrementFailedLoginAttemptCount should permanently lock the user account if the failed login attempts exceed the maximum allowed and autoReleaseYN is N" duration="1"/>
|
28
|
-
<testCase name="LoginUser combineSystemAccess should combine user and group system access and remove duplicates" duration="1"/>
|
29
|
-
<testCase name="LoginUser checkPrivileges should return true if user has the specified privilege" duration="1"/>
|
30
|
-
<testCase name="LoginUser checkPrivileges should return false if user does not have the specified privilege" duration="1"/>
|
31
|
-
<testCase name="LoginUser checkPrivileges should throw an error if ObjectId is not set" duration="1"/>
|
32
|
-
<testCase name="LoginUser getObjectPrivileges should return an array of privileges" duration="1"/>
|
33
|
-
<testCase name="LoginUser getObjectPrivileges should throw an error if an exception occurs" duration="1"/>
|
34
|
-
<testCase name="LoginUser getUserPersonalPrivileges should return an array of privileges" duration="2"/>
|
35
|
-
<testCase name="LoginUser getUserPersonalPrivileges should throw an error if an error occurs" duration="1"/>
|
36
|
-
<testCase name="LoginUser getInheritedSystemAccess should return group system access with its parent group system access if applicable" duration="3"/>
|
37
|
-
</file>
|
38
|
-
<file path="C:\Work\sso\__tests__\unit\components\system\system.spec.ts">
|
39
|
-
<testCase name="System init should initialize a system when SystemCode is provided" duration="3"/>
|
40
|
-
<testCase name="System init should throw an error when SystemCode is not found" duration="8"/>
|
41
|
-
<testCase name="System init should initialize a new system when SystemCode is not provided" duration="1"/>
|
42
|
-
<testCase name="System createSystem should create a new system" duration="4"/>
|
43
|
-
<testCase name="System createSystem should throw an error when user does not have permission" duration="1"/>
|
44
|
-
<testCase name="System createSystem should throw an error when SystemCode is missing" duration="1"/>
|
45
|
-
<testCase name="System createSystem should throw an error when Name is missing" duration="1"/>
|
46
|
-
<testCase name="System createSystem should throw an error when Description is missing" duration="1"/>
|
47
|
-
<testCase name="System createSystem should throw an error when failed to create system" duration="5"/>
|
48
|
-
<testCase name="System setSystemCode should set the SystemCode when there is no duplicate" duration="1"/>
|
49
|
-
<testCase name="System setSystemCode should throw an error when SystemCode already exists" duration="1"/>
|
50
|
-
<testCase name="System setSystemCode should throw an error when failed to check duplicate SystemCode" duration="1"/>
|
51
|
-
<testCase name="System findAll should find all systems based on filter" duration="2"/>
|
52
|
-
<testCase name="System findAll should find all systems without pagination when page and rows are not provided" duration="1"/>
|
53
|
-
</file>
|
54
|
-
<file path="C:\Work\sso\__tests__\unit\components\group-object-privilege\group-object-privilege.spec.ts">
|
55
|
-
<testCase name="GroupObjectPrivilege should create an instance of GroupObjectPrivilege" duration="2"/>
|
56
|
-
<testCase name="GroupObjectPrivilege should have the correct TableName" duration="0"/>
|
57
|
-
<testCase name="GroupObjectPrivilege should have the correct properties" duration="1"/>
|
58
|
-
<testCase name="GroupObjectPrivilege init should return an instance of GroupObjectPrivilege when GroupObjectPrivilegeId is provided" duration="2"/>
|
59
|
-
<testCase name="GroupObjectPrivilege init should throw an error when GroupObjectPrivilegeId is provided but no GroupObjectPrivilege is found" duration="3"/>
|
60
|
-
<testCase name="GroupObjectPrivilege init should return a new instance of GroupObjectPrivilege when GroupObjectPrivilegeId is not provided" duration="3"/>
|
61
|
-
</file>
|
62
|
-
<file path="C:\Work\sso\__tests__\unit\components\group-system-access\group-system-access.spec.ts">
|
63
|
-
<testCase name="GroupSystemAccess should create a new GroupSystemAccess instance" duration="2"/>
|
64
|
-
<testCase name="GroupSystemAccess init should initialize GroupSystemAccess without GroupSystemAccessId" duration="2"/>
|
65
|
-
<testCase name="GroupSystemAccess init should initialize GroupSystemAccess with GroupSystemAccessId" duration="3"/>
|
66
|
-
<testCase name="GroupSystemAccess init should throw an error if GroupSystemAccessId is not found" duration="5"/>
|
67
|
-
</file>
|
68
|
-
<file path="C:\Work\sso\__tests__\unit\components\group\group.spec.ts">
|
69
|
-
<testCase name="Group should initialize a group with valid GroupCode" duration="4"/>
|
70
|
-
<testCase name="Group should throw an error when initializing a group with invalid GroupCode" duration="5"/>
|
71
|
-
<testCase name="Group should throw an error when initializing a group with an error" duration="2"/>
|
72
|
-
</file>
|
73
|
-
<file path="C:\Work\sso\__tests__\unit\components\group-reporting-user\group-reporting-user.spec.ts">
|
74
|
-
<testCase name="GroupReportingUser init should initialize GroupReportingUser without GroupReportingUserId" duration="3"/>
|
75
|
-
<testCase name="GroupReportingUser init should initialize GroupReportingUser with valid GroupReportingUserId" duration="2"/>
|
76
|
-
<testCase name="GroupReportingUser init should throw ClassError when GroupReportingUser is not found" duration="8"/>
|
77
|
-
<testCase name="GroupReportingUser init should throw ClassError when failed to initialize GroupReportingUser" duration="1"/>
|
78
|
-
</file>
|
79
|
-
<file path="C:\Work\sso\__tests__\unit\components\system-privilege\system-privilege.spec.ts">
|
80
|
-
<testCase name="SystemPrivilege constructor should create a new SystemPrivilege instance" duration="2"/>
|
81
|
-
<testCase name="SystemPrivilege init should initialize SystemPrivilege without PrivilegeCode" duration="1"/>
|
82
|
-
<testCase name="SystemPrivilege init should initialize SystemPrivilege with PrivilegeCode" duration="2"/>
|
83
|
-
<testCase name="SystemPrivilege init should throw an error if PrivilegeCode is not found" duration="4"/>
|
84
|
-
</file>
|
85
|
-
<file path="C:\Work\sso\__tests__\unit\components\user-group\user-group.spec.ts">
|
86
|
-
<testCase name="UserGroup constructor should create a new UserGroup instance" duration="3"/>
|
87
|
-
<testCase name="UserGroup init should initialize UserGroup with valid UserGroupId" duration="2"/>
|
88
|
-
<testCase name="UserGroup init should throw ClassError when UserGroupId is not found" duration="5"/>
|
89
|
-
</file>
|
90
|
-
<file path="C:\Work\sso\__tests__\unit\components\user-object-privilege\user-object-privilege.spec.ts">
|
91
|
-
<testCase name="UserObjectPrivilege constructor should create a new UserObjectPrivilege instance" duration="2"/>
|
92
|
-
<testCase name="UserObjectPrivilege init should initialize UserObjectPrivilege with valid ObjectPrivilegeId" duration="5"/>
|
93
|
-
<testCase name="UserObjectPrivilege init should throw ClassError when ObjectPrivilegeId is not found" duration="4"/>
|
94
|
-
</file>
|
95
|
-
<file path="C:\Work\sso\__tests__\unit\components\group-privilege\group-privilege.spec.ts">
|
96
|
-
<testCase name="GroupPrivilege should initialize with GroupPrivilegeAttr" duration="6"/>
|
97
|
-
<testCase name="GroupPrivilege should throw ClassError when GroupPrivilegeAttr is not found" duration="4"/>
|
98
|
-
<testCase name="GroupPrivilege should initialize with default values" duration="1"/>
|
99
|
-
</file>
|
100
|
-
<file path="C:\Work\sso\__tests__\unit\components\user-system-access\user-system-access.spec.ts">
|
101
|
-
<testCase name="UserSystemAccess constructor should create a new UserSystemAccess instance" duration="2"/>
|
102
|
-
<testCase name="UserSystemAccess init should initialize UserSystemAccess with valid UserSystemAccessId" duration="2"/>
|
103
|
-
<testCase name="UserSystemAccess init should throw ClassError when UserSystemAccessId is not found" duration="1"/>
|
104
|
-
</file>
|
105
|
-
<file path="C:\Work\sso\__tests__\unit\components\user-privilege\user-privilege.spec.ts">
|
106
|
-
<testCase name="UserPrivilege constructor should create a new UserPrivilege instance" duration="2"/>
|
107
|
-
<testCase name="UserPrivilege init should initialize UserPrivilege with valid UserPrivilegeId" duration="2"/>
|
108
|
-
<testCase name="UserPrivilege init should throw ClassError when UserPrivilegeId is not found" duration="4"/>
|
109
|
-
</file>
|
110
|
-
<file path="C:\Work\sso\__tests__\unit\session\session.service.spec.ts">
|
111
|
-
<testCase name="session.service should return session service when instansiated" duration="2"/>
|
112
|
-
<testCase name="session.service should able to write session data" duration="3"/>
|
113
|
-
<testCase name="session.service should able to refresh session data" duration="3"/>
|
114
|
-
</file>
|
115
|
-
<file path="C:\Work\sso\__tests__\unit\system-privilege\system-privilage.spec.ts">
|
116
|
-
<testCase name="SystemPrivilege should be true" duration="2"/>
|
117
|
-
</file>
|
118
|
-
<file path="C:\Work\sso\__tests__\unit\components\password-hash\password-hash.service.spec.ts">
|
119
|
-
<testCase name="password-hash.service should return hash password" duration="2"/>
|
120
|
-
<testCase name="password-hash.service should return true when verify password" duration="1"/>
|
121
|
-
</file>
|
122
|
-
<file path="C:\Work\sso\__tests__\unit\redis-client\redis.service.spec.ts">
|
123
|
-
<testCase name="redis.service should return redis service when instansiated" duration="1"/>
|
124
|
-
<testCase name="redis.service should able to write and read redis" duration="2"/>
|
125
|
-
</file>
|
126
|
-
<file path="C:\Work\sso\__tests__\unit\components\login-user\l.spec.ts">
|
127
|
-
<testCase name="SystemPrivilege should be true" duration="1"/>
|
128
|
-
</file>
|
1
|
+
<?xml version="1.0" encoding="UTF-8"?>
|
2
|
+
<testExecutions version="1">
|
3
|
+
<file path="C:\Work\sso\__tests__\unit\components\login-user\login.spec.ts">
|
4
|
+
<testCase name="LoginUser init should initialize LoginUser with valid userId" duration="5"/>
|
5
|
+
<testCase name="LoginUser init should throw an error when user is not found" duration="20"/>
|
6
|
+
<testCase name="LoginUser checkSession should throw an error if session expired" duration="20"/>
|
7
|
+
<testCase name="LoginUser checkSession should refresh the session duration if session is valid" duration="2"/>
|
8
|
+
<testCase name="LoginUser shouldReleaseLock should return true if autoReleaseYN is "Y" and time difference is greater than minuteToAutoRelease" duration="2"/>
|
9
|
+
<testCase name="LoginUser shouldReleaseLock should return false if autoReleaseYN is "Y" and time difference is less than or equal to minuteToAutoRelease" duration="1"/>
|
10
|
+
<testCase name="LoginUser shouldReleaseLock should return false if autoReleaseYN is "N"" duration="1"/>
|
11
|
+
<testCase name="LoginUser releaseLock should release the lock for a user" duration="1"/>
|
12
|
+
<testCase name="LoginUser checkUserInfoDuplicated should throw an error if duplicate user info is found" duration="1"/>
|
13
|
+
<testCase name="LoginUser checkUserInfoDuplicated should not throw an error if duplicate user info is not found" duration="0"/>
|
14
|
+
<testCase name="LoginUser generateDefaultPassword should generate a default password with the specified length" duration="2"/>
|
15
|
+
<testCase name="LoginUser generateDefaultPassword should generate a default password with at least one capital letter" duration="1"/>
|
16
|
+
<testCase name="LoginUser generateDefaultPassword should generate a default password with at least one number" duration="1"/>
|
17
|
+
<testCase name="LoginUser generateDefaultPassword should generate a default password with at least one special character" duration="1"/>
|
18
|
+
<testCase name="LoginUser generateDefaultPassword should generate a default password without any non-acceptable characters" duration="1"/>
|
19
|
+
<testCase name="LoginUser setPassword should set the password for the user" duration="159"/>
|
20
|
+
<testCase name="LoginUser setPassword should throw an error if the password does not meet the security requirements" duration="13"/>
|
21
|
+
<testCase name="LoginUser create should create a new user record" duration="5"/>
|
22
|
+
<testCase name="LoginUser create should throw an error if user dont have the privilege to create new user" duration="2"/>
|
23
|
+
<testCase name="LoginUser create should throw an error if user email is missing" duration="2"/>
|
24
|
+
<testCase name="LoginUser incrementFailedLoginAttemptCount should increment FailedLoginAttemptCount and update user status" duration="1"/>
|
25
|
+
<testCase name="LoginUser incrementFailedLoginAttemptCount should throw an error if maxFailedLoginAttempts or autoReleaseYN is missing" duration="1"/>
|
26
|
+
<testCase name="LoginUser incrementFailedLoginAttemptCount should lock the user account if the failed login attempts exceed the maximum allowed" duration="1"/>
|
27
|
+
<testCase name="LoginUser incrementFailedLoginAttemptCount should permanently lock the user account if the failed login attempts exceed the maximum allowed and autoReleaseYN is N" duration="1"/>
|
28
|
+
<testCase name="LoginUser combineSystemAccess should combine user and group system access and remove duplicates" duration="1"/>
|
29
|
+
<testCase name="LoginUser checkPrivileges should return true if user has the specified privilege" duration="1"/>
|
30
|
+
<testCase name="LoginUser checkPrivileges should return false if user does not have the specified privilege" duration="1"/>
|
31
|
+
<testCase name="LoginUser checkPrivileges should throw an error if ObjectId is not set" duration="1"/>
|
32
|
+
<testCase name="LoginUser getObjectPrivileges should return an array of privileges" duration="1"/>
|
33
|
+
<testCase name="LoginUser getObjectPrivileges should throw an error if an exception occurs" duration="1"/>
|
34
|
+
<testCase name="LoginUser getUserPersonalPrivileges should return an array of privileges" duration="2"/>
|
35
|
+
<testCase name="LoginUser getUserPersonalPrivileges should throw an error if an error occurs" duration="1"/>
|
36
|
+
<testCase name="LoginUser getInheritedSystemAccess should return group system access with its parent group system access if applicable" duration="3"/>
|
37
|
+
</file>
|
38
|
+
<file path="C:\Work\sso\__tests__\unit\components\system\system.spec.ts">
|
39
|
+
<testCase name="System init should initialize a system when SystemCode is provided" duration="3"/>
|
40
|
+
<testCase name="System init should throw an error when SystemCode is not found" duration="8"/>
|
41
|
+
<testCase name="System init should initialize a new system when SystemCode is not provided" duration="1"/>
|
42
|
+
<testCase name="System createSystem should create a new system" duration="4"/>
|
43
|
+
<testCase name="System createSystem should throw an error when user does not have permission" duration="1"/>
|
44
|
+
<testCase name="System createSystem should throw an error when SystemCode is missing" duration="1"/>
|
45
|
+
<testCase name="System createSystem should throw an error when Name is missing" duration="1"/>
|
46
|
+
<testCase name="System createSystem should throw an error when Description is missing" duration="1"/>
|
47
|
+
<testCase name="System createSystem should throw an error when failed to create system" duration="5"/>
|
48
|
+
<testCase name="System setSystemCode should set the SystemCode when there is no duplicate" duration="1"/>
|
49
|
+
<testCase name="System setSystemCode should throw an error when SystemCode already exists" duration="1"/>
|
50
|
+
<testCase name="System setSystemCode should throw an error when failed to check duplicate SystemCode" duration="1"/>
|
51
|
+
<testCase name="System findAll should find all systems based on filter" duration="2"/>
|
52
|
+
<testCase name="System findAll should find all systems without pagination when page and rows are not provided" duration="1"/>
|
53
|
+
</file>
|
54
|
+
<file path="C:\Work\sso\__tests__\unit\components\group-object-privilege\group-object-privilege.spec.ts">
|
55
|
+
<testCase name="GroupObjectPrivilege should create an instance of GroupObjectPrivilege" duration="2"/>
|
56
|
+
<testCase name="GroupObjectPrivilege should have the correct TableName" duration="0"/>
|
57
|
+
<testCase name="GroupObjectPrivilege should have the correct properties" duration="1"/>
|
58
|
+
<testCase name="GroupObjectPrivilege init should return an instance of GroupObjectPrivilege when GroupObjectPrivilegeId is provided" duration="2"/>
|
59
|
+
<testCase name="GroupObjectPrivilege init should throw an error when GroupObjectPrivilegeId is provided but no GroupObjectPrivilege is found" duration="3"/>
|
60
|
+
<testCase name="GroupObjectPrivilege init should return a new instance of GroupObjectPrivilege when GroupObjectPrivilegeId is not provided" duration="3"/>
|
61
|
+
</file>
|
62
|
+
<file path="C:\Work\sso\__tests__\unit\components\group-system-access\group-system-access.spec.ts">
|
63
|
+
<testCase name="GroupSystemAccess should create a new GroupSystemAccess instance" duration="2"/>
|
64
|
+
<testCase name="GroupSystemAccess init should initialize GroupSystemAccess without GroupSystemAccessId" duration="2"/>
|
65
|
+
<testCase name="GroupSystemAccess init should initialize GroupSystemAccess with GroupSystemAccessId" duration="3"/>
|
66
|
+
<testCase name="GroupSystemAccess init should throw an error if GroupSystemAccessId is not found" duration="5"/>
|
67
|
+
</file>
|
68
|
+
<file path="C:\Work\sso\__tests__\unit\components\group\group.spec.ts">
|
69
|
+
<testCase name="Group should initialize a group with valid GroupCode" duration="4"/>
|
70
|
+
<testCase name="Group should throw an error when initializing a group with invalid GroupCode" duration="5"/>
|
71
|
+
<testCase name="Group should throw an error when initializing a group with an error" duration="2"/>
|
72
|
+
</file>
|
73
|
+
<file path="C:\Work\sso\__tests__\unit\components\group-reporting-user\group-reporting-user.spec.ts">
|
74
|
+
<testCase name="GroupReportingUser init should initialize GroupReportingUser without GroupReportingUserId" duration="3"/>
|
75
|
+
<testCase name="GroupReportingUser init should initialize GroupReportingUser with valid GroupReportingUserId" duration="2"/>
|
76
|
+
<testCase name="GroupReportingUser init should throw ClassError when GroupReportingUser is not found" duration="8"/>
|
77
|
+
<testCase name="GroupReportingUser init should throw ClassError when failed to initialize GroupReportingUser" duration="1"/>
|
78
|
+
</file>
|
79
|
+
<file path="C:\Work\sso\__tests__\unit\components\system-privilege\system-privilege.spec.ts">
|
80
|
+
<testCase name="SystemPrivilege constructor should create a new SystemPrivilege instance" duration="2"/>
|
81
|
+
<testCase name="SystemPrivilege init should initialize SystemPrivilege without PrivilegeCode" duration="1"/>
|
82
|
+
<testCase name="SystemPrivilege init should initialize SystemPrivilege with PrivilegeCode" duration="2"/>
|
83
|
+
<testCase name="SystemPrivilege init should throw an error if PrivilegeCode is not found" duration="4"/>
|
84
|
+
</file>
|
85
|
+
<file path="C:\Work\sso\__tests__\unit\components\user-group\user-group.spec.ts">
|
86
|
+
<testCase name="UserGroup constructor should create a new UserGroup instance" duration="3"/>
|
87
|
+
<testCase name="UserGroup init should initialize UserGroup with valid UserGroupId" duration="2"/>
|
88
|
+
<testCase name="UserGroup init should throw ClassError when UserGroupId is not found" duration="5"/>
|
89
|
+
</file>
|
90
|
+
<file path="C:\Work\sso\__tests__\unit\components\user-object-privilege\user-object-privilege.spec.ts">
|
91
|
+
<testCase name="UserObjectPrivilege constructor should create a new UserObjectPrivilege instance" duration="2"/>
|
92
|
+
<testCase name="UserObjectPrivilege init should initialize UserObjectPrivilege with valid ObjectPrivilegeId" duration="5"/>
|
93
|
+
<testCase name="UserObjectPrivilege init should throw ClassError when ObjectPrivilegeId is not found" duration="4"/>
|
94
|
+
</file>
|
95
|
+
<file path="C:\Work\sso\__tests__\unit\components\group-privilege\group-privilege.spec.ts">
|
96
|
+
<testCase name="GroupPrivilege should initialize with GroupPrivilegeAttr" duration="6"/>
|
97
|
+
<testCase name="GroupPrivilege should throw ClassError when GroupPrivilegeAttr is not found" duration="4"/>
|
98
|
+
<testCase name="GroupPrivilege should initialize with default values" duration="1"/>
|
99
|
+
</file>
|
100
|
+
<file path="C:\Work\sso\__tests__\unit\components\user-system-access\user-system-access.spec.ts">
|
101
|
+
<testCase name="UserSystemAccess constructor should create a new UserSystemAccess instance" duration="2"/>
|
102
|
+
<testCase name="UserSystemAccess init should initialize UserSystemAccess with valid UserSystemAccessId" duration="2"/>
|
103
|
+
<testCase name="UserSystemAccess init should throw ClassError when UserSystemAccessId is not found" duration="1"/>
|
104
|
+
</file>
|
105
|
+
<file path="C:\Work\sso\__tests__\unit\components\user-privilege\user-privilege.spec.ts">
|
106
|
+
<testCase name="UserPrivilege constructor should create a new UserPrivilege instance" duration="2"/>
|
107
|
+
<testCase name="UserPrivilege init should initialize UserPrivilege with valid UserPrivilegeId" duration="2"/>
|
108
|
+
<testCase name="UserPrivilege init should throw ClassError when UserPrivilegeId is not found" duration="4"/>
|
109
|
+
</file>
|
110
|
+
<file path="C:\Work\sso\__tests__\unit\session\session.service.spec.ts">
|
111
|
+
<testCase name="session.service should return session service when instansiated" duration="2"/>
|
112
|
+
<testCase name="session.service should able to write session data" duration="3"/>
|
113
|
+
<testCase name="session.service should able to refresh session data" duration="3"/>
|
114
|
+
</file>
|
115
|
+
<file path="C:\Work\sso\__tests__\unit\system-privilege\system-privilage.spec.ts">
|
116
|
+
<testCase name="SystemPrivilege should be true" duration="2"/>
|
117
|
+
</file>
|
118
|
+
<file path="C:\Work\sso\__tests__\unit\components\password-hash\password-hash.service.spec.ts">
|
119
|
+
<testCase name="password-hash.service should return hash password" duration="2"/>
|
120
|
+
<testCase name="password-hash.service should return true when verify password" duration="1"/>
|
121
|
+
</file>
|
122
|
+
<file path="C:\Work\sso\__tests__\unit\redis-client\redis.service.spec.ts">
|
123
|
+
<testCase name="redis.service should return redis service when instansiated" duration="1"/>
|
124
|
+
<testCase name="redis.service should able to write and read redis" duration="2"/>
|
125
|
+
</file>
|
126
|
+
<file path="C:\Work\sso\__tests__\unit\components\login-user\l.spec.ts">
|
127
|
+
<testCase name="SystemPrivilege should be true" duration="1"/>
|
128
|
+
</file>
|
129
129
|
</testExecutions>
|
package/create-sso-user.sql
CHANGED
@@ -1,40 +1,40 @@
|
|
1
|
-
|
2
|
-
-- example to create sso-user
|
3
|
-
CREATE USER 'sso_user'@'environment' IDENTIFIED BY 'password';
|
4
|
-
|
5
|
-
-- example to grant neccesary access to run migration
|
6
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_authorization_codes TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
7
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_bearer_tokens TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
8
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_building_types TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
9
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_buildings TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
10
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_cities TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
11
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_companies TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
12
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_countries TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
13
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_departments TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
14
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_grouproleprivilege TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
15
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_groupsystemaccess TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
16
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_groupsystemprivilege TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
17
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_groupsystemrole TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
18
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_oauth_tokens TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
19
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_roles TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
20
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_sequelize_meta TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
21
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_staff_types TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
22
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_staffs TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
23
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_states TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
24
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_system_accesses TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
25
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_systemprivilege TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
26
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_systemrole TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
27
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_systemroleprivilege TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
28
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_systems TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
29
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_updated_history TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
30
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_user_roles TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
31
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_usergroup TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
32
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_users TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
33
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_usersystemprivilege TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
34
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_usersystemrole TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
35
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_UserUserGroup TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
36
|
-
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production._prisma_migrations TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
37
|
-
|
38
|
-
|
39
|
-
-- Grant user to create, alter, drop, references on the database (required for creating shadow tables)
|
1
|
+
|
2
|
+
-- example to create sso-user
|
3
|
+
CREATE USER 'sso_user'@'environment' IDENTIFIED BY 'password';
|
4
|
+
|
5
|
+
-- example to grant neccesary access to run migration
|
6
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_authorization_codes TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
7
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_bearer_tokens TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
8
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_building_types TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
9
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_buildings TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
10
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_cities TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
11
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_companies TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
12
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_countries TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
13
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_departments TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
14
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_grouproleprivilege TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
15
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_groupsystemaccess TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
16
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_groupsystemprivilege TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
17
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_groupsystemrole TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
18
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_oauth_tokens TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
19
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_roles TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
20
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_sequelize_meta TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
21
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_staff_types TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
22
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_staffs TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
23
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_states TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
24
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_system_accesses TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
25
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_systemprivilege TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
26
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_systemrole TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
27
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_systemroleprivilege TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
28
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_systems TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
29
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_updated_history TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
30
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_user_roles TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
31
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_usergroup TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
32
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_users TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
33
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_usersystemprivilege TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
34
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_usersystemrole TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
35
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production.sso_UserUserGroup TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
36
|
+
GRANT CREATE, ALTER, DROP, INSERT, UPDATE, DELETE, SELECT, REFERENCES on production._prisma_migrations TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
37
|
+
|
38
|
+
|
39
|
+
-- Grant user to create, alter, drop, references on the database (required for creating shadow tables)
|
40
40
|
GRANT CREATE, ALTER, DROP, REFERENCES ON shadow_database.* TO 'sso_user'@'localhost' WITH GRANT OPTION;
|
@@ -0,0 +1 @@
|
|
1
|
+
export {};
|
@@ -0,0 +1,71 @@
|
|
1
|
+
"use strict";
|
2
|
+
var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {
|
3
|
+
function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); }
|
4
|
+
return new (P || (P = Promise))(function (resolve, reject) {
|
5
|
+
function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }
|
6
|
+
function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } }
|
7
|
+
function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); }
|
8
|
+
step((generator = generator.apply(thisArg, _arguments || [])).next());
|
9
|
+
});
|
10
|
+
};
|
11
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
12
|
+
const group_privilege_1 = require("../../../../src/components/group-privilege/group-privilege");
|
13
|
+
const group_privilege_repository_1 = require("../../../../src/components/group-privilege/group-privilege.repository");
|
14
|
+
const general_1 = require("@tomei/general");
|
15
|
+
describe('GroupPrivilege', () => {
|
16
|
+
afterEach(() => {
|
17
|
+
jest.restoreAllMocks();
|
18
|
+
});
|
19
|
+
it('should initialize with GroupPrivilegeAttr', () => __awaiter(void 0, void 0, void 0, function* () {
|
20
|
+
const mockGroupPrivilegeAttr = {
|
21
|
+
GroupPrivilegeId: 1,
|
22
|
+
GroupCode: 'group1',
|
23
|
+
PrivilegeCode: 'privilege1',
|
24
|
+
Status: 'active',
|
25
|
+
CreatedAt: new Date(),
|
26
|
+
UpdatedAt: new Date(),
|
27
|
+
CreatedById: 1,
|
28
|
+
UpdatedById: 1,
|
29
|
+
};
|
30
|
+
const findOneMock = jest
|
31
|
+
.spyOn(group_privilege_repository_1.GroupPrivilegeRepository.prototype, 'findOne')
|
32
|
+
.mockResolvedValueOnce({ get: jest.fn().mockReturnValue(mockGroupPrivilegeAttr) });
|
33
|
+
const groupPrivilege = yield group_privilege_1.GroupPrivilege.init(null, 1);
|
34
|
+
expect(findOneMock).toBeCalledWith({
|
35
|
+
where: { GroupPrivilegeId: 1 },
|
36
|
+
transaction: null,
|
37
|
+
});
|
38
|
+
expect(groupPrivilege).toBeInstanceOf(group_privilege_1.GroupPrivilege);
|
39
|
+
expect(groupPrivilege.GroupPrivilegeId).toEqual(mockGroupPrivilegeAttr.GroupPrivilegeId);
|
40
|
+
expect(groupPrivilege.GroupCode).toEqual(mockGroupPrivilegeAttr.GroupCode);
|
41
|
+
expect(groupPrivilege.PrivilegeCode).toEqual(mockGroupPrivilegeAttr.PrivilegeCode);
|
42
|
+
expect(groupPrivilege.Status).toEqual(mockGroupPrivilegeAttr.Status);
|
43
|
+
expect(groupPrivilege.CreatedAt).toEqual(mockGroupPrivilegeAttr.CreatedAt);
|
44
|
+
expect(groupPrivilege.UpdatedAt).toEqual(mockGroupPrivilegeAttr.UpdatedAt);
|
45
|
+
expect(groupPrivilege.CreatedById).toEqual(mockGroupPrivilegeAttr.CreatedById);
|
46
|
+
expect(groupPrivilege.UpdatedById).toEqual(mockGroupPrivilegeAttr.UpdatedById);
|
47
|
+
}));
|
48
|
+
it('should throw ClassError when GroupPrivilegeAttr is not found', () => __awaiter(void 0, void 0, void 0, function* () {
|
49
|
+
const findOneMock = jest
|
50
|
+
.spyOn(group_privilege_repository_1.GroupPrivilegeRepository.prototype, 'findOne')
|
51
|
+
.mockResolvedValueOnce(null);
|
52
|
+
yield expect(group_privilege_1.GroupPrivilege.init(null, 1)).rejects.toThrow(general_1.ClassError);
|
53
|
+
expect(findOneMock).toBeCalledWith({
|
54
|
+
where: { GroupPrivilegeId: 1 },
|
55
|
+
transaction: null,
|
56
|
+
});
|
57
|
+
}));
|
58
|
+
it('should initialize with default values', () => __awaiter(void 0, void 0, void 0, function* () {
|
59
|
+
const groupPrivilege = yield group_privilege_1.GroupPrivilege.init();
|
60
|
+
expect(groupPrivilege).toBeInstanceOf(group_privilege_1.GroupPrivilege);
|
61
|
+
expect(groupPrivilege.GroupPrivilegeId).toBeUndefined();
|
62
|
+
expect(groupPrivilege.GroupCode).toBeUndefined();
|
63
|
+
expect(groupPrivilege.PrivilegeCode).toBeUndefined();
|
64
|
+
expect(groupPrivilege.Status).toBeUndefined();
|
65
|
+
expect(groupPrivilege.CreatedAt).toBeUndefined();
|
66
|
+
expect(groupPrivilege.UpdatedAt).toBeUndefined();
|
67
|
+
expect(groupPrivilege.CreatedById).toBeUndefined();
|
68
|
+
expect(groupPrivilege.UpdatedById).toBeUndefined();
|
69
|
+
}));
|
70
|
+
});
|
71
|
+
//# sourceMappingURL=group-privilege.test.js.map
|
@@ -0,0 +1 @@
|
|
1
|
+
{"version":3,"file":"group-privilege.test.js","sourceRoot":"","sources":["../../../../../__tests__/unit/components/group-privilege/group-privilege.test.ts"],"names":[],"mappings":";;;;;;;;;;;AAAA,gGAA4F;AAC5F,sHAAiH;AACjH,4CAA4C;AAE5C,QAAQ,CAAC,gBAAgB,EAAE,GAAG,EAAE;IAC9B,SAAS,CAAC,GAAG,EAAE;QACb,IAAI,CAAC,eAAe,EAAE,CAAC;IACzB,CAAC,CAAC,CAAC;IAEH,EAAE,CAAC,2CAA2C,EAAE,GAAS,EAAE;QACzD,MAAM,sBAAsB,GAAG;YAC7B,gBAAgB,EAAE,CAAC;YACnB,SAAS,EAAE,QAAQ;YACnB,aAAa,EAAE,YAAY;YAC3B,MAAM,EAAE,QAAQ;YAChB,SAAS,EAAE,IAAI,IAAI,EAAE;YACrB,SAAS,EAAE,IAAI,IAAI,EAAE;YACrB,WAAW,EAAE,CAAC;YACd,WAAW,EAAE,CAAC;SACf,CAAC;QAEF,MAAM,WAAW,GAAG,IAAI;aACrB,KAAK,CAAC,qDAAwB,CAAC,SAAS,EAAE,SAAS,CAAC;aACpD,qBAAqB,CAAC,EAAE,GAAG,EAAE,IAAI,CAAC,EAAE,EAAE,CAAC,eAAe,CAAC,sBAAsB,CAAC,EAAS,CAAC,CAAC;QAE5F,MAAM,cAAc,GAAG,MAAM,gCAAc,CAAC,IAAI,CAAC,IAAI,EAAE,CAAC,CAAC,CAAC;QAE1D,MAAM,CAAC,WAAW,CAAC,CAAC,cAAc,CAAC;YACjC,KAAK,EAAE,EAAE,gBAAgB,EAAE,CAAC,EAAE;YAC9B,WAAW,EAAE,IAAI;SAClB,CAAC,CAAC;QACH,MAAM,CAAC,cAAc,CAAC,CAAC,cAAc,CAAC,gCAAc,CAAC,CAAC;QACtD,MAAM,CAAC,cAAc,CAAC,gBAAgB,CAAC,CAAC,OAAO,CAAC,sBAAsB,CAAC,gBAAgB,CAAC,CAAC;QACzF,MAAM,CAAC,cAAc,CAAC,SAAS,CAAC,CAAC,OAAO,CAAC,sBAAsB,CAAC,SAAS,CAAC,CAAC;QAC3E,MAAM,CAAC,cAAc,CAAC,aAAa,CAAC,CAAC,OAAO,CAAC,sBAAsB,CAAC,aAAa,CAAC,CAAC;QACnF,MAAM,CAAC,cAAc,CAAC,MAAM,CAAC,CAAC,OAAO,CAAC,sBAAsB,CAAC,MAAM,CAAC,CAAC;QACrE,MAAM,CAAC,cAAc,CAAC,SAAS,CAAC,CAAC,OAAO,CAAC,sBAAsB,CAAC,SAAS,CAAC,CAAC;QAC3E,MAAM,CAAC,cAAc,CAAC,SAAS,CAAC,CAAC,OAAO,CAAC,sBAAsB,CAAC,SAAS,CAAC,CAAC;QAC3E,MAAM,CAAC,cAAc,CAAC,WAAW,CAAC,CAAC,OAAO,CAAC,sBAAsB,CAAC,WAAW,CAAC,CAAC;QAC/E,MAAM,CAAC,cAAc,CAAC,WAAW,CAAC,CAAC,OAAO,CAAC,sBAAsB,CAAC,WAAW,CAAC,CAAC;IACjF,CAAC,CAAA,CAAC,CAAC;IAEH,EAAE,CAAC,8DAA8D,EAAE,GAAS,EAAE;QAC5E,MAAM,WAAW,GAAG,IAAI;aACrB,KAAK,CAAC,qDAAwB,CAAC,SAAS,EAAE,SAAS,CAAC;aACpD,qBAAqB,CAAC,IAAI,CAAC,CAAC;QAE/B,MAAM,MAAM,CAAC,gCAAc,CAAC,IAAI,CAAC,IAAI,EAAE,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,OAAO,CAAC,oBAAU,CAAC,CAAC;QAEvE,MAAM,CAAC,WAAW,CAAC,CAAC,cAAc,CAAC;YACjC,KAAK,EAAE,EAAE,gBAAgB,EAAE,CAAC,EAAE;YAC9B,WAAW,EAAE,IAAI;SAClB,CAAC,CAAC;IACL,CAAC,CAAA,CAAC,CAAC;IAEH,EAAE,CAAC,uCAAuC,EAAE,GAAS,EAAE;QACrD,MAAM,cAAc,GAAG,MAAM,gCAAc,CAAC,IAAI,EAAE,CAAC;QAEnD,MAAM,CAAC,cAAc,CAAC,CAAC,cAAc,CAAC,gCAAc,CAAC,CAAC;QACtD,MAAM,CAAC,cAAc,CAAC,gBAAgB,CAAC,CAAC,aAAa,EAAE,CAAC;QACxD,MAAM,CAAC,cAAc,CAAC,SAAS,CAAC,CAAC,aAAa,EAAE,CAAC;QACjD,MAAM,CAAC,cAAc,CAAC,aAAa,CAAC,CAAC,aAAa,EAAE,CAAC;QACrD,MAAM,CAAC,cAAc,CAAC,MAAM,CAAC,CAAC,aAAa,EAAE,CAAC;QAC9C,MAAM,CAAC,cAAc,CAAC,SAAS,CAAC,CAAC,aAAa,EAAE,CAAC;QACjD,MAAM,CAAC,cAAc,CAAC,SAAS,CAAC,CAAC,aAAa,EAAE,CAAC;QACjD,MAAM,CAAC,cAAc,CAAC,WAAW,CAAC,CAAC,aAAa,EAAE,CAAC;QACnD,MAAM,CAAC,cAAc,CAAC,WAAW,CAAC,CAAC,aAAa,EAAE,CAAC;IACrD,CAAC,CAAA,CAAC,CAAC;AACL,CAAC,CAAC,CAAC"}
|
File without changes
|
@@ -0,0 +1 @@
|
|
1
|
+
{"version":3,"file":"login-user.spec.js","sourceRoot":"","sources":["../../../../../__tests__/unit/components/login-user/login-user.spec.ts"],"names":[],"mappings":"AAuuBA,QAAQ,CAAC,WAAW,EAAE,GAAG,EAAE;IACvB,EAAE,CAAC,gBAAgB,EAAE,GAAG,EAAE;QACxB,MAAM,CAAC,IAAI,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;IAC1B,CAAC,CAAC,CAAC;AACL,CAAC,CAAC,CAAC"}
|
@@ -1223,7 +1223,7 @@ class User extends general_1.UserBase {
|
|
1223
1223
|
transaction: dbTransaction,
|
1224
1224
|
});
|
1225
1225
|
let systemAccesses = dataSystemAccesses;
|
1226
|
-
if (group.
|
1226
|
+
if (group.InheritParentSystemAccessYN === 'Y' && group.ParentGroupCode) {
|
1227
1227
|
const GroupCode = group.ParentGroupCode;
|
1228
1228
|
const parentGroup = yield User._GroupRepo.findByPk(GroupCode, dbTransaction);
|
1229
1229
|
const dataParentSystemAccesses = yield User.getInheritedSystemAccess(dbTransaction, parentGroup);
|