@nauth-toolkit/core 0.1.87 → 0.1.89
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/dto/admin-get-mfa-status.dto.d.ts +20 -0
- package/dist/dto/admin-get-mfa-status.dto.d.ts.map +1 -0
- package/dist/dto/{change-password-request.dto.js → admin-get-mfa-status.dto.js} +22 -32
- package/dist/dto/admin-get-mfa-status.dto.js.map +1 -0
- package/dist/dto/admin-get-user-auth-history.dto.d.ts +62 -0
- package/dist/dto/admin-get-user-auth-history.dto.d.ts.map +1 -0
- package/dist/dto/admin-get-user-auth-history.dto.js +87 -0
- package/dist/dto/admin-get-user-auth-history.dto.js.map +1 -0
- package/dist/dto/admin-logout-all.dto.d.ts +48 -0
- package/dist/dto/admin-logout-all.dto.d.ts.map +1 -0
- package/dist/dto/admin-logout-all.dto.js +85 -0
- package/dist/dto/admin-logout-all.dto.js.map +1 -0
- package/dist/dto/admin-remove-devices.dto.d.ts +25 -0
- package/dist/dto/admin-remove-devices.dto.d.ts.map +1 -0
- package/dist/dto/admin-remove-devices.dto.js +50 -0
- package/dist/dto/admin-remove-devices.dto.js.map +1 -0
- package/dist/dto/admin-reset-password.dto.d.ts +15 -19
- package/dist/dto/admin-reset-password.dto.d.ts.map +1 -1
- package/dist/dto/admin-reset-password.dto.js +21 -41
- package/dist/dto/admin-reset-password.dto.js.map +1 -1
- package/dist/dto/admin-revoke-session.dto.d.ts +22 -0
- package/dist/dto/admin-revoke-session.dto.d.ts.map +1 -0
- package/dist/dto/admin-revoke-session.dto.js +48 -0
- package/dist/dto/admin-revoke-session.dto.js.map +1 -0
- package/dist/dto/admin-set-password.dto.d.ts +8 -10
- package/dist/dto/admin-set-password.dto.d.ts.map +1 -1
- package/dist/dto/admin-set-password.dto.js +11 -21
- package/dist/dto/admin-set-password.dto.js.map +1 -1
- package/dist/dto/admin-set-preferred-method.dto.d.ts +25 -0
- package/dist/dto/admin-set-preferred-method.dto.d.ts.map +1 -0
- package/dist/dto/admin-set-preferred-method.dto.js +50 -0
- package/dist/dto/admin-set-preferred-method.dto.js.map +1 -0
- package/dist/dto/admin-update-user-attributes.dto.d.ts +41 -0
- package/dist/dto/admin-update-user-attributes.dto.d.ts.map +1 -0
- package/dist/dto/{update-user-attributes-request.dto.js → admin-update-user-attributes.dto.js} +12 -17
- package/dist/dto/admin-update-user-attributes.dto.js.map +1 -0
- package/dist/dto/auth-challenge.dto.d.ts +2 -2
- package/dist/dto/auth-challenge.dto.d.ts.map +1 -1
- package/dist/dto/auth-challenge.dto.js +3 -3
- package/dist/dto/auth-challenge.dto.js.map +1 -1
- package/dist/dto/auth-response.dto.d.ts +1 -1
- package/dist/dto/auth-response.dto.d.ts.map +1 -1
- package/dist/dto/auth-response.dto.js +1 -1
- package/dist/dto/auth-response.dto.js.map +1 -1
- package/dist/dto/get-mfa-status.dto.d.ts +3 -32
- package/dist/dto/get-mfa-status.dto.d.ts.map +1 -1
- package/dist/dto/get-mfa-status.dto.js +4 -55
- package/dist/dto/get-mfa-status.dto.js.map +1 -1
- package/dist/dto/get-risk-assessment-history.dto.d.ts +3 -3
- package/dist/dto/get-risk-assessment-history.dto.d.ts.map +1 -1
- package/dist/dto/get-risk-assessment-history.dto.js +5 -5
- package/dist/dto/get-risk-assessment-history.dto.js.map +1 -1
- package/dist/dto/get-suspicious-activity.dto.d.ts +3 -3
- package/dist/dto/get-suspicious-activity.dto.d.ts.map +1 -1
- package/dist/dto/get-suspicious-activity.dto.js +5 -5
- package/dist/dto/get-suspicious-activity.dto.js.map +1 -1
- package/dist/dto/get-user-auth-history.dto.d.ts +4 -39
- package/dist/dto/get-user-auth-history.dto.d.ts.map +1 -1
- package/dist/dto/get-user-auth-history.dto.js +53 -51
- package/dist/dto/get-user-auth-history.dto.js.map +1 -1
- package/dist/dto/get-user-devices.dto.d.ts +5 -18
- package/dist/dto/get-user-devices.dto.d.ts.map +1 -1
- package/dist/dto/get-user-devices.dto.js +5 -39
- package/dist/dto/get-user-devices.dto.js.map +1 -1
- package/dist/dto/get-user-sessions-response.dto.d.ts +1 -1
- package/dist/dto/get-user-sessions-response.dto.js +1 -1
- package/dist/dto/get-user-sessions.dto.d.ts +1 -1
- package/dist/dto/get-user-sessions.dto.js +1 -1
- package/dist/dto/index.d.ts +9 -2
- package/dist/dto/index.d.ts.map +1 -1
- package/dist/dto/index.js +9 -2
- package/dist/dto/index.js.map +1 -1
- package/dist/dto/logout-all-response.dto.d.ts +1 -1
- package/dist/dto/logout-all-response.dto.js +1 -1
- package/dist/dto/logout-all.dto.d.ts +1 -18
- package/dist/dto/logout-all.dto.d.ts.map +1 -1
- package/dist/dto/logout-all.dto.js +1 -30
- package/dist/dto/logout-all.dto.js.map +1 -1
- package/dist/dto/logout-session.dto.d.ts +0 -5
- package/dist/dto/logout-session.dto.d.ts.map +1 -1
- package/dist/dto/logout-session.dto.js +0 -12
- package/dist/dto/logout-session.dto.js.map +1 -1
- package/dist/dto/logout.dto.d.ts +1 -18
- package/dist/dto/logout.dto.d.ts.map +1 -1
- package/dist/dto/logout.dto.js +1 -30
- package/dist/dto/logout.dto.js.map +1 -1
- package/dist/dto/remove-devices.dto.d.ts +4 -16
- package/dist/dto/remove-devices.dto.d.ts.map +1 -1
- package/dist/dto/remove-devices.dto.js +4 -26
- package/dist/dto/remove-devices.dto.js.map +1 -1
- package/dist/dto/set-mfa-exemption.dto.d.ts +8 -9
- package/dist/dto/set-mfa-exemption.dto.d.ts.map +1 -1
- package/dist/dto/set-mfa-exemption.dto.js +11 -13
- package/dist/dto/set-mfa-exemption.dto.js.map +1 -1
- package/dist/dto/set-must-change-password.dto.d.ts +3 -3
- package/dist/dto/set-must-change-password.dto.d.ts.map +1 -1
- package/dist/dto/set-must-change-password.dto.js +5 -5
- package/dist/dto/set-must-change-password.dto.js.map +1 -1
- package/dist/dto/set-preferred-method.dto.d.ts +4 -16
- package/dist/dto/set-preferred-method.dto.d.ts.map +1 -1
- package/dist/dto/set-preferred-method.dto.js +4 -26
- package/dist/dto/set-preferred-method.dto.js.map +1 -1
- package/dist/dto/setup-mfa.dto.d.ts +3 -18
- package/dist/dto/setup-mfa.dto.d.ts.map +1 -1
- package/dist/dto/setup-mfa.dto.js +3 -30
- package/dist/dto/setup-mfa.dto.js.map +1 -1
- package/dist/dto/social-auth.dto.d.ts +4 -34
- package/dist/dto/social-auth.dto.d.ts.map +1 -1
- package/dist/dto/social-auth.dto.js +10 -68
- package/dist/dto/social-auth.dto.js.map +1 -1
- package/dist/dto/update-user-attributes.dto.d.ts +26 -0
- package/dist/dto/update-user-attributes.dto.d.ts.map +1 -0
- package/dist/dto/update-user-attributes.dto.js +30 -0
- package/dist/dto/update-user-attributes.dto.js.map +1 -0
- package/dist/index.d.ts +5 -0
- package/dist/index.d.ts.map +1 -1
- package/dist/index.js +5 -0
- package/dist/index.js.map +1 -1
- package/dist/interfaces/hooks.interface.d.ts +2 -1
- package/dist/interfaces/hooks.interface.d.ts.map +1 -1
- package/dist/interfaces/mfa-provider.interface.d.ts +7 -8
- package/dist/interfaces/mfa-provider.interface.d.ts.map +1 -1
- package/dist/interfaces/provider.interface.d.ts +1 -1
- package/dist/interfaces/provider.interface.d.ts.map +1 -1
- package/dist/services/adaptive-mfa-decision.service.js +2 -2
- package/dist/services/adaptive-mfa-decision.service.js.map +1 -1
- package/dist/services/admin-auth.service.d.ts +307 -0
- package/dist/services/admin-auth.service.d.ts.map +1 -0
- package/dist/services/admin-auth.service.js +885 -0
- package/dist/services/admin-auth.service.js.map +1 -0
- package/dist/services/auth-audit.service.d.ts +16 -16
- package/dist/services/auth-audit.service.d.ts.map +1 -1
- package/dist/services/auth-audit.service.js +33 -33
- package/dist/services/auth-audit.service.js.map +1 -1
- package/dist/services/auth-challenge-helper.service.js +3 -3
- package/dist/services/auth-challenge-helper.service.js.map +1 -1
- package/dist/services/auth-service-internal-helpers.d.ts +13 -2
- package/dist/services/auth-service-internal-helpers.d.ts.map +1 -1
- package/dist/services/auth-service-internal-helpers.js +39 -1
- package/dist/services/auth-service-internal-helpers.js.map +1 -1
- package/dist/services/auth.service.d.ts +94 -438
- package/dist/services/auth.service.d.ts.map +1 -1
- package/dist/services/auth.service.js +388 -1255
- package/dist/services/auth.service.js.map +1 -1
- package/dist/services/mfa-base.service.d.ts +14 -4
- package/dist/services/mfa-base.service.d.ts.map +1 -1
- package/dist/services/mfa-base.service.js +22 -1
- package/dist/services/mfa-base.service.js.map +1 -1
- package/dist/services/mfa.service.d.ts +107 -33
- package/dist/services/mfa.service.d.ts.map +1 -1
- package/dist/services/mfa.service.js +456 -333
- package/dist/services/mfa.service.js.map +1 -1
- package/dist/services/social-auth.service.d.ts +7 -0
- package/dist/services/social-auth.service.d.ts.map +1 -1
- package/dist/services/social-auth.service.js +38 -26
- package/dist/services/social-auth.service.js.map +1 -1
- package/dist/services/user.service.d.ts +3 -3
- package/dist/services/user.service.d.ts.map +1 -1
- package/dist/services/user.service.js +7 -7
- package/dist/services/user.service.js.map +1 -1
- package/dist/utils/dto-validator.d.ts.map +1 -1
- package/dist/utils/dto-validator.js +50 -4
- package/dist/utils/dto-validator.js.map +1 -1
- package/dist/utils/setup/init-services.d.ts +2 -1
- package/dist/utils/setup/init-services.d.ts.map +1 -1
- package/dist/utils/setup/init-services.js +2 -0
- package/dist/utils/setup/init-services.js.map +1 -1
- package/package.json +1 -1
- package/dist/dto/change-password-request.dto.d.ts +0 -43
- package/dist/dto/change-password-request.dto.d.ts.map +0 -1
- package/dist/dto/change-password-request.dto.js.map +0 -1
- package/dist/dto/update-user-attributes-request.dto.d.ts +0 -44
- package/dist/dto/update-user-attributes-request.dto.d.ts.map +0 -1
- package/dist/dto/update-user-attributes-request.dto.js.map +0 -1
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"auth-challenge.dto.js","sourceRoot":"","sources":["../../src/dto/auth-challenge.dto.ts"],"names":[],"mappings":";;;;;;;;;;;;AAAA,qDAA2D;AAC3D,yDAA8C;AAE9C;;;;;;;;;;;;;;;;GAgBG;AACH,IAAY,aAiCX;AAjCD,WAAY,aAAa;IACvB;;;OAGG;IACH,8CAA6B,CAAA;IAE7B;;;OAGG;IACH,8CAA6B,CAAA;IAE7B;;;;OAIG;IACH,8CAA6B,CAAA;IAE7B;;;;OAIG;IACH,0DAAyC,CAAA;IAEzC;;;;OAIG;IACH,gEAA+C,CAAA;AACjD,CAAC,EAjCW,aAAa,6BAAb,aAAa,QAiCxB;AAED;;;;;;;;;;;;;;;;;;;;;GAqBG;AACH,MAAa,wBAAwB;IACnC;;;;;OAKG;IAIH,aAAa,CAAiB;IAE9B;;;;;;;;;OASG;IAQH,OAAO,CAAU;IAEjB;;;;;;;;;;;;;;;;;;;;;OAqBG;IAEH,mBAAmB,CAA2B;IAE9C;;;;;;;;;OASG;IAQH,
|
|
1
|
+
{"version":3,"file":"auth-challenge.dto.js","sourceRoot":"","sources":["../../src/dto/auth-challenge.dto.ts"],"names":[],"mappings":";;;;;;;;;;;;AAAA,qDAA2D;AAC3D,yDAA8C;AAE9C;;;;;;;;;;;;;;;;GAgBG;AACH,IAAY,aAiCX;AAjCD,WAAY,aAAa;IACvB;;;OAGG;IACH,8CAA6B,CAAA;IAE7B;;;OAGG;IACH,8CAA6B,CAAA;IAE7B;;;;OAIG;IACH,8CAA6B,CAAA;IAE7B;;;;OAIG;IACH,0DAAyC,CAAA;IAEzC;;;;OAIG;IACH,gEAA+C,CAAA;AACjD,CAAC,EAjCW,aAAa,6BAAb,aAAa,QAiCxB;AAED;;;;;;;;;;;;;;;;;;;;;GAqBG;AACH,MAAa,wBAAwB;IACnC;;;;;OAKG;IAIH,aAAa,CAAiB;IAE9B;;;;;;;;;OASG;IAQH,OAAO,CAAU;IAEjB;;;;;;;;;;;;;;;;;;;;;OAqBG;IAEH,mBAAmB,CAA2B;IAE9C;;;;;;;;;OASG;IAQH,GAAG,CAAU;CACd;AA1ED,4DA0EC;AAhEC;IAHC,IAAA,wBAAM,EAAC,aAAa,EAAE;QACrB,OAAO,EAAE,yDAAyD;KACnE,CAAC;;+DAC4B;AAmB9B;IAPC,IAAA,wBAAM,EAAC,GAAG,EAAE,EAAE,OAAO,EAAE,8CAA8C,EAAE,CAAC;IACxE,IAAA,6BAAS,EAAC,CAAC,EAAE,KAAK,EAAE,EAAE,EAAE;QACvB,IAAI,OAAO,KAAK,KAAK,QAAQ,EAAE,CAAC;YAC9B,OAAO,KAAK,CAAC,IAAI,EAAE,CAAC,WAAW,EAAE,CAAC;QACpC,CAAC;QACD,OAAO,KAAK,CAAC;IACf,CAAC,CAAC;;yDACe;AAyBjB;IADC,IAAA,0BAAQ,EAAC,EAAE,OAAO,EAAE,wCAAwC,EAAE,CAAC;;qEAClB;AAmB9C;IAPC,IAAA,wBAAM,EAAC,GAAG,EAAE,EAAE,OAAO,EAAE,yCAAyC,EAAE,CAAC;IACnE,IAAA,6BAAS,EAAC,CAAC,EAAE,KAAK,EAAE,EAAE,EAAE;QACvB,IAAI,OAAO,KAAK,KAAK,QAAQ,EAAE,CAAC;YAC9B,OAAO,KAAK,CAAC,IAAI,EAAE,CAAC,WAAW,EAAE,CAAC;QACpC,CAAC;QACD,OAAO,KAAK,CAAC;IACf,CAAC,CAAC;;qDACW;AAGf;;;;;;;;;;;;;;;;;;;;;;;;GAwBG;AACH,MAAa,2BAA2B;IACtC;;;;;;;;;;;;OAYG;IAQH,OAAO,CAAU;IAEjB;;;;;OAKG;IAIH,aAAa,CAAiB;IAE9B;;;;;;;;;;;;;;;OAeG;IAEH,kBAAkB,CAA2B;CAC9C;AApDD,kEAoDC;AA/BC;IAPC,IAAA,wBAAM,EAAC,GAAG,EAAE,EAAE,OAAO,EAAE,8CAA8C,EAAE,CAAC;IACxE,IAAA,6BAAS,EAAC,CAAC,EAAE,KAAK,EAAE,EAAE,EAAE;QACvB,IAAI,OAAO,KAAK,KAAK,QAAQ,EAAE,CAAC;YAC9B,OAAO,KAAK,CAAC,IAAI,EAAE,CAAC,WAAW,EAAE,CAAC;QACpC,CAAC;QACD,OAAO,KAAK,CAAC;IACf,CAAC,CAAC;;4DACe;AAWjB;IAHC,IAAA,wBAAM,EAAC,aAAa,EAAE;QACrB,OAAO,EAAE,yDAAyD;KACnE,CAAC;;kEAC4B;AAmB9B;IADC,IAAA,0BAAQ,EAAC,EAAE,OAAO,EAAE,uCAAuC,EAAE,CAAC;;uEAClB"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"auth-response.dto.d.ts","sourceRoot":"","sources":["../../src/dto/auth-response.dto.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,aAAa,EAAE,MAAM,sBAAsB,CAAC;AACrD,OAAO,EAAE,KAAK,EAAE,MAAM,kCAAkC,CAAC;AAEzD;;;;;GAKG;AACH,MAAM,WAAW,gBAAgB;IAC/B;;;OAGG;IACH,GAAG,EAAE,MAAM,CAAC;IAEZ;;OAEG;IACH,KAAK,EAAE,MAAM,CAAC;IAEd;;OAEG;IACH,SAAS,CAAC,EAAE,MAAM,GAAG,IAAI,CAAC;IAE1B;;OAEG;IACH,QAAQ,CAAC,EAAE,MAAM,GAAG,IAAI,CAAC;IAEzB;;;OAGG;IACH,KAAK,CAAC,EAAE,MAAM,CAAC;IAEf;;OAEG;IACH,eAAe,EAAE,OAAO,CAAC;IAEzB;;OAEG;IACH,eAAe,CAAC,EAAE,OAAO,CAAC;IAE1B;;OAEG;IACH,eAAe,CAAC,EAAE,MAAM,EAAE,CAAC;IAE3B;;;;OAIG;IACH,eAAe,CAAC,EAAE,OAAO,CAAC;CAC3B;AAED;;;;;;;;;;;;;;;;;GAiBG;AACH,qBAAa,eAAe;IAC1B;;;;;OAKG;IACH,WAAW,CAAC,EAAE,MAAM,CAAC;IAErB;;;;;OAKG;IACH,YAAY,CAAC,EAAE,MAAM,CAAC;IAEtB;;;;;;;OAOG;IACH,oBAAoB,CAAC,EAAE,MAAM,CAAC;IAE9B;;;;;;;OAOG;IACH,qBAAqB,CAAC,EAAE,MAAM,CAAC;IAE/B;;;;;;;;;;;;OAYG;IACH,UAAU,CAAC,EAAE,MAAM,CAAC;IAEpB;;;;;;;;;;;;OAYG;IACH,OAAO,CAAC,EAAE,OAAO,CAAC;IAElB;;;;;;;;;;;;;;;;;;;;;;;OAuBG;IACH,WAAW,CAAC,EAAE,MAAM,CAAC;IAErB;;;;;OAKG;IACH,IAAI,CAAC,EAAE,gBAAgB,CAAC;IAMxB;;;;;;;;;OASG;IACH,aAAa,CAAC,EAAE,aAAa,CAAC;IAE9B;;;;;;;;;;OAUG;IACH,OAAO,CAAC,EAAE,MAAM,CAAC;IAEjB;;;;;;;;;;;;;;;;;OAiBG;IACH,mBAAmB,CAAC,EAAE,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;IAE9C;;;;;;OAMG;IACH,
|
|
1
|
+
{"version":3,"file":"auth-response.dto.d.ts","sourceRoot":"","sources":["../../src/dto/auth-response.dto.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,aAAa,EAAE,MAAM,sBAAsB,CAAC;AACrD,OAAO,EAAE,KAAK,EAAE,MAAM,kCAAkC,CAAC;AAEzD;;;;;GAKG;AACH,MAAM,WAAW,gBAAgB;IAC/B;;;OAGG;IACH,GAAG,EAAE,MAAM,CAAC;IAEZ;;OAEG;IACH,KAAK,EAAE,MAAM,CAAC;IAEd;;OAEG;IACH,SAAS,CAAC,EAAE,MAAM,GAAG,IAAI,CAAC;IAE1B;;OAEG;IACH,QAAQ,CAAC,EAAE,MAAM,GAAG,IAAI,CAAC;IAEzB;;;OAGG;IACH,KAAK,CAAC,EAAE,MAAM,CAAC;IAEf;;OAEG;IACH,eAAe,EAAE,OAAO,CAAC;IAEzB;;OAEG;IACH,eAAe,CAAC,EAAE,OAAO,CAAC;IAE1B;;OAEG;IACH,eAAe,CAAC,EAAE,MAAM,EAAE,CAAC;IAE3B;;;;OAIG;IACH,eAAe,CAAC,EAAE,OAAO,CAAC;CAC3B;AAED;;;;;;;;;;;;;;;;;GAiBG;AACH,qBAAa,eAAe;IAC1B;;;;;OAKG;IACH,WAAW,CAAC,EAAE,MAAM,CAAC;IAErB;;;;;OAKG;IACH,YAAY,CAAC,EAAE,MAAM,CAAC;IAEtB;;;;;;;OAOG;IACH,oBAAoB,CAAC,EAAE,MAAM,CAAC;IAE9B;;;;;;;OAOG;IACH,qBAAqB,CAAC,EAAE,MAAM,CAAC;IAE/B;;;;;;;;;;;;OAYG;IACH,UAAU,CAAC,EAAE,MAAM,CAAC;IAEpB;;;;;;;;;;;;OAYG;IACH,OAAO,CAAC,EAAE,OAAO,CAAC;IAElB;;;;;;;;;;;;;;;;;;;;;;;OAuBG;IACH,WAAW,CAAC,EAAE,MAAM,CAAC;IAErB;;;;;OAKG;IACH,IAAI,CAAC,EAAE,gBAAgB,CAAC;IAMxB;;;;;;;;;OASG;IACH,aAAa,CAAC,EAAE,aAAa,CAAC;IAE9B;;;;;;;;;;OAUG;IACH,OAAO,CAAC,EAAE,MAAM,CAAC;IAEjB;;;;;;;;;;;;;;;;;OAiBG;IACH,mBAAmB,CAAC,EAAE,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;IAE9C;;;;;;OAMG;IACH,GAAG,CAAC,EAAE,MAAM,CAAC;CACd;AAED;;;;;GAKG;AACH,MAAM,WAAW,aAAa;IAC5B;;OAEG;IACH,WAAW,EAAE,MAAM,CAAC;IAEpB;;OAEG;IACH,YAAY,EAAE,MAAM,CAAC;IAErB;;OAEG;IACH,oBAAoB,EAAE,MAAM,CAAC;IAE7B;;OAEG;IACH,qBAAqB,EAAE,MAAM,CAAC;CAC/B;AAED;;;;;;;;GAQG;AACH,wBAAgB,kBAAkB,CAAC,IAAI,EAAE,KAAK,GAAG,gBAAgB,CAYhE"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"auth-response.dto.js","sourceRoot":"","sources":["../../src/dto/auth-response.dto.ts"],"names":[],"mappings":";;;AAmRA,gDAYC;AAnOD;;;;;;;;;;;;;;;;;GAiBG;AACH,MAAa,eAAe;IAC1B;;;;;OAKG;IACH,WAAW,CAAU;IAErB;;;;;OAKG;IACH,YAAY,CAAU;IAEtB;;;;;;;OAOG;IACH,oBAAoB,CAAU;IAE9B;;;;;;;OAOG;IACH,qBAAqB,CAAU;IAE/B;;;;;;;;;;;;OAYG;IACH,UAAU,CAAU;IAEpB;;;;;;;;;;;;OAYG;IACH,OAAO,CAAW;IAElB;;;;;;;;;;;;;;;;;;;;;;;OAuBG;IACH,WAAW,CAAU;IAErB;;;;;OAKG;IACH,IAAI,CAAoB;IAExB,+EAA+E;IAC/E,4CAA4C;IAC5C,+EAA+E;IAE/E;;;;;;;;;OASG;IACH,aAAa,CAAiB;IAE9B;;;;;;;;;;OAUG;IACH,OAAO,CAAU;IAEjB;;;;;;;;;;;;;;;;;OAiBG;IACH,mBAAmB,CAA2B;IAE9C;;;;;;OAMG;IACH,
|
|
1
|
+
{"version":3,"file":"auth-response.dto.js","sourceRoot":"","sources":["../../src/dto/auth-response.dto.ts"],"names":[],"mappings":";;;AAmRA,gDAYC;AAnOD;;;;;;;;;;;;;;;;;GAiBG;AACH,MAAa,eAAe;IAC1B;;;;;OAKG;IACH,WAAW,CAAU;IAErB;;;;;OAKG;IACH,YAAY,CAAU;IAEtB;;;;;;;OAOG;IACH,oBAAoB,CAAU;IAE9B;;;;;;;OAOG;IACH,qBAAqB,CAAU;IAE/B;;;;;;;;;;;;OAYG;IACH,UAAU,CAAU;IAEpB;;;;;;;;;;;;OAYG;IACH,OAAO,CAAW;IAElB;;;;;;;;;;;;;;;;;;;;;;;OAuBG;IACH,WAAW,CAAU;IAErB;;;;;OAKG;IACH,IAAI,CAAoB;IAExB,+EAA+E;IAC/E,4CAA4C;IAC5C,+EAA+E;IAE/E;;;;;;;;;OASG;IACH,aAAa,CAAiB;IAE9B;;;;;;;;;;OAUG;IACH,OAAO,CAAU;IAEjB;;;;;;;;;;;;;;;;;OAiBG;IACH,mBAAmB,CAA2B;IAE9C;;;;;;OAMG;IACH,GAAG,CAAU;CACd;AA9JD,0CA8JC;AA8BD;;;;;;;;GAQG;AACH,SAAgB,kBAAkB,CAAC,IAAW;IAC5C,OAAO;QACL,GAAG,EAAE,IAAI,CAAC,GAAG;QACb,KAAK,EAAE,IAAI,CAAC,KAAK;QACjB,SAAS,EAAE,IAAI,CAAC,SAAS;QACzB,QAAQ,EAAE,IAAI,CAAC,QAAQ;QACvB,KAAK,EAAE,IAAI,CAAC,KAAK,IAAI,SAAS;QAC9B,eAAe,EAAE,IAAI,CAAC,eAAe;QACrC,eAAe,EAAE,IAAI,CAAC,eAAe,IAAI,SAAS;QAClD,eAAe,EAAE,IAAI,CAAC,eAAe,IAAI,IAAI,CAAC,eAAe,CAAC,MAAM,GAAG,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS;QAC3G,eAAe,EAAE,CAAC,CAAC,IAAI,CAAC,YAAY;KACrC,CAAC;AACJ,CAAC"}
|
|
@@ -1,38 +1,9 @@
|
|
|
1
|
-
/**
|
|
2
|
-
* DTO for getting MFA status
|
|
3
|
-
*
|
|
4
|
-
* Used to retrieve comprehensive MFA status for a user including enabled status,
|
|
5
|
-
* configured methods, available methods, backup codes, and exemption information.
|
|
6
|
-
*
|
|
7
|
-
* @example
|
|
8
|
-
* ```typescript
|
|
9
|
-
* const status = await mfaService.getMFAStatus({
|
|
10
|
-
* sub: 'user-uuid'
|
|
11
|
-
* });
|
|
12
|
-
* ```
|
|
13
|
-
*/
|
|
14
1
|
import { MFADeviceMethod } from '../enums/mfa-method.enum';
|
|
15
|
-
/**
|
|
16
|
-
* DTO for getting MFA status
|
|
17
|
-
*/
|
|
18
|
-
export declare class GetMFAStatusDTO {
|
|
19
|
-
/**
|
|
20
|
-
* User's unique identifier (UUID v4)
|
|
21
|
-
*
|
|
22
|
-
* Validation:
|
|
23
|
-
* - Must be a valid UUID v4 format
|
|
24
|
-
* - Matches DB constraint: char(36) or uuid
|
|
25
|
-
*
|
|
26
|
-
* Sanitization:
|
|
27
|
-
* - Trimmed
|
|
28
|
-
* - Lowercased for consistency
|
|
29
|
-
*
|
|
30
|
-
* @example "a21b654c-2746-4168-acee-c175083a65cd"
|
|
31
|
-
*/
|
|
32
|
-
sub: string;
|
|
33
|
-
}
|
|
34
2
|
/**
|
|
35
3
|
* Response DTO for MFA status
|
|
4
|
+
*
|
|
5
|
+
* Returned by MFAService.getMfaStatus() (user self-service) and
|
|
6
|
+
* MFAService.adminGetMfaStatus() (admin operation).
|
|
36
7
|
*/
|
|
37
8
|
export declare class GetMFAStatusResponseDTO {
|
|
38
9
|
/**
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"get-mfa-status.dto.d.ts","sourceRoot":"","sources":["../../src/dto/get-mfa-status.dto.ts"],"names":[],"mappings":"AAAA
|
|
1
|
+
{"version":3,"file":"get-mfa-status.dto.d.ts","sourceRoot":"","sources":["../../src/dto/get-mfa-status.dto.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,eAAe,EAAE,MAAM,0BAA0B,CAAC;AAE3D;;;;;GAKG;AACH,qBAAa,uBAAuB;IAClC;;OAEG;IACH,OAAO,EAAG,OAAO,CAAC;IAElB;;OAEG;IACH,QAAQ,EAAG,OAAO,CAAC;IAEnB;;OAEG;IACH,iBAAiB,EAAG,KAAK,CAAC,eAAe,CAAC,CAAC;IAE3C;;OAEG;IACH,gBAAgB,EAAG,KAAK,CAAC,MAAM,CAAC,CAAC;IAEjC;;OAEG;IACH,cAAc,EAAG,OAAO,CAAC;IAEzB;;OAEG;IACH,eAAe,CAAC,EAAE,eAAe,CAAC;IAElC;;OAEG;IACH,SAAS,EAAG,OAAO,CAAC;IAEpB;;OAEG;IACH,eAAe,EAAG,MAAM,GAAG,IAAI,CAAC;IAEhC;;OAEG;IACH,kBAAkB,EAAG,IAAI,GAAG,IAAI,CAAC;CAClC"}
|
|
@@ -1,62 +1,11 @@
|
|
|
1
1
|
"use strict";
|
|
2
|
-
/**
|
|
3
|
-
* DTO for getting MFA status
|
|
4
|
-
*
|
|
5
|
-
* Used to retrieve comprehensive MFA status for a user including enabled status,
|
|
6
|
-
* configured methods, available methods, backup codes, and exemption information.
|
|
7
|
-
*
|
|
8
|
-
* @example
|
|
9
|
-
* ```typescript
|
|
10
|
-
* const status = await mfaService.getMFAStatus({
|
|
11
|
-
* sub: 'user-uuid'
|
|
12
|
-
* });
|
|
13
|
-
* ```
|
|
14
|
-
*/
|
|
15
|
-
var __decorate = (this && this.__decorate) || function (decorators, target, key, desc) {
|
|
16
|
-
var c = arguments.length, r = c < 3 ? target : desc === null ? desc = Object.getOwnPropertyDescriptor(target, key) : desc, d;
|
|
17
|
-
if (typeof Reflect === "object" && typeof Reflect.decorate === "function") r = Reflect.decorate(decorators, target, key, desc);
|
|
18
|
-
else for (var i = decorators.length - 1; i >= 0; i--) if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;
|
|
19
|
-
return c > 3 && r && Object.defineProperty(target, key, r), r;
|
|
20
|
-
};
|
|
21
|
-
var __metadata = (this && this.__metadata) || function (k, v) {
|
|
22
|
-
if (typeof Reflect === "object" && typeof Reflect.metadata === "function") return Reflect.metadata(k, v);
|
|
23
|
-
};
|
|
24
2
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
25
|
-
exports.GetMFAStatusResponseDTO =
|
|
26
|
-
const class_validator_1 = require("class-validator");
|
|
27
|
-
const class_transformer_1 = require("class-transformer");
|
|
28
|
-
/**
|
|
29
|
-
* DTO for getting MFA status
|
|
30
|
-
*/
|
|
31
|
-
class GetMFAStatusDTO {
|
|
32
|
-
/**
|
|
33
|
-
* User's unique identifier (UUID v4)
|
|
34
|
-
*
|
|
35
|
-
* Validation:
|
|
36
|
-
* - Must be a valid UUID v4 format
|
|
37
|
-
* - Matches DB constraint: char(36) or uuid
|
|
38
|
-
*
|
|
39
|
-
* Sanitization:
|
|
40
|
-
* - Trimmed
|
|
41
|
-
* - Lowercased for consistency
|
|
42
|
-
*
|
|
43
|
-
* @example "a21b654c-2746-4168-acee-c175083a65cd"
|
|
44
|
-
*/
|
|
45
|
-
sub;
|
|
46
|
-
}
|
|
47
|
-
exports.GetMFAStatusDTO = GetMFAStatusDTO;
|
|
48
|
-
__decorate([
|
|
49
|
-
(0, class_validator_1.IsUUID)('4', { message: 'User sub must be a valid UUID v4 format' }),
|
|
50
|
-
(0, class_transformer_1.Transform)(({ value }) => {
|
|
51
|
-
if (typeof value === 'string') {
|
|
52
|
-
return value.trim().toLowerCase();
|
|
53
|
-
}
|
|
54
|
-
return value;
|
|
55
|
-
}),
|
|
56
|
-
__metadata("design:type", String)
|
|
57
|
-
], GetMFAStatusDTO.prototype, "sub", void 0);
|
|
3
|
+
exports.GetMFAStatusResponseDTO = void 0;
|
|
58
4
|
/**
|
|
59
5
|
* Response DTO for MFA status
|
|
6
|
+
*
|
|
7
|
+
* Returned by MFAService.getMfaStatus() (user self-service) and
|
|
8
|
+
* MFAService.adminGetMfaStatus() (admin operation).
|
|
60
9
|
*/
|
|
61
10
|
class GetMFAStatusResponseDTO {
|
|
62
11
|
/**
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"get-mfa-status.dto.js","sourceRoot":"","sources":["../../src/dto/get-mfa-status.dto.ts"],"names":[],"mappings":";
|
|
1
|
+
{"version":3,"file":"get-mfa-status.dto.js","sourceRoot":"","sources":["../../src/dto/get-mfa-status.dto.ts"],"names":[],"mappings":";;;AAEA;;;;;GAKG;AACH,MAAa,uBAAuB;IAClC;;OAEG;IACH,OAAO,CAAW;IAElB;;OAEG;IACH,QAAQ,CAAW;IAEnB;;OAEG;IACH,iBAAiB,CAA0B;IAE3C;;OAEG;IACH,gBAAgB,CAAiB;IAEjC;;OAEG;IACH,cAAc,CAAW;IAEzB;;OAEG;IACH,eAAe,CAAmB;IAElC;;OAEG;IACH,SAAS,CAAW;IAEpB;;OAEG;IACH,eAAe,CAAiB;IAEhC;;OAEG;IACH,kBAAkB,CAAe;CAClC;AA7CD,0DA6CC"}
|
|
@@ -8,16 +8,16 @@ import { IAuthAudit } from '../interfaces/entities.interface';
|
|
|
8
8
|
* @example
|
|
9
9
|
* ```typescript
|
|
10
10
|
* const result = await auditService.getRiskAssessmentHistory({
|
|
11
|
-
*
|
|
11
|
+
* sub: 'user-uuid',
|
|
12
12
|
* limit: 50,
|
|
13
13
|
* });
|
|
14
14
|
* ```
|
|
15
15
|
*/
|
|
16
16
|
export declare class GetRiskAssessmentHistoryDTO {
|
|
17
17
|
/**
|
|
18
|
-
* User identifier
|
|
18
|
+
* User's unique identifier (UUID v4)
|
|
19
19
|
*/
|
|
20
|
-
|
|
20
|
+
sub: string;
|
|
21
21
|
/**
|
|
22
22
|
* Maximum number of records to return
|
|
23
23
|
*
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"get-risk-assessment-history.dto.d.ts","sourceRoot":"","sources":["../../src/dto/get-risk-assessment-history.dto.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,UAAU,EAAE,MAAM,kCAAkC,CAAC;AAI9D;;;;;;;;;;;;;GAaG;AACH,qBAAa,2BAA2B;IACtC;;OAEG;IAQH,
|
|
1
|
+
{"version":3,"file":"get-risk-assessment-history.dto.d.ts","sourceRoot":"","sources":["../../src/dto/get-risk-assessment-history.dto.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,UAAU,EAAE,MAAM,kCAAkC,CAAC;AAI9D;;;;;;;;;;;;;GAaG;AACH,qBAAa,2BAA2B;IACtC;;OAEG;IAQH,GAAG,EAAG,MAAM,CAAC;IAEb;;;;OAIG;IAYH,KAAK,CAAC,EAAE,MAAM,CAAC;CAChB;AAED;;GAEG;AACH,qBAAa,mCAAmC;IAC9C;;OAEG;IACH,IAAI,EAAG,UAAU,EAAE,CAAC;CACrB"}
|
|
@@ -21,16 +21,16 @@ const class_transformer_1 = require("class-transformer");
|
|
|
21
21
|
* @example
|
|
22
22
|
* ```typescript
|
|
23
23
|
* const result = await auditService.getRiskAssessmentHistory({
|
|
24
|
-
*
|
|
24
|
+
* sub: 'user-uuid',
|
|
25
25
|
* limit: 50,
|
|
26
26
|
* });
|
|
27
27
|
* ```
|
|
28
28
|
*/
|
|
29
29
|
class GetRiskAssessmentHistoryDTO {
|
|
30
30
|
/**
|
|
31
|
-
* User identifier
|
|
31
|
+
* User's unique identifier (UUID v4)
|
|
32
32
|
*/
|
|
33
|
-
|
|
33
|
+
sub;
|
|
34
34
|
/**
|
|
35
35
|
* Maximum number of records to return
|
|
36
36
|
*
|
|
@@ -40,7 +40,7 @@ class GetRiskAssessmentHistoryDTO {
|
|
|
40
40
|
}
|
|
41
41
|
exports.GetRiskAssessmentHistoryDTO = GetRiskAssessmentHistoryDTO;
|
|
42
42
|
__decorate([
|
|
43
|
-
(0, class_validator_1.IsUUID)('4', { message: '
|
|
43
|
+
(0, class_validator_1.IsUUID)('4', { message: 'sub must be a valid UUID v4 format' }),
|
|
44
44
|
(0, class_transformer_1.Transform)(({ value }) => {
|
|
45
45
|
if (typeof value === 'string') {
|
|
46
46
|
return value.trim().toLowerCase();
|
|
@@ -48,7 +48,7 @@ __decorate([
|
|
|
48
48
|
return value;
|
|
49
49
|
}),
|
|
50
50
|
__metadata("design:type", String)
|
|
51
|
-
], GetRiskAssessmentHistoryDTO.prototype, "
|
|
51
|
+
], GetRiskAssessmentHistoryDTO.prototype, "sub", void 0);
|
|
52
52
|
__decorate([
|
|
53
53
|
(0, class_validator_1.IsOptional)(),
|
|
54
54
|
(0, class_validator_1.IsInt)({ message: 'limit must be an integer' }),
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"get-risk-assessment-history.dto.js","sourceRoot":"","sources":["../../src/dto/get-risk-assessment-history.dto.ts"],"names":[],"mappings":";;;;;;;;;;;;AACA,qDAAsE;AACtE,yDAA8C;AAE9C;;;;;;;;;;;;;GAaG;AACH,MAAa,2BAA2B;IACtC;;OAEG;IAQH,
|
|
1
|
+
{"version":3,"file":"get-risk-assessment-history.dto.js","sourceRoot":"","sources":["../../src/dto/get-risk-assessment-history.dto.ts"],"names":[],"mappings":";;;;;;;;;;;;AACA,qDAAsE;AACtE,yDAA8C;AAE9C;;;;;;;;;;;;;GAaG;AACH,MAAa,2BAA2B;IACtC;;OAEG;IAQH,GAAG,CAAU;IAEb;;;;OAIG;IAYH,KAAK,CAAU;CAChB;AA9BD,kEA8BC;AAnBC;IAPC,IAAA,wBAAM,EAAC,GAAG,EAAE,EAAE,OAAO,EAAE,oCAAoC,EAAE,CAAC;IAC9D,IAAA,6BAAS,EAAC,CAAC,EAAE,KAAK,EAAE,EAAE,EAAE;QACvB,IAAI,OAAO,KAAK,KAAK,QAAQ,EAAE,CAAC;YAC9B,OAAO,KAAK,CAAC,IAAI,EAAE,CAAC,WAAW,EAAE,CAAC;QACpC,CAAC;QACD,OAAO,KAAK,CAAC;IACf,CAAC,CAAC;;wDACW;AAkBb;IAXC,IAAA,4BAAU,GAAE;IACZ,IAAA,uBAAK,EAAC,EAAE,OAAO,EAAE,0BAA0B,EAAE,CAAC;IAC9C,IAAA,qBAAG,EAAC,CAAC,EAAE,EAAE,OAAO,EAAE,0BAA0B,EAAE,CAAC;IAC/C,IAAA,qBAAG,EAAC,GAAG,EAAE,EAAE,OAAO,EAAE,2BAA2B,EAAE,CAAC;IAClD,IAAA,6BAAS,EAAC,CAAC,EAAE,KAAK,EAAE,EAAE,EAAE;QACvB,IAAI,OAAO,KAAK,KAAK,QAAQ,IAAI,KAAK,CAAC,IAAI,EAAE,KAAK,EAAE,EAAE,CAAC;YACrD,MAAM,MAAM,GAAG,MAAM,CAAC,QAAQ,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;YAC1C,OAAO,MAAM,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,MAAM,CAAC;QAC/C,CAAC;QACD,OAAO,KAAK,CAAC;IACf,CAAC,CAAC;;0DACa;AAGjB;;GAEG;AACH,MAAa,mCAAmC;IAC9C;;OAEG;IACH,IAAI,CAAgB;CACrB;AALD,kFAKC"}
|
|
@@ -9,18 +9,18 @@ import { IAuthAudit } from '../interfaces/entities.interface';
|
|
|
9
9
|
*
|
|
10
10
|
* // Get suspicious activity for specific user
|
|
11
11
|
* const result = await auditService.getSuspiciousActivity({
|
|
12
|
-
*
|
|
12
|
+
* sub: 'user-uuid',
|
|
13
13
|
* limit: 50,
|
|
14
14
|
* });
|
|
15
15
|
* ```
|
|
16
16
|
*/
|
|
17
17
|
export declare class GetSuspiciousActivityDTO {
|
|
18
18
|
/**
|
|
19
|
-
* Optional user identifier to filter by specific user
|
|
19
|
+
* Optional user's unique identifier (UUID v4) to filter by specific user
|
|
20
20
|
*
|
|
21
21
|
* If not provided, returns suspicious activity for all users.
|
|
22
22
|
*/
|
|
23
|
-
|
|
23
|
+
sub?: string;
|
|
24
24
|
/**
|
|
25
25
|
* Maximum number of records to return
|
|
26
26
|
*
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"get-suspicious-activity.dto.d.ts","sourceRoot":"","sources":["../../src/dto/get-suspicious-activity.dto.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,UAAU,EAAE,MAAM,kCAAkC,CAAC;AAI9D;;;;;;;;;;;;;;GAcG;AACH,qBAAa,wBAAwB;IACnC;;;;OAIG;IASH,
|
|
1
|
+
{"version":3,"file":"get-suspicious-activity.dto.d.ts","sourceRoot":"","sources":["../../src/dto/get-suspicious-activity.dto.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,UAAU,EAAE,MAAM,kCAAkC,CAAC;AAI9D;;;;;;;;;;;;;;GAcG;AACH,qBAAa,wBAAwB;IACnC;;;;OAIG;IASH,GAAG,CAAC,EAAE,MAAM,CAAC;IAEb;;;;OAIG;IAYH,KAAK,CAAC,EAAE,MAAM,CAAC;CAChB;AAED;;GAEG;AACH,qBAAa,gCAAgC;IAC3C;;OAEG;IACH,IAAI,EAAG,UAAU,EAAE,CAAC;CACrB"}
|
|
@@ -22,18 +22,18 @@ const class_transformer_1 = require("class-transformer");
|
|
|
22
22
|
*
|
|
23
23
|
* // Get suspicious activity for specific user
|
|
24
24
|
* const result = await auditService.getSuspiciousActivity({
|
|
25
|
-
*
|
|
25
|
+
* sub: 'user-uuid',
|
|
26
26
|
* limit: 50,
|
|
27
27
|
* });
|
|
28
28
|
* ```
|
|
29
29
|
*/
|
|
30
30
|
class GetSuspiciousActivityDTO {
|
|
31
31
|
/**
|
|
32
|
-
* Optional user identifier to filter by specific user
|
|
32
|
+
* Optional user's unique identifier (UUID v4) to filter by specific user
|
|
33
33
|
*
|
|
34
34
|
* If not provided, returns suspicious activity for all users.
|
|
35
35
|
*/
|
|
36
|
-
|
|
36
|
+
sub;
|
|
37
37
|
/**
|
|
38
38
|
* Maximum number of records to return
|
|
39
39
|
*
|
|
@@ -44,7 +44,7 @@ class GetSuspiciousActivityDTO {
|
|
|
44
44
|
exports.GetSuspiciousActivityDTO = GetSuspiciousActivityDTO;
|
|
45
45
|
__decorate([
|
|
46
46
|
(0, class_validator_1.IsOptional)(),
|
|
47
|
-
(0, class_validator_1.IsUUID)('4', { message: '
|
|
47
|
+
(0, class_validator_1.IsUUID)('4', { message: 'sub must be a valid UUID v4 format' }),
|
|
48
48
|
(0, class_transformer_1.Transform)(({ value }) => {
|
|
49
49
|
if (typeof value === 'string') {
|
|
50
50
|
return value.trim().toLowerCase();
|
|
@@ -52,7 +52,7 @@ __decorate([
|
|
|
52
52
|
return value;
|
|
53
53
|
}),
|
|
54
54
|
__metadata("design:type", String)
|
|
55
|
-
], GetSuspiciousActivityDTO.prototype, "
|
|
55
|
+
], GetSuspiciousActivityDTO.prototype, "sub", void 0);
|
|
56
56
|
__decorate([
|
|
57
57
|
(0, class_validator_1.IsOptional)(),
|
|
58
58
|
(0, class_validator_1.IsInt)({ message: 'limit must be an integer' }),
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"get-suspicious-activity.dto.js","sourceRoot":"","sources":["../../src/dto/get-suspicious-activity.dto.ts"],"names":[],"mappings":";;;;;;;;;;;;AACA,qDAAsE;AACtE,yDAA8C;AAE9C;;;;;;;;;;;;;;GAcG;AACH,MAAa,wBAAwB;IACnC;;;;OAIG;IASH,
|
|
1
|
+
{"version":3,"file":"get-suspicious-activity.dto.js","sourceRoot":"","sources":["../../src/dto/get-suspicious-activity.dto.ts"],"names":[],"mappings":";;;;;;;;;;;;AACA,qDAAsE;AACtE,yDAA8C;AAE9C;;;;;;;;;;;;;;GAcG;AACH,MAAa,wBAAwB;IACnC;;;;OAIG;IASH,GAAG,CAAU;IAEb;;;;OAIG;IAYH,KAAK,CAAU;CAChB;AAjCD,4DAiCC;AAnBC;IARC,IAAA,4BAAU,GAAE;IACZ,IAAA,wBAAM,EAAC,GAAG,EAAE,EAAE,OAAO,EAAE,oCAAoC,EAAE,CAAC;IAC9D,IAAA,6BAAS,EAAC,CAAC,EAAE,KAAK,EAAE,EAAE,EAAE;QACvB,IAAI,OAAO,KAAK,KAAK,QAAQ,EAAE,CAAC;YAC9B,OAAO,KAAK,CAAC,IAAI,EAAE,CAAC,WAAW,EAAE,CAAC;QACpC,CAAC;QACD,OAAO,KAAK,CAAC;IACf,CAAC,CAAC;;qDACW;AAkBb;IAXC,IAAA,4BAAU,GAAE;IACZ,IAAA,uBAAK,EAAC,EAAE,OAAO,EAAE,0BAA0B,EAAE,CAAC;IAC9C,IAAA,qBAAG,EAAC,CAAC,EAAE,EAAE,OAAO,EAAE,0BAA0B,EAAE,CAAC;IAC/C,IAAA,qBAAG,EAAC,GAAG,EAAE,EAAE,OAAO,EAAE,2BAA2B,EAAE,CAAC;IAClD,IAAA,6BAAS,EAAC,CAAC,EAAE,KAAK,EAAE,EAAE,EAAE;QACvB,IAAI,OAAO,KAAK,KAAK,QAAQ,IAAI,KAAK,CAAC,IAAI,EAAE,KAAK,EAAE,EAAE,CAAC;YACrD,MAAM,MAAM,GAAG,MAAM,CAAC,QAAQ,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;YAC1C,OAAO,MAAM,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,MAAM,CAAC;QAC/C,CAAC;QACD,OAAO,KAAK,CAAC;IACf,CAAC,CAAC;;uDACa;AAGjB;;GAEG;AACH,MAAa,gCAAgC;IAC3C;;OAEG;IACH,IAAI,CAAgB;CACrB;AALD,4EAKC"}
|
|
@@ -1,13 +1,13 @@
|
|
|
1
1
|
import { AuthAuditEventType } from '../enums/auth-audit-event-type.enum';
|
|
2
2
|
import { AuthAuditEventStatus } from '../entities/auth-audit.entity';
|
|
3
|
-
import { IAuthAudit } from '../interfaces/entities.interface';
|
|
4
3
|
/**
|
|
5
|
-
* Request DTO for getting user authentication history
|
|
4
|
+
* Request DTO for getting user authentication history (user self-service)
|
|
5
|
+
*
|
|
6
|
+
* User self-service DTO - no userSub field. Service gets user from authenticated context.
|
|
6
7
|
*
|
|
7
8
|
* @example
|
|
8
9
|
* ```typescript
|
|
9
|
-
* const result = await
|
|
10
|
-
* userSub: 'user-uuid',
|
|
10
|
+
* const result = await authService.getUserAuthHistory({
|
|
11
11
|
* page: 1,
|
|
12
12
|
* limit: 50,
|
|
13
13
|
* eventTypes: [AuthAuditEventType.LOGIN_SUCCESS],
|
|
@@ -16,16 +16,6 @@ import { IAuthAudit } from '../interfaces/entities.interface';
|
|
|
16
16
|
* ```
|
|
17
17
|
*/
|
|
18
18
|
export declare class GetUserAuthHistoryDTO {
|
|
19
|
-
/**
|
|
20
|
-
* External user identifier (UUID)
|
|
21
|
-
*
|
|
22
|
-
* The service will automatically resolve this to the internal userId
|
|
23
|
-
* for efficient database queries.
|
|
24
|
-
*
|
|
25
|
-
* Note: This is optional in the DTO because controllers set it from the authenticated user.
|
|
26
|
-
* It will be validated when set by the controller.
|
|
27
|
-
*/
|
|
28
|
-
userSub?: string;
|
|
29
19
|
/**
|
|
30
20
|
* Page number (1-indexed)
|
|
31
21
|
*
|
|
@@ -59,29 +49,4 @@ export declare class GetUserAuthHistoryDTO {
|
|
|
59
49
|
*/
|
|
60
50
|
eventStatus?: AuthAuditEventStatus[];
|
|
61
51
|
}
|
|
62
|
-
/**
|
|
63
|
-
* Response DTO for paginated user authentication history
|
|
64
|
-
*/
|
|
65
|
-
export declare class GetUserAuthHistoryResponseDTO {
|
|
66
|
-
/**
|
|
67
|
-
* Array of audit records
|
|
68
|
-
*/
|
|
69
|
-
data: IAuthAudit[];
|
|
70
|
-
/**
|
|
71
|
-
* Total number of records matching the query
|
|
72
|
-
*/
|
|
73
|
-
total: number;
|
|
74
|
-
/**
|
|
75
|
-
* Current page number
|
|
76
|
-
*/
|
|
77
|
-
page: number;
|
|
78
|
-
/**
|
|
79
|
-
* Number of records per page
|
|
80
|
-
*/
|
|
81
|
-
limit: number;
|
|
82
|
-
/**
|
|
83
|
-
* Total number of pages
|
|
84
|
-
*/
|
|
85
|
-
totalPages: number;
|
|
86
|
-
}
|
|
87
52
|
//# sourceMappingURL=get-user-auth-history.dto.d.ts.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"get-user-auth-history.dto.d.ts","sourceRoot":"","sources":["../../src/dto/get-user-auth-history.dto.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,kBAAkB,EAAE,MAAM,qCAAqC,CAAC;AACzE,OAAO,EAAE,oBAAoB,EAAE,MAAM,+BAA+B,CAAC;
|
|
1
|
+
{"version":3,"file":"get-user-auth-history.dto.d.ts","sourceRoot":"","sources":["../../src/dto/get-user-auth-history.dto.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,kBAAkB,EAAE,MAAM,qCAAqC,CAAC;AACzE,OAAO,EAAE,oBAAoB,EAAE,MAAM,+BAA+B,CAAC;AAIrE;;;;;;;;;;;;;;GAcG;AACH,qBAAa,qBAAqB;IAChC;;;;OAIG;IAWH,IAAI,CAAC,EAAE,MAAM,CAAC;IAEd;;;;OAIG;IAYH,KAAK,CAAC,EAAE,MAAM,CAAC;IAEf;;OAEG;IAIH,SAAS,CAAC,EAAE,IAAI,CAAC;IAEjB;;OAEG;IAIH,OAAO,CAAC,EAAE,IAAI,CAAC;IAEf;;;;OAIG;IAiCH,UAAU,CAAC,EAAE,kBAAkB,EAAE,CAAC;IAElC;;;;OAIG;IAoCH,WAAW,CAAC,EAAE,oBAAoB,EAAE,CAAC;CACtC"}
|
|
@@ -9,17 +9,18 @@ var __metadata = (this && this.__metadata) || function (k, v) {
|
|
|
9
9
|
if (typeof Reflect === "object" && typeof Reflect.metadata === "function") return Reflect.metadata(k, v);
|
|
10
10
|
};
|
|
11
11
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
12
|
-
exports.
|
|
12
|
+
exports.GetUserAuthHistoryDTO = void 0;
|
|
13
13
|
const auth_audit_event_type_enum_1 = require("../enums/auth-audit-event-type.enum");
|
|
14
14
|
const class_validator_1 = require("class-validator");
|
|
15
15
|
const class_transformer_1 = require("class-transformer");
|
|
16
16
|
/**
|
|
17
|
-
* Request DTO for getting user authentication history
|
|
17
|
+
* Request DTO for getting user authentication history (user self-service)
|
|
18
|
+
*
|
|
19
|
+
* User self-service DTO - no userSub field. Service gets user from authenticated context.
|
|
18
20
|
*
|
|
19
21
|
* @example
|
|
20
22
|
* ```typescript
|
|
21
|
-
* const result = await
|
|
22
|
-
* userSub: 'user-uuid',
|
|
23
|
+
* const result = await authService.getUserAuthHistory({
|
|
23
24
|
* page: 1,
|
|
24
25
|
* limit: 50,
|
|
25
26
|
* eventTypes: [AuthAuditEventType.LOGIN_SUCCESS],
|
|
@@ -28,16 +29,6 @@ const class_transformer_1 = require("class-transformer");
|
|
|
28
29
|
* ```
|
|
29
30
|
*/
|
|
30
31
|
class GetUserAuthHistoryDTO {
|
|
31
|
-
/**
|
|
32
|
-
* External user identifier (UUID)
|
|
33
|
-
*
|
|
34
|
-
* The service will automatically resolve this to the internal userId
|
|
35
|
-
* for efficient database queries.
|
|
36
|
-
*
|
|
37
|
-
* Note: This is optional in the DTO because controllers set it from the authenticated user.
|
|
38
|
-
* It will be validated when set by the controller.
|
|
39
|
-
*/
|
|
40
|
-
userSub;
|
|
41
32
|
/**
|
|
42
33
|
* Page number (1-indexed)
|
|
43
34
|
*
|
|
@@ -72,17 +63,6 @@ class GetUserAuthHistoryDTO {
|
|
|
72
63
|
eventStatus;
|
|
73
64
|
}
|
|
74
65
|
exports.GetUserAuthHistoryDTO = GetUserAuthHistoryDTO;
|
|
75
|
-
__decorate([
|
|
76
|
-
(0, class_validator_1.IsOptional)(),
|
|
77
|
-
(0, class_validator_1.IsUUID)('4', { message: 'userSub must be a valid UUID v4 format' }),
|
|
78
|
-
(0, class_transformer_1.Transform)(({ value }) => {
|
|
79
|
-
if (typeof value === 'string') {
|
|
80
|
-
return value.trim().toLowerCase();
|
|
81
|
-
}
|
|
82
|
-
return value;
|
|
83
|
-
}),
|
|
84
|
-
__metadata("design:type", String)
|
|
85
|
-
], GetUserAuthHistoryDTO.prototype, "userSub", void 0);
|
|
86
66
|
__decorate([
|
|
87
67
|
(0, class_validator_1.IsOptional)(),
|
|
88
68
|
(0, class_validator_1.IsInt)({ message: 'page must be an integer' }),
|
|
@@ -126,6 +106,30 @@ __decorate([
|
|
|
126
106
|
(0, class_validator_1.IsOptional)(),
|
|
127
107
|
(0, class_validator_1.IsArray)({ message: 'eventTypes must be an array' }),
|
|
128
108
|
(0, class_validator_1.IsEnum)(auth_audit_event_type_enum_1.AuthAuditEventType, { each: true, message: 'eventTypes must contain only AuthAuditEventType values' }),
|
|
109
|
+
(0, class_transformer_1.Transform)(({ value }) => {
|
|
110
|
+
// Support query params like:
|
|
111
|
+
// - ?eventTypes=LOGIN_SUCCESS
|
|
112
|
+
// - ?eventTypes=LOGIN_SUCCESS&eventTypes=LOGIN_FAILED
|
|
113
|
+
// - ?eventTypes=LOGIN_SUCCESS,LOGIN_FAILED
|
|
114
|
+
if (value === undefined || value === null) {
|
|
115
|
+
return value;
|
|
116
|
+
}
|
|
117
|
+
if (Array.isArray(value)) {
|
|
118
|
+
return value.map((v) => (typeof v === 'string' ? v.trim() : v)).filter((v) => v !== '');
|
|
119
|
+
}
|
|
120
|
+
if (typeof value === 'string') {
|
|
121
|
+
const trimmed = value.trim();
|
|
122
|
+
if (trimmed === '') {
|
|
123
|
+
return value;
|
|
124
|
+
}
|
|
125
|
+
const parts = trimmed
|
|
126
|
+
.split(',')
|
|
127
|
+
.map((p) => p.trim())
|
|
128
|
+
.filter(Boolean);
|
|
129
|
+
return parts.length > 0 ? parts : value;
|
|
130
|
+
}
|
|
131
|
+
return value;
|
|
132
|
+
}),
|
|
129
133
|
__metadata("design:type", Array)
|
|
130
134
|
], GetUserAuthHistoryDTO.prototype, "eventTypes", void 0);
|
|
131
135
|
__decorate([
|
|
@@ -135,32 +139,30 @@ __decorate([
|
|
|
135
139
|
each: true,
|
|
136
140
|
message: 'eventStatus must contain only: SUCCESS, FAILURE, INFO, SUSPICIOUS',
|
|
137
141
|
}),
|
|
142
|
+
(0, class_transformer_1.Transform)(({ value }) => {
|
|
143
|
+
// Support query params like:
|
|
144
|
+
// - ?eventStatus=FAILURE
|
|
145
|
+
// - ?eventStatus=SUCCESS&eventStatus=FAILURE
|
|
146
|
+
// - ?eventStatus=SUCCESS,FAILURE
|
|
147
|
+
if (value === undefined || value === null) {
|
|
148
|
+
return value;
|
|
149
|
+
}
|
|
150
|
+
if (Array.isArray(value)) {
|
|
151
|
+
return value.map((v) => (typeof v === 'string' ? v.trim() : v)).filter((v) => v !== '');
|
|
152
|
+
}
|
|
153
|
+
if (typeof value === 'string') {
|
|
154
|
+
const trimmed = value.trim();
|
|
155
|
+
if (trimmed === '') {
|
|
156
|
+
return value;
|
|
157
|
+
}
|
|
158
|
+
const parts = trimmed
|
|
159
|
+
.split(',')
|
|
160
|
+
.map((p) => p.trim())
|
|
161
|
+
.filter(Boolean);
|
|
162
|
+
return parts.length > 0 ? parts : value;
|
|
163
|
+
}
|
|
164
|
+
return value;
|
|
165
|
+
}),
|
|
138
166
|
__metadata("design:type", Array)
|
|
139
167
|
], GetUserAuthHistoryDTO.prototype, "eventStatus", void 0);
|
|
140
|
-
/**
|
|
141
|
-
* Response DTO for paginated user authentication history
|
|
142
|
-
*/
|
|
143
|
-
class GetUserAuthHistoryResponseDTO {
|
|
144
|
-
/**
|
|
145
|
-
* Array of audit records
|
|
146
|
-
*/
|
|
147
|
-
data;
|
|
148
|
-
/**
|
|
149
|
-
* Total number of records matching the query
|
|
150
|
-
*/
|
|
151
|
-
total;
|
|
152
|
-
/**
|
|
153
|
-
* Current page number
|
|
154
|
-
*/
|
|
155
|
-
page;
|
|
156
|
-
/**
|
|
157
|
-
* Number of records per page
|
|
158
|
-
*/
|
|
159
|
-
limit;
|
|
160
|
-
/**
|
|
161
|
-
* Total number of pages
|
|
162
|
-
*/
|
|
163
|
-
totalPages;
|
|
164
|
-
}
|
|
165
|
-
exports.GetUserAuthHistoryResponseDTO = GetUserAuthHistoryResponseDTO;
|
|
166
168
|
//# sourceMappingURL=get-user-auth-history.dto.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"get-user-auth-history.dto.js","sourceRoot":"","sources":["../../src/dto/get-user-auth-history.dto.ts"],"names":[],"mappings":";;;;;;;;;;;;AAAA,oFAAyE;
|
|
1
|
+
{"version":3,"file":"get-user-auth-history.dto.js","sourceRoot":"","sources":["../../src/dto/get-user-auth-history.dto.ts"],"names":[],"mappings":";;;;;;;;;;;;AAAA,oFAAyE;AAEzE,qDAA6F;AAC7F,yDAAoD;AAEpD;;;;;;;;;;;;;;GAcG;AACH,MAAa,qBAAqB;IAChC;;;;OAIG;IAWH,IAAI,CAAU;IAEd;;;;OAIG;IAYH,KAAK,CAAU;IAEf;;OAEG;IAIH,SAAS,CAAQ;IAEjB;;OAEG;IAIH,OAAO,CAAQ;IAEf;;;;OAIG;IAiCH,UAAU,CAAwB;IAElC;;;;OAIG;IAoCH,WAAW,CAA0B;CACtC;AApID,sDAoIC;AApHC;IAVC,IAAA,4BAAU,GAAE;IACZ,IAAA,uBAAK,EAAC,EAAE,OAAO,EAAE,yBAAyB,EAAE,CAAC;IAC7C,IAAA,qBAAG,EAAC,CAAC,EAAE,EAAE,OAAO,EAAE,yBAAyB,EAAE,CAAC;IAC9C,IAAA,6BAAS,EAAC,CAAC,EAAE,KAAK,EAAE,EAAE,EAAE;QACvB,IAAI,OAAO,KAAK,KAAK,QAAQ,IAAI,KAAK,CAAC,IAAI,EAAE,KAAK,EAAE,EAAE,CAAC;YACrD,MAAM,MAAM,GAAG,MAAM,CAAC,QAAQ,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;YAC1C,OAAO,MAAM,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,MAAM,CAAC;QAC/C,CAAC;QACD,OAAO,KAAK,CAAC;IACf,CAAC,CAAC;;mDACY;AAkBd;IAXC,IAAA,4BAAU,GAAE;IACZ,IAAA,uBAAK,EAAC,EAAE,OAAO,EAAE,0BAA0B,EAAE,CAAC;IAC9C,IAAA,qBAAG,EAAC,CAAC,EAAE,EAAE,OAAO,EAAE,0BAA0B,EAAE,CAAC;IAC/C,IAAA,qBAAG,EAAC,GAAG,EAAE,EAAE,OAAO,EAAE,2BAA2B,EAAE,CAAC;IAClD,IAAA,6BAAS,EAAC,CAAC,EAAE,KAAK,EAAE,EAAE,EAAE;QACvB,IAAI,OAAO,KAAK,KAAK,QAAQ,IAAI,KAAK,CAAC,IAAI,EAAE,KAAK,EAAE,EAAE,CAAC;YACrD,MAAM,MAAM,GAAG,MAAM,CAAC,QAAQ,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;YAC1C,OAAO,MAAM,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,MAAM,CAAC;QAC/C,CAAC;QACD,OAAO,KAAK,CAAC;IACf,CAAC,CAAC;;oDACa;AAQf;IAHC,IAAA,4BAAU,GAAE;IACZ,IAAA,wBAAI,EAAC,GAAG,EAAE,CAAC,IAAI,CAAC;IAChB,IAAA,wBAAM,EAAC,EAAE,OAAO,EAAE,gCAAgC,EAAE,CAAC;8BAC1C,IAAI;wDAAC;AAQjB;IAHC,IAAA,4BAAU,GAAE;IACZ,IAAA,wBAAI,EAAC,GAAG,EAAE,CAAC,IAAI,CAAC;IAChB,IAAA,wBAAM,EAAC,EAAE,OAAO,EAAE,8BAA8B,EAAE,CAAC;8BAC1C,IAAI;sDAAC;AAuCf;IAhCC,IAAA,4BAAU,GAAE;IACZ,IAAA,yBAAO,EAAC,EAAE,OAAO,EAAE,6BAA6B,EAAE,CAAC;IACnD,IAAA,wBAAM,EAAC,+CAAkB,EAAE,EAAE,IAAI,EAAE,IAAI,EAAE,OAAO,EAAE,wDAAwD,EAAE,CAAC;IAC7G,IAAA,6BAAS,EAAC,CAAC,EAAE,KAAK,EAAsB,EAAE,EAAE;QAC3C,6BAA6B;QAC7B,8BAA8B;QAC9B,sDAAsD;QACtD,2CAA2C;QAC3C,IAAI,KAAK,KAAK,SAAS,IAAI,KAAK,KAAK,IAAI,EAAE,CAAC;YAC1C,OAAO,KAAK,CAAC;QACf,CAAC;QAED,IAAI,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,EAAE,CAAC;YACzB,OAAO,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,OAAO,CAAC,KAAK,QAAQ,CAAC,CAAC,CAAC,CAAC,CAAC,IAAI,EAAE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,KAAK,EAAE,CAAC,CAAC;QAC1F,CAAC;QAED,IAAI,OAAO,KAAK,KAAK,QAAQ,EAAE,CAAC;YAC9B,MAAM,OAAO,GAAG,KAAK,CAAC,IAAI,EAAE,CAAC;YAC7B,IAAI,OAAO,KAAK,EAAE,EAAE,CAAC;gBACnB,OAAO,KAAK,CAAC;YACf,CAAC;YAED,MAAM,KAAK,GAAG,OAAO;iBAClB,KAAK,CAAC,GAAG,CAAC;iBACV,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,IAAI,EAAE,CAAC;iBACpB,MAAM,CAAC,OAAO,CAAC,CAAC;YAEnB,OAAO,KAAK,CAAC,MAAM,GAAG,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC;QAC1C,CAAC;QAED,OAAO,KAAK,CAAC;IACf,CAAC,CAAC;;yDACgC;AA0ClC;IAnCC,IAAA,4BAAU,GAAE;IACZ,IAAA,yBAAO,EAAC,EAAE,OAAO,EAAE,8BAA8B,EAAE,CAAC;IACpD,IAAA,sBAAI,EAAC,CAAC,SAAS,EAAE,SAAS,EAAE,MAAM,EAAE,YAAY,CAAC,EAAE;QAClD,IAAI,EAAE,IAAI;QACV,OAAO,EAAE,mEAAmE;KAC7E,CAAC;IACD,IAAA,6BAAS,EAAC,CAAC,EAAE,KAAK,EAAsB,EAAE,EAAE;QAC3C,6BAA6B;QAC7B,yBAAyB;QACzB,6CAA6C;QAC7C,iCAAiC;QACjC,IAAI,KAAK,KAAK,SAAS,IAAI,KAAK,KAAK,IAAI,EAAE,CAAC;YAC1C,OAAO,KAAK,CAAC;QACf,CAAC;QAED,IAAI,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,EAAE,CAAC;YACzB,OAAO,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,OAAO,CAAC,KAAK,QAAQ,CAAC,CAAC,CAAC,CAAC,CAAC,IAAI,EAAE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,KAAK,EAAE,CAAC,CAAC;QAC1F,CAAC;QAED,IAAI,OAAO,KAAK,KAAK,QAAQ,EAAE,CAAC;YAC9B,MAAM,OAAO,GAAG,KAAK,CAAC,IAAI,EAAE,CAAC;YAC7B,IAAI,OAAO,KAAK,EAAE,EAAE,CAAC;gBACnB,OAAO,KAAK,CAAC;YACf,CAAC;YAED,MAAM,KAAK,GAAG,OAAO;iBAClB,KAAK,CAAC,GAAG,CAAC;iBACV,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,IAAI,EAAE,CAAC;iBACpB,MAAM,CAAC,OAAO,CAAC,CAAC;YAEnB,OAAO,KAAK,CAAC,MAAM,GAAG,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC;QAC1C,CAAC;QAED,OAAO,KAAK,CAAC;IACf,CAAC,CAAC;;0DACmC"}
|
|
@@ -1,34 +1,21 @@
|
|
|
1
1
|
/**
|
|
2
2
|
* DTO for getting user MFA devices
|
|
3
3
|
*
|
|
4
|
-
* Used to retrieve all MFA devices configured for
|
|
4
|
+
* Used to retrieve all MFA devices configured for the current authenticated user.
|
|
5
|
+
* User sub is obtained from authenticated context automatically.
|
|
5
6
|
*
|
|
6
7
|
* @example
|
|
7
8
|
* ```typescript
|
|
8
|
-
* const devices = await mfaService.getUserDevices({
|
|
9
|
-
* sub: 'user-uuid'
|
|
10
|
-
* });
|
|
9
|
+
* const devices = await mfaService.getUserDevices({});
|
|
11
10
|
* ```
|
|
12
11
|
*/
|
|
13
12
|
import { IMFADevice } from '../interfaces/entities.interface';
|
|
14
13
|
/**
|
|
15
14
|
* DTO for getting user MFA devices
|
|
15
|
+
*
|
|
16
|
+
* User self-service DTO - no sub field. Service gets user from authenticated context.
|
|
16
17
|
*/
|
|
17
18
|
export declare class GetUserDevicesDTO {
|
|
18
|
-
/**
|
|
19
|
-
* User's unique identifier (UUID v4)
|
|
20
|
-
*
|
|
21
|
-
* Validation:
|
|
22
|
-
* - Must be a valid UUID v4 format
|
|
23
|
-
* - Matches DB constraint: char(36) or uuid
|
|
24
|
-
*
|
|
25
|
-
* Sanitization:
|
|
26
|
-
* - Trimmed
|
|
27
|
-
* - Lowercased for consistency
|
|
28
|
-
*
|
|
29
|
-
* @example "a21b654c-2746-4168-acee-c175083a65cd"
|
|
30
|
-
*/
|
|
31
|
-
sub: string;
|
|
32
19
|
}
|
|
33
20
|
/**
|
|
34
21
|
* Response DTO for user MFA devices
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"get-user-devices.dto.d.ts","sourceRoot":"","sources":["../../src/dto/get-user-devices.dto.ts"],"names":[],"mappings":"AAAA
|
|
1
|
+
{"version":3,"file":"get-user-devices.dto.d.ts","sourceRoot":"","sources":["../../src/dto/get-user-devices.dto.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;GAUG;AAEH,OAAO,EAAE,UAAU,EAAE,MAAM,kCAAkC,CAAC;AAE9D;;;;GAIG;AACH,qBAAa,iBAAiB;CAE7B;AAED;;GAEG;AACH,qBAAa,yBAAyB;IACpC;;OAEG;IACH,OAAO,EAAG,UAAU,EAAE,CAAC;CACxB"}
|