@webiny/api-aco 5.43.0-beta.0 → 5.43.0-beta.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/apps/AcoApp.js +4 -4
- package/apps/AcoApp.js.map +1 -1
- package/constants.d.ts +3 -0
- package/constants.js +11 -0
- package/constants.js.map +1 -0
- package/createAcoContext.d.ts +3 -1
- package/createAcoContext.js +13 -99
- package/createAcoContext.js.map +1 -1
- package/createAcoHooks.js +2 -0
- package/createAcoHooks.js.map +1 -1
- package/createAcoStorageOperations.d.ts +2 -0
- package/createAcoStorageOperations.js +5 -3
- package/createAcoStorageOperations.js.map +1 -1
- package/createAcoTasks.d.ts +1 -0
- package/createAcoTasks.js +13 -0
- package/createAcoTasks.js.map +1 -0
- package/filter/filter.crud.js +7 -7
- package/filter/filter.crud.js.map +1 -1
- package/flp/FolderLevelPermissions/gateways/GetIdentityGateway/GetIdentityGatewayFromContext.d.ts +7 -0
- package/flp/FolderLevelPermissions/gateways/GetIdentityGateway/GetIdentityGatewayFromContext.js +17 -0
- package/flp/FolderLevelPermissions/gateways/GetIdentityGateway/GetIdentityGatewayFromContext.js.map +1 -0
- package/flp/FolderLevelPermissions/gateways/GetIdentityGateway/IGetIdentityGateway.d.ts +4 -0
- package/flp/FolderLevelPermissions/gateways/GetIdentityGateway/IGetIdentityGateway.js +7 -0
- package/flp/FolderLevelPermissions/gateways/GetIdentityGateway/IGetIdentityGateway.js.map +1 -0
- package/flp/FolderLevelPermissions/gateways/GetIdentityGateway/index.d.ts +2 -0
- package/flp/FolderLevelPermissions/gateways/GetIdentityGateway/index.js +29 -0
- package/flp/FolderLevelPermissions/gateways/GetIdentityGateway/index.js.map +1 -0
- package/flp/FolderLevelPermissions/gateways/GetWcpGateway/GetWcpGatewayFromContext.d.ts +7 -0
- package/flp/FolderLevelPermissions/gateways/GetWcpGateway/GetWcpGatewayFromContext.js +17 -0
- package/flp/FolderLevelPermissions/gateways/GetWcpGateway/GetWcpGatewayFromContext.js.map +1 -0
- package/flp/FolderLevelPermissions/gateways/GetWcpGateway/IGetWcpGateway.d.ts +4 -0
- package/flp/FolderLevelPermissions/gateways/GetWcpGateway/IGetWcpGateway.js +7 -0
- package/flp/FolderLevelPermissions/gateways/GetWcpGateway/IGetWcpGateway.js.map +1 -0
- package/flp/FolderLevelPermissions/gateways/GetWcpGateway/index.d.ts +2 -0
- package/flp/FolderLevelPermissions/gateways/GetWcpGateway/index.js +29 -0
- package/flp/FolderLevelPermissions/gateways/GetWcpGateway/index.js.map +1 -0
- package/flp/FolderLevelPermissions/gateways/IsAuthorizationEnabled/IIsAuthorizationEnabledGateway.d.ts +3 -0
- package/flp/FolderLevelPermissions/gateways/IsAuthorizationEnabled/IIsAuthorizationEnabledGateway.js +7 -0
- package/flp/FolderLevelPermissions/gateways/IsAuthorizationEnabled/IIsAuthorizationEnabledGateway.js.map +1 -0
- package/flp/FolderLevelPermissions/gateways/IsAuthorizationEnabled/IsAuthorizationEnabledGatewayFromContext.d.ts +7 -0
- package/flp/FolderLevelPermissions/gateways/IsAuthorizationEnabled/IsAuthorizationEnabledGatewayFromContext.js +17 -0
- package/flp/FolderLevelPermissions/gateways/IsAuthorizationEnabled/IsAuthorizationEnabledGatewayFromContext.js.map +1 -0
- package/flp/FolderLevelPermissions/gateways/IsAuthorizationEnabled/index.d.ts +2 -0
- package/flp/FolderLevelPermissions/gateways/IsAuthorizationEnabled/index.js +29 -0
- package/flp/FolderLevelPermissions/gateways/IsAuthorizationEnabled/index.js.map +1 -0
- package/flp/FolderLevelPermissions/gateways/ListIdentityTeamsGateway/IListIdentityTeamsGateway.d.ts +4 -0
- package/flp/FolderLevelPermissions/gateways/ListIdentityTeamsGateway/IListIdentityTeamsGateway.js +7 -0
- package/flp/FolderLevelPermissions/gateways/ListIdentityTeamsGateway/IListIdentityTeamsGateway.js.map +1 -0
- package/flp/FolderLevelPermissions/gateways/ListIdentityTeamsGateway/ListIdentityTeamsGatewayFromContext.d.ts +7 -0
- package/flp/FolderLevelPermissions/gateways/ListIdentityTeamsGateway/ListIdentityTeamsGatewayFromContext.js +39 -0
- package/flp/FolderLevelPermissions/gateways/ListIdentityTeamsGateway/ListIdentityTeamsGatewayFromContext.js.map +1 -0
- package/flp/FolderLevelPermissions/gateways/ListIdentityTeamsGateway/index.d.ts +2 -0
- package/flp/FolderLevelPermissions/gateways/ListIdentityTeamsGateway/index.js +29 -0
- package/flp/FolderLevelPermissions/gateways/ListIdentityTeamsGateway/index.js.map +1 -0
- package/flp/FolderLevelPermissions/gateways/ListPermissionsGateway/IListPermissionsGateway.d.ts +4 -0
- package/flp/FolderLevelPermissions/gateways/ListPermissionsGateway/IListPermissionsGateway.js +7 -0
- package/flp/FolderLevelPermissions/gateways/ListPermissionsGateway/IListPermissionsGateway.js.map +1 -0
- package/flp/FolderLevelPermissions/gateways/ListPermissionsGateway/ListPermissionsGatewayFromContext.d.ts +7 -0
- package/flp/FolderLevelPermissions/gateways/ListPermissionsGateway/ListPermissionsGatewayFromContext.js +17 -0
- package/flp/FolderLevelPermissions/gateways/ListPermissionsGateway/ListPermissionsGatewayFromContext.js.map +1 -0
- package/flp/FolderLevelPermissions/gateways/ListPermissionsGateway/index.d.ts +2 -0
- package/flp/FolderLevelPermissions/gateways/ListPermissionsGateway/index.js +29 -0
- package/flp/FolderLevelPermissions/gateways/ListPermissionsGateway/index.js.map +1 -0
- package/flp/FolderLevelPermissions/gateways/index.d.ts +5 -0
- package/flp/FolderLevelPermissions/gateways/index.js +62 -0
- package/flp/FolderLevelPermissions/gateways/index.js.map +1 -0
- package/flp/FolderLevelPermissions/index.d.ts +33 -0
- package/flp/FolderLevelPermissions/index.js +116 -0
- package/flp/FolderLevelPermissions/index.js.map +1 -0
- package/flp/FolderLevelPermissions/useCases/CanAccessFolder/CanAccessFolder.d.ts +7 -0
- package/flp/FolderLevelPermissions/useCases/CanAccessFolder/CanAccessFolder.js +48 -0
- package/flp/FolderLevelPermissions/useCases/CanAccessFolder/CanAccessFolder.js.map +1 -0
- package/flp/FolderLevelPermissions/useCases/CanAccessFolder/ICanAccessFolder.d.ts +9 -0
- package/flp/FolderLevelPermissions/useCases/CanAccessFolder/ICanAccessFolder.js +7 -0
- package/flp/FolderLevelPermissions/useCases/CanAccessFolder/ICanAccessFolder.js.map +1 -0
- package/flp/FolderLevelPermissions/useCases/CanAccessFolder/index.d.ts +2 -0
- package/flp/FolderLevelPermissions/useCases/CanAccessFolder/index.js +29 -0
- package/flp/FolderLevelPermissions/useCases/CanAccessFolder/index.js.map +1 -0
- package/flp/FolderLevelPermissions/useCases/CanAccessFolderContent/CanAccessFolderContent.d.ts +7 -0
- package/flp/FolderLevelPermissions/useCases/CanAccessFolderContent/CanAccessFolderContent.js +41 -0
- package/flp/FolderLevelPermissions/useCases/CanAccessFolderContent/CanAccessFolderContent.js.map +1 -0
- package/flp/FolderLevelPermissions/useCases/CanAccessFolderContent/ICanAccessFolderContent.d.ts +8 -0
- package/flp/FolderLevelPermissions/useCases/CanAccessFolderContent/ICanAccessFolderContent.js +7 -0
- package/flp/FolderLevelPermissions/useCases/CanAccessFolderContent/ICanAccessFolderContent.js.map +1 -0
- package/flp/FolderLevelPermissions/useCases/CanAccessFolderContent/index.d.ts +2 -0
- package/flp/FolderLevelPermissions/useCases/CanAccessFolderContent/index.js +29 -0
- package/flp/FolderLevelPermissions/useCases/CanAccessFolderContent/index.js.map +1 -0
- package/flp/FolderLevelPermissions/useCases/CanCreateFolderInRoot/CanCreateFolderInRoot.d.ts +4 -0
- package/flp/FolderLevelPermissions/useCases/CanCreateFolderInRoot/CanCreateFolderInRoot.js +14 -0
- package/flp/FolderLevelPermissions/useCases/CanCreateFolderInRoot/CanCreateFolderInRoot.js.map +1 -0
- package/flp/FolderLevelPermissions/useCases/CanCreateFolderInRoot/ICanCreateFolderInRoot.d.ts +3 -0
- package/flp/FolderLevelPermissions/useCases/CanCreateFolderInRoot/ICanCreateFolderInRoot.js +7 -0
- package/flp/FolderLevelPermissions/useCases/CanCreateFolderInRoot/ICanCreateFolderInRoot.js.map +1 -0
- package/flp/FolderLevelPermissions/useCases/CanCreateFolderInRoot/index.d.ts +2 -0
- package/flp/FolderLevelPermissions/useCases/CanCreateFolderInRoot/index.js +29 -0
- package/flp/FolderLevelPermissions/useCases/CanCreateFolderInRoot/index.js.map +1 -0
- package/flp/FolderLevelPermissions/useCases/CanUseFolderLevelPermissions/CanUseFolderLevelPermissions.d.ts +9 -0
- package/flp/FolderLevelPermissions/useCases/CanUseFolderLevelPermissions/CanUseFolderLevelPermissions.js +34 -0
- package/flp/FolderLevelPermissions/useCases/CanUseFolderLevelPermissions/CanUseFolderLevelPermissions.js.map +1 -0
- package/flp/FolderLevelPermissions/useCases/CanUseFolderLevelPermissions/ICanUseFolderPermissions.d.ts +3 -0
- package/flp/FolderLevelPermissions/useCases/CanUseFolderLevelPermissions/ICanUseFolderPermissions.js +7 -0
- package/flp/FolderLevelPermissions/useCases/CanUseFolderLevelPermissions/ICanUseFolderPermissions.js.map +1 -0
- package/flp/FolderLevelPermissions/useCases/CanUseFolderLevelPermissions/index.d.ts +2 -0
- package/flp/FolderLevelPermissions/useCases/CanUseFolderLevelPermissions/index.js +29 -0
- package/flp/FolderLevelPermissions/useCases/CanUseFolderLevelPermissions/index.js.map +1 -0
- package/flp/FolderLevelPermissions/useCases/CanUseTeams/CanUseTeams.d.ts +7 -0
- package/flp/FolderLevelPermissions/useCases/CanUseTeams/CanUseTeams.js +17 -0
- package/flp/FolderLevelPermissions/useCases/CanUseTeams/CanUseTeams.js.map +1 -0
- package/flp/FolderLevelPermissions/useCases/CanUseTeams/ICanUseTeams.d.ts +3 -0
- package/flp/FolderLevelPermissions/useCases/CanUseTeams/ICanUseTeams.js +7 -0
- package/flp/FolderLevelPermissions/useCases/CanUseTeams/ICanUseTeams.js.map +1 -0
- package/flp/FolderLevelPermissions/useCases/CanUseTeams/index.d.ts +2 -0
- package/flp/FolderLevelPermissions/useCases/CanUseTeams/index.js +29 -0
- package/flp/FolderLevelPermissions/useCases/CanUseTeams/index.js.map +1 -0
- package/flp/FolderLevelPermissions/useCases/CheckNotInheritedPermissions/CheckNotInheritedPermissions.d.ts +5 -0
- package/flp/FolderLevelPermissions/useCases/CheckNotInheritedPermissions/CheckNotInheritedPermissions.js +14 -0
- package/flp/FolderLevelPermissions/useCases/CheckNotInheritedPermissions/CheckNotInheritedPermissions.js.map +1 -0
- package/flp/FolderLevelPermissions/useCases/CheckNotInheritedPermissions/ICheckNotInheritedPermissions.d.ts +4 -0
- package/flp/FolderLevelPermissions/useCases/CheckNotInheritedPermissions/ICheckNotInheritedPermissions.js +7 -0
- package/flp/FolderLevelPermissions/useCases/CheckNotInheritedPermissions/ICheckNotInheritedPermissions.js.map +1 -0
- package/flp/FolderLevelPermissions/useCases/CheckNotInheritedPermissions/index.d.ts +2 -0
- package/flp/FolderLevelPermissions/useCases/CheckNotInheritedPermissions/index.js +29 -0
- package/flp/FolderLevelPermissions/useCases/CheckNotInheritedPermissions/index.js.map +1 -0
- package/flp/FolderLevelPermissions/useCases/GetDefaultPermissions/GetDefaultPermissions.d.ts +10 -0
- package/flp/FolderLevelPermissions/useCases/GetDefaultPermissions/GetDefaultPermissions.js +53 -0
- package/flp/FolderLevelPermissions/useCases/GetDefaultPermissions/GetDefaultPermissions.js.map +1 -0
- package/flp/FolderLevelPermissions/useCases/GetDefaultPermissions/GetDefaultPermissionsWithTeams.d.ts +10 -0
- package/flp/FolderLevelPermissions/useCases/GetDefaultPermissions/GetDefaultPermissionsWithTeams.js +40 -0
- package/flp/FolderLevelPermissions/useCases/GetDefaultPermissions/GetDefaultPermissionsWithTeams.js.map +1 -0
- package/flp/FolderLevelPermissions/useCases/GetDefaultPermissions/IGetDefaultPermissions.d.ts +4 -0
- package/flp/FolderLevelPermissions/useCases/GetDefaultPermissions/IGetDefaultPermissions.js +7 -0
- package/flp/FolderLevelPermissions/useCases/GetDefaultPermissions/IGetDefaultPermissions.js.map +1 -0
- package/flp/FolderLevelPermissions/useCases/GetDefaultPermissions/index.d.ts +3 -0
- package/flp/FolderLevelPermissions/useCases/GetDefaultPermissions/index.js +40 -0
- package/flp/FolderLevelPermissions/useCases/GetDefaultPermissions/index.js.map +1 -0
- package/flp/FolderLevelPermissions/useCases/GetFolderPermission/GetFolderPermission.d.ts +7 -0
- package/flp/FolderLevelPermissions/useCases/GetFolderPermission/GetFolderPermission.js +17 -0
- package/flp/FolderLevelPermissions/useCases/GetFolderPermission/GetFolderPermission.js.map +1 -0
- package/flp/FolderLevelPermissions/useCases/GetFolderPermission/IGetFolderPermission.d.ts +4 -0
- package/flp/FolderLevelPermissions/useCases/GetFolderPermission/IGetFolderPermission.js +7 -0
- package/flp/FolderLevelPermissions/useCases/GetFolderPermission/IGetFolderPermission.js.map +1 -0
- package/flp/FolderLevelPermissions/useCases/GetFolderPermission/index.d.ts +2 -0
- package/flp/FolderLevelPermissions/useCases/GetFolderPermission/index.js +29 -0
- package/flp/FolderLevelPermissions/useCases/GetFolderPermission/index.js.map +1 -0
- package/flp/FolderLevelPermissions/useCases/ListFolderPermissions/IListFolderPermissions.d.ts +4 -0
- package/flp/FolderLevelPermissions/useCases/ListFolderPermissions/IListFolderPermissions.js +7 -0
- package/flp/FolderLevelPermissions/useCases/ListFolderPermissions/IListFolderPermissions.js.map +1 -0
- package/flp/FolderLevelPermissions/useCases/ListFolderPermissions/ListFolderPermissions.d.ts +7 -0
- package/flp/FolderLevelPermissions/useCases/ListFolderPermissions/ListFolderPermissions.js +17 -0
- package/flp/FolderLevelPermissions/useCases/ListFolderPermissions/ListFolderPermissions.js.map +1 -0
- package/flp/FolderLevelPermissions/useCases/ListFolderPermissions/index.d.ts +2 -0
- package/flp/FolderLevelPermissions/useCases/ListFolderPermissions/index.js +18 -0
- package/flp/FolderLevelPermissions/useCases/ListFolderPermissions/index.js.map +1 -0
- package/flp/FolderLevelPermissions/useCases/index.d.ts +9 -0
- package/flp/FolderLevelPermissions/useCases/index.js +106 -0
- package/flp/FolderLevelPermissions/useCases/index.js.map +1 -0
- package/flp/flp.crud.d.ts +9 -0
- package/flp/flp.crud.js +172 -0
- package/flp/flp.crud.js.map +1 -0
- package/flp/flp.so.d.ts +26 -0
- package/flp/flp.so.js +304 -0
- package/flp/flp.so.js.map +1 -0
- package/flp/flp.types.d.ts +159 -0
- package/flp/flp.types.js +7 -0
- package/flp/flp.types.js.map +1 -0
- package/flp/hooks/index.d.ts +2 -0
- package/flp/hooks/index.js +17 -0
- package/flp/hooks/index.js.map +1 -0
- package/flp/hooks/onFolderAfterCreateFlp.hook.d.ts +2 -0
- package/flp/hooks/onFolderAfterCreateFlp.hook.js +37 -0
- package/flp/hooks/onFolderAfterCreateFlp.hook.js.map +1 -0
- package/flp/hooks/onFolderAfterDeleteFlp.hook.d.ts +2 -0
- package/flp/hooks/onFolderAfterDeleteFlp.hook.js +37 -0
- package/flp/hooks/onFolderAfterDeleteFlp.hook.js.map +1 -0
- package/flp/hooks/onFolderAfterUpdateFlp.hook.d.ts +2 -0
- package/flp/hooks/onFolderAfterUpdateFlp.hook.js +39 -0
- package/flp/hooks/onFolderAfterUpdateFlp.hook.js.map +1 -0
- package/flp/index.d.ts +5 -0
- package/flp/index.js +62 -0
- package/flp/index.js.map +1 -0
- package/flp/tasks/createFlp.task.d.ts +2 -0
- package/flp/tasks/createFlp.task.js +49 -0
- package/flp/tasks/createFlp.task.js.map +1 -0
- package/flp/tasks/deleteFlp.task.d.ts +2 -0
- package/flp/tasks/deleteFlp.task.js +49 -0
- package/flp/tasks/deleteFlp.task.js.map +1 -0
- package/flp/tasks/index.d.ts +5 -0
- package/flp/tasks/index.js +20 -0
- package/flp/tasks/index.js.map +1 -0
- package/flp/tasks/syncFlp.task.d.ts +2 -0
- package/flp/tasks/syncFlp.task.js +126 -0
- package/flp/tasks/syncFlp.task.js.map +1 -0
- package/flp/tasks/updateFlp.task.d.ts +2 -0
- package/flp/tasks/updateFlp.task.js +55 -0
- package/flp/tasks/updateFlp.task.js.map +1 -0
- package/flp/useCases/CreateFlp.d.ts +7 -0
- package/flp/useCases/CreateFlp.js +52 -0
- package/flp/useCases/CreateFlp.js.map +1 -0
- package/flp/useCases/DeleteFlp.d.ts +6 -0
- package/flp/useCases/DeleteFlp.js +30 -0
- package/flp/useCases/DeleteFlp.js.map +1 -0
- package/flp/useCases/Path.d.ts +3 -0
- package/flp/useCases/Path.js +18 -0
- package/flp/useCases/Path.js.map +1 -0
- package/flp/useCases/Permissions.d.ts +4 -0
- package/flp/useCases/Permissions.js +38 -0
- package/flp/useCases/Permissions.js.map +1 -0
- package/flp/useCases/UpdateFlp.d.ts +25 -0
- package/flp/useCases/UpdateFlp.js +182 -0
- package/flp/useCases/UpdateFlp.js.map +1 -0
- package/flp/useCases/index.d.ts +3 -0
- package/flp/useCases/index.js +40 -0
- package/flp/useCases/index.js.map +1 -0
- package/folder/createFolderTypeDefs.js +13 -2
- package/folder/createFolderTypeDefs.js.map +1 -1
- package/folder/folder.crud.d.ts +3 -6
- package/folder/folder.crud.js +90 -231
- package/folder/folder.crud.js.map +1 -1
- package/folder/folder.gql.js +30 -8
- package/folder/folder.gql.js.map +1 -1
- package/folder/folder.model.js +3 -0
- package/folder/folder.model.js.map +1 -1
- package/folder/folder.so.js +4 -1
- package/folder/folder.so.js.map +1 -1
- package/folder/folder.types.d.ts +17 -3
- package/folder/folder.types.js.map +1 -1
- package/folder/useCases/CreateFolder/CreateFolder.d.ts +7 -0
- package/folder/useCases/CreateFolder/CreateFolder.js +19 -0
- package/folder/useCases/CreateFolder/CreateFolder.js.map +1 -0
- package/folder/useCases/CreateFolder/CreateFolderWithEvents.d.ts +9 -0
- package/folder/useCases/CreateFolder/CreateFolderWithEvents.js +25 -0
- package/folder/useCases/CreateFolder/CreateFolderWithEvents.js.map +1 -0
- package/folder/useCases/CreateFolder/CreateFolderWithFolderLevelPermissions.d.ts +24 -0
- package/folder/useCases/CreateFolder/CreateFolderWithFolderLevelPermissions.js +39 -0
- package/folder/useCases/CreateFolder/CreateFolderWithFolderLevelPermissions.js.map +1 -0
- package/folder/useCases/CreateFolder/ICreateFolder.d.ts +4 -0
- package/folder/useCases/CreateFolder/ICreateFolder.js +7 -0
- package/folder/useCases/CreateFolder/ICreateFolder.js.map +1 -0
- package/folder/useCases/CreateFolder/index.d.ts +17 -0
- package/folder/useCases/CreateFolder/index.js +20 -0
- package/folder/useCases/CreateFolder/index.js.map +1 -0
- package/folder/useCases/DeleteFolder/DeleteFolder.d.ts +7 -0
- package/folder/useCases/DeleteFolder/DeleteFolder.js +18 -0
- package/folder/useCases/DeleteFolder/DeleteFolder.js.map +1 -0
- package/folder/useCases/DeleteFolder/DeleteFolderWithEvents.d.ts +10 -0
- package/folder/useCases/DeleteFolder/DeleteFolderWithEvents.js +29 -0
- package/folder/useCases/DeleteFolder/DeleteFolderWithEvents.js.map +1 -0
- package/folder/useCases/DeleteFolder/DeleteFolderWithFolderLevelPermissions.d.ts +9 -0
- package/folder/useCases/DeleteFolder/DeleteFolderWithFolderLevelPermissions.js +24 -0
- package/folder/useCases/DeleteFolder/DeleteFolderWithFolderLevelPermissions.js.map +1 -0
- package/folder/useCases/DeleteFolder/IDeleteFolder.d.ts +4 -0
- package/folder/useCases/DeleteFolder/IDeleteFolder.js +7 -0
- package/folder/useCases/DeleteFolder/IDeleteFolder.js.map +1 -0
- package/folder/useCases/DeleteFolder/index.d.ts +18 -0
- package/folder/useCases/DeleteFolder/index.js +20 -0
- package/folder/useCases/DeleteFolder/index.js.map +1 -0
- package/folder/useCases/GetAncestors/GetAncestors.d.ts +5 -0
- package/folder/useCases/GetAncestors/GetAncestors.js +57 -0
- package/folder/useCases/GetAncestors/GetAncestors.js.map +1 -0
- package/folder/useCases/GetAncestors/IGetAncestors.d.ts +8 -0
- package/folder/useCases/GetAncestors/IGetAncestors.js +7 -0
- package/folder/useCases/GetAncestors/IGetAncestors.js.map +1 -0
- package/folder/useCases/GetAncestors/index.d.ts +4 -0
- package/folder/useCases/GetAncestors/index.js +16 -0
- package/folder/useCases/GetAncestors/index.js.map +1 -0
- package/folder/useCases/GetFolder/GetFolder.d.ts +7 -0
- package/folder/useCases/GetFolder/GetFolder.js +17 -0
- package/folder/useCases/GetFolder/GetFolder.js.map +1 -0
- package/folder/useCases/GetFolder/GetFolderWithFolderLevelPermissions.d.ts +24 -0
- package/folder/useCases/GetFolder/GetFolderWithFolderLevelPermissions.js +33 -0
- package/folder/useCases/GetFolder/GetFolderWithFolderLevelPermissions.js.map +1 -0
- package/folder/useCases/GetFolder/IGetFolder.d.ts +4 -0
- package/folder/useCases/GetFolder/IGetFolder.js +7 -0
- package/folder/useCases/GetFolder/IGetFolder.js.map +1 -0
- package/folder/useCases/GetFolder/index.d.ts +13 -0
- package/folder/useCases/GetFolder/index.js +19 -0
- package/folder/useCases/GetFolder/index.js.map +1 -0
- package/folder/useCases/GetFolderHierarchy/GetFolderHierarchy.d.ts +11 -0
- package/folder/useCases/GetFolderHierarchy/GetFolderHierarchy.js +63 -0
- package/folder/useCases/GetFolderHierarchy/GetFolderHierarchy.js.map +1 -0
- package/folder/useCases/GetFolderHierarchy/GetFolderHierarchyWithFolderLevelPermissions.d.ts +17 -0
- package/folder/useCases/GetFolderHierarchy/GetFolderHierarchyWithFolderLevelPermissions.js +59 -0
- package/folder/useCases/GetFolderHierarchy/GetFolderHierarchyWithFolderLevelPermissions.js.map +1 -0
- package/folder/useCases/GetFolderHierarchy/IGetFolderHierarchy.d.ts +4 -0
- package/folder/useCases/GetFolderHierarchy/IGetFolderHierarchy.js +7 -0
- package/folder/useCases/GetFolderHierarchy/IGetFolderHierarchy.js.map +1 -0
- package/folder/useCases/GetFolderHierarchy/index.d.ts +12 -0
- package/folder/useCases/GetFolderHierarchy/index.js +18 -0
- package/folder/useCases/GetFolderHierarchy/index.js.map +1 -0
- package/folder/useCases/ListFolderLevelPermissionsTargets/IListAdminUsersGateway.d.ts +4 -0
- package/folder/useCases/ListFolderLevelPermissionsTargets/IListAdminUsersGateway.js +7 -0
- package/folder/useCases/ListFolderLevelPermissionsTargets/IListAdminUsersGateway.js.map +1 -0
- package/folder/useCases/ListFolderLevelPermissionsTargets/IListFolderLevelPermissionsTargets.d.ts +4 -0
- package/folder/useCases/ListFolderLevelPermissionsTargets/IListFolderLevelPermissionsTargets.js +7 -0
- package/folder/useCases/ListFolderLevelPermissionsTargets/IListFolderLevelPermissionsTargets.js.map +1 -0
- package/folder/useCases/ListFolderLevelPermissionsTargets/IListTeamsGateway.d.ts +4 -0
- package/folder/useCases/ListFolderLevelPermissionsTargets/IListTeamsGateway.js +7 -0
- package/folder/useCases/ListFolderLevelPermissionsTargets/IListTeamsGateway.js.map +1 -0
- package/folder/useCases/ListFolderLevelPermissionsTargets/ListAdminUsersGatewayFromContext.d.ts +7 -0
- package/folder/useCases/ListFolderLevelPermissionsTargets/ListAdminUsersGatewayFromContext.js +23 -0
- package/folder/useCases/ListFolderLevelPermissionsTargets/ListAdminUsersGatewayFromContext.js.map +1 -0
- package/folder/useCases/ListFolderLevelPermissionsTargets/ListFolderLevelPermissionsTargets.d.ts +13 -0
- package/folder/useCases/ListFolderLevelPermissionsTargets/ListFolderLevelPermissionsTargets.js +60 -0
- package/folder/useCases/ListFolderLevelPermissionsTargets/ListFolderLevelPermissionsTargets.js.map +1 -0
- package/folder/useCases/ListFolderLevelPermissionsTargets/ListTeamsGatewayFromContext.d.ts +7 -0
- package/folder/useCases/ListFolderLevelPermissionsTargets/ListTeamsGatewayFromContext.js +22 -0
- package/folder/useCases/ListFolderLevelPermissionsTargets/ListTeamsGatewayFromContext.js.map +1 -0
- package/folder/useCases/ListFolderLevelPermissionsTargets/index.d.ts +9 -0
- package/folder/useCases/ListFolderLevelPermissionsTargets/index.js +20 -0
- package/folder/useCases/ListFolderLevelPermissionsTargets/index.js.map +1 -0
- package/folder/useCases/ListFolders/IListFolders.d.ts +5 -0
- package/folder/useCases/ListFolders/IListFolders.js +7 -0
- package/folder/useCases/ListFolders/IListFolders.js.map +1 -0
- package/folder/useCases/ListFolders/ListFolders.d.ts +8 -0
- package/folder/useCases/ListFolders/ListFolders.js +17 -0
- package/folder/useCases/ListFolders/ListFolders.js.map +1 -0
- package/folder/useCases/ListFolders/ListFoldersWithFolderLevelPermissions.d.ts +14 -0
- package/folder/useCases/ListFolders/ListFoldersWithFolderLevelPermissions.js +67 -0
- package/folder/useCases/ListFolders/ListFoldersWithFolderLevelPermissions.js.map +1 -0
- package/folder/useCases/ListFolders/index.d.ts +13 -0
- package/folder/useCases/ListFolders/index.js +19 -0
- package/folder/useCases/ListFolders/index.js.map +1 -0
- package/folder/useCases/UpdateFolder/IUpdateFolder.d.ts +4 -0
- package/folder/useCases/UpdateFolder/IUpdateFolder.js +7 -0
- package/folder/useCases/UpdateFolder/IUpdateFolder.js.map +1 -0
- package/folder/useCases/UpdateFolder/UpdateFolder.d.ts +7 -0
- package/folder/useCases/UpdateFolder/UpdateFolder.js +20 -0
- package/folder/useCases/UpdateFolder/UpdateFolder.js.map +1 -0
- package/folder/useCases/UpdateFolder/UpdateFolderWithEvents.d.ts +10 -0
- package/folder/useCases/UpdateFolder/UpdateFolderWithEvents.js +38 -0
- package/folder/useCases/UpdateFolder/UpdateFolderWithEvents.js.map +1 -0
- package/folder/useCases/UpdateFolder/UpdateFolderWithFolderLevelPermissions.d.ts +25 -0
- package/folder/useCases/UpdateFolder/UpdateFolderWithFolderLevelPermissions.js +78 -0
- package/folder/useCases/UpdateFolder/UpdateFolderWithFolderLevelPermissions.js.map +1 -0
- package/folder/useCases/UpdateFolder/index.d.ts +18 -0
- package/folder/useCases/UpdateFolder/index.js +20 -0
- package/folder/useCases/UpdateFolder/index.js.map +1 -0
- package/folder/useCases/index.d.ts +8 -0
- package/folder/useCases/index.js +95 -0
- package/folder/useCases/index.js.map +1 -0
- package/index.d.ts +3 -1
- package/index.js +3 -2
- package/index.js.map +1 -1
- package/package.json +28 -26
- package/record/record.crud.js +10 -10
- package/record/record.crud.js.map +1 -1
- package/record/record.so.js +2 -1
- package/record/record.so.js.map +1 -1
- package/types.d.ts +17 -8
- package/types.js +12 -0
- package/types.js.map +1 -1
- package/utils/decorators/CmsEntriesCrudDecorators.js +41 -65
- package/utils/decorators/CmsEntriesCrudDecorators.js.map +1 -1
- package/utils/decorators/FilterEntriesByFolderFactory.d.ts +7 -0
- package/utils/decorators/FilterEntriesByFolderFactory.js +30 -0
- package/utils/decorators/FilterEntriesByFolderFactory.js.map +1 -0
- package/utils/decorators/ListEntriesFactory.d.ts +15 -0
- package/utils/decorators/ListEntriesFactory.js +107 -0
- package/utils/decorators/ListEntriesFactory.js.map +1 -0
- package/utils/decorators/decorateIfModelAuthorizationEnabled.js +7 -0
- package/utils/decorators/decorateIfModelAuthorizationEnabled.js.map +1 -1
- package/utils/decorators/hasRootFolderId.d.ts +7 -0
- package/utils/decorators/hasRootFolderId.js +27 -0
- package/utils/decorators/hasRootFolderId.js.map +1 -0
- package/utils/pickEntryFieldValues.js +1 -1
- package/utils/pickEntryFieldValues.js.map +1 -1
- package/utils/FolderLevelPermissions.d.ts +0 -75
- package/utils/FolderLevelPermissions.js +0 -390
- package/utils/FolderLevelPermissions.js.map +0 -1
- package/utils/decorators/constants.d.ts +0 -1
- package/utils/decorators/constants.js +0 -9
- package/utils/decorators/constants.js.map +0 -1
- package/utils/decorators/createFolderType.d.ts +0 -2
- package/utils/decorators/createFolderType.js +0 -18
- package/utils/decorators/createFolderType.js.map +0 -1
- package/utils/decorators/filterEntriesByFolderFactory.d.ts +0 -6
- package/utils/decorators/filterEntriesByFolderFactory.js +0 -37
- package/utils/decorators/filterEntriesByFolderFactory.js.map +0 -1
- package/utils/decorators/where.d.ts +0 -15
- package/utils/decorators/where.js +0 -60
- package/utils/decorators/where.js.map +0 -1
- package/utils/getFolderAndItsAncestors.d.ts +0 -7
- package/utils/getFolderAndItsAncestors.js +0 -53
- package/utils/getFolderAndItsAncestors.js.map +0 -1
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"names":["_apiSecurity","require","_useCases","_gateways","FolderLevelPermissions","constructor","params","crud","getWcpGateway","GetWcpGatewayFromContext","context","getIdentityGateway","GetIdentityGatewayFromContext","listPermissionsGateway","ListPermissionsGatewayFromContext","listIdentityTeamsGateway","ListIdentityTeamsGatewayFromContext","isAuthorizationEnabledGateway","IsAuthorizationEnabledGatewayFromContext","canUseFolderLevelPermissions","enabled","canUseFolderLevelPermissionsUseCase","CanUseFolderLevelPermissions","execute","canUseTeams","canUseTeamsUseCase","CanUseTeams","canCreateFolderInRoot","canCreateFolderInRootUseCase","CanCreateFolderInRoot","permissionsIncludeNonInheritedPermissions","permissions","checkNotInheritedPermissionsUseCase","CheckNotInheritedPermissions","canAccessFolder","canAccessFolderUseCase","CanAccessFolder","canAccessFolderContent","canAccessFolderContentUseCase","CanAccessFolderContent","ensureCanAccessFolder","result","NotAuthorizedError","ensureCanAccessFolderContent","canManageFolderContent","flp","rwd","canManageFolderStructure","canManageFolderPermissions","managePermissions","getDefaultPermissions","getDefaultPermissionsUseCase","GetDefaultPermissions","getDefaultPermissionsWithTeams","GetDefaultPermissionsWithTeams","listFolderLevelPermissions","listFolderLevelPermissionsUseCase","ListFolderPermissions","list","flps","Promise","all","map","id","getFolderLevelPermissions","getFolderLevelPermissionUseCase","GetFolderPermission","get","exports"],"sources":["index.ts"],"sourcesContent":["import { NotAuthorizedError } from \"@webiny/api-security\";\nimport {\n CanAccessFolder,\n CanAccessFolderContent,\n type CanAccessFolderContentParams,\n type CanAccessFolderParams,\n CanCreateFolderInRoot,\n CanUseFolderLevelPermissions,\n CanUseTeams,\n CheckNotInheritedPermissions,\n GetDefaultPermissions,\n GetDefaultPermissionsWithTeams,\n GetFolderPermission,\n ListFolderPermissions\n} from \"./useCases\";\nimport type {\n AcoContext,\n AcoFolderLevelPermissionsCrud,\n FolderLevelPermission,\n FolderPermission,\n ListFlpsParams\n} from \"~/types\";\nimport {\n GetIdentityGatewayFromContext,\n GetWcpGatewayFromContext,\n type IGetIdentityGateway,\n type IGetWcpGateway,\n type IIsAuthorizationEnabledGateway,\n type IListIdentityTeamsGateway,\n type IListPermissionsGateway,\n IsAuthorizationEnabledGatewayFromContext,\n ListIdentityTeamsGatewayFromContext,\n ListPermissionsGatewayFromContext\n} from \"./gateways\";\n\ninterface CreateFolderLevelPermissionsParams {\n context: AcoContext;\n crud: AcoFolderLevelPermissionsCrud;\n}\n\nexport class FolderLevelPermissions {\n private crud: AcoFolderLevelPermissionsCrud;\n\n private readonly getWcpGateway: IGetWcpGateway;\n private readonly getIdentityGateway: IGetIdentityGateway;\n private readonly listPermissionsGateway: IListPermissionsGateway;\n private readonly listIdentityTeamsGateway: IListIdentityTeamsGateway;\n private readonly isAuthorizationEnabledGateway: IIsAuthorizationEnabledGateway;\n\n constructor(params: CreateFolderLevelPermissionsParams) {\n this.crud = params.crud;\n this.getWcpGateway = new GetWcpGatewayFromContext(params.context);\n this.getIdentityGateway = new GetIdentityGatewayFromContext(params.context);\n this.listPermissionsGateway = new ListPermissionsGatewayFromContext(params.context);\n this.listIdentityTeamsGateway = new ListIdentityTeamsGatewayFromContext(params.context);\n this.isAuthorizationEnabledGateway = new IsAuthorizationEnabledGatewayFromContext(\n params.context\n );\n }\n\n public canUseFolderLevelPermissions(enabled?: boolean) {\n const canUseFolderLevelPermissionsUseCase = new CanUseFolderLevelPermissions(\n this.getWcpGateway,\n this.getIdentityGateway\n );\n return canUseFolderLevelPermissionsUseCase.execute(enabled);\n }\n\n public canUseTeams() {\n const canUseTeamsUseCase = new CanUseTeams(this.getWcpGateway);\n return canUseTeamsUseCase.execute();\n }\n\n public canCreateFolderInRoot() {\n const canCreateFolderInRootUseCase = new CanCreateFolderInRoot();\n return canCreateFolderInRootUseCase.execute();\n }\n\n public permissionsIncludeNonInheritedPermissions(permissions?: FolderPermission[]) {\n const checkNotInheritedPermissionsUseCase = new CheckNotInheritedPermissions();\n return checkNotInheritedPermissionsUseCase.execute(permissions);\n }\n\n public async canAccessFolder(params: CanAccessFolderParams) {\n if (!this.canUseFolderLevelPermissions() || !this.isAuthorizationEnabledGateway.execute()) {\n return true;\n }\n\n const canAccessFolderUseCase = new CanAccessFolder(this.getIdentityGateway);\n return await canAccessFolderUseCase.execute(params);\n }\n\n public async canAccessFolderContent(params: CanAccessFolderContentParams) {\n if (!this.canUseFolderLevelPermissions() || !this.isAuthorizationEnabledGateway.execute()) {\n return true;\n }\n\n const canAccessFolderContentUseCase = new CanAccessFolderContent(this.getIdentityGateway);\n return await canAccessFolderContentUseCase.execute(params);\n }\n\n public async ensureCanAccessFolder(params: CanAccessFolderParams) {\n const result = await this.canAccessFolder(params);\n if (!result) {\n throw new NotAuthorizedError();\n }\n }\n\n public async ensureCanAccessFolderContent(params: CanAccessFolderContentParams) {\n const result = await this.canAccessFolderContent(params);\n if (!result) {\n throw new NotAuthorizedError();\n }\n }\n\n public async canManageFolderContent(flp: FolderLevelPermission) {\n if (!this.canUseFolderLevelPermissions() || !this.isAuthorizationEnabledGateway.execute()) {\n return true;\n }\n\n return await this.canAccessFolderContent({ permissions: flp.permissions, rwd: \"w\" });\n }\n\n public async canManageFolderStructure(flp: FolderLevelPermission) {\n if (!this.canUseFolderLevelPermissions() || !this.isAuthorizationEnabledGateway.execute()) {\n return true;\n }\n\n return await this.canAccessFolder({ permissions: flp.permissions, rwd: \"w\" });\n }\n\n public async canManageFolderPermissions(flp: FolderLevelPermission) {\n if (!this.canUseFolderLevelPermissions()) {\n return false;\n }\n\n if (!this.isAuthorizationEnabledGateway.execute()) {\n return true;\n }\n\n return await this.canAccessFolder({\n permissions: flp.permissions,\n rwd: \"w\",\n managePermissions: true\n });\n }\n\n public getDefaultPermissions(permissions: FolderPermission[]) {\n const getDefaultPermissionsUseCase = new GetDefaultPermissions(\n this.getIdentityGateway,\n this.listPermissionsGateway\n );\n\n if (this.canUseTeams()) {\n const getDefaultPermissionsWithTeams = new GetDefaultPermissionsWithTeams(\n this.getIdentityGateway,\n this.listIdentityTeamsGateway,\n getDefaultPermissionsUseCase\n );\n\n return getDefaultPermissionsWithTeams.execute(permissions);\n }\n\n return getDefaultPermissionsUseCase.execute(permissions);\n }\n\n public async listFolderLevelPermissions(params: ListFlpsParams) {\n const listFolderLevelPermissionsUseCase = new ListFolderPermissions(this.crud.list);\n const flps = await listFolderLevelPermissionsUseCase.execute(params);\n\n return Promise.all(\n flps.map(async flp => ({\n id: flp.id,\n permissions: await this.getDefaultPermissions(flp.permissions)\n }))\n );\n }\n\n public async getFolderLevelPermissions(id: string) {\n const getFolderLevelPermissionUseCase = new GetFolderPermission(this.crud.get);\n const flp = await getFolderLevelPermissionUseCase.execute(id);\n return await this.getDefaultPermissions(flp?.permissions ?? []);\n }\n}\n"],"mappings":";;;;;;AAAA,IAAAA,YAAA,GAAAC,OAAA;AACA,IAAAC,SAAA,GAAAD,OAAA;AAqBA,IAAAE,SAAA,GAAAF,OAAA;AAkBO,MAAMG,sBAAsB,CAAC;EAShCC,WAAWA,CAACC,MAA0C,EAAE;IACpD,IAAI,CAACC,IAAI,GAAGD,MAAM,CAACC,IAAI;IACvB,IAAI,CAACC,aAAa,GAAG,IAAIC,kCAAwB,CAACH,MAAM,CAACI,OAAO,CAAC;IACjE,IAAI,CAACC,kBAAkB,GAAG,IAAIC,uCAA6B,CAACN,MAAM,CAACI,OAAO,CAAC;IAC3E,IAAI,CAACG,sBAAsB,GAAG,IAAIC,2CAAiC,CAACR,MAAM,CAACI,OAAO,CAAC;IACnF,IAAI,CAACK,wBAAwB,GAAG,IAAIC,6CAAmC,CAACV,MAAM,CAACI,OAAO,CAAC;IACvF,IAAI,CAACO,6BAA6B,GAAG,IAAIC,kDAAwC,CAC7EZ,MAAM,CAACI,OACX,CAAC;EACL;EAEOS,4BAA4BA,CAACC,OAAiB,EAAE;IACnD,MAAMC,mCAAmC,GAAG,IAAIC,sCAA4B,CACxE,IAAI,CAACd,aAAa,EAClB,IAAI,CAACG,kBACT,CAAC;IACD,OAAOU,mCAAmC,CAACE,OAAO,CAACH,OAAO,CAAC;EAC/D;EAEOI,WAAWA,CAAA,EAAG;IACjB,MAAMC,kBAAkB,GAAG,IAAIC,qBAAW,CAAC,IAAI,CAAClB,aAAa,CAAC;IAC9D,OAAOiB,kBAAkB,CAACF,OAAO,CAAC,CAAC;EACvC;EAEOI,qBAAqBA,CAAA,EAAG;IAC3B,MAAMC,4BAA4B,GAAG,IAAIC,+BAAqB,CAAC,CAAC;IAChE,OAAOD,4BAA4B,CAACL,OAAO,CAAC,CAAC;EACjD;EAEOO,yCAAyCA,CAACC,WAAgC,EAAE;IAC/E,MAAMC,mCAAmC,GAAG,IAAIC,sCAA4B,CAAC,CAAC;IAC9E,OAAOD,mCAAmC,CAACT,OAAO,CAACQ,WAAW,CAAC;EACnE;EAEA,MAAaG,eAAeA,CAAC5B,MAA6B,EAAE;IACxD,IAAI,CAAC,IAAI,CAACa,4BAA4B,CAAC,CAAC,IAAI,CAAC,IAAI,CAACF,6BAA6B,CAACM,OAAO,CAAC,CAAC,EAAE;MACvF,OAAO,IAAI;IACf;IAEA,MAAMY,sBAAsB,GAAG,IAAIC,yBAAe,CAAC,IAAI,CAACzB,kBAAkB,CAAC;IAC3E,OAAO,MAAMwB,sBAAsB,CAACZ,OAAO,CAACjB,MAAM,CAAC;EACvD;EAEA,MAAa+B,sBAAsBA,CAAC/B,MAAoC,EAAE;IACtE,IAAI,CAAC,IAAI,CAACa,4BAA4B,CAAC,CAAC,IAAI,CAAC,IAAI,CAACF,6BAA6B,CAACM,OAAO,CAAC,CAAC,EAAE;MACvF,OAAO,IAAI;IACf;IAEA,MAAMe,6BAA6B,GAAG,IAAIC,gCAAsB,CAAC,IAAI,CAAC5B,kBAAkB,CAAC;IACzF,OAAO,MAAM2B,6BAA6B,CAACf,OAAO,CAACjB,MAAM,CAAC;EAC9D;EAEA,MAAakC,qBAAqBA,CAAClC,MAA6B,EAAE;IAC9D,MAAMmC,MAAM,GAAG,MAAM,IAAI,CAACP,eAAe,CAAC5B,MAAM,CAAC;IACjD,IAAI,CAACmC,MAAM,EAAE;MACT,MAAM,IAAIC,+BAAkB,CAAC,CAAC;IAClC;EACJ;EAEA,MAAaC,4BAA4BA,CAACrC,MAAoC,EAAE;IAC5E,MAAMmC,MAAM,GAAG,MAAM,IAAI,CAACJ,sBAAsB,CAAC/B,MAAM,CAAC;IACxD,IAAI,CAACmC,MAAM,EAAE;MACT,MAAM,IAAIC,+BAAkB,CAAC,CAAC;IAClC;EACJ;EAEA,MAAaE,sBAAsBA,CAACC,GAA0B,EAAE;IAC5D,IAAI,CAAC,IAAI,CAAC1B,4BAA4B,CAAC,CAAC,IAAI,CAAC,IAAI,CAACF,6BAA6B,CAACM,OAAO,CAAC,CAAC,EAAE;MACvF,OAAO,IAAI;IACf;IAEA,OAAO,MAAM,IAAI,CAACc,sBAAsB,CAAC;MAAEN,WAAW,EAAEc,GAAG,CAACd,WAAW;MAAEe,GAAG,EAAE;IAAI,CAAC,CAAC;EACxF;EAEA,MAAaC,wBAAwBA,CAACF,GAA0B,EAAE;IAC9D,IAAI,CAAC,IAAI,CAAC1B,4BAA4B,CAAC,CAAC,IAAI,CAAC,IAAI,CAACF,6BAA6B,CAACM,OAAO,CAAC,CAAC,EAAE;MACvF,OAAO,IAAI;IACf;IAEA,OAAO,MAAM,IAAI,CAACW,eAAe,CAAC;MAAEH,WAAW,EAAEc,GAAG,CAACd,WAAW;MAAEe,GAAG,EAAE;IAAI,CAAC,CAAC;EACjF;EAEA,MAAaE,0BAA0BA,CAACH,GAA0B,EAAE;IAChE,IAAI,CAAC,IAAI,CAAC1B,4BAA4B,CAAC,CAAC,EAAE;MACtC,OAAO,KAAK;IAChB;IAEA,IAAI,CAAC,IAAI,CAACF,6BAA6B,CAACM,OAAO,CAAC,CAAC,EAAE;MAC/C,OAAO,IAAI;IACf;IAEA,OAAO,MAAM,IAAI,CAACW,eAAe,CAAC;MAC9BH,WAAW,EAAEc,GAAG,CAACd,WAAW;MAC5Be,GAAG,EAAE,GAAG;MACRG,iBAAiB,EAAE;IACvB,CAAC,CAAC;EACN;EAEOC,qBAAqBA,CAACnB,WAA+B,EAAE;IAC1D,MAAMoB,4BAA4B,GAAG,IAAIC,+BAAqB,CAC1D,IAAI,CAACzC,kBAAkB,EACvB,IAAI,CAACE,sBACT,CAAC;IAED,IAAI,IAAI,CAACW,WAAW,CAAC,CAAC,EAAE;MACpB,MAAM6B,8BAA8B,GAAG,IAAIC,wCAA8B,CACrE,IAAI,CAAC3C,kBAAkB,EACvB,IAAI,CAACI,wBAAwB,EAC7BoC,4BACJ,CAAC;MAED,OAAOE,8BAA8B,CAAC9B,OAAO,CAACQ,WAAW,CAAC;IAC9D;IAEA,OAAOoB,4BAA4B,CAAC5B,OAAO,CAACQ,WAAW,CAAC;EAC5D;EAEA,MAAawB,0BAA0BA,CAACjD,MAAsB,EAAE;IAC5D,MAAMkD,iCAAiC,GAAG,IAAIC,+BAAqB,CAAC,IAAI,CAAClD,IAAI,CAACmD,IAAI,CAAC;IACnF,MAAMC,IAAI,GAAG,MAAMH,iCAAiC,CAACjC,OAAO,CAACjB,MAAM,CAAC;IAEpE,OAAOsD,OAAO,CAACC,GAAG,CACdF,IAAI,CAACG,GAAG,CAAC,MAAMjB,GAAG,KAAK;MACnBkB,EAAE,EAAElB,GAAG,CAACkB,EAAE;MACVhC,WAAW,EAAE,MAAM,IAAI,CAACmB,qBAAqB,CAACL,GAAG,CAACd,WAAW;IACjE,CAAC,CAAC,CACN,CAAC;EACL;EAEA,MAAaiC,yBAAyBA,CAACD,EAAU,EAAE;IAC/C,MAAME,+BAA+B,GAAG,IAAIC,6BAAmB,CAAC,IAAI,CAAC3D,IAAI,CAAC4D,GAAG,CAAC;IAC9E,MAAMtB,GAAG,GAAG,MAAMoB,+BAA+B,CAAC1C,OAAO,CAACwC,EAAE,CAAC;IAC7D,OAAO,MAAM,IAAI,CAACb,qBAAqB,CAACL,GAAG,EAAEd,WAAW,IAAI,EAAE,CAAC;EACnE;AACJ;AAACqC,OAAA,CAAAhE,sBAAA,GAAAA,sBAAA","ignoreList":[]}
|
|
@@ -0,0 +1,7 @@
|
|
|
1
|
+
import type { CanAccessFolderParams, ICanAccessFolder } from "./ICanAccessFolder";
|
|
2
|
+
import type { IGetIdentityGateway } from "../../gateways";
|
|
3
|
+
export declare class CanAccessFolder implements ICanAccessFolder {
|
|
4
|
+
private getIdentityGateway;
|
|
5
|
+
constructor(getIdentityGateway: IGetIdentityGateway);
|
|
6
|
+
execute({ permissions, rwd, managePermissions }: CanAccessFolderParams): Promise<boolean>;
|
|
7
|
+
}
|
|
@@ -0,0 +1,48 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
|
|
3
|
+
Object.defineProperty(exports, "__esModule", {
|
|
4
|
+
value: true
|
|
5
|
+
});
|
|
6
|
+
exports.CanAccessFolder = void 0;
|
|
7
|
+
class CanAccessFolder {
|
|
8
|
+
constructor(getIdentityGateway) {
|
|
9
|
+
this.getIdentityGateway = getIdentityGateway;
|
|
10
|
+
}
|
|
11
|
+
async execute({
|
|
12
|
+
permissions = [],
|
|
13
|
+
rwd,
|
|
14
|
+
managePermissions
|
|
15
|
+
}) {
|
|
16
|
+
if (!permissions.length) {
|
|
17
|
+
return true;
|
|
18
|
+
}
|
|
19
|
+
const identity = this.getIdentityGateway.execute();
|
|
20
|
+
const currentIdentityPermission = permissions.find(p => {
|
|
21
|
+
return p.target === `admin:${identity.id}`;
|
|
22
|
+
});
|
|
23
|
+
if (!currentIdentityPermission) {
|
|
24
|
+
return false;
|
|
25
|
+
}
|
|
26
|
+
const {
|
|
27
|
+
level
|
|
28
|
+
} = currentIdentityPermission;
|
|
29
|
+
if (managePermissions) {
|
|
30
|
+
return level === "owner";
|
|
31
|
+
}
|
|
32
|
+
|
|
33
|
+
// If the user has a `no-access` level, they are explicitly denied access to the current folder.
|
|
34
|
+
if (level === "no-access") {
|
|
35
|
+
return false;
|
|
36
|
+
}
|
|
37
|
+
|
|
38
|
+
// Checking for "write" or "delete" access. Allow only if the
|
|
39
|
+
// user is has `owner` or `editor` level or the folder is public (no FLP assigned).
|
|
40
|
+
if (rwd !== "r") {
|
|
41
|
+
return level === "owner" || level === "editor" || level === "public";
|
|
42
|
+
}
|
|
43
|
+
return true;
|
|
44
|
+
}
|
|
45
|
+
}
|
|
46
|
+
exports.CanAccessFolder = CanAccessFolder;
|
|
47
|
+
|
|
48
|
+
//# sourceMappingURL=CanAccessFolder.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"names":["CanAccessFolder","constructor","getIdentityGateway","execute","permissions","rwd","managePermissions","length","identity","currentIdentityPermission","find","p","target","id","level","exports"],"sources":["CanAccessFolder.ts"],"sourcesContent":["import type { CanAccessFolderParams, ICanAccessFolder } from \"./ICanAccessFolder\";\nimport type { IGetIdentityGateway } from \"../../gateways\";\n\nexport class CanAccessFolder implements ICanAccessFolder {\n private getIdentityGateway: IGetIdentityGateway;\n\n constructor(getIdentityGateway: IGetIdentityGateway) {\n this.getIdentityGateway = getIdentityGateway;\n }\n\n async execute({ permissions = [], rwd, managePermissions }: CanAccessFolderParams) {\n if (!permissions.length) {\n return true;\n }\n\n const identity = this.getIdentityGateway.execute();\n const currentIdentityPermission = permissions.find(p => {\n return p.target === `admin:${identity.id}`;\n });\n\n if (!currentIdentityPermission) {\n return false;\n }\n\n const { level } = currentIdentityPermission;\n\n if (managePermissions) {\n return level === \"owner\";\n }\n\n // If the user has a `no-access` level, they are explicitly denied access to the current folder.\n if (level === \"no-access\") {\n return false;\n }\n\n // Checking for \"write\" or \"delete\" access. Allow only if the\n // user is has `owner` or `editor` level or the folder is public (no FLP assigned).\n if (rwd !== \"r\") {\n return level === \"owner\" || level === \"editor\" || level === \"public\";\n }\n\n return true;\n }\n}\n"],"mappings":";;;;;;AAGO,MAAMA,eAAe,CAA6B;EAGrDC,WAAWA,CAACC,kBAAuC,EAAE;IACjD,IAAI,CAACA,kBAAkB,GAAGA,kBAAkB;EAChD;EAEA,MAAMC,OAAOA,CAAC;IAAEC,WAAW,GAAG,EAAE;IAAEC,GAAG;IAAEC;EAAyC,CAAC,EAAE;IAC/E,IAAI,CAACF,WAAW,CAACG,MAAM,EAAE;MACrB,OAAO,IAAI;IACf;IAEA,MAAMC,QAAQ,GAAG,IAAI,CAACN,kBAAkB,CAACC,OAAO,CAAC,CAAC;IAClD,MAAMM,yBAAyB,GAAGL,WAAW,CAACM,IAAI,CAACC,CAAC,IAAI;MACpD,OAAOA,CAAC,CAACC,MAAM,KAAK,SAASJ,QAAQ,CAACK,EAAE,EAAE;IAC9C,CAAC,CAAC;IAEF,IAAI,CAACJ,yBAAyB,EAAE;MAC5B,OAAO,KAAK;IAChB;IAEA,MAAM;MAAEK;IAAM,CAAC,GAAGL,yBAAyB;IAE3C,IAAIH,iBAAiB,EAAE;MACnB,OAAOQ,KAAK,KAAK,OAAO;IAC5B;;IAEA;IACA,IAAIA,KAAK,KAAK,WAAW,EAAE;MACvB,OAAO,KAAK;IAChB;;IAEA;IACA;IACA,IAAIT,GAAG,KAAK,GAAG,EAAE;MACb,OAAOS,KAAK,KAAK,OAAO,IAAIA,KAAK,KAAK,QAAQ,IAAIA,KAAK,KAAK,QAAQ;IACxE;IAEA,OAAO,IAAI;EACf;AACJ;AAACC,OAAA,CAAAf,eAAA,GAAAA,eAAA","ignoreList":[]}
|
|
@@ -0,0 +1,9 @@
|
|
|
1
|
+
import type { FolderPermission } from "../../../flp.types";
|
|
2
|
+
export interface CanAccessFolderParams {
|
|
3
|
+
permissions?: FolderPermission[];
|
|
4
|
+
rwd?: "r" | "w" | "d";
|
|
5
|
+
managePermissions?: boolean;
|
|
6
|
+
}
|
|
7
|
+
export interface ICanAccessFolder {
|
|
8
|
+
execute: (params: CanAccessFolderParams) => Promise<boolean>;
|
|
9
|
+
}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"names":[],"sources":["ICanAccessFolder.ts"],"sourcesContent":["import type { FolderPermission } from \"~/flp/flp.types\";\n\nexport interface CanAccessFolderParams {\n permissions?: FolderPermission[];\n rwd?: \"r\" | \"w\" | \"d\";\n managePermissions?: boolean;\n}\n\nexport interface ICanAccessFolder {\n execute: (params: CanAccessFolderParams) => Promise<boolean>;\n}\n"],"mappings":"","ignoreList":[]}
|
|
@@ -0,0 +1,29 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
|
|
3
|
+
Object.defineProperty(exports, "__esModule", {
|
|
4
|
+
value: true
|
|
5
|
+
});
|
|
6
|
+
var _CanAccessFolder = require("./CanAccessFolder");
|
|
7
|
+
Object.keys(_CanAccessFolder).forEach(function (key) {
|
|
8
|
+
if (key === "default" || key === "__esModule") return;
|
|
9
|
+
if (key in exports && exports[key] === _CanAccessFolder[key]) return;
|
|
10
|
+
Object.defineProperty(exports, key, {
|
|
11
|
+
enumerable: true,
|
|
12
|
+
get: function () {
|
|
13
|
+
return _CanAccessFolder[key];
|
|
14
|
+
}
|
|
15
|
+
});
|
|
16
|
+
});
|
|
17
|
+
var _ICanAccessFolder = require("./ICanAccessFolder");
|
|
18
|
+
Object.keys(_ICanAccessFolder).forEach(function (key) {
|
|
19
|
+
if (key === "default" || key === "__esModule") return;
|
|
20
|
+
if (key in exports && exports[key] === _ICanAccessFolder[key]) return;
|
|
21
|
+
Object.defineProperty(exports, key, {
|
|
22
|
+
enumerable: true,
|
|
23
|
+
get: function () {
|
|
24
|
+
return _ICanAccessFolder[key];
|
|
25
|
+
}
|
|
26
|
+
});
|
|
27
|
+
});
|
|
28
|
+
|
|
29
|
+
//# sourceMappingURL=index.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"names":["_CanAccessFolder","require","Object","keys","forEach","key","exports","defineProperty","enumerable","get","_ICanAccessFolder"],"sources":["index.ts"],"sourcesContent":["export * from \"./CanAccessFolder\";\nexport * from \"./ICanAccessFolder\";\n"],"mappings":";;;;;AAAA,IAAAA,gBAAA,GAAAC,OAAA;AAAAC,MAAA,CAAAC,IAAA,CAAAH,gBAAA,EAAAI,OAAA,WAAAC,GAAA;EAAA,IAAAA,GAAA,kBAAAA,GAAA;EAAA,IAAAA,GAAA,IAAAC,OAAA,IAAAA,OAAA,CAAAD,GAAA,MAAAL,gBAAA,CAAAK,GAAA;EAAAH,MAAA,CAAAK,cAAA,CAAAD,OAAA,EAAAD,GAAA;IAAAG,UAAA;IAAAC,GAAA,WAAAA,CAAA;MAAA,OAAAT,gBAAA,CAAAK,GAAA;IAAA;EAAA;AAAA;AACA,IAAAK,iBAAA,GAAAT,OAAA;AAAAC,MAAA,CAAAC,IAAA,CAAAO,iBAAA,EAAAN,OAAA,WAAAC,GAAA;EAAA,IAAAA,GAAA,kBAAAA,GAAA;EAAA,IAAAA,GAAA,IAAAC,OAAA,IAAAA,OAAA,CAAAD,GAAA,MAAAK,iBAAA,CAAAL,GAAA;EAAAH,MAAA,CAAAK,cAAA,CAAAD,OAAA,EAAAD,GAAA;IAAAG,UAAA;IAAAC,GAAA,WAAAA,CAAA;MAAA,OAAAC,iBAAA,CAAAL,GAAA;IAAA;EAAA;AAAA","ignoreList":[]}
|
package/flp/FolderLevelPermissions/useCases/CanAccessFolderContent/CanAccessFolderContent.d.ts
ADDED
|
@@ -0,0 +1,7 @@
|
|
|
1
|
+
import type { CanAccessFolderContentParams, ICanAccessFolderContent } from "./ICanAccessFolderContent";
|
|
2
|
+
import type { IGetIdentityGateway } from "../../gateways";
|
|
3
|
+
export declare class CanAccessFolderContent implements ICanAccessFolderContent {
|
|
4
|
+
private getIdentityGateway;
|
|
5
|
+
constructor(getIdentityGateway: IGetIdentityGateway);
|
|
6
|
+
execute({ permissions, rwd }: CanAccessFolderContentParams): Promise<boolean>;
|
|
7
|
+
}
|
|
@@ -0,0 +1,41 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
|
|
3
|
+
Object.defineProperty(exports, "__esModule", {
|
|
4
|
+
value: true
|
|
5
|
+
});
|
|
6
|
+
exports.CanAccessFolderContent = void 0;
|
|
7
|
+
class CanAccessFolderContent {
|
|
8
|
+
constructor(getIdentityGateway) {
|
|
9
|
+
this.getIdentityGateway = getIdentityGateway;
|
|
10
|
+
}
|
|
11
|
+
async execute({
|
|
12
|
+
permissions = [],
|
|
13
|
+
rwd
|
|
14
|
+
}) {
|
|
15
|
+
const identity = this.getIdentityGateway.execute();
|
|
16
|
+
const currentIdentityPermission = permissions.find(p => {
|
|
17
|
+
return p.target === `admin:${identity.id}`;
|
|
18
|
+
});
|
|
19
|
+
if (!currentIdentityPermission) {
|
|
20
|
+
return false;
|
|
21
|
+
}
|
|
22
|
+
const {
|
|
23
|
+
level
|
|
24
|
+
} = currentIdentityPermission;
|
|
25
|
+
|
|
26
|
+
// If the user has a `no-access` level, they are explicitly denied access to the current folder.
|
|
27
|
+
if (level === "no-access") {
|
|
28
|
+
return false;
|
|
29
|
+
}
|
|
30
|
+
|
|
31
|
+
// If the user is not an owner and we're checking for "write" or
|
|
32
|
+
// "delete" access, then we can immediately return false.
|
|
33
|
+
if (rwd !== "r") {
|
|
34
|
+
return level !== "viewer";
|
|
35
|
+
}
|
|
36
|
+
return true;
|
|
37
|
+
}
|
|
38
|
+
}
|
|
39
|
+
exports.CanAccessFolderContent = CanAccessFolderContent;
|
|
40
|
+
|
|
41
|
+
//# sourceMappingURL=CanAccessFolderContent.js.map
|
package/flp/FolderLevelPermissions/useCases/CanAccessFolderContent/CanAccessFolderContent.js.map
ADDED
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"names":["CanAccessFolderContent","constructor","getIdentityGateway","execute","permissions","rwd","identity","currentIdentityPermission","find","p","target","id","level","exports"],"sources":["CanAccessFolderContent.ts"],"sourcesContent":["import type {\n CanAccessFolderContentParams,\n ICanAccessFolderContent\n} from \"./ICanAccessFolderContent\";\nimport type { IGetIdentityGateway } from \"../../gateways\";\n\nexport class CanAccessFolderContent implements ICanAccessFolderContent {\n private getIdentityGateway: IGetIdentityGateway;\n\n constructor(getIdentityGateway: IGetIdentityGateway) {\n this.getIdentityGateway = getIdentityGateway;\n }\n\n async execute({ permissions = [], rwd }: CanAccessFolderContentParams) {\n const identity = this.getIdentityGateway.execute();\n\n const currentIdentityPermission = permissions.find(p => {\n return p.target === `admin:${identity.id}`;\n });\n\n if (!currentIdentityPermission) {\n return false;\n }\n\n const { level } = currentIdentityPermission;\n\n // If the user has a `no-access` level, they are explicitly denied access to the current folder.\n if (level === \"no-access\") {\n return false;\n }\n\n // If the user is not an owner and we're checking for \"write\" or\n // \"delete\" access, then we can immediately return false.\n if (rwd !== \"r\") {\n return level !== \"viewer\";\n }\n\n return true;\n }\n}\n"],"mappings":";;;;;;AAMO,MAAMA,sBAAsB,CAAoC;EAGnEC,WAAWA,CAACC,kBAAuC,EAAE;IACjD,IAAI,CAACA,kBAAkB,GAAGA,kBAAkB;EAChD;EAEA,MAAMC,OAAOA,CAAC;IAAEC,WAAW,GAAG,EAAE;IAAEC;EAAkC,CAAC,EAAE;IACnE,MAAMC,QAAQ,GAAG,IAAI,CAACJ,kBAAkB,CAACC,OAAO,CAAC,CAAC;IAElD,MAAMI,yBAAyB,GAAGH,WAAW,CAACI,IAAI,CAACC,CAAC,IAAI;MACpD,OAAOA,CAAC,CAACC,MAAM,KAAK,SAASJ,QAAQ,CAACK,EAAE,EAAE;IAC9C,CAAC,CAAC;IAEF,IAAI,CAACJ,yBAAyB,EAAE;MAC5B,OAAO,KAAK;IAChB;IAEA,MAAM;MAAEK;IAAM,CAAC,GAAGL,yBAAyB;;IAE3C;IACA,IAAIK,KAAK,KAAK,WAAW,EAAE;MACvB,OAAO,KAAK;IAChB;;IAEA;IACA;IACA,IAAIP,GAAG,KAAK,GAAG,EAAE;MACb,OAAOO,KAAK,KAAK,QAAQ;IAC7B;IAEA,OAAO,IAAI;EACf;AACJ;AAACC,OAAA,CAAAb,sBAAA,GAAAA,sBAAA","ignoreList":[]}
|
package/flp/FolderLevelPermissions/useCases/CanAccessFolderContent/ICanAccessFolderContent.d.ts
ADDED
|
@@ -0,0 +1,8 @@
|
|
|
1
|
+
import type { FolderPermission } from "../../../flp.types";
|
|
2
|
+
export interface CanAccessFolderContentParams {
|
|
3
|
+
permissions?: FolderPermission[];
|
|
4
|
+
rwd?: "r" | "w" | "d";
|
|
5
|
+
}
|
|
6
|
+
export interface ICanAccessFolderContent {
|
|
7
|
+
execute: (params: CanAccessFolderContentParams) => Promise<boolean>;
|
|
8
|
+
}
|
package/flp/FolderLevelPermissions/useCases/CanAccessFolderContent/ICanAccessFolderContent.js.map
ADDED
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"names":[],"sources":["ICanAccessFolderContent.ts"],"sourcesContent":["import type { FolderPermission } from \"~/flp/flp.types\";\n\nexport interface CanAccessFolderContentParams {\n permissions?: FolderPermission[];\n rwd?: \"r\" | \"w\" | \"d\";\n}\n\nexport interface ICanAccessFolderContent {\n execute: (params: CanAccessFolderContentParams) => Promise<boolean>;\n}\n"],"mappings":"","ignoreList":[]}
|
|
@@ -0,0 +1,29 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
|
|
3
|
+
Object.defineProperty(exports, "__esModule", {
|
|
4
|
+
value: true
|
|
5
|
+
});
|
|
6
|
+
var _CanAccessFolderContent = require("./CanAccessFolderContent");
|
|
7
|
+
Object.keys(_CanAccessFolderContent).forEach(function (key) {
|
|
8
|
+
if (key === "default" || key === "__esModule") return;
|
|
9
|
+
if (key in exports && exports[key] === _CanAccessFolderContent[key]) return;
|
|
10
|
+
Object.defineProperty(exports, key, {
|
|
11
|
+
enumerable: true,
|
|
12
|
+
get: function () {
|
|
13
|
+
return _CanAccessFolderContent[key];
|
|
14
|
+
}
|
|
15
|
+
});
|
|
16
|
+
});
|
|
17
|
+
var _ICanAccessFolderContent = require("./ICanAccessFolderContent");
|
|
18
|
+
Object.keys(_ICanAccessFolderContent).forEach(function (key) {
|
|
19
|
+
if (key === "default" || key === "__esModule") return;
|
|
20
|
+
if (key in exports && exports[key] === _ICanAccessFolderContent[key]) return;
|
|
21
|
+
Object.defineProperty(exports, key, {
|
|
22
|
+
enumerable: true,
|
|
23
|
+
get: function () {
|
|
24
|
+
return _ICanAccessFolderContent[key];
|
|
25
|
+
}
|
|
26
|
+
});
|
|
27
|
+
});
|
|
28
|
+
|
|
29
|
+
//# sourceMappingURL=index.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"names":["_CanAccessFolderContent","require","Object","keys","forEach","key","exports","defineProperty","enumerable","get","_ICanAccessFolderContent"],"sources":["index.ts"],"sourcesContent":["export * from \"./CanAccessFolderContent\";\nexport * from \"./ICanAccessFolderContent\";\n"],"mappings":";;;;;AAAA,IAAAA,uBAAA,GAAAC,OAAA;AAAAC,MAAA,CAAAC,IAAA,CAAAH,uBAAA,EAAAI,OAAA,WAAAC,GAAA;EAAA,IAAAA,GAAA,kBAAAA,GAAA;EAAA,IAAAA,GAAA,IAAAC,OAAA,IAAAA,OAAA,CAAAD,GAAA,MAAAL,uBAAA,CAAAK,GAAA;EAAAH,MAAA,CAAAK,cAAA,CAAAD,OAAA,EAAAD,GAAA;IAAAG,UAAA;IAAAC,GAAA,WAAAA,CAAA;MAAA,OAAAT,uBAAA,CAAAK,GAAA;IAAA;EAAA;AAAA;AACA,IAAAK,wBAAA,GAAAT,OAAA;AAAAC,MAAA,CAAAC,IAAA,CAAAO,wBAAA,EAAAN,OAAA,WAAAC,GAAA;EAAA,IAAAA,GAAA,kBAAAA,GAAA;EAAA,IAAAA,GAAA,IAAAC,OAAA,IAAAA,OAAA,CAAAD,GAAA,MAAAK,wBAAA,CAAAL,GAAA;EAAAH,MAAA,CAAAK,cAAA,CAAAD,OAAA,EAAAD,GAAA;IAAAG,UAAA;IAAAC,GAAA,WAAAA,CAAA;MAAA,OAAAC,wBAAA,CAAAL,GAAA;IAAA;EAAA;AAAA","ignoreList":[]}
|
|
@@ -0,0 +1,14 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
|
|
3
|
+
Object.defineProperty(exports, "__esModule", {
|
|
4
|
+
value: true
|
|
5
|
+
});
|
|
6
|
+
exports.CanCreateFolderInRoot = void 0;
|
|
7
|
+
class CanCreateFolderInRoot {
|
|
8
|
+
execute() {
|
|
9
|
+
return true;
|
|
10
|
+
}
|
|
11
|
+
}
|
|
12
|
+
exports.CanCreateFolderInRoot = CanCreateFolderInRoot;
|
|
13
|
+
|
|
14
|
+
//# sourceMappingURL=CanCreateFolderInRoot.js.map
|
package/flp/FolderLevelPermissions/useCases/CanCreateFolderInRoot/CanCreateFolderInRoot.js.map
ADDED
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"names":["CanCreateFolderInRoot","execute","exports"],"sources":["CanCreateFolderInRoot.ts"],"sourcesContent":["import type { ICanCreateFolderInRoot } from \"./ICanCreateFolderInRoot\";\n\nexport class CanCreateFolderInRoot implements ICanCreateFolderInRoot {\n execute() {\n return true;\n }\n}\n"],"mappings":";;;;;;AAEO,MAAMA,qBAAqB,CAAmC;EACjEC,OAAOA,CAAA,EAAG;IACN,OAAO,IAAI;EACf;AACJ;AAACC,OAAA,CAAAF,qBAAA,GAAAA,qBAAA","ignoreList":[]}
|
package/flp/FolderLevelPermissions/useCases/CanCreateFolderInRoot/ICanCreateFolderInRoot.js.map
ADDED
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"names":[],"sources":["ICanCreateFolderInRoot.ts"],"sourcesContent":["export interface ICanCreateFolderInRoot {\n execute: () => boolean;\n}\n"],"mappings":"","ignoreList":[]}
|
|
@@ -0,0 +1,29 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
|
|
3
|
+
Object.defineProperty(exports, "__esModule", {
|
|
4
|
+
value: true
|
|
5
|
+
});
|
|
6
|
+
var _CanCreateFolderInRoot = require("./CanCreateFolderInRoot");
|
|
7
|
+
Object.keys(_CanCreateFolderInRoot).forEach(function (key) {
|
|
8
|
+
if (key === "default" || key === "__esModule") return;
|
|
9
|
+
if (key in exports && exports[key] === _CanCreateFolderInRoot[key]) return;
|
|
10
|
+
Object.defineProperty(exports, key, {
|
|
11
|
+
enumerable: true,
|
|
12
|
+
get: function () {
|
|
13
|
+
return _CanCreateFolderInRoot[key];
|
|
14
|
+
}
|
|
15
|
+
});
|
|
16
|
+
});
|
|
17
|
+
var _ICanCreateFolderInRoot = require("./ICanCreateFolderInRoot");
|
|
18
|
+
Object.keys(_ICanCreateFolderInRoot).forEach(function (key) {
|
|
19
|
+
if (key === "default" || key === "__esModule") return;
|
|
20
|
+
if (key in exports && exports[key] === _ICanCreateFolderInRoot[key]) return;
|
|
21
|
+
Object.defineProperty(exports, key, {
|
|
22
|
+
enumerable: true,
|
|
23
|
+
get: function () {
|
|
24
|
+
return _ICanCreateFolderInRoot[key];
|
|
25
|
+
}
|
|
26
|
+
});
|
|
27
|
+
});
|
|
28
|
+
|
|
29
|
+
//# sourceMappingURL=index.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"names":["_CanCreateFolderInRoot","require","Object","keys","forEach","key","exports","defineProperty","enumerable","get","_ICanCreateFolderInRoot"],"sources":["index.ts"],"sourcesContent":["export * from \"./CanCreateFolderInRoot\";\nexport * from \"./ICanCreateFolderInRoot\";\n"],"mappings":";;;;;AAAA,IAAAA,sBAAA,GAAAC,OAAA;AAAAC,MAAA,CAAAC,IAAA,CAAAH,sBAAA,EAAAI,OAAA,WAAAC,GAAA;EAAA,IAAAA,GAAA,kBAAAA,GAAA;EAAA,IAAAA,GAAA,IAAAC,OAAA,IAAAA,OAAA,CAAAD,GAAA,MAAAL,sBAAA,CAAAK,GAAA;EAAAH,MAAA,CAAAK,cAAA,CAAAD,OAAA,EAAAD,GAAA;IAAAG,UAAA;IAAAC,GAAA,WAAAA,CAAA;MAAA,OAAAT,sBAAA,CAAAK,GAAA;IAAA;EAAA;AAAA;AACA,IAAAK,uBAAA,GAAAT,OAAA;AAAAC,MAAA,CAAAC,IAAA,CAAAO,uBAAA,EAAAN,OAAA,WAAAC,GAAA;EAAA,IAAAA,GAAA,kBAAAA,GAAA;EAAA,IAAAA,GAAA,IAAAC,OAAA,IAAAA,OAAA,CAAAD,GAAA,MAAAK,uBAAA,CAAAL,GAAA;EAAAH,MAAA,CAAAK,cAAA,CAAAD,OAAA,EAAAD,GAAA;IAAAG,UAAA;IAAAC,GAAA,WAAAA,CAAA;MAAA,OAAAC,uBAAA,CAAAL,GAAA;IAAA;EAAA;AAAA","ignoreList":[]}
|
|
@@ -0,0 +1,9 @@
|
|
|
1
|
+
import type { ICanUseFolderLevelPermissions } from "./ICanUseFolderPermissions";
|
|
2
|
+
import type { IGetIdentityGateway } from "../../gateways";
|
|
3
|
+
import type { IGetWcpGateway } from "../../gateways/GetWcpGateway";
|
|
4
|
+
export declare class CanUseFolderLevelPermissions implements ICanUseFolderLevelPermissions {
|
|
5
|
+
private getWcpGateway;
|
|
6
|
+
private readonly getIdentityGateway;
|
|
7
|
+
constructor(getWcpGateway: IGetWcpGateway, getIdentityGateway: IGetIdentityGateway);
|
|
8
|
+
execute(enabled?: boolean): boolean;
|
|
9
|
+
}
|
|
@@ -0,0 +1,34 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
|
|
3
|
+
Object.defineProperty(exports, "__esModule", {
|
|
4
|
+
value: true
|
|
5
|
+
});
|
|
6
|
+
exports.CanUseFolderLevelPermissions = void 0;
|
|
7
|
+
class CanUseFolderLevelPermissions {
|
|
8
|
+
constructor(getWcpGateway, getIdentityGateway) {
|
|
9
|
+
this.getWcpGateway = getWcpGateway;
|
|
10
|
+
this.getIdentityGateway = getIdentityGateway;
|
|
11
|
+
}
|
|
12
|
+
execute(enabled) {
|
|
13
|
+
if (enabled === false) {
|
|
14
|
+
return false;
|
|
15
|
+
}
|
|
16
|
+
const identity = this.getIdentityGateway.execute();
|
|
17
|
+
|
|
18
|
+
// FLPs only work with authenticated identities (logged-in users).
|
|
19
|
+
if (!identity) {
|
|
20
|
+
return false;
|
|
21
|
+
}
|
|
22
|
+
|
|
23
|
+
// At the moment, we only want FLP to be used with identities of type "admin".
|
|
24
|
+
// This temporarily addresses the issue of API keys not being able to access content, because
|
|
25
|
+
// FLPs doesn't work with them. Once we start adding FLPs to API keys, we can remove this check.
|
|
26
|
+
if (identity.type !== "admin") {
|
|
27
|
+
return false;
|
|
28
|
+
}
|
|
29
|
+
return this.getWcpGateway.execute().canUseFolderLevelPermissions();
|
|
30
|
+
}
|
|
31
|
+
}
|
|
32
|
+
exports.CanUseFolderLevelPermissions = CanUseFolderLevelPermissions;
|
|
33
|
+
|
|
34
|
+
//# sourceMappingURL=CanUseFolderLevelPermissions.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"names":["CanUseFolderLevelPermissions","constructor","getWcpGateway","getIdentityGateway","execute","enabled","identity","type","canUseFolderLevelPermissions","exports"],"sources":["CanUseFolderLevelPermissions.ts"],"sourcesContent":["import type { ICanUseFolderLevelPermissions } from \"./ICanUseFolderPermissions\";\nimport type { IGetIdentityGateway } from \"~/flp/FolderLevelPermissions/gateways\";\nimport type { IGetWcpGateway } from \"~/flp/FolderLevelPermissions/gateways/GetWcpGateway\";\n\nexport class CanUseFolderLevelPermissions implements ICanUseFolderLevelPermissions {\n private getWcpGateway: IGetWcpGateway;\n private readonly getIdentityGateway: IGetIdentityGateway;\n\n constructor(getWcpGateway: IGetWcpGateway, getIdentityGateway: IGetIdentityGateway) {\n this.getWcpGateway = getWcpGateway;\n this.getIdentityGateway = getIdentityGateway;\n }\n\n execute(enabled?: boolean) {\n if (enabled === false) {\n return false;\n }\n\n const identity = this.getIdentityGateway.execute();\n\n // FLPs only work with authenticated identities (logged-in users).\n if (!identity) {\n return false;\n }\n\n // At the moment, we only want FLP to be used with identities of type \"admin\".\n // This temporarily addresses the issue of API keys not being able to access content, because\n // FLPs doesn't work with them. Once we start adding FLPs to API keys, we can remove this check.\n if (identity.type !== \"admin\") {\n return false;\n }\n\n return this.getWcpGateway.execute().canUseFolderLevelPermissions();\n }\n}\n"],"mappings":";;;;;;AAIO,MAAMA,4BAA4B,CAA0C;EAI/EC,WAAWA,CAACC,aAA6B,EAAEC,kBAAuC,EAAE;IAChF,IAAI,CAACD,aAAa,GAAGA,aAAa;IAClC,IAAI,CAACC,kBAAkB,GAAGA,kBAAkB;EAChD;EAEAC,OAAOA,CAACC,OAAiB,EAAE;IACvB,IAAIA,OAAO,KAAK,KAAK,EAAE;MACnB,OAAO,KAAK;IAChB;IAEA,MAAMC,QAAQ,GAAG,IAAI,CAACH,kBAAkB,CAACC,OAAO,CAAC,CAAC;;IAElD;IACA,IAAI,CAACE,QAAQ,EAAE;MACX,OAAO,KAAK;IAChB;;IAEA;IACA;IACA;IACA,IAAIA,QAAQ,CAACC,IAAI,KAAK,OAAO,EAAE;MAC3B,OAAO,KAAK;IAChB;IAEA,OAAO,IAAI,CAACL,aAAa,CAACE,OAAO,CAAC,CAAC,CAACI,4BAA4B,CAAC,CAAC;EACtE;AACJ;AAACC,OAAA,CAAAT,4BAAA,GAAAA,4BAAA","ignoreList":[]}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"names":[],"sources":["ICanUseFolderPermissions.ts"],"sourcesContent":["export interface ICanUseFolderLevelPermissions {\n execute: (enabled?: boolean) => boolean;\n}\n"],"mappings":"","ignoreList":[]}
|
|
@@ -0,0 +1,29 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
|
|
3
|
+
Object.defineProperty(exports, "__esModule", {
|
|
4
|
+
value: true
|
|
5
|
+
});
|
|
6
|
+
var _CanUseFolderLevelPermissions = require("./CanUseFolderLevelPermissions");
|
|
7
|
+
Object.keys(_CanUseFolderLevelPermissions).forEach(function (key) {
|
|
8
|
+
if (key === "default" || key === "__esModule") return;
|
|
9
|
+
if (key in exports && exports[key] === _CanUseFolderLevelPermissions[key]) return;
|
|
10
|
+
Object.defineProperty(exports, key, {
|
|
11
|
+
enumerable: true,
|
|
12
|
+
get: function () {
|
|
13
|
+
return _CanUseFolderLevelPermissions[key];
|
|
14
|
+
}
|
|
15
|
+
});
|
|
16
|
+
});
|
|
17
|
+
var _ICanUseFolderPermissions = require("./ICanUseFolderPermissions");
|
|
18
|
+
Object.keys(_ICanUseFolderPermissions).forEach(function (key) {
|
|
19
|
+
if (key === "default" || key === "__esModule") return;
|
|
20
|
+
if (key in exports && exports[key] === _ICanUseFolderPermissions[key]) return;
|
|
21
|
+
Object.defineProperty(exports, key, {
|
|
22
|
+
enumerable: true,
|
|
23
|
+
get: function () {
|
|
24
|
+
return _ICanUseFolderPermissions[key];
|
|
25
|
+
}
|
|
26
|
+
});
|
|
27
|
+
});
|
|
28
|
+
|
|
29
|
+
//# sourceMappingURL=index.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"names":["_CanUseFolderLevelPermissions","require","Object","keys","forEach","key","exports","defineProperty","enumerable","get","_ICanUseFolderPermissions"],"sources":["index.ts"],"sourcesContent":["export * from \"./CanUseFolderLevelPermissions\";\nexport * from \"./ICanUseFolderPermissions\";\n"],"mappings":";;;;;AAAA,IAAAA,6BAAA,GAAAC,OAAA;AAAAC,MAAA,CAAAC,IAAA,CAAAH,6BAAA,EAAAI,OAAA,WAAAC,GAAA;EAAA,IAAAA,GAAA,kBAAAA,GAAA;EAAA,IAAAA,GAAA,IAAAC,OAAA,IAAAA,OAAA,CAAAD,GAAA,MAAAL,6BAAA,CAAAK,GAAA;EAAAH,MAAA,CAAAK,cAAA,CAAAD,OAAA,EAAAD,GAAA;IAAAG,UAAA;IAAAC,GAAA,WAAAA,CAAA;MAAA,OAAAT,6BAAA,CAAAK,GAAA;IAAA;EAAA;AAAA;AACA,IAAAK,yBAAA,GAAAT,OAAA;AAAAC,MAAA,CAAAC,IAAA,CAAAO,yBAAA,EAAAN,OAAA,WAAAC,GAAA;EAAA,IAAAA,GAAA,kBAAAA,GAAA;EAAA,IAAAA,GAAA,IAAAC,OAAA,IAAAA,OAAA,CAAAD,GAAA,MAAAK,yBAAA,CAAAL,GAAA;EAAAH,MAAA,CAAAK,cAAA,CAAAD,OAAA,EAAAD,GAAA;IAAAG,UAAA;IAAAC,GAAA,WAAAA,CAAA;MAAA,OAAAC,yBAAA,CAAAL,GAAA;IAAA;EAAA;AAAA","ignoreList":[]}
|
|
@@ -0,0 +1,7 @@
|
|
|
1
|
+
import type { ICanUseTeams } from "./ICanUseTeams";
|
|
2
|
+
import type { IGetWcpGateway } from "../../gateways/GetWcpGateway";
|
|
3
|
+
export declare class CanUseTeams implements ICanUseTeams {
|
|
4
|
+
private getWcpGateway;
|
|
5
|
+
constructor(getWcpGateway: IGetWcpGateway);
|
|
6
|
+
execute(): boolean;
|
|
7
|
+
}
|
|
@@ -0,0 +1,17 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
|
|
3
|
+
Object.defineProperty(exports, "__esModule", {
|
|
4
|
+
value: true
|
|
5
|
+
});
|
|
6
|
+
exports.CanUseTeams = void 0;
|
|
7
|
+
class CanUseTeams {
|
|
8
|
+
constructor(getWcpGateway) {
|
|
9
|
+
this.getWcpGateway = getWcpGateway;
|
|
10
|
+
}
|
|
11
|
+
execute() {
|
|
12
|
+
return this.getWcpGateway.execute().canUseTeams();
|
|
13
|
+
}
|
|
14
|
+
}
|
|
15
|
+
exports.CanUseTeams = CanUseTeams;
|
|
16
|
+
|
|
17
|
+
//# sourceMappingURL=CanUseTeams.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"names":["CanUseTeams","constructor","getWcpGateway","execute","canUseTeams","exports"],"sources":["CanUseTeams.ts"],"sourcesContent":["import type { ICanUseTeams } from \"./ICanUseTeams\";\nimport type { IGetWcpGateway } from \"~/flp/FolderLevelPermissions/gateways/GetWcpGateway\";\n\nexport class CanUseTeams implements ICanUseTeams {\n private getWcpGateway: IGetWcpGateway;\n\n constructor(getWcpGateway: IGetWcpGateway) {\n this.getWcpGateway = getWcpGateway;\n }\n\n execute() {\n return this.getWcpGateway.execute().canUseTeams();\n }\n}\n"],"mappings":";;;;;;AAGO,MAAMA,WAAW,CAAyB;EAG7CC,WAAWA,CAACC,aAA6B,EAAE;IACvC,IAAI,CAACA,aAAa,GAAGA,aAAa;EACtC;EAEAC,OAAOA,CAAA,EAAG;IACN,OAAO,IAAI,CAACD,aAAa,CAACC,OAAO,CAAC,CAAC,CAACC,WAAW,CAAC,CAAC;EACrD;AACJ;AAACC,OAAA,CAAAL,WAAA,GAAAA,WAAA","ignoreList":[]}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"names":[],"sources":["ICanUseTeams.ts"],"sourcesContent":["export interface ICanUseTeams {\n execute: () => boolean;\n}\n"],"mappings":"","ignoreList":[]}
|
|
@@ -0,0 +1,29 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
|
|
3
|
+
Object.defineProperty(exports, "__esModule", {
|
|
4
|
+
value: true
|
|
5
|
+
});
|
|
6
|
+
var _CanUseTeams = require("./CanUseTeams");
|
|
7
|
+
Object.keys(_CanUseTeams).forEach(function (key) {
|
|
8
|
+
if (key === "default" || key === "__esModule") return;
|
|
9
|
+
if (key in exports && exports[key] === _CanUseTeams[key]) return;
|
|
10
|
+
Object.defineProperty(exports, key, {
|
|
11
|
+
enumerable: true,
|
|
12
|
+
get: function () {
|
|
13
|
+
return _CanUseTeams[key];
|
|
14
|
+
}
|
|
15
|
+
});
|
|
16
|
+
});
|
|
17
|
+
var _ICanUseTeams = require("./ICanUseTeams");
|
|
18
|
+
Object.keys(_ICanUseTeams).forEach(function (key) {
|
|
19
|
+
if (key === "default" || key === "__esModule") return;
|
|
20
|
+
if (key in exports && exports[key] === _ICanUseTeams[key]) return;
|
|
21
|
+
Object.defineProperty(exports, key, {
|
|
22
|
+
enumerable: true,
|
|
23
|
+
get: function () {
|
|
24
|
+
return _ICanUseTeams[key];
|
|
25
|
+
}
|
|
26
|
+
});
|
|
27
|
+
});
|
|
28
|
+
|
|
29
|
+
//# sourceMappingURL=index.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"names":["_CanUseTeams","require","Object","keys","forEach","key","exports","defineProperty","enumerable","get","_ICanUseTeams"],"sources":["index.ts"],"sourcesContent":["export * from \"./CanUseTeams\";\nexport * from \"./ICanUseTeams\";\n"],"mappings":";;;;;AAAA,IAAAA,YAAA,GAAAC,OAAA;AAAAC,MAAA,CAAAC,IAAA,CAAAH,YAAA,EAAAI,OAAA,WAAAC,GAAA;EAAA,IAAAA,GAAA,kBAAAA,GAAA;EAAA,IAAAA,GAAA,IAAAC,OAAA,IAAAA,OAAA,CAAAD,GAAA,MAAAL,YAAA,CAAAK,GAAA;EAAAH,MAAA,CAAAK,cAAA,CAAAD,OAAA,EAAAD,GAAA;IAAAG,UAAA;IAAAC,GAAA,WAAAA,CAAA;MAAA,OAAAT,YAAA,CAAAK,GAAA;IAAA;EAAA;AAAA;AACA,IAAAK,aAAA,GAAAT,OAAA;AAAAC,MAAA,CAAAC,IAAA,CAAAO,aAAA,EAAAN,OAAA,WAAAC,GAAA;EAAA,IAAAA,GAAA,kBAAAA,GAAA;EAAA,IAAAA,GAAA,IAAAC,OAAA,IAAAA,OAAA,CAAAD,GAAA,MAAAK,aAAA,CAAAL,GAAA;EAAAH,MAAA,CAAAK,cAAA,CAAAD,OAAA,EAAAD,GAAA;IAAAG,UAAA;IAAAC,GAAA,WAAAA,CAAA;MAAA,OAAAC,aAAA,CAAAL,GAAA;IAAA;EAAA;AAAA","ignoreList":[]}
|
|
@@ -0,0 +1,5 @@
|
|
|
1
|
+
import type { ICheckNotInheritedPermissions } from "./ICheckNotInheritedPermissions";
|
|
2
|
+
import type { FolderPermission } from "../../../flp.types";
|
|
3
|
+
export declare class CheckNotInheritedPermissions implements ICheckNotInheritedPermissions {
|
|
4
|
+
execute(permissions?: FolderPermission[]): boolean | undefined;
|
|
5
|
+
}
|
|
@@ -0,0 +1,14 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
|
|
3
|
+
Object.defineProperty(exports, "__esModule", {
|
|
4
|
+
value: true
|
|
5
|
+
});
|
|
6
|
+
exports.CheckNotInheritedPermissions = void 0;
|
|
7
|
+
class CheckNotInheritedPermissions {
|
|
8
|
+
execute(permissions) {
|
|
9
|
+
return permissions?.some(p => !p.inheritedFrom);
|
|
10
|
+
}
|
|
11
|
+
}
|
|
12
|
+
exports.CheckNotInheritedPermissions = CheckNotInheritedPermissions;
|
|
13
|
+
|
|
14
|
+
//# sourceMappingURL=CheckNotInheritedPermissions.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"names":["CheckNotInheritedPermissions","execute","permissions","some","p","inheritedFrom","exports"],"sources":["CheckNotInheritedPermissions.ts"],"sourcesContent":["import type { ICheckNotInheritedPermissions } from \"./ICheckNotInheritedPermissions\";\nimport type { FolderPermission } from \"~/flp/flp.types\";\n\nexport class CheckNotInheritedPermissions implements ICheckNotInheritedPermissions {\n execute(permissions?: FolderPermission[]) {\n return permissions?.some(p => !p.inheritedFrom);\n }\n}\n"],"mappings":";;;;;;AAGO,MAAMA,4BAA4B,CAA0C;EAC/EC,OAAOA,CAACC,WAAgC,EAAE;IACtC,OAAOA,WAAW,EAAEC,IAAI,CAACC,CAAC,IAAI,CAACA,CAAC,CAACC,aAAa,CAAC;EACnD;AACJ;AAACC,OAAA,CAAAN,4BAAA,GAAAA,4BAAA","ignoreList":[]}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"names":[],"sources":["ICheckNotInheritedPermissions.ts"],"sourcesContent":["import type { FolderPermission } from \"~/flp/flp.types\";\n\nexport interface ICheckNotInheritedPermissions {\n execute: (permissions?: FolderPermission[]) => boolean | undefined;\n}\n"],"mappings":"","ignoreList":[]}
|