@arch-cadre/core 0.0.56 → 0.0.57
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/_virtual/_rolldown/runtime.cjs +1 -0
- package/dist/_virtual/_rolldown/runtime.mjs +1 -0
- package/dist/core/auth/augment.cjs +1 -0
- package/dist/core/auth/augment.d.cts +20 -0
- package/dist/core/auth/augment.d.cts.map +1 -0
- package/dist/core/auth/augment.d.mts +20 -0
- package/dist/core/auth/augment.d.mts.map +1 -0
- package/dist/core/auth/augment.mjs +2 -0
- package/dist/core/auth/augment.mjs.map +1 -0
- package/dist/core/auth/email-verification.cjs +1 -0
- package/dist/core/auth/email-verification.d.cts +62 -0
- package/dist/core/auth/email-verification.d.cts.map +1 -0
- package/dist/core/auth/email-verification.d.mts +62 -0
- package/dist/core/auth/email-verification.d.mts.map +1 -0
- package/dist/core/auth/email-verification.mjs +2 -0
- package/dist/core/auth/email-verification.mjs.map +1 -0
- package/dist/core/auth/logic.cjs +1 -0
- package/dist/core/auth/logic.d.cts +110 -0
- package/dist/core/auth/logic.d.cts.map +1 -0
- package/dist/core/auth/logic.d.mts +110 -0
- package/dist/core/auth/logic.d.mts.map +1 -0
- package/dist/core/auth/logic.mjs +2 -0
- package/dist/core/auth/logic.mjs.map +1 -0
- package/dist/core/auth/password-reset.cjs +1 -0
- package/dist/core/auth/password-reset.d.cts +39 -0
- package/dist/core/auth/password-reset.d.cts.map +1 -0
- package/dist/core/auth/password-reset.d.mts +39 -0
- package/dist/core/auth/password-reset.d.mts.map +1 -0
- package/dist/core/auth/password-reset.mjs +2 -0
- package/dist/core/auth/password-reset.mjs.map +1 -0
- package/dist/core/auth/rbac.cjs +1 -0
- package/dist/core/auth/rbac.d.cts +61 -0
- package/dist/core/auth/rbac.d.cts.map +1 -0
- package/dist/core/auth/rbac.d.mts +61 -0
- package/dist/core/auth/rbac.d.mts.map +1 -0
- package/dist/core/auth/rbac.mjs +2 -0
- package/dist/core/auth/rbac.mjs.map +1 -0
- package/dist/core/auth/session.cjs +1 -0
- package/dist/core/auth/session.d.cts +54 -0
- package/dist/core/auth/session.d.cts.map +1 -0
- package/dist/core/auth/session.d.mts +54 -0
- package/dist/core/auth/session.d.mts.map +1 -0
- package/dist/core/auth/session.mjs +2 -0
- package/dist/core/auth/session.mjs.map +1 -0
- package/dist/core/auth/types.d.cts +55 -0
- package/dist/core/auth/types.d.cts.map +1 -0
- package/dist/core/auth/types.d.mts +55 -0
- package/dist/core/auth/types.d.mts.map +1 -0
- package/dist/core/auth/utils/encode.cjs +1 -0
- package/dist/core/auth/utils/encode.d.cts +15 -0
- package/dist/core/auth/utils/encode.d.cts.map +1 -0
- package/dist/core/auth/utils/encode.d.mts +15 -0
- package/dist/core/auth/utils/encode.d.mts.map +1 -0
- package/dist/core/auth/utils/encode.mjs +2 -0
- package/dist/core/auth/utils/encode.mjs.map +1 -0
- package/dist/core/auth/utils/encryption.cjs +1 -0
- package/dist/core/auth/utils/{encryption.d.ts → encryption.d.cts} +8 -5
- package/dist/core/auth/utils/encryption.d.cts.map +1 -0
- package/dist/core/auth/utils/encryption.d.mts +28 -0
- package/dist/core/auth/utils/encryption.d.mts.map +1 -0
- package/dist/core/auth/utils/encryption.mjs +2 -0
- package/dist/core/auth/utils/encryption.mjs.map +1 -0
- package/dist/core/auth/validation.cjs +1 -0
- package/dist/core/auth/validation.d.cts +48 -0
- package/dist/core/auth/validation.d.cts.map +1 -0
- package/dist/core/auth/validation.d.mts +48 -0
- package/dist/core/auth/validation.d.mts.map +1 -0
- package/dist/core/auth/validation.mjs +2 -0
- package/dist/core/auth/validation.mjs.map +1 -0
- package/dist/core/bootstrap.cjs +1 -0
- package/dist/core/bootstrap.d.cts +5 -0
- package/dist/core/bootstrap.d.cts.map +1 -0
- package/dist/core/bootstrap.d.mts +5 -0
- package/dist/core/bootstrap.d.mts.map +1 -0
- package/dist/core/bootstrap.mjs +2 -0
- package/dist/core/bootstrap.mjs.map +1 -0
- package/dist/core/config.cjs +1 -0
- package/dist/core/config.d.cts +11 -0
- package/dist/core/config.d.cts.map +1 -0
- package/dist/core/config.d.mts +11 -0
- package/dist/core/config.d.mts.map +1 -0
- package/dist/core/config.mjs +2 -0
- package/dist/core/config.mjs.map +1 -0
- package/dist/core/config.server.cjs +1 -0
- package/dist/core/config.server.d.cts +16 -0
- package/dist/core/config.server.d.cts.map +1 -0
- package/dist/core/config.server.d.mts +16 -0
- package/dist/core/config.server.d.mts.map +1 -0
- package/dist/core/config.server.mjs +2 -0
- package/dist/core/config.server.mjs.map +1 -0
- package/dist/core/event-bus.cjs +1 -0
- package/dist/core/event-bus.d.cts +17 -0
- package/dist/core/event-bus.d.cts.map +1 -0
- package/dist/core/event-bus.d.mts +17 -0
- package/dist/core/event-bus.d.mts.map +1 -0
- package/dist/core/event-bus.mjs +2 -0
- package/dist/core/event-bus.mjs.map +1 -0
- package/dist/core/filesystem/index.cjs +1 -0
- package/dist/core/filesystem/index.mjs +2 -0
- package/dist/core/filesystem/index.mjs.map +1 -0
- package/dist/core/filesystem/providers/local.cjs +1 -0
- package/dist/core/filesystem/providers/local.mjs +2 -0
- package/dist/core/filesystem/providers/local.mjs.map +1 -0
- package/dist/core/filesystem/service.cjs +1 -0
- package/dist/core/filesystem/service.d.cts +19 -0
- package/dist/core/filesystem/service.d.cts.map +1 -0
- package/dist/core/filesystem/service.d.mts +19 -0
- package/dist/core/filesystem/service.d.mts.map +1 -0
- package/dist/core/filesystem/service.mjs +2 -0
- package/dist/core/filesystem/service.mjs.map +1 -0
- package/dist/core/filesystem/types.d.cts +22 -0
- package/dist/core/filesystem/types.d.cts.map +1 -0
- package/dist/core/filesystem/types.d.mts +22 -0
- package/dist/core/filesystem/types.d.mts.map +1 -0
- package/dist/core/notifications/actions.cjs +1 -0
- package/dist/core/notifications/actions.d.cts +58 -0
- package/dist/core/notifications/actions.d.cts.map +1 -0
- package/dist/core/notifications/actions.d.mts +58 -0
- package/dist/core/notifications/actions.d.mts.map +1 -0
- package/dist/core/notifications/actions.mjs +2 -0
- package/dist/core/notifications/actions.mjs.map +1 -0
- package/dist/core/notifications/index.cjs +1 -0
- package/dist/core/notifications/index.mjs +1 -0
- package/dist/core/notifications/service.cjs +1 -0
- package/dist/core/notifications/service.d.cts +9 -0
- package/dist/core/notifications/service.d.cts.map +1 -0
- package/dist/core/notifications/service.d.mts +9 -0
- package/dist/core/notifications/service.d.mts.map +1 -0
- package/dist/core/notifications/service.mjs +2 -0
- package/dist/core/notifications/service.mjs.map +1 -0
- package/dist/core/notifications/types.d.cts +21 -0
- package/dist/core/notifications/types.d.cts.map +1 -0
- package/dist/core/notifications/types.d.mts +21 -0
- package/dist/core/notifications/types.d.mts.map +1 -0
- package/dist/core/setup.cjs +1 -0
- package/dist/core/setup.d.cts +9 -0
- package/dist/core/setup.d.cts.map +1 -0
- package/dist/core/setup.d.mts +9 -0
- package/dist/core/setup.d.mts.map +1 -0
- package/dist/core/setup.mjs +2 -0
- package/dist/core/setup.mjs.map +1 -0
- package/dist/core/types.d.cts +13 -0
- package/dist/core/types.d.cts.map +1 -0
- package/dist/core/types.d.mts +13 -0
- package/dist/core/types.d.mts.map +1 -0
- package/dist/index.cjs +1 -0
- package/dist/index.d.cts +8 -0
- package/dist/index.d.mts +8 -0
- package/dist/index.mjs +1 -0
- package/dist/server/auth/email.cjs +1 -0
- package/dist/server/auth/email.d.cts +13 -0
- package/dist/server/auth/email.d.cts.map +1 -0
- package/dist/server/auth/email.d.mts +13 -0
- package/dist/server/auth/email.d.mts.map +1 -0
- package/dist/server/auth/email.mjs +2 -0
- package/dist/server/auth/email.mjs.map +1 -0
- package/dist/server/auth/password.cjs +1 -0
- package/dist/server/auth/{password.d.ts → password.d.cts} +7 -4
- package/dist/server/auth/password.d.cts.map +1 -0
- package/dist/server/auth/{password.js → password.d.mts} +7 -14
- package/dist/server/auth/password.d.mts.map +1 -0
- package/dist/server/auth/password.mjs +2 -0
- package/dist/server/auth/password.mjs.map +1 -0
- package/dist/server/auth/user.cjs +1 -0
- package/dist/server/auth/user.d.cts +58 -0
- package/dist/server/auth/user.d.cts.map +1 -0
- package/dist/server/auth/user.d.mts +58 -0
- package/dist/server/auth/user.d.mts.map +1 -0
- package/dist/server/auth/user.mjs +2 -0
- package/dist/server/auth/user.mjs.map +1 -0
- package/dist/server/database/inject.cjs +1 -0
- package/dist/server/database/inject.d.cts +15 -0
- package/dist/server/database/inject.d.cts.map +1 -0
- package/dist/server/database/inject.d.mts +15 -0
- package/dist/server/database/inject.d.mts.map +1 -0
- package/dist/server/database/inject.mjs +2 -0
- package/dist/server/database/inject.mjs.map +1 -0
- package/dist/server/database/schema.cjs +1 -0
- package/dist/server/database/schema.d.cts +3065 -0
- package/dist/server/database/{schema.d.ts.map → schema.d.cts.map} +1 -1
- package/dist/server/database/schema.d.mts +3065 -0
- package/dist/server/database/schema.d.mts.map +1 -0
- package/dist/server/database/schema.mjs +2 -0
- package/dist/server/database/schema.mjs.map +1 -0
- package/dist/server/emails/index.cjs +1 -0
- package/dist/server/emails/index.d.cts +26 -0
- package/dist/server/emails/index.d.cts.map +1 -0
- package/dist/server/emails/index.d.mts +26 -0
- package/dist/server/emails/index.d.mts.map +1 -0
- package/dist/server/emails/index.mjs +2 -0
- package/dist/server/emails/index.mjs.map +1 -0
- package/dist/server.cjs +1 -0
- package/dist/server.d.cts +26 -0
- package/dist/server.d.mts +26 -0
- package/dist/server.mjs +1 -0
- package/package.json +15 -7
- package/dist/core/auth/augment.d.ts +0 -18
- package/dist/core/auth/augment.d.ts.map +0 -1
- package/dist/core/auth/augment.js +0 -45
- package/dist/core/auth/email-verification.d.ts +0 -58
- package/dist/core/auth/email-verification.d.ts.map +0 -1
- package/dist/core/auth/email-verification.js +0 -105
- package/dist/core/auth/events.d.ts +0 -53
- package/dist/core/auth/events.d.ts.map +0 -1
- package/dist/core/auth/events.js +0 -1
- package/dist/core/auth/logic.d.ts +0 -106
- package/dist/core/auth/logic.d.ts.map +0 -1
- package/dist/core/auth/logic.js +0 -245
- package/dist/core/auth/password-reset.d.ts +0 -35
- package/dist/core/auth/password-reset.d.ts.map +0 -1
- package/dist/core/auth/password-reset.js +0 -122
- package/dist/core/auth/rbac.d.ts +0 -56
- package/dist/core/auth/rbac.d.ts.map +0 -1
- package/dist/core/auth/rbac.js +0 -134
- package/dist/core/auth/session.d.ts +0 -50
- package/dist/core/auth/session.d.ts.map +0 -1
- package/dist/core/auth/session.js +0 -152
- package/dist/core/auth/types.d.ts +0 -52
- package/dist/core/auth/types.d.ts.map +0 -1
- package/dist/core/auth/types.js +0 -1
- package/dist/core/auth/utils/encode.d.ts +0 -12
- package/dist/core/auth/utils/encode.d.ts.map +0 -1
- package/dist/core/auth/utils/encode.js +0 -20
- package/dist/core/auth/utils/encryption.d.ts.map +0 -1
- package/dist/core/auth/utils/encryption.js +0 -62
- package/dist/core/auth/validation.d.ts +0 -44
- package/dist/core/auth/validation.d.ts.map +0 -1
- package/dist/core/auth/validation.js +0 -41
- package/dist/core/bootstrap.d.ts +0 -2
- package/dist/core/bootstrap.d.ts.map +0 -1
- package/dist/core/bootstrap.js +0 -51
- package/dist/core/config.d.ts +0 -9
- package/dist/core/config.d.ts.map +0 -1
- package/dist/core/config.js +0 -3
- package/dist/core/config.server.d.ts +0 -12
- package/dist/core/config.server.d.ts.map +0 -1
- package/dist/core/config.server.js +0 -61
- package/dist/core/event-bus.d.ts +0 -14
- package/dist/core/event-bus.d.ts.map +0 -1
- package/dist/core/event-bus.js +0 -51
- package/dist/core/filesystem/index.d.ts +0 -4
- package/dist/core/filesystem/index.d.ts.map +0 -1
- package/dist/core/filesystem/index.js +0 -10
- package/dist/core/filesystem/providers/local.d.ts +0 -8
- package/dist/core/filesystem/providers/local.d.ts.map +0 -1
- package/dist/core/filesystem/providers/local.js +0 -42
- package/dist/core/filesystem/service.d.ts +0 -16
- package/dist/core/filesystem/service.d.ts.map +0 -1
- package/dist/core/filesystem/service.js +0 -51
- package/dist/core/filesystem/types.d.ts +0 -19
- package/dist/core/filesystem/types.d.ts.map +0 -1
- package/dist/core/filesystem/types.js +0 -1
- package/dist/core/notifications/actions.d.ts +0 -54
- package/dist/core/notifications/actions.d.ts.map +0 -1
- package/dist/core/notifications/actions.js +0 -43
- package/dist/core/notifications/index.d.ts +0 -4
- package/dist/core/notifications/index.d.ts.map +0 -1
- package/dist/core/notifications/index.js +0 -3
- package/dist/core/notifications/service.d.ts +0 -7
- package/dist/core/notifications/service.d.ts.map +0 -1
- package/dist/core/notifications/service.js +0 -32
- package/dist/core/notifications/types.d.ts +0 -17
- package/dist/core/notifications/types.d.ts.map +0 -1
- package/dist/core/notifications/types.js +0 -1
- package/dist/core/setup.d.ts +0 -6
- package/dist/core/setup.d.ts.map +0 -1
- package/dist/core/setup.js +0 -25
- package/dist/core/types.d.ts +0 -10
- package/dist/core/types.d.ts.map +0 -1
- package/dist/core/types.js +0 -1
- package/dist/index.d.ts +0 -8
- package/dist/index.d.ts.map +0 -1
- package/dist/index.js +0 -16
- package/dist/server/auth/email.d.ts +0 -10
- package/dist/server/auth/email.d.ts.map +0 -1
- package/dist/server/auth/email.js +0 -20
- package/dist/server/auth/password.d.ts.map +0 -1
- package/dist/server/auth/types.d.ts +0 -13
- package/dist/server/auth/types.d.ts.map +0 -1
- package/dist/server/auth/types.js +0 -1
- package/dist/server/auth/user.d.ts +0 -54
- package/dist/server/auth/user.d.ts.map +0 -1
- package/dist/server/auth/user.js +0 -222
- package/dist/server/database/inject.d.ts +0 -11
- package/dist/server/database/inject.d.ts.map +0 -1
- package/dist/server/database/inject.js +0 -29
- package/dist/server/database/schema.d.ts +0 -3056
- package/dist/server/database/schema.js +0 -205
- package/dist/server/database/types.d.ts +0 -12
- package/dist/server/database/types.d.ts.map +0 -1
- package/dist/server/database/types.js +0 -1
- package/dist/server/emails/index.d.ts +0 -23
- package/dist/server/emails/index.d.ts.map +0 -1
- package/dist/server/emails/index.js +0 -67
- package/dist/server.d.ts +0 -25
- package/dist/server.d.ts.map +0 -1
- package/dist/server.js +0 -32
|
@@ -0,0 +1,58 @@
|
|
|
1
|
+
import { CreateNotificationPayload } from "./types.mjs";
|
|
2
|
+
|
|
3
|
+
//#region src/core/notifications/actions.d.ts
|
|
4
|
+
declare function getUserNotifications(): Promise<{
|
|
5
|
+
id: string;
|
|
6
|
+
title: string;
|
|
7
|
+
content: string | null;
|
|
8
|
+
target: string | null;
|
|
9
|
+
type: string | null;
|
|
10
|
+
isRead: boolean;
|
|
11
|
+
resourceId: string | null;
|
|
12
|
+
resourceType: string | null;
|
|
13
|
+
userId: string;
|
|
14
|
+
createdAt: Date;
|
|
15
|
+
updatedAt: Date | null;
|
|
16
|
+
}[] | null>;
|
|
17
|
+
declare function createNotification(data: CreateNotificationPayload): Promise<{
|
|
18
|
+
id: string;
|
|
19
|
+
createdAt: Date;
|
|
20
|
+
updatedAt: Date | null;
|
|
21
|
+
userId: string;
|
|
22
|
+
type: string | null;
|
|
23
|
+
title: string;
|
|
24
|
+
content: string | null;
|
|
25
|
+
target: string | null;
|
|
26
|
+
isRead: boolean;
|
|
27
|
+
resourceId: string | null;
|
|
28
|
+
resourceType: string | null;
|
|
29
|
+
}>;
|
|
30
|
+
declare function markNotificationAsRead(id: string): Promise<{
|
|
31
|
+
id: string;
|
|
32
|
+
title: string;
|
|
33
|
+
content: string | null;
|
|
34
|
+
target: string | null;
|
|
35
|
+
type: string | null;
|
|
36
|
+
isRead: boolean;
|
|
37
|
+
resourceId: string | null;
|
|
38
|
+
resourceType: string | null;
|
|
39
|
+
userId: string;
|
|
40
|
+
createdAt: Date;
|
|
41
|
+
updatedAt: Date | null;
|
|
42
|
+
}>;
|
|
43
|
+
declare function markAllNotificationsAsRead(): Promise<{
|
|
44
|
+
id: string;
|
|
45
|
+
title: string;
|
|
46
|
+
content: string | null;
|
|
47
|
+
target: string | null;
|
|
48
|
+
type: string | null;
|
|
49
|
+
isRead: boolean;
|
|
50
|
+
resourceId: string | null;
|
|
51
|
+
resourceType: string | null;
|
|
52
|
+
userId: string;
|
|
53
|
+
createdAt: Date;
|
|
54
|
+
updatedAt: Date | null;
|
|
55
|
+
}[] | null>;
|
|
56
|
+
//#endregion
|
|
57
|
+
export { createNotification, getUserNotifications, markAllNotificationsAsRead, markNotificationAsRead };
|
|
58
|
+
//# sourceMappingURL=actions.d.mts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"actions.d.mts","names":[],"sources":["../../../src/core/notifications/actions.ts"],"mappings":";;;iBAQsB,oBAAA,CAAA,GAAoB,OAAA;;;;;;;;;;;;;iBAWpB,kBAAA,CAAmB,IAAA,EAAM,yBAAA,GAAyB,OAAA;;;;;;;;;;;;;iBAYlD,sBAAA,CAAuB,EAAA,WAAU,OAAA;;;;;;;;;;;;;iBAUjC,0BAAA,CAAA,GAA0B,OAAA"}
|
|
@@ -0,0 +1,2 @@
|
|
|
1
|
+
"use server";import{db as e}from"../../server/database/inject.mjs";import{notificationTable as t}from"../../server/database/schema.mjs";import{getCurrentSession as n}from"../auth/session.mjs";import{desc as r,eq as i}from"drizzle-orm";async function a(){let{user:a}=await n();return a?await e.select().from(t).where(i(t.userId,a.id)).orderBy(r(t.createdAt)):null}async function o(n){let[r]=await e.insert(t).values({...n,isRead:!1}).returning();return r}async function s(n){let[r]=await e.update(t).set({isRead:!0}).where(i(t.id,n)).returning();return r}async function c(){let{user:r}=await n();return r?await e.update(t).set({isRead:!0}).where(i(t.userId,r.id)).returning():null}export{o as createNotification,a as getUserNotifications,c as markAllNotificationsAsRead,s as markNotificationAsRead};
|
|
2
|
+
//# sourceMappingURL=actions.mjs.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"actions.mjs","names":[],"sources":["../../../src/core/notifications/actions.ts"],"sourcesContent":["\"use server\";\n\nimport { desc, eq } from \"drizzle-orm\";\nimport { db } from \"../../server/database/inject\";\nimport { notificationTable } from \"../../server/database/schema\";\nimport { getCurrentSession } from \"../auth/session\";\nimport type { CreateNotificationPayload } from \"./types\";\n\nexport async function getUserNotifications() {\n const { user } = await getCurrentSession();\n if (!user) return null;\n\n return await db\n .select()\n .from(notificationTable)\n .where(eq(notificationTable.userId, user.id))\n .orderBy(desc(notificationTable.createdAt));\n}\n\nexport async function createNotification(data: CreateNotificationPayload) {\n const [notification] = await db\n .insert(notificationTable)\n .values({\n ...data,\n isRead: false,\n })\n .returning();\n\n return notification;\n}\n\nexport async function markNotificationAsRead(id: string) {\n const [updated] = await db\n .update(notificationTable)\n .set({ isRead: true })\n .where(eq(notificationTable.id, id))\n .returning();\n\n return updated;\n}\n\nexport async function markAllNotificationsAsRead() {\n const { user } = await getCurrentSession();\n if (!user) return null;\n\n return await db\n .update(notificationTable)\n .set({ isRead: true })\n .where(eq(notificationTable.userId, user.id))\n .returning();\n}\n"],"mappings":"2OAQA,eAAsB,GAAuB,CAC3C,GAAM,CAAE,QAAS,MAAM,GAAmB,CAG1C,OAFK,EAEE,MAAM,EACV,QAAQ,CACR,KAAK,EAAkB,CACvB,MAAM,EAAG,EAAkB,OAAQ,EAAK,GAAG,CAAC,CAC5C,QAAQ,EAAK,EAAkB,UAAU,CAAC,CAN3B,KASpB,eAAsB,EAAmB,EAAiC,CACxE,GAAM,CAAC,GAAgB,MAAM,EAC1B,OAAO,EAAkB,CACzB,OAAO,CACN,GAAG,EACH,OAAQ,GACT,CAAC,CACD,WAAW,CAEd,OAAO,EAGT,eAAsB,EAAuB,EAAY,CACvD,GAAM,CAAC,GAAW,MAAM,EACrB,OAAO,EAAkB,CACzB,IAAI,CAAE,OAAQ,GAAM,CAAC,CACrB,MAAM,EAAG,EAAkB,GAAI,EAAG,CAAC,CACnC,WAAW,CAEd,OAAO,EAGT,eAAsB,GAA6B,CACjD,GAAM,CAAE,QAAS,MAAM,GAAmB,CAG1C,OAFK,EAEE,MAAM,EACV,OAAO,EAAkB,CACzB,IAAI,CAAE,OAAQ,GAAM,CAAC,CACrB,MAAM,EAAG,EAAkB,OAAQ,EAAK,GAAG,CAAC,CAC5C,WAAW,CANI"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
require(`./actions.cjs`),require(`./service.cjs`);
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
import{createNotification as e,getUserNotifications as t,markAllNotificationsAsRead as n,markNotificationAsRead as r}from"./actions.mjs";import{notificationService as i}from"./service.mjs";export{};
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
const e=require(`../event-bus.cjs`),t=require(`./actions.cjs`);var n=class{constructor(){this.initialized=!1}init(){this.initialized||(console.log(`[Notification Service] Subscribing to notification:send...`),e.eventBus.subscribe(`notification:send`,`notification-service`,async e=>{console.log(`[Notification Service] Received notification:send event`,e.payload);try{let n=await t.createNotification(e.payload);console.log(`[Notification Service] Notification created successfully:`,n.id)}catch(e){console.error(`[Notification Service] Failed to process notification:send`,e)}}),this.initialized=!0,console.log(`[NotificationService] Initialized and listening for events.`))}};const r=globalThis,i=r.__KRYO_NOTIFICATION_SERVICE__??new n;r.__KRYO_NOTIFICATION_SERVICE__=i,exports.notificationService=i;
|
|
@@ -0,0 +1,9 @@
|
|
|
1
|
+
//#region src/core/notifications/service.d.ts
|
|
2
|
+
declare class NotificationService {
|
|
3
|
+
private initialized;
|
|
4
|
+
init(): void;
|
|
5
|
+
}
|
|
6
|
+
declare const notificationService: NotificationService;
|
|
7
|
+
//#endregion
|
|
8
|
+
export { notificationService };
|
|
9
|
+
//# sourceMappingURL=service.d.cts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"service.d.cts","names":[],"sources":["../../../src/core/notifications/service.ts"],"mappings":";cAIM,mBAAA;EAAA,QACI,WAAA;EAED,IAAA,CAAA;AAAA;AAAA,cA4CI,mBAAA,EAAmB,mBAAA"}
|
|
@@ -0,0 +1,9 @@
|
|
|
1
|
+
//#region src/core/notifications/service.d.ts
|
|
2
|
+
declare class NotificationService {
|
|
3
|
+
private initialized;
|
|
4
|
+
init(): void;
|
|
5
|
+
}
|
|
6
|
+
declare const notificationService: NotificationService;
|
|
7
|
+
//#endregion
|
|
8
|
+
export { notificationService };
|
|
9
|
+
//# sourceMappingURL=service.d.mts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"service.d.mts","names":[],"sources":["../../../src/core/notifications/service.ts"],"mappings":";cAIM,mBAAA;EAAA,QACI,WAAA;EAED,IAAA,CAAA;AAAA;AAAA,cA4CI,mBAAA,EAAmB,mBAAA"}
|
|
@@ -0,0 +1,2 @@
|
|
|
1
|
+
import{eventBus as e}from"../event-bus.mjs";import{createNotification as t}from"./actions.mjs";var n=class{constructor(){this.initialized=!1}init(){this.initialized||(console.log(`[Notification Service] Subscribing to notification:send...`),e.subscribe(`notification:send`,`notification-service`,async e=>{console.log(`[Notification Service] Received notification:send event`,e.payload);try{let n=await t(e.payload);console.log(`[Notification Service] Notification created successfully:`,n.id)}catch(e){console.error(`[Notification Service] Failed to process notification:send`,e)}}),this.initialized=!0,console.log(`[NotificationService] Initialized and listening for events.`))}};const r=globalThis,i=r.__KRYO_NOTIFICATION_SERVICE__??new n;r.__KRYO_NOTIFICATION_SERVICE__=i;export{i as notificationService};
|
|
2
|
+
//# sourceMappingURL=service.mjs.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"service.mjs","names":[],"sources":["../../../src/core/notifications/service.ts"],"sourcesContent":["import { eventBus } from \"../event-bus\";\nimport { createNotification } from \"./actions\";\nimport type { CreateNotificationPayload } from \"./types\";\n\nclass NotificationService {\n private initialized = false;\n\n public init() {\n if (this.initialized) {\n // console.log(\"[Notification Service] Already initialized.\");\n return;\n }\n\n console.log(\"[Notification Service] Subscribing to notification:send...\");\n\n eventBus.subscribe(\n \"notification:send\",\n \"notification-service\",\n async (event) => {\n console.log(\n \"[Notification Service] Received notification:send event\",\n event.payload,\n );\n try {\n // const { createNotification } = await import(\"./actions\");\n const result = await createNotification(\n event.payload as CreateNotificationPayload,\n );\n console.log(\n \"[Notification Service] Notification created successfully:\",\n result.id,\n );\n } catch (error) {\n console.error(\n \"[Notification Service] Failed to process notification:send\",\n error,\n );\n }\n },\n );\n\n this.initialized = true;\n console.log(\"[NotificationService] Initialized and listening for events.\");\n }\n}\n\n// Global Singleton Pattern\nconst globalForNotifications = globalThis as unknown as {\n __KRYO_NOTIFICATION_SERVICE__: NotificationService | undefined;\n};\n\nexport const notificationService =\n globalForNotifications.__KRYO_NOTIFICATION_SERVICE__ ??\n new NotificationService();\n\nglobalForNotifications.__KRYO_NOTIFICATION_SERVICE__ = notificationService;\n"],"mappings":"+FAIA,IAAM,EAAN,KAA0B,gCACF,GAEtB,MAAc,CACR,KAAK,cAKT,QAAQ,IAAI,6DAA6D,CAEzE,EAAS,UACP,oBACA,uBACA,KAAO,IAAU,CACf,QAAQ,IACN,0DACA,EAAM,QACP,CACD,GAAI,CAEF,IAAM,EAAS,MAAM,EACnB,EAAM,QACP,CACD,QAAQ,IACN,4DACA,EAAO,GACR,OACM,EAAO,CACd,QAAQ,MACN,6DACA,EACD,GAGN,CAED,KAAK,YAAc,GACnB,QAAQ,IAAI,8DAA8D,IAK9E,MAAM,EAAyB,WAIlB,EACX,EAAuB,+BACvB,IAAI,EAEN,EAAuB,8BAAgC"}
|
|
@@ -0,0 +1,21 @@
|
|
|
1
|
+
import { notificationTable } from "../../server/database/schema.cjs";
|
|
2
|
+
import { InferSelectModel } from "drizzle-orm";
|
|
3
|
+
|
|
4
|
+
//#region src/core/notifications/types.d.ts
|
|
5
|
+
type Notification = InferSelectModel<typeof notificationTable>;
|
|
6
|
+
type CreateNotificationPayload = {
|
|
7
|
+
title: string;
|
|
8
|
+
content?: string;
|
|
9
|
+
type?: string;
|
|
10
|
+
target?: string;
|
|
11
|
+
userId: string;
|
|
12
|
+
resourceId?: string;
|
|
13
|
+
resourceType?: string;
|
|
14
|
+
};
|
|
15
|
+
type NotificationEvents = {
|
|
16
|
+
"notification:send": CreateNotificationPayload;
|
|
17
|
+
"notification:created": Notification;
|
|
18
|
+
};
|
|
19
|
+
//#endregion
|
|
20
|
+
export { CreateNotificationPayload, Notification, NotificationEvents };
|
|
21
|
+
//# sourceMappingURL=types.d.cts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"types.d.cts","names":[],"sources":["../../../src/core/notifications/types.ts"],"mappings":";;;;KAGY,YAAA,GAAe,gBAAA,QAAwB,iBAAA;AAAA,KAEvC,yBAAA;EACV,KAAA;EACA,OAAA;EACA,IAAA;EACA,MAAA;EACA,MAAA;EACA,UAAA;EACA,YAAA;AAAA;AAAA,KAGU,kBAAA;EACV,mBAAA,EAAqB,yBAAA;EACrB,sBAAA,EAAwB,YAAA;AAAA"}
|
|
@@ -0,0 +1,21 @@
|
|
|
1
|
+
import { notificationTable } from "../../server/database/schema.mjs";
|
|
2
|
+
import { InferSelectModel } from "drizzle-orm";
|
|
3
|
+
|
|
4
|
+
//#region src/core/notifications/types.d.ts
|
|
5
|
+
type Notification = InferSelectModel<typeof notificationTable>;
|
|
6
|
+
type CreateNotificationPayload = {
|
|
7
|
+
title: string;
|
|
8
|
+
content?: string;
|
|
9
|
+
type?: string;
|
|
10
|
+
target?: string;
|
|
11
|
+
userId: string;
|
|
12
|
+
resourceId?: string;
|
|
13
|
+
resourceType?: string;
|
|
14
|
+
};
|
|
15
|
+
type NotificationEvents = {
|
|
16
|
+
"notification:send": CreateNotificationPayload;
|
|
17
|
+
"notification:created": Notification;
|
|
18
|
+
};
|
|
19
|
+
//#endregion
|
|
20
|
+
export { CreateNotificationPayload, Notification, NotificationEvents };
|
|
21
|
+
//# sourceMappingURL=types.d.mts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"types.d.mts","names":[],"sources":["../../../src/core/notifications/types.ts"],"mappings":";;;;KAGY,YAAA,GAAe,gBAAA,QAAwB,iBAAA;AAAA,KAEvC,yBAAA;EACV,KAAA;EACA,OAAA;EACA,IAAA;EACA,MAAA;EACA,MAAA;EACA,UAAA;EACA,YAAA;AAAA;AAAA,KAGU,kBAAA;EACV,mBAAA,EAAqB,yBAAA;EACrB,sBAAA,EAAwB,YAAA;AAAA"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
require(`../_virtual/_rolldown/runtime.cjs`);const e=require(`../server/database/inject.cjs`),t=require(`../server/database/schema.cjs`);let n=require(`drizzle-orm`);async function r(){try{console.log(`[Kernel:Setup] Checking if system is installed...`);let r=await e.db.select({count:n.sql`count(*)`}).from(t.userTable),i=Number(r[0]?.count||0);return console.log(`[Kernel:Setup] User count: ${i}`),i>0}catch(e){return console.log(`[Kernel:Setup] System not installed or error: ${e.message}`),!1}}exports.isSystemInstalled=r;
|
|
@@ -0,0 +1,9 @@
|
|
|
1
|
+
//#region src/core/setup.d.ts
|
|
2
|
+
/**
|
|
3
|
+
* Checks if the system is installed.
|
|
4
|
+
* A system is considered installed if at least one user exists in the database.
|
|
5
|
+
*/
|
|
6
|
+
declare function isSystemInstalled(): Promise<boolean>;
|
|
7
|
+
//#endregion
|
|
8
|
+
export { isSystemInstalled };
|
|
9
|
+
//# sourceMappingURL=setup.d.cts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"setup.d.cts","names":[],"sources":["../../src/core/setup.ts"],"mappings":";;AAQA;;;iBAAsB,iBAAA,CAAA,GAAqB,OAAA"}
|
|
@@ -0,0 +1,9 @@
|
|
|
1
|
+
//#region src/core/setup.d.ts
|
|
2
|
+
/**
|
|
3
|
+
* Checks if the system is installed.
|
|
4
|
+
* A system is considered installed if at least one user exists in the database.
|
|
5
|
+
*/
|
|
6
|
+
declare function isSystemInstalled(): Promise<boolean>;
|
|
7
|
+
//#endregion
|
|
8
|
+
export { isSystemInstalled };
|
|
9
|
+
//# sourceMappingURL=setup.d.mts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"setup.d.mts","names":[],"sources":["../../src/core/setup.ts"],"mappings":";;AAQA;;;iBAAsB,iBAAA,CAAA,GAAqB,OAAA"}
|
|
@@ -0,0 +1,2 @@
|
|
|
1
|
+
import{db as e}from"../server/database/inject.mjs";import{userTable as t}from"../server/database/schema.mjs";import{sql as n}from"drizzle-orm";async function r(){try{console.log(`[Kernel:Setup] Checking if system is installed...`);let r=await e.select({count:n`count(*)`}).from(t),i=Number(r[0]?.count||0);return console.log(`[Kernel:Setup] User count: ${i}`),i>0}catch(e){return console.log(`[Kernel:Setup] System not installed or error: ${e.message}`),!1}}export{r as isSystemInstalled};
|
|
2
|
+
//# sourceMappingURL=setup.mjs.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"setup.mjs","names":[],"sources":["../../src/core/setup.ts"],"sourcesContent":["import { sql } from \"drizzle-orm\";\nimport { db } from \"../server/database/inject\";\nimport { userTable } from \"../server/database/schema\";\n\n/**\n * Checks if the system is installed.\n * A system is considered installed if at least one user exists in the database.\n */\nexport async function isSystemInstalled(): Promise<boolean> {\n try {\n // We check if the users table exists and has at least one record\n console.log(\"[Kernel:Setup] Checking if system is installed...\");\n const result = await db\n .select({ count: sql<string | number>`count(*)` })\n .from(userTable);\n const count = Number(result[0]?.count || 0);\n console.log(`[Kernel:Setup] User count: ${count}`);\n return count > 0;\n } catch (error: any) {\n console.log(\n `[Kernel:Setup] System not installed or error: ${error.message}`,\n );\n // If table doesn't exist, it's definitely not installed\n return false;\n }\n}\n"],"mappings":"+IAQA,eAAsB,GAAsC,CAC1D,GAAI,CAEF,QAAQ,IAAI,oDAAoD,CAChE,IAAM,EAAS,MAAM,EAClB,OAAO,CAAE,MAAO,CAAoB,WAAY,CAAC,CACjD,KAAK,EAAU,CACZ,EAAQ,OAAO,EAAO,IAAI,OAAS,EAAE,CAE3C,OADA,QAAQ,IAAI,8BAA8B,IAAQ,CAC3C,EAAQ,QACR,EAAY,CAKnB,OAJA,QAAQ,IACN,iDAAiD,EAAM,UACxD,CAEM"}
|
|
@@ -0,0 +1,13 @@
|
|
|
1
|
+
//#region src/core/types.d.ts
|
|
2
|
+
type UserRole = "user" | "admin" | string;
|
|
3
|
+
type UserPermission = string;
|
|
4
|
+
interface SystemEvent<T = any> {
|
|
5
|
+
type: string;
|
|
6
|
+
payload: T;
|
|
7
|
+
timestamp: number;
|
|
8
|
+
source: string;
|
|
9
|
+
}
|
|
10
|
+
type EventHandler<T = any> = (event: SystemEvent<T>) => Promise<void> | void;
|
|
11
|
+
//#endregion
|
|
12
|
+
export { EventHandler, SystemEvent, UserPermission, UserRole };
|
|
13
|
+
//# sourceMappingURL=types.d.cts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"types.d.cts","names":[],"sources":["../../src/core/types.ts"],"mappings":";KAAY,QAAA;AAAA,KACA,cAAA;AAAA,UAEK,WAAA;EACf,IAAA;EACA,OAAA,EAAS,CAAA;EACT,SAAA;EACA,MAAA;AAAA;AAAA,KAGU,YAAA,aACV,KAAA,EAAO,WAAA,CAAY,CAAA,MAChB,OAAA"}
|
|
@@ -0,0 +1,13 @@
|
|
|
1
|
+
//#region src/core/types.d.ts
|
|
2
|
+
type UserRole = "user" | "admin" | string;
|
|
3
|
+
type UserPermission = string;
|
|
4
|
+
interface SystemEvent<T = any> {
|
|
5
|
+
type: string;
|
|
6
|
+
payload: T;
|
|
7
|
+
timestamp: number;
|
|
8
|
+
source: string;
|
|
9
|
+
}
|
|
10
|
+
type EventHandler<T = any> = (event: SystemEvent<T>) => Promise<void> | void;
|
|
11
|
+
//#endregion
|
|
12
|
+
export { EventHandler, SystemEvent, UserPermission, UserRole };
|
|
13
|
+
//# sourceMappingURL=types.d.mts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"types.d.mts","names":[],"sources":["../../src/core/types.ts"],"mappings":";KAAY,QAAA;AAAA,KACA,cAAA;AAAA,UAEK,WAAA;EACf,IAAA;EACA,OAAA,EAAS,CAAA;EACT,SAAA;EACA,MAAA;AAAA;AAAA,KAGU,YAAA,aACV,KAAA,EAAO,WAAA,CAAY,CAAA,MAChB,OAAA"}
|
package/dist/index.cjs
ADDED
|
@@ -0,0 +1 @@
|
|
|
1
|
+
Object.defineProperty(exports,Symbol.toStringTag,{value:`Module`});const e=require(`./core/auth/validation.cjs`),t=require(`./core/event-bus.cjs`),n=require(`./server/database/schema.cjs`),r=require(`./core/notifications/service.cjs`);exports.activityLogsTable=n.activityLogsTable,exports.coreSchema=n.coreSchema,exports.emailVerificationTable=n.emailVerificationTable,exports.eventBus=t.eventBus,exports.forgotPasswordSchema=e.forgotPasswordSchema,exports.loginSchema=e.loginSchema,exports.notificationService=r.notificationService,exports.notificationTable=n.notificationTable,exports.passkeysSetupSchema=e.passkeysSetupSchema,exports.passwordResetSessionTable=n.passwordResetSessionTable,exports.permissionsTable=n.permissionsTable,exports.recoveryCodeVerifySchema=e.recoveryCodeVerifySchema,exports.registerSchema=e.registerSchema,exports.relations=n.relations,exports.resetPasswordSchema=e.resetPasswordSchema,exports.rolesTable=n.rolesTable,exports.rolesToPermissionsTable=n.rolesToPermissionsTable,exports.sessionTable=n.sessionTable,exports.systemModulesTable=n.systemModulesTable,exports.totpSetupSchema=e.totpSetupSchema,exports.totpVerifySchema=e.totpVerifySchema,exports.userTable=n.userTable,exports.usersToPermissionsTable=n.usersToPermissionsTable,exports.usersToRolesTable=n.usersToRolesTable,exports.verifyEmailSchema=e.verifyEmailSchema;
|
package/dist/index.d.cts
ADDED
|
@@ -0,0 +1,8 @@
|
|
|
1
|
+
import { DatabaseSchema, activityLogsTable, coreSchema, emailVerificationTable, notificationTable, passwordResetSessionTable, permissionsTable, relations, rolesTable, rolesToPermissionsTable, sessionTable, systemModulesTable, userTable, usersToPermissionsTable, usersToRolesTable } from "./server/database/schema.cjs";
|
|
2
|
+
import { EventHandler, SystemEvent, UserPermission, UserRole } from "./core/types.cjs";
|
|
3
|
+
import { AuthResponse, AuthSession, FullUser, PasswordResetAuthSession, PasswordResetSession, Session, SessionFlags, User, UserSession } from "./core/auth/types.cjs";
|
|
4
|
+
import { ForgotPasswordInput, LoginInput, PasskeysSetupInput, RecoveryVerifyInput, RegisterInput, ResetPasswordInput, TOTPSetupInput, TOTPVerifyInput, VerifyEmailInput, forgotPasswordSchema, loginSchema, passkeysSetupSchema, recoveryCodeVerifySchema, registerSchema, resetPasswordSchema, totpSetupSchema, totpVerifySchema, verifyEmailSchema } from "./core/auth/validation.cjs";
|
|
5
|
+
import { eventBus } from "./core/event-bus.cjs";
|
|
6
|
+
import { notificationService } from "./core/notifications/service.cjs";
|
|
7
|
+
import { CreateNotificationPayload, Notification, NotificationEvents } from "./core/notifications/types.cjs";
|
|
8
|
+
export { AuthResponse, AuthSession, CreateNotificationPayload, DatabaseSchema, EventHandler, ForgotPasswordInput, FullUser, LoginInput, Notification, NotificationEvents, PasskeysSetupInput, PasswordResetAuthSession, PasswordResetSession, RecoveryVerifyInput, RegisterInput, ResetPasswordInput, Session, SessionFlags, SystemEvent, TOTPSetupInput, TOTPVerifyInput, User, UserPermission, UserRole, UserSession, VerifyEmailInput, activityLogsTable, coreSchema, emailVerificationTable, eventBus, forgotPasswordSchema, loginSchema, notificationService, notificationTable, passkeysSetupSchema, passwordResetSessionTable, permissionsTable, recoveryCodeVerifySchema, registerSchema, relations, resetPasswordSchema, rolesTable, rolesToPermissionsTable, sessionTable, systemModulesTable, totpSetupSchema, totpVerifySchema, userTable, usersToPermissionsTable, usersToRolesTable, verifyEmailSchema };
|
package/dist/index.d.mts
ADDED
|
@@ -0,0 +1,8 @@
|
|
|
1
|
+
import { DatabaseSchema, activityLogsTable, coreSchema, emailVerificationTable, notificationTable, passwordResetSessionTable, permissionsTable, relations, rolesTable, rolesToPermissionsTable, sessionTable, systemModulesTable, userTable, usersToPermissionsTable, usersToRolesTable } from "./server/database/schema.mjs";
|
|
2
|
+
import { EventHandler, SystemEvent, UserPermission, UserRole } from "./core/types.mjs";
|
|
3
|
+
import { AuthResponse, AuthSession, FullUser, PasswordResetAuthSession, PasswordResetSession, Session, SessionFlags, User, UserSession } from "./core/auth/types.mjs";
|
|
4
|
+
import { ForgotPasswordInput, LoginInput, PasskeysSetupInput, RecoveryVerifyInput, RegisterInput, ResetPasswordInput, TOTPSetupInput, TOTPVerifyInput, VerifyEmailInput, forgotPasswordSchema, loginSchema, passkeysSetupSchema, recoveryCodeVerifySchema, registerSchema, resetPasswordSchema, totpSetupSchema, totpVerifySchema, verifyEmailSchema } from "./core/auth/validation.mjs";
|
|
5
|
+
import { eventBus } from "./core/event-bus.mjs";
|
|
6
|
+
import { notificationService } from "./core/notifications/service.mjs";
|
|
7
|
+
import { CreateNotificationPayload, Notification, NotificationEvents } from "./core/notifications/types.mjs";
|
|
8
|
+
export { AuthResponse, AuthSession, CreateNotificationPayload, DatabaseSchema, EventHandler, ForgotPasswordInput, FullUser, LoginInput, Notification, NotificationEvents, PasskeysSetupInput, PasswordResetAuthSession, PasswordResetSession, RecoveryVerifyInput, RegisterInput, ResetPasswordInput, Session, SessionFlags, SystemEvent, TOTPSetupInput, TOTPVerifyInput, User, UserPermission, UserRole, UserSession, VerifyEmailInput, activityLogsTable, coreSchema, emailVerificationTable, eventBus, forgotPasswordSchema, loginSchema, notificationService, notificationTable, passkeysSetupSchema, passwordResetSessionTable, permissionsTable, recoveryCodeVerifySchema, registerSchema, relations, resetPasswordSchema, rolesTable, rolesToPermissionsTable, sessionTable, systemModulesTable, totpSetupSchema, totpVerifySchema, userTable, usersToPermissionsTable, usersToRolesTable, verifyEmailSchema };
|
package/dist/index.mjs
ADDED
|
@@ -0,0 +1 @@
|
|
|
1
|
+
import{forgotPasswordSchema as e,loginSchema as t,passkeysSetupSchema as n,recoveryCodeVerifySchema as r,registerSchema as i,resetPasswordSchema as a,totpSetupSchema as o,totpVerifySchema as s,verifyEmailSchema as c}from"./core/auth/validation.mjs";import{eventBus as l}from"./core/event-bus.mjs";import{activityLogsTable as u,coreSchema as d,emailVerificationTable as f,notificationTable as p,passwordResetSessionTable as m,permissionsTable as h,relations as g,rolesTable as _,rolesToPermissionsTable as v,sessionTable as y,systemModulesTable as b,userTable as x,usersToPermissionsTable as S,usersToRolesTable as C}from"./server/database/schema.mjs";import{notificationService as w}from"./core/notifications/service.mjs";export{u as activityLogsTable,d as coreSchema,f as emailVerificationTable,l as eventBus,e as forgotPasswordSchema,t as loginSchema,w as notificationService,p as notificationTable,n as passkeysSetupSchema,m as passwordResetSessionTable,h as permissionsTable,r as recoveryCodeVerifySchema,i as registerSchema,g as relations,a as resetPasswordSchema,_ as rolesTable,v as rolesToPermissionsTable,y as sessionTable,b as systemModulesTable,o as totpSetupSchema,s as totpVerifySchema,x as userTable,S as usersToPermissionsTable,C as usersToRolesTable,c as verifyEmailSchema};
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
require(`../../_virtual/_rolldown/runtime.cjs`);const e=require(`../database/inject.cjs`),t=require(`../database/schema.cjs`);let n=require(`drizzle-orm`);function r(e){return/^.+@.+\..+$/.test(e)&&e.length<256&&e.length>0}async function i(r){let[i]=await e.db.select({count:(0,n.count)()}).from(t.userTable).where((0,n.eq)(t.userTable.email,r));return i.count===0}exports.checkEmailAvailability=i,exports.verifyEmailInput=r;
|
|
@@ -0,0 +1,13 @@
|
|
|
1
|
+
//#region src/server/auth/email.d.ts
|
|
2
|
+
/**
|
|
3
|
+
* Validates the email format and length.
|
|
4
|
+
*/
|
|
5
|
+
declare function verifyEmailInput(email: string): boolean;
|
|
6
|
+
/**
|
|
7
|
+
* Checks if an email address is already in use.
|
|
8
|
+
* @returns True if the email is available, false otherwise.
|
|
9
|
+
*/
|
|
10
|
+
declare function checkEmailAvailability(email: string): Promise<boolean>;
|
|
11
|
+
//#endregion
|
|
12
|
+
export { checkEmailAvailability, verifyEmailInput };
|
|
13
|
+
//# sourceMappingURL=email.d.cts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"email.d.cts","names":[],"sources":["../../../src/server/auth/email.ts"],"mappings":";;AAOA;;iBAAgB,gBAAA,CAAiB,KAAA;;;AAQjC;;iBAAsB,sBAAA,CAAuB,KAAA,WAAgB,OAAA"}
|
|
@@ -0,0 +1,13 @@
|
|
|
1
|
+
//#region src/server/auth/email.d.ts
|
|
2
|
+
/**
|
|
3
|
+
* Validates the email format and length.
|
|
4
|
+
*/
|
|
5
|
+
declare function verifyEmailInput(email: string): boolean;
|
|
6
|
+
/**
|
|
7
|
+
* Checks if an email address is already in use.
|
|
8
|
+
* @returns True if the email is available, false otherwise.
|
|
9
|
+
*/
|
|
10
|
+
declare function checkEmailAvailability(email: string): Promise<boolean>;
|
|
11
|
+
//#endregion
|
|
12
|
+
export { checkEmailAvailability, verifyEmailInput };
|
|
13
|
+
//# sourceMappingURL=email.d.mts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"email.d.mts","names":[],"sources":["../../../src/server/auth/email.ts"],"mappings":";;AAOA;;iBAAgB,gBAAA,CAAiB,KAAA;;;AAQjC;;iBAAsB,sBAAA,CAAuB,KAAA,WAAgB,OAAA"}
|
|
@@ -0,0 +1,2 @@
|
|
|
1
|
+
import{db as e}from"../database/inject.mjs";import{userTable as t}from"../database/schema.mjs";import{count as n,eq as r}from"drizzle-orm";function i(e){return/^.+@.+\..+$/.test(e)&&e.length<256&&e.length>0}async function a(i){let[a]=await e.select({count:n()}).from(t).where(r(t.email,i));return a.count===0}export{a as checkEmailAvailability,i as verifyEmailInput};
|
|
2
|
+
//# sourceMappingURL=email.mjs.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"email.mjs","names":[],"sources":["../../../src/server/auth/email.ts"],"sourcesContent":["import { count, eq } from \"drizzle-orm\";\nimport { db } from \"../database/inject\";\nimport { userTable } from \"../database/schema\";\n\n/**\n * Validates the email format and length.\n */\nexport function verifyEmailInput(email: string): boolean {\n return /^.+@.+\\..+$/.test(email) && email.length < 256 && email.length > 0;\n}\n\n/**\n * Checks if an email address is already in use.\n * @returns True if the email is available, false otherwise.\n */\nexport async function checkEmailAvailability(email: string): Promise<boolean> {\n const [entries] = await db\n .select({ count: count() })\n .from(userTable)\n .where(eq(userTable.email, email));\n\n return entries.count === 0;\n}\n"],"mappings":"2IAOA,SAAgB,EAAiB,EAAwB,CACvD,MAAO,cAAc,KAAK,EAAM,EAAI,EAAM,OAAS,KAAO,EAAM,OAAS,EAO3E,eAAsB,EAAuB,EAAiC,CAC5E,GAAM,CAAC,GAAW,MAAM,EACrB,OAAO,CAAE,MAAO,GAAO,CAAE,CAAC,CAC1B,KAAK,EAAU,CACf,MAAM,EAAG,EAAU,MAAO,EAAM,CAAC,CAEpC,OAAO,EAAQ,QAAU"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
"use server";const e=require(`../../_virtual/_rolldown/runtime.cjs`);let t=require(`bcryptjs`);t=e.__toESM(t);async function n(e){return await t.default.hash(e,10)}async function r(e,n){return await t.default.compare(n,e)}async function i(e){return e.length>=8&&e.length<=255}exports.hashPassword=n,exports.verifyPasswordHash=r,exports.verifyPasswordStrength=i;
|
|
@@ -1,20 +1,23 @@
|
|
|
1
|
+
//#region src/server/auth/password.d.ts
|
|
1
2
|
/**
|
|
2
3
|
* Hashes the password using bcrypt.
|
|
3
4
|
* @param password Password to be hashed.
|
|
4
5
|
* @returns Returns the hashed password.
|
|
5
6
|
*/
|
|
6
|
-
|
|
7
|
+
declare function hashPassword(password: string): Promise<string>;
|
|
7
8
|
/**
|
|
8
9
|
* Verifies the password hash.
|
|
9
10
|
* @param hash bcrypt hash.
|
|
10
11
|
* @param password Password for comparison.
|
|
11
12
|
* @returns Returns true if the password is correct, false otherwise.
|
|
12
13
|
*/
|
|
13
|
-
|
|
14
|
+
declare function verifyPasswordHash(hash: string, password: string): Promise<boolean>;
|
|
14
15
|
/**
|
|
15
16
|
* Validates password strength.
|
|
16
17
|
* @param password Password to validate.
|
|
17
18
|
* @returns Returns true if the password meets complexity requirements.
|
|
18
19
|
*/
|
|
19
|
-
|
|
20
|
-
//#
|
|
20
|
+
declare function verifyPasswordStrength(password: string): Promise<boolean>;
|
|
21
|
+
//#endregion
|
|
22
|
+
export { hashPassword, verifyPasswordHash, verifyPasswordStrength };
|
|
23
|
+
//# sourceMappingURL=password.d.cts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"password.d.cts","names":[],"sources":["../../../src/server/auth/password.ts"],"mappings":";;AASA;;;;iBAAsB,YAAA,CAAa,QAAA,WAAmB,OAAA;AAYtD;;;;;;AAAA,iBAAsB,kBAAA,CACpB,IAAA,UACA,QAAA,WACC,OAAA;;;AAUH;;;iBAAsB,sBAAA,CACpB,QAAA,WACC,OAAA"}
|
|
@@ -1,30 +1,23 @@
|
|
|
1
|
-
|
|
2
|
-
import bcrypt from "bcryptjs";
|
|
1
|
+
//#region src/server/auth/password.d.ts
|
|
3
2
|
/**
|
|
4
3
|
* Hashes the password using bcrypt.
|
|
5
4
|
* @param password Password to be hashed.
|
|
6
5
|
* @returns Returns the hashed password.
|
|
7
6
|
*/
|
|
8
|
-
|
|
9
|
-
const saltRounds = 10;
|
|
10
|
-
return await bcrypt.hash(password, saltRounds);
|
|
11
|
-
// return password;
|
|
12
|
-
}
|
|
7
|
+
declare function hashPassword(password: string): Promise<string>;
|
|
13
8
|
/**
|
|
14
9
|
* Verifies the password hash.
|
|
15
10
|
* @param hash bcrypt hash.
|
|
16
11
|
* @param password Password for comparison.
|
|
17
12
|
* @returns Returns true if the password is correct, false otherwise.
|
|
18
13
|
*/
|
|
19
|
-
|
|
20
|
-
return await bcrypt.compare(password, hash);
|
|
21
|
-
// return password === hash;
|
|
22
|
-
}
|
|
14
|
+
declare function verifyPasswordHash(hash: string, password: string): Promise<boolean>;
|
|
23
15
|
/**
|
|
24
16
|
* Validates password strength.
|
|
25
17
|
* @param password Password to validate.
|
|
26
18
|
* @returns Returns true if the password meets complexity requirements.
|
|
27
19
|
*/
|
|
28
|
-
|
|
29
|
-
|
|
30
|
-
}
|
|
20
|
+
declare function verifyPasswordStrength(password: string): Promise<boolean>;
|
|
21
|
+
//#endregion
|
|
22
|
+
export { hashPassword, verifyPasswordHash, verifyPasswordStrength };
|
|
23
|
+
//# sourceMappingURL=password.d.mts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"password.d.mts","names":[],"sources":["../../../src/server/auth/password.ts"],"mappings":";;AASA;;;;iBAAsB,YAAA,CAAa,QAAA,WAAmB,OAAA;AAYtD;;;;;;AAAA,iBAAsB,kBAAA,CACpB,IAAA,UACA,QAAA,WACC,OAAA;;;AAUH;;;iBAAsB,sBAAA,CACpB,QAAA,WACC,OAAA"}
|
|
@@ -0,0 +1,2 @@
|
|
|
1
|
+
"use server";import e from"bcryptjs";async function t(t){return await e.hash(t,10)}async function n(t,n){return await e.compare(n,t)}async function r(e){return e.length>=8&&e.length<=255}export{t as hashPassword,n as verifyPasswordHash,r as verifyPasswordStrength};
|
|
2
|
+
//# sourceMappingURL=password.mjs.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"password.mjs","names":[],"sources":["../../../src/server/auth/password.ts"],"sourcesContent":["\"use server\";\n\nimport bcrypt from \"bcryptjs\";\n\n/**\n * Hashes the password using bcrypt.\n * @param password Password to be hashed.\n * @returns Returns the hashed password.\n */\nexport async function hashPassword(password: string): Promise<string> {\n const saltRounds = 10;\n return await bcrypt.hash(password, saltRounds);\n // return password;\n}\n\n/**\n * Verifies the password hash.\n * @param hash bcrypt hash.\n * @param password Password for comparison.\n * @returns Returns true if the password is correct, false otherwise.\n */\nexport async function verifyPasswordHash(\n hash: string,\n password: string,\n): Promise<boolean> {\n return await bcrypt.compare(password, hash);\n // return password === hash;\n}\n\n/**\n * Validates password strength.\n * @param password Password to validate.\n * @returns Returns true if the password meets complexity requirements.\n */\nexport async function verifyPasswordStrength(\n password: string,\n): Promise<boolean> {\n return password.length >= 8 && password.length <= 255;\n}\n"],"mappings":"qCASA,eAAsB,EAAa,EAAmC,CAEpE,OAAO,MAAM,EAAO,KAAK,EADN,GAC2B,CAUhD,eAAsB,EACpB,EACA,EACkB,CAClB,OAAO,MAAM,EAAO,QAAQ,EAAU,EAAK,CAS7C,eAAsB,EACpB,EACkB,CAClB,OAAO,EAAS,QAAU,GAAK,EAAS,QAAU"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
"use server";require(`../../_virtual/_rolldown/runtime.cjs`);const e=require(`../database/inject.cjs`),t=require(`../database/schema.cjs`),n=require(`./password.cjs`),r=require(`../../core/auth/utils/encode.cjs`),i=require(`../../core/auth/utils/encryption.cjs`),a=require(`../emails/index.cjs`);let o=require(`drizzle-orm`);async function s(e){return e.length>3&&e.length<32&&e.trim()===e}async function c(s,c,l){let u=await n.hashPassword(l),d=r.generateRandomRecoveryCode(),f=i.encryptString(d);return await e.db.transaction(async e=>{let[n]=await e.insert(t.userTable).values({email:s,name:c,password:u,recovery_code:Buffer.from(f)}).returning();if(!n)throw Error(`Failed to create user`);let[r]=await e.select().from(t.rolesTable).where((0,o.eq)(t.rolesTable.name,`user`));return r||([r]=await e.insert(t.rolesTable).values({name:`user`,description:`Default user role`}).returning()),await e.insert(t.usersToRolesTable).values({userId:n.id,roleId:r.id}),await a.sendRecoveryCode(n.email,d),n})}async function l(n,a,s){let c=i.encryptString(r.generateRandomRecoveryCode());return await e.db.transaction(async e=>{let[r]=await e.insert(t.userTable).values({email:n,name:a,image:s,emailVerifiedAt:new Date,recovery_code:Buffer.from(c)}).returning(),[i]=await e.select().from(t.rolesTable).where((0,o.eq)(t.rolesTable.name,`user`));return i||([i]=await e.insert(t.rolesTable).values({name:`user`,description:`Default user role`}).returning()),await e.insert(t.usersToRolesTable).values({userId:r.id,roleId:i.id}),r})}async function u(n){let[r]=await e.db.select().from(t.userTable).where((0,o.eq)(t.userTable.id,n));if(!r)return null;let{password:i,recovery_code:a,...s}=r;return s}async function d(n){let[r]=await e.db.select({recovery_code:t.userTable.recovery_code}).from(t.userTable).where((0,o.eq)(t.userTable.id,n));if(!r||!r.recovery_code)throw Error(`Recovery code not found for user`);return i.decryptToString(r.recovery_code)}async function f(n){let s=r.generateRandomRecoveryCode(),c=i.encryptString(s),[l]=await e.db.update(t.userTable).set({recovery_code:Buffer.from(c)}).where((0,o.eq)(t.userTable.id,n)).returning();if(!l)throw Error(`User not found`);return await a.sendRecoveryCode(l.email,s),s}async function p(r,i){let a=await n.hashPassword(i);await e.db.update(t.userTable).set({password:a}).where((0,o.eq)(t.userTable.id,r))}async function m(n,r){await e.db.update(t.userTable).set({name:r}).where((0,o.eq)(t.userTable.id,n))}async function h(n,r){await e.db.update(t.userTable).set({image:r}).where((0,o.eq)(t.userTable.id,n))}async function g(n,r){await e.db.update(t.userTable).set({email:r,emailVerifiedAt:new Date}).where((0,o.eq)(t.userTable.id,n))}async function _(n,r){return(await e.db.update(t.userTable).set({emailVerifiedAt:new Date}).where((0,o.and)((0,o.eq)(t.userTable.id,n),(0,o.eq)(t.userTable.email,r))).returning({id:t.userTable.id})).length>0}async function v(n){let[r]=await e.db.select({password:t.userTable.password}).from(t.userTable).where((0,o.eq)(t.userTable.id,n));if(!r)throw Error(`User not found`);return r.password}async function y(n){let[r]=await e.db.select().from(t.userTable).where((0,o.eq)(t.userTable.email,n));if(!r)return null;let{password:i,recovery_code:a,...s}=r;return s}exports.createOAuthUser=l,exports.createUser=c,exports.getUserById=u,exports.getUserFromEmail=y,exports.getUserPasswordHash=v,exports.getUserRecoverCode=d,exports.resetUserRecoveryCode=f,exports.setUserAsEmailVerifiedIfEmailMatches=_,exports.updateUserAwatar=h,exports.updateUserEmailAndSetEmailAsVerified=g,exports.updateUserName=m,exports.updateUserPassword=p,exports.verifyUsernameInput=s;
|
|
@@ -0,0 +1,58 @@
|
|
|
1
|
+
import { User } from "../../core/auth/types.cjs";
|
|
2
|
+
|
|
3
|
+
//#region src/server/auth/user.d.ts
|
|
4
|
+
/**
|
|
5
|
+
* Validates the username input.
|
|
6
|
+
*/
|
|
7
|
+
declare function verifyUsernameInput(username: string): Promise<boolean>;
|
|
8
|
+
/**
|
|
9
|
+
* Creates a new user with an initial recovery code and default 'user' role.
|
|
10
|
+
*/
|
|
11
|
+
declare function createUser(email: string, username: string, password: string): Promise<User>;
|
|
12
|
+
/**
|
|
13
|
+
* Creates a new user from an OAuth provider.
|
|
14
|
+
*/
|
|
15
|
+
declare function createOAuthUser(email: string, name: string, image?: string): Promise<User>;
|
|
16
|
+
/**
|
|
17
|
+
* Returns a user by ID.
|
|
18
|
+
*/
|
|
19
|
+
declare function getUserById(userId: string): Promise<User | null>;
|
|
20
|
+
/**
|
|
21
|
+
* Decrypts and returns the user's recovery code.
|
|
22
|
+
*/
|
|
23
|
+
declare function getUserRecoverCode(userId: string): Promise<string>;
|
|
24
|
+
/**
|
|
25
|
+
* Generates and sets a new recovery code for the user.
|
|
26
|
+
*/
|
|
27
|
+
declare function resetUserRecoveryCode(userId: string): Promise<string>;
|
|
28
|
+
/**
|
|
29
|
+
* Updates the user's password.
|
|
30
|
+
*/
|
|
31
|
+
declare function updateUserPassword(userId: string, password: string): Promise<void>;
|
|
32
|
+
/**
|
|
33
|
+
* Updates the user's name.
|
|
34
|
+
*/
|
|
35
|
+
declare function updateUserName(userId: string, name: string): Promise<void>;
|
|
36
|
+
/**
|
|
37
|
+
* Updates the user's image.
|
|
38
|
+
*/
|
|
39
|
+
declare function updateUserAwatar(userId: string, image: string): Promise<void>;
|
|
40
|
+
/**
|
|
41
|
+
* Updates the user's email and marks it as verified.
|
|
42
|
+
*/
|
|
43
|
+
declare function updateUserEmailAndSetEmailAsVerified(userId: string, email: string): Promise<void>;
|
|
44
|
+
/**
|
|
45
|
+
* Sets the user as email verified if the provided email matches.
|
|
46
|
+
*/
|
|
47
|
+
declare function setUserAsEmailVerifiedIfEmailMatches(userId: string, email: string): Promise<boolean>;
|
|
48
|
+
/**
|
|
49
|
+
* Returns the user's password hash.
|
|
50
|
+
*/
|
|
51
|
+
declare function getUserPasswordHash(userId: string): Promise<string | null>;
|
|
52
|
+
/**
|
|
53
|
+
* Returns a user by email.
|
|
54
|
+
*/
|
|
55
|
+
declare function getUserFromEmail(email: string): Promise<User | null>;
|
|
56
|
+
//#endregion
|
|
57
|
+
export { createOAuthUser, createUser, getUserById, getUserFromEmail, getUserPasswordHash, getUserRecoverCode, resetUserRecoveryCode, setUserAsEmailVerifiedIfEmailMatches, updateUserAwatar, updateUserEmailAndSetEmailAsVerified, updateUserName, updateUserPassword, verifyUsernameInput };
|
|
58
|
+
//# sourceMappingURL=user.d.cts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"user.d.cts","names":[],"sources":["../../../src/server/auth/user.ts"],"mappings":";;;;;AAiBA;iBAAsB,mBAAA,CAAoB,QAAA,WAAmB,OAAA;;;;iBASvC,UAAA,CACpB,KAAA,UACA,QAAA,UACA,QAAA,WACC,OAAA,CAAQ,IAAA;;;;iBA+CW,eAAA,CACpB,KAAA,UACA,IAAA,UACA,KAAA,YACC,OAAA,CAAQ,IAAA;;;;iBAyCW,WAAA,CAAY,MAAA,WAAiB,OAAA,CAAQ,IAAA;;;AA7C3D;iBA2DsB,kBAAA,CAAmB,MAAA,WAAiB,OAAA;;;;iBAkBpC,qBAAA,CAAsB,MAAA,WAAiB,OAAA;;;;iBAuBvC,kBAAA,CACpB,MAAA,UACA,QAAA,WACC,OAAA;;AA1DH;;iBAwEsB,cAAA,CACpB,MAAA,UACA,IAAA,WACC,OAAA;;;;iBAWmB,gBAAA,CACpB,MAAA,UACA,KAAA,WACC,OAAA;;;AA3EH;iBAuFsB,oCAAA,CACpB,MAAA,UACA,KAAA,WACC,OAAA;;;;iBAamB,oCAAA,CACpB,MAAA,UACA,KAAA,WACC,OAAA;;;;iBAemB,mBAAA,CACpB,MAAA,WACC,OAAA;AAlFH;;;AAAA,iBAoGsB,gBAAA,CAAiB,KAAA,WAAgB,OAAA,CAAQ,IAAA"}
|
|
@@ -0,0 +1,58 @@
|
|
|
1
|
+
import { User } from "../../core/auth/types.mjs";
|
|
2
|
+
|
|
3
|
+
//#region src/server/auth/user.d.ts
|
|
4
|
+
/**
|
|
5
|
+
* Validates the username input.
|
|
6
|
+
*/
|
|
7
|
+
declare function verifyUsernameInput(username: string): Promise<boolean>;
|
|
8
|
+
/**
|
|
9
|
+
* Creates a new user with an initial recovery code and default 'user' role.
|
|
10
|
+
*/
|
|
11
|
+
declare function createUser(email: string, username: string, password: string): Promise<User>;
|
|
12
|
+
/**
|
|
13
|
+
* Creates a new user from an OAuth provider.
|
|
14
|
+
*/
|
|
15
|
+
declare function createOAuthUser(email: string, name: string, image?: string): Promise<User>;
|
|
16
|
+
/**
|
|
17
|
+
* Returns a user by ID.
|
|
18
|
+
*/
|
|
19
|
+
declare function getUserById(userId: string): Promise<User | null>;
|
|
20
|
+
/**
|
|
21
|
+
* Decrypts and returns the user's recovery code.
|
|
22
|
+
*/
|
|
23
|
+
declare function getUserRecoverCode(userId: string): Promise<string>;
|
|
24
|
+
/**
|
|
25
|
+
* Generates and sets a new recovery code for the user.
|
|
26
|
+
*/
|
|
27
|
+
declare function resetUserRecoveryCode(userId: string): Promise<string>;
|
|
28
|
+
/**
|
|
29
|
+
* Updates the user's password.
|
|
30
|
+
*/
|
|
31
|
+
declare function updateUserPassword(userId: string, password: string): Promise<void>;
|
|
32
|
+
/**
|
|
33
|
+
* Updates the user's name.
|
|
34
|
+
*/
|
|
35
|
+
declare function updateUserName(userId: string, name: string): Promise<void>;
|
|
36
|
+
/**
|
|
37
|
+
* Updates the user's image.
|
|
38
|
+
*/
|
|
39
|
+
declare function updateUserAwatar(userId: string, image: string): Promise<void>;
|
|
40
|
+
/**
|
|
41
|
+
* Updates the user's email and marks it as verified.
|
|
42
|
+
*/
|
|
43
|
+
declare function updateUserEmailAndSetEmailAsVerified(userId: string, email: string): Promise<void>;
|
|
44
|
+
/**
|
|
45
|
+
* Sets the user as email verified if the provided email matches.
|
|
46
|
+
*/
|
|
47
|
+
declare function setUserAsEmailVerifiedIfEmailMatches(userId: string, email: string): Promise<boolean>;
|
|
48
|
+
/**
|
|
49
|
+
* Returns the user's password hash.
|
|
50
|
+
*/
|
|
51
|
+
declare function getUserPasswordHash(userId: string): Promise<string | null>;
|
|
52
|
+
/**
|
|
53
|
+
* Returns a user by email.
|
|
54
|
+
*/
|
|
55
|
+
declare function getUserFromEmail(email: string): Promise<User | null>;
|
|
56
|
+
//#endregion
|
|
57
|
+
export { createOAuthUser, createUser, getUserById, getUserFromEmail, getUserPasswordHash, getUserRecoverCode, resetUserRecoveryCode, setUserAsEmailVerifiedIfEmailMatches, updateUserAwatar, updateUserEmailAndSetEmailAsVerified, updateUserName, updateUserPassword, verifyUsernameInput };
|
|
58
|
+
//# sourceMappingURL=user.d.mts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"user.d.mts","names":[],"sources":["../../../src/server/auth/user.ts"],"mappings":";;;;;AAiBA;iBAAsB,mBAAA,CAAoB,QAAA,WAAmB,OAAA;;;;iBASvC,UAAA,CACpB,KAAA,UACA,QAAA,UACA,QAAA,WACC,OAAA,CAAQ,IAAA;;;;iBA+CW,eAAA,CACpB,KAAA,UACA,IAAA,UACA,KAAA,YACC,OAAA,CAAQ,IAAA;;;;iBAyCW,WAAA,CAAY,MAAA,WAAiB,OAAA,CAAQ,IAAA;;;AA7C3D;iBA2DsB,kBAAA,CAAmB,MAAA,WAAiB,OAAA;;;;iBAkBpC,qBAAA,CAAsB,MAAA,WAAiB,OAAA;;;;iBAuBvC,kBAAA,CACpB,MAAA,UACA,QAAA,WACC,OAAA;;AA1DH;;iBAwEsB,cAAA,CACpB,MAAA,UACA,IAAA,WACC,OAAA;;;;iBAWmB,gBAAA,CACpB,MAAA,UACA,KAAA,WACC,OAAA;;;AA3EH;iBAuFsB,oCAAA,CACpB,MAAA,UACA,KAAA,WACC,OAAA;;;;iBAamB,oCAAA,CACpB,MAAA,UACA,KAAA,WACC,OAAA;;;;iBAemB,mBAAA,CACpB,MAAA,WACC,OAAA;AAlFH;;;AAAA,iBAoGsB,gBAAA,CAAiB,KAAA,WAAgB,OAAA,CAAQ,IAAA"}
|
|
@@ -0,0 +1,2 @@
|
|
|
1
|
+
"use server";import{db as e}from"../database/inject.mjs";import{rolesTable as t,userTable as n,usersToRolesTable as r}from"../database/schema.mjs";import{hashPassword as i}from"./password.mjs";import{generateRandomRecoveryCode as a}from"../../core/auth/utils/encode.mjs";import{decryptToString as o,encryptString as s}from"../../core/auth/utils/encryption.mjs";import{sendRecoveryCode as c}from"../emails/index.mjs";import{and as l,eq as u}from"drizzle-orm";async function d(e){return e.length>3&&e.length<32&&e.trim()===e}async function f(o,l,d){let f=await i(d),p=a(),m=s(p);return await e.transaction(async e=>{let[i]=await e.insert(n).values({email:o,name:l,password:f,recovery_code:Buffer.from(m)}).returning();if(!i)throw Error(`Failed to create user`);let[a]=await e.select().from(t).where(u(t.name,`user`));return a||([a]=await e.insert(t).values({name:`user`,description:`Default user role`}).returning()),await e.insert(r).values({userId:i.id,roleId:a.id}),await c(i.email,p),i})}async function p(i,o,c){let l=s(a());return await e.transaction(async e=>{let[a]=await e.insert(n).values({email:i,name:o,image:c,emailVerifiedAt:new Date,recovery_code:Buffer.from(l)}).returning(),[s]=await e.select().from(t).where(u(t.name,`user`));return s||([s]=await e.insert(t).values({name:`user`,description:`Default user role`}).returning()),await e.insert(r).values({userId:a.id,roleId:s.id}),a})}async function m(t){let[r]=await e.select().from(n).where(u(n.id,t));if(!r)return null;let{password:i,recovery_code:a,...o}=r;return o}async function h(t){let[r]=await e.select({recovery_code:n.recovery_code}).from(n).where(u(n.id,t));if(!r||!r.recovery_code)throw Error(`Recovery code not found for user`);return o(r.recovery_code)}async function g(t){let r=a(),i=s(r),[o]=await e.update(n).set({recovery_code:Buffer.from(i)}).where(u(n.id,t)).returning();if(!o)throw Error(`User not found`);return await c(o.email,r),r}async function _(t,r){let a=await i(r);await e.update(n).set({password:a}).where(u(n.id,t))}async function v(t,r){await e.update(n).set({name:r}).where(u(n.id,t))}async function y(t,r){await e.update(n).set({image:r}).where(u(n.id,t))}async function b(t,r){await e.update(n).set({email:r,emailVerifiedAt:new Date}).where(u(n.id,t))}async function x(t,r){return(await e.update(n).set({emailVerifiedAt:new Date}).where(l(u(n.id,t),u(n.email,r))).returning({id:n.id})).length>0}async function S(t){let[r]=await e.select({password:n.password}).from(n).where(u(n.id,t));if(!r)throw Error(`User not found`);return r.password}async function C(t){let[r]=await e.select().from(n).where(u(n.email,t));if(!r)return null;let{password:i,recovery_code:a,...o}=r;return o}export{p as createOAuthUser,f as createUser,m as getUserById,C as getUserFromEmail,S as getUserPasswordHash,h as getUserRecoverCode,g as resetUserRecoveryCode,x as setUserAsEmailVerifiedIfEmailMatches,y as updateUserAwatar,b as updateUserEmailAndSetEmailAsVerified,v as updateUserName,_ as updateUserPassword,d as verifyUsernameInput};
|
|
2
|
+
//# sourceMappingURL=user.mjs.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"user.mjs","names":[],"sources":["../../../src/server/auth/user.ts"],"sourcesContent":["\"use server\";\n\nimport { and, eq } from \"drizzle-orm\";\nimport type { User } from \"../../core/auth/types\";\nimport { generateRandomRecoveryCode } from \"../../core/auth/utils/encode\";\nimport {\n decryptToString,\n encryptString,\n} from \"../../core/auth/utils/encryption\";\nimport { db } from \"../database/inject\";\nimport { rolesTable, usersToRolesTable, userTable } from \"../database/schema\";\nimport { sendRecoveryCode } from \"../emails/index\";\nimport { hashPassword } from \"./password\";\n\n/**\n * Validates the username input.\n */\nexport async function verifyUsernameInput(username: string): Promise<boolean> {\n return (\n username.length > 3 && username.length < 32 && username.trim() === username\n );\n}\n\n/**\n * Creates a new user with an initial recovery code and default 'user' role.\n */\nexport async function createUser(\n email: string,\n username: string,\n password: string,\n): Promise<User> {\n const passwordHash = await hashPassword(password);\n const recoveryCode = generateRandomRecoveryCode();\n const encryptedRecoveryCode = encryptString(recoveryCode);\n\n return await db.transaction(async (tx) => {\n const [row] = await tx\n .insert(userTable)\n .values({\n email: email,\n name: username,\n password: passwordHash,\n recovery_code: Buffer.from(encryptedRecoveryCode),\n })\n .returning();\n\n if (!row) {\n throw new Error(\"Failed to create user\");\n }\n\n // Assign default 'user' role\n let [role] = await tx\n .select()\n .from(rolesTable)\n .where(eq(rolesTable.name, \"user\"));\n\n if (!role) {\n [role] = await tx\n .insert(rolesTable)\n .values({ name: \"user\", description: \"Default user role\" })\n .returning();\n }\n\n await tx.insert(usersToRolesTable).values({\n userId: row.id,\n roleId: role.id,\n });\n\n await sendRecoveryCode(row.email, recoveryCode);\n\n return row;\n });\n}\n\n/**\n * Creates a new user from an OAuth provider.\n */\nexport async function createOAuthUser(\n email: string,\n name: string,\n image?: string,\n): Promise<User> {\n const recoveryCode = generateRandomRecoveryCode();\n const encryptedRecoveryCode = encryptString(recoveryCode);\n\n return await db.transaction(async (tx) => {\n const [row] = await tx\n .insert(userTable)\n .values({\n email: email,\n name: name,\n image: image,\n emailVerifiedAt: new Date(),\n recovery_code: Buffer.from(encryptedRecoveryCode),\n })\n .returning();\n\n // Assign default 'user' role\n let [role] = await tx\n .select()\n .from(rolesTable)\n .where(eq(rolesTable.name, \"user\"));\n\n if (!role) {\n [role] = await tx\n .insert(rolesTable)\n .values({ name: \"user\", description: \"Default user role\" })\n .returning();\n }\n\n await tx.insert(usersToRolesTable).values({\n userId: row.id,\n roleId: role.id,\n });\n\n return row;\n });\n}\n\n/**\n * Returns a user by ID.\n */\nexport async function getUserById(userId: string): Promise<User | null> {\n const [user] = await db\n .select()\n .from(userTable)\n .where(eq(userTable.id, userId));\n\n if (!user) return null;\n const { password, recovery_code, ...safeUser } = user;\n return safeUser as User;\n}\n\n/**\n * Decrypts and returns the user's recovery code.\n */\nexport async function getUserRecoverCode(userId: string): Promise<string> {\n const [user] = await db\n .select({\n recovery_code: userTable.recovery_code,\n })\n .from(userTable)\n .where(eq(userTable.id, userId));\n\n if (!user || !user.recovery_code) {\n throw new Error(\"Recovery code not found for user\");\n }\n\n return decryptToString(user.recovery_code);\n}\n\n/**\n * Generates and sets a new recovery code for the user.\n */\nexport async function resetUserRecoveryCode(userId: string): Promise<string> {\n const recoveryCode = generateRandomRecoveryCode();\n const encrypted = encryptString(recoveryCode);\n const [currentUser] = await db\n .update(userTable)\n .set({\n recovery_code: Buffer.from(encrypted),\n })\n .where(eq(userTable.id, userId))\n .returning();\n\n if (!currentUser) {\n throw new Error(\"User not found\");\n }\n\n await sendRecoveryCode(currentUser.email, recoveryCode);\n\n return recoveryCode;\n}\n\n/**\n * Updates the user's password.\n */\nexport async function updateUserPassword(\n userId: string,\n password: string,\n): Promise<void> {\n const passwordHash = await hashPassword(password);\n\n await db\n .update(userTable)\n .set({\n password: passwordHash,\n })\n .where(eq(userTable.id, userId));\n}\n\n/**\n * Updates the user's name.\n */\nexport async function updateUserName(\n userId: string,\n name: string,\n): Promise<void> {\n await db\n .update(userTable)\n .set({\n name: name,\n })\n .where(eq(userTable.id, userId));\n}\n/**\n * Updates the user's image.\n */\nexport async function updateUserAwatar(\n userId: string,\n image: string,\n): Promise<void> {\n await db\n .update(userTable)\n .set({\n image,\n })\n .where(eq(userTable.id, userId));\n}\n\n/**\n * Updates the user's email and marks it as verified.\n */\nexport async function updateUserEmailAndSetEmailAsVerified(\n userId: string,\n email: string,\n): Promise<void> {\n await db\n .update(userTable)\n .set({\n email: email,\n emailVerifiedAt: new Date(),\n })\n .where(eq(userTable.id, userId));\n}\n\n/**\n * Sets the user as email verified if the provided email matches.\n */\nexport async function setUserAsEmailVerifiedIfEmailMatches(\n userId: string,\n email: string,\n): Promise<boolean> {\n const result = await db\n .update(userTable)\n .set({\n emailVerifiedAt: new Date(),\n })\n .where(and(eq(userTable.id, userId), eq(userTable.email, email)))\n .returning({ id: userTable.id });\n\n return result.length > 0;\n}\n\n/**\n * Returns the user's password hash.\n */\nexport async function getUserPasswordHash(\n userId: string,\n): Promise<string | null> {\n const [user] = await db\n .select({\n password: userTable.password,\n })\n .from(userTable)\n .where(eq(userTable.id, userId));\n\n if (!user) {\n throw new Error(\"User not found\");\n }\n\n return user.password;\n}\n\n/**\n * Returns a user by email.\n */\nexport async function getUserFromEmail(email: string): Promise<User | null> {\n const [user] = await db\n .select()\n .from(userTable)\n .where(eq(userTable.email, email));\n\n if (!user) return null;\n const { password, recovery_code, ...safeUser } = user;\n return safeUser as User;\n}\n"],"mappings":"0cAiBA,eAAsB,EAAoB,EAAoC,CAC5E,OACE,EAAS,OAAS,GAAK,EAAS,OAAS,IAAM,EAAS,MAAM,GAAK,EAOvE,eAAsB,EACpB,EACA,EACA,EACe,CACf,IAAM,EAAe,MAAM,EAAa,EAAS,CAC3C,EAAe,GAA4B,CAC3C,EAAwB,EAAc,EAAa,CAEzD,OAAO,MAAM,EAAG,YAAY,KAAO,IAAO,CACxC,GAAM,CAAC,GAAO,MAAM,EACjB,OAAO,EAAU,CACjB,OAAO,CACC,QACP,KAAM,EACN,SAAU,EACV,cAAe,OAAO,KAAK,EAAsB,CAClD,CAAC,CACD,WAAW,CAEd,GAAI,CAAC,EACH,MAAU,MAAM,wBAAwB,CAI1C,GAAI,CAAC,GAAQ,MAAM,EAChB,QAAQ,CACR,KAAK,EAAW,CAChB,MAAM,EAAG,EAAW,KAAM,OAAO,CAAC,CAgBrC,OAdK,IACH,CAAC,GAAQ,MAAM,EACZ,OAAO,EAAW,CAClB,OAAO,CAAE,KAAM,OAAQ,YAAa,oBAAqB,CAAC,CAC1D,WAAW,EAGhB,MAAM,EAAG,OAAO,EAAkB,CAAC,OAAO,CACxC,OAAQ,EAAI,GACZ,OAAQ,EAAK,GACd,CAAC,CAEF,MAAM,EAAiB,EAAI,MAAO,EAAa,CAExC,GACP,CAMJ,eAAsB,EACpB,EACA,EACA,EACe,CAEf,IAAM,EAAwB,EADT,GAA4B,CACQ,CAEzD,OAAO,MAAM,EAAG,YAAY,KAAO,IAAO,CACxC,GAAM,CAAC,GAAO,MAAM,EACjB,OAAO,EAAU,CACjB,OAAO,CACC,QACD,OACC,QACP,gBAAiB,IAAI,KACrB,cAAe,OAAO,KAAK,EAAsB,CAClD,CAAC,CACD,WAAW,CAGV,CAAC,GAAQ,MAAM,EAChB,QAAQ,CACR,KAAK,EAAW,CAChB,MAAM,EAAG,EAAW,KAAM,OAAO,CAAC,CAcrC,OAZK,IACH,CAAC,GAAQ,MAAM,EACZ,OAAO,EAAW,CAClB,OAAO,CAAE,KAAM,OAAQ,YAAa,oBAAqB,CAAC,CAC1D,WAAW,EAGhB,MAAM,EAAG,OAAO,EAAkB,CAAC,OAAO,CACxC,OAAQ,EAAI,GACZ,OAAQ,EAAK,GACd,CAAC,CAEK,GACP,CAMJ,eAAsB,EAAY,EAAsC,CACtE,GAAM,CAAC,GAAQ,MAAM,EAClB,QAAQ,CACR,KAAK,EAAU,CACf,MAAM,EAAG,EAAU,GAAI,EAAO,CAAC,CAElC,GAAI,CAAC,EAAM,OAAO,KAClB,GAAM,CAAE,WAAU,gBAAe,GAAG,GAAa,EACjD,OAAO,EAMT,eAAsB,EAAmB,EAAiC,CACxE,GAAM,CAAC,GAAQ,MAAM,EAClB,OAAO,CACN,cAAe,EAAU,cAC1B,CAAC,CACD,KAAK,EAAU,CACf,MAAM,EAAG,EAAU,GAAI,EAAO,CAAC,CAElC,GAAI,CAAC,GAAQ,CAAC,EAAK,cACjB,MAAU,MAAM,mCAAmC,CAGrD,OAAO,EAAgB,EAAK,cAAc,CAM5C,eAAsB,EAAsB,EAAiC,CAC3E,IAAM,EAAe,GAA4B,CAC3C,EAAY,EAAc,EAAa,CACvC,CAAC,GAAe,MAAM,EACzB,OAAO,EAAU,CACjB,IAAI,CACH,cAAe,OAAO,KAAK,EAAU,CACtC,CAAC,CACD,MAAM,EAAG,EAAU,GAAI,EAAO,CAAC,CAC/B,WAAW,CAEd,GAAI,CAAC,EACH,MAAU,MAAM,iBAAiB,CAKnC,OAFA,MAAM,EAAiB,EAAY,MAAO,EAAa,CAEhD,EAMT,eAAsB,EACpB,EACA,EACe,CACf,IAAM,EAAe,MAAM,EAAa,EAAS,CAEjD,MAAM,EACH,OAAO,EAAU,CACjB,IAAI,CACH,SAAU,EACX,CAAC,CACD,MAAM,EAAG,EAAU,GAAI,EAAO,CAAC,CAMpC,eAAsB,EACpB,EACA,EACe,CACf,MAAM,EACH,OAAO,EAAU,CACjB,IAAI,CACG,OACP,CAAC,CACD,MAAM,EAAG,EAAU,GAAI,EAAO,CAAC,CAKpC,eAAsB,EACpB,EACA,EACe,CACf,MAAM,EACH,OAAO,EAAU,CACjB,IAAI,CACH,QACD,CAAC,CACD,MAAM,EAAG,EAAU,GAAI,EAAO,CAAC,CAMpC,eAAsB,EACpB,EACA,EACe,CACf,MAAM,EACH,OAAO,EAAU,CACjB,IAAI,CACI,QACP,gBAAiB,IAAI,KACtB,CAAC,CACD,MAAM,EAAG,EAAU,GAAI,EAAO,CAAC,CAMpC,eAAsB,EACpB,EACA,EACkB,CASlB,OARe,MAAM,EAClB,OAAO,EAAU,CACjB,IAAI,CACH,gBAAiB,IAAI,KACtB,CAAC,CACD,MAAM,EAAI,EAAG,EAAU,GAAI,EAAO,CAAE,EAAG,EAAU,MAAO,EAAM,CAAC,CAAC,CAChE,UAAU,CAAE,GAAI,EAAU,GAAI,CAAC,EAEpB,OAAS,EAMzB,eAAsB,EACpB,EACwB,CACxB,GAAM,CAAC,GAAQ,MAAM,EAClB,OAAO,CACN,SAAU,EAAU,SACrB,CAAC,CACD,KAAK,EAAU,CACf,MAAM,EAAG,EAAU,GAAI,EAAO,CAAC,CAElC,GAAI,CAAC,EACH,MAAU,MAAM,iBAAiB,CAGnC,OAAO,EAAK,SAMd,eAAsB,EAAiB,EAAqC,CAC1E,GAAM,CAAC,GAAQ,MAAM,EAClB,QAAQ,CACR,KAAK,EAAU,CACf,MAAM,EAAG,EAAU,MAAO,EAAM,CAAC,CAEpC,GAAI,CAAC,EAAM,OAAO,KAClB,GAAM,CAAE,WAAU,gBAAe,GAAG,GAAa,EACjD,OAAO"}
|