Skip to content

Instantly share code, notes, and snippets.

@DaGaMs
Created February 18, 2017 01:55
Show Gist options
  • Save DaGaMs/e3d5c6d908a6de88c131b88339c1ea9f to your computer and use it in GitHub Desktop.
Save DaGaMs/e3d5c6d908a6de88c131b88339c1ea9f to your computer and use it in GitHub Desktop.
loopback:security:role isInRole(): $everyone +0ms
loopback:security:access-context ---AccessContext--- +0ms
loopback:security:access-context principals: +0ms
loopback:security:access-context principal: {"type":"USER","id":1} +0ms
loopback:security:access-context modelName Note +0ms
loopback:security:access-context modelId undefined +0ms
loopback:security:access-context property find +0ms
loopback:security:access-context method find +0ms
loopback:security:access-context accessType READ +1ms
loopback:security:access-context accessToken: +0ms
loopback:security:access-context id "0niitLiBbRO5Allg1Ri3C0dWFcjoDd5PUMhtAu8vFlmA2dWlBFGsba3LuJefTzc4" +0ms
loopback:security:access-context ttl 1209600 +0ms
loopback:security:access-context getUserId() 1 +0ms
loopback:security:access-context isAuthenticated() true +0ms
loopback:security:role Custom resolver found for role $everyone +0ms
loopback:security:role isInRole(): $authenticated +0ms
loopback:security:access-context ---AccessContext--- +0ms
loopback:security:access-context principals: +0ms
loopback:security:access-context principal: {"type":"USER","id":1} +0ms
loopback:security:access-context modelName Note +0ms
loopback:security:access-context modelId undefined +1ms
loopback:security:access-context property find +0ms
loopback:security:access-context method find +0ms
loopback:security:access-context accessType READ +0ms
loopback:security:access-context accessToken: +0ms
loopback:security:access-context id "0niitLiBbRO5Allg1Ri3C0dWFcjoDd5PUMhtAu8vFlmA2dWlBFGsba3LuJefTzc4" +0ms
loopback:security:access-context ttl 1209600 +0ms
loopback:security:access-context getUserId() 1 +0ms
loopback:security:access-context isAuthenticated() true +0ms
loopback:security:role Custom resolver found for role $authenticated +0ms
loopback:security:role isInRole(): $owner +0ms
loopback:security:access-context ---AccessContext--- +0ms
loopback:security:access-context principals: +0ms
loopback:security:access-context principal: {"type":"USER","id":1} +0ms
loopback:security:access-context modelName Note +0ms
loopback:security:access-context modelId undefined +0ms
loopback:security:access-context property find +0ms
loopback:security:access-context method find +0ms
loopback:security:access-context accessType READ +0ms
loopback:security:access-context accessToken: +0ms
loopback:security:access-context id "0niitLiBbRO5Allg1Ri3C0dWFcjoDd5PUMhtAu8vFlmA2dWlBFGsba3LuJefTzc4" +0ms
loopback:security:access-context ttl 1209600 +0ms
loopback:security:access-context getUserId() 1 +0ms
loopback:security:access-context isAuthenticated() true +0ms
loopback:security:role Custom resolver found for role $owner +0ms
loopback:security:acl The following ACLs were searched: +2ms
loopback:security:acl ---ACL--- +0ms
loopback:security:acl model Note +0ms
loopback:security:acl property find +0ms
loopback:security:acl principalType ROLE +0ms
loopback:security:acl principalId $authenticated +0ms
loopback:security:acl accessType * +0ms
loopback:security:acl permission ALLOW +0ms
loopback:security:acl with score: +0ms 8008
loopback:security:acl ---ACL--- +0ms
loopback:security:acl model Note +0ms
loopback:security:acl property * +0ms
loopback:security:acl principalType ROLE +0ms
loopback:security:acl principalId $everyone +0ms
loopback:security:acl accessType * +0ms
loopback:security:acl permission DENY +1ms
loopback:security:acl with score: +0ms 7495
loopback:security:acl ---Resolved--- +0ms
loopback:security:access-context ---AccessRequest--- +0ms
loopback:security:access-context model Note +0ms
loopback:security:access-context property find +0ms
loopback:security:access-context accessType READ +0ms
loopback:security:access-context permission ALLOW +0ms
loopback:security:access-context isWildcard() false +0ms
loopback:security:access-context isAllowed() true +0ms
strong-remoting:shared-method - find - invoke with +1ms [ { where: { title: 'test' } },
{ accessToken:
{ id: '0niitLiBbRO5Allg1Ri3C0dWFcjoDd5PUMhtAu8vFlmA2dWlBFGsba3LuJefTzc4',
ttl: 1209600,
created: 2017-02-18T01:43:57.602Z,
userId: 1 },
userId: 1 },
[Function: callback] ]
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment