@factiii/auth 0.4.0 → 0.4.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist/index.d.mts CHANGED
@@ -6,8 +6,8 @@ import { PrismaClient } from '@prisma/client';
6
6
  import * as _trpc_server from '@trpc/server';
7
7
  import * as zod from 'zod';
8
8
  import { CreateHTTPContextOptions } from '@trpc/server/adapters/standalone';
9
- import { S as SchemaExtensions, A as AuthHooks } from './hooks-BXNxNK4S.mjs';
10
- export { C as ChangePasswordInput, L as LoginInput, O as OAuthLoginInput, R as ResetPasswordInput, a as SignupInput, T as TwoFaVerifyInput, V as VerifyEmailInput, b as biometricVerifySchema, c as changePasswordSchema, e as endAllSessionsSchema, l as loginSchema, o as oAuthLoginSchema, r as requestPasswordResetSchema, d as resetPasswordSchema, s as signupSchema, t as twoFaResetSchema, f as twoFaVerifySchema, v as verifyEmailSchema } from './hooks-BXNxNK4S.mjs';
9
+ import { S as SchemaExtensions, A as AuthHooks } from './hooks-yHGJ7C6_.mjs';
10
+ export { C as ChangePasswordInput, L as LoginInput, O as OAuthLoginInput, R as ResetPasswordInput, a as SignupInput, T as TwoFaVerifyInput, V as VerifyEmailInput, b as biometricVerifySchema, c as changePasswordSchema, e as endAllSessionsSchema, l as loginSchema, o as oAuthLoginSchema, r as requestPasswordResetSchema, d as resetPasswordSchema, s as signupSchema, t as twoFaResetSchema, f as twoFaVerifySchema, v as verifyEmailSchema } from './hooks-yHGJ7C6_.mjs';
11
11
 
12
12
  //# sourceMappingURL=TRPCError.d.ts.map
13
13
  //#endregion
@@ -659,12 +659,12 @@ declare function createAuthRouter<TExtensions extends SchemaExtensions = {}>(con
659
659
  email: zod.ZodString;
660
660
  password: zod.ZodEffects<zod.ZodString, string, string>;
661
661
  }, "strip", zod.ZodTypeAny, {
662
- email: string;
663
662
  username: string;
663
+ email: string;
664
664
  password: string;
665
665
  }, {
666
- email: string;
667
666
  username: string;
667
+ email: string;
668
668
  password: string;
669
669
  }>>["in"] extends infer T_7 ? T_7 extends inferParser<[TExtensions["signup"]] extends [zod.AnyZodObject] ? zod.ZodObject<{
670
670
  username: zod.ZodString;
@@ -683,12 +683,12 @@ declare function createAuthRouter<TExtensions extends SchemaExtensions = {}>(con
683
683
  email: zod.ZodString;
684
684
  password: zod.ZodEffects<zod.ZodString, string, string>;
685
685
  }, "strip", zod.ZodTypeAny, {
686
- email: string;
687
686
  username: string;
687
+ email: string;
688
688
  password: string;
689
689
  }, {
690
- email: string;
691
690
  username: string;
691
+ email: string;
692
692
  password: string;
693
693
  }>>["in"] ? T_7 extends _trpc_server.TRPCUnsetMarker ? void : T_7 : never : never;
694
694
  output: {
@@ -752,12 +752,17 @@ declare function createAuthRouter<TExtensions extends SchemaExtensions = {}>(con
752
752
  code?: string | undefined;
753
753
  }>>["in"] ? T_12 extends _trpc_server.TRPCUnsetMarker ? void : T_12 : never : never;
754
754
  output: {
755
+ success: boolean;
756
+ requires2FA: boolean;
757
+ user?: undefined;
758
+ } | {
755
759
  success: boolean;
756
760
  user: {
757
761
  id: number;
758
762
  email: string;
759
763
  username: string;
760
764
  };
765
+ requires2FA?: undefined;
761
766
  };
762
767
  meta: Meta;
763
768
  }>;
package/dist/index.d.ts CHANGED
@@ -6,8 +6,8 @@ import { PrismaClient } from '@prisma/client';
6
6
  import * as _trpc_server from '@trpc/server';
7
7
  import * as zod from 'zod';
8
8
  import { CreateHTTPContextOptions } from '@trpc/server/adapters/standalone';
9
- import { S as SchemaExtensions, A as AuthHooks } from './hooks-BXNxNK4S.js';
10
- export { C as ChangePasswordInput, L as LoginInput, O as OAuthLoginInput, R as ResetPasswordInput, a as SignupInput, T as TwoFaVerifyInput, V as VerifyEmailInput, b as biometricVerifySchema, c as changePasswordSchema, e as endAllSessionsSchema, l as loginSchema, o as oAuthLoginSchema, r as requestPasswordResetSchema, d as resetPasswordSchema, s as signupSchema, t as twoFaResetSchema, f as twoFaVerifySchema, v as verifyEmailSchema } from './hooks-BXNxNK4S.js';
9
+ import { S as SchemaExtensions, A as AuthHooks } from './hooks-yHGJ7C6_.js';
10
+ export { C as ChangePasswordInput, L as LoginInput, O as OAuthLoginInput, R as ResetPasswordInput, a as SignupInput, T as TwoFaVerifyInput, V as VerifyEmailInput, b as biometricVerifySchema, c as changePasswordSchema, e as endAllSessionsSchema, l as loginSchema, o as oAuthLoginSchema, r as requestPasswordResetSchema, d as resetPasswordSchema, s as signupSchema, t as twoFaResetSchema, f as twoFaVerifySchema, v as verifyEmailSchema } from './hooks-yHGJ7C6_.js';
11
11
 
12
12
  //# sourceMappingURL=TRPCError.d.ts.map
13
13
  //#endregion
@@ -659,12 +659,12 @@ declare function createAuthRouter<TExtensions extends SchemaExtensions = {}>(con
659
659
  email: zod.ZodString;
660
660
  password: zod.ZodEffects<zod.ZodString, string, string>;
661
661
  }, "strip", zod.ZodTypeAny, {
662
- email: string;
663
662
  username: string;
663
+ email: string;
664
664
  password: string;
665
665
  }, {
666
- email: string;
667
666
  username: string;
667
+ email: string;
668
668
  password: string;
669
669
  }>>["in"] extends infer T_7 ? T_7 extends inferParser<[TExtensions["signup"]] extends [zod.AnyZodObject] ? zod.ZodObject<{
670
670
  username: zod.ZodString;
@@ -683,12 +683,12 @@ declare function createAuthRouter<TExtensions extends SchemaExtensions = {}>(con
683
683
  email: zod.ZodString;
684
684
  password: zod.ZodEffects<zod.ZodString, string, string>;
685
685
  }, "strip", zod.ZodTypeAny, {
686
- email: string;
687
686
  username: string;
687
+ email: string;
688
688
  password: string;
689
689
  }, {
690
- email: string;
691
690
  username: string;
691
+ email: string;
692
692
  password: string;
693
693
  }>>["in"] ? T_7 extends _trpc_server.TRPCUnsetMarker ? void : T_7 : never : never;
694
694
  output: {
@@ -752,12 +752,17 @@ declare function createAuthRouter<TExtensions extends SchemaExtensions = {}>(con
752
752
  code?: string | undefined;
753
753
  }>>["in"] ? T_12 extends _trpc_server.TRPCUnsetMarker ? void : T_12 : never : never;
754
754
  output: {
755
+ success: boolean;
756
+ requires2FA: boolean;
757
+ user?: undefined;
758
+ } | {
755
759
  success: boolean;
756
760
  user: {
757
761
  id: number;
758
762
  email: string;
759
763
  username: string;
760
764
  };
765
+ requires2FA?: undefined;
761
766
  };
762
767
  meta: Meta;
763
768
  }>;
package/dist/index.js CHANGED
@@ -888,10 +888,10 @@ var BaseProcedureFactory = class {
888
888
  }
889
889
  if (user.twoFaEnabled && this.config.features?.twoFa) {
890
890
  if (!code) {
891
- throw new import_server2.TRPCError({
892
- code: "FORBIDDEN",
893
- message: "2FA code required."
894
- });
891
+ return {
892
+ success: false,
893
+ requires2FA: true
894
+ };
895
895
  }
896
896
  let validCode = false;
897
897
  const secrets = await this.config.prisma.session.findMany({
package/dist/index.mjs CHANGED
@@ -754,10 +754,10 @@ var BaseProcedureFactory = class {
754
754
  }
755
755
  if (user.twoFaEnabled && this.config.features?.twoFa) {
756
756
  if (!code) {
757
- throw new TRPCError2({
758
- code: "FORBIDDEN",
759
- message: "2FA code required."
760
- });
757
+ return {
758
+ success: false,
759
+ requires2FA: true
760
+ };
761
761
  }
762
762
  let validCode = false;
763
763
  const secrets = await this.config.prisma.session.findMany({
@@ -1,2 +1,2 @@
1
1
  import 'zod';
2
- export { g as AuthSchemas, C as ChangePasswordInput, h as CreatedSchemas, L as LoginInput, i as LoginSchemaInput, O as OAuthLoginInput, j as OAuthSchemaInput, R as ResetPasswordInput, a as SignupInput, k as SignupSchemaInput, T as TwoFaVerifyInput, V as VerifyEmailInput, b as biometricVerifySchema, c as changePasswordSchema, m as checkPasswordResetSchema, n as createSchemas, p as deregisterPushTokenSchema, q as disableTwofaSchema, e as endAllSessionsSchema, u as getTwofaSecretSchema, l as loginSchema, o as oAuthLoginSchema, w as registerPushTokenSchema, r as requestPasswordResetSchema, d as resetPasswordSchema, s as signupSchema, t as twoFaResetSchema, x as twoFaResetVerifySchema, f as twoFaVerifySchema, v as verifyEmailSchema } from './hooks-BXNxNK4S.mjs';
2
+ export { g as AuthSchemas, C as ChangePasswordInput, h as CreatedSchemas, L as LoginInput, i as LoginSchemaInput, O as OAuthLoginInput, j as OAuthSchemaInput, R as ResetPasswordInput, a as SignupInput, k as SignupSchemaInput, T as TwoFaVerifyInput, V as VerifyEmailInput, b as biometricVerifySchema, c as changePasswordSchema, m as checkPasswordResetSchema, n as createSchemas, p as deregisterPushTokenSchema, q as disableTwofaSchema, e as endAllSessionsSchema, u as getTwofaSecretSchema, l as loginSchema, o as oAuthLoginSchema, w as registerPushTokenSchema, r as requestPasswordResetSchema, d as resetPasswordSchema, s as signupSchema, t as twoFaResetSchema, x as twoFaResetVerifySchema, f as twoFaVerifySchema, v as verifyEmailSchema } from './hooks-yHGJ7C6_.mjs';
@@ -1,2 +1,2 @@
1
1
  import 'zod';
2
- export { g as AuthSchemas, C as ChangePasswordInput, h as CreatedSchemas, L as LoginInput, i as LoginSchemaInput, O as OAuthLoginInput, j as OAuthSchemaInput, R as ResetPasswordInput, a as SignupInput, k as SignupSchemaInput, T as TwoFaVerifyInput, V as VerifyEmailInput, b as biometricVerifySchema, c as changePasswordSchema, m as checkPasswordResetSchema, n as createSchemas, p as deregisterPushTokenSchema, q as disableTwofaSchema, e as endAllSessionsSchema, u as getTwofaSecretSchema, l as loginSchema, o as oAuthLoginSchema, w as registerPushTokenSchema, r as requestPasswordResetSchema, d as resetPasswordSchema, s as signupSchema, t as twoFaResetSchema, x as twoFaResetVerifySchema, f as twoFaVerifySchema, v as verifyEmailSchema } from './hooks-BXNxNK4S.js';
2
+ export { g as AuthSchemas, C as ChangePasswordInput, h as CreatedSchemas, L as LoginInput, i as LoginSchemaInput, O as OAuthLoginInput, j as OAuthSchemaInput, R as ResetPasswordInput, a as SignupInput, k as SignupSchemaInput, T as TwoFaVerifyInput, V as VerifyEmailInput, b as biometricVerifySchema, c as changePasswordSchema, m as checkPasswordResetSchema, n as createSchemas, p as deregisterPushTokenSchema, q as disableTwofaSchema, e as endAllSessionsSchema, u as getTwofaSecretSchema, l as loginSchema, o as oAuthLoginSchema, w as registerPushTokenSchema, r as requestPasswordResetSchema, d as resetPasswordSchema, s as signupSchema, t as twoFaResetSchema, x as twoFaResetVerifySchema, f as twoFaVerifySchema, v as verifyEmailSchema } from './hooks-yHGJ7C6_.js';
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@factiii/auth",
3
- "version": "0.4.0",
3
+ "version": "0.4.1",
4
4
  "publishConfig": {
5
5
  "access": "public"
6
6
  },
@@ -8,12 +8,12 @@ declare const signupSchema: z.ZodObject<{
8
8
  email: z.ZodString;
9
9
  password: z.ZodEffects<z.ZodString, string, string>;
10
10
  }, "strip", z.ZodTypeAny, {
11
- email: string;
12
11
  username: string;
12
+ email: string;
13
13
  password: string;
14
14
  }, {
15
- email: string;
16
15
  username: string;
16
+ email: string;
17
17
  password: string;
18
18
  }>;
19
19
  /**
@@ -8,12 +8,12 @@ declare const signupSchema: z.ZodObject<{
8
8
  email: z.ZodString;
9
9
  password: z.ZodEffects<z.ZodString, string, string>;
10
10
  }, "strip", z.ZodTypeAny, {
11
- email: string;
12
11
  username: string;
12
+ email: string;
13
13
  password: string;
14
14
  }, {
15
- email: string;
16
15
  username: string;
16
+ email: string;
17
17
  password: string;
18
18
  }>;
19
19
  /**