@nauth-toolkit/core 0.1.86 → 0.1.88

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (166) hide show
  1. package/dist/dto/admin-get-user-auth-history.dto.d.ts +62 -0
  2. package/dist/dto/admin-get-user-auth-history.dto.d.ts.map +1 -0
  3. package/dist/dto/admin-get-user-auth-history.dto.js +87 -0
  4. package/dist/dto/admin-get-user-auth-history.dto.js.map +1 -0
  5. package/dist/dto/admin-logout-all.dto.d.ts +48 -0
  6. package/dist/dto/admin-logout-all.dto.d.ts.map +1 -0
  7. package/dist/dto/{change-password-request.dto.js → admin-logout-all.dto.js} +36 -21
  8. package/dist/dto/admin-logout-all.dto.js.map +1 -0
  9. package/dist/dto/admin-remove-devices.dto.d.ts +25 -0
  10. package/dist/dto/admin-remove-devices.dto.d.ts.map +1 -0
  11. package/dist/dto/admin-remove-devices.dto.js +50 -0
  12. package/dist/dto/admin-remove-devices.dto.js.map +1 -0
  13. package/dist/dto/admin-reset-password.dto.d.ts +24 -49
  14. package/dist/dto/admin-reset-password.dto.d.ts.map +1 -1
  15. package/dist/dto/admin-reset-password.dto.js +30 -82
  16. package/dist/dto/admin-reset-password.dto.js.map +1 -1
  17. package/dist/dto/admin-revoke-session.dto.d.ts +22 -0
  18. package/dist/dto/admin-revoke-session.dto.d.ts.map +1 -0
  19. package/dist/dto/admin-revoke-session.dto.js +48 -0
  20. package/dist/dto/admin-revoke-session.dto.js.map +1 -0
  21. package/dist/dto/admin-set-password.dto.d.ts +8 -10
  22. package/dist/dto/admin-set-password.dto.d.ts.map +1 -1
  23. package/dist/dto/admin-set-password.dto.js +11 -21
  24. package/dist/dto/admin-set-password.dto.js.map +1 -1
  25. package/dist/dto/admin-set-preferred-method.dto.d.ts +25 -0
  26. package/dist/dto/admin-set-preferred-method.dto.d.ts.map +1 -0
  27. package/dist/dto/admin-set-preferred-method.dto.js +50 -0
  28. package/dist/dto/admin-set-preferred-method.dto.js.map +1 -0
  29. package/dist/dto/admin-update-user-attributes.dto.d.ts +41 -0
  30. package/dist/dto/admin-update-user-attributes.dto.d.ts.map +1 -0
  31. package/dist/dto/{update-user-attributes-request.dto.js → admin-update-user-attributes.dto.js} +12 -17
  32. package/dist/dto/admin-update-user-attributes.dto.js.map +1 -0
  33. package/dist/dto/auth-challenge.dto.d.ts +2 -2
  34. package/dist/dto/auth-challenge.dto.d.ts.map +1 -1
  35. package/dist/dto/auth-challenge.dto.js +3 -3
  36. package/dist/dto/auth-challenge.dto.js.map +1 -1
  37. package/dist/dto/auth-response.dto.d.ts +1 -1
  38. package/dist/dto/auth-response.dto.d.ts.map +1 -1
  39. package/dist/dto/auth-response.dto.js +1 -1
  40. package/dist/dto/auth-response.dto.js.map +1 -1
  41. package/dist/dto/get-mfa-status.dto.d.ts +8 -4
  42. package/dist/dto/get-mfa-status.dto.d.ts.map +1 -1
  43. package/dist/dto/get-mfa-status.dto.js +8 -4
  44. package/dist/dto/get-mfa-status.dto.js.map +1 -1
  45. package/dist/dto/get-risk-assessment-history.dto.d.ts +3 -3
  46. package/dist/dto/get-risk-assessment-history.dto.d.ts.map +1 -1
  47. package/dist/dto/get-risk-assessment-history.dto.js +5 -5
  48. package/dist/dto/get-risk-assessment-history.dto.js.map +1 -1
  49. package/dist/dto/get-suspicious-activity.dto.d.ts +3 -3
  50. package/dist/dto/get-suspicious-activity.dto.d.ts.map +1 -1
  51. package/dist/dto/get-suspicious-activity.dto.js +5 -5
  52. package/dist/dto/get-suspicious-activity.dto.js.map +1 -1
  53. package/dist/dto/get-user-auth-history.dto.d.ts +4 -39
  54. package/dist/dto/get-user-auth-history.dto.d.ts.map +1 -1
  55. package/dist/dto/get-user-auth-history.dto.js +53 -51
  56. package/dist/dto/get-user-auth-history.dto.js.map +1 -1
  57. package/dist/dto/get-user-devices.dto.d.ts +5 -18
  58. package/dist/dto/get-user-devices.dto.d.ts.map +1 -1
  59. package/dist/dto/get-user-devices.dto.js +5 -39
  60. package/dist/dto/get-user-devices.dto.js.map +1 -1
  61. package/dist/dto/get-user-sessions-response.dto.d.ts +1 -1
  62. package/dist/dto/get-user-sessions-response.dto.js +1 -1
  63. package/dist/dto/get-user-sessions.dto.d.ts +1 -1
  64. package/dist/dto/get-user-sessions.dto.js +1 -1
  65. package/dist/dto/index.d.ts +8 -2
  66. package/dist/dto/index.d.ts.map +1 -1
  67. package/dist/dto/index.js +8 -2
  68. package/dist/dto/index.js.map +1 -1
  69. package/dist/dto/logout-all-response.dto.d.ts +1 -1
  70. package/dist/dto/logout-all-response.dto.js +1 -1
  71. package/dist/dto/logout-all.dto.d.ts +1 -18
  72. package/dist/dto/logout-all.dto.d.ts.map +1 -1
  73. package/dist/dto/logout-all.dto.js +1 -30
  74. package/dist/dto/logout-all.dto.js.map +1 -1
  75. package/dist/dto/logout-session.dto.d.ts +0 -5
  76. package/dist/dto/logout-session.dto.d.ts.map +1 -1
  77. package/dist/dto/logout-session.dto.js +0 -12
  78. package/dist/dto/logout-session.dto.js.map +1 -1
  79. package/dist/dto/logout.dto.d.ts +1 -18
  80. package/dist/dto/logout.dto.d.ts.map +1 -1
  81. package/dist/dto/logout.dto.js +1 -30
  82. package/dist/dto/logout.dto.js.map +1 -1
  83. package/dist/dto/remove-devices.dto.d.ts +4 -16
  84. package/dist/dto/remove-devices.dto.d.ts.map +1 -1
  85. package/dist/dto/remove-devices.dto.js +4 -26
  86. package/dist/dto/remove-devices.dto.js.map +1 -1
  87. package/dist/dto/set-mfa-exemption.dto.d.ts +4 -2
  88. package/dist/dto/set-mfa-exemption.dto.d.ts.map +1 -1
  89. package/dist/dto/set-mfa-exemption.dto.js +5 -3
  90. package/dist/dto/set-mfa-exemption.dto.js.map +1 -1
  91. package/dist/dto/set-must-change-password.dto.d.ts +3 -3
  92. package/dist/dto/set-must-change-password.dto.d.ts.map +1 -1
  93. package/dist/dto/set-must-change-password.dto.js +5 -5
  94. package/dist/dto/set-must-change-password.dto.js.map +1 -1
  95. package/dist/dto/set-preferred-method.dto.d.ts +4 -16
  96. package/dist/dto/set-preferred-method.dto.d.ts.map +1 -1
  97. package/dist/dto/set-preferred-method.dto.js +4 -26
  98. package/dist/dto/set-preferred-method.dto.js.map +1 -1
  99. package/dist/dto/setup-mfa.dto.d.ts +3 -18
  100. package/dist/dto/setup-mfa.dto.d.ts.map +1 -1
  101. package/dist/dto/setup-mfa.dto.js +3 -30
  102. package/dist/dto/setup-mfa.dto.js.map +1 -1
  103. package/dist/dto/social-auth.dto.d.ts +4 -34
  104. package/dist/dto/social-auth.dto.d.ts.map +1 -1
  105. package/dist/dto/social-auth.dto.js +10 -68
  106. package/dist/dto/social-auth.dto.js.map +1 -1
  107. package/dist/dto/update-user-attributes.dto.d.ts +26 -0
  108. package/dist/dto/update-user-attributes.dto.d.ts.map +1 -0
  109. package/dist/dto/update-user-attributes.dto.js +30 -0
  110. package/dist/dto/update-user-attributes.dto.js.map +1 -0
  111. package/dist/index.d.ts +5 -0
  112. package/dist/index.d.ts.map +1 -1
  113. package/dist/index.js +5 -0
  114. package/dist/index.js.map +1 -1
  115. package/dist/interfaces/hooks.interface.d.ts +2 -1
  116. package/dist/interfaces/hooks.interface.d.ts.map +1 -1
  117. package/dist/interfaces/provider.interface.d.ts +1 -1
  118. package/dist/interfaces/provider.interface.d.ts.map +1 -1
  119. package/dist/services/adaptive-mfa-decision.service.js +2 -2
  120. package/dist/services/adaptive-mfa-decision.service.js.map +1 -1
  121. package/dist/services/admin-auth.service.d.ts +307 -0
  122. package/dist/services/admin-auth.service.d.ts.map +1 -0
  123. package/dist/services/admin-auth.service.js +885 -0
  124. package/dist/services/admin-auth.service.js.map +1 -0
  125. package/dist/services/auth-audit.service.d.ts +16 -16
  126. package/dist/services/auth-audit.service.d.ts.map +1 -1
  127. package/dist/services/auth-audit.service.js +33 -33
  128. package/dist/services/auth-audit.service.js.map +1 -1
  129. package/dist/services/auth-challenge-helper.service.js +3 -3
  130. package/dist/services/auth-challenge-helper.service.js.map +1 -1
  131. package/dist/services/auth-service-internal-helpers.d.ts +2 -2
  132. package/dist/services/auth-service-internal-helpers.d.ts.map +1 -1
  133. package/dist/services/auth-service-internal-helpers.js.map +1 -1
  134. package/dist/services/auth.service.d.ts +122 -446
  135. package/dist/services/auth.service.d.ts.map +1 -1
  136. package/dist/services/auth.service.js +424 -1274
  137. package/dist/services/auth.service.js.map +1 -1
  138. package/dist/services/mfa.service.d.ts +90 -12
  139. package/dist/services/mfa.service.d.ts.map +1 -1
  140. package/dist/services/mfa.service.js +395 -264
  141. package/dist/services/mfa.service.js.map +1 -1
  142. package/dist/services/password-reset.service.d.ts.map +1 -1
  143. package/dist/services/password-reset.service.js +80 -29
  144. package/dist/services/password-reset.service.js.map +1 -1
  145. package/dist/services/social-auth.service.d.ts +7 -0
  146. package/dist/services/social-auth.service.d.ts.map +1 -1
  147. package/dist/services/social-auth.service.js +38 -26
  148. package/dist/services/social-auth.service.js.map +1 -1
  149. package/dist/services/user.service.d.ts +3 -3
  150. package/dist/services/user.service.d.ts.map +1 -1
  151. package/dist/services/user.service.js +7 -7
  152. package/dist/services/user.service.js.map +1 -1
  153. package/dist/utils/dto-validator.d.ts.map +1 -1
  154. package/dist/utils/dto-validator.js +50 -4
  155. package/dist/utils/dto-validator.js.map +1 -1
  156. package/dist/utils/setup/init-services.d.ts +2 -1
  157. package/dist/utils/setup/init-services.d.ts.map +1 -1
  158. package/dist/utils/setup/init-services.js +2 -0
  159. package/dist/utils/setup/init-services.js.map +1 -1
  160. package/package.json +1 -1
  161. package/dist/dto/change-password-request.dto.d.ts +0 -43
  162. package/dist/dto/change-password-request.dto.d.ts.map +0 -1
  163. package/dist/dto/change-password-request.dto.js.map +0 -1
  164. package/dist/dto/update-user-attributes-request.dto.d.ts +0 -44
  165. package/dist/dto/update-user-attributes-request.dto.d.ts.map +0 -1
  166. package/dist/dto/update-user-attributes-request.dto.js.map +0 -1
@@ -1,21 +1,21 @@
1
1
  "use strict";
2
2
  /**
3
- * Update User Attributes Request DTO
3
+ * Admin Update User Attributes DTO
4
4
  *
5
- * Request DTO for updating user profile information (includes user sub).
5
+ * Request DTO for administrators to update a user's profile information.
6
6
  *
7
7
  * Security:
8
- * - User sub validated (UUID)
8
+ * - Requires target user sub (UUID)
9
9
  * - All fields validated according to UserUpdateDTO rules
10
10
  * - Uniqueness constraints enforced
11
11
  *
12
12
  * @example
13
13
  * ```typescript
14
- * const result = await authService.updateUserAttributes({
14
+ * const result = await adminAuthService.updateUserAttributes({
15
15
  * sub: 'user-uuid',
16
16
  * username: 'newusername',
17
17
  * firstName: 'John',
18
- * lastName: 'Doe'
18
+ * lastName: 'Doe',
19
19
  * });
20
20
  * ```
21
21
  */
@@ -29,22 +29,19 @@ var __metadata = (this && this.__metadata) || function (k, v) {
29
29
  if (typeof Reflect === "object" && typeof Reflect.metadata === "function") return Reflect.metadata(k, v);
30
30
  };
31
31
  Object.defineProperty(exports, "__esModule", { value: true });
32
- exports.UpdateUserAttributesRequestDTO = void 0;
32
+ exports.AdminUpdateUserAttributesDTO = void 0;
33
33
  const class_validator_1 = require("class-validator");
34
34
  const class_transformer_1 = require("class-transformer");
35
35
  const user_update_dto_1 = require("./user-update.dto");
36
36
  /**
37
- * Request DTO for updating user attributes (includes user sub)
37
+ * Request DTO for admin updating user attributes (includes sub)
38
38
  */
39
- class UpdateUserAttributesRequestDTO extends user_update_dto_1.UserUpdateDTO {
39
+ class AdminUpdateUserAttributesDTO extends user_update_dto_1.UserUpdateDTO {
40
40
  /**
41
41
  * User's unique identifier (UUID v4)
42
42
  *
43
- * Optional at controller level - filled from authenticated user's JWT.
44
- * Validated only when provided (service layer will ensure it's set).
45
- *
46
43
  * Validation:
47
- * - Must be a valid UUID v4 format when provided
44
+ * - Must be a valid UUID v4 format
48
45
  * - Matches DB constraint: char(36) or uuid
49
46
  *
50
47
  * Sanitization:
@@ -55,9 +52,8 @@ class UpdateUserAttributesRequestDTO extends user_update_dto_1.UserUpdateDTO {
55
52
  */
56
53
  sub;
57
54
  }
58
- exports.UpdateUserAttributesRequestDTO = UpdateUserAttributesRequestDTO;
55
+ exports.AdminUpdateUserAttributesDTO = AdminUpdateUserAttributesDTO;
59
56
  __decorate([
60
- (0, class_validator_1.ValidateIf)((o) => o.sub !== undefined && o.sub !== null && o.sub !== ''),
61
57
  (0, class_validator_1.IsUUID)('4', { message: 'User sub must be a valid UUID v4 format' }),
62
58
  (0, class_transformer_1.Transform)(({ value }) => {
63
59
  if (typeof value === 'string') {
@@ -65,7 +61,6 @@ __decorate([
65
61
  }
66
62
  return value;
67
63
  }),
68
- (0, class_validator_1.IsOptional)(),
69
64
  __metadata("design:type", String)
70
- ], UpdateUserAttributesRequestDTO.prototype, "sub", void 0);
71
- //# sourceMappingURL=update-user-attributes-request.dto.js.map
65
+ ], AdminUpdateUserAttributesDTO.prototype, "sub", void 0);
66
+ //# sourceMappingURL=admin-update-user-attributes.dto.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"admin-update-user-attributes.dto.js","sourceRoot":"","sources":["../../src/dto/admin-update-user-attributes.dto.ts"],"names":[],"mappings":";AAAA;;;;;;;;;;;;;;;;;;;GAmBG;;;;;;;;;;;;AAEH,qDAAyC;AACzC,yDAA8C;AAC9C,uDAAkD;AAElD;;GAEG;AACH,MAAa,4BAA6B,SAAQ,+BAAa;IAC7D;;;;;;;;;;;;OAYG;IAQH,GAAG,CAAU;CACd;AAtBD,oEAsBC;AADC;IAPC,IAAA,wBAAM,EAAC,GAAG,EAAE,EAAE,OAAO,EAAE,yCAAyC,EAAE,CAAC;IACnE,IAAA,6BAAS,EAAC,CAAC,EAAE,KAAK,EAAE,EAAE,EAAE;QACvB,IAAI,OAAO,KAAK,KAAK,QAAQ,EAAE,CAAC;YAC9B,OAAO,KAAK,CAAC,IAAI,EAAE,CAAC,WAAW,EAAE,CAAC;QACpC,CAAC;QACD,OAAO,KAAK,CAAC;IACf,CAAC,CAAC;;yDACW"}
@@ -63,7 +63,7 @@ export declare enum AuthChallenge {
63
63
  * email: 'user@example.com',
64
64
  * codeDeliveryDestination: 'u***@example.com'
65
65
  * },
66
- * userSub: 'a21b654c-2746-4168-acee-c175083a65cd'
66
+ * sub: 'a21b654c-2746-4168-acee-c175083a65cd'
67
67
  * }
68
68
  * ```
69
69
  */
@@ -119,7 +119,7 @@ export declare class AuthChallengeResponseDTO {
119
119
  *
120
120
  * @example "a21b654c-2746-4168-acee-c175083a65cd"
121
121
  */
122
- userSub: string;
122
+ sub: string;
123
123
  }
124
124
  /**
125
125
  * Challenge Completion Request DTO
@@ -1 +1 @@
1
- {"version":3,"file":"auth-challenge.dto.d.ts","sourceRoot":"","sources":["../../src/dto/auth-challenge.dto.ts"],"names":[],"mappings":"AAGA;;;;;;;;;;;;;;;;GAgBG;AACH,oBAAY,aAAa;IACvB;;;OAGG;IACH,YAAY,iBAAiB;IAE7B;;;OAGG;IACH,YAAY,iBAAiB;IAE7B;;;;OAIG;IACH,YAAY,iBAAiB;IAE7B;;;;OAIG;IACH,kBAAkB,uBAAuB;IAEzC;;;;OAIG;IACH,qBAAqB,0BAA0B;CAChD;AAED;;;;;;;;;;;;;;;;;;;;;GAqBG;AACH,qBAAa,wBAAwB;IACnC;;;;;OAKG;IAIH,aAAa,EAAG,aAAa,CAAC;IAE9B;;;;;;;;;OASG;IAQH,OAAO,EAAG,MAAM,CAAC;IAEjB;;;;;;;;;;;;;;;;;;;;;OAqBG;IAEH,mBAAmB,EAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;IAE9C;;;;;;;;;OASG;IAQH,OAAO,EAAG,MAAM,CAAC;CAClB;AAED;;;;;;;;;;;;;;;;;;;;;;;;GAwBG;AACH,qBAAa,2BAA2B;IACtC;;;;;;;;;;;;OAYG;IAQH,OAAO,EAAG,MAAM,CAAC;IAEjB;;;;;OAKG;IAIH,aAAa,EAAG,aAAa,CAAC;IAE9B;;;;;;;;;;;;;;;OAeG;IAEH,kBAAkB,EAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;CAC9C"}
1
+ {"version":3,"file":"auth-challenge.dto.d.ts","sourceRoot":"","sources":["../../src/dto/auth-challenge.dto.ts"],"names":[],"mappings":"AAGA;;;;;;;;;;;;;;;;GAgBG;AACH,oBAAY,aAAa;IACvB;;;OAGG;IACH,YAAY,iBAAiB;IAE7B;;;OAGG;IACH,YAAY,iBAAiB;IAE7B;;;;OAIG;IACH,YAAY,iBAAiB;IAE7B;;;;OAIG;IACH,kBAAkB,uBAAuB;IAEzC;;;;OAIG;IACH,qBAAqB,0BAA0B;CAChD;AAED;;;;;;;;;;;;;;;;;;;;;GAqBG;AACH,qBAAa,wBAAwB;IACnC;;;;;OAKG;IAIH,aAAa,EAAG,aAAa,CAAC;IAE9B;;;;;;;;;OASG;IAQH,OAAO,EAAG,MAAM,CAAC;IAEjB;;;;;;;;;;;;;;;;;;;;;OAqBG;IAEH,mBAAmB,EAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;IAE9C;;;;;;;;;OASG;IAQH,GAAG,EAAG,MAAM,CAAC;CACd;AAED;;;;;;;;;;;;;;;;;;;;;;;;GAwBG;AACH,qBAAa,2BAA2B;IACtC;;;;;;;;;;;;OAYG;IAQH,OAAO,EAAG,MAAM,CAAC;IAEjB;;;;;OAKG;IAIH,aAAa,EAAG,aAAa,CAAC;IAE9B;;;;;;;;;;;;;;;OAeG;IAEH,kBAAkB,EAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;CAC9C"}
@@ -78,7 +78,7 @@ var AuthChallenge;
78
78
  * email: 'user@example.com',
79
79
  * codeDeliveryDestination: 'u***@example.com'
80
80
  * },
81
- * userSub: 'a21b654c-2746-4168-acee-c175083a65cd'
81
+ * sub: 'a21b654c-2746-4168-acee-c175083a65cd'
82
82
  * }
83
83
  * ```
84
84
  */
@@ -134,7 +134,7 @@ class AuthChallengeResponseDTO {
134
134
  *
135
135
  * @example "a21b654c-2746-4168-acee-c175083a65cd"
136
136
  */
137
- userSub;
137
+ sub;
138
138
  }
139
139
  exports.AuthChallengeResponseDTO = AuthChallengeResponseDTO;
140
140
  __decorate([
@@ -166,7 +166,7 @@ __decorate([
166
166
  return value;
167
167
  }),
168
168
  __metadata("design:type", String)
169
- ], AuthChallengeResponseDTO.prototype, "userSub", void 0);
169
+ ], AuthChallengeResponseDTO.prototype, "sub", void 0);
170
170
  /**
171
171
  * Challenge Completion Request DTO
172
172
  *
@@ -1 +1 @@
1
- {"version":3,"file":"auth-challenge.dto.js","sourceRoot":"","sources":["../../src/dto/auth-challenge.dto.ts"],"names":[],"mappings":";;;;;;;;;;;;AAAA,qDAA2D;AAC3D,yDAA8C;AAE9C;;;;;;;;;;;;;;;;GAgBG;AACH,IAAY,aAiCX;AAjCD,WAAY,aAAa;IACvB;;;OAGG;IACH,8CAA6B,CAAA;IAE7B;;;OAGG;IACH,8CAA6B,CAAA;IAE7B;;;;OAIG;IACH,8CAA6B,CAAA;IAE7B;;;;OAIG;IACH,0DAAyC,CAAA;IAEzC;;;;OAIG;IACH,gEAA+C,CAAA;AACjD,CAAC,EAjCW,aAAa,6BAAb,aAAa,QAiCxB;AAED;;;;;;;;;;;;;;;;;;;;;GAqBG;AACH,MAAa,wBAAwB;IACnC;;;;;OAKG;IAIH,aAAa,CAAiB;IAE9B;;;;;;;;;OASG;IAQH,OAAO,CAAU;IAEjB;;;;;;;;;;;;;;;;;;;;;OAqBG;IAEH,mBAAmB,CAA2B;IAE9C;;;;;;;;;OASG;IAQH,OAAO,CAAU;CAClB;AA1ED,4DA0EC;AAhEC;IAHC,IAAA,wBAAM,EAAC,aAAa,EAAE;QACrB,OAAO,EAAE,yDAAyD;KACnE,CAAC;;+DAC4B;AAmB9B;IAPC,IAAA,wBAAM,EAAC,GAAG,EAAE,EAAE,OAAO,EAAE,8CAA8C,EAAE,CAAC;IACxE,IAAA,6BAAS,EAAC,CAAC,EAAE,KAAK,EAAE,EAAE,EAAE;QACvB,IAAI,OAAO,KAAK,KAAK,QAAQ,EAAE,CAAC;YAC9B,OAAO,KAAK,CAAC,IAAI,EAAE,CAAC,WAAW,EAAE,CAAC;QACpC,CAAC;QACD,OAAO,KAAK,CAAC;IACf,CAAC,CAAC;;yDACe;AAyBjB;IADC,IAAA,0BAAQ,EAAC,EAAE,OAAO,EAAE,wCAAwC,EAAE,CAAC;;qEAClB;AAmB9C;IAPC,IAAA,wBAAM,EAAC,GAAG,EAAE,EAAE,OAAO,EAAE,yCAAyC,EAAE,CAAC;IACnE,IAAA,6BAAS,EAAC,CAAC,EAAE,KAAK,EAAE,EAAE,EAAE;QACvB,IAAI,OAAO,KAAK,KAAK,QAAQ,EAAE,CAAC;YAC9B,OAAO,KAAK,CAAC,IAAI,EAAE,CAAC,WAAW,EAAE,CAAC;QACpC,CAAC;QACD,OAAO,KAAK,CAAC;IACf,CAAC,CAAC;;yDACe;AAGnB;;;;;;;;;;;;;;;;;;;;;;;;GAwBG;AACH,MAAa,2BAA2B;IACtC;;;;;;;;;;;;OAYG;IAQH,OAAO,CAAU;IAEjB;;;;;OAKG;IAIH,aAAa,CAAiB;IAE9B;;;;;;;;;;;;;;;OAeG;IAEH,kBAAkB,CAA2B;CAC9C;AApDD,kEAoDC;AA/BC;IAPC,IAAA,wBAAM,EAAC,GAAG,EAAE,EAAE,OAAO,EAAE,8CAA8C,EAAE,CAAC;IACxE,IAAA,6BAAS,EAAC,CAAC,EAAE,KAAK,EAAE,EAAE,EAAE;QACvB,IAAI,OAAO,KAAK,KAAK,QAAQ,EAAE,CAAC;YAC9B,OAAO,KAAK,CAAC,IAAI,EAAE,CAAC,WAAW,EAAE,CAAC;QACpC,CAAC;QACD,OAAO,KAAK,CAAC;IACf,CAAC,CAAC;;4DACe;AAWjB;IAHC,IAAA,wBAAM,EAAC,aAAa,EAAE;QACrB,OAAO,EAAE,yDAAyD;KACnE,CAAC;;kEAC4B;AAmB9B;IADC,IAAA,0BAAQ,EAAC,EAAE,OAAO,EAAE,uCAAuC,EAAE,CAAC;;uEAClB"}
1
+ {"version":3,"file":"auth-challenge.dto.js","sourceRoot":"","sources":["../../src/dto/auth-challenge.dto.ts"],"names":[],"mappings":";;;;;;;;;;;;AAAA,qDAA2D;AAC3D,yDAA8C;AAE9C;;;;;;;;;;;;;;;;GAgBG;AACH,IAAY,aAiCX;AAjCD,WAAY,aAAa;IACvB;;;OAGG;IACH,8CAA6B,CAAA;IAE7B;;;OAGG;IACH,8CAA6B,CAAA;IAE7B;;;;OAIG;IACH,8CAA6B,CAAA;IAE7B;;;;OAIG;IACH,0DAAyC,CAAA;IAEzC;;;;OAIG;IACH,gEAA+C,CAAA;AACjD,CAAC,EAjCW,aAAa,6BAAb,aAAa,QAiCxB;AAED;;;;;;;;;;;;;;;;;;;;;GAqBG;AACH,MAAa,wBAAwB;IACnC;;;;;OAKG;IAIH,aAAa,CAAiB;IAE9B;;;;;;;;;OASG;IAQH,OAAO,CAAU;IAEjB;;;;;;;;;;;;;;;;;;;;;OAqBG;IAEH,mBAAmB,CAA2B;IAE9C;;;;;;;;;OASG;IAQH,GAAG,CAAU;CACd;AA1ED,4DA0EC;AAhEC;IAHC,IAAA,wBAAM,EAAC,aAAa,EAAE;QACrB,OAAO,EAAE,yDAAyD;KACnE,CAAC;;+DAC4B;AAmB9B;IAPC,IAAA,wBAAM,EAAC,GAAG,EAAE,EAAE,OAAO,EAAE,8CAA8C,EAAE,CAAC;IACxE,IAAA,6BAAS,EAAC,CAAC,EAAE,KAAK,EAAE,EAAE,EAAE;QACvB,IAAI,OAAO,KAAK,KAAK,QAAQ,EAAE,CAAC;YAC9B,OAAO,KAAK,CAAC,IAAI,EAAE,CAAC,WAAW,EAAE,CAAC;QACpC,CAAC;QACD,OAAO,KAAK,CAAC;IACf,CAAC,CAAC;;yDACe;AAyBjB;IADC,IAAA,0BAAQ,EAAC,EAAE,OAAO,EAAE,wCAAwC,EAAE,CAAC;;qEAClB;AAmB9C;IAPC,IAAA,wBAAM,EAAC,GAAG,EAAE,EAAE,OAAO,EAAE,yCAAyC,EAAE,CAAC;IACnE,IAAA,6BAAS,EAAC,CAAC,EAAE,KAAK,EAAE,EAAE,EAAE;QACvB,IAAI,OAAO,KAAK,KAAK,QAAQ,EAAE,CAAC;YAC9B,OAAO,KAAK,CAAC,IAAI,EAAE,CAAC,WAAW,EAAE,CAAC;QACpC,CAAC;QACD,OAAO,KAAK,CAAC;IACf,CAAC,CAAC;;qDACW;AAGf;;;;;;;;;;;;;;;;;;;;;;;;GAwBG;AACH,MAAa,2BAA2B;IACtC;;;;;;;;;;;;OAYG;IAQH,OAAO,CAAU;IAEjB;;;;;OAKG;IAIH,aAAa,CAAiB;IAE9B;;;;;;;;;;;;;;;OAeG;IAEH,kBAAkB,CAA2B;CAC9C;AApDD,kEAoDC;AA/BC;IAPC,IAAA,wBAAM,EAAC,GAAG,EAAE,EAAE,OAAO,EAAE,8CAA8C,EAAE,CAAC;IACxE,IAAA,6BAAS,EAAC,CAAC,EAAE,KAAK,EAAE,EAAE,EAAE;QACvB,IAAI,OAAO,KAAK,KAAK,QAAQ,EAAE,CAAC;YAC9B,OAAO,KAAK,CAAC,IAAI,EAAE,CAAC,WAAW,EAAE,CAAC;QACpC,CAAC;QACD,OAAO,KAAK,CAAC;IACf,CAAC,CAAC;;4DACe;AAWjB;IAHC,IAAA,wBAAM,EAAC,aAAa,EAAE;QACrB,OAAO,EAAE,yDAAyD;KACnE,CAAC;;kEAC4B;AAmB9B;IADC,IAAA,0BAAQ,EAAC,EAAE,OAAO,EAAE,uCAAuC,EAAE,CAAC;;uEAClB"}
@@ -208,7 +208,7 @@ export declare class AuthResponseDTO {
208
208
  *
209
209
  * @example "a21b654c-2746-4168-acee-c175083a65cd"
210
210
  */
211
- userSub?: string;
211
+ sub?: string;
212
212
  }
213
213
  /**
214
214
  * Token Response DTO
@@ -1 +1 @@
1
- {"version":3,"file":"auth-response.dto.d.ts","sourceRoot":"","sources":["../../src/dto/auth-response.dto.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,aAAa,EAAE,MAAM,sBAAsB,CAAC;AACrD,OAAO,EAAE,KAAK,EAAE,MAAM,kCAAkC,CAAC;AAEzD;;;;;GAKG;AACH,MAAM,WAAW,gBAAgB;IAC/B;;;OAGG;IACH,GAAG,EAAE,MAAM,CAAC;IAEZ;;OAEG;IACH,KAAK,EAAE,MAAM,CAAC;IAEd;;OAEG;IACH,SAAS,CAAC,EAAE,MAAM,GAAG,IAAI,CAAC;IAE1B;;OAEG;IACH,QAAQ,CAAC,EAAE,MAAM,GAAG,IAAI,CAAC;IAEzB;;;OAGG;IACH,KAAK,CAAC,EAAE,MAAM,CAAC;IAEf;;OAEG;IACH,eAAe,EAAE,OAAO,CAAC;IAEzB;;OAEG;IACH,eAAe,CAAC,EAAE,OAAO,CAAC;IAE1B;;OAEG;IACH,eAAe,CAAC,EAAE,MAAM,EAAE,CAAC;IAE3B;;;;OAIG;IACH,eAAe,CAAC,EAAE,OAAO,CAAC;CAC3B;AAED;;;;;;;;;;;;;;;;;GAiBG;AACH,qBAAa,eAAe;IAC1B;;;;;OAKG;IACH,WAAW,CAAC,EAAE,MAAM,CAAC;IAErB;;;;;OAKG;IACH,YAAY,CAAC,EAAE,MAAM,CAAC;IAEtB;;;;;;;OAOG;IACH,oBAAoB,CAAC,EAAE,MAAM,CAAC;IAE9B;;;;;;;OAOG;IACH,qBAAqB,CAAC,EAAE,MAAM,CAAC;IAE/B;;;;;;;;;;;;OAYG;IACH,UAAU,CAAC,EAAE,MAAM,CAAC;IAEpB;;;;;;;;;;;;OAYG;IACH,OAAO,CAAC,EAAE,OAAO,CAAC;IAElB;;;;;;;;;;;;;;;;;;;;;;;OAuBG;IACH,WAAW,CAAC,EAAE,MAAM,CAAC;IAErB;;;;;OAKG;IACH,IAAI,CAAC,EAAE,gBAAgB,CAAC;IAMxB;;;;;;;;;OASG;IACH,aAAa,CAAC,EAAE,aAAa,CAAC;IAE9B;;;;;;;;;;OAUG;IACH,OAAO,CAAC,EAAE,MAAM,CAAC;IAEjB;;;;;;;;;;;;;;;;;OAiBG;IACH,mBAAmB,CAAC,EAAE,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;IAE9C;;;;;;OAMG;IACH,OAAO,CAAC,EAAE,MAAM,CAAC;CAClB;AAED;;;;;GAKG;AACH,MAAM,WAAW,aAAa;IAC5B;;OAEG;IACH,WAAW,EAAE,MAAM,CAAC;IAEpB;;OAEG;IACH,YAAY,EAAE,MAAM,CAAC;IAErB;;OAEG;IACH,oBAAoB,EAAE,MAAM,CAAC;IAE7B;;OAEG;IACH,qBAAqB,EAAE,MAAM,CAAC;CAC/B;AAED;;;;;;;;GAQG;AACH,wBAAgB,kBAAkB,CAAC,IAAI,EAAE,KAAK,GAAG,gBAAgB,CAYhE"}
1
+ {"version":3,"file":"auth-response.dto.d.ts","sourceRoot":"","sources":["../../src/dto/auth-response.dto.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,aAAa,EAAE,MAAM,sBAAsB,CAAC;AACrD,OAAO,EAAE,KAAK,EAAE,MAAM,kCAAkC,CAAC;AAEzD;;;;;GAKG;AACH,MAAM,WAAW,gBAAgB;IAC/B;;;OAGG;IACH,GAAG,EAAE,MAAM,CAAC;IAEZ;;OAEG;IACH,KAAK,EAAE,MAAM,CAAC;IAEd;;OAEG;IACH,SAAS,CAAC,EAAE,MAAM,GAAG,IAAI,CAAC;IAE1B;;OAEG;IACH,QAAQ,CAAC,EAAE,MAAM,GAAG,IAAI,CAAC;IAEzB;;;OAGG;IACH,KAAK,CAAC,EAAE,MAAM,CAAC;IAEf;;OAEG;IACH,eAAe,EAAE,OAAO,CAAC;IAEzB;;OAEG;IACH,eAAe,CAAC,EAAE,OAAO,CAAC;IAE1B;;OAEG;IACH,eAAe,CAAC,EAAE,MAAM,EAAE,CAAC;IAE3B;;;;OAIG;IACH,eAAe,CAAC,EAAE,OAAO,CAAC;CAC3B;AAED;;;;;;;;;;;;;;;;;GAiBG;AACH,qBAAa,eAAe;IAC1B;;;;;OAKG;IACH,WAAW,CAAC,EAAE,MAAM,CAAC;IAErB;;;;;OAKG;IACH,YAAY,CAAC,EAAE,MAAM,CAAC;IAEtB;;;;;;;OAOG;IACH,oBAAoB,CAAC,EAAE,MAAM,CAAC;IAE9B;;;;;;;OAOG;IACH,qBAAqB,CAAC,EAAE,MAAM,CAAC;IAE/B;;;;;;;;;;;;OAYG;IACH,UAAU,CAAC,EAAE,MAAM,CAAC;IAEpB;;;;;;;;;;;;OAYG;IACH,OAAO,CAAC,EAAE,OAAO,CAAC;IAElB;;;;;;;;;;;;;;;;;;;;;;;OAuBG;IACH,WAAW,CAAC,EAAE,MAAM,CAAC;IAErB;;;;;OAKG;IACH,IAAI,CAAC,EAAE,gBAAgB,CAAC;IAMxB;;;;;;;;;OASG;IACH,aAAa,CAAC,EAAE,aAAa,CAAC;IAE9B;;;;;;;;;;OAUG;IACH,OAAO,CAAC,EAAE,MAAM,CAAC;IAEjB;;;;;;;;;;;;;;;;;OAiBG;IACH,mBAAmB,CAAC,EAAE,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;IAE9C;;;;;;OAMG;IACH,GAAG,CAAC,EAAE,MAAM,CAAC;CACd;AAED;;;;;GAKG;AACH,MAAM,WAAW,aAAa;IAC5B;;OAEG;IACH,WAAW,EAAE,MAAM,CAAC;IAEpB;;OAEG;IACH,YAAY,EAAE,MAAM,CAAC;IAErB;;OAEG;IACH,oBAAoB,EAAE,MAAM,CAAC;IAE7B;;OAEG;IACH,qBAAqB,EAAE,MAAM,CAAC;CAC/B;AAED;;;;;;;;GAQG;AACH,wBAAgB,kBAAkB,CAAC,IAAI,EAAE,KAAK,GAAG,gBAAgB,CAYhE"}
@@ -165,7 +165,7 @@ class AuthResponseDTO {
165
165
  *
166
166
  * @example "a21b654c-2746-4168-acee-c175083a65cd"
167
167
  */
168
- userSub;
168
+ sub;
169
169
  }
170
170
  exports.AuthResponseDTO = AuthResponseDTO;
171
171
  /**
@@ -1 +1 @@
1
- {"version":3,"file":"auth-response.dto.js","sourceRoot":"","sources":["../../src/dto/auth-response.dto.ts"],"names":[],"mappings":";;;AAmRA,gDAYC;AAnOD;;;;;;;;;;;;;;;;;GAiBG;AACH,MAAa,eAAe;IAC1B;;;;;OAKG;IACH,WAAW,CAAU;IAErB;;;;;OAKG;IACH,YAAY,CAAU;IAEtB;;;;;;;OAOG;IACH,oBAAoB,CAAU;IAE9B;;;;;;;OAOG;IACH,qBAAqB,CAAU;IAE/B;;;;;;;;;;;;OAYG;IACH,UAAU,CAAU;IAEpB;;;;;;;;;;;;OAYG;IACH,OAAO,CAAW;IAElB;;;;;;;;;;;;;;;;;;;;;;;OAuBG;IACH,WAAW,CAAU;IAErB;;;;;OAKG;IACH,IAAI,CAAoB;IAExB,+EAA+E;IAC/E,4CAA4C;IAC5C,+EAA+E;IAE/E;;;;;;;;;OASG;IACH,aAAa,CAAiB;IAE9B;;;;;;;;;;OAUG;IACH,OAAO,CAAU;IAEjB;;;;;;;;;;;;;;;;;OAiBG;IACH,mBAAmB,CAA2B;IAE9C;;;;;;OAMG;IACH,OAAO,CAAU;CAClB;AA9JD,0CA8JC;AA8BD;;;;;;;;GAQG;AACH,SAAgB,kBAAkB,CAAC,IAAW;IAC5C,OAAO;QACL,GAAG,EAAE,IAAI,CAAC,GAAG;QACb,KAAK,EAAE,IAAI,CAAC,KAAK;QACjB,SAAS,EAAE,IAAI,CAAC,SAAS;QACzB,QAAQ,EAAE,IAAI,CAAC,QAAQ;QACvB,KAAK,EAAE,IAAI,CAAC,KAAK,IAAI,SAAS;QAC9B,eAAe,EAAE,IAAI,CAAC,eAAe;QACrC,eAAe,EAAE,IAAI,CAAC,eAAe,IAAI,SAAS;QAClD,eAAe,EAAE,IAAI,CAAC,eAAe,IAAI,IAAI,CAAC,eAAe,CAAC,MAAM,GAAG,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS;QAC3G,eAAe,EAAE,CAAC,CAAC,IAAI,CAAC,YAAY;KACrC,CAAC;AACJ,CAAC"}
1
+ {"version":3,"file":"auth-response.dto.js","sourceRoot":"","sources":["../../src/dto/auth-response.dto.ts"],"names":[],"mappings":";;;AAmRA,gDAYC;AAnOD;;;;;;;;;;;;;;;;;GAiBG;AACH,MAAa,eAAe;IAC1B;;;;;OAKG;IACH,WAAW,CAAU;IAErB;;;;;OAKG;IACH,YAAY,CAAU;IAEtB;;;;;;;OAOG;IACH,oBAAoB,CAAU;IAE9B;;;;;;;OAOG;IACH,qBAAqB,CAAU;IAE/B;;;;;;;;;;;;OAYG;IACH,UAAU,CAAU;IAEpB;;;;;;;;;;;;OAYG;IACH,OAAO,CAAW;IAElB;;;;;;;;;;;;;;;;;;;;;;;OAuBG;IACH,WAAW,CAAU;IAErB;;;;;OAKG;IACH,IAAI,CAAoB;IAExB,+EAA+E;IAC/E,4CAA4C;IAC5C,+EAA+E;IAE/E;;;;;;;;;OASG;IACH,aAAa,CAAiB;IAE9B;;;;;;;;;;OAUG;IACH,OAAO,CAAU;IAEjB;;;;;;;;;;;;;;;;;OAiBG;IACH,mBAAmB,CAA2B;IAE9C;;;;;;OAMG;IACH,GAAG,CAAU;CACd;AA9JD,0CA8JC;AA8BD;;;;;;;;GAQG;AACH,SAAgB,kBAAkB,CAAC,IAAW;IAC5C,OAAO;QACL,GAAG,EAAE,IAAI,CAAC,GAAG;QACb,KAAK,EAAE,IAAI,CAAC,KAAK;QACjB,SAAS,EAAE,IAAI,CAAC,SAAS;QACzB,QAAQ,EAAE,IAAI,CAAC,QAAQ;QACvB,KAAK,EAAE,IAAI,CAAC,KAAK,IAAI,SAAS;QAC9B,eAAe,EAAE,IAAI,CAAC,eAAe;QACrC,eAAe,EAAE,IAAI,CAAC,eAAe,IAAI,SAAS;QAClD,eAAe,EAAE,IAAI,CAAC,eAAe,IAAI,IAAI,CAAC,eAAe,CAAC,MAAM,GAAG,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS;QAC3G,eAAe,EAAE,CAAC,CAAC,IAAI,CAAC,YAAY;KACrC,CAAC;AACJ,CAAC"}
@@ -1,19 +1,23 @@
1
1
  /**
2
- * DTO for getting MFA status
2
+ * DTO for getting MFA status (admin-only)
3
3
  *
4
- * Used to retrieve comprehensive MFA status for a user including enabled status,
5
- * configured methods, available methods, backup codes, and exemption information.
4
+ * Admin DTO - requires sub field. Used by AdminAuthService.
5
+ * User self-service version uses AuthService.getMFAStatus() which takes no DTO.
6
6
  *
7
7
  * @example
8
8
  * ```typescript
9
+ * // Admin version
9
10
  * const status = await mfaService.getMFAStatus({
10
11
  * sub: 'user-uuid'
11
12
  * });
13
+ *
14
+ * // User version (no DTO needed)
15
+ * const status = await authService.getMFAStatus();
12
16
  * ```
13
17
  */
14
18
  import { MFADeviceMethod } from '../enums/mfa-method.enum';
15
19
  /**
16
- * DTO for getting MFA status
20
+ * DTO for getting MFA status (admin-only)
17
21
  */
18
22
  export declare class GetMFAStatusDTO {
19
23
  /**
@@ -1 +1 @@
1
- {"version":3,"file":"get-mfa-status.dto.d.ts","sourceRoot":"","sources":["../../src/dto/get-mfa-status.dto.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;;;GAYG;AAIH,OAAO,EAAE,eAAe,EAAE,MAAM,0BAA0B,CAAC;AAE3D;;GAEG;AACH,qBAAa,eAAe;IAC1B;;;;;;;;;;;;OAYG;IAQH,GAAG,EAAG,MAAM,CAAC;CACd;AAED;;GAEG;AACH,qBAAa,uBAAuB;IAClC;;OAEG;IACH,OAAO,EAAG,OAAO,CAAC;IAElB;;OAEG;IACH,QAAQ,EAAG,OAAO,CAAC;IAEnB;;OAEG;IACH,iBAAiB,EAAG,KAAK,CAAC,eAAe,CAAC,CAAC;IAE3C;;OAEG;IACH,gBAAgB,EAAG,KAAK,CAAC,MAAM,CAAC,CAAC;IAEjC;;OAEG;IACH,cAAc,EAAG,OAAO,CAAC;IAEzB;;OAEG;IACH,eAAe,CAAC,EAAE,eAAe,CAAC;IAElC;;OAEG;IACH,SAAS,EAAG,OAAO,CAAC;IAEpB;;OAEG;IACH,eAAe,EAAG,MAAM,GAAG,IAAI,CAAC;IAEhC;;OAEG;IACH,kBAAkB,EAAG,IAAI,GAAG,IAAI,CAAC;CAClC"}
1
+ {"version":3,"file":"get-mfa-status.dto.d.ts","sourceRoot":"","sources":["../../src/dto/get-mfa-status.dto.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;;;;;;;GAgBG;AAIH,OAAO,EAAE,eAAe,EAAE,MAAM,0BAA0B,CAAC;AAE3D;;GAEG;AACH,qBAAa,eAAe;IAC1B;;;;;;;;;;;;OAYG;IAQH,GAAG,EAAG,MAAM,CAAC;CACd;AAED;;GAEG;AACH,qBAAa,uBAAuB;IAClC;;OAEG;IACH,OAAO,EAAG,OAAO,CAAC;IAElB;;OAEG;IACH,QAAQ,EAAG,OAAO,CAAC;IAEnB;;OAEG;IACH,iBAAiB,EAAG,KAAK,CAAC,eAAe,CAAC,CAAC;IAE3C;;OAEG;IACH,gBAAgB,EAAG,KAAK,CAAC,MAAM,CAAC,CAAC;IAEjC;;OAEG;IACH,cAAc,EAAG,OAAO,CAAC;IAEzB;;OAEG;IACH,eAAe,CAAC,EAAE,eAAe,CAAC;IAElC;;OAEG;IACH,SAAS,EAAG,OAAO,CAAC;IAEpB;;OAEG;IACH,eAAe,EAAG,MAAM,GAAG,IAAI,CAAC;IAEhC;;OAEG;IACH,kBAAkB,EAAG,IAAI,GAAG,IAAI,CAAC;CAClC"}
@@ -1,15 +1,19 @@
1
1
  "use strict";
2
2
  /**
3
- * DTO for getting MFA status
3
+ * DTO for getting MFA status (admin-only)
4
4
  *
5
- * Used to retrieve comprehensive MFA status for a user including enabled status,
6
- * configured methods, available methods, backup codes, and exemption information.
5
+ * Admin DTO - requires sub field. Used by AdminAuthService.
6
+ * User self-service version uses AuthService.getMFAStatus() which takes no DTO.
7
7
  *
8
8
  * @example
9
9
  * ```typescript
10
+ * // Admin version
10
11
  * const status = await mfaService.getMFAStatus({
11
12
  * sub: 'user-uuid'
12
13
  * });
14
+ *
15
+ * // User version (no DTO needed)
16
+ * const status = await authService.getMFAStatus();
13
17
  * ```
14
18
  */
15
19
  var __decorate = (this && this.__decorate) || function (decorators, target, key, desc) {
@@ -26,7 +30,7 @@ exports.GetMFAStatusResponseDTO = exports.GetMFAStatusDTO = void 0;
26
30
  const class_validator_1 = require("class-validator");
27
31
  const class_transformer_1 = require("class-transformer");
28
32
  /**
29
- * DTO for getting MFA status
33
+ * DTO for getting MFA status (admin-only)
30
34
  */
31
35
  class GetMFAStatusDTO {
32
36
  /**
@@ -1 +1 @@
1
- {"version":3,"file":"get-mfa-status.dto.js","sourceRoot":"","sources":["../../src/dto/get-mfa-status.dto.ts"],"names":[],"mappings":";AAAA;;;;;;;;;;;;GAYG;;;;;;;;;;;;AAEH,qDAAyC;AACzC,yDAA8C;AAG9C;;GAEG;AACH,MAAa,eAAe;IAC1B;;;;;;;;;;;;OAYG;IAQH,GAAG,CAAU;CACd;AAtBD,0CAsBC;AADC;IAPC,IAAA,wBAAM,EAAC,GAAG,EAAE,EAAE,OAAO,EAAE,yCAAyC,EAAE,CAAC;IACnE,IAAA,6BAAS,EAAC,CAAC,EAAE,KAAK,EAAE,EAAE,EAAE;QACvB,IAAI,OAAO,KAAK,KAAK,QAAQ,EAAE,CAAC;YAC9B,OAAO,KAAK,CAAC,IAAI,EAAE,CAAC,WAAW,EAAE,CAAC;QACpC,CAAC;QACD,OAAO,KAAK,CAAC;IACf,CAAC,CAAC;;4CACW;AAGf;;GAEG;AACH,MAAa,uBAAuB;IAClC;;OAEG;IACH,OAAO,CAAW;IAElB;;OAEG;IACH,QAAQ,CAAW;IAEnB;;OAEG;IACH,iBAAiB,CAA0B;IAE3C;;OAEG;IACH,gBAAgB,CAAiB;IAEjC;;OAEG;IACH,cAAc,CAAW;IAEzB;;OAEG;IACH,eAAe,CAAmB;IAElC;;OAEG;IACH,SAAS,CAAW;IAEpB;;OAEG;IACH,eAAe,CAAiB;IAEhC;;OAEG;IACH,kBAAkB,CAAe;CAClC;AA7CD,0DA6CC"}
1
+ {"version":3,"file":"get-mfa-status.dto.js","sourceRoot":"","sources":["../../src/dto/get-mfa-status.dto.ts"],"names":[],"mappings":";AAAA;;;;;;;;;;;;;;;;GAgBG;;;;;;;;;;;;AAEH,qDAAyC;AACzC,yDAA8C;AAG9C;;GAEG;AACH,MAAa,eAAe;IAC1B;;;;;;;;;;;;OAYG;IAQH,GAAG,CAAU;CACd;AAtBD,0CAsBC;AADC;IAPC,IAAA,wBAAM,EAAC,GAAG,EAAE,EAAE,OAAO,EAAE,yCAAyC,EAAE,CAAC;IACnE,IAAA,6BAAS,EAAC,CAAC,EAAE,KAAK,EAAE,EAAE,EAAE;QACvB,IAAI,OAAO,KAAK,KAAK,QAAQ,EAAE,CAAC;YAC9B,OAAO,KAAK,CAAC,IAAI,EAAE,CAAC,WAAW,EAAE,CAAC;QACpC,CAAC;QACD,OAAO,KAAK,CAAC;IACf,CAAC,CAAC;;4CACW;AAGf;;GAEG;AACH,MAAa,uBAAuB;IAClC;;OAEG;IACH,OAAO,CAAW;IAElB;;OAEG;IACH,QAAQ,CAAW;IAEnB;;OAEG;IACH,iBAAiB,CAA0B;IAE3C;;OAEG;IACH,gBAAgB,CAAiB;IAEjC;;OAEG;IACH,cAAc,CAAW;IAEzB;;OAEG;IACH,eAAe,CAAmB;IAElC;;OAEG;IACH,SAAS,CAAW;IAEpB;;OAEG;IACH,eAAe,CAAiB;IAEhC;;OAEG;IACH,kBAAkB,CAAe;CAClC;AA7CD,0DA6CC"}
@@ -8,16 +8,16 @@ import { IAuthAudit } from '../interfaces/entities.interface';
8
8
  * @example
9
9
  * ```typescript
10
10
  * const result = await auditService.getRiskAssessmentHistory({
11
- * userSub: 'user-uuid',
11
+ * sub: 'user-uuid',
12
12
  * limit: 50,
13
13
  * });
14
14
  * ```
15
15
  */
16
16
  export declare class GetRiskAssessmentHistoryDTO {
17
17
  /**
18
- * User identifier
18
+ * User's unique identifier (UUID v4)
19
19
  */
20
- userSub: string;
20
+ sub: string;
21
21
  /**
22
22
  * Maximum number of records to return
23
23
  *
@@ -1 +1 @@
1
- {"version":3,"file":"get-risk-assessment-history.dto.d.ts","sourceRoot":"","sources":["../../src/dto/get-risk-assessment-history.dto.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,UAAU,EAAE,MAAM,kCAAkC,CAAC;AAI9D;;;;;;;;;;;;;GAaG;AACH,qBAAa,2BAA2B;IACtC;;OAEG;IAQH,OAAO,EAAG,MAAM,CAAC;IAEjB;;;;OAIG;IAYH,KAAK,CAAC,EAAE,MAAM,CAAC;CAChB;AAED;;GAEG;AACH,qBAAa,mCAAmC;IAC9C;;OAEG;IACH,IAAI,EAAG,UAAU,EAAE,CAAC;CACrB"}
1
+ {"version":3,"file":"get-risk-assessment-history.dto.d.ts","sourceRoot":"","sources":["../../src/dto/get-risk-assessment-history.dto.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,UAAU,EAAE,MAAM,kCAAkC,CAAC;AAI9D;;;;;;;;;;;;;GAaG;AACH,qBAAa,2BAA2B;IACtC;;OAEG;IAQH,GAAG,EAAG,MAAM,CAAC;IAEb;;;;OAIG;IAYH,KAAK,CAAC,EAAE,MAAM,CAAC;CAChB;AAED;;GAEG;AACH,qBAAa,mCAAmC;IAC9C;;OAEG;IACH,IAAI,EAAG,UAAU,EAAE,CAAC;CACrB"}
@@ -21,16 +21,16 @@ const class_transformer_1 = require("class-transformer");
21
21
  * @example
22
22
  * ```typescript
23
23
  * const result = await auditService.getRiskAssessmentHistory({
24
- * userSub: 'user-uuid',
24
+ * sub: 'user-uuid',
25
25
  * limit: 50,
26
26
  * });
27
27
  * ```
28
28
  */
29
29
  class GetRiskAssessmentHistoryDTO {
30
30
  /**
31
- * User identifier
31
+ * User's unique identifier (UUID v4)
32
32
  */
33
- userSub;
33
+ sub;
34
34
  /**
35
35
  * Maximum number of records to return
36
36
  *
@@ -40,7 +40,7 @@ class GetRiskAssessmentHistoryDTO {
40
40
  }
41
41
  exports.GetRiskAssessmentHistoryDTO = GetRiskAssessmentHistoryDTO;
42
42
  __decorate([
43
- (0, class_validator_1.IsUUID)('4', { message: 'userSub must be a valid UUID v4 format' }),
43
+ (0, class_validator_1.IsUUID)('4', { message: 'sub must be a valid UUID v4 format' }),
44
44
  (0, class_transformer_1.Transform)(({ value }) => {
45
45
  if (typeof value === 'string') {
46
46
  return value.trim().toLowerCase();
@@ -48,7 +48,7 @@ __decorate([
48
48
  return value;
49
49
  }),
50
50
  __metadata("design:type", String)
51
- ], GetRiskAssessmentHistoryDTO.prototype, "userSub", void 0);
51
+ ], GetRiskAssessmentHistoryDTO.prototype, "sub", void 0);
52
52
  __decorate([
53
53
  (0, class_validator_1.IsOptional)(),
54
54
  (0, class_validator_1.IsInt)({ message: 'limit must be an integer' }),
@@ -1 +1 @@
1
- {"version":3,"file":"get-risk-assessment-history.dto.js","sourceRoot":"","sources":["../../src/dto/get-risk-assessment-history.dto.ts"],"names":[],"mappings":";;;;;;;;;;;;AACA,qDAAsE;AACtE,yDAA8C;AAE9C;;;;;;;;;;;;;GAaG;AACH,MAAa,2BAA2B;IACtC;;OAEG;IAQH,OAAO,CAAU;IAEjB;;;;OAIG;IAYH,KAAK,CAAU;CAChB;AA9BD,kEA8BC;AAnBC;IAPC,IAAA,wBAAM,EAAC,GAAG,EAAE,EAAE,OAAO,EAAE,wCAAwC,EAAE,CAAC;IAClE,IAAA,6BAAS,EAAC,CAAC,EAAE,KAAK,EAAE,EAAE,EAAE;QACvB,IAAI,OAAO,KAAK,KAAK,QAAQ,EAAE,CAAC;YAC9B,OAAO,KAAK,CAAC,IAAI,EAAE,CAAC,WAAW,EAAE,CAAC;QACpC,CAAC;QACD,OAAO,KAAK,CAAC;IACf,CAAC,CAAC;;4DACe;AAkBjB;IAXC,IAAA,4BAAU,GAAE;IACZ,IAAA,uBAAK,EAAC,EAAE,OAAO,EAAE,0BAA0B,EAAE,CAAC;IAC9C,IAAA,qBAAG,EAAC,CAAC,EAAE,EAAE,OAAO,EAAE,0BAA0B,EAAE,CAAC;IAC/C,IAAA,qBAAG,EAAC,GAAG,EAAE,EAAE,OAAO,EAAE,2BAA2B,EAAE,CAAC;IAClD,IAAA,6BAAS,EAAC,CAAC,EAAE,KAAK,EAAE,EAAE,EAAE;QACvB,IAAI,OAAO,KAAK,KAAK,QAAQ,IAAI,KAAK,CAAC,IAAI,EAAE,KAAK,EAAE,EAAE,CAAC;YACrD,MAAM,MAAM,GAAG,MAAM,CAAC,QAAQ,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;YAC1C,OAAO,MAAM,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,MAAM,CAAC;QAC/C,CAAC;QACD,OAAO,KAAK,CAAC;IACf,CAAC,CAAC;;0DACa;AAGjB;;GAEG;AACH,MAAa,mCAAmC;IAC9C;;OAEG;IACH,IAAI,CAAgB;CACrB;AALD,kFAKC"}
1
+ {"version":3,"file":"get-risk-assessment-history.dto.js","sourceRoot":"","sources":["../../src/dto/get-risk-assessment-history.dto.ts"],"names":[],"mappings":";;;;;;;;;;;;AACA,qDAAsE;AACtE,yDAA8C;AAE9C;;;;;;;;;;;;;GAaG;AACH,MAAa,2BAA2B;IACtC;;OAEG;IAQH,GAAG,CAAU;IAEb;;;;OAIG;IAYH,KAAK,CAAU;CAChB;AA9BD,kEA8BC;AAnBC;IAPC,IAAA,wBAAM,EAAC,GAAG,EAAE,EAAE,OAAO,EAAE,oCAAoC,EAAE,CAAC;IAC9D,IAAA,6BAAS,EAAC,CAAC,EAAE,KAAK,EAAE,EAAE,EAAE;QACvB,IAAI,OAAO,KAAK,KAAK,QAAQ,EAAE,CAAC;YAC9B,OAAO,KAAK,CAAC,IAAI,EAAE,CAAC,WAAW,EAAE,CAAC;QACpC,CAAC;QACD,OAAO,KAAK,CAAC;IACf,CAAC,CAAC;;wDACW;AAkBb;IAXC,IAAA,4BAAU,GAAE;IACZ,IAAA,uBAAK,EAAC,EAAE,OAAO,EAAE,0BAA0B,EAAE,CAAC;IAC9C,IAAA,qBAAG,EAAC,CAAC,EAAE,EAAE,OAAO,EAAE,0BAA0B,EAAE,CAAC;IAC/C,IAAA,qBAAG,EAAC,GAAG,EAAE,EAAE,OAAO,EAAE,2BAA2B,EAAE,CAAC;IAClD,IAAA,6BAAS,EAAC,CAAC,EAAE,KAAK,EAAE,EAAE,EAAE;QACvB,IAAI,OAAO,KAAK,KAAK,QAAQ,IAAI,KAAK,CAAC,IAAI,EAAE,KAAK,EAAE,EAAE,CAAC;YACrD,MAAM,MAAM,GAAG,MAAM,CAAC,QAAQ,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;YAC1C,OAAO,MAAM,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,MAAM,CAAC;QAC/C,CAAC;QACD,OAAO,KAAK,CAAC;IACf,CAAC,CAAC;;0DACa;AAGjB;;GAEG;AACH,MAAa,mCAAmC;IAC9C;;OAEG;IACH,IAAI,CAAgB;CACrB;AALD,kFAKC"}
@@ -9,18 +9,18 @@ import { IAuthAudit } from '../interfaces/entities.interface';
9
9
  *
10
10
  * // Get suspicious activity for specific user
11
11
  * const result = await auditService.getSuspiciousActivity({
12
- * userSub: 'user-uuid',
12
+ * sub: 'user-uuid',
13
13
  * limit: 50,
14
14
  * });
15
15
  * ```
16
16
  */
17
17
  export declare class GetSuspiciousActivityDTO {
18
18
  /**
19
- * Optional user identifier to filter by specific user
19
+ * Optional user's unique identifier (UUID v4) to filter by specific user
20
20
  *
21
21
  * If not provided, returns suspicious activity for all users.
22
22
  */
23
- userSub?: string;
23
+ sub?: string;
24
24
  /**
25
25
  * Maximum number of records to return
26
26
  *
@@ -1 +1 @@
1
- {"version":3,"file":"get-suspicious-activity.dto.d.ts","sourceRoot":"","sources":["../../src/dto/get-suspicious-activity.dto.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,UAAU,EAAE,MAAM,kCAAkC,CAAC;AAI9D;;;;;;;;;;;;;;GAcG;AACH,qBAAa,wBAAwB;IACnC;;;;OAIG;IASH,OAAO,CAAC,EAAE,MAAM,CAAC;IAEjB;;;;OAIG;IAYH,KAAK,CAAC,EAAE,MAAM,CAAC;CAChB;AAED;;GAEG;AACH,qBAAa,gCAAgC;IAC3C;;OAEG;IACH,IAAI,EAAG,UAAU,EAAE,CAAC;CACrB"}
1
+ {"version":3,"file":"get-suspicious-activity.dto.d.ts","sourceRoot":"","sources":["../../src/dto/get-suspicious-activity.dto.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,UAAU,EAAE,MAAM,kCAAkC,CAAC;AAI9D;;;;;;;;;;;;;;GAcG;AACH,qBAAa,wBAAwB;IACnC;;;;OAIG;IASH,GAAG,CAAC,EAAE,MAAM,CAAC;IAEb;;;;OAIG;IAYH,KAAK,CAAC,EAAE,MAAM,CAAC;CAChB;AAED;;GAEG;AACH,qBAAa,gCAAgC;IAC3C;;OAEG;IACH,IAAI,EAAG,UAAU,EAAE,CAAC;CACrB"}
@@ -22,18 +22,18 @@ const class_transformer_1 = require("class-transformer");
22
22
  *
23
23
  * // Get suspicious activity for specific user
24
24
  * const result = await auditService.getSuspiciousActivity({
25
- * userSub: 'user-uuid',
25
+ * sub: 'user-uuid',
26
26
  * limit: 50,
27
27
  * });
28
28
  * ```
29
29
  */
30
30
  class GetSuspiciousActivityDTO {
31
31
  /**
32
- * Optional user identifier to filter by specific user
32
+ * Optional user's unique identifier (UUID v4) to filter by specific user
33
33
  *
34
34
  * If not provided, returns suspicious activity for all users.
35
35
  */
36
- userSub;
36
+ sub;
37
37
  /**
38
38
  * Maximum number of records to return
39
39
  *
@@ -44,7 +44,7 @@ class GetSuspiciousActivityDTO {
44
44
  exports.GetSuspiciousActivityDTO = GetSuspiciousActivityDTO;
45
45
  __decorate([
46
46
  (0, class_validator_1.IsOptional)(),
47
- (0, class_validator_1.IsUUID)('4', { message: 'userSub must be a valid UUID v4 format' }),
47
+ (0, class_validator_1.IsUUID)('4', { message: 'sub must be a valid UUID v4 format' }),
48
48
  (0, class_transformer_1.Transform)(({ value }) => {
49
49
  if (typeof value === 'string') {
50
50
  return value.trim().toLowerCase();
@@ -52,7 +52,7 @@ __decorate([
52
52
  return value;
53
53
  }),
54
54
  __metadata("design:type", String)
55
- ], GetSuspiciousActivityDTO.prototype, "userSub", void 0);
55
+ ], GetSuspiciousActivityDTO.prototype, "sub", void 0);
56
56
  __decorate([
57
57
  (0, class_validator_1.IsOptional)(),
58
58
  (0, class_validator_1.IsInt)({ message: 'limit must be an integer' }),
@@ -1 +1 @@
1
- {"version":3,"file":"get-suspicious-activity.dto.js","sourceRoot":"","sources":["../../src/dto/get-suspicious-activity.dto.ts"],"names":[],"mappings":";;;;;;;;;;;;AACA,qDAAsE;AACtE,yDAA8C;AAE9C;;;;;;;;;;;;;;GAcG;AACH,MAAa,wBAAwB;IACnC;;;;OAIG;IASH,OAAO,CAAU;IAEjB;;;;OAIG;IAYH,KAAK,CAAU;CAChB;AAjCD,4DAiCC;AAnBC;IARC,IAAA,4BAAU,GAAE;IACZ,IAAA,wBAAM,EAAC,GAAG,EAAE,EAAE,OAAO,EAAE,wCAAwC,EAAE,CAAC;IAClE,IAAA,6BAAS,EAAC,CAAC,EAAE,KAAK,EAAE,EAAE,EAAE;QACvB,IAAI,OAAO,KAAK,KAAK,QAAQ,EAAE,CAAC;YAC9B,OAAO,KAAK,CAAC,IAAI,EAAE,CAAC,WAAW,EAAE,CAAC;QACpC,CAAC;QACD,OAAO,KAAK,CAAC;IACf,CAAC,CAAC;;yDACe;AAkBjB;IAXC,IAAA,4BAAU,GAAE;IACZ,IAAA,uBAAK,EAAC,EAAE,OAAO,EAAE,0BAA0B,EAAE,CAAC;IAC9C,IAAA,qBAAG,EAAC,CAAC,EAAE,EAAE,OAAO,EAAE,0BAA0B,EAAE,CAAC;IAC/C,IAAA,qBAAG,EAAC,GAAG,EAAE,EAAE,OAAO,EAAE,2BAA2B,EAAE,CAAC;IAClD,IAAA,6BAAS,EAAC,CAAC,EAAE,KAAK,EAAE,EAAE,EAAE;QACvB,IAAI,OAAO,KAAK,KAAK,QAAQ,IAAI,KAAK,CAAC,IAAI,EAAE,KAAK,EAAE,EAAE,CAAC;YACrD,MAAM,MAAM,GAAG,MAAM,CAAC,QAAQ,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;YAC1C,OAAO,MAAM,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,MAAM,CAAC;QAC/C,CAAC;QACD,OAAO,KAAK,CAAC;IACf,CAAC,CAAC;;uDACa;AAGjB;;GAEG;AACH,MAAa,gCAAgC;IAC3C;;OAEG;IACH,IAAI,CAAgB;CACrB;AALD,4EAKC"}
1
+ {"version":3,"file":"get-suspicious-activity.dto.js","sourceRoot":"","sources":["../../src/dto/get-suspicious-activity.dto.ts"],"names":[],"mappings":";;;;;;;;;;;;AACA,qDAAsE;AACtE,yDAA8C;AAE9C;;;;;;;;;;;;;;GAcG;AACH,MAAa,wBAAwB;IACnC;;;;OAIG;IASH,GAAG,CAAU;IAEb;;;;OAIG;IAYH,KAAK,CAAU;CAChB;AAjCD,4DAiCC;AAnBC;IARC,IAAA,4BAAU,GAAE;IACZ,IAAA,wBAAM,EAAC,GAAG,EAAE,EAAE,OAAO,EAAE,oCAAoC,EAAE,CAAC;IAC9D,IAAA,6BAAS,EAAC,CAAC,EAAE,KAAK,EAAE,EAAE,EAAE;QACvB,IAAI,OAAO,KAAK,KAAK,QAAQ,EAAE,CAAC;YAC9B,OAAO,KAAK,CAAC,IAAI,EAAE,CAAC,WAAW,EAAE,CAAC;QACpC,CAAC;QACD,OAAO,KAAK,CAAC;IACf,CAAC,CAAC;;qDACW;AAkBb;IAXC,IAAA,4BAAU,GAAE;IACZ,IAAA,uBAAK,EAAC,EAAE,OAAO,EAAE,0BAA0B,EAAE,CAAC;IAC9C,IAAA,qBAAG,EAAC,CAAC,EAAE,EAAE,OAAO,EAAE,0BAA0B,EAAE,CAAC;IAC/C,IAAA,qBAAG,EAAC,GAAG,EAAE,EAAE,OAAO,EAAE,2BAA2B,EAAE,CAAC;IAClD,IAAA,6BAAS,EAAC,CAAC,EAAE,KAAK,EAAE,EAAE,EAAE;QACvB,IAAI,OAAO,KAAK,KAAK,QAAQ,IAAI,KAAK,CAAC,IAAI,EAAE,KAAK,EAAE,EAAE,CAAC;YACrD,MAAM,MAAM,GAAG,MAAM,CAAC,QAAQ,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;YAC1C,OAAO,MAAM,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,MAAM,CAAC;QAC/C,CAAC;QACD,OAAO,KAAK,CAAC;IACf,CAAC,CAAC;;uDACa;AAGjB;;GAEG;AACH,MAAa,gCAAgC;IAC3C;;OAEG;IACH,IAAI,CAAgB;CACrB;AALD,4EAKC"}
@@ -1,13 +1,13 @@
1
1
  import { AuthAuditEventType } from '../enums/auth-audit-event-type.enum';
2
2
  import { AuthAuditEventStatus } from '../entities/auth-audit.entity';
3
- import { IAuthAudit } from '../interfaces/entities.interface';
4
3
  /**
5
- * Request DTO for getting user authentication history
4
+ * Request DTO for getting user authentication history (user self-service)
5
+ *
6
+ * User self-service DTO - no userSub field. Service gets user from authenticated context.
6
7
  *
7
8
  * @example
8
9
  * ```typescript
9
- * const result = await auditService.getUserAuthHistory({
10
- * userSub: 'user-uuid',
10
+ * const result = await authService.getUserAuthHistory({
11
11
  * page: 1,
12
12
  * limit: 50,
13
13
  * eventTypes: [AuthAuditEventType.LOGIN_SUCCESS],
@@ -16,16 +16,6 @@ import { IAuthAudit } from '../interfaces/entities.interface';
16
16
  * ```
17
17
  */
18
18
  export declare class GetUserAuthHistoryDTO {
19
- /**
20
- * External user identifier (UUID)
21
- *
22
- * The service will automatically resolve this to the internal userId
23
- * for efficient database queries.
24
- *
25
- * Note: This is optional in the DTO because controllers set it from the authenticated user.
26
- * It will be validated when set by the controller.
27
- */
28
- userSub?: string;
29
19
  /**
30
20
  * Page number (1-indexed)
31
21
  *
@@ -59,29 +49,4 @@ export declare class GetUserAuthHistoryDTO {
59
49
  */
60
50
  eventStatus?: AuthAuditEventStatus[];
61
51
  }
62
- /**
63
- * Response DTO for paginated user authentication history
64
- */
65
- export declare class GetUserAuthHistoryResponseDTO {
66
- /**
67
- * Array of audit records
68
- */
69
- data: IAuthAudit[];
70
- /**
71
- * Total number of records matching the query
72
- */
73
- total: number;
74
- /**
75
- * Current page number
76
- */
77
- page: number;
78
- /**
79
- * Number of records per page
80
- */
81
- limit: number;
82
- /**
83
- * Total number of pages
84
- */
85
- totalPages: number;
86
- }
87
52
  //# sourceMappingURL=get-user-auth-history.dto.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"get-user-auth-history.dto.d.ts","sourceRoot":"","sources":["../../src/dto/get-user-auth-history.dto.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,kBAAkB,EAAE,MAAM,qCAAqC,CAAC;AACzE,OAAO,EAAE,oBAAoB,EAAE,MAAM,+BAA+B,CAAC;AACrE,OAAO,EAAE,UAAU,EAAE,MAAM,kCAAkC,CAAC;AAI9D;;;;;;;;;;;;;GAaG;AACH,qBAAa,qBAAqB;IAChC;;;;;;;;OAQG;IASH,OAAO,CAAC,EAAE,MAAM,CAAC;IAEjB;;;;OAIG;IAWH,IAAI,CAAC,EAAE,MAAM,CAAC;IAEd;;;;OAIG;IAYH,KAAK,CAAC,EAAE,MAAM,CAAC;IAEf;;OAEG;IAIH,SAAS,CAAC,EAAE,IAAI,CAAC;IAEjB;;OAEG;IAIH,OAAO,CAAC,EAAE,IAAI,CAAC;IAEf;;;;OAIG;IAIH,UAAU,CAAC,EAAE,kBAAkB,EAAE,CAAC;IAElC;;;;OAIG;IAOH,WAAW,CAAC,EAAE,oBAAoB,EAAE,CAAC;CACtC;AAED;;GAEG;AACH,qBAAa,6BAA6B;IACxC;;OAEG;IACH,IAAI,EAAG,UAAU,EAAE,CAAC;IAEpB;;OAEG;IACH,KAAK,EAAG,MAAM,CAAC;IAEf;;OAEG;IACH,IAAI,EAAG,MAAM,CAAC;IAEd;;OAEG;IACH,KAAK,EAAG,MAAM,CAAC;IAEf;;OAEG;IACH,UAAU,EAAG,MAAM,CAAC;CACrB"}
1
+ {"version":3,"file":"get-user-auth-history.dto.d.ts","sourceRoot":"","sources":["../../src/dto/get-user-auth-history.dto.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,kBAAkB,EAAE,MAAM,qCAAqC,CAAC;AACzE,OAAO,EAAE,oBAAoB,EAAE,MAAM,+BAA+B,CAAC;AAIrE;;;;;;;;;;;;;;GAcG;AACH,qBAAa,qBAAqB;IAChC;;;;OAIG;IAWH,IAAI,CAAC,EAAE,MAAM,CAAC;IAEd;;;;OAIG;IAYH,KAAK,CAAC,EAAE,MAAM,CAAC;IAEf;;OAEG;IAIH,SAAS,CAAC,EAAE,IAAI,CAAC;IAEjB;;OAEG;IAIH,OAAO,CAAC,EAAE,IAAI,CAAC;IAEf;;;;OAIG;IAiCH,UAAU,CAAC,EAAE,kBAAkB,EAAE,CAAC;IAElC;;;;OAIG;IAoCH,WAAW,CAAC,EAAE,oBAAoB,EAAE,CAAC;CACtC"}
@@ -9,17 +9,18 @@ var __metadata = (this && this.__metadata) || function (k, v) {
9
9
  if (typeof Reflect === "object" && typeof Reflect.metadata === "function") return Reflect.metadata(k, v);
10
10
  };
11
11
  Object.defineProperty(exports, "__esModule", { value: true });
12
- exports.GetUserAuthHistoryResponseDTO = exports.GetUserAuthHistoryDTO = void 0;
12
+ exports.GetUserAuthHistoryDTO = void 0;
13
13
  const auth_audit_event_type_enum_1 = require("../enums/auth-audit-event-type.enum");
14
14
  const class_validator_1 = require("class-validator");
15
15
  const class_transformer_1 = require("class-transformer");
16
16
  /**
17
- * Request DTO for getting user authentication history
17
+ * Request DTO for getting user authentication history (user self-service)
18
+ *
19
+ * User self-service DTO - no userSub field. Service gets user from authenticated context.
18
20
  *
19
21
  * @example
20
22
  * ```typescript
21
- * const result = await auditService.getUserAuthHistory({
22
- * userSub: 'user-uuid',
23
+ * const result = await authService.getUserAuthHistory({
23
24
  * page: 1,
24
25
  * limit: 50,
25
26
  * eventTypes: [AuthAuditEventType.LOGIN_SUCCESS],
@@ -28,16 +29,6 @@ const class_transformer_1 = require("class-transformer");
28
29
  * ```
29
30
  */
30
31
  class GetUserAuthHistoryDTO {
31
- /**
32
- * External user identifier (UUID)
33
- *
34
- * The service will automatically resolve this to the internal userId
35
- * for efficient database queries.
36
- *
37
- * Note: This is optional in the DTO because controllers set it from the authenticated user.
38
- * It will be validated when set by the controller.
39
- */
40
- userSub;
41
32
  /**
42
33
  * Page number (1-indexed)
43
34
  *
@@ -72,17 +63,6 @@ class GetUserAuthHistoryDTO {
72
63
  eventStatus;
73
64
  }
74
65
  exports.GetUserAuthHistoryDTO = GetUserAuthHistoryDTO;
75
- __decorate([
76
- (0, class_validator_1.IsOptional)(),
77
- (0, class_validator_1.IsUUID)('4', { message: 'userSub must be a valid UUID v4 format' }),
78
- (0, class_transformer_1.Transform)(({ value }) => {
79
- if (typeof value === 'string') {
80
- return value.trim().toLowerCase();
81
- }
82
- return value;
83
- }),
84
- __metadata("design:type", String)
85
- ], GetUserAuthHistoryDTO.prototype, "userSub", void 0);
86
66
  __decorate([
87
67
  (0, class_validator_1.IsOptional)(),
88
68
  (0, class_validator_1.IsInt)({ message: 'page must be an integer' }),
@@ -126,6 +106,30 @@ __decorate([
126
106
  (0, class_validator_1.IsOptional)(),
127
107
  (0, class_validator_1.IsArray)({ message: 'eventTypes must be an array' }),
128
108
  (0, class_validator_1.IsEnum)(auth_audit_event_type_enum_1.AuthAuditEventType, { each: true, message: 'eventTypes must contain only AuthAuditEventType values' }),
109
+ (0, class_transformer_1.Transform)(({ value }) => {
110
+ // Support query params like:
111
+ // - ?eventTypes=LOGIN_SUCCESS
112
+ // - ?eventTypes=LOGIN_SUCCESS&eventTypes=LOGIN_FAILED
113
+ // - ?eventTypes=LOGIN_SUCCESS,LOGIN_FAILED
114
+ if (value === undefined || value === null) {
115
+ return value;
116
+ }
117
+ if (Array.isArray(value)) {
118
+ return value.map((v) => (typeof v === 'string' ? v.trim() : v)).filter((v) => v !== '');
119
+ }
120
+ if (typeof value === 'string') {
121
+ const trimmed = value.trim();
122
+ if (trimmed === '') {
123
+ return value;
124
+ }
125
+ const parts = trimmed
126
+ .split(',')
127
+ .map((p) => p.trim())
128
+ .filter(Boolean);
129
+ return parts.length > 0 ? parts : value;
130
+ }
131
+ return value;
132
+ }),
129
133
  __metadata("design:type", Array)
130
134
  ], GetUserAuthHistoryDTO.prototype, "eventTypes", void 0);
131
135
  __decorate([
@@ -135,32 +139,30 @@ __decorate([
135
139
  each: true,
136
140
  message: 'eventStatus must contain only: SUCCESS, FAILURE, INFO, SUSPICIOUS',
137
141
  }),
142
+ (0, class_transformer_1.Transform)(({ value }) => {
143
+ // Support query params like:
144
+ // - ?eventStatus=FAILURE
145
+ // - ?eventStatus=SUCCESS&eventStatus=FAILURE
146
+ // - ?eventStatus=SUCCESS,FAILURE
147
+ if (value === undefined || value === null) {
148
+ return value;
149
+ }
150
+ if (Array.isArray(value)) {
151
+ return value.map((v) => (typeof v === 'string' ? v.trim() : v)).filter((v) => v !== '');
152
+ }
153
+ if (typeof value === 'string') {
154
+ const trimmed = value.trim();
155
+ if (trimmed === '') {
156
+ return value;
157
+ }
158
+ const parts = trimmed
159
+ .split(',')
160
+ .map((p) => p.trim())
161
+ .filter(Boolean);
162
+ return parts.length > 0 ? parts : value;
163
+ }
164
+ return value;
165
+ }),
138
166
  __metadata("design:type", Array)
139
167
  ], GetUserAuthHistoryDTO.prototype, "eventStatus", void 0);
140
- /**
141
- * Response DTO for paginated user authentication history
142
- */
143
- class GetUserAuthHistoryResponseDTO {
144
- /**
145
- * Array of audit records
146
- */
147
- data;
148
- /**
149
- * Total number of records matching the query
150
- */
151
- total;
152
- /**
153
- * Current page number
154
- */
155
- page;
156
- /**
157
- * Number of records per page
158
- */
159
- limit;
160
- /**
161
- * Total number of pages
162
- */
163
- totalPages;
164
- }
165
- exports.GetUserAuthHistoryResponseDTO = GetUserAuthHistoryResponseDTO;
166
168
  //# sourceMappingURL=get-user-auth-history.dto.js.map