chyz 1.2.4-rc.2 → 1.2.4-rc.5
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/BaseChyz.d.ts +62 -0
- package/BaseChyz.js +9 -17
- package/BaseChyz.js.map +1 -1
- package/Chyz.d.ts +3 -0
- package/Chyz.js +2 -4
- package/Chyz.js.map +1 -1
- package/base/ActionFilter.d.ts +26 -0
- package/base/ActionFilter.js +10 -15
- package/base/ActionFilter.js.map +1 -1
- package/base/BaseError.d.ts +10 -0
- package/base/BaseError.js +2 -4
- package/base/BaseError.js.map +1 -1
- package/base/BaseObject.d.ts +4 -0
- package/base/BaseObject.js +2 -4
- package/base/BaseObject.js.map +1 -1
- package/base/Behavior.d.ts +3 -0
- package/base/CWebController.d.ts +43 -0
- package/base/CWebController.js +2 -10
- package/base/CWebController.js.map +1 -1
- package/base/Component.d.ts +21 -0
- package/base/Component.js +2 -4
- package/base/Component.js.map +1 -1
- package/base/Configurable.d.ts +2 -0
- package/base/DataErrorDbException.d.ts +5 -0
- package/base/DbConnection.d.ts +12 -0
- package/base/DbConnection.js +3 -14
- package/base/DbConnection.js.map +1 -1
- package/base/ForbiddenHttpException.d.ts +4 -0
- package/base/InvalidArgumentException.d.ts +5 -0
- package/base/InvalidConfigException.d.ts +5 -0
- package/base/Model.d.ts +298 -0
- package/base/Model.js +6 -17
- package/base/Model.js.map +1 -1
- package/base/ModelManager.d.ts +1 -0
- package/base/NotFoundHttpException.d.ts +5 -0
- package/base/RestClient.d.ts +8 -0
- package/base/UnauthorizedHttpException.d.ts +5 -0
- package/base/ValidationHttpException.d.ts +5 -0
- package/base/db/Exception.d.ts +6 -0
- package/base/index.d.ts +18 -0
- package/base/index.js +19 -28
- package/base/index.js.map +1 -1
- package/decorator/Middleware.d.ts +3 -0
- package/decorator/controller.d.ts +2 -0
- package/decorator/enums/ControllerDecoratorParams.d.ts +5 -0
- package/decorator/get.d.ts +2 -0
- package/decorator/index.d.ts +3 -0
- package/decorator/index.js +4 -13
- package/decorator/index.js.map +1 -1
- package/decorator/post.d.ts +2 -0
- package/filters/AccessControl.d.ts +11 -0
- package/filters/AccessControl.js +4 -15
- package/filters/AccessControl.js.map +1 -1
- package/filters/AccessRule.d.ts +82 -0
- package/filters/AccessRule.js +4 -15
- package/filters/AccessRule.js.map +1 -1
- package/filters/auth/AuthInterface.d.ts +25 -0
- package/filters/auth/AuthMethod.d.ts +25 -0
- package/filters/auth/AuthMethod.js +2 -10
- package/filters/auth/AuthMethod.js.map +1 -1
- package/filters/auth/HttpBasicAuth.d.ts +22 -0
- package/filters/auth/HttpBasicAuth.js +3 -14
- package/filters/auth/HttpBasicAuth.js.map +1 -1
- package/filters/auth/HttpBearerAuth.d.ts +17 -0
- package/filters/auth/HttpHeaderAuth.d.ts +14 -0
- package/filters/auth/HttpHeaderAuth.js +3 -14
- package/filters/auth/HttpHeaderAuth.js.map +1 -1
- package/filters/auth/JwtHttpBearerAuth.d.ts +20 -0
- package/filters/auth/JwtHttpBearerAuth.js +3 -14
- package/filters/auth/JwtHttpBearerAuth.js.map +1 -1
- package/filters/auth/KeyCloakHttpBearerAuth.d.ts +22 -0
- package/filters/auth/KeyCloakHttpBearerAuth.js +4 -15
- package/filters/auth/KeyCloakHttpBearerAuth.js.map +1 -1
- package/filters/auth/index.d.ts +4 -0
- package/filters/auth/index.js +5 -14
- package/filters/auth/index.js.map +1 -1
- package/filters/index.d.ts +2 -0
- package/filters/index.js +3 -12
- package/filters/index.js.map +1 -1
- package/index.d.ts +15 -0
- package/index.js +7 -19
- package/index.js.map +1 -1
- package/model/RouteDefinition.d.ts +6 -0
- package/package.json +6 -1
- package/rbac/AuthAssignment.d.ts +18 -0
- package/rbac/AuthItem.d.ts +26 -0
- package/rbac/AuthItemChild.d.ts +18 -0
- package/rbac/AuthManager.d.ts +111 -0
- package/rbac/AuthManager.js +18 -29
- package/rbac/AuthManager.js.map +1 -1
- package/requiments/Glob.d.ts +2 -0
- package/requiments/ReflectUtil.d.ts +0 -0
- package/requiments/Utils.d.ts +2 -0
- package/validators/BooleanValidator.d.ts +0 -0
- package/validators/CompareValidator.d.ts +0 -0
- package/validators/DateValidator.d.ts +0 -0
- package/validators/EmailValidator.d.ts +0 -0
- package/validators/Validator.d.ts +17 -0
- package/web/IdentityInterface.d.ts +54 -0
- package/web/WebUser.d.ts +71 -0
- package/web/WebUser.js +5 -16
- package/web/WebUser.js.map +1 -1
package/index.js
CHANGED
|
@@ -1,27 +1,15 @@
|
|
|
1
1
|
"use strict";
|
|
2
|
-
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
3
|
-
if (k2 === undefined) k2 = k;
|
|
4
|
-
Object.defineProperty(o, k2, { enumerable: true, get: function() { return m[k]; } });
|
|
5
|
-
}) : (function(o, m, k, k2) {
|
|
6
|
-
if (k2 === undefined) k2 = k;
|
|
7
|
-
o[k2] = m[k];
|
|
8
|
-
}));
|
|
9
|
-
var __exportStar = (this && this.__exportStar) || function(m, exports) {
|
|
10
|
-
for (var p in m) if (p !== "default" && !Object.prototype.hasOwnProperty.call(exports, p)) __createBinding(exports, m, p);
|
|
11
|
-
};
|
|
12
|
-
var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
13
|
-
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
14
|
-
};
|
|
15
2
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
16
3
|
exports.BaseChyz = exports.WebUser = void 0;
|
|
17
|
-
|
|
18
|
-
__exportStar(require("./
|
|
19
|
-
__exportStar(require("./filters
|
|
20
|
-
__exportStar(require("./
|
|
21
|
-
__exportStar(require("./
|
|
4
|
+
const tslib_1 = require("tslib");
|
|
5
|
+
tslib_1.__exportStar(require("./base"), exports);
|
|
6
|
+
tslib_1.__exportStar(require("./filters"), exports);
|
|
7
|
+
tslib_1.__exportStar(require("./filters/auth"), exports);
|
|
8
|
+
tslib_1.__exportStar(require("./decorator"), exports);
|
|
9
|
+
tslib_1.__exportStar(require("./requiments/Utils"), exports);
|
|
22
10
|
var WebUser_1 = require("./web/WebUser");
|
|
23
11
|
Object.defineProperty(exports, "WebUser", { enumerable: true, get: function () { return WebUser_1.WebUser; } });
|
|
24
|
-
const BaseChyz_1 = __importDefault(require("./BaseChyz"));
|
|
12
|
+
const BaseChyz_1 = tslib_1.__importDefault(require("./BaseChyz"));
|
|
25
13
|
exports.BaseChyz = BaseChyz_1.default;
|
|
26
14
|
/**
|
|
27
15
|
*
|
package/index.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.js","sourceRoot":"","sources":["../index.ts"],"names":[],"mappings":"
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../index.ts"],"names":[],"mappings":";;;;AACA,iDAAuB;AACvB,oDAA0B;AAC1B,yDAA+B;AAC/B,sDAA4B;AAC5B,6DAAmC;AAEnC,yCAAsC;AAA9B,kGAAA,OAAO,OAAA;AAEf,kEAAkC;AAC1B,mBADD,kBAAQ,CACC;AAChB;;GAEG;AACH,MAAM,IAAI,GAAG,IAAI,kBAAQ,EAAE,CAAC;AAC5B,kBAAe,IAAI,CAAC"}
|
package/package.json
CHANGED
|
@@ -1,6 +1,8 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "chyz",
|
|
3
|
-
"version": "1.2.4-rc.
|
|
3
|
+
"version": "1.2.4-rc.5",
|
|
4
|
+
"main": "dist/index",
|
|
5
|
+
"typings": "dist/index",
|
|
4
6
|
"description": "Nodejs Micro service Framework",
|
|
5
7
|
"scripts": {
|
|
6
8
|
"dev": "nodemon -t --trace-warnings index.ts",
|
|
@@ -23,6 +25,8 @@
|
|
|
23
25
|
"axios": "^0.23.0",
|
|
24
26
|
"babel-plugin-transform-decorators-legacy": "^1.3.5",
|
|
25
27
|
"body-parser": "^1.19.0",
|
|
28
|
+
"compression": "^1.7.4",
|
|
29
|
+
"core-js": "^3.24.1",
|
|
26
30
|
"dotenv-flow": "^3.2.0",
|
|
27
31
|
"express": "^4.17.1",
|
|
28
32
|
"express-session": "^1.17.2",
|
|
@@ -38,6 +42,7 @@
|
|
|
38
42
|
"reflect-metadata": "^0.1.13",
|
|
39
43
|
"sequelize": "^6.6.5",
|
|
40
44
|
"sequelize-transparent-cache": "^2.3.0",
|
|
45
|
+
"tslib": "^2.4.0",
|
|
41
46
|
"validate.js": "^0.13.1"
|
|
42
47
|
},
|
|
43
48
|
"devDependencies": {
|
|
@@ -0,0 +1,18 @@
|
|
|
1
|
+
import { DataTypes, Model, Relation } from "../base";
|
|
2
|
+
export declare class AuthAssignmentClass extends Model {
|
|
3
|
+
[x: string]: any;
|
|
4
|
+
tableName(): string;
|
|
5
|
+
attributes(): {
|
|
6
|
+
item_name: {
|
|
7
|
+
type: DataTypes.StringDataTypeConstructor;
|
|
8
|
+
primaryKey: boolean;
|
|
9
|
+
allowNull: boolean;
|
|
10
|
+
};
|
|
11
|
+
user_id: {
|
|
12
|
+
type: DataTypes.StringDataTypeConstructor;
|
|
13
|
+
allowNull: boolean;
|
|
14
|
+
};
|
|
15
|
+
};
|
|
16
|
+
init(): void;
|
|
17
|
+
relations(): Relation[];
|
|
18
|
+
}
|
|
@@ -0,0 +1,26 @@
|
|
|
1
|
+
import { DataTypes, Model, Relation } from "../base";
|
|
2
|
+
export declare class AuthItemClass extends Model {
|
|
3
|
+
[x: string]: any;
|
|
4
|
+
tableName(): string;
|
|
5
|
+
attributes(): {
|
|
6
|
+
name: {
|
|
7
|
+
type: DataTypes.StringDataTypeConstructor;
|
|
8
|
+
primaryKey: boolean;
|
|
9
|
+
allowNull: boolean;
|
|
10
|
+
};
|
|
11
|
+
type: {
|
|
12
|
+
type: DataTypes.IntegerDataTypeConstructor;
|
|
13
|
+
allowNull: boolean;
|
|
14
|
+
};
|
|
15
|
+
description: {
|
|
16
|
+
type: DataTypes.StringDataTypeConstructor;
|
|
17
|
+
allowNull: boolean;
|
|
18
|
+
};
|
|
19
|
+
rule_name: {
|
|
20
|
+
type: DataTypes.StringDataTypeConstructor;
|
|
21
|
+
allowNull: boolean;
|
|
22
|
+
};
|
|
23
|
+
};
|
|
24
|
+
init(): void;
|
|
25
|
+
relations(): Relation[];
|
|
26
|
+
}
|
|
@@ -0,0 +1,18 @@
|
|
|
1
|
+
import { DataTypes, Model, Relation } from "../base";
|
|
2
|
+
export declare class AuthItemChildClass extends Model {
|
|
3
|
+
[x: string]: any;
|
|
4
|
+
tableName(): string;
|
|
5
|
+
attributes(): {
|
|
6
|
+
parent: {
|
|
7
|
+
type: DataTypes.StringDataTypeConstructor;
|
|
8
|
+
primaryKey: boolean;
|
|
9
|
+
allowNull: boolean;
|
|
10
|
+
};
|
|
11
|
+
child: {
|
|
12
|
+
type: DataTypes.StringDataTypeConstructor;
|
|
13
|
+
allowNull: boolean;
|
|
14
|
+
};
|
|
15
|
+
};
|
|
16
|
+
init(): void;
|
|
17
|
+
relations(): Relation[];
|
|
18
|
+
}
|
|
@@ -0,0 +1,111 @@
|
|
|
1
|
+
import { Component } from "../base";
|
|
2
|
+
interface Role {
|
|
3
|
+
type: number;
|
|
4
|
+
name: string;
|
|
5
|
+
description: string;
|
|
6
|
+
ruleName: string;
|
|
7
|
+
data: string;
|
|
8
|
+
params: string;
|
|
9
|
+
}
|
|
10
|
+
export declare class AuthManager extends Component {
|
|
11
|
+
static readonly TYPE_ROLE = 1;
|
|
12
|
+
static readonly TYPE_PERMISSION = 2;
|
|
13
|
+
init(): void;
|
|
14
|
+
/**
|
|
15
|
+
* @var Item[] all auth items (name => Item)
|
|
16
|
+
*/
|
|
17
|
+
protected items: any;
|
|
18
|
+
checkAccessAssignments: any;
|
|
19
|
+
defaultRoles: any;
|
|
20
|
+
/**
|
|
21
|
+
*
|
|
22
|
+
*/
|
|
23
|
+
checkAccess(userId: number, permissionName: string, params?: any[]): Promise<boolean>;
|
|
24
|
+
checkAccessFromCache(): Promise<void>;
|
|
25
|
+
checkAccessRecursive(user: string | number, itemname: string, params: any[], assignments: any): Promise<boolean>;
|
|
26
|
+
/**
|
|
27
|
+
*
|
|
28
|
+
* @param name
|
|
29
|
+
*/
|
|
30
|
+
getItem(name: string): Promise<any>;
|
|
31
|
+
getItems(type: number): Promise<any>;
|
|
32
|
+
getRolesByUser(userId: number): Promise<any>;
|
|
33
|
+
/**
|
|
34
|
+
*
|
|
35
|
+
* @param roleName
|
|
36
|
+
*/
|
|
37
|
+
getChildRoles(roleName: string): Promise<any>;
|
|
38
|
+
/**
|
|
39
|
+
*
|
|
40
|
+
* @param roleName
|
|
41
|
+
*/
|
|
42
|
+
getPermissionsByRole(roleName: string): Promise<any>;
|
|
43
|
+
/**
|
|
44
|
+
*
|
|
45
|
+
* @param userId
|
|
46
|
+
*/
|
|
47
|
+
getPermissionsByUser(userId: number): Promise<any>;
|
|
48
|
+
/**
|
|
49
|
+
* Returns all permissions that are directly assigned to user.
|
|
50
|
+
* @return Permission[] all direct permissions that the user has. The array is indexed by the permission names.
|
|
51
|
+
*/
|
|
52
|
+
protected getDirectPermissionsByUser(userId: number): Promise<any>;
|
|
53
|
+
protected getInheritedPermissionsByUser(userId: number): Promise<any>;
|
|
54
|
+
/**
|
|
55
|
+
*
|
|
56
|
+
* @param userId
|
|
57
|
+
*/
|
|
58
|
+
getItemsByUser(userId: number): Promise<any>;
|
|
59
|
+
/**
|
|
60
|
+
* Returns all role assignment information for the specified role.
|
|
61
|
+
* @param $roleName
|
|
62
|
+
*/
|
|
63
|
+
getUserIdsByRole(roleName: number): Promise<any>;
|
|
64
|
+
/**
|
|
65
|
+
* {@inheritdoc}
|
|
66
|
+
*/
|
|
67
|
+
getRole(name: string): Promise<Role | null>;
|
|
68
|
+
/**
|
|
69
|
+
* {@inheritdoc}
|
|
70
|
+
*/
|
|
71
|
+
getRoles(): Promise<any>;
|
|
72
|
+
/**
|
|
73
|
+
* Recursively finds all children and grand children of the specified item.
|
|
74
|
+
* @param string $name the name of the item whose children are to be looked for.
|
|
75
|
+
* @param array $childrenList the child list built via [[getChildrenList()]]
|
|
76
|
+
* @param array $result the children and grand children (in array keys)
|
|
77
|
+
*/
|
|
78
|
+
protected getChildrenRecursive(name: string, childrenList: any, model: any): void;
|
|
79
|
+
/**
|
|
80
|
+
*
|
|
81
|
+
* @param roleName
|
|
82
|
+
* @param userId
|
|
83
|
+
*/
|
|
84
|
+
getAssignment(roleName: string, userId: string): any;
|
|
85
|
+
/**
|
|
86
|
+
*
|
|
87
|
+
*/
|
|
88
|
+
getAssignments(userId: number): Promise<any>;
|
|
89
|
+
/**
|
|
90
|
+
* Returns the children for every parent.
|
|
91
|
+
* @return array the children list. Each array key is a parent item name,
|
|
92
|
+
* and the corresponding array value is a list of child item names.
|
|
93
|
+
*/
|
|
94
|
+
protected getChildrenList(): Promise<any>;
|
|
95
|
+
/**
|
|
96
|
+
* Check whether $userId is empty.
|
|
97
|
+
* @param mixed $userId
|
|
98
|
+
* @return bool
|
|
99
|
+
* @since 2.0.26
|
|
100
|
+
*/
|
|
101
|
+
protected isEmptyUserId(userId: string): boolean;
|
|
102
|
+
/**
|
|
103
|
+
* Checks whether array of $assignments is empty and [[defaultRoles]] property is empty as well.
|
|
104
|
+
*
|
|
105
|
+
* @param Assignment[] $assignments array of user's assignments
|
|
106
|
+
* @return bool whether array of $assignments is empty and [[defaultRoles]] property is empty as well
|
|
107
|
+
* @since 2.0.11
|
|
108
|
+
*/
|
|
109
|
+
protected hasNoAssignments(assignments: any): any;
|
|
110
|
+
}
|
|
111
|
+
export {};
|
package/rbac/AuthManager.js
CHANGED
|
@@ -1,21 +1,10 @@
|
|
|
1
1
|
"use strict";
|
|
2
|
-
var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {
|
|
3
|
-
function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); }
|
|
4
|
-
return new (P || (P = Promise))(function (resolve, reject) {
|
|
5
|
-
function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }
|
|
6
|
-
function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } }
|
|
7
|
-
function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); }
|
|
8
|
-
step((generator = generator.apply(thisArg, _arguments || [])).next());
|
|
9
|
-
});
|
|
10
|
-
};
|
|
11
|
-
var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
12
|
-
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
13
|
-
};
|
|
14
2
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
15
3
|
exports.AuthManager = void 0;
|
|
4
|
+
const tslib_1 = require("tslib");
|
|
16
5
|
const base_1 = require("../base");
|
|
17
6
|
const index_1 = require("../index");
|
|
18
|
-
const Utils_1 = __importDefault(require("../requiments/Utils"));
|
|
7
|
+
const Utils_1 = tslib_1.__importDefault(require("../requiments/Utils"));
|
|
19
8
|
class AuthManager extends base_1.Component {
|
|
20
9
|
constructor() {
|
|
21
10
|
super(...arguments);
|
|
@@ -29,7 +18,7 @@ class AuthManager extends base_1.Component {
|
|
|
29
18
|
*
|
|
30
19
|
*/
|
|
31
20
|
checkAccess(userId, permissionName, params = []) {
|
|
32
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
21
|
+
return tslib_1.__awaiter(this, void 0, void 0, function* () {
|
|
33
22
|
let assignments;
|
|
34
23
|
if (!this.checkAccessAssignments[userId.toString()]) {
|
|
35
24
|
assignments = yield this.getAssignments(userId);
|
|
@@ -46,11 +35,11 @@ class AuthManager extends base_1.Component {
|
|
|
46
35
|
});
|
|
47
36
|
}
|
|
48
37
|
checkAccessFromCache() {
|
|
49
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
38
|
+
return tslib_1.__awaiter(this, void 0, void 0, function* () {
|
|
50
39
|
});
|
|
51
40
|
}
|
|
52
41
|
checkAccessRecursive(user, itemname, params, assignments) {
|
|
53
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
42
|
+
return tslib_1.__awaiter(this, void 0, void 0, function* () {
|
|
54
43
|
let item = yield this.getItem(itemname);
|
|
55
44
|
if (!item)
|
|
56
45
|
return false;
|
|
@@ -79,14 +68,14 @@ class AuthManager extends base_1.Component {
|
|
|
79
68
|
* @param name
|
|
80
69
|
*/
|
|
81
70
|
getItem(name) {
|
|
82
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
71
|
+
return tslib_1.__awaiter(this, void 0, void 0, function* () {
|
|
83
72
|
if (!name)
|
|
84
73
|
return null;
|
|
85
74
|
return yield base_1.ModelManager.AuthItem.findOne({ where: { name: name } });
|
|
86
75
|
});
|
|
87
76
|
}
|
|
88
77
|
getItems(type) {
|
|
89
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
78
|
+
return tslib_1.__awaiter(this, void 0, void 0, function* () {
|
|
90
79
|
let items = {};
|
|
91
80
|
let _items = yield base_1.ModelManager.AuthItem.findAll({ where: { type: type } });
|
|
92
81
|
if (_items)
|
|
@@ -97,7 +86,7 @@ class AuthManager extends base_1.Component {
|
|
|
97
86
|
});
|
|
98
87
|
}
|
|
99
88
|
getRolesByUser(userId) {
|
|
100
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
89
|
+
return tslib_1.__awaiter(this, void 0, void 0, function* () {
|
|
101
90
|
if (this.isEmptyUserId(userId.toString())) {
|
|
102
91
|
return [];
|
|
103
92
|
}
|
|
@@ -123,7 +112,7 @@ class AuthManager extends base_1.Component {
|
|
|
123
112
|
* @param roleName
|
|
124
113
|
*/
|
|
125
114
|
getChildRoles(roleName) {
|
|
126
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
115
|
+
return tslib_1.__awaiter(this, void 0, void 0, function* () {
|
|
127
116
|
let role = yield this.getRole(roleName);
|
|
128
117
|
if (role === null) {
|
|
129
118
|
throw new index_1.InvalidArgumentException(`Role "${roleName}" not found.`);
|
|
@@ -146,7 +135,7 @@ class AuthManager extends base_1.Component {
|
|
|
146
135
|
* @param roleName
|
|
147
136
|
*/
|
|
148
137
|
getPermissionsByRole(roleName) {
|
|
149
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
138
|
+
return tslib_1.__awaiter(this, void 0, void 0, function* () {
|
|
150
139
|
let childrenList = this.getChildrenList();
|
|
151
140
|
const result = { result: {} };
|
|
152
141
|
let permissions = {};
|
|
@@ -171,7 +160,7 @@ class AuthManager extends base_1.Component {
|
|
|
171
160
|
* @param userId
|
|
172
161
|
*/
|
|
173
162
|
getPermissionsByUser(userId) {
|
|
174
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
163
|
+
return tslib_1.__awaiter(this, void 0, void 0, function* () {
|
|
175
164
|
if (this.isEmptyUserId(userId.toString())) {
|
|
176
165
|
return {};
|
|
177
166
|
}
|
|
@@ -185,7 +174,7 @@ class AuthManager extends base_1.Component {
|
|
|
185
174
|
* @return Permission[] all direct permissions that the user has. The array is indexed by the permission names.
|
|
186
175
|
*/
|
|
187
176
|
getDirectPermissionsByUser(userId) {
|
|
188
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
177
|
+
return tslib_1.__awaiter(this, void 0, void 0, function* () {
|
|
189
178
|
let permissions = {};
|
|
190
179
|
let result = yield base_1.ModelManager.AuthAssignment.findAll({
|
|
191
180
|
where: {
|
|
@@ -206,7 +195,7 @@ class AuthManager extends base_1.Component {
|
|
|
206
195
|
});
|
|
207
196
|
}
|
|
208
197
|
getInheritedPermissionsByUser(userId) {
|
|
209
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
198
|
+
return tslib_1.__awaiter(this, void 0, void 0, function* () {
|
|
210
199
|
let userAssignment = yield base_1.ModelManager.AuthAssignment.findAll({ where: { user_id: userId.toString() }, attributes: ["item_name"] });
|
|
211
200
|
let childrenList = yield this.getChildrenList();
|
|
212
201
|
const result = { result: {} };
|
|
@@ -234,7 +223,7 @@ class AuthManager extends base_1.Component {
|
|
|
234
223
|
* @param userId
|
|
235
224
|
*/
|
|
236
225
|
getItemsByUser(userId) {
|
|
237
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
226
|
+
return tslib_1.__awaiter(this, void 0, void 0, function* () {
|
|
238
227
|
let items = yield base_1.ModelManager.AuthAssignment.findAll({
|
|
239
228
|
where: {
|
|
240
229
|
user_id: userId.toString()
|
|
@@ -251,7 +240,7 @@ class AuthManager extends base_1.Component {
|
|
|
251
240
|
* @param $roleName
|
|
252
241
|
*/
|
|
253
242
|
getUserIdsByRole(roleName) {
|
|
254
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
243
|
+
return tslib_1.__awaiter(this, void 0, void 0, function* () {
|
|
255
244
|
if (!roleName)
|
|
256
245
|
return [];
|
|
257
246
|
return yield base_1.ModelManager.AuthAssignment.findAll({ where: { "item_name": roleName }, attributes: ["user_id"] });
|
|
@@ -261,7 +250,7 @@ class AuthManager extends base_1.Component {
|
|
|
261
250
|
* {@inheritdoc}
|
|
262
251
|
*/
|
|
263
252
|
getRole(name) {
|
|
264
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
253
|
+
return tslib_1.__awaiter(this, void 0, void 0, function* () {
|
|
265
254
|
let item = yield this.getItem(name);
|
|
266
255
|
return item && item.type == AuthManager.TYPE_ROLE ? item : null;
|
|
267
256
|
});
|
|
@@ -301,7 +290,7 @@ class AuthManager extends base_1.Component {
|
|
|
301
290
|
*
|
|
302
291
|
*/
|
|
303
292
|
getAssignments(userId) {
|
|
304
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
293
|
+
return tslib_1.__awaiter(this, void 0, void 0, function* () {
|
|
305
294
|
if (this.isEmptyUserId(userId.toString())) {
|
|
306
295
|
return {};
|
|
307
296
|
}
|
|
@@ -324,7 +313,7 @@ class AuthManager extends base_1.Component {
|
|
|
324
313
|
* and the corresponding array value is a list of child item names.
|
|
325
314
|
*/
|
|
326
315
|
getChildrenList() {
|
|
327
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
316
|
+
return tslib_1.__awaiter(this, void 0, void 0, function* () {
|
|
328
317
|
let items = yield base_1.ModelManager.AuthItemChild.findAll();
|
|
329
318
|
let parents = {};
|
|
330
319
|
for (const item of items) {
|
package/rbac/AuthManager.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"AuthManager.js","sourceRoot":"","sources":["../../rbac/AuthManager.ts"],"names":[],"mappings":"
|
|
1
|
+
{"version":3,"file":"AuthManager.js","sourceRoot":"","sources":["../../rbac/AuthManager.ts"],"names":[],"mappings":";;;;AAAA,kCAAyH;AACzH,oCAA4D;AAC5D,wEAAwC;AAsBxC,MAAa,WAAY,SAAQ,gBAAS;IAA1C;;QAYI,2BAAsB,GAAQ,EAAE,CAAA;QAChC,iBAAY,GAAQ,EAAE,CAAA;IAwW1B,CAAC;IAjXG,IAAI;QACA,gBAAQ,CAAC,IAAI,CAAC,uBAAuB,CAAC,CAAA;IAC1C,CAAC;IAUD;;OAEG;IAEU,WAAW,CAAC,MAAc,EAAE,cAAsB,EAAE,SAAgB,EAAE;;YAC/E,IAAI,WAAgB,CAAC;YACrB,IAAI,CAAC,IAAI,CAAC,sBAAsB,CAAC,MAAM,CAAC,QAAQ,EAAE,CAAC,EAAE;gBACjD,WAAW,GAAG,MAAM,IAAI,CAAC,cAAc,CAAC,MAAM,CAAC,CAAC;gBAChD,IAAI,CAAC,sBAAsB,CAAC,MAAM,CAAC,QAAQ,EAAE,CAAC,GAAG,WAAW,CAAC;aAChE;iBAAM;gBACH,WAAW,GAAG,IAAI,CAAC,sBAAsB,CAAC,MAAM,CAAC,QAAQ,EAAE,CAAC,CAAA;aAC/D;YAGD,2CAA2C;YAC3C,IAAI,IAAI,CAAC,gBAAgB,CAAC,WAAW,CAAC,EAAE;gBACpC,OAAO,KAAK,CAAC;aAChB;YAGD,OAAO,MAAM,IAAI,CAAC,oBAAoB,CAAC,MAAM,EAAE,cAAc,EAAE,MAAM,EAAE,WAAW,CAAC,CAAC;QACxF,CAAC;KAAA;IAEK,oBAAoB;;QAG1B,CAAC;KAAA;IAEY,oBAAoB,CAAC,IAAqB,EAAE,QAAgB,EAAE,MAAa,EAAE,WAAgB;;YACtG,IAAI,IAAI,GAAQ,MAAM,IAAI,CAAC,OAAO,CAAC,QAAQ,CAAC,CAAC;YAC7C,IAAI,CAAC,IAAI;gBAAE,OAAO,KAAK,CAAC;YAExB;;;eAGG;YAEH,IAAI,WAAW,CAAC,QAAQ,CAAC,IAAI,eAAK,CAAC,IAAI,CAAC,IAAI,CAAC,YAAY,EAAE,QAAQ,CAAC,EAAE;gBAClE,OAAO,IAAI,CAAC;aACf;YAED;;eAEG;YACH,IAAI,OAAO,GAAG,MAAM,mBAAY,CAAC,aAAa,CAAC,OAAO,CAAC,EAAC,UAAU,EAAC,CAAC,QAAQ,CAAC,EAAE,KAAK,EAAE,EAAC,KAAK,EAAE,QAAQ,EAAC,EAAC,CAAC,CAAC;YAC1G,KAAK,MAAM,MAAM,IAAI,OAAO,EAAE;gBAC1B,IAAI,CAAC,GAAG,MAAM,IAAI,CAAC,oBAAoB,CAAC,IAAI,EAAE,MAAM,CAAC,MAAM,EAAE,MAAM,EAAE,WAAW,CAAC,CAAC;gBAClF,IAAI,CAAC,EAAE;oBACH,OAAO,IAAI,CAAC;iBACf;aACJ;YAED,OAAO,KAAK,CAAC;QAEjB,CAAC;KAAA;IAED;;;OAGG;IACU,OAAO,CAAC,IAAY;;YAC7B,IAAI,CAAC,IAAI;gBAAE,OAAO,IAAI,CAAC;YAEvB,OAAO,MAAM,mBAAY,CAAC,QAAQ,CAAC,OAAO,CAAC,EAAC,KAAK,EAAE,EAAC,IAAI,EAAE,IAAI,EAAC,EAAC,CAAC,CAAA;QAErE,CAAC;KAAA;IAEY,QAAQ,CAAC,IAAY;;YAC9B,IAAI,KAAK,GAAQ,EAAE,CAAC;YACpB,IAAI,MAAM,GAAG,MAAM,mBAAY,CAAC,QAAQ,CAAC,OAAO,CAAC,EAAC,KAAK,EAAE,EAAC,IAAI,EAAE,IAAI,EAAC,EAAC,CAAC,CAAA;YACvE,IAAI,MAAM;gBACN,MAAM,CAAC,OAAO,CAAC,CAAC,IAAS,EAAE,EAAE;oBACzB,KAAK,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,GAAG,IAAI,CAAC,UAAkB,CAAC;gBAClD,CAAC,CAAC,CAAA;YAEN,OAAO,KAAK,CAAA;QAEhB,CAAC;KAAA;IAEY,cAAc,CAAC,MAAc;;YACtC,IAAI,IAAI,CAAC,aAAa,CAAC,MAAM,CAAC,QAAQ,EAAE,CAAC,EAAE;gBACvC,OAAO,EAAE,CAAC;aACb;YAGD,IAAI,KAAK,GAAQ,EAAE,CAAA;YACnB,IAAI,KAAK,GAAG,MAAM,mBAAY,CAAC,cAAc,CAAC,OAAO,CAAC;gBAClD,KAAK,EAAE;oBACH,OAAO,EAAE,MAAM,CAAC,QAAQ,EAAE;oBAC1B,wBAAwB,EAAE,WAAW,CAAC,SAAS;iBAClD;gBACD,OAAO,EAAE,CAAC;wBACN,KAAK,EAAE,mBAAY,CAAC,QAAQ,CAAC,KAAK,EAAE;qBACvC,CAAC;aACL,CAAC,CAAA;YACF,KAAK,MAAM,IAAI,IAAI,KAAK,EAAE;gBACtB,KAAK,MAAM,CAAC,IAAI,IAAI,CAAC,eAAe;oBAChC,KAAK,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,GAAG,CAAC,CAAC,UAAkB,CAAC;aAC/C;YAED,OAAO,KAAK,CAAC;QAEjB,CAAC;KAAA;IAED;;;OAGG;IACU,aAAa,CAAC,QAAgB;;YACvC,IAAI,IAAI,GAAG,MAAM,IAAI,CAAC,OAAO,CAAC,QAAQ,CAAC,CAAC;YACxC,IAAI,IAAI,KAAK,IAAI,EAAE;gBACf,MAAM,IAAI,gCAAwB,CAAC,SAAS,QAAQ,cAAc,CAAC,CAAC;aACvE;YACD,MAAM,MAAM,GAAQ,EAAC,MAAM,EAAE,EAAE,EAAC,CAAC;YACjC,MAAM,IAAI,CAAC,oBAAoB,CAAC,QAAQ,EAAE,MAAM,IAAI,CAAC,eAAe,EAAE,EAAE,MAAM,CAAC,CAAC;YAChF,IAAI,KAAK,GAAQ,EAAE,CAAC;YACpB,KAAK,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC;YACvB,IAAI,MAAM,GAAG,MAAM,IAAI,CAAC,QAAQ,EAAE,CAAC;YACnC,IAAI,EAAE,GAAQ,EAAE,CAAC;YACjB,eAAK,CAAC,OAAO,CAAC,MAAM,EAAE,CAAC,IAAU,EAAE,EAAE;gBACjC,IAAI,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC;oBACxB,EAAE,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,IAAI,CAAC;YAC7B,CAAC,CAAC,CAAA;YAGF,OAAO,eAAK,CAAC,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QAClC,CAAC;KAAA;IAED;;;OAGG;IACU,oBAAoB,CAAC,QAAgB;;YAC9C,IAAI,YAAY,GAAG,IAAI,CAAC,eAAe,EAAE,CAAC;YAC1C,MAAM,MAAM,GAAG,EAAC,MAAM,EAAE,EAAE,EAAC,CAAA;YAC3B,IAAI,WAAW,GAAQ,EAAE,CAAA;YACzB,MAAM,IAAI,CAAC,oBAAoB,CAAC,QAAQ,EAAE,YAAY,EAAE,MAAM,CAAC,CAAC;YAChE,IAAI,eAAK,CAAC,OAAO,CAAC,MAAM,CAAC,MAAM,CAAC,EAAE;gBAC9B,OAAO,EAAE,CAAC;aACb;YAED,IAAI,UAAU,GAAG,MAAM,mBAAY,CAAC,QAAQ,CAAC,OAAO,CAAC;gBACjD,KAAK,EAAE;oBACH,IAAI,EAAE,WAAW,CAAC,eAAe;oBACjC,IAAI,EAAE,MAAM,CAAC,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC;iBACnC;aACJ,CAAC,CAAC;YACH,KAAK,MAAM,WAAW,IAAI,UAAU,EAAE;gBAClC,WAAW,CAAC,WAAW,CAAC,MAAM,CAAC,CAAC,GAAG,WAAW,CAAC,UAAwB,CAAA;aAC1E;YAED,OAAO,WAAW,CAAC;QAEvB,CAAC;KAAA;IAED;;;OAGG;IACU,oBAAoB,CAAC,MAAc;;YAE5C,IAAI,IAAI,CAAC,aAAa,CAAC,MAAM,CAAC,QAAQ,EAAE,CAAC,EAAE;gBACvC,OAAO,EAAE,CAAC;aACb;YAED,IAAI,gBAAgB,GAAG,MAAM,IAAI,CAAC,0BAA0B,CAAC,MAAM,CAAC,CAAC;YACrE,IAAI,mBAAmB,GAAG,MAAM,IAAI,CAAC,6BAA6B,CAAC,MAAM,CAAC,CAAC;YAE3E,OAAO,eAAK,CAAC,KAAK,CAAC,gBAAgB,EAAE,mBAAmB,CAAC,CAAC;QAC9D,CAAC;KAAA;IAED;;;OAGG;IACa,0BAA0B,CAAC,MAAc;;YACrD,IAAI,WAAW,GAAQ,EAAE,CAAA;YACzB,IAAI,MAAM,GAAG,MAAM,mBAAY,CAAC,cAAc,CAAC,OAAO,CAAC;gBACnD,KAAK,EAAE;oBACH,OAAO,EAAE,MAAM,CAAC,QAAQ,EAAE;oBAC1B,wBAAwB,EAAE,WAAW,CAAC,eAAe;iBACxD;gBACD,OAAO,EAAE;oBACL;wBACI,KAAK,EAAE,mBAAY,CAAC,QAAQ,CAAC,KAAK,EAAE;qBACvC;iBACJ;aACJ,CAAC,CAAA;YAEF,KAAK,MAAM,aAAa,IAAI,MAAM,EAAE;gBAChC,KAAK,MAAM,CAAC,IAAI,aAAa,CAAC,eAAe;oBACzC,WAAW,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,GAAG,CAAC,CAAC,UAAwB,CAAC;aAC3D;YAGD,OAAO,WAAW,CAAC;QACvB,CAAC;KAAA;IAEe,6BAA6B,CAAC,MAAc;;YACxD,IAAI,cAAc,GAAG,MAAM,mBAAY,CAAC,cAAc,CAAC,OAAO,CAAC,EAAC,KAAK,EAAE,EAAC,OAAO,EAAE,MAAM,CAAC,QAAQ,EAAE,EAAC,EAAE,UAAU,EAAE,CAAC,WAAW,CAAC,EAAC,CAAC,CAAC;YACjI,IAAI,YAAY,GAAG,MAAM,IAAI,CAAC,eAAe,EAAE,CAAC;YAChD,MAAM,MAAM,GAAQ,EAAC,MAAM,EAAE,EAAE,EAAC,CAAA;YAChC,IAAI,WAAW,GAAQ,EAAE,CAAA;YAEzB,KAAK,MAAM,qBAAqB,IAAI,cAAc,EAAE;gBAChD,IAAI,CAAC,oBAAoB,CAAC,qBAAqB,CAAC,SAAS,EAAE,YAAY,EAAE,MAAM,CAAC,CAAC;aACpF;YAED,IAAI,eAAK,CAAC,OAAO,CAAC,MAAM,CAAC,MAAM,CAAC,EAAE;gBAC9B,OAAO,EAAE,CAAC;aACb;YAED,IAAI,UAAU,GAAG,MAAM,mBAAY,CAAC,QAAQ,CAAC,OAAO,CAAC;gBACjD,KAAK,EAAE;oBACH,IAAI,EAAE,WAAW,CAAC,eAAe;oBACjC,IAAI,EAAE,MAAM,CAAC,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC;iBACnC;aACJ,CAAC,CAAC;YACH,KAAK,MAAM,WAAW,IAAI,UAAU,EAAE;gBAClC,WAAW,CAAC,WAAW,CAAC,MAAM,CAAC,CAAC,GAAG,WAAW,CAAC,UAAwB,CAAA;aAC1E;YAED,OAAO,WAAW,CAAC;QACvB,CAAC;KAAA;IAGD;;;OAGG;IACU,cAAc,CAAC,MAAc;;YACtC,IAAI,KAAK,GAAG,MAAM,mBAAY,CAAC,cAAc,CAAC,OAAO,CAAC;gBAClD,KAAK,EAAE;oBACH,OAAO,EAAE,MAAM,CAAC,QAAQ,EAAE;iBAC7B;gBACD,OAAO,EAAE,CAAC;wBACN,KAAK,EAAE,mBAAY,CAAC,QAAQ,CAAC,KAAK,EAAE;qBACvC,CAAC;aACL,CAAC,CAAA;YAEF,OAAO,KAAK,CAAC;QACjB,CAAC;KAAA;IAGD;;;OAGG;IACU,gBAAgB,CAAC,QAAgB;;YAC1C,IAAI,CAAC,QAAQ;gBAAE,OAAO,EAAE,CAAC;YAEzB,OAAO,MAAM,mBAAY,CAAC,cAAc,CAAC,OAAO,CAAC,EAAC,KAAK,EAAE,EAAC,WAAW,EAAE,QAAQ,EAAC,EAAE,UAAU,EAAE,CAAC,SAAS,CAAC,EAAC,CAAC,CAAC;QAChH,CAAC;KAAA;IAGD;;OAEG;IACU,OAAO,CAAC,IAAY;;YAC7B,IAAI,IAAI,GAAS,MAAM,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC;YAC1C,OAAO,IAAI,IAAI,IAAI,CAAC,IAAI,IAAI,WAAW,CAAC,SAAS,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC;QACpE,CAAC;KAAA;IAGD;;OAEG;IACI,QAAQ;QACX,OAAO,IAAI,CAAC,QAAQ,CAAC,WAAW,CAAC,SAAS,CAAC,CAAC;IAChD,CAAC;IAED;;;;;OAKG;IACO,oBAAoB,CAAC,IAAY,EAAE,YAAiB,EAAE,KAAU;QACtE,IAAI,YAAY,CAAC,IAAI,CAAC,EAAE;YACpB,KAAK,MAAM,KAAK,IAAI,YAAY,CAAC,IAAI,CAAC,EAAE;gBACpC,KAAK,CAAC,MAAM,CAAC,KAAK,CAAC,GAAG,IAAI,CAAC;gBAC3B,IAAI,CAAC,oBAAoB,CAAC,KAAK,EAAE,YAAY,EAAE,KAAK,CAAC,CAAC;aACzD;SACJ;IAEL,CAAC;IAGD;;;;OAIG;IACI,aAAa,CAAC,QAAgB,EAAE,MAAc;QACjD,IAAI,IAAI,CAAC,aAAa,CAAC,MAAM,CAAC,EAAE;YAC5B,OAAO,EAAE,CAAC;SACb;QACD,OAAO,mBAAY,CAAC,cAAc,CAAC,OAAO,CAAC,EAAC,KAAK,EAAE,EAAC,OAAO,EAAE,MAAM,EAAE,UAAU,EAAE,QAAQ,EAAC,EAAC,CAAC,CAAC;IAEjG,CAAC;IAED;;OAEG;IACU,cAAc,CAAC,MAAc;;YACtC,IAAI,IAAI,CAAC,aAAa,CAAC,MAAM,CAAC,QAAQ,EAAE,CAAC,EAAE;gBACvC,OAAO,EAAE,CAAC;aACb;YAED,IAAI,WAAW,GAAQ,EAAE,CAAC;YAC1B,IAAI;gBAEA,IAAI,EAAE,GAAG,MAAM,mBAAY,CAAC,cAAc,CAAC,OAAO,CAAC,EAAC,KAAK,EAAE,EAAC,OAAO,EAAE,MAAM,CAAC,QAAQ,EAAE,EAAC,EAAC,CAAC,CAAC;gBAC1F,KAAK,MAAM,CAAC,IAAI,EAAE,EAAE;oBAChB,WAAW,CAAC,CAAC,CAAC,WAAW,CAAC,CAAC,GAAG,CAAC,CAAC;iBACnC;aACJ;YAAC,OAAO,CAAC,EAAE;gBACR,MAAM,IAAI,6BAAsB,CAAC,kFAAkF,CAAC,CAAC;aACxH;YACD,OAAO,WAAW,CAAC;QACvB,CAAC;KAAA;IAED;;;;OAIG;IACa,eAAe;;YAC3B,IAAI,KAAK,GAAG,MAAM,mBAAY,CAAC,aAAa,CAAC,OAAO,EAAE,CAAC;YACvD,IAAI,OAAO,GAAQ,EAAE,CAAC;YACtB,KAAK,MAAM,IAAI,IAAI,KAAK,EAAE;gBACtB,OAAO,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,GAAG,eAAK,CAAC,MAAM,CAAC,OAAO,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC;aAC1F;YAED,OAAO,OAAO,CAAA;QAClB,CAAC;KAAA;IAED;;;;;OAKG;IACO,aAAa,CAAC,MAAc;QAClC,OAAO,CAAC,MAAM,IAAI,MAAM,KAAK,EAAE,CAAC;IACpC,CAAC;IAED;;;;;;OAMG;IACO,gBAAgB,CAAC,WAAgB;QACvC,OAAO,eAAK,CAAC,OAAO,CAAC,WAAW,CAAC,IAAI,eAAK,CAAC,OAAO,CAAC,IAAI,CAAC,YAAY,CAAC,CAAA;IACzE,CAAC;;AApXL,kCAqXC;AApXmB,qBAAS,GAAG,CAAC,CAAC;AACd,2BAAe,GAAG,CAAC,CAAC"}
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
@@ -0,0 +1,17 @@
|
|
|
1
|
+
import { Component } from "../base";
|
|
2
|
+
export declare class Validator extends Component {
|
|
3
|
+
static builtInValidators: {
|
|
4
|
+
boolean: string;
|
|
5
|
+
email: string;
|
|
6
|
+
};
|
|
7
|
+
/**
|
|
8
|
+
* @var array|string attributes to be validated by this validator. For multiple attributes,
|
|
9
|
+
* please specify them as an array; for single attribute, you may use either a string or an array.
|
|
10
|
+
*/
|
|
11
|
+
attributes: never[];
|
|
12
|
+
message: string;
|
|
13
|
+
except: never[];
|
|
14
|
+
isEmpty: never[];
|
|
15
|
+
init(): void;
|
|
16
|
+
static createValidator(type: any, model: any, attributes: any, params?: never[]): void;
|
|
17
|
+
}
|
|
@@ -0,0 +1,54 @@
|
|
|
1
|
+
export interface IdentityInterface {
|
|
2
|
+
/**
|
|
3
|
+
* Finds an identity by the given ID.
|
|
4
|
+
* @param string|int $id the ID to be looked for
|
|
5
|
+
* @return IdentityInterface|null the identity object that matches the given ID.
|
|
6
|
+
* Null should be returned if such an identity cannot be found
|
|
7
|
+
* or the identity is not in an active state (disabled, deleted, etc.)
|
|
8
|
+
*/
|
|
9
|
+
findIdentity(id: number): any;
|
|
10
|
+
/**
|
|
11
|
+
* Finds an identity by the given token.
|
|
12
|
+
* For example, [[\yii\filters\auth\HttpBearerAuth]] will set this parameter to be `yii\filters\auth\HttpBearerAuth`.
|
|
13
|
+
* @return IdentityInterface|null the identity object that matches the given token.
|
|
14
|
+
* Null should be returned if such an identity cannot be found
|
|
15
|
+
* or the identity is not in an active state (disabled, deleted, etc.)
|
|
16
|
+
* @param token
|
|
17
|
+
* @param type
|
|
18
|
+
*/
|
|
19
|
+
findIdentityByAccessToken(token: any, type: string): any;
|
|
20
|
+
/**
|
|
21
|
+
* Returns an ID that can uniquely identify a user identity.
|
|
22
|
+
* @return string|int an ID that uniquely identifies a user identity.
|
|
23
|
+
*/
|
|
24
|
+
getId(): number;
|
|
25
|
+
/**
|
|
26
|
+
* Returns a key that can be used to check the validity of a given identity ID.
|
|
27
|
+
*
|
|
28
|
+
* The key should be unique for each individual user, and should be persistent
|
|
29
|
+
* so that it can be used to check the validity of the user identity.
|
|
30
|
+
*
|
|
31
|
+
* The space of such keys should be big enough to defeat potential identity attacks.
|
|
32
|
+
*
|
|
33
|
+
* The returned key is used to validate session and auto-login (if [[User::enableAutoLogin]] is enabled).
|
|
34
|
+
*
|
|
35
|
+
* Make sure to invalidate earlier issued authKeys when you implement force user logout, password change and
|
|
36
|
+
* other scenarios, that require forceful access revocation for old sessions.
|
|
37
|
+
*
|
|
38
|
+
* @return string|null a key that is used to check the validity of a given identity ID.
|
|
39
|
+
* @see validateAuthKey()
|
|
40
|
+
*/
|
|
41
|
+
getAuthKey(): string;
|
|
42
|
+
/**
|
|
43
|
+
* Validates the given auth key.
|
|
44
|
+
*
|
|
45
|
+
* @param string $authKey the given auth key
|
|
46
|
+
* @return bool|null whether the given auth key is valid.
|
|
47
|
+
* @see getAuthKey()
|
|
48
|
+
*/
|
|
49
|
+
validateAuthKey(authKey: string): (boolean | null);
|
|
50
|
+
/**
|
|
51
|
+
*
|
|
52
|
+
*/
|
|
53
|
+
can(permissionName: string, params: any[], allowCaching: boolean): (boolean | null);
|
|
54
|
+
}
|
package/web/WebUser.d.ts
ADDED
|
@@ -0,0 +1,71 @@
|
|
|
1
|
+
import { Component } from "../base/Component";
|
|
2
|
+
import { IdentityInterface } from "./IdentityInterface";
|
|
3
|
+
import { AuthManager } from "../rbac/AuthManager";
|
|
4
|
+
export declare class WebUser extends Component {
|
|
5
|
+
/**
|
|
6
|
+
* @var string the class name of the [[identity]] object.
|
|
7
|
+
*/
|
|
8
|
+
identityClass: any;
|
|
9
|
+
private _identity;
|
|
10
|
+
/**
|
|
11
|
+
* @var CheckAccessInterface|string|array The access checker object to use for checking access or the application
|
|
12
|
+
* component ID of the access checker.
|
|
13
|
+
* If not set the application auth manager will be used.
|
|
14
|
+
* @since 2.0.9
|
|
15
|
+
*/
|
|
16
|
+
accessChecker: any;
|
|
17
|
+
get identity(): any;
|
|
18
|
+
set identity(value: any);
|
|
19
|
+
init(): void;
|
|
20
|
+
getIsGuest(): boolean;
|
|
21
|
+
getIdentity(autoRenew?: boolean): any;
|
|
22
|
+
loginRequired(): void;
|
|
23
|
+
/**
|
|
24
|
+
* Regenerates CSRF token
|
|
25
|
+
*
|
|
26
|
+
* @since 2.0.14.2
|
|
27
|
+
*/
|
|
28
|
+
protected regenerateCsrfToken(): void;
|
|
29
|
+
/**
|
|
30
|
+
* Logs in a user by the given access token.
|
|
31
|
+
* @param token
|
|
32
|
+
* @param type
|
|
33
|
+
*/
|
|
34
|
+
loginByAccessToken(token: any, type?: any): Promise<any>;
|
|
35
|
+
login(identity: IdentityInterface, duration?: number): boolean;
|
|
36
|
+
beforeLogin(identity: any, cookieBased: boolean, duration: number): boolean;
|
|
37
|
+
afterLogin(): void;
|
|
38
|
+
getId(): any;
|
|
39
|
+
/**
|
|
40
|
+
* Checks if the user can perform the operation as specified by the given permission.
|
|
41
|
+
*
|
|
42
|
+
* Note that you must configure "authManager" application component in order to use this method.
|
|
43
|
+
* Otherwise it will always return false.
|
|
44
|
+
*
|
|
45
|
+
* @param string $permissionName the name of the permission (e.g. "edit post") that needs access check.
|
|
46
|
+
* @param array $params name-value pairs that would be passed to the rules associated
|
|
47
|
+
* with the roles and permissions assigned to the user.
|
|
48
|
+
* @param bool $allowCaching whether to allow caching the result of access check.
|
|
49
|
+
* When this parameter is true (default), if the access check of an operation was performed
|
|
50
|
+
* before, its result will be directly returned when calling this method to check the same
|
|
51
|
+
* operation. If this parameter is false, this method will always call
|
|
52
|
+
* [[\yii\rbac\CheckAccessInterface::checkAccess()]] to obtain the up-to-date access result. Note that this
|
|
53
|
+
* caching is effective only within the same request and only works when `$params = []`.
|
|
54
|
+
* @return bool whether the user can perform the operation as specified by the given permission.
|
|
55
|
+
*/
|
|
56
|
+
can(permissionName: string, params?: never[], allowCaching?: boolean): Promise<boolean>;
|
|
57
|
+
/**
|
|
58
|
+
* Returns auth manager associated with the user component.
|
|
59
|
+
*
|
|
60
|
+
* By default this is the `authManager` application component.
|
|
61
|
+
* You may override this method to return a different auth manager instance if needed.
|
|
62
|
+
* @return \yii\rbac\ManagerInterface
|
|
63
|
+
* @since 2.0.6
|
|
64
|
+
*/
|
|
65
|
+
protected getAuthManager(): AuthManager;
|
|
66
|
+
/**
|
|
67
|
+
* Returns the access checker used for checking access.
|
|
68
|
+
* @return CheckAccessInterface
|
|
69
|
+
*/
|
|
70
|
+
protected getAccessChecker(): AuthManager;
|
|
71
|
+
}
|