@arch-cadre/core 0.0.23 → 0.0.26
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/_virtual/_rolldown/runtime.cjs +1 -29
- package/dist/_virtual/_rolldown/runtime.mjs +1 -18
- package/dist/core/auth/augment.cjs +1 -71
- package/dist/core/auth/augment.d.cts.map +1 -1
- package/dist/core/auth/augment.d.mts.map +1 -1
- package/dist/core/auth/augment.mjs +1 -65
- package/dist/core/auth/augment.mjs.map +1 -1
- package/dist/core/auth/email-verification.cjs +1 -99
- package/dist/core/auth/email-verification.d.cts +1 -1
- package/dist/core/auth/email-verification.d.mts +1 -1
- package/dist/core/auth/email-verification.mjs +1 -91
- package/dist/core/auth/email-verification.mjs.map +1 -1
- package/dist/core/auth/logic.cjs +1 -224
- package/dist/core/auth/logic.d.cts +6 -6
- package/dist/core/auth/logic.d.mts +6 -6
- package/dist/core/auth/logic.mjs +1 -212
- package/dist/core/auth/logic.mjs.map +1 -1
- package/dist/core/auth/password-reset.cjs +1 -118
- package/dist/core/auth/password-reset.mjs +1 -110
- package/dist/core/auth/password-reset.mjs.map +1 -1
- package/dist/core/auth/rbac.cjs +1 -118
- package/dist/core/auth/rbac.d.cts +2 -2
- package/dist/core/auth/rbac.d.mts +2 -2
- package/dist/core/auth/rbac.mjs +1 -103
- package/dist/core/auth/rbac.mjs.map +1 -1
- package/dist/core/auth/session.cjs +1 -154
- package/dist/core/auth/session.mjs +1 -142
- package/dist/core/auth/session.mjs.map +1 -1
- package/dist/core/auth/types.d.cts.map +1 -1
- package/dist/core/auth/types.d.mts.map +1 -1
- package/dist/core/auth/utils/encode.cjs +1 -27
- package/dist/core/auth/utils/encode.mjs +1 -25
- package/dist/core/auth/utils/encode.mjs.map +1 -1
- package/dist/core/auth/utils/encryption.cjs +1 -67
- package/dist/core/auth/utils/encryption.mjs +1 -63
- package/dist/core/auth/utils/encryption.mjs.map +1 -1
- package/dist/core/auth/validation.cjs +1 -39
- package/dist/core/auth/validation.mjs +1 -30
- package/dist/core/auth/validation.mjs.map +1 -1
- package/dist/core/bootstrap.cjs +1 -39
- package/dist/core/bootstrap.mjs +1 -39
- package/dist/core/bootstrap.mjs.map +1 -1
- package/dist/core/config.cjs +1 -6
- package/dist/core/config.mjs +1 -5
- package/dist/core/config.mjs.map +1 -1
- package/dist/core/config.server.cjs +1 -60
- package/dist/core/config.server.mjs +1 -56
- package/dist/core/config.server.mjs.map +1 -1
- package/dist/core/event-bus.cjs +1 -48
- package/dist/core/event-bus.d.cts.map +1 -1
- package/dist/core/event-bus.d.mts.map +1 -1
- package/dist/core/event-bus.mjs +1 -47
- package/dist/core/event-bus.mjs.map +1 -1
- package/dist/core/filesystem/index.cjs +1 -11
- package/dist/core/filesystem/index.mjs +1 -12
- package/dist/core/filesystem/index.mjs.map +1 -1
- package/dist/core/filesystem/providers/local.cjs +1 -43
- package/dist/core/filesystem/providers/local.mjs +1 -40
- package/dist/core/filesystem/providers/local.mjs.map +1 -1
- package/dist/core/filesystem/service.cjs +1 -43
- package/dist/core/filesystem/service.mjs +1 -42
- package/dist/core/filesystem/service.mjs.map +1 -1
- package/dist/core/notifications/actions.cjs +1 -36
- package/dist/core/notifications/actions.d.cts +1 -1
- package/dist/core/notifications/actions.d.mts +1 -1
- package/dist/core/notifications/actions.mjs +1 -32
- package/dist/core/notifications/actions.mjs.map +1 -1
- package/dist/core/notifications/index.cjs +1 -2
- package/dist/core/notifications/index.mjs +1 -4
- package/dist/core/notifications/service.cjs +1 -30
- package/dist/core/notifications/service.mjs +1 -30
- package/dist/core/notifications/service.mjs.map +1 -1
- package/dist/core/setup.cjs +1 -25
- package/dist/core/setup.mjs +1 -24
- package/dist/core/setup.mjs.map +1 -1
- package/dist/index.cjs +1 -30
- package/dist/index.mjs +1 -6
- package/dist/server/auth/email.cjs +1 -24
- package/dist/server/auth/email.mjs +1 -22
- package/dist/server/auth/email.mjs.map +1 -1
- package/dist/server/auth/password.cjs +1 -37
- package/dist/server/auth/password.mjs +1 -33
- package/dist/server/auth/password.mjs.map +1 -1
- package/dist/server/auth/user.cjs +1 -165
- package/dist/server/auth/user.mjs +1 -152
- package/dist/server/auth/user.mjs.map +1 -1
- package/dist/server/database/inject.cjs +1 -24
- package/dist/server/database/inject.mjs +1 -22
- package/dist/server/database/inject.mjs.map +1 -1
- package/dist/server/database/schema.cjs +1 -163
- package/dist/server/database/schema.mjs +1 -150
- package/dist/server/database/schema.mjs.map +1 -1
- package/dist/server/emails/index.cjs +1 -32
- package/dist/server/emails/index.mjs +1 -28
- package/dist/server/emails/index.mjs.map +1 -1
- package/dist/server.cjs +1 -145
- package/dist/server.mjs +1 -23
- package/package.json +1 -1
|
@@ -1,151 +1,2 @@
|
|
|
1
|
-
import {
|
|
2
|
-
import { boolean, bytea, pgTable, text, timestamp } from "drizzle-orm/pg-core";
|
|
3
|
-
|
|
4
|
-
//#region src/server/database/schema.ts
|
|
5
|
-
const userTable = pgTable("users", {
|
|
6
|
-
id: text("id").$defaultFn(() => crypto.randomUUID()).notNull().primaryKey(),
|
|
7
|
-
email: text("email").notNull().unique(),
|
|
8
|
-
name: text("name").notNull(),
|
|
9
|
-
password: text("password"),
|
|
10
|
-
image: text("image"),
|
|
11
|
-
recovery_code: bytea("recovery_code").notNull(),
|
|
12
|
-
emailVerifiedAt: timestamp("email_verified_at", { precision: 3 }),
|
|
13
|
-
createdAt: timestamp("created_at", { precision: 3 }).notNull().defaultNow(),
|
|
14
|
-
updatedAt: timestamp("updated_at", { precision: 3 })
|
|
15
|
-
});
|
|
16
|
-
const rolesTable = pgTable("roles", {
|
|
17
|
-
id: text("id").$defaultFn(() => crypto.randomUUID()).notNull().primaryKey(),
|
|
18
|
-
name: text("name").notNull().unique(),
|
|
19
|
-
description: text("description")
|
|
20
|
-
});
|
|
21
|
-
const permissionsTable = pgTable("permissions", {
|
|
22
|
-
id: text("id").$defaultFn(() => crypto.randomUUID()).notNull().primaryKey(),
|
|
23
|
-
name: text("name").notNull().unique(),
|
|
24
|
-
description: text("description")
|
|
25
|
-
});
|
|
26
|
-
const usersToRolesTable = pgTable("users_to_roles", {
|
|
27
|
-
userId: text("user_id").notNull().references(() => userTable.id, { onDelete: "cascade" }),
|
|
28
|
-
roleId: text("role_id").notNull().references(() => rolesTable.id, { onDelete: "cascade" })
|
|
29
|
-
}, (t) => [{ pk: sql`PRIMARY KEY (${t.userId}, ${t.roleId})` }]);
|
|
30
|
-
const usersToPermissionsTable = pgTable("users_to_permissions", {
|
|
31
|
-
userId: text("user_id").notNull().references(() => userTable.id, { onDelete: "cascade" }),
|
|
32
|
-
permissionId: text("permission_id").notNull().references(() => permissionsTable.id, { onDelete: "cascade" })
|
|
33
|
-
}, (t) => [{ pk: sql`PRIMARY KEY (${t.userId}, ${t.permissionId})` }]);
|
|
34
|
-
const rolesToPermissionsTable = pgTable("roles_to_permissions", {
|
|
35
|
-
roleId: text("role_id").notNull().references(() => rolesTable.id, { onDelete: "cascade" }),
|
|
36
|
-
permissionId: text("permission_id").notNull().references(() => permissionsTable.id, { onDelete: "cascade" })
|
|
37
|
-
}, (t) => [{ pk: sql`PRIMARY KEY (${t.roleId}, ${t.permissionId})` }]);
|
|
38
|
-
const sessionTable = pgTable("sessions", {
|
|
39
|
-
id: text("id").$defaultFn(() => crypto.randomUUID()).notNull().primaryKey(),
|
|
40
|
-
active_organization_id: text("active_organization_id"),
|
|
41
|
-
userId: text("user_id").notNull().references(() => userTable.id, {
|
|
42
|
-
onDelete: "cascade",
|
|
43
|
-
onUpdate: "cascade"
|
|
44
|
-
}),
|
|
45
|
-
expiresAt: timestamp("expires_at", { precision: 3 }).notNull(),
|
|
46
|
-
createdAt: timestamp("created_at", { precision: 3 }).notNull().defaultNow(),
|
|
47
|
-
updatedAt: timestamp("updated_at", { precision: 3 })
|
|
48
|
-
});
|
|
49
|
-
const emailVerificationTable = pgTable("email_verification_requests", {
|
|
50
|
-
id: text("id").$defaultFn(() => crypto.randomUUID()).notNull().primaryKey(),
|
|
51
|
-
email: text("email").notNull(),
|
|
52
|
-
code: text("code").notNull(),
|
|
53
|
-
userId: text("user_id").notNull().references(() => userTable.id, {
|
|
54
|
-
onDelete: "cascade",
|
|
55
|
-
onUpdate: "cascade"
|
|
56
|
-
}),
|
|
57
|
-
expiresAt: timestamp("expires_at", { precision: 3 }).notNull(),
|
|
58
|
-
createdAt: timestamp("created_at", { precision: 3 }).notNull().defaultNow(),
|
|
59
|
-
updatedAt: timestamp("updated_at", { precision: 3 })
|
|
60
|
-
});
|
|
61
|
-
const passwordResetSessionTable = pgTable("password_reset_sessions", {
|
|
62
|
-
id: text("id").$defaultFn(() => crypto.randomUUID()).notNull().primaryKey(),
|
|
63
|
-
email: text("email").notNull(),
|
|
64
|
-
code: text("code").notNull(),
|
|
65
|
-
emailVerified: boolean("emailVerified").default(false),
|
|
66
|
-
userId: text("user_id").notNull().references(() => userTable.id, {
|
|
67
|
-
onDelete: "cascade",
|
|
68
|
-
onUpdate: "cascade"
|
|
69
|
-
}),
|
|
70
|
-
expiresAt: timestamp("expires_at", { precision: 3 }).notNull(),
|
|
71
|
-
createdAt: timestamp("created_at", { precision: 3 }).notNull().defaultNow(),
|
|
72
|
-
updatedAt: timestamp("updated_at", { precision: 3 })
|
|
73
|
-
});
|
|
74
|
-
const notificationTable = pgTable("notification", {
|
|
75
|
-
id: text("id").$defaultFn(() => crypto.randomUUID()).notNull().primaryKey(),
|
|
76
|
-
title: text("title").notNull(),
|
|
77
|
-
content: text("content"),
|
|
78
|
-
target: text("target"),
|
|
79
|
-
type: text("type"),
|
|
80
|
-
isRead: boolean("isRead").notNull(),
|
|
81
|
-
resourceId: text("resource_id"),
|
|
82
|
-
resourceType: text("resource_type"),
|
|
83
|
-
userId: text("user_id").notNull().references(() => userTable.id, {
|
|
84
|
-
onDelete: "cascade",
|
|
85
|
-
onUpdate: "cascade"
|
|
86
|
-
}),
|
|
87
|
-
createdAt: timestamp("created_at", { precision: 3 }).notNull().defaultNow(),
|
|
88
|
-
updatedAt: timestamp("updated_at", { precision: 3 })
|
|
89
|
-
});
|
|
90
|
-
const systemModulesTable = pgTable("system_modules", {
|
|
91
|
-
id: text("id").notNull().primaryKey(),
|
|
92
|
-
enabled: boolean("enabled").notNull().default(false),
|
|
93
|
-
installed: boolean("installed").notNull().default(false),
|
|
94
|
-
deleted: boolean("deleted").notNull().default(false),
|
|
95
|
-
system: boolean("system").notNull().default(false),
|
|
96
|
-
config: text("config"),
|
|
97
|
-
lastStep: text("last_step"),
|
|
98
|
-
updatedAt: timestamp("updated_at", { precision: 3 }).defaultNow()
|
|
99
|
-
});
|
|
100
|
-
const relations = defineRelations({
|
|
101
|
-
user: userTable,
|
|
102
|
-
emailVerification: emailVerificationTable,
|
|
103
|
-
passwordResetSession: passwordResetSessionTable,
|
|
104
|
-
session: sessionTable,
|
|
105
|
-
notification: notificationTable,
|
|
106
|
-
systemModulesTable
|
|
107
|
-
}, (r) => ({
|
|
108
|
-
user: {
|
|
109
|
-
sessions: r.many.session({
|
|
110
|
-
from: r.user.id,
|
|
111
|
-
to: r.session.userId
|
|
112
|
-
}),
|
|
113
|
-
emailVerification: r.many.emailVerification({
|
|
114
|
-
from: r.user.id,
|
|
115
|
-
to: r.emailVerification.userId
|
|
116
|
-
}),
|
|
117
|
-
passwordResetSession: r.many.passwordResetSession({
|
|
118
|
-
from: r.user.id,
|
|
119
|
-
to: r.passwordResetSession.userId
|
|
120
|
-
})
|
|
121
|
-
},
|
|
122
|
-
session: { user: r.one.user({
|
|
123
|
-
from: r.session.userId,
|
|
124
|
-
to: r.user.id
|
|
125
|
-
}) },
|
|
126
|
-
emailVerification: { user: r.one.user({
|
|
127
|
-
from: r.emailVerification.userId,
|
|
128
|
-
to: r.user.id
|
|
129
|
-
}) },
|
|
130
|
-
passwordResetSession: { user: r.one.user({
|
|
131
|
-
from: r.passwordResetSession.userId,
|
|
132
|
-
to: r.user.id
|
|
133
|
-
}) }
|
|
134
|
-
}));
|
|
135
|
-
const coreSchema = {
|
|
136
|
-
userTable,
|
|
137
|
-
rolesTable,
|
|
138
|
-
permissionsTable,
|
|
139
|
-
usersToRolesTable,
|
|
140
|
-
usersToPermissionsTable,
|
|
141
|
-
rolesToPermissionsTable,
|
|
142
|
-
sessionTable,
|
|
143
|
-
emailVerificationTable,
|
|
144
|
-
passwordResetSessionTable,
|
|
145
|
-
notificationTable,
|
|
146
|
-
systemModulesTable
|
|
147
|
-
};
|
|
148
|
-
|
|
149
|
-
//#endregion
|
|
150
|
-
export { coreSchema, emailVerificationTable, notificationTable, passwordResetSessionTable, permissionsTable, relations, rolesTable, rolesToPermissionsTable, sessionTable, systemModulesTable, userTable, usersToPermissionsTable, usersToRolesTable };
|
|
1
|
+
import{defineRelations as e,sql as t}from"drizzle-orm";import{boolean as n,bytea as r,pgTable as i,text as a,timestamp as o}from"drizzle-orm/pg-core";const s=i(`users`,{id:a(`id`).$defaultFn(()=>crypto.randomUUID()).notNull().primaryKey(),email:a(`email`).notNull().unique(),name:a(`name`).notNull(),password:a(`password`),image:a(`image`),recovery_code:r(`recovery_code`).notNull(),emailVerifiedAt:o(`email_verified_at`,{precision:3}),createdAt:o(`created_at`,{precision:3}).notNull().defaultNow(),updatedAt:o(`updated_at`,{precision:3})}),c=i(`roles`,{id:a(`id`).$defaultFn(()=>crypto.randomUUID()).notNull().primaryKey(),name:a(`name`).notNull().unique(),description:a(`description`)}),l=i(`permissions`,{id:a(`id`).$defaultFn(()=>crypto.randomUUID()).notNull().primaryKey(),name:a(`name`).notNull().unique(),description:a(`description`)}),u=i(`users_to_roles`,{userId:a(`user_id`).notNull().references(()=>s.id,{onDelete:`cascade`}),roleId:a(`role_id`).notNull().references(()=>c.id,{onDelete:`cascade`})},e=>[{pk:t`PRIMARY KEY (${e.userId}, ${e.roleId})`}]),d=i(`users_to_permissions`,{userId:a(`user_id`).notNull().references(()=>s.id,{onDelete:`cascade`}),permissionId:a(`permission_id`).notNull().references(()=>l.id,{onDelete:`cascade`})},e=>[{pk:t`PRIMARY KEY (${e.userId}, ${e.permissionId})`}]),f=i(`roles_to_permissions`,{roleId:a(`role_id`).notNull().references(()=>c.id,{onDelete:`cascade`}),permissionId:a(`permission_id`).notNull().references(()=>l.id,{onDelete:`cascade`})},e=>[{pk:t`PRIMARY KEY (${e.roleId}, ${e.permissionId})`}]),p=i(`sessions`,{id:a(`id`).$defaultFn(()=>crypto.randomUUID()).notNull().primaryKey(),active_organization_id:a(`active_organization_id`),userId:a(`user_id`).notNull().references(()=>s.id,{onDelete:`cascade`,onUpdate:`cascade`}),expiresAt:o(`expires_at`,{precision:3}).notNull(),createdAt:o(`created_at`,{precision:3}).notNull().defaultNow(),updatedAt:o(`updated_at`,{precision:3})}),m=i(`email_verification_requests`,{id:a(`id`).$defaultFn(()=>crypto.randomUUID()).notNull().primaryKey(),email:a(`email`).notNull(),code:a(`code`).notNull(),userId:a(`user_id`).notNull().references(()=>s.id,{onDelete:`cascade`,onUpdate:`cascade`}),expiresAt:o(`expires_at`,{precision:3}).notNull(),createdAt:o(`created_at`,{precision:3}).notNull().defaultNow(),updatedAt:o(`updated_at`,{precision:3})}),h=i(`password_reset_sessions`,{id:a(`id`).$defaultFn(()=>crypto.randomUUID()).notNull().primaryKey(),email:a(`email`).notNull(),code:a(`code`).notNull(),emailVerified:n(`emailVerified`).default(!1),userId:a(`user_id`).notNull().references(()=>s.id,{onDelete:`cascade`,onUpdate:`cascade`}),expiresAt:o(`expires_at`,{precision:3}).notNull(),createdAt:o(`created_at`,{precision:3}).notNull().defaultNow(),updatedAt:o(`updated_at`,{precision:3})}),g=i(`notification`,{id:a(`id`).$defaultFn(()=>crypto.randomUUID()).notNull().primaryKey(),title:a(`title`).notNull(),content:a(`content`),target:a(`target`),type:a(`type`),isRead:n(`isRead`).notNull(),resourceId:a(`resource_id`),resourceType:a(`resource_type`),userId:a(`user_id`).notNull().references(()=>s.id,{onDelete:`cascade`,onUpdate:`cascade`}),createdAt:o(`created_at`,{precision:3}).notNull().defaultNow(),updatedAt:o(`updated_at`,{precision:3})}),_=i(`system_modules`,{id:a(`id`).notNull().primaryKey(),enabled:n(`enabled`).notNull().default(!1),installed:n(`installed`).notNull().default(!1),deleted:n(`deleted`).notNull().default(!1),system:n(`system`).notNull().default(!1),config:a(`config`),lastStep:a(`last_step`),updatedAt:o(`updated_at`,{precision:3}).defaultNow()}),v=e({user:s,emailVerification:m,passwordResetSession:h,session:p,notification:g,systemModulesTable:_},e=>({user:{sessions:e.many.session({from:e.user.id,to:e.session.userId}),emailVerification:e.many.emailVerification({from:e.user.id,to:e.emailVerification.userId}),passwordResetSession:e.many.passwordResetSession({from:e.user.id,to:e.passwordResetSession.userId})},session:{user:e.one.user({from:e.session.userId,to:e.user.id})},emailVerification:{user:e.one.user({from:e.emailVerification.userId,to:e.user.id})},passwordResetSession:{user:e.one.user({from:e.passwordResetSession.userId,to:e.user.id})}})),y={userTable:s,rolesTable:c,permissionsTable:l,usersToRolesTable:u,usersToPermissionsTable:d,rolesToPermissionsTable:f,sessionTable:p,emailVerificationTable:m,passwordResetSessionTable:h,notificationTable:g,systemModulesTable:_};export{y as coreSchema,m as emailVerificationTable,g as notificationTable,h as passwordResetSessionTable,l as permissionsTable,v as relations,c as rolesTable,f as rolesToPermissionsTable,p as sessionTable,_ as systemModulesTable,s as userTable,d as usersToPermissionsTable,u as usersToRolesTable};
|
|
151
2
|
//# sourceMappingURL=schema.mjs.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"schema.mjs","names":[],"sources":["../../../src/server/database/schema.ts"],"sourcesContent":["import { defineRelations, sql } from \"drizzle-orm\";\nimport { boolean, bytea, pgTable, text, timestamp } from \"drizzle-orm/pg-core\";\n\nexport const userTable = pgTable(\"users\", {\n id: text(\"id\")\n .$defaultFn(() => crypto.randomUUID())\n .notNull()\n .primaryKey(),\n email: text(\"email\").notNull().unique(),\n name: text(\"name\").notNull(),\n password: text(\"password\"),\n image: text(\"image\"),\n recovery_code: bytea(\"recovery_code\").notNull(),\n emailVerifiedAt: timestamp(\"email_verified_at\", { precision: 3 }),\n createdAt: timestamp(\"created_at\", { precision: 3 }).notNull().defaultNow(),\n updatedAt: timestamp(\"updated_at\", { precision: 3 }),\n});\n\nexport const rolesTable = pgTable(\"roles\", {\n id: text(\"id\")\n .$defaultFn(() => crypto.randomUUID())\n .notNull()\n .primaryKey(),\n name: text(\"name\").notNull().unique(), // np. \"admin\", \"user\"\n description: text(\"description\"),\n});\n\nexport const permissionsTable = pgTable(\"permissions\", {\n id: text(\"id\")\n .$defaultFn(() => crypto.randomUUID())\n .notNull()\n .primaryKey(),\n name: text(\"name\").notNull().unique(), // np. \"blog:write\"\n description: text(\"description\"),\n});\n\nexport const usersToRolesTable = pgTable(\n \"users_to_roles\",\n {\n userId: text(\"user_id\")\n .notNull()\n .references(() => userTable.id, { onDelete: \"cascade\" }),\n roleId: text(\"role_id\")\n .notNull()\n .references(() => rolesTable.id, { onDelete: \"cascade\" }),\n },\n (t) => [{ pk: sql`PRIMARY KEY (${t.userId}, ${t.roleId})` }],\n);\n\nexport const usersToPermissionsTable = pgTable(\n \"users_to_permissions\",\n {\n userId: text(\"user_id\")\n .notNull()\n .references(() => userTable.id, { onDelete: \"cascade\" }),\n permissionId: text(\"permission_id\")\n .notNull()\n .references(() => permissionsTable.id, { onDelete: \"cascade\" }),\n },\n (t) => [{ pk: sql`PRIMARY KEY (${t.userId}, ${t.permissionId})` }],\n);\n\nexport const rolesToPermissionsTable = pgTable(\n \"roles_to_permissions\",\n {\n roleId: text(\"role_id\")\n .notNull()\n .references(() => rolesTable.id, { onDelete: \"cascade\" }),\n permissionId: text(\"permission_id\")\n .notNull()\n .references(() => permissionsTable.id, { onDelete: \"cascade\" }),\n },\n (t) => [{ pk: sql`PRIMARY KEY (${t.roleId}, ${t.permissionId})` }],\n);\n\nexport const sessionTable = pgTable(\"sessions\", {\n id: text(\"id\")\n .$defaultFn(() => crypto.randomUUID())\n .notNull()\n .primaryKey(),\n active_organization_id: text(\"active_organization_id\"),\n userId: text(\"user_id\")\n .notNull()\n .references(() => userTable.id, {\n onDelete: \"cascade\",\n onUpdate: \"cascade\",\n }),\n expiresAt: timestamp(\"expires_at\", { precision: 3 }).notNull(),\n createdAt: timestamp(\"created_at\", { precision: 3 }).notNull().defaultNow(),\n updatedAt: timestamp(\"updated_at\", { precision: 3 }),\n});\n\nexport const emailVerificationTable = pgTable(\"email_verification_requests\", {\n id: text(\"id\")\n .$defaultFn(() => crypto.randomUUID())\n .notNull()\n .primaryKey(),\n email: text(\"email\").notNull(),\n code: text(\"code\").notNull(),\n userId: text(\"user_id\")\n .notNull()\n .references(() => userTable.id, {\n onDelete: \"cascade\",\n onUpdate: \"cascade\",\n }),\n expiresAt: timestamp(\"expires_at\", { precision: 3 }).notNull(),\n createdAt: timestamp(\"created_at\", { precision: 3 }).notNull().defaultNow(),\n updatedAt: timestamp(\"updated_at\", { precision: 3 }),\n});\n\nexport const passwordResetSessionTable = pgTable(\"password_reset_sessions\", {\n id: text(\"id\")\n .$defaultFn(() => crypto.randomUUID())\n .notNull()\n .primaryKey(),\n email: text(\"email\").notNull(),\n code: text(\"code\").notNull(),\n emailVerified: boolean(\"emailVerified\").default(false),\n userId: text(\"user_id\")\n .notNull()\n .references(() => userTable.id, {\n onDelete: \"cascade\",\n onUpdate: \"cascade\",\n }),\n expiresAt: timestamp(\"expires_at\", { precision: 3 }).notNull(),\n createdAt: timestamp(\"created_at\", { precision: 3 }).notNull().defaultNow(),\n updatedAt: timestamp(\"updated_at\", { precision: 3 }),\n});\n\nexport const notificationTable = pgTable(\"notification\", {\n id: text(\"id\")\n .$defaultFn(() => crypto.randomUUID())\n .notNull()\n .primaryKey(),\n title: text(\"title\").notNull(),\n content: text(\"content\"),\n target: text(\"target\"),\n type: text(\"type\"),\n isRead: boolean(\"isRead\").notNull(),\n resourceId: text(\"resource_id\"),\n resourceType: text(\"resource_type\"),\n userId: text(\"user_id\")\n .notNull()\n .references(() => userTable.id, {\n onDelete: \"cascade\",\n onUpdate: \"cascade\",\n }),\n createdAt: timestamp(\"created_at\", { precision: 3 }).notNull().defaultNow(),\n updatedAt: timestamp(\"updated_at\", { precision: 3 }),\n});\n\nexport const systemModulesTable = pgTable(\"system_modules\", {\n id: text(\"id\").notNull().primaryKey(),\n enabled: boolean(\"enabled\").notNull().default(false),\n installed: boolean(\"installed\").notNull().default(false),\n deleted: boolean(\"deleted\").notNull().default(false),\n system: boolean(\"system\").notNull().default(false),\n config: text(\"config\"),\n lastStep: text(\"last_step\"), // Przechowuje aktualny etap (np. \"Syncing DB\")\n updatedAt: timestamp(\"updated_at\", { precision: 3 }).defaultNow(),\n});\n\nexport const relations = defineRelations(\n {\n user: userTable,\n emailVerification: emailVerificationTable,\n passwordResetSession: passwordResetSessionTable,\n session: sessionTable,\n notification: notificationTable,\n systemModulesTable: systemModulesTable,\n },\n (r) => ({\n user: {\n sessions: r.many.session({\n from: r.user.id,\n to: r.session.userId,\n }),\n emailVerification: r.many.emailVerification({\n from: r.user.id,\n to: r.emailVerification.userId,\n }),\n passwordResetSession: r.many.passwordResetSession({\n from: r.user.id,\n to: r.passwordResetSession.userId,\n }),\n },\n\n session: {\n user: r.one.user({\n from: r.session.userId,\n to: r.user.id,\n }),\n },\n\n emailVerification: {\n user: r.one.user({\n from: r.emailVerification.userId,\n to: r.user.id,\n }),\n },\n\n passwordResetSession: {\n user: r.one.user({\n from: r.passwordResetSession.userId,\n to: r.user.id,\n }),\n },\n }),\n);\n\nexport const coreSchema = {\n userTable,\n rolesTable,\n permissionsTable,\n usersToRolesTable,\n usersToPermissionsTable,\n rolesToPermissionsTable,\n sessionTable,\n emailVerificationTable,\n passwordResetSessionTable,\n notificationTable,\n systemModulesTable,\n};\n\nexport type DatabaseSchema = typeof relations;\n"],"mappings":";;;;AAGA,MAAa,YAAY,QAAQ,SAAS;CACxC,IAAI,KAAK,KAAK,CACX,iBAAiB,OAAO,YAAY,CAAC,CACrC,SAAS,CACT,YAAY;CACf,OAAO,KAAK,QAAQ,CAAC,SAAS,CAAC,QAAQ;CACvC,MAAM,KAAK,OAAO,CAAC,SAAS;CAC5B,UAAU,KAAK,WAAW;CAC1B,OAAO,KAAK,QAAQ;CACpB,eAAe,MAAM,gBAAgB,CAAC,SAAS;CAC/C,iBAAiB,UAAU,qBAAqB,EAAE,WAAW,GAAG,CAAC;CACjE,WAAW,UAAU,cAAc,EAAE,WAAW,GAAG,CAAC,CAAC,SAAS,CAAC,YAAY;CAC3E,WAAW,UAAU,cAAc,EAAE,WAAW,GAAG,CAAC;CACrD,CAAC;AAEF,MAAa,aAAa,QAAQ,SAAS;CACzC,IAAI,KAAK,KAAK,CACX,iBAAiB,OAAO,YAAY,CAAC,CACrC,SAAS,CACT,YAAY;CACf,MAAM,KAAK,OAAO,CAAC,SAAS,CAAC,QAAQ;CACrC,aAAa,KAAK,cAAc;CACjC,CAAC;AAEF,MAAa,mBAAmB,QAAQ,eAAe;CACrD,IAAI,KAAK,KAAK,CACX,iBAAiB,OAAO,YAAY,CAAC,CACrC,SAAS,CACT,YAAY;CACf,MAAM,KAAK,OAAO,CAAC,SAAS,CAAC,QAAQ;CACrC,aAAa,KAAK,cAAc;CACjC,CAAC;AAEF,MAAa,oBAAoB,QAC/B,kBACA;CACE,QAAQ,KAAK,UAAU,CACpB,SAAS,CACT,iBAAiB,UAAU,IAAI,EAAE,UAAU,WAAW,CAAC;CAC1D,QAAQ,KAAK,UAAU,CACpB,SAAS,CACT,iBAAiB,WAAW,IAAI,EAAE,UAAU,WAAW,CAAC;CAC5D,GACA,MAAM,CAAC,EAAE,IAAI,GAAG,gBAAgB,EAAE,OAAO,IAAI,EAAE,OAAO,IAAI,CAAC,CAC7D;AAED,MAAa,0BAA0B,QACrC,wBACA;CACE,QAAQ,KAAK,UAAU,CACpB,SAAS,CACT,iBAAiB,UAAU,IAAI,EAAE,UAAU,WAAW,CAAC;CAC1D,cAAc,KAAK,gBAAgB,CAChC,SAAS,CACT,iBAAiB,iBAAiB,IAAI,EAAE,UAAU,WAAW,CAAC;CAClE,GACA,MAAM,CAAC,EAAE,IAAI,GAAG,gBAAgB,EAAE,OAAO,IAAI,EAAE,aAAa,IAAI,CAAC,CACnE;AAED,MAAa,0BAA0B,QACrC,wBACA;CACE,QAAQ,KAAK,UAAU,CACpB,SAAS,CACT,iBAAiB,WAAW,IAAI,EAAE,UAAU,WAAW,CAAC;CAC3D,cAAc,KAAK,gBAAgB,CAChC,SAAS,CACT,iBAAiB,iBAAiB,IAAI,EAAE,UAAU,WAAW,CAAC;CAClE,GACA,MAAM,CAAC,EAAE,IAAI,GAAG,gBAAgB,EAAE,OAAO,IAAI,EAAE,aAAa,IAAI,CAAC,CACnE;AAED,MAAa,eAAe,QAAQ,YAAY;CAC9C,IAAI,KAAK,KAAK,CACX,iBAAiB,OAAO,YAAY,CAAC,CACrC,SAAS,CACT,YAAY;CACf,wBAAwB,KAAK,yBAAyB;CACtD,QAAQ,KAAK,UAAU,CACpB,SAAS,CACT,iBAAiB,UAAU,IAAI;EAC9B,UAAU;EACV,UAAU;EACX,CAAC;CACJ,WAAW,UAAU,cAAc,EAAE,WAAW,GAAG,CAAC,CAAC,SAAS;CAC9D,WAAW,UAAU,cAAc,EAAE,WAAW,GAAG,CAAC,CAAC,SAAS,CAAC,YAAY;CAC3E,WAAW,UAAU,cAAc,EAAE,WAAW,GAAG,CAAC;CACrD,CAAC;AAEF,MAAa,yBAAyB,QAAQ,+BAA+B;CAC3E,IAAI,KAAK,KAAK,CACX,iBAAiB,OAAO,YAAY,CAAC,CACrC,SAAS,CACT,YAAY;CACf,OAAO,KAAK,QAAQ,CAAC,SAAS;CAC9B,MAAM,KAAK,OAAO,CAAC,SAAS;CAC5B,QAAQ,KAAK,UAAU,CACpB,SAAS,CACT,iBAAiB,UAAU,IAAI;EAC9B,UAAU;EACV,UAAU;EACX,CAAC;CACJ,WAAW,UAAU,cAAc,EAAE,WAAW,GAAG,CAAC,CAAC,SAAS;CAC9D,WAAW,UAAU,cAAc,EAAE,WAAW,GAAG,CAAC,CAAC,SAAS,CAAC,YAAY;CAC3E,WAAW,UAAU,cAAc,EAAE,WAAW,GAAG,CAAC;CACrD,CAAC;AAEF,MAAa,4BAA4B,QAAQ,2BAA2B;CAC1E,IAAI,KAAK,KAAK,CACX,iBAAiB,OAAO,YAAY,CAAC,CACrC,SAAS,CACT,YAAY;CACf,OAAO,KAAK,QAAQ,CAAC,SAAS;CAC9B,MAAM,KAAK,OAAO,CAAC,SAAS;CAC5B,eAAe,QAAQ,gBAAgB,CAAC,QAAQ,MAAM;CACtD,QAAQ,KAAK,UAAU,CACpB,SAAS,CACT,iBAAiB,UAAU,IAAI;EAC9B,UAAU;EACV,UAAU;EACX,CAAC;CACJ,WAAW,UAAU,cAAc,EAAE,WAAW,GAAG,CAAC,CAAC,SAAS;CAC9D,WAAW,UAAU,cAAc,EAAE,WAAW,GAAG,CAAC,CAAC,SAAS,CAAC,YAAY;CAC3E,WAAW,UAAU,cAAc,EAAE,WAAW,GAAG,CAAC;CACrD,CAAC;AAEF,MAAa,oBAAoB,QAAQ,gBAAgB;CACvD,IAAI,KAAK,KAAK,CACX,iBAAiB,OAAO,YAAY,CAAC,CACrC,SAAS,CACT,YAAY;CACf,OAAO,KAAK,QAAQ,CAAC,SAAS;CAC9B,SAAS,KAAK,UAAU;CACxB,QAAQ,KAAK,SAAS;CACtB,MAAM,KAAK,OAAO;CAClB,QAAQ,QAAQ,SAAS,CAAC,SAAS;CACnC,YAAY,KAAK,cAAc;CAC/B,cAAc,KAAK,gBAAgB;CACnC,QAAQ,KAAK,UAAU,CACpB,SAAS,CACT,iBAAiB,UAAU,IAAI;EAC9B,UAAU;EACV,UAAU;EACX,CAAC;CACJ,WAAW,UAAU,cAAc,EAAE,WAAW,GAAG,CAAC,CAAC,SAAS,CAAC,YAAY;CAC3E,WAAW,UAAU,cAAc,EAAE,WAAW,GAAG,CAAC;CACrD,CAAC;AAEF,MAAa,qBAAqB,QAAQ,kBAAkB;CAC1D,IAAI,KAAK,KAAK,CAAC,SAAS,CAAC,YAAY;CACrC,SAAS,QAAQ,UAAU,CAAC,SAAS,CAAC,QAAQ,MAAM;CACpD,WAAW,QAAQ,YAAY,CAAC,SAAS,CAAC,QAAQ,MAAM;CACxD,SAAS,QAAQ,UAAU,CAAC,SAAS,CAAC,QAAQ,MAAM;CACpD,QAAQ,QAAQ,SAAS,CAAC,SAAS,CAAC,QAAQ,MAAM;CAClD,QAAQ,KAAK,SAAS;CACtB,UAAU,KAAK,YAAY;CAC3B,WAAW,UAAU,cAAc,EAAE,WAAW,GAAG,CAAC,CAAC,YAAY;CAClE,CAAC;AAEF,MAAa,YAAY,gBACvB;CACE,MAAM;CACN,mBAAmB;CACnB,sBAAsB;CACtB,SAAS;CACT,cAAc;CACM;CACrB,GACA,OAAO;CACN,MAAM;EACJ,UAAU,EAAE,KAAK,QAAQ;GACvB,MAAM,EAAE,KAAK;GACb,IAAI,EAAE,QAAQ;GACf,CAAC;EACF,mBAAmB,EAAE,KAAK,kBAAkB;GAC1C,MAAM,EAAE,KAAK;GACb,IAAI,EAAE,kBAAkB;GACzB,CAAC;EACF,sBAAsB,EAAE,KAAK,qBAAqB;GAChD,MAAM,EAAE,KAAK;GACb,IAAI,EAAE,qBAAqB;GAC5B,CAAC;EACH;CAED,SAAS,EACP,MAAM,EAAE,IAAI,KAAK;EACf,MAAM,EAAE,QAAQ;EAChB,IAAI,EAAE,KAAK;EACZ,CAAC,EACH;CAED,mBAAmB,EACjB,MAAM,EAAE,IAAI,KAAK;EACf,MAAM,EAAE,kBAAkB;EAC1B,IAAI,EAAE,KAAK;EACZ,CAAC,EACH;CAED,sBAAsB,EACpB,MAAM,EAAE,IAAI,KAAK;EACf,MAAM,EAAE,qBAAqB;EAC7B,IAAI,EAAE,KAAK;EACZ,CAAC,EACH;CACF,EACF;AAED,MAAa,aAAa;CACxB;CACA;CACA;CACA;CACA;CACA;CACA;CACA;CACA;CACA;CACA;CACD"}
|
|
1
|
+
{"version":3,"file":"schema.mjs","names":[],"sources":["../../../src/server/database/schema.ts"],"sourcesContent":["import { defineRelations, sql } from \"drizzle-orm\";\nimport { boolean, bytea, pgTable, text, timestamp } from \"drizzle-orm/pg-core\";\n\nexport const userTable = pgTable(\"users\", {\n id: text(\"id\")\n .$defaultFn(() => crypto.randomUUID())\n .notNull()\n .primaryKey(),\n email: text(\"email\").notNull().unique(),\n name: text(\"name\").notNull(),\n password: text(\"password\"),\n image: text(\"image\"),\n recovery_code: bytea(\"recovery_code\").notNull(),\n emailVerifiedAt: timestamp(\"email_verified_at\", { precision: 3 }),\n createdAt: timestamp(\"created_at\", { precision: 3 }).notNull().defaultNow(),\n updatedAt: timestamp(\"updated_at\", { precision: 3 }),\n});\n\nexport const rolesTable = pgTable(\"roles\", {\n id: text(\"id\")\n .$defaultFn(() => crypto.randomUUID())\n .notNull()\n .primaryKey(),\n name: text(\"name\").notNull().unique(), // np. \"admin\", \"user\"\n description: text(\"description\"),\n});\n\nexport const permissionsTable = pgTable(\"permissions\", {\n id: text(\"id\")\n .$defaultFn(() => crypto.randomUUID())\n .notNull()\n .primaryKey(),\n name: text(\"name\").notNull().unique(), // np. \"blog:write\"\n description: text(\"description\"),\n});\n\nexport const usersToRolesTable = pgTable(\n \"users_to_roles\",\n {\n userId: text(\"user_id\")\n .notNull()\n .references(() => userTable.id, { onDelete: \"cascade\" }),\n roleId: text(\"role_id\")\n .notNull()\n .references(() => rolesTable.id, { onDelete: \"cascade\" }),\n },\n (t) => [{ pk: sql`PRIMARY KEY (${t.userId}, ${t.roleId})` }],\n);\n\nexport const usersToPermissionsTable = pgTable(\n \"users_to_permissions\",\n {\n userId: text(\"user_id\")\n .notNull()\n .references(() => userTable.id, { onDelete: \"cascade\" }),\n permissionId: text(\"permission_id\")\n .notNull()\n .references(() => permissionsTable.id, { onDelete: \"cascade\" }),\n },\n (t) => [{ pk: sql`PRIMARY KEY (${t.userId}, ${t.permissionId})` }],\n);\n\nexport const rolesToPermissionsTable = pgTable(\n \"roles_to_permissions\",\n {\n roleId: text(\"role_id\")\n .notNull()\n .references(() => rolesTable.id, { onDelete: \"cascade\" }),\n permissionId: text(\"permission_id\")\n .notNull()\n .references(() => permissionsTable.id, { onDelete: \"cascade\" }),\n },\n (t) => [{ pk: sql`PRIMARY KEY (${t.roleId}, ${t.permissionId})` }],\n);\n\nexport const sessionTable = pgTable(\"sessions\", {\n id: text(\"id\")\n .$defaultFn(() => crypto.randomUUID())\n .notNull()\n .primaryKey(),\n active_organization_id: text(\"active_organization_id\"),\n userId: text(\"user_id\")\n .notNull()\n .references(() => userTable.id, {\n onDelete: \"cascade\",\n onUpdate: \"cascade\",\n }),\n expiresAt: timestamp(\"expires_at\", { precision: 3 }).notNull(),\n createdAt: timestamp(\"created_at\", { precision: 3 }).notNull().defaultNow(),\n updatedAt: timestamp(\"updated_at\", { precision: 3 }),\n});\n\nexport const emailVerificationTable = pgTable(\"email_verification_requests\", {\n id: text(\"id\")\n .$defaultFn(() => crypto.randomUUID())\n .notNull()\n .primaryKey(),\n email: text(\"email\").notNull(),\n code: text(\"code\").notNull(),\n userId: text(\"user_id\")\n .notNull()\n .references(() => userTable.id, {\n onDelete: \"cascade\",\n onUpdate: \"cascade\",\n }),\n expiresAt: timestamp(\"expires_at\", { precision: 3 }).notNull(),\n createdAt: timestamp(\"created_at\", { precision: 3 }).notNull().defaultNow(),\n updatedAt: timestamp(\"updated_at\", { precision: 3 }),\n});\n\nexport const passwordResetSessionTable = pgTable(\"password_reset_sessions\", {\n id: text(\"id\")\n .$defaultFn(() => crypto.randomUUID())\n .notNull()\n .primaryKey(),\n email: text(\"email\").notNull(),\n code: text(\"code\").notNull(),\n emailVerified: boolean(\"emailVerified\").default(false),\n userId: text(\"user_id\")\n .notNull()\n .references(() => userTable.id, {\n onDelete: \"cascade\",\n onUpdate: \"cascade\",\n }),\n expiresAt: timestamp(\"expires_at\", { precision: 3 }).notNull(),\n createdAt: timestamp(\"created_at\", { precision: 3 }).notNull().defaultNow(),\n updatedAt: timestamp(\"updated_at\", { precision: 3 }),\n});\n\nexport const notificationTable = pgTable(\"notification\", {\n id: text(\"id\")\n .$defaultFn(() => crypto.randomUUID())\n .notNull()\n .primaryKey(),\n title: text(\"title\").notNull(),\n content: text(\"content\"),\n target: text(\"target\"),\n type: text(\"type\"),\n isRead: boolean(\"isRead\").notNull(),\n resourceId: text(\"resource_id\"),\n resourceType: text(\"resource_type\"),\n userId: text(\"user_id\")\n .notNull()\n .references(() => userTable.id, {\n onDelete: \"cascade\",\n onUpdate: \"cascade\",\n }),\n createdAt: timestamp(\"created_at\", { precision: 3 }).notNull().defaultNow(),\n updatedAt: timestamp(\"updated_at\", { precision: 3 }),\n});\n\nexport const systemModulesTable = pgTable(\"system_modules\", {\n id: text(\"id\").notNull().primaryKey(),\n enabled: boolean(\"enabled\").notNull().default(false),\n installed: boolean(\"installed\").notNull().default(false),\n deleted: boolean(\"deleted\").notNull().default(false),\n system: boolean(\"system\").notNull().default(false),\n config: text(\"config\"),\n lastStep: text(\"last_step\"), // Przechowuje aktualny etap (np. \"Syncing DB\")\n updatedAt: timestamp(\"updated_at\", { precision: 3 }).defaultNow(),\n});\n\nexport const relations = defineRelations(\n {\n user: userTable,\n emailVerification: emailVerificationTable,\n passwordResetSession: passwordResetSessionTable,\n session: sessionTable,\n notification: notificationTable,\n systemModulesTable: systemModulesTable,\n },\n (r) => ({\n user: {\n sessions: r.many.session({\n from: r.user.id,\n to: r.session.userId,\n }),\n emailVerification: r.many.emailVerification({\n from: r.user.id,\n to: r.emailVerification.userId,\n }),\n passwordResetSession: r.many.passwordResetSession({\n from: r.user.id,\n to: r.passwordResetSession.userId,\n }),\n },\n\n session: {\n user: r.one.user({\n from: r.session.userId,\n to: r.user.id,\n }),\n },\n\n emailVerification: {\n user: r.one.user({\n from: r.emailVerification.userId,\n to: r.user.id,\n }),\n },\n\n passwordResetSession: {\n user: r.one.user({\n from: r.passwordResetSession.userId,\n to: r.user.id,\n }),\n },\n }),\n);\n\nexport const coreSchema = {\n userTable,\n rolesTable,\n permissionsTable,\n usersToRolesTable,\n usersToPermissionsTable,\n rolesToPermissionsTable,\n sessionTable,\n emailVerificationTable,\n passwordResetSessionTable,\n notificationTable,\n systemModulesTable,\n};\n\nexport type DatabaseSchema = typeof relations;\n"],"mappings":"sJAGA,MAAa,EAAY,EAAQ,QAAS,CACxC,GAAI,EAAK,KAAK,CACX,eAAiB,OAAO,YAAY,CAAC,CACrC,SAAS,CACT,YAAY,CACf,MAAO,EAAK,QAAQ,CAAC,SAAS,CAAC,QAAQ,CACvC,KAAM,EAAK,OAAO,CAAC,SAAS,CAC5B,SAAU,EAAK,WAAW,CAC1B,MAAO,EAAK,QAAQ,CACpB,cAAe,EAAM,gBAAgB,CAAC,SAAS,CAC/C,gBAAiB,EAAU,oBAAqB,CAAE,UAAW,EAAG,CAAC,CACjE,UAAW,EAAU,aAAc,CAAE,UAAW,EAAG,CAAC,CAAC,SAAS,CAAC,YAAY,CAC3E,UAAW,EAAU,aAAc,CAAE,UAAW,EAAG,CAAC,CACrD,CAAC,CAEW,EAAa,EAAQ,QAAS,CACzC,GAAI,EAAK,KAAK,CACX,eAAiB,OAAO,YAAY,CAAC,CACrC,SAAS,CACT,YAAY,CACf,KAAM,EAAK,OAAO,CAAC,SAAS,CAAC,QAAQ,CACrC,YAAa,EAAK,cAAc,CACjC,CAAC,CAEW,EAAmB,EAAQ,cAAe,CACrD,GAAI,EAAK,KAAK,CACX,eAAiB,OAAO,YAAY,CAAC,CACrC,SAAS,CACT,YAAY,CACf,KAAM,EAAK,OAAO,CAAC,SAAS,CAAC,QAAQ,CACrC,YAAa,EAAK,cAAc,CACjC,CAAC,CAEW,EAAoB,EAC/B,iBACA,CACE,OAAQ,EAAK,UAAU,CACpB,SAAS,CACT,eAAiB,EAAU,GAAI,CAAE,SAAU,UAAW,CAAC,CAC1D,OAAQ,EAAK,UAAU,CACpB,SAAS,CACT,eAAiB,EAAW,GAAI,CAAE,SAAU,UAAW,CAAC,CAC5D,CACA,GAAM,CAAC,CAAE,GAAI,CAAG,gBAAgB,EAAE,OAAO,IAAI,EAAE,OAAO,GAAI,CAAC,CAC7D,CAEY,EAA0B,EACrC,uBACA,CACE,OAAQ,EAAK,UAAU,CACpB,SAAS,CACT,eAAiB,EAAU,GAAI,CAAE,SAAU,UAAW,CAAC,CAC1D,aAAc,EAAK,gBAAgB,CAChC,SAAS,CACT,eAAiB,EAAiB,GAAI,CAAE,SAAU,UAAW,CAAC,CAClE,CACA,GAAM,CAAC,CAAE,GAAI,CAAG,gBAAgB,EAAE,OAAO,IAAI,EAAE,aAAa,GAAI,CAAC,CACnE,CAEY,EAA0B,EACrC,uBACA,CACE,OAAQ,EAAK,UAAU,CACpB,SAAS,CACT,eAAiB,EAAW,GAAI,CAAE,SAAU,UAAW,CAAC,CAC3D,aAAc,EAAK,gBAAgB,CAChC,SAAS,CACT,eAAiB,EAAiB,GAAI,CAAE,SAAU,UAAW,CAAC,CAClE,CACA,GAAM,CAAC,CAAE,GAAI,CAAG,gBAAgB,EAAE,OAAO,IAAI,EAAE,aAAa,GAAI,CAAC,CACnE,CAEY,EAAe,EAAQ,WAAY,CAC9C,GAAI,EAAK,KAAK,CACX,eAAiB,OAAO,YAAY,CAAC,CACrC,SAAS,CACT,YAAY,CACf,uBAAwB,EAAK,yBAAyB,CACtD,OAAQ,EAAK,UAAU,CACpB,SAAS,CACT,eAAiB,EAAU,GAAI,CAC9B,SAAU,UACV,SAAU,UACX,CAAC,CACJ,UAAW,EAAU,aAAc,CAAE,UAAW,EAAG,CAAC,CAAC,SAAS,CAC9D,UAAW,EAAU,aAAc,CAAE,UAAW,EAAG,CAAC,CAAC,SAAS,CAAC,YAAY,CAC3E,UAAW,EAAU,aAAc,CAAE,UAAW,EAAG,CAAC,CACrD,CAAC,CAEW,EAAyB,EAAQ,8BAA+B,CAC3E,GAAI,EAAK,KAAK,CACX,eAAiB,OAAO,YAAY,CAAC,CACrC,SAAS,CACT,YAAY,CACf,MAAO,EAAK,QAAQ,CAAC,SAAS,CAC9B,KAAM,EAAK,OAAO,CAAC,SAAS,CAC5B,OAAQ,EAAK,UAAU,CACpB,SAAS,CACT,eAAiB,EAAU,GAAI,CAC9B,SAAU,UACV,SAAU,UACX,CAAC,CACJ,UAAW,EAAU,aAAc,CAAE,UAAW,EAAG,CAAC,CAAC,SAAS,CAC9D,UAAW,EAAU,aAAc,CAAE,UAAW,EAAG,CAAC,CAAC,SAAS,CAAC,YAAY,CAC3E,UAAW,EAAU,aAAc,CAAE,UAAW,EAAG,CAAC,CACrD,CAAC,CAEW,EAA4B,EAAQ,0BAA2B,CAC1E,GAAI,EAAK,KAAK,CACX,eAAiB,OAAO,YAAY,CAAC,CACrC,SAAS,CACT,YAAY,CACf,MAAO,EAAK,QAAQ,CAAC,SAAS,CAC9B,KAAM,EAAK,OAAO,CAAC,SAAS,CAC5B,cAAe,EAAQ,gBAAgB,CAAC,QAAQ,GAAM,CACtD,OAAQ,EAAK,UAAU,CACpB,SAAS,CACT,eAAiB,EAAU,GAAI,CAC9B,SAAU,UACV,SAAU,UACX,CAAC,CACJ,UAAW,EAAU,aAAc,CAAE,UAAW,EAAG,CAAC,CAAC,SAAS,CAC9D,UAAW,EAAU,aAAc,CAAE,UAAW,EAAG,CAAC,CAAC,SAAS,CAAC,YAAY,CAC3E,UAAW,EAAU,aAAc,CAAE,UAAW,EAAG,CAAC,CACrD,CAAC,CAEW,EAAoB,EAAQ,eAAgB,CACvD,GAAI,EAAK,KAAK,CACX,eAAiB,OAAO,YAAY,CAAC,CACrC,SAAS,CACT,YAAY,CACf,MAAO,EAAK,QAAQ,CAAC,SAAS,CAC9B,QAAS,EAAK,UAAU,CACxB,OAAQ,EAAK,SAAS,CACtB,KAAM,EAAK,OAAO,CAClB,OAAQ,EAAQ,SAAS,CAAC,SAAS,CACnC,WAAY,EAAK,cAAc,CAC/B,aAAc,EAAK,gBAAgB,CACnC,OAAQ,EAAK,UAAU,CACpB,SAAS,CACT,eAAiB,EAAU,GAAI,CAC9B,SAAU,UACV,SAAU,UACX,CAAC,CACJ,UAAW,EAAU,aAAc,CAAE,UAAW,EAAG,CAAC,CAAC,SAAS,CAAC,YAAY,CAC3E,UAAW,EAAU,aAAc,CAAE,UAAW,EAAG,CAAC,CACrD,CAAC,CAEW,EAAqB,EAAQ,iBAAkB,CAC1D,GAAI,EAAK,KAAK,CAAC,SAAS,CAAC,YAAY,CACrC,QAAS,EAAQ,UAAU,CAAC,SAAS,CAAC,QAAQ,GAAM,CACpD,UAAW,EAAQ,YAAY,CAAC,SAAS,CAAC,QAAQ,GAAM,CACxD,QAAS,EAAQ,UAAU,CAAC,SAAS,CAAC,QAAQ,GAAM,CACpD,OAAQ,EAAQ,SAAS,CAAC,SAAS,CAAC,QAAQ,GAAM,CAClD,OAAQ,EAAK,SAAS,CACtB,SAAU,EAAK,YAAY,CAC3B,UAAW,EAAU,aAAc,CAAE,UAAW,EAAG,CAAC,CAAC,YAAY,CAClE,CAAC,CAEW,EAAY,EACvB,CACE,KAAM,EACN,kBAAmB,EACnB,qBAAsB,EACtB,QAAS,EACT,aAAc,EACM,qBACrB,CACA,IAAO,CACN,KAAM,CACJ,SAAU,EAAE,KAAK,QAAQ,CACvB,KAAM,EAAE,KAAK,GACb,GAAI,EAAE,QAAQ,OACf,CAAC,CACF,kBAAmB,EAAE,KAAK,kBAAkB,CAC1C,KAAM,EAAE,KAAK,GACb,GAAI,EAAE,kBAAkB,OACzB,CAAC,CACF,qBAAsB,EAAE,KAAK,qBAAqB,CAChD,KAAM,EAAE,KAAK,GACb,GAAI,EAAE,qBAAqB,OAC5B,CAAC,CACH,CAED,QAAS,CACP,KAAM,EAAE,IAAI,KAAK,CACf,KAAM,EAAE,QAAQ,OAChB,GAAI,EAAE,KAAK,GACZ,CAAC,CACH,CAED,kBAAmB,CACjB,KAAM,EAAE,IAAI,KAAK,CACf,KAAM,EAAE,kBAAkB,OAC1B,GAAI,EAAE,KAAK,GACZ,CAAC,CACH,CAED,qBAAsB,CACpB,KAAM,EAAE,IAAI,KAAK,CACf,KAAM,EAAE,qBAAqB,OAC7B,GAAI,EAAE,KAAK,GACZ,CAAC,CACH,CACF,EACF,CAEY,EAAa,CACxB,YACA,aACA,mBACA,oBACA,0BACA,0BACA,eACA,yBACA,4BACA,oBACA,qBACD"}
|
|
@@ -1,32 +1 @@
|
|
|
1
|
-
"use server";
|
|
2
|
-
|
|
3
|
-
|
|
4
|
-
//#region src/server/emails/index.ts
|
|
5
|
-
/**
|
|
6
|
-
* Sends an email with a verification link.
|
|
7
|
-
* @param email Recipient's email address.
|
|
8
|
-
* @param code Verification code.
|
|
9
|
-
*/
|
|
10
|
-
async function sendVerifyEmail(email, code) {}
|
|
11
|
-
/**
|
|
12
|
-
* Sends an email with a password reset link.
|
|
13
|
-
* @param email Recipient's email address.
|
|
14
|
-
* @param code Password reset code.
|
|
15
|
-
*/
|
|
16
|
-
async function sendResetPassword(email, code) {}
|
|
17
|
-
/**
|
|
18
|
-
* Sends an email with a recovery code.
|
|
19
|
-
* @param email Recipient's email address.
|
|
20
|
-
* @param recoveryCode Recovery code
|
|
21
|
-
*/
|
|
22
|
-
async function sendRecoveryCode(email, recoveryCode) {}
|
|
23
|
-
/**
|
|
24
|
-
* Sends a 2FA code via email.
|
|
25
|
-
*/
|
|
26
|
-
async function send2FACode(email, code) {}
|
|
27
|
-
|
|
28
|
-
//#endregion
|
|
29
|
-
exports.send2FACode = send2FACode;
|
|
30
|
-
exports.sendRecoveryCode = sendRecoveryCode;
|
|
31
|
-
exports.sendResetPassword = sendResetPassword;
|
|
32
|
-
exports.sendVerifyEmail = sendVerifyEmail;
|
|
1
|
+
"use server";async function e(e,t){}async function t(e,t){}async function n(e,t){}async function r(e,t){}exports.send2FACode=r,exports.sendRecoveryCode=n,exports.sendResetPassword=t,exports.sendVerifyEmail=e;
|
|
@@ -1,29 +1,2 @@
|
|
|
1
|
-
"use server";
|
|
2
|
-
|
|
3
|
-
//#region src/server/emails/index.ts
|
|
4
|
-
/**
|
|
5
|
-
* Sends an email with a verification link.
|
|
6
|
-
* @param email Recipient's email address.
|
|
7
|
-
* @param code Verification code.
|
|
8
|
-
*/
|
|
9
|
-
async function sendVerifyEmail(email, code) {}
|
|
10
|
-
/**
|
|
11
|
-
* Sends an email with a password reset link.
|
|
12
|
-
* @param email Recipient's email address.
|
|
13
|
-
* @param code Password reset code.
|
|
14
|
-
*/
|
|
15
|
-
async function sendResetPassword(email, code) {}
|
|
16
|
-
/**
|
|
17
|
-
* Sends an email with a recovery code.
|
|
18
|
-
* @param email Recipient's email address.
|
|
19
|
-
* @param recoveryCode Recovery code
|
|
20
|
-
*/
|
|
21
|
-
async function sendRecoveryCode(email, recoveryCode) {}
|
|
22
|
-
/**
|
|
23
|
-
* Sends a 2FA code via email.
|
|
24
|
-
*/
|
|
25
|
-
async function send2FACode(email, code) {}
|
|
26
|
-
|
|
27
|
-
//#endregion
|
|
28
|
-
export { send2FACode, sendRecoveryCode, sendResetPassword, sendVerifyEmail };
|
|
1
|
+
"use server";async function e(e,t){}async function t(e,t){}async function n(e,t){}async function r(e,t){}export{r as send2FACode,n as sendRecoveryCode,t as sendResetPassword,e as sendVerifyEmail};
|
|
29
2
|
//# sourceMappingURL=index.mjs.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.mjs","names":[],"sources":["../../../src/server/emails/index.ts"],"sourcesContent":["\"use server\";\n\n// import nodemailer from \"nodemailer\";\n\n// Konfiguracja transportera SMTP\n// const transporter = nodemailer.createTransport({\n// service: \"gmail\",\n// auth: {\n// user: process.env.GOOGLE_SMTP_APP_USERNAME,\n// pass: process.env.GOOGLE_SMTP_APP_PASSWORD,\n// },\n// });\n\n/**\n * Sends an email with a verification link.\n * @param email Recipient's email address.\n * @param code Verification code.\n */\nexport async function sendVerifyEmail(email: string, code: string) {\n // const { t } = await getTranslation();\n // await transporter.sendMail({\n // from: `Winkly <${process.env.GOOGLE_SMTP_APP_USERNAME}>`,\n // to: email,\n // subject: t(\"Verify Email\"),\n // text: t(\"Verify your email address with your code: {{ code }}\", { code }),\n // });\n}\n\n/**\n * Sends an email with a password reset link.\n * @param email Recipient's email address.\n * @param code Password reset code.\n */\nexport async function sendResetPassword(email: string, code: string) {\n // const { t } = await getTranslation();\n // await transporter.sendMail({\n // from: `Winkly <${process.env.GOOGLE_SMTP_APP_USERNAME}>`,\n // to: email,\n // subject: t(\"Password Reset\"),\n // text: t(\"Verify password reset with code: {{ code }}\", { code }),\n // });\n}\n\n/**\n * Sends an email with a recovery code.\n * @param email Recipient's email address.\n * @param recoveryCode Recovery code\n */\nexport async function sendRecoveryCode(email: string, recoveryCode: string) {\n // const { t } = await getTranslation();\n // await transporter.sendMail({\n // from: `Winkly <${process.env.GOOGLE_SMTP_APP_USERNAME}>`,\n // to: email,\n // subject: t(\"Recovery Code\"),\n // text: t(\"Your recovery code is: {{ recoveryCode }}\", { recoveryCode }),\n // });\n}\n\n/**\n * Sends a 2FA code via email.\n */\nexport async function send2FACode(email: string, code: string) {\n // const { t } = await getTranslation();\n // await transporter.sendMail({\n // from: `Winkly <${process.env.GOOGLE_SMTP_APP_USERNAME}>`,\n // to: email,\n // subject: t(\"Your 2FA Code\"),\n // text: t(\n // \"Your verification code is: {{ code }}. It will expire in 10 minutes.\",\n // { code },\n // ),\n // });\n}\n"],"mappings":"
|
|
1
|
+
{"version":3,"file":"index.mjs","names":[],"sources":["../../../src/server/emails/index.ts"],"sourcesContent":["\"use server\";\n\n// import nodemailer from \"nodemailer\";\n\n// Konfiguracja transportera SMTP\n// const transporter = nodemailer.createTransport({\n// service: \"gmail\",\n// auth: {\n// user: process.env.GOOGLE_SMTP_APP_USERNAME,\n// pass: process.env.GOOGLE_SMTP_APP_PASSWORD,\n// },\n// });\n\n/**\n * Sends an email with a verification link.\n * @param email Recipient's email address.\n * @param code Verification code.\n */\nexport async function sendVerifyEmail(email: string, code: string) {\n // const { t } = await getTranslation();\n // await transporter.sendMail({\n // from: `Winkly <${process.env.GOOGLE_SMTP_APP_USERNAME}>`,\n // to: email,\n // subject: t(\"Verify Email\"),\n // text: t(\"Verify your email address with your code: {{ code }}\", { code }),\n // });\n}\n\n/**\n * Sends an email with a password reset link.\n * @param email Recipient's email address.\n * @param code Password reset code.\n */\nexport async function sendResetPassword(email: string, code: string) {\n // const { t } = await getTranslation();\n // await transporter.sendMail({\n // from: `Winkly <${process.env.GOOGLE_SMTP_APP_USERNAME}>`,\n // to: email,\n // subject: t(\"Password Reset\"),\n // text: t(\"Verify password reset with code: {{ code }}\", { code }),\n // });\n}\n\n/**\n * Sends an email with a recovery code.\n * @param email Recipient's email address.\n * @param recoveryCode Recovery code\n */\nexport async function sendRecoveryCode(email: string, recoveryCode: string) {\n // const { t } = await getTranslation();\n // await transporter.sendMail({\n // from: `Winkly <${process.env.GOOGLE_SMTP_APP_USERNAME}>`,\n // to: email,\n // subject: t(\"Recovery Code\"),\n // text: t(\"Your recovery code is: {{ recoveryCode }}\", { recoveryCode }),\n // });\n}\n\n/**\n * Sends a 2FA code via email.\n */\nexport async function send2FACode(email: string, code: string) {\n // const { t } = await getTranslation();\n // await transporter.sendMail({\n // from: `Winkly <${process.env.GOOGLE_SMTP_APP_USERNAME}>`,\n // to: email,\n // subject: t(\"Your 2FA Code\"),\n // text: t(\n // \"Your verification code is: {{ code }}. It will expire in 10 minutes.\",\n // { code },\n // ),\n // });\n}\n"],"mappings":"aAkBA,eAAsB,EAAgB,EAAe,EAAc,EAenE,eAAsB,EAAkB,EAAe,EAAc,EAerE,eAAsB,EAAiB,EAAe,EAAsB,EAa5E,eAAsB,EAAY,EAAe,EAAc"}
|
package/dist/server.cjs
CHANGED
|
@@ -1,145 +1 @@
|
|
|
1
|
-
Object.defineProperty(exports,
|
|
2
|
-
const require_validation = require('./core/auth/validation.cjs');
|
|
3
|
-
const require_event_bus = require('./core/event-bus.cjs');
|
|
4
|
-
const require_inject = require('./server/database/inject.cjs');
|
|
5
|
-
const require_schema = require('./server/database/schema.cjs');
|
|
6
|
-
const require_augment = require('./core/auth/augment.cjs');
|
|
7
|
-
const require_password = require('./server/auth/password.cjs');
|
|
8
|
-
const require_encode = require('./core/auth/utils/encode.cjs');
|
|
9
|
-
const require_encryption = require('./core/auth/utils/encryption.cjs');
|
|
10
|
-
const require_index = require('./server/emails/index.cjs');
|
|
11
|
-
const require_user = require('./server/auth/user.cjs');
|
|
12
|
-
const require_email_verification = require('./core/auth/email-verification.cjs');
|
|
13
|
-
const require_logic = require('./core/auth/logic.cjs');
|
|
14
|
-
const require_session = require('./core/auth/session.cjs');
|
|
15
|
-
const require_actions = require('./core/notifications/actions.cjs');
|
|
16
|
-
const require_password_reset = require('./core/auth/password-reset.cjs');
|
|
17
|
-
const require_rbac = require('./core/auth/rbac.cjs');
|
|
18
|
-
const require_service = require('./core/filesystem/service.cjs');
|
|
19
|
-
const require_setup = require('./core/setup.cjs');
|
|
20
|
-
const require_bootstrap = require('./core/bootstrap.cjs');
|
|
21
|
-
const require_config_server = require('./core/config.server.cjs');
|
|
22
|
-
const require_email = require('./server/auth/email.cjs');
|
|
23
|
-
|
|
24
|
-
exports.assignPermissionToRole = require_rbac.assignPermissionToRole;
|
|
25
|
-
exports.assignPermissionToUser = require_rbac.assignPermissionToUser;
|
|
26
|
-
exports.assignRoleToUser = require_rbac.assignRoleToUser;
|
|
27
|
-
exports.augmentSession = require_augment.augmentSession;
|
|
28
|
-
exports.augmentUser = require_augment.augmentUser;
|
|
29
|
-
exports.checkEmailAvailability = require_email.checkEmailAvailability;
|
|
30
|
-
exports.checkSecurity = require_logic.checkSecurity;
|
|
31
|
-
exports.coreSchema = require_schema.coreSchema;
|
|
32
|
-
exports.createEmailVerificationRequest = require_email_verification.createEmailVerificationRequest;
|
|
33
|
-
exports.createNotification = require_actions.createNotification;
|
|
34
|
-
exports.createOAuthUser = require_user.createOAuthUser;
|
|
35
|
-
exports.createPasswordResetSession = require_password_reset.createPasswordResetSession;
|
|
36
|
-
exports.createPermission = require_rbac.createPermission;
|
|
37
|
-
exports.createRole = require_rbac.createRole;
|
|
38
|
-
exports.createSession = require_session.createSession;
|
|
39
|
-
exports.createUser = require_user.createUser;
|
|
40
|
-
exports.db = require_inject.db;
|
|
41
|
-
exports.decrypt = require_encryption.decrypt;
|
|
42
|
-
exports.decryptToString = require_encryption.decryptToString;
|
|
43
|
-
exports.deleteEmailVerificationRequestCookie = require_email_verification.deleteEmailVerificationRequestCookie;
|
|
44
|
-
exports.deletePasswordResetSessionTokenCookie = require_password_reset.deletePasswordResetSessionTokenCookie;
|
|
45
|
-
exports.deletePermission = require_rbac.deletePermission;
|
|
46
|
-
exports.deleteRole = require_rbac.deleteRole;
|
|
47
|
-
exports.deleteSessionTokenCookie = require_session.deleteSessionTokenCookie;
|
|
48
|
-
exports.deleteUserEmailVerificationRequest = require_email_verification.deleteUserEmailVerificationRequest;
|
|
49
|
-
exports.emailVerificationTable = require_schema.emailVerificationTable;
|
|
50
|
-
exports.encrypt = require_encryption.encrypt;
|
|
51
|
-
exports.encryptString = require_encryption.encryptString;
|
|
52
|
-
exports.ensureSystemInitialized = require_bootstrap.ensureSystemInitialized;
|
|
53
|
-
exports.eventBus = require_event_bus.eventBus;
|
|
54
|
-
exports.filesystemService = require_service.filesystemService;
|
|
55
|
-
exports.finalizeLogin = require_logic.finalizeLogin;
|
|
56
|
-
exports.forgotPasswordSchema = require_validation.forgotPasswordSchema;
|
|
57
|
-
exports.generateRandomOTP = require_encode.generateRandomOTP;
|
|
58
|
-
exports.generateRandomRecoveryCode = require_encode.generateRandomRecoveryCode;
|
|
59
|
-
exports.generateSessionToken = require_session.generateSessionToken;
|
|
60
|
-
exports.getCurrentPasswordResetSession = require_password_reset.getCurrentPasswordResetSession;
|
|
61
|
-
exports.getCurrentSession = require_session.getCurrentSession;
|
|
62
|
-
exports.getIPAddress = require_session.getIPAddress;
|
|
63
|
-
exports.getKryoConfig = require_config_server.getKryoConfig;
|
|
64
|
-
exports.getModulesDir = require_config_server.getModulesDir;
|
|
65
|
-
exports.getPermissions = require_rbac.getPermissions;
|
|
66
|
-
exports.getRoleById = require_rbac.getRoleById;
|
|
67
|
-
exports.getRolePermissions = require_rbac.getRolePermissions;
|
|
68
|
-
exports.getRoles = require_rbac.getRoles;
|
|
69
|
-
exports.getUserById = require_user.getUserById;
|
|
70
|
-
exports.getUserEmailVerificationRequest = require_email_verification.getUserEmailVerificationRequest;
|
|
71
|
-
exports.getUserEmailVerificationRequestFromRequest = require_email_verification.getUserEmailVerificationRequestFromRequest;
|
|
72
|
-
exports.getUserFromEmail = require_user.getUserFromEmail;
|
|
73
|
-
exports.getUserNotifications = require_actions.getUserNotifications;
|
|
74
|
-
exports.getUserPasswordHash = require_user.getUserPasswordHash;
|
|
75
|
-
exports.getUserRbacData = require_rbac.getUserRbacData;
|
|
76
|
-
exports.getUserRecoverCode = require_user.getUserRecoverCode;
|
|
77
|
-
exports.getUserSessions = require_session.getUserSessions;
|
|
78
|
-
exports.hashPassword = require_password.hashPassword;
|
|
79
|
-
exports.initEmailVerification = require_email_verification.initEmailVerification;
|
|
80
|
-
exports.injectDb = require_inject.injectDb;
|
|
81
|
-
exports.invalidateOtherSessions = require_session.invalidateOtherSessions;
|
|
82
|
-
exports.invalidateSession = require_session.invalidateSession;
|
|
83
|
-
exports.invalidateUserPasswordResetSessions = require_password_reset.invalidateUserPasswordResetSessions;
|
|
84
|
-
exports.invalidateUserSessions = require_session.invalidateUserSessions;
|
|
85
|
-
exports.isSystemInstalled = require_setup.isSystemInstalled;
|
|
86
|
-
exports.loginSchema = require_validation.loginSchema;
|
|
87
|
-
exports.markAllNotificationsAsRead = require_actions.markAllNotificationsAsRead;
|
|
88
|
-
exports.markNotificationAsRead = require_actions.markNotificationAsRead;
|
|
89
|
-
exports.notificationTable = require_schema.notificationTable;
|
|
90
|
-
exports.passkeysSetupSchema = require_validation.passkeysSetupSchema;
|
|
91
|
-
exports.passwordResetSessionTable = require_schema.passwordResetSessionTable;
|
|
92
|
-
exports.performFullUserAugmentation = require_logic.performFullUserAugmentation;
|
|
93
|
-
exports.permissionsTable = require_schema.permissionsTable;
|
|
94
|
-
exports.recoveryCodeVerifySchema = require_validation.recoveryCodeVerifySchema;
|
|
95
|
-
exports.registerAuthValidator = require_logic.registerAuthValidator;
|
|
96
|
-
exports.registerEmailVerificationValidator = require_logic.registerEmailVerificationValidator;
|
|
97
|
-
exports.registerIdentityAugmenter = require_augment.registerIdentityAugmenter;
|
|
98
|
-
exports.registerPasswordResetSessionAugmenter = require_augment.registerPasswordResetSessionAugmenter;
|
|
99
|
-
exports.registerPasswordResetValidator = require_logic.registerPasswordResetValidator;
|
|
100
|
-
exports.registerSchema = require_validation.registerSchema;
|
|
101
|
-
exports.registerSecurityRequirement = require_logic.registerSecurityRequirement;
|
|
102
|
-
exports.registerSessionAugmenter = require_augment.registerSessionAugmenter;
|
|
103
|
-
exports.relations = require_schema.relations;
|
|
104
|
-
exports.resetPasswordSchema = require_validation.resetPasswordSchema;
|
|
105
|
-
exports.resetUserRecoveryCode = require_user.resetUserRecoveryCode;
|
|
106
|
-
exports.revokePermissionFromRole = require_rbac.revokePermissionFromRole;
|
|
107
|
-
exports.revokePermissionFromUser = require_rbac.revokePermissionFromUser;
|
|
108
|
-
exports.revokeRoleFromUser = require_rbac.revokeRoleFromUser;
|
|
109
|
-
exports.rolesTable = require_schema.rolesTable;
|
|
110
|
-
exports.rolesToPermissionsTable = require_schema.rolesToPermissionsTable;
|
|
111
|
-
exports.runEmailVerificationValidators = require_logic.runEmailVerificationValidators;
|
|
112
|
-
exports.runPasswordResetValidators = require_logic.runPasswordResetValidators;
|
|
113
|
-
exports.send2FACode = require_index.send2FACode;
|
|
114
|
-
exports.sendPasswordResetEmail = require_password_reset.sendPasswordResetEmail;
|
|
115
|
-
exports.sendRecoveryCode = require_index.sendRecoveryCode;
|
|
116
|
-
exports.sendResetPassword = require_index.sendResetPassword;
|
|
117
|
-
exports.sendVerificationEmail = require_email_verification.sendVerificationEmail;
|
|
118
|
-
exports.sendVerifyEmail = require_index.sendVerifyEmail;
|
|
119
|
-
exports.sessionSignOut = require_session.sessionSignOut;
|
|
120
|
-
exports.sessionTable = require_schema.sessionTable;
|
|
121
|
-
exports.setEmailVerificationRequestCookie = require_email_verification.setEmailVerificationRequestCookie;
|
|
122
|
-
exports.setPasswordResetSessionAsEmailVerified = require_password_reset.setPasswordResetSessionAsEmailVerified;
|
|
123
|
-
exports.setPasswordResetSessionTokenCookie = require_password_reset.setPasswordResetSessionTokenCookie;
|
|
124
|
-
exports.setSessionTokenCookie = require_session.setSessionTokenCookie;
|
|
125
|
-
exports.setUserAsEmailVerifiedIfEmailMatches = require_user.setUserAsEmailVerifiedIfEmailMatches;
|
|
126
|
-
exports.signIn = require_logic.signIn;
|
|
127
|
-
exports.signOut = require_logic.signOut;
|
|
128
|
-
exports.signUp = require_logic.signUp;
|
|
129
|
-
exports.systemModulesTable = require_schema.systemModulesTable;
|
|
130
|
-
exports.totpSetupSchema = require_validation.totpSetupSchema;
|
|
131
|
-
exports.totpVerifySchema = require_validation.totpVerifySchema;
|
|
132
|
-
exports.updateUserAwatar = require_user.updateUserAwatar;
|
|
133
|
-
exports.updateUserEmailAndSetEmailAsVerified = require_user.updateUserEmailAndSetEmailAsVerified;
|
|
134
|
-
exports.updateUserName = require_user.updateUserName;
|
|
135
|
-
exports.updateUserPassword = require_user.updateUserPassword;
|
|
136
|
-
exports.userTable = require_schema.userTable;
|
|
137
|
-
exports.usersToPermissionsTable = require_schema.usersToPermissionsTable;
|
|
138
|
-
exports.usersToRolesTable = require_schema.usersToRolesTable;
|
|
139
|
-
exports.validatePasswordResetSessionToken = require_password_reset.validatePasswordResetSessionToken;
|
|
140
|
-
exports.validateSessionToken = require_session.validateSessionToken;
|
|
141
|
-
exports.verifyEmailInput = require_email.verifyEmailInput;
|
|
142
|
-
exports.verifyEmailSchema = require_validation.verifyEmailSchema;
|
|
143
|
-
exports.verifyPasswordHash = require_password.verifyPasswordHash;
|
|
144
|
-
exports.verifyPasswordStrength = require_password.verifyPasswordStrength;
|
|
145
|
-
exports.verifyUsernameInput = require_user.verifyUsernameInput;
|
|
1
|
+
Object.defineProperty(exports,Symbol.toStringTag,{value:`Module`});const e=require(`./core/auth/validation.cjs`),t=require(`./core/event-bus.cjs`),n=require(`./server/database/inject.cjs`),r=require(`./server/database/schema.cjs`),i=require(`./core/auth/augment.cjs`),a=require(`./server/auth/password.cjs`),o=require(`./core/auth/utils/encode.cjs`),s=require(`./core/auth/utils/encryption.cjs`),c=require(`./server/emails/index.cjs`),l=require(`./server/auth/user.cjs`),u=require(`./core/auth/email-verification.cjs`),d=require(`./core/auth/logic.cjs`),f=require(`./core/auth/session.cjs`),p=require(`./core/notifications/actions.cjs`),m=require(`./core/auth/password-reset.cjs`),h=require(`./core/auth/rbac.cjs`),g=require(`./core/filesystem/service.cjs`),_=require(`./core/setup.cjs`),v=require(`./core/bootstrap.cjs`),y=require(`./core/config.server.cjs`),b=require(`./server/auth/email.cjs`);exports.assignPermissionToRole=h.assignPermissionToRole,exports.assignPermissionToUser=h.assignPermissionToUser,exports.assignRoleToUser=h.assignRoleToUser,exports.augmentSession=i.augmentSession,exports.augmentUser=i.augmentUser,exports.checkEmailAvailability=b.checkEmailAvailability,exports.checkSecurity=d.checkSecurity,exports.coreSchema=r.coreSchema,exports.createEmailVerificationRequest=u.createEmailVerificationRequest,exports.createNotification=p.createNotification,exports.createOAuthUser=l.createOAuthUser,exports.createPasswordResetSession=m.createPasswordResetSession,exports.createPermission=h.createPermission,exports.createRole=h.createRole,exports.createSession=f.createSession,exports.createUser=l.createUser,exports.db=n.db,exports.decrypt=s.decrypt,exports.decryptToString=s.decryptToString,exports.deleteEmailVerificationRequestCookie=u.deleteEmailVerificationRequestCookie,exports.deletePasswordResetSessionTokenCookie=m.deletePasswordResetSessionTokenCookie,exports.deletePermission=h.deletePermission,exports.deleteRole=h.deleteRole,exports.deleteSessionTokenCookie=f.deleteSessionTokenCookie,exports.deleteUserEmailVerificationRequest=u.deleteUserEmailVerificationRequest,exports.emailVerificationTable=r.emailVerificationTable,exports.encrypt=s.encrypt,exports.encryptString=s.encryptString,exports.ensureSystemInitialized=v.ensureSystemInitialized,exports.eventBus=t.eventBus,exports.filesystemService=g.filesystemService,exports.finalizeLogin=d.finalizeLogin,exports.forgotPasswordSchema=e.forgotPasswordSchema,exports.generateRandomOTP=o.generateRandomOTP,exports.generateRandomRecoveryCode=o.generateRandomRecoveryCode,exports.generateSessionToken=f.generateSessionToken,exports.getCurrentPasswordResetSession=m.getCurrentPasswordResetSession,exports.getCurrentSession=f.getCurrentSession,exports.getIPAddress=f.getIPAddress,exports.getKryoConfig=y.getKryoConfig,exports.getModulesDir=y.getModulesDir,exports.getPermissions=h.getPermissions,exports.getRoleById=h.getRoleById,exports.getRolePermissions=h.getRolePermissions,exports.getRoles=h.getRoles,exports.getUserById=l.getUserById,exports.getUserEmailVerificationRequest=u.getUserEmailVerificationRequest,exports.getUserEmailVerificationRequestFromRequest=u.getUserEmailVerificationRequestFromRequest,exports.getUserFromEmail=l.getUserFromEmail,exports.getUserNotifications=p.getUserNotifications,exports.getUserPasswordHash=l.getUserPasswordHash,exports.getUserRbacData=h.getUserRbacData,exports.getUserRecoverCode=l.getUserRecoverCode,exports.getUserSessions=f.getUserSessions,exports.hashPassword=a.hashPassword,exports.initEmailVerification=u.initEmailVerification,exports.injectDb=n.injectDb,exports.invalidateOtherSessions=f.invalidateOtherSessions,exports.invalidateSession=f.invalidateSession,exports.invalidateUserPasswordResetSessions=m.invalidateUserPasswordResetSessions,exports.invalidateUserSessions=f.invalidateUserSessions,exports.isSystemInstalled=_.isSystemInstalled,exports.loginSchema=e.loginSchema,exports.markAllNotificationsAsRead=p.markAllNotificationsAsRead,exports.markNotificationAsRead=p.markNotificationAsRead,exports.notificationTable=r.notificationTable,exports.passkeysSetupSchema=e.passkeysSetupSchema,exports.passwordResetSessionTable=r.passwordResetSessionTable,exports.performFullUserAugmentation=d.performFullUserAugmentation,exports.permissionsTable=r.permissionsTable,exports.recoveryCodeVerifySchema=e.recoveryCodeVerifySchema,exports.registerAuthValidator=d.registerAuthValidator,exports.registerEmailVerificationValidator=d.registerEmailVerificationValidator,exports.registerIdentityAugmenter=i.registerIdentityAugmenter,exports.registerPasswordResetSessionAugmenter=i.registerPasswordResetSessionAugmenter,exports.registerPasswordResetValidator=d.registerPasswordResetValidator,exports.registerSchema=e.registerSchema,exports.registerSecurityRequirement=d.registerSecurityRequirement,exports.registerSessionAugmenter=i.registerSessionAugmenter,exports.relations=r.relations,exports.resetPasswordSchema=e.resetPasswordSchema,exports.resetUserRecoveryCode=l.resetUserRecoveryCode,exports.revokePermissionFromRole=h.revokePermissionFromRole,exports.revokePermissionFromUser=h.revokePermissionFromUser,exports.revokeRoleFromUser=h.revokeRoleFromUser,exports.rolesTable=r.rolesTable,exports.rolesToPermissionsTable=r.rolesToPermissionsTable,exports.runEmailVerificationValidators=d.runEmailVerificationValidators,exports.runPasswordResetValidators=d.runPasswordResetValidators,exports.send2FACode=c.send2FACode,exports.sendPasswordResetEmail=m.sendPasswordResetEmail,exports.sendRecoveryCode=c.sendRecoveryCode,exports.sendResetPassword=c.sendResetPassword,exports.sendVerificationEmail=u.sendVerificationEmail,exports.sendVerifyEmail=c.sendVerifyEmail,exports.sessionSignOut=f.sessionSignOut,exports.sessionTable=r.sessionTable,exports.setEmailVerificationRequestCookie=u.setEmailVerificationRequestCookie,exports.setPasswordResetSessionAsEmailVerified=m.setPasswordResetSessionAsEmailVerified,exports.setPasswordResetSessionTokenCookie=m.setPasswordResetSessionTokenCookie,exports.setSessionTokenCookie=f.setSessionTokenCookie,exports.setUserAsEmailVerifiedIfEmailMatches=l.setUserAsEmailVerifiedIfEmailMatches,exports.signIn=d.signIn,exports.signOut=d.signOut,exports.signUp=d.signUp,exports.systemModulesTable=r.systemModulesTable,exports.totpSetupSchema=e.totpSetupSchema,exports.totpVerifySchema=e.totpVerifySchema,exports.updateUserAwatar=l.updateUserAwatar,exports.updateUserEmailAndSetEmailAsVerified=l.updateUserEmailAndSetEmailAsVerified,exports.updateUserName=l.updateUserName,exports.updateUserPassword=l.updateUserPassword,exports.userTable=r.userTable,exports.usersToPermissionsTable=r.usersToPermissionsTable,exports.usersToRolesTable=r.usersToRolesTable,exports.validatePasswordResetSessionToken=m.validatePasswordResetSessionToken,exports.validateSessionToken=f.validateSessionToken,exports.verifyEmailInput=b.verifyEmailInput,exports.verifyEmailSchema=e.verifyEmailSchema,exports.verifyPasswordHash=a.verifyPasswordHash,exports.verifyPasswordStrength=a.verifyPasswordStrength,exports.verifyUsernameInput=l.verifyUsernameInput;
|
package/dist/server.mjs
CHANGED
|
@@ -1,23 +1 @@
|
|
|
1
|
-
import {
|
|
2
|
-
import { eventBus } from "./core/event-bus.mjs";
|
|
3
|
-
import { db, injectDb } from "./server/database/inject.mjs";
|
|
4
|
-
import { coreSchema, emailVerificationTable, notificationTable, passwordResetSessionTable, permissionsTable, relations, rolesTable, rolesToPermissionsTable, sessionTable, systemModulesTable, userTable, usersToPermissionsTable, usersToRolesTable } from "./server/database/schema.mjs";
|
|
5
|
-
import { augmentSession, augmentUser, registerIdentityAugmenter, registerPasswordResetSessionAugmenter, registerSessionAugmenter } from "./core/auth/augment.mjs";
|
|
6
|
-
import { hashPassword, verifyPasswordHash, verifyPasswordStrength } from "./server/auth/password.mjs";
|
|
7
|
-
import { generateRandomOTP, generateRandomRecoveryCode } from "./core/auth/utils/encode.mjs";
|
|
8
|
-
import { decrypt, decryptToString, encrypt, encryptString } from "./core/auth/utils/encryption.mjs";
|
|
9
|
-
import { send2FACode, sendRecoveryCode, sendResetPassword, sendVerifyEmail } from "./server/emails/index.mjs";
|
|
10
|
-
import { createOAuthUser, createUser, getUserById, getUserFromEmail, getUserPasswordHash, getUserRecoverCode, resetUserRecoveryCode, setUserAsEmailVerifiedIfEmailMatches, updateUserAwatar, updateUserEmailAndSetEmailAsVerified, updateUserName, updateUserPassword, verifyUsernameInput } from "./server/auth/user.mjs";
|
|
11
|
-
import { createEmailVerificationRequest, deleteEmailVerificationRequestCookie, deleteUserEmailVerificationRequest, getUserEmailVerificationRequest, getUserEmailVerificationRequestFromRequest, initEmailVerification, sendVerificationEmail, setEmailVerificationRequestCookie } from "./core/auth/email-verification.mjs";
|
|
12
|
-
import { checkSecurity, finalizeLogin, performFullUserAugmentation, registerAuthValidator, registerEmailVerificationValidator, registerPasswordResetValidator, registerSecurityRequirement, runEmailVerificationValidators, runPasswordResetValidators, signIn, signOut, signUp } from "./core/auth/logic.mjs";
|
|
13
|
-
import { createSession, deleteSessionTokenCookie, generateSessionToken, getCurrentSession, getIPAddress, getUserSessions, invalidateOtherSessions, invalidateSession, invalidateUserSessions, sessionSignOut, setSessionTokenCookie, validateSessionToken } from "./core/auth/session.mjs";
|
|
14
|
-
import { createNotification, getUserNotifications, markAllNotificationsAsRead, markNotificationAsRead } from "./core/notifications/actions.mjs";
|
|
15
|
-
import { createPasswordResetSession, deletePasswordResetSessionTokenCookie, getCurrentPasswordResetSession, invalidateUserPasswordResetSessions, sendPasswordResetEmail, setPasswordResetSessionAsEmailVerified, setPasswordResetSessionTokenCookie, validatePasswordResetSessionToken } from "./core/auth/password-reset.mjs";
|
|
16
|
-
import { assignPermissionToRole, assignPermissionToUser, assignRoleToUser, createPermission, createRole, deletePermission, deleteRole, getPermissions, getRoleById, getRolePermissions, getRoles, getUserRbacData, revokePermissionFromRole, revokePermissionFromUser, revokeRoleFromUser } from "./core/auth/rbac.mjs";
|
|
17
|
-
import { filesystemService } from "./core/filesystem/service.mjs";
|
|
18
|
-
import { isSystemInstalled } from "./core/setup.mjs";
|
|
19
|
-
import { ensureSystemInitialized } from "./core/bootstrap.mjs";
|
|
20
|
-
import { getKryoConfig, getModulesDir } from "./core/config.server.mjs";
|
|
21
|
-
import { checkEmailAvailability, verifyEmailInput } from "./server/auth/email.mjs";
|
|
22
|
-
|
|
23
|
-
export { assignPermissionToRole, assignPermissionToUser, assignRoleToUser, augmentSession, augmentUser, checkEmailAvailability, checkSecurity, coreSchema, createEmailVerificationRequest, createNotification, createOAuthUser, createPasswordResetSession, createPermission, createRole, createSession, createUser, db, decrypt, decryptToString, deleteEmailVerificationRequestCookie, deletePasswordResetSessionTokenCookie, deletePermission, deleteRole, deleteSessionTokenCookie, deleteUserEmailVerificationRequest, emailVerificationTable, encrypt, encryptString, ensureSystemInitialized, eventBus, filesystemService, finalizeLogin, forgotPasswordSchema, generateRandomOTP, generateRandomRecoveryCode, generateSessionToken, getCurrentPasswordResetSession, getCurrentSession, getIPAddress, getKryoConfig, getModulesDir, getPermissions, getRoleById, getRolePermissions, getRoles, getUserById, getUserEmailVerificationRequest, getUserEmailVerificationRequestFromRequest, getUserFromEmail, getUserNotifications, getUserPasswordHash, getUserRbacData, getUserRecoverCode, getUserSessions, hashPassword, initEmailVerification, injectDb, invalidateOtherSessions, invalidateSession, invalidateUserPasswordResetSessions, invalidateUserSessions, isSystemInstalled, loginSchema, markAllNotificationsAsRead, markNotificationAsRead, notificationTable, passkeysSetupSchema, passwordResetSessionTable, performFullUserAugmentation, permissionsTable, recoveryCodeVerifySchema, registerAuthValidator, registerEmailVerificationValidator, registerIdentityAugmenter, registerPasswordResetSessionAugmenter, registerPasswordResetValidator, registerSchema, registerSecurityRequirement, registerSessionAugmenter, relations, resetPasswordSchema, resetUserRecoveryCode, revokePermissionFromRole, revokePermissionFromUser, revokeRoleFromUser, rolesTable, rolesToPermissionsTable, runEmailVerificationValidators, runPasswordResetValidators, send2FACode, sendPasswordResetEmail, sendRecoveryCode, sendResetPassword, sendVerificationEmail, sendVerifyEmail, sessionSignOut, sessionTable, setEmailVerificationRequestCookie, setPasswordResetSessionAsEmailVerified, setPasswordResetSessionTokenCookie, setSessionTokenCookie, setUserAsEmailVerifiedIfEmailMatches, signIn, signOut, signUp, systemModulesTable, totpSetupSchema, totpVerifySchema, updateUserAwatar, updateUserEmailAndSetEmailAsVerified, updateUserName, updateUserPassword, userTable, usersToPermissionsTable, usersToRolesTable, validatePasswordResetSessionToken, validateSessionToken, verifyEmailInput, verifyEmailSchema, verifyPasswordHash, verifyPasswordStrength, verifyUsernameInput };
|
|
1
|
+
import{forgotPasswordSchema as e,loginSchema as t,passkeysSetupSchema as n,recoveryCodeVerifySchema as r,registerSchema as i,resetPasswordSchema as a,totpSetupSchema as o,totpVerifySchema as s,verifyEmailSchema as c}from"./core/auth/validation.mjs";import{eventBus as l}from"./core/event-bus.mjs";import{db as u,injectDb as d}from"./server/database/inject.mjs";import{coreSchema as f,emailVerificationTable as p,notificationTable as m,passwordResetSessionTable as h,permissionsTable as g,relations as _,rolesTable as v,rolesToPermissionsTable as y,sessionTable as b,systemModulesTable as x,userTable as S,usersToPermissionsTable as C,usersToRolesTable as w}from"./server/database/schema.mjs";import{augmentSession as T,augmentUser as E,registerIdentityAugmenter as D,registerPasswordResetSessionAugmenter as O,registerSessionAugmenter as k}from"./core/auth/augment.mjs";import{hashPassword as A,verifyPasswordHash as j,verifyPasswordStrength as M}from"./server/auth/password.mjs";import{generateRandomOTP as N,generateRandomRecoveryCode as P}from"./core/auth/utils/encode.mjs";import{decrypt as F,decryptToString as I,encrypt as L,encryptString as R}from"./core/auth/utils/encryption.mjs";import{send2FACode as z,sendRecoveryCode as B,sendResetPassword as V,sendVerifyEmail as H}from"./server/emails/index.mjs";import{createOAuthUser as U,createUser as W,getUserById as G,getUserFromEmail as K,getUserPasswordHash as q,getUserRecoverCode as J,resetUserRecoveryCode as Y,setUserAsEmailVerifiedIfEmailMatches as X,updateUserAwatar as Z,updateUserEmailAndSetEmailAsVerified as Q,updateUserName as $,updateUserPassword as ee,verifyUsernameInput as te}from"./server/auth/user.mjs";import{createEmailVerificationRequest as ne,deleteEmailVerificationRequestCookie as re,deleteUserEmailVerificationRequest as ie,getUserEmailVerificationRequest as ae,getUserEmailVerificationRequestFromRequest as oe,initEmailVerification as se,sendVerificationEmail as ce,setEmailVerificationRequestCookie as le}from"./core/auth/email-verification.mjs";import{checkSecurity as ue,finalizeLogin as de,performFullUserAugmentation as fe,registerAuthValidator as pe,registerEmailVerificationValidator as me,registerPasswordResetValidator as he,registerSecurityRequirement as ge,runEmailVerificationValidators as _e,runPasswordResetValidators as ve,signIn as ye,signOut as be,signUp as xe}from"./core/auth/logic.mjs";import{createSession as Se,deleteSessionTokenCookie as Ce,generateSessionToken as we,getCurrentSession as Te,getIPAddress as Ee,getUserSessions as De,invalidateOtherSessions as Oe,invalidateSession as ke,invalidateUserSessions as Ae,sessionSignOut as je,setSessionTokenCookie as Me,validateSessionToken as Ne}from"./core/auth/session.mjs";import{createNotification as Pe,getUserNotifications as Fe,markAllNotificationsAsRead as Ie,markNotificationAsRead as Le}from"./core/notifications/actions.mjs";import{createPasswordResetSession as Re,deletePasswordResetSessionTokenCookie as ze,getCurrentPasswordResetSession as Be,invalidateUserPasswordResetSessions as Ve,sendPasswordResetEmail as He,setPasswordResetSessionAsEmailVerified as Ue,setPasswordResetSessionTokenCookie as We,validatePasswordResetSessionToken as Ge}from"./core/auth/password-reset.mjs";import{assignPermissionToRole as Ke,assignPermissionToUser as qe,assignRoleToUser as Je,createPermission as Ye,createRole as Xe,deletePermission as Ze,deleteRole as Qe,getPermissions as $e,getRoleById as et,getRolePermissions as tt,getRoles as nt,getUserRbacData as rt,revokePermissionFromRole as it,revokePermissionFromUser as at,revokeRoleFromUser as ot}from"./core/auth/rbac.mjs";import{filesystemService as st}from"./core/filesystem/service.mjs";import{isSystemInstalled as ct}from"./core/setup.mjs";import{ensureSystemInitialized as lt}from"./core/bootstrap.mjs";import{getKryoConfig as ut,getModulesDir as dt}from"./core/config.server.mjs";import{checkEmailAvailability as ft,verifyEmailInput as pt}from"./server/auth/email.mjs";export{Ke as assignPermissionToRole,qe as assignPermissionToUser,Je as assignRoleToUser,T as augmentSession,E as augmentUser,ft as checkEmailAvailability,ue as checkSecurity,f as coreSchema,ne as createEmailVerificationRequest,Pe as createNotification,U as createOAuthUser,Re as createPasswordResetSession,Ye as createPermission,Xe as createRole,Se as createSession,W as createUser,u as db,F as decrypt,I as decryptToString,re as deleteEmailVerificationRequestCookie,ze as deletePasswordResetSessionTokenCookie,Ze as deletePermission,Qe as deleteRole,Ce as deleteSessionTokenCookie,ie as deleteUserEmailVerificationRequest,p as emailVerificationTable,L as encrypt,R as encryptString,lt as ensureSystemInitialized,l as eventBus,st as filesystemService,de as finalizeLogin,e as forgotPasswordSchema,N as generateRandomOTP,P as generateRandomRecoveryCode,we as generateSessionToken,Be as getCurrentPasswordResetSession,Te as getCurrentSession,Ee as getIPAddress,ut as getKryoConfig,dt as getModulesDir,$e as getPermissions,et as getRoleById,tt as getRolePermissions,nt as getRoles,G as getUserById,ae as getUserEmailVerificationRequest,oe as getUserEmailVerificationRequestFromRequest,K as getUserFromEmail,Fe as getUserNotifications,q as getUserPasswordHash,rt as getUserRbacData,J as getUserRecoverCode,De as getUserSessions,A as hashPassword,se as initEmailVerification,d as injectDb,Oe as invalidateOtherSessions,ke as invalidateSession,Ve as invalidateUserPasswordResetSessions,Ae as invalidateUserSessions,ct as isSystemInstalled,t as loginSchema,Ie as markAllNotificationsAsRead,Le as markNotificationAsRead,m as notificationTable,n as passkeysSetupSchema,h as passwordResetSessionTable,fe as performFullUserAugmentation,g as permissionsTable,r as recoveryCodeVerifySchema,pe as registerAuthValidator,me as registerEmailVerificationValidator,D as registerIdentityAugmenter,O as registerPasswordResetSessionAugmenter,he as registerPasswordResetValidator,i as registerSchema,ge as registerSecurityRequirement,k as registerSessionAugmenter,_ as relations,a as resetPasswordSchema,Y as resetUserRecoveryCode,it as revokePermissionFromRole,at as revokePermissionFromUser,ot as revokeRoleFromUser,v as rolesTable,y as rolesToPermissionsTable,_e as runEmailVerificationValidators,ve as runPasswordResetValidators,z as send2FACode,He as sendPasswordResetEmail,B as sendRecoveryCode,V as sendResetPassword,ce as sendVerificationEmail,H as sendVerifyEmail,je as sessionSignOut,b as sessionTable,le as setEmailVerificationRequestCookie,Ue as setPasswordResetSessionAsEmailVerified,We as setPasswordResetSessionTokenCookie,Me as setSessionTokenCookie,X as setUserAsEmailVerifiedIfEmailMatches,ye as signIn,be as signOut,xe as signUp,x as systemModulesTable,o as totpSetupSchema,s as totpVerifySchema,Z as updateUserAwatar,Q as updateUserEmailAndSetEmailAsVerified,$ as updateUserName,ee as updateUserPassword,S as userTable,C as usersToPermissionsTable,w as usersToRolesTable,Ge as validatePasswordResetSessionToken,Ne as validateSessionToken,pt as verifyEmailInput,c as verifyEmailSchema,j as verifyPasswordHash,M as verifyPasswordStrength,te as verifyUsernameInput};
|