@robelest/convex-auth 0.0.4-preview.21 → 0.0.4-preview.23

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (310) hide show
  1. package/dist/authorization/index.d.ts +1 -1
  2. package/dist/authorization/index.js +1 -1
  3. package/dist/authorization/index.js.map +1 -1
  4. package/dist/client/index.d.ts +1 -2
  5. package/dist/client/index.d.ts.map +1 -1
  6. package/dist/client/index.js +36 -39
  7. package/dist/client/index.js.map +1 -1
  8. package/dist/component/client/index.d.ts +1 -2
  9. package/dist/component/convex.config.d.ts +2 -2
  10. package/dist/component/convex.config.d.ts.map +1 -1
  11. package/dist/component/model.d.ts +5 -5
  12. package/dist/component/model.d.ts.map +1 -1
  13. package/dist/component/public/enterprise/audit.d.ts.map +1 -1
  14. package/dist/component/public/enterprise/audit.js.map +1 -1
  15. package/dist/component/public/enterprise/core.d.ts.map +1 -1
  16. package/dist/component/public/enterprise/core.js.map +1 -1
  17. package/dist/component/public/enterprise/domains.d.ts.map +1 -1
  18. package/dist/component/public/enterprise/domains.js.map +1 -1
  19. package/dist/component/public/enterprise/scim.d.ts.map +1 -1
  20. package/dist/component/public/enterprise/scim.js.map +1 -1
  21. package/dist/component/public/enterprise/secrets.d.ts.map +1 -1
  22. package/dist/component/public/enterprise/secrets.js.map +1 -1
  23. package/dist/component/public/enterprise/webhooks.d.ts.map +1 -1
  24. package/dist/component/public/enterprise/webhooks.js.map +1 -1
  25. package/dist/component/public/factors/devices.d.ts.map +1 -1
  26. package/dist/component/public/factors/devices.js.map +1 -1
  27. package/dist/component/public/factors/passkeys.d.ts.map +1 -1
  28. package/dist/component/public/factors/passkeys.js.map +1 -1
  29. package/dist/component/public/factors/totp.d.ts.map +1 -1
  30. package/dist/component/public/factors/totp.js.map +1 -1
  31. package/dist/component/public/groups/core.js.map +1 -1
  32. package/dist/component/public/groups/invites.d.ts.map +1 -1
  33. package/dist/component/public/groups/invites.js.map +1 -1
  34. package/dist/component/public/groups/members.d.ts.map +1 -1
  35. package/dist/component/public/groups/members.js.map +1 -1
  36. package/dist/component/public/identity/accounts.d.ts.map +1 -1
  37. package/dist/component/public/identity/accounts.js.map +1 -1
  38. package/dist/component/public/identity/codes.d.ts.map +1 -1
  39. package/dist/component/public/identity/codes.js.map +1 -1
  40. package/dist/component/public/identity/sessions.d.ts.map +1 -1
  41. package/dist/component/public/identity/sessions.js.map +1 -1
  42. package/dist/component/public/identity/tokens.d.ts.map +1 -1
  43. package/dist/component/public/identity/tokens.js.map +1 -1
  44. package/dist/component/public/identity/users.d.ts.map +1 -1
  45. package/dist/component/public/identity/users.js.map +1 -1
  46. package/dist/component/public/identity/verifiers.d.ts.map +1 -1
  47. package/dist/component/public/identity/verifiers.js.map +1 -1
  48. package/dist/component/public/security/keys.d.ts.map +1 -1
  49. package/dist/component/public/security/keys.js.map +1 -1
  50. package/dist/component/public/security/limits.d.ts.map +1 -1
  51. package/dist/component/public/security/limits.js.map +1 -1
  52. package/dist/component/schema.d.ts +39 -39
  53. package/dist/component/server/auth.d.ts +95 -52
  54. package/dist/component/server/auth.d.ts.map +1 -1
  55. package/dist/component/server/auth.js +63 -43
  56. package/dist/component/server/auth.js.map +1 -1
  57. package/dist/component/server/core.js +116 -235
  58. package/dist/component/server/core.js.map +1 -1
  59. package/dist/component/server/crypto.js +25 -7
  60. package/dist/component/server/crypto.js.map +1 -1
  61. package/dist/component/server/device.js +58 -15
  62. package/dist/component/server/device.js.map +1 -1
  63. package/dist/component/server/enterprise/domain.js +148 -59
  64. package/dist/component/server/enterprise/domain.js.map +1 -1
  65. package/dist/component/server/enterprise/http.js +36 -15
  66. package/dist/component/server/enterprise/http.js.map +1 -1
  67. package/dist/component/server/enterprise/oidc.js +1 -1
  68. package/dist/component/server/http.js +26 -21
  69. package/dist/component/server/http.js.map +1 -1
  70. package/dist/component/server/identity.js +5 -2
  71. package/dist/component/server/identity.js.map +1 -1
  72. package/dist/component/server/limits.js +21 -30
  73. package/dist/component/server/limits.js.map +1 -1
  74. package/dist/component/server/mutations/account.js +12 -10
  75. package/dist/component/server/mutations/account.js.map +1 -1
  76. package/dist/component/server/mutations/code.js +5 -2
  77. package/dist/component/server/mutations/code.js.map +1 -1
  78. package/dist/component/server/mutations/invalidate.js +1 -1
  79. package/dist/component/server/mutations/invalidate.js.map +1 -1
  80. package/dist/component/server/mutations/oauth.js +10 -4
  81. package/dist/component/server/mutations/oauth.js.map +1 -1
  82. package/dist/component/server/mutations/refresh.js +2 -2
  83. package/dist/component/server/mutations/refresh.js.map +1 -1
  84. package/dist/component/server/mutations/register.js +46 -42
  85. package/dist/component/server/mutations/register.js.map +1 -1
  86. package/dist/component/server/mutations/retrieve.js +21 -25
  87. package/dist/component/server/mutations/retrieve.js.map +1 -1
  88. package/dist/component/server/mutations/signature.js +10 -4
  89. package/dist/component/server/mutations/signature.js.map +1 -1
  90. package/dist/component/server/mutations/signout.js.map +1 -1
  91. package/dist/component/server/mutations/store.js +9 -24
  92. package/dist/component/server/mutations/store.js.map +1 -1
  93. package/dist/component/server/mutations/verifier.js.map +1 -1
  94. package/dist/component/server/mutations/verify.js +1 -1
  95. package/dist/component/server/mutations/verify.js.map +1 -1
  96. package/dist/component/server/oauth.js +53 -16
  97. package/dist/component/server/oauth.js.map +1 -1
  98. package/dist/component/server/passkey.js +115 -31
  99. package/dist/component/server/passkey.js.map +1 -1
  100. package/dist/component/server/redirects.js +9 -3
  101. package/dist/component/server/redirects.js.map +1 -1
  102. package/dist/component/server/refresh.js +10 -7
  103. package/dist/component/server/refresh.js.map +1 -1
  104. package/dist/component/server/runtime.d.ts +3 -3
  105. package/dist/component/server/runtime.d.ts.map +1 -1
  106. package/dist/component/server/runtime.js +62 -20
  107. package/dist/component/server/runtime.js.map +1 -1
  108. package/dist/component/server/signin.js +34 -10
  109. package/dist/component/server/signin.js.map +1 -1
  110. package/dist/component/server/totp.js +79 -19
  111. package/dist/component/server/totp.js.map +1 -1
  112. package/dist/component/server/types.d.ts +12 -20
  113. package/dist/component/server/types.d.ts.map +1 -1
  114. package/dist/component/server/types.js.map +1 -1
  115. package/dist/component/server/users.js +6 -3
  116. package/dist/component/server/users.js.map +1 -1
  117. package/dist/component/server/utils.js +10 -4
  118. package/dist/component/server/utils.js.map +1 -1
  119. package/dist/core/types.d.ts +14 -22
  120. package/dist/core/types.d.ts.map +1 -1
  121. package/dist/factors/device.js +8 -9
  122. package/dist/factors/device.js.map +1 -1
  123. package/dist/factors/passkey.js +18 -21
  124. package/dist/factors/passkey.js.map +1 -1
  125. package/dist/providers/password.js +66 -81
  126. package/dist/providers/password.js.map +1 -1
  127. package/dist/runtime/invite.js +2 -8
  128. package/dist/runtime/invite.js.map +1 -1
  129. package/dist/server/auth.d.ts +95 -52
  130. package/dist/server/auth.d.ts.map +1 -1
  131. package/dist/server/auth.js +63 -43
  132. package/dist/server/auth.js.map +1 -1
  133. package/dist/server/core.d.ts +71 -159
  134. package/dist/server/core.d.ts.map +1 -1
  135. package/dist/server/core.js +116 -235
  136. package/dist/server/core.js.map +1 -1
  137. package/dist/server/crypto.d.ts.map +1 -1
  138. package/dist/server/crypto.js +25 -7
  139. package/dist/server/crypto.js.map +1 -1
  140. package/dist/server/device.js +58 -15
  141. package/dist/server/device.js.map +1 -1
  142. package/dist/server/enterprise/domain.d.ts +0 -8
  143. package/dist/server/enterprise/domain.d.ts.map +1 -1
  144. package/dist/server/enterprise/domain.js +148 -59
  145. package/dist/server/enterprise/domain.js.map +1 -1
  146. package/dist/server/enterprise/http.d.ts.map +1 -1
  147. package/dist/server/enterprise/http.js +35 -14
  148. package/dist/server/enterprise/http.js.map +1 -1
  149. package/dist/server/http.d.ts +2 -2
  150. package/dist/server/http.d.ts.map +1 -1
  151. package/dist/server/http.js +25 -20
  152. package/dist/server/http.js.map +1 -1
  153. package/dist/server/identity.js +5 -2
  154. package/dist/server/identity.js.map +1 -1
  155. package/dist/server/index.d.ts +2 -2
  156. package/dist/server/limits.js +21 -30
  157. package/dist/server/limits.js.map +1 -1
  158. package/dist/server/mounts.d.ts +26 -64
  159. package/dist/server/mounts.d.ts.map +1 -1
  160. package/dist/server/mounts.js +45 -106
  161. package/dist/server/mounts.js.map +1 -1
  162. package/dist/server/mutations/account.d.ts +8 -9
  163. package/dist/server/mutations/account.d.ts.map +1 -1
  164. package/dist/server/mutations/account.js +11 -9
  165. package/dist/server/mutations/account.js.map +1 -1
  166. package/dist/server/mutations/code.d.ts +13 -13
  167. package/dist/server/mutations/code.d.ts.map +1 -1
  168. package/dist/server/mutations/code.js +5 -2
  169. package/dist/server/mutations/code.js.map +1 -1
  170. package/dist/server/mutations/invalidate.d.ts +4 -4
  171. package/dist/server/mutations/invalidate.d.ts.map +1 -1
  172. package/dist/server/mutations/invalidate.js.map +1 -1
  173. package/dist/server/mutations/oauth.d.ts +12 -10
  174. package/dist/server/mutations/oauth.d.ts.map +1 -1
  175. package/dist/server/mutations/oauth.js +9 -3
  176. package/dist/server/mutations/oauth.js.map +1 -1
  177. package/dist/server/mutations/refresh.d.ts +3 -3
  178. package/dist/server/mutations/refresh.d.ts.map +1 -1
  179. package/dist/server/mutations/refresh.js +1 -1
  180. package/dist/server/mutations/refresh.js.map +1 -1
  181. package/dist/server/mutations/register.d.ts +11 -11
  182. package/dist/server/mutations/register.d.ts.map +1 -1
  183. package/dist/server/mutations/register.js +45 -41
  184. package/dist/server/mutations/register.js.map +1 -1
  185. package/dist/server/mutations/retrieve.d.ts +6 -6
  186. package/dist/server/mutations/retrieve.d.ts.map +1 -1
  187. package/dist/server/mutations/retrieve.js +20 -24
  188. package/dist/server/mutations/retrieve.js.map +1 -1
  189. package/dist/server/mutations/signature.d.ts +6 -7
  190. package/dist/server/mutations/signature.d.ts.map +1 -1
  191. package/dist/server/mutations/signature.js +9 -3
  192. package/dist/server/mutations/signature.js.map +1 -1
  193. package/dist/server/mutations/signin.d.ts +5 -5
  194. package/dist/server/mutations/signin.d.ts.map +1 -1
  195. package/dist/server/mutations/signout.js.map +1 -1
  196. package/dist/server/mutations/store.d.ts +97 -97
  197. package/dist/server/mutations/store.d.ts.map +1 -1
  198. package/dist/server/mutations/store.js +8 -23
  199. package/dist/server/mutations/store.js.map +1 -1
  200. package/dist/server/mutations/verifier.js.map +1 -1
  201. package/dist/server/mutations/verify.d.ts +10 -10
  202. package/dist/server/mutations/verify.d.ts.map +1 -1
  203. package/dist/server/mutations/verify.js.map +1 -1
  204. package/dist/server/oauth.js +53 -16
  205. package/dist/server/oauth.js.map +1 -1
  206. package/dist/server/passkey.d.ts +2 -2
  207. package/dist/server/passkey.d.ts.map +1 -1
  208. package/dist/server/passkey.js +114 -30
  209. package/dist/server/passkey.js.map +1 -1
  210. package/dist/server/redirects.js +9 -3
  211. package/dist/server/redirects.js.map +1 -1
  212. package/dist/server/refresh.js +10 -7
  213. package/dist/server/refresh.js.map +1 -1
  214. package/dist/server/runtime.d.ts +14 -14
  215. package/dist/server/runtime.d.ts.map +1 -1
  216. package/dist/server/runtime.js +61 -19
  217. package/dist/server/runtime.js.map +1 -1
  218. package/dist/server/signin.js +34 -10
  219. package/dist/server/signin.js.map +1 -1
  220. package/dist/server/ssr.d.ts.map +1 -1
  221. package/dist/server/ssr.js +175 -184
  222. package/dist/server/ssr.js.map +1 -1
  223. package/dist/server/totp.js +78 -18
  224. package/dist/server/totp.js.map +1 -1
  225. package/dist/server/types.d.ts +13 -21
  226. package/dist/server/types.d.ts.map +1 -1
  227. package/dist/server/types.js.map +1 -1
  228. package/dist/server/users.js +6 -3
  229. package/dist/server/users.js.map +1 -1
  230. package/dist/server/utils.js +10 -4
  231. package/dist/server/utils.js.map +1 -1
  232. package/package.json +2 -6
  233. package/src/authorization/index.ts +1 -1
  234. package/src/cli/index.ts +1 -1
  235. package/src/client/core/types.ts +14 -14
  236. package/src/client/factors/device.ts +10 -12
  237. package/src/client/factors/passkey.ts +23 -26
  238. package/src/client/index.ts +54 -64
  239. package/src/client/runtime/invite.ts +5 -7
  240. package/src/component/index.ts +1 -0
  241. package/src/component/public/enterprise/audit.ts +6 -1
  242. package/src/component/public/enterprise/core.ts +1 -0
  243. package/src/component/public/enterprise/domains.ts +5 -1
  244. package/src/component/public/enterprise/scim.ts +1 -0
  245. package/src/component/public/enterprise/secrets.ts +1 -0
  246. package/src/component/public/enterprise/webhooks.ts +1 -0
  247. package/src/component/public/factors/devices.ts +1 -0
  248. package/src/component/public/factors/passkeys.ts +1 -0
  249. package/src/component/public/factors/totp.ts +1 -0
  250. package/src/component/public/groups/core.ts +1 -1
  251. package/src/component/public/groups/invites.ts +7 -1
  252. package/src/component/public/groups/members.ts +1 -0
  253. package/src/component/public/identity/accounts.ts +1 -0
  254. package/src/component/public/identity/codes.ts +1 -0
  255. package/src/component/public/identity/sessions.ts +1 -0
  256. package/src/component/public/identity/tokens.ts +1 -0
  257. package/src/component/public/identity/users.ts +1 -0
  258. package/src/component/public/identity/verifiers.ts +1 -0
  259. package/src/component/public/security/keys.ts +1 -0
  260. package/src/component/public/security/limits.ts +1 -0
  261. package/src/providers/password.ts +89 -110
  262. package/src/server/auth.ts +177 -111
  263. package/src/server/core.ts +197 -233
  264. package/src/server/crypto.ts +31 -29
  265. package/src/server/device.ts +65 -32
  266. package/src/server/enterprise/domain.ts +158 -170
  267. package/src/server/enterprise/http.ts +46 -39
  268. package/src/server/http.ts +36 -30
  269. package/src/server/identity.ts +5 -5
  270. package/src/server/index.ts +2 -0
  271. package/src/server/limits.ts +53 -80
  272. package/src/server/mounts.ts +47 -74
  273. package/src/server/mutations/account.ts +22 -36
  274. package/src/server/mutations/code.ts +6 -6
  275. package/src/server/mutations/invalidate.ts +1 -1
  276. package/src/server/mutations/oauth.ts +14 -8
  277. package/src/server/mutations/refresh.ts +5 -4
  278. package/src/server/mutations/register.ts +87 -132
  279. package/src/server/mutations/retrieve.ts +44 -44
  280. package/src/server/mutations/signature.ts +13 -6
  281. package/src/server/mutations/signout.ts +1 -1
  282. package/src/server/mutations/store.ts +16 -31
  283. package/src/server/mutations/verifier.ts +1 -1
  284. package/src/server/mutations/verify.ts +3 -5
  285. package/src/server/oauth.ts +60 -69
  286. package/src/server/passkey.ts +567 -517
  287. package/src/server/redirects.ts +10 -6
  288. package/src/server/refresh.ts +14 -18
  289. package/src/server/runtime.ts +70 -55
  290. package/src/server/signin.ts +44 -37
  291. package/src/server/ssr.ts +390 -407
  292. package/src/server/totp.ts +85 -35
  293. package/src/server/types.ts +19 -22
  294. package/src/server/users.ts +7 -6
  295. package/src/server/utils.ts +10 -12
  296. package/dist/component/server/authError.js +0 -34
  297. package/dist/component/server/authError.js.map +0 -1
  298. package/dist/component/server/errors.d.ts +0 -1
  299. package/dist/component/server/errors.js +0 -137
  300. package/dist/component/server/errors.js.map +0 -1
  301. package/dist/server/authError.d.ts +0 -46
  302. package/dist/server/authError.d.ts.map +0 -1
  303. package/dist/server/authError.js +0 -34
  304. package/dist/server/authError.js.map +0 -1
  305. package/dist/server/errors.d.ts +0 -177
  306. package/dist/server/errors.d.ts.map +0 -1
  307. package/dist/server/errors.js +0 -212
  308. package/dist/server/errors.js.map +0 -1
  309. package/src/server/authError.ts +0 -44
  310. package/src/server/errors.ts +0 -290
@@ -1,14 +1,14 @@
1
1
  import { Doc, MutationCtx, SessionInfo } from "../types.js";
2
2
  import { Config, GetProviderOrThrowFunc } from "../crypto.js";
3
- import * as convex_values20 from "convex/values";
3
+ import * as convex_values19 from "convex/values";
4
4
  import { Infer } from "convex/values";
5
5
 
6
6
  //#region src/server/mutations/store.d.ts
7
- declare const storeArgs: convex_values20.VObject<{
7
+ declare const storeArgs: convex_values19.VObject<{
8
8
  args: {
9
9
  sessionId?: string | undefined;
10
- userId: string;
11
10
  type: "signIn";
11
+ userId: string;
12
12
  generateTokens: boolean;
13
13
  } | {
14
14
  type: "signOut";
@@ -19,9 +19,9 @@ declare const storeArgs: convex_values20.VObject<{
19
19
  provider?: string | undefined;
20
20
  verifier?: string | undefined;
21
21
  type: "verifyCodeAndSignIn";
22
- allowExtraProviders: boolean;
23
- generateTokens: boolean;
24
22
  params: any;
23
+ generateTokens: boolean;
24
+ allowExtraProviders: boolean;
25
25
  } | {
26
26
  type: "verifier";
27
27
  } | {
@@ -36,24 +36,24 @@ declare const storeArgs: convex_values20.VObject<{
36
36
  providerAccountId: string;
37
37
  profile: any;
38
38
  } | {
39
- email?: string | undefined;
40
- accountId?: string | undefined;
41
39
  phone?: string | undefined;
40
+ accountId?: string | undefined;
41
+ email?: string | undefined;
42
42
  type: "createVerificationCode";
43
43
  provider: string;
44
+ allowExtraProviders: boolean;
44
45
  code: string;
45
46
  expirationTime: number;
46
- allowExtraProviders: boolean;
47
47
  } | {
48
48
  shouldLinkViaEmail?: boolean | undefined;
49
49
  shouldLinkViaPhone?: boolean | undefined;
50
50
  type: "createAccountFromCredentials";
51
51
  provider: string;
52
+ profile: any;
52
53
  account: {
53
54
  secret?: string | undefined;
54
55
  id: string;
55
56
  };
56
- profile: any;
57
57
  } | {
58
58
  type: "retrieveAccountWithCredentials";
59
59
  provider: string;
@@ -70,14 +70,14 @@ declare const storeArgs: convex_values20.VObject<{
70
70
  };
71
71
  } | {
72
72
  except?: string[] | undefined;
73
- userId: string;
74
73
  type: "invalidateSessions";
74
+ userId: string;
75
75
  };
76
76
  }, {
77
- args: convex_values20.VUnion<{
77
+ args: convex_values19.VUnion<{
78
78
  sessionId?: string | undefined;
79
- userId: string;
80
79
  type: "signIn";
80
+ userId: string;
81
81
  generateTokens: boolean;
82
82
  } | {
83
83
  type: "signOut";
@@ -88,9 +88,9 @@ declare const storeArgs: convex_values20.VObject<{
88
88
  provider?: string | undefined;
89
89
  verifier?: string | undefined;
90
90
  type: "verifyCodeAndSignIn";
91
- allowExtraProviders: boolean;
92
- generateTokens: boolean;
93
91
  params: any;
92
+ generateTokens: boolean;
93
+ allowExtraProviders: boolean;
94
94
  } | {
95
95
  type: "verifier";
96
96
  } | {
@@ -105,24 +105,24 @@ declare const storeArgs: convex_values20.VObject<{
105
105
  providerAccountId: string;
106
106
  profile: any;
107
107
  } | {
108
- email?: string | undefined;
109
- accountId?: string | undefined;
110
108
  phone?: string | undefined;
109
+ accountId?: string | undefined;
110
+ email?: string | undefined;
111
111
  type: "createVerificationCode";
112
112
  provider: string;
113
+ allowExtraProviders: boolean;
113
114
  code: string;
114
115
  expirationTime: number;
115
- allowExtraProviders: boolean;
116
116
  } | {
117
117
  shouldLinkViaEmail?: boolean | undefined;
118
118
  shouldLinkViaPhone?: boolean | undefined;
119
119
  type: "createAccountFromCredentials";
120
120
  provider: string;
121
+ profile: any;
121
122
  account: {
122
123
  secret?: string | undefined;
123
124
  id: string;
124
125
  };
125
- profile: any;
126
126
  } | {
127
127
  type: "retrieveAccountWithCredentials";
128
128
  provider: string;
@@ -139,55 +139,55 @@ declare const storeArgs: convex_values20.VObject<{
139
139
  };
140
140
  } | {
141
141
  except?: string[] | undefined;
142
- userId: string;
143
142
  type: "invalidateSessions";
144
- }, [convex_values20.VObject<{
145
- sessionId?: string | undefined;
146
143
  userId: string;
144
+ }, [convex_values19.VObject<{
145
+ sessionId?: string | undefined;
147
146
  type: "signIn";
147
+ userId: string;
148
148
  generateTokens: boolean;
149
149
  }, {
150
- userId: convex_values20.VString<string, "required">;
151
- sessionId: convex_values20.VString<string | undefined, "optional">;
152
- generateTokens: convex_values20.VBoolean<boolean, "required">;
153
- type: convex_values20.VLiteral<"signIn", "required">;
154
- }, "required", "userId" | "type" | "sessionId" | "generateTokens">, convex_values20.VObject<{
150
+ userId: convex_values19.VString<string, "required">;
151
+ sessionId: convex_values19.VString<string | undefined, "optional">;
152
+ generateTokens: convex_values19.VBoolean<boolean, "required">;
153
+ type: convex_values19.VLiteral<"signIn", "required">;
154
+ }, "required", "type" | "userId" | "sessionId" | "generateTokens">, convex_values19.VObject<{
155
155
  type: "signOut";
156
156
  }, {
157
- type: convex_values20.VLiteral<"signOut", "required">;
158
- }, "required", "type">, convex_values20.VObject<{
157
+ type: convex_values19.VLiteral<"signOut", "required">;
158
+ }, "required", "type">, convex_values19.VObject<{
159
159
  type: "refreshSession";
160
160
  refreshToken: string;
161
161
  }, {
162
- refreshToken: convex_values20.VString<string, "required">;
163
- type: convex_values20.VLiteral<"refreshSession", "required">;
164
- }, "required", "type" | "refreshToken">, convex_values20.VObject<{
162
+ refreshToken: convex_values19.VString<string, "required">;
163
+ type: convex_values19.VLiteral<"refreshSession", "required">;
164
+ }, "required", "type" | "refreshToken">, convex_values19.VObject<{
165
165
  provider?: string | undefined;
166
166
  verifier?: string | undefined;
167
167
  type: "verifyCodeAndSignIn";
168
- allowExtraProviders: boolean;
169
- generateTokens: boolean;
170
168
  params: any;
169
+ generateTokens: boolean;
170
+ allowExtraProviders: boolean;
171
171
  }, {
172
- params: convex_values20.VAny<any, "required", string>;
173
- provider: convex_values20.VString<string | undefined, "optional">;
174
- verifier: convex_values20.VString<string | undefined, "optional">;
175
- generateTokens: convex_values20.VBoolean<boolean, "required">;
176
- allowExtraProviders: convex_values20.VBoolean<boolean, "required">;
177
- type: convex_values20.VLiteral<"verifyCodeAndSignIn", "required">;
178
- }, "required", "type" | "provider" | "allowExtraProviders" | "generateTokens" | "params" | "verifier" | `params.${string}`>, convex_values20.VObject<{
172
+ params: convex_values19.VAny<any, "required", string>;
173
+ provider: convex_values19.VString<string | undefined, "optional">;
174
+ verifier: convex_values19.VString<string | undefined, "optional">;
175
+ generateTokens: convex_values19.VBoolean<boolean, "required">;
176
+ allowExtraProviders: convex_values19.VBoolean<boolean, "required">;
177
+ type: convex_values19.VLiteral<"verifyCodeAndSignIn", "required">;
178
+ }, "required", "type" | "provider" | "params" | "verifier" | "generateTokens" | "allowExtraProviders" | `params.${string}`>, convex_values19.VObject<{
179
179
  type: "verifier";
180
180
  }, {
181
- type: convex_values20.VLiteral<"verifier", "required">;
182
- }, "required", "type">, convex_values20.VObject<{
181
+ type: convex_values19.VLiteral<"verifier", "required">;
182
+ }, "required", "type">, convex_values19.VObject<{
183
183
  type: "verifierSignature";
184
184
  verifier: string;
185
185
  signature: string;
186
186
  }, {
187
- verifier: convex_values20.VString<string, "required">;
188
- signature: convex_values20.VString<string, "required">;
189
- type: convex_values20.VLiteral<"verifierSignature", "required">;
190
- }, "required", "type" | "verifier" | "signature">, convex_values20.VObject<{
187
+ verifier: convex_values19.VString<string, "required">;
188
+ signature: convex_values19.VString<string, "required">;
189
+ type: convex_values19.VLiteral<"verifierSignature", "required">;
190
+ }, "required", "type" | "verifier" | "signature">, convex_values19.VObject<{
191
191
  accountExtend?: any;
192
192
  type: "userOAuth";
193
193
  provider: string;
@@ -195,54 +195,54 @@ declare const storeArgs: convex_values20.VObject<{
195
195
  providerAccountId: string;
196
196
  profile: any;
197
197
  }, {
198
- provider: convex_values20.VString<string, "required">;
199
- providerAccountId: convex_values20.VString<string, "required">;
200
- profile: convex_values20.VAny<any, "required", string>;
201
- signature: convex_values20.VString<string, "required">;
202
- accountExtend: convex_values20.VAny<any, "optional", string>;
203
- type: convex_values20.VLiteral<"userOAuth", "required">;
204
- }, "required", "type" | "provider" | "signature" | "providerAccountId" | "profile" | "accountExtend" | `profile.${string}` | `accountExtend.${string}`>, convex_values20.VObject<{
205
- email?: string | undefined;
206
- accountId?: string | undefined;
198
+ provider: convex_values19.VString<string, "required">;
199
+ providerAccountId: convex_values19.VString<string, "required">;
200
+ profile: convex_values19.VAny<any, "required", string>;
201
+ signature: convex_values19.VString<string, "required">;
202
+ accountExtend: convex_values19.VAny<any, "optional", string>;
203
+ type: convex_values19.VLiteral<"userOAuth", "required">;
204
+ }, "required", "type" | "provider" | "signature" | "providerAccountId" | "profile" | "accountExtend" | `profile.${string}` | `accountExtend.${string}`>, convex_values19.VObject<{
207
205
  phone?: string | undefined;
206
+ accountId?: string | undefined;
207
+ email?: string | undefined;
208
208
  type: "createVerificationCode";
209
209
  provider: string;
210
+ allowExtraProviders: boolean;
210
211
  code: string;
211
212
  expirationTime: number;
212
- allowExtraProviders: boolean;
213
213
  }, {
214
- accountId: convex_values20.VString<string | undefined, "optional">;
215
- provider: convex_values20.VString<string, "required">;
216
- email: convex_values20.VString<string | undefined, "optional">;
217
- phone: convex_values20.VString<string | undefined, "optional">;
218
- code: convex_values20.VString<string, "required">;
219
- expirationTime: convex_values20.VFloat64<number, "required">;
220
- allowExtraProviders: convex_values20.VBoolean<boolean, "required">;
221
- type: convex_values20.VLiteral<"createVerificationCode", "required">;
222
- }, "required", "email" | "type" | "provider" | "code" | "accountId" | "phone" | "expirationTime" | "allowExtraProviders">, convex_values20.VObject<{
214
+ accountId: convex_values19.VString<string | undefined, "optional">;
215
+ provider: convex_values19.VString<string, "required">;
216
+ email: convex_values19.VString<string | undefined, "optional">;
217
+ phone: convex_values19.VString<string | undefined, "optional">;
218
+ code: convex_values19.VString<string, "required">;
219
+ expirationTime: convex_values19.VFloat64<number, "required">;
220
+ allowExtraProviders: convex_values19.VBoolean<boolean, "required">;
221
+ type: convex_values19.VLiteral<"createVerificationCode", "required">;
222
+ }, "required", "phone" | "type" | "provider" | "allowExtraProviders" | "accountId" | "email" | "code" | "expirationTime">, convex_values19.VObject<{
223
223
  shouldLinkViaEmail?: boolean | undefined;
224
224
  shouldLinkViaPhone?: boolean | undefined;
225
225
  type: "createAccountFromCredentials";
226
226
  provider: string;
227
+ profile: any;
227
228
  account: {
228
229
  secret?: string | undefined;
229
230
  id: string;
230
231
  };
231
- profile: any;
232
232
  }, {
233
- provider: convex_values20.VString<string, "required">;
234
- account: convex_values20.VObject<{
233
+ provider: convex_values19.VString<string, "required">;
234
+ account: convex_values19.VObject<{
235
235
  secret?: string | undefined;
236
236
  id: string;
237
237
  }, {
238
- id: convex_values20.VString<string, "required">;
239
- secret: convex_values20.VString<string | undefined, "optional">;
238
+ id: convex_values19.VString<string, "required">;
239
+ secret: convex_values19.VString<string | undefined, "optional">;
240
240
  }, "required", "id" | "secret">;
241
- profile: convex_values20.VAny<any, "required", string>;
242
- shouldLinkViaEmail: convex_values20.VBoolean<boolean | undefined, "optional">;
243
- shouldLinkViaPhone: convex_values20.VBoolean<boolean | undefined, "optional">;
244
- type: convex_values20.VLiteral<"createAccountFromCredentials", "required">;
245
- }, "required", "type" | "provider" | "account" | "account.id" | "account.secret" | "profile" | `profile.${string}` | "shouldLinkViaEmail" | "shouldLinkViaPhone">, convex_values20.VObject<{
241
+ profile: convex_values19.VAny<any, "required", string>;
242
+ shouldLinkViaEmail: convex_values19.VBoolean<boolean | undefined, "optional">;
243
+ shouldLinkViaPhone: convex_values19.VBoolean<boolean | undefined, "optional">;
244
+ type: convex_values19.VLiteral<"createAccountFromCredentials", "required">;
245
+ }, "required", "type" | "provider" | "profile" | `profile.${string}` | "account" | "shouldLinkViaEmail" | "shouldLinkViaPhone" | "account.id" | "account.secret">, convex_values19.VObject<{
246
246
  type: "retrieveAccountWithCredentials";
247
247
  provider: string;
248
248
  account: {
@@ -250,16 +250,16 @@ declare const storeArgs: convex_values20.VObject<{
250
250
  id: string;
251
251
  };
252
252
  }, {
253
- provider: convex_values20.VString<string, "required">;
254
- account: convex_values20.VObject<{
253
+ provider: convex_values19.VString<string, "required">;
254
+ account: convex_values19.VObject<{
255
255
  secret?: string | undefined;
256
256
  id: string;
257
257
  }, {
258
- id: convex_values20.VString<string, "required">;
259
- secret: convex_values20.VString<string | undefined, "optional">;
258
+ id: convex_values19.VString<string, "required">;
259
+ secret: convex_values19.VString<string | undefined, "optional">;
260
260
  }, "required", "id" | "secret">;
261
- type: convex_values20.VLiteral<"retrieveAccountWithCredentials", "required">;
262
- }, "required", "type" | "provider" | "account" | "account.id" | "account.secret">, convex_values20.VObject<{
261
+ type: convex_values19.VLiteral<"retrieveAccountWithCredentials", "required">;
262
+ }, "required", "type" | "provider" | "account" | "account.id" | "account.secret">, convex_values19.VObject<{
263
263
  type: "modifyAccount";
264
264
  provider: string;
265
265
  account: {
@@ -267,31 +267,31 @@ declare const storeArgs: convex_values20.VObject<{
267
267
  secret: string;
268
268
  };
269
269
  }, {
270
- provider: convex_values20.VString<string, "required">;
271
- account: convex_values20.VObject<{
270
+ provider: convex_values19.VString<string, "required">;
271
+ account: convex_values19.VObject<{
272
272
  id: string;
273
273
  secret: string;
274
274
  }, {
275
- id: convex_values20.VString<string, "required">;
276
- secret: convex_values20.VString<string, "required">;
275
+ id: convex_values19.VString<string, "required">;
276
+ secret: convex_values19.VString<string, "required">;
277
277
  }, "required", "id" | "secret">;
278
- type: convex_values20.VLiteral<"modifyAccount", "required">;
279
- }, "required", "type" | "provider" | "account" | "account.id" | "account.secret">, convex_values20.VObject<{
278
+ type: convex_values19.VLiteral<"modifyAccount", "required">;
279
+ }, "required", "type" | "provider" | "account" | "account.id" | "account.secret">, convex_values19.VObject<{
280
280
  except?: string[] | undefined;
281
- userId: string;
282
281
  type: "invalidateSessions";
282
+ userId: string;
283
283
  }, {
284
- userId: convex_values20.VString<string, "required">;
285
- except: convex_values20.VArray<string[] | undefined, convex_values20.VString<string, "required">, "optional">;
286
- type: convex_values20.VLiteral<"invalidateSessions", "required">;
287
- }, "required", "userId" | "except" | "type">], "required", "email" | "userId" | "except" | "type" | "provider" | "account" | "account.id" | "account.secret" | "code" | "accountId" | "phone" | "expirationTime" | "allowExtraProviders" | "sessionId" | "generateTokens" | "refreshToken" | "params" | "verifier" | `params.${string}` | "signature" | "providerAccountId" | "profile" | "accountExtend" | `profile.${string}` | `accountExtend.${string}` | "shouldLinkViaEmail" | "shouldLinkViaPhone">;
288
- }, "required", "args" | "args.email" | "args.userId" | "args.except" | "args.type" | "args.provider" | "args.account" | "args.account.id" | "args.account.secret" | "args.code" | "args.accountId" | "args.phone" | "args.expirationTime" | "args.allowExtraProviders" | "args.sessionId" | "args.generateTokens" | "args.refreshToken" | "args.params" | "args.verifier" | `args.params.${string}` | "args.signature" | "args.providerAccountId" | "args.profile" | "args.accountExtend" | `args.profile.${string}` | `args.accountExtend.${string}` | "args.shouldLinkViaEmail" | "args.shouldLinkViaPhone">;
289
- declare const storeImpl: (ctx: MutationCtx, fnArgs: Infer<typeof storeArgs>, getProviderOrThrow: GetProviderOrThrowFunc, config: Config) => Promise<string | void | SessionInfo | {
290
- userId: convex_values20.GenericId<"User">;
291
- sessionId: convex_values20.GenericId<"Session">;
284
+ userId: convex_values19.VString<string, "required">;
285
+ except: convex_values19.VArray<string[] | undefined, convex_values19.VString<string, "required">, "optional">;
286
+ type: convex_values19.VLiteral<"invalidateSessions", "required">;
287
+ }, "required", "type" | "userId" | "except">], "required", "phone" | "type" | "provider" | "params" | "verifier" | "refreshToken" | "userId" | "sessionId" | "generateTokens" | "allowExtraProviders" | `params.${string}` | "signature" | "providerAccountId" | "profile" | "accountExtend" | `profile.${string}` | `accountExtend.${string}` | "accountId" | "email" | "code" | "expirationTime" | "account" | "shouldLinkViaEmail" | "shouldLinkViaPhone" | "account.id" | "account.secret" | "except">;
288
+ }, "required", "args" | "args.phone" | "args.type" | "args.provider" | "args.params" | "args.verifier" | "args.refreshToken" | "args.userId" | "args.sessionId" | "args.generateTokens" | "args.allowExtraProviders" | `args.params.${string}` | "args.signature" | "args.providerAccountId" | "args.profile" | "args.accountExtend" | `args.profile.${string}` | `args.accountExtend.${string}` | "args.accountId" | "args.email" | "args.code" | "args.expirationTime" | "args.account" | "args.shouldLinkViaEmail" | "args.shouldLinkViaPhone" | "args.account.id" | "args.account.secret" | "args.except">;
289
+ declare const storeImpl: (ctx: MutationCtx, fnArgs: Infer<typeof storeArgs>, getProviderOrThrow: GetProviderOrThrowFunc, config: Config) => Promise<string | void | {
290
+ userId: convex_values19.GenericId<"User">;
291
+ sessionId: convex_values19.GenericId<"Session">;
292
292
  } | (string & {
293
293
  __tableName: "AuthVerifier";
294
- }) | {
294
+ }) | SessionInfo | {
295
295
  token: string;
296
296
  refreshToken: string;
297
297
  } | {
@@ -1 +1 @@
1
- {"version":3,"file":"store.d.ts","names":[],"sources":["../../../src/server/mutations/store.ts"],"mappings":";;;;;;cAyBa,SAAA,kBAAS,OAAA;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;YAiDpB,eAAA,CAAA,OAAA;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;cAEW,SAAA,GACX,GAAA,EAAK,WAAA,EACL,MAAA,EAAQ,KAAA,QAAa,SAAA,GACrB,kBAAA,EAAoB,sBAAA,EACpB,MAAA,EAAQ,MAAA,KAAe,OAAA,iBAAA,WAAA;UAAA,eAAA,CAAA,SAAA"}
1
+ {"version":3,"file":"store.d.ts","names":[],"sources":["../../../src/server/mutations/store.ts"],"mappings":";;;;;;cAyBa,SAAA,kBAAS,OAAA;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;YAiDpB,eAAA,CAAA,OAAA;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;cAEW,SAAA,GACX,GAAA,EAAK,WAAA,EACL,MAAA,EAAQ,KAAA,QAAa,SAAA,GACrB,kBAAA,EAAoB,sBAAA,EACpB,MAAA,EAAQ,MAAA,KAAe,OAAA;UAAA,eAAA,CAAA,SAAA"}
@@ -50,32 +50,17 @@ const storeImpl = async (ctx, fnArgs, getProviderOrThrow, config) => {
50
50
  const args = fnArgs.args;
51
51
  logWithLevel(LOG_LEVELS.INFO, `\`auth:store\` type: ${args.type}`);
52
52
  return Fx.run(Fx.match(args, args.type, {
53
- signIn: (a) => Fx.from({
54
- ok: () => signInImpl(ctx, a, config),
55
- err: (e) => e
56
- }),
53
+ signIn: (a) => Fx.promise(() => signInImpl(ctx, a, config)),
57
54
  signOut: () => signOutImpl(ctx, config),
58
- refreshSession: (a) => Fx.from({
59
- ok: () => refreshSessionImpl(ctx, a, getProviderOrThrow, config),
60
- err: (e) => e
61
- }),
62
- verifyCodeAndSignIn: (a) => Fx.from({
63
- ok: () => verifyCodeAndSignInImpl(ctx, a, getProviderOrThrow, config),
64
- err: (e) => e
65
- }),
55
+ refreshSession: (a) => Fx.promise(() => refreshSessionImpl(ctx, a, getProviderOrThrow, config)),
56
+ verifyCodeAndSignIn: (a) => Fx.promise(() => verifyCodeAndSignInImpl(ctx, a, getProviderOrThrow, config)),
66
57
  verifier: () => verifierImpl(ctx, config),
67
- verifierSignature: (a) => verifierSignatureImpl(ctx, a, config).pipe(Fx.recover((e) => Fx.fatal(e.toConvexError()))),
68
- userOAuth: (a) => userOAuthImpl(ctx, a, getProviderOrThrow, config).pipe(Fx.recover((e) => Fx.fatal(e.toConvexError()))),
69
- createVerificationCode: (a) => Fx.from({
70
- ok: () => createVerificationCodeImpl(ctx, a, getProviderOrThrow, config),
71
- err: (e) => e
72
- }),
73
- createAccountFromCredentials: (a) => Fx.from({
74
- ok: () => createAccountFromCredentialsImpl(ctx, a, getProviderOrThrow, config),
75
- err: (e) => e
76
- }),
58
+ verifierSignature: (a) => verifierSignatureImpl(ctx, a, config).pipe(Fx.recover((e) => Fx.fatal(e))),
59
+ userOAuth: (a) => userOAuthImpl(ctx, a, getProviderOrThrow, config).pipe(Fx.recover((e) => Fx.fatal(e))),
60
+ createVerificationCode: (a) => Fx.promise(() => createVerificationCodeImpl(ctx, a, getProviderOrThrow, config)),
61
+ createAccountFromCredentials: (a) => Fx.promise(() => createAccountFromCredentialsImpl(ctx, a, getProviderOrThrow, config)),
77
62
  retrieveAccountWithCredentials: (a) => retrieveAccountWithCredentialsImpl(ctx, a, getProviderOrThrow, config),
78
- modifyAccount: (a) => modifyAccountImpl(ctx, a, getProviderOrThrow, config).pipe(Fx.recover((e) => Fx.fatal(e.toConvexError()))),
63
+ modifyAccount: (a) => modifyAccountImpl(ctx, a, getProviderOrThrow, config).pipe(Fx.recover((e) => Fx.fatal(e))),
79
64
  invalidateSessions: (a) => invalidateSessionsImpl(ctx, a, config)
80
65
  }));
81
66
  };
@@ -1 +1 @@
1
- {"version":3,"file":"store.js","names":[],"sources":["../../../src/server/mutations/store.ts"],"sourcesContent":["import { Fx } from \"@robelest/fx\";\nimport { Infer, v } from \"convex/values\";\n\nimport * as Provider from \"../crypto\";\nimport { MutationCtx } from \"../types\";\nimport { LOG_LEVELS, logWithLevel } from \"../utils\";\nimport { modifyAccountArgs, modifyAccountImpl } from \"./account\";\nimport { createVerificationCodeArgs, createVerificationCodeImpl } from \"./code\";\nimport { invalidateSessionsArgs, invalidateSessionsImpl } from \"./invalidate\";\nimport { userOAuthArgs, userOAuthImpl } from \"./oauth\";\nimport { refreshSessionArgs, refreshSessionImpl } from \"./refresh\";\nimport {\n createAccountFromCredentialsArgs,\n createAccountFromCredentialsImpl,\n} from \"./register\";\nimport {\n retrieveAccountWithCredentialsArgs,\n retrieveAccountWithCredentialsImpl,\n} from \"./retrieve\";\nimport { verifierSignatureArgs, verifierSignatureImpl } from \"./signature\";\nimport { signInArgs, signInImpl } from \"./signin\";\nimport { signOutImpl } from \"./signout\";\nimport { verifierImpl } from \"./verifier\";\nimport { verifyCodeAndSignInArgs, verifyCodeAndSignInImpl } from \"./verify\";\n\nexport const storeArgs = v.object({\n args: v.union(\n v.object({\n type: v.literal(\"signIn\"),\n ...signInArgs.fields,\n }),\n v.object({\n type: v.literal(\"signOut\"),\n }),\n v.object({\n type: v.literal(\"refreshSession\"),\n ...refreshSessionArgs.fields,\n }),\n v.object({\n type: v.literal(\"verifyCodeAndSignIn\"),\n ...verifyCodeAndSignInArgs.fields,\n }),\n v.object({\n type: v.literal(\"verifier\"),\n }),\n v.object({\n type: v.literal(\"verifierSignature\"),\n ...verifierSignatureArgs.fields,\n }),\n v.object({\n type: v.literal(\"userOAuth\"),\n ...userOAuthArgs.fields,\n }),\n v.object({\n type: v.literal(\"createVerificationCode\"),\n ...createVerificationCodeArgs.fields,\n }),\n v.object({\n type: v.literal(\"createAccountFromCredentials\"),\n ...createAccountFromCredentialsArgs.fields,\n }),\n v.object({\n type: v.literal(\"retrieveAccountWithCredentials\"),\n ...retrieveAccountWithCredentialsArgs.fields,\n }),\n v.object({\n type: v.literal(\"modifyAccount\"),\n ...modifyAccountArgs.fields,\n }),\n v.object({\n type: v.literal(\"invalidateSessions\"),\n ...invalidateSessionsArgs.fields,\n }),\n ),\n});\n\nexport const storeImpl = async (\n ctx: MutationCtx,\n fnArgs: Infer<typeof storeArgs>,\n getProviderOrThrow: Provider.GetProviderOrThrowFunc,\n config: Provider.Config,\n) => {\n const args = fnArgs.args;\n logWithLevel(LOG_LEVELS.INFO, `\\`auth:store\\` type: ${args.type}`);\n return Fx.run(\n Fx.match(args, args.type, {\n signIn: (a) =>\n Fx.from({\n ok: () => signInImpl(ctx, a, config),\n err: (e) => e as never,\n }),\n signOut: () => signOutImpl(ctx, config),\n refreshSession: (a) =>\n Fx.from({\n ok: () => refreshSessionImpl(ctx, a, getProviderOrThrow, config),\n err: (e) => e as never,\n }),\n verifyCodeAndSignIn: (a) =>\n Fx.from({\n ok: () => verifyCodeAndSignInImpl(ctx, a, getProviderOrThrow, config),\n err: (e) => e as never,\n }),\n verifier: () => verifierImpl(ctx, config),\n verifierSignature: (a) =>\n verifierSignatureImpl(ctx, a, config).pipe(\n Fx.recover((e) => Fx.fatal(e.toConvexError())),\n ),\n userOAuth: (a) =>\n userOAuthImpl(ctx, a, getProviderOrThrow, config).pipe(\n Fx.recover((e) => Fx.fatal(e.toConvexError())),\n ),\n createVerificationCode: (a) =>\n Fx.from({\n ok: () =>\n createVerificationCodeImpl(ctx, a, getProviderOrThrow, config),\n err: (e) => e as never,\n }),\n createAccountFromCredentials: (a) =>\n Fx.from({\n ok: () =>\n createAccountFromCredentialsImpl(\n ctx,\n a,\n getProviderOrThrow,\n config,\n ),\n err: (e) => e as never,\n }),\n retrieveAccountWithCredentials: (a) =>\n retrieveAccountWithCredentialsImpl(ctx, a, getProviderOrThrow, config),\n modifyAccount: (a) =>\n modifyAccountImpl(ctx, a, getProviderOrThrow, config).pipe(\n Fx.recover((e) => Fx.fatal(e.toConvexError())),\n ),\n invalidateSessions: (a) => invalidateSessionsImpl(ctx, a, config),\n }),\n );\n};\n"],"mappings":";;;;;;;;;;;;;;;;;AAyBA,MAAa,YAAY,EAAE,OAAO,EAChC,MAAM,EAAE,MACN,EAAE,OAAO;CACP,MAAM,EAAE,QAAQ,SAAS;CACzB,GAAG,WAAW;CACf,CAAC,EACF,EAAE,OAAO,EACP,MAAM,EAAE,QAAQ,UAAU,EAC3B,CAAC,EACF,EAAE,OAAO;CACP,MAAM,EAAE,QAAQ,iBAAiB;CACjC,GAAG,mBAAmB;CACvB,CAAC,EACF,EAAE,OAAO;CACP,MAAM,EAAE,QAAQ,sBAAsB;CACtC,GAAG,wBAAwB;CAC5B,CAAC,EACF,EAAE,OAAO,EACP,MAAM,EAAE,QAAQ,WAAW,EAC5B,CAAC,EACF,EAAE,OAAO;CACP,MAAM,EAAE,QAAQ,oBAAoB;CACpC,GAAG,sBAAsB;CAC1B,CAAC,EACF,EAAE,OAAO;CACP,MAAM,EAAE,QAAQ,YAAY;CAC5B,GAAG,cAAc;CAClB,CAAC,EACF,EAAE,OAAO;CACP,MAAM,EAAE,QAAQ,yBAAyB;CACzC,GAAG,2BAA2B;CAC/B,CAAC,EACF,EAAE,OAAO;CACP,MAAM,EAAE,QAAQ,+BAA+B;CAC/C,GAAG,iCAAiC;CACrC,CAAC,EACF,EAAE,OAAO;CACP,MAAM,EAAE,QAAQ,iCAAiC;CACjD,GAAG,mCAAmC;CACvC,CAAC,EACF,EAAE,OAAO;CACP,MAAM,EAAE,QAAQ,gBAAgB;CAChC,GAAG,kBAAkB;CACtB,CAAC,EACF,EAAE,OAAO;CACP,MAAM,EAAE,QAAQ,qBAAqB;CACrC,GAAG,uBAAuB;CAC3B,CAAC,CACH,EACF,CAAC;AAEF,MAAa,YAAY,OACvB,KACA,QACA,oBACA,WACG;CACH,MAAM,OAAO,OAAO;AACpB,cAAa,WAAW,MAAM,wBAAwB,KAAK,OAAO;AAClE,QAAO,GAAG,IACR,GAAG,MAAM,MAAM,KAAK,MAAM;EACxB,SAAS,MACP,GAAG,KAAK;GACN,UAAU,WAAW,KAAK,GAAG,OAAO;GACpC,MAAM,MAAM;GACb,CAAC;EACJ,eAAe,YAAY,KAAK,OAAO;EACvC,iBAAiB,MACf,GAAG,KAAK;GACN,UAAU,mBAAmB,KAAK,GAAG,oBAAoB,OAAO;GAChE,MAAM,MAAM;GACb,CAAC;EACJ,sBAAsB,MACpB,GAAG,KAAK;GACN,UAAU,wBAAwB,KAAK,GAAG,oBAAoB,OAAO;GACrE,MAAM,MAAM;GACb,CAAC;EACJ,gBAAgB,aAAa,KAAK,OAAO;EACzC,oBAAoB,MAClB,sBAAsB,KAAK,GAAG,OAAO,CAAC,KACpC,GAAG,SAAS,MAAM,GAAG,MAAM,EAAE,eAAe,CAAC,CAAC,CAC/C;EACH,YAAY,MACV,cAAc,KAAK,GAAG,oBAAoB,OAAO,CAAC,KAChD,GAAG,SAAS,MAAM,GAAG,MAAM,EAAE,eAAe,CAAC,CAAC,CAC/C;EACH,yBAAyB,MACvB,GAAG,KAAK;GACN,UACE,2BAA2B,KAAK,GAAG,oBAAoB,OAAO;GAChE,MAAM,MAAM;GACb,CAAC;EACJ,+BAA+B,MAC7B,GAAG,KAAK;GACN,UACE,iCACE,KACA,GACA,oBACA,OACD;GACH,MAAM,MAAM;GACb,CAAC;EACJ,iCAAiC,MAC/B,mCAAmC,KAAK,GAAG,oBAAoB,OAAO;EACxE,gBAAgB,MACd,kBAAkB,KAAK,GAAG,oBAAoB,OAAO,CAAC,KACpD,GAAG,SAAS,MAAM,GAAG,MAAM,EAAE,eAAe,CAAC,CAAC,CAC/C;EACH,qBAAqB,MAAM,uBAAuB,KAAK,GAAG,OAAO;EAClE,CAAC,CACH"}
1
+ {"version":3,"file":"store.js","names":[],"sources":["../../../src/server/mutations/store.ts"],"sourcesContent":["import { Fx } from \"@robelest/fx\";\nimport { Infer, v } from \"convex/values\";\n\nimport * as Provider from \"../crypto\";\nimport { MutationCtx } from \"../types\";\nimport { LOG_LEVELS, logWithLevel } from \"../utils\";\nimport { modifyAccountArgs, modifyAccountImpl } from \"./account\";\nimport { createVerificationCodeArgs, createVerificationCodeImpl } from \"./code\";\nimport { invalidateSessionsArgs, invalidateSessionsImpl } from \"./invalidate\";\nimport { userOAuthArgs, userOAuthImpl } from \"./oauth\";\nimport { refreshSessionArgs, refreshSessionImpl } from \"./refresh\";\nimport {\n createAccountFromCredentialsArgs,\n createAccountFromCredentialsImpl,\n} from \"./register\";\nimport {\n retrieveAccountWithCredentialsArgs,\n retrieveAccountWithCredentialsImpl,\n} from \"./retrieve\";\nimport { verifierSignatureArgs, verifierSignatureImpl } from \"./signature\";\nimport { signInArgs, signInImpl } from \"./signin\";\nimport { signOutImpl } from \"./signout\";\nimport { verifierImpl } from \"./verifier\";\nimport { verifyCodeAndSignInArgs, verifyCodeAndSignInImpl } from \"./verify\";\n\nexport const storeArgs = v.object({\n args: v.union(\n v.object({\n type: v.literal(\"signIn\"),\n ...signInArgs.fields,\n }),\n v.object({\n type: v.literal(\"signOut\"),\n }),\n v.object({\n type: v.literal(\"refreshSession\"),\n ...refreshSessionArgs.fields,\n }),\n v.object({\n type: v.literal(\"verifyCodeAndSignIn\"),\n ...verifyCodeAndSignInArgs.fields,\n }),\n v.object({\n type: v.literal(\"verifier\"),\n }),\n v.object({\n type: v.literal(\"verifierSignature\"),\n ...verifierSignatureArgs.fields,\n }),\n v.object({\n type: v.literal(\"userOAuth\"),\n ...userOAuthArgs.fields,\n }),\n v.object({\n type: v.literal(\"createVerificationCode\"),\n ...createVerificationCodeArgs.fields,\n }),\n v.object({\n type: v.literal(\"createAccountFromCredentials\"),\n ...createAccountFromCredentialsArgs.fields,\n }),\n v.object({\n type: v.literal(\"retrieveAccountWithCredentials\"),\n ...retrieveAccountWithCredentialsArgs.fields,\n }),\n v.object({\n type: v.literal(\"modifyAccount\"),\n ...modifyAccountArgs.fields,\n }),\n v.object({\n type: v.literal(\"invalidateSessions\"),\n ...invalidateSessionsArgs.fields,\n }),\n ),\n});\n\nexport const storeImpl = async (\n ctx: MutationCtx,\n fnArgs: Infer<typeof storeArgs>,\n getProviderOrThrow: Provider.GetProviderOrThrowFunc,\n config: Provider.Config,\n) => {\n const args = fnArgs.args;\n logWithLevel(LOG_LEVELS.INFO, `\\`auth:store\\` type: ${args.type}`);\n return Fx.run(\n Fx.match(args, args.type, {\n signIn: (a) => Fx.promise(() => signInImpl(ctx, a, config)),\n signOut: () => signOutImpl(ctx, config),\n refreshSession: (a) =>\n Fx.promise(() =>\n refreshSessionImpl(ctx, a, getProviderOrThrow, config),\n ),\n verifyCodeAndSignIn: (a) =>\n Fx.promise(() =>\n verifyCodeAndSignInImpl(ctx, a, getProviderOrThrow, config),\n ),\n verifier: () => verifierImpl(ctx, config),\n verifierSignature: (a) =>\n verifierSignatureImpl(ctx, a, config).pipe(\n Fx.recover((e) => Fx.fatal(e)),\n ),\n userOAuth: (a) =>\n userOAuthImpl(ctx, a, getProviderOrThrow, config).pipe(\n Fx.recover((e) => Fx.fatal(e)),\n ),\n createVerificationCode: (a) =>\n Fx.promise(() =>\n createVerificationCodeImpl(ctx, a, getProviderOrThrow, config),\n ),\n createAccountFromCredentials: (a) =>\n Fx.promise(() =>\n createAccountFromCredentialsImpl(ctx, a, getProviderOrThrow, config),\n ),\n retrieveAccountWithCredentials: (a) =>\n retrieveAccountWithCredentialsImpl(ctx, a, getProviderOrThrow, config),\n modifyAccount: (a) =>\n modifyAccountImpl(ctx, a, getProviderOrThrow, config).pipe(\n Fx.recover((e) => Fx.fatal(e)),\n ),\n invalidateSessions: (a) => invalidateSessionsImpl(ctx, a, config),\n }),\n );\n};\n"],"mappings":";;;;;;;;;;;;;;;;;AAyBA,MAAa,YAAY,EAAE,OAAO,EAChC,MAAM,EAAE,MACN,EAAE,OAAO;CACP,MAAM,EAAE,QAAQ,SAAS;CACzB,GAAG,WAAW;CACf,CAAC,EACF,EAAE,OAAO,EACP,MAAM,EAAE,QAAQ,UAAU,EAC3B,CAAC,EACF,EAAE,OAAO;CACP,MAAM,EAAE,QAAQ,iBAAiB;CACjC,GAAG,mBAAmB;CACvB,CAAC,EACF,EAAE,OAAO;CACP,MAAM,EAAE,QAAQ,sBAAsB;CACtC,GAAG,wBAAwB;CAC5B,CAAC,EACF,EAAE,OAAO,EACP,MAAM,EAAE,QAAQ,WAAW,EAC5B,CAAC,EACF,EAAE,OAAO;CACP,MAAM,EAAE,QAAQ,oBAAoB;CACpC,GAAG,sBAAsB;CAC1B,CAAC,EACF,EAAE,OAAO;CACP,MAAM,EAAE,QAAQ,YAAY;CAC5B,GAAG,cAAc;CAClB,CAAC,EACF,EAAE,OAAO;CACP,MAAM,EAAE,QAAQ,yBAAyB;CACzC,GAAG,2BAA2B;CAC/B,CAAC,EACF,EAAE,OAAO;CACP,MAAM,EAAE,QAAQ,+BAA+B;CAC/C,GAAG,iCAAiC;CACrC,CAAC,EACF,EAAE,OAAO;CACP,MAAM,EAAE,QAAQ,iCAAiC;CACjD,GAAG,mCAAmC;CACvC,CAAC,EACF,EAAE,OAAO;CACP,MAAM,EAAE,QAAQ,gBAAgB;CAChC,GAAG,kBAAkB;CACtB,CAAC,EACF,EAAE,OAAO;CACP,MAAM,EAAE,QAAQ,qBAAqB;CACrC,GAAG,uBAAuB;CAC3B,CAAC,CACH,EACF,CAAC;AAEF,MAAa,YAAY,OACvB,KACA,QACA,oBACA,WACG;CACH,MAAM,OAAO,OAAO;AACpB,cAAa,WAAW,MAAM,wBAAwB,KAAK,OAAO;AAClE,QAAO,GAAG,IACR,GAAG,MAAM,MAAM,KAAK,MAAM;EACxB,SAAS,MAAM,GAAG,cAAc,WAAW,KAAK,GAAG,OAAO,CAAC;EAC3D,eAAe,YAAY,KAAK,OAAO;EACvC,iBAAiB,MACf,GAAG,cACD,mBAAmB,KAAK,GAAG,oBAAoB,OAAO,CACvD;EACH,sBAAsB,MACpB,GAAG,cACD,wBAAwB,KAAK,GAAG,oBAAoB,OAAO,CAC5D;EACH,gBAAgB,aAAa,KAAK,OAAO;EACzC,oBAAoB,MAClB,sBAAsB,KAAK,GAAG,OAAO,CAAC,KACpC,GAAG,SAAS,MAAM,GAAG,MAAM,EAAE,CAAC,CAC/B;EACH,YAAY,MACV,cAAc,KAAK,GAAG,oBAAoB,OAAO,CAAC,KAChD,GAAG,SAAS,MAAM,GAAG,MAAM,EAAE,CAAC,CAC/B;EACH,yBAAyB,MACvB,GAAG,cACD,2BAA2B,KAAK,GAAG,oBAAoB,OAAO,CAC/D;EACH,+BAA+B,MAC7B,GAAG,cACD,iCAAiC,KAAK,GAAG,oBAAoB,OAAO,CACrE;EACH,iCAAiC,MAC/B,mCAAmC,KAAK,GAAG,oBAAoB,OAAO;EACxE,gBAAgB,MACd,kBAAkB,KAAK,GAAG,oBAAoB,OAAO,CAAC,KACpD,GAAG,SAAS,MAAM,GAAG,MAAM,EAAE,CAAC,CAC/B;EACH,qBAAqB,MAAM,uBAAuB,KAAK,GAAG,OAAO;EAClE,CAAC,CACH"}
@@ -1 +1 @@
1
- {"version":3,"file":"verifier.js","names":[],"sources":["../../../src/server/mutations/verifier.ts"],"sourcesContent":["import { Fx } from \"@robelest/fx\";\nimport type { GenericActionCtx, GenericDataModel } from \"convex/server\";\nimport { GenericId } from \"convex/values\";\n\nimport { authDb } from \"../db\";\nimport * as Provider from \"../crypto\";\nimport { getAuthSessionId } from \"../sessions\";\nimport { MutationCtx } from \"../types\";\nimport { AUTH_STORE_REF } from \"./store/refs\";\n\ntype ReturnType = GenericId<\"AuthVerifier\">;\n\nexport function verifierImpl(\n ctx: MutationCtx,\n config: Provider.Config,\n): Fx<ReturnType, never> {\n return Fx.gen(function* () {\n return (yield* Fx.promise(async () =>\n authDb(ctx, config).verifiers.create(\n (await getAuthSessionId(ctx)) ?? undefined,\n ),\n )) as ReturnType;\n });\n}\n\nexport const callVerifier = async <DataModel extends GenericDataModel>(\n ctx: GenericActionCtx<DataModel>,\n): Promise<ReturnType> => {\n return ctx.runMutation(AUTH_STORE_REF, {\n args: {\n type: \"verifier\",\n },\n });\n};\n"],"mappings":";;;;;;AAYA,SAAgB,aACd,KACA,QACuB;AACvB,QAAO,GAAG,IAAI,aAAa;AACzB,SAAQ,OAAO,GAAG,QAAQ,YACxB,OAAO,KAAK,OAAO,CAAC,UAAU,OAC3B,MAAM,iBAAiB,IAAI,IAAK,OAClC,CACF;GACD;;AAGJ,MAAa,eAAe,OAC1B,QACwB;AACxB,QAAO,IAAI,YAAY,gBAAgB,EACrC,MAAM,EACJ,MAAM,YACP,EACF,CAAC"}
1
+ {"version":3,"file":"verifier.js","names":[],"sources":["../../../src/server/mutations/verifier.ts"],"sourcesContent":["import { Fx } from \"@robelest/fx\";\nimport type { GenericActionCtx, GenericDataModel } from \"convex/server\";\nimport { GenericId } from \"convex/values\";\n\nimport * as Provider from \"../crypto\";\nimport { authDb } from \"../db\";\nimport { getAuthSessionId } from \"../sessions\";\nimport { MutationCtx } from \"../types\";\nimport { AUTH_STORE_REF } from \"./store/refs\";\n\ntype ReturnType = GenericId<\"AuthVerifier\">;\n\nexport function verifierImpl(\n ctx: MutationCtx,\n config: Provider.Config,\n): Fx<ReturnType, never> {\n return Fx.gen(function* () {\n return (yield* Fx.promise(async () =>\n authDb(ctx, config).verifiers.create(\n (await getAuthSessionId(ctx)) ?? undefined,\n ),\n )) as ReturnType;\n });\n}\n\nexport const callVerifier = async <DataModel extends GenericDataModel>(\n ctx: GenericActionCtx<DataModel>,\n): Promise<ReturnType> => {\n return ctx.runMutation(AUTH_STORE_REF, {\n args: {\n type: \"verifier\",\n },\n });\n};\n"],"mappings":";;;;;;AAYA,SAAgB,aACd,KACA,QACuB;AACvB,QAAO,GAAG,IAAI,aAAa;AACzB,SAAQ,OAAO,GAAG,QAAQ,YACxB,OAAO,KAAK,OAAO,CAAC,UAAU,OAC3B,MAAM,iBAAiB,IAAI,IAAK,OAClC,CACF;GACD;;AAGJ,MAAa,eAAe,OAC1B,QACwB;AACxB,QAAO,IAAI,YAAY,gBAAgB,EACrC,MAAM,EACJ,MAAM,YACP,EACF,CAAC"}
@@ -1,23 +1,23 @@
1
1
  import { MutationCtx, SessionInfo } from "../types.js";
2
2
  import { Config, GetProviderOrThrowFunc } from "../crypto.js";
3
3
  import { GenericActionCtx, GenericDataModel } from "convex/server";
4
- import * as convex_values95 from "convex/values";
4
+ import * as convex_values13 from "convex/values";
5
5
  import { Infer } from "convex/values";
6
6
 
7
7
  //#region src/server/mutations/verify.d.ts
8
- declare const verifyCodeAndSignInArgs: convex_values95.VObject<{
8
+ declare const verifyCodeAndSignInArgs: convex_values13.VObject<{
9
9
  provider?: string | undefined;
10
10
  verifier?: string | undefined;
11
- allowExtraProviders: boolean;
12
- generateTokens: boolean;
13
11
  params: any;
12
+ generateTokens: boolean;
13
+ allowExtraProviders: boolean;
14
14
  }, {
15
- params: convex_values95.VAny<any, "required", string>;
16
- provider: convex_values95.VString<string | undefined, "optional">;
17
- verifier: convex_values95.VString<string | undefined, "optional">;
18
- generateTokens: convex_values95.VBoolean<boolean, "required">;
19
- allowExtraProviders: convex_values95.VBoolean<boolean, "required">;
20
- }, "required", "provider" | "allowExtraProviders" | "generateTokens" | "params" | "verifier" | `params.${string}`>;
15
+ params: convex_values13.VAny<any, "required", string>;
16
+ provider: convex_values13.VString<string | undefined, "optional">;
17
+ verifier: convex_values13.VString<string | undefined, "optional">;
18
+ generateTokens: convex_values13.VBoolean<boolean, "required">;
19
+ allowExtraProviders: convex_values13.VBoolean<boolean, "required">;
20
+ }, "required", "provider" | "params" | "verifier" | "generateTokens" | "allowExtraProviders" | `params.${string}`>;
21
21
  type ReturnType = null | SessionInfo;
22
22
  declare function verifyCodeAndSignInImpl(ctx: MutationCtx, args: Infer<typeof verifyCodeAndSignInArgs>, getProviderOrThrow: GetProviderOrThrowFunc, config: Config): Promise<ReturnType>;
23
23
  declare const callVerifyCodeAndSignIn: <DataModel extends GenericDataModel>(ctx: GenericActionCtx<DataModel>, args: Infer<typeof verifyCodeAndSignInArgs>) => Promise<ReturnType>;
@@ -1 +1 @@
1
- {"version":3,"file":"verify.d.ts","names":[],"sources":["../../../src/server/mutations/verify.ts"],"mappings":";;;;;;;cA0Ba,uBAAA,kBAAuB,OAAA;;;;;;;UAMlC,eAAA,CAAA,IAAA;;;;;;KAEG,UAAA,UAAoB,WAAA;AAAA,iBAgBH,uBAAA,CACpB,GAAA,EAAK,WAAA,EACL,IAAA,EAAM,KAAA,QAAa,uBAAA,GACnB,kBAAA,EAAoB,sBAAA,EACpB,MAAA,EAAQ,MAAA,GACP,OAAA,CAAQ,UAAA;AAAA,cAsIE,uBAAA,qBACO,gBAAA,EAElB,GAAA,EAAK,gBAAA,CAAiB,SAAA,GACtB,IAAA,EAAM,KAAA,QAAa,uBAAA,MAClB,OAAA,CAAQ,UAAA"}
1
+ {"version":3,"file":"verify.d.ts","names":[],"sources":["../../../src/server/mutations/verify.ts"],"mappings":";;;;;;;cAwBa,uBAAA,kBAAuB,OAAA;;;;;;;UAMlC,eAAA,CAAA,IAAA;;;;;;KAEG,UAAA,UAAoB,WAAA;AAAA,iBAgBH,uBAAA,CACpB,GAAA,EAAK,WAAA,EACL,IAAA,EAAM,KAAA,QAAa,uBAAA,GACnB,kBAAA,EAAoB,sBAAA,EACpB,MAAA,EAAQ,MAAA,GACP,OAAA,CAAQ,UAAA;AAAA,cAsIE,uBAAA,qBACO,gBAAA,EAElB,GAAA,EAAK,gBAAA,CAAiB,SAAA,GACtB,IAAA,EAAM,KAAA,QAAa,uBAAA,MAClB,OAAA,CAAQ,UAAA"}
@@ -1 +1 @@
1
- {"version":3,"file":"verify.js","names":[],"sources":["../../../src/server/mutations/verify.ts"],"sourcesContent":["import { Fx } from \"@robelest/fx\";\nimport type { GenericActionCtx, GenericDataModel } from \"convex/server\";\nimport { Infer, v } from \"convex/values\";\n\nimport { authDb } from \"../db\";\nimport * as Provider from \"../crypto\";\nimport {\n isSignInRateLimited,\n recordFailedSignIn,\n resetSignInRateLimit,\n} from \"../limits\";\nimport {\n createNewAndDeleteExistingSession,\n getAuthSessionId,\n maybeGenerateTokensForSession,\n} from \"../sessions\";\nimport {\n createSyntheticOAuthMaterializedConfig,\n} from \"../enterprise/oidc\";\nimport { isEnterpriseProviderId } from \"../enterprise/shared\";\nimport { MutationCtx, SessionInfo } from \"../types\";\nimport { upsertUserAndAccount } from \"../users\";\nimport { LOG_LEVELS, logWithLevel, sha256 } from \"../utils\";\nimport { requireEnv } from \"../utils\";\nimport { AUTH_STORE_REF } from \"./store/refs\";\n\nexport const verifyCodeAndSignInArgs = v.object({\n params: v.any(),\n provider: v.optional(v.string()),\n verifier: v.optional(v.string()),\n generateTokens: v.boolean(),\n allowExtraProviders: v.boolean(),\n});\n\ntype ReturnType = null | SessionInfo;\n\n// ============================================================================\n// Small validators for the verification pipeline\n// ============================================================================\n\n/** A soft verification failure — logged and collapsed to null at the boundary. */\nclass VerifyFailure {\n readonly _tag = \"VerifyFailure\" as const;\n constructor(readonly reason: string) {}\n}\n\n// ============================================================================\n// Main exported function\n// ============================================================================\n\nexport async function verifyCodeAndSignInImpl(\n ctx: MutationCtx,\n args: Infer<typeof verifyCodeAndSignInArgs>,\n getProviderOrThrow: Provider.GetProviderOrThrowFunc,\n config: Provider.Config,\n): Promise<ReturnType> {\n logWithLevel(LOG_LEVELS.DEBUG, \"verifyCodeAndSignInImpl args:\", {\n params: { email: args.params.email, phone: args.params.phone },\n provider: args.provider,\n verifier: args.verifier,\n generateTokens: args.generateTokens,\n allowExtraProviders: args.allowExtraProviders,\n });\n\n const { generateTokens, provider, allowExtraProviders } = args;\n if (generateTokens) {\n requireEnv(\"JWT_PRIVATE_KEY\");\n requireEnv(\"JWKS\");\n requireEnv(\"CONVEX_SITE_URL\");\n }\n const identifier: string | undefined = args.params.email ?? args.params.phone;\n\n try {\n if (identifier !== undefined) {\n const limited = await Fx.run(\n isSignInRateLimited(ctx, identifier, config),\n );\n if (limited) {\n throw new VerifyFailure(\n \"Too many failed attempts to verify code for this email\",\n );\n }\n }\n\n const db = authDb(ctx, config);\n const { params, verifier } = args;\n const hash = await sha256(params.code);\n const code = await db.verificationCodes.getByCode(hash);\n if (code === null) {\n throw new VerifyFailure(\"Invalid verification code\");\n }\n\n await db.verificationCodes.delete(code._id);\n\n if (code.verifier !== verifier) {\n throw new VerifyFailure(\"Invalid verifier\");\n }\n if (code.expirationTime < Date.now()) {\n throw new VerifyFailure(\"Expired verification code\");\n }\n if (provider !== undefined && code.provider !== provider) {\n throw new VerifyFailure(\n `Invalid provider \"${provider}\" for given \\`code\\``,\n );\n }\n\n const account = await db.accounts.getById(code.accountId);\n if (account === null) {\n throw new VerifyFailure(\n \"Account associated with this email has been deleted\",\n );\n }\n\n const codeProvider = isEnterpriseProviderId(code.provider)\n ? createSyntheticOAuthMaterializedConfig(code.provider)\n : getProviderOrThrow(code.provider, allowExtraProviders);\n\n if (\n codeProvider !== null &&\n (codeProvider.type === \"email\" || codeProvider.type === \"phone\") &&\n codeProvider.authorize !== undefined\n ) {\n await codeProvider.authorize(args.params, account);\n }\n\n const methodProvider = isEnterpriseProviderId(account.provider)\n ? createSyntheticOAuthMaterializedConfig(account.provider)\n : getProviderOrThrow(account.provider);\n\n const userId =\n methodProvider.type === \"oauth\"\n ? account.userId\n : (\n await upsertUserAndAccount(\n ctx,\n await getAuthSessionId(ctx),\n { existingAccount: account },\n {\n type: \"verification\",\n provider: methodProvider,\n profile: {\n ...(code.emailVerified !== undefined\n ? { email: code.emailVerified, emailVerified: true }\n : {}),\n ...(code.phoneVerified !== undefined\n ? { phone: code.phoneVerified, phoneVerified: true }\n : {}),\n },\n },\n config,\n )\n ).userId;\n\n if (identifier !== undefined) {\n await Fx.run(resetSignInRateLimit(ctx, identifier, config));\n }\n\n const sessionId = await createNewAndDeleteExistingSession(\n ctx,\n config,\n userId,\n );\n return await maybeGenerateTokensForSession(\n ctx,\n config,\n userId,\n sessionId,\n generateTokens,\n );\n } catch (error) {\n if (error instanceof VerifyFailure) {\n logWithLevel(LOG_LEVELS.ERROR, error.reason);\n if (identifier !== undefined) {\n await Fx.run(recordFailedSignIn(ctx, identifier, config));\n }\n return null;\n }\n logWithLevel(\n LOG_LEVELS.ERROR,\n `verifyCodeAndSignInImpl failed: ${String(error)}`,\n );\n return null;\n }\n}\n\n// ============================================================================\n// Action-level caller (unchanged — just forwards to mutation)\n// ============================================================================\n\nexport const callVerifyCodeAndSignIn = async <\n DataModel extends GenericDataModel,\n>(\n ctx: GenericActionCtx<DataModel>,\n args: Infer<typeof verifyCodeAndSignInArgs>,\n): Promise<ReturnType> => {\n return ctx.runMutation(AUTH_STORE_REF, {\n args: {\n type: \"verifyCodeAndSignIn\",\n ...args,\n },\n });\n};\n"],"mappings":";;;;;;;;;;;;AA0BA,MAAa,0BAA0B,EAAE,OAAO;CAC9C,QAAQ,EAAE,KAAK;CACf,UAAU,EAAE,SAAS,EAAE,QAAQ,CAAC;CAChC,UAAU,EAAE,SAAS,EAAE,QAAQ,CAAC;CAChC,gBAAgB,EAAE,SAAS;CAC3B,qBAAqB,EAAE,SAAS;CACjC,CAAC;;AASF,IAAM,gBAAN,MAAoB;CAClB,AAAS,OAAO;CAChB,YAAY,AAAS,QAAgB;EAAhB;;;AAOvB,eAAsB,wBACpB,KACA,MACA,oBACA,QACqB;AACrB,cAAa,WAAW,OAAO,iCAAiC;EAC9D,QAAQ;GAAE,OAAO,KAAK,OAAO;GAAO,OAAO,KAAK,OAAO;GAAO;EAC9D,UAAU,KAAK;EACf,UAAU,KAAK;EACf,gBAAgB,KAAK;EACrB,qBAAqB,KAAK;EAC3B,CAAC;CAEF,MAAM,EAAE,gBAAgB,UAAU,wBAAwB;AAC1D,KAAI,gBAAgB;AAClB,aAAW,kBAAkB;AAC7B,aAAW,OAAO;AAClB,aAAW,kBAAkB;;CAE/B,MAAM,aAAiC,KAAK,OAAO,SAAS,KAAK,OAAO;AAExE,KAAI;AACF,MAAI,eAAe,QAIjB;OAHgB,MAAM,GAAG,IACvB,oBAAoB,KAAK,YAAY,OAAO,CAC7C,CAEC,OAAM,IAAI,cACR,yDACD;;EAIL,MAAM,KAAK,OAAO,KAAK,OAAO;EAC9B,MAAM,EAAE,QAAQ,aAAa;EAC7B,MAAM,OAAO,MAAM,OAAO,OAAO,KAAK;EACtC,MAAM,OAAO,MAAM,GAAG,kBAAkB,UAAU,KAAK;AACvD,MAAI,SAAS,KACX,OAAM,IAAI,cAAc,4BAA4B;AAGtD,QAAM,GAAG,kBAAkB,OAAO,KAAK,IAAI;AAE3C,MAAI,KAAK,aAAa,SACpB,OAAM,IAAI,cAAc,mBAAmB;AAE7C,MAAI,KAAK,iBAAiB,KAAK,KAAK,CAClC,OAAM,IAAI,cAAc,4BAA4B;AAEtD,MAAI,aAAa,UAAa,KAAK,aAAa,SAC9C,OAAM,IAAI,cACR,qBAAqB,SAAS,sBAC/B;EAGH,MAAM,UAAU,MAAM,GAAG,SAAS,QAAQ,KAAK,UAAU;AACzD,MAAI,YAAY,KACd,OAAM,IAAI,cACR,sDACD;EAGH,MAAM,eAAe,uBAAuB,KAAK,SAAS,GACtD,uCAAuC,KAAK,SAAS,GACrD,mBAAmB,KAAK,UAAU,oBAAoB;AAE1D,MACE,iBAAiB,SAChB,aAAa,SAAS,WAAW,aAAa,SAAS,YACxD,aAAa,cAAc,OAE3B,OAAM,aAAa,UAAU,KAAK,QAAQ,QAAQ;EAGpD,MAAM,iBAAiB,uBAAuB,QAAQ,SAAS,GAC3D,uCAAuC,QAAQ,SAAS,GACxD,mBAAmB,QAAQ,SAAS;EAExC,MAAM,SACJ,eAAe,SAAS,UACpB,QAAQ,UAEN,MAAM,qBACJ,KACA,MAAM,iBAAiB,IAAI,EAC3B,EAAE,iBAAiB,SAAS,EAC5B;GACE,MAAM;GACN,UAAU;GACV,SAAS;IACP,GAAI,KAAK,kBAAkB,SACvB;KAAE,OAAO,KAAK;KAAe,eAAe;KAAM,GAClD,EAAE;IACN,GAAI,KAAK,kBAAkB,SACvB;KAAE,OAAO,KAAK;KAAe,eAAe;KAAM,GAClD,EAAE;IACP;GACF,EACD,OACD,EACD;AAER,MAAI,eAAe,OACjB,OAAM,GAAG,IAAI,qBAAqB,KAAK,YAAY,OAAO,CAAC;AAQ7D,SAAO,MAAM,8BACX,KACA,QACA,QARgB,MAAM,kCACtB,KACA,QACA,OACD,EAMC,eACD;UACM,OAAO;AACd,MAAI,iBAAiB,eAAe;AAClC,gBAAa,WAAW,OAAO,MAAM,OAAO;AAC5C,OAAI,eAAe,OACjB,OAAM,GAAG,IAAI,mBAAmB,KAAK,YAAY,OAAO,CAAC;AAE3D,UAAO;;AAET,eACE,WAAW,OACX,mCAAmC,OAAO,MAAM,GACjD;AACD,SAAO;;;AAQX,MAAa,0BAA0B,OAGrC,KACA,SACwB;AACxB,QAAO,IAAI,YAAY,gBAAgB,EACrC,MAAM;EACJ,MAAM;EACN,GAAG;EACJ,EACF,CAAC"}
1
+ {"version":3,"file":"verify.js","names":[],"sources":["../../../src/server/mutations/verify.ts"],"sourcesContent":["import { Fx } from \"@robelest/fx\";\nimport type { GenericActionCtx, GenericDataModel } from \"convex/server\";\nimport { Infer, v } from \"convex/values\";\n\nimport * as Provider from \"../crypto\";\nimport { authDb } from \"../db\";\nimport { createSyntheticOAuthMaterializedConfig } from \"../enterprise/oidc\";\nimport { isEnterpriseProviderId } from \"../enterprise/shared\";\nimport {\n isSignInRateLimited,\n recordFailedSignIn,\n resetSignInRateLimit,\n} from \"../limits\";\nimport {\n createNewAndDeleteExistingSession,\n getAuthSessionId,\n maybeGenerateTokensForSession,\n} from \"../sessions\";\nimport { MutationCtx, SessionInfo } from \"../types\";\nimport { upsertUserAndAccount } from \"../users\";\nimport { LOG_LEVELS, logWithLevel, sha256 } from \"../utils\";\nimport { requireEnv } from \"../utils\";\nimport { AUTH_STORE_REF } from \"./store/refs\";\n\nexport const verifyCodeAndSignInArgs = v.object({\n params: v.any(),\n provider: v.optional(v.string()),\n verifier: v.optional(v.string()),\n generateTokens: v.boolean(),\n allowExtraProviders: v.boolean(),\n});\n\ntype ReturnType = null | SessionInfo;\n\n// ============================================================================\n// Small validators for the verification pipeline\n// ============================================================================\n\n/** A soft verification failure — logged and collapsed to null at the boundary. */\nclass VerifyFailure {\n readonly _tag = \"VerifyFailure\" as const;\n constructor(readonly reason: string) {}\n}\n\n// ============================================================================\n// Main exported function\n// ============================================================================\n\nexport async function verifyCodeAndSignInImpl(\n ctx: MutationCtx,\n args: Infer<typeof verifyCodeAndSignInArgs>,\n getProviderOrThrow: Provider.GetProviderOrThrowFunc,\n config: Provider.Config,\n): Promise<ReturnType> {\n logWithLevel(LOG_LEVELS.DEBUG, \"verifyCodeAndSignInImpl args:\", {\n params: { email: args.params.email, phone: args.params.phone },\n provider: args.provider,\n verifier: args.verifier,\n generateTokens: args.generateTokens,\n allowExtraProviders: args.allowExtraProviders,\n });\n\n const { generateTokens, provider, allowExtraProviders } = args;\n if (generateTokens) {\n requireEnv(\"JWT_PRIVATE_KEY\");\n requireEnv(\"JWKS\");\n requireEnv(\"CONVEX_SITE_URL\");\n }\n const identifier: string | undefined = args.params.email ?? args.params.phone;\n\n try {\n if (identifier !== undefined) {\n const limited = await Fx.run(\n isSignInRateLimited(ctx, identifier, config),\n );\n if (limited) {\n throw new VerifyFailure(\n \"Too many failed attempts to verify code for this email\",\n );\n }\n }\n\n const db = authDb(ctx, config);\n const { params, verifier } = args;\n const hash = await sha256(params.code);\n const code = await db.verificationCodes.getByCode(hash);\n if (code === null) {\n throw new VerifyFailure(\"Invalid verification code\");\n }\n\n await db.verificationCodes.delete(code._id);\n\n if (code.verifier !== verifier) {\n throw new VerifyFailure(\"Invalid verifier\");\n }\n if (code.expirationTime < Date.now()) {\n throw new VerifyFailure(\"Expired verification code\");\n }\n if (provider !== undefined && code.provider !== provider) {\n throw new VerifyFailure(\n `Invalid provider \"${provider}\" for given \\`code\\``,\n );\n }\n\n const account = await db.accounts.getById(code.accountId);\n if (account === null) {\n throw new VerifyFailure(\n \"Account associated with this email has been deleted\",\n );\n }\n\n const codeProvider = isEnterpriseProviderId(code.provider)\n ? createSyntheticOAuthMaterializedConfig(code.provider)\n : getProviderOrThrow(code.provider, allowExtraProviders);\n\n if (\n codeProvider !== null &&\n (codeProvider.type === \"email\" || codeProvider.type === \"phone\") &&\n codeProvider.authorize !== undefined\n ) {\n await codeProvider.authorize(args.params, account);\n }\n\n const methodProvider = isEnterpriseProviderId(account.provider)\n ? createSyntheticOAuthMaterializedConfig(account.provider)\n : getProviderOrThrow(account.provider);\n\n const userId =\n methodProvider.type === \"oauth\"\n ? account.userId\n : (\n await upsertUserAndAccount(\n ctx,\n await getAuthSessionId(ctx),\n { existingAccount: account },\n {\n type: \"verification\",\n provider: methodProvider,\n profile: {\n ...(code.emailVerified !== undefined\n ? { email: code.emailVerified, emailVerified: true }\n : {}),\n ...(code.phoneVerified !== undefined\n ? { phone: code.phoneVerified, phoneVerified: true }\n : {}),\n },\n },\n config,\n )\n ).userId;\n\n if (identifier !== undefined) {\n await Fx.run(resetSignInRateLimit(ctx, identifier, config));\n }\n\n const sessionId = await createNewAndDeleteExistingSession(\n ctx,\n config,\n userId,\n );\n return await maybeGenerateTokensForSession(\n ctx,\n config,\n userId,\n sessionId,\n generateTokens,\n );\n } catch (error) {\n if (error instanceof VerifyFailure) {\n logWithLevel(LOG_LEVELS.ERROR, error.reason);\n if (identifier !== undefined) {\n await Fx.run(recordFailedSignIn(ctx, identifier, config));\n }\n return null;\n }\n logWithLevel(\n LOG_LEVELS.ERROR,\n `verifyCodeAndSignInImpl failed: ${String(error)}`,\n );\n return null;\n }\n}\n\n// ============================================================================\n// Action-level caller (unchanged — just forwards to mutation)\n// ============================================================================\n\nexport const callVerifyCodeAndSignIn = async <\n DataModel extends GenericDataModel,\n>(\n ctx: GenericActionCtx<DataModel>,\n args: Infer<typeof verifyCodeAndSignInArgs>,\n): Promise<ReturnType> => {\n return ctx.runMutation(AUTH_STORE_REF, {\n args: {\n type: \"verifyCodeAndSignIn\",\n ...args,\n },\n });\n};\n"],"mappings":";;;;;;;;;;;;AAwBA,MAAa,0BAA0B,EAAE,OAAO;CAC9C,QAAQ,EAAE,KAAK;CACf,UAAU,EAAE,SAAS,EAAE,QAAQ,CAAC;CAChC,UAAU,EAAE,SAAS,EAAE,QAAQ,CAAC;CAChC,gBAAgB,EAAE,SAAS;CAC3B,qBAAqB,EAAE,SAAS;CACjC,CAAC;;AASF,IAAM,gBAAN,MAAoB;CAClB,AAAS,OAAO;CAChB,YAAY,AAAS,QAAgB;EAAhB;;;AAOvB,eAAsB,wBACpB,KACA,MACA,oBACA,QACqB;AACrB,cAAa,WAAW,OAAO,iCAAiC;EAC9D,QAAQ;GAAE,OAAO,KAAK,OAAO;GAAO,OAAO,KAAK,OAAO;GAAO;EAC9D,UAAU,KAAK;EACf,UAAU,KAAK;EACf,gBAAgB,KAAK;EACrB,qBAAqB,KAAK;EAC3B,CAAC;CAEF,MAAM,EAAE,gBAAgB,UAAU,wBAAwB;AAC1D,KAAI,gBAAgB;AAClB,aAAW,kBAAkB;AAC7B,aAAW,OAAO;AAClB,aAAW,kBAAkB;;CAE/B,MAAM,aAAiC,KAAK,OAAO,SAAS,KAAK,OAAO;AAExE,KAAI;AACF,MAAI,eAAe,QAIjB;OAHgB,MAAM,GAAG,IACvB,oBAAoB,KAAK,YAAY,OAAO,CAC7C,CAEC,OAAM,IAAI,cACR,yDACD;;EAIL,MAAM,KAAK,OAAO,KAAK,OAAO;EAC9B,MAAM,EAAE,QAAQ,aAAa;EAC7B,MAAM,OAAO,MAAM,OAAO,OAAO,KAAK;EACtC,MAAM,OAAO,MAAM,GAAG,kBAAkB,UAAU,KAAK;AACvD,MAAI,SAAS,KACX,OAAM,IAAI,cAAc,4BAA4B;AAGtD,QAAM,GAAG,kBAAkB,OAAO,KAAK,IAAI;AAE3C,MAAI,KAAK,aAAa,SACpB,OAAM,IAAI,cAAc,mBAAmB;AAE7C,MAAI,KAAK,iBAAiB,KAAK,KAAK,CAClC,OAAM,IAAI,cAAc,4BAA4B;AAEtD,MAAI,aAAa,UAAa,KAAK,aAAa,SAC9C,OAAM,IAAI,cACR,qBAAqB,SAAS,sBAC/B;EAGH,MAAM,UAAU,MAAM,GAAG,SAAS,QAAQ,KAAK,UAAU;AACzD,MAAI,YAAY,KACd,OAAM,IAAI,cACR,sDACD;EAGH,MAAM,eAAe,uBAAuB,KAAK,SAAS,GACtD,uCAAuC,KAAK,SAAS,GACrD,mBAAmB,KAAK,UAAU,oBAAoB;AAE1D,MACE,iBAAiB,SAChB,aAAa,SAAS,WAAW,aAAa,SAAS,YACxD,aAAa,cAAc,OAE3B,OAAM,aAAa,UAAU,KAAK,QAAQ,QAAQ;EAGpD,MAAM,iBAAiB,uBAAuB,QAAQ,SAAS,GAC3D,uCAAuC,QAAQ,SAAS,GACxD,mBAAmB,QAAQ,SAAS;EAExC,MAAM,SACJ,eAAe,SAAS,UACpB,QAAQ,UAEN,MAAM,qBACJ,KACA,MAAM,iBAAiB,IAAI,EAC3B,EAAE,iBAAiB,SAAS,EAC5B;GACE,MAAM;GACN,UAAU;GACV,SAAS;IACP,GAAI,KAAK,kBAAkB,SACvB;KAAE,OAAO,KAAK;KAAe,eAAe;KAAM,GAClD,EAAE;IACN,GAAI,KAAK,kBAAkB,SACvB;KAAE,OAAO,KAAK;KAAe,eAAe;KAAM,GAClD,EAAE;IACP;GACF,EACD,OACD,EACD;AAER,MAAI,eAAe,OACjB,OAAM,GAAG,IAAI,qBAAqB,KAAK,YAAY,OAAO,CAAC;AAQ7D,SAAO,MAAM,8BACX,KACA,QACA,QARgB,MAAM,kCACtB,KACA,QACA,OACD,EAMC,eACD;UACM,OAAO;AACd,MAAI,iBAAiB,eAAe;AAClC,gBAAa,WAAW,OAAO,MAAM,OAAO;AAC5C,OAAI,eAAe,OACjB,OAAM,GAAG,IAAI,mBAAmB,KAAK,YAAY,OAAO,CAAC;AAE3D,UAAO;;AAET,eACE,WAAW,OACX,mCAAmC,OAAO,MAAM,GACjD;AACD,SAAO;;;AAQX,MAAa,0BAA0B,OAGrC,KACA,SACwB;AACxB,QAAO,IAAI,YAAY,gBAAgB,EACrC,MAAM;EACJ,MAAM;EACN,GAAG;EACJ,EACF,CAAC"}