@arch-cadre/core 0.0.6
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/_virtual/_rolldown/runtime.cjs +29 -0
- package/dist/_virtual/_rolldown/runtime.mjs +18 -0
- package/dist/core/auth/augment.cjs +71 -0
- package/dist/core/auth/augment.d.cts +20 -0
- package/dist/core/auth/augment.d.cts.map +1 -0
- package/dist/core/auth/augment.d.mts +20 -0
- package/dist/core/auth/augment.d.mts.map +1 -0
- package/dist/core/auth/augment.mjs +66 -0
- package/dist/core/auth/augment.mjs.map +1 -0
- package/dist/core/auth/email-verification.cjs +99 -0
- package/dist/core/auth/email-verification.d.cts +62 -0
- package/dist/core/auth/email-verification.d.cts.map +1 -0
- package/dist/core/auth/email-verification.d.mts +62 -0
- package/dist/core/auth/email-verification.d.mts.map +1 -0
- package/dist/core/auth/email-verification.mjs +92 -0
- package/dist/core/auth/email-verification.mjs.map +1 -0
- package/dist/core/auth/logic.cjs +224 -0
- package/dist/core/auth/logic.d.cts +110 -0
- package/dist/core/auth/logic.d.cts.map +1 -0
- package/dist/core/auth/logic.d.mts +110 -0
- package/dist/core/auth/logic.d.mts.map +1 -0
- package/dist/core/auth/logic.mjs +213 -0
- package/dist/core/auth/logic.mjs.map +1 -0
- package/dist/core/auth/password-reset.cjs +118 -0
- package/dist/core/auth/password-reset.d.cts +39 -0
- package/dist/core/auth/password-reset.d.cts.map +1 -0
- package/dist/core/auth/password-reset.d.mts +39 -0
- package/dist/core/auth/password-reset.d.mts.map +1 -0
- package/dist/core/auth/password-reset.mjs +111 -0
- package/dist/core/auth/password-reset.mjs.map +1 -0
- package/dist/core/auth/rbac.cjs +118 -0
- package/dist/core/auth/rbac.d.cts +61 -0
- package/dist/core/auth/rbac.d.cts.map +1 -0
- package/dist/core/auth/rbac.d.mts +61 -0
- package/dist/core/auth/rbac.d.mts.map +1 -0
- package/dist/core/auth/rbac.mjs +104 -0
- package/dist/core/auth/rbac.mjs.map +1 -0
- package/dist/core/auth/session.cjs +161 -0
- package/dist/core/auth/session.d.cts +54 -0
- package/dist/core/auth/session.d.cts.map +1 -0
- package/dist/core/auth/session.d.mts +54 -0
- package/dist/core/auth/session.d.mts.map +1 -0
- package/dist/core/auth/session.mjs +150 -0
- package/dist/core/auth/session.mjs.map +1 -0
- package/dist/core/auth/types.d.cts +55 -0
- package/dist/core/auth/types.d.cts.map +1 -0
- package/dist/core/auth/types.d.mts +55 -0
- package/dist/core/auth/types.d.mts.map +1 -0
- package/dist/core/auth/utils/encode.cjs +27 -0
- package/dist/core/auth/utils/encode.d.cts +15 -0
- package/dist/core/auth/utils/encode.d.cts.map +1 -0
- package/dist/core/auth/utils/encode.d.mts +15 -0
- package/dist/core/auth/utils/encode.d.mts.map +1 -0
- package/dist/core/auth/utils/encode.mjs +26 -0
- package/dist/core/auth/utils/encode.mjs.map +1 -0
- package/dist/core/auth/utils/encryption.cjs +67 -0
- package/dist/core/auth/utils/encryption.d.cts +28 -0
- package/dist/core/auth/utils/encryption.d.cts.map +1 -0
- package/dist/core/auth/utils/encryption.d.mts +28 -0
- package/dist/core/auth/utils/encryption.d.mts.map +1 -0
- package/dist/core/auth/utils/encryption.mjs +64 -0
- package/dist/core/auth/utils/encryption.mjs.map +1 -0
- package/dist/core/auth/validation.cjs +39 -0
- package/dist/core/auth/validation.d.cts +48 -0
- package/dist/core/auth/validation.d.cts.map +1 -0
- package/dist/core/auth/validation.d.mts +48 -0
- package/dist/core/auth/validation.d.mts.map +1 -0
- package/dist/core/auth/validation.mjs +31 -0
- package/dist/core/auth/validation.mjs.map +1 -0
- package/dist/core/bootstrap.cjs +32 -0
- package/dist/core/bootstrap.d.cts +5 -0
- package/dist/core/bootstrap.d.cts.map +1 -0
- package/dist/core/bootstrap.d.mts +5 -0
- package/dist/core/bootstrap.d.mts.map +1 -0
- package/dist/core/bootstrap.mjs +33 -0
- package/dist/core/bootstrap.mjs.map +1 -0
- package/dist/core/config.cjs +6 -0
- package/dist/core/config.d.cts +11 -0
- package/dist/core/config.d.cts.map +1 -0
- package/dist/core/config.d.mts +11 -0
- package/dist/core/config.d.mts.map +1 -0
- package/dist/core/config.mjs +6 -0
- package/dist/core/config.mjs.map +1 -0
- package/dist/core/config.server.cjs +60 -0
- package/dist/core/config.server.d.cts +16 -0
- package/dist/core/config.server.d.cts.map +1 -0
- package/dist/core/config.server.d.mts +16 -0
- package/dist/core/config.server.d.mts.map +1 -0
- package/dist/core/config.server.mjs +57 -0
- package/dist/core/config.server.mjs.map +1 -0
- package/dist/core/event-bus.cjs +48 -0
- package/dist/core/event-bus.d.cts +17 -0
- package/dist/core/event-bus.d.cts.map +1 -0
- package/dist/core/event-bus.d.mts +17 -0
- package/dist/core/event-bus.d.mts.map +1 -0
- package/dist/core/event-bus.mjs +48 -0
- package/dist/core/event-bus.mjs.map +1 -0
- package/dist/core/filesystem/service.cjs +43 -0
- package/dist/core/filesystem/service.d.cts +19 -0
- package/dist/core/filesystem/service.d.cts.map +1 -0
- package/dist/core/filesystem/service.d.mts +19 -0
- package/dist/core/filesystem/service.d.mts.map +1 -0
- package/dist/core/filesystem/service.mjs +43 -0
- package/dist/core/filesystem/service.mjs.map +1 -0
- package/dist/core/filesystem/types.d.cts +22 -0
- package/dist/core/filesystem/types.d.cts.map +1 -0
- package/dist/core/filesystem/types.d.mts +22 -0
- package/dist/core/filesystem/types.d.mts.map +1 -0
- package/dist/core/notifications/actions.cjs +36 -0
- package/dist/core/notifications/actions.d.cts +58 -0
- package/dist/core/notifications/actions.d.cts.map +1 -0
- package/dist/core/notifications/actions.d.mts +58 -0
- package/dist/core/notifications/actions.d.mts.map +1 -0
- package/dist/core/notifications/actions.mjs +33 -0
- package/dist/core/notifications/actions.mjs.map +1 -0
- package/dist/core/notifications/index.cjs +2 -0
- package/dist/core/notifications/index.mjs +4 -0
- package/dist/core/notifications/service.cjs +30 -0
- package/dist/core/notifications/service.d.cts +9 -0
- package/dist/core/notifications/service.d.cts.map +1 -0
- package/dist/core/notifications/service.d.mts +9 -0
- package/dist/core/notifications/service.d.mts.map +1 -0
- package/dist/core/notifications/service.mjs +31 -0
- package/dist/core/notifications/service.mjs.map +1 -0
- package/dist/core/notifications/types.d.cts +21 -0
- package/dist/core/notifications/types.d.cts.map +1 -0
- package/dist/core/notifications/types.d.mts +21 -0
- package/dist/core/notifications/types.d.mts.map +1 -0
- package/dist/core/setup.cjs +25 -0
- package/dist/core/setup.d.cts +9 -0
- package/dist/core/setup.d.cts.map +1 -0
- package/dist/core/setup.d.mts +9 -0
- package/dist/core/setup.d.mts.map +1 -0
- package/dist/core/setup.mjs +25 -0
- package/dist/core/setup.mjs.map +1 -0
- package/dist/core/types.d.cts +13 -0
- package/dist/core/types.d.cts.map +1 -0
- package/dist/core/types.d.mts +13 -0
- package/dist/core/types.d.mts.map +1 -0
- package/dist/index.cjs +30 -0
- package/dist/index.d.cts +8 -0
- package/dist/index.d.mts +8 -0
- package/dist/index.mjs +6 -0
- package/dist/server/auth/email.cjs +24 -0
- package/dist/server/auth/email.d.cts +13 -0
- package/dist/server/auth/email.d.cts.map +1 -0
- package/dist/server/auth/email.d.mts +13 -0
- package/dist/server/auth/email.d.mts.map +1 -0
- package/dist/server/auth/email.mjs +23 -0
- package/dist/server/auth/email.mjs.map +1 -0
- package/dist/server/auth/password.cjs +37 -0
- package/dist/server/auth/password.d.cts +23 -0
- package/dist/server/auth/password.d.cts.map +1 -0
- package/dist/server/auth/password.d.mts +23 -0
- package/dist/server/auth/password.d.mts.map +1 -0
- package/dist/server/auth/password.mjs +34 -0
- package/dist/server/auth/password.mjs.map +1 -0
- package/dist/server/auth/user.cjs +165 -0
- package/dist/server/auth/user.d.cts +58 -0
- package/dist/server/auth/user.d.cts.map +1 -0
- package/dist/server/auth/user.d.mts +58 -0
- package/dist/server/auth/user.d.mts.map +1 -0
- package/dist/server/auth/user.mjs +153 -0
- package/dist/server/auth/user.mjs.map +1 -0
- package/dist/server/database/inject.cjs +24 -0
- package/dist/server/database/inject.d.cts +15 -0
- package/dist/server/database/inject.d.cts.map +1 -0
- package/dist/server/database/inject.d.mts +15 -0
- package/dist/server/database/inject.d.mts.map +1 -0
- package/dist/server/database/inject.mjs +23 -0
- package/dist/server/database/inject.mjs.map +1 -0
- package/dist/server/database/schema.cjs +163 -0
- package/dist/server/database/schema.d.cts +2962 -0
- package/dist/server/database/schema.d.cts.map +1 -0
- package/dist/server/database/schema.d.mts +2962 -0
- package/dist/server/database/schema.d.mts.map +1 -0
- package/dist/server/database/schema.mjs +151 -0
- package/dist/server/database/schema.mjs.map +1 -0
- package/dist/server/emails/index.cjs +32 -0
- package/dist/server/emails/index.d.cts +26 -0
- package/dist/server/emails/index.d.cts.map +1 -0
- package/dist/server/emails/index.d.mts +26 -0
- package/dist/server/emails/index.d.mts.map +1 -0
- package/dist/server/emails/index.mjs +29 -0
- package/dist/server/emails/index.mjs.map +1 -0
- package/dist/server.cjs +145 -0
- package/dist/server.d.cts +26 -0
- package/dist/server.d.mts +26 -0
- package/dist/server.mjs +23 -0
- package/package.json +60 -0
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"schema.d.mts","names":[],"sources":["../../../src/server/database/schema.ts"],"mappings":";;;;;;;cAGa,SAAA,uBAAS,kBAAA;;;;QAapB,oBAAA,CAAA,QAAA;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;cAEW,UAAA,uBAAU,kBAAA;;;;QAOrB,oBAAA,CAAA,QAAA;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;cAEW,gBAAA,uBAAgB,kBAAA;;;;QAO3B,oBAAA,CAAA,QAAA;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;cAEW,iBAAA,uBAAiB,kBAAA;;;;YAW7B,oBAAA,CAAA,QAAA;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;cAEY,uBAAA,uBAAuB,kBAAA;;;;YAWnC,oBAAA,CAAA,QAAA;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;cAEY,uBAAA,uBAAuB,kBAAA;;;;YAWnC,oBAAA,CAAA,QAAA;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;cAEY,YAAA,uBAAY,kBAAA;;;;QAevB,oBAAA,CAAA,QAAA;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;cAEW,sBAAA,uBAAsB,kBAAA;;;;QAgBjC,oBAAA,CAAA,QAAA;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;cAEW,yBAAA,uBAAyB,kBAAA;;;;QAiBpC,oBAAA,CAAA,QAAA;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;cAEW,iBAAA,uBAAiB,kBAAA;;;;QAoB5B,oBAAA,CAAA,QAAA;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;cAEW,kBAAA,uBAAkB,kBAAA;;;;QAS7B,oBAAA,CAAA,QAAA;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;cAEW,SAAA,eAAS,0BAAA;;cA8CrB,YAAA,CAAA,IAAA;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;cAEY,UAAA;;;;;UAYZ,oBAAA,CAAA,QAAA;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;KAEW,cAAA,UAAwB,SAAA"}
|
|
@@ -0,0 +1,151 @@
|
|
|
1
|
+
import { defineRelations, sql } from "drizzle-orm";
|
|
2
|
+
import { boolean, bytea, pgTable, text, timestamp } from "drizzle-orm/pg-core";
|
|
3
|
+
|
|
4
|
+
//#region src/server/database/schema.ts
|
|
5
|
+
const userTable = pgTable("users", {
|
|
6
|
+
id: text("id").$defaultFn(() => crypto.randomUUID()).notNull().primaryKey(),
|
|
7
|
+
email: text("email").notNull().unique(),
|
|
8
|
+
name: text("name").notNull(),
|
|
9
|
+
password: text("password"),
|
|
10
|
+
image: text("image"),
|
|
11
|
+
recovery_code: bytea("recovery_code").notNull(),
|
|
12
|
+
emailVerifiedAt: timestamp("email_verified_at", { precision: 3 }),
|
|
13
|
+
createdAt: timestamp("created_at", { precision: 3 }).notNull().defaultNow(),
|
|
14
|
+
updatedAt: timestamp("updated_at", { precision: 3 })
|
|
15
|
+
});
|
|
16
|
+
const rolesTable = pgTable("roles", {
|
|
17
|
+
id: text("id").$defaultFn(() => crypto.randomUUID()).notNull().primaryKey(),
|
|
18
|
+
name: text("name").notNull().unique(),
|
|
19
|
+
description: text("description")
|
|
20
|
+
});
|
|
21
|
+
const permissionsTable = pgTable("permissions", {
|
|
22
|
+
id: text("id").$defaultFn(() => crypto.randomUUID()).notNull().primaryKey(),
|
|
23
|
+
name: text("name").notNull().unique(),
|
|
24
|
+
description: text("description")
|
|
25
|
+
});
|
|
26
|
+
const usersToRolesTable = pgTable("users_to_roles", {
|
|
27
|
+
userId: text("user_id").notNull().references(() => userTable.id, { onDelete: "cascade" }),
|
|
28
|
+
roleId: text("role_id").notNull().references(() => rolesTable.id, { onDelete: "cascade" })
|
|
29
|
+
}, (t) => [{ pk: sql`PRIMARY KEY (${t.userId}, ${t.roleId})` }]);
|
|
30
|
+
const usersToPermissionsTable = pgTable("users_to_permissions", {
|
|
31
|
+
userId: text("user_id").notNull().references(() => userTable.id, { onDelete: "cascade" }),
|
|
32
|
+
permissionId: text("permission_id").notNull().references(() => permissionsTable.id, { onDelete: "cascade" })
|
|
33
|
+
}, (t) => [{ pk: sql`PRIMARY KEY (${t.userId}, ${t.permissionId})` }]);
|
|
34
|
+
const rolesToPermissionsTable = pgTable("roles_to_permissions", {
|
|
35
|
+
roleId: text("role_id").notNull().references(() => rolesTable.id, { onDelete: "cascade" }),
|
|
36
|
+
permissionId: text("permission_id").notNull().references(() => permissionsTable.id, { onDelete: "cascade" })
|
|
37
|
+
}, (t) => [{ pk: sql`PRIMARY KEY (${t.roleId}, ${t.permissionId})` }]);
|
|
38
|
+
const sessionTable = pgTable("sessions", {
|
|
39
|
+
id: text("id").$defaultFn(() => crypto.randomUUID()).notNull().primaryKey(),
|
|
40
|
+
active_organization_id: text("active_organization_id"),
|
|
41
|
+
userId: text("user_id").notNull().references(() => userTable.id, {
|
|
42
|
+
onDelete: "cascade",
|
|
43
|
+
onUpdate: "cascade"
|
|
44
|
+
}),
|
|
45
|
+
expiresAt: timestamp("expires_at", { precision: 3 }).notNull(),
|
|
46
|
+
createdAt: timestamp("created_at", { precision: 3 }).notNull().defaultNow(),
|
|
47
|
+
updatedAt: timestamp("updated_at", { precision: 3 })
|
|
48
|
+
});
|
|
49
|
+
const emailVerificationTable = pgTable("email_verification_requests", {
|
|
50
|
+
id: text("id").$defaultFn(() => crypto.randomUUID()).notNull().primaryKey(),
|
|
51
|
+
email: text("email").notNull(),
|
|
52
|
+
code: text("code").notNull(),
|
|
53
|
+
userId: text("user_id").notNull().references(() => userTable.id, {
|
|
54
|
+
onDelete: "cascade",
|
|
55
|
+
onUpdate: "cascade"
|
|
56
|
+
}),
|
|
57
|
+
expiresAt: timestamp("expires_at", { precision: 3 }).notNull(),
|
|
58
|
+
createdAt: timestamp("created_at", { precision: 3 }).notNull().defaultNow(),
|
|
59
|
+
updatedAt: timestamp("updated_at", { precision: 3 })
|
|
60
|
+
});
|
|
61
|
+
const passwordResetSessionTable = pgTable("password_reset_sessions", {
|
|
62
|
+
id: text("id").$defaultFn(() => crypto.randomUUID()).notNull().primaryKey(),
|
|
63
|
+
email: text("email").notNull(),
|
|
64
|
+
code: text("code").notNull(),
|
|
65
|
+
emailVerified: boolean("emailVerified").default(false),
|
|
66
|
+
userId: text("user_id").notNull().references(() => userTable.id, {
|
|
67
|
+
onDelete: "cascade",
|
|
68
|
+
onUpdate: "cascade"
|
|
69
|
+
}),
|
|
70
|
+
expiresAt: timestamp("expires_at", { precision: 3 }).notNull(),
|
|
71
|
+
createdAt: timestamp("created_at", { precision: 3 }).notNull().defaultNow(),
|
|
72
|
+
updatedAt: timestamp("updated_at", { precision: 3 })
|
|
73
|
+
});
|
|
74
|
+
const notificationTable = pgTable("notification", {
|
|
75
|
+
id: text("id").$defaultFn(() => crypto.randomUUID()).notNull().primaryKey(),
|
|
76
|
+
title: text("title").notNull(),
|
|
77
|
+
content: text("content"),
|
|
78
|
+
target: text("target"),
|
|
79
|
+
type: text("type"),
|
|
80
|
+
isRead: boolean("isRead").notNull(),
|
|
81
|
+
resourceId: text("resource_id"),
|
|
82
|
+
resourceType: text("resource_type"),
|
|
83
|
+
userId: text("user_id").notNull().references(() => userTable.id, {
|
|
84
|
+
onDelete: "cascade",
|
|
85
|
+
onUpdate: "cascade"
|
|
86
|
+
}),
|
|
87
|
+
createdAt: timestamp("created_at", { precision: 3 }).notNull().defaultNow(),
|
|
88
|
+
updatedAt: timestamp("updated_at", { precision: 3 })
|
|
89
|
+
});
|
|
90
|
+
const systemModulesTable = pgTable("system_modules", {
|
|
91
|
+
id: text("id").notNull().primaryKey(),
|
|
92
|
+
enabled: boolean("enabled").notNull().default(false),
|
|
93
|
+
installed: boolean("installed").notNull().default(false),
|
|
94
|
+
deleted: boolean("deleted").notNull().default(false),
|
|
95
|
+
system: boolean("system").notNull().default(false),
|
|
96
|
+
config: text("config"),
|
|
97
|
+
lastStep: text("last_step"),
|
|
98
|
+
updatedAt: timestamp("updated_at", { precision: 3 }).defaultNow()
|
|
99
|
+
});
|
|
100
|
+
const relations = defineRelations({
|
|
101
|
+
user: userTable,
|
|
102
|
+
emailVerification: emailVerificationTable,
|
|
103
|
+
passwordResetSession: passwordResetSessionTable,
|
|
104
|
+
session: sessionTable,
|
|
105
|
+
notification: notificationTable,
|
|
106
|
+
systemModulesTable
|
|
107
|
+
}, (r) => ({
|
|
108
|
+
user: {
|
|
109
|
+
sessions: r.many.session({
|
|
110
|
+
from: r.user.id,
|
|
111
|
+
to: r.session.userId
|
|
112
|
+
}),
|
|
113
|
+
emailVerification: r.many.emailVerification({
|
|
114
|
+
from: r.user.id,
|
|
115
|
+
to: r.emailVerification.userId
|
|
116
|
+
}),
|
|
117
|
+
passwordResetSession: r.many.passwordResetSession({
|
|
118
|
+
from: r.user.id,
|
|
119
|
+
to: r.passwordResetSession.userId
|
|
120
|
+
})
|
|
121
|
+
},
|
|
122
|
+
session: { user: r.one.user({
|
|
123
|
+
from: r.session.userId,
|
|
124
|
+
to: r.user.id
|
|
125
|
+
}) },
|
|
126
|
+
emailVerification: { user: r.one.user({
|
|
127
|
+
from: r.emailVerification.userId,
|
|
128
|
+
to: r.user.id
|
|
129
|
+
}) },
|
|
130
|
+
passwordResetSession: { user: r.one.user({
|
|
131
|
+
from: r.passwordResetSession.userId,
|
|
132
|
+
to: r.user.id
|
|
133
|
+
}) }
|
|
134
|
+
}));
|
|
135
|
+
const coreSchema = {
|
|
136
|
+
userTable,
|
|
137
|
+
rolesTable,
|
|
138
|
+
permissionsTable,
|
|
139
|
+
usersToRolesTable,
|
|
140
|
+
usersToPermissionsTable,
|
|
141
|
+
rolesToPermissionsTable,
|
|
142
|
+
sessionTable,
|
|
143
|
+
emailVerificationTable,
|
|
144
|
+
passwordResetSessionTable,
|
|
145
|
+
notificationTable,
|
|
146
|
+
systemModulesTable
|
|
147
|
+
};
|
|
148
|
+
|
|
149
|
+
//#endregion
|
|
150
|
+
export { coreSchema, emailVerificationTable, notificationTable, passwordResetSessionTable, permissionsTable, relations, rolesTable, rolesToPermissionsTable, sessionTable, systemModulesTable, userTable, usersToPermissionsTable, usersToRolesTable };
|
|
151
|
+
//# sourceMappingURL=schema.mjs.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"schema.mjs","names":[],"sources":["../../../src/server/database/schema.ts"],"sourcesContent":["import { defineRelations, sql } from \"drizzle-orm\";\nimport { boolean, bytea, pgTable, text, timestamp } from \"drizzle-orm/pg-core\";\n\nexport const userTable = pgTable(\"users\", {\n id: text(\"id\")\n .$defaultFn(() => crypto.randomUUID())\n .notNull()\n .primaryKey(),\n email: text(\"email\").notNull().unique(),\n name: text(\"name\").notNull(),\n password: text(\"password\"),\n image: text(\"image\"),\n recovery_code: bytea(\"recovery_code\").notNull(),\n emailVerifiedAt: timestamp(\"email_verified_at\", { precision: 3 }),\n createdAt: timestamp(\"created_at\", { precision: 3 }).notNull().defaultNow(),\n updatedAt: timestamp(\"updated_at\", { precision: 3 }),\n});\n\nexport const rolesTable = pgTable(\"roles\", {\n id: text(\"id\")\n .$defaultFn(() => crypto.randomUUID())\n .notNull()\n .primaryKey(),\n name: text(\"name\").notNull().unique(), // np. \"admin\", \"user\"\n description: text(\"description\"),\n});\n\nexport const permissionsTable = pgTable(\"permissions\", {\n id: text(\"id\")\n .$defaultFn(() => crypto.randomUUID())\n .notNull()\n .primaryKey(),\n name: text(\"name\").notNull().unique(), // np. \"blog:write\"\n description: text(\"description\"),\n});\n\nexport const usersToRolesTable = pgTable(\n \"users_to_roles\",\n {\n userId: text(\"user_id\")\n .notNull()\n .references(() => userTable.id, { onDelete: \"cascade\" }),\n roleId: text(\"role_id\")\n .notNull()\n .references(() => rolesTable.id, { onDelete: \"cascade\" }),\n },\n (t) => [{ pk: sql`PRIMARY KEY (${t.userId}, ${t.roleId})` }],\n);\n\nexport const usersToPermissionsTable = pgTable(\n \"users_to_permissions\",\n {\n userId: text(\"user_id\")\n .notNull()\n .references(() => userTable.id, { onDelete: \"cascade\" }),\n permissionId: text(\"permission_id\")\n .notNull()\n .references(() => permissionsTable.id, { onDelete: \"cascade\" }),\n },\n (t) => [{ pk: sql`PRIMARY KEY (${t.userId}, ${t.permissionId})` }],\n);\n\nexport const rolesToPermissionsTable = pgTable(\n \"roles_to_permissions\",\n {\n roleId: text(\"role_id\")\n .notNull()\n .references(() => rolesTable.id, { onDelete: \"cascade\" }),\n permissionId: text(\"permission_id\")\n .notNull()\n .references(() => permissionsTable.id, { onDelete: \"cascade\" }),\n },\n (t) => [{ pk: sql`PRIMARY KEY (${t.roleId}, ${t.permissionId})` }],\n);\n\nexport const sessionTable = pgTable(\"sessions\", {\n id: text(\"id\")\n .$defaultFn(() => crypto.randomUUID())\n .notNull()\n .primaryKey(),\n active_organization_id: text(\"active_organization_id\"),\n userId: text(\"user_id\")\n .notNull()\n .references(() => userTable.id, {\n onDelete: \"cascade\",\n onUpdate: \"cascade\",\n }),\n expiresAt: timestamp(\"expires_at\", { precision: 3 }).notNull(),\n createdAt: timestamp(\"created_at\", { precision: 3 }).notNull().defaultNow(),\n updatedAt: timestamp(\"updated_at\", { precision: 3 }),\n});\n\nexport const emailVerificationTable = pgTable(\"email_verification_requests\", {\n id: text(\"id\")\n .$defaultFn(() => crypto.randomUUID())\n .notNull()\n .primaryKey(),\n email: text(\"email\").notNull(),\n code: text(\"code\").notNull(),\n userId: text(\"user_id\")\n .notNull()\n .references(() => userTable.id, {\n onDelete: \"cascade\",\n onUpdate: \"cascade\",\n }),\n expiresAt: timestamp(\"expires_at\", { precision: 3 }).notNull(),\n createdAt: timestamp(\"created_at\", { precision: 3 }).notNull().defaultNow(),\n updatedAt: timestamp(\"updated_at\", { precision: 3 }),\n});\n\nexport const passwordResetSessionTable = pgTable(\"password_reset_sessions\", {\n id: text(\"id\")\n .$defaultFn(() => crypto.randomUUID())\n .notNull()\n .primaryKey(),\n email: text(\"email\").notNull(),\n code: text(\"code\").notNull(),\n emailVerified: boolean(\"emailVerified\").default(false),\n userId: text(\"user_id\")\n .notNull()\n .references(() => userTable.id, {\n onDelete: \"cascade\",\n onUpdate: \"cascade\",\n }),\n expiresAt: timestamp(\"expires_at\", { precision: 3 }).notNull(),\n createdAt: timestamp(\"created_at\", { precision: 3 }).notNull().defaultNow(),\n updatedAt: timestamp(\"updated_at\", { precision: 3 }),\n});\n\nexport const notificationTable = pgTable(\"notification\", {\n id: text(\"id\")\n .$defaultFn(() => crypto.randomUUID())\n .notNull()\n .primaryKey(),\n title: text(\"title\").notNull(),\n content: text(\"content\"),\n target: text(\"target\"),\n type: text(\"type\"),\n isRead: boolean(\"isRead\").notNull(),\n resourceId: text(\"resource_id\"),\n resourceType: text(\"resource_type\"),\n userId: text(\"user_id\")\n .notNull()\n .references(() => userTable.id, {\n onDelete: \"cascade\",\n onUpdate: \"cascade\",\n }),\n createdAt: timestamp(\"created_at\", { precision: 3 }).notNull().defaultNow(),\n updatedAt: timestamp(\"updated_at\", { precision: 3 }),\n});\n\nexport const systemModulesTable = pgTable(\"system_modules\", {\n id: text(\"id\").notNull().primaryKey(),\n enabled: boolean(\"enabled\").notNull().default(false),\n installed: boolean(\"installed\").notNull().default(false),\n deleted: boolean(\"deleted\").notNull().default(false),\n system: boolean(\"system\").notNull().default(false),\n config: text(\"config\"),\n lastStep: text(\"last_step\"), // Przechowuje aktualny etap (np. \"Syncing DB\")\n updatedAt: timestamp(\"updated_at\", { precision: 3 }).defaultNow(),\n});\n\nexport const relations = defineRelations(\n {\n user: userTable,\n emailVerification: emailVerificationTable,\n passwordResetSession: passwordResetSessionTable,\n session: sessionTable,\n notification: notificationTable,\n systemModulesTable: systemModulesTable,\n },\n (r) => ({\n user: {\n sessions: r.many.session({\n from: r.user.id,\n to: r.session.userId,\n }),\n emailVerification: r.many.emailVerification({\n from: r.user.id,\n to: r.emailVerification.userId,\n }),\n passwordResetSession: r.many.passwordResetSession({\n from: r.user.id,\n to: r.passwordResetSession.userId,\n }),\n },\n\n session: {\n user: r.one.user({\n from: r.session.userId,\n to: r.user.id,\n }),\n },\n\n emailVerification: {\n user: r.one.user({\n from: r.emailVerification.userId,\n to: r.user.id,\n }),\n },\n\n passwordResetSession: {\n user: r.one.user({\n from: r.passwordResetSession.userId,\n to: r.user.id,\n }),\n },\n }),\n);\n\nexport const coreSchema = {\n userTable,\n rolesTable,\n permissionsTable,\n usersToRolesTable,\n usersToPermissionsTable,\n rolesToPermissionsTable,\n sessionTable,\n emailVerificationTable,\n passwordResetSessionTable,\n notificationTable,\n systemModulesTable,\n};\n\nexport type DatabaseSchema = typeof relations;\n"],"mappings":";;;;AAGA,MAAa,YAAY,QAAQ,SAAS;CACxC,IAAI,KAAK,KAAK,CACX,iBAAiB,OAAO,YAAY,CAAC,CACrC,SAAS,CACT,YAAY;CACf,OAAO,KAAK,QAAQ,CAAC,SAAS,CAAC,QAAQ;CACvC,MAAM,KAAK,OAAO,CAAC,SAAS;CAC5B,UAAU,KAAK,WAAW;CAC1B,OAAO,KAAK,QAAQ;CACpB,eAAe,MAAM,gBAAgB,CAAC,SAAS;CAC/C,iBAAiB,UAAU,qBAAqB,EAAE,WAAW,GAAG,CAAC;CACjE,WAAW,UAAU,cAAc,EAAE,WAAW,GAAG,CAAC,CAAC,SAAS,CAAC,YAAY;CAC3E,WAAW,UAAU,cAAc,EAAE,WAAW,GAAG,CAAC;CACrD,CAAC;AAEF,MAAa,aAAa,QAAQ,SAAS;CACzC,IAAI,KAAK,KAAK,CACX,iBAAiB,OAAO,YAAY,CAAC,CACrC,SAAS,CACT,YAAY;CACf,MAAM,KAAK,OAAO,CAAC,SAAS,CAAC,QAAQ;CACrC,aAAa,KAAK,cAAc;CACjC,CAAC;AAEF,MAAa,mBAAmB,QAAQ,eAAe;CACrD,IAAI,KAAK,KAAK,CACX,iBAAiB,OAAO,YAAY,CAAC,CACrC,SAAS,CACT,YAAY;CACf,MAAM,KAAK,OAAO,CAAC,SAAS,CAAC,QAAQ;CACrC,aAAa,KAAK,cAAc;CACjC,CAAC;AAEF,MAAa,oBAAoB,QAC/B,kBACA;CACE,QAAQ,KAAK,UAAU,CACpB,SAAS,CACT,iBAAiB,UAAU,IAAI,EAAE,UAAU,WAAW,CAAC;CAC1D,QAAQ,KAAK,UAAU,CACpB,SAAS,CACT,iBAAiB,WAAW,IAAI,EAAE,UAAU,WAAW,CAAC;CAC5D,GACA,MAAM,CAAC,EAAE,IAAI,GAAG,gBAAgB,EAAE,OAAO,IAAI,EAAE,OAAO,IAAI,CAAC,CAC7D;AAED,MAAa,0BAA0B,QACrC,wBACA;CACE,QAAQ,KAAK,UAAU,CACpB,SAAS,CACT,iBAAiB,UAAU,IAAI,EAAE,UAAU,WAAW,CAAC;CAC1D,cAAc,KAAK,gBAAgB,CAChC,SAAS,CACT,iBAAiB,iBAAiB,IAAI,EAAE,UAAU,WAAW,CAAC;CAClE,GACA,MAAM,CAAC,EAAE,IAAI,GAAG,gBAAgB,EAAE,OAAO,IAAI,EAAE,aAAa,IAAI,CAAC,CACnE;AAED,MAAa,0BAA0B,QACrC,wBACA;CACE,QAAQ,KAAK,UAAU,CACpB,SAAS,CACT,iBAAiB,WAAW,IAAI,EAAE,UAAU,WAAW,CAAC;CAC3D,cAAc,KAAK,gBAAgB,CAChC,SAAS,CACT,iBAAiB,iBAAiB,IAAI,EAAE,UAAU,WAAW,CAAC;CAClE,GACA,MAAM,CAAC,EAAE,IAAI,GAAG,gBAAgB,EAAE,OAAO,IAAI,EAAE,aAAa,IAAI,CAAC,CACnE;AAED,MAAa,eAAe,QAAQ,YAAY;CAC9C,IAAI,KAAK,KAAK,CACX,iBAAiB,OAAO,YAAY,CAAC,CACrC,SAAS,CACT,YAAY;CACf,wBAAwB,KAAK,yBAAyB;CACtD,QAAQ,KAAK,UAAU,CACpB,SAAS,CACT,iBAAiB,UAAU,IAAI;EAC9B,UAAU;EACV,UAAU;EACX,CAAC;CACJ,WAAW,UAAU,cAAc,EAAE,WAAW,GAAG,CAAC,CAAC,SAAS;CAC9D,WAAW,UAAU,cAAc,EAAE,WAAW,GAAG,CAAC,CAAC,SAAS,CAAC,YAAY;CAC3E,WAAW,UAAU,cAAc,EAAE,WAAW,GAAG,CAAC;CACrD,CAAC;AAEF,MAAa,yBAAyB,QAAQ,+BAA+B;CAC3E,IAAI,KAAK,KAAK,CACX,iBAAiB,OAAO,YAAY,CAAC,CACrC,SAAS,CACT,YAAY;CACf,OAAO,KAAK,QAAQ,CAAC,SAAS;CAC9B,MAAM,KAAK,OAAO,CAAC,SAAS;CAC5B,QAAQ,KAAK,UAAU,CACpB,SAAS,CACT,iBAAiB,UAAU,IAAI;EAC9B,UAAU;EACV,UAAU;EACX,CAAC;CACJ,WAAW,UAAU,cAAc,EAAE,WAAW,GAAG,CAAC,CAAC,SAAS;CAC9D,WAAW,UAAU,cAAc,EAAE,WAAW,GAAG,CAAC,CAAC,SAAS,CAAC,YAAY;CAC3E,WAAW,UAAU,cAAc,EAAE,WAAW,GAAG,CAAC;CACrD,CAAC;AAEF,MAAa,4BAA4B,QAAQ,2BAA2B;CAC1E,IAAI,KAAK,KAAK,CACX,iBAAiB,OAAO,YAAY,CAAC,CACrC,SAAS,CACT,YAAY;CACf,OAAO,KAAK,QAAQ,CAAC,SAAS;CAC9B,MAAM,KAAK,OAAO,CAAC,SAAS;CAC5B,eAAe,QAAQ,gBAAgB,CAAC,QAAQ,MAAM;CACtD,QAAQ,KAAK,UAAU,CACpB,SAAS,CACT,iBAAiB,UAAU,IAAI;EAC9B,UAAU;EACV,UAAU;EACX,CAAC;CACJ,WAAW,UAAU,cAAc,EAAE,WAAW,GAAG,CAAC,CAAC,SAAS;CAC9D,WAAW,UAAU,cAAc,EAAE,WAAW,GAAG,CAAC,CAAC,SAAS,CAAC,YAAY;CAC3E,WAAW,UAAU,cAAc,EAAE,WAAW,GAAG,CAAC;CACrD,CAAC;AAEF,MAAa,oBAAoB,QAAQ,gBAAgB;CACvD,IAAI,KAAK,KAAK,CACX,iBAAiB,OAAO,YAAY,CAAC,CACrC,SAAS,CACT,YAAY;CACf,OAAO,KAAK,QAAQ,CAAC,SAAS;CAC9B,SAAS,KAAK,UAAU;CACxB,QAAQ,KAAK,SAAS;CACtB,MAAM,KAAK,OAAO;CAClB,QAAQ,QAAQ,SAAS,CAAC,SAAS;CACnC,YAAY,KAAK,cAAc;CAC/B,cAAc,KAAK,gBAAgB;CACnC,QAAQ,KAAK,UAAU,CACpB,SAAS,CACT,iBAAiB,UAAU,IAAI;EAC9B,UAAU;EACV,UAAU;EACX,CAAC;CACJ,WAAW,UAAU,cAAc,EAAE,WAAW,GAAG,CAAC,CAAC,SAAS,CAAC,YAAY;CAC3E,WAAW,UAAU,cAAc,EAAE,WAAW,GAAG,CAAC;CACrD,CAAC;AAEF,MAAa,qBAAqB,QAAQ,kBAAkB;CAC1D,IAAI,KAAK,KAAK,CAAC,SAAS,CAAC,YAAY;CACrC,SAAS,QAAQ,UAAU,CAAC,SAAS,CAAC,QAAQ,MAAM;CACpD,WAAW,QAAQ,YAAY,CAAC,SAAS,CAAC,QAAQ,MAAM;CACxD,SAAS,QAAQ,UAAU,CAAC,SAAS,CAAC,QAAQ,MAAM;CACpD,QAAQ,QAAQ,SAAS,CAAC,SAAS,CAAC,QAAQ,MAAM;CAClD,QAAQ,KAAK,SAAS;CACtB,UAAU,KAAK,YAAY;CAC3B,WAAW,UAAU,cAAc,EAAE,WAAW,GAAG,CAAC,CAAC,YAAY;CAClE,CAAC;AAEF,MAAa,YAAY,gBACvB;CACE,MAAM;CACN,mBAAmB;CACnB,sBAAsB;CACtB,SAAS;CACT,cAAc;CACM;CACrB,GACA,OAAO;CACN,MAAM;EACJ,UAAU,EAAE,KAAK,QAAQ;GACvB,MAAM,EAAE,KAAK;GACb,IAAI,EAAE,QAAQ;GACf,CAAC;EACF,mBAAmB,EAAE,KAAK,kBAAkB;GAC1C,MAAM,EAAE,KAAK;GACb,IAAI,EAAE,kBAAkB;GACzB,CAAC;EACF,sBAAsB,EAAE,KAAK,qBAAqB;GAChD,MAAM,EAAE,KAAK;GACb,IAAI,EAAE,qBAAqB;GAC5B,CAAC;EACH;CAED,SAAS,EACP,MAAM,EAAE,IAAI,KAAK;EACf,MAAM,EAAE,QAAQ;EAChB,IAAI,EAAE,KAAK;EACZ,CAAC,EACH;CAED,mBAAmB,EACjB,MAAM,EAAE,IAAI,KAAK;EACf,MAAM,EAAE,kBAAkB;EAC1B,IAAI,EAAE,KAAK;EACZ,CAAC,EACH;CAED,sBAAsB,EACpB,MAAM,EAAE,IAAI,KAAK;EACf,MAAM,EAAE,qBAAqB;EAC7B,IAAI,EAAE,KAAK;EACZ,CAAC,EACH;CACF,EACF;AAED,MAAa,aAAa;CACxB;CACA;CACA;CACA;CACA;CACA;CACA;CACA;CACA;CACA;CACA;CACD"}
|
|
@@ -0,0 +1,32 @@
|
|
|
1
|
+
"use server";
|
|
2
|
+
|
|
3
|
+
|
|
4
|
+
//#region src/server/emails/index.ts
|
|
5
|
+
/**
|
|
6
|
+
* Sends an email with a verification link.
|
|
7
|
+
* @param email Recipient's email address.
|
|
8
|
+
* @param code Verification code.
|
|
9
|
+
*/
|
|
10
|
+
async function sendVerifyEmail(email, code) {}
|
|
11
|
+
/**
|
|
12
|
+
* Sends an email with a password reset link.
|
|
13
|
+
* @param email Recipient's email address.
|
|
14
|
+
* @param code Password reset code.
|
|
15
|
+
*/
|
|
16
|
+
async function sendResetPassword(email, code) {}
|
|
17
|
+
/**
|
|
18
|
+
* Sends an email with a recovery code.
|
|
19
|
+
* @param email Recipient's email address.
|
|
20
|
+
* @param recoveryCode Recovery code
|
|
21
|
+
*/
|
|
22
|
+
async function sendRecoveryCode(email, recoveryCode) {}
|
|
23
|
+
/**
|
|
24
|
+
* Sends a 2FA code via email.
|
|
25
|
+
*/
|
|
26
|
+
async function send2FACode(email, code) {}
|
|
27
|
+
|
|
28
|
+
//#endregion
|
|
29
|
+
exports.send2FACode = send2FACode;
|
|
30
|
+
exports.sendRecoveryCode = sendRecoveryCode;
|
|
31
|
+
exports.sendResetPassword = sendResetPassword;
|
|
32
|
+
exports.sendVerifyEmail = sendVerifyEmail;
|
|
@@ -0,0 +1,26 @@
|
|
|
1
|
+
//#region src/server/emails/index.d.ts
|
|
2
|
+
/**
|
|
3
|
+
* Sends an email with a verification link.
|
|
4
|
+
* @param email Recipient's email address.
|
|
5
|
+
* @param code Verification code.
|
|
6
|
+
*/
|
|
7
|
+
declare function sendVerifyEmail(email: string, code: string): Promise<void>;
|
|
8
|
+
/**
|
|
9
|
+
* Sends an email with a password reset link.
|
|
10
|
+
* @param email Recipient's email address.
|
|
11
|
+
* @param code Password reset code.
|
|
12
|
+
*/
|
|
13
|
+
declare function sendResetPassword(email: string, code: string): Promise<void>;
|
|
14
|
+
/**
|
|
15
|
+
* Sends an email with a recovery code.
|
|
16
|
+
* @param email Recipient's email address.
|
|
17
|
+
* @param recoveryCode Recovery code
|
|
18
|
+
*/
|
|
19
|
+
declare function sendRecoveryCode(email: string, recoveryCode: string): Promise<void>;
|
|
20
|
+
/**
|
|
21
|
+
* Sends a 2FA code via email.
|
|
22
|
+
*/
|
|
23
|
+
declare function send2FACode(email: string, code: string): Promise<void>;
|
|
24
|
+
//#endregion
|
|
25
|
+
export { send2FACode, sendRecoveryCode, sendResetPassword, sendVerifyEmail };
|
|
26
|
+
//# sourceMappingURL=index.d.cts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"index.d.cts","names":[],"sources":["../../../src/server/emails/index.ts"],"mappings":";;AAkBA;;;;iBAAsB,eAAA,CAAgB,KAAA,UAAe,IAAA,WAAY,OAAA;;;;;AAejE;iBAAsB,iBAAA,CAAkB,KAAA,UAAe,IAAA,WAAY,OAAA;;;;;;iBAe7C,gBAAA,CAAiB,KAAA,UAAe,YAAA,WAAoB,OAAA;;AAA1E;;iBAasB,WAAA,CAAY,KAAA,UAAe,IAAA,WAAY,OAAA"}
|
|
@@ -0,0 +1,26 @@
|
|
|
1
|
+
//#region src/server/emails/index.d.ts
|
|
2
|
+
/**
|
|
3
|
+
* Sends an email with a verification link.
|
|
4
|
+
* @param email Recipient's email address.
|
|
5
|
+
* @param code Verification code.
|
|
6
|
+
*/
|
|
7
|
+
declare function sendVerifyEmail(email: string, code: string): Promise<void>;
|
|
8
|
+
/**
|
|
9
|
+
* Sends an email with a password reset link.
|
|
10
|
+
* @param email Recipient's email address.
|
|
11
|
+
* @param code Password reset code.
|
|
12
|
+
*/
|
|
13
|
+
declare function sendResetPassword(email: string, code: string): Promise<void>;
|
|
14
|
+
/**
|
|
15
|
+
* Sends an email with a recovery code.
|
|
16
|
+
* @param email Recipient's email address.
|
|
17
|
+
* @param recoveryCode Recovery code
|
|
18
|
+
*/
|
|
19
|
+
declare function sendRecoveryCode(email: string, recoveryCode: string): Promise<void>;
|
|
20
|
+
/**
|
|
21
|
+
* Sends a 2FA code via email.
|
|
22
|
+
*/
|
|
23
|
+
declare function send2FACode(email: string, code: string): Promise<void>;
|
|
24
|
+
//#endregion
|
|
25
|
+
export { send2FACode, sendRecoveryCode, sendResetPassword, sendVerifyEmail };
|
|
26
|
+
//# sourceMappingURL=index.d.mts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"index.d.mts","names":[],"sources":["../../../src/server/emails/index.ts"],"mappings":";;AAkBA;;;;iBAAsB,eAAA,CAAgB,KAAA,UAAe,IAAA,WAAY,OAAA;;;;;AAejE;iBAAsB,iBAAA,CAAkB,KAAA,UAAe,IAAA,WAAY,OAAA;;;;;;iBAe7C,gBAAA,CAAiB,KAAA,UAAe,YAAA,WAAoB,OAAA;;AAA1E;;iBAasB,WAAA,CAAY,KAAA,UAAe,IAAA,WAAY,OAAA"}
|
|
@@ -0,0 +1,29 @@
|
|
|
1
|
+
"use server";
|
|
2
|
+
|
|
3
|
+
//#region src/server/emails/index.ts
|
|
4
|
+
/**
|
|
5
|
+
* Sends an email with a verification link.
|
|
6
|
+
* @param email Recipient's email address.
|
|
7
|
+
* @param code Verification code.
|
|
8
|
+
*/
|
|
9
|
+
async function sendVerifyEmail(email, code) {}
|
|
10
|
+
/**
|
|
11
|
+
* Sends an email with a password reset link.
|
|
12
|
+
* @param email Recipient's email address.
|
|
13
|
+
* @param code Password reset code.
|
|
14
|
+
*/
|
|
15
|
+
async function sendResetPassword(email, code) {}
|
|
16
|
+
/**
|
|
17
|
+
* Sends an email with a recovery code.
|
|
18
|
+
* @param email Recipient's email address.
|
|
19
|
+
* @param recoveryCode Recovery code
|
|
20
|
+
*/
|
|
21
|
+
async function sendRecoveryCode(email, recoveryCode) {}
|
|
22
|
+
/**
|
|
23
|
+
* Sends a 2FA code via email.
|
|
24
|
+
*/
|
|
25
|
+
async function send2FACode(email, code) {}
|
|
26
|
+
|
|
27
|
+
//#endregion
|
|
28
|
+
export { send2FACode, sendRecoveryCode, sendResetPassword, sendVerifyEmail };
|
|
29
|
+
//# sourceMappingURL=index.mjs.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"index.mjs","names":[],"sources":["../../../src/server/emails/index.ts"],"sourcesContent":["\"use server\";\n\n// import nodemailer from \"nodemailer\";\n\n// Konfiguracja transportera SMTP\n// const transporter = nodemailer.createTransport({\n// service: \"gmail\",\n// auth: {\n// user: process.env.GOOGLE_SMTP_APP_USERNAME,\n// pass: process.env.GOOGLE_SMTP_APP_PASSWORD,\n// },\n// });\n\n/**\n * Sends an email with a verification link.\n * @param email Recipient's email address.\n * @param code Verification code.\n */\nexport async function sendVerifyEmail(email: string, code: string) {\n // const { t } = await getTranslation();\n // await transporter.sendMail({\n // from: `Winkly <${process.env.GOOGLE_SMTP_APP_USERNAME}>`,\n // to: email,\n // subject: t(\"Verify Email\"),\n // text: t(\"Verify your email address with your code: {{ code }}\", { code }),\n // });\n}\n\n/**\n * Sends an email with a password reset link.\n * @param email Recipient's email address.\n * @param code Password reset code.\n */\nexport async function sendResetPassword(email: string, code: string) {\n // const { t } = await getTranslation();\n // await transporter.sendMail({\n // from: `Winkly <${process.env.GOOGLE_SMTP_APP_USERNAME}>`,\n // to: email,\n // subject: t(\"Password Reset\"),\n // text: t(\"Verify password reset with code: {{ code }}\", { code }),\n // });\n}\n\n/**\n * Sends an email with a recovery code.\n * @param email Recipient's email address.\n * @param recoveryCode Recovery code\n */\nexport async function sendRecoveryCode(email: string, recoveryCode: string) {\n // const { t } = await getTranslation();\n // await transporter.sendMail({\n // from: `Winkly <${process.env.GOOGLE_SMTP_APP_USERNAME}>`,\n // to: email,\n // subject: t(\"Recovery Code\"),\n // text: t(\"Your recovery code is: {{ recoveryCode }}\", { recoveryCode }),\n // });\n}\n\n/**\n * Sends a 2FA code via email.\n */\nexport async function send2FACode(email: string, code: string) {\n // const { t } = await getTranslation();\n // await transporter.sendMail({\n // from: `Winkly <${process.env.GOOGLE_SMTP_APP_USERNAME}>`,\n // to: email,\n // subject: t(\"Your 2FA Code\"),\n // text: t(\n // \"Your verification code is: {{ code }}. It will expire in 10 minutes.\",\n // { code },\n // ),\n // });\n}\n"],"mappings":";;;;;;;;AAkBA,eAAsB,gBAAgB,OAAe,MAAc;;;;;;AAenE,eAAsB,kBAAkB,OAAe,MAAc;;;;;;AAerE,eAAsB,iBAAiB,OAAe,cAAsB;;;;AAa5E,eAAsB,YAAY,OAAe,MAAc"}
|
package/dist/server.cjs
ADDED
|
@@ -0,0 +1,145 @@
|
|
|
1
|
+
Object.defineProperty(exports, Symbol.toStringTag, { value: 'Module' });
|
|
2
|
+
const require_validation = require('./core/auth/validation.cjs');
|
|
3
|
+
const require_event_bus = require('./core/event-bus.cjs');
|
|
4
|
+
const require_inject = require('./server/database/inject.cjs');
|
|
5
|
+
const require_schema = require('./server/database/schema.cjs');
|
|
6
|
+
const require_index = require('./server/emails/index.cjs');
|
|
7
|
+
const require_password = require('./server/auth/password.cjs');
|
|
8
|
+
const require_encode = require('./core/auth/utils/encode.cjs');
|
|
9
|
+
const require_encryption = require('./core/auth/utils/encryption.cjs');
|
|
10
|
+
const require_user = require('./server/auth/user.cjs');
|
|
11
|
+
const require_augment = require('./core/auth/augment.cjs');
|
|
12
|
+
const require_logic = require('./core/auth/logic.cjs');
|
|
13
|
+
const require_email_verification = require('./core/auth/email-verification.cjs');
|
|
14
|
+
const require_setup = require('./core/setup.cjs');
|
|
15
|
+
const require_bootstrap = require('./core/bootstrap.cjs');
|
|
16
|
+
const require_session = require('./core/auth/session.cjs');
|
|
17
|
+
const require_actions = require('./core/notifications/actions.cjs');
|
|
18
|
+
const require_password_reset = require('./core/auth/password-reset.cjs');
|
|
19
|
+
const require_rbac = require('./core/auth/rbac.cjs');
|
|
20
|
+
const require_config_server = require('./core/config.server.cjs');
|
|
21
|
+
const require_service = require('./core/filesystem/service.cjs');
|
|
22
|
+
const require_email = require('./server/auth/email.cjs');
|
|
23
|
+
|
|
24
|
+
exports.assignPermissionToRole = require_rbac.assignPermissionToRole;
|
|
25
|
+
exports.assignPermissionToUser = require_rbac.assignPermissionToUser;
|
|
26
|
+
exports.assignRoleToUser = require_rbac.assignRoleToUser;
|
|
27
|
+
exports.augmentSession = require_augment.augmentSession;
|
|
28
|
+
exports.augmentUser = require_augment.augmentUser;
|
|
29
|
+
exports.checkEmailAvailability = require_email.checkEmailAvailability;
|
|
30
|
+
exports.checkSecurity = require_logic.checkSecurity;
|
|
31
|
+
exports.coreSchema = require_schema.coreSchema;
|
|
32
|
+
exports.createEmailVerificationRequest = require_email_verification.createEmailVerificationRequest;
|
|
33
|
+
exports.createNotification = require_actions.createNotification;
|
|
34
|
+
exports.createOAuthUser = require_user.createOAuthUser;
|
|
35
|
+
exports.createPasswordResetSession = require_password_reset.createPasswordResetSession;
|
|
36
|
+
exports.createPermission = require_rbac.createPermission;
|
|
37
|
+
exports.createRole = require_rbac.createRole;
|
|
38
|
+
exports.createSession = require_session.createSession;
|
|
39
|
+
exports.createUser = require_user.createUser;
|
|
40
|
+
exports.db = require_inject.db;
|
|
41
|
+
exports.decrypt = require_encryption.decrypt;
|
|
42
|
+
exports.decryptToString = require_encryption.decryptToString;
|
|
43
|
+
exports.deleteEmailVerificationRequestCookie = require_email_verification.deleteEmailVerificationRequestCookie;
|
|
44
|
+
exports.deletePasswordResetSessionTokenCookie = require_password_reset.deletePasswordResetSessionTokenCookie;
|
|
45
|
+
exports.deletePermission = require_rbac.deletePermission;
|
|
46
|
+
exports.deleteRole = require_rbac.deleteRole;
|
|
47
|
+
exports.deleteSessionTokenCookie = require_session.deleteSessionTokenCookie;
|
|
48
|
+
exports.deleteUserEmailVerificationRequest = require_email_verification.deleteUserEmailVerificationRequest;
|
|
49
|
+
exports.emailVerificationTable = require_schema.emailVerificationTable;
|
|
50
|
+
exports.encrypt = require_encryption.encrypt;
|
|
51
|
+
exports.encryptString = require_encryption.encryptString;
|
|
52
|
+
exports.ensureSystemInitialized = require_bootstrap.ensureSystemInitialized;
|
|
53
|
+
exports.eventBus = require_event_bus.eventBus;
|
|
54
|
+
exports.filesystemService = require_service.filesystemService;
|
|
55
|
+
exports.finalizeLogin = require_logic.finalizeLogin;
|
|
56
|
+
exports.forgotPasswordSchema = require_validation.forgotPasswordSchema;
|
|
57
|
+
exports.generateRandomOTP = require_encode.generateRandomOTP;
|
|
58
|
+
exports.generateRandomRecoveryCode = require_encode.generateRandomRecoveryCode;
|
|
59
|
+
exports.generateSessionToken = require_session.generateSessionToken;
|
|
60
|
+
exports.getCurrentPasswordResetSession = require_password_reset.getCurrentPasswordResetSession;
|
|
61
|
+
exports.getCurrentSession = require_session.getCurrentSession;
|
|
62
|
+
exports.getIPAddress = require_session.getIPAddress;
|
|
63
|
+
exports.getKryoConfig = require_config_server.getKryoConfig;
|
|
64
|
+
exports.getModulesDir = require_config_server.getModulesDir;
|
|
65
|
+
exports.getPermissions = require_rbac.getPermissions;
|
|
66
|
+
exports.getRoleById = require_rbac.getRoleById;
|
|
67
|
+
exports.getRolePermissions = require_rbac.getRolePermissions;
|
|
68
|
+
exports.getRoles = require_rbac.getRoles;
|
|
69
|
+
exports.getUserById = require_user.getUserById;
|
|
70
|
+
exports.getUserEmailVerificationRequest = require_email_verification.getUserEmailVerificationRequest;
|
|
71
|
+
exports.getUserEmailVerificationRequestFromRequest = require_email_verification.getUserEmailVerificationRequestFromRequest;
|
|
72
|
+
exports.getUserFromEmail = require_user.getUserFromEmail;
|
|
73
|
+
exports.getUserNotifications = require_actions.getUserNotifications;
|
|
74
|
+
exports.getUserPasswordHash = require_user.getUserPasswordHash;
|
|
75
|
+
exports.getUserRbacData = require_rbac.getUserRbacData;
|
|
76
|
+
exports.getUserRecoverCode = require_user.getUserRecoverCode;
|
|
77
|
+
exports.getUserSessions = require_session.getUserSessions;
|
|
78
|
+
exports.hashPassword = require_password.hashPassword;
|
|
79
|
+
exports.initEmailVerification = require_email_verification.initEmailVerification;
|
|
80
|
+
exports.injectDb = require_inject.injectDb;
|
|
81
|
+
exports.invalidateOtherSessions = require_session.invalidateOtherSessions;
|
|
82
|
+
exports.invalidateSession = require_session.invalidateSession;
|
|
83
|
+
exports.invalidateUserPasswordResetSessions = require_password_reset.invalidateUserPasswordResetSessions;
|
|
84
|
+
exports.invalidateUserSessions = require_session.invalidateUserSessions;
|
|
85
|
+
exports.isSystemInstalled = require_setup.isSystemInstalled;
|
|
86
|
+
exports.loginSchema = require_validation.loginSchema;
|
|
87
|
+
exports.markAllNotificationsAsRead = require_actions.markAllNotificationsAsRead;
|
|
88
|
+
exports.markNotificationAsRead = require_actions.markNotificationAsRead;
|
|
89
|
+
exports.notificationTable = require_schema.notificationTable;
|
|
90
|
+
exports.passkeysSetupSchema = require_validation.passkeysSetupSchema;
|
|
91
|
+
exports.passwordResetSessionTable = require_schema.passwordResetSessionTable;
|
|
92
|
+
exports.performFullUserAugmentation = require_logic.performFullUserAugmentation;
|
|
93
|
+
exports.permissionsTable = require_schema.permissionsTable;
|
|
94
|
+
exports.recoveryCodeVerifySchema = require_validation.recoveryCodeVerifySchema;
|
|
95
|
+
exports.registerAuthValidator = require_logic.registerAuthValidator;
|
|
96
|
+
exports.registerEmailVerificationValidator = require_logic.registerEmailVerificationValidator;
|
|
97
|
+
exports.registerIdentityAugmenter = require_augment.registerIdentityAugmenter;
|
|
98
|
+
exports.registerPasswordResetSessionAugmenter = require_augment.registerPasswordResetSessionAugmenter;
|
|
99
|
+
exports.registerPasswordResetValidator = require_logic.registerPasswordResetValidator;
|
|
100
|
+
exports.registerSchema = require_validation.registerSchema;
|
|
101
|
+
exports.registerSecurityRequirement = require_logic.registerSecurityRequirement;
|
|
102
|
+
exports.registerSessionAugmenter = require_augment.registerSessionAugmenter;
|
|
103
|
+
exports.relations = require_schema.relations;
|
|
104
|
+
exports.resetPasswordSchema = require_validation.resetPasswordSchema;
|
|
105
|
+
exports.resetUserRecoveryCode = require_user.resetUserRecoveryCode;
|
|
106
|
+
exports.revokePermissionFromRole = require_rbac.revokePermissionFromRole;
|
|
107
|
+
exports.revokePermissionFromUser = require_rbac.revokePermissionFromUser;
|
|
108
|
+
exports.revokeRoleFromUser = require_rbac.revokeRoleFromUser;
|
|
109
|
+
exports.rolesTable = require_schema.rolesTable;
|
|
110
|
+
exports.rolesToPermissionsTable = require_schema.rolesToPermissionsTable;
|
|
111
|
+
exports.runEmailVerificationValidators = require_logic.runEmailVerificationValidators;
|
|
112
|
+
exports.runPasswordResetValidators = require_logic.runPasswordResetValidators;
|
|
113
|
+
exports.send2FACode = require_index.send2FACode;
|
|
114
|
+
exports.sendPasswordResetEmail = require_password_reset.sendPasswordResetEmail;
|
|
115
|
+
exports.sendRecoveryCode = require_index.sendRecoveryCode;
|
|
116
|
+
exports.sendResetPassword = require_index.sendResetPassword;
|
|
117
|
+
exports.sendVerificationEmail = require_email_verification.sendVerificationEmail;
|
|
118
|
+
exports.sendVerifyEmail = require_index.sendVerifyEmail;
|
|
119
|
+
exports.sessionSignOut = require_session.sessionSignOut;
|
|
120
|
+
exports.sessionTable = require_schema.sessionTable;
|
|
121
|
+
exports.setEmailVerificationRequestCookie = require_email_verification.setEmailVerificationRequestCookie;
|
|
122
|
+
exports.setPasswordResetSessionAsEmailVerified = require_password_reset.setPasswordResetSessionAsEmailVerified;
|
|
123
|
+
exports.setPasswordResetSessionTokenCookie = require_password_reset.setPasswordResetSessionTokenCookie;
|
|
124
|
+
exports.setSessionTokenCookie = require_session.setSessionTokenCookie;
|
|
125
|
+
exports.setUserAsEmailVerifiedIfEmailMatches = require_user.setUserAsEmailVerifiedIfEmailMatches;
|
|
126
|
+
exports.signIn = require_logic.signIn;
|
|
127
|
+
exports.signOut = require_logic.signOut;
|
|
128
|
+
exports.signUp = require_logic.signUp;
|
|
129
|
+
exports.systemModulesTable = require_schema.systemModulesTable;
|
|
130
|
+
exports.totpSetupSchema = require_validation.totpSetupSchema;
|
|
131
|
+
exports.totpVerifySchema = require_validation.totpVerifySchema;
|
|
132
|
+
exports.updateUserAwatar = require_user.updateUserAwatar;
|
|
133
|
+
exports.updateUserEmailAndSetEmailAsVerified = require_user.updateUserEmailAndSetEmailAsVerified;
|
|
134
|
+
exports.updateUserName = require_user.updateUserName;
|
|
135
|
+
exports.updateUserPassword = require_user.updateUserPassword;
|
|
136
|
+
exports.userTable = require_schema.userTable;
|
|
137
|
+
exports.usersToPermissionsTable = require_schema.usersToPermissionsTable;
|
|
138
|
+
exports.usersToRolesTable = require_schema.usersToRolesTable;
|
|
139
|
+
exports.validatePasswordResetSessionToken = require_password_reset.validatePasswordResetSessionToken;
|
|
140
|
+
exports.validateSessionToken = require_session.validateSessionToken;
|
|
141
|
+
exports.verifyEmailInput = require_email.verifyEmailInput;
|
|
142
|
+
exports.verifyEmailSchema = require_validation.verifyEmailSchema;
|
|
143
|
+
exports.verifyPasswordHash = require_password.verifyPasswordHash;
|
|
144
|
+
exports.verifyPasswordStrength = require_password.verifyPasswordStrength;
|
|
145
|
+
exports.verifyUsernameInput = require_user.verifyUsernameInput;
|
|
@@ -0,0 +1,26 @@
|
|
|
1
|
+
import { DatabaseSchema, coreSchema, emailVerificationTable, notificationTable, passwordResetSessionTable, permissionsTable, relations, rolesTable, rolesToPermissionsTable, sessionTable, systemModulesTable, userTable, usersToPermissionsTable, usersToRolesTable } from "./server/database/schema.cjs";
|
|
2
|
+
import { EventHandler, SystemEvent, UserPermission, UserRole } from "./core/types.cjs";
|
|
3
|
+
import { AuthResponse, AuthSession, FullUser, PasswordResetAuthSession, PasswordResetSession, Session, SessionFlags, User, UserSession } from "./core/auth/types.cjs";
|
|
4
|
+
import { ForgotPasswordInput, LoginInput, PasskeysSetupInput, RecoveryVerifyInput, RegisterInput, ResetPasswordInput, TOTPSetupInput, TOTPVerifyInput, VerifyEmailInput, forgotPasswordSchema, loginSchema, passkeysSetupSchema, recoveryCodeVerifySchema, registerSchema, resetPasswordSchema, totpSetupSchema, totpVerifySchema, verifyEmailSchema } from "./core/auth/validation.cjs";
|
|
5
|
+
import { eventBus } from "./core/event-bus.cjs";
|
|
6
|
+
import { CreateNotificationPayload, Notification, NotificationEvents } from "./core/notifications/types.cjs";
|
|
7
|
+
import { createEmailVerificationRequest, deleteEmailVerificationRequestCookie, deleteUserEmailVerificationRequest, getUserEmailVerificationRequest, getUserEmailVerificationRequestFromRequest, initEmailVerification, sendVerificationEmail, setEmailVerificationRequestCookie } from "./core/auth/email-verification.cjs";
|
|
8
|
+
import { augmentSession, augmentUser, registerIdentityAugmenter, registerPasswordResetSessionAugmenter, registerSessionAugmenter } from "./core/auth/augment.cjs";
|
|
9
|
+
import { checkSecurity, finalizeLogin, performFullUserAugmentation, registerAuthValidator, registerEmailVerificationValidator, registerPasswordResetValidator, registerSecurityRequirement, runEmailVerificationValidators, runPasswordResetValidators, signIn, signOut, signUp } from "./core/auth/logic.cjs";
|
|
10
|
+
import { createPasswordResetSession, deletePasswordResetSessionTokenCookie, getCurrentPasswordResetSession, invalidateUserPasswordResetSessions, sendPasswordResetEmail, setPasswordResetSessionAsEmailVerified, setPasswordResetSessionTokenCookie, validatePasswordResetSessionToken } from "./core/auth/password-reset.cjs";
|
|
11
|
+
import { assignPermissionToRole, assignPermissionToUser, assignRoleToUser, createPermission, createRole, deletePermission, deleteRole, getPermissions, getRoleById, getRolePermissions, getRoles, getUserRbacData, revokePermissionFromRole, revokePermissionFromUser, revokeRoleFromUser } from "./core/auth/rbac.cjs";
|
|
12
|
+
import { createSession, deleteSessionTokenCookie, generateSessionToken, getCurrentSession, getIPAddress, getUserSessions, invalidateOtherSessions, invalidateSession, invalidateUserSessions, sessionSignOut, setSessionTokenCookie, validateSessionToken } from "./core/auth/session.cjs";
|
|
13
|
+
import { generateRandomOTP, generateRandomRecoveryCode } from "./core/auth/utils/encode.cjs";
|
|
14
|
+
import { decrypt, decryptToString, encrypt, encryptString } from "./core/auth/utils/encryption.cjs";
|
|
15
|
+
import { ensureSystemInitialized } from "./core/bootstrap.cjs";
|
|
16
|
+
import { getKryoConfig, getModulesDir } from "./core/config.server.cjs";
|
|
17
|
+
import { IStorageProvider, StorageData, StorageError, StorageResult } from "./core/filesystem/types.cjs";
|
|
18
|
+
import { filesystemService } from "./core/filesystem/service.cjs";
|
|
19
|
+
import { createNotification, getUserNotifications, markAllNotificationsAsRead, markNotificationAsRead } from "./core/notifications/actions.cjs";
|
|
20
|
+
import { isSystemInstalled } from "./core/setup.cjs";
|
|
21
|
+
import { checkEmailAvailability, verifyEmailInput } from "./server/auth/email.cjs";
|
|
22
|
+
import { hashPassword, verifyPasswordHash, verifyPasswordStrength } from "./server/auth/password.cjs";
|
|
23
|
+
import { createOAuthUser, createUser, getUserById, getUserFromEmail, getUserPasswordHash, getUserRecoverCode, resetUserRecoveryCode, setUserAsEmailVerifiedIfEmailMatches, updateUserAwatar, updateUserEmailAndSetEmailAsVerified, updateUserName, updateUserPassword, verifyUsernameInput } from "./server/auth/user.cjs";
|
|
24
|
+
import { KryoDatabase, db, injectDb } from "./server/database/inject.cjs";
|
|
25
|
+
import { send2FACode, sendRecoveryCode, sendResetPassword, sendVerifyEmail } from "./server/emails/index.cjs";
|
|
26
|
+
export { AuthResponse, AuthSession, CreateNotificationPayload, DatabaseSchema, EventHandler, ForgotPasswordInput, FullUser, IStorageProvider, KryoDatabase, LoginInput, Notification, NotificationEvents, PasskeysSetupInput, PasswordResetAuthSession, PasswordResetSession, RecoveryVerifyInput, RegisterInput, ResetPasswordInput, Session, SessionFlags, StorageData, StorageError, StorageResult, SystemEvent, TOTPSetupInput, TOTPVerifyInput, User, UserPermission, UserRole, UserSession, VerifyEmailInput, assignPermissionToRole, assignPermissionToUser, assignRoleToUser, augmentSession, augmentUser, checkEmailAvailability, checkSecurity, coreSchema, createEmailVerificationRequest, createNotification, createOAuthUser, createPasswordResetSession, createPermission, createRole, createSession, createUser, db, decrypt, decryptToString, deleteEmailVerificationRequestCookie, deletePasswordResetSessionTokenCookie, deletePermission, deleteRole, deleteSessionTokenCookie, deleteUserEmailVerificationRequest, emailVerificationTable, encrypt, encryptString, ensureSystemInitialized, eventBus, filesystemService, finalizeLogin, forgotPasswordSchema, generateRandomOTP, generateRandomRecoveryCode, generateSessionToken, getCurrentPasswordResetSession, getCurrentSession, getIPAddress, getKryoConfig, getModulesDir, getPermissions, getRoleById, getRolePermissions, getRoles, getUserById, getUserEmailVerificationRequest, getUserEmailVerificationRequestFromRequest, getUserFromEmail, getUserNotifications, getUserPasswordHash, getUserRbacData, getUserRecoverCode, getUserSessions, hashPassword, initEmailVerification, injectDb, invalidateOtherSessions, invalidateSession, invalidateUserPasswordResetSessions, invalidateUserSessions, isSystemInstalled, loginSchema, markAllNotificationsAsRead, markNotificationAsRead, notificationTable, passkeysSetupSchema, passwordResetSessionTable, performFullUserAugmentation, permissionsTable, recoveryCodeVerifySchema, registerAuthValidator, registerEmailVerificationValidator, registerIdentityAugmenter, registerPasswordResetSessionAugmenter, registerPasswordResetValidator, registerSchema, registerSecurityRequirement, registerSessionAugmenter, relations, resetPasswordSchema, resetUserRecoveryCode, revokePermissionFromRole, revokePermissionFromUser, revokeRoleFromUser, rolesTable, rolesToPermissionsTable, runEmailVerificationValidators, runPasswordResetValidators, send2FACode, sendPasswordResetEmail, sendRecoveryCode, sendResetPassword, sendVerificationEmail, sendVerifyEmail, sessionSignOut, sessionTable, setEmailVerificationRequestCookie, setPasswordResetSessionAsEmailVerified, setPasswordResetSessionTokenCookie, setSessionTokenCookie, setUserAsEmailVerifiedIfEmailMatches, signIn, signOut, signUp, systemModulesTable, totpSetupSchema, totpVerifySchema, updateUserAwatar, updateUserEmailAndSetEmailAsVerified, updateUserName, updateUserPassword, userTable, usersToPermissionsTable, usersToRolesTable, validatePasswordResetSessionToken, validateSessionToken, verifyEmailInput, verifyEmailSchema, verifyPasswordHash, verifyPasswordStrength, verifyUsernameInput };
|
|
@@ -0,0 +1,26 @@
|
|
|
1
|
+
import { DatabaseSchema, coreSchema, emailVerificationTable, notificationTable, passwordResetSessionTable, permissionsTable, relations, rolesTable, rolesToPermissionsTable, sessionTable, systemModulesTable, userTable, usersToPermissionsTable, usersToRolesTable } from "./server/database/schema.mjs";
|
|
2
|
+
import { EventHandler, SystemEvent, UserPermission, UserRole } from "./core/types.mjs";
|
|
3
|
+
import { AuthResponse, AuthSession, FullUser, PasswordResetAuthSession, PasswordResetSession, Session, SessionFlags, User, UserSession } from "./core/auth/types.mjs";
|
|
4
|
+
import { ForgotPasswordInput, LoginInput, PasskeysSetupInput, RecoveryVerifyInput, RegisterInput, ResetPasswordInput, TOTPSetupInput, TOTPVerifyInput, VerifyEmailInput, forgotPasswordSchema, loginSchema, passkeysSetupSchema, recoveryCodeVerifySchema, registerSchema, resetPasswordSchema, totpSetupSchema, totpVerifySchema, verifyEmailSchema } from "./core/auth/validation.mjs";
|
|
5
|
+
import { eventBus } from "./core/event-bus.mjs";
|
|
6
|
+
import { CreateNotificationPayload, Notification, NotificationEvents } from "./core/notifications/types.mjs";
|
|
7
|
+
import { createEmailVerificationRequest, deleteEmailVerificationRequestCookie, deleteUserEmailVerificationRequest, getUserEmailVerificationRequest, getUserEmailVerificationRequestFromRequest, initEmailVerification, sendVerificationEmail, setEmailVerificationRequestCookie } from "./core/auth/email-verification.mjs";
|
|
8
|
+
import { augmentSession, augmentUser, registerIdentityAugmenter, registerPasswordResetSessionAugmenter, registerSessionAugmenter } from "./core/auth/augment.mjs";
|
|
9
|
+
import { checkSecurity, finalizeLogin, performFullUserAugmentation, registerAuthValidator, registerEmailVerificationValidator, registerPasswordResetValidator, registerSecurityRequirement, runEmailVerificationValidators, runPasswordResetValidators, signIn, signOut, signUp } from "./core/auth/logic.mjs";
|
|
10
|
+
import { createPasswordResetSession, deletePasswordResetSessionTokenCookie, getCurrentPasswordResetSession, invalidateUserPasswordResetSessions, sendPasswordResetEmail, setPasswordResetSessionAsEmailVerified, setPasswordResetSessionTokenCookie, validatePasswordResetSessionToken } from "./core/auth/password-reset.mjs";
|
|
11
|
+
import { assignPermissionToRole, assignPermissionToUser, assignRoleToUser, createPermission, createRole, deletePermission, deleteRole, getPermissions, getRoleById, getRolePermissions, getRoles, getUserRbacData, revokePermissionFromRole, revokePermissionFromUser, revokeRoleFromUser } from "./core/auth/rbac.mjs";
|
|
12
|
+
import { createSession, deleteSessionTokenCookie, generateSessionToken, getCurrentSession, getIPAddress, getUserSessions, invalidateOtherSessions, invalidateSession, invalidateUserSessions, sessionSignOut, setSessionTokenCookie, validateSessionToken } from "./core/auth/session.mjs";
|
|
13
|
+
import { generateRandomOTP, generateRandomRecoveryCode } from "./core/auth/utils/encode.mjs";
|
|
14
|
+
import { decrypt, decryptToString, encrypt, encryptString } from "./core/auth/utils/encryption.mjs";
|
|
15
|
+
import { ensureSystemInitialized } from "./core/bootstrap.mjs";
|
|
16
|
+
import { getKryoConfig, getModulesDir } from "./core/config.server.mjs";
|
|
17
|
+
import { IStorageProvider, StorageData, StorageError, StorageResult } from "./core/filesystem/types.mjs";
|
|
18
|
+
import { filesystemService } from "./core/filesystem/service.mjs";
|
|
19
|
+
import { createNotification, getUserNotifications, markAllNotificationsAsRead, markNotificationAsRead } from "./core/notifications/actions.mjs";
|
|
20
|
+
import { isSystemInstalled } from "./core/setup.mjs";
|
|
21
|
+
import { checkEmailAvailability, verifyEmailInput } from "./server/auth/email.mjs";
|
|
22
|
+
import { hashPassword, verifyPasswordHash, verifyPasswordStrength } from "./server/auth/password.mjs";
|
|
23
|
+
import { createOAuthUser, createUser, getUserById, getUserFromEmail, getUserPasswordHash, getUserRecoverCode, resetUserRecoveryCode, setUserAsEmailVerifiedIfEmailMatches, updateUserAwatar, updateUserEmailAndSetEmailAsVerified, updateUserName, updateUserPassword, verifyUsernameInput } from "./server/auth/user.mjs";
|
|
24
|
+
import { KryoDatabase, db, injectDb } from "./server/database/inject.mjs";
|
|
25
|
+
import { send2FACode, sendRecoveryCode, sendResetPassword, sendVerifyEmail } from "./server/emails/index.mjs";
|
|
26
|
+
export { AuthResponse, AuthSession, CreateNotificationPayload, DatabaseSchema, EventHandler, ForgotPasswordInput, FullUser, IStorageProvider, KryoDatabase, LoginInput, Notification, NotificationEvents, PasskeysSetupInput, PasswordResetAuthSession, PasswordResetSession, RecoveryVerifyInput, RegisterInput, ResetPasswordInput, Session, SessionFlags, StorageData, StorageError, StorageResult, SystemEvent, TOTPSetupInput, TOTPVerifyInput, User, UserPermission, UserRole, UserSession, VerifyEmailInput, assignPermissionToRole, assignPermissionToUser, assignRoleToUser, augmentSession, augmentUser, checkEmailAvailability, checkSecurity, coreSchema, createEmailVerificationRequest, createNotification, createOAuthUser, createPasswordResetSession, createPermission, createRole, createSession, createUser, db, decrypt, decryptToString, deleteEmailVerificationRequestCookie, deletePasswordResetSessionTokenCookie, deletePermission, deleteRole, deleteSessionTokenCookie, deleteUserEmailVerificationRequest, emailVerificationTable, encrypt, encryptString, ensureSystemInitialized, eventBus, filesystemService, finalizeLogin, forgotPasswordSchema, generateRandomOTP, generateRandomRecoveryCode, generateSessionToken, getCurrentPasswordResetSession, getCurrentSession, getIPAddress, getKryoConfig, getModulesDir, getPermissions, getRoleById, getRolePermissions, getRoles, getUserById, getUserEmailVerificationRequest, getUserEmailVerificationRequestFromRequest, getUserFromEmail, getUserNotifications, getUserPasswordHash, getUserRbacData, getUserRecoverCode, getUserSessions, hashPassword, initEmailVerification, injectDb, invalidateOtherSessions, invalidateSession, invalidateUserPasswordResetSessions, invalidateUserSessions, isSystemInstalled, loginSchema, markAllNotificationsAsRead, markNotificationAsRead, notificationTable, passkeysSetupSchema, passwordResetSessionTable, performFullUserAugmentation, permissionsTable, recoveryCodeVerifySchema, registerAuthValidator, registerEmailVerificationValidator, registerIdentityAugmenter, registerPasswordResetSessionAugmenter, registerPasswordResetValidator, registerSchema, registerSecurityRequirement, registerSessionAugmenter, relations, resetPasswordSchema, resetUserRecoveryCode, revokePermissionFromRole, revokePermissionFromUser, revokeRoleFromUser, rolesTable, rolesToPermissionsTable, runEmailVerificationValidators, runPasswordResetValidators, send2FACode, sendPasswordResetEmail, sendRecoveryCode, sendResetPassword, sendVerificationEmail, sendVerifyEmail, sessionSignOut, sessionTable, setEmailVerificationRequestCookie, setPasswordResetSessionAsEmailVerified, setPasswordResetSessionTokenCookie, setSessionTokenCookie, setUserAsEmailVerifiedIfEmailMatches, signIn, signOut, signUp, systemModulesTable, totpSetupSchema, totpVerifySchema, updateUserAwatar, updateUserEmailAndSetEmailAsVerified, updateUserName, updateUserPassword, userTable, usersToPermissionsTable, usersToRolesTable, validatePasswordResetSessionToken, validateSessionToken, verifyEmailInput, verifyEmailSchema, verifyPasswordHash, verifyPasswordStrength, verifyUsernameInput };
|
package/dist/server.mjs
ADDED
|
@@ -0,0 +1,23 @@
|
|
|
1
|
+
import { forgotPasswordSchema, loginSchema, passkeysSetupSchema, recoveryCodeVerifySchema, registerSchema, resetPasswordSchema, totpSetupSchema, totpVerifySchema, verifyEmailSchema } from "./core/auth/validation.mjs";
|
|
2
|
+
import { eventBus } from "./core/event-bus.mjs";
|
|
3
|
+
import { db, injectDb } from "./server/database/inject.mjs";
|
|
4
|
+
import { coreSchema, emailVerificationTable, notificationTable, passwordResetSessionTable, permissionsTable, relations, rolesTable, rolesToPermissionsTable, sessionTable, systemModulesTable, userTable, usersToPermissionsTable, usersToRolesTable } from "./server/database/schema.mjs";
|
|
5
|
+
import { send2FACode, sendRecoveryCode, sendResetPassword, sendVerifyEmail } from "./server/emails/index.mjs";
|
|
6
|
+
import { hashPassword, verifyPasswordHash, verifyPasswordStrength } from "./server/auth/password.mjs";
|
|
7
|
+
import { generateRandomOTP, generateRandomRecoveryCode } from "./core/auth/utils/encode.mjs";
|
|
8
|
+
import { decrypt, decryptToString, encrypt, encryptString } from "./core/auth/utils/encryption.mjs";
|
|
9
|
+
import { createOAuthUser, createUser, getUserById, getUserFromEmail, getUserPasswordHash, getUserRecoverCode, resetUserRecoveryCode, setUserAsEmailVerifiedIfEmailMatches, updateUserAwatar, updateUserEmailAndSetEmailAsVerified, updateUserName, updateUserPassword, verifyUsernameInput } from "./server/auth/user.mjs";
|
|
10
|
+
import { augmentSession, augmentUser, registerIdentityAugmenter, registerPasswordResetSessionAugmenter, registerSessionAugmenter } from "./core/auth/augment.mjs";
|
|
11
|
+
import { checkSecurity, finalizeLogin, performFullUserAugmentation, registerAuthValidator, registerEmailVerificationValidator, registerPasswordResetValidator, registerSecurityRequirement, runEmailVerificationValidators, runPasswordResetValidators, signIn, signOut, signUp } from "./core/auth/logic.mjs";
|
|
12
|
+
import { createEmailVerificationRequest, deleteEmailVerificationRequestCookie, deleteUserEmailVerificationRequest, getUserEmailVerificationRequest, getUserEmailVerificationRequestFromRequest, initEmailVerification, sendVerificationEmail, setEmailVerificationRequestCookie } from "./core/auth/email-verification.mjs";
|
|
13
|
+
import { isSystemInstalled } from "./core/setup.mjs";
|
|
14
|
+
import { ensureSystemInitialized } from "./core/bootstrap.mjs";
|
|
15
|
+
import { createSession, deleteSessionTokenCookie, generateSessionToken, getCurrentSession, getIPAddress, getUserSessions, invalidateOtherSessions, invalidateSession, invalidateUserSessions, sessionSignOut, setSessionTokenCookie, validateSessionToken } from "./core/auth/session.mjs";
|
|
16
|
+
import { createNotification, getUserNotifications, markAllNotificationsAsRead, markNotificationAsRead } from "./core/notifications/actions.mjs";
|
|
17
|
+
import { createPasswordResetSession, deletePasswordResetSessionTokenCookie, getCurrentPasswordResetSession, invalidateUserPasswordResetSessions, sendPasswordResetEmail, setPasswordResetSessionAsEmailVerified, setPasswordResetSessionTokenCookie, validatePasswordResetSessionToken } from "./core/auth/password-reset.mjs";
|
|
18
|
+
import { assignPermissionToRole, assignPermissionToUser, assignRoleToUser, createPermission, createRole, deletePermission, deleteRole, getPermissions, getRoleById, getRolePermissions, getRoles, getUserRbacData, revokePermissionFromRole, revokePermissionFromUser, revokeRoleFromUser } from "./core/auth/rbac.mjs";
|
|
19
|
+
import { getKryoConfig, getModulesDir } from "./core/config.server.mjs";
|
|
20
|
+
import { filesystemService } from "./core/filesystem/service.mjs";
|
|
21
|
+
import { checkEmailAvailability, verifyEmailInput } from "./server/auth/email.mjs";
|
|
22
|
+
|
|
23
|
+
export { assignPermissionToRole, assignPermissionToUser, assignRoleToUser, augmentSession, augmentUser, checkEmailAvailability, checkSecurity, coreSchema, createEmailVerificationRequest, createNotification, createOAuthUser, createPasswordResetSession, createPermission, createRole, createSession, createUser, db, decrypt, decryptToString, deleteEmailVerificationRequestCookie, deletePasswordResetSessionTokenCookie, deletePermission, deleteRole, deleteSessionTokenCookie, deleteUserEmailVerificationRequest, emailVerificationTable, encrypt, encryptString, ensureSystemInitialized, eventBus, filesystemService, finalizeLogin, forgotPasswordSchema, generateRandomOTP, generateRandomRecoveryCode, generateSessionToken, getCurrentPasswordResetSession, getCurrentSession, getIPAddress, getKryoConfig, getModulesDir, getPermissions, getRoleById, getRolePermissions, getRoles, getUserById, getUserEmailVerificationRequest, getUserEmailVerificationRequestFromRequest, getUserFromEmail, getUserNotifications, getUserPasswordHash, getUserRbacData, getUserRecoverCode, getUserSessions, hashPassword, initEmailVerification, injectDb, invalidateOtherSessions, invalidateSession, invalidateUserPasswordResetSessions, invalidateUserSessions, isSystemInstalled, loginSchema, markAllNotificationsAsRead, markNotificationAsRead, notificationTable, passkeysSetupSchema, passwordResetSessionTable, performFullUserAugmentation, permissionsTable, recoveryCodeVerifySchema, registerAuthValidator, registerEmailVerificationValidator, registerIdentityAugmenter, registerPasswordResetSessionAugmenter, registerPasswordResetValidator, registerSchema, registerSecurityRequirement, registerSessionAugmenter, relations, resetPasswordSchema, resetUserRecoveryCode, revokePermissionFromRole, revokePermissionFromUser, revokeRoleFromUser, rolesTable, rolesToPermissionsTable, runEmailVerificationValidators, runPasswordResetValidators, send2FACode, sendPasswordResetEmail, sendRecoveryCode, sendResetPassword, sendVerificationEmail, sendVerifyEmail, sessionSignOut, sessionTable, setEmailVerificationRequestCookie, setPasswordResetSessionAsEmailVerified, setPasswordResetSessionTokenCookie, setSessionTokenCookie, setUserAsEmailVerifiedIfEmailMatches, signIn, signOut, signUp, systemModulesTable, totpSetupSchema, totpVerifySchema, updateUserAwatar, updateUserEmailAndSetEmailAsVerified, updateUserName, updateUserPassword, userTable, usersToPermissionsTable, usersToRolesTable, validatePasswordResetSessionToken, validateSessionToken, verifyEmailInput, verifyEmailSchema, verifyPasswordHash, verifyPasswordStrength, verifyUsernameInput };
|