@flowerforce/flowerbase 1.7.5-beta.6 → 1.7.6-beta.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (53) hide show
  1. package/CHANGELOG.md +21 -0
  2. package/dist/auth/controller.d.ts.map +1 -1
  3. package/dist/auth/controller.js +11 -10
  4. package/dist/auth/plugins/jwt.js +1 -1
  5. package/dist/auth/providers/anon-user/controller.js +1 -1
  6. package/dist/auth/providers/custom-function/controller.js +8 -7
  7. package/dist/auth/providers/local-userpass/controller.d.ts.map +1 -1
  8. package/dist/auth/providers/local-userpass/controller.js +15 -14
  9. package/dist/auth/utils.d.ts +1 -0
  10. package/dist/auth/utils.d.ts.map +1 -1
  11. package/dist/constants.d.ts +1 -0
  12. package/dist/constants.d.ts.map +1 -1
  13. package/dist/constants.js +4 -3
  14. package/dist/features/triggers/index.js +1 -1
  15. package/dist/features/triggers/utils.js +2 -2
  16. package/dist/monitoring/routes/users.d.ts.map +1 -1
  17. package/dist/monitoring/routes/users.js +7 -6
  18. package/dist/monitoring/utils.d.ts.map +1 -1
  19. package/dist/monitoring/utils.js +5 -4
  20. package/dist/shared/handleUserDeletion.js +1 -1
  21. package/dist/shared/handleUserRegistration.js +2 -2
  22. package/dist/utils/initializer/exposeRoutes.js +1 -1
  23. package/dist/utils/rules-matcher/interface.d.ts +5 -1
  24. package/dist/utils/rules-matcher/interface.d.ts.map +1 -1
  25. package/dist/utils/rules-matcher/interface.js +2 -0
  26. package/dist/utils/rules-matcher/utils.d.ts.map +1 -1
  27. package/dist/utils/rules-matcher/utils.js +51 -16
  28. package/package.json +1 -1
  29. package/src/auth/__tests__/controller.test.ts +1 -0
  30. package/src/auth/controller.ts +12 -11
  31. package/src/auth/plugins/jwt.ts +2 -2
  32. package/src/auth/providers/anon-user/__tests__/controller.test.ts +1 -0
  33. package/src/auth/providers/anon-user/controller.ts +2 -2
  34. package/src/auth/providers/custom-function/controller.ts +8 -8
  35. package/src/auth/providers/local-userpass/controller.ts +16 -15
  36. package/src/auth/utils.ts +1 -0
  37. package/src/constants.ts +3 -2
  38. package/src/features/triggers/__tests__/index.test.ts +1 -0
  39. package/src/features/triggers/index.ts +2 -2
  40. package/src/features/triggers/utils.ts +3 -3
  41. package/src/monitoring/routes/users.ts +8 -7
  42. package/src/monitoring/ui.css +5 -1
  43. package/src/monitoring/ui.events.js +2 -2
  44. package/src/monitoring/ui.shared.js +2 -1
  45. package/src/monitoring/utils.ts +6 -5
  46. package/src/shared/handleUserDeletion.ts +2 -2
  47. package/src/shared/handleUserRegistration.ts +3 -3
  48. package/src/utils/__tests__/operators.test.ts +24 -0
  49. package/src/utils/__tests__/rule.test.ts +39 -0
  50. package/src/utils/__tests__/rulesMatcherInterfaces.test.ts +2 -0
  51. package/src/utils/initializer/exposeRoutes.ts +2 -2
  52. package/src/utils/rules-matcher/interface.ts +5 -1
  53. package/src/utils/rules-matcher/utils.ts +78 -32
package/CHANGELOG.md CHANGED
@@ -1,3 +1,24 @@
1
+ ## 1.7.5 (2026-03-02)
2
+
3
+
4
+ ### 🩹 Fixes
5
+
6
+ - _id in user_data ([#21](https://github.com/flowerforce/flowerbase/pull/21))
7
+
8
+ - refresh token ([#25](https://github.com/flowerforce/flowerbase/pull/25))
9
+
10
+ - trigger disable ([61b6676](https://github.com/flowerforce/flowerbase/commit/61b6676))
11
+
12
+ - cursor functions ([da6d590](https://github.com/flowerforce/flowerbase/commit/da6d590))
13
+
14
+ - WIP roles ([35e93b4](https://github.com/flowerforce/flowerbase/commit/35e93b4))
15
+
16
+ - roles ([f7a3b13](https://github.com/flowerforce/flowerbase/commit/f7a3b13))
17
+
18
+ - roles read & write ([45ded56](https://github.com/flowerforce/flowerbase/commit/45ded56))
19
+
20
+ - **monitoring:** keep function editor line numbers synced while scrolling ([#30](https://github.com/flowerforce/flowerbase/pull/30))
21
+
1
22
  ## 1.7.4 (2026-02-19)
2
23
 
3
24
 
@@ -1 +1 @@
1
- {"version":3,"file":"controller.d.ts","sourceRoot":"","sources":["../../src/auth/controller.ts"],"names":[],"mappings":"AACA,OAAO,EAAE,eAAe,EAAE,MAAM,SAAS,CAAA;AAgBzC;;;;GAIG;AACH,wBAAsB,cAAc,CAAC,GAAG,EAAE,eAAe,iBA0LxD"}
1
+ {"version":3,"file":"controller.d.ts","sourceRoot":"","sources":["../../src/auth/controller.ts"],"names":[],"mappings":"AACA,OAAO,EAAE,eAAe,EAAE,MAAM,SAAS,CAAA;AAgBzC;;;;GAIG;AACH,wBAAsB,cAAc,CAAC,GAAG,EAAE,eAAe,iBA2LxD"}
@@ -30,16 +30,17 @@ const unauthorizedSessionError = {
30
30
  function authController(app) {
31
31
  return __awaiter(this, void 0, void 0, function* () {
32
32
  const { authCollection, userCollection, refreshTokensCollection } = constants_1.AUTH_CONFIG;
33
- const db = app.mongo.client.db(constants_1.DB_NAME);
33
+ const authDb = app.mongo.client.db(constants_1.AUTH_DB_NAME);
34
+ const customUserDb = app.mongo.client.db(constants_1.DB_NAME);
34
35
  const refreshTokenTtlMs = constants_1.DEFAULT_CONFIG.REFRESH_TOKEN_TTL_DAYS * 24 * 60 * 60 * 1000;
35
36
  try {
36
- yield db.collection(refreshTokensCollection).createIndex({ expiresAt: 1 }, { expireAfterSeconds: 0 });
37
+ yield authDb.collection(refreshTokensCollection).createIndex({ expiresAt: 1 }, { expireAfterSeconds: 0 });
37
38
  }
38
39
  catch (error) {
39
40
  console.error('Failed to ensure refresh token TTL index', error);
40
41
  }
41
42
  try {
42
- yield db.collection(authCollection).createIndex({ email: 1 }, {
43
+ yield authDb.collection(authCollection).createIndex({ email: 1 }, {
43
44
  unique: true
44
45
  });
45
46
  }
@@ -64,11 +65,11 @@ function authController(app) {
64
65
  if (req.user.typ !== 'access') {
65
66
  throw new Error('Access token required');
66
67
  }
67
- const authUser = yield db
68
+ const authUser = yield authDb
68
69
  .collection(authCollection)
69
70
  .findOne({ _id: bson_1.ObjectId.createFromHexString(req.user.id) });
70
71
  const customData = userCollection && constants_1.AUTH_CONFIG.user_id_field
71
- ? yield db
72
+ ? yield customUserDb
72
73
  .collection(userCollection)
73
74
  .findOne({ [constants_1.AUTH_CONFIG.user_id_field]: req.user.id })
74
75
  : null;
@@ -112,7 +113,7 @@ function authController(app) {
112
113
  }
113
114
  const refreshToken = authHeader.slice('Bearer '.length).trim();
114
115
  const refreshTokenHash = (0, crypto_1.hashToken)(refreshToken);
115
- const storedToken = yield db.collection(refreshTokensCollection).findOne({
116
+ const storedToken = yield authDb.collection(refreshTokensCollection).findOne({
116
117
  tokenHash: refreshTokenHash,
117
118
  revokedAt: null,
118
119
  expiresAt: { $gt: new Date() }
@@ -121,13 +122,13 @@ function authController(app) {
121
122
  res.code(401).send(unauthorizedSessionError);
122
123
  return;
123
124
  }
124
- const auth_user = yield (db === null || db === void 0 ? void 0 : db.collection(authCollection).findOne({ _id: new this.mongo.ObjectId(req.user.sub) }));
125
+ const auth_user = yield (authDb === null || authDb === void 0 ? void 0 : authDb.collection(authCollection).findOne({ _id: new this.mongo.ObjectId(req.user.sub) }));
125
126
  if (!auth_user) {
126
127
  res.code(401).send(unauthorizedSessionError);
127
128
  return;
128
129
  }
129
130
  const user = userCollection && constants_1.AUTH_CONFIG.user_id_field
130
- ? (yield db.collection(userCollection).findOne({ [constants_1.AUTH_CONFIG.user_id_field]: req.user.sub }))
131
+ ? (yield customUserDb.collection(userCollection).findOne({ [constants_1.AUTH_CONFIG.user_id_field]: req.user.sub }))
131
132
  : {};
132
133
  res.status(201);
133
134
  return {
@@ -154,7 +155,7 @@ function authController(app) {
154
155
  const refreshTokenHash = (0, crypto_1.hashToken)(refreshToken);
155
156
  const now = new Date();
156
157
  const expiresAt = new Date(Date.now() + refreshTokenTtlMs);
157
- const updateResult = yield db.collection(refreshTokensCollection).findOneAndUpdate({ tokenHash: refreshTokenHash }, {
158
+ const updateResult = yield authDb.collection(refreshTokensCollection).findOneAndUpdate({ tokenHash: refreshTokenHash }, {
158
159
  $set: {
159
160
  revokedAt: now,
160
161
  expiresAt
@@ -171,7 +172,7 @@ function authController(app) {
171
172
  }
172
173
  }
173
174
  if (userId && authCollection) {
174
- yield db.collection(authCollection).updateOne({ _id: userId }, { $set: { lastLogoutAt: now } });
175
+ yield authDb.collection(authCollection).updateOne({ _id: userId }, { $set: { lastLogoutAt: now } });
175
176
  }
176
177
  return { status: 'ok' };
177
178
  });
@@ -51,7 +51,7 @@ exports.default = (0, fastify_plugin_1.default)(function (fastify, opts) {
51
51
  if (((_a = request.user) === null || _a === void 0 ? void 0 : _a.typ) !== 'access') {
52
52
  return;
53
53
  }
54
- const db = (_c = (_b = fastify.mongo) === null || _b === void 0 ? void 0 : _b.client) === null || _c === void 0 ? void 0 : _c.db(constants_1.DB_NAME);
54
+ const db = (_c = (_b = fastify.mongo) === null || _b === void 0 ? void 0 : _b.client) === null || _c === void 0 ? void 0 : _c.db(constants_1.AUTH_DB_NAME);
55
55
  if (!db) {
56
56
  fastify.log.warn('Mongo client unavailable while checking logout state');
57
57
  return;
@@ -22,7 +22,7 @@ const utils_1 = require("../../utils");
22
22
  */
23
23
  function anonUserController(app) {
24
24
  return __awaiter(this, void 0, void 0, function* () {
25
- const db = app.mongo.client.db(constants_1.DB_NAME);
25
+ const db = app.mongo.client.db(constants_1.AUTH_DB_NAME);
26
26
  const { authCollection, refreshTokensCollection } = constants_1.AUTH_CONFIG;
27
27
  const refreshTokenTtlMs = constants_1.DEFAULT_CONFIG.REFRESH_TOKEN_TTL_DAYS * 24 * 60 * 60 * 1000;
28
28
  const anonUserTtlSeconds = constants_1.DEFAULT_CONFIG.ANON_USER_TTL_SECONDS;
@@ -26,7 +26,8 @@ function customFunctionController(app) {
26
26
  return __awaiter(this, void 0, void 0, function* () {
27
27
  const functionsList = state_1.StateManager.select('functions');
28
28
  const services = state_1.StateManager.select('services');
29
- const db = app.mongo.client.db(constants_1.DB_NAME);
29
+ const authDb = app.mongo.client.db(constants_1.AUTH_DB_NAME);
30
+ const customUserDb = app.mongo.client.db(constants_1.DB_NAME);
30
31
  const { authCollection, refreshTokensCollection, userCollection, user_id_field } = constants_1.AUTH_CONFIG;
31
32
  const refreshTokenTtlMs = constants_1.DEFAULT_CONFIG.REFRESH_TOKEN_TTL_DAYS * 24 * 60 * 60 * 1000;
32
33
  /**
@@ -43,7 +44,7 @@ function customFunctionController(app) {
43
44
  }
44
45
  }, function (req, reply) {
45
46
  return __awaiter(this, void 0, void 0, function* () {
46
- var _a, _b;
47
+ var _a, _b, _c;
47
48
  const customFunctionProvider = (_a = constants_1.AUTH_CONFIG.authProviders) === null || _a === void 0 ? void 0 : _a['custom-function'];
48
49
  if (!customFunctionProvider || customFunctionProvider.disabled) {
49
50
  throw new Error('Custom function authentication disabled');
@@ -79,11 +80,11 @@ function customFunctionController(app) {
79
80
  reply.code(401).send({ message: 'Unauthorized' });
80
81
  return;
81
82
  }
82
- const email = (authResult === null || authResult === void 0 ? void 0 : authResult.email) || authResult.id;
83
- let authUser = yield db.collection(authCollection).findOne({ email });
83
+ const email = (_c = authResult.email) !== null && _c !== void 0 ? _c : authResult.id;
84
+ let authUser = yield authDb.collection(authCollection).findOne({ email });
84
85
  if (!authUser) {
85
86
  const authUserId = new mongodb_1.ObjectId();
86
- yield db.collection(authCollection).insertOne({
87
+ yield authDb.collection(authCollection).insertOne({
87
88
  _id: authUserId,
88
89
  email,
89
90
  status: 'confirmed',
@@ -104,7 +105,7 @@ function customFunctionController(app) {
104
105
  };
105
106
  }
106
107
  const user = user_id_field && userCollection
107
- ? yield db
108
+ ? yield customUserDb
108
109
  .collection(userCollection)
109
110
  .findOne({ [user_id_field]: authUser._id.toString() })
110
111
  : {};
@@ -115,7 +116,7 @@ function customFunctionController(app) {
115
116
  };
116
117
  const refreshToken = this.createRefreshToken(currentUserData);
117
118
  const refreshTokenHash = (0, crypto_1.hashToken)(refreshToken);
118
- yield db.collection(refreshTokensCollection).insertOne({
119
+ yield authDb.collection(refreshTokensCollection).insertOne({
119
120
  userId: authUser._id,
120
121
  tokenHash: refreshTokenHash,
121
122
  createdAt: new Date(),
@@ -1 +1 @@
1
- {"version":3,"file":"controller.d.ts","sourceRoot":"","sources":["../../../../src/auth/providers/local-userpass/controller.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,eAAe,EAAE,MAAM,SAAS,CAAA;AAqCzC;;;;GAIG;AACH,wBAAsB,uBAAuB,CAAC,GAAG,EAAE,eAAe,iBAoXjE"}
1
+ {"version":3,"file":"controller.d.ts","sourceRoot":"","sources":["../../../../src/auth/providers/local-userpass/controller.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,eAAe,EAAE,MAAM,SAAS,CAAA;AAqCzC;;;;GAIG;AACH,wBAAsB,uBAAuB,CAAC,GAAG,EAAE,eAAe,iBAqXjE"}
@@ -40,7 +40,8 @@ function localUserPassController(app) {
40
40
  const { authCollection, userCollection, user_id_field } = constants_1.AUTH_CONFIG;
41
41
  const { resetPasswordCollection } = constants_1.AUTH_CONFIG;
42
42
  const { refreshTokensCollection } = constants_1.AUTH_CONFIG;
43
- const db = app.mongo.client.db(constants_1.DB_NAME);
43
+ const authDb = app.mongo.client.db(constants_1.AUTH_DB_NAME);
44
+ const customUserDb = app.mongo.client.db(constants_1.DB_NAME);
44
45
  const resetPasswordTtlSeconds = constants_1.DEFAULT_CONFIG.RESET_PASSWORD_TTL_SECONDS;
45
46
  const rateLimitWindowMs = constants_1.DEFAULT_CONFIG.AUTH_RATE_LIMIT_WINDOW_MS;
46
47
  const loginMaxAttempts = constants_1.DEFAULT_CONFIG.AUTH_LOGIN_MAX_ATTEMPTS;
@@ -49,20 +50,20 @@ function localUserPassController(app) {
49
50
  const refreshTokenTtlMs = constants_1.DEFAULT_CONFIG.REFRESH_TOKEN_TTL_DAYS * 24 * 60 * 60 * 1000;
50
51
  const resolveLocalUserpassProvider = () => { var _a; return (_a = constants_1.AUTH_CONFIG.authProviders) === null || _a === void 0 ? void 0 : _a['local-userpass']; };
51
52
  try {
52
- yield db.collection(resetPasswordCollection).createIndex({ createdAt: 1 }, { expireAfterSeconds: resetPasswordTtlSeconds });
53
+ yield authDb.collection(resetPasswordCollection).createIndex({ createdAt: 1 }, { expireAfterSeconds: resetPasswordTtlSeconds });
53
54
  }
54
55
  catch (error) {
55
56
  console.error('Failed to ensure reset password TTL index', error);
56
57
  }
57
58
  try {
58
- yield db.collection(refreshTokensCollection).createIndex({ expiresAt: 1 }, { expireAfterSeconds: 0 });
59
+ yield authDb.collection(refreshTokensCollection).createIndex({ expiresAt: 1 }, { expireAfterSeconds: 0 });
59
60
  }
60
61
  catch (error) {
61
62
  console.error('Failed to ensure refresh token TTL index', error);
62
63
  }
63
64
  const handleResetPasswordRequest = (email, password, extraArguments) => __awaiter(this, void 0, void 0, function* () {
64
65
  const { resetPasswordConfig } = constants_1.AUTH_CONFIG;
65
- const authUser = yield db.collection(authCollection).findOne({
66
+ const authUser = yield authDb.collection(authCollection).findOne({
66
67
  email
67
68
  });
68
69
  if (!authUser) {
@@ -70,7 +71,7 @@ function localUserPassController(app) {
70
71
  }
71
72
  const token = (0, crypto_1.generateToken)();
72
73
  const tokenId = (0, crypto_1.generateToken)();
73
- yield (db === null || db === void 0 ? void 0 : db.collection(resetPasswordCollection).updateOne({ email }, { $set: { token, tokenId, email, createdAt: new Date() } }, { upsert: true }));
74
+ yield (authDb === null || authDb === void 0 ? void 0 : authDb.collection(resetPasswordCollection).updateOne({ email }, { $set: { token, tokenId, email, createdAt: new Date() } }, { upsert: true }));
74
75
  if (!resetPasswordConfig.runResetFunction && !resetPasswordConfig.resetFunctionName) {
75
76
  throw new Error(utils_1.AUTH_ERRORS.MISSING_RESET_FUNCTION);
76
77
  }
@@ -156,7 +157,7 @@ function localUserPassController(app) {
156
157
  res.status(429).send({ message: 'Too many requests' });
157
158
  return;
158
159
  }
159
- const existing = yield db.collection(authCollection).findOne({
160
+ const existing = yield authDb.collection(authCollection).findOne({
160
161
  confirmationToken: req.body.token,
161
162
  confirmationTokenId: req.body.tokenId
162
163
  });
@@ -165,7 +166,7 @@ function localUserPassController(app) {
165
166
  throw new Error(utils_1.AUTH_ERRORS.INVALID_TOKEN);
166
167
  }
167
168
  if (existing.status !== 'confirmed') {
168
- yield db.collection(authCollection).updateOne({ _id: existing._id }, {
169
+ yield authDb.collection(authCollection).updateOne({ _id: existing._id }, {
169
170
  $set: { status: 'confirmed' },
170
171
  $unset: { confirmationToken: '', confirmationTokenId: '' }
171
172
  });
@@ -193,7 +194,7 @@ function localUserPassController(app) {
193
194
  res.status(429).send({ message: 'Too many requests' });
194
195
  return;
195
196
  }
196
- const authUser = yield db.collection(authCollection).findOne({
197
+ const authUser = yield authDb.collection(authCollection).findOne({
197
198
  email: req.body.username
198
199
  });
199
200
  if (!authUser) {
@@ -204,7 +205,7 @@ function localUserPassController(app) {
204
205
  throw new Error(utils_1.AUTH_ERRORS.INVALID_CREDENTIALS);
205
206
  }
206
207
  const user = user_id_field && userCollection
207
- ? yield db
208
+ ? yield customUserDb
208
209
  .collection(userCollection)
209
210
  .findOne({ [user_id_field]: authUser._id.toString() })
210
211
  : {};
@@ -215,7 +216,7 @@ function localUserPassController(app) {
215
216
  }
216
217
  const refreshToken = this.createRefreshToken(userWithCustomData);
217
218
  const refreshTokenHash = (0, crypto_1.hashToken)(refreshToken);
218
- yield db.collection(refreshTokensCollection).insertOne({
219
+ yield authDb.collection(refreshTokensCollection).insertOne({
219
220
  userId: authUser._id,
220
221
  tokenHash: refreshTokenHash,
221
222
  createdAt: new Date(),
@@ -298,7 +299,7 @@ function localUserPassController(app) {
298
299
  return { message: 'Too many requests' };
299
300
  }
300
301
  const { token, tokenId, password } = req.body;
301
- const resetRequest = yield (db === null || db === void 0 ? void 0 : db.collection(resetPasswordCollection).findOne({ token, tokenId }));
302
+ const resetRequest = yield (authDb === null || authDb === void 0 ? void 0 : authDb.collection(resetPasswordCollection).findOne({ token, tokenId }));
302
303
  if (!resetRequest) {
303
304
  throw new Error(utils_1.AUTH_ERRORS.INVALID_RESET_PARAMS);
304
305
  }
@@ -307,16 +308,16 @@ function localUserPassController(app) {
307
308
  Number.isNaN(createdAt.getTime()) ||
308
309
  Date.now() - createdAt.getTime() > resetPasswordTtlSeconds * 1000;
309
310
  if (isExpired) {
310
- yield (db === null || db === void 0 ? void 0 : db.collection(resetPasswordCollection).deleteOne({ _id: resetRequest._id }));
311
+ yield (authDb === null || authDb === void 0 ? void 0 : authDb.collection(resetPasswordCollection).deleteOne({ _id: resetRequest._id }));
311
312
  throw new Error(utils_1.AUTH_ERRORS.INVALID_RESET_PARAMS);
312
313
  }
313
314
  const hashedPassword = yield (0, crypto_1.hashPassword)(password);
314
- yield db.collection(authCollection).updateOne({ email: resetRequest.email }, {
315
+ yield authDb.collection(authCollection).updateOne({ email: resetRequest.email }, {
315
316
  $set: {
316
317
  password: hashedPassword
317
318
  }
318
319
  });
319
- yield (db === null || db === void 0 ? void 0 : db.collection(resetPasswordCollection).deleteOne({ _id: resetRequest._id }));
320
+ yield (authDb === null || authDb === void 0 ? void 0 : authDb.collection(resetPasswordCollection).deleteOne({ _id: resetRequest._id }));
320
321
  });
321
322
  });
322
323
  });
@@ -150,6 +150,7 @@ export declare enum AUTH_ERRORS {
150
150
  }
151
151
  export interface AuthConfig {
152
152
  auth_collection?: string;
153
+ auth_database?: string;
153
154
  'api-key': ApiKey;
154
155
  'local-userpass': LocalUserpass;
155
156
  'custom-function': CustomFunction;
@@ -1 +1 @@
1
- {"version":3,"file":"utils.d.ts","sourceRoot":"","sources":["../../src/auth/utils.ts"],"names":[],"mappings":"AAMA,eAAO,MAAM,cAAc;;;CAA4C,CAAC;AACxE,eAAO,MAAM,YAAY;;;;;;;;;;;;;;;;;;;CAexB,CAAA;AAED,eAAO,MAAM,iBAAiB;;;;;;;;;;;;;;CAc7B,CAAA;AAED,eAAO,MAAM,iBAAiB;;;;;;;;;;;;;;;;;;;;;;CAgB7B,CAAA;AAED,eAAO,MAAM,oBAAoB;;;;;;;;;;;;;;;;;;;CAWhC,CAAA;AAED,eAAO,MAAM,mBAAmB;;;;;;;;;;;;;;CAU/B,CAAA;AAED,eAAO,MAAM,YAAY;;;;;;;;;;;;;;CAAoB,CAAA;AAE7C,eAAO,MAAM,mBAAmB;;;;;;;;;;;;;;;;;;;CAe/B,CAAA;AAED,oBAAY,cAAc;IACxB,KAAK,WAAW;IAChB,YAAY,cAAc;IAC1B,OAAO,aAAa;IACpB,OAAO,aAAa;IACpB,OAAO,aAAa;IACpB,KAAK,gBAAgB;IACrB,UAAU,gBAAgB;IAC1B,aAAa,WAAW;IACxB,UAAU,sBAAsB;CACjC;AAED,oBAAY,WAAW;IACrB,mBAAmB,wBAAwB;IAC3C,aAAa,mCAAmC;IAChD,oBAAoB,sCAAsC;IAC1D,sBAAsB,2BAA2B;IACjD,kBAAkB,uBAAuB;CAC1C;AAED,MAAM,WAAW,UAAU;IACzB,eAAe,CAAC,EAAE,MAAM,CAAA;IACxB,SAAS,EAAE,MAAM,CAAA;IACjB,gBAAgB,EAAE,aAAa,CAAA;IAC/B,iBAAiB,EAAE,cAAc,CAAA;IACjC,WAAW,CAAC,EAAE,QAAQ,CAAA;CACvB;AAED,UAAU,MAAM;IACd,IAAI,EAAE,MAAM,CAAA;IACZ,IAAI,EAAE,MAAM,CAAA;IACZ,QAAQ,EAAE,OAAO,CAAA;CAClB;AACD,UAAU,aAAa;IACrB,IAAI,EAAE,MAAM,CAAA;IACZ,IAAI,EAAE,MAAM,CAAA;IACZ,QAAQ,EAAE,OAAO,CAAA;IACjB,MAAM,EAAE,MAAM,CAAA;CACf;AAED,UAAU,cAAc;IACtB,IAAI,EAAE,iBAAiB,CAAC;IACxB,IAAI,EAAE,iBAAiB,CAAC;IACxB,QAAQ,EAAE,OAAO,CAAC;IAClB,MAAM,EAAE;QACN,kBAAkB,EAAE,MAAM,CAAA;KAC3B,CAAA;CACF;AAED,MAAM,WAAW,QAAQ;IACvB,IAAI,EAAE,WAAW,CAAA;IACjB,IAAI,EAAE,WAAW,CAAA;IACjB,QAAQ,EAAE,OAAO,CAAA;CAClB;AAED,MAAM,WAAW,MAAM;IACrB,WAAW,EAAE,OAAO,CAAA;IACpB,wBAAwB,CAAC,EAAE,MAAM,CAAA;IACjC,iBAAiB,EAAE,MAAM,CAAA;IACzB,gBAAgB,EAAE,MAAM,CAAA;IACxB,uBAAuB,EAAE,OAAO,CAAA;IAChC,gBAAgB,EAAE,OAAO,CAAA;CAC1B;AAED,MAAM,WAAW,oBAAoB;IACnC,OAAO,EAAE,OAAO,CAAA;IAChB,kBAAkB,EAAE,MAAM,CAAA;IAC1B,aAAa,EAAE,MAAM,CAAA;IACrB,eAAe,EAAE,MAAM,CAAA;IACvB,aAAa,EAAE,MAAM,CAAA;IACrB,8BAA8B,EAAE,MAAM,CAAA;CACvC;AAMD;;;GAGG;AACH,eAAO,MAAM,cAAc,QAAO,UAuCjC,CAAA;AAED;;;GAGG;AACH,eAAO,MAAM,kBAAkB,QAAO,oBAarC,CAAA;AAED,eAAO,MAAM,gBAAgB,GAAI,eAAW,WAG3C,CAAA"}
1
+ {"version":3,"file":"utils.d.ts","sourceRoot":"","sources":["../../src/auth/utils.ts"],"names":[],"mappings":"AAMA,eAAO,MAAM,cAAc;;;CAA4C,CAAC;AACxE,eAAO,MAAM,YAAY;;;;;;;;;;;;;;;;;;;CAexB,CAAA;AAED,eAAO,MAAM,iBAAiB;;;;;;;;;;;;;;CAc7B,CAAA;AAED,eAAO,MAAM,iBAAiB;;;;;;;;;;;;;;;;;;;;;;CAgB7B,CAAA;AAED,eAAO,MAAM,oBAAoB;;;;;;;;;;;;;;;;;;;CAWhC,CAAA;AAED,eAAO,MAAM,mBAAmB;;;;;;;;;;;;;;CAU/B,CAAA;AAED,eAAO,MAAM,YAAY;;;;;;;;;;;;;;CAAoB,CAAA;AAE7C,eAAO,MAAM,mBAAmB;;;;;;;;;;;;;;;;;;;CAe/B,CAAA;AAED,oBAAY,cAAc;IACxB,KAAK,WAAW;IAChB,YAAY,cAAc;IAC1B,OAAO,aAAa;IACpB,OAAO,aAAa;IACpB,OAAO,aAAa;IACpB,KAAK,gBAAgB;IACrB,UAAU,gBAAgB;IAC1B,aAAa,WAAW;IACxB,UAAU,sBAAsB;CACjC;AAED,oBAAY,WAAW;IACrB,mBAAmB,wBAAwB;IAC3C,aAAa,mCAAmC;IAChD,oBAAoB,sCAAsC;IAC1D,sBAAsB,2BAA2B;IACjD,kBAAkB,uBAAuB;CAC1C;AAED,MAAM,WAAW,UAAU;IACzB,eAAe,CAAC,EAAE,MAAM,CAAA;IACxB,aAAa,CAAC,EAAE,MAAM,CAAA;IACtB,SAAS,EAAE,MAAM,CAAA;IACjB,gBAAgB,EAAE,aAAa,CAAA;IAC/B,iBAAiB,EAAE,cAAc,CAAA;IACjC,WAAW,CAAC,EAAE,QAAQ,CAAA;CACvB;AAED,UAAU,MAAM;IACd,IAAI,EAAE,MAAM,CAAA;IACZ,IAAI,EAAE,MAAM,CAAA;IACZ,QAAQ,EAAE,OAAO,CAAA;CAClB;AACD,UAAU,aAAa;IACrB,IAAI,EAAE,MAAM,CAAA;IACZ,IAAI,EAAE,MAAM,CAAA;IACZ,QAAQ,EAAE,OAAO,CAAA;IACjB,MAAM,EAAE,MAAM,CAAA;CACf;AAED,UAAU,cAAc;IACtB,IAAI,EAAE,iBAAiB,CAAC;IACxB,IAAI,EAAE,iBAAiB,CAAC;IACxB,QAAQ,EAAE,OAAO,CAAC;IAClB,MAAM,EAAE;QACN,kBAAkB,EAAE,MAAM,CAAA;KAC3B,CAAA;CACF;AAED,MAAM,WAAW,QAAQ;IACvB,IAAI,EAAE,WAAW,CAAA;IACjB,IAAI,EAAE,WAAW,CAAA;IACjB,QAAQ,EAAE,OAAO,CAAA;CAClB;AAED,MAAM,WAAW,MAAM;IACrB,WAAW,EAAE,OAAO,CAAA;IACpB,wBAAwB,CAAC,EAAE,MAAM,CAAA;IACjC,iBAAiB,EAAE,MAAM,CAAA;IACzB,gBAAgB,EAAE,MAAM,CAAA;IACxB,uBAAuB,EAAE,OAAO,CAAA;IAChC,gBAAgB,EAAE,OAAO,CAAA;CAC1B;AAED,MAAM,WAAW,oBAAoB;IACnC,OAAO,EAAE,OAAO,CAAA;IAChB,kBAAkB,EAAE,MAAM,CAAA;IAC1B,aAAa,EAAE,MAAM,CAAA;IACrB,eAAe,EAAE,MAAM,CAAA;IACvB,aAAa,EAAE,MAAM,CAAA;IACrB,8BAA8B,EAAE,MAAM,CAAA;CACvC;AAMD;;;GAGG;AACH,eAAO,MAAM,cAAc,QAAO,UAuCjC,CAAA;AAED;;;GAGG;AACH,eAAO,MAAM,kBAAkB,QAAO,oBAarC,CAAA;AAED,eAAO,MAAM,gBAAgB,GAAI,eAAW,WAG3C,CAAA"}
@@ -37,6 +37,7 @@ export declare const DEFAULT_CONFIG: {
37
37
  export declare const API_VERSION: string;
38
38
  export declare const HTTPS_SCHEMA: string;
39
39
  export declare const DB_NAME: string;
40
+ export declare const AUTH_DB_NAME: string;
40
41
  type AuthProviders = Record<string, {
41
42
  disabled?: boolean;
42
43
  config?: unknown;
@@ -1 +1 @@
1
- {"version":3,"file":"constants.d.ts","sourceRoot":"","sources":["../src/constants.ts"],"names":[],"mappings":"AACA,OAAO,EAAE,eAAe,EAAE,MAAM,IAAI,CAAA;AAsBpC,eAAO,MAAM,cAAc;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;iBAmCsB,eAAe,EAAE;;CAEjE,CAAA;AACD,eAAO,MAAM,WAAW,QAA8C,CAAA;AACtE,eAAO,MAAM,YAAY,QAA8B,CAAA;AACvD,eAAO,MAAM,OAAO,QAAgB,CAAA;AAEpC,KAAK,aAAa,GAAG,MAAM,CAAC,MAAM,EAAE;IAAE,QAAQ,CAAC,EAAE,OAAO,CAAC;IAAC,MAAM,CAAC,EAAE,OAAO,CAAA;CAAE,CAAC,CAAA;AAE7E,eAAO,MAAM,WAAW;;;;;;;mBAOqB,aAAa;;;;;;;;;CAOzD,CAAA;AAID,eAAO,MAAM,SAAS;;;CAGrB,CAAA"}
1
+ {"version":3,"file":"constants.d.ts","sourceRoot":"","sources":["../src/constants.ts"],"names":[],"mappings":"AACA,OAAO,EAAE,eAAe,EAAE,MAAM,IAAI,CAAA;AAsBpC,eAAO,MAAM,cAAc;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;iBAmCsB,eAAe,EAAE;;CAEjE,CAAA;AACD,eAAO,MAAM,WAAW,QAA8C,CAAA;AACtE,eAAO,MAAM,YAAY,QAA8B,CAAA;AACvD,eAAO,MAAM,OAAO,QAAgB,CAAA;AACpC,eAAO,MAAM,YAAY,QAAiC,CAAA;AAE1D,KAAK,aAAa,GAAG,MAAM,CAAC,MAAM,EAAE;IAAE,QAAQ,CAAC,EAAE,OAAO,CAAC;IAAC,MAAM,CAAC,EAAE,OAAO,CAAA;CAAE,CAAC,CAAA;AAE7E,eAAO,MAAM,WAAW;;;;;;;mBAOqB,aAAa;;;;;;;;;CAOzD,CAAA;AAID,eAAO,MAAM,SAAS;;;CAGrB,CAAA"}
package/dist/constants.js CHANGED
@@ -12,7 +12,7 @@ var __rest = (this && this.__rest) || function (s, e) {
12
12
  };
13
13
  var _a, _b, _c, _d, _e, _f, _g, _h;
14
14
  Object.defineProperty(exports, "__esModule", { value: true });
15
- exports.S3_CONFIG = exports.AUTH_CONFIG = exports.DB_NAME = exports.HTTPS_SCHEMA = exports.API_VERSION = exports.DEFAULT_CONFIG = void 0;
15
+ exports.S3_CONFIG = exports.AUTH_CONFIG = exports.AUTH_DB_NAME = exports.DB_NAME = exports.HTTPS_SCHEMA = exports.API_VERSION = exports.DEFAULT_CONFIG = void 0;
16
16
  const utils_1 = require("./auth/utils");
17
17
  const parseBoolean = (value) => {
18
18
  if (!value)
@@ -25,8 +25,8 @@ const monitEnabledEnv = process.env.MONIT_ENABLED;
25
25
  const monitEnabled = typeof monitEnabledEnv === 'string'
26
26
  ? parseBoolean(monitEnabledEnv)
27
27
  : false;
28
- const { database_name, collection_name = 'users', user_id_field = 'id', on_user_creation_function_name } = (0, utils_1.loadCustomUserData)();
29
- const _j = (0, utils_1.loadAuthConfig)(), { auth_collection = 'auth_users' } = _j, configuration = __rest(_j, ["auth_collection"]);
28
+ const { database_name = 'main', collection_name = 'users', user_id_field = 'id', on_user_creation_function_name } = (0, utils_1.loadCustomUserData)();
29
+ const _j = (0, utils_1.loadAuthConfig)(), { auth_collection = 'auth_users', auth_database } = _j, configuration = __rest(_j, ["auth_collection", "auth_database"]);
30
30
  exports.DEFAULT_CONFIG = {
31
31
  PORT: Number(process.env.PORT) || 3000,
32
32
  MONGODB_URL: process.env.MONGODB_URL || '',
@@ -68,6 +68,7 @@ exports.DEFAULT_CONFIG = {
68
68
  exports.API_VERSION = `/api/client/${exports.DEFAULT_CONFIG.API_VERSION}`;
69
69
  exports.HTTPS_SCHEMA = exports.DEFAULT_CONFIG.HTTPS_SCHEMA;
70
70
  exports.DB_NAME = database_name;
71
+ exports.AUTH_DB_NAME = auth_database !== null && auth_database !== void 0 ? auth_database : database_name;
71
72
  // TODO spostare nell'oggetto providers anche le altre configurazioni
72
73
  exports.AUTH_CONFIG = {
73
74
  authCollection: auth_collection,
@@ -50,7 +50,7 @@ const activateTriggers = (_a) => __awaiter(void 0, [_a], void 0, function* ({ fa
50
50
  config: {
51
51
  isAutoTrigger: true,
52
52
  collection: (_e = constants_1.AUTH_CONFIG.authCollection) !== null && _e !== void 0 ? _e : 'auth_users',
53
- database: constants_1.DB_NAME,
53
+ database: constants_1.AUTH_DB_NAME,
54
54
  full_document: true,
55
55
  full_document_before_change: false,
56
56
  match: {},
@@ -220,11 +220,11 @@ const handleAuthenticationTrigger = (_a) => __awaiter(void 0, [_a], void 0, func
220
220
  const { database, isAutoTrigger, operation_types = [], operation_type } = config;
221
221
  const providerFilter = normalizeProviders((_b = config.providers) !== null && _b !== void 0 ? _b : []);
222
222
  const authCollection = (_c = constants_1.AUTH_CONFIG.authCollection) !== null && _c !== void 0 ? _c : 'auth_users';
223
- const collection = app.mongo.client.db(database || constants_1.DB_NAME).collection(authCollection);
223
+ const collection = app.mongo.client.db(database || constants_1.AUTH_DB_NAME).collection(authCollection);
224
224
  const operationCandidates = operation_type ? mapOpInverse[operation_type] : operation_types;
225
225
  const normalizedOps = normalizeOperationTypes(operationCandidates);
226
226
  const baseMeta = {
227
- database: database || constants_1.DB_NAME,
227
+ database: database || constants_1.AUTH_DB_NAME,
228
228
  collection: authCollection,
229
229
  operationTypes: normalizedOps,
230
230
  providers: providerFilter,
@@ -1 +1 @@
1
- {"version":3,"file":"users.d.ts","sourceRoot":"","sources":["../../../src/monitoring/routes/users.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,eAAe,EAAE,MAAM,SAAS,CAAA;AAO9C,OAAO,EAAiB,YAAY,EAAY,MAAM,UAAU,CAAA;AAEhE,MAAM,MAAM,cAAc,GAAG;IAC3B,MAAM,EAAE,MAAM,CAAA;IACd,QAAQ,EAAE,CAAC,KAAK,EAAE,YAAY,KAAK,IAAI,CAAA;CACxC,CAAA;AAYD,eAAO,MAAM,kBAAkB,GAAI,KAAK,eAAe,EAAE,MAAM,cAAc,SAsP5E,CAAA"}
1
+ {"version":3,"file":"users.d.ts","sourceRoot":"","sources":["../../../src/monitoring/routes/users.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,eAAe,EAAE,MAAM,SAAS,CAAA;AAO9C,OAAO,EAAiB,YAAY,EAAY,MAAM,UAAU,CAAA;AAEhE,MAAM,MAAM,cAAc,GAAG;IAC3B,MAAM,EAAE,MAAM,CAAA;IACd,QAAQ,EAAE,CAAC,KAAK,EAAE,YAAY,KAAK,IAAI,CAAA;CACxC,CAAA;AAYD,eAAO,MAAM,kBAAkB,GAAI,KAAK,eAAe,EAAE,MAAM,cAAc,SAuP5E,CAAA"}
@@ -46,7 +46,8 @@ const registerUserRoutes = (app, deps) => {
46
46
  const resolvedAuthLimit = Math.min(Number.isFinite(parsedAuthLimit) && parsedAuthLimit > 0 ? parsedAuthLimit : 100, 500);
47
47
  const resolvedCustomLimit = Math.min(Number.isFinite(parsedCustomLimit) && parsedCustomLimit > 0 ? parsedCustomLimit : 25, 500);
48
48
  const resolvedCustomPage = Math.max(Number.isFinite(parsedPage) && parsedPage > 0 ? parsedPage : 1, 1);
49
- const db = app.mongo.client.db(constants_1.DB_NAME);
49
+ const authDb = app.mongo.client.db(constants_1.AUTH_DB_NAME);
50
+ const customDb = app.mongo.client.db(constants_1.DB_NAME);
50
51
  const authCollection = (_h = constants_1.AUTH_CONFIG.authCollection) !== null && _h !== void 0 ? _h : 'auth_users';
51
52
  const userCollection = constants_1.AUTH_CONFIG.userCollection;
52
53
  const response = {
@@ -66,7 +67,7 @@ const registerUserRoutes = (app, deps) => {
66
67
  ]
67
68
  }
68
69
  : {};
69
- const authItems = yield db
70
+ const authItems = yield authDb
70
71
  .collection(authCollection)
71
72
  .find(authFilter)
72
73
  .sort({ createdAt: -1, _id: -1 })
@@ -90,11 +91,11 @@ const registerUserRoutes = (app, deps) => {
90
91
  ]
91
92
  }
92
93
  : {};
93
- const total = yield db.collection(userCollection).countDocuments(customFilter);
94
+ const total = yield customDb.collection(userCollection).countDocuments(customFilter);
94
95
  const totalPages = Math.max(1, Math.ceil(total / Math.max(resolvedCustomLimit, 1)));
95
96
  const page = Math.min(resolvedCustomPage, totalPages);
96
97
  const skip = Math.max(0, (page - 1) * resolvedCustomLimit);
97
- const customItems = yield db
98
+ const customItems = yield customDb
98
99
  .collection(userCollection)
99
100
  .find(customFilter)
100
101
  .sort({ createdAt: -1, _id: -1 })
@@ -181,7 +182,7 @@ const registerUserRoutes = (app, deps) => {
181
182
  reply.code(400);
182
183
  return { error: passwordError };
183
184
  }
184
- const db = app.mongo.client.db(constants_1.DB_NAME);
185
+ const db = app.mongo.client.db(constants_1.AUTH_DB_NAME);
185
186
  const authCollection = (_a = constants_1.AUTH_CONFIG.authCollection) !== null && _a !== void 0 ? _a : 'auth_users';
186
187
  const selector = {};
187
188
  if (params.id && mongodb_1.ObjectId.isValid(params.id)) {
@@ -216,7 +217,7 @@ const registerUserRoutes = (app, deps) => {
216
217
  var _a, _b;
217
218
  const params = req.params;
218
219
  const body = req.body;
219
- const db = app.mongo.client.db(constants_1.DB_NAME);
220
+ const db = app.mongo.client.db(constants_1.AUTH_DB_NAME);
220
221
  const authCollection = (_a = constants_1.AUTH_CONFIG.authCollection) !== null && _a !== void 0 ? _a : 'auth_users';
221
222
  const selector = {};
222
223
  if (params.id && mongodb_1.ObjectId.isValid(params.id)) {
@@ -1 +1 @@
1
- {"version":3,"file":"utils.d.ts","sourceRoot":"","sources":["../../src/monitoring/utils.ts"],"names":[],"mappings":"AAEA,OAAO,KAAK,EAAE,eAAe,EAAE,cAAc,EAAE,MAAM,SAAS,CAAA;AAG9D,OAAO,KAAK,EAAE,KAAK,EAAE,MAAM,6BAA6B,CAAA;AAIxD,MAAM,MAAM,YAAY,GAAG;IACzB,EAAE,EAAE,MAAM,CAAA;IACV,EAAE,EAAE,MAAM,CAAA;IACV,IAAI,EAAE,MAAM,CAAA;IACZ,MAAM,CAAC,EAAE,MAAM,CAAA;IACf,OAAO,EAAE,MAAM,CAAA;IACf,IAAI,CAAC,EAAE,OAAO,CAAA;CACf,CAAA;AAED,MAAM,MAAM,mBAAmB,GAAG;IAChC,EAAE,EAAE,MAAM,CAAA;IACV,IAAI,EAAE,MAAM,CAAA;IACZ,IAAI,EAAE,OAAO,EAAE,CAAA;IACf,WAAW,EAAE,OAAO,CAAA;IACpB,IAAI,CAAC,EAAE;QAAE,EAAE,CAAC,EAAE,MAAM,CAAC;QAAC,KAAK,CAAC,EAAE,MAAM,CAAA;KAAE,CAAA;IACtC,IAAI,CAAC,EAAE,MAAM,CAAA;IACb,YAAY,CAAC,EAAE,OAAO,CAAA;CACvB,CAAA;AAED,MAAM,MAAM,qBAAqB,GAAG;IAClC,EAAE,EAAE,MAAM,CAAA;IACV,UAAU,EAAE,MAAM,CAAA;IAClB,IAAI,EAAE,OAAO,GAAG,WAAW,GAAG,WAAW,GAAG,YAAY,CAAA;IACxD,KAAK,CAAC,EAAE,OAAO,CAAA;IACf,QAAQ,CAAC,EAAE,OAAO,CAAA;IAClB,QAAQ,CAAC,EAAE,OAAO,CAAA;IAClB,SAAS,CAAC,EAAE,OAAO,CAAA;IACnB,IAAI,CAAC,EAAE,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAA;IAC9B,WAAW,EAAE,OAAO,CAAA;IACpB,IAAI,CAAC,EAAE;QAAE,EAAE,CAAC,EAAE,MAAM,CAAC;QAAC,KAAK,CAAC,EAAE,MAAM,CAAA;KAAE,CAAA;IACtC,IAAI,CAAC,EAAE,MAAM,CAAA;CACd,CAAA;AAED,MAAM,MAAM,UAAU,GAAG;IACvB,CAAC,CAAC,EAAE,MAAM,CAAA;IACV,IAAI,CAAC,EAAE,MAAM,CAAA;IACb,KAAK,CAAC,EAAE,MAAM,CAAA;CACf,CAAA;AAED,MAAM,MAAM,UAAU,GAAG;IACvB,GAAG,EAAE,CAAC,KAAK,EAAE,YAAY,KAAK,IAAI,CAAA;IAClC,IAAI,EAAE,CAAC,KAAK,CAAC,EAAE,UAAU,KAAK,YAAY,EAAE,CAAA;IAC5C,KAAK,EAAE,MAAM,IAAI,CAAA;CAClB,CAAA;AAED,MAAM,MAAM,SAAS,GAAG;IACtB,WAAW,EAAE,MAAM,CAAA;IACnB,KAAK,CAAC,EAAE,KAAK,CAAA;IACb,IAAI,CAAC,EAAE,OAAO,CAAA;IACd,WAAW,CAAC,EAAE,OAAO,CAAA;IACrB,MAAM,CAAC,EAAE,MAAM,CAAA;IACf,UAAU,CAAC,EAAE,MAAM,CAAA;CACpB,CAAA;AAED,eAAO,MAAM,MAAM,QAAsB,CAAA;AACzC,eAAO,MAAM,SAAS,KAAK,CAAA;AAC3B,eAAO,MAAM,SAAS,KAAK,CAAA;AAC3B,eAAO,MAAM,UAAU,MAAM,CAAA;AAC7B,eAAO,MAAM,oBAAoB,KAAK,CAAA;AAEtC,eAAO,MAAM,SAAS,eACuD,CAAA;AAE7E,eAAO,MAAM,aAAa,GAAI,OAAO,OAAO,KAAG,KAAK,IAAI,OAAO,CAAC,OAAO,CAC2B,CAAA;AAElG,eAAO,MAAM,aAAa,GAAI,OAAO,OAAO,KAAG,KAAK,IAAI,MAAM,CAAC,MAAM,EAAE,OAAO,CACf,CAAA;AAE/D,eAAO,MAAM,aAAa,GAAI,OAAO,OAAO,WAc3C,CAAA;AAeD,eAAO,MAAM,YAAY,GAAI,OAAO,MAAM,WAWzC,CAAA;AAED,eAAO,MAAM,oBAAoB,GAAI,OAAO,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,4BAOlE,CAAA;AAED,eAAO,MAAM,WAAW,GAAI,OAAO,OAAO,KAAG,KAAK,IAAI,MAAM,CAAC,MAAM,EAAE,OAAO,CAS3E,CAAA;AAED,eAAO,MAAM,iBAAiB,GAAI,OAAO,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,EAAE,OAAO,MAAM,KAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAuCvG,CAAA;AAED,eAAO,MAAM,QAAQ,GAAI,OAAO,OAAO,EAAE,cAAS,KAAG,OAqCpD,CAAA;AAED,eAAO,MAAM,eAAe,GAAI,OAAO,OAAO;;;;;;CAc7C,CAAA;AAED,eAAO,MAAM,WAAW,GAAI,SAAS,cAAc,CAAC,SAAS,CAAC,YAQ7D,CAAA;AAED,eAAO,MAAM,gBAAgB,GAAI,UAAU,MAAM,EAAE,WAAW,MAAM,KAAG,UAqCtE,CAAA;AAED,eAAO,MAAM,eAAe,GAAI,KAAK,MAAM,uEAS1C,CAAA;AAED,eAAO,MAAM,aAAa,cAC8C,CAAA;AAExE,eAAO,MAAM,cAAc,GAAI,OAAO,SAAS;;;;;;;;;;;;;;;;aA2B9C,CAAA;AAED,eAAO,MAAM,4BAA4B,GACvC,OAAO,KAAK,GAAG,SAAS,EACxB,YAAY,MAAM,EAClB,OAAO,OAAO,EACd,cAAc,OAAO,6DAItB,CAAA;AAED,eAAO,MAAM,sBAAsB,GAAI,UAAU,MAAM,EAAE,QAAQ,MAAM,aAiBtE,CAAA;AAED,eAAO,MAAM,SAAS,GAAI,UAAU,MAAM,EAAE,QAAQ,MAAM,WAYzD,CAAA;AAED,eAAO,MAAM,kBAAkB,GAC7B,KAAK,eAAe,EACpB,SAAS,MAAM,EACf,cAAc,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,iDAwDtC,CAAA;AAED,eAAO,MAAM,WAAW,GAAI,eAAe,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC;;;aAajE,CAAA"}
1
+ {"version":3,"file":"utils.d.ts","sourceRoot":"","sources":["../../src/monitoring/utils.ts"],"names":[],"mappings":"AAEA,OAAO,KAAK,EAAE,eAAe,EAAE,cAAc,EAAE,MAAM,SAAS,CAAA;AAG9D,OAAO,KAAK,EAAE,KAAK,EAAE,MAAM,6BAA6B,CAAA;AAIxD,MAAM,MAAM,YAAY,GAAG;IACzB,EAAE,EAAE,MAAM,CAAA;IACV,EAAE,EAAE,MAAM,CAAA;IACV,IAAI,EAAE,MAAM,CAAA;IACZ,MAAM,CAAC,EAAE,MAAM,CAAA;IACf,OAAO,EAAE,MAAM,CAAA;IACf,IAAI,CAAC,EAAE,OAAO,CAAA;CACf,CAAA;AAED,MAAM,MAAM,mBAAmB,GAAG;IAChC,EAAE,EAAE,MAAM,CAAA;IACV,IAAI,EAAE,MAAM,CAAA;IACZ,IAAI,EAAE,OAAO,EAAE,CAAA;IACf,WAAW,EAAE,OAAO,CAAA;IACpB,IAAI,CAAC,EAAE;QAAE,EAAE,CAAC,EAAE,MAAM,CAAC;QAAC,KAAK,CAAC,EAAE,MAAM,CAAA;KAAE,CAAA;IACtC,IAAI,CAAC,EAAE,MAAM,CAAA;IACb,YAAY,CAAC,EAAE,OAAO,CAAA;CACvB,CAAA;AAED,MAAM,MAAM,qBAAqB,GAAG;IAClC,EAAE,EAAE,MAAM,CAAA;IACV,UAAU,EAAE,MAAM,CAAA;IAClB,IAAI,EAAE,OAAO,GAAG,WAAW,GAAG,WAAW,GAAG,YAAY,CAAA;IACxD,KAAK,CAAC,EAAE,OAAO,CAAA;IACf,QAAQ,CAAC,EAAE,OAAO,CAAA;IAClB,QAAQ,CAAC,EAAE,OAAO,CAAA;IAClB,SAAS,CAAC,EAAE,OAAO,CAAA;IACnB,IAAI,CAAC,EAAE,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAA;IAC9B,WAAW,EAAE,OAAO,CAAA;IACpB,IAAI,CAAC,EAAE;QAAE,EAAE,CAAC,EAAE,MAAM,CAAC;QAAC,KAAK,CAAC,EAAE,MAAM,CAAA;KAAE,CAAA;IACtC,IAAI,CAAC,EAAE,MAAM,CAAA;CACd,CAAA;AAED,MAAM,MAAM,UAAU,GAAG;IACvB,CAAC,CAAC,EAAE,MAAM,CAAA;IACV,IAAI,CAAC,EAAE,MAAM,CAAA;IACb,KAAK,CAAC,EAAE,MAAM,CAAA;CACf,CAAA;AAED,MAAM,MAAM,UAAU,GAAG;IACvB,GAAG,EAAE,CAAC,KAAK,EAAE,YAAY,KAAK,IAAI,CAAA;IAClC,IAAI,EAAE,CAAC,KAAK,CAAC,EAAE,UAAU,KAAK,YAAY,EAAE,CAAA;IAC5C,KAAK,EAAE,MAAM,IAAI,CAAA;CAClB,CAAA;AAED,MAAM,MAAM,SAAS,GAAG;IACtB,WAAW,EAAE,MAAM,CAAA;IACnB,KAAK,CAAC,EAAE,KAAK,CAAA;IACb,IAAI,CAAC,EAAE,OAAO,CAAA;IACd,WAAW,CAAC,EAAE,OAAO,CAAA;IACrB,MAAM,CAAC,EAAE,MAAM,CAAA;IACf,UAAU,CAAC,EAAE,MAAM,CAAA;CACpB,CAAA;AAED,eAAO,MAAM,MAAM,QAAsB,CAAA;AACzC,eAAO,MAAM,SAAS,KAAK,CAAA;AAC3B,eAAO,MAAM,SAAS,KAAK,CAAA;AAC3B,eAAO,MAAM,UAAU,MAAM,CAAA;AAC7B,eAAO,MAAM,oBAAoB,KAAK,CAAA;AAEtC,eAAO,MAAM,SAAS,eACuD,CAAA;AAE7E,eAAO,MAAM,aAAa,GAAI,OAAO,OAAO,KAAG,KAAK,IAAI,OAAO,CAAC,OAAO,CAC2B,CAAA;AAElG,eAAO,MAAM,aAAa,GAAI,OAAO,OAAO,KAAG,KAAK,IAAI,MAAM,CAAC,MAAM,EAAE,OAAO,CACf,CAAA;AAE/D,eAAO,MAAM,aAAa,GAAI,OAAO,OAAO,WAc3C,CAAA;AAeD,eAAO,MAAM,YAAY,GAAI,OAAO,MAAM,WAWzC,CAAA;AAED,eAAO,MAAM,oBAAoB,GAAI,OAAO,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,4BAOlE,CAAA;AAED,eAAO,MAAM,WAAW,GAAI,OAAO,OAAO,KAAG,KAAK,IAAI,MAAM,CAAC,MAAM,EAAE,OAAO,CAS3E,CAAA;AAED,eAAO,MAAM,iBAAiB,GAAI,OAAO,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,EAAE,OAAO,MAAM,KAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAuCvG,CAAA;AAED,eAAO,MAAM,QAAQ,GAAI,OAAO,OAAO,EAAE,cAAS,KAAG,OAqCpD,CAAA;AAED,eAAO,MAAM,eAAe,GAAI,OAAO,OAAO;;;;;;CAc7C,CAAA;AAED,eAAO,MAAM,WAAW,GAAI,SAAS,cAAc,CAAC,SAAS,CAAC,YAQ7D,CAAA;AAED,eAAO,MAAM,gBAAgB,GAAI,UAAU,MAAM,EAAE,WAAW,MAAM,KAAG,UAqCtE,CAAA;AAED,eAAO,MAAM,eAAe,GAAI,KAAK,MAAM,uEAS1C,CAAA;AAED,eAAO,MAAM,aAAa,cAC8C,CAAA;AAExE,eAAO,MAAM,cAAc,GAAI,OAAO,SAAS;;;;;;;;;;;;;;;;aA2B9C,CAAA;AAED,eAAO,MAAM,4BAA4B,GACvC,OAAO,KAAK,GAAG,SAAS,EACxB,YAAY,MAAM,EAClB,OAAO,OAAO,EACd,cAAc,OAAO,6DAItB,CAAA;AAED,eAAO,MAAM,sBAAsB,GAAI,UAAU,MAAM,EAAE,QAAQ,MAAM,aAiBtE,CAAA;AAED,eAAO,MAAM,SAAS,GAAI,UAAU,MAAM,EAAE,QAAQ,MAAM,WAYzD,CAAA;AAED,eAAO,MAAM,kBAAkB,GAC7B,KAAK,eAAe,EACpB,SAAS,MAAM,EACf,cAAc,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,iDAyDtC,CAAA;AAED,eAAO,MAAM,WAAW,GAAI,eAAe,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC;;;aAajE,CAAA"}
@@ -332,7 +332,8 @@ const resolveUserContext = (app, userId, userPayload) => __awaiter(void 0, void
332
332
  if (!userId)
333
333
  return undefined;
334
334
  const normalizedUserId = userId.trim();
335
- const db = app.mongo.client.db(constants_1.DB_NAME);
335
+ const authDb = app.mongo.client.db(constants_1.AUTH_DB_NAME);
336
+ const customDb = app.mongo.client.db(constants_1.DB_NAME);
336
337
  const authCollection = (_a = constants_1.AUTH_CONFIG.authCollection) !== null && _a !== void 0 ? _a : 'auth_users';
337
338
  const userCollection = constants_1.AUTH_CONFIG.userCollection;
338
339
  const userIdField = (_b = constants_1.AUTH_CONFIG.user_id_field) !== null && _b !== void 0 ? _b : 'id';
@@ -340,13 +341,13 @@ const resolveUserContext = (app, userId, userPayload) => __awaiter(void 0, void
340
341
  const authSelector = isObjectId
341
342
  ? { _id: new mongodb_1.ObjectId(normalizedUserId) }
342
343
  : { id: normalizedUserId };
343
- const authUser = yield db.collection(authCollection).findOne(authSelector);
344
+ const authUser = yield authDb.collection(authCollection).findOne(authSelector);
344
345
  let customUser = null;
345
346
  if (userCollection) {
346
347
  const customSelector = { [userIdField]: normalizedUserId };
347
- customUser = yield db.collection(userCollection).findOne(customSelector);
348
+ customUser = yield customDb.collection(userCollection).findOne(customSelector);
348
349
  if (!customUser && isObjectId) {
349
- customUser = yield db.collection(userCollection).findOne({ _id: new mongodb_1.ObjectId(normalizedUserId) });
350
+ customUser = yield customDb.collection(userCollection).findOne({ _id: new mongodb_1.ObjectId(normalizedUserId) });
350
351
  }
351
352
  }
352
353
  const id = authUser && typeof authUser._id !== 'undefined'
@@ -40,7 +40,7 @@ const handleUserDeletion = (app, opt) => (_a) => __awaiter(void 0, [_a], void 0,
40
40
  }
41
41
  const { authCollection } = constants_1.AUTH_CONFIG;
42
42
  const mongo = app === null || app === void 0 ? void 0 : app.mongo;
43
- const db = mongo.client.db(constants_1.DB_NAME);
43
+ const db = mongo.client.db(constants_1.AUTH_DB_NAME);
44
44
  const collection = db.collection(authCollection);
45
45
  let query;
46
46
  if (id) {
@@ -10,10 +10,10 @@ var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, ge
10
10
  };
11
11
  Object.defineProperty(exports, "__esModule", { value: true });
12
12
  const constants_1 = require("../constants");
13
+ const monitoring_1 = require("../services/monitoring");
13
14
  const state_1 = require("../state");
14
15
  const context_1 = require("../utils/context");
15
16
  const crypto_1 = require("../utils/crypto");
16
- const monitoring_1 = require("../services/monitoring");
17
17
  /**
18
18
  * Register user
19
19
  *
@@ -43,7 +43,7 @@ const handleUserRegistration = (app, opt) => (_a) => __awaiter(void 0, [_a], voi
43
43
  const runConfirmationFunction = (localUserpassConfig === null || localUserpassConfig === void 0 ? void 0 : localUserpassConfig.runConfirmationFunction) === true;
44
44
  const confirmationFunctionName = localUserpassConfig === null || localUserpassConfig === void 0 ? void 0 : localUserpassConfig.confirmationFunctionName;
45
45
  const mongo = app === null || app === void 0 ? void 0 : app.mongo;
46
- const db = mongo.client.db(constants_1.DB_NAME);
46
+ const db = mongo.client.db(constants_1.AUTH_DB_NAME);
47
47
  const hashedPassword = yield (0, crypto_1.hashPassword)(password);
48
48
  const existingUser = yield (db === null || db === void 0 ? void 0 : db.collection(authCollection).findOne({ email }));
49
49
  if (existingUser && !skipUserCheck) {
@@ -56,7 +56,7 @@ const exposeRoutes = (fastify) => __awaiter(void 0, void 0, void 0, function* ()
56
56
  }, function (req, res) {
57
57
  return __awaiter(this, void 0, void 0, function* () {
58
58
  const { authCollection } = constants_1.AUTH_CONFIG;
59
- const db = fastify.mongo.client.db(constants_1.DB_NAME);
59
+ const db = fastify.mongo.client.db(constants_1.AUTH_DB_NAME);
60
60
  const { email, password } = req.body;
61
61
  const hashedPassword = yield (0, crypto_1.hashPassword)(password);
62
62
  const now = new Date();
@@ -311,6 +311,8 @@ export type Operators = {
311
311
  * @returns
312
312
  */
313
313
  $regex: OperatorsFunction;
314
+ '%stringToOid': OperatorsFunction;
315
+ '%oidToString': OperatorsFunction;
314
316
  };
315
317
  export declare enum RulesOperators {
316
318
  $exists = "$exists",
@@ -328,7 +330,9 @@ export declare enum RulesOperators {
328
330
  $nin = "$nin",
329
331
  $all = "$all",
330
332
  $size = "$size",
331
- $regex = "$regex"
333
+ $regex = "$regex",
334
+ '%stringToOid' = "%stringToOid",
335
+ '%oidToString' = "%oidToString"
332
336
  }
333
337
  export type RulesOperatorsInArray<T> = Partial<{
334
338
  [KEY in keyof T]: Partial<{
@@ -1 +1 @@
1
- {"version":3,"file":"interface.d.ts","sourceRoot":"","sources":["../../../src/utils/rules-matcher/interface.ts"],"names":[],"mappings":"AAAA,MAAM,MAAM,WAAW,GAAG,CAAC,CAAC,EAAE,GAAG,KAAK,OAAO,CAAA;AAE7C,MAAM,MAAM,iBAAiB,GAAG;IAC9B,EAAE,EAAE,MAAM,SAAS,CAAA;IACnB,KAAK,EAAE,GAAG,CAAA;IACV,GAAG,CAAC,EAAE,GAAG,CAAA;CACV,CAAA;AAED,MAAM,WAAW,iBAAiB;IAChC;;;;;;;OAOG;IACH,QAAQ,EAAE,CAAC,CAAC,EAAE,EAAE,EAAE,CAAC,KAAK,OAAO,CAAA;IAC/B;;;;;;;;;OASG;IACH,IAAI,EAAE,CACJ,KAAK,EAAE,MAAM,CAAC,MAAM,EAAE,GAAG,CAAC,EAC1B,IAAI,EAAE,MAAM,CAAC,MAAM,EAAE,GAAG,CAAC,EACzB,OAAO,CAAC,EAAE,MAAM,CAAC,MAAM,EAAE,GAAG,CAAC,KAC1B;QACH,KAAK,EAAE,OAAO,CAAA;QACd,IAAI,EAAE,MAAM,CAAA;KACb,CAAA;IACD;;;;;;;;;OASG;IACH,MAAM,EAAE,CACN,KAAK,EAAE,WAAW,CAAC,GAAG,CAAC,EACvB,IAAI,EAAE,MAAM,CAAC,MAAM,EAAE,GAAG,CAAC,EACzB,OAAO,EAAE,MAAM,CAAC,MAAM,EAAE,GAAG,CAAC,KACzB,MAAM,CAAC,MAAM,EAAE,GAAG,CAAC,CAAA;IACxB;;;;;;OAMG;IACH,MAAM,EAAE,WAAW,CAAA;IACnB;;;;;;OAMG;IACH,SAAS,EAAE,WAAW,CAAA;IACtB;;;;;;OAMG;IACH,QAAQ,EAAE,WAAW,CAAA;IACrB;;;;;;OAMG;IACH,UAAU,EAAE,WAAW,CAAA;IACvB;;;;;;OAMG;IACH,QAAQ,EAAE,WAAW,CAAA;IACrB;;;;;;OAMG;IACH,qBAAqB,EAAE,CAAC,KAAK,EAAE,WAAW,GAAG,SAAS,GAAG,MAAM,KAAK,iBAAiB,CAAA;IACrF;;;;;;OAMG;IACH,SAAS,EAAE,CAAC,KAAK,EAAE,GAAG,KAAK,MAAM,GAAG,IAAI,CAAA;IACxC;;;;;;OAMG;IACH,cAAc,EAAE,CAAC,KAAK,EAAE,GAAG,KAAK,iBAAiB,CAAA;IACjD;;;;;;;OAOG;IACH,OAAO,EAAE,CAAC,KAAK,EAAE,GAAG,KAAK,OAAO,CAAA;IAChC;;;;;;OAMG;IACH,UAAU,EAAE,CAAC,CAAC,EAAE,KAAK,EAAE,CAAC,KAAK,KAAK,CAAC,CAAC,CAAC,CAAA;IACrC;;;;;;;;OAQG;IACH,OAAO,EAAE,CAAC,IAAI,EAAE,MAAM,EAAE,MAAM,CAAC,EAAE,MAAM,KAAK,MAAM,CAAA;IAClD;;;;;;;OAOG;IACH,WAAW,EAAE,CAAC,CAAC,EAAE,KAAK,EAAE,CAAC,KAAK,MAAM,CAAA;IACpC;;;;;;;;OAQG;IACH,SAAS,EAAE,CAAC,CAAC,SAAS,MAAM,CAAC,MAAM,EAAE,GAAG,CAAC,EACvC,KAAK,EAAE,WAAW,CAAC,CAAC,CAAC,EACrB,IAAI,EAAE,CAAC,EACP,OAAO,CAAC,EAAE,MAAM,CAAC,MAAM,EAAE,GAAG,CAAC,KAC1B,OAAO,CAAA;IACZ;;;;;;;OAOG;IACH,OAAO,EAAE,CAAC,CAAC,SAAS,MAAM,CAAC,MAAM,EAAE,GAAG,CAAC,EACrC,KAAK,CAAC,EAAE,CAAC,EACT,OAAO,CAAC,EAAE,MAAM,CAAC,MAAM,EAAE,GAAG,CAAC,KAC1B,MAAM,EAAE,GAAG,IAAI,CAAA;CACrB;AAED,MAAM,MAAM,iBAAiB,GAAG,CAAC,CAAC,EAAE,GAAG,EAAE,CAAC,EAAE,GAAG,EAAE,GAAG,CAAC,EAAE,GAAG,EAAE,IAAI,CAAC,EAAE,GAAG,KAAK,OAAO,CAAA;AAElF,MAAM,MAAM,SAAS,GAAG;IACtB;;;;;;;;OAQG;IACH,OAAO,EAAE,iBAAiB,CAAA;IAC1B;;;;;;;OAOG;IACH,GAAG,EAAE,iBAAiB,CAAA;IACtB;;;;;;;OAOG;IACH,GAAG,EAAE,iBAAiB,CAAA;IACtB;;;;;;;OAOG;IACH,GAAG,EAAE,iBAAiB,CAAA;IACtB;;;;;;;OAOG;IACH,IAAI,EAAE,iBAAiB,CAAA;IACvB;;;;;;;OAOG;IACH,GAAG,EAAE,iBAAiB,CAAA;IACtB;;;;;;;OAOG;IACH,IAAI,EAAE,iBAAiB,CAAA;IACvB;;;;;;;OAOG;IACH,MAAM,EAAE,iBAAiB,CAAA;IACzB;;;;;;;OAOG;IACH,OAAO,EAAE,iBAAiB,CAAA;IAC1B;;;;;;;OAOG;IACH,MAAM,EAAE,iBAAiB,CAAA;IACzB;;;;;;;OAOG;IACH,OAAO,EAAE,iBAAiB,CAAA;IAE1B;;;;;;;;OAQG;IACH,GAAG,EAAE,iBAAiB,CAAA;IACtB;;;;;;;;OAQG;IACH,IAAI,EAAE,iBAAiB,CAAA;IACvB;;;;;;;;OAQG;IACH,IAAI,EAAE,iBAAiB,CAAA;IACvB;;;;;;;OAOG;IACH,KAAK,EAAE,iBAAiB,CAAA;IACxB;;;;;;;;;OASG;IACH,MAAM,EAAE,iBAAiB,CAAA;CAC1B,CAAA;AAED,oBAAY,cAAc;IACxB,OAAO,YAAY;IACnB,GAAG,QAAQ;IACX,GAAG,QAAQ;IACX,GAAG,QAAQ;IACX,IAAI,SAAS;IACb,GAAG,QAAQ;IACX,IAAI,SAAS;IACb,MAAM,WAAW;IACjB,OAAO,YAAY;IACnB,MAAM,WAAW;IACjB,OAAO,YAAY;IACnB,GAAG,QAAQ;IACX,IAAI,SAAS;IACb,IAAI,SAAS;IACb,KAAK,UAAU;IACf,MAAM,WAAW;CAClB;AAED,MAAM,MAAM,qBAAqB,CAAC,CAAC,IAAI,OAAO,CAAC;KAC5C,GAAG,IAAI,MAAM,CAAC,GAAG,OAAO,CAAC;SACvB,CAAC,IAAI,MAAM,OAAO,cAAc,GAAG,CAAC,CAAC,GAAG,CAAC;KAC3C,CAAC;CACH,CAAC,CAAA;AAEF,MAAM,MAAM,eAAe,CAAC,CAAC,IAAI;IAAE,eAAe,CAAC,EAAE,OAAO,CAAA;CAAE,GAAG,CAAC,CAAA;AAElE,oBAAY,UAAU;IACpB,IAAI,SAAS;IACb,GAAG,QAAQ;CACZ;AAED,MAAM,MAAM,WAAW,CAAC,CAAC,IACrB,eAAe,CAAC,CAAC,CAAC,GAClB;KACG,CAAC,IAAI,MAAM,OAAO,UAAU,GACzB,KAAK,CAAC,qBAAqB,CAAC,eAAe,CAAC,CAAC,CAAC,CAAC,CAAC,GAChD,KAAK,CAAC,WAAW,CAAC,eAAe,CAAC,CAAC,CAAC,CAAC,CAAC;CAC3C,GACD,KAAK,CAAC,OAAO,CAAC,qBAAqB,CAAC,eAAe,CAAC,CAAC,CAAC,CAAC,EAAE,SAAS,CAAC,CAAC,CAAA"}
1
+ {"version":3,"file":"interface.d.ts","sourceRoot":"","sources":["../../../src/utils/rules-matcher/interface.ts"],"names":[],"mappings":"AAAA,MAAM,MAAM,WAAW,GAAG,CAAC,CAAC,EAAE,GAAG,KAAK,OAAO,CAAA;AAE7C,MAAM,MAAM,iBAAiB,GAAG;IAC9B,EAAE,EAAE,MAAM,SAAS,CAAA;IACnB,KAAK,EAAE,GAAG,CAAA;IACV,GAAG,CAAC,EAAE,GAAG,CAAA;CACV,CAAA;AAED,MAAM,WAAW,iBAAiB;IAChC;;;;;;;OAOG;IACH,QAAQ,EAAE,CAAC,CAAC,EAAE,EAAE,EAAE,CAAC,KAAK,OAAO,CAAA;IAC/B;;;;;;;;;OASG;IACH,IAAI,EAAE,CACJ,KAAK,EAAE,MAAM,CAAC,MAAM,EAAE,GAAG,CAAC,EAC1B,IAAI,EAAE,MAAM,CAAC,MAAM,EAAE,GAAG,CAAC,EACzB,OAAO,CAAC,EAAE,MAAM,CAAC,MAAM,EAAE,GAAG,CAAC,KAC1B;QACH,KAAK,EAAE,OAAO,CAAA;QACd,IAAI,EAAE,MAAM,CAAA;KACb,CAAA;IACD;;;;;;;;;OASG;IACH,MAAM,EAAE,CACN,KAAK,EAAE,WAAW,CAAC,GAAG,CAAC,EACvB,IAAI,EAAE,MAAM,CAAC,MAAM,EAAE,GAAG,CAAC,EACzB,OAAO,EAAE,MAAM,CAAC,MAAM,EAAE,GAAG,CAAC,KACzB,MAAM,CAAC,MAAM,EAAE,GAAG,CAAC,CAAA;IACxB;;;;;;OAMG;IACH,MAAM,EAAE,WAAW,CAAA;IACnB;;;;;;OAMG;IACH,SAAS,EAAE,WAAW,CAAA;IACtB;;;;;;OAMG;IACH,QAAQ,EAAE,WAAW,CAAA;IACrB;;;;;;OAMG;IACH,UAAU,EAAE,WAAW,CAAA;IACvB;;;;;;OAMG;IACH,QAAQ,EAAE,WAAW,CAAA;IACrB;;;;;;OAMG;IACH,qBAAqB,EAAE,CAAC,KAAK,EAAE,WAAW,GAAG,SAAS,GAAG,MAAM,KAAK,iBAAiB,CAAA;IACrF;;;;;;OAMG;IACH,SAAS,EAAE,CAAC,KAAK,EAAE,GAAG,KAAK,MAAM,GAAG,IAAI,CAAA;IACxC;;;;;;OAMG;IACH,cAAc,EAAE,CAAC,KAAK,EAAE,GAAG,KAAK,iBAAiB,CAAA;IACjD;;;;;;;OAOG;IACH,OAAO,EAAE,CAAC,KAAK,EAAE,GAAG,KAAK,OAAO,CAAA;IAChC;;;;;;OAMG;IACH,UAAU,EAAE,CAAC,CAAC,EAAE,KAAK,EAAE,CAAC,KAAK,KAAK,CAAC,CAAC,CAAC,CAAA;IACrC;;;;;;;;OAQG;IACH,OAAO,EAAE,CAAC,IAAI,EAAE,MAAM,EAAE,MAAM,CAAC,EAAE,MAAM,KAAK,MAAM,CAAA;IAClD;;;;;;;OAOG;IACH,WAAW,EAAE,CAAC,CAAC,EAAE,KAAK,EAAE,CAAC,KAAK,MAAM,CAAA;IACpC;;;;;;;;OAQG;IACH,SAAS,EAAE,CAAC,CAAC,SAAS,MAAM,CAAC,MAAM,EAAE,GAAG,CAAC,EACvC,KAAK,EAAE,WAAW,CAAC,CAAC,CAAC,EACrB,IAAI,EAAE,CAAC,EACP,OAAO,CAAC,EAAE,MAAM,CAAC,MAAM,EAAE,GAAG,CAAC,KAC1B,OAAO,CAAA;IACZ;;;;;;;OAOG;IACH,OAAO,EAAE,CAAC,CAAC,SAAS,MAAM,CAAC,MAAM,EAAE,GAAG,CAAC,EACrC,KAAK,CAAC,EAAE,CAAC,EACT,OAAO,CAAC,EAAE,MAAM,CAAC,MAAM,EAAE,GAAG,CAAC,KAC1B,MAAM,EAAE,GAAG,IAAI,CAAA;CACrB;AAED,MAAM,MAAM,iBAAiB,GAAG,CAAC,CAAC,EAAE,GAAG,EAAE,CAAC,EAAE,GAAG,EAAE,GAAG,CAAC,EAAE,GAAG,EAAE,IAAI,CAAC,EAAE,GAAG,KAAK,OAAO,CAAA;AAElF,MAAM,MAAM,SAAS,GAAG;IACtB;;;;;;;;OAQG;IACH,OAAO,EAAE,iBAAiB,CAAA;IAC1B;;;;;;;OAOG;IACH,GAAG,EAAE,iBAAiB,CAAA;IACtB;;;;;;;OAOG;IACH,GAAG,EAAE,iBAAiB,CAAA;IACtB;;;;;;;OAOG;IACH,GAAG,EAAE,iBAAiB,CAAA;IACtB;;;;;;;OAOG;IACH,IAAI,EAAE,iBAAiB,CAAA;IACvB;;;;;;;OAOG;IACH,GAAG,EAAE,iBAAiB,CAAA;IACtB;;;;;;;OAOG;IACH,IAAI,EAAE,iBAAiB,CAAA;IACvB;;;;;;;OAOG;IACH,MAAM,EAAE,iBAAiB,CAAA;IACzB;;;;;;;OAOG;IACH,OAAO,EAAE,iBAAiB,CAAA;IAC1B;;;;;;;OAOG;IACH,MAAM,EAAE,iBAAiB,CAAA;IACzB;;;;;;;OAOG;IACH,OAAO,EAAE,iBAAiB,CAAA;IAE1B;;;;;;;;OAQG;IACH,GAAG,EAAE,iBAAiB,CAAA;IACtB;;;;;;;;OAQG;IACH,IAAI,EAAE,iBAAiB,CAAA;IACvB;;;;;;;;OAQG;IACH,IAAI,EAAE,iBAAiB,CAAA;IACvB;;;;;;;OAOG;IACH,KAAK,EAAE,iBAAiB,CAAA;IACxB;;;;;;;;;OASG;IACH,MAAM,EAAE,iBAAiB,CAAA;IACzB,cAAc,EAAE,iBAAiB,CAAA;IACjC,cAAc,EAAE,iBAAiB,CAAA;CAClC,CAAA;AAED,oBAAY,cAAc;IACxB,OAAO,YAAY;IACnB,GAAG,QAAQ;IACX,GAAG,QAAQ;IACX,GAAG,QAAQ;IACX,IAAI,SAAS;IACb,GAAG,QAAQ;IACX,IAAI,SAAS;IACb,MAAM,WAAW;IACjB,OAAO,YAAY;IACnB,MAAM,WAAW;IACjB,OAAO,YAAY;IACnB,GAAG,QAAQ;IACX,IAAI,SAAS;IACb,IAAI,SAAS;IACb,KAAK,UAAU;IACf,MAAM,WAAW;IACjB,cAAc,iBAAiB;IAC/B,cAAc,iBAAiB;CAChC;AAED,MAAM,MAAM,qBAAqB,CAAC,CAAC,IAAI,OAAO,CAAC;KAC5C,GAAG,IAAI,MAAM,CAAC,GAAG,OAAO,CAAC;SACvB,CAAC,IAAI,MAAM,OAAO,cAAc,GAAG,CAAC,CAAC,GAAG,CAAC;KAC3C,CAAC;CACH,CAAC,CAAA;AAEF,MAAM,MAAM,eAAe,CAAC,CAAC,IAAI;IAAE,eAAe,CAAC,EAAE,OAAO,CAAA;CAAE,GAAG,CAAC,CAAA;AAElE,oBAAY,UAAU;IACpB,IAAI,SAAS;IACb,GAAG,QAAQ;CACZ;AAED,MAAM,MAAM,WAAW,CAAC,CAAC,IACrB,eAAe,CAAC,CAAC,CAAC,GAClB;KACG,CAAC,IAAI,MAAM,OAAO,UAAU,GACzB,KAAK,CAAC,qBAAqB,CAAC,eAAe,CAAC,CAAC,CAAC,CAAC,CAAC,GAChD,KAAK,CAAC,WAAW,CAAC,eAAe,CAAC,CAAC,CAAC,CAAC,CAAC;CAC3C,GACD,KAAK,CAAC,OAAO,CAAC,qBAAqB,CAAC,eAAe,CAAC,CAAC,CAAC,CAAC,EAAE,SAAS,CAAC,CAAC,CAAA"}
@@ -19,6 +19,8 @@ var RulesOperators;
19
19
  RulesOperators["$all"] = "$all";
20
20
  RulesOperators["$size"] = "$size";
21
21
  RulesOperators["$regex"] = "$regex";
22
+ RulesOperators["%stringToOid"] = "%stringToOid";
23
+ RulesOperators["%oidToString"] = "%oidToString";
22
24
  })(RulesOperators || (exports.RulesOperators = RulesOperators = {}));
23
25
  var RulesModes;
24
26
  (function (RulesModes) {
@@ -1 +1 @@
1
- {"version":3,"file":"utils.d.ts","sourceRoot":"","sources":["../../../src/utils/rules-matcher/utils.ts"],"names":[],"mappings":"AAGA,OAAO,EAAE,SAAS,EAAE,iBAAiB,EAAe,MAAM,aAAa,CAAA;AAIvE;;GAEG;AACH,QAAA,MAAM,iBAAiB,EAAE,iBAsNxB,CAAA;AAED;;GAEG;AACH,eAAO,MAAM,SAAS,EAAE,SAwDvB,CAAA;AAID,eAAe,iBAAiB,CAAA"}
1
+ {"version":3,"file":"utils.d.ts","sourceRoot":"","sources":["../../../src/utils/rules-matcher/utils.ts"],"names":[],"mappings":"AAGA,OAAO,EAAE,SAAS,EAAE,iBAAiB,EAAe,MAAM,aAAa,CAAA;AAsDvE;;GAEG;AACH,QAAA,MAAM,iBAAiB,EAAE,iBAsNxB,CAAA;AAED;;GAEG;AACH,eAAO,MAAM,SAAS,EAAE,SAoDvB,CAAA;AAID,eAAe,iBAAiB,CAAA"}