@arikajs/authorization 0.0.4 → 0.0.5
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +173 -78
- package/dist/AuthResponse.d.ts +23 -0
- package/dist/AuthResponse.d.ts.map +1 -0
- package/dist/AuthResponse.js +40 -0
- package/dist/AuthResponse.js.map +1 -0
- package/dist/AuthorizationContext.d.ts +31 -0
- package/dist/AuthorizationContext.d.ts.map +1 -0
- package/dist/AuthorizationContext.js +87 -0
- package/dist/AuthorizationContext.js.map +1 -0
- package/dist/AuthorizationManager.d.ts +15 -7
- package/dist/AuthorizationManager.d.ts.map +1 -1
- package/dist/AuthorizationManager.js +46 -12
- package/dist/AuthorizationManager.js.map +1 -1
- package/dist/Exceptions/AuthorizationException.d.ts +2 -1
- package/dist/Exceptions/AuthorizationException.d.ts.map +1 -1
- package/dist/Exceptions/AuthorizationException.js +2 -1
- package/dist/Exceptions/AuthorizationException.js.map +1 -1
- package/dist/Gate.d.ts +39 -3
- package/dist/Gate.d.ts.map +1 -1
- package/dist/Gate.js +121 -14
- package/dist/Gate.js.map +1 -1
- package/dist/Middleware/Authorize.d.ts +5 -4
- package/dist/Middleware/Authorize.d.ts.map +1 -1
- package/dist/Middleware/Authorize.js +24 -6
- package/dist/Middleware/Authorize.js.map +1 -1
- package/dist/PolicyResolver.d.ts +7 -2
- package/dist/PolicyResolver.d.ts.map +1 -1
- package/dist/PolicyResolver.js +26 -4
- package/dist/PolicyResolver.js.map +1 -1
- package/dist/RolePermission.d.ts +36 -0
- package/dist/RolePermission.d.ts.map +1 -0
- package/dist/RolePermission.js +59 -0
- package/dist/RolePermission.js.map +1 -0
- package/dist/index.d.ts +3 -0
- package/dist/index.d.ts.map +1 -1
- package/dist/index.js +3 -0
- package/dist/index.js.map +1 -1
- package/dist/src/AuthResponse.d.ts +23 -0
- package/dist/src/AuthResponse.d.ts.map +1 -0
- package/dist/src/AuthResponse.js +40 -0
- package/dist/src/AuthResponse.js.map +1 -0
- package/dist/src/AuthorizationContext.d.ts +31 -0
- package/dist/src/AuthorizationContext.d.ts.map +1 -0
- package/dist/src/AuthorizationContext.js +87 -0
- package/dist/src/AuthorizationContext.js.map +1 -0
- package/dist/src/AuthorizationManager.d.ts +25 -0
- package/dist/src/AuthorizationManager.d.ts.map +1 -0
- package/dist/src/AuthorizationManager.js +64 -0
- package/dist/src/AuthorizationManager.js.map +1 -0
- package/dist/src/Contracts/Policy.d.ts +4 -0
- package/dist/src/Contracts/Policy.d.ts.map +1 -0
- package/dist/src/Contracts/Policy.js +3 -0
- package/dist/src/Contracts/Policy.js.map +1 -0
- package/dist/src/Exceptions/AuthorizationException.d.ts +6 -0
- package/dist/src/Exceptions/AuthorizationException.d.ts.map +1 -0
- package/dist/src/Exceptions/AuthorizationException.js +13 -0
- package/dist/src/Exceptions/AuthorizationException.js.map +1 -0
- package/dist/src/Gate.d.ts +76 -0
- package/dist/src/Gate.d.ts.map +1 -0
- package/dist/src/Gate.js +189 -0
- package/dist/src/Gate.js.map +1 -0
- package/dist/src/Middleware/Authorize.d.ts +13 -0
- package/dist/src/Middleware/Authorize.d.ts.map +1 -0
- package/dist/src/Middleware/Authorize.js +51 -0
- package/dist/src/Middleware/Authorize.js.map +1 -0
- package/dist/src/PolicyResolver.d.ts +21 -0
- package/dist/src/PolicyResolver.d.ts.map +1 -0
- package/dist/src/PolicyResolver.js +67 -0
- package/dist/src/PolicyResolver.js.map +1 -0
- package/dist/src/RolePermission.d.ts +36 -0
- package/dist/src/RolePermission.d.ts.map +1 -0
- package/dist/src/RolePermission.js +59 -0
- package/dist/src/RolePermission.js.map +1 -0
- package/dist/src/index.d.ts +10 -0
- package/dist/src/index.d.ts.map +1 -0
- package/dist/src/index.js +26 -0
- package/dist/src/index.js.map +1 -0
- package/dist/tests/Authorization.test.d.ts +2 -0
- package/dist/tests/Authorization.test.d.ts.map +1 -0
- package/dist/tests/Authorization.test.js +236 -0
- package/dist/tests/Authorization.test.js.map +1 -0
- package/package.json +44 -42
|
@@ -0,0 +1,236 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
3
|
+
if (k2 === undefined) k2 = k;
|
|
4
|
+
var desc = Object.getOwnPropertyDescriptor(m, k);
|
|
5
|
+
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
|
|
6
|
+
desc = { enumerable: true, get: function() { return m[k]; } };
|
|
7
|
+
}
|
|
8
|
+
Object.defineProperty(o, k2, desc);
|
|
9
|
+
}) : (function(o, m, k, k2) {
|
|
10
|
+
if (k2 === undefined) k2 = k;
|
|
11
|
+
o[k2] = m[k];
|
|
12
|
+
}));
|
|
13
|
+
var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
|
|
14
|
+
Object.defineProperty(o, "default", { enumerable: true, value: v });
|
|
15
|
+
}) : function(o, v) {
|
|
16
|
+
o["default"] = v;
|
|
17
|
+
});
|
|
18
|
+
var __importStar = (this && this.__importStar) || (function () {
|
|
19
|
+
var ownKeys = function(o) {
|
|
20
|
+
ownKeys = Object.getOwnPropertyNames || function (o) {
|
|
21
|
+
var ar = [];
|
|
22
|
+
for (var k in o) if (Object.prototype.hasOwnProperty.call(o, k)) ar[ar.length] = k;
|
|
23
|
+
return ar;
|
|
24
|
+
};
|
|
25
|
+
return ownKeys(o);
|
|
26
|
+
};
|
|
27
|
+
return function (mod) {
|
|
28
|
+
if (mod && mod.__esModule) return mod;
|
|
29
|
+
var result = {};
|
|
30
|
+
if (mod != null) for (var k = ownKeys(mod), i = 0; i < k.length; i++) if (k[i] !== "default") __createBinding(result, mod, k[i]);
|
|
31
|
+
__setModuleDefault(result, mod);
|
|
32
|
+
return result;
|
|
33
|
+
};
|
|
34
|
+
})();
|
|
35
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
36
|
+
const node_test_1 = require("node:test");
|
|
37
|
+
const assert = __importStar(require("node:assert"));
|
|
38
|
+
const src_1 = require("../src/index");
|
|
39
|
+
class Post {
|
|
40
|
+
constructor(id, userId, title) {
|
|
41
|
+
this.id = id;
|
|
42
|
+
this.userId = userId;
|
|
43
|
+
this.title = title;
|
|
44
|
+
}
|
|
45
|
+
}
|
|
46
|
+
class PostPolicy {
|
|
47
|
+
before(user, ability) {
|
|
48
|
+
if (user.isSuperAdmin)
|
|
49
|
+
return true; // Super admin bypass
|
|
50
|
+
return null; // Continue to normal check
|
|
51
|
+
}
|
|
52
|
+
view(user, post) {
|
|
53
|
+
return true;
|
|
54
|
+
}
|
|
55
|
+
update(user, post) {
|
|
56
|
+
return user.id === post.userId;
|
|
57
|
+
}
|
|
58
|
+
delete(user, post) {
|
|
59
|
+
if (user.id !== post.userId) {
|
|
60
|
+
return src_1.AuthResponse.deny('You do not own this post.', 'POST_NOT_OWNED');
|
|
61
|
+
}
|
|
62
|
+
return src_1.AuthResponse.allow();
|
|
63
|
+
}
|
|
64
|
+
}
|
|
65
|
+
(0, node_test_1.describe)('Arika Authorization', () => {
|
|
66
|
+
const user = { id: 1, name: 'John', isAdmin: false, isSuperAdmin: false, roles: ['editor'], permissions: ['view-posts'] };
|
|
67
|
+
const adminUser = { id: 2, name: 'Admin', isAdmin: true, isSuperAdmin: false, roles: ['admin', 'editor'], permissions: ['view-posts', 'edit-posts', 'delete-posts'] };
|
|
68
|
+
const superAdmin = { id: 3, name: 'SuperAdmin', isSuperAdmin: true, roles: ['super-admin'], permissions: [] };
|
|
69
|
+
const post = new Post(1, 1, 'Test Post');
|
|
70
|
+
const otherPost = new Post(2, 2, 'Other Post');
|
|
71
|
+
(0, node_test_1.beforeEach)(() => {
|
|
72
|
+
src_1.Gate.reset();
|
|
73
|
+
});
|
|
74
|
+
(0, node_test_1.afterEach)(() => {
|
|
75
|
+
src_1.Gate.reset();
|
|
76
|
+
});
|
|
77
|
+
// ── Basic Gate Tests ────────────────────────────────────────────
|
|
78
|
+
(0, node_test_1.it)('defines and checks gates', async () => {
|
|
79
|
+
src_1.Gate.define('edit-post', (user, post) => user.id === post.userId);
|
|
80
|
+
const canEdit = await src_1.Gate.forUser(user).allows('edit-post', post);
|
|
81
|
+
assert.strictEqual(canEdit, true);
|
|
82
|
+
const cannotEdit = await src_1.Gate.forUser(user).allows('edit-post', otherPost);
|
|
83
|
+
assert.strictEqual(cannotEdit, false);
|
|
84
|
+
});
|
|
85
|
+
(0, node_test_1.it)('denies unauthorized actions', async () => {
|
|
86
|
+
src_1.Gate.define('delete-post', (user) => user.isAdmin);
|
|
87
|
+
const denied = await src_1.Gate.forUser(user).denies('delete-post', post);
|
|
88
|
+
assert.strictEqual(denied, true);
|
|
89
|
+
const allowed = await src_1.Gate.forUser(adminUser).denies('delete-post', post);
|
|
90
|
+
assert.strictEqual(allowed, false);
|
|
91
|
+
});
|
|
92
|
+
// ── Policy Tests ────────────────────────────────────────────────
|
|
93
|
+
(0, node_test_1.it)('works with policies', async () => {
|
|
94
|
+
src_1.Gate.policy(Post, PostPolicy);
|
|
95
|
+
const canView = await src_1.Gate.forUser(user).allows('view', post);
|
|
96
|
+
assert.strictEqual(canView, true);
|
|
97
|
+
const canUpdate = await src_1.Gate.forUser(user).allows('update', post);
|
|
98
|
+
assert.strictEqual(canUpdate, true);
|
|
99
|
+
const cannotUpdate = await src_1.Gate.forUser(user).allows('update', otherPost);
|
|
100
|
+
assert.strictEqual(cannotUpdate, false);
|
|
101
|
+
});
|
|
102
|
+
// ── Feature 2: before() / after() Hooks ─────────────────────────
|
|
103
|
+
(0, node_test_1.it)('runs before() hook on policy for super admin bypass', async () => {
|
|
104
|
+
src_1.Gate.policy(Post, PostPolicy);
|
|
105
|
+
// SuperAdmin can update ANY post via before() returning true
|
|
106
|
+
const canUpdate = await src_1.Gate.forUser(superAdmin).allows('update', otherPost);
|
|
107
|
+
assert.strictEqual(canUpdate, true);
|
|
108
|
+
// Regular user cannot
|
|
109
|
+
const cannotUpdate = await src_1.Gate.forUser(user).allows('update', otherPost);
|
|
110
|
+
assert.strictEqual(cannotUpdate, false);
|
|
111
|
+
});
|
|
112
|
+
(0, node_test_1.it)('runs global before() hook', async () => {
|
|
113
|
+
src_1.Gate.before((user) => {
|
|
114
|
+
if (user.isSuperAdmin)
|
|
115
|
+
return true;
|
|
116
|
+
return null;
|
|
117
|
+
});
|
|
118
|
+
src_1.Gate.define('admin-only', (user) => user.isAdmin);
|
|
119
|
+
// Super admin bypasses everything
|
|
120
|
+
const allowed = await src_1.Gate.forUser(superAdmin).allows('admin-only');
|
|
121
|
+
assert.strictEqual(allowed, true);
|
|
122
|
+
// Regular user denied
|
|
123
|
+
const denied = await src_1.Gate.forUser(user).allows('admin-only');
|
|
124
|
+
assert.strictEqual(denied, false);
|
|
125
|
+
});
|
|
126
|
+
(0, node_test_1.it)('runs after() hook for auditing', async () => {
|
|
127
|
+
let auditLog = [];
|
|
128
|
+
src_1.Gate.after((user, ability, result) => {
|
|
129
|
+
auditLog.push({ ability, result });
|
|
130
|
+
});
|
|
131
|
+
src_1.Gate.define('edit-post', (user, post) => user.id === post.userId);
|
|
132
|
+
await src_1.Gate.forUser(user).allows('edit-post', post);
|
|
133
|
+
await src_1.Gate.forUser(user).allows('edit-post', otherPost);
|
|
134
|
+
assert.strictEqual(auditLog.length, 2);
|
|
135
|
+
assert.strictEqual(auditLog[0].result, true);
|
|
136
|
+
assert.strictEqual(auditLog[1].result, false);
|
|
137
|
+
});
|
|
138
|
+
// ── Feature 3: Bulk Checks ──────────────────────────────────────
|
|
139
|
+
(0, node_test_1.it)('Gate.any() checks if user has any of the abilities', async () => {
|
|
140
|
+
src_1.Gate.define('edit-post', (user, post) => user.id === post.userId);
|
|
141
|
+
src_1.Gate.define('delete-post', (user) => user.isAdmin);
|
|
142
|
+
const hasAny = await src_1.Gate.forUser(user).any(['edit-post', 'delete-post'], post);
|
|
143
|
+
assert.strictEqual(hasAny, true); // can edit-post
|
|
144
|
+
const hasNone = await src_1.Gate.forUser({ id: 999, isAdmin: false }).any(['edit-post', 'delete-post'], post);
|
|
145
|
+
assert.strictEqual(hasNone, false);
|
|
146
|
+
});
|
|
147
|
+
(0, node_test_1.it)('Gate.every() checks if user has all abilities', async () => {
|
|
148
|
+
src_1.Gate.define('edit-post', (user, post) => user.id === post.userId);
|
|
149
|
+
src_1.Gate.define('publish-post', () => true);
|
|
150
|
+
const hasAll = await src_1.Gate.forUser(user).every(['edit-post', 'publish-post'], post);
|
|
151
|
+
assert.strictEqual(hasAll, true);
|
|
152
|
+
src_1.Gate.define('admin-only', (user) => user.isAdmin);
|
|
153
|
+
const notAll = await src_1.Gate.forUser(user).every(['edit-post', 'admin-only'], post);
|
|
154
|
+
assert.strictEqual(notAll, false);
|
|
155
|
+
});
|
|
156
|
+
(0, node_test_1.it)('Gate.none() checks that user has none of the abilities', async () => {
|
|
157
|
+
src_1.Gate.define('admin-only', (user) => user.isAdmin);
|
|
158
|
+
src_1.Gate.define('super-admin-only', (user) => user.isSuperAdmin);
|
|
159
|
+
const noneForUser = await src_1.Gate.forUser(user).none(['admin-only', 'super-admin-only']);
|
|
160
|
+
assert.strictEqual(noneForUser, true);
|
|
161
|
+
const noneForAdmin = await src_1.Gate.forUser(adminUser).none(['admin-only', 'super-admin-only']);
|
|
162
|
+
assert.strictEqual(noneForAdmin, false);
|
|
163
|
+
});
|
|
164
|
+
// ── Feature 4: Response-Based Authorization ─────────────────────
|
|
165
|
+
(0, node_test_1.it)('returns custom deny message via AuthResponse', async () => {
|
|
166
|
+
src_1.Gate.policy(Post, PostPolicy);
|
|
167
|
+
const response = await src_1.Gate.forUser(user).inspect('delete', otherPost);
|
|
168
|
+
assert.strictEqual(response.denied(), true);
|
|
169
|
+
assert.strictEqual(response.message(), 'You do not own this post.');
|
|
170
|
+
assert.strictEqual(response.code(), 'POST_NOT_OWNED');
|
|
171
|
+
const allowResponse = await src_1.Gate.forUser(user).inspect('delete', post);
|
|
172
|
+
assert.strictEqual(allowResponse.allowed(), true);
|
|
173
|
+
});
|
|
174
|
+
(0, node_test_1.it)('throws exception with custom message from AuthResponse', async () => {
|
|
175
|
+
src_1.Gate.policy(Post, PostPolicy);
|
|
176
|
+
await assert.rejects(async () => await src_1.Gate.forUser(user).authorize('delete', otherPost), (err) => {
|
|
177
|
+
assert.strictEqual(err.message, 'You do not own this post.');
|
|
178
|
+
assert.strictEqual(err.code, 'POST_NOT_OWNED');
|
|
179
|
+
return true;
|
|
180
|
+
});
|
|
181
|
+
});
|
|
182
|
+
// ── Feature 5: Request-Scoped Context ───────────────────────────
|
|
183
|
+
(0, node_test_1.it)('AuthorizationContext provides isolated per-request checks', async () => {
|
|
184
|
+
src_1.Gate.define('edit-post', (user, post) => user.id === post.userId);
|
|
185
|
+
const ctx1 = new src_1.AuthorizationContext(user);
|
|
186
|
+
const ctx2 = new src_1.AuthorizationContext(adminUser);
|
|
187
|
+
const can1 = await ctx1.can('edit-post', post);
|
|
188
|
+
assert.strictEqual(can1, true);
|
|
189
|
+
const can2 = await ctx2.can('edit-post', post);
|
|
190
|
+
assert.strictEqual(can2, false); // adminUser.id !== post.userId
|
|
191
|
+
});
|
|
192
|
+
(0, node_test_1.it)('AuthorizationContext caches results within a request', async () => {
|
|
193
|
+
let callCount = 0;
|
|
194
|
+
src_1.Gate.define('counted-gate', (user) => {
|
|
195
|
+
callCount++;
|
|
196
|
+
return true;
|
|
197
|
+
});
|
|
198
|
+
const ctx = new src_1.AuthorizationContext(user);
|
|
199
|
+
await ctx.can('counted-gate');
|
|
200
|
+
await ctx.can('counted-gate'); // should be cached
|
|
201
|
+
assert.strictEqual(callCount, 1); // Only called once
|
|
202
|
+
});
|
|
203
|
+
// ── Feature 1: Role & Permission ────────────────────────────────
|
|
204
|
+
(0, node_test_1.it)('checks roles via RolePermissionMixin', () => {
|
|
205
|
+
assert.strictEqual(src_1.RolePermissionMixin.hasRole(user, 'editor'), true);
|
|
206
|
+
assert.strictEqual(src_1.RolePermissionMixin.hasRole(user, 'admin'), false);
|
|
207
|
+
assert.strictEqual(src_1.RolePermissionMixin.hasAnyRole(adminUser, ['admin', 'super-admin']), true);
|
|
208
|
+
assert.strictEqual(src_1.RolePermissionMixin.hasAllRoles(adminUser, ['admin', 'editor']), true);
|
|
209
|
+
assert.strictEqual(src_1.RolePermissionMixin.hasAllRoles(adminUser, ['admin', 'super-admin']), false);
|
|
210
|
+
});
|
|
211
|
+
(0, node_test_1.it)('checks permissions via RolePermissionMixin', () => {
|
|
212
|
+
assert.strictEqual(src_1.RolePermissionMixin.hasPermission(user, 'view-posts'), true);
|
|
213
|
+
assert.strictEqual(src_1.RolePermissionMixin.hasPermission(user, 'delete-posts'), false);
|
|
214
|
+
assert.strictEqual(src_1.RolePermissionMixin.hasAnyPermission(adminUser, ['edit-posts', 'nuke-server']), true);
|
|
215
|
+
assert.strictEqual(src_1.RolePermissionMixin.hasAllPermissions(adminUser, ['view-posts', 'edit-posts', 'delete-posts']), true);
|
|
216
|
+
});
|
|
217
|
+
(0, node_test_1.it)('checks roles/permissions via AuthorizationContext', () => {
|
|
218
|
+
const ctx = new src_1.AuthorizationContext(adminUser);
|
|
219
|
+
assert.strictEqual(ctx.hasRole('admin'), true);
|
|
220
|
+
assert.strictEqual(ctx.hasAnyRole(['admin', 'super-admin']), true);
|
|
221
|
+
assert.strictEqual(ctx.hasPermission('edit-posts'), true);
|
|
222
|
+
assert.strictEqual(ctx.hasAllPermissions(['view-posts', 'edit-posts']), true);
|
|
223
|
+
});
|
|
224
|
+
// ── AuthorizationManager ────────────────────────────────────────
|
|
225
|
+
(0, node_test_1.it)('AuthorizationManager delegates to context', async () => {
|
|
226
|
+
src_1.Gate.define('edit-post', (user, post) => user.id === post.userId);
|
|
227
|
+
const authz = new src_1.AuthorizationManager(user);
|
|
228
|
+
const can = await authz.can('edit-post', post);
|
|
229
|
+
assert.strictEqual(can, true);
|
|
230
|
+
const cannot = await authz.cannot('edit-post', otherPost);
|
|
231
|
+
assert.strictEqual(cannot, true);
|
|
232
|
+
assert.strictEqual(authz.hasRole('editor'), true);
|
|
233
|
+
assert.strictEqual(authz.hasPermission('view-posts'), true);
|
|
234
|
+
});
|
|
235
|
+
});
|
|
236
|
+
//# sourceMappingURL=Authorization.test.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"Authorization.test.js","sourceRoot":"","sources":["../../tests/Authorization.test.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA,yCAAgE;AAChE,oDAAsC;AACtC,gCAQgB;AAEhB,MAAM,IAAI;IACN,YAAmB,EAAU,EAAS,MAAc,EAAS,KAAa;QAAvD,OAAE,GAAF,EAAE,CAAQ;QAAS,WAAM,GAAN,MAAM,CAAQ;QAAS,UAAK,GAAL,KAAK,CAAQ;IAAI,CAAC;CAClF;AAED,MAAM,UAAU;IACZ,MAAM,CAAC,IAAS,EAAE,OAAe;QAC7B,IAAI,IAAI,CAAC,YAAY;YAAE,OAAO,IAAI,CAAC,CAAE,qBAAqB;QAC1D,OAAO,IAAI,CAAC,CAAC,2BAA2B;IAC5C,CAAC;IAED,IAAI,CAAC,IAAS,EAAE,IAAU;QACtB,OAAO,IAAI,CAAC;IAChB,CAAC;IAED,MAAM,CAAC,IAAS,EAAE,IAAU;QACxB,OAAO,IAAI,CAAC,EAAE,KAAK,IAAI,CAAC,MAAM,CAAC;IACnC,CAAC;IAED,MAAM,CAAC,IAAS,EAAE,IAAU;QACxB,IAAI,IAAI,CAAC,EAAE,KAAK,IAAI,CAAC,MAAM,EAAE,CAAC;YAC1B,OAAO,kBAAY,CAAC,IAAI,CAAC,2BAA2B,EAAE,gBAAgB,CAAC,CAAC;QAC5E,CAAC;QACD,OAAO,kBAAY,CAAC,KAAK,EAAE,CAAC;IAChC,CAAC;CACJ;AAED,IAAA,oBAAQ,EAAC,qBAAqB,EAAE,GAAG,EAAE;IACjC,MAAM,IAAI,GAAG,EAAE,EAAE,EAAE,CAAC,EAAE,IAAI,EAAE,MAAM,EAAE,OAAO,EAAE,KAAK,EAAE,YAAY,EAAE,KAAK,EAAE,KAAK,EAAE,CAAC,QAAQ,CAAC,EAAE,WAAW,EAAE,CAAC,YAAY,CAAC,EAAE,CAAC;IAC1H,MAAM,SAAS,GAAG,EAAE,EAAE,EAAE,CAAC,EAAE,IAAI,EAAE,OAAO,EAAE,OAAO,EAAE,IAAI,EAAE,YAAY,EAAE,KAAK,EAAE,KAAK,EAAE,CAAC,OAAO,EAAE,QAAQ,CAAC,EAAE,WAAW,EAAE,CAAC,YAAY,EAAE,YAAY,EAAE,cAAc,CAAC,EAAE,CAAC;IACtK,MAAM,UAAU,GAAG,EAAE,EAAE,EAAE,CAAC,EAAE,IAAI,EAAE,YAAY,EAAE,YAAY,EAAE,IAAI,EAAE,KAAK,EAAE,CAAC,aAAa,CAAC,EAAE,WAAW,EAAE,EAAE,EAAE,CAAC;IAC9G,MAAM,IAAI,GAAG,IAAI,IAAI,CAAC,CAAC,EAAE,CAAC,EAAE,WAAW,CAAC,CAAC;IACzC,MAAM,SAAS,GAAG,IAAI,IAAI,CAAC,CAAC,EAAE,CAAC,EAAE,YAAY,CAAC,CAAC;IAE/C,IAAA,sBAAU,EAAC,GAAG,EAAE;QACZ,UAAI,CAAC,KAAK,EAAE,CAAC;IACjB,CAAC,CAAC,CAAC;IAEH,IAAA,qBAAS,EAAC,GAAG,EAAE;QACX,UAAI,CAAC,KAAK,EAAE,CAAC;IACjB,CAAC,CAAC,CAAC;IAEH,mEAAmE;IAEnE,IAAA,cAAE,EAAC,0BAA0B,EAAE,KAAK,IAAI,EAAE;QACtC,UAAI,CAAC,MAAM,CAAC,WAAW,EAAE,CAAC,IAAI,EAAE,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,EAAE,KAAK,IAAI,CAAC,MAAM,CAAC,CAAC;QAElE,MAAM,OAAO,GAAG,MAAM,UAAI,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC,MAAM,CAAC,WAAW,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,CAAC,WAAW,CAAC,OAAO,EAAE,IAAI,CAAC,CAAC;QAElC,MAAM,UAAU,GAAG,MAAM,UAAI,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC,MAAM,CAAC,WAAW,EAAE,SAAS,CAAC,CAAC;QAC3E,MAAM,CAAC,WAAW,CAAC,UAAU,EAAE,KAAK,CAAC,CAAC;IAC1C,CAAC,CAAC,CAAC;IAEH,IAAA,cAAE,EAAC,6BAA6B,EAAE,KAAK,IAAI,EAAE;QACzC,UAAI,CAAC,MAAM,CAAC,aAAa,EAAE,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC;QAEnD,MAAM,MAAM,GAAG,MAAM,UAAI,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC,MAAM,CAAC,aAAa,EAAE,IAAI,CAAC,CAAC;QACpE,MAAM,CAAC,WAAW,CAAC,MAAM,EAAE,IAAI,CAAC,CAAC;QAEjC,MAAM,OAAO,GAAG,MAAM,UAAI,CAAC,OAAO,CAAC,SAAS,CAAC,CAAC,MAAM,CAAC,aAAa,EAAE,IAAI,CAAC,CAAC;QAC1E,MAAM,CAAC,WAAW,CAAC,OAAO,EAAE,KAAK,CAAC,CAAC;IACvC,CAAC,CAAC,CAAC;IAEH,mEAAmE;IAEnE,IAAA,cAAE,EAAC,qBAAqB,EAAE,KAAK,IAAI,EAAE;QACjC,UAAI,CAAC,MAAM,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAE9B,MAAM,OAAO,GAAG,MAAM,UAAI,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC,MAAM,CAAC,MAAM,EAAE,IAAI,CAAC,CAAC;QAC9D,MAAM,CAAC,WAAW,CAAC,OAAO,EAAE,IAAI,CAAC,CAAC;QAElC,MAAM,SAAS,GAAG,MAAM,UAAI,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC,MAAM,CAAC,QAAQ,EAAE,IAAI,CAAC,CAAC;QAClE,MAAM,CAAC,WAAW,CAAC,SAAS,EAAE,IAAI,CAAC,CAAC;QAEpC,MAAM,YAAY,GAAG,MAAM,UAAI,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC,MAAM,CAAC,QAAQ,EAAE,SAAS,CAAC,CAAC;QAC1E,MAAM,CAAC,WAAW,CAAC,YAAY,EAAE,KAAK,CAAC,CAAC;IAC5C,CAAC,CAAC,CAAC;IAEH,mEAAmE;IAEnE,IAAA,cAAE,EAAC,qDAAqD,EAAE,KAAK,IAAI,EAAE;QACjE,UAAI,CAAC,MAAM,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAE9B,6DAA6D;QAC7D,MAAM,SAAS,GAAG,MAAM,UAAI,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC,MAAM,CAAC,QAAQ,EAAE,SAAS,CAAC,CAAC;QAC7E,MAAM,CAAC,WAAW,CAAC,SAAS,EAAE,IAAI,CAAC,CAAC;QAEpC,sBAAsB;QACtB,MAAM,YAAY,GAAG,MAAM,UAAI,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC,MAAM,CAAC,QAAQ,EAAE,SAAS,CAAC,CAAC;QAC1E,MAAM,CAAC,WAAW,CAAC,YAAY,EAAE,KAAK,CAAC,CAAC;IAC5C,CAAC,CAAC,CAAC;IAEH,IAAA,cAAE,EAAC,2BAA2B,EAAE,KAAK,IAAI,EAAE;QACvC,UAAI,CAAC,MAAM,CAAC,CAAC,IAAI,EAAE,EAAE;YACjB,IAAI,IAAI,CAAC,YAAY;gBAAE,OAAO,IAAI,CAAC;YACnC,OAAO,IAAI,CAAC;QAChB,CAAC,CAAC,CAAC;QAEH,UAAI,CAAC,MAAM,CAAC,YAAY,EAAE,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC;QAElD,kCAAkC;QAClC,MAAM,OAAO,GAAG,MAAM,UAAI,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC,MAAM,CAAC,YAAY,CAAC,CAAC;QACpE,MAAM,CAAC,WAAW,CAAC,OAAO,EAAE,IAAI,CAAC,CAAC;QAElC,sBAAsB;QACtB,MAAM,MAAM,GAAG,MAAM,UAAI,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC,MAAM,CAAC,YAAY,CAAC,CAAC;QAC7D,MAAM,CAAC,WAAW,CAAC,MAAM,EAAE,KAAK,CAAC,CAAC;IACtC,CAAC,CAAC,CAAC;IAEH,IAAA,cAAE,EAAC,gCAAgC,EAAE,KAAK,IAAI,EAAE;QAC5C,IAAI,QAAQ,GAA2C,EAAE,CAAC;QAE1D,UAAI,CAAC,KAAK,CAAC,CAAC,IAAI,EAAE,OAAO,EAAE,MAAM,EAAE,EAAE;YACjC,QAAQ,CAAC,IAAI,CAAC,EAAE,OAAO,EAAE,MAAM,EAAE,CAAC,CAAC;QACvC,CAAC,CAAC,CAAC;QAEH,UAAI,CAAC,MAAM,CAAC,WAAW,EAAE,CAAC,IAAI,EAAE,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,EAAE,KAAK,IAAI,CAAC,MAAM,CAAC,CAAC;QAElE,MAAM,UAAI,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC,MAAM,CAAC,WAAW,EAAE,IAAI,CAAC,CAAC;QACnD,MAAM,UAAI,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC,MAAM,CAAC,WAAW,EAAE,SAAS,CAAC,CAAC;QAExD,MAAM,CAAC,WAAW,CAAC,QAAQ,CAAC,MAAM,EAAE,CAAC,CAAC,CAAC;QACvC,MAAM,CAAC,WAAW,CAAC,QAAQ,CAAC,CAAC,CAAC,CAAC,MAAM,EAAE,IAAI,CAAC,CAAC;QAC7C,MAAM,CAAC,WAAW,CAAC,QAAQ,CAAC,CAAC,CAAC,CAAC,MAAM,EAAE,KAAK,CAAC,CAAC;IAClD,CAAC,CAAC,CAAC;IAEH,mEAAmE;IAEnE,IAAA,cAAE,EAAC,oDAAoD,EAAE,KAAK,IAAI,EAAE;QAChE,UAAI,CAAC,MAAM,CAAC,WAAW,EAAE,CAAC,IAAI,EAAE,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,EAAE,KAAK,IAAI,CAAC,MAAM,CAAC,CAAC;QAClE,UAAI,CAAC,MAAM,CAAC,aAAa,EAAE,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC;QAEnD,MAAM,MAAM,GAAG,MAAM,UAAI,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC,GAAG,CAAC,CAAC,WAAW,EAAE,aAAa,CAAC,EAAE,IAAI,CAAC,CAAC;QAChF,MAAM,CAAC,WAAW,CAAC,MAAM,EAAE,IAAI,CAAC,CAAC,CAAC,gBAAgB;QAElD,MAAM,OAAO,GAAG,MAAM,UAAI,CAAC,OAAO,CAAC,EAAE,EAAE,EAAE,GAAG,EAAE,OAAO,EAAE,KAAK,EAAE,CAAC,CAAC,GAAG,CAAC,CAAC,WAAW,EAAE,aAAa,CAAC,EAAE,IAAI,CAAC,CAAC;QACxG,MAAM,CAAC,WAAW,CAAC,OAAO,EAAE,KAAK,CAAC,CAAC;IACvC,CAAC,CAAC,CAAC;IAEH,IAAA,cAAE,EAAC,+CAA+C,EAAE,KAAK,IAAI,EAAE;QAC3D,UAAI,CAAC,MAAM,CAAC,WAAW,EAAE,CAAC,IAAI,EAAE,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,EAAE,KAAK,IAAI,CAAC,MAAM,CAAC,CAAC;QAClE,UAAI,CAAC,MAAM,CAAC,cAAc,EAAE,GAAG,EAAE,CAAC,IAAI,CAAC,CAAC;QAExC,MAAM,MAAM,GAAG,MAAM,UAAI,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,WAAW,EAAE,cAAc,CAAC,EAAE,IAAI,CAAC,CAAC;QACnF,MAAM,CAAC,WAAW,CAAC,MAAM,EAAE,IAAI,CAAC,CAAC;QAEjC,UAAI,CAAC,MAAM,CAAC,YAAY,EAAE,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC;QAClD,MAAM,MAAM,GAAG,MAAM,UAAI,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,WAAW,EAAE,YAAY,CAAC,EAAE,IAAI,CAAC,CAAC;QACjF,MAAM,CAAC,WAAW,CAAC,MAAM,EAAE,KAAK,CAAC,CAAC;IACtC,CAAC,CAAC,CAAC;IAEH,IAAA,cAAE,EAAC,wDAAwD,EAAE,KAAK,IAAI,EAAE;QACpE,UAAI,CAAC,MAAM,CAAC,YAAY,EAAE,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC;QAClD,UAAI,CAAC,MAAM,CAAC,kBAAkB,EAAE,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC;QAE7D,MAAM,WAAW,GAAG,MAAM,UAAI,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC,IAAI,CAAC,CAAC,YAAY,EAAE,kBAAkB,CAAC,CAAC,CAAC;QACtF,MAAM,CAAC,WAAW,CAAC,WAAW,EAAE,IAAI,CAAC,CAAC;QAEtC,MAAM,YAAY,GAAG,MAAM,UAAI,CAAC,OAAO,CAAC,SAAS,CAAC,CAAC,IAAI,CAAC,CAAC,YAAY,EAAE,kBAAkB,CAAC,CAAC,CAAC;QAC5F,MAAM,CAAC,WAAW,CAAC,YAAY,EAAE,KAAK,CAAC,CAAC;IAC5C,CAAC,CAAC,CAAC;IAEH,mEAAmE;IAEnE,IAAA,cAAE,EAAC,8CAA8C,EAAE,KAAK,IAAI,EAAE;QAC1D,UAAI,CAAC,MAAM,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAE9B,MAAM,QAAQ,GAAG,MAAM,UAAI,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC,OAAO,CAAC,QAAQ,EAAE,SAAS,CAAC,CAAC;QACvE,MAAM,CAAC,WAAW,CAAC,QAAQ,CAAC,MAAM,EAAE,EAAE,IAAI,CAAC,CAAC;QAC5C,MAAM,CAAC,WAAW,CAAC,QAAQ,CAAC,OAAO,EAAE,EAAE,2BAA2B,CAAC,CAAC;QACpE,MAAM,CAAC,WAAW,CAAC,QAAQ,CAAC,IAAI,EAAE,EAAE,gBAAgB,CAAC,CAAC;QAEtD,MAAM,aAAa,GAAG,MAAM,UAAI,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC,OAAO,CAAC,QAAQ,EAAE,IAAI,CAAC,CAAC;QACvE,MAAM,CAAC,WAAW,CAAC,aAAa,CAAC,OAAO,EAAE,EAAE,IAAI,CAAC,CAAC;IACtD,CAAC,CAAC,CAAC;IAEH,IAAA,cAAE,EAAC,wDAAwD,EAAE,KAAK,IAAI,EAAE;QACpE,UAAI,CAAC,MAAM,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAE9B,MAAM,MAAM,CAAC,OAAO,CAChB,KAAK,IAAI,EAAE,CAAC,MAAM,UAAI,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC,SAAS,CAAC,QAAQ,EAAE,SAAS,CAAC,EACnE,CAAC,GAAQ,EAAE,EAAE;YACT,MAAM,CAAC,WAAW,CAAC,GAAG,CAAC,OAAO,EAAE,2BAA2B,CAAC,CAAC;YAC7D,MAAM,CAAC,WAAW,CAAC,GAAG,CAAC,IAAI,EAAE,gBAAgB,CAAC,CAAC;YAC/C,OAAO,IAAI,CAAC;QAChB,CAAC,CACJ,CAAC;IACN,CAAC,CAAC,CAAC;IAEH,mEAAmE;IAEnE,IAAA,cAAE,EAAC,2DAA2D,EAAE,KAAK,IAAI,EAAE;QACvE,UAAI,CAAC,MAAM,CAAC,WAAW,EAAE,CAAC,IAAI,EAAE,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,EAAE,KAAK,IAAI,CAAC,MAAM,CAAC,CAAC;QAElE,MAAM,IAAI,GAAG,IAAI,0BAAoB,CAAC,IAAI,CAAC,CAAC;QAC5C,MAAM,IAAI,GAAG,IAAI,0BAAoB,CAAC,SAAS,CAAC,CAAC;QAEjD,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,GAAG,CAAC,WAAW,EAAE,IAAI,CAAC,CAAC;QAC/C,MAAM,CAAC,WAAW,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;QAE/B,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,GAAG,CAAC,WAAW,EAAE,IAAI,CAAC,CAAC;QAC/C,MAAM,CAAC,WAAW,CAAC,IAAI,EAAE,KAAK,CAAC,CAAC,CAAC,+BAA+B;IACpE,CAAC,CAAC,CAAC;IAEH,IAAA,cAAE,EAAC,sDAAsD,EAAE,KAAK,IAAI,EAAE;QAClE,IAAI,SAAS,GAAG,CAAC,CAAC;QAClB,UAAI,CAAC,MAAM,CAAC,cAAc,EAAE,CAAC,IAAI,EAAE,EAAE;YACjC,SAAS,EAAE,CAAC;YACZ,OAAO,IAAI,CAAC;QAChB,CAAC,CAAC,CAAC;QAEH,MAAM,GAAG,GAAG,IAAI,0BAAoB,CAAC,IAAI,CAAC,CAAC;QAE3C,MAAM,GAAG,CAAC,GAAG,CAAC,cAAc,CAAC,CAAC;QAC9B,MAAM,GAAG,CAAC,GAAG,CAAC,cAAc,CAAC,CAAC,CAAC,mBAAmB;QAElD,MAAM,CAAC,WAAW,CAAC,SAAS,EAAE,CAAC,CAAC,CAAC,CAAC,mBAAmB;IACzD,CAAC,CAAC,CAAC;IAEH,mEAAmE;IAEnE,IAAA,cAAE,EAAC,sCAAsC,EAAE,GAAG,EAAE;QAC5C,MAAM,CAAC,WAAW,CAAC,yBAAmB,CAAC,OAAO,CAAC,IAAI,EAAE,QAAQ,CAAC,EAAE,IAAI,CAAC,CAAC;QACtE,MAAM,CAAC,WAAW,CAAC,yBAAmB,CAAC,OAAO,CAAC,IAAI,EAAE,OAAO,CAAC,EAAE,KAAK,CAAC,CAAC;QAEtE,MAAM,CAAC,WAAW,CAAC,yBAAmB,CAAC,UAAU,CAAC,SAAS,EAAE,CAAC,OAAO,EAAE,aAAa,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC;QAC9F,MAAM,CAAC,WAAW,CAAC,yBAAmB,CAAC,WAAW,CAAC,SAAS,EAAE,CAAC,OAAO,EAAE,QAAQ,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC;QAC1F,MAAM,CAAC,WAAW,CAAC,yBAAmB,CAAC,WAAW,CAAC,SAAS,EAAE,CAAC,OAAO,EAAE,aAAa,CAAC,CAAC,EAAE,KAAK,CAAC,CAAC;IACpG,CAAC,CAAC,CAAC;IAEH,IAAA,cAAE,EAAC,4CAA4C,EAAE,GAAG,EAAE;QAClD,MAAM,CAAC,WAAW,CAAC,yBAAmB,CAAC,aAAa,CAAC,IAAI,EAAE,YAAY,CAAC,EAAE,IAAI,CAAC,CAAC;QAChF,MAAM,CAAC,WAAW,CAAC,yBAAmB,CAAC,aAAa,CAAC,IAAI,EAAE,cAAc,CAAC,EAAE,KAAK,CAAC,CAAC;QAEnF,MAAM,CAAC,WAAW,CAAC,yBAAmB,CAAC,gBAAgB,CAAC,SAAS,EAAE,CAAC,YAAY,EAAE,aAAa,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC;QACzG,MAAM,CAAC,WAAW,CAAC,yBAAmB,CAAC,iBAAiB,CAAC,SAAS,EAAE,CAAC,YAAY,EAAE,YAAY,EAAE,cAAc,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC;IAC7H,CAAC,CAAC,CAAC;IAEH,IAAA,cAAE,EAAC,mDAAmD,EAAE,GAAG,EAAE;QACzD,MAAM,GAAG,GAAG,IAAI,0BAAoB,CAAC,SAAS,CAAC,CAAC;QAEhD,MAAM,CAAC,WAAW,CAAC,GAAG,CAAC,OAAO,CAAC,OAAO,CAAC,EAAE,IAAI,CAAC,CAAC;QAC/C,MAAM,CAAC,WAAW,CAAC,GAAG,CAAC,UAAU,CAAC,CAAC,OAAO,EAAE,aAAa,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,CAAC,WAAW,CAAC,GAAG,CAAC,aAAa,CAAC,YAAY,CAAC,EAAE,IAAI,CAAC,CAAC;QAC1D,MAAM,CAAC,WAAW,CAAC,GAAG,CAAC,iBAAiB,CAAC,CAAC,YAAY,EAAE,YAAY,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC;IAClF,CAAC,CAAC,CAAC;IAEH,mEAAmE;IAEnE,IAAA,cAAE,EAAC,2CAA2C,EAAE,KAAK,IAAI,EAAE;QACvD,UAAI,CAAC,MAAM,CAAC,WAAW,EAAE,CAAC,IAAI,EAAE,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,EAAE,KAAK,IAAI,CAAC,MAAM,CAAC,CAAC;QAElE,MAAM,KAAK,GAAG,IAAI,0BAAoB,CAAC,IAAI,CAAC,CAAC;QAE7C,MAAM,GAAG,GAAG,MAAM,KAAK,CAAC,GAAG,CAAC,WAAW,EAAE,IAAI,CAAC,CAAC;QAC/C,MAAM,CAAC,WAAW,CAAC,GAAG,EAAE,IAAI,CAAC,CAAC;QAE9B,MAAM,MAAM,GAAG,MAAM,KAAK,CAAC,MAAM,CAAC,WAAW,EAAE,SAAS,CAAC,CAAC;QAC1D,MAAM,CAAC,WAAW,CAAC,MAAM,EAAE,IAAI,CAAC,CAAC;QAEjC,MAAM,CAAC,WAAW,CAAC,KAAK,CAAC,OAAO,CAAC,QAAQ,CAAC,EAAE,IAAI,CAAC,CAAC;QAClD,MAAM,CAAC,WAAW,CAAC,KAAK,CAAC,aAAa,CAAC,YAAY,CAAC,EAAE,IAAI,CAAC,CAAC;IAChE,CAAC,CAAC,CAAC;AACP,CAAC,CAAC,CAAC"}
|
package/package.json
CHANGED
|
@@ -1,44 +1,46 @@
|
|
|
1
1
|
{
|
|
2
|
-
|
|
3
|
-
|
|
4
|
-
|
|
5
|
-
|
|
6
|
-
|
|
7
|
-
|
|
8
|
-
|
|
9
|
-
|
|
10
|
-
|
|
11
|
-
|
|
12
|
-
|
|
13
|
-
|
|
14
|
-
|
|
15
|
-
|
|
16
|
-
|
|
17
|
-
|
|
18
|
-
|
|
19
|
-
|
|
20
|
-
|
|
21
|
-
|
|
22
|
-
|
|
23
|
-
|
|
24
|
-
|
|
25
|
-
|
|
26
|
-
|
|
27
|
-
|
|
28
|
-
|
|
29
|
-
|
|
30
|
-
|
|
31
|
-
|
|
32
|
-
|
|
33
|
-
|
|
34
|
-
|
|
35
|
-
"
|
|
36
|
-
|
|
37
|
-
|
|
38
|
-
"
|
|
39
|
-
|
|
40
|
-
|
|
41
|
-
|
|
42
|
-
|
|
43
|
-
"
|
|
2
|
+
"name": "@arikajs/authorization",
|
|
3
|
+
"version": "0.0.5",
|
|
4
|
+
"description": "Authorization (access control) for the ArikaJS framework.",
|
|
5
|
+
"license": "MIT",
|
|
6
|
+
"main": "dist/index.js",
|
|
7
|
+
"types": "dist/index.d.ts",
|
|
8
|
+
"scripts": {
|
|
9
|
+
"build": "tsc -p tsconfig.json",
|
|
10
|
+
"build:tests": "tsc -p tsconfig.test.json",
|
|
11
|
+
"clean": "rm -rf dist",
|
|
12
|
+
"prepare": "echo skip",
|
|
13
|
+
"test": "npm run build && npm run build:tests && node scripts/fix-test-imports.js && node --test 'dist/tests/**/*.test.js'",
|
|
14
|
+
"test:watch": "npm run build && npm run build:tests && node --test --watch 'dist/tests/**/*.test.js'",
|
|
15
|
+
"dev": "tsc -p tsconfig.json --watch"
|
|
16
|
+
},
|
|
17
|
+
"files": [
|
|
18
|
+
"dist"
|
|
19
|
+
],
|
|
20
|
+
"keywords": [
|
|
21
|
+
"arika",
|
|
22
|
+
"arika-js",
|
|
23
|
+
"framework",
|
|
24
|
+
"authorization",
|
|
25
|
+
"access-control",
|
|
26
|
+
"policy",
|
|
27
|
+
"gate"
|
|
28
|
+
],
|
|
29
|
+
"engines": {
|
|
30
|
+
"node": ">=20.0.0"
|
|
31
|
+
},
|
|
32
|
+
"repository": {
|
|
33
|
+
"type": "git",
|
|
34
|
+
"url": "git+https://github.com/ArikaJs/arikajs.git",
|
|
35
|
+
"directory": "packages/authorization"
|
|
36
|
+
},
|
|
37
|
+
"bugs": {
|
|
38
|
+
"url": "https://github.com/ArikaJs/arikajs/issues"
|
|
39
|
+
},
|
|
40
|
+
"homepage": "https://github.com/ArikaJs/arikajs/tree/main/packages/authorization#readme",
|
|
41
|
+
"devDependencies": {
|
|
42
|
+
"@types/node": "^20.11.24",
|
|
43
|
+
"typescript": "^5.3.3"
|
|
44
|
+
},
|
|
45
|
+
"author": "Prakash Tank"
|
|
44
46
|
}
|