storemw-core-api 1.0.116 → 1.0.117
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/access_control/actions.d.ts +3 -0
- package/dist/access_control/actions.js +19 -0
- package/dist/access_control/actions.js.map +1 -0
- package/dist/access_control/extra/index.d.ts +2 -0
- package/dist/access_control/extra/index.js +7 -0
- package/dist/access_control/extra/index.js.map +1 -0
- package/dist/access_control/extra/policies/administrator.d.ts +3 -0
- package/dist/access_control/extra/policies/administrator.js +13 -0
- package/dist/access_control/extra/policies/administrator.js.map +1 -0
- package/dist/access_control/extra/types.d.ts +11 -0
- package/dist/access_control/extra/types.js +3 -0
- package/dist/access_control/extra/types.js.map +1 -0
- package/dist/access_control/index.d.ts +11 -0
- package/dist/access_control/index.js +25 -0
- package/dist/access_control/index.js.map +1 -0
- package/dist/access_control/modules.d.ts +21 -0
- package/dist/access_control/modules.js +60 -0
- package/dist/access_control/modules.js.map +1 -0
- package/dist/access_control/policies/administrator.d.ts +2 -0
- package/dist/access_control/policies/administrator.js +22 -0
- package/dist/access_control/policies/administrator.js.map +1 -0
- package/dist/access_control/policies/index.d.ts +3 -0
- package/dist/access_control/policies/index.js +18 -0
- package/dist/access_control/policies/index.js.map +1 -0
- package/dist/access_control/policies/operator.d.ts +2 -0
- package/dist/access_control/policies/operator.js +13 -0
- package/dist/access_control/policies/operator.js.map +1 -0
- package/dist/access_control/policies/worker.d.ts +2 -0
- package/dist/access_control/policies/worker.js +11 -0
- package/dist/access_control/policies/worker.js.map +1 -0
- package/dist/access_control/scopes.d.ts +3 -0
- package/dist/access_control/scopes.js +33 -0
- package/dist/access_control/scopes.js.map +1 -0
- package/dist/access_control/types.d.ts +16 -0
- package/dist/access_control/types.js +3 -0
- package/dist/access_control/types.js.map +1 -0
- package/dist/app.js +1 -0
- package/dist/app.js.map +1 -1
- package/dist/controllers/access_control/accessControlController.d.ts +7 -0
- package/dist/controllers/access_control/accessControlController.js +208 -0
- package/dist/controllers/access_control/accessControlController.js.map +1 -0
- package/dist/controllers/account/accountController.js +2 -0
- package/dist/controllers/account/accountController.js.map +1 -1
- package/dist/controllers/index.d.ts +1 -0
- package/dist/controllers/index.js +4 -2
- package/dist/controllers/index.js.map +1 -1
- package/dist/features/core_config/coreConfigRegistry.js +2 -1
- package/dist/features/core_config/coreConfigRegistry.js.map +1 -1
- package/dist/features/core_config/coreConfigType.d.ts +13 -0
- package/dist/features/core_config/coreConfigType.js.map +1 -1
- package/dist/middlewares/request/index.d.ts +1 -0
- package/dist/middlewares/request/index.js +7 -2
- package/dist/middlewares/request/index.js.map +1 -1
- package/dist/middlewares/request/validateAccessControl.d.ts +6 -0
- package/dist/middlewares/request/validateAccessControl.js +24 -0
- package/dist/middlewares/request/validateAccessControl.js.map +1 -0
- package/dist/middlewares/request/validateAuthorization.d.ts +2 -0
- package/dist/middlewares/request/validateAuthorization.js +3 -0
- package/dist/middlewares/request/validateAuthorization.js.map +1 -1
- package/dist/routes/access_control/accessControlRoutes.d.ts +3 -0
- package/dist/routes/access_control/accessControlRoutes.js +12 -0
- package/dist/routes/access_control/accessControlRoutes.js.map +1 -0
- package/dist/routes/access_control/accessControlsRoutes.d.ts +3 -0
- package/dist/routes/access_control/accessControlsRoutes.js +12 -0
- package/dist/routes/access_control/accessControlsRoutes.js.map +1 -0
- package/dist/routes/account/accountRoutes.js +4 -0
- package/dist/routes/account/accountRoutes.js.map +1 -1
- package/dist/routes/account/accountsRoutes.js +3 -0
- package/dist/routes/account/accountsRoutes.js.map +1 -1
- package/dist/routes/index.d.ts +1 -0
- package/dist/routes/index.js +3 -1
- package/dist/routes/index.js.map +1 -1
- package/dist/schema/middleware/route/bk_schemaDocument.d.ts +2 -2
- package/dist/schema/middleware/route/index.d.ts +2 -0
- package/dist/schema/middleware/route/index.js +3 -1
- package/dist/schema/middleware/route/index.js.map +1 -1
- package/dist/schema/middleware/route/schemaAccessControl.d.ts +10 -0
- package/dist/schema/middleware/route/schemaAccessControl.js +11 -0
- package/dist/schema/middleware/route/schemaAccessControl.js.map +1 -0
- package/dist/schema/middleware/route/schemaDocument.d.ts +2 -2
- package/dist/schema/middleware/route/schemaItem.d.ts +2 -2
- package/dist/schema/payload/account/schemaAccount.d.ts +20 -20
- package/dist/schema/payload/document/schemaDocument.d.ts +4 -4
- package/dist/schema/payload/injection_field/schemaInjectionField.d.ts +16 -16
- package/dist/schema/payload/item/schemaItem.d.ts +4 -4
- package/dist/schema/payload/item/schemaItemProduct.d.ts +25 -25
- package/dist/services/access_control/AccessControlService.d.ts +39 -0
- package/dist/services/access_control/AccessControlService.js +161 -0
- package/dist/services/access_control/AccessControlService.js.map +1 -0
- package/dist/services/index.d.ts +2 -0
- package/dist/services/index.js +3 -1
- package/dist/services/index.js.map +1 -1
- package/dist/services/injection_field/InjectionFieldService.d.ts +3 -3
- package/dist/utils/serviceUtils.d.ts +3 -0
- package/dist/utils/serviceUtils.js +7 -1
- package/dist/utils/serviceUtils.js.map +1 -1
- package/package.json +6 -1
|
@@ -0,0 +1,3 @@
|
|
|
1
|
+
export declare const accessControlActions: readonly ["list", "view", "create", "update", "delete"];
|
|
2
|
+
export declare const accessControlActionsMap: Map<"list" | "view" | "create" | "update" | "delete", string>;
|
|
3
|
+
export type AccessControlAction = typeof accessControlActions[number];
|
|
@@ -0,0 +1,19 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.accessControlActionsMap = exports.accessControlActions = void 0;
|
|
4
|
+
// List of all possible actions a user can perform on a module
|
|
5
|
+
exports.accessControlActions = [
|
|
6
|
+
"list",
|
|
7
|
+
"view",
|
|
8
|
+
"create",
|
|
9
|
+
"update",
|
|
10
|
+
"delete",
|
|
11
|
+
];
|
|
12
|
+
exports.accessControlActionsMap = new Map([
|
|
13
|
+
["list", "Access Listing"],
|
|
14
|
+
["view", "Viewing"],
|
|
15
|
+
["create", "Create"],
|
|
16
|
+
["update", "Modify"],
|
|
17
|
+
["delete", "Remove"],
|
|
18
|
+
]);
|
|
19
|
+
//# sourceMappingURL=actions.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"actions.js","sourceRoot":"","sources":["../../src/access_control/actions.ts"],"names":[],"mappings":";;;AAAA,8DAA8D;AACjD,QAAA,oBAAoB,GAAG;IAChC,MAAM;IACN,MAAM;IACN,QAAQ;IACR,QAAQ;IACR,QAAQ;CACF,CAAC;AAEE,QAAA,uBAAuB,GAAG,IAAI,GAAG,CAA8B;IACxE,CAAC,MAAM,EAAE,gBAAgB,CAAC;IAC1B,CAAC,MAAM,EAAE,SAAS,CAAC;IACnB,CAAC,QAAQ,EAAE,QAAQ,CAAC;IACpB,CAAC,QAAQ,EAAE,QAAQ,CAAC;IACpB,CAAC,QAAQ,EAAE,QAAQ,CAAC;CACvB,CAAC,CAAC","sourcesContent":["// List of all possible actions a user can perform on a module\nexport const accessControlActions = [\n \"list\",\n \"view\",\n \"create\",\n \"update\",\n \"delete\",\n] as const;\n\nexport const accessControlActionsMap = new Map<AccessControlAction, string>([\n [\"list\", \"Access Listing\"],\n [\"view\", \"Viewing\"],\n [\"create\", \"Create\"],\n [\"update\", \"Modify\"],\n [\"delete\", \"Remove\"],\n]);\n\n// Type-safe Action type\nexport type AccessControlAction = typeof accessControlActions[number];\n"]}
|
|
@@ -0,0 +1,7 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.extraAdministratorPolicy = void 0;
|
|
4
|
+
// Policies (user_type_policies)
|
|
5
|
+
var administrator_1 = require("./policies/administrator");
|
|
6
|
+
Object.defineProperty(exports, "extraAdministratorPolicy", { enumerable: true, get: function () { return administrator_1.extraAdministratorPolicy; } });
|
|
7
|
+
//# sourceMappingURL=index.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../../src/access_control/extra/index.ts"],"names":[],"mappings":";;;AAGA,gCAAgC;AAChC,0DAAmE;AAA1D,yHAAA,wBAAwB,OAAA","sourcesContent":["// Extra Types/Modules/Actions\nexport type { ExtraAccessControlScopes, ExtraAccessControlModules, ExtraAccessControlActions } from \"./types\"\n\n// Policies (user_type_policies)\nexport { extraAdministratorPolicy } from \"./policies/administrator\""]}
|
|
@@ -0,0 +1,3 @@
|
|
|
1
|
+
import { AccessPolicyWithExtra } from '../../types';
|
|
2
|
+
import { ExtraAccessControlScopes, ExtraAccessControlModules, ExtraAccessControlActions } from '../types';
|
|
3
|
+
export declare const extraAdministratorPolicy: AccessPolicyWithExtra<ExtraAccessControlScopes, ExtraAccessControlModules, ExtraAccessControlActions>;
|
|
@@ -0,0 +1,13 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.extraAdministratorPolicy = void 0;
|
|
4
|
+
// Extra administrator policy for consumer-defined scopes
|
|
5
|
+
exports.extraAdministratorPolicy = {
|
|
6
|
+
// Add new consumer scope: customRegions
|
|
7
|
+
extraScope: {
|
|
8
|
+
extraModuleA: { list: true, view: true },
|
|
9
|
+
extraModuleB: { list: true, view: true },
|
|
10
|
+
extraModuleC: { list: true, view: true },
|
|
11
|
+
},
|
|
12
|
+
};
|
|
13
|
+
//# sourceMappingURL=administrator.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"administrator.js","sourceRoot":"","sources":["../../../../src/access_control/extra/policies/administrator.ts"],"names":[],"mappings":";;;AAGA,yDAAyD;AAC5C,QAAA,wBAAwB,GAA0G;IAC3I,wCAAwC;IACxC,UAAU,EAAE;QACR,YAAY,EAAE,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE;QACxC,YAAY,EAAE,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE;QACxC,YAAY,EAAE,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE;KAC3C;CACJ,CAAC","sourcesContent":["import { AccessPolicyWithExtra } from '../../types'\nimport { ExtraAccessControlScopes, ExtraAccessControlModules, ExtraAccessControlActions } from '../types';\n\n// Extra administrator policy for consumer-defined scopes\nexport const extraAdministratorPolicy: AccessPolicyWithExtra<ExtraAccessControlScopes, ExtraAccessControlModules, ExtraAccessControlActions> = {\n // Add new consumer scope: customRegions\n extraScope: {\n extraModuleA: { list: true, view: true },\n extraModuleB: { list: true, view: true },\n extraModuleC: { list: true, view: true },\n },\n};\n"]}
|
|
@@ -0,0 +1,11 @@
|
|
|
1
|
+
export type ExtraAccessControlScopes = "extraScope";
|
|
2
|
+
export type ExtraAccessControlModules = {
|
|
3
|
+
extraScope: "extraModuleA" | "extraModuleB" | "extraModuleC";
|
|
4
|
+
};
|
|
5
|
+
export type ExtraAccessControlActions = {
|
|
6
|
+
extraScope: {
|
|
7
|
+
extraModuleA: "list" | "view";
|
|
8
|
+
extraModuleB: "list" | "view";
|
|
9
|
+
extraModuleC: "list" | "view";
|
|
10
|
+
};
|
|
11
|
+
};
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"types.js","sourceRoot":"","sources":["../../../src/access_control/extra/types.ts"],"names":[],"mappings":"","sourcesContent":["\nexport type ExtraAccessControlScopes = \"extraScope\"\nexport type ExtraAccessControlModules = {\n extraScope: \"extraModuleA\" | \"extraModuleB\" | \"extraModuleC\";\n};\nexport type ExtraAccessControlActions = {\n extraScope: {\n extraModuleA: \"list\" | \"view\";\n extraModuleB: \"list\" | \"view\"\n extraModuleC: \"list\" | \"view\"\n };\n};"]}
|
|
@@ -0,0 +1,11 @@
|
|
|
1
|
+
export { accessControlScopes, accessControlScopesMap } from "./scopes";
|
|
2
|
+
export type { AccessControlScope } from "./scopes";
|
|
3
|
+
export { accessControlModules, accessControlModulesMap } from "./modules";
|
|
4
|
+
export type { AccessControlModulesMap, AccessControlModuleOf } from "./modules";
|
|
5
|
+
export { accessControlActions, accessControlActionsMap } from "./actions";
|
|
6
|
+
export type { AccessControlAction } from "./actions";
|
|
7
|
+
export type { AccessPolicyWithExtra } from "./types";
|
|
8
|
+
export { userTypePolicies } from "./policies";
|
|
9
|
+
export { administratorPolicy } from "./policies/administrator";
|
|
10
|
+
export { operatorPolicy } from "./policies/operator";
|
|
11
|
+
export { workerPolicy } from "./policies/worker";
|
|
@@ -0,0 +1,25 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.workerPolicy = exports.operatorPolicy = exports.administratorPolicy = exports.userTypePolicies = exports.accessControlActionsMap = exports.accessControlActions = exports.accessControlModulesMap = exports.accessControlModules = exports.accessControlScopesMap = exports.accessControlScopes = void 0;
|
|
4
|
+
// Scopes
|
|
5
|
+
var scopes_1 = require("./scopes");
|
|
6
|
+
Object.defineProperty(exports, "accessControlScopes", { enumerable: true, get: function () { return scopes_1.accessControlScopes; } });
|
|
7
|
+
Object.defineProperty(exports, "accessControlScopesMap", { enumerable: true, get: function () { return scopes_1.accessControlScopesMap; } });
|
|
8
|
+
// Modules
|
|
9
|
+
var modules_1 = require("./modules");
|
|
10
|
+
Object.defineProperty(exports, "accessControlModules", { enumerable: true, get: function () { return modules_1.accessControlModules; } });
|
|
11
|
+
Object.defineProperty(exports, "accessControlModulesMap", { enumerable: true, get: function () { return modules_1.accessControlModulesMap; } });
|
|
12
|
+
// Actions
|
|
13
|
+
var actions_1 = require("./actions");
|
|
14
|
+
Object.defineProperty(exports, "accessControlActions", { enumerable: true, get: function () { return actions_1.accessControlActions; } });
|
|
15
|
+
Object.defineProperty(exports, "accessControlActionsMap", { enumerable: true, get: function () { return actions_1.accessControlActionsMap; } });
|
|
16
|
+
// Policies (user_type_policies)
|
|
17
|
+
var policies_1 = require("./policies");
|
|
18
|
+
Object.defineProperty(exports, "userTypePolicies", { enumerable: true, get: function () { return policies_1.userTypePolicies; } });
|
|
19
|
+
var administrator_1 = require("./policies/administrator");
|
|
20
|
+
Object.defineProperty(exports, "administratorPolicy", { enumerable: true, get: function () { return administrator_1.administratorPolicy; } });
|
|
21
|
+
var operator_1 = require("./policies/operator");
|
|
22
|
+
Object.defineProperty(exports, "operatorPolicy", { enumerable: true, get: function () { return operator_1.operatorPolicy; } });
|
|
23
|
+
var worker_1 = require("./policies/worker");
|
|
24
|
+
Object.defineProperty(exports, "workerPolicy", { enumerable: true, get: function () { return worker_1.workerPolicy; } });
|
|
25
|
+
//# sourceMappingURL=index.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/access_control/index.ts"],"names":[],"mappings":";;;AAAA,SAAS;AACT,mCAAuE;AAA9D,6GAAA,mBAAmB,OAAA;AAAE,gHAAA,sBAAsB,OAAA;AAGpD,UAAU;AACV,qCAA0E;AAAjE,+GAAA,oBAAoB,OAAA;AAAE,kHAAA,uBAAuB,OAAA;AAGtD,UAAU;AACV,qCAA0E;AAAjE,+GAAA,oBAAoB,OAAA;AAAE,kHAAA,uBAAuB,OAAA;AAMtD,gCAAgC;AAChC,uCAA6C;AAApC,4GAAA,gBAAgB,OAAA;AACzB,0DAA8D;AAArD,oHAAA,mBAAmB,OAAA;AAC5B,gDAAoD;AAA3C,0GAAA,cAAc,OAAA;AACvB,4CAAgD;AAAvC,sGAAA,YAAY,OAAA","sourcesContent":["// Scopes\nexport { accessControlScopes, accessControlScopesMap } from \"./scopes\";\nexport type { AccessControlScope } from \"./scopes\"\n\n// Modules\nexport { accessControlModules, accessControlModulesMap } from \"./modules\";\nexport type { AccessControlModulesMap, AccessControlModuleOf } from \"./modules\"\n\n// Actions\nexport { accessControlActions, accessControlActionsMap } from \"./actions\";\nexport type { AccessControlAction } from \"./actions\"\n\n// Types\nexport type { AccessPolicyWithExtra } from \"./types\"\n\n// Policies (user_type_policies)\nexport { userTypePolicies } from \"./policies\"\nexport { administratorPolicy } from \"./policies/administrator\"\nexport { operatorPolicy } from \"./policies/operator\"\nexport { workerPolicy } from \"./policies/worker\""]}
|
|
@@ -0,0 +1,21 @@
|
|
|
1
|
+
import { AccessControlScope } from "./scopes";
|
|
2
|
+
export declare const accessControlModules: {
|
|
3
|
+
readonly account: readonly ["account"];
|
|
4
|
+
readonly access_key: readonly ["access_key"];
|
|
5
|
+
readonly business: readonly ["business"];
|
|
6
|
+
readonly access_control: readonly ["access_control"];
|
|
7
|
+
readonly user: readonly ["administrator", "worker", "operator"];
|
|
8
|
+
readonly role: readonly ["role"];
|
|
9
|
+
readonly user_role: readonly ["user_role"];
|
|
10
|
+
readonly location: readonly ["location"];
|
|
11
|
+
readonly injection_field: readonly ["injection_field"];
|
|
12
|
+
readonly file: readonly ["file"];
|
|
13
|
+
readonly item: readonly ["product", "item", "category"];
|
|
14
|
+
readonly document: readonly ["sales_order", "delivery_order", "cash_sales"];
|
|
15
|
+
};
|
|
16
|
+
export type AccessControlModulesMap = typeof accessControlModules;
|
|
17
|
+
export type AccessControlModuleOf<S extends AccessControlScope> = AccessControlModulesMap[S][number];
|
|
18
|
+
export declare const accessControlModulesMap: Map<string, {
|
|
19
|
+
value: string;
|
|
20
|
+
label: string;
|
|
21
|
+
}[]>;
|
|
@@ -0,0 +1,60 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.accessControlModulesMap = exports.accessControlModules = void 0;
|
|
4
|
+
// Define accessControlModules under each scope
|
|
5
|
+
exports.accessControlModules = {
|
|
6
|
+
account: ["account"],
|
|
7
|
+
access_key: ["access_key"],
|
|
8
|
+
business: ["business"],
|
|
9
|
+
access_control: ["access_control"],
|
|
10
|
+
user: ["administrator", "worker", "operator"],
|
|
11
|
+
role: ["role"],
|
|
12
|
+
user_role: ["user_role"],
|
|
13
|
+
location: ["location"],
|
|
14
|
+
injection_field: ["injection_field"],
|
|
15
|
+
file: ["file"],
|
|
16
|
+
item: ["product", "item", "category"],
|
|
17
|
+
document: ["sales_order", "delivery_order", "cash_sales"],
|
|
18
|
+
};
|
|
19
|
+
// Define modules for each scope with labels using a Map
|
|
20
|
+
exports.accessControlModulesMap = new Map([
|
|
21
|
+
["account", [
|
|
22
|
+
{ value: "account", label: "Accounts" }
|
|
23
|
+
]],
|
|
24
|
+
["business", [
|
|
25
|
+
{ value: "business", label: "Businesses" }
|
|
26
|
+
]],
|
|
27
|
+
["access_control", [
|
|
28
|
+
{ value: "access_control", label: "Access Control" }
|
|
29
|
+
]],
|
|
30
|
+
["user", [
|
|
31
|
+
{ value: "administrator", label: "Administrators" },
|
|
32
|
+
{ value: "worker", label: "Workers" },
|
|
33
|
+
{ value: "operator", label: "Operators" },
|
|
34
|
+
]],
|
|
35
|
+
["role", [
|
|
36
|
+
{ value: "role", label: "Roles" }
|
|
37
|
+
]],
|
|
38
|
+
["user_role", [
|
|
39
|
+
{ value: "user_role", label: "User Permissions" }
|
|
40
|
+
]],
|
|
41
|
+
["location", [
|
|
42
|
+
{ value: "location", label: "Location" }
|
|
43
|
+
]],
|
|
44
|
+
["injection_field", [
|
|
45
|
+
{ value: "injection_field", label: "Injection Fields" }
|
|
46
|
+
]],
|
|
47
|
+
["file", [
|
|
48
|
+
{ value: "file", label: "Files" }
|
|
49
|
+
]],
|
|
50
|
+
["item", [
|
|
51
|
+
{ value: "product", label: "Manage Products" },
|
|
52
|
+
{ value: "item", label: "Manage Items" },
|
|
53
|
+
{ value: "category", label: "Manage Category" }
|
|
54
|
+
]],
|
|
55
|
+
["document", [
|
|
56
|
+
{ value: "invoice", label: "Manage Invoice" },
|
|
57
|
+
{ value: "receipt", label: "Manage Receipt" }
|
|
58
|
+
]]
|
|
59
|
+
]);
|
|
60
|
+
//# sourceMappingURL=modules.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"modules.js","sourceRoot":"","sources":["../../src/access_control/modules.ts"],"names":[],"mappings":";;;AAEA,+CAA+C;AAClC,QAAA,oBAAoB,GAAG;IAChC,OAAO,EAAE,CAAC,SAAS,CAAC;IACpB,UAAU,EAAE,CAAC,YAAY,CAAC;IAC1B,QAAQ,EAAE,CAAC,UAAU,CAAC;IACtB,cAAc,EAAE,CAAC,gBAAgB,CAAC;IAClC,IAAI,EAAE,CAAC,eAAe,EAAE,QAAQ,EAAE,UAAU,CAAC;IAC7C,IAAI,EAAE,CAAC,MAAM,CAAC;IACd,SAAS,EAAE,CAAC,WAAW,CAAC;IACxB,QAAQ,EAAE,CAAC,UAAU,CAAC;IACtB,eAAe,EAAE,CAAC,iBAAiB,CAAC;IACpC,IAAI,EAAE,CAAC,MAAM,CAAC;IACd,IAAI,EAAE,CAAC,SAAS,EAAE,MAAM,EAAE,UAAU,CAAC;IACrC,QAAQ,EAAE,CAAC,aAAa,EAAE,gBAAgB,EAAE,YAAY,CAAC;CACnD,CAAC;AAQX,wDAAwD;AAC3C,QAAA,uBAAuB,GAAoD,IAAI,GAAG,CAAC;IAC5F,CAAC,SAAS,EAAE;YACR,EAAE,KAAK,EAAE,SAAS,EAAE,KAAK,EAAE,UAAU,EAAE;SAC1C,CAAC;IACF,CAAC,UAAU,EAAE;YACT,EAAE,KAAK,EAAE,UAAU,EAAE,KAAK,EAAE,YAAY,EAAE;SAC7C,CAAC;IACF,CAAC,gBAAgB,EAAE;YACf,EAAE,KAAK,EAAE,gBAAgB,EAAE,KAAK,EAAE,gBAAgB,EAAE;SACvD,CAAC;IACF,CAAC,MAAM,EAAE;YACL,EAAE,KAAK,EAAE,eAAe,EAAE,KAAK,EAAE,gBAAgB,EAAE;YACnD,EAAE,KAAK,EAAE,QAAQ,EAAE,KAAK,EAAE,SAAS,EAAE;YACrC,EAAE,KAAK,EAAE,UAAU,EAAE,KAAK,EAAE,WAAW,EAAE;SAC5C,CAAC;IACF,CAAC,MAAM,EAAE;YACL,EAAE,KAAK,EAAE,MAAM,EAAE,KAAK,EAAE,OAAO,EAAE;SACpC,CAAC;IACF,CAAC,WAAW,EAAE;YACV,EAAE,KAAK,EAAE,WAAW,EAAE,KAAK,EAAE,kBAAkB,EAAE;SACpD,CAAC;IACF,CAAC,UAAU,EAAE;YACT,EAAE,KAAK,EAAE,UAAU,EAAE,KAAK,EAAE,UAAU,EAAE;SAC3C,CAAC;IACF,CAAC,iBAAiB,EAAE;YAChB,EAAE,KAAK,EAAE,iBAAiB,EAAE,KAAK,EAAE,kBAAkB,EAAE;SAC1D,CAAC;IACF,CAAC,MAAM,EAAE;YACL,EAAE,KAAK,EAAE,MAAM,EAAE,KAAK,EAAE,OAAO,EAAE;SACpC,CAAC;IACF,CAAC,MAAM,EAAE;YACL,EAAE,KAAK,EAAE,SAAS,EAAE,KAAK,EAAE,iBAAiB,EAAE;YAC9C,EAAE,KAAK,EAAE,MAAM,EAAE,KAAK,EAAE,cAAc,EAAE;YACxC,EAAE,KAAK,EAAE,UAAU,EAAE,KAAK,EAAE,iBAAiB,EAAE;SAClD,CAAC;IACF,CAAC,UAAU,EAAE;YACT,EAAE,KAAK,EAAE,SAAS,EAAE,KAAK,EAAE,gBAAgB,EAAE;YAC7C,EAAE,KAAK,EAAE,SAAS,EAAE,KAAK,EAAE,gBAAgB,EAAE;SAChD,CAAC;CACL,CAAC,CAAC","sourcesContent":["import { AccessControlScope } from \"./scopes\";\n\n// Define accessControlModules under each scope\nexport const accessControlModules = {\n account: [\"account\"],\n access_key: [\"access_key\"],\n business: [\"business\"],\n access_control: [\"access_control\"],\n user: [\"administrator\", \"worker\", \"operator\"],\n role: [\"role\"],\n user_role: [\"user_role\"],\n location: [\"location\"],\n injection_field: [\"injection_field\"],\n file: [\"file\"],\n item: [\"product\", \"item\", \"category\"],\n document: [\"sales_order\", \"delivery_order\", \"cash_sales\"],\n} as const;\n\n// Type of the full accessControlModules map\nexport type AccessControlModulesMap = typeof accessControlModules;\n\n// Type helper: get accessControlModules for a specific scope\nexport type AccessControlModuleOf<S extends AccessControlScope> = AccessControlModulesMap[S][number];\n\n// Define modules for each scope with labels using a Map\nexport const accessControlModulesMap: Map<string, { value: string; label: string }[]> = new Map([\n [\"account\", [\n { value: \"account\", label: \"Accounts\" }\n ]],\n [\"business\", [\n { value: \"business\", label: \"Businesses\" }\n ]],\n [\"access_control\", [\n { value: \"access_control\", label: \"Access Control\" }\n ]],\n [\"user\", [\n { value: \"administrator\", label: \"Administrators\" },\n { value: \"worker\", label: \"Workers\" },\n { value: \"operator\", label: \"Operators\" },\n ]],\n [\"role\", [\n { value: \"role\", label: \"Roles\" }\n ]],\n [\"user_role\", [\n { value: \"user_role\", label: \"User Permissions\" }\n ]],\n [\"location\", [\n { value: \"location\", label: \"Location\" }\n ]],\n [\"injection_field\", [\n { value: \"injection_field\", label: \"Injection Fields\" }\n ]],\n [\"file\", [\n { value: \"file\", label: \"Files\" }\n ]],\n [\"item\", [\n { value: \"product\", label: \"Manage Products\" },\n { value: \"item\", label: \"Manage Items\" },\n { value: \"category\", label: \"Manage Category\" }\n ]],\n [\"document\", [\n { value: \"invoice\", label: \"Manage Invoice\" },\n { value: \"receipt\", label: \"Manage Receipt\" }\n ]]\n]);"]}
|
|
@@ -0,0 +1,22 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.administratorPolicy = void 0;
|
|
4
|
+
// Administrator: full access to all scopes/modules/actions
|
|
5
|
+
exports.administratorPolicy = {
|
|
6
|
+
account: {
|
|
7
|
+
account: { list: true, view: false, create: false, update: false, delete: false }
|
|
8
|
+
},
|
|
9
|
+
business: {
|
|
10
|
+
business: { list: true, view: false, create: false, update: false, delete: false }
|
|
11
|
+
},
|
|
12
|
+
item: {
|
|
13
|
+
item: { list: false, view: true, create: true, update: true, delete: true },
|
|
14
|
+
// category: { list: true, view: true, create: true, update: true, delete: true },
|
|
15
|
+
},
|
|
16
|
+
document: {
|
|
17
|
+
sales_order: { list: true, view: true, create: true, update: true, delete: true },
|
|
18
|
+
delivery_order: { list: true, view: true, create: true, update: true, delete: true },
|
|
19
|
+
cash_sales: { list: true, view: true, create: true, update: true, delete: true },
|
|
20
|
+
},
|
|
21
|
+
};
|
|
22
|
+
//# sourceMappingURL=administrator.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"administrator.js","sourceRoot":"","sources":["../../../src/access_control/policies/administrator.ts"],"names":[],"mappings":";;;AAEA,2DAA2D;AAC9C,QAAA,mBAAmB,GAA0B;IACtD,OAAO,EAAE;QACL,OAAO,EAAE,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,KAAK,EAAE,MAAM,EAAE,KAAK,EAAE,MAAM,EAAE,KAAK,EAAE,MAAM,EAAE,KAAK,EAAE;KACpF;IACD,QAAQ,EAAE;QACN,QAAQ,EAAE,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,KAAK,EAAE,MAAM,EAAE,KAAK,EAAE,MAAM,EAAE,KAAK,EAAE,MAAM,EAAE,KAAK,EAAE;KACrF;IACD,IAAI,EAAE;QACF,IAAI,EAAE,EAAE,IAAI,EAAE,KAAK,EAAE,IAAI,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,EAAE;QAC3E,kFAAkF;KACrF;IACD,QAAQ,EAAE;QACN,WAAW,EAAE,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,EAAE;QACjF,cAAc,EAAE,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,EAAE;QACpF,UAAU,EAAE,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,EAAE;KACnF;CACJ,CAAC","sourcesContent":["import { AccessPolicyWithExtra } from \"../types\";\n\n// Administrator: full access to all scopes/modules/actions\nexport const administratorPolicy: AccessPolicyWithExtra = {\n account: {\n account: { list: true, view: false, create: false, update: false, delete: false }\n },\n business: {\n business: { list: true, view: false, create: false, update: false, delete: false }\n },\n item: {\n item: { list: false, view: true, create: true, update: true, delete: true },\n // category: { list: true, view: true, create: true, update: true, delete: true },\n },\n document: {\n sales_order: { list: true, view: true, create: true, update: true, delete: true },\n delivery_order: { list: true, view: true, create: true, update: true, delete: true },\n cash_sales: { list: true, view: true, create: true, update: true, delete: true },\n },\n};\n"]}
|
|
@@ -0,0 +1,18 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.userTypePolicies = void 0;
|
|
4
|
+
const administrator_1 = require("./administrator");
|
|
5
|
+
const worker_1 = require("./worker");
|
|
6
|
+
const operator_1 = require("./operator");
|
|
7
|
+
exports.userTypePolicies = {
|
|
8
|
+
administrator: administrator_1.administratorPolicy,
|
|
9
|
+
worker: worker_1.workerPolicy,
|
|
10
|
+
operator: operator_1.operatorPolicy,
|
|
11
|
+
supplier: {},
|
|
12
|
+
customer: {},
|
|
13
|
+
driver: {},
|
|
14
|
+
retailer: {},
|
|
15
|
+
member: {},
|
|
16
|
+
agent: {},
|
|
17
|
+
};
|
|
18
|
+
//# sourceMappingURL=index.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../../src/access_control/policies/index.ts"],"names":[],"mappings":";;;AAGA,mDAAsD;AACtD,qCAAwC;AACxC,yCAA4C;AAE/B,QAAA,gBAAgB,GAA4C;IACrE,aAAa,EAAE,mCAAmB;IAClC,MAAM,EAAE,qBAAY;IACpB,QAAQ,EAAE,yBAAc;IACxB,QAAQ,EAAE,EAAE;IACZ,QAAQ,EAAE,EAAE;IACZ,MAAM,EAAE,EAAE;IACV,QAAQ,EAAE,EAAE;IACZ,MAAM,EAAE,EAAE;IACV,KAAK,EAAE,EAAE;CACZ,CAAC","sourcesContent":["import { AccessPolicyWithExtra } from \"../types\";\nimport { UserType } from \"@/services\";\n\nimport { administratorPolicy } from \"./administrator\";\nimport { workerPolicy } from \"./worker\";\nimport { operatorPolicy } from \"./operator\";\n\nexport const userTypePolicies: Record<UserType, AccessPolicyWithExtra> = {\n administrator: administratorPolicy,\n worker: workerPolicy,\n operator: operatorPolicy,\n supplier: {},\n customer: {},\n driver: {},\n retailer: {},\n member: {},\n agent: {},\n};"]}
|
|
@@ -0,0 +1,13 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.operatorPolicy = void 0;
|
|
4
|
+
// Operator: minimal access
|
|
5
|
+
exports.operatorPolicy = {
|
|
6
|
+
account: {
|
|
7
|
+
account: { list: true, view: true, create: true, update: true, delete: true }
|
|
8
|
+
},
|
|
9
|
+
item: {
|
|
10
|
+
item: { list: true, view: true },
|
|
11
|
+
},
|
|
12
|
+
};
|
|
13
|
+
//# sourceMappingURL=operator.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"operator.js","sourceRoot":"","sources":["../../../src/access_control/policies/operator.ts"],"names":[],"mappings":";;;AAEA,2BAA2B;AACd,QAAA,cAAc,GAA0B;IACjD,OAAO,EAAE;QACL,OAAO,EAAE,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,EAAE;KAChF;IACD,IAAI,EAAE;QACF,IAAI,EAAE,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE;KACnC;CACJ,CAAC","sourcesContent":["import { AccessPolicyWithExtra } from \"../types\";\n\n// Operator: minimal access\nexport const operatorPolicy: AccessPolicyWithExtra = {\n account: {\n account: { list: true, view: true, create: true, update: true, delete: true }\n },\n item: {\n item: { list: true, view: true },\n },\n};\n"]}
|
|
@@ -0,0 +1,11 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.workerPolicy = void 0;
|
|
4
|
+
// Worker: limited access
|
|
5
|
+
exports.workerPolicy = {
|
|
6
|
+
item: {
|
|
7
|
+
item: { list: true, view: true, create: false, update: false, delete: false },
|
|
8
|
+
category: { list: true, view: true, create: false, update: false, delete: false },
|
|
9
|
+
}
|
|
10
|
+
};
|
|
11
|
+
//# sourceMappingURL=worker.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"worker.js","sourceRoot":"","sources":["../../../src/access_control/policies/worker.ts"],"names":[],"mappings":";;;AAEA,yBAAyB;AACZ,QAAA,YAAY,GAA0B;IAC/C,IAAI,EAAE;QACF,IAAI,EAAE,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,MAAM,EAAE,KAAK,EAAE,MAAM,EAAE,KAAK,EAAE,MAAM,EAAE,KAAK,EAAE;QAC7E,QAAQ,EAAE,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,MAAM,EAAE,KAAK,EAAE,MAAM,EAAE,KAAK,EAAE,MAAM,EAAE,KAAK,EAAE;KACpF;CACJ,CAAC","sourcesContent":["import { AccessPolicyWithExtra } from \"../types\";\n\n// Worker: limited access\nexport const workerPolicy: AccessPolicyWithExtra = {\n item: {\n item: { list: true, view: true, create: false, update: false, delete: false },\n category: { list: true, view: true, create: false, update: false, delete: false },\n }\n};\n"]}
|
|
@@ -0,0 +1,3 @@
|
|
|
1
|
+
export declare const accessControlScopes: readonly ["account", "access_key", "business", "access_control", "user", "role", "user_role", "item", "location", "injection_field", "file", "document"];
|
|
2
|
+
export declare const accessControlScopesMap: Map<"location" | "account" | "access_key" | "business" | "access_control" | "user" | "role" | "user_role" | "item" | "injection_field" | "file" | "document", string>;
|
|
3
|
+
export type AccessControlScope = typeof accessControlScopes[number];
|
|
@@ -0,0 +1,33 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.accessControlScopesMap = exports.accessControlScopes = void 0;
|
|
4
|
+
// List of all scopes in your system
|
|
5
|
+
exports.accessControlScopes = [
|
|
6
|
+
"account",
|
|
7
|
+
"access_key",
|
|
8
|
+
"business",
|
|
9
|
+
"access_control",
|
|
10
|
+
"user",
|
|
11
|
+
"role",
|
|
12
|
+
"user_role",
|
|
13
|
+
"item",
|
|
14
|
+
"location",
|
|
15
|
+
"injection_field",
|
|
16
|
+
"file",
|
|
17
|
+
"document",
|
|
18
|
+
];
|
|
19
|
+
exports.accessControlScopesMap = new Map([
|
|
20
|
+
["account", "Manage Accounts"],
|
|
21
|
+
["access_key", "Manage Access Keys"],
|
|
22
|
+
["business", "Manage Business Orgnizations"],
|
|
23
|
+
["access_control", "Manage Access Control Policies"],
|
|
24
|
+
["user", "Manage Users"],
|
|
25
|
+
["role", "Manage Roles"],
|
|
26
|
+
["user_role", "Manage User Permissions"],
|
|
27
|
+
["item", "Manage Items"],
|
|
28
|
+
["location", "Manage Locations"],
|
|
29
|
+
["injection_field", "Manage Injection Fields"],
|
|
30
|
+
["file", "Manage Files"],
|
|
31
|
+
["document", "Manage Documents"],
|
|
32
|
+
]);
|
|
33
|
+
//# sourceMappingURL=scopes.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"scopes.js","sourceRoot":"","sources":["../../src/access_control/scopes.ts"],"names":[],"mappings":";;;AAAA,oCAAoC;AACvB,QAAA,mBAAmB,GAAG;IAC/B,SAAS;IACT,YAAY;IACZ,UAAU;IACV,gBAAgB;IAChB,MAAM;IACN,MAAM;IACN,WAAW;IACX,MAAM;IACN,UAAU;IACV,iBAAiB;IACjB,MAAM;IACN,UAAU;CACJ,CAAC;AAEE,QAAA,sBAAsB,GAAG,IAAI,GAAG,CAA6B;IACtE,CAAC,SAAS,EAAE,iBAAiB,CAAC;IAC9B,CAAC,YAAY,EAAE,oBAAoB,CAAC;IACpC,CAAC,UAAU,EAAE,8BAA8B,CAAC;IAC5C,CAAC,gBAAgB,EAAE,gCAAgC,CAAC;IACpD,CAAC,MAAM,EAAE,cAAc,CAAC;IACxB,CAAC,MAAM,EAAE,cAAc,CAAC;IACxB,CAAC,WAAW,EAAE,yBAAyB,CAAC;IACxC,CAAC,MAAM,EAAE,cAAc,CAAC;IACxB,CAAC,UAAU,EAAE,kBAAkB,CAAC;IAChC,CAAC,iBAAiB,EAAE,yBAAyB,CAAC;IAC9C,CAAC,MAAM,EAAE,cAAc,CAAC;IACxB,CAAC,UAAU,EAAE,kBAAkB,CAAC;CACnC,CAAC,CAAC","sourcesContent":["// List of all scopes in your system\nexport const accessControlScopes = [\n \"account\",\n \"access_key\",\n \"business\",\n \"access_control\",\n \"user\",\n \"role\",\n \"user_role\",\n \"item\",\n \"location\",\n \"injection_field\",\n \"file\",\n \"document\",\n] as const;\n\nexport const accessControlScopesMap = new Map<AccessControlScope, string>([\n [\"account\", \"Manage Accounts\"],\n [\"access_key\", \"Manage Access Keys\"],\n [\"business\", \"Manage Business Orgnizations\"],\n [\"access_control\", \"Manage Access Control Policies\"],\n [\"user\", \"Manage Users\"],\n [\"role\", \"Manage Roles\"],\n [\"user_role\", \"Manage User Permissions\"],\n [\"item\", \"Manage Items\"],\n [\"location\", \"Manage Locations\"],\n [\"injection_field\", \"Manage Injection Fields\"],\n [\"file\", \"Manage Files\"],\n [\"document\", \"Manage Documents\"],\n]);\n\n// Type-safe Scope type\nexport type AccessControlScope = typeof accessControlScopes[number];"]}
|
|
@@ -0,0 +1,16 @@
|
|
|
1
|
+
import { AccessControlScope } from "./scopes";
|
|
2
|
+
import { AccessControlModuleOf } from "./modules";
|
|
3
|
+
import { AccessControlAction } from "./actions";
|
|
4
|
+
export type AccessPolicyWithExtra<ExtraScopes extends string = never, ExtraModules extends Record<ExtraScopes, string> = Record<ExtraScopes, string>, ExtraActions extends Record<ExtraScopes, Record<string, string>> = Record<ExtraScopes, Record<string, string>>> = {
|
|
5
|
+
[S in AccessControlScope]?: {
|
|
6
|
+
[M in AccessControlModuleOf<S>]?: {
|
|
7
|
+
[A in AccessControlAction]?: boolean;
|
|
8
|
+
};
|
|
9
|
+
};
|
|
10
|
+
} & {
|
|
11
|
+
[S in ExtraScopes]?: {
|
|
12
|
+
[M in ExtraModules[S]]?: {
|
|
13
|
+
[A in ExtraActions[S][M]]?: boolean;
|
|
14
|
+
};
|
|
15
|
+
};
|
|
16
|
+
};
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"types.js","sourceRoot":"","sources":["../../src/access_control/types.ts"],"names":[],"mappings":"","sourcesContent":["import { AccessControlScope } from \"./scopes\";\nimport { AccessControlModuleOf } from \"./modules\";\nimport { AccessControlAction } from \"./actions\";\n\nexport type AccessPolicyWithExtra<\n ExtraScopes extends string = never,\n ExtraModules extends Record<ExtraScopes, string> = Record<ExtraScopes, string>,\n ExtraActions extends Record<ExtraScopes, Record<string, string>> = Record<ExtraScopes, Record<string, string>>\n> = {\n // Core scopes (typed)\n [S in AccessControlScope]?: {\n [M in AccessControlModuleOf<S>]?: {\n [A in AccessControlAction]?: boolean;\n };\n };\n} & {\n // Extra scopes/modules/actions\n [S in ExtraScopes]?: {\n [M in ExtraModules[S]]?: {\n [A in ExtraActions[S][M]]?: boolean;\n };\n };\n };"]}
|
package/dist/app.js
CHANGED
|
@@ -25,6 +25,7 @@ app.use((0, request_1.validateAuthorization)({
|
|
|
25
25
|
excludedRoutes: []
|
|
26
26
|
})); // Validate the Authorization
|
|
27
27
|
app.use(["/auth"], routes_1.authRoutes);
|
|
28
|
+
app.use(["/access_control"], routes_1.accessControlRoutes);
|
|
28
29
|
app.use(["/access_key"], routes_1.accessKeyRoutes);
|
|
29
30
|
app.use(["/access_keys"], routes_1.accessKeysRoutes);
|
|
30
31
|
app.use(["/reset_password"], routes_1.resetPasswordRoutes);
|
package/dist/app.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"app.js","sourceRoot":"","sources":["../src/app.ts"],"names":[],"mappings":";;;;;AAAA,sDAA6B;AAC7B,gDAAwB;AAExB,
|
|
1
|
+
{"version":3,"file":"app.js","sourceRoot":"","sources":["../src/app.ts"],"names":[],"mappings":";;;;;AAAA,sDAA6B;AAC7B,gDAAwB;AAExB,qCAiCiB;AAEjB,mDAA2F;AAC3F,iDAAoD;AAEpD,MAAM,GAAG,GAAG,IAAA,iBAAO,GAAE,CAAC;AAEtB,gBAAgB;AAChB,GAAG,CAAC,GAAG,CAAC,SAAS,EAAE,iBAAO,CAAC,MAAM,CAAC,cAAI,CAAC,IAAI,CAAC,SAAS,EAAE,IAAI,EAAE,QAAQ,CAAC,CAAC,CAAC,CAAC;AAEzE,8BAA8B;AAC9B,GAAG,CAAC,GAAG,CAAC,sBAAY,CAAC,CAAC;AAEtB,wCAAwC;AACxC,GAAG,CAAC,GAAG,CAAC,wBAAc,CAAC,CAAC;AAExB,aAAa;AACb,GAAG,CAAC,GAAG,CAAC,iBAAO,CAAC,IAAI,CAAC,EAAE,KAAK,EAAE,MAAM,EAAE,CAAC,CAAC,CAAC;AACzC,GAAG,CAAC,GAAG,CAAC,iBAAO,CAAC,UAAU,CAAC,EAAE,KAAK,EAAE,MAAM,EAAE,QAAQ,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC;AAE/D,iBAAiB;AACjB,yBAAyB;AAEzB,mBAAmB;AACnB,GAAG,CAAC,GAAG,CAAC,IAAA,+BAAqB,EAAC;IAC1B,cAAc,EAAE,EAAE;CACrB,CAAC,CAAC,CAAC,CAAC,6BAA6B;AAElC,GAAG,CAAC,GAAG,CAAC,CAAC,OAAO,CAAC,EAAE,mBAAU,CAAC,CAAA;AAC9B,GAAG,CAAC,GAAG,CAAC,CAAC,iBAAiB,CAAC,EAAE,4BAAmB,CAAC,CAAA;AACjD,GAAG,CAAC,GAAG,CAAC,CAAC,aAAa,CAAC,EAAE,wBAAe,CAAC,CAAA;AACzC,GAAG,CAAC,GAAG,CAAC,CAAC,cAAc,CAAC,EAAE,yBAAgB,CAAC,CAAA;AAC3C,GAAG,CAAC,GAAG,CAAC,CAAC,iBAAiB,CAAC,EAAE,4BAAmB,CAAC,CAAA;AACjD,GAAG,CAAC,GAAG,CAAC,CAAC,gBAAgB,CAAC,EAAE,0BAAiB,CAAC,CAAA;AAC9C,GAAG,CAAC,GAAG,CAAC,CAAC,iBAAiB,CAAC,EAAE,2BAAkB,CAAC,CAAA;AAChD,GAAG,CAAC,GAAG,CAAC,CAAC,UAAU,CAAC,EAAE,sBAAa,CAAC,CAAA;AACpC,GAAG,CAAC,GAAG,CAAC,CAAC,WAAW,CAAC,EAAE,uBAAc,CAAC,CAAA;AACtC,GAAG,CAAC,GAAG,CAAC,CAAC,OAAO,CAAC,EAAE,mBAAU,CAAC,CAAA;AAC9B,GAAG,CAAC,GAAG,CAAC,CAAC,QAAQ,CAAC,EAAE,oBAAW,CAAC,CAAA;AAChC,GAAG,CAAC,GAAG,CAAC,CAAC,cAAc,CAAC,EAAE,yBAAgB,CAAC,CAAA;AAC3C,GAAG,CAAC,GAAG,CAAC,CAAC,gBAAgB,CAAC,EAAE,2BAAkB,CAAC,CAAA;AAC/C,GAAG,CAAC,GAAG,CAAC,CAAC,WAAW,CAAC,EAAE,uBAAc,CAAC,CAAA;AACtC,GAAG,CAAC,GAAG,CAAC,CAAC,YAAY,CAAC,EAAE,wBAAe,CAAC,CAAA;AACxC,GAAG,CAAC,GAAG,CAAC,CAAC,OAAO,CAAC,EAAE,mBAAU,CAAC,CAAA;AAC9B,GAAG,CAAC,GAAG,CAAC,CAAC,QAAQ,CAAC,EAAE,oBAAW,CAAC,CAAA;AAChC,GAAG,CAAC,GAAG,CAAC,CAAC,OAAO,CAAC,EAAE,mBAAU,CAAC,CAAA;AAC9B,GAAG,CAAC,GAAG,CAAC,CAAC,QAAQ,CAAC,EAAE,oBAAW,CAAC,CAAA;AAChC,GAAG,CAAC,GAAG,CAAC,CAAC,SAAS,CAAC,EAAE,qBAAY,CAAC,CAAA;AAClC,GAAG,CAAC,GAAG,CAAC,CAAC,UAAU,CAAC,EAAE,sBAAa,CAAC,CAAA;AACpC,GAAG,CAAC,GAAG,CAAC,CAAC,WAAW,CAAC,EAAE,uBAAc,CAAC,CAAA;AACtC,GAAG,CAAC,GAAG,CAAC,CAAC,YAAY,CAAC,EAAE,wBAAe,CAAC,CAAA;AACxC,GAAG,CAAC,GAAG,CAAC,CAAC,kBAAkB,CAAC,EAAE,6BAAoB,CAAC,CAAA;AACnD,GAAG,CAAC,GAAG,CAAC,CAAC,mBAAmB,CAAC,EAAE,8BAAqB,CAAC,CAAA;AACrD,GAAG,CAAC,GAAG,CAAC,CAAC,UAAU,CAAC,EAAE,sBAAa,CAAC,CAAA;AACpC,GAAG,CAAC,GAAG,CAAC,CAAC,WAAW,CAAC,EAAE,uBAAc,CAAC,CAAA;AACtC,GAAG,CAAC,GAAG,CAAC,CAAC,WAAW,CAAC,EAAE,uBAAc,CAAC,CAAA;AACtC,GAAG,CAAC,GAAG,CAAC,CAAC,aAAa,CAAC,EAAE,yBAAgB,CAAC,CAAA;AAE1C,GAAG,CAAC,GAAG,CAAC,CAAC,QAAQ,CAAC,EAAE,iCAAwB,CAAC,CAAA;AAC7C,GAAG,CAAC,GAAG,CAAC,CAAC,QAAQ,CAAC,EAAE,4BAAmB,CAAC,CAAA;AAExC,uBAAuB;AACvB,GAAG,CAAC,GAAG,CAAC,qBAAY,CAAC,CAAA;AAErB,kBAAe,GAAG,CAAC","sourcesContent":["import express from \"express\"\nimport path from \"path\";\n\nimport {\n // fileRoutes,\n // filesRoutes,\n // ocrRoutes,\n authRoutes,\n accessControlRoutes,\n accessKeyRoutes,\n accessKeysRoutes,\n resetPasswordRoutes,\n oneTimeCodeRoutes,\n oneTimeCodesRoutes,\n userRoutes,\n usersRoutes,\n businessRoutes,\n businessesRoutes,\n accountRoutes,\n accountsRoutes,\n fileRoutes,\n filesRoutes,\n userBranchRoutes,\n userBranchesRoutes,\n documentRoutes,\n documentsRoutes,\n itemRoutes,\n itemsRoutes,\n regionRoutes,\n regionsRoutes,\n locationRoutes,\n locationsRoutes,\n injectionFieldRoutes,\n injectionFieldsRoutes,\n changePasswordUtilRoutes,\n accessKeyUtilRoutes\n} from \"@/routes\"\n\nimport { validateHeader, validateAuthorization, validateCors } from \"@/middlewares/request\"\nimport { errorHandler } from \"./middlewares/common\";\n\nconst app = express();\n\n// Static Routes\napp.use('/public', express.static(path.join(__dirname, '..', 'public')));\n\n// Enable CORS for all origins\napp.use(validateCors);\n\n// Register global check headers handler\napp.use(validateHeader);\n\n// Middleware\napp.use(express.json({ limit: '15mb' }));\napp.use(express.urlencoded({ limit: '15mb', extended: true }));\n\n// Initial Prisma\n// app.use(initialPrisma)\n\n// Protected Routes\napp.use(validateAuthorization({\n excludedRoutes: []\n})); // Validate the Authorization\n\napp.use([\"/auth\"], authRoutes)\napp.use([\"/access_control\"], accessControlRoutes)\napp.use([\"/access_key\"], accessKeyRoutes)\napp.use([\"/access_keys\"], accessKeysRoutes)\napp.use([\"/reset_password\"], resetPasswordRoutes)\napp.use([\"/one_time_code\"], oneTimeCodeRoutes)\napp.use([\"/one_time_codes\"], oneTimeCodesRoutes)\napp.use([\"/account\"], accountRoutes)\napp.use([\"/accounts\"], accountsRoutes)\napp.use([\"/user\"], userRoutes)\napp.use([\"/users\"], usersRoutes)\napp.use([\"/user_branch\"], userBranchRoutes)\napp.use([\"/user_branches\"], userBranchesRoutes)\napp.use([\"/document\"], documentRoutes)\napp.use([\"/documents\"], documentsRoutes)\napp.use([\"/item\"], itemRoutes)\napp.use([\"/items\"], itemsRoutes)\napp.use([\"/file\"], fileRoutes)\napp.use([\"/files\"], filesRoutes)\napp.use([\"/region\"], regionRoutes)\napp.use([\"/regions\"], regionsRoutes)\napp.use([\"/location\"], locationRoutes)\napp.use([\"/locations\"], locationsRoutes)\napp.use([\"/injection_field\"], injectionFieldRoutes)\napp.use([\"/injection_fields\"], injectionFieldsRoutes)\napp.use([\"/account\"], accountRoutes)\napp.use([\"/accounts\"], accountsRoutes)\napp.use([\"/business\"], businessRoutes)\napp.use([\"/businesses\"], businessesRoutes)\n\napp.use([\"/utils\"], changePasswordUtilRoutes)\napp.use([\"/utils\"], accessKeyUtilRoutes)\n\n// Global error handler\napp.use(errorHandler)\n\nexport default app;"]}
|
|
@@ -0,0 +1,7 @@
|
|
|
1
|
+
import { Request, Response, NextFunction } from "express";
|
|
2
|
+
/** account/:accountId : get account */
|
|
3
|
+
/** account : create account */
|
|
4
|
+
/** account/:accountId : update account */
|
|
5
|
+
/** access_controls/policy_options/:userType : list ACL options */
|
|
6
|
+
export declare const listAccessControlPolicyOptions: (req: Request, res: Response, next: NextFunction) => Promise<any>;
|
|
7
|
+
/** accounts/delete : delete accounts */
|