@anarchitects/auth-nest 0.0.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +88 -0
- package/package.json +60 -0
- package/src/application/application.module-definition.d.ts +25 -0
- package/src/application/application.module-definition.js +13 -0
- package/src/application/application.module-definition.js.map +1 -0
- package/src/application/application.module.d.ts +27 -0
- package/src/application/application.module.js +73 -0
- package/src/application/application.module.js.map +1 -0
- package/src/application/factories/ability.factory.d.ts +6 -0
- package/src/application/factories/ability.factory.js +34 -0
- package/src/application/factories/ability.factory.js.map +1 -0
- package/src/application/index.d.ts +8 -0
- package/src/application/index.js +12 -0
- package/src/application/index.js.map +1 -0
- package/src/application/services/auth.service.d.ts +32 -0
- package/src/application/services/auth.service.js +12 -0
- package/src/application/services/auth.service.js.map +1 -0
- package/src/application/services/bcrypt-hash.service.d.ts +5 -0
- package/src/application/services/bcrypt-hash.service.js +20 -0
- package/src/application/services/bcrypt-hash.service.js.map +1 -0
- package/src/application/services/hash.service.d.ts +4 -0
- package/src/application/services/hash.service.js +12 -0
- package/src/application/services/hash.service.js.map +1 -0
- package/src/application/services/jwt-auth.service.d.ts +41 -0
- package/src/application/services/jwt-auth.service.js +220 -0
- package/src/application/services/jwt-auth.service.js.map +1 -0
- package/src/application/services/policies.service.d.ts +10 -0
- package/src/application/services/policies.service.js +42 -0
- package/src/application/services/policies.service.js.map +1 -0
- package/src/application/strategies/jwt/strategy.d.ts +16 -0
- package/src/application/strategies/jwt/strategy.js +25 -0
- package/src/application/strategies/jwt/strategy.js.map +1 -0
- package/src/config/auth.config.d.ts +18 -0
- package/src/config/auth.config.js +17 -0
- package/src/config/auth.config.js.map +1 -0
- package/src/config/index.d.ts +1 -0
- package/src/config/index.js +5 -0
- package/src/config/index.js.map +1 -0
- package/src/index.d.ts +5 -0
- package/src/index.js +9 -0
- package/src/index.js.map +1 -0
- package/src/infrastructure-mailer/adapters/mailer.adapter.d.ts +4 -0
- package/src/infrastructure-mailer/adapters/mailer.adapter.js +7 -0
- package/src/infrastructure-mailer/adapters/mailer.adapter.js.map +1 -0
- package/src/infrastructure-mailer/adapters/node-mailer.adapter.d.ts +8 -0
- package/src/infrastructure-mailer/adapters/node-mailer.adapter.js +23 -0
- package/src/infrastructure-mailer/adapters/node-mailer.adapter.js.map +1 -0
- package/src/infrastructure-mailer/index.d.ts +3 -0
- package/src/infrastructure-mailer/index.js +7 -0
- package/src/infrastructure-mailer/index.js.map +1 -0
- package/src/infrastructure-mailer/mailer.module.d.ts +2 -0
- package/src/infrastructure-mailer/mailer.module.js +23 -0
- package/src/infrastructure-mailer/mailer.module.js.map +1 -0
- package/src/infrastructure-persistence/entities/invalidated-token.entity.d.ts +7 -0
- package/src/infrastructure-persistence/entities/invalidated-token.entity.js +42 -0
- package/src/infrastructure-persistence/entities/invalidated-token.entity.js.map +1 -0
- package/src/infrastructure-persistence/entities/permission.entity.d.ts +17 -0
- package/src/infrastructure-persistence/entities/permission.entity.js +76 -0
- package/src/infrastructure-persistence/entities/permission.entity.js.map +1 -0
- package/src/infrastructure-persistence/entities/role.entity.d.ts +12 -0
- package/src/infrastructure-persistence/entities/role.entity.js +69 -0
- package/src/infrastructure-persistence/entities/role.entity.js.map +1 -0
- package/src/infrastructure-persistence/entities/user.entity.d.ts +14 -0
- package/src/infrastructure-persistence/entities/user.entity.js +77 -0
- package/src/infrastructure-persistence/entities/user.entity.js.map +1 -0
- package/src/infrastructure-persistence/index.d.ts +2 -0
- package/src/infrastructure-persistence/index.js +6 -0
- package/src/infrastructure-persistence/index.js.map +1 -0
- package/src/infrastructure-persistence/migrations/1720200000000-create-invalidated-tokens-cache.table.d.ts +6 -0
- package/src/infrastructure-persistence/migrations/1720200000000-create-invalidated-tokens-cache.table.js +29 -0
- package/src/infrastructure-persistence/migrations/1720200000000-create-invalidated-tokens-cache.table.js.map +1 -0
- package/src/infrastructure-persistence/persistence.module-definition.d.ts +13 -0
- package/src/infrastructure-persistence/persistence.module-definition.js +13 -0
- package/src/infrastructure-persistence/persistence.module-definition.js.map +1 -0
- package/src/infrastructure-persistence/persistence.module.d.ts +7 -0
- package/src/infrastructure-persistence/persistence.module.js +52 -0
- package/src/infrastructure-persistence/persistence.module.js.map +1 -0
- package/src/infrastructure-persistence/repositories/auth-user.repository.d.ts +10 -0
- package/src/infrastructure-persistence/repositories/auth-user.repository.js +12 -0
- package/src/infrastructure-persistence/repositories/auth-user.repository.js.map +1 -0
- package/src/infrastructure-persistence/repositories/typeorm-auth-user.repository.d.ts +17 -0
- package/src/infrastructure-persistence/repositories/typeorm-auth-user.repository.js +62 -0
- package/src/infrastructure-persistence/repositories/typeorm-auth-user.repository.js.map +1 -0
- package/src/infrastructure-persistence/schema.d.ts +1 -0
- package/src/infrastructure-persistence/schema.js +5 -0
- package/src/infrastructure-persistence/schema.js.map +1 -0
- package/src/presentation/controllers/auth.controller.d.ts +39 -0
- package/src/presentation/controllers/auth.controller.js +198 -0
- package/src/presentation/controllers/auth.controller.js.map +1 -0
- package/src/presentation/decorators/policies.decorator.d.ts +3 -0
- package/src/presentation/decorators/policies.decorator.js +8 -0
- package/src/presentation/decorators/policies.decorator.js.map +1 -0
- package/src/presentation/guards/policies.guard.d.ts +9 -0
- package/src/presentation/guards/policies.guard.js +38 -0
- package/src/presentation/guards/policies.guard.js.map +1 -0
- package/src/presentation/index.d.ts +4 -0
- package/src/presentation/index.js +8 -0
- package/src/presentation/index.js.map +1 -0
- package/src/presentation/presentation.module.d.ts +2 -0
- package/src/presentation/presentation.module.js +15 -0
- package/src/presentation/presentation.module.js.map +1 -0
|
@@ -0,0 +1,220 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.JwtAuthService = void 0;
|
|
4
|
+
const tslib_1 = require("tslib");
|
|
5
|
+
const common_1 = require("@nestjs/common");
|
|
6
|
+
const jwt_1 = require("@nestjs/jwt");
|
|
7
|
+
const auth_user_repository_1 = require("../../infrastructure-persistence/repositories/auth-user.repository");
|
|
8
|
+
const hash_service_1 = require("./hash.service");
|
|
9
|
+
let JwtAuthService = class JwtAuthService {
|
|
10
|
+
constructor(hashService, authUserRepository, jwtService) {
|
|
11
|
+
this.hashService = hashService;
|
|
12
|
+
this.authUserRepository = authUserRepository;
|
|
13
|
+
this.jwtService = jwtService;
|
|
14
|
+
}
|
|
15
|
+
async registerUser(dto) {
|
|
16
|
+
if (dto.password !== dto.confirmPassword) {
|
|
17
|
+
throw new common_1.BadRequestException('Passwords do not match');
|
|
18
|
+
}
|
|
19
|
+
const passwordHash = await this.hashService.hash(dto.password);
|
|
20
|
+
const token = crypto.randomUUID();
|
|
21
|
+
const { userName, email } = dto;
|
|
22
|
+
const user = {
|
|
23
|
+
email,
|
|
24
|
+
passwordHash,
|
|
25
|
+
isActive: false,
|
|
26
|
+
userName,
|
|
27
|
+
token,
|
|
28
|
+
roles: [
|
|
29
|
+
{
|
|
30
|
+
name: 'user',
|
|
31
|
+
},
|
|
32
|
+
],
|
|
33
|
+
};
|
|
34
|
+
await this.authUserRepository.create(user);
|
|
35
|
+
return { success: true };
|
|
36
|
+
}
|
|
37
|
+
async activateUser(dto) {
|
|
38
|
+
const { token } = dto;
|
|
39
|
+
const user = await this.authUserRepository.findOne(token);
|
|
40
|
+
await this.authUserRepository.update({
|
|
41
|
+
...user,
|
|
42
|
+
isActive: true,
|
|
43
|
+
token: null,
|
|
44
|
+
});
|
|
45
|
+
return { success: true };
|
|
46
|
+
}
|
|
47
|
+
async login(dto) {
|
|
48
|
+
const { credential, password } = dto;
|
|
49
|
+
const user = await this.authUserRepository.findOne({
|
|
50
|
+
where: [{ email: credential }, { userName: credential }],
|
|
51
|
+
});
|
|
52
|
+
if (!user) {
|
|
53
|
+
throw new common_1.BadRequestException('Invalid credentials');
|
|
54
|
+
}
|
|
55
|
+
const isPasswordValid = await this.hashService.compare(password, user.passwordHash);
|
|
56
|
+
if (!isPasswordValid) {
|
|
57
|
+
throw new common_1.BadRequestException('Invalid credentials');
|
|
58
|
+
}
|
|
59
|
+
return this.generateTokens(user);
|
|
60
|
+
}
|
|
61
|
+
async logout(dto) {
|
|
62
|
+
const { accessToken, refreshToken } = dto;
|
|
63
|
+
if (!refreshToken) {
|
|
64
|
+
throw new common_1.BadRequestException('Refresh token is required');
|
|
65
|
+
}
|
|
66
|
+
const payload = await this.jwtService
|
|
67
|
+
.verifyAsync(refreshToken)
|
|
68
|
+
.catch(() => {
|
|
69
|
+
throw new common_1.BadRequestException('Invalid refresh token');
|
|
70
|
+
});
|
|
71
|
+
if (!payload?.sub) {
|
|
72
|
+
throw new common_1.BadRequestException('Invalid refresh token');
|
|
73
|
+
}
|
|
74
|
+
const user = await this.authUserRepository.findOne({
|
|
75
|
+
where: { id: payload.sub },
|
|
76
|
+
});
|
|
77
|
+
if (!user?.id) {
|
|
78
|
+
throw new common_1.BadRequestException('Invalid refresh token');
|
|
79
|
+
}
|
|
80
|
+
const tokenHashes = await Promise.all([accessToken, refreshToken]
|
|
81
|
+
.filter((token) => Boolean(token))
|
|
82
|
+
.map((token) => this.hashService.hash(token)));
|
|
83
|
+
await this.authUserRepository.invalidateTokens(tokenHashes, user.id);
|
|
84
|
+
return { success: true };
|
|
85
|
+
}
|
|
86
|
+
async changePassword(userId, dto) {
|
|
87
|
+
const { currentPassword, newPassword, confirmPassword } = dto;
|
|
88
|
+
if (newPassword !== confirmPassword) {
|
|
89
|
+
throw new common_1.BadRequestException('Passwords do not match');
|
|
90
|
+
}
|
|
91
|
+
const user = await this.authUserRepository.findOne({
|
|
92
|
+
where: { id: userId },
|
|
93
|
+
});
|
|
94
|
+
if (!user) {
|
|
95
|
+
throw new common_1.BadRequestException('User not found');
|
|
96
|
+
}
|
|
97
|
+
const isCurrentPasswordValid = await this.hashService.compare(currentPassword, user.passwordHash);
|
|
98
|
+
if (!isCurrentPasswordValid) {
|
|
99
|
+
throw new common_1.BadRequestException('Invalid current password');
|
|
100
|
+
}
|
|
101
|
+
user.passwordHash = await this.hashService.hash(newPassword);
|
|
102
|
+
await this.authUserRepository.update(user);
|
|
103
|
+
return { success: true };
|
|
104
|
+
}
|
|
105
|
+
async forgotPassword(dto) {
|
|
106
|
+
const { email } = dto;
|
|
107
|
+
const user = await this.authUserRepository.findOne({ where: { email } });
|
|
108
|
+
if (!user) {
|
|
109
|
+
throw new common_1.BadRequestException('User not found');
|
|
110
|
+
}
|
|
111
|
+
const token = crypto.randomUUID();
|
|
112
|
+
user.token = token;
|
|
113
|
+
await this.authUserRepository.update(user);
|
|
114
|
+
// Here you would typically send the token to the user's email
|
|
115
|
+
return { success: true };
|
|
116
|
+
}
|
|
117
|
+
async resetPassword(dto) {
|
|
118
|
+
const { token, password, confirmPassword } = dto;
|
|
119
|
+
if (password !== confirmPassword) {
|
|
120
|
+
throw new common_1.BadRequestException('Passwords do not match');
|
|
121
|
+
}
|
|
122
|
+
const user = await this.authUserRepository.findOne({ where: { token } });
|
|
123
|
+
if (!user) {
|
|
124
|
+
throw new common_1.BadRequestException('Invalid token');
|
|
125
|
+
}
|
|
126
|
+
user.passwordHash = await this.hashService.hash(password);
|
|
127
|
+
user.token = null;
|
|
128
|
+
await this.authUserRepository.update(user);
|
|
129
|
+
return { success: true };
|
|
130
|
+
}
|
|
131
|
+
async verifyEmail(dto) {
|
|
132
|
+
const { token } = dto;
|
|
133
|
+
const user = await this.authUserRepository.findOne({ where: { token } });
|
|
134
|
+
if (!user) {
|
|
135
|
+
throw new common_1.BadRequestException('Invalid token');
|
|
136
|
+
}
|
|
137
|
+
user.isActive = true;
|
|
138
|
+
user.token = null;
|
|
139
|
+
await this.authUserRepository.update(user);
|
|
140
|
+
return { success: true };
|
|
141
|
+
}
|
|
142
|
+
async updateEmail(userId, dto) {
|
|
143
|
+
const { newEmail, password } = dto;
|
|
144
|
+
const user = await this.authUserRepository.findOne({
|
|
145
|
+
where: { id: userId },
|
|
146
|
+
});
|
|
147
|
+
if (!user) {
|
|
148
|
+
throw new common_1.BadRequestException('User not found');
|
|
149
|
+
}
|
|
150
|
+
const isPasswordValid = password && (await this.hashService.compare(password, user.passwordHash));
|
|
151
|
+
if (!isPasswordValid) {
|
|
152
|
+
throw new common_1.BadRequestException('Invalid password');
|
|
153
|
+
}
|
|
154
|
+
user.email = newEmail;
|
|
155
|
+
await this.authUserRepository.update(user);
|
|
156
|
+
return { success: true };
|
|
157
|
+
}
|
|
158
|
+
async refreshTokens(userId, dto) {
|
|
159
|
+
const { refreshToken } = dto;
|
|
160
|
+
const payload = await this.jwtService
|
|
161
|
+
.verifyAsync(refreshToken)
|
|
162
|
+
.catch(() => {
|
|
163
|
+
throw new common_1.BadRequestException('Invalid refresh token');
|
|
164
|
+
});
|
|
165
|
+
if (!payload?.sub || payload.sub !== userId) {
|
|
166
|
+
throw new common_1.BadRequestException('Invalid refresh token');
|
|
167
|
+
}
|
|
168
|
+
const user = await this.authUserRepository.findOne({
|
|
169
|
+
where: { id: userId },
|
|
170
|
+
});
|
|
171
|
+
if (!user) {
|
|
172
|
+
throw new common_1.BadRequestException('User not found');
|
|
173
|
+
}
|
|
174
|
+
const isTokenInvalidated = await this.authUserRepository.isTokenInvalidated(await this.hashService.hash(refreshToken));
|
|
175
|
+
if (isTokenInvalidated) {
|
|
176
|
+
throw new common_1.BadRequestException('Refresh token has been invalidated');
|
|
177
|
+
}
|
|
178
|
+
return this.generateTokens(user);
|
|
179
|
+
}
|
|
180
|
+
async getLoggedInUserInfo(userId) {
|
|
181
|
+
const user = await this.authUserRepository.findOne({
|
|
182
|
+
where: { id: userId },
|
|
183
|
+
relations: ['roles', 'permissions'],
|
|
184
|
+
});
|
|
185
|
+
if (!user) {
|
|
186
|
+
throw new common_1.BadRequestException('User not found');
|
|
187
|
+
}
|
|
188
|
+
const rbac = [];
|
|
189
|
+
user.roles?.forEach((role) => {
|
|
190
|
+
role.permissions?.forEach((permission) => {
|
|
191
|
+
rbac.push({
|
|
192
|
+
action: permission.action,
|
|
193
|
+
subject: permission.subject,
|
|
194
|
+
conditions: permission.conditions ?? undefined,
|
|
195
|
+
fields: permission.fields ?? undefined,
|
|
196
|
+
reason: permission.reason ?? undefined,
|
|
197
|
+
inverted: permission.inverted ?? false,
|
|
198
|
+
});
|
|
199
|
+
});
|
|
200
|
+
});
|
|
201
|
+
return { user, rbac };
|
|
202
|
+
}
|
|
203
|
+
async generateTokens(user) {
|
|
204
|
+
const payload = {
|
|
205
|
+
sub: user.id,
|
|
206
|
+
roles: user.roles?.map((role) => role.name),
|
|
207
|
+
};
|
|
208
|
+
const accessToken = await this.jwtService.signAsync(payload);
|
|
209
|
+
const refreshToken = await this.jwtService.signAsync(payload);
|
|
210
|
+
return { accessToken, refreshToken };
|
|
211
|
+
}
|
|
212
|
+
};
|
|
213
|
+
exports.JwtAuthService = JwtAuthService;
|
|
214
|
+
exports.JwtAuthService = JwtAuthService = tslib_1.__decorate([
|
|
215
|
+
(0, common_1.Injectable)(),
|
|
216
|
+
tslib_1.__metadata("design:paramtypes", [hash_service_1.HashService,
|
|
217
|
+
auth_user_repository_1.AuthUserRepository,
|
|
218
|
+
jwt_1.JwtService])
|
|
219
|
+
], JwtAuthService);
|
|
220
|
+
//# sourceMappingURL=jwt-auth.service.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"jwt-auth.service.js","sourceRoot":"","sources":["../../../../../../../libs/auth/nest/src/application/services/jwt-auth.service.ts"],"names":[],"mappings":";;;;AAeA,2CAAiE;AACjE,qCAAyC;AACzC,6GAAwG;AAExG,iDAA6C;AAGtC,IAAM,cAAc,GAApB,MAAM,cAAc;IACzB,YACmB,WAAwB,EACxB,kBAAsC,EACtC,UAAsB;QAFtB,gBAAW,GAAX,WAAW,CAAa;QACxB,uBAAkB,GAAlB,kBAAkB,CAAoB;QACtC,eAAU,GAAV,UAAU,CAAY;IACtC,CAAC;IAEJ,KAAK,CAAC,YAAY,CAAC,GAAuB;QACxC,IAAI,GAAG,CAAC,QAAQ,KAAK,GAAG,CAAC,eAAe,EAAE,CAAC;YACzC,MAAM,IAAI,4BAAmB,CAAC,wBAAwB,CAAC,CAAC;QAC1D,CAAC;QACD,MAAM,YAAY,GAAG,MAAM,IAAI,CAAC,WAAW,CAAC,IAAI,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;QAC/D,MAAM,KAAK,GAAG,MAAM,CAAC,UAAU,EAAE,CAAC;QAClC,MAAM,EAAE,QAAQ,EAAE,KAAK,EAAE,GAAG,GAAG,CAAC;QAChC,MAAM,IAAI,GAAkB;YAC1B,KAAK;YACL,YAAY;YACZ,QAAQ,EAAE,KAAK;YACf,QAAQ;YACR,KAAK;YACL,KAAK,EAAE;gBACL;oBACE,IAAI,EAAE,MAAM;iBACL;aACV;SACF,CAAC;QACF,MAAM,IAAI,CAAC,kBAAkB,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC;QAC3C,OAAO,EAAE,OAAO,EAAE,IAAI,EAAE,CAAC;IAC3B,CAAC;IAED,KAAK,CAAC,YAAY,CAChB,GAA2B;QAE3B,MAAM,EAAE,KAAK,EAAE,GAAG,GAAG,CAAC;QACtB,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,kBAAkB,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC;QAC1D,MAAM,IAAI,CAAC,kBAAkB,CAAC,MAAM,CAAC;YACnC,GAAG,IAAI;YACP,QAAQ,EAAE,IAAI;YACd,KAAK,EAAE,IAAI;SACZ,CAAC,CAAC;QACH,OAAO,EAAE,OAAO,EAAE,IAAI,EAAE,CAAC;IAC3B,CAAC;IAED,KAAK,CAAC,KAAK,CAAC,GAAoB;QAC9B,MAAM,EAAE,UAAU,EAAE,QAAQ,EAAE,GAAG,GAAG,CAAC;QACrC,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,kBAAkB,CAAC,OAAO,CAAC;YACjD,KAAK,EAAE,CAAC,EAAE,KAAK,EAAE,UAAU,EAAE,EAAE,EAAE,QAAQ,EAAE,UAAU,EAAE,CAAC;SACzD,CAAC,CAAC;QACH,IAAI,CAAC,IAAI,EAAE,CAAC;YACV,MAAM,IAAI,4BAAmB,CAAC,qBAAqB,CAAC,CAAC;QACvD,CAAC;QACD,MAAM,eAAe,GAAG,MAAM,IAAI,CAAC,WAAW,CAAC,OAAO,CACpD,QAAQ,EACR,IAAI,CAAC,YAAY,CAClB,CAAC;QACF,IAAI,CAAC,eAAe,EAAE,CAAC;YACrB,MAAM,IAAI,4BAAmB,CAAC,qBAAqB,CAAC,CAAC;QACvD,CAAC;QACD,OAAO,IAAI,CAAC,cAAc,CAAC,IAAI,CAAC,CAAC;IACnC,CAAC;IAED,KAAK,CAAC,MAAM,CAAC,GAAqB;QAChC,MAAM,EAAE,WAAW,EAAE,YAAY,EAAE,GAAG,GAAG,CAAC;QAE1C,IAAI,CAAC,YAAY,EAAE,CAAC;YAClB,MAAM,IAAI,4BAAmB,CAAC,2BAA2B,CAAC,CAAC;QAC7D,CAAC;QAED,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,UAAU;aAClC,WAAW,CAAC,YAAY,CAAC;aACzB,KAAK,CAAC,GAAG,EAAE;YACV,MAAM,IAAI,4BAAmB,CAAC,uBAAuB,CAAC,CAAC;QACzD,CAAC,CAAC,CAAC;QAEL,IAAI,CAAC,OAAO,EAAE,GAAG,EAAE,CAAC;YAClB,MAAM,IAAI,4BAAmB,CAAC,uBAAuB,CAAC,CAAC;QACzD,CAAC;QAED,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,kBAAkB,CAAC,OAAO,CAAC;YACjD,KAAK,EAAE,EAAE,EAAE,EAAE,OAAO,CAAC,GAAG,EAAE;SAC3B,CAAC,CAAC;QAEH,IAAI,CAAC,IAAI,EAAE,EAAE,EAAE,CAAC;YACd,MAAM,IAAI,4BAAmB,CAAC,uBAAuB,CAAC,CAAC;QACzD,CAAC;QAED,MAAM,WAAW,GAAG,MAAM,OAAO,CAAC,GAAG,CACnC,CAAC,WAAW,EAAE,YAAY,CAAC;aACxB,MAAM,CAAC,CAAC,KAAK,EAAmB,EAAE,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC;aAClD,GAAG,CAAC,CAAC,KAAK,EAAE,EAAE,CAAC,IAAI,CAAC,WAAW,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAChD,CAAC;QAEF,MAAM,IAAI,CAAC,kBAAkB,CAAC,gBAAgB,CAAC,WAAW,EAAE,IAAI,CAAC,EAAE,CAAC,CAAC;QAErE,OAAO,EAAE,OAAO,EAAE,IAAI,EAAE,CAAC;IAC3B,CAAC;IAED,KAAK,CAAC,cAAc,CAClB,MAAc,EACd,GAA6B;QAE7B,MAAM,EAAE,eAAe,EAAE,WAAW,EAAE,eAAe,EAAE,GAAG,GAAG,CAAC;QAC9D,IAAI,WAAW,KAAK,eAAe,EAAE,CAAC;YACpC,MAAM,IAAI,4BAAmB,CAAC,wBAAwB,CAAC,CAAC;QAC1D,CAAC;QACD,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,kBAAkB,CAAC,OAAO,CAAC;YACjD,KAAK,EAAE,EAAE,EAAE,EAAE,MAAM,EAAE;SACtB,CAAC,CAAC;QACH,IAAI,CAAC,IAAI,EAAE,CAAC;YACV,MAAM,IAAI,4BAAmB,CAAC,gBAAgB,CAAC,CAAC;QAClD,CAAC;QACD,MAAM,sBAAsB,GAAG,MAAM,IAAI,CAAC,WAAW,CAAC,OAAO,CAC3D,eAAe,EACf,IAAI,CAAC,YAAY,CAClB,CAAC;QACF,IAAI,CAAC,sBAAsB,EAAE,CAAC;YAC5B,MAAM,IAAI,4BAAmB,CAAC,0BAA0B,CAAC,CAAC;QAC5D,CAAC;QACD,IAAI,CAAC,YAAY,GAAG,MAAM,IAAI,CAAC,WAAW,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC;QAC7D,MAAM,IAAI,CAAC,kBAAkB,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC;QAC3C,OAAO,EAAE,OAAO,EAAE,IAAI,EAAE,CAAC;IAC3B,CAAC;IACD,KAAK,CAAC,cAAc,CAClB,GAA6B;QAE7B,MAAM,EAAE,KAAK,EAAE,GAAG,GAAG,CAAC;QACtB,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,kBAAkB,CAAC,OAAO,CAAC,EAAE,KAAK,EAAE,EAAE,KAAK,EAAE,EAAE,CAAC,CAAC;QACzE,IAAI,CAAC,IAAI,EAAE,CAAC;YACV,MAAM,IAAI,4BAAmB,CAAC,gBAAgB,CAAC,CAAC;QAClD,CAAC;QACD,MAAM,KAAK,GAAG,MAAM,CAAC,UAAU,EAAE,CAAC;QAClC,IAAI,CAAC,KAAK,GAAG,KAAK,CAAC;QACnB,MAAM,IAAI,CAAC,kBAAkB,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC;QAC3C,8DAA8D;QAC9D,OAAO,EAAE,OAAO,EAAE,IAAI,EAAE,CAAC;IAC3B,CAAC;IACD,KAAK,CAAC,aAAa,CACjB,GAA4B;QAE5B,MAAM,EAAE,KAAK,EAAE,QAAQ,EAAE,eAAe,EAAE,GAAG,GAAG,CAAC;QACjD,IAAI,QAAQ,KAAK,eAAe,EAAE,CAAC;YACjC,MAAM,IAAI,4BAAmB,CAAC,wBAAwB,CAAC,CAAC;QAC1D,CAAC;QACD,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,kBAAkB,CAAC,OAAO,CAAC,EAAE,KAAK,EAAE,EAAE,KAAK,EAAE,EAAE,CAAC,CAAC;QACzE,IAAI,CAAC,IAAI,EAAE,CAAC;YACV,MAAM,IAAI,4BAAmB,CAAC,eAAe,CAAC,CAAC;QACjD,CAAC;QACD,IAAI,CAAC,YAAY,GAAG,MAAM,IAAI,CAAC,WAAW,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;QAC1D,IAAI,CAAC,KAAK,GAAG,IAAI,CAAC;QAClB,MAAM,IAAI,CAAC,kBAAkB,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC;QAC3C,OAAO,EAAE,OAAO,EAAE,IAAI,EAAE,CAAC;IAC3B,CAAC;IACD,KAAK,CAAC,WAAW,CAAC,GAA0B;QAC1C,MAAM,EAAE,KAAK,EAAE,GAAG,GAAG,CAAC;QACtB,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,kBAAkB,CAAC,OAAO,CAAC,EAAE,KAAK,EAAE,EAAE,KAAK,EAAE,EAAE,CAAC,CAAC;QACzE,IAAI,CAAC,IAAI,EAAE,CAAC;YACV,MAAM,IAAI,4BAAmB,CAAC,eAAe,CAAC,CAAC;QACjD,CAAC;QACD,IAAI,CAAC,QAAQ,GAAG,IAAI,CAAC;QACrB,IAAI,CAAC,KAAK,GAAG,IAAI,CAAC;QAClB,MAAM,IAAI,CAAC,kBAAkB,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC;QAC3C,OAAO,EAAE,OAAO,EAAE,IAAI,EAAE,CAAC;IAC3B,CAAC;IAED,KAAK,CAAC,WAAW,CACf,MAAc,EACd,GAA0B;QAE1B,MAAM,EAAE,QAAQ,EAAE,QAAQ,EAAE,GAAG,GAAG,CAAC;QACnC,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,kBAAkB,CAAC,OAAO,CAAC;YACjD,KAAK,EAAE,EAAE,EAAE,EAAE,MAAM,EAAE;SACtB,CAAC,CAAC;QACH,IAAI,CAAC,IAAI,EAAE,CAAC;YACV,MAAM,IAAI,4BAAmB,CAAC,gBAAgB,CAAC,CAAC;QAClD,CAAC;QACD,MAAM,eAAe,GACnB,QAAQ,IAAI,CAAC,MAAM,IAAI,CAAC,WAAW,CAAC,OAAO,CAAC,QAAQ,EAAE,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC;QAC5E,IAAI,CAAC,eAAe,EAAE,CAAC;YACrB,MAAM,IAAI,4BAAmB,CAAC,kBAAkB,CAAC,CAAC;QACpD,CAAC;QACD,IAAI,CAAC,KAAK,GAAG,QAAQ,CAAC;QACtB,MAAM,IAAI,CAAC,kBAAkB,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC;QAC3C,OAAO,EAAE,OAAO,EAAE,IAAI,EAAE,CAAC;IAC3B,CAAC;IAED,KAAK,CAAC,aAAa,CACjB,MAAc,EACd,GAA2B;QAE3B,MAAM,EAAE,YAAY,EAAE,GAAG,GAAG,CAAC;QAC7B,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,UAAU;aAClC,WAAW,CAAC,YAAY,CAAC;aACzB,KAAK,CAAC,GAAG,EAAE;YACV,MAAM,IAAI,4BAAmB,CAAC,uBAAuB,CAAC,CAAC;QACzD,CAAC,CAAC,CAAC;QAEL,IAAI,CAAC,OAAO,EAAE,GAAG,IAAI,OAAO,CAAC,GAAG,KAAK,MAAM,EAAE,CAAC;YAC5C,MAAM,IAAI,4BAAmB,CAAC,uBAAuB,CAAC,CAAC;QACzD,CAAC;QAED,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,kBAAkB,CAAC,OAAO,CAAC;YACjD,KAAK,EAAE,EAAE,EAAE,EAAE,MAAM,EAAE;SACtB,CAAC,CAAC;QAEH,IAAI,CAAC,IAAI,EAAE,CAAC;YACV,MAAM,IAAI,4BAAmB,CAAC,gBAAgB,CAAC,CAAC;QAClD,CAAC;QAED,MAAM,kBAAkB,GAAG,MAAM,IAAI,CAAC,kBAAkB,CAAC,kBAAkB,CACzE,MAAM,IAAI,CAAC,WAAW,CAAC,IAAI,CAAC,YAAY,CAAC,CAC1C,CAAC;QAEF,IAAI,kBAAkB,EAAE,CAAC;YACvB,MAAM,IAAI,4BAAmB,CAAC,oCAAoC,CAAC,CAAC;QACtE,CAAC;QAED,OAAO,IAAI,CAAC,cAAc,CAAC,IAAI,CAAC,CAAC;IACnC,CAAC;IAED,KAAK,CAAC,mBAAmB,CACvB,MAAc;QAEd,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,kBAAkB,CAAC,OAAO,CAAC;YACjD,KAAK,EAAE,EAAE,EAAE,EAAE,MAAM,EAAE;YACrB,SAAS,EAAE,CAAC,OAAO,EAAE,aAAa,CAAC;SACpC,CAAC,CAAC;QACH,IAAI,CAAC,IAAI,EAAE,CAAC;YACV,MAAM,IAAI,4BAAmB,CAAC,gBAAgB,CAAC,CAAC;QAClD,CAAC;QACD,MAAM,IAAI,GAAiB,EAAE,CAAC;QAC9B,IAAI,CAAC,KAAK,EAAE,OAAO,CAAC,CAAC,IAAI,EAAE,EAAE;YAC3B,IAAI,CAAC,WAAW,EAAE,OAAO,CAAC,CAAC,UAAU,EAAE,EAAE;gBACvC,IAAI,CAAC,IAAI,CAAC;oBACR,MAAM,EAAE,UAAU,CAAC,MAAM;oBACzB,OAAO,EAAE,UAAU,CAAC,OAAO;oBAC3B,UAAU,EAAE,UAAU,CAAC,UAAU,IAAI,SAAS;oBAC9C,MAAM,EAAE,UAAU,CAAC,MAAM,IAAI,SAAS;oBACtC,MAAM,EAAE,UAAU,CAAC,MAAM,IAAI,SAAS;oBACtC,QAAQ,EAAE,UAAU,CAAC,QAAQ,IAAI,KAAK;iBACvC,CAAC,CAAC;YACL,CAAC,CAAC,CAAC;QACL,CAAC,CAAC,CAAC;QACH,OAAO,EAAE,IAAI,EAAE,IAAI,EAAE,CAAC;IACxB,CAAC;IAEO,KAAK,CAAC,cAAc,CAAC,IAAU;QACrC,MAAM,OAAO,GAAG;YACd,GAAG,EAAE,IAAI,CAAC,EAAE;YACZ,KAAK,EAAE,IAAI,CAAC,KAAK,EAAE,GAAG,CAAC,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,IAAI,CAAC;SAC5C,CAAC;QACF,MAAM,WAAW,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,SAAS,CAAC,OAAO,CAAC,CAAC;QAC7D,MAAM,YAAY,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,SAAS,CAAC,OAAO,CAAC,CAAC;QAC9D,OAAO,EAAE,WAAW,EAAE,YAAY,EAAE,CAAC;IACvC,CAAC;CACF,CAAA;AA9PY,wCAAc;yBAAd,cAAc;IAD1B,IAAA,mBAAU,GAAE;6CAGqB,0BAAW;QACJ,yCAAkB;QAC1B,gBAAU;GAJ9B,cAAc,CA8P1B"}
|
|
@@ -0,0 +1,10 @@
|
|
|
1
|
+
import { AuthUserRepository } from '../../infrastructure-persistence/repositories/auth-user.repository';
|
|
2
|
+
import { PolicyRule, User } from '@anarchitects/auth-ts/models';
|
|
3
|
+
import { AppAbility, AbilityFactory } from '../factories/ability.factory';
|
|
4
|
+
export declare class PoliciesService {
|
|
5
|
+
private readonly authUserRepository;
|
|
6
|
+
private readonly abilityFactory;
|
|
7
|
+
constructor(authUserRepository: AuthUserRepository, abilityFactory: AbilityFactory);
|
|
8
|
+
rulesForUser(authUser: User): Promise<PolicyRule[]>;
|
|
9
|
+
buildAbilityForUser(authUser: User): Promise<AppAbility>;
|
|
10
|
+
}
|
|
@@ -0,0 +1,42 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.PoliciesService = void 0;
|
|
4
|
+
const tslib_1 = require("tslib");
|
|
5
|
+
/* eslint-disable @typescript-eslint/no-explicit-any */
|
|
6
|
+
const common_1 = require("@nestjs/common");
|
|
7
|
+
const auth_user_repository_1 = require("../../infrastructure-persistence/repositories/auth-user.repository");
|
|
8
|
+
const ability_factory_1 = require("../factories/ability.factory");
|
|
9
|
+
let PoliciesService = class PoliciesService {
|
|
10
|
+
constructor(authUserRepository, abilityFactory) {
|
|
11
|
+
this.authUserRepository = authUserRepository;
|
|
12
|
+
this.abilityFactory = abilityFactory;
|
|
13
|
+
}
|
|
14
|
+
async rulesForUser(authUser) {
|
|
15
|
+
const user = await this.authUserRepository.findOne({
|
|
16
|
+
where: { id: authUser.id },
|
|
17
|
+
relations: ['roles', 'roles.permissions'],
|
|
18
|
+
});
|
|
19
|
+
const inject = (c) => !c ? undefined : JSON.parse(JSON.stringify(c));
|
|
20
|
+
if (!user) {
|
|
21
|
+
return [];
|
|
22
|
+
}
|
|
23
|
+
return (user.roles ?? []).flatMap((role) => (role.permissions ?? []).map((permission) => ({
|
|
24
|
+
action: permission.action,
|
|
25
|
+
subject: permission.subject,
|
|
26
|
+
conditions: inject(permission.conditions),
|
|
27
|
+
fields: permission.fields ?? undefined,
|
|
28
|
+
inverted: permission.inverted ?? false,
|
|
29
|
+
reason: permission.reason ?? undefined,
|
|
30
|
+
})));
|
|
31
|
+
}
|
|
32
|
+
async buildAbilityForUser(authUser) {
|
|
33
|
+
return this.abilityFactory.buildAbility(await this.rulesForUser(authUser));
|
|
34
|
+
}
|
|
35
|
+
};
|
|
36
|
+
exports.PoliciesService = PoliciesService;
|
|
37
|
+
exports.PoliciesService = PoliciesService = tslib_1.__decorate([
|
|
38
|
+
(0, common_1.Injectable)(),
|
|
39
|
+
tslib_1.__metadata("design:paramtypes", [auth_user_repository_1.AuthUserRepository,
|
|
40
|
+
ability_factory_1.AbilityFactory])
|
|
41
|
+
], PoliciesService);
|
|
42
|
+
//# sourceMappingURL=policies.service.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"policies.service.js","sourceRoot":"","sources":["../../../../../../../libs/auth/nest/src/application/services/policies.service.ts"],"names":[],"mappings":";;;;AAAA,uDAAuD;AACvD,2CAA4C;AAC5C,6GAAwG;AAExG,kEAA0E;AAGnE,IAAM,eAAe,GAArB,MAAM,eAAe;IAC1B,YACmB,kBAAsC,EACtC,cAA8B;QAD9B,uBAAkB,GAAlB,kBAAkB,CAAoB;QACtC,mBAAc,GAAd,cAAc,CAAgB;IAC9C,CAAC;IAEJ,KAAK,CAAC,YAAY,CAAC,QAAc;QAC/B,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,kBAAkB,CAAC,OAAO,CAAC;YACjD,KAAK,EAAE,EAAE,EAAE,EAAE,QAAQ,CAAC,EAAE,EAAE;YAC1B,SAAS,EAAE,CAAC,OAAO,EAAE,mBAAmB,CAAC;SAC1C,CAAC,CAAC;QACH,MAAM,MAAM,GAAG,CAAC,CAAO,EAAE,EAAE,CACzB,CAAC,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC,CAAC;QACjD,IAAI,CAAC,IAAI,EAAE,CAAC;YACV,OAAO,EAAE,CAAC;QACZ,CAAC;QACD,OAAO,CAAC,IAAI,CAAC,KAAK,IAAI,EAAE,CAAC,CAAC,OAAO,CAAC,CAAC,IAAI,EAAE,EAAE,CACzC,CAAC,IAAI,CAAC,WAAW,IAAI,EAAE,CAAC,CAAC,GAAG,CAAa,CAAC,UAAU,EAAE,EAAE,CAAC,CAAC;YACxD,MAAM,EAAE,UAAU,CAAC,MAAM;YACzB,OAAO,EAAE,UAAU,CAAC,OAAO;YAC3B,UAAU,EAAE,MAAM,CAAC,UAAU,CAAC,UAAU,CAAC;YACzC,MAAM,EAAE,UAAU,CAAC,MAAM,IAAI,SAAS;YACtC,QAAQ,EAAE,UAAU,CAAC,QAAQ,IAAI,KAAK;YACtC,MAAM,EAAE,UAAU,CAAC,MAAM,IAAI,SAAS;SACvC,CAAC,CAAC,CACJ,CAAC;IACJ,CAAC;IAED,KAAK,CAAC,mBAAmB,CAAC,QAAc;QACtC,OAAO,IAAI,CAAC,cAAc,CAAC,YAAY,CAAC,MAAM,IAAI,CAAC,YAAY,CAAC,QAAQ,CAAC,CAAC,CAAC;IAC7E,CAAC;CACF,CAAA;AA/BY,0CAAe;0BAAf,eAAe;IAD3B,IAAA,mBAAU,GAAE;6CAG4B,yCAAkB;QACtB,gCAAc;GAHtC,eAAe,CA+B3B"}
|
|
@@ -0,0 +1,16 @@
|
|
|
1
|
+
import { Role } from '@anarchitects/auth-ts/models';
|
|
2
|
+
import { Strategy } from 'passport-jwt';
|
|
3
|
+
declare const JwtStrategy_base: new (...args: [opt: import("passport-jwt").StrategyOptionsWithRequest] | [opt: import("passport-jwt").StrategyOptionsWithoutRequest]) => Strategy & {
|
|
4
|
+
validate(...args: any[]): unknown;
|
|
5
|
+
};
|
|
6
|
+
export declare class JwtStrategy extends JwtStrategy_base {
|
|
7
|
+
constructor();
|
|
8
|
+
validate(payload: {
|
|
9
|
+
sub: string;
|
|
10
|
+
roles: Role[];
|
|
11
|
+
}): Promise<{
|
|
12
|
+
userId: string;
|
|
13
|
+
roles: Role[];
|
|
14
|
+
}>;
|
|
15
|
+
}
|
|
16
|
+
export {};
|
|
@@ -0,0 +1,25 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.JwtStrategy = void 0;
|
|
4
|
+
const tslib_1 = require("tslib");
|
|
5
|
+
const common_1 = require("@nestjs/common");
|
|
6
|
+
const passport_1 = require("@nestjs/passport");
|
|
7
|
+
const passport_jwt_1 = require("passport-jwt");
|
|
8
|
+
let JwtStrategy = class JwtStrategy extends (0, passport_1.PassportStrategy)(passport_jwt_1.Strategy) {
|
|
9
|
+
constructor() {
|
|
10
|
+
super({
|
|
11
|
+
jwtFromRequest: passport_jwt_1.ExtractJwt.fromAuthHeaderAsBearerToken(),
|
|
12
|
+
ignoreExpiration: false,
|
|
13
|
+
secretOrKey: process.env['JWT_SECRET'] || 'defaultSecret',
|
|
14
|
+
});
|
|
15
|
+
}
|
|
16
|
+
async validate(payload) {
|
|
17
|
+
return { userId: payload.sub, roles: payload.roles };
|
|
18
|
+
}
|
|
19
|
+
};
|
|
20
|
+
exports.JwtStrategy = JwtStrategy;
|
|
21
|
+
exports.JwtStrategy = JwtStrategy = tslib_1.__decorate([
|
|
22
|
+
(0, common_1.Injectable)(),
|
|
23
|
+
tslib_1.__metadata("design:paramtypes", [])
|
|
24
|
+
], JwtStrategy);
|
|
25
|
+
//# sourceMappingURL=strategy.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"strategy.js","sourceRoot":"","sources":["../../../../../../../../libs/auth/nest/src/application/strategies/jwt/strategy.ts"],"names":[],"mappings":";;;;AACA,2CAA4C;AAC5C,+CAAoD;AACpD,+CAAoD;AAG7C,IAAM,WAAW,GAAjB,MAAM,WAAY,SAAQ,IAAA,2BAAgB,EAAC,uBAAQ,CAAC;IACzD;QACE,KAAK,CAAC;YACJ,cAAc,EAAE,yBAAU,CAAC,2BAA2B,EAAE;YACxD,gBAAgB,EAAE,KAAK;YACvB,WAAW,EAAE,OAAO,CAAC,GAAG,CAAC,YAAY,CAAC,IAAI,eAAe;SAC1D,CAAC,CAAC;IACL,CAAC;IAED,KAAK,CAAC,QAAQ,CAAC,OAAuC;QACpD,OAAO,EAAE,MAAM,EAAE,OAAO,CAAC,GAAG,EAAE,KAAK,EAAE,OAAO,CAAC,KAAK,EAAE,CAAC;IACvD,CAAC;CACF,CAAA;AAZY,kCAAW;sBAAX,WAAW;IADvB,IAAA,mBAAU,GAAE;;GACA,WAAW,CAYvB"}
|
|
@@ -0,0 +1,18 @@
|
|
|
1
|
+
import { ConfigType } from '@nestjs/config';
|
|
2
|
+
export declare const authConfig: (() => {
|
|
3
|
+
jwtSecret: string;
|
|
4
|
+
jwtExpiration: string;
|
|
5
|
+
jwtAudience: string;
|
|
6
|
+
jwtIssuer: string;
|
|
7
|
+
encryptionAlgorithm: string;
|
|
8
|
+
encryptionKey: string;
|
|
9
|
+
}) & import("@nestjs/config").ConfigFactoryKeyHost<{
|
|
10
|
+
jwtSecret: string;
|
|
11
|
+
jwtExpiration: string;
|
|
12
|
+
jwtAudience: string;
|
|
13
|
+
jwtIssuer: string;
|
|
14
|
+
encryptionAlgorithm: string;
|
|
15
|
+
encryptionKey: string;
|
|
16
|
+
}>;
|
|
17
|
+
export type AuthConfig = ConfigType<typeof authConfig>;
|
|
18
|
+
export declare const InjectAuthConfig: () => PropertyDecorator & ParameterDecorator;
|
|
@@ -0,0 +1,17 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.InjectAuthConfig = exports.authConfig = void 0;
|
|
4
|
+
const common_1 = require("@nestjs/common");
|
|
5
|
+
const config_1 = require("@nestjs/config");
|
|
6
|
+
const AUTH_CONFIG_KEY = 'auth';
|
|
7
|
+
exports.authConfig = (0, config_1.registerAs)(AUTH_CONFIG_KEY, () => ({
|
|
8
|
+
jwtSecret: process.env['AUTH_JWT_SECRET'] || 'default_jwt_secret',
|
|
9
|
+
jwtExpiration: process.env['AUTH_JWT_EXPIRATION'] || '3600s',
|
|
10
|
+
jwtAudience: process.env['AUTH_JWT_AUDIENCE'] || 'your_audience',
|
|
11
|
+
jwtIssuer: process.env['AUTH_JWT_ISSUER'] || 'your_issuer',
|
|
12
|
+
encryptionAlgorithm: process.env['AUTH_ENCRYPTION_ALGORITHM'] || 'bcrypt',
|
|
13
|
+
encryptionKey: process.env['AUTH_ENCRYPTION_KEY'] || 'default_encryption_key',
|
|
14
|
+
}));
|
|
15
|
+
const InjectAuthConfig = () => (0, common_1.Inject)(exports.authConfig.KEY);
|
|
16
|
+
exports.InjectAuthConfig = InjectAuthConfig;
|
|
17
|
+
//# sourceMappingURL=auth.config.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"auth.config.js","sourceRoot":"","sources":["../../../../../../libs/auth/nest/src/config/auth.config.ts"],"names":[],"mappings":";;;AAAA,2CAAwC;AACxC,2CAAwD;AAExD,MAAM,eAAe,GAAG,MAAM,CAAC;AAElB,QAAA,UAAU,GAAG,IAAA,mBAAU,EAAC,eAAe,EAAE,GAAG,EAAE,CAAC,CAAC;IAC3D,SAAS,EAAE,OAAO,CAAC,GAAG,CAAC,iBAAiB,CAAC,IAAI,oBAAoB;IACjE,aAAa,EAAE,OAAO,CAAC,GAAG,CAAC,qBAAqB,CAAC,IAAI,OAAO;IAC5D,WAAW,EAAE,OAAO,CAAC,GAAG,CAAC,mBAAmB,CAAC,IAAI,eAAe;IAChE,SAAS,EAAE,OAAO,CAAC,GAAG,CAAC,iBAAiB,CAAC,IAAI,aAAa;IAC1D,mBAAmB,EAAE,OAAO,CAAC,GAAG,CAAC,2BAA2B,CAAC,IAAI,QAAQ;IACzE,aAAa,EAAE,OAAO,CAAC,GAAG,CAAC,qBAAqB,CAAC,IAAI,wBAAwB;CAC9E,CAAC,CAAC,CAAC;AAIG,MAAM,gBAAgB,GAAG,GAAG,EAAE,CAAC,IAAA,eAAM,EAAC,kBAAU,CAAC,GAAG,CAAC,CAAC;AAAhD,QAAA,gBAAgB,oBAAgC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
export * from './auth.config';
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../../../../../libs/auth/nest/src/config/index.ts"],"names":[],"mappings":";;;AAAA,wDAA8B"}
|
package/src/index.d.ts
ADDED
package/src/index.js
ADDED
|
@@ -0,0 +1,9 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
const tslib_1 = require("tslib");
|
|
4
|
+
tslib_1.__exportStar(require("./application"), exports);
|
|
5
|
+
tslib_1.__exportStar(require("./presentation"), exports);
|
|
6
|
+
tslib_1.__exportStar(require("./infrastructure-persistence"), exports);
|
|
7
|
+
tslib_1.__exportStar(require("./infrastructure-mailer"), exports);
|
|
8
|
+
tslib_1.__exportStar(require("./config"), exports);
|
|
9
|
+
//# sourceMappingURL=index.js.map
|
package/src/index.js.map
ADDED
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../../../../libs/auth/nest/src/index.ts"],"names":[],"mappings":";;;AAAA,wDAA8B;AAC9B,yDAA+B;AAC/B,uEAA6C;AAC7C,kEAAwC;AACxC,mDAAyB"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"mailer.adapter.js","sourceRoot":"","sources":["../../../../../../../libs/auth/nest/src/infrastructure-mailer/adapters/mailer.adapter.ts"],"names":[],"mappings":";;;AAAA,MAAsB,aAAa;CAQlC;AARD,sCAQC"}
|
|
@@ -0,0 +1,8 @@
|
|
|
1
|
+
import { MailerService } from '@nestjs-modules/mailer';
|
|
2
|
+
import { MailerAdapter } from './mailer.adapter';
|
|
3
|
+
export declare class NodeMailerAdapter implements MailerAdapter {
|
|
4
|
+
private readonly mailer;
|
|
5
|
+
constructor(mailer: MailerService);
|
|
6
|
+
send(to: string, subject: string, html: string): Promise<SentMessageInfo>;
|
|
7
|
+
sendTemplate(to: string, subject: string, template: string, context?: Record<string, unknown>): Promise<SentMessageInfo>;
|
|
8
|
+
}
|
|
@@ -0,0 +1,23 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.NodeMailerAdapter = void 0;
|
|
4
|
+
const tslib_1 = require("tslib");
|
|
5
|
+
const common_1 = require("@nestjs/common");
|
|
6
|
+
const mailer_1 = require("@nestjs-modules/mailer");
|
|
7
|
+
let NodeMailerAdapter = class NodeMailerAdapter {
|
|
8
|
+
constructor(mailer) {
|
|
9
|
+
this.mailer = mailer;
|
|
10
|
+
}
|
|
11
|
+
async send(to, subject, html) {
|
|
12
|
+
return await this.mailer.sendMail({ to, subject, html });
|
|
13
|
+
}
|
|
14
|
+
async sendTemplate(to, subject, template, context) {
|
|
15
|
+
return await this.mailer.sendMail({ to, subject, template, context });
|
|
16
|
+
}
|
|
17
|
+
};
|
|
18
|
+
exports.NodeMailerAdapter = NodeMailerAdapter;
|
|
19
|
+
exports.NodeMailerAdapter = NodeMailerAdapter = tslib_1.__decorate([
|
|
20
|
+
(0, common_1.Injectable)(),
|
|
21
|
+
tslib_1.__metadata("design:paramtypes", [mailer_1.MailerService])
|
|
22
|
+
], NodeMailerAdapter);
|
|
23
|
+
//# sourceMappingURL=node-mailer.adapter.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"node-mailer.adapter.js","sourceRoot":"","sources":["../../../../../../../libs/auth/nest/src/infrastructure-mailer/adapters/node-mailer.adapter.ts"],"names":[],"mappings":";;;;AAAA,2CAA4C;AAC5C,mDAAuD;AAIhD,IAAM,iBAAiB,GAAvB,MAAM,iBAAiB;IAC5B,YAA6B,MAAqB;QAArB,WAAM,GAAN,MAAM,CAAe;IAAG,CAAC;IACtD,KAAK,CAAC,IAAI,CAAC,EAAU,EAAE,OAAe,EAAE,IAAY;QAClD,OAAO,MAAM,IAAI,CAAC,MAAM,CAAC,QAAQ,CAAC,EAAE,EAAE,EAAE,OAAO,EAAE,IAAI,EAAE,CAAC,CAAC;IAC3D,CAAC;IACD,KAAK,CAAC,YAAY,CAChB,EAAU,EACV,OAAe,EACf,QAAgB,EAChB,OAAiC;QAEjC,OAAO,MAAM,IAAI,CAAC,MAAM,CAAC,QAAQ,CAAC,EAAE,EAAE,EAAE,OAAO,EAAE,QAAQ,EAAE,OAAO,EAAE,CAAC,CAAC;IACxE,CAAC;CACF,CAAA;AAbY,8CAAiB;4BAAjB,iBAAiB;IAD7B,IAAA,mBAAU,GAAE;6CAE0B,sBAAa;GADvC,iBAAiB,CAa7B"}
|
|
@@ -0,0 +1,7 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
const tslib_1 = require("tslib");
|
|
4
|
+
tslib_1.__exportStar(require("./adapters/mailer.adapter"), exports);
|
|
5
|
+
tslib_1.__exportStar(require("./adapters/node-mailer.adapter"), exports);
|
|
6
|
+
tslib_1.__exportStar(require("./mailer.module"), exports);
|
|
7
|
+
//# sourceMappingURL=index.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../../../../../libs/auth/nest/src/infrastructure-mailer/index.ts"],"names":[],"mappings":";;;AAAA,oEAA0C;AAC1C,yEAA+C;AAC/C,0DAAgC"}
|
|
@@ -0,0 +1,23 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.MailerModule = void 0;
|
|
4
|
+
const tslib_1 = require("tslib");
|
|
5
|
+
const common_1 = require("@nestjs/common");
|
|
6
|
+
const node_mailer_adapter_1 = require("./adapters/node-mailer.adapter");
|
|
7
|
+
const mailer_adapter_1 = require("./adapters/mailer.adapter");
|
|
8
|
+
let MailerModule = class MailerModule {
|
|
9
|
+
};
|
|
10
|
+
exports.MailerModule = MailerModule;
|
|
11
|
+
exports.MailerModule = MailerModule = tslib_1.__decorate([
|
|
12
|
+
(0, common_1.Module)({
|
|
13
|
+
providers: [
|
|
14
|
+
node_mailer_adapter_1.NodeMailerAdapter,
|
|
15
|
+
{
|
|
16
|
+
provide: mailer_adapter_1.MailerAdapter,
|
|
17
|
+
useExisting: node_mailer_adapter_1.NodeMailerAdapter,
|
|
18
|
+
},
|
|
19
|
+
],
|
|
20
|
+
exports: [mailer_adapter_1.MailerAdapter],
|
|
21
|
+
})
|
|
22
|
+
], MailerModule);
|
|
23
|
+
//# sourceMappingURL=mailer.module.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"mailer.module.js","sourceRoot":"","sources":["../../../../../../libs/auth/nest/src/infrastructure-mailer/mailer.module.ts"],"names":[],"mappings":";;;;AAAA,2CAAwC;AACxC,wEAAmE;AACnE,8DAA0D;AAYnD,IAAM,YAAY,GAAlB,MAAM,YAAY;CAAG,CAAA;AAAf,oCAAY;uBAAZ,YAAY;IAVxB,IAAA,eAAM,EAAC;QACN,SAAS,EAAE;YACT,uCAAiB;YACjB;gBACE,OAAO,EAAE,8BAAa;gBACtB,WAAW,EAAE,uCAAiB;aAC/B;SACF;QACD,OAAO,EAAE,CAAC,8BAAa,CAAC;KACzB,CAAC;GACW,YAAY,CAAG"}
|
|
@@ -0,0 +1,42 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.InvalidatedTokenEntity = void 0;
|
|
4
|
+
const tslib_1 = require("tslib");
|
|
5
|
+
const typeorm_1 = require("typeorm");
|
|
6
|
+
const schema_1 = require("../schema");
|
|
7
|
+
let InvalidatedTokenEntity = class InvalidatedTokenEntity {
|
|
8
|
+
constructor(partial = {}) {
|
|
9
|
+
Object.assign(this, partial);
|
|
10
|
+
}
|
|
11
|
+
};
|
|
12
|
+
exports.InvalidatedTokenEntity = InvalidatedTokenEntity;
|
|
13
|
+
tslib_1.__decorate([
|
|
14
|
+
(0, typeorm_1.PrimaryColumn)({ type: 'varchar', length: 128 }),
|
|
15
|
+
tslib_1.__metadata("design:type", String)
|
|
16
|
+
], InvalidatedTokenEntity.prototype, "tokenId", void 0);
|
|
17
|
+
tslib_1.__decorate([
|
|
18
|
+
(0, typeorm_1.Column)({ type: 'uuid', nullable: true }),
|
|
19
|
+
tslib_1.__metadata("design:type", Object)
|
|
20
|
+
], InvalidatedTokenEntity.prototype, "userId", void 0);
|
|
21
|
+
tslib_1.__decorate([
|
|
22
|
+
(0, typeorm_1.Column)({ type: 'timestamptz', name: 'expires_at' }),
|
|
23
|
+
tslib_1.__metadata("design:type", Date)
|
|
24
|
+
], InvalidatedTokenEntity.prototype, "expiresAt", void 0);
|
|
25
|
+
tslib_1.__decorate([
|
|
26
|
+
(0, typeorm_1.Column)({
|
|
27
|
+
type: 'timestamptz',
|
|
28
|
+
name: 'invalidated_at',
|
|
29
|
+
default: () => 'CURRENT_TIMESTAMP',
|
|
30
|
+
}),
|
|
31
|
+
tslib_1.__metadata("design:type", Date)
|
|
32
|
+
], InvalidatedTokenEntity.prototype, "invalidatedAt", void 0);
|
|
33
|
+
exports.InvalidatedTokenEntity = InvalidatedTokenEntity = tslib_1.__decorate([
|
|
34
|
+
(0, typeorm_1.Entity)({
|
|
35
|
+
schema: schema_1.AUTH_SCHEMA,
|
|
36
|
+
name: 'invalidated_tokens',
|
|
37
|
+
synchronize: false,
|
|
38
|
+
}),
|
|
39
|
+
(0, typeorm_1.Index)('invalidated_tokens_expires_at_idx', ['expiresAt']),
|
|
40
|
+
tslib_1.__metadata("design:paramtypes", [Object])
|
|
41
|
+
], InvalidatedTokenEntity);
|
|
42
|
+
//# sourceMappingURL=invalidated-token.entity.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"invalidated-token.entity.js","sourceRoot":"","sources":["../../../../../../../libs/auth/nest/src/infrastructure-persistence/entities/invalidated-token.entity.ts"],"names":[],"mappings":";;;;AAAA,qCAA+D;AAC/D,sCAAwC;AAQjC,IAAM,sBAAsB,GAA5B,MAAM,sBAAsB;IAiBjC,YAAY,UAA2C,EAAE;QACvD,MAAM,CAAC,MAAM,CAAC,IAAI,EAAE,OAAO,CAAC,CAAC;IAC/B,CAAC;CACF,CAAA;AApBY,wDAAsB;AAEjC;IADC,IAAA,uBAAa,EAAC,EAAE,IAAI,EAAE,SAAS,EAAE,MAAM,EAAE,GAAG,EAAE,CAAC;;uDAC/B;AAGjB;IADC,IAAA,gBAAM,EAAC,EAAE,IAAI,EAAE,MAAM,EAAE,QAAQ,EAAE,IAAI,EAAE,CAAC;;sDAClB;AAGvB;IADC,IAAA,gBAAM,EAAC,EAAE,IAAI,EAAE,aAAa,EAAE,IAAI,EAAE,YAAY,EAAE,CAAC;sCACxC,IAAI;yDAAC;AAOjB;IALC,IAAA,gBAAM,EAAC;QACN,IAAI,EAAE,aAAa;QACnB,IAAI,EAAE,gBAAgB;QACtB,OAAO,EAAE,GAAG,EAAE,CAAC,mBAAmB;KACnC,CAAC;sCACc,IAAI;6DAAC;iCAfV,sBAAsB;IANlC,IAAA,gBAAM,EAAC;QACN,MAAM,EAAE,oBAAW;QACnB,IAAI,EAAE,oBAAoB;QAC1B,WAAW,EAAE,KAAK;KACnB,CAAC;IACD,IAAA,eAAK,EAAC,mCAAmC,EAAE,CAAC,WAAW,CAAC,CAAC;;GAC7C,sBAAsB,CAoBlC"}
|
|
@@ -0,0 +1,17 @@
|
|
|
1
|
+
import { Permission, Role } from '@anarchitects/auth-ts/models';
|
|
2
|
+
export declare class PermissionEntity implements Permission {
|
|
3
|
+
id: string;
|
|
4
|
+
name: string;
|
|
5
|
+
description: string | null;
|
|
6
|
+
action: string;
|
|
7
|
+
subject: string;
|
|
8
|
+
conditions: Record<string, unknown> | null;
|
|
9
|
+
fields: string[] | null;
|
|
10
|
+
inverted: boolean;
|
|
11
|
+
reason: string | null;
|
|
12
|
+
roles: Role[] | null;
|
|
13
|
+
createdAt: Date;
|
|
14
|
+
updatedAt: Date;
|
|
15
|
+
constructor(partial: Partial<Permission>);
|
|
16
|
+
generateId(): void;
|
|
17
|
+
}
|