@arch-cadre/core 0.0.55 → 0.0.57

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (297) hide show
  1. package/dist/_virtual/_rolldown/runtime.cjs +1 -0
  2. package/dist/_virtual/_rolldown/runtime.mjs +1 -0
  3. package/dist/core/auth/augment.cjs +1 -0
  4. package/dist/core/auth/augment.d.cts +20 -0
  5. package/dist/core/auth/augment.d.cts.map +1 -0
  6. package/dist/core/auth/augment.d.mts +20 -0
  7. package/dist/core/auth/augment.d.mts.map +1 -0
  8. package/dist/core/auth/augment.mjs +2 -0
  9. package/dist/core/auth/augment.mjs.map +1 -0
  10. package/dist/core/auth/email-verification.cjs +1 -0
  11. package/dist/core/auth/email-verification.d.cts +62 -0
  12. package/dist/core/auth/email-verification.d.cts.map +1 -0
  13. package/dist/core/auth/email-verification.d.mts +62 -0
  14. package/dist/core/auth/email-verification.d.mts.map +1 -0
  15. package/dist/core/auth/email-verification.mjs +2 -0
  16. package/dist/core/auth/email-verification.mjs.map +1 -0
  17. package/dist/core/auth/logic.cjs +1 -0
  18. package/dist/core/auth/logic.d.cts +110 -0
  19. package/dist/core/auth/logic.d.cts.map +1 -0
  20. package/dist/core/auth/logic.d.mts +110 -0
  21. package/dist/core/auth/logic.d.mts.map +1 -0
  22. package/dist/core/auth/logic.mjs +2 -0
  23. package/dist/core/auth/logic.mjs.map +1 -0
  24. package/dist/core/auth/password-reset.cjs +1 -0
  25. package/dist/core/auth/password-reset.d.cts +39 -0
  26. package/dist/core/auth/password-reset.d.cts.map +1 -0
  27. package/dist/core/auth/password-reset.d.mts +39 -0
  28. package/dist/core/auth/password-reset.d.mts.map +1 -0
  29. package/dist/core/auth/password-reset.mjs +2 -0
  30. package/dist/core/auth/password-reset.mjs.map +1 -0
  31. package/dist/core/auth/rbac.cjs +1 -0
  32. package/dist/core/auth/rbac.d.cts +61 -0
  33. package/dist/core/auth/rbac.d.cts.map +1 -0
  34. package/dist/core/auth/rbac.d.mts +61 -0
  35. package/dist/core/auth/rbac.d.mts.map +1 -0
  36. package/dist/core/auth/rbac.mjs +2 -0
  37. package/dist/core/auth/rbac.mjs.map +1 -0
  38. package/dist/core/auth/session.cjs +1 -0
  39. package/dist/core/auth/session.d.cts +54 -0
  40. package/dist/core/auth/session.d.cts.map +1 -0
  41. package/dist/core/auth/session.d.mts +54 -0
  42. package/dist/core/auth/session.d.mts.map +1 -0
  43. package/dist/core/auth/session.mjs +2 -0
  44. package/dist/core/auth/session.mjs.map +1 -0
  45. package/dist/core/auth/types.d.cts +55 -0
  46. package/dist/core/auth/types.d.cts.map +1 -0
  47. package/dist/core/auth/types.d.mts +55 -0
  48. package/dist/core/auth/types.d.mts.map +1 -0
  49. package/dist/core/auth/utils/encode.cjs +1 -0
  50. package/dist/core/auth/utils/encode.d.cts +15 -0
  51. package/dist/core/auth/utils/encode.d.cts.map +1 -0
  52. package/dist/core/auth/utils/encode.d.mts +15 -0
  53. package/dist/core/auth/utils/encode.d.mts.map +1 -0
  54. package/dist/core/auth/utils/encode.mjs +2 -0
  55. package/dist/core/auth/utils/encode.mjs.map +1 -0
  56. package/dist/core/auth/utils/encryption.cjs +1 -0
  57. package/dist/core/auth/utils/{encryption.d.ts → encryption.d.cts} +8 -5
  58. package/dist/core/auth/utils/encryption.d.cts.map +1 -0
  59. package/dist/core/auth/utils/encryption.d.mts +28 -0
  60. package/dist/core/auth/utils/encryption.d.mts.map +1 -0
  61. package/dist/core/auth/utils/encryption.mjs +2 -0
  62. package/dist/core/auth/utils/encryption.mjs.map +1 -0
  63. package/dist/core/auth/validation.cjs +1 -0
  64. package/dist/core/auth/validation.d.cts +48 -0
  65. package/dist/core/auth/validation.d.cts.map +1 -0
  66. package/dist/core/auth/validation.d.mts +48 -0
  67. package/dist/core/auth/validation.d.mts.map +1 -0
  68. package/dist/core/auth/validation.mjs +2 -0
  69. package/dist/core/auth/validation.mjs.map +1 -0
  70. package/dist/core/bootstrap.cjs +1 -0
  71. package/dist/core/bootstrap.d.cts +5 -0
  72. package/dist/core/bootstrap.d.cts.map +1 -0
  73. package/dist/core/bootstrap.d.mts +5 -0
  74. package/dist/core/bootstrap.d.mts.map +1 -0
  75. package/dist/core/bootstrap.mjs +2 -0
  76. package/dist/core/bootstrap.mjs.map +1 -0
  77. package/dist/core/config.cjs +1 -0
  78. package/dist/core/config.d.cts +11 -0
  79. package/dist/core/config.d.cts.map +1 -0
  80. package/dist/core/config.d.mts +11 -0
  81. package/dist/core/config.d.mts.map +1 -0
  82. package/dist/core/config.mjs +2 -0
  83. package/dist/core/config.mjs.map +1 -0
  84. package/dist/core/config.server.cjs +1 -0
  85. package/dist/core/config.server.d.cts +16 -0
  86. package/dist/core/config.server.d.cts.map +1 -0
  87. package/dist/core/config.server.d.mts +16 -0
  88. package/dist/core/config.server.d.mts.map +1 -0
  89. package/dist/core/config.server.mjs +2 -0
  90. package/dist/core/config.server.mjs.map +1 -0
  91. package/dist/core/event-bus.cjs +1 -0
  92. package/dist/core/event-bus.d.cts +17 -0
  93. package/dist/core/event-bus.d.cts.map +1 -0
  94. package/dist/core/event-bus.d.mts +17 -0
  95. package/dist/core/event-bus.d.mts.map +1 -0
  96. package/dist/core/event-bus.mjs +2 -0
  97. package/dist/core/event-bus.mjs.map +1 -0
  98. package/dist/core/filesystem/index.cjs +1 -0
  99. package/dist/core/filesystem/index.mjs +2 -0
  100. package/dist/core/filesystem/index.mjs.map +1 -0
  101. package/dist/core/filesystem/providers/local.cjs +1 -0
  102. package/dist/core/filesystem/providers/local.mjs +2 -0
  103. package/dist/core/filesystem/providers/local.mjs.map +1 -0
  104. package/dist/core/filesystem/service.cjs +1 -0
  105. package/dist/core/filesystem/service.d.cts +19 -0
  106. package/dist/core/filesystem/service.d.cts.map +1 -0
  107. package/dist/core/filesystem/service.d.mts +19 -0
  108. package/dist/core/filesystem/service.d.mts.map +1 -0
  109. package/dist/core/filesystem/service.mjs +2 -0
  110. package/dist/core/filesystem/service.mjs.map +1 -0
  111. package/dist/core/filesystem/types.d.cts +22 -0
  112. package/dist/core/filesystem/types.d.cts.map +1 -0
  113. package/dist/core/filesystem/types.d.mts +22 -0
  114. package/dist/core/filesystem/types.d.mts.map +1 -0
  115. package/dist/core/notifications/actions.cjs +1 -0
  116. package/dist/core/notifications/actions.d.cts +58 -0
  117. package/dist/core/notifications/actions.d.cts.map +1 -0
  118. package/dist/core/notifications/actions.d.mts +58 -0
  119. package/dist/core/notifications/actions.d.mts.map +1 -0
  120. package/dist/core/notifications/actions.mjs +2 -0
  121. package/dist/core/notifications/actions.mjs.map +1 -0
  122. package/dist/core/notifications/index.cjs +1 -0
  123. package/dist/core/notifications/index.mjs +1 -0
  124. package/dist/core/notifications/service.cjs +1 -0
  125. package/dist/core/notifications/service.d.cts +9 -0
  126. package/dist/core/notifications/service.d.cts.map +1 -0
  127. package/dist/core/notifications/service.d.mts +9 -0
  128. package/dist/core/notifications/service.d.mts.map +1 -0
  129. package/dist/core/notifications/service.mjs +2 -0
  130. package/dist/core/notifications/service.mjs.map +1 -0
  131. package/dist/core/notifications/types.d.cts +21 -0
  132. package/dist/core/notifications/types.d.cts.map +1 -0
  133. package/dist/core/notifications/types.d.mts +21 -0
  134. package/dist/core/notifications/types.d.mts.map +1 -0
  135. package/dist/core/setup.cjs +1 -0
  136. package/dist/core/setup.d.cts +9 -0
  137. package/dist/core/setup.d.cts.map +1 -0
  138. package/dist/core/setup.d.mts +9 -0
  139. package/dist/core/setup.d.mts.map +1 -0
  140. package/dist/core/setup.mjs +2 -0
  141. package/dist/core/setup.mjs.map +1 -0
  142. package/dist/core/types.d.cts +13 -0
  143. package/dist/core/types.d.cts.map +1 -0
  144. package/dist/core/types.d.mts +13 -0
  145. package/dist/core/types.d.mts.map +1 -0
  146. package/dist/index.cjs +1 -0
  147. package/dist/index.d.cts +8 -0
  148. package/dist/index.d.mts +8 -0
  149. package/dist/index.mjs +1 -0
  150. package/dist/server/auth/email.cjs +1 -0
  151. package/dist/server/auth/email.d.cts +13 -0
  152. package/dist/server/auth/email.d.cts.map +1 -0
  153. package/dist/server/auth/email.d.mts +13 -0
  154. package/dist/server/auth/email.d.mts.map +1 -0
  155. package/dist/server/auth/email.mjs +2 -0
  156. package/dist/server/auth/email.mjs.map +1 -0
  157. package/dist/server/auth/password.cjs +1 -0
  158. package/dist/server/auth/{password.d.ts → password.d.cts} +7 -4
  159. package/dist/server/auth/password.d.cts.map +1 -0
  160. package/dist/server/auth/{password.js → password.d.mts} +7 -14
  161. package/dist/server/auth/password.d.mts.map +1 -0
  162. package/dist/server/auth/password.mjs +2 -0
  163. package/dist/server/auth/password.mjs.map +1 -0
  164. package/dist/server/auth/user.cjs +1 -0
  165. package/dist/server/auth/user.d.cts +58 -0
  166. package/dist/server/auth/user.d.cts.map +1 -0
  167. package/dist/server/auth/user.d.mts +58 -0
  168. package/dist/server/auth/user.d.mts.map +1 -0
  169. package/dist/server/auth/user.mjs +2 -0
  170. package/dist/server/auth/user.mjs.map +1 -0
  171. package/dist/server/database/inject.cjs +1 -0
  172. package/dist/server/database/inject.d.cts +15 -0
  173. package/dist/server/database/inject.d.cts.map +1 -0
  174. package/dist/server/database/inject.d.mts +15 -0
  175. package/dist/server/database/inject.d.mts.map +1 -0
  176. package/dist/server/database/inject.mjs +2 -0
  177. package/dist/server/database/inject.mjs.map +1 -0
  178. package/dist/server/database/schema.cjs +1 -0
  179. package/dist/server/database/schema.d.cts +3065 -0
  180. package/dist/server/database/{schema.d.ts.map → schema.d.cts.map} +1 -1
  181. package/dist/server/database/schema.d.mts +3065 -0
  182. package/dist/server/database/schema.d.mts.map +1 -0
  183. package/dist/server/database/schema.mjs +2 -0
  184. package/dist/server/database/schema.mjs.map +1 -0
  185. package/dist/server/emails/index.cjs +1 -0
  186. package/dist/server/emails/index.d.cts +26 -0
  187. package/dist/server/emails/index.d.cts.map +1 -0
  188. package/dist/server/emails/index.d.mts +26 -0
  189. package/dist/server/emails/index.d.mts.map +1 -0
  190. package/dist/server/emails/index.mjs +2 -0
  191. package/dist/server/emails/index.mjs.map +1 -0
  192. package/dist/server.cjs +1 -0
  193. package/dist/server.d.cts +26 -0
  194. package/dist/server.d.mts +26 -0
  195. package/dist/server.mjs +1 -0
  196. package/package.json +15 -7
  197. package/dist/core/auth/augment.d.ts +0 -18
  198. package/dist/core/auth/augment.d.ts.map +0 -1
  199. package/dist/core/auth/augment.js +0 -45
  200. package/dist/core/auth/email-verification.d.ts +0 -58
  201. package/dist/core/auth/email-verification.d.ts.map +0 -1
  202. package/dist/core/auth/email-verification.js +0 -105
  203. package/dist/core/auth/events.d.ts +0 -53
  204. package/dist/core/auth/events.d.ts.map +0 -1
  205. package/dist/core/auth/events.js +0 -1
  206. package/dist/core/auth/logic.d.ts +0 -106
  207. package/dist/core/auth/logic.d.ts.map +0 -1
  208. package/dist/core/auth/logic.js +0 -245
  209. package/dist/core/auth/password-reset.d.ts +0 -35
  210. package/dist/core/auth/password-reset.d.ts.map +0 -1
  211. package/dist/core/auth/password-reset.js +0 -122
  212. package/dist/core/auth/rbac.d.ts +0 -56
  213. package/dist/core/auth/rbac.d.ts.map +0 -1
  214. package/dist/core/auth/rbac.js +0 -134
  215. package/dist/core/auth/session.d.ts +0 -50
  216. package/dist/core/auth/session.d.ts.map +0 -1
  217. package/dist/core/auth/session.js +0 -152
  218. package/dist/core/auth/types.d.ts +0 -52
  219. package/dist/core/auth/types.d.ts.map +0 -1
  220. package/dist/core/auth/types.js +0 -1
  221. package/dist/core/auth/utils/encode.d.ts +0 -12
  222. package/dist/core/auth/utils/encode.d.ts.map +0 -1
  223. package/dist/core/auth/utils/encode.js +0 -20
  224. package/dist/core/auth/utils/encryption.d.ts.map +0 -1
  225. package/dist/core/auth/utils/encryption.js +0 -62
  226. package/dist/core/auth/validation.d.ts +0 -44
  227. package/dist/core/auth/validation.d.ts.map +0 -1
  228. package/dist/core/auth/validation.js +0 -41
  229. package/dist/core/bootstrap.d.ts +0 -2
  230. package/dist/core/bootstrap.d.ts.map +0 -1
  231. package/dist/core/bootstrap.js +0 -51
  232. package/dist/core/config.d.ts +0 -9
  233. package/dist/core/config.d.ts.map +0 -1
  234. package/dist/core/config.js +0 -3
  235. package/dist/core/config.server.d.ts +0 -12
  236. package/dist/core/config.server.d.ts.map +0 -1
  237. package/dist/core/config.server.js +0 -61
  238. package/dist/core/event-bus.d.ts +0 -14
  239. package/dist/core/event-bus.d.ts.map +0 -1
  240. package/dist/core/event-bus.js +0 -51
  241. package/dist/core/filesystem/index.d.ts +0 -4
  242. package/dist/core/filesystem/index.d.ts.map +0 -1
  243. package/dist/core/filesystem/index.js +0 -10
  244. package/dist/core/filesystem/providers/local.d.ts +0 -8
  245. package/dist/core/filesystem/providers/local.d.ts.map +0 -1
  246. package/dist/core/filesystem/providers/local.js +0 -42
  247. package/dist/core/filesystem/service.d.ts +0 -16
  248. package/dist/core/filesystem/service.d.ts.map +0 -1
  249. package/dist/core/filesystem/service.js +0 -51
  250. package/dist/core/filesystem/types.d.ts +0 -19
  251. package/dist/core/filesystem/types.d.ts.map +0 -1
  252. package/dist/core/filesystem/types.js +0 -1
  253. package/dist/core/notifications/actions.d.ts +0 -54
  254. package/dist/core/notifications/actions.d.ts.map +0 -1
  255. package/dist/core/notifications/actions.js +0 -43
  256. package/dist/core/notifications/index.d.ts +0 -4
  257. package/dist/core/notifications/index.d.ts.map +0 -1
  258. package/dist/core/notifications/index.js +0 -3
  259. package/dist/core/notifications/service.d.ts +0 -7
  260. package/dist/core/notifications/service.d.ts.map +0 -1
  261. package/dist/core/notifications/service.js +0 -32
  262. package/dist/core/notifications/types.d.ts +0 -17
  263. package/dist/core/notifications/types.d.ts.map +0 -1
  264. package/dist/core/notifications/types.js +0 -1
  265. package/dist/core/setup.d.ts +0 -6
  266. package/dist/core/setup.d.ts.map +0 -1
  267. package/dist/core/setup.js +0 -25
  268. package/dist/core/types.d.ts +0 -10
  269. package/dist/core/types.d.ts.map +0 -1
  270. package/dist/core/types.js +0 -1
  271. package/dist/index.d.ts +0 -8
  272. package/dist/index.d.ts.map +0 -1
  273. package/dist/index.js +0 -16
  274. package/dist/server/auth/email.d.ts +0 -10
  275. package/dist/server/auth/email.d.ts.map +0 -1
  276. package/dist/server/auth/email.js +0 -20
  277. package/dist/server/auth/password.d.ts.map +0 -1
  278. package/dist/server/auth/types.d.ts +0 -13
  279. package/dist/server/auth/types.d.ts.map +0 -1
  280. package/dist/server/auth/types.js +0 -1
  281. package/dist/server/auth/user.d.ts +0 -54
  282. package/dist/server/auth/user.d.ts.map +0 -1
  283. package/dist/server/auth/user.js +0 -222
  284. package/dist/server/database/inject.d.ts +0 -11
  285. package/dist/server/database/inject.d.ts.map +0 -1
  286. package/dist/server/database/inject.js +0 -29
  287. package/dist/server/database/schema.d.ts +0 -2953
  288. package/dist/server/database/schema.js +0 -192
  289. package/dist/server/database/types.d.ts +0 -12
  290. package/dist/server/database/types.d.ts.map +0 -1
  291. package/dist/server/database/types.js +0 -1
  292. package/dist/server/emails/index.d.ts +0 -23
  293. package/dist/server/emails/index.d.ts.map +0 -1
  294. package/dist/server/emails/index.js +0 -67
  295. package/dist/server.d.ts +0 -25
  296. package/dist/server.d.ts.map +0 -1
  297. package/dist/server.js +0 -32
@@ -0,0 +1 @@
1
+ {"version":3,"file":"schema.d.mts","names":[],"sources":["../../../src/server/database/schema.ts"],"mappings":";;;;;;;cAGa,SAAA,uBAAS,kBAAA;;;;QAapB,oBAAA,CAAA,QAAA;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;cAEW,UAAA,uBAAU,kBAAA;;;;QAOrB,oBAAA,CAAA,QAAA;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;cAEW,gBAAA,uBAAgB,kBAAA;;;;QAO3B,oBAAA,CAAA,QAAA;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;cAEW,iBAAA,uBAAiB,kBAAA;;;;YAW7B,oBAAA,CAAA,QAAA;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;cAEY,uBAAA,uBAAuB,kBAAA;;;;YAWnC,oBAAA,CAAA,QAAA;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;cAEY,uBAAA,uBAAuB,kBAAA;;;;YAWnC,oBAAA,CAAA,QAAA;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;cAEY,YAAA,uBAAY,kBAAA;;;;QAevB,oBAAA,CAAA,QAAA;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;cAEW,sBAAA,uBAAsB,kBAAA;;;;QAgBjC,oBAAA,CAAA,QAAA;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;cAEW,yBAAA,uBAAyB,kBAAA;;;;QAiBpC,oBAAA,CAAA,QAAA;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;cAEW,iBAAA,uBAAiB,kBAAA;;;;QAoB5B,oBAAA,CAAA,QAAA;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;cAEW,kBAAA,uBAAkB,kBAAA;;;;QAS7B,oBAAA,CAAA,QAAA;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;cAEW,SAAA,eAAS,0BAAA;;cA8CrB,YAAA,CAAA,IAAA;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;cAGY,iBAAA,uBAAiB,kBAAA;;;;QAY5B,oBAAA,CAAA,QAAA;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;cAEW,UAAA;;;;;UAYZ,oBAAA,CAAA,QAAA;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;KAEW,cAAA,UAAwB,SAAA"}
@@ -0,0 +1,2 @@
1
+ import{defineRelations as e,sql as t}from"drizzle-orm";import{boolean as n,bytea as r,jsonb as i,pgTable as a,text as o,timestamp as s}from"drizzle-orm/pg-core";const c=a(`users`,{id:o(`id`).$defaultFn(()=>crypto.randomUUID()).notNull().primaryKey(),email:o(`email`).notNull().unique(),name:o(`name`).notNull(),password:o(`password`),image:o(`image`),recovery_code:r(`recovery_code`).notNull(),emailVerifiedAt:s(`email_verified_at`,{precision:3}),createdAt:s(`created_at`,{precision:3}).notNull().defaultNow(),updatedAt:s(`updated_at`,{precision:3})}),l=a(`roles`,{id:o(`id`).$defaultFn(()=>crypto.randomUUID()).notNull().primaryKey(),name:o(`name`).notNull().unique(),description:o(`description`)}),u=a(`permissions`,{id:o(`id`).$defaultFn(()=>crypto.randomUUID()).notNull().primaryKey(),name:o(`name`).notNull().unique(),description:o(`description`)}),d=a(`users_to_roles`,{userId:o(`user_id`).notNull().references(()=>c.id,{onDelete:`cascade`}),roleId:o(`role_id`).notNull().references(()=>l.id,{onDelete:`cascade`})},e=>[{pk:t`PRIMARY KEY (${e.userId}, ${e.roleId})`}]),f=a(`users_to_permissions`,{userId:o(`user_id`).notNull().references(()=>c.id,{onDelete:`cascade`}),permissionId:o(`permission_id`).notNull().references(()=>u.id,{onDelete:`cascade`})},e=>[{pk:t`PRIMARY KEY (${e.userId}, ${e.permissionId})`}]),p=a(`roles_to_permissions`,{roleId:o(`role_id`).notNull().references(()=>l.id,{onDelete:`cascade`}),permissionId:o(`permission_id`).notNull().references(()=>u.id,{onDelete:`cascade`})},e=>[{pk:t`PRIMARY KEY (${e.roleId}, ${e.permissionId})`}]),m=a(`sessions`,{id:o(`id`).$defaultFn(()=>crypto.randomUUID()).notNull().primaryKey(),active_organization_id:o(`active_organization_id`),userId:o(`user_id`).notNull().references(()=>c.id,{onDelete:`cascade`,onUpdate:`cascade`}),expiresAt:s(`expires_at`,{precision:3}).notNull(),createdAt:s(`created_at`,{precision:3}).notNull().defaultNow(),updatedAt:s(`updated_at`,{precision:3})}),h=a(`email_verification_requests`,{id:o(`id`).$defaultFn(()=>crypto.randomUUID()).notNull().primaryKey(),email:o(`email`).notNull(),code:o(`code`).notNull(),userId:o(`user_id`).notNull().references(()=>c.id,{onDelete:`cascade`,onUpdate:`cascade`}),expiresAt:s(`expires_at`,{precision:3}).notNull(),createdAt:s(`created_at`,{precision:3}).notNull().defaultNow(),updatedAt:s(`updated_at`,{precision:3})}),g=a(`password_reset_sessions`,{id:o(`id`).$defaultFn(()=>crypto.randomUUID()).notNull().primaryKey(),email:o(`email`).notNull(),code:o(`code`).notNull(),emailVerified:n(`emailVerified`).default(!1),userId:o(`user_id`).notNull().references(()=>c.id,{onDelete:`cascade`,onUpdate:`cascade`}),expiresAt:s(`expires_at`,{precision:3}).notNull(),createdAt:s(`created_at`,{precision:3}).notNull().defaultNow(),updatedAt:s(`updated_at`,{precision:3})}),_=a(`notification`,{id:o(`id`).$defaultFn(()=>crypto.randomUUID()).notNull().primaryKey(),title:o(`title`).notNull(),content:o(`content`),target:o(`target`),type:o(`type`),isRead:n(`isRead`).notNull(),resourceId:o(`resource_id`),resourceType:o(`resource_type`),userId:o(`user_id`).notNull().references(()=>c.id,{onDelete:`cascade`,onUpdate:`cascade`}),createdAt:s(`created_at`,{precision:3}).notNull().defaultNow(),updatedAt:s(`updated_at`,{precision:3})}),v=a(`system_modules`,{id:o(`id`).notNull().primaryKey(),enabled:n(`enabled`).notNull().default(!1),installed:n(`installed`).notNull().default(!1),deleted:n(`deleted`).notNull().default(!1),system:n(`system`).notNull().default(!1),config:o(`config`),lastStep:o(`last_step`),updatedAt:s(`updated_at`,{precision:3}).defaultNow()}),y=e({user:c,emailVerification:h,passwordResetSession:g,session:m,notification:_,systemModulesTable:v},e=>({user:{sessions:e.many.session({from:e.user.id,to:e.session.userId}),emailVerification:e.many.emailVerification({from:e.user.id,to:e.emailVerification.userId}),passwordResetSession:e.many.passwordResetSession({from:e.user.id,to:e.passwordResetSession.userId})},session:{user:e.one.user({from:e.session.userId,to:e.user.id})},emailVerification:{user:e.one.user({from:e.emailVerification.userId,to:e.user.id})},passwordResetSession:{user:e.one.user({from:e.passwordResetSession.userId,to:e.user.id})}})),b=a(`activity_logs`,{id:o(`id`).$defaultFn(()=>crypto.randomUUID()).notNull().primaryKey(),userId:o(`user_id`).references(()=>c.id,{onDelete:`set null`}),action:o(`action`).notNull(),description:o(`description`).notNull(),metadata:i(`metadata`),createdAt:s(`created_at`,{precision:3}).notNull().defaultNow()}),x={userTable:c,rolesTable:l,permissionsTable:u,usersToRolesTable:d,usersToPermissionsTable:f,rolesToPermissionsTable:p,sessionTable:m,emailVerificationTable:h,passwordResetSessionTable:g,notificationTable:_,systemModulesTable:v};export{b as activityLogsTable,x as coreSchema,h as emailVerificationTable,_ as notificationTable,g as passwordResetSessionTable,u as permissionsTable,y as relations,l as rolesTable,p as rolesToPermissionsTable,m as sessionTable,v as systemModulesTable,c as userTable,f as usersToPermissionsTable,d as usersToRolesTable};
2
+ //# sourceMappingURL=schema.mjs.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"schema.mjs","names":[],"sources":["../../../src/server/database/schema.ts"],"sourcesContent":["import { defineRelations, sql } from \"drizzle-orm\";\nimport { boolean, bytea, jsonb, pgTable, text, timestamp } from \"drizzle-orm/pg-core\";\n\nexport const userTable = pgTable(\"users\", {\n id: text(\"id\")\n .$defaultFn(() => crypto.randomUUID())\n .notNull()\n .primaryKey(),\n email: text(\"email\").notNull().unique(),\n name: text(\"name\").notNull(),\n password: text(\"password\"),\n image: text(\"image\"),\n recovery_code: bytea(\"recovery_code\").notNull(),\n emailVerifiedAt: timestamp(\"email_verified_at\", { precision: 3 }),\n createdAt: timestamp(\"created_at\", { precision: 3 }).notNull().defaultNow(),\n updatedAt: timestamp(\"updated_at\", { precision: 3 }),\n});\n\nexport const rolesTable = pgTable(\"roles\", {\n id: text(\"id\")\n .$defaultFn(() => crypto.randomUUID())\n .notNull()\n .primaryKey(),\n name: text(\"name\").notNull().unique(), // np. \"admin\", \"user\"\n description: text(\"description\"),\n});\n\nexport const permissionsTable = pgTable(\"permissions\", {\n id: text(\"id\")\n .$defaultFn(() => crypto.randomUUID())\n .notNull()\n .primaryKey(),\n name: text(\"name\").notNull().unique(), // np. \"blog:write\"\n description: text(\"description\"),\n});\n\nexport const usersToRolesTable = pgTable(\n \"users_to_roles\",\n {\n userId: text(\"user_id\")\n .notNull()\n .references(() => userTable.id, { onDelete: \"cascade\" }),\n roleId: text(\"role_id\")\n .notNull()\n .references(() => rolesTable.id, { onDelete: \"cascade\" }),\n },\n (t) => [{ pk: sql`PRIMARY KEY (${t.userId}, ${t.roleId})` }],\n);\n\nexport const usersToPermissionsTable = pgTable(\n \"users_to_permissions\",\n {\n userId: text(\"user_id\")\n .notNull()\n .references(() => userTable.id, { onDelete: \"cascade\" }),\n permissionId: text(\"permission_id\")\n .notNull()\n .references(() => permissionsTable.id, { onDelete: \"cascade\" }),\n },\n (t) => [{ pk: sql`PRIMARY KEY (${t.userId}, ${t.permissionId})` }],\n);\n\nexport const rolesToPermissionsTable = pgTable(\n \"roles_to_permissions\",\n {\n roleId: text(\"role_id\")\n .notNull()\n .references(() => rolesTable.id, { onDelete: \"cascade\" }),\n permissionId: text(\"permission_id\")\n .notNull()\n .references(() => permissionsTable.id, { onDelete: \"cascade\" }),\n },\n (t) => [{ pk: sql`PRIMARY KEY (${t.roleId}, ${t.permissionId})` }],\n);\n\nexport const sessionTable = pgTable(\"sessions\", {\n id: text(\"id\")\n .$defaultFn(() => crypto.randomUUID())\n .notNull()\n .primaryKey(),\n active_organization_id: text(\"active_organization_id\"),\n userId: text(\"user_id\")\n .notNull()\n .references(() => userTable.id, {\n onDelete: \"cascade\",\n onUpdate: \"cascade\",\n }),\n expiresAt: timestamp(\"expires_at\", { precision: 3 }).notNull(),\n createdAt: timestamp(\"created_at\", { precision: 3 }).notNull().defaultNow(),\n updatedAt: timestamp(\"updated_at\", { precision: 3 }),\n});\n\nexport const emailVerificationTable = pgTable(\"email_verification_requests\", {\n id: text(\"id\")\n .$defaultFn(() => crypto.randomUUID())\n .notNull()\n .primaryKey(),\n email: text(\"email\").notNull(),\n code: text(\"code\").notNull(),\n userId: text(\"user_id\")\n .notNull()\n .references(() => userTable.id, {\n onDelete: \"cascade\",\n onUpdate: \"cascade\",\n }),\n expiresAt: timestamp(\"expires_at\", { precision: 3 }).notNull(),\n createdAt: timestamp(\"created_at\", { precision: 3 }).notNull().defaultNow(),\n updatedAt: timestamp(\"updated_at\", { precision: 3 }),\n});\n\nexport const passwordResetSessionTable = pgTable(\"password_reset_sessions\", {\n id: text(\"id\")\n .$defaultFn(() => crypto.randomUUID())\n .notNull()\n .primaryKey(),\n email: text(\"email\").notNull(),\n code: text(\"code\").notNull(),\n emailVerified: boolean(\"emailVerified\").default(false),\n userId: text(\"user_id\")\n .notNull()\n .references(() => userTable.id, {\n onDelete: \"cascade\",\n onUpdate: \"cascade\",\n }),\n expiresAt: timestamp(\"expires_at\", { precision: 3 }).notNull(),\n createdAt: timestamp(\"created_at\", { precision: 3 }).notNull().defaultNow(),\n updatedAt: timestamp(\"updated_at\", { precision: 3 }),\n});\n\nexport const notificationTable = pgTable(\"notification\", {\n id: text(\"id\")\n .$defaultFn(() => crypto.randomUUID())\n .notNull()\n .primaryKey(),\n title: text(\"title\").notNull(),\n content: text(\"content\"),\n target: text(\"target\"),\n type: text(\"type\"),\n isRead: boolean(\"isRead\").notNull(),\n resourceId: text(\"resource_id\"),\n resourceType: text(\"resource_type\"),\n userId: text(\"user_id\")\n .notNull()\n .references(() => userTable.id, {\n onDelete: \"cascade\",\n onUpdate: \"cascade\",\n }),\n createdAt: timestamp(\"created_at\", { precision: 3 }).notNull().defaultNow(),\n updatedAt: timestamp(\"updated_at\", { precision: 3 }),\n});\n\nexport const systemModulesTable = pgTable(\"system_modules\", {\n id: text(\"id\").notNull().primaryKey(),\n enabled: boolean(\"enabled\").notNull().default(false),\n installed: boolean(\"installed\").notNull().default(false),\n deleted: boolean(\"deleted\").notNull().default(false),\n system: boolean(\"system\").notNull().default(false),\n config: text(\"config\"),\n lastStep: text(\"last_step\"), // Przechowuje aktualny etap (np. \"Syncing DB\")\n updatedAt: timestamp(\"updated_at\", { precision: 3 }).defaultNow(),\n});\n\nexport const relations = defineRelations(\n {\n user: userTable,\n emailVerification: emailVerificationTable,\n passwordResetSession: passwordResetSessionTable,\n session: sessionTable,\n notification: notificationTable,\n systemModulesTable: systemModulesTable,\n },\n (r) => ({\n user: {\n sessions: r.many.session({\n from: r.user.id,\n to: r.session.userId,\n }),\n emailVerification: r.many.emailVerification({\n from: r.user.id,\n to: r.emailVerification.userId,\n }),\n passwordResetSession: r.many.passwordResetSession({\n from: r.user.id,\n to: r.passwordResetSession.userId,\n }),\n },\n\n session: {\n user: r.one.user({\n from: r.session.userId,\n to: r.user.id,\n }),\n },\n\n emailVerification: {\n user: r.one.user({\n from: r.emailVerification.userId,\n to: r.user.id,\n }),\n },\n\n passwordResetSession: {\n user: r.one.user({\n from: r.passwordResetSession.userId,\n to: r.user.id,\n }),\n },\n }),\n);\n\n\nexport const activityLogsTable = pgTable(\"activity_logs\", {\n id: text(\"id\")\n .$defaultFn(() => crypto.randomUUID())\n .notNull()\n .primaryKey(),\n userId: text(\"user_id\").references(() => userTable.id, {\n onDelete: \"set null\",\n }),\n action: text(\"action\").notNull(), // np. \"blog.post.created\"\n description: text(\"description\").notNull(), // np. \"Użytkownik dodał komentarz\"\n metadata: jsonb(\"metadata\"), // dodatkowe dane (np. ID posta)\n createdAt: timestamp(\"created_at\", { precision: 3 }).notNull().defaultNow(),\n});\n\nexport const coreSchema = {\n userTable,\n rolesTable,\n permissionsTable,\n usersToRolesTable,\n usersToPermissionsTable,\n rolesToPermissionsTable,\n sessionTable,\n emailVerificationTable,\n passwordResetSessionTable,\n notificationTable,\n systemModulesTable,\n};\n\nexport type DatabaseSchema = typeof relations;\n"],"mappings":"iKAGA,MAAa,EAAY,EAAQ,QAAS,CACxC,GAAI,EAAK,KAAK,CACX,eAAiB,OAAO,YAAY,CAAC,CACrC,SAAS,CACT,YAAY,CACf,MAAO,EAAK,QAAQ,CAAC,SAAS,CAAC,QAAQ,CACvC,KAAM,EAAK,OAAO,CAAC,SAAS,CAC5B,SAAU,EAAK,WAAW,CAC1B,MAAO,EAAK,QAAQ,CACpB,cAAe,EAAM,gBAAgB,CAAC,SAAS,CAC/C,gBAAiB,EAAU,oBAAqB,CAAE,UAAW,EAAG,CAAC,CACjE,UAAW,EAAU,aAAc,CAAE,UAAW,EAAG,CAAC,CAAC,SAAS,CAAC,YAAY,CAC3E,UAAW,EAAU,aAAc,CAAE,UAAW,EAAG,CAAC,CACrD,CAAC,CAEW,EAAa,EAAQ,QAAS,CACzC,GAAI,EAAK,KAAK,CACX,eAAiB,OAAO,YAAY,CAAC,CACrC,SAAS,CACT,YAAY,CACf,KAAM,EAAK,OAAO,CAAC,SAAS,CAAC,QAAQ,CACrC,YAAa,EAAK,cAAc,CACjC,CAAC,CAEW,EAAmB,EAAQ,cAAe,CACrD,GAAI,EAAK,KAAK,CACX,eAAiB,OAAO,YAAY,CAAC,CACrC,SAAS,CACT,YAAY,CACf,KAAM,EAAK,OAAO,CAAC,SAAS,CAAC,QAAQ,CACrC,YAAa,EAAK,cAAc,CACjC,CAAC,CAEW,EAAoB,EAC/B,iBACA,CACE,OAAQ,EAAK,UAAU,CACpB,SAAS,CACT,eAAiB,EAAU,GAAI,CAAE,SAAU,UAAW,CAAC,CAC1D,OAAQ,EAAK,UAAU,CACpB,SAAS,CACT,eAAiB,EAAW,GAAI,CAAE,SAAU,UAAW,CAAC,CAC5D,CACA,GAAM,CAAC,CAAE,GAAI,CAAG,gBAAgB,EAAE,OAAO,IAAI,EAAE,OAAO,GAAI,CAAC,CAC7D,CAEY,EAA0B,EACrC,uBACA,CACE,OAAQ,EAAK,UAAU,CACpB,SAAS,CACT,eAAiB,EAAU,GAAI,CAAE,SAAU,UAAW,CAAC,CAC1D,aAAc,EAAK,gBAAgB,CAChC,SAAS,CACT,eAAiB,EAAiB,GAAI,CAAE,SAAU,UAAW,CAAC,CAClE,CACA,GAAM,CAAC,CAAE,GAAI,CAAG,gBAAgB,EAAE,OAAO,IAAI,EAAE,aAAa,GAAI,CAAC,CACnE,CAEY,EAA0B,EACrC,uBACA,CACE,OAAQ,EAAK,UAAU,CACpB,SAAS,CACT,eAAiB,EAAW,GAAI,CAAE,SAAU,UAAW,CAAC,CAC3D,aAAc,EAAK,gBAAgB,CAChC,SAAS,CACT,eAAiB,EAAiB,GAAI,CAAE,SAAU,UAAW,CAAC,CAClE,CACA,GAAM,CAAC,CAAE,GAAI,CAAG,gBAAgB,EAAE,OAAO,IAAI,EAAE,aAAa,GAAI,CAAC,CACnE,CAEY,EAAe,EAAQ,WAAY,CAC9C,GAAI,EAAK,KAAK,CACX,eAAiB,OAAO,YAAY,CAAC,CACrC,SAAS,CACT,YAAY,CACf,uBAAwB,EAAK,yBAAyB,CACtD,OAAQ,EAAK,UAAU,CACpB,SAAS,CACT,eAAiB,EAAU,GAAI,CAC9B,SAAU,UACV,SAAU,UACX,CAAC,CACJ,UAAW,EAAU,aAAc,CAAE,UAAW,EAAG,CAAC,CAAC,SAAS,CAC9D,UAAW,EAAU,aAAc,CAAE,UAAW,EAAG,CAAC,CAAC,SAAS,CAAC,YAAY,CAC3E,UAAW,EAAU,aAAc,CAAE,UAAW,EAAG,CAAC,CACrD,CAAC,CAEW,EAAyB,EAAQ,8BAA+B,CAC3E,GAAI,EAAK,KAAK,CACX,eAAiB,OAAO,YAAY,CAAC,CACrC,SAAS,CACT,YAAY,CACf,MAAO,EAAK,QAAQ,CAAC,SAAS,CAC9B,KAAM,EAAK,OAAO,CAAC,SAAS,CAC5B,OAAQ,EAAK,UAAU,CACpB,SAAS,CACT,eAAiB,EAAU,GAAI,CAC9B,SAAU,UACV,SAAU,UACX,CAAC,CACJ,UAAW,EAAU,aAAc,CAAE,UAAW,EAAG,CAAC,CAAC,SAAS,CAC9D,UAAW,EAAU,aAAc,CAAE,UAAW,EAAG,CAAC,CAAC,SAAS,CAAC,YAAY,CAC3E,UAAW,EAAU,aAAc,CAAE,UAAW,EAAG,CAAC,CACrD,CAAC,CAEW,EAA4B,EAAQ,0BAA2B,CAC1E,GAAI,EAAK,KAAK,CACX,eAAiB,OAAO,YAAY,CAAC,CACrC,SAAS,CACT,YAAY,CACf,MAAO,EAAK,QAAQ,CAAC,SAAS,CAC9B,KAAM,EAAK,OAAO,CAAC,SAAS,CAC5B,cAAe,EAAQ,gBAAgB,CAAC,QAAQ,GAAM,CACtD,OAAQ,EAAK,UAAU,CACpB,SAAS,CACT,eAAiB,EAAU,GAAI,CAC9B,SAAU,UACV,SAAU,UACX,CAAC,CACJ,UAAW,EAAU,aAAc,CAAE,UAAW,EAAG,CAAC,CAAC,SAAS,CAC9D,UAAW,EAAU,aAAc,CAAE,UAAW,EAAG,CAAC,CAAC,SAAS,CAAC,YAAY,CAC3E,UAAW,EAAU,aAAc,CAAE,UAAW,EAAG,CAAC,CACrD,CAAC,CAEW,EAAoB,EAAQ,eAAgB,CACvD,GAAI,EAAK,KAAK,CACX,eAAiB,OAAO,YAAY,CAAC,CACrC,SAAS,CACT,YAAY,CACf,MAAO,EAAK,QAAQ,CAAC,SAAS,CAC9B,QAAS,EAAK,UAAU,CACxB,OAAQ,EAAK,SAAS,CACtB,KAAM,EAAK,OAAO,CAClB,OAAQ,EAAQ,SAAS,CAAC,SAAS,CACnC,WAAY,EAAK,cAAc,CAC/B,aAAc,EAAK,gBAAgB,CACnC,OAAQ,EAAK,UAAU,CACpB,SAAS,CACT,eAAiB,EAAU,GAAI,CAC9B,SAAU,UACV,SAAU,UACX,CAAC,CACJ,UAAW,EAAU,aAAc,CAAE,UAAW,EAAG,CAAC,CAAC,SAAS,CAAC,YAAY,CAC3E,UAAW,EAAU,aAAc,CAAE,UAAW,EAAG,CAAC,CACrD,CAAC,CAEW,EAAqB,EAAQ,iBAAkB,CAC1D,GAAI,EAAK,KAAK,CAAC,SAAS,CAAC,YAAY,CACrC,QAAS,EAAQ,UAAU,CAAC,SAAS,CAAC,QAAQ,GAAM,CACpD,UAAW,EAAQ,YAAY,CAAC,SAAS,CAAC,QAAQ,GAAM,CACxD,QAAS,EAAQ,UAAU,CAAC,SAAS,CAAC,QAAQ,GAAM,CACpD,OAAQ,EAAQ,SAAS,CAAC,SAAS,CAAC,QAAQ,GAAM,CAClD,OAAQ,EAAK,SAAS,CACtB,SAAU,EAAK,YAAY,CAC3B,UAAW,EAAU,aAAc,CAAE,UAAW,EAAG,CAAC,CAAC,YAAY,CAClE,CAAC,CAEW,EAAY,EACvB,CACE,KAAM,EACN,kBAAmB,EACnB,qBAAsB,EACtB,QAAS,EACT,aAAc,EACM,qBACrB,CACA,IAAO,CACN,KAAM,CACJ,SAAU,EAAE,KAAK,QAAQ,CACvB,KAAM,EAAE,KAAK,GACb,GAAI,EAAE,QAAQ,OACf,CAAC,CACF,kBAAmB,EAAE,KAAK,kBAAkB,CAC1C,KAAM,EAAE,KAAK,GACb,GAAI,EAAE,kBAAkB,OACzB,CAAC,CACF,qBAAsB,EAAE,KAAK,qBAAqB,CAChD,KAAM,EAAE,KAAK,GACb,GAAI,EAAE,qBAAqB,OAC5B,CAAC,CACH,CAED,QAAS,CACP,KAAM,EAAE,IAAI,KAAK,CACf,KAAM,EAAE,QAAQ,OAChB,GAAI,EAAE,KAAK,GACZ,CAAC,CACH,CAED,kBAAmB,CACjB,KAAM,EAAE,IAAI,KAAK,CACf,KAAM,EAAE,kBAAkB,OAC1B,GAAI,EAAE,KAAK,GACZ,CAAC,CACH,CAED,qBAAsB,CACpB,KAAM,EAAE,IAAI,KAAK,CACf,KAAM,EAAE,qBAAqB,OAC7B,GAAI,EAAE,KAAK,GACZ,CAAC,CACH,CACF,EACF,CAGY,EAAoB,EAAQ,gBAAiB,CACxD,GAAI,EAAK,KAAK,CACX,eAAiB,OAAO,YAAY,CAAC,CACrC,SAAS,CACT,YAAY,CACf,OAAQ,EAAK,UAAU,CAAC,eAAiB,EAAU,GAAI,CACrD,SAAU,WACX,CAAC,CACF,OAAQ,EAAK,SAAS,CAAC,SAAS,CAChC,YAAa,EAAK,cAAc,CAAC,SAAS,CAC1C,SAAU,EAAM,WAAW,CAC3B,UAAW,EAAU,aAAc,CAAE,UAAW,EAAG,CAAC,CAAC,SAAS,CAAC,YAAY,CAC5E,CAAC,CAEW,EAAa,CACxB,YACA,aACA,mBACA,oBACA,0BACA,0BACA,eACA,yBACA,4BACA,oBACA,qBACD"}
@@ -0,0 +1 @@
1
+ "use server";async function e(e,t){}async function t(e,t){}async function n(e,t){}async function r(e,t){}exports.send2FACode=r,exports.sendRecoveryCode=n,exports.sendResetPassword=t,exports.sendVerifyEmail=e;
@@ -0,0 +1,26 @@
1
+ //#region src/server/emails/index.d.ts
2
+ /**
3
+ * Sends an email with a verification link.
4
+ * @param email Recipient's email address.
5
+ * @param code Verification code.
6
+ */
7
+ declare function sendVerifyEmail(email: string, code: string): Promise<void>;
8
+ /**
9
+ * Sends an email with a password reset link.
10
+ * @param email Recipient's email address.
11
+ * @param code Password reset code.
12
+ */
13
+ declare function sendResetPassword(email: string, code: string): Promise<void>;
14
+ /**
15
+ * Sends an email with a recovery code.
16
+ * @param email Recipient's email address.
17
+ * @param recoveryCode Recovery code
18
+ */
19
+ declare function sendRecoveryCode(email: string, recoveryCode: string): Promise<void>;
20
+ /**
21
+ * Sends a 2FA code via email.
22
+ */
23
+ declare function send2FACode(email: string, code: string): Promise<void>;
24
+ //#endregion
25
+ export { send2FACode, sendRecoveryCode, sendResetPassword, sendVerifyEmail };
26
+ //# sourceMappingURL=index.d.cts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"index.d.cts","names":[],"sources":["../../../src/server/emails/index.ts"],"mappings":";;AAkBA;;;;iBAAsB,eAAA,CAAgB,KAAA,UAAe,IAAA,WAAY,OAAA;;;;;AAejE;iBAAsB,iBAAA,CAAkB,KAAA,UAAe,IAAA,WAAY,OAAA;;;;;;iBAe7C,gBAAA,CAAiB,KAAA,UAAe,YAAA,WAAoB,OAAA;;AAA1E;;iBAasB,WAAA,CAAY,KAAA,UAAe,IAAA,WAAY,OAAA"}
@@ -0,0 +1,26 @@
1
+ //#region src/server/emails/index.d.ts
2
+ /**
3
+ * Sends an email with a verification link.
4
+ * @param email Recipient's email address.
5
+ * @param code Verification code.
6
+ */
7
+ declare function sendVerifyEmail(email: string, code: string): Promise<void>;
8
+ /**
9
+ * Sends an email with a password reset link.
10
+ * @param email Recipient's email address.
11
+ * @param code Password reset code.
12
+ */
13
+ declare function sendResetPassword(email: string, code: string): Promise<void>;
14
+ /**
15
+ * Sends an email with a recovery code.
16
+ * @param email Recipient's email address.
17
+ * @param recoveryCode Recovery code
18
+ */
19
+ declare function sendRecoveryCode(email: string, recoveryCode: string): Promise<void>;
20
+ /**
21
+ * Sends a 2FA code via email.
22
+ */
23
+ declare function send2FACode(email: string, code: string): Promise<void>;
24
+ //#endregion
25
+ export { send2FACode, sendRecoveryCode, sendResetPassword, sendVerifyEmail };
26
+ //# sourceMappingURL=index.d.mts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"index.d.mts","names":[],"sources":["../../../src/server/emails/index.ts"],"mappings":";;AAkBA;;;;iBAAsB,eAAA,CAAgB,KAAA,UAAe,IAAA,WAAY,OAAA;;;;;AAejE;iBAAsB,iBAAA,CAAkB,KAAA,UAAe,IAAA,WAAY,OAAA;;;;;;iBAe7C,gBAAA,CAAiB,KAAA,UAAe,YAAA,WAAoB,OAAA;;AAA1E;;iBAasB,WAAA,CAAY,KAAA,UAAe,IAAA,WAAY,OAAA"}
@@ -0,0 +1,2 @@
1
+ "use server";async function e(e,t){}async function t(e,t){}async function n(e,t){}async function r(e,t){}export{r as send2FACode,n as sendRecoveryCode,t as sendResetPassword,e as sendVerifyEmail};
2
+ //# sourceMappingURL=index.mjs.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"index.mjs","names":[],"sources":["../../../src/server/emails/index.ts"],"sourcesContent":["\"use server\";\n\n// import nodemailer from \"nodemailer\";\n\n// Konfiguracja transportera SMTP\n// const transporter = nodemailer.createTransport({\n// service: \"gmail\",\n// auth: {\n// user: process.env.GOOGLE_SMTP_APP_USERNAME,\n// pass: process.env.GOOGLE_SMTP_APP_PASSWORD,\n// },\n// });\n\n/**\n * Sends an email with a verification link.\n * @param email Recipient's email address.\n * @param code Verification code.\n */\nexport async function sendVerifyEmail(email: string, code: string) {\n // const { t } = await getTranslation();\n // await transporter.sendMail({\n // from: `Winkly <${process.env.GOOGLE_SMTP_APP_USERNAME}>`,\n // to: email,\n // subject: t(\"Verify Email\"),\n // text: t(\"Verify your email address with your code: {{ code }}\", { code }),\n // });\n}\n\n/**\n * Sends an email with a password reset link.\n * @param email Recipient's email address.\n * @param code Password reset code.\n */\nexport async function sendResetPassword(email: string, code: string) {\n // const { t } = await getTranslation();\n // await transporter.sendMail({\n // from: `Winkly <${process.env.GOOGLE_SMTP_APP_USERNAME}>`,\n // to: email,\n // subject: t(\"Password Reset\"),\n // text: t(\"Verify password reset with code: {{ code }}\", { code }),\n // });\n}\n\n/**\n * Sends an email with a recovery code.\n * @param email Recipient's email address.\n * @param recoveryCode Recovery code\n */\nexport async function sendRecoveryCode(email: string, recoveryCode: string) {\n // const { t } = await getTranslation();\n // await transporter.sendMail({\n // from: `Winkly <${process.env.GOOGLE_SMTP_APP_USERNAME}>`,\n // to: email,\n // subject: t(\"Recovery Code\"),\n // text: t(\"Your recovery code is: {{ recoveryCode }}\", { recoveryCode }),\n // });\n}\n\n/**\n * Sends a 2FA code via email.\n */\nexport async function send2FACode(email: string, code: string) {\n // const { t } = await getTranslation();\n // await transporter.sendMail({\n // from: `Winkly <${process.env.GOOGLE_SMTP_APP_USERNAME}>`,\n // to: email,\n // subject: t(\"Your 2FA Code\"),\n // text: t(\n // \"Your verification code is: {{ code }}. It will expire in 10 minutes.\",\n // { code },\n // ),\n // });\n}\n"],"mappings":"aAkBA,eAAsB,EAAgB,EAAe,EAAc,EAenE,eAAsB,EAAkB,EAAe,EAAc,EAerE,eAAsB,EAAiB,EAAe,EAAsB,EAa5E,eAAsB,EAAY,EAAe,EAAc"}
@@ -0,0 +1 @@
1
+ Object.defineProperty(exports,Symbol.toStringTag,{value:`Module`});const e=require(`./core/auth/validation.cjs`),t=require(`./core/event-bus.cjs`),n=require(`./server/database/inject.cjs`),r=require(`./server/database/schema.cjs`),i=require(`./core/auth/augment.cjs`),a=require(`./server/auth/password.cjs`),o=require(`./core/auth/utils/encode.cjs`),s=require(`./core/auth/utils/encryption.cjs`),c=require(`./server/emails/index.cjs`),l=require(`./server/auth/user.cjs`),u=require(`./core/auth/email-verification.cjs`),d=require(`./core/auth/logic.cjs`),f=require(`./core/auth/session.cjs`),p=require(`./core/notifications/actions.cjs`),m=require(`./core/auth/password-reset.cjs`),h=require(`./core/auth/rbac.cjs`),g=require(`./core/filesystem/service.cjs`),_=require(`./core/setup.cjs`),v=require(`./core/bootstrap.cjs`),y=require(`./core/config.server.cjs`),b=require(`./server/auth/email.cjs`);exports.activityLogsTable=r.activityLogsTable,exports.assignPermissionToRole=h.assignPermissionToRole,exports.assignPermissionToUser=h.assignPermissionToUser,exports.assignRoleToUser=h.assignRoleToUser,exports.augmentSession=i.augmentSession,exports.augmentUser=i.augmentUser,exports.checkEmailAvailability=b.checkEmailAvailability,exports.checkSecurity=d.checkSecurity,exports.coreSchema=r.coreSchema,exports.createEmailVerificationRequest=u.createEmailVerificationRequest,exports.createNotification=p.createNotification,exports.createOAuthUser=l.createOAuthUser,exports.createPasswordResetSession=m.createPasswordResetSession,exports.createPermission=h.createPermission,exports.createRole=h.createRole,exports.createSession=f.createSession,exports.createUser=l.createUser,exports.db=n.db,exports.decrypt=s.decrypt,exports.decryptToString=s.decryptToString,exports.deleteEmailVerificationRequestCookie=u.deleteEmailVerificationRequestCookie,exports.deletePasswordResetSessionTokenCookie=m.deletePasswordResetSessionTokenCookie,exports.deletePermission=h.deletePermission,exports.deleteRole=h.deleteRole,exports.deleteSessionTokenCookie=f.deleteSessionTokenCookie,exports.deleteUserEmailVerificationRequest=u.deleteUserEmailVerificationRequest,exports.emailVerificationTable=r.emailVerificationTable,exports.encrypt=s.encrypt,exports.encryptString=s.encryptString,exports.ensureSystemInitialized=v.ensureSystemInitialized,exports.eventBus=t.eventBus,exports.filesystemService=g.filesystemService,exports.finalizeLogin=d.finalizeLogin,exports.forgotPasswordSchema=e.forgotPasswordSchema,exports.generateRandomOTP=o.generateRandomOTP,exports.generateRandomRecoveryCode=o.generateRandomRecoveryCode,exports.generateSessionToken=f.generateSessionToken,exports.getCurrentPasswordResetSession=m.getCurrentPasswordResetSession,exports.getCurrentSession=f.getCurrentSession,exports.getIPAddress=f.getIPAddress,exports.getKryoConfig=y.getKryoConfig,exports.getModulesDir=y.getModulesDir,exports.getPermissions=h.getPermissions,exports.getRoleById=h.getRoleById,exports.getRolePermissions=h.getRolePermissions,exports.getRoles=h.getRoles,exports.getUserById=l.getUserById,exports.getUserEmailVerificationRequest=u.getUserEmailVerificationRequest,exports.getUserEmailVerificationRequestFromRequest=u.getUserEmailVerificationRequestFromRequest,exports.getUserFromEmail=l.getUserFromEmail,exports.getUserNotifications=p.getUserNotifications,exports.getUserPasswordHash=l.getUserPasswordHash,exports.getUserRbacData=h.getUserRbacData,exports.getUserRecoverCode=l.getUserRecoverCode,exports.getUserSessions=f.getUserSessions,exports.hashPassword=a.hashPassword,exports.initEmailVerification=u.initEmailVerification,exports.injectDb=n.injectDb,exports.invalidateOtherSessions=f.invalidateOtherSessions,exports.invalidateSession=f.invalidateSession,exports.invalidateUserPasswordResetSessions=m.invalidateUserPasswordResetSessions,exports.invalidateUserSessions=f.invalidateUserSessions,exports.isSystemInstalled=_.isSystemInstalled,exports.loginSchema=e.loginSchema,exports.markAllNotificationsAsRead=p.markAllNotificationsAsRead,exports.markNotificationAsRead=p.markNotificationAsRead,exports.notificationTable=r.notificationTable,exports.passkeysSetupSchema=e.passkeysSetupSchema,exports.passwordResetSessionTable=r.passwordResetSessionTable,exports.performFullUserAugmentation=d.performFullUserAugmentation,exports.permissionsTable=r.permissionsTable,exports.recoveryCodeVerifySchema=e.recoveryCodeVerifySchema,exports.registerAuthValidator=d.registerAuthValidator,exports.registerEmailVerificationValidator=d.registerEmailVerificationValidator,exports.registerIdentityAugmenter=i.registerIdentityAugmenter,exports.registerPasswordResetSessionAugmenter=i.registerPasswordResetSessionAugmenter,exports.registerPasswordResetValidator=d.registerPasswordResetValidator,exports.registerSchema=e.registerSchema,exports.registerSecurityRequirement=d.registerSecurityRequirement,exports.registerSessionAugmenter=i.registerSessionAugmenter,exports.relations=r.relations,exports.resetPasswordSchema=e.resetPasswordSchema,exports.resetUserRecoveryCode=l.resetUserRecoveryCode,exports.revokePermissionFromRole=h.revokePermissionFromRole,exports.revokePermissionFromUser=h.revokePermissionFromUser,exports.revokeRoleFromUser=h.revokeRoleFromUser,exports.rolesTable=r.rolesTable,exports.rolesToPermissionsTable=r.rolesToPermissionsTable,exports.runEmailVerificationValidators=d.runEmailVerificationValidators,exports.runPasswordResetValidators=d.runPasswordResetValidators,exports.send2FACode=c.send2FACode,exports.sendPasswordResetEmail=m.sendPasswordResetEmail,exports.sendRecoveryCode=c.sendRecoveryCode,exports.sendResetPassword=c.sendResetPassword,exports.sendVerificationEmail=u.sendVerificationEmail,exports.sendVerifyEmail=c.sendVerifyEmail,exports.sessionSignOut=f.sessionSignOut,exports.sessionTable=r.sessionTable,exports.setEmailVerificationRequestCookie=u.setEmailVerificationRequestCookie,exports.setPasswordResetSessionAsEmailVerified=m.setPasswordResetSessionAsEmailVerified,exports.setPasswordResetSessionTokenCookie=m.setPasswordResetSessionTokenCookie,exports.setSessionTokenCookie=f.setSessionTokenCookie,exports.setUserAsEmailVerifiedIfEmailMatches=l.setUserAsEmailVerifiedIfEmailMatches,exports.signIn=d.signIn,exports.signOut=d.signOut,exports.signUp=d.signUp,exports.systemModulesTable=r.systemModulesTable,exports.totpSetupSchema=e.totpSetupSchema,exports.totpVerifySchema=e.totpVerifySchema,exports.updateUserAwatar=l.updateUserAwatar,exports.updateUserEmailAndSetEmailAsVerified=l.updateUserEmailAndSetEmailAsVerified,exports.updateUserName=l.updateUserName,exports.updateUserPassword=l.updateUserPassword,exports.userTable=r.userTable,exports.usersToPermissionsTable=r.usersToPermissionsTable,exports.usersToRolesTable=r.usersToRolesTable,exports.validatePasswordResetSessionToken=m.validatePasswordResetSessionToken,exports.validateSessionToken=f.validateSessionToken,exports.verifyEmailInput=b.verifyEmailInput,exports.verifyEmailSchema=e.verifyEmailSchema,exports.verifyPasswordHash=a.verifyPasswordHash,exports.verifyPasswordStrength=a.verifyPasswordStrength,exports.verifyUsernameInput=l.verifyUsernameInput;
@@ -0,0 +1,26 @@
1
+ import { DatabaseSchema, activityLogsTable, coreSchema, emailVerificationTable, notificationTable, passwordResetSessionTable, permissionsTable, relations, rolesTable, rolesToPermissionsTable, sessionTable, systemModulesTable, userTable, usersToPermissionsTable, usersToRolesTable } from "./server/database/schema.cjs";
2
+ import { EventHandler, SystemEvent, UserPermission, UserRole } from "./core/types.cjs";
3
+ import { AuthResponse, AuthSession, FullUser, PasswordResetAuthSession, PasswordResetSession, Session, SessionFlags, User, UserSession } from "./core/auth/types.cjs";
4
+ import { ForgotPasswordInput, LoginInput, PasskeysSetupInput, RecoveryVerifyInput, RegisterInput, ResetPasswordInput, TOTPSetupInput, TOTPVerifyInput, VerifyEmailInput, forgotPasswordSchema, loginSchema, passkeysSetupSchema, recoveryCodeVerifySchema, registerSchema, resetPasswordSchema, totpSetupSchema, totpVerifySchema, verifyEmailSchema } from "./core/auth/validation.cjs";
5
+ import { eventBus } from "./core/event-bus.cjs";
6
+ import { CreateNotificationPayload, Notification, NotificationEvents } from "./core/notifications/types.cjs";
7
+ import { createEmailVerificationRequest, deleteEmailVerificationRequestCookie, deleteUserEmailVerificationRequest, getUserEmailVerificationRequest, getUserEmailVerificationRequestFromRequest, initEmailVerification, sendVerificationEmail, setEmailVerificationRequestCookie } from "./core/auth/email-verification.cjs";
8
+ import { augmentSession, augmentUser, registerIdentityAugmenter, registerPasswordResetSessionAugmenter, registerSessionAugmenter } from "./core/auth/augment.cjs";
9
+ import { checkSecurity, finalizeLogin, performFullUserAugmentation, registerAuthValidator, registerEmailVerificationValidator, registerPasswordResetValidator, registerSecurityRequirement, runEmailVerificationValidators, runPasswordResetValidators, signIn, signOut, signUp } from "./core/auth/logic.cjs";
10
+ import { createPasswordResetSession, deletePasswordResetSessionTokenCookie, getCurrentPasswordResetSession, invalidateUserPasswordResetSessions, sendPasswordResetEmail, setPasswordResetSessionAsEmailVerified, setPasswordResetSessionTokenCookie, validatePasswordResetSessionToken } from "./core/auth/password-reset.cjs";
11
+ import { assignPermissionToRole, assignPermissionToUser, assignRoleToUser, createPermission, createRole, deletePermission, deleteRole, getPermissions, getRoleById, getRolePermissions, getRoles, getUserRbacData, revokePermissionFromRole, revokePermissionFromUser, revokeRoleFromUser } from "./core/auth/rbac.cjs";
12
+ import { createSession, deleteSessionTokenCookie, generateSessionToken, getCurrentSession, getIPAddress, getUserSessions, invalidateOtherSessions, invalidateSession, invalidateUserSessions, sessionSignOut, setSessionTokenCookie, validateSessionToken } from "./core/auth/session.cjs";
13
+ import { generateRandomOTP, generateRandomRecoveryCode } from "./core/auth/utils/encode.cjs";
14
+ import { decrypt, decryptToString, encrypt, encryptString } from "./core/auth/utils/encryption.cjs";
15
+ import { ensureSystemInitialized } from "./core/bootstrap.cjs";
16
+ import { getKryoConfig, getModulesDir } from "./core/config.server.cjs";
17
+ import { IStorageProvider, StorageData, StorageError, StorageResult } from "./core/filesystem/types.cjs";
18
+ import { filesystemService } from "./core/filesystem/service.cjs";
19
+ import { createNotification, getUserNotifications, markAllNotificationsAsRead, markNotificationAsRead } from "./core/notifications/actions.cjs";
20
+ import { isSystemInstalled } from "./core/setup.cjs";
21
+ import { checkEmailAvailability, verifyEmailInput } from "./server/auth/email.cjs";
22
+ import { hashPassword, verifyPasswordHash, verifyPasswordStrength } from "./server/auth/password.cjs";
23
+ import { createOAuthUser, createUser, getUserById, getUserFromEmail, getUserPasswordHash, getUserRecoverCode, resetUserRecoveryCode, setUserAsEmailVerifiedIfEmailMatches, updateUserAwatar, updateUserEmailAndSetEmailAsVerified, updateUserName, updateUserPassword, verifyUsernameInput } from "./server/auth/user.cjs";
24
+ import { KryoDatabase, db, injectDb } from "./server/database/inject.cjs";
25
+ import { send2FACode, sendRecoveryCode, sendResetPassword, sendVerifyEmail } from "./server/emails/index.cjs";
26
+ export { AuthResponse, AuthSession, CreateNotificationPayload, DatabaseSchema, EventHandler, ForgotPasswordInput, FullUser, IStorageProvider, KryoDatabase, LoginInput, Notification, NotificationEvents, PasskeysSetupInput, PasswordResetAuthSession, PasswordResetSession, RecoveryVerifyInput, RegisterInput, ResetPasswordInput, Session, SessionFlags, StorageData, StorageError, StorageResult, SystemEvent, TOTPSetupInput, TOTPVerifyInput, User, UserPermission, UserRole, UserSession, VerifyEmailInput, activityLogsTable, assignPermissionToRole, assignPermissionToUser, assignRoleToUser, augmentSession, augmentUser, checkEmailAvailability, checkSecurity, coreSchema, createEmailVerificationRequest, createNotification, createOAuthUser, createPasswordResetSession, createPermission, createRole, createSession, createUser, db, decrypt, decryptToString, deleteEmailVerificationRequestCookie, deletePasswordResetSessionTokenCookie, deletePermission, deleteRole, deleteSessionTokenCookie, deleteUserEmailVerificationRequest, emailVerificationTable, encrypt, encryptString, ensureSystemInitialized, eventBus, filesystemService, finalizeLogin, forgotPasswordSchema, generateRandomOTP, generateRandomRecoveryCode, generateSessionToken, getCurrentPasswordResetSession, getCurrentSession, getIPAddress, getKryoConfig, getModulesDir, getPermissions, getRoleById, getRolePermissions, getRoles, getUserById, getUserEmailVerificationRequest, getUserEmailVerificationRequestFromRequest, getUserFromEmail, getUserNotifications, getUserPasswordHash, getUserRbacData, getUserRecoverCode, getUserSessions, hashPassword, initEmailVerification, injectDb, invalidateOtherSessions, invalidateSession, invalidateUserPasswordResetSessions, invalidateUserSessions, isSystemInstalled, loginSchema, markAllNotificationsAsRead, markNotificationAsRead, notificationTable, passkeysSetupSchema, passwordResetSessionTable, performFullUserAugmentation, permissionsTable, recoveryCodeVerifySchema, registerAuthValidator, registerEmailVerificationValidator, registerIdentityAugmenter, registerPasswordResetSessionAugmenter, registerPasswordResetValidator, registerSchema, registerSecurityRequirement, registerSessionAugmenter, relations, resetPasswordSchema, resetUserRecoveryCode, revokePermissionFromRole, revokePermissionFromUser, revokeRoleFromUser, rolesTable, rolesToPermissionsTable, runEmailVerificationValidators, runPasswordResetValidators, send2FACode, sendPasswordResetEmail, sendRecoveryCode, sendResetPassword, sendVerificationEmail, sendVerifyEmail, sessionSignOut, sessionTable, setEmailVerificationRequestCookie, setPasswordResetSessionAsEmailVerified, setPasswordResetSessionTokenCookie, setSessionTokenCookie, setUserAsEmailVerifiedIfEmailMatches, signIn, signOut, signUp, systemModulesTable, totpSetupSchema, totpVerifySchema, updateUserAwatar, updateUserEmailAndSetEmailAsVerified, updateUserName, updateUserPassword, userTable, usersToPermissionsTable, usersToRolesTable, validatePasswordResetSessionToken, validateSessionToken, verifyEmailInput, verifyEmailSchema, verifyPasswordHash, verifyPasswordStrength, verifyUsernameInput };
@@ -0,0 +1,26 @@
1
+ import { DatabaseSchema, activityLogsTable, coreSchema, emailVerificationTable, notificationTable, passwordResetSessionTable, permissionsTable, relations, rolesTable, rolesToPermissionsTable, sessionTable, systemModulesTable, userTable, usersToPermissionsTable, usersToRolesTable } from "./server/database/schema.mjs";
2
+ import { EventHandler, SystemEvent, UserPermission, UserRole } from "./core/types.mjs";
3
+ import { AuthResponse, AuthSession, FullUser, PasswordResetAuthSession, PasswordResetSession, Session, SessionFlags, User, UserSession } from "./core/auth/types.mjs";
4
+ import { ForgotPasswordInput, LoginInput, PasskeysSetupInput, RecoveryVerifyInput, RegisterInput, ResetPasswordInput, TOTPSetupInput, TOTPVerifyInput, VerifyEmailInput, forgotPasswordSchema, loginSchema, passkeysSetupSchema, recoveryCodeVerifySchema, registerSchema, resetPasswordSchema, totpSetupSchema, totpVerifySchema, verifyEmailSchema } from "./core/auth/validation.mjs";
5
+ import { eventBus } from "./core/event-bus.mjs";
6
+ import { CreateNotificationPayload, Notification, NotificationEvents } from "./core/notifications/types.mjs";
7
+ import { createEmailVerificationRequest, deleteEmailVerificationRequestCookie, deleteUserEmailVerificationRequest, getUserEmailVerificationRequest, getUserEmailVerificationRequestFromRequest, initEmailVerification, sendVerificationEmail, setEmailVerificationRequestCookie } from "./core/auth/email-verification.mjs";
8
+ import { augmentSession, augmentUser, registerIdentityAugmenter, registerPasswordResetSessionAugmenter, registerSessionAugmenter } from "./core/auth/augment.mjs";
9
+ import { checkSecurity, finalizeLogin, performFullUserAugmentation, registerAuthValidator, registerEmailVerificationValidator, registerPasswordResetValidator, registerSecurityRequirement, runEmailVerificationValidators, runPasswordResetValidators, signIn, signOut, signUp } from "./core/auth/logic.mjs";
10
+ import { createPasswordResetSession, deletePasswordResetSessionTokenCookie, getCurrentPasswordResetSession, invalidateUserPasswordResetSessions, sendPasswordResetEmail, setPasswordResetSessionAsEmailVerified, setPasswordResetSessionTokenCookie, validatePasswordResetSessionToken } from "./core/auth/password-reset.mjs";
11
+ import { assignPermissionToRole, assignPermissionToUser, assignRoleToUser, createPermission, createRole, deletePermission, deleteRole, getPermissions, getRoleById, getRolePermissions, getRoles, getUserRbacData, revokePermissionFromRole, revokePermissionFromUser, revokeRoleFromUser } from "./core/auth/rbac.mjs";
12
+ import { createSession, deleteSessionTokenCookie, generateSessionToken, getCurrentSession, getIPAddress, getUserSessions, invalidateOtherSessions, invalidateSession, invalidateUserSessions, sessionSignOut, setSessionTokenCookie, validateSessionToken } from "./core/auth/session.mjs";
13
+ import { generateRandomOTP, generateRandomRecoveryCode } from "./core/auth/utils/encode.mjs";
14
+ import { decrypt, decryptToString, encrypt, encryptString } from "./core/auth/utils/encryption.mjs";
15
+ import { ensureSystemInitialized } from "./core/bootstrap.mjs";
16
+ import { getKryoConfig, getModulesDir } from "./core/config.server.mjs";
17
+ import { IStorageProvider, StorageData, StorageError, StorageResult } from "./core/filesystem/types.mjs";
18
+ import { filesystemService } from "./core/filesystem/service.mjs";
19
+ import { createNotification, getUserNotifications, markAllNotificationsAsRead, markNotificationAsRead } from "./core/notifications/actions.mjs";
20
+ import { isSystemInstalled } from "./core/setup.mjs";
21
+ import { checkEmailAvailability, verifyEmailInput } from "./server/auth/email.mjs";
22
+ import { hashPassword, verifyPasswordHash, verifyPasswordStrength } from "./server/auth/password.mjs";
23
+ import { createOAuthUser, createUser, getUserById, getUserFromEmail, getUserPasswordHash, getUserRecoverCode, resetUserRecoveryCode, setUserAsEmailVerifiedIfEmailMatches, updateUserAwatar, updateUserEmailAndSetEmailAsVerified, updateUserName, updateUserPassword, verifyUsernameInput } from "./server/auth/user.mjs";
24
+ import { KryoDatabase, db, injectDb } from "./server/database/inject.mjs";
25
+ import { send2FACode, sendRecoveryCode, sendResetPassword, sendVerifyEmail } from "./server/emails/index.mjs";
26
+ export { AuthResponse, AuthSession, CreateNotificationPayload, DatabaseSchema, EventHandler, ForgotPasswordInput, FullUser, IStorageProvider, KryoDatabase, LoginInput, Notification, NotificationEvents, PasskeysSetupInput, PasswordResetAuthSession, PasswordResetSession, RecoveryVerifyInput, RegisterInput, ResetPasswordInput, Session, SessionFlags, StorageData, StorageError, StorageResult, SystemEvent, TOTPSetupInput, TOTPVerifyInput, User, UserPermission, UserRole, UserSession, VerifyEmailInput, activityLogsTable, assignPermissionToRole, assignPermissionToUser, assignRoleToUser, augmentSession, augmentUser, checkEmailAvailability, checkSecurity, coreSchema, createEmailVerificationRequest, createNotification, createOAuthUser, createPasswordResetSession, createPermission, createRole, createSession, createUser, db, decrypt, decryptToString, deleteEmailVerificationRequestCookie, deletePasswordResetSessionTokenCookie, deletePermission, deleteRole, deleteSessionTokenCookie, deleteUserEmailVerificationRequest, emailVerificationTable, encrypt, encryptString, ensureSystemInitialized, eventBus, filesystemService, finalizeLogin, forgotPasswordSchema, generateRandomOTP, generateRandomRecoveryCode, generateSessionToken, getCurrentPasswordResetSession, getCurrentSession, getIPAddress, getKryoConfig, getModulesDir, getPermissions, getRoleById, getRolePermissions, getRoles, getUserById, getUserEmailVerificationRequest, getUserEmailVerificationRequestFromRequest, getUserFromEmail, getUserNotifications, getUserPasswordHash, getUserRbacData, getUserRecoverCode, getUserSessions, hashPassword, initEmailVerification, injectDb, invalidateOtherSessions, invalidateSession, invalidateUserPasswordResetSessions, invalidateUserSessions, isSystemInstalled, loginSchema, markAllNotificationsAsRead, markNotificationAsRead, notificationTable, passkeysSetupSchema, passwordResetSessionTable, performFullUserAugmentation, permissionsTable, recoveryCodeVerifySchema, registerAuthValidator, registerEmailVerificationValidator, registerIdentityAugmenter, registerPasswordResetSessionAugmenter, registerPasswordResetValidator, registerSchema, registerSecurityRequirement, registerSessionAugmenter, relations, resetPasswordSchema, resetUserRecoveryCode, revokePermissionFromRole, revokePermissionFromUser, revokeRoleFromUser, rolesTable, rolesToPermissionsTable, runEmailVerificationValidators, runPasswordResetValidators, send2FACode, sendPasswordResetEmail, sendRecoveryCode, sendResetPassword, sendVerificationEmail, sendVerifyEmail, sessionSignOut, sessionTable, setEmailVerificationRequestCookie, setPasswordResetSessionAsEmailVerified, setPasswordResetSessionTokenCookie, setSessionTokenCookie, setUserAsEmailVerifiedIfEmailMatches, signIn, signOut, signUp, systemModulesTable, totpSetupSchema, totpVerifySchema, updateUserAwatar, updateUserEmailAndSetEmailAsVerified, updateUserName, updateUserPassword, userTable, usersToPermissionsTable, usersToRolesTable, validatePasswordResetSessionToken, validateSessionToken, verifyEmailInput, verifyEmailSchema, verifyPasswordHash, verifyPasswordStrength, verifyUsernameInput };
@@ -0,0 +1 @@
1
+ import{forgotPasswordSchema as e,loginSchema as t,passkeysSetupSchema as n,recoveryCodeVerifySchema as r,registerSchema as i,resetPasswordSchema as a,totpSetupSchema as o,totpVerifySchema as s,verifyEmailSchema as c}from"./core/auth/validation.mjs";import{eventBus as l}from"./core/event-bus.mjs";import{db as u,injectDb as d}from"./server/database/inject.mjs";import{activityLogsTable as f,coreSchema as p,emailVerificationTable as m,notificationTable as h,passwordResetSessionTable as g,permissionsTable as _,relations as v,rolesTable as y,rolesToPermissionsTable as b,sessionTable as x,systemModulesTable as S,userTable as C,usersToPermissionsTable as w,usersToRolesTable as T}from"./server/database/schema.mjs";import{augmentSession as E,augmentUser as D,registerIdentityAugmenter as O,registerPasswordResetSessionAugmenter as k,registerSessionAugmenter as A}from"./core/auth/augment.mjs";import{hashPassword as j,verifyPasswordHash as M,verifyPasswordStrength as N}from"./server/auth/password.mjs";import{generateRandomOTP as P,generateRandomRecoveryCode as F}from"./core/auth/utils/encode.mjs";import{decrypt as I,decryptToString as L,encrypt as R,encryptString as z}from"./core/auth/utils/encryption.mjs";import{send2FACode as B,sendRecoveryCode as V,sendResetPassword as H,sendVerifyEmail as U}from"./server/emails/index.mjs";import{createOAuthUser as W,createUser as G,getUserById as K,getUserFromEmail as q,getUserPasswordHash as J,getUserRecoverCode as Y,resetUserRecoveryCode as X,setUserAsEmailVerifiedIfEmailMatches as Z,updateUserAwatar as Q,updateUserEmailAndSetEmailAsVerified as $,updateUserName as ee,updateUserPassword as te,verifyUsernameInput as ne}from"./server/auth/user.mjs";import{createEmailVerificationRequest as re,deleteEmailVerificationRequestCookie as ie,deleteUserEmailVerificationRequest as ae,getUserEmailVerificationRequest as oe,getUserEmailVerificationRequestFromRequest as se,initEmailVerification as ce,sendVerificationEmail as le,setEmailVerificationRequestCookie as ue}from"./core/auth/email-verification.mjs";import{checkSecurity as de,finalizeLogin as fe,performFullUserAugmentation as pe,registerAuthValidator as me,registerEmailVerificationValidator as he,registerPasswordResetValidator as ge,registerSecurityRequirement as _e,runEmailVerificationValidators as ve,runPasswordResetValidators as ye,signIn as be,signOut as xe,signUp as Se}from"./core/auth/logic.mjs";import{createSession as Ce,deleteSessionTokenCookie as we,generateSessionToken as Te,getCurrentSession as Ee,getIPAddress as De,getUserSessions as Oe,invalidateOtherSessions as ke,invalidateSession as Ae,invalidateUserSessions as je,sessionSignOut as Me,setSessionTokenCookie as Ne,validateSessionToken as Pe}from"./core/auth/session.mjs";import{createNotification as Fe,getUserNotifications as Ie,markAllNotificationsAsRead as Le,markNotificationAsRead as Re}from"./core/notifications/actions.mjs";import{createPasswordResetSession as ze,deletePasswordResetSessionTokenCookie as Be,getCurrentPasswordResetSession as Ve,invalidateUserPasswordResetSessions as He,sendPasswordResetEmail as Ue,setPasswordResetSessionAsEmailVerified as We,setPasswordResetSessionTokenCookie as Ge,validatePasswordResetSessionToken as Ke}from"./core/auth/password-reset.mjs";import{assignPermissionToRole as qe,assignPermissionToUser as Je,assignRoleToUser as Ye,createPermission as Xe,createRole as Ze,deletePermission as Qe,deleteRole as $e,getPermissions as et,getRoleById as tt,getRolePermissions as nt,getRoles as rt,getUserRbacData as it,revokePermissionFromRole as at,revokePermissionFromUser as ot,revokeRoleFromUser as st}from"./core/auth/rbac.mjs";import{filesystemService as ct}from"./core/filesystem/service.mjs";import{isSystemInstalled as lt}from"./core/setup.mjs";import{ensureSystemInitialized as ut}from"./core/bootstrap.mjs";import{getKryoConfig as dt,getModulesDir as ft}from"./core/config.server.mjs";import{checkEmailAvailability as pt,verifyEmailInput as mt}from"./server/auth/email.mjs";export{f as activityLogsTable,qe as assignPermissionToRole,Je as assignPermissionToUser,Ye as assignRoleToUser,E as augmentSession,D as augmentUser,pt as checkEmailAvailability,de as checkSecurity,p as coreSchema,re as createEmailVerificationRequest,Fe as createNotification,W as createOAuthUser,ze as createPasswordResetSession,Xe as createPermission,Ze as createRole,Ce as createSession,G as createUser,u as db,I as decrypt,L as decryptToString,ie as deleteEmailVerificationRequestCookie,Be as deletePasswordResetSessionTokenCookie,Qe as deletePermission,$e as deleteRole,we as deleteSessionTokenCookie,ae as deleteUserEmailVerificationRequest,m as emailVerificationTable,R as encrypt,z as encryptString,ut as ensureSystemInitialized,l as eventBus,ct as filesystemService,fe as finalizeLogin,e as forgotPasswordSchema,P as generateRandomOTP,F as generateRandomRecoveryCode,Te as generateSessionToken,Ve as getCurrentPasswordResetSession,Ee as getCurrentSession,De as getIPAddress,dt as getKryoConfig,ft as getModulesDir,et as getPermissions,tt as getRoleById,nt as getRolePermissions,rt as getRoles,K as getUserById,oe as getUserEmailVerificationRequest,se as getUserEmailVerificationRequestFromRequest,q as getUserFromEmail,Ie as getUserNotifications,J as getUserPasswordHash,it as getUserRbacData,Y as getUserRecoverCode,Oe as getUserSessions,j as hashPassword,ce as initEmailVerification,d as injectDb,ke as invalidateOtherSessions,Ae as invalidateSession,He as invalidateUserPasswordResetSessions,je as invalidateUserSessions,lt as isSystemInstalled,t as loginSchema,Le as markAllNotificationsAsRead,Re as markNotificationAsRead,h as notificationTable,n as passkeysSetupSchema,g as passwordResetSessionTable,pe as performFullUserAugmentation,_ as permissionsTable,r as recoveryCodeVerifySchema,me as registerAuthValidator,he as registerEmailVerificationValidator,O as registerIdentityAugmenter,k as registerPasswordResetSessionAugmenter,ge as registerPasswordResetValidator,i as registerSchema,_e as registerSecurityRequirement,A as registerSessionAugmenter,v as relations,a as resetPasswordSchema,X as resetUserRecoveryCode,at as revokePermissionFromRole,ot as revokePermissionFromUser,st as revokeRoleFromUser,y as rolesTable,b as rolesToPermissionsTable,ve as runEmailVerificationValidators,ye as runPasswordResetValidators,B as send2FACode,Ue as sendPasswordResetEmail,V as sendRecoveryCode,H as sendResetPassword,le as sendVerificationEmail,U as sendVerifyEmail,Me as sessionSignOut,x as sessionTable,ue as setEmailVerificationRequestCookie,We as setPasswordResetSessionAsEmailVerified,Ge as setPasswordResetSessionTokenCookie,Ne as setSessionTokenCookie,Z as setUserAsEmailVerifiedIfEmailMatches,be as signIn,xe as signOut,Se as signUp,S as systemModulesTable,o as totpSetupSchema,s as totpVerifySchema,Q as updateUserAwatar,$ as updateUserEmailAndSetEmailAsVerified,ee as updateUserName,te as updateUserPassword,C as userTable,w as usersToPermissionsTable,T as usersToRolesTable,Ke as validatePasswordResetSessionToken,Pe as validateSessionToken,mt as verifyEmailInput,c as verifyEmailSchema,M as verifyPasswordHash,N as verifyPasswordStrength,ne as verifyUsernameInput};
package/package.json CHANGED
@@ -1,13 +1,19 @@
1
1
  {
2
2
  "name": "@arch-cadre/core",
3
- "version": "0.0.55",
3
+ "version": "0.0.57",
4
4
  "type": "module",
5
5
  "description": "Core logic for Kryo framework",
6
- "types": "./dist/index.d.ts",
7
- "module": "./dist/index.js",
6
+ "types": "./dist/index.d.cts",
7
+ "module": "./dist/index.mjs",
8
8
  "exports": {
9
- ".": "./dist/index.js",
10
- "./server": "./dist/server.js",
9
+ ".": {
10
+ "import": "./dist/index.mjs",
11
+ "require": "./dist/index.cjs"
12
+ },
13
+ "./server": {
14
+ "import": "./dist/server.mjs",
15
+ "require": "./dist/server.cjs"
16
+ },
11
17
  "./package.json": "./package.json"
12
18
  },
13
19
  "files": [
@@ -19,7 +25,8 @@
19
25
  "switch:prod": "node scripts/switchToDist.js",
20
26
  "release": "npm publish --access public --no-git-checks",
21
27
  "dev": "tsdown --watch",
22
- "build": "pnpm clean && tsc --module esnext"
28
+ "builds": "pnpm clean && tsc --module esnext",
29
+ "build": "tsdown"
23
30
  },
24
31
  "dependencies": {
25
32
  "@oslojs/binary": "^1.0.0",
@@ -48,5 +55,6 @@
48
55
  "swr": "^2.3.8",
49
56
  "tsdown": "^0.20.3",
50
57
  "typescript": "^5"
51
- }
58
+ },
59
+ "main": "./dist/index.cjs"
52
60
  }
@@ -1,18 +0,0 @@
1
- import type { FullUser, PasswordResetSession, Session, User } from "./types";
2
- /**
3
- * REGISTRIES FOR MODULAR EXTENSIONS
4
- */
5
- type IdentityAugmenter = (user: User) => Promise<Partial<FullUser>>;
6
- type SessionAugmenter = (session: Session) => Promise<Partial<Session>>;
7
- type PasswordResetSessionAugmenter = (session: PasswordResetSession) => Promise<Partial<PasswordResetSession>>;
8
- export declare function registerIdentityAugmenter(augmenter: IdentityAugmenter): void;
9
- export declare function registerSessionAugmenter(augmenter: SessionAugmenter): void;
10
- export declare function registerPasswordResetSessionAugmenter(augmenter: PasswordResetSessionAugmenter): void;
11
- /**
12
- * EXECUTION FUNCTIONS
13
- */
14
- export declare function augmentUser(user: User, coreRbacData?: Record<string, any>): Promise<FullUser>;
15
- export declare function augmentSession(session: Session): Promise<Session>;
16
- export declare function augmentPasswordResetSession(session: PasswordResetSession): Promise<PasswordResetSession>;
17
- export {};
18
- //# sourceMappingURL=augment.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"augment.d.ts","sourceRoot":"","sources":["../../../src/core/auth/augment.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,QAAQ,EAAE,oBAAoB,EAAE,OAAO,EAAE,IAAI,EAAE,MAAM,SAAS,CAAC;AAE7E;;GAEG;AAEH,KAAK,iBAAiB,GAAG,CAAC,IAAI,EAAE,IAAI,KAAK,OAAO,CAAC,OAAO,CAAC,QAAQ,CAAC,CAAC,CAAC;AACpE,KAAK,gBAAgB,GAAG,CAAC,OAAO,EAAE,OAAO,KAAK,OAAO,CAAC,OAAO,CAAC,OAAO,CAAC,CAAC,CAAC;AACxE,KAAK,6BAA6B,GAAG,CACnC,OAAO,EAAE,oBAAoB,KAC1B,OAAO,CAAC,OAAO,CAAC,oBAAoB,CAAC,CAAC,CAAC;AAuB5C,wBAAgB,yBAAyB,CAAC,SAAS,EAAE,iBAAiB,QAErE;AAED,wBAAgB,wBAAwB,CAAC,SAAS,EAAE,gBAAgB,QAEnE;AAED,wBAAgB,qCAAqC,CACnD,SAAS,EAAE,6BAA6B,QAGzC;AAED;;GAEG;AACH,wBAAsB,WAAW,CAC/B,IAAI,EAAE,IAAI,EACV,YAAY,CAAC,EAAE,MAAM,CAAC,MAAM,EAAE,GAAG,CAAC,GACjC,OAAO,CAAC,QAAQ,CAAC,CAOnB;AAED,wBAAsB,cAAc,CAAC,OAAO,EAAE,OAAO,GAAG,OAAO,CAAC,OAAO,CAAC,CAOvE;AAED,wBAAsB,2BAA2B,CAC/C,OAAO,EAAE,oBAAoB,GAC5B,OAAO,CAAC,oBAAoB,CAAC,CAO/B"}
@@ -1,45 +0,0 @@
1
- var _a, _b, _c;
2
- const globalForAugment = globalThis;
3
- const identityAugmenters = (_a = globalForAugment.__KRYO_IDENTITY_AUGMENTERS__) !== null && _a !== void 0 ? _a : new Set();
4
- const sessionAugmenters = (_b = globalForAugment.__KRYO_SESSION_AUGMENTERS__) !== null && _b !== void 0 ? _b : new Set();
5
- const passwordResetSessionAugmenters = (_c = globalForAugment.__KRYO_PASSWORD_RESET_SESSION_AUGMENTERS__) !== null && _c !== void 0 ? _c : new Set();
6
- globalForAugment.__KRYO_IDENTITY_AUGMENTERS__ = identityAugmenters;
7
- globalForAugment.__KRYO_SESSION_AUGMENTERS__ = sessionAugmenters;
8
- globalForAugment.__KRYO_PASSWORD_RESET_SESSION_AUGMENTERS__ =
9
- passwordResetSessionAugmenters;
10
- export function registerIdentityAugmenter(augmenter) {
11
- identityAugmenters.add(augmenter);
12
- }
13
- export function registerSessionAugmenter(augmenter) {
14
- sessionAugmenters.add(augmenter);
15
- }
16
- export function registerPasswordResetSessionAugmenter(augmenter) {
17
- passwordResetSessionAugmenters.add(augmenter);
18
- }
19
- /**
20
- * EXECUTION FUNCTIONS
21
- */
22
- export async function augmentUser(user, coreRbacData) {
23
- let augmentedData = coreRbacData || {};
24
- for (const augmenter of identityAugmenters) {
25
- const data = await augmenter(user);
26
- augmentedData = { ...augmentedData, ...data };
27
- }
28
- return { ...user, ...augmentedData };
29
- }
30
- export async function augmentSession(session) {
31
- let augmentedData = {};
32
- for (const augmenter of sessionAugmenters) {
33
- const data = await augmenter(session);
34
- augmentedData = { ...augmentedData, ...data };
35
- }
36
- return { ...session, ...augmentedData };
37
- }
38
- export async function augmentPasswordResetSession(session) {
39
- let augmentedData = {};
40
- for (const augmenter of passwordResetSessionAugmenters) {
41
- const data = await augmenter(session);
42
- augmentedData = { ...augmentedData, ...data };
43
- }
44
- return { ...session, ...augmentedData };
45
- }
@@ -1,58 +0,0 @@
1
- import { emailVerificationTable } from "../../server/database/schema";
2
- /**
3
- * Register Email Verification as a Core Security Requirement.
4
- */
5
- export declare function initEmailVerification(): Promise<void>;
6
- /**
7
- * Retrieves a specific email verification request for a user.
8
- */
9
- export declare function getUserEmailVerificationRequest(userId: string, id: string): Promise<{
10
- id: string;
11
- email: string;
12
- code: string;
13
- userId: string;
14
- expiresAt: Date;
15
- createdAt: Date;
16
- updatedAt: Date | null;
17
- }>;
18
- /**
19
- * Creates a new email verification request, deleting any existing one for the user.
20
- */
21
- export declare function createEmailVerificationRequest(userId: string, email: string): Promise<{
22
- id: string;
23
- email: string;
24
- createdAt: Date;
25
- updatedAt: Date | null;
26
- userId: string;
27
- expiresAt: Date;
28
- code: string;
29
- }>;
30
- /**
31
- * Deletes all email verification requests for a user.
32
- */
33
- export declare function deleteUserEmailVerificationRequest(userId: string): Promise<void>;
34
- /**
35
- * Sends a verification email with the OTP code.
36
- */
37
- export declare function sendVerificationEmail(email: string, code: string): Promise<void>;
38
- /**
39
- * Sets the email verification request ID in a cookie.
40
- */
41
- export declare function setEmailVerificationRequestCookie(request: typeof emailVerificationTable.$inferSelect): Promise<void>;
42
- /**
43
- * Removes the email verification request cookie.
44
- */
45
- export declare function deleteEmailVerificationRequestCookie(): Promise<void>;
46
- /**
47
- * Retrieves the current email verification request based on session and cookie.
48
- */
49
- export declare function getUserEmailVerificationRequestFromRequest(): Promise<{
50
- id: string;
51
- email: string;
52
- code: string;
53
- userId: string;
54
- expiresAt: Date;
55
- createdAt: Date;
56
- updatedAt: Date | null;
57
- } | null>;
58
- //# sourceMappingURL=email-verification.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"email-verification.d.ts","sourceRoot":"","sources":["../../../src/core/auth/email-verification.ts"],"names":[],"mappings":"AAMA,OAAO,EAAE,sBAAsB,EAAE,MAAM,8BAA8B,CAAC;AAMtE;;GAEG;AACH,wBAAsB,qBAAqB,kBAU1C;AAED;;GAEG;AACH,wBAAsB,+BAA+B,CACnD,MAAM,EAAE,MAAM,EACd,EAAE,EAAE,MAAM;;;;;;;;GAaX;AAED;;GAEG;AACH,wBAAsB,8BAA8B,CAClD,MAAM,EAAE,MAAM,EACd,KAAK,EAAE,MAAM;;;;;;;;GAiBd;AAED;;GAEG;AACH,wBAAsB,kCAAkC,CACtD,MAAM,EAAE,MAAM,GACb,OAAO,CAAC,IAAI,CAAC,CAIf;AAED;;GAEG;AACH,wBAAsB,qBAAqB,CACzC,KAAK,EAAE,MAAM,EACb,IAAI,EAAE,MAAM,GACX,OAAO,CAAC,IAAI,CAAC,CAEf;AAED;;GAEG;AACH,wBAAsB,iCAAiC,CACrD,OAAO,EAAE,OAAO,sBAAsB,CAAC,YAAY,GAClD,OAAO,CAAC,IAAI,CAAC,CAUf;AAED;;GAEG;AACH,wBAAsB,oCAAoC,IAAI,OAAO,CAAC,IAAI,CAAC,CAG1E;AAED;;GAEG;AACH,wBAAsB,0CAA0C;;;;;;;;UAqB/D"}
@@ -1,105 +0,0 @@
1
- "use server";
2
- import { addHours } from "date-fns";
3
- import { and, eq } from "drizzle-orm";
4
- import { cookies } from "next/headers";
5
- import { db } from "../../server/database/inject";
6
- import { emailVerificationTable } from "../../server/database/schema";
7
- import { sendVerifyEmail } from "../../server/emails/index";
8
- import { registerSecurityRequirement } from "./logic";
9
- import { getCurrentSession } from "./session";
10
- import { generateRandomOTP } from "./utils/encode";
11
- /**
12
- * Register Email Verification as a Core Security Requirement.
13
- */
14
- export async function initEmailVerification() {
15
- registerSecurityRequirement(async (_session, user) => {
16
- if (!user.emailVerifiedAt) {
17
- return {
18
- satisfied: false,
19
- redirect: "/verify-email?unverified",
20
- };
21
- }
22
- return { satisfied: true };
23
- });
24
- }
25
- /**
26
- * Retrieves a specific email verification request for a user.
27
- */
28
- export async function getUserEmailVerificationRequest(userId, id) {
29
- const [session] = await db
30
- .select()
31
- .from(emailVerificationTable)
32
- .where(and(eq(emailVerificationTable.id, id), eq(emailVerificationTable.userId, userId)));
33
- return session;
34
- }
35
- /**
36
- * Creates a new email verification request, deleting any existing one for the user.
37
- */
38
- export async function createEmailVerificationRequest(userId, email) {
39
- await deleteUserEmailVerificationRequest(userId);
40
- const code = generateRandomOTP();
41
- const [verificationRequest] = await db
42
- .insert(emailVerificationTable)
43
- .values({
44
- userId,
45
- code,
46
- email,
47
- expiresAt: new Date(addHours(new Date(), 1)),
48
- })
49
- .returning();
50
- return verificationRequest;
51
- }
52
- /**
53
- * Deletes all email verification requests for a user.
54
- */
55
- export async function deleteUserEmailVerificationRequest(userId) {
56
- await db
57
- .delete(emailVerificationTable)
58
- .where(eq(emailVerificationTable.userId, userId));
59
- }
60
- /**
61
- * Sends a verification email with the OTP code.
62
- */
63
- export async function sendVerificationEmail(email, code) {
64
- await sendVerifyEmail(email, code);
65
- }
66
- /**
67
- * Sets the email verification request ID in a cookie.
68
- */
69
- export async function setEmailVerificationRequestCookie(request) {
70
- const cookieStore = await cookies();
71
- cookieStore.set("email_verification", request.id, {
72
- httpOnly: true,
73
- path: "/",
74
- secure: process.env.NODE_ENV === "production",
75
- sameSite: "lax",
76
- expires: request.expiresAt,
77
- });
78
- }
79
- /**
80
- * Removes the email verification request cookie.
81
- */
82
- export async function deleteEmailVerificationRequestCookie() {
83
- const cookieStore = await cookies();
84
- cookieStore.delete("email_verification");
85
- }
86
- /**
87
- * Retrieves the current email verification request based on session and cookie.
88
- */
89
- export async function getUserEmailVerificationRequestFromRequest() {
90
- var _a, _b;
91
- const { user } = await getCurrentSession();
92
- if (!user) {
93
- return null;
94
- }
95
- const cookieStore = await cookies();
96
- const id = (_b = (_a = cookieStore.get("email_verification")) === null || _a === void 0 ? void 0 : _a.value) !== null && _b !== void 0 ? _b : null;
97
- if (!id) {
98
- return null;
99
- }
100
- const request = await getUserEmailVerificationRequest(user.id, id);
101
- if (!request) {
102
- await deleteEmailVerificationRequestCookie();
103
- }
104
- return request;
105
- }
@@ -1,53 +0,0 @@
1
- import type { Session, User } from "./types";
2
- export type AuthEventPayloads = {
3
- /**
4
- * Emitted after password/base credentials are verified,
5
- * but BEFORE the final session is created.
6
- * Listeners can return a "veto" to require additional factors.
7
- */
8
- "auth:validate-factors": {
9
- userId: string;
10
- email: string;
11
- };
12
- /**
13
- * Emitted after a full session is successfully created.
14
- */
15
- "auth:session-created": {
16
- session: Session;
17
- user: User;
18
- };
19
- /**
20
- * Emitted after a user signs out.
21
- */
22
- "auth:signed-out": {
23
- userId: string;
24
- };
25
- /**
26
- * Emitted when a password reset is requested.
27
- */
28
- "auth:password-reset:requested": {
29
- userId: string;
30
- email: string;
31
- };
32
- /**
33
- * Emitted when a password has been successfully reset.
34
- */
35
- "auth:password-reset:completed": {
36
- userId: string;
37
- };
38
- /**
39
- * Emitted when a verification email is sent.
40
- */
41
- "auth:verification-requested": {
42
- userId: string;
43
- email: string;
44
- };
45
- /**
46
- * Emitted when a user successfully verifies their email.
47
- */
48
- "auth:email-verified": {
49
- userId: string;
50
- email: string;
51
- };
52
- };
53
- //# sourceMappingURL=events.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"events.d.ts","sourceRoot":"","sources":["../../../src/core/auth/events.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,OAAO,EAAE,IAAI,EAAE,MAAM,SAAS,CAAC;AAE7C,MAAM,MAAM,iBAAiB,GAAG;IAC9B;;;;OAIG;IACH,uBAAuB,EAAE;QACvB,MAAM,EAAE,MAAM,CAAC;QACf,KAAK,EAAE,MAAM,CAAC;KACf,CAAC;IAEF;;OAEG;IACH,sBAAsB,EAAE;QACtB,OAAO,EAAE,OAAO,CAAC;QACjB,IAAI,EAAE,IAAI,CAAC;KACZ,CAAC;IAEF;;OAEG;IACH,iBAAiB,EAAE;QACjB,MAAM,EAAE,MAAM,CAAC;KAChB,CAAC;IAEF;;OAEG;IACH,+BAA+B,EAAE;QAC/B,MAAM,EAAE,MAAM,CAAC;QACf,KAAK,EAAE,MAAM,CAAC;KACf,CAAC;IAEF;;OAEG;IACH,+BAA+B,EAAE;QAC/B,MAAM,EAAE,MAAM,CAAC;KAChB,CAAC;IAEF;;OAEG;IACH,6BAA6B,EAAE;QAC7B,MAAM,EAAE,MAAM,CAAC;QACf,KAAK,EAAE,MAAM,CAAC;KACf,CAAC;IAEF;;OAEG;IACH,qBAAqB,EAAE;QACrB,MAAM,EAAE,MAAM,CAAC;QACf,KAAK,EAAE,MAAM,CAAC;KACf,CAAC;CACH,CAAC"}
@@ -1 +0,0 @@
1
- export {};