@ackplus/nest-auth 0.0.39 → 0.0.40
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +226 -0
- package/package.json +2 -2
- package/src/index.js +12 -0
- package/src/index.js.map +1 -0
- package/src/lib/auth/auth.module.js +52 -0
- package/src/lib/auth/auth.module.js.map +1 -0
- package/src/lib/auth/controllers/auth.controller.js +189 -0
- package/src/lib/auth/controllers/auth.controller.js.map +1 -0
- package/src/lib/auth/controllers/mfa.controller.js +130 -0
- package/src/lib/auth/controllers/mfa.controller.js.map +1 -0
- package/src/lib/auth/dto/index.js +1 -0
- package/src/lib/auth/dto/index.js.map +1 -0
- package/src/lib/auth/dto/requests/forgot-password.request.dto.js +30 -0
- package/src/lib/auth/dto/requests/forgot-password.request.dto.js.map +1 -0
- package/src/lib/auth/dto/requests/login.request.dto.js +34 -0
- package/src/lib/auth/dto/requests/login.request.dto.js.map +1 -0
- package/src/lib/auth/dto/requests/refresh-token.request.dto.js +15 -0
- package/src/lib/auth/dto/requests/refresh-token.request.dto.js.map +1 -0
- package/src/lib/auth/dto/requests/reset-password.request.dto.js +42 -0
- package/src/lib/auth/dto/requests/reset-password.request.dto.js.map +1 -0
- package/src/lib/auth/dto/requests/send-mfa-code.request.dto.js +16 -0
- package/src/lib/auth/dto/requests/send-mfa-code.request.dto.js.map +1 -0
- package/src/lib/auth/dto/requests/signup.request.dto.js +37 -0
- package/src/lib/auth/dto/requests/signup.request.dto.js.map +1 -0
- package/src/lib/auth/dto/requests/social-login.request.dto.js +16 -0
- package/src/lib/auth/dto/requests/social-login.request.dto.js.map +1 -0
- package/src/lib/auth/dto/requests/verify-2fa.request.dto.js +21 -0
- package/src/lib/auth/dto/requests/verify-2fa.request.dto.js.map +1 -0
- package/src/lib/auth/dto/requests/verify-totp-setup.request.dto.js +20 -0
- package/src/lib/auth/dto/requests/verify-totp-setup.request.dto.js.map +1 -0
- package/src/lib/auth/dto/responses/auth.response.dto.js +50 -0
- package/src/lib/auth/dto/responses/auth.response.dto.js.map +1 -0
- package/src/lib/auth/entities/mfa-secret.entity.js +50 -0
- package/src/lib/auth/entities/mfa-secret.entity.js.map +1 -0
- package/src/lib/auth/entities/otp.entity.js +50 -0
- package/src/lib/auth/entities/otp.entity.js.map +1 -0
- package/src/lib/auth/events/logged-out-all.event.js +10 -0
- package/src/lib/auth/events/logged-out-all.event.js.map +1 -0
- package/src/lib/auth/events/logged-out.event.js +10 -0
- package/src/lib/auth/events/logged-out.event.js.map +1 -0
- package/src/lib/auth/events/password-reset-requested.event.js +10 -0
- package/src/lib/auth/events/password-reset-requested.event.js.map +1 -0
- package/src/lib/auth/events/password-reset.event.js +10 -0
- package/src/lib/auth/events/password-reset.event.js.map +1 -0
- package/src/lib/auth/events/user-2fa-verified.event.js +10 -0
- package/src/lib/auth/events/user-2fa-verified.event.js.map +1 -0
- package/src/lib/auth/events/user-logged-in.event.js +10 -0
- package/src/lib/auth/events/user-logged-in.event.js.map +1 -0
- package/src/lib/auth/events/user-refresh-token.event.js +10 -0
- package/src/lib/auth/events/user-refresh-token.event.js.map +1 -0
- package/src/lib/auth/index.js +20 -0
- package/src/lib/auth/index.js.map +1 -0
- package/src/lib/auth/services/auth.service.js +396 -0
- package/src/lib/auth/services/auth.service.js.map +1 -0
- package/src/lib/auth/services/cookie.service.js +43 -0
- package/src/lib/auth/services/cookie.service.js.map +1 -0
- package/src/lib/auth/services/mfa.service.js +255 -0
- package/src/lib/auth/services/mfa.service.js.map +1 -0
- package/src/lib/auth.constants.js +43 -0
- package/src/lib/auth.constants.js.map +1 -0
- package/src/lib/core/core.module.js +67 -0
- package/src/lib/core/core.module.js.map +1 -0
- package/src/lib/core/decorators/role.decorator.js +14 -0
- package/src/lib/core/decorators/role.decorator.js.map +1 -0
- package/src/lib/core/decorators/skip-mfa.decorator.js +8 -0
- package/src/lib/core/decorators/skip-mfa.decorator.js.map +1 -0
- package/src/lib/core/dto/message.response.dto.js +13 -0
- package/src/lib/core/dto/message.response.dto.js.map +1 -0
- package/src/lib/core/entities.d.ts +1 -1
- package/src/lib/core/entities.js +34 -0
- package/src/lib/core/entities.js.map +1 -0
- package/src/lib/core/guards/auth.guard.js +135 -0
- package/src/lib/core/guards/auth.guard.js.map +1 -0
- package/src/lib/core/guards/role.guard.js +40 -0
- package/src/lib/core/guards/role.guard.js.map +1 -0
- package/src/lib/core/index.js +27 -0
- package/src/lib/core/index.js.map +1 -0
- package/src/lib/core/interfaces/auth-module-options.interface.js +3 -0
- package/src/lib/core/interfaces/auth-module-options.interface.js.map +1 -0
- package/src/lib/core/interfaces/mfa-options.interface.js +10 -0
- package/src/lib/core/interfaces/mfa-options.interface.js.map +1 -0
- package/src/lib/core/interfaces/otp.interface.js +10 -0
- package/src/lib/core/interfaces/otp.interface.js.map +1 -0
- package/src/lib/core/interfaces/session-options.interface.js +9 -0
- package/src/lib/core/interfaces/session-options.interface.js.map +1 -0
- package/src/lib/core/interfaces/token-payload.interface.js +3 -0
- package/src/lib/core/interfaces/token-payload.interface.js.map +1 -0
- package/src/lib/core/providers/apple-auth.provider.js +58 -0
- package/src/lib/core/providers/apple-auth.provider.js.map +1 -0
- package/src/lib/core/providers/base-auth.provider.js +41 -0
- package/src/lib/core/providers/base-auth.provider.js.map +1 -0
- package/src/lib/core/providers/email-auth.provider.js +42 -0
- package/src/lib/core/providers/email-auth.provider.js.map +1 -0
- package/src/lib/core/providers/facebook-auth.provider.js +58 -0
- package/src/lib/core/providers/facebook-auth.provider.js.map +1 -0
- package/src/lib/core/providers/google-auth.provider.js +60 -0
- package/src/lib/core/providers/google-auth.provider.js.map +1 -0
- package/src/lib/core/providers/jwt-auth.provider.js +51 -0
- package/src/lib/core/providers/jwt-auth.provider.js.map +1 -0
- package/src/lib/core/providers/phone-auth.provider.js +45 -0
- package/src/lib/core/providers/phone-auth.provider.js.map +1 -0
- package/src/lib/core/services/auth-provider-registry.service.js +72 -0
- package/src/lib/core/services/auth-provider-registry.service.js.map +1 -0
- package/src/lib/core/services/jwt.service.js +93 -0
- package/src/lib/core/services/jwt.service.js.map +1 -0
- package/src/lib/nest-auth.module.js +118 -0
- package/src/lib/nest-auth.module.js.map +1 -0
- package/src/lib/request-context/request-context.js +108 -0
- package/src/lib/request-context/request-context.js.map +1 -0
- package/src/lib/request-context/request-context.middleware.js +16 -0
- package/src/lib/request-context/request-context.middleware.js.map +1 -0
- package/src/lib/role/entities/permission.entity.js +42 -0
- package/src/lib/role/entities/permission.entity.js.map +1 -0
- package/src/lib/role/entities/role.entity.js +106 -0
- package/src/lib/role/entities/role.entity.js.map +1 -0
- package/src/lib/role/index.js +6 -0
- package/src/lib/role/index.js.map +1 -0
- package/src/lib/role/role.module.js +22 -0
- package/src/lib/role/role.module.js.map +1 -0
- package/src/lib/role/services/role.service.js +220 -0
- package/src/lib/role/services/role.service.js.map +1 -0
- package/src/lib/session/entities/session.entity.js +63 -0
- package/src/lib/session/entities/session.entity.js.map +1 -0
- package/src/lib/session/index.js +8 -0
- package/src/lib/session/index.js.map +1 -0
- package/src/lib/session/services/base-session.service.js +66 -0
- package/src/lib/session/services/base-session.service.js.map +1 -0
- package/src/lib/session/services/database-session.service.js +55 -0
- package/src/lib/session/services/database-session.service.js.map +1 -0
- package/src/lib/session/services/redis-session.service.js +120 -0
- package/src/lib/session/services/redis-session.service.js.map +1 -0
- package/src/lib/session/session.module.js +33 -0
- package/src/lib/session/session.module.js.map +1 -0
- package/src/lib/tenant/entities/tenant.entity.js +44 -0
- package/src/lib/tenant/entities/tenant.entity.js.map +1 -0
- package/src/lib/tenant/events/tenant-created.event.js +10 -0
- package/src/lib/tenant/events/tenant-created.event.js.map +1 -0
- package/src/lib/tenant/events/tenant-deleted.event.js +10 -0
- package/src/lib/tenant/events/tenant-deleted.event.js.map +1 -0
- package/src/lib/tenant/events/tenant-updated.event.js +10 -0
- package/src/lib/tenant/events/tenant-updated.event.js.map +1 -0
- package/src/lib/tenant/index.js +7 -0
- package/src/lib/tenant/index.js.map +1 -0
- package/src/lib/tenant/services/tenant.service.js +136 -0
- package/src/lib/tenant/services/tenant.service.js.map +1 -0
- package/src/lib/tenant/tenant.module.js +27 -0
- package/src/lib/tenant/tenant.module.js.map +1 -0
- package/src/lib/user/dto/requests/update-user.dto.js +24 -0
- package/src/lib/user/dto/requests/update-user.dto.js.map +1 -0
- package/src/lib/user/entities/access-key.entity.js +63 -0
- package/src/lib/user/entities/access-key.entity.js.map +1 -0
- package/src/lib/user/entities/auth-identity.entity.js +47 -0
- package/src/lib/user/entities/auth-identity.entity.js.map +1 -0
- package/src/lib/user/entities/user.entity.js +189 -0
- package/src/lib/user/entities/user.entity.js.map +1 -0
- package/src/lib/user/events/user-created.event.js +10 -0
- package/src/lib/user/events/user-created.event.js.map +1 -0
- package/src/lib/user/events/user-deleted.event.js +10 -0
- package/src/lib/user/events/user-deleted.event.js.map +1 -0
- package/src/lib/user/events/user-registered.event.js +10 -0
- package/src/lib/user/events/user-registered.event.js.map +1 -0
- package/src/lib/user/events/user-updated.event.js +10 -0
- package/src/lib/user/events/user-updated.event.js.map +1 -0
- package/src/lib/user/index.js +8 -0
- package/src/lib/user/index.js.map +1 -0
- package/src/lib/user/services/access-key.service.js +119 -0
- package/src/lib/user/services/access-key.service.js.map +1 -0
- package/src/lib/user/services/user.service.js +217 -0
- package/src/lib/user/services/user.service.js.map +1 -0
- package/src/lib/user/user.module.js +32 -0
- package/src/lib/user/user.module.js.map +1 -0
- package/src/lib/utils/database.utils.js +8 -0
- package/src/lib/utils/database.utils.js.map +1 -0
- package/src/lib/utils/otp.js +7 -0
- package/src/lib/utils/otp.js.map +1 -0
- package/tsconfig.tsbuildinfo +1 -0
- package/index.cjs.d.ts +0 -1
- package/index.cjs.js +0 -28350
|
@@ -0,0 +1,30 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.ForgotPasswordRequestDto = void 0;
|
|
4
|
+
const tslib_1 = require("tslib");
|
|
5
|
+
const swagger_1 = require("@nestjs/swagger");
|
|
6
|
+
const class_validator_1 = require("class-validator");
|
|
7
|
+
class ForgotPasswordRequestDto {
|
|
8
|
+
}
|
|
9
|
+
exports.ForgotPasswordRequestDto = ForgotPasswordRequestDto;
|
|
10
|
+
tslib_1.__decorate([
|
|
11
|
+
(0, swagger_1.ApiProperty)({ description: 'User email address', required: false }),
|
|
12
|
+
(0, class_validator_1.ValidateIf)(o => !o.phone),
|
|
13
|
+
(0, class_validator_1.IsEmail)(),
|
|
14
|
+
(0, class_validator_1.IsNotEmpty)(),
|
|
15
|
+
tslib_1.__metadata("design:type", String)
|
|
16
|
+
], ForgotPasswordRequestDto.prototype, "email", void 0);
|
|
17
|
+
tslib_1.__decorate([
|
|
18
|
+
(0, swagger_1.ApiProperty)({ description: 'User phone number', required: false }),
|
|
19
|
+
(0, class_validator_1.ValidateIf)(o => !o.email),
|
|
20
|
+
(0, class_validator_1.IsPhoneNumber)(),
|
|
21
|
+
(0, class_validator_1.IsNotEmpty)(),
|
|
22
|
+
tslib_1.__metadata("design:type", String)
|
|
23
|
+
], ForgotPasswordRequestDto.prototype, "phone", void 0);
|
|
24
|
+
tslib_1.__decorate([
|
|
25
|
+
(0, swagger_1.ApiProperty)({ description: 'Tenant ID', required: false }),
|
|
26
|
+
(0, class_validator_1.IsUUID)(),
|
|
27
|
+
(0, class_validator_1.IsOptional)(),
|
|
28
|
+
tslib_1.__metadata("design:type", String)
|
|
29
|
+
], ForgotPasswordRequestDto.prototype, "tenantId", void 0);
|
|
30
|
+
//# sourceMappingURL=forgot-password.request.dto.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"forgot-password.request.dto.js","sourceRoot":"","sources":["../../../../../../../../packages/nest-auth/src/lib/auth/dto/requests/forgot-password.request.dto.ts"],"names":[],"mappings":";;;;AAAA,6CAA8C;AAC9C,qDAAqG;AAErG,MAAa,wBAAwB;CAiBpC;AAjBD,4DAiBC;AAZG;IAJC,IAAA,qBAAW,EAAC,EAAE,WAAW,EAAE,oBAAoB,EAAE,QAAQ,EAAE,KAAK,EAAE,CAAC;IACnE,IAAA,4BAAU,EAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC;IACzB,IAAA,yBAAO,GAAE;IACT,IAAA,4BAAU,GAAE;;uDACE;AAMf;IAJC,IAAA,qBAAW,EAAC,EAAE,WAAW,EAAE,mBAAmB,EAAE,QAAQ,EAAE,KAAK,EAAE,CAAC;IAClE,IAAA,4BAAU,EAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC;IACzB,IAAA,+BAAa,GAAE;IACf,IAAA,4BAAU,GAAE;;uDACE;AAKf;IAHC,IAAA,qBAAW,EAAC,EAAE,WAAW,EAAE,WAAW,EAAE,QAAQ,EAAE,KAAK,EAAE,CAAC;IAC1D,IAAA,wBAAM,GAAE;IACR,IAAA,4BAAU,GAAE;;0DACK"}
|
|
@@ -0,0 +1,34 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.LoginRequestDto = void 0;
|
|
4
|
+
const tslib_1 = require("tslib");
|
|
5
|
+
const class_validator_1 = require("class-validator");
|
|
6
|
+
const swagger_1 = require("@nestjs/swagger");
|
|
7
|
+
class LoginRequestDto {
|
|
8
|
+
}
|
|
9
|
+
exports.LoginRequestDto = LoginRequestDto;
|
|
10
|
+
tslib_1.__decorate([
|
|
11
|
+
(0, swagger_1.ApiProperty)({ description: 'Provider ID', required: false }),
|
|
12
|
+
(0, class_validator_1.IsString)(),
|
|
13
|
+
(0, class_validator_1.IsOptional)(),
|
|
14
|
+
tslib_1.__metadata("design:type", String)
|
|
15
|
+
], LoginRequestDto.prototype, "providerId", void 0);
|
|
16
|
+
tslib_1.__decorate([
|
|
17
|
+
(0, swagger_1.ApiProperty)({ description: 'Credentials', required: false }),
|
|
18
|
+
(0, class_validator_1.IsObject)(),
|
|
19
|
+
(0, class_validator_1.IsOptional)(),
|
|
20
|
+
tslib_1.__metadata("design:type", Object)
|
|
21
|
+
], LoginRequestDto.prototype, "credentials", void 0);
|
|
22
|
+
tslib_1.__decorate([
|
|
23
|
+
(0, swagger_1.ApiProperty)({ description: 'Tenant ID', required: false }),
|
|
24
|
+
(0, class_validator_1.IsUUID)(),
|
|
25
|
+
(0, class_validator_1.IsOptional)(),
|
|
26
|
+
tslib_1.__metadata("design:type", String)
|
|
27
|
+
], LoginRequestDto.prototype, "tenantId", void 0);
|
|
28
|
+
tslib_1.__decorate([
|
|
29
|
+
(0, swagger_1.ApiProperty)({ description: 'Create user if not exists', required: false }),
|
|
30
|
+
(0, class_validator_1.IsBoolean)(),
|
|
31
|
+
(0, class_validator_1.IsOptional)(),
|
|
32
|
+
tslib_1.__metadata("design:type", Boolean)
|
|
33
|
+
], LoginRequestDto.prototype, "createUserIfNotExists", void 0);
|
|
34
|
+
//# sourceMappingURL=login.request.dto.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"login.request.dto.js","sourceRoot":"","sources":["../../../../../../../../packages/nest-auth/src/lib/auth/dto/requests/login.request.dto.ts"],"names":[],"mappings":";;;;AAAA,qDAAoF;AACpF,6CAA8C;AAE9C,MAAa,eAAe;CAqB3B;AArBD,0CAqBC;AAhBG;IAHC,IAAA,qBAAW,EAAC,EAAE,WAAW,EAAE,aAAa,EAAE,QAAQ,EAAE,KAAK,EAAE,CAAC;IAC5D,IAAA,0BAAQ,GAAE;IACV,IAAA,4BAAU,GAAE;;mDACO;AAKpB;IAHC,IAAA,qBAAW,EAAC,EAAE,WAAW,EAAE,aAAa,EAAE,QAAQ,EAAE,KAAK,EAAE,CAAC;IAC5D,IAAA,0BAAQ,GAAE;IACV,IAAA,4BAAU,GAAE;;oDACqB;AAKlC;IAHC,IAAA,qBAAW,EAAC,EAAE,WAAW,EAAE,WAAW,EAAE,QAAQ,EAAE,KAAK,EAAE,CAAC;IAC1D,IAAA,wBAAM,GAAE;IACR,IAAA,4BAAU,GAAE;;iDACK;AAKlB;IAHC,IAAA,qBAAW,EAAC,EAAE,WAAW,EAAE,2BAA2B,EAAE,QAAQ,EAAE,KAAK,EAAE,CAAC;IAC1E,IAAA,2BAAS,GAAE;IACX,IAAA,4BAAU,GAAE;;8DACmB"}
|
|
@@ -0,0 +1,15 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.RefreshTokenRequestDto = void 0;
|
|
4
|
+
const tslib_1 = require("tslib");
|
|
5
|
+
const swagger_1 = require("@nestjs/swagger");
|
|
6
|
+
const class_validator_1 = require("class-validator");
|
|
7
|
+
class RefreshTokenRequestDto {
|
|
8
|
+
}
|
|
9
|
+
exports.RefreshTokenRequestDto = RefreshTokenRequestDto;
|
|
10
|
+
tslib_1.__decorate([
|
|
11
|
+
(0, swagger_1.ApiProperty)({ description: 'Refresh token to get new access token' }),
|
|
12
|
+
(0, class_validator_1.IsString)(),
|
|
13
|
+
tslib_1.__metadata("design:type", String)
|
|
14
|
+
], RefreshTokenRequestDto.prototype, "refreshToken", void 0);
|
|
15
|
+
//# sourceMappingURL=refresh-token.request.dto.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"refresh-token.request.dto.js","sourceRoot":"","sources":["../../../../../../../../packages/nest-auth/src/lib/auth/dto/requests/refresh-token.request.dto.ts"],"names":[],"mappings":";;;;AAAA,6CAA8C;AAC9C,qDAA2C;AAE3C,MAAa,sBAAsB;CAIlC;AAJD,wDAIC;AADG;IAFC,IAAA,qBAAW,EAAC,EAAE,WAAW,EAAE,uCAAuC,EAAE,CAAC;IACrE,IAAA,0BAAQ,GAAE;;4DACU"}
|
|
@@ -0,0 +1,42 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.ResetPasswordRequestDto = void 0;
|
|
4
|
+
const tslib_1 = require("tslib");
|
|
5
|
+
const swagger_1 = require("@nestjs/swagger");
|
|
6
|
+
const class_validator_1 = require("class-validator");
|
|
7
|
+
class ResetPasswordRequestDto {
|
|
8
|
+
}
|
|
9
|
+
exports.ResetPasswordRequestDto = ResetPasswordRequestDto;
|
|
10
|
+
tslib_1.__decorate([
|
|
11
|
+
(0, swagger_1.ApiProperty)({ description: 'User email address', required: false }),
|
|
12
|
+
(0, class_validator_1.ValidateIf)(o => !o.phone),
|
|
13
|
+
(0, class_validator_1.IsEmail)(),
|
|
14
|
+
(0, class_validator_1.IsNotEmpty)(),
|
|
15
|
+
tslib_1.__metadata("design:type", String)
|
|
16
|
+
], ResetPasswordRequestDto.prototype, "email", void 0);
|
|
17
|
+
tslib_1.__decorate([
|
|
18
|
+
(0, swagger_1.ApiProperty)({ description: 'User phone number', required: false }),
|
|
19
|
+
(0, class_validator_1.ValidateIf)(o => !o.email),
|
|
20
|
+
(0, class_validator_1.IsPhoneNumber)(),
|
|
21
|
+
(0, class_validator_1.IsNotEmpty)(),
|
|
22
|
+
tslib_1.__metadata("design:type", String)
|
|
23
|
+
], ResetPasswordRequestDto.prototype, "phone", void 0);
|
|
24
|
+
tslib_1.__decorate([
|
|
25
|
+
(0, swagger_1.ApiProperty)({ description: 'One-time password (OTP) received via email or SMS' }),
|
|
26
|
+
(0, class_validator_1.IsString)(),
|
|
27
|
+
(0, class_validator_1.IsNotEmpty)(),
|
|
28
|
+
tslib_1.__metadata("design:type", String)
|
|
29
|
+
], ResetPasswordRequestDto.prototype, "otp", void 0);
|
|
30
|
+
tslib_1.__decorate([
|
|
31
|
+
(0, swagger_1.ApiProperty)({ description: 'New password' }),
|
|
32
|
+
(0, class_validator_1.IsString)(),
|
|
33
|
+
(0, class_validator_1.IsNotEmpty)(),
|
|
34
|
+
tslib_1.__metadata("design:type", String)
|
|
35
|
+
], ResetPasswordRequestDto.prototype, "newPassword", void 0);
|
|
36
|
+
tslib_1.__decorate([
|
|
37
|
+
(0, swagger_1.ApiProperty)({ description: 'Tenant ID', required: false }),
|
|
38
|
+
(0, class_validator_1.IsUUID)(),
|
|
39
|
+
(0, class_validator_1.IsOptional)(),
|
|
40
|
+
tslib_1.__metadata("design:type", String)
|
|
41
|
+
], ResetPasswordRequestDto.prototype, "tenantId", void 0);
|
|
42
|
+
//# sourceMappingURL=reset-password.request.dto.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"reset-password.request.dto.js","sourceRoot":"","sources":["../../../../../../../../packages/nest-auth/src/lib/auth/dto/requests/reset-password.request.dto.ts"],"names":[],"mappings":";;;;AAAA,6CAA8C;AAC9C,qDAA+G;AAE/G,MAAa,uBAAuB;CA2BnC;AA3BD,0DA2BC;AAtBG;IAJC,IAAA,qBAAW,EAAC,EAAE,WAAW,EAAE,oBAAoB,EAAE,QAAQ,EAAE,KAAK,EAAE,CAAC;IACnE,IAAA,4BAAU,EAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC;IACzB,IAAA,yBAAO,GAAE;IACT,IAAA,4BAAU,GAAE;;sDACE;AAMf;IAJC,IAAA,qBAAW,EAAC,EAAE,WAAW,EAAE,mBAAmB,EAAE,QAAQ,EAAE,KAAK,EAAE,CAAC;IAClE,IAAA,4BAAU,EAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC;IACzB,IAAA,+BAAa,GAAE;IACf,IAAA,4BAAU,GAAE;;sDACE;AAKf;IAHC,IAAA,qBAAW,EAAC,EAAE,WAAW,EAAE,mDAAmD,EAAE,CAAC;IACjF,IAAA,0BAAQ,GAAE;IACV,IAAA,4BAAU,GAAE;;oDACD;AAKZ;IAHC,IAAA,qBAAW,EAAC,EAAE,WAAW,EAAE,cAAc,EAAE,CAAC;IAC5C,IAAA,0BAAQ,GAAE;IACV,IAAA,4BAAU,GAAE;;4DACO;AAKpB;IAHC,IAAA,qBAAW,EAAC,EAAE,WAAW,EAAE,WAAW,EAAE,QAAQ,EAAE,KAAK,EAAE,CAAC;IAC1D,IAAA,wBAAM,GAAE;IACR,IAAA,4BAAU,GAAE;;yDACK"}
|
|
@@ -0,0 +1,16 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.SendMfaCodeRequestDto = void 0;
|
|
4
|
+
const tslib_1 = require("tslib");
|
|
5
|
+
const class_validator_1 = require("class-validator");
|
|
6
|
+
const core_1 = require("../../../core");
|
|
7
|
+
const swagger_1 = require("@nestjs/swagger");
|
|
8
|
+
class SendMfaCodeRequestDto {
|
|
9
|
+
}
|
|
10
|
+
exports.SendMfaCodeRequestDto = SendMfaCodeRequestDto;
|
|
11
|
+
tslib_1.__decorate([
|
|
12
|
+
(0, swagger_1.ApiProperty)({ enum: core_1.MFAMethodEnum }),
|
|
13
|
+
(0, class_validator_1.IsEnum)(core_1.MFAMethodEnum),
|
|
14
|
+
tslib_1.__metadata("design:type", String)
|
|
15
|
+
], SendMfaCodeRequestDto.prototype, "method", void 0);
|
|
16
|
+
//# sourceMappingURL=send-mfa-code.request.dto.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"send-mfa-code.request.dto.js","sourceRoot":"","sources":["../../../../../../../../packages/nest-auth/src/lib/auth/dto/requests/send-mfa-code.request.dto.ts"],"names":[],"mappings":";;;;AAAA,qDAAyC;AACzC,wCAA8C;AAC9C,6CAA8C;AAG9C,MAAa,qBAAqB;CAIjC;AAJD,sDAIC;AADG;IAFC,IAAA,qBAAW,EAAC,EAAE,IAAI,EAAE,oBAAa,EAAE,CAAC;IACpC,IAAA,wBAAM,EAAC,oBAAa,CAAC;;qDACA"}
|
|
@@ -0,0 +1,37 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.SignupRequestDto = void 0;
|
|
4
|
+
const tslib_1 = require("tslib");
|
|
5
|
+
const class_validator_1 = require("class-validator");
|
|
6
|
+
const swagger_1 = require("@nestjs/swagger");
|
|
7
|
+
class SignupRequestDto {
|
|
8
|
+
}
|
|
9
|
+
exports.SignupRequestDto = SignupRequestDto;
|
|
10
|
+
tslib_1.__decorate([
|
|
11
|
+
(0, swagger_1.ApiProperty)({ description: 'User email address', required: false }),
|
|
12
|
+
(0, class_validator_1.ValidateIf)(o => !o.phone),
|
|
13
|
+
(0, class_validator_1.IsEmail)(),
|
|
14
|
+
(0, class_validator_1.IsNotEmpty)(),
|
|
15
|
+
tslib_1.__metadata("design:type", String)
|
|
16
|
+
], SignupRequestDto.prototype, "email", void 0);
|
|
17
|
+
tslib_1.__decorate([
|
|
18
|
+
(0, swagger_1.ApiProperty)({ description: 'User phone number', required: false }),
|
|
19
|
+
(0, class_validator_1.ValidateIf)(o => !o.email),
|
|
20
|
+
(0, class_validator_1.IsPhoneNumber)(),
|
|
21
|
+
(0, class_validator_1.IsNotEmpty)(),
|
|
22
|
+
tslib_1.__metadata("design:type", String)
|
|
23
|
+
], SignupRequestDto.prototype, "phone", void 0);
|
|
24
|
+
tslib_1.__decorate([
|
|
25
|
+
(0, swagger_1.ApiProperty)({ description: 'User password (min 8 characters)' }),
|
|
26
|
+
(0, class_validator_1.IsString)(),
|
|
27
|
+
(0, class_validator_1.IsNotEmpty)(),
|
|
28
|
+
(0, class_validator_1.MinLength)(8),
|
|
29
|
+
tslib_1.__metadata("design:type", String)
|
|
30
|
+
], SignupRequestDto.prototype, "password", void 0);
|
|
31
|
+
tslib_1.__decorate([
|
|
32
|
+
(0, swagger_1.ApiPropertyOptional)({ description: 'Optional tenant ID for multi-tenant applications' }),
|
|
33
|
+
(0, class_validator_1.IsString)(),
|
|
34
|
+
(0, class_validator_1.IsOptional)(),
|
|
35
|
+
tslib_1.__metadata("design:type", String)
|
|
36
|
+
], SignupRequestDto.prototype, "tenantId", void 0);
|
|
37
|
+
//# sourceMappingURL=signup.request.dto.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"signup.request.dto.js","sourceRoot":"","sources":["../../../../../../../../packages/nest-auth/src/lib/auth/dto/requests/signup.request.dto.ts"],"names":[],"mappings":";;;;AAAA,qDAAkH;AAClH,6CAAmE;AAEnE,MAAa,gBAAgB;CAuB5B;AAvBD,4CAuBC;AAlBG;IAJC,IAAA,qBAAW,EAAC,EAAE,WAAW,EAAE,oBAAoB,EAAE,QAAQ,EAAE,KAAK,EAAE,CAAC;IACnE,IAAA,4BAAU,EAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC;IACzB,IAAA,yBAAO,GAAE;IACT,IAAA,4BAAU,GAAE;;+CACE;AAMf;IAJC,IAAA,qBAAW,EAAC,EAAE,WAAW,EAAE,mBAAmB,EAAE,QAAQ,EAAE,KAAK,EAAE,CAAC;IAClE,IAAA,4BAAU,EAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC;IACzB,IAAA,+BAAa,GAAE;IACf,IAAA,4BAAU,GAAE;;+CACE;AAMf;IAJC,IAAA,qBAAW,EAAC,EAAE,WAAW,EAAE,kCAAkC,EAAE,CAAC;IAChE,IAAA,0BAAQ,GAAE;IACV,IAAA,4BAAU,GAAE;IACZ,IAAA,2BAAS,EAAC,CAAC,CAAC;;kDACI;AAKjB;IAHC,IAAA,6BAAmB,EAAC,EAAE,WAAW,EAAE,kDAAkD,EAAE,CAAC;IACxF,IAAA,0BAAQ,GAAE;IACV,IAAA,4BAAU,GAAE;;kDACK"}
|
|
@@ -0,0 +1,16 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.SocialLoginRequestDto = void 0;
|
|
4
|
+
const tslib_1 = require("tslib");
|
|
5
|
+
const class_validator_1 = require("class-validator");
|
|
6
|
+
const swagger_1 = require("@nestjs/swagger");
|
|
7
|
+
class SocialLoginRequestDto {
|
|
8
|
+
}
|
|
9
|
+
exports.SocialLoginRequestDto = SocialLoginRequestDto;
|
|
10
|
+
tslib_1.__decorate([
|
|
11
|
+
(0, swagger_1.ApiProperty)({ description: 'Authentication token from social provider' }),
|
|
12
|
+
(0, class_validator_1.IsString)(),
|
|
13
|
+
(0, class_validator_1.IsNotEmpty)(),
|
|
14
|
+
tslib_1.__metadata("design:type", String)
|
|
15
|
+
], SocialLoginRequestDto.prototype, "token", void 0);
|
|
16
|
+
//# sourceMappingURL=social-login.request.dto.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"social-login.request.dto.js","sourceRoot":"","sources":["../../../../../../../../packages/nest-auth/src/lib/auth/dto/requests/social-login.request.dto.ts"],"names":[],"mappings":";;;;AAAA,qDAAuD;AACvD,6CAA8C;AAE9C,MAAa,qBAAqB;CAKjC;AALD,sDAKC;AADG;IAHC,IAAA,qBAAW,EAAC,EAAE,WAAW,EAAE,2CAA2C,EAAE,CAAC;IACzE,IAAA,0BAAQ,GAAE;IACV,IAAA,4BAAU,GAAE;;oDACC"}
|
|
@@ -0,0 +1,21 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.Verify2faRequestDto = void 0;
|
|
4
|
+
const tslib_1 = require("tslib");
|
|
5
|
+
const class_validator_1 = require("class-validator");
|
|
6
|
+
const core_1 = require("../../../core");
|
|
7
|
+
const swagger_1 = require("@nestjs/swagger");
|
|
8
|
+
class Verify2faRequestDto {
|
|
9
|
+
}
|
|
10
|
+
exports.Verify2faRequestDto = Verify2faRequestDto;
|
|
11
|
+
tslib_1.__decorate([
|
|
12
|
+
(0, swagger_1.ApiProperty)({ enum: core_1.MFAMethodEnum }),
|
|
13
|
+
(0, class_validator_1.IsEnum)(core_1.MFAMethodEnum),
|
|
14
|
+
tslib_1.__metadata("design:type", String)
|
|
15
|
+
], Verify2faRequestDto.prototype, "method", void 0);
|
|
16
|
+
tslib_1.__decorate([
|
|
17
|
+
(0, swagger_1.ApiProperty)({ description: 'The OTP to verify' }),
|
|
18
|
+
(0, class_validator_1.IsString)(),
|
|
19
|
+
tslib_1.__metadata("design:type", String)
|
|
20
|
+
], Verify2faRequestDto.prototype, "otp", void 0);
|
|
21
|
+
//# sourceMappingURL=verify-2fa.request.dto.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"verify-2fa.request.dto.js","sourceRoot":"","sources":["../../../../../../../../packages/nest-auth/src/lib/auth/dto/requests/verify-2fa.request.dto.ts"],"names":[],"mappings":";;;;AAAA,qDAAmD;AACnD,wCAA8C;AAC9C,6CAA8C;AAG9C,MAAa,mBAAmB;CAQ/B;AARD,kDAQC;AALG;IAFC,IAAA,qBAAW,EAAC,EAAE,IAAI,EAAE,oBAAa,EAAE,CAAC;IACpC,IAAA,wBAAM,EAAC,oBAAa,CAAC;;mDACA;AAItB;IAFC,IAAA,qBAAW,EAAC,EAAE,WAAW,EAAE,mBAAmB,EAAE,CAAC;IACjD,IAAA,0BAAQ,GAAE;;gDACC"}
|
|
@@ -0,0 +1,20 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.VerifyTotpSetupRequestDto = void 0;
|
|
4
|
+
const tslib_1 = require("tslib");
|
|
5
|
+
const swagger_1 = require("@nestjs/swagger");
|
|
6
|
+
const class_validator_1 = require("class-validator");
|
|
7
|
+
class VerifyTotpSetupRequestDto {
|
|
8
|
+
}
|
|
9
|
+
exports.VerifyTotpSetupRequestDto = VerifyTotpSetupRequestDto;
|
|
10
|
+
tslib_1.__decorate([
|
|
11
|
+
(0, swagger_1.ApiProperty)({ description: 'The OTP token to verify' }),
|
|
12
|
+
(0, class_validator_1.IsString)(),
|
|
13
|
+
tslib_1.__metadata("design:type", String)
|
|
14
|
+
], VerifyTotpSetupRequestDto.prototype, "otp", void 0);
|
|
15
|
+
tslib_1.__decorate([
|
|
16
|
+
(0, swagger_1.ApiProperty)({ description: 'Device secret to verify' }),
|
|
17
|
+
(0, class_validator_1.IsString)(),
|
|
18
|
+
tslib_1.__metadata("design:type", String)
|
|
19
|
+
], VerifyTotpSetupRequestDto.prototype, "secret", void 0);
|
|
20
|
+
//# sourceMappingURL=verify-totp-setup.request.dto.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"verify-totp-setup.request.dto.js","sourceRoot":"","sources":["../../../../../../../../packages/nest-auth/src/lib/auth/dto/requests/verify-totp-setup.request.dto.ts"],"names":[],"mappings":";;;;AAAA,6CAA8C;AAC9C,qDAA2C;AAE3C,MAAa,yBAAyB;CAQrC;AARD,8DAQC;AALG;IAFC,IAAA,qBAAW,EAAC,EAAE,WAAW,EAAE,yBAAyB,EAAE,CAAC;IACvD,IAAA,0BAAQ,GAAE;;sDACC;AAIZ;IAFC,IAAA,qBAAW,EAAC,EAAE,WAAW,EAAE,yBAAyB,EAAE,CAAC;IACvD,IAAA,0BAAQ,GAAE;;yDACI"}
|
|
@@ -0,0 +1,50 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.Verify2faResponseDto = exports.AuthResponseDto = exports.UserResponseDto = exports.AuthTokensResponseDto = void 0;
|
|
4
|
+
const tslib_1 = require("tslib");
|
|
5
|
+
const swagger_1 = require("@nestjs/swagger");
|
|
6
|
+
class AuthTokensResponseDto {
|
|
7
|
+
}
|
|
8
|
+
exports.AuthTokensResponseDto = AuthTokensResponseDto;
|
|
9
|
+
tslib_1.__decorate([
|
|
10
|
+
(0, swagger_1.ApiProperty)({ description: 'JWT access token' }),
|
|
11
|
+
tslib_1.__metadata("design:type", String)
|
|
12
|
+
], AuthTokensResponseDto.prototype, "accessToken", void 0);
|
|
13
|
+
tslib_1.__decorate([
|
|
14
|
+
(0, swagger_1.ApiProperty)({ description: 'JWT refresh token' }),
|
|
15
|
+
tslib_1.__metadata("design:type", String)
|
|
16
|
+
], AuthTokensResponseDto.prototype, "refreshToken", void 0);
|
|
17
|
+
class UserResponseDto {
|
|
18
|
+
}
|
|
19
|
+
exports.UserResponseDto = UserResponseDto;
|
|
20
|
+
tslib_1.__decorate([
|
|
21
|
+
(0, swagger_1.ApiProperty)({ description: 'User ID' }),
|
|
22
|
+
tslib_1.__metadata("design:type", String)
|
|
23
|
+
], UserResponseDto.prototype, "id", void 0);
|
|
24
|
+
tslib_1.__decorate([
|
|
25
|
+
(0, swagger_1.ApiProperty)({ description: 'User email' }),
|
|
26
|
+
tslib_1.__metadata("design:type", String)
|
|
27
|
+
], UserResponseDto.prototype, "email", void 0);
|
|
28
|
+
tslib_1.__decorate([
|
|
29
|
+
(0, swagger_1.ApiProperty)({ description: 'User phone number' }),
|
|
30
|
+
tslib_1.__metadata("design:type", String)
|
|
31
|
+
], UserResponseDto.prototype, "phone", void 0);
|
|
32
|
+
tslib_1.__decorate([
|
|
33
|
+
(0, swagger_1.ApiProperty)({ description: 'User verification status' }),
|
|
34
|
+
tslib_1.__metadata("design:type", Boolean)
|
|
35
|
+
], UserResponseDto.prototype, "isVerified", void 0);
|
|
36
|
+
tslib_1.__decorate([
|
|
37
|
+
(0, swagger_1.ApiProperty)({ description: 'User metadata' }),
|
|
38
|
+
tslib_1.__metadata("design:type", Object)
|
|
39
|
+
], UserResponseDto.prototype, "metadata", void 0);
|
|
40
|
+
class AuthResponseDto extends AuthTokensResponseDto {
|
|
41
|
+
}
|
|
42
|
+
exports.AuthResponseDto = AuthResponseDto;
|
|
43
|
+
tslib_1.__decorate([
|
|
44
|
+
(0, swagger_1.ApiProperty)({ description: 'Whether the user requires MFA' }),
|
|
45
|
+
tslib_1.__metadata("design:type", Boolean)
|
|
46
|
+
], AuthResponseDto.prototype, "isRequiresMfa", void 0);
|
|
47
|
+
class Verify2faResponseDto extends AuthTokensResponseDto {
|
|
48
|
+
}
|
|
49
|
+
exports.Verify2faResponseDto = Verify2faResponseDto;
|
|
50
|
+
//# sourceMappingURL=auth.response.dto.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"auth.response.dto.js","sourceRoot":"","sources":["../../../../../../../../packages/nest-auth/src/lib/auth/dto/responses/auth.response.dto.ts"],"names":[],"mappings":";;;;AAAA,6CAAmE;AAEnE,MAAa,qBAAqB;CAMjC;AAND,sDAMC;AAJG;IADC,IAAA,qBAAW,EAAC,EAAE,WAAW,EAAE,kBAAkB,EAAE,CAAC;;0DAC7B;AAGpB;IADC,IAAA,qBAAW,EAAC,EAAE,WAAW,EAAE,mBAAmB,EAAE,CAAC;;2DAC7B;AAGzB,MAAa,eAAe;CAe3B;AAfD,0CAeC;AAbG;IADC,IAAA,qBAAW,EAAC,EAAE,WAAW,EAAE,SAAS,EAAE,CAAC;;2CAC7B;AAGX;IADC,IAAA,qBAAW,EAAC,EAAE,WAAW,EAAE,YAAY,EAAE,CAAC;;8CAC7B;AAGd;IADC,IAAA,qBAAW,EAAC,EAAE,WAAW,EAAE,mBAAmB,EAAE,CAAC;;8CACpC;AAGd;IADC,IAAA,qBAAW,EAAC,EAAE,WAAW,EAAE,0BAA0B,EAAE,CAAC;;mDACrC;AAGpB;IADC,IAAA,qBAAW,EAAC,EAAE,WAAW,EAAE,eAAe,EAAE,CAAC;;iDACf;AAGnC,MAAa,eAAgB,SAAQ,qBAAqB;CAKzD;AALD,0CAKC;AAFG;IADC,IAAA,qBAAW,EAAC,EAAE,WAAW,EAAE,+BAA+B,EAAE,CAAC;;sDACvC;AAM3B,MAAa,oBAAqB,SAAQ,qBAAqB;CAE9D;AAFD,oDAEC"}
|
|
@@ -0,0 +1,50 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.MFASecret = void 0;
|
|
4
|
+
const tslib_1 = require("tslib");
|
|
5
|
+
const typeorm_1 = require("typeorm");
|
|
6
|
+
const user_entity_1 = require("../../user/entities/user.entity");
|
|
7
|
+
let MFASecret = class MFASecret {
|
|
8
|
+
};
|
|
9
|
+
exports.MFASecret = MFASecret;
|
|
10
|
+
tslib_1.__decorate([
|
|
11
|
+
(0, typeorm_1.PrimaryGeneratedColumn)('uuid'),
|
|
12
|
+
tslib_1.__metadata("design:type", String)
|
|
13
|
+
], MFASecret.prototype, "id", void 0);
|
|
14
|
+
tslib_1.__decorate([
|
|
15
|
+
(0, typeorm_1.Column)(),
|
|
16
|
+
tslib_1.__metadata("design:type", String)
|
|
17
|
+
], MFASecret.prototype, "userId", void 0);
|
|
18
|
+
tslib_1.__decorate([
|
|
19
|
+
(0, typeorm_1.ManyToOne)(() => user_entity_1.User, user => user.mfaSecrets, { onDelete: 'CASCADE' }),
|
|
20
|
+
(0, typeorm_1.JoinColumn)({ name: 'userId' }),
|
|
21
|
+
tslib_1.__metadata("design:type", user_entity_1.User)
|
|
22
|
+
], MFASecret.prototype, "user", void 0);
|
|
23
|
+
tslib_1.__decorate([
|
|
24
|
+
(0, typeorm_1.Column)(),
|
|
25
|
+
tslib_1.__metadata("design:type", String)
|
|
26
|
+
], MFASecret.prototype, "secret", void 0);
|
|
27
|
+
tslib_1.__decorate([
|
|
28
|
+
(0, typeorm_1.Column)({ default: false }),
|
|
29
|
+
tslib_1.__metadata("design:type", Boolean)
|
|
30
|
+
], MFASecret.prototype, "verified", void 0);
|
|
31
|
+
tslib_1.__decorate([
|
|
32
|
+
(0, typeorm_1.Column)({ nullable: true }),
|
|
33
|
+
tslib_1.__metadata("design:type", String)
|
|
34
|
+
], MFASecret.prototype, "deviceName", void 0);
|
|
35
|
+
tslib_1.__decorate([
|
|
36
|
+
(0, typeorm_1.Column)({ nullable: true }),
|
|
37
|
+
tslib_1.__metadata("design:type", Date)
|
|
38
|
+
], MFASecret.prototype, "lastUsedAt", void 0);
|
|
39
|
+
tslib_1.__decorate([
|
|
40
|
+
(0, typeorm_1.CreateDateColumn)(),
|
|
41
|
+
tslib_1.__metadata("design:type", Date)
|
|
42
|
+
], MFASecret.prototype, "createdAt", void 0);
|
|
43
|
+
tslib_1.__decorate([
|
|
44
|
+
(0, typeorm_1.UpdateDateColumn)(),
|
|
45
|
+
tslib_1.__metadata("design:type", Date)
|
|
46
|
+
], MFASecret.prototype, "updatedAt", void 0);
|
|
47
|
+
exports.MFASecret = MFASecret = tslib_1.__decorate([
|
|
48
|
+
(0, typeorm_1.Entity)('nest_auth_mfa_secrets')
|
|
49
|
+
], MFASecret);
|
|
50
|
+
//# sourceMappingURL=mfa-secret.entity.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"mfa-secret.entity.js","sourceRoot":"","sources":["../../../../../../../packages/nest-auth/src/lib/auth/entities/mfa-secret.entity.ts"],"names":[],"mappings":";;;;AAAA,qCAA4H;AAC5H,iEAAuD;AAGhD,IAAM,SAAS,GAAf,MAAM,SAAS;CA4BrB,CAAA;AA5BY,8BAAS;AAElB;IADC,IAAA,gCAAsB,EAAC,MAAM,CAAC;;qCACpB;AAGX;IADC,IAAA,gBAAM,GAAE;;yCACM;AAIf;IAFC,IAAA,mBAAS,EAAC,GAAG,EAAE,CAAC,kBAAI,EAAE,IAAI,CAAC,EAAE,CAAC,IAAI,CAAC,UAAU,EAAE,EAAE,QAAQ,EAAE,SAAS,EAAE,CAAC;IACvE,IAAA,oBAAU,EAAC,EAAE,IAAI,EAAE,QAAQ,EAAE,CAAC;sCACzB,kBAAI;uCAAC;AAGX;IADC,IAAA,gBAAM,GAAE;;yCACM;AAGf;IADC,IAAA,gBAAM,EAAC,EAAE,OAAO,EAAE,KAAK,EAAE,CAAC;;2CACT;AAGlB;IADC,IAAA,gBAAM,EAAC,EAAE,QAAQ,EAAE,IAAI,EAAE,CAAC;;6CACR;AAGnB;IADC,IAAA,gBAAM,EAAC,EAAE,QAAQ,EAAE,IAAI,EAAE,CAAC;sCACf,IAAI;6CAAC;AAGjB;IADC,IAAA,0BAAgB,GAAE;sCACR,IAAI;4CAAC;AAGhB;IADC,IAAA,0BAAgB,GAAE;sCACR,IAAI;4CAAC;oBA3BP,SAAS;IADrB,IAAA,gBAAM,EAAC,uBAAuB,CAAC;GACnB,SAAS,CA4BrB"}
|
|
@@ -0,0 +1,50 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.OTP = void 0;
|
|
4
|
+
const tslib_1 = require("tslib");
|
|
5
|
+
const typeorm_1 = require("typeorm");
|
|
6
|
+
const user_entity_1 = require("../../user/entities/user.entity");
|
|
7
|
+
const otp_interface_1 = require("../../core/interfaces/otp.interface");
|
|
8
|
+
let OTP = class OTP {
|
|
9
|
+
};
|
|
10
|
+
exports.OTP = OTP;
|
|
11
|
+
tslib_1.__decorate([
|
|
12
|
+
(0, typeorm_1.PrimaryGeneratedColumn)('uuid'),
|
|
13
|
+
tslib_1.__metadata("design:type", String)
|
|
14
|
+
], OTP.prototype, "id", void 0);
|
|
15
|
+
tslib_1.__decorate([
|
|
16
|
+
(0, typeorm_1.Column)(),
|
|
17
|
+
tslib_1.__metadata("design:type", String)
|
|
18
|
+
], OTP.prototype, "userId", void 0);
|
|
19
|
+
tslib_1.__decorate([
|
|
20
|
+
(0, typeorm_1.Column)(),
|
|
21
|
+
tslib_1.__metadata("design:type", String)
|
|
22
|
+
], OTP.prototype, "code", void 0);
|
|
23
|
+
tslib_1.__decorate([
|
|
24
|
+
(0, typeorm_1.Column)({ type: 'text' }),
|
|
25
|
+
tslib_1.__metadata("design:type", String)
|
|
26
|
+
], OTP.prototype, "type", void 0);
|
|
27
|
+
tslib_1.__decorate([
|
|
28
|
+
(0, typeorm_1.Column)(),
|
|
29
|
+
tslib_1.__metadata("design:type", Date)
|
|
30
|
+
], OTP.prototype, "expiresAt", void 0);
|
|
31
|
+
tslib_1.__decorate([
|
|
32
|
+
(0, typeorm_1.Column)({ default: false }),
|
|
33
|
+
tslib_1.__metadata("design:type", Boolean)
|
|
34
|
+
], OTP.prototype, "used", void 0);
|
|
35
|
+
tslib_1.__decorate([
|
|
36
|
+
(0, typeorm_1.CreateDateColumn)(),
|
|
37
|
+
tslib_1.__metadata("design:type", Date)
|
|
38
|
+
], OTP.prototype, "createdAt", void 0);
|
|
39
|
+
tslib_1.__decorate([
|
|
40
|
+
(0, typeorm_1.UpdateDateColumn)(),
|
|
41
|
+
tslib_1.__metadata("design:type", Date)
|
|
42
|
+
], OTP.prototype, "updatedAt", void 0);
|
|
43
|
+
tslib_1.__decorate([
|
|
44
|
+
(0, typeorm_1.ManyToOne)(() => user_entity_1.User, user => user.otps, { onDelete: 'CASCADE' }),
|
|
45
|
+
tslib_1.__metadata("design:type", user_entity_1.User)
|
|
46
|
+
], OTP.prototype, "user", void 0);
|
|
47
|
+
exports.OTP = OTP = tslib_1.__decorate([
|
|
48
|
+
(0, typeorm_1.Entity)('nest_auth_otps')
|
|
49
|
+
], OTP);
|
|
50
|
+
//# sourceMappingURL=otp.entity.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"otp.entity.js","sourceRoot":"","sources":["../../../../../../../packages/nest-auth/src/lib/auth/entities/otp.entity.ts"],"names":[],"mappings":";;;;AAAA,qCAAgH;AAChH,iEAAuD;AACvD,uEAAkE;AAG3D,IAAM,GAAG,GAAT,MAAM,GAAG;CA2Bf,CAAA;AA3BY,kBAAG;AAEZ;IADC,IAAA,gCAAsB,EAAC,MAAM,CAAC;;+BACpB;AAGX;IADC,IAAA,gBAAM,GAAE;;mCACM;AAGf;IADC,IAAA,gBAAM,GAAE;;iCACI;AAGb;IADC,IAAA,gBAAM,EAAC,EAAE,IAAI,EAAE,MAAM,EAAE,CAAC;;iCACP;AAGlB;IADC,IAAA,gBAAM,GAAE;sCACE,IAAI;sCAAC;AAGhB;IADC,IAAA,gBAAM,EAAC,EAAE,OAAO,EAAE,KAAK,EAAE,CAAC;;iCACb;AAGd;IADC,IAAA,0BAAgB,GAAE;sCACR,IAAI;sCAAC;AAGhB;IADC,IAAA,0BAAgB,GAAE;sCACR,IAAI;sCAAC;AAGhB;IADC,IAAA,mBAAS,EAAC,GAAG,EAAE,CAAC,kBAAI,EAAE,IAAI,CAAC,EAAE,CAAC,IAAI,CAAC,IAAI,EAAE,EAAE,QAAQ,EAAE,SAAS,EAAE,CAAC;sCAC5D,kBAAI;iCAAC;cA1BF,GAAG;IADf,IAAA,gBAAM,EAAC,gBAAgB,CAAC;GACZ,GAAG,CA2Bf"}
|
|
@@ -0,0 +1,10 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.LoggedOutAllEvent = void 0;
|
|
4
|
+
class LoggedOutAllEvent {
|
|
5
|
+
constructor(payload) {
|
|
6
|
+
this.payload = payload;
|
|
7
|
+
}
|
|
8
|
+
}
|
|
9
|
+
exports.LoggedOutAllEvent = LoggedOutAllEvent;
|
|
10
|
+
//# sourceMappingURL=logged-out-all.event.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"logged-out-all.event.js","sourceRoot":"","sources":["../../../../../../../packages/nest-auth/src/lib/auth/events/logged-out-all.event.ts"],"names":[],"mappings":";;;AAaA,MAAa,iBAAiB;IAC1B,YACoB,OAAiC;QAAjC,YAAO,GAAP,OAAO,CAA0B;IACjD,CAAC;CACR;AAJD,8CAIC"}
|
|
@@ -0,0 +1,10 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.LoggedOutEvent = void 0;
|
|
4
|
+
class LoggedOutEvent {
|
|
5
|
+
constructor(payload) {
|
|
6
|
+
this.payload = payload;
|
|
7
|
+
}
|
|
8
|
+
}
|
|
9
|
+
exports.LoggedOutEvent = LoggedOutEvent;
|
|
10
|
+
//# sourceMappingURL=logged-out.event.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"logged-out.event.js","sourceRoot":"","sources":["../../../../../../../packages/nest-auth/src/lib/auth/events/logged-out.event.ts"],"names":[],"mappings":";;;AAUA,MAAa,cAAc;IACvB,YACoB,OAA8B;QAA9B,YAAO,GAAP,OAAO,CAAuB;IAC9C,CAAC;CACR;AAJD,wCAIC"}
|
|
@@ -0,0 +1,10 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.PasswordResetRequestedEvent = void 0;
|
|
4
|
+
class PasswordResetRequestedEvent {
|
|
5
|
+
constructor(payload) {
|
|
6
|
+
this.payload = payload;
|
|
7
|
+
}
|
|
8
|
+
}
|
|
9
|
+
exports.PasswordResetRequestedEvent = PasswordResetRequestedEvent;
|
|
10
|
+
//# sourceMappingURL=password-reset-requested.event.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"password-reset-requested.event.js","sourceRoot":"","sources":["../../../../../../../packages/nest-auth/src/lib/auth/events/password-reset-requested.event.ts"],"names":[],"mappings":";;;AAaA,MAAa,2BAA2B;IACpC,YACoB,OAA2C;QAA3C,YAAO,GAAP,OAAO,CAAoC;IAC3D,CAAC;CACR;AAJD,kEAIC"}
|
|
@@ -0,0 +1,10 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.PasswordResetEvent = void 0;
|
|
4
|
+
class PasswordResetEvent {
|
|
5
|
+
constructor(payload) {
|
|
6
|
+
this.payload = payload;
|
|
7
|
+
}
|
|
8
|
+
}
|
|
9
|
+
exports.PasswordResetEvent = PasswordResetEvent;
|
|
10
|
+
//# sourceMappingURL=password-reset.event.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"password-reset.event.js","sourceRoot":"","sources":["../../../../../../../packages/nest-auth/src/lib/auth/events/password-reset.event.ts"],"names":[],"mappings":";;;AASA,MAAa,kBAAkB;IAC3B,YACoB,OAAkC;QAAlC,YAAO,GAAP,OAAO,CAA2B;IAClD,CAAC;CACR;AAJD,gDAIC"}
|
|
@@ -0,0 +1,10 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.User2faVerifiedEvent = void 0;
|
|
4
|
+
class User2faVerifiedEvent {
|
|
5
|
+
constructor(payload) {
|
|
6
|
+
this.payload = payload;
|
|
7
|
+
}
|
|
8
|
+
}
|
|
9
|
+
exports.User2faVerifiedEvent = User2faVerifiedEvent;
|
|
10
|
+
//# sourceMappingURL=user-2fa-verified.event.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"user-2fa-verified.event.js","sourceRoot":"","sources":["../../../../../../../packages/nest-auth/src/lib/auth/events/user-2fa-verified.event.ts"],"names":[],"mappings":";;;AAaA,MAAa,oBAAoB;IAC7B,YACoB,OAAoC;QAApC,YAAO,GAAP,OAAO,CAA6B;IACpD,CAAC;CACR;AAJD,oDAIC"}
|
|
@@ -0,0 +1,10 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.UserLoggedInEvent = void 0;
|
|
4
|
+
class UserLoggedInEvent {
|
|
5
|
+
constructor(payload) {
|
|
6
|
+
this.payload = payload;
|
|
7
|
+
}
|
|
8
|
+
}
|
|
9
|
+
exports.UserLoggedInEvent = UserLoggedInEvent;
|
|
10
|
+
//# sourceMappingURL=user-logged-in.event.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"user-logged-in.event.js","sourceRoot":"","sources":["../../../../../../../packages/nest-auth/src/lib/auth/events/user-logged-in.event.ts"],"names":[],"mappings":";;;AAiBA,MAAa,iBAAiB;IAC1B,YACoB,OAAiC;QAAjC,YAAO,GAAP,OAAO,CAA0B;IACjD,CAAC;CACR;AAJD,8CAIC"}
|
|
@@ -0,0 +1,10 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.UserRefreshTokenEvent = void 0;
|
|
4
|
+
class UserRefreshTokenEvent {
|
|
5
|
+
constructor(payload) {
|
|
6
|
+
this.payload = payload;
|
|
7
|
+
}
|
|
8
|
+
}
|
|
9
|
+
exports.UserRefreshTokenEvent = UserRefreshTokenEvent;
|
|
10
|
+
//# sourceMappingURL=user-refresh-token.event.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"user-refresh-token.event.js","sourceRoot":"","sources":["../../../../../../../packages/nest-auth/src/lib/auth/events/user-refresh-token.event.ts"],"names":[],"mappings":";;;AASA,MAAa,qBAAqB;IAC9B,YACoB,OAAqC;QAArC,YAAO,GAAP,OAAO,CAA8B;IACrD,CAAC;CACR;AAJD,sDAIC"}
|
|
@@ -0,0 +1,20 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
const tslib_1 = require("tslib");
|
|
4
|
+
tslib_1.__exportStar(require("./auth.module"), exports);
|
|
5
|
+
tslib_1.__exportStar(require("./services/auth.service"), exports);
|
|
6
|
+
tslib_1.__exportStar(require("./services/cookie.service"), exports);
|
|
7
|
+
tslib_1.__exportStar(require("./services/mfa.service"), exports);
|
|
8
|
+
tslib_1.__exportStar(require("./controllers/auth.controller"), exports);
|
|
9
|
+
tslib_1.__exportStar(require("./controllers/mfa.controller"), exports);
|
|
10
|
+
tslib_1.__exportStar(require("./dto/requests/login.request.dto"), exports);
|
|
11
|
+
tslib_1.__exportStar(require("./dto/requests/signup.request.dto"), exports);
|
|
12
|
+
tslib_1.__exportStar(require("./dto/requests/social-login.request.dto"), exports);
|
|
13
|
+
tslib_1.__exportStar(require("./dto/requests/forgot-password.request.dto"), exports);
|
|
14
|
+
tslib_1.__exportStar(require("./dto/requests/reset-password.request.dto"), exports);
|
|
15
|
+
tslib_1.__exportStar(require("./dto/requests/send-mfa-code.request.dto"), exports);
|
|
16
|
+
tslib_1.__exportStar(require("./dto/requests/refresh-token.request.dto"), exports);
|
|
17
|
+
tslib_1.__exportStar(require("./dto/requests/verify-2fa.request.dto"), exports);
|
|
18
|
+
tslib_1.__exportStar(require("./dto/requests/verify-totp-setup.request.dto"), exports);
|
|
19
|
+
tslib_1.__exportStar(require("./dto/responses/auth.response.dto"), exports);
|
|
20
|
+
//# sourceMappingURL=index.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../../../../../packages/nest-auth/src/lib/auth/index.ts"],"names":[],"mappings":";;;AAAA,wDAA8B;AAG9B,kEAAwC;AACxC,oEAA0C;AAC1C,iEAAuC;AAGvC,wEAA8C;AAC9C,uEAA6C;AAO7C,2EAAiD;AACjD,4EAAkD;AAClD,kFAAwD;AACxD,qFAA2D;AAC3D,oFAA0D;AAC1D,mFAAyD;AACzD,mFAAyD;AACzD,gFAAsD;AACtD,uFAA6D;AAC7D,4EAAkD"}
|