@pax2pay/model-banking 0.1.476 → 0.1.478
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/Identity.ts +18 -3
- package/dist/cjs/Identity.d.ts +8 -2
- package/dist/cjs/Identity.js +4 -1
- package/dist/cjs/Identity.js.map +1 -1
- package/dist/mjs/Identity.d.ts +8 -2
- package/dist/mjs/Identity.js +4 -1
- package/dist/mjs/Identity.js.map +1 -1
- package/package.json +7 -6
package/Identity.ts
CHANGED
|
@@ -1,5 +1,6 @@
|
|
|
1
1
|
import { gracely } from "gracely"
|
|
2
2
|
import { userwidgets } from "@userwidgets/model"
|
|
3
|
+
import { slackly } from "slackly"
|
|
3
4
|
import { Key } from "./Key"
|
|
4
5
|
import { Realm } from "./Realm"
|
|
5
6
|
|
|
@@ -35,21 +36,24 @@ export class Identity<T extends Identity.Require = never> {
|
|
|
35
36
|
constraint: Key.Permissions | Key.Permissions[],
|
|
36
37
|
requires?: T,
|
|
37
38
|
verifier?: userwidgets.User.Key.Verifier<Key>,
|
|
38
|
-
output?: "undefined"
|
|
39
|
+
output?: "undefined",
|
|
40
|
+
notify?: Identity.Notify
|
|
39
41
|
): Promise<Identity<T> | undefined>
|
|
40
42
|
static async authenticate<T extends Identity.Require = Record<string, never>>(
|
|
41
43
|
header: { authorization?: string | undefined; realm?: Realm; organization?: string },
|
|
42
44
|
constraint: Key.Permissions | Key.Permissions[],
|
|
43
45
|
requires?: T,
|
|
44
46
|
verifier?: userwidgets.User.Key.Verifier<Key>,
|
|
45
|
-
output?: "error"
|
|
47
|
+
output?: "error",
|
|
48
|
+
notify?: Identity.Notify
|
|
46
49
|
): Promise<Identity<T> | gracely.Error>
|
|
47
50
|
static async authenticate<T extends Identity.Require = Record<string, never>>(
|
|
48
51
|
header: { authorization?: string | undefined; realm?: Realm; organization?: string },
|
|
49
52
|
constraint: Key.Permissions | Key.Permissions[],
|
|
50
53
|
requires?: T,
|
|
51
54
|
verifier: userwidgets.User.Key.Verifier<Key> = productionVerifier,
|
|
52
|
-
output: "error" | "undefined" = "undefined"
|
|
55
|
+
output: "error" | "undefined" = "undefined",
|
|
56
|
+
notify?: Identity.Notify
|
|
53
57
|
): Promise<Identity<T> | (gracely.Error | undefined)> {
|
|
54
58
|
let result: Identity<T> | gracely.Error | undefined
|
|
55
59
|
const authorization = header.authorization?.startsWith("Bearer ")
|
|
@@ -76,6 +80,12 @@ export class Identity<T extends Identity.Require = never> {
|
|
|
76
80
|
(identity?.check(constraint) && requirement(identity) && identity) ||
|
|
77
81
|
(output === "undefined" ? undefined : gracely.client.forbidden())
|
|
78
82
|
}
|
|
83
|
+
gracely.Error.is(result) &&
|
|
84
|
+
result.type == "forbidden" &&
|
|
85
|
+
(await notify?.slack.send(
|
|
86
|
+
"monitoring",
|
|
87
|
+
`Unauthorized access attempt at ${notify.method.toUpperCase()} ${notify.endpoint}`
|
|
88
|
+
))
|
|
79
89
|
return result
|
|
80
90
|
}
|
|
81
91
|
static async verify(
|
|
@@ -105,6 +115,11 @@ export namespace Identity {
|
|
|
105
115
|
realm?: Realm
|
|
106
116
|
organization?: string
|
|
107
117
|
}
|
|
118
|
+
export type Notify = {
|
|
119
|
+
slack: slackly.Connection<["monitoring"]>
|
|
120
|
+
endpoint: string
|
|
121
|
+
method: string
|
|
122
|
+
}
|
|
108
123
|
}
|
|
109
124
|
const publicKey =
|
|
110
125
|
"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"
|
package/dist/cjs/Identity.d.ts
CHANGED
|
@@ -1,5 +1,6 @@
|
|
|
1
1
|
import { gracely } from "gracely";
|
|
2
2
|
import { userwidgets } from "@userwidgets/model";
|
|
3
|
+
import { slackly } from "slackly";
|
|
3
4
|
import { Key } from "./Key";
|
|
4
5
|
import { Realm } from "./Realm";
|
|
5
6
|
export declare class Identity<T extends Identity.Require = never> {
|
|
@@ -11,12 +12,12 @@ export declare class Identity<T extends Identity.Require = never> {
|
|
|
11
12
|
constructor(key: Key, realm: T["realm"] extends true ? Realm : Realm | undefined, organization: T["organization"] extends true ? string : string | undefined);
|
|
12
13
|
check(constraint: Key.Permissions | Key.Permissions[], realm?: Realm, organization?: string): boolean;
|
|
13
14
|
collectionCheck(collection: string): boolean;
|
|
14
|
-
static authenticate<T extends Identity.Require = Record<string, never>>(header: Identity.Header, constraint: Key.Permissions | Key.Permissions[], requires?: T, verifier?: userwidgets.User.Key.Verifier<Key>, output?: "undefined"): Promise<Identity<T> | undefined>;
|
|
15
|
+
static authenticate<T extends Identity.Require = Record<string, never>>(header: Identity.Header, constraint: Key.Permissions | Key.Permissions[], requires?: T, verifier?: userwidgets.User.Key.Verifier<Key>, output?: "undefined", notify?: Identity.Notify): Promise<Identity<T> | undefined>;
|
|
15
16
|
static authenticate<T extends Identity.Require = Record<string, never>>(header: {
|
|
16
17
|
authorization?: string | undefined;
|
|
17
18
|
realm?: Realm;
|
|
18
19
|
organization?: string;
|
|
19
|
-
}, constraint: Key.Permissions | Key.Permissions[], requires?: T, verifier?: userwidgets.User.Key.Verifier<Key>, output?: "error"): Promise<Identity<T> | gracely.Error>;
|
|
20
|
+
}, constraint: Key.Permissions | Key.Permissions[], requires?: T, verifier?: userwidgets.User.Key.Verifier<Key>, output?: "error", notify?: Identity.Notify): Promise<Identity<T> | gracely.Error>;
|
|
20
21
|
static verify(authorization: string | undefined, verifier?: userwidgets.User.Key.Verifier<Key>): Promise<Key | undefined>;
|
|
21
22
|
static getRealms(permissions: Key.Permissions): Realm[];
|
|
22
23
|
}
|
|
@@ -30,4 +31,9 @@ export declare namespace Identity {
|
|
|
30
31
|
realm?: Realm;
|
|
31
32
|
organization?: string;
|
|
32
33
|
}
|
|
34
|
+
type Notify = {
|
|
35
|
+
slack: slackly.Connection<["monitoring"]>;
|
|
36
|
+
endpoint: string;
|
|
37
|
+
method: string;
|
|
38
|
+
};
|
|
33
39
|
}
|
package/dist/cjs/Identity.js
CHANGED
|
@@ -30,7 +30,7 @@ class Identity {
|
|
|
30
30
|
collectionCheck(collection) {
|
|
31
31
|
return Object.values(this.key.permissions).some(value => (typeof value == "object" && value[collection]) || value == true);
|
|
32
32
|
}
|
|
33
|
-
static async authenticate(header, constraint, requires, verifier = productionVerifier, output = "undefined") {
|
|
33
|
+
static async authenticate(header, constraint, requires, verifier = productionVerifier, output = "undefined", notify) {
|
|
34
34
|
let result;
|
|
35
35
|
const authorization = header.authorization?.startsWith("Bearer ")
|
|
36
36
|
? header.authorization.replace("Bearer ", "")
|
|
@@ -47,6 +47,9 @@ class Identity {
|
|
|
47
47
|
(identity?.check(constraint) && requirement(identity) && identity) ||
|
|
48
48
|
(output === "undefined" ? undefined : gracely_1.gracely.client.forbidden());
|
|
49
49
|
}
|
|
50
|
+
gracely_1.gracely.Error.is(result) &&
|
|
51
|
+
result.type == "forbidden" &&
|
|
52
|
+
(await notify?.slack.send("monitoring", `Unauthorized access attempt at ${notify.method.toUpperCase()} ${notify.endpoint}`));
|
|
50
53
|
return result;
|
|
51
54
|
}
|
|
52
55
|
static async verify(authorization, verifier = productionVerifier) {
|
package/dist/cjs/Identity.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"Identity.js","sourceRoot":"","sources":["../../Identity.ts"],"names":[],"mappings":";;;AAAA,qCAAiC;AACjC,8CAAgD;
|
|
1
|
+
{"version":3,"file":"Identity.js","sourceRoot":"","sources":["../../Identity.ts"],"names":[],"mappings":";;;AAAA,qCAAiC;AACjC,8CAAgD;AAGhD,mCAA+B;AAE/B,MAAa,QAAQ;IAOV;IACA;IACA;IARV,OAAO,CAAqB;IAC5B,IAAI,MAAM;QACT,OAAO,CAAC,IAAI,CAAC,OAAO,KAAK,QAAQ,CAAC,SAAS,CAAC,IAAI,CAAC,GAAG,CAAC,WAAW,CAAC,CAAC,CAAA;IACnE,CAAC;IAED,YACU,GAAQ,EACR,KAA0D,EAC1D,YAA0E;QAF1E,QAAG,GAAH,GAAG,CAAK;QACR,UAAK,GAAL,KAAK,CAAqD;QAC1D,iBAAY,GAAZ,YAAY,CAA8D;IACjF,CAAC;IACJ,KAAK,CAAC,UAA+C,EAAE,KAAa,EAAE,YAAqB;QAC1F,OAAO,KAAK,CAAC,OAAO,CAAC,UAAU,CAAC;YAC/B,CAAC,CAAC,UAAU,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,EAAE,KAAK,EAAE,YAAY,CAAC,CAAC;YAC1D,CAAC,CAAC;gBACA,EAAE,CAAC,GAAG,KAAK,IAAI,IAAI,CAAC,KAAK,IAAI,YAAY,IAAI,IAAI,CAAC,YAAY,EAAE,CAAC,EAAE,UAAU,EAAE;gBAC/E,EAAE,CAAC,GAAG,YAAY,IAAI,IAAI,CAAC,YAAY,EAAE,CAAC,EAAE,UAAU,EAAE;gBACxD,EAAE,CAAC,GAAG,KAAK,IAAI,IAAI,CAAC,KAAK,IAAI,CAAC,EAAE,UAAU,EAAE;gBAC5C,EAAE,CAAC,KAAK,CAAC,EAAE,UAAU,EAAE;aACtB,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,mBAAW,CAAC,IAAI,CAAC,WAAW,CAAC,KAAK,CAAC,IAAI,CAAC,GAAG,CAAC,WAAW,EAAE,CAAC,CAAC,CAAC,CAAA;IAC5E,CAAC;IACD,eAAe,CAAC,UAAkB;QACjC,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,GAAG,CAAC,WAAW,CAAC,CAAC,IAAI,CAC9C,KAAK,CAAC,EAAE,CAAC,CAAC,OAAO,KAAK,IAAI,QAAQ,IAAI,KAAK,CAAC,UAAU,CAAC,CAAC,IAAI,KAAK,IAAI,IAAI,CACzE,CAAA;IACF,CAAC;IAkBD,MAAM,CAAC,KAAK,CAAC,YAAY,CACxB,MAAoF,EACpF,UAA+C,EAC/C,QAAY,EACZ,WAA+C,kBAAkB,EACjE,SAAgC,WAAW,EAC3C,MAAwB;QAExB,IAAI,MAA+C,CAAA;QACnD,MAAM,aAAa,GAAG,MAAM,CAAC,aAAa,EAAE,UAAU,CAAC,SAAS,CAAC;YAChE,CAAC,CAAC,MAAM,CAAC,aAAa,CAAC,OAAO,CAAC,SAAS,EAAE,EAAE,CAAC;YAC7C,CAAC,CAAC,SAAS,CAAA;QACZ,MAAM,GAAG,GAAG,MAAM,QAAQ,CAAC,MAAM,CAAC,aAAa,EAAE,QAAQ,CAAC,CAAA;QAC1D,IAAI,CAAC,GAAG;YACP,MAAM,KAAK,WAAW,IAAI,CAAC,MAAM,GAAG,iBAAO,CAAC,MAAM,CAAC,YAAY,EAAE,CAAC,CAAA;aAC9D,CAAC;YACL,MAAM,MAAM,GAAG,QAAQ,CAAC,SAAS,CAAC,GAAG,CAAC,WAAW,CAAC,CAAA;YAClD,MAAM,QAAQ,GAAG,IAAI,QAAQ,CAC5B,GAAG,EACH,CAAC,MAAM,EAAE,MAAM,IAAI,CAAC,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,MAAM,CAAC,KAAK,CAAU,EACzD,CAAC,GAAG,CAAC,YAAY,IAAI,MAAM,CAAC,YAAY,CAAW,CACnD,CAAA;YACD,MAAM,WAAW,GAAG,CACnB,KAA2B,EAGf,EAAE,CACd,CAAC,QAAQ,EAAE,YAAY,CAAC,CAAC,CAAC,CAAC,CAAC,QAAQ,EAAE,YAAY,CAAC,CAAC,CAAC,IAAI,CAAC;gBAC1D,CAAC,QAAQ,EAAE,KAAK,CAAC,CAAC,CAAC,aAAK,CAAC,IAAI,CAAC,EAAE,CAAC,QAAQ,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,CAAA;YAC1D,MAAM;gBACL,CAAC,QAAQ,EAAE,KAAK,CAAC,UAAU,CAAC,IAAI,WAAW,CAAC,QAAQ,CAAC,IAAI,QAAQ,CAAC;oBAClE,CAAC,MAAM,KAAK,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,iBAAO,CAAC,MAAM,CAAC,SAAS,EAAE,CAAC,CAAA;QACnE,CAAC;QACD,iBAAO,CAAC,KAAK,CAAC,EAAE,CAAC,MAAM,CAAC;YACvB,MAAM,CAAC,IAAI,IAAI,WAAW;YAC1B,CAAC,MAAM,MAAM,EAAE,KAAK,CAAC,IAAI,CACxB,YAAY,EACZ,kCAAkC,MAAM,CAAC,MAAM,CAAC,WAAW,EAAE,IAAI,MAAM,CAAC,QAAQ,EAAE,CAClF,CAAC,CAAA;QACH,OAAO,MAAM,CAAA;IACd,CAAC;IACD,MAAM,CAAC,KAAK,CAAC,MAAM,CAClB,aAAiC,EACjC,WAA+C,kBAAkB;QAEjE,OAAO,MAAM,QAAQ,CAAC,MAAM,CAAC,aAAa,CAAC,CAAA;IAC5C,CAAC;IACD,MAAM,CAAC,SAAS,CAAC,WAA4B;QAC5C,OAAO;YACN,GAAG,IAAI,GAAG,CACT,MAAM,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,OAAO,CAAC,IAAI,CAAC,EAAE,CACvC,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,IAAI,GAAG,CAAC,CAAC,CAAC,aAAK,CAAC,MAAM,CAAC,CAAC,CAAC,aAAK,CAAC,IAAI,CAAC,GAAG,CAAC,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,IAAI,EAAE,CACnF,CACD;SACD,CAAA;IACF,CAAC;CACD;AAnGD,4BAmGC;AAkBD,MAAM,SAAS,GACd,kuBAAkuB,CAAA;AACnuB,MAAM,kBAAkB,GAAG,mBAAW,CAAC,IAAI,CAAC,GAAG,CAAC,QAAQ,CAAC,MAAM,CAAM,SAAS,CAAC,CAAA"}
|
package/dist/mjs/Identity.d.ts
CHANGED
|
@@ -1,5 +1,6 @@
|
|
|
1
1
|
import { gracely } from "gracely";
|
|
2
2
|
import { userwidgets } from "@userwidgets/model";
|
|
3
|
+
import { slackly } from "slackly";
|
|
3
4
|
import { Key } from "./Key";
|
|
4
5
|
import { Realm } from "./Realm";
|
|
5
6
|
export declare class Identity<T extends Identity.Require = never> {
|
|
@@ -11,12 +12,12 @@ export declare class Identity<T extends Identity.Require = never> {
|
|
|
11
12
|
constructor(key: Key, realm: T["realm"] extends true ? Realm : Realm | undefined, organization: T["organization"] extends true ? string : string | undefined);
|
|
12
13
|
check(constraint: Key.Permissions | Key.Permissions[], realm?: Realm, organization?: string): boolean;
|
|
13
14
|
collectionCheck(collection: string): boolean;
|
|
14
|
-
static authenticate<T extends Identity.Require = Record<string, never>>(header: Identity.Header, constraint: Key.Permissions | Key.Permissions[], requires?: T, verifier?: userwidgets.User.Key.Verifier<Key>, output?: "undefined"): Promise<Identity<T> | undefined>;
|
|
15
|
+
static authenticate<T extends Identity.Require = Record<string, never>>(header: Identity.Header, constraint: Key.Permissions | Key.Permissions[], requires?: T, verifier?: userwidgets.User.Key.Verifier<Key>, output?: "undefined", notify?: Identity.Notify): Promise<Identity<T> | undefined>;
|
|
15
16
|
static authenticate<T extends Identity.Require = Record<string, never>>(header: {
|
|
16
17
|
authorization?: string | undefined;
|
|
17
18
|
realm?: Realm;
|
|
18
19
|
organization?: string;
|
|
19
|
-
}, constraint: Key.Permissions | Key.Permissions[], requires?: T, verifier?: userwidgets.User.Key.Verifier<Key>, output?: "error"): Promise<Identity<T> | gracely.Error>;
|
|
20
|
+
}, constraint: Key.Permissions | Key.Permissions[], requires?: T, verifier?: userwidgets.User.Key.Verifier<Key>, output?: "error", notify?: Identity.Notify): Promise<Identity<T> | gracely.Error>;
|
|
20
21
|
static verify(authorization: string | undefined, verifier?: userwidgets.User.Key.Verifier<Key>): Promise<Key | undefined>;
|
|
21
22
|
static getRealms(permissions: Key.Permissions): Realm[];
|
|
22
23
|
}
|
|
@@ -30,4 +31,9 @@ export declare namespace Identity {
|
|
|
30
31
|
realm?: Realm;
|
|
31
32
|
organization?: string;
|
|
32
33
|
}
|
|
34
|
+
type Notify = {
|
|
35
|
+
slack: slackly.Connection<["monitoring"]>;
|
|
36
|
+
endpoint: string;
|
|
37
|
+
method: string;
|
|
38
|
+
};
|
|
33
39
|
}
|
package/dist/mjs/Identity.js
CHANGED
|
@@ -27,7 +27,7 @@ export class Identity {
|
|
|
27
27
|
collectionCheck(collection) {
|
|
28
28
|
return Object.values(this.key.permissions).some(value => (typeof value == "object" && value[collection]) || value == true);
|
|
29
29
|
}
|
|
30
|
-
static async authenticate(header, constraint, requires, verifier = productionVerifier, output = "undefined") {
|
|
30
|
+
static async authenticate(header, constraint, requires, verifier = productionVerifier, output = "undefined", notify) {
|
|
31
31
|
let result;
|
|
32
32
|
const authorization = header.authorization?.startsWith("Bearer ")
|
|
33
33
|
? header.authorization.replace("Bearer ", "")
|
|
@@ -44,6 +44,9 @@ export class Identity {
|
|
|
44
44
|
(identity?.check(constraint) && requirement(identity) && identity) ||
|
|
45
45
|
(output === "undefined" ? undefined : gracely.client.forbidden());
|
|
46
46
|
}
|
|
47
|
+
gracely.Error.is(result) &&
|
|
48
|
+
result.type == "forbidden" &&
|
|
49
|
+
(await notify?.slack.send("monitoring", `Unauthorized access attempt at ${notify.method.toUpperCase()} ${notify.endpoint}`));
|
|
47
50
|
return result;
|
|
48
51
|
}
|
|
49
52
|
static async verify(authorization, verifier = productionVerifier) {
|
package/dist/mjs/Identity.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"Identity.js","sourceRoot":"","sources":["../../Identity.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,OAAO,EAAE,MAAM,SAAS,CAAA;AACjC,OAAO,EAAE,WAAW,EAAE,MAAM,oBAAoB,CAAA;
|
|
1
|
+
{"version":3,"file":"Identity.js","sourceRoot":"","sources":["../../Identity.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,OAAO,EAAE,MAAM,SAAS,CAAA;AACjC,OAAO,EAAE,WAAW,EAAE,MAAM,oBAAoB,CAAA;AAGhD,OAAO,EAAE,KAAK,EAAE,MAAM,SAAS,CAAA;AAE/B,MAAM,OAAO,QAAQ;IAOV;IACA;IACA;IARV,OAAO,CAAqB;IAC5B,IAAI,MAAM;QACT,OAAO,CAAC,IAAI,CAAC,OAAO,KAAK,QAAQ,CAAC,SAAS,CAAC,IAAI,CAAC,GAAG,CAAC,WAAW,CAAC,CAAC,CAAA;IACnE,CAAC;IAED,YACU,GAAQ,EACR,KAA0D,EAC1D,YAA0E;QAF1E,QAAG,GAAH,GAAG,CAAK;QACR,UAAK,GAAL,KAAK,CAAqD;QAC1D,iBAAY,GAAZ,YAAY,CAA8D;IACjF,CAAC;IACJ,KAAK,CAAC,UAA+C,EAAE,KAAa,EAAE,YAAqB;QAC1F,OAAO,KAAK,CAAC,OAAO,CAAC,UAAU,CAAC;YAC/B,CAAC,CAAC,UAAU,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,EAAE,KAAK,EAAE,YAAY,CAAC,CAAC;YAC1D,CAAC,CAAC;gBACA,EAAE,CAAC,GAAG,KAAK,IAAI,IAAI,CAAC,KAAK,IAAI,YAAY,IAAI,IAAI,CAAC,YAAY,EAAE,CAAC,EAAE,UAAU,EAAE;gBAC/E,EAAE,CAAC,GAAG,YAAY,IAAI,IAAI,CAAC,YAAY,EAAE,CAAC,EAAE,UAAU,EAAE;gBACxD,EAAE,CAAC,GAAG,KAAK,IAAI,IAAI,CAAC,KAAK,IAAI,CAAC,EAAE,UAAU,EAAE;gBAC5C,EAAE,CAAC,KAAK,CAAC,EAAE,UAAU,EAAE;aACtB,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,WAAW,CAAC,IAAI,CAAC,WAAW,CAAC,KAAK,CAAC,IAAI,CAAC,GAAG,CAAC,WAAW,EAAE,CAAC,CAAC,CAAC,CAAA;IAC5E,CAAC;IACD,eAAe,CAAC,UAAkB;QACjC,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,GAAG,CAAC,WAAW,CAAC,CAAC,IAAI,CAC9C,KAAK,CAAC,EAAE,CAAC,CAAC,OAAO,KAAK,IAAI,QAAQ,IAAI,KAAK,CAAC,UAAU,CAAC,CAAC,IAAI,KAAK,IAAI,IAAI,CACzE,CAAA;IACF,CAAC;IAkBD,MAAM,CAAC,KAAK,CAAC,YAAY,CACxB,MAAoF,EACpF,UAA+C,EAC/C,QAAY,EACZ,WAA+C,kBAAkB,EACjE,SAAgC,WAAW,EAC3C,MAAwB;QAExB,IAAI,MAA+C,CAAA;QACnD,MAAM,aAAa,GAAG,MAAM,CAAC,aAAa,EAAE,UAAU,CAAC,SAAS,CAAC;YAChE,CAAC,CAAC,MAAM,CAAC,aAAa,CAAC,OAAO,CAAC,SAAS,EAAE,EAAE,CAAC;YAC7C,CAAC,CAAC,SAAS,CAAA;QACZ,MAAM,GAAG,GAAG,MAAM,QAAQ,CAAC,MAAM,CAAC,aAAa,EAAE,QAAQ,CAAC,CAAA;QAC1D,IAAI,CAAC,GAAG;YACP,MAAM,KAAK,WAAW,IAAI,CAAC,MAAM,GAAG,OAAO,CAAC,MAAM,CAAC,YAAY,EAAE,CAAC,CAAA;aAC9D,CAAC;YACL,MAAM,MAAM,GAAG,QAAQ,CAAC,SAAS,CAAC,GAAG,CAAC,WAAW,CAAC,CAAA;YAClD,MAAM,QAAQ,GAAG,IAAI,QAAQ,CAC5B,GAAG,EACH,CAAC,MAAM,EAAE,MAAM,IAAI,CAAC,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,MAAM,CAAC,KAAK,CAAU,EACzD,CAAC,GAAG,CAAC,YAAY,IAAI,MAAM,CAAC,YAAY,CAAW,CACnD,CAAA;YACD,MAAM,WAAW,GAAG,CACnB,KAA2B,EAGf,EAAE,CACd,CAAC,QAAQ,EAAE,YAAY,CAAC,CAAC,CAAC,CAAC,CAAC,QAAQ,EAAE,YAAY,CAAC,CAAC,CAAC,IAAI,CAAC;gBAC1D,CAAC,QAAQ,EAAE,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,EAAE,CAAC,QAAQ,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,CAAA;YAC1D,MAAM;gBACL,CAAC,QAAQ,EAAE,KAAK,CAAC,UAAU,CAAC,IAAI,WAAW,CAAC,QAAQ,CAAC,IAAI,QAAQ,CAAC;oBAClE,CAAC,MAAM,KAAK,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,OAAO,CAAC,MAAM,CAAC,SAAS,EAAE,CAAC,CAAA;QACnE,CAAC;QACD,OAAO,CAAC,KAAK,CAAC,EAAE,CAAC,MAAM,CAAC;YACvB,MAAM,CAAC,IAAI,IAAI,WAAW;YAC1B,CAAC,MAAM,MAAM,EAAE,KAAK,CAAC,IAAI,CACxB,YAAY,EACZ,kCAAkC,MAAM,CAAC,MAAM,CAAC,WAAW,EAAE,IAAI,MAAM,CAAC,QAAQ,EAAE,CAClF,CAAC,CAAA;QACH,OAAO,MAAM,CAAA;IACd,CAAC;IACD,MAAM,CAAC,KAAK,CAAC,MAAM,CAClB,aAAiC,EACjC,WAA+C,kBAAkB;QAEjE,OAAO,MAAM,QAAQ,CAAC,MAAM,CAAC,aAAa,CAAC,CAAA;IAC5C,CAAC;IACD,MAAM,CAAC,SAAS,CAAC,WAA4B;QAC5C,OAAO;YACN,GAAG,IAAI,GAAG,CACT,MAAM,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,OAAO,CAAC,IAAI,CAAC,EAAE,CACvC,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,IAAI,GAAG,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,GAAG,CAAC,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,IAAI,EAAE,CACnF,CACD;SACD,CAAA;IACF,CAAC;CACD;AAkBD,MAAM,SAAS,GACd,kuBAAkuB,CAAA;AACnuB,MAAM,kBAAkB,GAAG,WAAW,CAAC,IAAI,CAAC,GAAG,CAAC,QAAQ,CAAC,MAAM,CAAM,SAAS,CAAC,CAAA"}
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@pax2pay/model-banking",
|
|
3
|
-
"version": "0.1.
|
|
3
|
+
"version": "0.1.478",
|
|
4
4
|
"description": "Library containing data model types and functions for the Pax2Pay Banking API.",
|
|
5
5
|
"author": "Pax2Pay Ltd",
|
|
6
6
|
"license": "MIT",
|
|
@@ -45,16 +45,16 @@
|
|
|
45
45
|
},
|
|
46
46
|
"devDependencies": {
|
|
47
47
|
"@cloudflare/workers-types": "^4.20241112.0",
|
|
48
|
-
"@vitest/coverage-v8": "^2.1.8",
|
|
49
48
|
"@typescript-eslint/eslint-plugin": "8.2.0",
|
|
50
49
|
"@typescript-eslint/parser": "8.2.0",
|
|
50
|
+
"@vitest/coverage-v8": "^2.1.8",
|
|
51
51
|
"eslint": "^8.57.0",
|
|
52
52
|
"eslint-plugin-prettierx": "github:utily/eslint-plugin-prettierx#utily-20231004",
|
|
53
53
|
"eslint-plugin-simple-import-sort": "^12.1.1",
|
|
54
54
|
"prettierx": "github:utily/prettierx#utily-20231004",
|
|
55
55
|
"rimraf": "^6.0.1",
|
|
56
|
-
"
|
|
57
|
-
"
|
|
56
|
+
"typescript": "^5.5.4",
|
|
57
|
+
"vitest": "^2.1.8"
|
|
58
58
|
},
|
|
59
59
|
"dependencies": {
|
|
60
60
|
"@userwidgets/model": "0.8.32",
|
|
@@ -68,7 +68,8 @@
|
|
|
68
68
|
"isly2": "npm:isly@1.0.1-alpha.21",
|
|
69
69
|
"isoly": "3.0.6",
|
|
70
70
|
"isoly2": "npm:isoly@3.0.7-alpha.10",
|
|
71
|
-
"
|
|
72
|
-
"
|
|
71
|
+
"selectively": "^2.0.15",
|
|
72
|
+
"slackly": "^0.0.5",
|
|
73
|
+
"typedly": "0.0.26"
|
|
73
74
|
}
|
|
74
75
|
}
|