salix/modules/ticket/back/methods/sale/canEdit.js

96 lines
3.6 KiB
JavaScript
Raw Normal View History

2022-10-04 11:22:11 +00:00
const UserError = require('vn-loopback/util/user-error');
2022-10-19 06:22:36 +00:00
const loopBackCtx = require('vn-loopback/server/server');
2022-10-04 11:22:11 +00:00
module.exports = Self => {
Self.remoteMethodCtx('canEdit', {
description: 'Check if all the received sales are aditable',
accessType: 'READ',
accepts: [{
arg: 'sales',
type: ['object'],
required: true
}],
returns: {
type: 'boolean',
root: true
},
http: {
2022-10-04 13:02:00 +00:00
path: `/canEdit`,
verb: 'get'
}
});
Self.canEdit = async(ctx, sales, options) => {
const models = Self.app.models;
const myOptions = {};
if (typeof options == 'object')
Object.assign(myOptions, options);
2022-10-04 13:02:00 +00:00
const firstSale = await models.Sale.findById(sales[0], null, myOptions);
2022-10-04 11:22:11 +00:00
const isTicketEditable = await models.Ticket.isEditable(ctx, firstSale.ticketFk, myOptions);
if (!isTicketEditable)
2022-10-04 13:02:00 +00:00
throw new UserError(`The sales of this ticket can't be modified`);
2022-10-04 11:22:11 +00:00
const saleTracking = await models.SaleTracking.find({where: {saleFk: {inq: sales}}}, myOptions);
const hasSaleTracking = saleTracking.length;
2022-10-04 11:22:11 +00:00
const saleCloned = await models.SaleCloned.find({where: {saleClonedFk: {inq: sales}}}, myOptions);
const hasSaleCloned = saleCloned.length;
const isTicketWeekly =
await models.TicketWeekly.findOne({where: {ticketFk: firstSale.ticketFk}}, myOptions);
2022-10-18 09:50:16 +00:00
// (principalType, principalId,model, property, accessType,callback);
2022-10-19 06:22:36 +00:00
// let canEditTracked = await models.ACL.checkPermission('ROLE', 'employee', 'Sale', 'editTracked', 'WRITE');
2022-10-18 09:50:16 +00:00
// let canEditTracked2 = await models.ACL.checkPermission('USER', 'developer', 'Sale', 'editTracked', 'READ');
const array = ['editTracked'];
2022-10-19 06:22:36 +00:00
const AccessContext = loopBackCtx.AccessContext;
const toFind = {
2022-10-18 09:50:16 +00:00
principals: [{
type: 'ROLE',
id: 'employee'
}],
model: 'Sale',
property: 'editTracked',
2022-10-19 06:22:36 +00:00
methodNames: ['editTracked'],
accessType: 'WRITE'
};
const newContext = new AccessContext(toFind);
newContext.methodNames = ['editTracked'];
let canEditTracked3 = await models.ACL.checkAccessForContext(newContext);
let canEditTracked4 = await models.ACL.checkAccessForContext({
principals: [{
type: 'ROLE',
id: 'developer'
}],
model: 'Sale',
property: 'editTracked',
methodName: 'editTracked',
methodNames: ['editTracked'],
accessType: 'WRITE'
2022-10-18 09:50:16 +00:00
});
2022-10-19 06:22:36 +00:00
// console.log(canEditTracked);
2022-10-18 09:50:16 +00:00
// canEditTracked = await models.ACL.resolvePermission(canEditTracked);
// let canEditCloned = await models.ACL.checkPermission('ROLE', 'employee', 'Sale', 'editCloned', '*');
// let canEditWeekly = await models.ACL.checkPermission('ROLE', 'employee', 'Ticket', 'editWeekly', '*');
2022-10-18 09:50:16 +00:00
// console.log(canEditTracked, canEditTracked2);
2022-10-19 06:22:36 +00:00
console.log('DENY: ', canEditTracked3.permission);
console.log('ALLOW: ', canEditTracked4.permission);
const shouldEditTracked = canEditTracked || !hasSaleTracking;
const shouldEditCloned = canEditCloned || !hasSaleCloned;
const shouldEditWeekly = canEditWeekly || !isTicketWeekly;
const canEdit = shouldEditTracked && shouldEditCloned && shouldEditWeekly;
2022-10-18 09:50:16 +00:00
if (canEdit)
return true;
return false;
};
};