Skip to content

Commit 786e7be

Browse files
committed
added constant rename
1 parent 042d49a commit 786e7be

File tree

3 files changed

+19
-19
lines changed

3 files changed

+19
-19
lines changed

constants/userDataLevels.js

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,11 +11,11 @@ const ROLE_LEVEL = {
1111
confidential: ["super_user"],
1212
};
1313

14-
const ROLE_ACCESS = {
14+
const KEYS_NOT_ALLOWED = {
1515
public: ["email", "phone", "chaincode"],
1616
internal: ["phone", "chaincode"],
1717
private: ["chaincode"],
1818
confidential: [],
1919
};
2020

21-
module.exports = { ACCESS_LEVEL, ROLE_ACCESS, ROLE_LEVEL };
21+
module.exports = { ACCESS_LEVEL, KEYS_NOT_ALLOWED, ROLE_LEVEL };

services/dataAccessLayer.js

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
const userQuery = require("../models/users");
22
const members = require("../models/members");
3-
const { ROLE_LEVEL, ROLE_ACCESS, ACCESS_LEVEL } = require("../constants/userDataLevels");
3+
const { ROLE_LEVEL, KEYS_NOT_ALLOWED, ACCESS_LEVEL } = require("../constants/userDataLevels");
44

55
const retrieveUsers = async ({
66
id = null,
@@ -78,9 +78,9 @@ const retrieveUsersWithRole = async (role) => {
7878
};
7979

8080
const removeSensitiveInfo = function (obj, level = ACCESS_LEVEL.PUBLIC) {
81-
for (let i = 0; i < ROLE_ACCESS[level].length; i++) {
82-
if (Object.prototype.hasOwnProperty.call(obj, ROLE_ACCESS[level][i])) {
83-
delete obj[ROLE_ACCESS[level][i]];
81+
for (let i = 0; i < KEYS_NOT_ALLOWED[level].length; i++) {
82+
if (Object.prototype.hasOwnProperty.call(obj, KEYS_NOT_ALLOWED[level][i])) {
83+
delete obj[KEYS_NOT_ALLOWED[level][i]];
8484
}
8585
}
8686
};

test/unit/services/dataAccessLayer.test.js

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ const {
1515
levelSpecificAccess,
1616
} = require("../../../services/dataAccessLayer");
1717

18-
const { ROLE_ACCESS, ACCESS_LEVEL } = require("../../../constants/userDataLevels");
18+
const { KEYS_NOT_ALLOWED, ACCESS_LEVEL } = require("../../../constants/userDataLevels");
1919

2020
const userData = require("../../fixtures/user/user")();
2121

@@ -31,7 +31,7 @@ describe("Data Access Layer", function () {
3131
const result = await retrieveUsers({ id: userData[12].id });
3232
removeSensitiveInfo(userData[12]);
3333
expect(result.user).to.deep.equal(userData[12]);
34-
ROLE_ACCESS[ACCESS_LEVEL.PUBLIC].forEach((key) => {
34+
KEYS_NOT_ALLOWED[ACCESS_LEVEL.PUBLIC].forEach((key) => {
3535
expect(result.user).to.not.have.property(key);
3636
});
3737
});
@@ -41,7 +41,7 @@ describe("Data Access Layer", function () {
4141
const result = await retrieveUsers({ username: userData[12].username });
4242
removeSensitiveInfo(userData[12]);
4343
expect(result.user).to.deep.equal(userData[12]);
44-
ROLE_ACCESS[ACCESS_LEVEL.PUBLIC].forEach((key) => {
44+
KEYS_NOT_ALLOWED[ACCESS_LEVEL.PUBLIC].forEach((key) => {
4545
expect(result.user).to.not.have.property(key);
4646
});
4747
});
@@ -53,7 +53,7 @@ describe("Data Access Layer", function () {
5353
removeSensitiveInfo(userData[12]);
5454
result.forEach((user) => {
5555
expect(user).to.deep.equal(userData[12]);
56-
ROLE_ACCESS[ACCESS_LEVEL.PUBLIC].forEach((key) => {
56+
KEYS_NOT_ALLOWED[ACCESS_LEVEL.PUBLIC].forEach((key) => {
5757
expect(user).to.not.have.property(key);
5858
});
5959
});
@@ -67,7 +67,7 @@ describe("Data Access Layer", function () {
6767
removeSensitiveInfo(userData[12]);
6868
result.users.forEach((user) => {
6969
expect(user).to.deep.equal(userData[12]);
70-
ROLE_ACCESS[ACCESS_LEVEL.PUBLIC].forEach((key) => {
70+
KEYS_NOT_ALLOWED[ACCESS_LEVEL.PUBLIC].forEach((key) => {
7171
expect(user).to.not.have.property(key);
7272
});
7373
});
@@ -77,7 +77,7 @@ describe("Data Access Layer", function () {
7777
const userdata = userData[12];
7878
await retrieveUsers({ userdata });
7979
removeSensitiveInfo(userData[12]);
80-
ROLE_ACCESS[ACCESS_LEVEL.PUBLIC].forEach((key) => {
80+
KEYS_NOT_ALLOWED[ACCESS_LEVEL.PUBLIC].forEach((key) => {
8181
expect(userdata).to.not.have.property(key);
8282
});
8383
});
@@ -90,7 +90,7 @@ describe("Data Access Layer", function () {
9090
const result = await retrieveDiscordUsers();
9191
result.forEach((user) => {
9292
expect(user).to.deep.equal(userData[12]);
93-
ROLE_ACCESS[ACCESS_LEVEL.PUBLIC].forEach((key) => {
93+
KEYS_NOT_ALLOWED[ACCESS_LEVEL.PUBLIC].forEach((key) => {
9494
expect(user).to.not.have.property(key);
9595
});
9696
});
@@ -105,7 +105,7 @@ describe("Data Access Layer", function () {
105105
const result = await retrieveUsersWithRole(query);
106106
result.forEach((user) => {
107107
expect(user).to.deep.equal(userData[12]);
108-
ROLE_ACCESS[ACCESS_LEVEL.PUBLIC].forEach((key) => {
108+
KEYS_NOT_ALLOWED[ACCESS_LEVEL.PUBLIC].forEach((key) => {
109109
expect(user).to.not.have.property(key);
110110
});
111111
});
@@ -119,7 +119,7 @@ describe("Data Access Layer", function () {
119119
const result = await retrieveMembers();
120120
result.forEach((user) => {
121121
expect(user).to.deep.equal(userData[12]);
122-
ROLE_ACCESS[ACCESS_LEVEL.PUBLIC].forEach((key) => {
122+
KEYS_NOT_ALLOWED[ACCESS_LEVEL.PUBLIC].forEach((key) => {
123123
expect(user).to.not.have.property(key);
124124
});
125125
});
@@ -134,7 +134,7 @@ describe("Data Access Layer", function () {
134134
const result = await retreiveFilteredUsers(query);
135135
result.forEach((user) => {
136136
expect(user).to.deep.equal(userData[12]);
137-
ROLE_ACCESS[ACCESS_LEVEL.PUBLIC].forEach((key) => {
137+
KEYS_NOT_ALLOWED[ACCESS_LEVEL.PUBLIC].forEach((key) => {
138138
expect(user).to.not.have.property(key);
139139
});
140140
});
@@ -144,7 +144,7 @@ describe("Data Access Layer", function () {
144144
describe("removeSensitiveInfo", function () {
145145
it("should remove sensitive information from the users object", function () {
146146
removeSensitiveInfo(userData[12]);
147-
ROLE_ACCESS[ACCESS_LEVEL.PUBLIC].forEach((key) => {
147+
KEYS_NOT_ALLOWED[ACCESS_LEVEL.PUBLIC].forEach((key) => {
148148
expect(userData[12]).to.not.have.property(key);
149149
});
150150
});
@@ -153,7 +153,7 @@ describe("Data Access Layer", function () {
153153
describe("levelSpecificAccess", function () {
154154
it("should return the user object for PUBLIC level after removing all sensitive info", function () {
155155
const result = levelSpecificAccess({ ...userData[12] }, ACCESS_LEVEL.PUBLIC);
156-
ROLE_ACCESS[ACCESS_LEVEL.PUBLIC].forEach((key) => {
156+
KEYS_NOT_ALLOWED[ACCESS_LEVEL.PUBLIC].forEach((key) => {
157157
expect(result).to.not.have.property(key);
158158
});
159159
});
@@ -169,7 +169,7 @@ describe("Data Access Layer", function () {
169169
const role = "super_user";
170170
const level = ACCESS_LEVEL.PRIVATE;
171171
const result = levelSpecificAccess(user, level, role);
172-
ROLE_ACCESS[level].forEach((key) => {
172+
KEYS_NOT_ALLOWED[level].forEach((key) => {
173173
expect(result).to.not.have.property(key);
174174
});
175175
expect(result).to.have.property("phone");

0 commit comments

Comments
 (0)