@mesob/auth-react 0.3.4 → 0.4.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (142) hide show
  1. package/dist/components/auth/auth-layout.d.ts +1 -1
  2. package/dist/components/auth/auth-layout.js +10 -2
  3. package/dist/components/auth/auth-layout.js.map +1 -1
  4. package/dist/components/auth/countdown.js +8 -6
  5. package/dist/components/auth/countdown.js.map +1 -1
  6. package/dist/components/auth/forgot-password.js +21 -19
  7. package/dist/components/auth/forgot-password.js.map +1 -1
  8. package/dist/components/auth/reset-password-form.js +22 -21
  9. package/dist/components/auth/reset-password-form.js.map +1 -1
  10. package/dist/components/auth/set-password.d.ts +9 -0
  11. package/dist/components/auth/set-password.js +527 -0
  12. package/dist/components/auth/set-password.js.map +1 -0
  13. package/dist/components/auth/sign-in.js +45 -26
  14. package/dist/components/auth/sign-in.js.map +1 -1
  15. package/dist/components/auth/sign-up.js +25 -29
  16. package/dist/components/auth/sign-up.js.map +1 -1
  17. package/dist/components/auth/verification-form.js +24 -27
  18. package/dist/components/auth/verification-form.js.map +1 -1
  19. package/dist/components/auth/verify-email.js +40 -31
  20. package/dist/components/auth/verify-email.js.map +1 -1
  21. package/dist/components/auth/verify-phone.js +40 -31
  22. package/dist/components/auth/verify-phone.js.map +1 -1
  23. package/dist/components/authorization/deny.d.ts +11 -0
  24. package/dist/components/authorization/deny.js +52 -0
  25. package/dist/components/authorization/deny.js.map +1 -0
  26. package/dist/components/authorization/grant.d.ts +12 -0
  27. package/dist/components/authorization/grant.js +57 -0
  28. package/dist/components/authorization/grant.js.map +1 -0
  29. package/dist/components/iam/permission-selector.d.ts +19 -0
  30. package/dist/components/iam/permission-selector.js +122 -0
  31. package/dist/components/iam/permission-selector.js.map +1 -0
  32. package/dist/components/iam/permissions.js +21 -33
  33. package/dist/components/iam/permissions.js.map +1 -1
  34. package/dist/components/iam/role-detail-layout.d.ts +11 -0
  35. package/dist/components/iam/role-detail-layout.js +137 -0
  36. package/dist/components/iam/role-detail-layout.js.map +1 -0
  37. package/dist/components/iam/role-detail-page.d.ts +9 -0
  38. package/dist/components/iam/role-detail-page.js +229 -0
  39. package/dist/components/iam/role-detail-page.js.map +1 -0
  40. package/dist/components/iam/role-permissions-page.d.ts +8 -0
  41. package/dist/components/iam/role-permissions-page.js +397 -0
  42. package/dist/components/iam/role-permissions-page.js.map +1 -0
  43. package/dist/components/iam/roles.js +20 -10
  44. package/dist/components/iam/roles.js.map +1 -1
  45. package/dist/components/iam/tenants.js +9 -2
  46. package/dist/components/iam/tenants.js.map +1 -1
  47. package/dist/components/iam/users.js +10 -9
  48. package/dist/components/iam/users.js.map +1 -1
  49. package/dist/components/profile/account.js +110 -19
  50. package/dist/components/profile/account.js.map +1 -1
  51. package/dist/components/profile/change-email-form.js +26 -29
  52. package/dist/components/profile/change-email-form.js.map +1 -1
  53. package/dist/components/profile/change-phone-form.js +26 -29
  54. package/dist/components/profile/change-phone-form.js.map +1 -1
  55. package/dist/components/profile/change-profile.d.ts +2 -1
  56. package/dist/components/profile/change-profile.js +16 -8
  57. package/dist/components/profile/change-profile.js.map +1 -1
  58. package/dist/components/profile/otp-verification-modal.js +24 -27
  59. package/dist/components/profile/otp-verification-modal.js.map +1 -1
  60. package/dist/components/profile/security.js +88 -57
  61. package/dist/components/profile/security.js.map +1 -1
  62. package/dist/components/profile/verify-change-email-form.js +24 -27
  63. package/dist/components/profile/verify-change-email-form.js.map +1 -1
  64. package/dist/components/profile/verify-change-phone-form.js +24 -27
  65. package/dist/components/profile/verify-change-phone-form.js.map +1 -1
  66. package/dist/index.d.ts +9 -1
  67. package/dist/index.js +1897 -821
  68. package/dist/index.js.map +1 -1
  69. package/dist/pages/auth/forgot-password.d.ts +7 -0
  70. package/dist/pages/auth/forgot-password.js +784 -0
  71. package/dist/pages/auth/forgot-password.js.map +1 -0
  72. package/dist/pages/auth/layout.d.ts +8 -0
  73. package/dist/pages/auth/layout.js +562 -0
  74. package/dist/pages/auth/layout.js.map +1 -0
  75. package/dist/pages/auth/reset-password.d.ts +10 -0
  76. package/dist/pages/auth/reset-password.js +913 -0
  77. package/dist/pages/auth/reset-password.js.map +1 -0
  78. package/dist/pages/auth/set-password.d.ts +10 -0
  79. package/dist/pages/auth/set-password.js +946 -0
  80. package/dist/pages/auth/set-password.js.map +1 -0
  81. package/dist/pages/auth/sign-in.d.ts +10 -0
  82. package/dist/pages/auth/sign-in.js +984 -0
  83. package/dist/pages/auth/sign-in.js.map +1 -0
  84. package/dist/pages/auth/sign-up.d.ts +10 -0
  85. package/dist/pages/auth/sign-up.js +940 -0
  86. package/dist/pages/auth/sign-up.js.map +1 -0
  87. package/dist/pages/auth/verify-email.d.ts +10 -0
  88. package/dist/pages/auth/verify-email.js +950 -0
  89. package/dist/pages/auth/verify-email.js.map +1 -0
  90. package/dist/pages/auth/verify-phone.d.ts +10 -0
  91. package/dist/pages/auth/verify-phone.js +964 -0
  92. package/dist/pages/auth/verify-phone.js.map +1 -0
  93. package/dist/pages/iam/permissions.d.ts +5 -0
  94. package/dist/pages/iam/permissions.js +308 -0
  95. package/dist/pages/iam/permissions.js.map +1 -0
  96. package/dist/pages/iam/role-detail-layout.d.ts +12 -0
  97. package/dist/pages/iam/role-detail-layout.js +145 -0
  98. package/dist/pages/iam/role-detail-layout.js.map +1 -0
  99. package/dist/pages/iam/role-detail.d.ts +12 -0
  100. package/dist/pages/iam/role-detail.js +241 -0
  101. package/dist/pages/iam/role-detail.js.map +1 -0
  102. package/dist/pages/iam/role-permissions.d.ts +12 -0
  103. package/dist/pages/iam/role-permissions.js +409 -0
  104. package/dist/pages/iam/role-permissions.js.map +1 -0
  105. package/dist/pages/iam/role-users.d.ts +12 -0
  106. package/dist/pages/iam/role-users.js +825 -0
  107. package/dist/pages/iam/role-users.js.map +1 -0
  108. package/dist/pages/iam/roles.d.ts +5 -0
  109. package/dist/pages/iam/roles.js +684 -0
  110. package/dist/pages/iam/roles.js.map +1 -0
  111. package/dist/pages/iam/sessions.d.ts +5 -0
  112. package/dist/pages/iam/sessions.js +315 -0
  113. package/dist/pages/iam/sessions.js.map +1 -0
  114. package/dist/pages/iam/tenant-detail.d.ts +10 -0
  115. package/dist/pages/iam/tenant-detail.js +186 -0
  116. package/dist/pages/iam/tenant-detail.js.map +1 -0
  117. package/dist/pages/iam/tenants.d.ts +5 -0
  118. package/dist/pages/iam/tenants.js +610 -0
  119. package/dist/pages/iam/tenants.js.map +1 -0
  120. package/dist/pages/iam/user-activity.d.ts +10 -0
  121. package/dist/pages/iam/user-activity.js +850 -0
  122. package/dist/pages/iam/user-activity.js.map +1 -0
  123. package/dist/pages/iam/user-detail-layout.d.ts +12 -0
  124. package/dist/pages/iam/user-detail-layout.js +106 -0
  125. package/dist/pages/iam/user-detail-layout.js.map +1 -0
  126. package/dist/pages/iam/user-detail.d.ts +10 -0
  127. package/dist/pages/iam/user-detail.js +102 -0
  128. package/dist/pages/iam/user-detail.js.map +1 -0
  129. package/dist/pages/iam/users.d.ts +5 -0
  130. package/dist/pages/iam/users.js +1275 -0
  131. package/dist/pages/iam/users.js.map +1 -0
  132. package/dist/pages/profile/account.d.ts +5 -0
  133. package/dist/pages/profile/account.js +182 -0
  134. package/dist/pages/profile/account.js.map +1 -0
  135. package/dist/pages/profile/layout.d.ts +8 -0
  136. package/dist/pages/profile/layout.js +133 -0
  137. package/dist/pages/profile/layout.js.map +1 -0
  138. package/dist/pages/profile/security.d.ts +5 -0
  139. package/dist/pages/profile/security.js +1539 -0
  140. package/dist/pages/profile/security.js.map +1 -0
  141. package/dist/{types-vcfvnAzQ.d.ts → types-g9QcNRxT.d.ts} +13 -7
  142. package/package.json +102 -3
@@ -0,0 +1,409 @@
1
+ // src/components/iam/role-permissions-page.tsx
2
+ import {
3
+ Badge as Badge2,
4
+ Button,
5
+ DataTablePagination,
6
+ DeleteConfirmButton,
7
+ DisplayTable,
8
+ EntityEmptyState,
9
+ EntityFilter,
10
+ EntityHeader,
11
+ EntityLoadingState,
12
+ EntitySearch,
13
+ EntitySort,
14
+ EntityViewToggle,
15
+ PageBody,
16
+ Tbody,
17
+ Td,
18
+ Th,
19
+ Thead,
20
+ Tr,
21
+ useEntityPagination,
22
+ useEntityParams
23
+ } from "@mesob/ui/components";
24
+ import { IconKey as IconKey2, IconPlus, IconTrash } from "@tabler/icons-react";
25
+ import { useQueryClient } from "@tanstack/react-query";
26
+ import { useMemo as useMemo2 } from "react";
27
+ import { toast } from "sonner";
28
+
29
+ // src/provider.tsx
30
+ import { QueryClient, QueryClientProvider } from "@tanstack/react-query";
31
+ import { deepmerge } from "deepmerge-ts";
32
+ import createFetchClient from "openapi-fetch";
33
+ import createClient from "openapi-react-query";
34
+ import { createContext, useContext, useMemo, useState } from "react";
35
+
36
+ // src/utils/cookie.ts
37
+ var isProduction = typeof process !== "undefined" && process.env.NODE_ENV === "production";
38
+
39
+ // src/provider.tsx
40
+ import { jsx } from "react/jsx-runtime";
41
+ var SessionContext = createContext(null);
42
+ var ApiContext = createContext(null);
43
+ var ConfigContext = createContext(null);
44
+ var queryClient = new QueryClient({
45
+ defaultOptions: {
46
+ queries: {
47
+ refetchOnWindowFocus: false
48
+ }
49
+ }
50
+ });
51
+ function useApi() {
52
+ const context = useContext(ApiContext);
53
+ if (!context) {
54
+ throw new Error("useApi must be used within MesobAuthProvider");
55
+ }
56
+ return context;
57
+ }
58
+
59
+ // src/components/iam/permission-selector.tsx
60
+ import {
61
+ Badge,
62
+ EntitySelector,
63
+ useEntitySectionState
64
+ } from "@mesob/ui/components";
65
+ import { IconKey } from "@tabler/icons-react";
66
+ import { jsx as jsx2, jsxs } from "react/jsx-runtime";
67
+ var permissionColumns = [
68
+ {
69
+ key: "permission",
70
+ header: "Permission",
71
+ cell: (permission) => /* @__PURE__ */ jsxs("div", { className: "space-y-1", children: [
72
+ /* @__PURE__ */ jsx2("p", { className: "font-medium", children: permission.activity }),
73
+ /* @__PURE__ */ jsx2("p", { className: "font-mono text-xs text-muted-foreground", children: permission.id })
74
+ ] })
75
+ },
76
+ {
77
+ key: "scope",
78
+ header: "Scope",
79
+ cell: (permission) => /* @__PURE__ */ jsxs("div", { className: "flex flex-wrap gap-2", children: [
80
+ /* @__PURE__ */ jsx2(Badge, { variant: "secondary", children: permission.application }),
81
+ /* @__PURE__ */ jsx2(Badge, { variant: "outline", children: permission.feature })
82
+ ] })
83
+ }
84
+ ];
85
+ function PermissionSelector({
86
+ trigger,
87
+ multiple = true,
88
+ onSelect,
89
+ excludeIds = []
90
+ }) {
91
+ const { hooks } = useApi();
92
+ const state = useEntitySectionState({
93
+ defaultSort: "id",
94
+ defaultOrder: "asc",
95
+ defaultPageSize: 10,
96
+ searchParamName: "search"
97
+ });
98
+ const permissionsQuery = state.queryConfig;
99
+ const { data, isPending, isFetching } = hooks.useQuery(
100
+ "get",
101
+ "/permissions",
102
+ permissionsQuery
103
+ );
104
+ const items = (data?.permissions ?? []).filter(
105
+ (permission) => !excludeIds.includes(permission.id)
106
+ );
107
+ const config = {
108
+ title: "Select permission(s)",
109
+ multiple,
110
+ entityName: "permission",
111
+ entityIcon: IconKey,
112
+ columns: permissionColumns,
113
+ getItemLabel: (permission) => permission.id,
114
+ searchPlaceholder: "Search permissions...",
115
+ filterOptions: [
116
+ { label: "All", value: "" },
117
+ { label: "Application", value: "application" },
118
+ { label: "Feature", value: "feature" },
119
+ { label: "Activity", value: "activity" }
120
+ ],
121
+ sortOptions: [
122
+ { label: "ID", value: "id" },
123
+ { label: "Application", value: "application" },
124
+ { label: "Feature", value: "feature" },
125
+ { label: "Activity", value: "activity" }
126
+ ],
127
+ showViewToggle: false,
128
+ wrapHeaderInCard: false
129
+ };
130
+ return /* @__PURE__ */ jsx2(
131
+ EntitySelector,
132
+ {
133
+ trigger,
134
+ config,
135
+ onSelect,
136
+ items,
137
+ total: items.length,
138
+ isLoading: isPending || isFetching,
139
+ state
140
+ }
141
+ );
142
+ }
143
+
144
+ // src/components/iam/role-permissions-page.tsx
145
+ import { jsx as jsx3, jsxs as jsxs2 } from "react/jsx-runtime";
146
+ var TABLE_COLUMN_COUNT = 4;
147
+ function RolePermissionsPage({ roleId }) {
148
+ const { hooks } = useApi();
149
+ const qc = useQueryClient();
150
+ const { queryConfig, params, setParams } = useEntityParams({
151
+ searchKey: "search",
152
+ defaultSort: "application",
153
+ defaultOrder: "asc"
154
+ });
155
+ const permissionsQuery = useMemo2(
156
+ () => ({
157
+ params: {
158
+ path: { id: roleId },
159
+ query: queryConfig.params.query
160
+ }
161
+ }),
162
+ [queryConfig, roleId]
163
+ );
164
+ const { data, isPending, isFetching } = hooks.useQuery(
165
+ "get",
166
+ "/roles/{id}/permissions",
167
+ permissionsQuery,
168
+ { enabled: !!roleId }
169
+ );
170
+ const assignPermissions = hooks.useMutation(
171
+ "post",
172
+ "/roles/{id}/permissions",
173
+ {
174
+ onSuccess: (result) => {
175
+ qc.invalidateQueries({ queryKey: ["get", "/roles"] });
176
+ qc.invalidateQueries({ queryKey: ["get", "/roles/{id}"] });
177
+ qc.invalidateQueries({ queryKey: ["get", "/roles/{id}/permissions"] });
178
+ toast.success(
179
+ result?.created ? `${result.created} permission(s) added` : "No changes"
180
+ );
181
+ },
182
+ onError: () => {
183
+ toast.error("Failed to assign permissions");
184
+ }
185
+ }
186
+ );
187
+ const revokePermission = hooks.useMutation(
188
+ "delete",
189
+ "/roles/{id}/permissions/{permissionId}",
190
+ {
191
+ onSuccess: () => {
192
+ qc.invalidateQueries({ queryKey: ["get", "/roles"] });
193
+ qc.invalidateQueries({ queryKey: ["get", "/roles/{id}"] });
194
+ qc.invalidateQueries({
195
+ queryKey: ["get", "/roles/{id}/permissions"]
196
+ });
197
+ toast.success("Permission removed");
198
+ },
199
+ onError: () => {
200
+ toast.error("Failed to remove permission");
201
+ }
202
+ }
203
+ );
204
+ const permissions = data?.permissions ?? [];
205
+ const { total, pageCount } = useEntityPagination({
206
+ items: permissions,
207
+ total: data?.total,
208
+ pageSize: params.pageSize
209
+ });
210
+ const isLoading = isPending || isFetching;
211
+ const currentView = params.view || "table";
212
+ if (!roleId) {
213
+ return null;
214
+ }
215
+ let content;
216
+ if (isLoading) {
217
+ content = /* @__PURE__ */ jsx3(
218
+ EntityLoadingState,
219
+ {
220
+ view: currentView,
221
+ rowCount: params.pageSize,
222
+ columnCount: TABLE_COLUMN_COUNT,
223
+ cardCount: params.pageSize
224
+ }
225
+ );
226
+ } else if (total === 0) {
227
+ content = /* @__PURE__ */ jsx3(
228
+ EntityEmptyState,
229
+ {
230
+ icon: IconKey2,
231
+ entityName: "permission",
232
+ title: "No permissions assigned",
233
+ description: "Assign permissions from the selector to grant access to this role."
234
+ }
235
+ );
236
+ } else if (currentView === "table") {
237
+ content = /* @__PURE__ */ jsxs2("div", { className: "space-y-4", children: [
238
+ /* @__PURE__ */ jsxs2(DisplayTable, { withTableBorder: true, children: [
239
+ /* @__PURE__ */ jsx3(Thead, { children: /* @__PURE__ */ jsxs2(Tr, { children: [
240
+ /* @__PURE__ */ jsx3(Th, { children: "Permission" }),
241
+ /* @__PURE__ */ jsx3(Th, { children: "Application" }),
242
+ /* @__PURE__ */ jsx3(Th, { children: "Feature" }),
243
+ /* @__PURE__ */ jsx3(Th, { className: "w-[60px]" })
244
+ ] }) }),
245
+ /* @__PURE__ */ jsx3(Tbody, { children: permissions.map((permission) => /* @__PURE__ */ jsxs2(Tr, { children: [
246
+ /* @__PURE__ */ jsx3(Td, { children: /* @__PURE__ */ jsxs2("div", { className: "space-y-1", children: [
247
+ /* @__PURE__ */ jsx3("p", { className: "font-medium", children: permission.activity }),
248
+ /* @__PURE__ */ jsx3("p", { className: "font-mono text-xs text-muted-foreground", children: permission.id })
249
+ ] }) }),
250
+ /* @__PURE__ */ jsx3(Td, { children: /* @__PURE__ */ jsx3(Badge2, { variant: "secondary", children: permission.application }) }),
251
+ /* @__PURE__ */ jsx3(Td, { children: /* @__PURE__ */ jsx3(Badge2, { variant: "outline", children: permission.feature }) }),
252
+ /* @__PURE__ */ jsx3(Td, { children: /* @__PURE__ */ jsx3(
253
+ DeleteConfirmButton,
254
+ {
255
+ entityName: "permission",
256
+ onConfirm: () => revokePermission.mutate({
257
+ params: {
258
+ path: { id: roleId, permissionId: permission.id }
259
+ }
260
+ }),
261
+ triggerClassName: "size-8 text-destructive hover:text-destructive"
262
+ }
263
+ ) })
264
+ ] }, permission.id)) })
265
+ ] }),
266
+ /* @__PURE__ */ jsx3(
267
+ DataTablePagination,
268
+ {
269
+ pageIndex: params.page - 1,
270
+ pageSize: params.pageSize,
271
+ pageCount,
272
+ totalRows: total,
273
+ onPageChange: (page) => setParams({ page: page + 1 }),
274
+ onPageSizeChange: (pageSize) => setParams({ pageSize, page: 1 })
275
+ }
276
+ )
277
+ ] });
278
+ } else {
279
+ content = /* @__PURE__ */ jsxs2("div", { className: "space-y-4", children: [
280
+ /* @__PURE__ */ jsx3("div", { className: "grid grid-cols-1 gap-4 md:grid-cols-2 xl:grid-cols-3", children: permissions.map((permission) => /* @__PURE__ */ jsx3(
281
+ "div",
282
+ {
283
+ className: "rounded-xl border border-border/60 bg-card p-4 shadow-sm",
284
+ children: /* @__PURE__ */ jsxs2("div", { className: "flex items-start justify-between gap-3", children: [
285
+ /* @__PURE__ */ jsxs2("div", { className: "space-y-2", children: [
286
+ /* @__PURE__ */ jsx3("p", { className: "font-semibold", children: permission.activity }),
287
+ /* @__PURE__ */ jsxs2("div", { className: "flex flex-wrap gap-2", children: [
288
+ /* @__PURE__ */ jsx3(Badge2, { variant: "secondary", children: permission.application }),
289
+ /* @__PURE__ */ jsx3(Badge2, { variant: "outline", children: permission.feature })
290
+ ] }),
291
+ /* @__PURE__ */ jsx3("p", { className: "font-mono text-xs text-muted-foreground", children: permission.id })
292
+ ] }),
293
+ /* @__PURE__ */ jsx3(
294
+ Button,
295
+ {
296
+ type: "button",
297
+ variant: "ghost",
298
+ size: "icon",
299
+ onClick: () => revokePermission.mutate({
300
+ params: {
301
+ path: { id: roleId, permissionId: permission.id }
302
+ }
303
+ }),
304
+ disabled: revokePermission.isPending,
305
+ children: /* @__PURE__ */ jsx3(IconTrash, { className: "h-4 w-4" })
306
+ }
307
+ )
308
+ ] })
309
+ },
310
+ permission.id
311
+ )) }),
312
+ /* @__PURE__ */ jsx3(
313
+ DataTablePagination,
314
+ {
315
+ pageIndex: params.page - 1,
316
+ pageSize: params.pageSize,
317
+ pageCount,
318
+ totalRows: total,
319
+ onPageChange: (page) => setParams({ page: page + 1 }),
320
+ onPageSizeChange: (pageSize) => setParams({ pageSize, page: 1 })
321
+ }
322
+ )
323
+ ] });
324
+ }
325
+ return /* @__PURE__ */ jsxs2(PageBody, { className: "px-0 pb-6", children: [
326
+ /* @__PURE__ */ jsx3(
327
+ EntityHeader,
328
+ {
329
+ icon: /* @__PURE__ */ jsx3(IconKey2, { className: "h-5 w-5" }),
330
+ title: "Role permissions",
331
+ actions: /* @__PURE__ */ jsx3(
332
+ PermissionSelector,
333
+ {
334
+ trigger: /* @__PURE__ */ jsxs2(Button, { size: "sm", loading: assignPermissions.isPending, children: [
335
+ /* @__PURE__ */ jsx3(IconPlus, { className: "h-4 w-4" }),
336
+ "Add permissions"
337
+ ] }),
338
+ onSelect: (selectedPermissions) => {
339
+ if (!selectedPermissions.length) {
340
+ return;
341
+ }
342
+ assignPermissions.mutate({
343
+ params: { path: { id: roleId } },
344
+ body: {
345
+ permissionIds: selectedPermissions.map(
346
+ (permission) => permission.id
347
+ )
348
+ }
349
+ });
350
+ },
351
+ excludeIds: permissions.map((permission) => permission.id)
352
+ }
353
+ ),
354
+ search: /* @__PURE__ */ jsx3(
355
+ EntitySearch,
356
+ {
357
+ paramKey: "search",
358
+ placeholder: "Search assigned permissions..."
359
+ }
360
+ ),
361
+ filter: /* @__PURE__ */ jsx3(
362
+ EntityFilter,
363
+ {
364
+ options: [
365
+ { label: "All", value: "" },
366
+ { label: "Application", value: "application" },
367
+ { label: "Feature", value: "feature" },
368
+ { label: "Activity", value: "activity" }
369
+ ],
370
+ placeholder: "Search field"
371
+ }
372
+ ),
373
+ sort: /* @__PURE__ */ jsx3(
374
+ EntitySort,
375
+ {
376
+ defaultSort: "application",
377
+ defaultOrder: "asc",
378
+ options: [
379
+ { label: "ID", value: "id" },
380
+ { label: "Application", value: "application" },
381
+ { label: "Feature", value: "feature" },
382
+ { label: "Activity", value: "activity" }
383
+ ]
384
+ }
385
+ ),
386
+ view: /* @__PURE__ */ jsx3(EntityViewToggle, { views: ["table", "card"] })
387
+ }
388
+ ),
389
+ content
390
+ ] });
391
+ }
392
+
393
+ // src/pages/iam/role-permissions.tsx
394
+ import { jsx as jsx4 } from "react/jsx-runtime";
395
+ var metadata = {
396
+ title: "Role Permissions",
397
+ description: "Manage permissions assigned to a role."
398
+ };
399
+ async function RolePermissionsRoutePage({
400
+ params
401
+ }) {
402
+ const { id } = await params;
403
+ return /* @__PURE__ */ jsx4(RolePermissionsPage, { roleId: id });
404
+ }
405
+ export {
406
+ RolePermissionsRoutePage as default,
407
+ metadata
408
+ };
409
+ //# sourceMappingURL=role-permissions.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"sources":["../../../src/components/iam/role-permissions-page.tsx","../../../src/provider.tsx","../../../src/utils/cookie.ts","../../../src/components/iam/permission-selector.tsx","../../../src/pages/iam/role-permissions.tsx"],"sourcesContent":["'use client';\n\nimport {\n Badge,\n Button,\n DataTablePagination,\n DeleteConfirmButton,\n DisplayTable,\n EntityEmptyState,\n EntityFilter,\n EntityHeader,\n EntityLoadingState,\n EntitySearch,\n EntitySort,\n EntityViewToggle,\n PageBody,\n Tbody,\n Td,\n Th,\n Thead,\n Tr,\n useEntityPagination,\n useEntityParams,\n} from '@mesob/ui/components';\nimport { IconKey, IconPlus, IconTrash } from '@tabler/icons-react';\nimport { useQueryClient } from '@tanstack/react-query';\nimport type { ReactNode } from 'react';\nimport { useMemo } from 'react';\nimport { toast } from 'sonner';\nimport type { paths } from '../../data/openapi';\nimport { useApi } from '../../provider';\nimport { PermissionSelector } from './permission-selector';\n\ntype Permission = {\n id: string;\n description?: unknown;\n activity: string;\n application: string;\n feature: string;\n};\n\ntype RolePermissionsPageProps = {\n roleId: string;\n};\n\nconst TABLE_COLUMN_COUNT = 4;\n\nexport function RolePermissionsPage({ roleId }: RolePermissionsPageProps) {\n const { hooks } = useApi();\n const qc = useQueryClient();\n const { queryConfig, params, setParams } = useEntityParams({\n searchKey: 'search',\n defaultSort: 'application',\n defaultOrder: 'asc',\n });\n const permissionsQuery = useMemo(\n () =>\n ({\n params: {\n path: { id: roleId },\n query: queryConfig.params.query,\n },\n }) as {\n params: {\n path: { id: string };\n query: NonNullable<\n paths['/roles/{id}/permissions']['get']['parameters']['query']\n >;\n };\n },\n [queryConfig, roleId],\n );\n\n const { data, isPending, isFetching } = hooks.useQuery(\n 'get',\n '/roles/{id}/permissions',\n permissionsQuery,\n { enabled: !!roleId },\n );\n const assignPermissions = hooks.useMutation(\n 'post',\n '/roles/{id}/permissions',\n {\n onSuccess: (result: { created?: number } | undefined) => {\n qc.invalidateQueries({ queryKey: ['get', '/roles'] });\n qc.invalidateQueries({ queryKey: ['get', '/roles/{id}'] });\n qc.invalidateQueries({ queryKey: ['get', '/roles/{id}/permissions'] });\n toast.success(\n result?.created\n ? `${result.created} permission(s) added`\n : 'No changes',\n );\n },\n onError: () => {\n toast.error('Failed to assign permissions');\n },\n },\n );\n const revokePermission = hooks.useMutation(\n 'delete',\n '/roles/{id}/permissions/{permissionId}',\n {\n onSuccess: () => {\n qc.invalidateQueries({ queryKey: ['get', '/roles'] });\n qc.invalidateQueries({ queryKey: ['get', '/roles/{id}'] });\n qc.invalidateQueries({\n queryKey: ['get', '/roles/{id}/permissions'],\n });\n toast.success('Permission removed');\n },\n onError: () => {\n toast.error('Failed to remove permission');\n },\n },\n );\n\n const permissions = (data?.permissions ?? []) as Permission[];\n const { total, pageCount } = useEntityPagination({\n items: permissions,\n total: data?.total,\n pageSize: params.pageSize,\n });\n const isLoading = isPending || isFetching;\n const currentView = (params.view || 'table') as 'table' | 'card';\n\n if (!roleId) {\n return null;\n }\n\n let content: ReactNode;\n if (isLoading) {\n content = (\n <EntityLoadingState\n view={currentView}\n rowCount={params.pageSize}\n columnCount={TABLE_COLUMN_COUNT}\n cardCount={params.pageSize}\n />\n );\n } else if (total === 0) {\n content = (\n <EntityEmptyState\n icon={IconKey}\n entityName=\"permission\"\n title=\"No permissions assigned\"\n description=\"Assign permissions from the selector to grant access to this role.\"\n />\n );\n } else if (currentView === 'table') {\n content = (\n <div className=\"space-y-4\">\n <DisplayTable withTableBorder>\n <Thead>\n <Tr>\n <Th>Permission</Th>\n <Th>Application</Th>\n <Th>Feature</Th>\n <Th className=\"w-[60px]\" />\n </Tr>\n </Thead>\n <Tbody>\n {permissions.map((permission) => (\n <Tr key={permission.id}>\n <Td>\n <div className=\"space-y-1\">\n <p className=\"font-medium\">{permission.activity}</p>\n <p className=\"font-mono text-xs text-muted-foreground\">\n {permission.id}\n </p>\n </div>\n </Td>\n <Td>\n <Badge variant=\"secondary\">{permission.application}</Badge>\n </Td>\n <Td>\n <Badge variant=\"outline\">{permission.feature}</Badge>\n </Td>\n <Td>\n <DeleteConfirmButton\n entityName=\"permission\"\n onConfirm={() =>\n revokePermission.mutate({\n params: {\n path: { id: roleId, permissionId: permission.id },\n },\n })\n }\n triggerClassName=\"size-8 text-destructive hover:text-destructive\"\n />\n </Td>\n </Tr>\n ))}\n </Tbody>\n </DisplayTable>\n <DataTablePagination\n pageIndex={params.page - 1}\n pageSize={params.pageSize}\n pageCount={pageCount}\n totalRows={total}\n onPageChange={(page) => setParams({ page: page + 1 })}\n onPageSizeChange={(pageSize) => setParams({ pageSize, page: 1 })}\n />\n </div>\n );\n } else {\n content = (\n <div className=\"space-y-4\">\n <div className=\"grid grid-cols-1 gap-4 md:grid-cols-2 xl:grid-cols-3\">\n {permissions.map((permission) => (\n <div\n key={permission.id}\n className=\"rounded-xl border border-border/60 bg-card p-4 shadow-sm\"\n >\n <div className=\"flex items-start justify-between gap-3\">\n <div className=\"space-y-2\">\n <p className=\"font-semibold\">{permission.activity}</p>\n <div className=\"flex flex-wrap gap-2\">\n <Badge variant=\"secondary\">{permission.application}</Badge>\n <Badge variant=\"outline\">{permission.feature}</Badge>\n </div>\n <p className=\"font-mono text-xs text-muted-foreground\">\n {permission.id}\n </p>\n </div>\n <Button\n type=\"button\"\n variant=\"ghost\"\n size=\"icon\"\n onClick={() =>\n revokePermission.mutate({\n params: {\n path: { id: roleId, permissionId: permission.id },\n },\n })\n }\n disabled={revokePermission.isPending}\n >\n <IconTrash className=\"h-4 w-4\" />\n </Button>\n </div>\n </div>\n ))}\n </div>\n <DataTablePagination\n pageIndex={params.page - 1}\n pageSize={params.pageSize}\n pageCount={pageCount}\n totalRows={total}\n onPageChange={(page) => setParams({ page: page + 1 })}\n onPageSizeChange={(pageSize) => setParams({ pageSize, page: 1 })}\n />\n </div>\n );\n }\n\n return (\n <PageBody className=\"px-0 pb-6\">\n <EntityHeader\n icon={<IconKey className=\"h-5 w-5\" />}\n title=\"Role permissions\"\n actions={\n <PermissionSelector\n trigger={\n <Button size=\"sm\" loading={assignPermissions.isPending}>\n <IconPlus className=\"h-4 w-4\" />\n Add permissions\n </Button>\n }\n onSelect={(selectedPermissions) => {\n if (!selectedPermissions.length) {\n return;\n }\n\n assignPermissions.mutate({\n params: { path: { id: roleId } },\n body: {\n permissionIds: selectedPermissions.map(\n (permission) => permission.id,\n ),\n },\n });\n }}\n excludeIds={permissions.map((permission) => permission.id)}\n />\n }\n search={\n <EntitySearch\n paramKey=\"search\"\n placeholder=\"Search assigned permissions...\"\n />\n }\n filter={\n <EntityFilter\n options={[\n { label: 'All', value: '' },\n { label: 'Application', value: 'application' },\n { label: 'Feature', value: 'feature' },\n { label: 'Activity', value: 'activity' },\n ]}\n placeholder=\"Search field\"\n />\n }\n sort={\n <EntitySort\n defaultSort=\"application\"\n defaultOrder=\"asc\"\n options={[\n { label: 'ID', value: 'id' },\n { label: 'Application', value: 'application' },\n { label: 'Feature', value: 'feature' },\n { label: 'Activity', value: 'activity' },\n ]}\n />\n }\n view={<EntityViewToggle views={['table', 'card']} />}\n />\n {content}\n </PageBody>\n );\n}\n","'use client';\n\nimport { QueryClient, QueryClientProvider } from '@tanstack/react-query';\nimport { deepmerge } from 'deepmerge-ts';\nimport createFetchClient from 'openapi-fetch';\nimport createClient from 'openapi-react-query';\nimport type { ReactNode } from 'react';\nimport { createContext, useContext, useMemo, useState } from 'react';\nimport type { paths } from './data/openapi';\nimport { createTranslator } from './lib/translations';\nimport {\n type AuthClientConfig,\n type AuthResponse,\n defaultAuthClientConfig,\n type Session,\n type User,\n} from './types';\nimport { getSessionCookieName } from './utils/cookie';\nimport { createCustomFetch } from './utils/custom-fetch';\n\n// biome-ignore lint/suspicious/noExplicitAny: OpenAPI hooks type\ntype OpenApiHooks = any;\n\n// --- Utility: Check if running on server ---\nfunction isServer(): boolean {\n return typeof document === 'undefined';\n}\n\n/**\n * @deprecated Cookie is httpOnly and cannot be read client-side.\n * Use `useSession().isAuthenticated` instead.\n * This function always returns false on client.\n */\nexport function hasAuthCookie(_cookieName: string): boolean {\n // Cookie is httpOnly, can't check client-side\n // Always return false - use useSession() for auth status\n return false;\n}\n\n// --- Types ---\nexport type AuthStatus = 'loading' | 'authenticated' | 'unauthenticated';\n\ntype AuthState = {\n user: User | null;\n session: Session | null;\n status: AuthStatus;\n error: Error | null;\n};\n\ntype SessionContextValue = AuthState & {\n isLoading: boolean;\n isAuthenticated: boolean;\n refresh: () => Promise<void>;\n signOut: () => Promise<void>;\n};\n\ntype ApiContextValue = {\n hooks: OpenApiHooks;\n setAuth: (auth: AuthResponse) => void;\n clearAuth: () => void;\n refresh: () => Promise<void>;\n};\n\ntype ConfigContextValue = {\n config: AuthClientConfig;\n cookieName: string;\n t: (key: string, params?: Record<string, string | number>) => string;\n};\n\nconst SessionContext = createContext<SessionContextValue | null>(null);\nconst ApiContext = createContext<ApiContextValue | null>(null);\nconst ConfigContext = createContext<ConfigContextValue | null>(null);\n\nconst queryClient = new QueryClient({\n defaultOptions: {\n queries: {\n refetchOnWindowFocus: false,\n },\n },\n});\n\n// --- Hooks ---\n\n/**\n * Get session state including user, session, and auth status.\n * - `status`: 'loading' | 'authenticated' | 'unauthenticated'\n * - `isLoading`: true while fetching session\n * - `isAuthenticated`: true if user and session exist\n */\nexport function useSession(): SessionContextValue {\n const context = useContext(SessionContext);\n if (!context) {\n throw new Error('useSession must be used within MesobAuthProvider');\n }\n return context;\n}\n\nexport function useApi(): ApiContextValue {\n const context = useContext(ApiContext);\n if (!context) {\n throw new Error('useApi must be used within MesobAuthProvider');\n }\n return context;\n}\n\nexport function useConfig(): ConfigContextValue {\n const context = useContext(ConfigContext);\n if (!context) {\n throw new Error('useConfig must be used within MesobAuthProvider');\n }\n return context;\n}\n\n/**\n * @deprecated Cookie is httpOnly, can't be checked client-side.\n * Use `useSession().isAuthenticated` instead.\n */\nexport function useHasAuthCookie(): boolean {\n const { status } = useSession();\n return status === 'authenticated' || status === 'loading';\n}\n\n// --- Provider ---\n\ntype MesobAuthProviderProps = {\n config: AuthClientConfig;\n children: ReactNode;\n};\n\nexport function MesobAuthProvider({\n config,\n children,\n}: MesobAuthProviderProps) {\n const mergedConfig = useMemo(\n () =>\n deepmerge(\n { ...defaultAuthClientConfig } as Partial<AuthClientConfig>,\n config,\n ) as AuthClientConfig,\n [config],\n );\n\n const api = useMemo(\n () =>\n createFetchClient<paths>({\n baseUrl: mergedConfig.baseURL,\n fetch: createCustomFetch(mergedConfig),\n }),\n [mergedConfig],\n );\n\n const hooks = useMemo(() => createClient(api), [api]);\n const cookieName = useMemo(\n () => getSessionCookieName(mergedConfig),\n [mergedConfig],\n );\n\n return (\n <QueryClientProvider client={queryClient}>\n <AuthStateProvider\n config={mergedConfig}\n hooks={hooks}\n cookieName={cookieName}\n >\n {children}\n </AuthStateProvider>\n </QueryClientProvider>\n );\n}\n\ntype AuthStateProviderProps = {\n config: AuthClientConfig;\n hooks: OpenApiHooks;\n cookieName: string;\n children: ReactNode;\n};\n\nfunction AuthStateProvider({\n config,\n hooks,\n cookieName,\n children,\n}: AuthStateProviderProps) {\n // Manual override for sign-out / sign-in\n const [override, setOverride] = useState<AuthState | null>(null);\n\n // Always fetch session - cookie is httpOnly, can't check client-side\n // Server will read the cookie and return user/session if valid\n const {\n data: sessionData,\n isLoading,\n isFetched,\n error: sessionError,\n refetch,\n } = hooks.useQuery(\n 'get',\n '/session',\n {},\n {\n enabled: !(override || isServer()),\n refetchOnMount: false,\n refetchOnWindowFocus: false,\n refetchOnReconnect: false,\n retry: false,\n gcTime: 0,\n staleTime: 0,\n },\n );\n\n // Derive state directly - no useEffect\n const user = override?.user ?? sessionData?.user ?? null;\n const session = override?.session ?? sessionData?.session ?? null;\n const error = override?.error ?? (sessionError as Error | null);\n\n // Check error status code\n const errorStatus = (() => {\n if (!sessionError) {\n return null;\n }\n const err = sessionError as { status?: number };\n return err.status ?? null;\n })();\n\n // Check if error is a network/connection error\n const isNetworkError = (() => {\n if (!sessionError) {\n return false;\n }\n const error = sessionError as Error & { cause?: unknown; data?: unknown };\n const errorMessage =\n error.message || String(error) || JSON.stringify(error);\n // Network errors: TypeError, DOMException, or fetch failures\n if (\n error instanceof TypeError ||\n error instanceof DOMException ||\n error.name === 'TypeError' ||\n errorMessage.includes('Failed to fetch') ||\n errorMessage.includes('ERR_CONNECTION_REFUSED') ||\n errorMessage.includes('NetworkError') ||\n errorMessage.includes('Network request failed') ||\n errorMessage.includes('fetch failed')\n ) {\n return true;\n }\n // Check error cause\n if (error.cause) {\n const causeStr = String(error.cause);\n if (\n causeStr.includes('Failed to fetch') ||\n causeStr.includes('ERR_CONNECTION_REFUSED') ||\n causeStr.includes('NetworkError')\n ) {\n return true;\n }\n }\n return false;\n })();\n\n // Compute status\n // biome-ignore lint: Status determination requires multiple checks\n const status: AuthStatus = (() => {\n if (override) {\n return override.status;\n }\n if (isServer()) {\n return 'loading';\n }\n if (user && session) {\n return 'authenticated';\n }\n // Check for network errors or auth errors first - allow auth page to show\n if (isNetworkError || errorStatus === 401) {\n return 'unauthenticated';\n }\n // If we have an error but it's not a network error, still check loading state\n if (sessionError && !isNetworkError && errorStatus !== 401) {\n if (errorStatus && errorStatus >= 500) {\n return 'authenticated';\n }\n // Other errors mean unauthenticated\n if (isFetched) {\n return 'unauthenticated';\n }\n }\n if (isLoading || !isFetched) {\n return 'loading';\n }\n if (isFetched && !user && !session) {\n return 'unauthenticated';\n }\n return 'unauthenticated';\n })();\n\n const signOutMutation = hooks.useMutation('post', '/sign-out');\n const t = createTranslator(config.messages || {});\n\n const setAuth = (auth: AuthResponse) => {\n setOverride({\n user: auth.user,\n session: auth.session,\n status: 'authenticated',\n error: null,\n });\n };\n\n const clearAuth = () => {\n setOverride({\n user: null,\n session: null,\n status: 'unauthenticated',\n error: null,\n });\n };\n\n const refresh = async () => {\n setOverride(null);\n await refetch();\n };\n\n const signOut = async () => {\n try {\n await signOutMutation.mutateAsync({});\n } finally {\n clearAuth();\n }\n };\n\n return (\n <ConfigContext.Provider value={{ config, cookieName, t }}>\n <ApiContext.Provider value={{ hooks, setAuth, clearAuth, refresh }}>\n <SessionContext.Provider\n value={{\n user,\n session,\n status,\n error,\n isLoading: status === 'loading',\n isAuthenticated: status === 'authenticated',\n refresh,\n signOut,\n }}\n >\n {children}\n </SessionContext.Provider>\n </ApiContext.Provider>\n </ConfigContext.Provider>\n );\n}\n","import type { AuthClientConfig } from '../types';\n\nconst isProduction =\n typeof process !== 'undefined' && process.env.NODE_ENV === 'production';\n\nexport const getSessionCookieName = (config: AuthClientConfig): string => {\n const prefix = config.cookiePrefix || '';\n const baseName = 'session_token';\n if (prefix) {\n return `${prefix}_${baseName}`;\n }\n return isProduction ? '__Host-session_token' : baseName;\n};\n","'use client';\n\nimport {\n Badge,\n EntitySelector,\n type EntitySelectorColumn,\n type EntitySelectorConfig,\n useEntitySectionState,\n} from '@mesob/ui/components';\nimport { IconKey } from '@tabler/icons-react';\nimport type { ReactNode } from 'react';\nimport type { paths } from '../../data/openapi';\nimport { useApi } from '../../provider';\n\ntype Permission = {\n id: string;\n description?: unknown;\n activity: string;\n application: string;\n feature: string;\n};\n\nconst permissionColumns: EntitySelectorColumn<Permission>[] = [\n {\n key: 'permission',\n header: 'Permission',\n cell: (permission) => (\n <div className=\"space-y-1\">\n <p className=\"font-medium\">{permission.activity}</p>\n <p className=\"font-mono text-xs text-muted-foreground\">\n {permission.id}\n </p>\n </div>\n ),\n },\n {\n key: 'scope',\n header: 'Scope',\n cell: (permission) => (\n <div className=\"flex flex-wrap gap-2\">\n <Badge variant=\"secondary\">{permission.application}</Badge>\n <Badge variant=\"outline\">{permission.feature}</Badge>\n </div>\n ),\n },\n];\n\ntype PermissionSelectorProps = {\n trigger: ReactNode;\n multiple?: boolean;\n onSelect: (permissions: Permission[]) => void;\n excludeIds?: string[];\n};\n\nexport function PermissionSelector({\n trigger,\n multiple = true,\n onSelect,\n excludeIds = [],\n}: PermissionSelectorProps) {\n const { hooks } = useApi();\n const state = useEntitySectionState({\n defaultSort: 'id',\n defaultOrder: 'asc',\n defaultPageSize: 10,\n searchParamName: 'search',\n });\n const permissionsQuery = state.queryConfig as {\n params: {\n query: NonNullable<paths['/permissions']['get']['parameters']['query']>;\n };\n };\n\n const { data, isPending, isFetching } = hooks.useQuery(\n 'get',\n '/permissions',\n permissionsQuery,\n );\n\n const items = ((data?.permissions ?? []) as Permission[]).filter(\n (permission) => !excludeIds.includes(permission.id),\n );\n\n const config: EntitySelectorConfig<Permission> = {\n title: 'Select permission(s)',\n multiple,\n entityName: 'permission',\n entityIcon: IconKey,\n columns: permissionColumns,\n getItemLabel: (permission) => permission.id,\n searchPlaceholder: 'Search permissions...',\n filterOptions: [\n { label: 'All', value: '' },\n { label: 'Application', value: 'application' },\n { label: 'Feature', value: 'feature' },\n { label: 'Activity', value: 'activity' },\n ],\n sortOptions: [\n { label: 'ID', value: 'id' },\n { label: 'Application', value: 'application' },\n { label: 'Feature', value: 'feature' },\n { label: 'Activity', value: 'activity' },\n ],\n showViewToggle: false,\n wrapHeaderInCard: false,\n };\n\n return (\n <EntitySelector<Permission>\n trigger={trigger}\n config={config}\n onSelect={onSelect}\n items={items}\n total={items.length}\n isLoading={isPending || isFetching}\n state={state}\n />\n );\n}\n","import type { Metadata } from 'next';\nimport { RolePermissionsPage } from '../../components/iam/role-permissions-page';\n\ntype RolePermissionsPageProps = {\n params: Promise<{ id: string }>;\n};\n\nexport const metadata: Metadata = {\n title: 'Role Permissions',\n description: 'Manage permissions assigned to a role.',\n};\n\nexport default async function RolePermissionsRoutePage({\n params,\n}: RolePermissionsPageProps) {\n const { id } = await params;\n\n return <RolePermissionsPage roleId={id} />;\n}\n"],"mappings":";AAEA;AAAA,EACE,SAAAA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,OACK;AACP,SAAS,WAAAC,UAAS,UAAU,iBAAiB;AAC7C,SAAS,sBAAsB;AAE/B,SAAS,WAAAC,gBAAe;AACxB,SAAS,aAAa;;;AC1BtB,SAAS,aAAa,2BAA2B;AACjD,SAAS,iBAAiB;AAC1B,OAAO,uBAAuB;AAC9B,OAAO,kBAAkB;AAEzB,SAAS,eAAe,YAAY,SAAS,gBAAgB;;;ACL7D,IAAM,eACJ,OAAO,YAAY,eAAe,QAAQ,IAAI,aAAa;;;AD4JvD;AA1FN,IAAM,iBAAiB,cAA0C,IAAI;AACrE,IAAM,aAAa,cAAsC,IAAI;AAC7D,IAAM,gBAAgB,cAAyC,IAAI;AAEnE,IAAM,cAAc,IAAI,YAAY;AAAA,EAClC,gBAAgB;AAAA,IACd,SAAS;AAAA,MACP,sBAAsB;AAAA,IACxB;AAAA,EACF;AACF,CAAC;AAkBM,SAAS,SAA0B;AACxC,QAAM,UAAU,WAAW,UAAU;AACrC,MAAI,CAAC,SAAS;AACZ,UAAM,IAAI,MAAM,8CAA8C;AAAA,EAChE;AACA,SAAO;AACT;;;AErGA;AAAA,EACE;AAAA,EACA;AAAA,EAGA;AAAA,OACK;AACP,SAAS,eAAe;AAkBlB,SACE,OAAAC,MADF;AALN,IAAM,oBAAwD;AAAA,EAC5D;AAAA,IACE,KAAK;AAAA,IACL,QAAQ;AAAA,IACR,MAAM,CAAC,eACL,qBAAC,SAAI,WAAU,aACb;AAAA,sBAAAA,KAAC,OAAE,WAAU,eAAe,qBAAW,UAAS;AAAA,MAChD,gBAAAA,KAAC,OAAE,WAAU,2CACV,qBAAW,IACd;AAAA,OACF;AAAA,EAEJ;AAAA,EACA;AAAA,IACE,KAAK;AAAA,IACL,QAAQ;AAAA,IACR,MAAM,CAAC,eACL,qBAAC,SAAI,WAAU,wBACb;AAAA,sBAAAA,KAAC,SAAM,SAAQ,aAAa,qBAAW,aAAY;AAAA,MACnD,gBAAAA,KAAC,SAAM,SAAQ,WAAW,qBAAW,SAAQ;AAAA,OAC/C;AAAA,EAEJ;AACF;AASO,SAAS,mBAAmB;AAAA,EACjC;AAAA,EACA,WAAW;AAAA,EACX;AAAA,EACA,aAAa,CAAC;AAChB,GAA4B;AAC1B,QAAM,EAAE,MAAM,IAAI,OAAO;AACzB,QAAM,QAAQ,sBAAsB;AAAA,IAClC,aAAa;AAAA,IACb,cAAc;AAAA,IACd,iBAAiB;AAAA,IACjB,iBAAiB;AAAA,EACnB,CAAC;AACD,QAAM,mBAAmB,MAAM;AAM/B,QAAM,EAAE,MAAM,WAAW,WAAW,IAAI,MAAM;AAAA,IAC5C;AAAA,IACA;AAAA,IACA;AAAA,EACF;AAEA,QAAM,SAAU,MAAM,eAAe,CAAC,GAAoB;AAAA,IACxD,CAAC,eAAe,CAAC,WAAW,SAAS,WAAW,EAAE;AAAA,EACpD;AAEA,QAAM,SAA2C;AAAA,IAC/C,OAAO;AAAA,IACP;AAAA,IACA,YAAY;AAAA,IACZ,YAAY;AAAA,IACZ,SAAS;AAAA,IACT,cAAc,CAAC,eAAe,WAAW;AAAA,IACzC,mBAAmB;AAAA,IACnB,eAAe;AAAA,MACb,EAAE,OAAO,OAAO,OAAO,GAAG;AAAA,MAC1B,EAAE,OAAO,eAAe,OAAO,cAAc;AAAA,MAC7C,EAAE,OAAO,WAAW,OAAO,UAAU;AAAA,MACrC,EAAE,OAAO,YAAY,OAAO,WAAW;AAAA,IACzC;AAAA,IACA,aAAa;AAAA,MACX,EAAE,OAAO,MAAM,OAAO,KAAK;AAAA,MAC3B,EAAE,OAAO,eAAe,OAAO,cAAc;AAAA,MAC7C,EAAE,OAAO,WAAW,OAAO,UAAU;AAAA,MACrC,EAAE,OAAO,YAAY,OAAO,WAAW;AAAA,IACzC;AAAA,IACA,gBAAgB;AAAA,IAChB,kBAAkB;AAAA,EACpB;AAEA,SACE,gBAAAA;AAAA,IAAC;AAAA;AAAA,MACC;AAAA,MACA;AAAA,MACA;AAAA,MACA;AAAA,MACA,OAAO,MAAM;AAAA,MACb,WAAW,aAAa;AAAA,MACxB;AAAA;AAAA,EACF;AAEJ;;;AHcM,gBAAAC,MAqBM,QAAAC,aArBN;AAvFN,IAAM,qBAAqB;AAEpB,SAAS,oBAAoB,EAAE,OAAO,GAA6B;AACxE,QAAM,EAAE,MAAM,IAAI,OAAO;AACzB,QAAM,KAAK,eAAe;AAC1B,QAAM,EAAE,aAAa,QAAQ,UAAU,IAAI,gBAAgB;AAAA,IACzD,WAAW;AAAA,IACX,aAAa;AAAA,IACb,cAAc;AAAA,EAChB,CAAC;AACD,QAAM,mBAAmBC;AAAA,IACvB,OACG;AAAA,MACC,QAAQ;AAAA,QACN,MAAM,EAAE,IAAI,OAAO;AAAA,QACnB,OAAO,YAAY,OAAO;AAAA,MAC5B;AAAA,IACF;AAAA,IAQF,CAAC,aAAa,MAAM;AAAA,EACtB;AAEA,QAAM,EAAE,MAAM,WAAW,WAAW,IAAI,MAAM;AAAA,IAC5C;AAAA,IACA;AAAA,IACA;AAAA,IACA,EAAE,SAAS,CAAC,CAAC,OAAO;AAAA,EACtB;AACA,QAAM,oBAAoB,MAAM;AAAA,IAC9B;AAAA,IACA;AAAA,IACA;AAAA,MACE,WAAW,CAAC,WAA6C;AACvD,WAAG,kBAAkB,EAAE,UAAU,CAAC,OAAO,QAAQ,EAAE,CAAC;AACpD,WAAG,kBAAkB,EAAE,UAAU,CAAC,OAAO,aAAa,EAAE,CAAC;AACzD,WAAG,kBAAkB,EAAE,UAAU,CAAC,OAAO,yBAAyB,EAAE,CAAC;AACrE,cAAM;AAAA,UACJ,QAAQ,UACJ,GAAG,OAAO,OAAO,yBACjB;AAAA,QACN;AAAA,MACF;AAAA,MACA,SAAS,MAAM;AACb,cAAM,MAAM,8BAA8B;AAAA,MAC5C;AAAA,IACF;AAAA,EACF;AACA,QAAM,mBAAmB,MAAM;AAAA,IAC7B;AAAA,IACA;AAAA,IACA;AAAA,MACE,WAAW,MAAM;AACf,WAAG,kBAAkB,EAAE,UAAU,CAAC,OAAO,QAAQ,EAAE,CAAC;AACpD,WAAG,kBAAkB,EAAE,UAAU,CAAC,OAAO,aAAa,EAAE,CAAC;AACzD,WAAG,kBAAkB;AAAA,UACnB,UAAU,CAAC,OAAO,yBAAyB;AAAA,QAC7C,CAAC;AACD,cAAM,QAAQ,oBAAoB;AAAA,MACpC;AAAA,MACA,SAAS,MAAM;AACb,cAAM,MAAM,6BAA6B;AAAA,MAC3C;AAAA,IACF;AAAA,EACF;AAEA,QAAM,cAAe,MAAM,eAAe,CAAC;AAC3C,QAAM,EAAE,OAAO,UAAU,IAAI,oBAAoB;AAAA,IAC/C,OAAO;AAAA,IACP,OAAO,MAAM;AAAA,IACb,UAAU,OAAO;AAAA,EACnB,CAAC;AACD,QAAM,YAAY,aAAa;AAC/B,QAAM,cAAe,OAAO,QAAQ;AAEpC,MAAI,CAAC,QAAQ;AACX,WAAO;AAAA,EACT;AAEA,MAAI;AACJ,MAAI,WAAW;AACb,cACE,gBAAAF;AAAA,MAAC;AAAA;AAAA,QACC,MAAM;AAAA,QACN,UAAU,OAAO;AAAA,QACjB,aAAa;AAAA,QACb,WAAW,OAAO;AAAA;AAAA,IACpB;AAAA,EAEJ,WAAW,UAAU,GAAG;AACtB,cACE,gBAAAA;AAAA,MAAC;AAAA;AAAA,QACC,MAAMG;AAAA,QACN,YAAW;AAAA,QACX,OAAM;AAAA,QACN,aAAY;AAAA;AAAA,IACd;AAAA,EAEJ,WAAW,gBAAgB,SAAS;AAClC,cACE,gBAAAF,MAAC,SAAI,WAAU,aACb;AAAA,sBAAAA,MAAC,gBAAa,iBAAe,MAC3B;AAAA,wBAAAD,KAAC,SACC,0BAAAC,MAAC,MACC;AAAA,0BAAAD,KAAC,MAAG,wBAAU;AAAA,UACd,gBAAAA,KAAC,MAAG,yBAAW;AAAA,UACf,gBAAAA,KAAC,MAAG,qBAAO;AAAA,UACX,gBAAAA,KAAC,MAAG,WAAU,YAAW;AAAA,WAC3B,GACF;AAAA,QACA,gBAAAA,KAAC,SACE,sBAAY,IAAI,CAAC,eAChB,gBAAAC,MAAC,MACC;AAAA,0BAAAD,KAAC,MACC,0BAAAC,MAAC,SAAI,WAAU,aACb;AAAA,4BAAAD,KAAC,OAAE,WAAU,eAAe,qBAAW,UAAS;AAAA,YAChD,gBAAAA,KAAC,OAAE,WAAU,2CACV,qBAAW,IACd;AAAA,aACF,GACF;AAAA,UACA,gBAAAA,KAAC,MACC,0BAAAA,KAACI,QAAA,EAAM,SAAQ,aAAa,qBAAW,aAAY,GACrD;AAAA,UACA,gBAAAJ,KAAC,MACC,0BAAAA,KAACI,QAAA,EAAM,SAAQ,WAAW,qBAAW,SAAQ,GAC/C;AAAA,UACA,gBAAAJ,KAAC,MACC,0BAAAA;AAAA,YAAC;AAAA;AAAA,cACC,YAAW;AAAA,cACX,WAAW,MACT,iBAAiB,OAAO;AAAA,gBACtB,QAAQ;AAAA,kBACN,MAAM,EAAE,IAAI,QAAQ,cAAc,WAAW,GAAG;AAAA,gBAClD;AAAA,cACF,CAAC;AAAA,cAEH,kBAAiB;AAAA;AAAA,UACnB,GACF;AAAA,aA3BO,WAAW,EA4BpB,CACD,GACH;AAAA,SACF;AAAA,MACA,gBAAAA;AAAA,QAAC;AAAA;AAAA,UACC,WAAW,OAAO,OAAO;AAAA,UACzB,UAAU,OAAO;AAAA,UACjB;AAAA,UACA,WAAW;AAAA,UACX,cAAc,CAAC,SAAS,UAAU,EAAE,MAAM,OAAO,EAAE,CAAC;AAAA,UACpD,kBAAkB,CAAC,aAAa,UAAU,EAAE,UAAU,MAAM,EAAE,CAAC;AAAA;AAAA,MACjE;AAAA,OACF;AAAA,EAEJ,OAAO;AACL,cACE,gBAAAC,MAAC,SAAI,WAAU,aACb;AAAA,sBAAAD,KAAC,SAAI,WAAU,wDACZ,sBAAY,IAAI,CAAC,eAChB,gBAAAA;AAAA,QAAC;AAAA;AAAA,UAEC,WAAU;AAAA,UAEV,0BAAAC,MAAC,SAAI,WAAU,0CACb;AAAA,4BAAAA,MAAC,SAAI,WAAU,aACb;AAAA,8BAAAD,KAAC,OAAE,WAAU,iBAAiB,qBAAW,UAAS;AAAA,cAClD,gBAAAC,MAAC,SAAI,WAAU,wBACb;AAAA,gCAAAD,KAACI,QAAA,EAAM,SAAQ,aAAa,qBAAW,aAAY;AAAA,gBACnD,gBAAAJ,KAACI,QAAA,EAAM,SAAQ,WAAW,qBAAW,SAAQ;AAAA,iBAC/C;AAAA,cACA,gBAAAJ,KAAC,OAAE,WAAU,2CACV,qBAAW,IACd;AAAA,eACF;AAAA,YACA,gBAAAA;AAAA,cAAC;AAAA;AAAA,gBACC,MAAK;AAAA,gBACL,SAAQ;AAAA,gBACR,MAAK;AAAA,gBACL,SAAS,MACP,iBAAiB,OAAO;AAAA,kBACtB,QAAQ;AAAA,oBACN,MAAM,EAAE,IAAI,QAAQ,cAAc,WAAW,GAAG;AAAA,kBAClD;AAAA,gBACF,CAAC;AAAA,gBAEH,UAAU,iBAAiB;AAAA,gBAE3B,0BAAAA,KAAC,aAAU,WAAU,WAAU;AAAA;AAAA,YACjC;AAAA,aACF;AAAA;AAAA,QA7BK,WAAW;AAAA,MA8BlB,CACD,GACH;AAAA,MACA,gBAAAA;AAAA,QAAC;AAAA;AAAA,UACC,WAAW,OAAO,OAAO;AAAA,UACzB,UAAU,OAAO;AAAA,UACjB;AAAA,UACA,WAAW;AAAA,UACX,cAAc,CAAC,SAAS,UAAU,EAAE,MAAM,OAAO,EAAE,CAAC;AAAA,UACpD,kBAAkB,CAAC,aAAa,UAAU,EAAE,UAAU,MAAM,EAAE,CAAC;AAAA;AAAA,MACjE;AAAA,OACF;AAAA,EAEJ;AAEA,SACE,gBAAAC,MAAC,YAAS,WAAU,aAClB;AAAA,oBAAAD;AAAA,MAAC;AAAA;AAAA,QACC,MAAM,gBAAAA,KAACG,UAAA,EAAQ,WAAU,WAAU;AAAA,QACnC,OAAM;AAAA,QACN,SACE,gBAAAH;AAAA,UAAC;AAAA;AAAA,YACC,SACE,gBAAAC,MAAC,UAAO,MAAK,MAAK,SAAS,kBAAkB,WAC3C;AAAA,8BAAAD,KAAC,YAAS,WAAU,WAAU;AAAA,cAAE;AAAA,eAElC;AAAA,YAEF,UAAU,CAAC,wBAAwB;AACjC,kBAAI,CAAC,oBAAoB,QAAQ;AAC/B;AAAA,cACF;AAEA,gCAAkB,OAAO;AAAA,gBACvB,QAAQ,EAAE,MAAM,EAAE,IAAI,OAAO,EAAE;AAAA,gBAC/B,MAAM;AAAA,kBACJ,eAAe,oBAAoB;AAAA,oBACjC,CAAC,eAAe,WAAW;AAAA,kBAC7B;AAAA,gBACF;AAAA,cACF,CAAC;AAAA,YACH;AAAA,YACA,YAAY,YAAY,IAAI,CAAC,eAAe,WAAW,EAAE;AAAA;AAAA,QAC3D;AAAA,QAEF,QACE,gBAAAA;AAAA,UAAC;AAAA;AAAA,YACC,UAAS;AAAA,YACT,aAAY;AAAA;AAAA,QACd;AAAA,QAEF,QACE,gBAAAA;AAAA,UAAC;AAAA;AAAA,YACC,SAAS;AAAA,cACP,EAAE,OAAO,OAAO,OAAO,GAAG;AAAA,cAC1B,EAAE,OAAO,eAAe,OAAO,cAAc;AAAA,cAC7C,EAAE,OAAO,WAAW,OAAO,UAAU;AAAA,cACrC,EAAE,OAAO,YAAY,OAAO,WAAW;AAAA,YACzC;AAAA,YACA,aAAY;AAAA;AAAA,QACd;AAAA,QAEF,MACE,gBAAAA;AAAA,UAAC;AAAA;AAAA,YACC,aAAY;AAAA,YACZ,cAAa;AAAA,YACb,SAAS;AAAA,cACP,EAAE,OAAO,MAAM,OAAO,KAAK;AAAA,cAC3B,EAAE,OAAO,eAAe,OAAO,cAAc;AAAA,cAC7C,EAAE,OAAO,WAAW,OAAO,UAAU;AAAA,cACrC,EAAE,OAAO,YAAY,OAAO,WAAW;AAAA,YACzC;AAAA;AAAA,QACF;AAAA,QAEF,MAAM,gBAAAA,KAAC,oBAAiB,OAAO,CAAC,SAAS,MAAM,GAAG;AAAA;AAAA,IACpD;AAAA,IACC;AAAA,KACH;AAEJ;;;AI9SS,gBAAAK,YAAA;AAVF,IAAM,WAAqB;AAAA,EAChC,OAAO;AAAA,EACP,aAAa;AACf;AAEA,eAAO,yBAAgD;AAAA,EACrD;AACF,GAA6B;AAC3B,QAAM,EAAE,GAAG,IAAI,MAAM;AAErB,SAAO,gBAAAA,KAAC,uBAAoB,QAAQ,IAAI;AAC1C;","names":["Badge","IconKey","useMemo","jsx","jsx","jsxs","useMemo","IconKey","Badge","jsx"]}
@@ -0,0 +1,12 @@
1
+ import * as react_jsx_runtime from 'react/jsx-runtime';
2
+ import { Metadata } from 'next';
3
+
4
+ type RoleUsersPageProps = {
5
+ params: Promise<{
6
+ id: string;
7
+ }>;
8
+ };
9
+ declare const metadata: Metadata;
10
+ declare function RoleUsersRoutePage({ params, }: RoleUsersPageProps): Promise<react_jsx_runtime.JSX.Element>;
11
+
12
+ export { RoleUsersRoutePage as default, metadata };