@arikajs/authorization 0.0.4 → 0.0.5

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (82) hide show
  1. package/README.md +173 -78
  2. package/dist/AuthResponse.d.ts +23 -0
  3. package/dist/AuthResponse.d.ts.map +1 -0
  4. package/dist/AuthResponse.js +40 -0
  5. package/dist/AuthResponse.js.map +1 -0
  6. package/dist/AuthorizationContext.d.ts +31 -0
  7. package/dist/AuthorizationContext.d.ts.map +1 -0
  8. package/dist/AuthorizationContext.js +87 -0
  9. package/dist/AuthorizationContext.js.map +1 -0
  10. package/dist/AuthorizationManager.d.ts +15 -7
  11. package/dist/AuthorizationManager.d.ts.map +1 -1
  12. package/dist/AuthorizationManager.js +46 -12
  13. package/dist/AuthorizationManager.js.map +1 -1
  14. package/dist/Exceptions/AuthorizationException.d.ts +2 -1
  15. package/dist/Exceptions/AuthorizationException.d.ts.map +1 -1
  16. package/dist/Exceptions/AuthorizationException.js +2 -1
  17. package/dist/Exceptions/AuthorizationException.js.map +1 -1
  18. package/dist/Gate.d.ts +39 -3
  19. package/dist/Gate.d.ts.map +1 -1
  20. package/dist/Gate.js +121 -14
  21. package/dist/Gate.js.map +1 -1
  22. package/dist/Middleware/Authorize.d.ts +5 -4
  23. package/dist/Middleware/Authorize.d.ts.map +1 -1
  24. package/dist/Middleware/Authorize.js +24 -6
  25. package/dist/Middleware/Authorize.js.map +1 -1
  26. package/dist/PolicyResolver.d.ts +7 -2
  27. package/dist/PolicyResolver.d.ts.map +1 -1
  28. package/dist/PolicyResolver.js +26 -4
  29. package/dist/PolicyResolver.js.map +1 -1
  30. package/dist/RolePermission.d.ts +36 -0
  31. package/dist/RolePermission.d.ts.map +1 -0
  32. package/dist/RolePermission.js +59 -0
  33. package/dist/RolePermission.js.map +1 -0
  34. package/dist/index.d.ts +3 -0
  35. package/dist/index.d.ts.map +1 -1
  36. package/dist/index.js +3 -0
  37. package/dist/index.js.map +1 -1
  38. package/dist/src/AuthResponse.d.ts +23 -0
  39. package/dist/src/AuthResponse.d.ts.map +1 -0
  40. package/dist/src/AuthResponse.js +40 -0
  41. package/dist/src/AuthResponse.js.map +1 -0
  42. package/dist/src/AuthorizationContext.d.ts +31 -0
  43. package/dist/src/AuthorizationContext.d.ts.map +1 -0
  44. package/dist/src/AuthorizationContext.js +87 -0
  45. package/dist/src/AuthorizationContext.js.map +1 -0
  46. package/dist/src/AuthorizationManager.d.ts +25 -0
  47. package/dist/src/AuthorizationManager.d.ts.map +1 -0
  48. package/dist/src/AuthorizationManager.js +64 -0
  49. package/dist/src/AuthorizationManager.js.map +1 -0
  50. package/dist/src/Contracts/Policy.d.ts +4 -0
  51. package/dist/src/Contracts/Policy.d.ts.map +1 -0
  52. package/dist/src/Contracts/Policy.js +3 -0
  53. package/dist/src/Contracts/Policy.js.map +1 -0
  54. package/dist/src/Exceptions/AuthorizationException.d.ts +6 -0
  55. package/dist/src/Exceptions/AuthorizationException.d.ts.map +1 -0
  56. package/dist/src/Exceptions/AuthorizationException.js +13 -0
  57. package/dist/src/Exceptions/AuthorizationException.js.map +1 -0
  58. package/dist/src/Gate.d.ts +76 -0
  59. package/dist/src/Gate.d.ts.map +1 -0
  60. package/dist/src/Gate.js +189 -0
  61. package/dist/src/Gate.js.map +1 -0
  62. package/dist/src/Middleware/Authorize.d.ts +13 -0
  63. package/dist/src/Middleware/Authorize.d.ts.map +1 -0
  64. package/dist/src/Middleware/Authorize.js +51 -0
  65. package/dist/src/Middleware/Authorize.js.map +1 -0
  66. package/dist/src/PolicyResolver.d.ts +21 -0
  67. package/dist/src/PolicyResolver.d.ts.map +1 -0
  68. package/dist/src/PolicyResolver.js +67 -0
  69. package/dist/src/PolicyResolver.js.map +1 -0
  70. package/dist/src/RolePermission.d.ts +36 -0
  71. package/dist/src/RolePermission.d.ts.map +1 -0
  72. package/dist/src/RolePermission.js +59 -0
  73. package/dist/src/RolePermission.js.map +1 -0
  74. package/dist/src/index.d.ts +10 -0
  75. package/dist/src/index.d.ts.map +1 -0
  76. package/dist/src/index.js +26 -0
  77. package/dist/src/index.js.map +1 -0
  78. package/dist/tests/Authorization.test.d.ts +2 -0
  79. package/dist/tests/Authorization.test.d.ts.map +1 -0
  80. package/dist/tests/Authorization.test.js +236 -0
  81. package/dist/tests/Authorization.test.js.map +1 -0
  82. package/package.json +44 -42
@@ -0,0 +1,236 @@
1
+ "use strict";
2
+ var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
3
+ if (k2 === undefined) k2 = k;
4
+ var desc = Object.getOwnPropertyDescriptor(m, k);
5
+ if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
6
+ desc = { enumerable: true, get: function() { return m[k]; } };
7
+ }
8
+ Object.defineProperty(o, k2, desc);
9
+ }) : (function(o, m, k, k2) {
10
+ if (k2 === undefined) k2 = k;
11
+ o[k2] = m[k];
12
+ }));
13
+ var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
14
+ Object.defineProperty(o, "default", { enumerable: true, value: v });
15
+ }) : function(o, v) {
16
+ o["default"] = v;
17
+ });
18
+ var __importStar = (this && this.__importStar) || (function () {
19
+ var ownKeys = function(o) {
20
+ ownKeys = Object.getOwnPropertyNames || function (o) {
21
+ var ar = [];
22
+ for (var k in o) if (Object.prototype.hasOwnProperty.call(o, k)) ar[ar.length] = k;
23
+ return ar;
24
+ };
25
+ return ownKeys(o);
26
+ };
27
+ return function (mod) {
28
+ if (mod && mod.__esModule) return mod;
29
+ var result = {};
30
+ if (mod != null) for (var k = ownKeys(mod), i = 0; i < k.length; i++) if (k[i] !== "default") __createBinding(result, mod, k[i]);
31
+ __setModuleDefault(result, mod);
32
+ return result;
33
+ };
34
+ })();
35
+ Object.defineProperty(exports, "__esModule", { value: true });
36
+ const node_test_1 = require("node:test");
37
+ const assert = __importStar(require("node:assert"));
38
+ const src_1 = require("../src/index");
39
+ class Post {
40
+ constructor(id, userId, title) {
41
+ this.id = id;
42
+ this.userId = userId;
43
+ this.title = title;
44
+ }
45
+ }
46
+ class PostPolicy {
47
+ before(user, ability) {
48
+ if (user.isSuperAdmin)
49
+ return true; // Super admin bypass
50
+ return null; // Continue to normal check
51
+ }
52
+ view(user, post) {
53
+ return true;
54
+ }
55
+ update(user, post) {
56
+ return user.id === post.userId;
57
+ }
58
+ delete(user, post) {
59
+ if (user.id !== post.userId) {
60
+ return src_1.AuthResponse.deny('You do not own this post.', 'POST_NOT_OWNED');
61
+ }
62
+ return src_1.AuthResponse.allow();
63
+ }
64
+ }
65
+ (0, node_test_1.describe)('Arika Authorization', () => {
66
+ const user = { id: 1, name: 'John', isAdmin: false, isSuperAdmin: false, roles: ['editor'], permissions: ['view-posts'] };
67
+ const adminUser = { id: 2, name: 'Admin', isAdmin: true, isSuperAdmin: false, roles: ['admin', 'editor'], permissions: ['view-posts', 'edit-posts', 'delete-posts'] };
68
+ const superAdmin = { id: 3, name: 'SuperAdmin', isSuperAdmin: true, roles: ['super-admin'], permissions: [] };
69
+ const post = new Post(1, 1, 'Test Post');
70
+ const otherPost = new Post(2, 2, 'Other Post');
71
+ (0, node_test_1.beforeEach)(() => {
72
+ src_1.Gate.reset();
73
+ });
74
+ (0, node_test_1.afterEach)(() => {
75
+ src_1.Gate.reset();
76
+ });
77
+ // ── Basic Gate Tests ────────────────────────────────────────────
78
+ (0, node_test_1.it)('defines and checks gates', async () => {
79
+ src_1.Gate.define('edit-post', (user, post) => user.id === post.userId);
80
+ const canEdit = await src_1.Gate.forUser(user).allows('edit-post', post);
81
+ assert.strictEqual(canEdit, true);
82
+ const cannotEdit = await src_1.Gate.forUser(user).allows('edit-post', otherPost);
83
+ assert.strictEqual(cannotEdit, false);
84
+ });
85
+ (0, node_test_1.it)('denies unauthorized actions', async () => {
86
+ src_1.Gate.define('delete-post', (user) => user.isAdmin);
87
+ const denied = await src_1.Gate.forUser(user).denies('delete-post', post);
88
+ assert.strictEqual(denied, true);
89
+ const allowed = await src_1.Gate.forUser(adminUser).denies('delete-post', post);
90
+ assert.strictEqual(allowed, false);
91
+ });
92
+ // ── Policy Tests ────────────────────────────────────────────────
93
+ (0, node_test_1.it)('works with policies', async () => {
94
+ src_1.Gate.policy(Post, PostPolicy);
95
+ const canView = await src_1.Gate.forUser(user).allows('view', post);
96
+ assert.strictEqual(canView, true);
97
+ const canUpdate = await src_1.Gate.forUser(user).allows('update', post);
98
+ assert.strictEqual(canUpdate, true);
99
+ const cannotUpdate = await src_1.Gate.forUser(user).allows('update', otherPost);
100
+ assert.strictEqual(cannotUpdate, false);
101
+ });
102
+ // ── Feature 2: before() / after() Hooks ─────────────────────────
103
+ (0, node_test_1.it)('runs before() hook on policy for super admin bypass', async () => {
104
+ src_1.Gate.policy(Post, PostPolicy);
105
+ // SuperAdmin can update ANY post via before() returning true
106
+ const canUpdate = await src_1.Gate.forUser(superAdmin).allows('update', otherPost);
107
+ assert.strictEqual(canUpdate, true);
108
+ // Regular user cannot
109
+ const cannotUpdate = await src_1.Gate.forUser(user).allows('update', otherPost);
110
+ assert.strictEqual(cannotUpdate, false);
111
+ });
112
+ (0, node_test_1.it)('runs global before() hook', async () => {
113
+ src_1.Gate.before((user) => {
114
+ if (user.isSuperAdmin)
115
+ return true;
116
+ return null;
117
+ });
118
+ src_1.Gate.define('admin-only', (user) => user.isAdmin);
119
+ // Super admin bypasses everything
120
+ const allowed = await src_1.Gate.forUser(superAdmin).allows('admin-only');
121
+ assert.strictEqual(allowed, true);
122
+ // Regular user denied
123
+ const denied = await src_1.Gate.forUser(user).allows('admin-only');
124
+ assert.strictEqual(denied, false);
125
+ });
126
+ (0, node_test_1.it)('runs after() hook for auditing', async () => {
127
+ let auditLog = [];
128
+ src_1.Gate.after((user, ability, result) => {
129
+ auditLog.push({ ability, result });
130
+ });
131
+ src_1.Gate.define('edit-post', (user, post) => user.id === post.userId);
132
+ await src_1.Gate.forUser(user).allows('edit-post', post);
133
+ await src_1.Gate.forUser(user).allows('edit-post', otherPost);
134
+ assert.strictEqual(auditLog.length, 2);
135
+ assert.strictEqual(auditLog[0].result, true);
136
+ assert.strictEqual(auditLog[1].result, false);
137
+ });
138
+ // ── Feature 3: Bulk Checks ──────────────────────────────────────
139
+ (0, node_test_1.it)('Gate.any() checks if user has any of the abilities', async () => {
140
+ src_1.Gate.define('edit-post', (user, post) => user.id === post.userId);
141
+ src_1.Gate.define('delete-post', (user) => user.isAdmin);
142
+ const hasAny = await src_1.Gate.forUser(user).any(['edit-post', 'delete-post'], post);
143
+ assert.strictEqual(hasAny, true); // can edit-post
144
+ const hasNone = await src_1.Gate.forUser({ id: 999, isAdmin: false }).any(['edit-post', 'delete-post'], post);
145
+ assert.strictEqual(hasNone, false);
146
+ });
147
+ (0, node_test_1.it)('Gate.every() checks if user has all abilities', async () => {
148
+ src_1.Gate.define('edit-post', (user, post) => user.id === post.userId);
149
+ src_1.Gate.define('publish-post', () => true);
150
+ const hasAll = await src_1.Gate.forUser(user).every(['edit-post', 'publish-post'], post);
151
+ assert.strictEqual(hasAll, true);
152
+ src_1.Gate.define('admin-only', (user) => user.isAdmin);
153
+ const notAll = await src_1.Gate.forUser(user).every(['edit-post', 'admin-only'], post);
154
+ assert.strictEqual(notAll, false);
155
+ });
156
+ (0, node_test_1.it)('Gate.none() checks that user has none of the abilities', async () => {
157
+ src_1.Gate.define('admin-only', (user) => user.isAdmin);
158
+ src_1.Gate.define('super-admin-only', (user) => user.isSuperAdmin);
159
+ const noneForUser = await src_1.Gate.forUser(user).none(['admin-only', 'super-admin-only']);
160
+ assert.strictEqual(noneForUser, true);
161
+ const noneForAdmin = await src_1.Gate.forUser(adminUser).none(['admin-only', 'super-admin-only']);
162
+ assert.strictEqual(noneForAdmin, false);
163
+ });
164
+ // ── Feature 4: Response-Based Authorization ─────────────────────
165
+ (0, node_test_1.it)('returns custom deny message via AuthResponse', async () => {
166
+ src_1.Gate.policy(Post, PostPolicy);
167
+ const response = await src_1.Gate.forUser(user).inspect('delete', otherPost);
168
+ assert.strictEqual(response.denied(), true);
169
+ assert.strictEqual(response.message(), 'You do not own this post.');
170
+ assert.strictEqual(response.code(), 'POST_NOT_OWNED');
171
+ const allowResponse = await src_1.Gate.forUser(user).inspect('delete', post);
172
+ assert.strictEqual(allowResponse.allowed(), true);
173
+ });
174
+ (0, node_test_1.it)('throws exception with custom message from AuthResponse', async () => {
175
+ src_1.Gate.policy(Post, PostPolicy);
176
+ await assert.rejects(async () => await src_1.Gate.forUser(user).authorize('delete', otherPost), (err) => {
177
+ assert.strictEqual(err.message, 'You do not own this post.');
178
+ assert.strictEqual(err.code, 'POST_NOT_OWNED');
179
+ return true;
180
+ });
181
+ });
182
+ // ── Feature 5: Request-Scoped Context ───────────────────────────
183
+ (0, node_test_1.it)('AuthorizationContext provides isolated per-request checks', async () => {
184
+ src_1.Gate.define('edit-post', (user, post) => user.id === post.userId);
185
+ const ctx1 = new src_1.AuthorizationContext(user);
186
+ const ctx2 = new src_1.AuthorizationContext(adminUser);
187
+ const can1 = await ctx1.can('edit-post', post);
188
+ assert.strictEqual(can1, true);
189
+ const can2 = await ctx2.can('edit-post', post);
190
+ assert.strictEqual(can2, false); // adminUser.id !== post.userId
191
+ });
192
+ (0, node_test_1.it)('AuthorizationContext caches results within a request', async () => {
193
+ let callCount = 0;
194
+ src_1.Gate.define('counted-gate', (user) => {
195
+ callCount++;
196
+ return true;
197
+ });
198
+ const ctx = new src_1.AuthorizationContext(user);
199
+ await ctx.can('counted-gate');
200
+ await ctx.can('counted-gate'); // should be cached
201
+ assert.strictEqual(callCount, 1); // Only called once
202
+ });
203
+ // ── Feature 1: Role & Permission ────────────────────────────────
204
+ (0, node_test_1.it)('checks roles via RolePermissionMixin', () => {
205
+ assert.strictEqual(src_1.RolePermissionMixin.hasRole(user, 'editor'), true);
206
+ assert.strictEqual(src_1.RolePermissionMixin.hasRole(user, 'admin'), false);
207
+ assert.strictEqual(src_1.RolePermissionMixin.hasAnyRole(adminUser, ['admin', 'super-admin']), true);
208
+ assert.strictEqual(src_1.RolePermissionMixin.hasAllRoles(adminUser, ['admin', 'editor']), true);
209
+ assert.strictEqual(src_1.RolePermissionMixin.hasAllRoles(adminUser, ['admin', 'super-admin']), false);
210
+ });
211
+ (0, node_test_1.it)('checks permissions via RolePermissionMixin', () => {
212
+ assert.strictEqual(src_1.RolePermissionMixin.hasPermission(user, 'view-posts'), true);
213
+ assert.strictEqual(src_1.RolePermissionMixin.hasPermission(user, 'delete-posts'), false);
214
+ assert.strictEqual(src_1.RolePermissionMixin.hasAnyPermission(adminUser, ['edit-posts', 'nuke-server']), true);
215
+ assert.strictEqual(src_1.RolePermissionMixin.hasAllPermissions(adminUser, ['view-posts', 'edit-posts', 'delete-posts']), true);
216
+ });
217
+ (0, node_test_1.it)('checks roles/permissions via AuthorizationContext', () => {
218
+ const ctx = new src_1.AuthorizationContext(adminUser);
219
+ assert.strictEqual(ctx.hasRole('admin'), true);
220
+ assert.strictEqual(ctx.hasAnyRole(['admin', 'super-admin']), true);
221
+ assert.strictEqual(ctx.hasPermission('edit-posts'), true);
222
+ assert.strictEqual(ctx.hasAllPermissions(['view-posts', 'edit-posts']), true);
223
+ });
224
+ // ── AuthorizationManager ────────────────────────────────────────
225
+ (0, node_test_1.it)('AuthorizationManager delegates to context', async () => {
226
+ src_1.Gate.define('edit-post', (user, post) => user.id === post.userId);
227
+ const authz = new src_1.AuthorizationManager(user);
228
+ const can = await authz.can('edit-post', post);
229
+ assert.strictEqual(can, true);
230
+ const cannot = await authz.cannot('edit-post', otherPost);
231
+ assert.strictEqual(cannot, true);
232
+ assert.strictEqual(authz.hasRole('editor'), true);
233
+ assert.strictEqual(authz.hasPermission('view-posts'), true);
234
+ });
235
+ });
236
+ //# sourceMappingURL=Authorization.test.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"Authorization.test.js","sourceRoot":"","sources":["../../tests/Authorization.test.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA,yCAAgE;AAChE,oDAAsC;AACtC,gCAQgB;AAEhB,MAAM,IAAI;IACN,YAAmB,EAAU,EAAS,MAAc,EAAS,KAAa;QAAvD,OAAE,GAAF,EAAE,CAAQ;QAAS,WAAM,GAAN,MAAM,CAAQ;QAAS,UAAK,GAAL,KAAK,CAAQ;IAAI,CAAC;CAClF;AAED,MAAM,UAAU;IACZ,MAAM,CAAC,IAAS,EAAE,OAAe;QAC7B,IAAI,IAAI,CAAC,YAAY;YAAE,OAAO,IAAI,CAAC,CAAE,qBAAqB;QAC1D,OAAO,IAAI,CAAC,CAAC,2BAA2B;IAC5C,CAAC;IAED,IAAI,CAAC,IAAS,EAAE,IAAU;QACtB,OAAO,IAAI,CAAC;IAChB,CAAC;IAED,MAAM,CAAC,IAAS,EAAE,IAAU;QACxB,OAAO,IAAI,CAAC,EAAE,KAAK,IAAI,CAAC,MAAM,CAAC;IACnC,CAAC;IAED,MAAM,CAAC,IAAS,EAAE,IAAU;QACxB,IAAI,IAAI,CAAC,EAAE,KAAK,IAAI,CAAC,MAAM,EAAE,CAAC;YAC1B,OAAO,kBAAY,CAAC,IAAI,CAAC,2BAA2B,EAAE,gBAAgB,CAAC,CAAC;QAC5E,CAAC;QACD,OAAO,kBAAY,CAAC,KAAK,EAAE,CAAC;IAChC,CAAC;CACJ;AAED,IAAA,oBAAQ,EAAC,qBAAqB,EAAE,GAAG,EAAE;IACjC,MAAM,IAAI,GAAG,EAAE,EAAE,EAAE,CAAC,EAAE,IAAI,EAAE,MAAM,EAAE,OAAO,EAAE,KAAK,EAAE,YAAY,EAAE,KAAK,EAAE,KAAK,EAAE,CAAC,QAAQ,CAAC,EAAE,WAAW,EAAE,CAAC,YAAY,CAAC,EAAE,CAAC;IAC1H,MAAM,SAAS,GAAG,EAAE,EAAE,EAAE,CAAC,EAAE,IAAI,EAAE,OAAO,EAAE,OAAO,EAAE,IAAI,EAAE,YAAY,EAAE,KAAK,EAAE,KAAK,EAAE,CAAC,OAAO,EAAE,QAAQ,CAAC,EAAE,WAAW,EAAE,CAAC,YAAY,EAAE,YAAY,EAAE,cAAc,CAAC,EAAE,CAAC;IACtK,MAAM,UAAU,GAAG,EAAE,EAAE,EAAE,CAAC,EAAE,IAAI,EAAE,YAAY,EAAE,YAAY,EAAE,IAAI,EAAE,KAAK,EAAE,CAAC,aAAa,CAAC,EAAE,WAAW,EAAE,EAAE,EAAE,CAAC;IAC9G,MAAM,IAAI,GAAG,IAAI,IAAI,CAAC,CAAC,EAAE,CAAC,EAAE,WAAW,CAAC,CAAC;IACzC,MAAM,SAAS,GAAG,IAAI,IAAI,CAAC,CAAC,EAAE,CAAC,EAAE,YAAY,CAAC,CAAC;IAE/C,IAAA,sBAAU,EAAC,GAAG,EAAE;QACZ,UAAI,CAAC,KAAK,EAAE,CAAC;IACjB,CAAC,CAAC,CAAC;IAEH,IAAA,qBAAS,EAAC,GAAG,EAAE;QACX,UAAI,CAAC,KAAK,EAAE,CAAC;IACjB,CAAC,CAAC,CAAC;IAEH,mEAAmE;IAEnE,IAAA,cAAE,EAAC,0BAA0B,EAAE,KAAK,IAAI,EAAE;QACtC,UAAI,CAAC,MAAM,CAAC,WAAW,EAAE,CAAC,IAAI,EAAE,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,EAAE,KAAK,IAAI,CAAC,MAAM,CAAC,CAAC;QAElE,MAAM,OAAO,GAAG,MAAM,UAAI,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC,MAAM,CAAC,WAAW,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,CAAC,WAAW,CAAC,OAAO,EAAE,IAAI,CAAC,CAAC;QAElC,MAAM,UAAU,GAAG,MAAM,UAAI,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC,MAAM,CAAC,WAAW,EAAE,SAAS,CAAC,CAAC;QAC3E,MAAM,CAAC,WAAW,CAAC,UAAU,EAAE,KAAK,CAAC,CAAC;IAC1C,CAAC,CAAC,CAAC;IAEH,IAAA,cAAE,EAAC,6BAA6B,EAAE,KAAK,IAAI,EAAE;QACzC,UAAI,CAAC,MAAM,CAAC,aAAa,EAAE,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC;QAEnD,MAAM,MAAM,GAAG,MAAM,UAAI,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC,MAAM,CAAC,aAAa,EAAE,IAAI,CAAC,CAAC;QACpE,MAAM,CAAC,WAAW,CAAC,MAAM,EAAE,IAAI,CAAC,CAAC;QAEjC,MAAM,OAAO,GAAG,MAAM,UAAI,CAAC,OAAO,CAAC,SAAS,CAAC,CAAC,MAAM,CAAC,aAAa,EAAE,IAAI,CAAC,CAAC;QAC1E,MAAM,CAAC,WAAW,CAAC,OAAO,EAAE,KAAK,CAAC,CAAC;IACvC,CAAC,CAAC,CAAC;IAEH,mEAAmE;IAEnE,IAAA,cAAE,EAAC,qBAAqB,EAAE,KAAK,IAAI,EAAE;QACjC,UAAI,CAAC,MAAM,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAE9B,MAAM,OAAO,GAAG,MAAM,UAAI,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC,MAAM,CAAC,MAAM,EAAE,IAAI,CAAC,CAAC;QAC9D,MAAM,CAAC,WAAW,CAAC,OAAO,EAAE,IAAI,CAAC,CAAC;QAElC,MAAM,SAAS,GAAG,MAAM,UAAI,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC,MAAM,CAAC,QAAQ,EAAE,IAAI,CAAC,CAAC;QAClE,MAAM,CAAC,WAAW,CAAC,SAAS,EAAE,IAAI,CAAC,CAAC;QAEpC,MAAM,YAAY,GAAG,MAAM,UAAI,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC,MAAM,CAAC,QAAQ,EAAE,SAAS,CAAC,CAAC;QAC1E,MAAM,CAAC,WAAW,CAAC,YAAY,EAAE,KAAK,CAAC,CAAC;IAC5C,CAAC,CAAC,CAAC;IAEH,mEAAmE;IAEnE,IAAA,cAAE,EAAC,qDAAqD,EAAE,KAAK,IAAI,EAAE;QACjE,UAAI,CAAC,MAAM,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAE9B,6DAA6D;QAC7D,MAAM,SAAS,GAAG,MAAM,UAAI,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC,MAAM,CAAC,QAAQ,EAAE,SAAS,CAAC,CAAC;QAC7E,MAAM,CAAC,WAAW,CAAC,SAAS,EAAE,IAAI,CAAC,CAAC;QAEpC,sBAAsB;QACtB,MAAM,YAAY,GAAG,MAAM,UAAI,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC,MAAM,CAAC,QAAQ,EAAE,SAAS,CAAC,CAAC;QAC1E,MAAM,CAAC,WAAW,CAAC,YAAY,EAAE,KAAK,CAAC,CAAC;IAC5C,CAAC,CAAC,CAAC;IAEH,IAAA,cAAE,EAAC,2BAA2B,EAAE,KAAK,IAAI,EAAE;QACvC,UAAI,CAAC,MAAM,CAAC,CAAC,IAAI,EAAE,EAAE;YACjB,IAAI,IAAI,CAAC,YAAY;gBAAE,OAAO,IAAI,CAAC;YACnC,OAAO,IAAI,CAAC;QAChB,CAAC,CAAC,CAAC;QAEH,UAAI,CAAC,MAAM,CAAC,YAAY,EAAE,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC;QAElD,kCAAkC;QAClC,MAAM,OAAO,GAAG,MAAM,UAAI,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC,MAAM,CAAC,YAAY,CAAC,CAAC;QACpE,MAAM,CAAC,WAAW,CAAC,OAAO,EAAE,IAAI,CAAC,CAAC;QAElC,sBAAsB;QACtB,MAAM,MAAM,GAAG,MAAM,UAAI,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC,MAAM,CAAC,YAAY,CAAC,CAAC;QAC7D,MAAM,CAAC,WAAW,CAAC,MAAM,EAAE,KAAK,CAAC,CAAC;IACtC,CAAC,CAAC,CAAC;IAEH,IAAA,cAAE,EAAC,gCAAgC,EAAE,KAAK,IAAI,EAAE;QAC5C,IAAI,QAAQ,GAA2C,EAAE,CAAC;QAE1D,UAAI,CAAC,KAAK,CAAC,CAAC,IAAI,EAAE,OAAO,EAAE,MAAM,EAAE,EAAE;YACjC,QAAQ,CAAC,IAAI,CAAC,EAAE,OAAO,EAAE,MAAM,EAAE,CAAC,CAAC;QACvC,CAAC,CAAC,CAAC;QAEH,UAAI,CAAC,MAAM,CAAC,WAAW,EAAE,CAAC,IAAI,EAAE,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,EAAE,KAAK,IAAI,CAAC,MAAM,CAAC,CAAC;QAElE,MAAM,UAAI,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC,MAAM,CAAC,WAAW,EAAE,IAAI,CAAC,CAAC;QACnD,MAAM,UAAI,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC,MAAM,CAAC,WAAW,EAAE,SAAS,CAAC,CAAC;QAExD,MAAM,CAAC,WAAW,CAAC,QAAQ,CAAC,MAAM,EAAE,CAAC,CAAC,CAAC;QACvC,MAAM,CAAC,WAAW,CAAC,QAAQ,CAAC,CAAC,CAAC,CAAC,MAAM,EAAE,IAAI,CAAC,CAAC;QAC7C,MAAM,CAAC,WAAW,CAAC,QAAQ,CAAC,CAAC,CAAC,CAAC,MAAM,EAAE,KAAK,CAAC,CAAC;IAClD,CAAC,CAAC,CAAC;IAEH,mEAAmE;IAEnE,IAAA,cAAE,EAAC,oDAAoD,EAAE,KAAK,IAAI,EAAE;QAChE,UAAI,CAAC,MAAM,CAAC,WAAW,EAAE,CAAC,IAAI,EAAE,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,EAAE,KAAK,IAAI,CAAC,MAAM,CAAC,CAAC;QAClE,UAAI,CAAC,MAAM,CAAC,aAAa,EAAE,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC;QAEnD,MAAM,MAAM,GAAG,MAAM,UAAI,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC,GAAG,CAAC,CAAC,WAAW,EAAE,aAAa,CAAC,EAAE,IAAI,CAAC,CAAC;QAChF,MAAM,CAAC,WAAW,CAAC,MAAM,EAAE,IAAI,CAAC,CAAC,CAAC,gBAAgB;QAElD,MAAM,OAAO,GAAG,MAAM,UAAI,CAAC,OAAO,CAAC,EAAE,EAAE,EAAE,GAAG,EAAE,OAAO,EAAE,KAAK,EAAE,CAAC,CAAC,GAAG,CAAC,CAAC,WAAW,EAAE,aAAa,CAAC,EAAE,IAAI,CAAC,CAAC;QACxG,MAAM,CAAC,WAAW,CAAC,OAAO,EAAE,KAAK,CAAC,CAAC;IACvC,CAAC,CAAC,CAAC;IAEH,IAAA,cAAE,EAAC,+CAA+C,EAAE,KAAK,IAAI,EAAE;QAC3D,UAAI,CAAC,MAAM,CAAC,WAAW,EAAE,CAAC,IAAI,EAAE,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,EAAE,KAAK,IAAI,CAAC,MAAM,CAAC,CAAC;QAClE,UAAI,CAAC,MAAM,CAAC,cAAc,EAAE,GAAG,EAAE,CAAC,IAAI,CAAC,CAAC;QAExC,MAAM,MAAM,GAAG,MAAM,UAAI,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,WAAW,EAAE,cAAc,CAAC,EAAE,IAAI,CAAC,CAAC;QACnF,MAAM,CAAC,WAAW,CAAC,MAAM,EAAE,IAAI,CAAC,CAAC;QAEjC,UAAI,CAAC,MAAM,CAAC,YAAY,EAAE,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC;QAClD,MAAM,MAAM,GAAG,MAAM,UAAI,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,WAAW,EAAE,YAAY,CAAC,EAAE,IAAI,CAAC,CAAC;QACjF,MAAM,CAAC,WAAW,CAAC,MAAM,EAAE,KAAK,CAAC,CAAC;IACtC,CAAC,CAAC,CAAC;IAEH,IAAA,cAAE,EAAC,wDAAwD,EAAE,KAAK,IAAI,EAAE;QACpE,UAAI,CAAC,MAAM,CAAC,YAAY,EAAE,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC;QAClD,UAAI,CAAC,MAAM,CAAC,kBAAkB,EAAE,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC;QAE7D,MAAM,WAAW,GAAG,MAAM,UAAI,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC,IAAI,CAAC,CAAC,YAAY,EAAE,kBAAkB,CAAC,CAAC,CAAC;QACtF,MAAM,CAAC,WAAW,CAAC,WAAW,EAAE,IAAI,CAAC,CAAC;QAEtC,MAAM,YAAY,GAAG,MAAM,UAAI,CAAC,OAAO,CAAC,SAAS,CAAC,CAAC,IAAI,CAAC,CAAC,YAAY,EAAE,kBAAkB,CAAC,CAAC,CAAC;QAC5F,MAAM,CAAC,WAAW,CAAC,YAAY,EAAE,KAAK,CAAC,CAAC;IAC5C,CAAC,CAAC,CAAC;IAEH,mEAAmE;IAEnE,IAAA,cAAE,EAAC,8CAA8C,EAAE,KAAK,IAAI,EAAE;QAC1D,UAAI,CAAC,MAAM,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAE9B,MAAM,QAAQ,GAAG,MAAM,UAAI,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC,OAAO,CAAC,QAAQ,EAAE,SAAS,CAAC,CAAC;QACvE,MAAM,CAAC,WAAW,CAAC,QAAQ,CAAC,MAAM,EAAE,EAAE,IAAI,CAAC,CAAC;QAC5C,MAAM,CAAC,WAAW,CAAC,QAAQ,CAAC,OAAO,EAAE,EAAE,2BAA2B,CAAC,CAAC;QACpE,MAAM,CAAC,WAAW,CAAC,QAAQ,CAAC,IAAI,EAAE,EAAE,gBAAgB,CAAC,CAAC;QAEtD,MAAM,aAAa,GAAG,MAAM,UAAI,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC,OAAO,CAAC,QAAQ,EAAE,IAAI,CAAC,CAAC;QACvE,MAAM,CAAC,WAAW,CAAC,aAAa,CAAC,OAAO,EAAE,EAAE,IAAI,CAAC,CAAC;IACtD,CAAC,CAAC,CAAC;IAEH,IAAA,cAAE,EAAC,wDAAwD,EAAE,KAAK,IAAI,EAAE;QACpE,UAAI,CAAC,MAAM,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAE9B,MAAM,MAAM,CAAC,OAAO,CAChB,KAAK,IAAI,EAAE,CAAC,MAAM,UAAI,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC,SAAS,CAAC,QAAQ,EAAE,SAAS,CAAC,EACnE,CAAC,GAAQ,EAAE,EAAE;YACT,MAAM,CAAC,WAAW,CAAC,GAAG,CAAC,OAAO,EAAE,2BAA2B,CAAC,CAAC;YAC7D,MAAM,CAAC,WAAW,CAAC,GAAG,CAAC,IAAI,EAAE,gBAAgB,CAAC,CAAC;YAC/C,OAAO,IAAI,CAAC;QAChB,CAAC,CACJ,CAAC;IACN,CAAC,CAAC,CAAC;IAEH,mEAAmE;IAEnE,IAAA,cAAE,EAAC,2DAA2D,EAAE,KAAK,IAAI,EAAE;QACvE,UAAI,CAAC,MAAM,CAAC,WAAW,EAAE,CAAC,IAAI,EAAE,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,EAAE,KAAK,IAAI,CAAC,MAAM,CAAC,CAAC;QAElE,MAAM,IAAI,GAAG,IAAI,0BAAoB,CAAC,IAAI,CAAC,CAAC;QAC5C,MAAM,IAAI,GAAG,IAAI,0BAAoB,CAAC,SAAS,CAAC,CAAC;QAEjD,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,GAAG,CAAC,WAAW,EAAE,IAAI,CAAC,CAAC;QAC/C,MAAM,CAAC,WAAW,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;QAE/B,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,GAAG,CAAC,WAAW,EAAE,IAAI,CAAC,CAAC;QAC/C,MAAM,CAAC,WAAW,CAAC,IAAI,EAAE,KAAK,CAAC,CAAC,CAAC,+BAA+B;IACpE,CAAC,CAAC,CAAC;IAEH,IAAA,cAAE,EAAC,sDAAsD,EAAE,KAAK,IAAI,EAAE;QAClE,IAAI,SAAS,GAAG,CAAC,CAAC;QAClB,UAAI,CAAC,MAAM,CAAC,cAAc,EAAE,CAAC,IAAI,EAAE,EAAE;YACjC,SAAS,EAAE,CAAC;YACZ,OAAO,IAAI,CAAC;QAChB,CAAC,CAAC,CAAC;QAEH,MAAM,GAAG,GAAG,IAAI,0BAAoB,CAAC,IAAI,CAAC,CAAC;QAE3C,MAAM,GAAG,CAAC,GAAG,CAAC,cAAc,CAAC,CAAC;QAC9B,MAAM,GAAG,CAAC,GAAG,CAAC,cAAc,CAAC,CAAC,CAAC,mBAAmB;QAElD,MAAM,CAAC,WAAW,CAAC,SAAS,EAAE,CAAC,CAAC,CAAC,CAAC,mBAAmB;IACzD,CAAC,CAAC,CAAC;IAEH,mEAAmE;IAEnE,IAAA,cAAE,EAAC,sCAAsC,EAAE,GAAG,EAAE;QAC5C,MAAM,CAAC,WAAW,CAAC,yBAAmB,CAAC,OAAO,CAAC,IAAI,EAAE,QAAQ,CAAC,EAAE,IAAI,CAAC,CAAC;QACtE,MAAM,CAAC,WAAW,CAAC,yBAAmB,CAAC,OAAO,CAAC,IAAI,EAAE,OAAO,CAAC,EAAE,KAAK,CAAC,CAAC;QAEtE,MAAM,CAAC,WAAW,CAAC,yBAAmB,CAAC,UAAU,CAAC,SAAS,EAAE,CAAC,OAAO,EAAE,aAAa,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC;QAC9F,MAAM,CAAC,WAAW,CAAC,yBAAmB,CAAC,WAAW,CAAC,SAAS,EAAE,CAAC,OAAO,EAAE,QAAQ,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC;QAC1F,MAAM,CAAC,WAAW,CAAC,yBAAmB,CAAC,WAAW,CAAC,SAAS,EAAE,CAAC,OAAO,EAAE,aAAa,CAAC,CAAC,EAAE,KAAK,CAAC,CAAC;IACpG,CAAC,CAAC,CAAC;IAEH,IAAA,cAAE,EAAC,4CAA4C,EAAE,GAAG,EAAE;QAClD,MAAM,CAAC,WAAW,CAAC,yBAAmB,CAAC,aAAa,CAAC,IAAI,EAAE,YAAY,CAAC,EAAE,IAAI,CAAC,CAAC;QAChF,MAAM,CAAC,WAAW,CAAC,yBAAmB,CAAC,aAAa,CAAC,IAAI,EAAE,cAAc,CAAC,EAAE,KAAK,CAAC,CAAC;QAEnF,MAAM,CAAC,WAAW,CAAC,yBAAmB,CAAC,gBAAgB,CAAC,SAAS,EAAE,CAAC,YAAY,EAAE,aAAa,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC;QACzG,MAAM,CAAC,WAAW,CAAC,yBAAmB,CAAC,iBAAiB,CAAC,SAAS,EAAE,CAAC,YAAY,EAAE,YAAY,EAAE,cAAc,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC;IAC7H,CAAC,CAAC,CAAC;IAEH,IAAA,cAAE,EAAC,mDAAmD,EAAE,GAAG,EAAE;QACzD,MAAM,GAAG,GAAG,IAAI,0BAAoB,CAAC,SAAS,CAAC,CAAC;QAEhD,MAAM,CAAC,WAAW,CAAC,GAAG,CAAC,OAAO,CAAC,OAAO,CAAC,EAAE,IAAI,CAAC,CAAC;QAC/C,MAAM,CAAC,WAAW,CAAC,GAAG,CAAC,UAAU,CAAC,CAAC,OAAO,EAAE,aAAa,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,CAAC,WAAW,CAAC,GAAG,CAAC,aAAa,CAAC,YAAY,CAAC,EAAE,IAAI,CAAC,CAAC;QAC1D,MAAM,CAAC,WAAW,CAAC,GAAG,CAAC,iBAAiB,CAAC,CAAC,YAAY,EAAE,YAAY,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC;IAClF,CAAC,CAAC,CAAC;IAEH,mEAAmE;IAEnE,IAAA,cAAE,EAAC,2CAA2C,EAAE,KAAK,IAAI,EAAE;QACvD,UAAI,CAAC,MAAM,CAAC,WAAW,EAAE,CAAC,IAAI,EAAE,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,EAAE,KAAK,IAAI,CAAC,MAAM,CAAC,CAAC;QAElE,MAAM,KAAK,GAAG,IAAI,0BAAoB,CAAC,IAAI,CAAC,CAAC;QAE7C,MAAM,GAAG,GAAG,MAAM,KAAK,CAAC,GAAG,CAAC,WAAW,EAAE,IAAI,CAAC,CAAC;QAC/C,MAAM,CAAC,WAAW,CAAC,GAAG,EAAE,IAAI,CAAC,CAAC;QAE9B,MAAM,MAAM,GAAG,MAAM,KAAK,CAAC,MAAM,CAAC,WAAW,EAAE,SAAS,CAAC,CAAC;QAC1D,MAAM,CAAC,WAAW,CAAC,MAAM,EAAE,IAAI,CAAC,CAAC;QAEjC,MAAM,CAAC,WAAW,CAAC,KAAK,CAAC,OAAO,CAAC,QAAQ,CAAC,EAAE,IAAI,CAAC,CAAC;QAClD,MAAM,CAAC,WAAW,CAAC,KAAK,CAAC,aAAa,CAAC,YAAY,CAAC,EAAE,IAAI,CAAC,CAAC;IAChE,CAAC,CAAC,CAAC;AACP,CAAC,CAAC,CAAC"}
package/package.json CHANGED
@@ -1,44 +1,46 @@
1
1
  {
2
- "name": "@arikajs/authorization",
3
- "version": "0.0.4",
4
- "description": "Authorization (access control) for the ArikaJS framework.",
5
- "license": "MIT",
6
- "main": "dist/index.js",
7
- "types": "dist/index.d.ts",
8
- "scripts": {
9
- "build": "tsc -p tsconfig.json",
10
- "build:tests": "tsc -p tsconfig.test.json",
11
- "clean": "rm -rf dist",
12
- "prepare": "echo skip",
13
- "test": "npm run build && npm run build:tests && node scripts/fix-test-imports.js && node --test 'dist/tests/**/*.test.js'",
14
- "test:watch": "npm run build && npm run build:tests && node --test --watch 'dist/tests/**/*.test.js'"
15
- },
16
- "files": [
17
- "dist"
18
- ],
19
- "keywords": [
20
- "arika",
21
- "arika-js",
22
- "framework",
23
- "authorization",
24
- "access-control",
25
- "policy",
26
- "gate"
27
- ],
28
- "engines": {
29
- "node": ">=20.0.0"
30
- },
31
- "repository": {
32
- "type": "git",
33
- "url": "git+https://github.com/arikajs/authorization.git"
34
- },
35
- "bugs": {
36
- "url": "https://github.com/arikajs/authorization/issues"
37
- },
38
- "homepage": "https://github.com/arikajs/authorization#readme",
39
- "devDependencies": {
40
- "@types/node": "^20.11.24",
41
- "typescript": "^5.3.3"
42
- },
43
- "author": "Prakash Tank"
2
+ "name": "@arikajs/authorization",
3
+ "version": "0.0.5",
4
+ "description": "Authorization (access control) for the ArikaJS framework.",
5
+ "license": "MIT",
6
+ "main": "dist/index.js",
7
+ "types": "dist/index.d.ts",
8
+ "scripts": {
9
+ "build": "tsc -p tsconfig.json",
10
+ "build:tests": "tsc -p tsconfig.test.json",
11
+ "clean": "rm -rf dist",
12
+ "prepare": "echo skip",
13
+ "test": "npm run build && npm run build:tests && node scripts/fix-test-imports.js && node --test 'dist/tests/**/*.test.js'",
14
+ "test:watch": "npm run build && npm run build:tests && node --test --watch 'dist/tests/**/*.test.js'",
15
+ "dev": "tsc -p tsconfig.json --watch"
16
+ },
17
+ "files": [
18
+ "dist"
19
+ ],
20
+ "keywords": [
21
+ "arika",
22
+ "arika-js",
23
+ "framework",
24
+ "authorization",
25
+ "access-control",
26
+ "policy",
27
+ "gate"
28
+ ],
29
+ "engines": {
30
+ "node": ">=20.0.0"
31
+ },
32
+ "repository": {
33
+ "type": "git",
34
+ "url": "git+https://github.com/ArikaJs/arikajs.git",
35
+ "directory": "packages/authorization"
36
+ },
37
+ "bugs": {
38
+ "url": "https://github.com/ArikaJs/arikajs/issues"
39
+ },
40
+ "homepage": "https://github.com/ArikaJs/arikajs/tree/main/packages/authorization#readme",
41
+ "devDependencies": {
42
+ "@types/node": "^20.11.24",
43
+ "typescript": "^5.3.3"
44
+ },
45
+ "author": "Prakash Tank"
44
46
  }