@node-c/domain-iam 1.0.0-alpha9 → 1.0.0-beta1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/common/definitions/common.constants.d.ts +7 -1
- package/dist/common/definitions/common.constants.js +6 -0
- package/dist/common/definitions/common.constants.js.map +1 -1
- package/dist/module/iam.module.js.map +1 -1
- package/dist/services/authentication/iam.authentication.definitions.d.ts +79 -16
- package/dist/services/authentication/iam.authentication.definitions.js +6 -9
- package/dist/services/authentication/iam.authentication.definitions.js.map +1 -1
- package/dist/services/authentication/iam.authentication.service.d.ts +13 -5
- package/dist/services/authentication/iam.authentication.service.js +32 -3
- package/dist/services/authentication/iam.authentication.service.js.map +1 -1
- package/dist/services/authenticationOAuth2/iam.authenticationOAuth2.definitions.d.ts +38 -0
- package/dist/services/{authenticationLocal/iam.authenticationLocal.definitions.js → authenticationOAuth2/iam.authenticationOAuth2.definitions.js} +1 -1
- package/dist/services/authenticationOAuth2/iam.authenticationOAuth2.definitions.js.map +1 -0
- package/dist/services/authenticationOAuth2/iam.authenticationOAuth2.service.d.ts +25 -0
- package/dist/services/authenticationOAuth2/iam.authenticationOAuth2.service.js +300 -0
- package/dist/services/authenticationOAuth2/iam.authenticationOAuth2.service.js.map +1 -0
- package/dist/services/authenticationOAuth2/index.d.ts +2 -0
- package/dist/services/authenticationOAuth2/index.js +19 -0
- package/dist/services/authenticationOAuth2/index.js.map +1 -0
- package/dist/services/authenticationUserLocal/iam.authenticationUserLocal.definitions.d.ts +12 -0
- package/dist/services/authenticationUserLocal/iam.authenticationUserLocal.definitions.js +3 -0
- package/dist/services/authenticationUserLocal/iam.authenticationUserLocal.definitions.js.map +1 -0
- package/dist/services/authenticationUserLocal/iam.authenticationUserLocal.service.d.ts +15 -0
- package/dist/services/authenticationUserLocal/iam.authenticationUserLocal.service.js +142 -0
- package/dist/services/authenticationUserLocal/iam.authenticationUserLocal.service.js.map +1 -0
- package/dist/services/authenticationUserLocal/index.d.ts +2 -0
- package/dist/services/{authenticationLocal → authenticationUserLocal}/index.js +2 -2
- package/dist/services/authenticationUserLocal/index.js.map +1 -0
- package/dist/services/authorization/iam.authorization.definitions.d.ts +33 -23
- package/dist/services/authorization/iam.authorization.definitions.js +7 -0
- package/dist/services/authorization/iam.authorization.definitions.js.map +1 -1
- package/dist/services/authorization/iam.authorization.service.d.ts +29 -13
- package/dist/services/authorization/iam.authorization.service.js +233 -125
- package/dist/services/authorization/iam.authorization.service.js.map +1 -1
- package/dist/services/index.d.ts +4 -2
- package/dist/services/index.js +4 -2
- package/dist/services/index.js.map +1 -1
- package/dist/services/mfa/iam.mfa.definitions.d.ts +21 -0
- package/dist/services/mfa/iam.mfa.definitions.js +8 -0
- package/dist/services/mfa/iam.mfa.definitions.js.map +1 -0
- package/dist/services/mfa/iam.mfa.service.d.ts +10 -0
- package/dist/services/mfa/iam.mfa.service.js +32 -0
- package/dist/services/mfa/iam.mfa.service.js.map +1 -0
- package/dist/services/mfa/index.d.ts +2 -0
- package/dist/services/{users → mfa}/index.js +2 -2
- package/dist/services/mfa/index.js.map +1 -0
- package/dist/services/tokenManager/iam.tokenManager.definitions.d.ts +14 -3
- package/dist/services/tokenManager/iam.tokenManager.definitions.js.map +1 -1
- package/dist/services/tokenManager/iam.tokenManager.service.d.ts +24 -9
- package/dist/services/tokenManager/iam.tokenManager.service.js +113 -44
- package/dist/services/tokenManager/iam.tokenManager.service.js.map +1 -1
- package/dist/services/userManager/iam.userManager.definitions.d.ts +45 -0
- package/dist/services/userManager/iam.userManager.definitions.js +8 -0
- package/dist/services/userManager/iam.userManager.definitions.js.map +1 -0
- package/dist/services/userManager/iam.userManager.service.d.ts +33 -0
- package/dist/services/userManager/iam.userManager.service.js +332 -0
- package/dist/services/userManager/iam.userManager.service.js.map +1 -0
- package/dist/services/userManager/index.d.ts +2 -0
- package/dist/services/userManager/index.js +19 -0
- package/dist/services/userManager/index.js.map +1 -0
- package/package.json +10 -8
- package/src/common/definitions/common.constants.ts +16 -0
- package/src/common/definitions/index.ts +1 -0
- package/src/index.ts +3 -0
- package/src/module/iam.definitions.ts +15 -0
- package/src/module/iam.module.ts +29 -0
- package/src/module/index.ts +2 -0
- package/src/services/authentication/iam.authentication.definitions.ts +100 -0
- package/src/services/authentication/iam.authentication.service.ts +105 -0
- package/src/services/authentication/index.ts +2 -0
- package/src/services/authenticationOAuth2/iam.authenticationOAuth2.definitions.ts +72 -0
- package/src/services/authenticationOAuth2/iam.authenticationOAuth2.service.ts +352 -0
- package/src/services/authenticationOAuth2/index.ts +2 -0
- package/src/services/authenticationUserLocal/iam.authenticationUserLocal.definitions.ts +29 -0
- package/src/services/authenticationUserLocal/iam.authenticationUserLocal.service.ts +173 -0
- package/src/services/authenticationUserLocal/index.ts +2 -0
- package/src/services/authorization/iam.authorization.definitions.ts +55 -0
- package/src/services/authorization/iam.authorization.service.ts +387 -0
- package/src/services/authorization/index.ts +2 -0
- package/src/services/index.ts +7 -0
- package/src/services/mfa/iam.mfa.definitions.ts +28 -0
- package/src/services/mfa/iam.mfa.service.ts +40 -0
- package/src/services/mfa/index.ts +2 -0
- package/src/services/tokenManager/iam.tokenManager.definitions.ts +61 -0
- package/src/services/tokenManager/iam.tokenManager.service.ts +292 -0
- package/src/services/tokenManager/index.ts +2 -0
- package/src/services/userManager/iam.userManager.definitions.ts +73 -0
- package/src/services/userManager/iam.userManager.service.ts +463 -0
- package/src/services/userManager/index.ts +2 -0
- package/dist/services/authenticationLocal/iam.authenticationLocal.definitions.d.ts +0 -11
- package/dist/services/authenticationLocal/iam.authenticationLocal.definitions.js.map +0 -1
- package/dist/services/authenticationLocal/iam.authenticationLocal.service.d.ts +0 -10
- package/dist/services/authenticationLocal/iam.authenticationLocal.service.js +0 -70
- package/dist/services/authenticationLocal/iam.authenticationLocal.service.js.map +0 -1
- package/dist/services/authenticationLocal/index.d.ts +0 -2
- package/dist/services/authenticationLocal/index.js.map +0 -1
- package/dist/services/users/iam.users.definitions.d.ts +0 -30
- package/dist/services/users/iam.users.definitions.js +0 -8
- package/dist/services/users/iam.users.definitions.js.map +0 -1
- package/dist/services/users/iam.users.service.d.ts +0 -16
- package/dist/services/users/iam.users.service.js +0 -93
- package/dist/services/users/iam.users.service.js.map +0 -1
- package/dist/services/users/index.d.ts +0 -2
- package/dist/services/users/index.js.map +0 -1
|
@@ -0,0 +1,19 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
3
|
+
if (k2 === undefined) k2 = k;
|
|
4
|
+
var desc = Object.getOwnPropertyDescriptor(m, k);
|
|
5
|
+
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
|
|
6
|
+
desc = { enumerable: true, get: function() { return m[k]; } };
|
|
7
|
+
}
|
|
8
|
+
Object.defineProperty(o, k2, desc);
|
|
9
|
+
}) : (function(o, m, k, k2) {
|
|
10
|
+
if (k2 === undefined) k2 = k;
|
|
11
|
+
o[k2] = m[k];
|
|
12
|
+
}));
|
|
13
|
+
var __exportStar = (this && this.__exportStar) || function(m, exports) {
|
|
14
|
+
for (var p in m) if (p !== "default" && !Object.prototype.hasOwnProperty.call(exports, p)) __createBinding(exports, m, p);
|
|
15
|
+
};
|
|
16
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
17
|
+
__exportStar(require("./iam.authenticationOAuth2.definitions"), exports);
|
|
18
|
+
__exportStar(require("./iam.authenticationOAuth2.service"), exports);
|
|
19
|
+
//# sourceMappingURL=index.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../../src/services/authenticationOAuth2/index.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;AAAA,yEAAuD;AACvD,qEAAmD"}
|
|
@@ -0,0 +1,12 @@
|
|
|
1
|
+
import { IAMAuthenticationCompleteData, IAMAuthenticationCompleteOptions, IAMAuthenticationCompleteResult, IAMAuthenticationGetUserCreateAccessTokenConfigResult, IAMAuthenticationInitiateData, IAMAuthenticationInitiateOptions, IAMAuthenticationInitiateResult } from '../authentication';
|
|
2
|
+
export type IAMAuthenticationUserLocalCompleteData = IAMAuthenticationCompleteData;
|
|
3
|
+
export type IAMAuthenticationUserLocalCompleteOptions<Context extends object> = IAMAuthenticationCompleteOptions<Context>;
|
|
4
|
+
export type IAMAuthenticationUserLocalCompleteResult = IAMAuthenticationCompleteResult;
|
|
5
|
+
export type IAMAuthenticationUserLocalGetUserCreateAccessTokenConfigResult = IAMAuthenticationGetUserCreateAccessTokenConfigResult;
|
|
6
|
+
export interface IAMAuthenticationUserLocalInitiateData extends IAMAuthenticationInitiateData {
|
|
7
|
+
password: string;
|
|
8
|
+
}
|
|
9
|
+
export type IAMAuthenticationUserLocalInitiateOptions<Context extends object> = IAMAuthenticationInitiateOptions<{
|
|
10
|
+
password: string;
|
|
11
|
+
} & Context>;
|
|
12
|
+
export type IAMAuthenticationUserLocalInitiateResult = IAMAuthenticationInitiateResult;
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"iam.authenticationUserLocal.definitions.js","sourceRoot":"","sources":["../../../src/services/authenticationUserLocal/iam.authenticationUserLocal.definitions.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1,15 @@
|
|
|
1
|
+
import { ConfigProviderService, LoggerService } from '@node-c/core';
|
|
2
|
+
import { IAMAuthenticationUserLocalCompleteData, IAMAuthenticationUserLocalCompleteOptions, IAMAuthenticationUserLocalCompleteResult, IAMAuthenticationUserLocalGetUserCreateAccessTokenConfigResult, IAMAuthenticationUserLocalInitiateData, IAMAuthenticationUserLocalInitiateOptions, IAMAuthenticationUserLocalInitiateResult } from './iam.authenticationUserLocal.definitions';
|
|
3
|
+
import { IAMAuthenticationService } from '../authentication';
|
|
4
|
+
import { IAMMFAService, IAMMFAType } from '../mfa';
|
|
5
|
+
export declare class IAMAuthenticationUserLocalService<CompleteContext extends object, InitiateContext extends object> extends IAMAuthenticationService<CompleteContext, InitiateContext> {
|
|
6
|
+
protected configProvider: ConfigProviderService;
|
|
7
|
+
protected logger: LoggerService;
|
|
8
|
+
protected moduleName: string;
|
|
9
|
+
protected serviceName: string;
|
|
10
|
+
protected mfaServices?: Record<IAMMFAType, IAMMFAService<object, object>> | undefined;
|
|
11
|
+
constructor(configProvider: ConfigProviderService, logger: LoggerService, moduleName: string, serviceName: string, mfaServices?: Record<IAMMFAType, IAMMFAService<object, object>> | undefined);
|
|
12
|
+
complete(data: IAMAuthenticationUserLocalCompleteData, options: IAMAuthenticationUserLocalCompleteOptions<CompleteContext>): Promise<IAMAuthenticationUserLocalCompleteResult>;
|
|
13
|
+
getUserCreateAccessTokenConfig(): IAMAuthenticationUserLocalGetUserCreateAccessTokenConfigResult;
|
|
14
|
+
initiate(data: IAMAuthenticationUserLocalInitiateData, options: IAMAuthenticationUserLocalInitiateOptions<InitiateContext>): Promise<IAMAuthenticationUserLocalInitiateResult>;
|
|
15
|
+
}
|
|
@@ -0,0 +1,142 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {
|
|
3
|
+
function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); }
|
|
4
|
+
return new (P || (P = Promise))(function (resolve, reject) {
|
|
5
|
+
function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }
|
|
6
|
+
function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } }
|
|
7
|
+
function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); }
|
|
8
|
+
step((generator = generator.apply(thisArg, _arguments || [])).next());
|
|
9
|
+
});
|
|
10
|
+
};
|
|
11
|
+
var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
12
|
+
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
13
|
+
};
|
|
14
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
15
|
+
exports.IAMAuthenticationUserLocalService = void 0;
|
|
16
|
+
const crypto_1 = __importDefault(require("crypto"));
|
|
17
|
+
const core_1 = require("@node-c/core");
|
|
18
|
+
const lodash_1 = __importDefault(require("lodash"));
|
|
19
|
+
const authentication_1 = require("../authentication");
|
|
20
|
+
class IAMAuthenticationUserLocalService extends authentication_1.IAMAuthenticationService {
|
|
21
|
+
constructor(configProvider, logger, moduleName, serviceName, mfaServices) {
|
|
22
|
+
super(configProvider, logger, moduleName);
|
|
23
|
+
this.configProvider = configProvider;
|
|
24
|
+
this.logger = logger;
|
|
25
|
+
this.moduleName = moduleName;
|
|
26
|
+
this.serviceName = serviceName;
|
|
27
|
+
this.mfaServices = mfaServices;
|
|
28
|
+
this.isLocal = true;
|
|
29
|
+
}
|
|
30
|
+
complete(data, options) {
|
|
31
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
32
|
+
const { configProvider, logger, moduleName, mfaServices, serviceName } = this;
|
|
33
|
+
const { defaultUserIdentifierField } = configProvider.config.domain[moduleName];
|
|
34
|
+
const { mfaData, mfaType } = data;
|
|
35
|
+
const { context, mfaOptions } = options;
|
|
36
|
+
const userIdentifierField = options.contextIdentifierField || defaultUserIdentifierField;
|
|
37
|
+
const userIdentifierValue = context[userIdentifierField];
|
|
38
|
+
let mfaUsed = false;
|
|
39
|
+
let mfaValid = false;
|
|
40
|
+
if (mfaType) {
|
|
41
|
+
const mfaService = mfaServices === null || mfaServices === void 0 ? void 0 : mfaServices[mfaType];
|
|
42
|
+
if (!mfaService) {
|
|
43
|
+
logger.error(`[${moduleName}][${serviceName}]: Login attempt failed for user "${userIdentifierValue}" - MFA service ${mfaType} not configured.`);
|
|
44
|
+
throw new core_1.ApplicationError('Authentication failed.');
|
|
45
|
+
}
|
|
46
|
+
if (!mfaData) {
|
|
47
|
+
logger.error(`[${moduleName}][${serviceName}]: Login attempt failed for user "${userIdentifierValue}" - no MFA data provided.`);
|
|
48
|
+
throw new core_1.ApplicationError('Authentication failed.');
|
|
49
|
+
}
|
|
50
|
+
const mfaResult = yield mfaService.complete(mfaData, Object.assign(Object.assign({}, (mfaOptions || {})), { context }));
|
|
51
|
+
mfaUsed = true;
|
|
52
|
+
mfaValid = mfaResult.valid;
|
|
53
|
+
}
|
|
54
|
+
return { mfaUsed, mfaValid, valid: true };
|
|
55
|
+
});
|
|
56
|
+
}
|
|
57
|
+
getUserCreateAccessTokenConfig() {
|
|
58
|
+
const { configProvider, moduleName, serviceName } = this;
|
|
59
|
+
const moduleConfig = configProvider.config.domain[moduleName];
|
|
60
|
+
const { steps } = moduleConfig.authServiceSettings[serviceName];
|
|
61
|
+
const defaultConfig = {
|
|
62
|
+
[core_1.AppConfigDomainIAMAuthenticationStep.Complete]: {
|
|
63
|
+
cache: {
|
|
64
|
+
settings: {
|
|
65
|
+
cacheFieldName: 'userId',
|
|
66
|
+
inputFieldName: 'options.context.id'
|
|
67
|
+
},
|
|
68
|
+
use: {
|
|
69
|
+
options: { overwrite: true, use: true }
|
|
70
|
+
}
|
|
71
|
+
},
|
|
72
|
+
findUser: true,
|
|
73
|
+
findUserBeforeAuth: true,
|
|
74
|
+
validWithoutUser: false
|
|
75
|
+
},
|
|
76
|
+
[core_1.AppConfigDomainIAMAuthenticationStep.Initiate]: {
|
|
77
|
+
cache: {
|
|
78
|
+
populate: {
|
|
79
|
+
options: [{ cacheFieldName: 'context', inputFieldName: 'options.context' }]
|
|
80
|
+
},
|
|
81
|
+
settings: {
|
|
82
|
+
cacheFieldName: 'userId',
|
|
83
|
+
inputFieldName: 'options.context.id'
|
|
84
|
+
}
|
|
85
|
+
},
|
|
86
|
+
findUser: true,
|
|
87
|
+
findUserBeforeAuth: true,
|
|
88
|
+
validWithoutUser: false
|
|
89
|
+
}
|
|
90
|
+
};
|
|
91
|
+
return lodash_1.default.merge(defaultConfig, steps || {});
|
|
92
|
+
}
|
|
93
|
+
initiate(data, options) {
|
|
94
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
95
|
+
const { configProvider, logger, moduleName, mfaServices, serviceName } = this;
|
|
96
|
+
const moduleConfig = configProvider.config.domain[moduleName];
|
|
97
|
+
const { secretKeyHMACAlgorithm, hashingSecret } = moduleConfig.authServiceSettings[serviceName].secretKey;
|
|
98
|
+
const { mfaData, mfaType, password: authPassword } = data;
|
|
99
|
+
const { context, context: { password: userPassword }, mfaOptions } = options;
|
|
100
|
+
const userIdentifierField = options.contextIdentifierField || moduleConfig.defaultUserIdentifierField;
|
|
101
|
+
const userIdentifierValue = context[userIdentifierField];
|
|
102
|
+
let mfaUsed = false;
|
|
103
|
+
let mfaValid = false;
|
|
104
|
+
let wrongPassword = false;
|
|
105
|
+
if (!secretKeyHMACAlgorithm || !hashingSecret || !userPassword) {
|
|
106
|
+
wrongPassword = true;
|
|
107
|
+
logger.error(`[${moduleName}][${serviceName}]: secretKeyHMACAlgorithm, hashingSecret and/or userPassword not provided.`);
|
|
108
|
+
}
|
|
109
|
+
else {
|
|
110
|
+
const computedPassword = crypto_1.default
|
|
111
|
+
.createHmac(secretKeyHMACAlgorithm, hashingSecret)
|
|
112
|
+
.update(`${authPassword}`)
|
|
113
|
+
.digest('hex')
|
|
114
|
+
.toString();
|
|
115
|
+
if (computedPassword !== userPassword) {
|
|
116
|
+
wrongPassword = true;
|
|
117
|
+
}
|
|
118
|
+
}
|
|
119
|
+
if (wrongPassword) {
|
|
120
|
+
logger.error(`[${moduleName}][${serviceName}]: Login attempt failed for user "${userIdentifierValue}" - wrong password.`);
|
|
121
|
+
throw new core_1.ApplicationError('Authentication failed.');
|
|
122
|
+
}
|
|
123
|
+
if (mfaType) {
|
|
124
|
+
const mfaService = mfaServices === null || mfaServices === void 0 ? void 0 : mfaServices[mfaType];
|
|
125
|
+
if (!mfaService) {
|
|
126
|
+
logger.error(`[${moduleName}][${serviceName}]: Login attempt failed for user "${userIdentifierValue}" - MFA service ${mfaType} not configured.`);
|
|
127
|
+
throw new core_1.ApplicationError('Authentication failed.');
|
|
128
|
+
}
|
|
129
|
+
if (!mfaData) {
|
|
130
|
+
logger.error(`[${moduleName}][${serviceName}]: Login attempt failed for user "${userIdentifierValue}" - no MFA data provided.`);
|
|
131
|
+
throw new core_1.ApplicationError('Authentication failed.');
|
|
132
|
+
}
|
|
133
|
+
const mfaResult = yield mfaService.initiate(mfaData, Object.assign(Object.assign({}, (mfaOptions || {})), { context }));
|
|
134
|
+
mfaUsed = true;
|
|
135
|
+
mfaValid = mfaResult.valid;
|
|
136
|
+
}
|
|
137
|
+
return { mfaUsed, mfaValid, valid: true };
|
|
138
|
+
});
|
|
139
|
+
}
|
|
140
|
+
}
|
|
141
|
+
exports.IAMAuthenticationUserLocalService = IAMAuthenticationUserLocalService;
|
|
142
|
+
//# sourceMappingURL=iam.authenticationUserLocal.service.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"iam.authenticationUserLocal.service.js","sourceRoot":"","sources":["../../../src/services/authenticationUserLocal/iam.authenticationUserLocal.service.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;AAAA,oDAA4B;AAE5B,uCAMsB;AAEtB,oDAAwB;AAYxB,sDAA6D;AAI7D,MAAa,iCAGX,SAAQ,yCAA0D;IAClE,YACY,cAAqC,EACrC,MAAqB,EACrB,UAAkB,EAElB,WAAmB,EAEnB,WAA+D;QAEzE,KAAK,CAAC,cAAc,EAAE,MAAM,EAAE,UAAU,CAAC,CAAC;QARhC,mBAAc,GAAd,cAAc,CAAuB;QACrC,WAAM,GAAN,MAAM,CAAe;QACrB,eAAU,GAAV,UAAU,CAAQ;QAElB,gBAAW,GAAX,WAAW,CAAQ;QAEnB,gBAAW,GAAX,WAAW,CAAoD;QAGzE,IAAI,CAAC,OAAO,GAAG,IAAI,CAAC;IACtB,CAAC;IAEK,QAAQ,CACZ,IAA4C,EAC5C,OAAmE;;YAEnE,MAAM,EAAE,cAAc,EAAE,MAAM,EAAE,UAAU,EAAE,WAAW,EAAE,WAAW,EAAE,GAAG,IAAI,CAAC;YAC9E,MAAM,EAAE,0BAA0B,EAAE,GAAG,cAAc,CAAC,MAAM,CAAC,MAAM,CAAC,UAAU,CAAuB,CAAC;YACtG,MAAM,EAAE,OAAO,EAAE,OAAO,EAAE,GAAG,IAAI,CAAC;YAClC,MAAM,EAAE,OAAO,EAAE,UAAU,EAAE,GAAG,OAAO,CAAC;YACxC,MAAM,mBAAmB,GAAG,OAAO,CAAC,sBAAsB,IAAI,0BAA0B,CAAC;YACzF,MAAM,mBAAmB,GAAG,OAAO,CAAC,mBAA4C,CAAC,CAAC;YAClF,IAAI,OAAO,GAAG,KAAK,CAAC;YACpB,IAAI,QAAQ,GAAG,KAAK,CAAC;YACrB,IAAI,OAAO,EAAE,CAAC;gBACZ,MAAM,UAAU,GAAG,WAAW,aAAX,WAAW,uBAAX,WAAW,CAAG,OAAO,CAAC,CAAC;gBAC1C,IAAI,CAAC,UAAU,EAAE,CAAC;oBAChB,MAAM,CAAC,KAAK,CACV,IAAI,UAAU,KAAK,WAAW,qCAAqC,mBAAmB,mBAAmB,OAAO,kBAAkB,CACnI,CAAC;oBACF,MAAM,IAAI,uBAAgB,CAAC,wBAAwB,CAAC,CAAC;gBACvD,CAAC;gBACD,IAAI,CAAC,OAAO,EAAE,CAAC;oBACb,MAAM,CAAC,KAAK,CACV,IAAI,UAAU,KAAK,WAAW,qCAAqC,mBAAmB,2BAA2B,CAClH,CAAC;oBACF,MAAM,IAAI,uBAAgB,CAAC,wBAAwB,CAAC,CAAC;gBACvD,CAAC;gBACD,MAAM,SAAS,GAAG,MAAM,UAAU,CAAC,QAAQ,CAAC,OAAO,kCAAO,CAAC,UAAU,IAAI,EAAE,CAAC,KAAE,OAAO,IAAG,CAAC;gBACzF,OAAO,GAAG,IAAI,CAAC;gBACf,QAAQ,GAAG,SAAS,CAAC,KAAK,CAAC;YAC7B,CAAC;YACD,OAAO,EAAE,OAAO,EAAE,QAAQ,EAAE,KAAK,EAAE,IAAI,EAAE,CAAC;QAC5C,CAAC;KAAA;IAED,8BAA8B;QAC5B,MAAM,EAAE,cAAc,EAAE,UAAU,EAAE,WAAW,EAAE,GAAG,IAAI,CAAC;QACzD,MAAM,YAAY,GAAG,cAAc,CAAC,MAAM,CAAC,MAAM,CAAC,UAAU,CAAuB,CAAC;QACpF,MAAM,EAAE,KAAK,EAAE,GAAG,YAAY,CAAC,mBAAoB,CAAC,WAAW,CAAC,CAAC;QACjE,MAAM,aAAa,GAAmE;YACpF,CAAC,2CAAoC,CAAC,QAAQ,CAAC,EAAE;gBAC/C,KAAK,EAAE;oBACL,QAAQ,EAAE;wBACR,cAAc,EAAE,QAAQ;wBACxB,cAAc,EAAE,oBAAoB;qBACrC;oBACD,GAAG,EAAE;wBACH,OAAO,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,GAAG,EAAE,IAAI,EAAE;qBACxC;iBACF;gBACD,QAAQ,EAAE,IAAI;gBACd,kBAAkB,EAAE,IAAI;gBACxB,gBAAgB,EAAE,KAAK;aACxB;YACD,CAAC,2CAAoC,CAAC,QAAQ,CAAC,EAAE;gBAC/C,KAAK,EAAE;oBACL,QAAQ,EAAE;wBACR,OAAO,EAAE,CAAC,EAAE,cAAc,EAAE,SAAS,EAAE,cAAc,EAAE,iBAAiB,EAAE,CAAC;qBAC5E;oBACD,QAAQ,EAAE;wBACR,cAAc,EAAE,QAAQ;wBACxB,cAAc,EAAE,oBAAoB;qBACrC;iBACF;gBACD,QAAQ,EAAE,IAAI;gBACd,kBAAkB,EAAE,IAAI;gBACxB,gBAAgB,EAAE,KAAK;aACxB;SACF,CAAC;QACF,OAAO,gBAAE,CAAC,KAAK,CAAC,aAAa,EAAE,KAAK,IAAI,EAAE,CAAC,CAAC;IAC9C,CAAC;IAEK,QAAQ,CACZ,IAA4C,EAC5C,OAAmE;;YAEnE,MAAM,EAAE,cAAc,EAAE,MAAM,EAAE,UAAU,EAAE,WAAW,EAAE,WAAW,EAAE,GAAG,IAAI,CAAC;YAC9E,MAAM,YAAY,GAAG,cAAc,CAAC,MAAM,CAAC,MAAM,CAAC,UAAU,CAAuB,CAAC;YACpF,MAAM,EAAE,sBAAsB,EAAE,aAAa,EAAE,GAAG,YAAY,CAAC,mBAAoB,CAAC,WAAW,CAAC,CAAC,SAAU,CAAC;YAC5G,MAAM,EAAE,OAAO,EAAE,OAAO,EAAE,QAAQ,EAAE,YAAY,EAAE,GAAG,IAAI,CAAC;YAC1D,MAAM,EACJ,OAAO,EACP,OAAO,EAAE,EAAE,QAAQ,EAAE,YAAY,EAAE,EACnC,UAAU,EACX,GAAG,OAAO,CAAC;YACZ,MAAM,mBAAmB,GAAG,OAAO,CAAC,sBAAsB,IAAI,YAAY,CAAC,0BAA0B,CAAC;YACtG,MAAM,mBAAmB,GAAG,OAAO,CAAC,mBAA4C,CAAC,CAAC;YAClF,IAAI,OAAO,GAAG,KAAK,CAAC;YACpB,IAAI,QAAQ,GAAG,KAAK,CAAC;YACrB,IAAI,aAAa,GAAG,KAAK,CAAC;YAC1B,IAAI,CAAC,sBAAsB,IAAI,CAAC,aAAa,IAAI,CAAC,YAAY,EAAE,CAAC;gBAC/D,aAAa,GAAG,IAAI,CAAC;gBACrB,MAAM,CAAC,KAAK,CACV,IAAI,UAAU,KAAK,WAAW,4EAA4E,CAC3G,CAAC;YACJ,CAAC;iBAAM,CAAC;gBACN,MAAM,gBAAgB,GAAG,gBAAM;qBAC5B,UAAU,CAAC,sBAAsB,EAAE,aAAa,CAAC;qBACjD,MAAM,CAAC,GAAG,YAAY,EAAE,CAAC;qBACzB,MAAM,CAAC,KAAK,CAAC;qBACb,QAAQ,EAAE,CAAC;gBACd,IAAI,gBAAgB,KAAK,YAAY,EAAE,CAAC;oBACtC,aAAa,GAAG,IAAI,CAAC;gBACvB,CAAC;YACH,CAAC;YACD,IAAI,aAAa,EAAE,CAAC;gBAClB,MAAM,CAAC,KAAK,CACV,IAAI,UAAU,KAAK,WAAW,qCAAqC,mBAAmB,qBAAqB,CAC5G,CAAC;gBACF,MAAM,IAAI,uBAAgB,CAAC,wBAAwB,CAAC,CAAC;YACvD,CAAC;YACD,IAAI,OAAO,EAAE,CAAC;gBACZ,MAAM,UAAU,GAAG,WAAW,aAAX,WAAW,uBAAX,WAAW,CAAG,OAAO,CAAC,CAAC;gBAC1C,IAAI,CAAC,UAAU,EAAE,CAAC;oBAChB,MAAM,CAAC,KAAK,CACV,IAAI,UAAU,KAAK,WAAW,qCAAqC,mBAAmB,mBAAmB,OAAO,kBAAkB,CACnI,CAAC;oBACF,MAAM,IAAI,uBAAgB,CAAC,wBAAwB,CAAC,CAAC;gBACvD,CAAC;gBACD,IAAI,CAAC,OAAO,EAAE,CAAC;oBACb,MAAM,CAAC,KAAK,CACV,IAAI,UAAU,KAAK,WAAW,qCAAqC,mBAAmB,2BAA2B,CAClH,CAAC;oBACF,MAAM,IAAI,uBAAgB,CAAC,wBAAwB,CAAC,CAAC;gBACvD,CAAC;gBACD,MAAM,SAAS,GAAG,MAAM,UAAU,CAAC,QAAQ,CAAC,OAAO,kCAAO,CAAC,UAAU,IAAI,EAAE,CAAC,KAAE,OAAO,IAAG,CAAC;gBACzF,OAAO,GAAG,IAAI,CAAC;gBACf,QAAQ,GAAG,SAAS,CAAC,KAAK,CAAC;YAC7B,CAAC;YACD,OAAO,EAAE,OAAO,EAAE,QAAQ,EAAE,KAAK,EAAE,IAAI,EAAE,CAAC;QAC5C,CAAC;KAAA;CACF;AAlJD,8EAkJC"}
|
|
@@ -14,6 +14,6 @@ var __exportStar = (this && this.__exportStar) || function(m, exports) {
|
|
|
14
14
|
for (var p in m) if (p !== "default" && !Object.prototype.hasOwnProperty.call(exports, p)) __createBinding(exports, m, p);
|
|
15
15
|
};
|
|
16
16
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
17
|
-
__exportStar(require("./iam.
|
|
18
|
-
__exportStar(require("./iam.
|
|
17
|
+
__exportStar(require("./iam.authenticationUserLocal.definitions"), exports);
|
|
18
|
+
__exportStar(require("./iam.authenticationUserLocal.service"), exports);
|
|
19
19
|
//# sourceMappingURL=index.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../../src/services/authenticationUserLocal/index.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;AAAA,4EAA0D;AAC1D,wEAAsD"}
|
|
@@ -1,37 +1,47 @@
|
|
|
1
1
|
import { GenericObject } from '@node-c/core';
|
|
2
|
+
export declare enum AuthorizationCheckErrorCode {
|
|
3
|
+
FGANoAccessToModule = "FGA_NO_ACCESS",
|
|
4
|
+
RBACNoAccessToModule = "RBAC_NO_ACCESS_TO_MODULE",
|
|
5
|
+
RBACNoAccessToResource = "RBAC_NO_ACCESS_TO_RESOURCE"
|
|
6
|
+
}
|
|
2
7
|
export interface AuthorizationPoint<Id> {
|
|
3
8
|
allowedInputData?: GenericObject;
|
|
4
|
-
|
|
9
|
+
allowedOutputData?: GenericObject;
|
|
5
10
|
forbiddenInputData?: GenericObject;
|
|
6
|
-
|
|
11
|
+
forbiddenOutputData?: GenericObject;
|
|
7
12
|
id: Id;
|
|
8
13
|
inputDataFieldName?: string;
|
|
9
|
-
|
|
14
|
+
moduleName: string;
|
|
10
15
|
name: string;
|
|
11
16
|
requiredStaticData?: GenericObject;
|
|
17
|
+
resources?: string[];
|
|
18
|
+
resourceContext?: string;
|
|
12
19
|
userFieldName?: string;
|
|
13
|
-
userTypes: GenericObject[];
|
|
14
20
|
}
|
|
15
|
-
export interface
|
|
16
|
-
|
|
17
|
-
|
|
18
|
-
|
|
19
|
-
|
|
20
|
-
|
|
21
|
-
|
|
22
|
-
|
|
23
|
-
|
|
24
|
-
|
|
25
|
-
|
|
26
|
-
[authorizationPointId: string | number]: AuthorizationPoint<AuthorizationPointId>;
|
|
27
|
-
};
|
|
28
|
-
[handlerName: string]: {
|
|
29
|
-
[authorizationPointId: string | number]: AuthorizationPoint<AuthorizationPointId>;
|
|
30
|
-
};
|
|
31
|
-
};
|
|
21
|
+
export interface AuthorizationStaticCheckAccessOptions {
|
|
22
|
+
moduleName: string;
|
|
23
|
+
resource?: string;
|
|
24
|
+
resourceContext?: string;
|
|
25
|
+
}
|
|
26
|
+
export interface AuthorizationStaticCheckAccessResult {
|
|
27
|
+
authorizationPoints: GenericObject<AuthorizationPoint<unknown>>;
|
|
28
|
+
errorCode?: AuthorizationCheckErrorCode;
|
|
29
|
+
hasAccess: boolean;
|
|
30
|
+
inputDataToBeMutated: GenericObject;
|
|
31
|
+
noMatchForResource: boolean;
|
|
32
32
|
}
|
|
33
33
|
export interface AuthorizationUser<AuthorizationPointId> {
|
|
34
|
-
currentAuthorizationPoints:
|
|
35
|
-
|
|
34
|
+
currentAuthorizationPoints: GenericObject<AuthorizationPoint<AuthorizationPointId>>;
|
|
35
|
+
}
|
|
36
|
+
export interface AuthorizeApiKeyData {
|
|
37
|
+
apiKey: string;
|
|
38
|
+
signature?: string;
|
|
39
|
+
signatureContent?: string;
|
|
40
|
+
}
|
|
41
|
+
export interface AuthorizeApiKeyOptions {
|
|
42
|
+
config: {
|
|
43
|
+
apiKey?: string;
|
|
44
|
+
apiSecret?: string;
|
|
45
|
+
apiSecretAlgorithm?: string;
|
|
36
46
|
};
|
|
37
47
|
}
|
|
@@ -1,3 +1,10 @@
|
|
|
1
1
|
"use strict";
|
|
2
2
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.AuthorizationCheckErrorCode = void 0;
|
|
4
|
+
var AuthorizationCheckErrorCode;
|
|
5
|
+
(function (AuthorizationCheckErrorCode) {
|
|
6
|
+
AuthorizationCheckErrorCode["FGANoAccessToModule"] = "FGA_NO_ACCESS";
|
|
7
|
+
AuthorizationCheckErrorCode["RBACNoAccessToModule"] = "RBAC_NO_ACCESS_TO_MODULE";
|
|
8
|
+
AuthorizationCheckErrorCode["RBACNoAccessToResource"] = "RBAC_NO_ACCESS_TO_RESOURCE";
|
|
9
|
+
})(AuthorizationCheckErrorCode || (exports.AuthorizationCheckErrorCode = AuthorizationCheckErrorCode = {}));
|
|
3
10
|
//# sourceMappingURL=iam.authorization.definitions.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"iam.authorization.definitions.js","sourceRoot":"","sources":["../../../src/services/authorization/iam.authorization.definitions.ts"],"names":[],"mappings":""}
|
|
1
|
+
{"version":3,"file":"iam.authorization.definitions.js","sourceRoot":"","sources":["../../../src/services/authorization/iam.authorization.definitions.ts"],"names":[],"mappings":";;;AAEA,IAAY,2BAOX;AAPD,WAAY,2BAA2B;IAErC,oEAAqC,CAAA;IAErC,gFAAiD,CAAA;IAEjD,oFAAqD,CAAA;AACvD,CAAC,EAPW,2BAA2B,2CAA3B,2BAA2B,QAOtC"}
|
|
@@ -1,18 +1,34 @@
|
|
|
1
|
-
import {
|
|
2
|
-
import {
|
|
3
|
-
|
|
4
|
-
|
|
1
|
+
import { DataEntityService, DomainEntityService, DomainEntityServiceDefaultData, GenericObject, LoggerService } from '@node-c/core';
|
|
2
|
+
import { AuthorizationStaticCheckAccessOptions, AuthorizationStaticCheckAccessResult, AuthorizationUser, AuthorizeApiKeyData, AuthorizeApiKeyOptions, AuthorizationPoint as BaseAuthorizationPoint } from './iam.authorization.definitions';
|
|
3
|
+
import { DecodedTokenContent, IAMTokenManagerService } from '../tokenManager';
|
|
4
|
+
export declare class IAMAuthorizationService<AuthorizationPoint extends BaseAuthorizationPoint<unknown> = BaseAuthorizationPoint<unknown>, Data extends DomainEntityServiceDefaultData<Partial<AuthorizationPoint>> = DomainEntityServiceDefaultData<Partial<AuthorizationPoint>>, TokenManager extends IAMTokenManagerService<object> = IAMTokenManagerService<object>> extends DomainEntityService<AuthorizationPoint, DataEntityService<AuthorizationPoint>, Data, Record<string, DataEntityService<Partial<AuthorizationPoint>>> | undefined> {
|
|
5
|
+
protected dataAuthorizationPointsService: DataEntityService<AuthorizationPoint>;
|
|
5
6
|
protected defaultMethods: string[];
|
|
6
|
-
protected
|
|
7
|
-
|
|
8
|
-
|
|
9
|
-
|
|
10
|
-
|
|
11
|
-
|
|
12
|
-
|
|
13
|
-
|
|
7
|
+
protected logger: LoggerService;
|
|
8
|
+
protected additionalDataEntityServices?: GenericObject<DataEntityService<Partial<AuthorizationPoint>>> | undefined;
|
|
9
|
+
protected tokenManager?: TokenManager | undefined;
|
|
10
|
+
constructor(dataAuthorizationPointsService: DataEntityService<AuthorizationPoint>, defaultMethods: string[] | undefined, logger: LoggerService, additionalDataEntityServices?: GenericObject<DataEntityService<Partial<AuthorizationPoint>>> | undefined, tokenManager?: TokenManager | undefined);
|
|
11
|
+
authorizeApiKey(data: AuthorizeApiKeyData, options: AuthorizeApiKeyOptions): Promise<{
|
|
12
|
+
valid: boolean;
|
|
13
|
+
}>;
|
|
14
|
+
authorizeBearer<UserTokenEnityFields = unknown>(data: {
|
|
15
|
+
authToken?: string;
|
|
16
|
+
refreshToken?: string;
|
|
17
|
+
}, options?: {
|
|
18
|
+
identifierDataField?: string;
|
|
19
|
+
}): Promise<{
|
|
20
|
+
newAuthToken?: string;
|
|
21
|
+
tokenContent?: DecodedTokenContent<UserTokenEnityFields>;
|
|
22
|
+
valid: boolean;
|
|
23
|
+
}>;
|
|
24
|
+
checkAccessWithStorage(): Promise<void>;
|
|
25
|
+
static checkAccess<InputData = GenericObject>(inputData: InputData, user: AuthorizationUser<unknown>, options: AuthorizationStaticCheckAccessOptions): AuthorizationStaticCheckAccessResult;
|
|
14
26
|
static getValuesForTesting(valueToTest: unknown): unknown[];
|
|
15
|
-
mapAuthorizationPoints(moduleName: string, additionalServicesOptions?: DomainBaseOptionsForAdditionalServicesFull): Promise<AuthorizationData<unknown>>;
|
|
16
27
|
static matchInputValues(input: GenericObject, values: GenericObject): GenericObject;
|
|
28
|
+
static processOutputData(authorizationPoints: {
|
|
29
|
+
[id: number]: BaseAuthorizationPoint<unknown>;
|
|
30
|
+
}, outputData: GenericObject): {
|
|
31
|
+
outputDataToBeMutated: GenericObject;
|
|
32
|
+
};
|
|
17
33
|
static testValue(valueToTest: unknown, valueToTestAgainst: unknown): boolean;
|
|
18
34
|
}
|