@robelest/convex-auth 0.0.4-preview.21 → 0.0.4-preview.23
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/authorization/index.d.ts +1 -1
- package/dist/authorization/index.js +1 -1
- package/dist/authorization/index.js.map +1 -1
- package/dist/client/index.d.ts +1 -2
- package/dist/client/index.d.ts.map +1 -1
- package/dist/client/index.js +36 -39
- package/dist/client/index.js.map +1 -1
- package/dist/component/client/index.d.ts +1 -2
- package/dist/component/convex.config.d.ts +2 -2
- package/dist/component/convex.config.d.ts.map +1 -1
- package/dist/component/model.d.ts +5 -5
- package/dist/component/model.d.ts.map +1 -1
- package/dist/component/public/enterprise/audit.d.ts.map +1 -1
- package/dist/component/public/enterprise/audit.js.map +1 -1
- package/dist/component/public/enterprise/core.d.ts.map +1 -1
- package/dist/component/public/enterprise/core.js.map +1 -1
- package/dist/component/public/enterprise/domains.d.ts.map +1 -1
- package/dist/component/public/enterprise/domains.js.map +1 -1
- package/dist/component/public/enterprise/scim.d.ts.map +1 -1
- package/dist/component/public/enterprise/scim.js.map +1 -1
- package/dist/component/public/enterprise/secrets.d.ts.map +1 -1
- package/dist/component/public/enterprise/secrets.js.map +1 -1
- package/dist/component/public/enterprise/webhooks.d.ts.map +1 -1
- package/dist/component/public/enterprise/webhooks.js.map +1 -1
- package/dist/component/public/factors/devices.d.ts.map +1 -1
- package/dist/component/public/factors/devices.js.map +1 -1
- package/dist/component/public/factors/passkeys.d.ts.map +1 -1
- package/dist/component/public/factors/passkeys.js.map +1 -1
- package/dist/component/public/factors/totp.d.ts.map +1 -1
- package/dist/component/public/factors/totp.js.map +1 -1
- package/dist/component/public/groups/core.js.map +1 -1
- package/dist/component/public/groups/invites.d.ts.map +1 -1
- package/dist/component/public/groups/invites.js.map +1 -1
- package/dist/component/public/groups/members.d.ts.map +1 -1
- package/dist/component/public/groups/members.js.map +1 -1
- package/dist/component/public/identity/accounts.d.ts.map +1 -1
- package/dist/component/public/identity/accounts.js.map +1 -1
- package/dist/component/public/identity/codes.d.ts.map +1 -1
- package/dist/component/public/identity/codes.js.map +1 -1
- package/dist/component/public/identity/sessions.d.ts.map +1 -1
- package/dist/component/public/identity/sessions.js.map +1 -1
- package/dist/component/public/identity/tokens.d.ts.map +1 -1
- package/dist/component/public/identity/tokens.js.map +1 -1
- package/dist/component/public/identity/users.d.ts.map +1 -1
- package/dist/component/public/identity/users.js.map +1 -1
- package/dist/component/public/identity/verifiers.d.ts.map +1 -1
- package/dist/component/public/identity/verifiers.js.map +1 -1
- package/dist/component/public/security/keys.d.ts.map +1 -1
- package/dist/component/public/security/keys.js.map +1 -1
- package/dist/component/public/security/limits.d.ts.map +1 -1
- package/dist/component/public/security/limits.js.map +1 -1
- package/dist/component/schema.d.ts +39 -39
- package/dist/component/server/auth.d.ts +95 -52
- package/dist/component/server/auth.d.ts.map +1 -1
- package/dist/component/server/auth.js +63 -43
- package/dist/component/server/auth.js.map +1 -1
- package/dist/component/server/core.js +116 -235
- package/dist/component/server/core.js.map +1 -1
- package/dist/component/server/crypto.js +25 -7
- package/dist/component/server/crypto.js.map +1 -1
- package/dist/component/server/device.js +58 -15
- package/dist/component/server/device.js.map +1 -1
- package/dist/component/server/enterprise/domain.js +148 -59
- package/dist/component/server/enterprise/domain.js.map +1 -1
- package/dist/component/server/enterprise/http.js +36 -15
- package/dist/component/server/enterprise/http.js.map +1 -1
- package/dist/component/server/enterprise/oidc.js +1 -1
- package/dist/component/server/http.js +26 -21
- package/dist/component/server/http.js.map +1 -1
- package/dist/component/server/identity.js +5 -2
- package/dist/component/server/identity.js.map +1 -1
- package/dist/component/server/limits.js +21 -30
- package/dist/component/server/limits.js.map +1 -1
- package/dist/component/server/mutations/account.js +12 -10
- package/dist/component/server/mutations/account.js.map +1 -1
- package/dist/component/server/mutations/code.js +5 -2
- package/dist/component/server/mutations/code.js.map +1 -1
- package/dist/component/server/mutations/invalidate.js +1 -1
- package/dist/component/server/mutations/invalidate.js.map +1 -1
- package/dist/component/server/mutations/oauth.js +10 -4
- package/dist/component/server/mutations/oauth.js.map +1 -1
- package/dist/component/server/mutations/refresh.js +2 -2
- package/dist/component/server/mutations/refresh.js.map +1 -1
- package/dist/component/server/mutations/register.js +46 -42
- package/dist/component/server/mutations/register.js.map +1 -1
- package/dist/component/server/mutations/retrieve.js +21 -25
- package/dist/component/server/mutations/retrieve.js.map +1 -1
- package/dist/component/server/mutations/signature.js +10 -4
- package/dist/component/server/mutations/signature.js.map +1 -1
- package/dist/component/server/mutations/signout.js.map +1 -1
- package/dist/component/server/mutations/store.js +9 -24
- package/dist/component/server/mutations/store.js.map +1 -1
- package/dist/component/server/mutations/verifier.js.map +1 -1
- package/dist/component/server/mutations/verify.js +1 -1
- package/dist/component/server/mutations/verify.js.map +1 -1
- package/dist/component/server/oauth.js +53 -16
- package/dist/component/server/oauth.js.map +1 -1
- package/dist/component/server/passkey.js +115 -31
- package/dist/component/server/passkey.js.map +1 -1
- package/dist/component/server/redirects.js +9 -3
- package/dist/component/server/redirects.js.map +1 -1
- package/dist/component/server/refresh.js +10 -7
- package/dist/component/server/refresh.js.map +1 -1
- package/dist/component/server/runtime.d.ts +3 -3
- package/dist/component/server/runtime.d.ts.map +1 -1
- package/dist/component/server/runtime.js +62 -20
- package/dist/component/server/runtime.js.map +1 -1
- package/dist/component/server/signin.js +34 -10
- package/dist/component/server/signin.js.map +1 -1
- package/dist/component/server/totp.js +79 -19
- package/dist/component/server/totp.js.map +1 -1
- package/dist/component/server/types.d.ts +12 -20
- package/dist/component/server/types.d.ts.map +1 -1
- package/dist/component/server/types.js.map +1 -1
- package/dist/component/server/users.js +6 -3
- package/dist/component/server/users.js.map +1 -1
- package/dist/component/server/utils.js +10 -4
- package/dist/component/server/utils.js.map +1 -1
- package/dist/core/types.d.ts +14 -22
- package/dist/core/types.d.ts.map +1 -1
- package/dist/factors/device.js +8 -9
- package/dist/factors/device.js.map +1 -1
- package/dist/factors/passkey.js +18 -21
- package/dist/factors/passkey.js.map +1 -1
- package/dist/providers/password.js +66 -81
- package/dist/providers/password.js.map +1 -1
- package/dist/runtime/invite.js +2 -8
- package/dist/runtime/invite.js.map +1 -1
- package/dist/server/auth.d.ts +95 -52
- package/dist/server/auth.d.ts.map +1 -1
- package/dist/server/auth.js +63 -43
- package/dist/server/auth.js.map +1 -1
- package/dist/server/core.d.ts +71 -159
- package/dist/server/core.d.ts.map +1 -1
- package/dist/server/core.js +116 -235
- package/dist/server/core.js.map +1 -1
- package/dist/server/crypto.d.ts.map +1 -1
- package/dist/server/crypto.js +25 -7
- package/dist/server/crypto.js.map +1 -1
- package/dist/server/device.js +58 -15
- package/dist/server/device.js.map +1 -1
- package/dist/server/enterprise/domain.d.ts +0 -8
- package/dist/server/enterprise/domain.d.ts.map +1 -1
- package/dist/server/enterprise/domain.js +148 -59
- package/dist/server/enterprise/domain.js.map +1 -1
- package/dist/server/enterprise/http.d.ts.map +1 -1
- package/dist/server/enterprise/http.js +35 -14
- package/dist/server/enterprise/http.js.map +1 -1
- package/dist/server/http.d.ts +2 -2
- package/dist/server/http.d.ts.map +1 -1
- package/dist/server/http.js +25 -20
- package/dist/server/http.js.map +1 -1
- package/dist/server/identity.js +5 -2
- package/dist/server/identity.js.map +1 -1
- package/dist/server/index.d.ts +2 -2
- package/dist/server/limits.js +21 -30
- package/dist/server/limits.js.map +1 -1
- package/dist/server/mounts.d.ts +26 -64
- package/dist/server/mounts.d.ts.map +1 -1
- package/dist/server/mounts.js +45 -106
- package/dist/server/mounts.js.map +1 -1
- package/dist/server/mutations/account.d.ts +8 -9
- package/dist/server/mutations/account.d.ts.map +1 -1
- package/dist/server/mutations/account.js +11 -9
- package/dist/server/mutations/account.js.map +1 -1
- package/dist/server/mutations/code.d.ts +13 -13
- package/dist/server/mutations/code.d.ts.map +1 -1
- package/dist/server/mutations/code.js +5 -2
- package/dist/server/mutations/code.js.map +1 -1
- package/dist/server/mutations/invalidate.d.ts +4 -4
- package/dist/server/mutations/invalidate.d.ts.map +1 -1
- package/dist/server/mutations/invalidate.js.map +1 -1
- package/dist/server/mutations/oauth.d.ts +12 -10
- package/dist/server/mutations/oauth.d.ts.map +1 -1
- package/dist/server/mutations/oauth.js +9 -3
- package/dist/server/mutations/oauth.js.map +1 -1
- package/dist/server/mutations/refresh.d.ts +3 -3
- package/dist/server/mutations/refresh.d.ts.map +1 -1
- package/dist/server/mutations/refresh.js +1 -1
- package/dist/server/mutations/refresh.js.map +1 -1
- package/dist/server/mutations/register.d.ts +11 -11
- package/dist/server/mutations/register.d.ts.map +1 -1
- package/dist/server/mutations/register.js +45 -41
- package/dist/server/mutations/register.js.map +1 -1
- package/dist/server/mutations/retrieve.d.ts +6 -6
- package/dist/server/mutations/retrieve.d.ts.map +1 -1
- package/dist/server/mutations/retrieve.js +20 -24
- package/dist/server/mutations/retrieve.js.map +1 -1
- package/dist/server/mutations/signature.d.ts +6 -7
- package/dist/server/mutations/signature.d.ts.map +1 -1
- package/dist/server/mutations/signature.js +9 -3
- package/dist/server/mutations/signature.js.map +1 -1
- package/dist/server/mutations/signin.d.ts +5 -5
- package/dist/server/mutations/signin.d.ts.map +1 -1
- package/dist/server/mutations/signout.js.map +1 -1
- package/dist/server/mutations/store.d.ts +97 -97
- package/dist/server/mutations/store.d.ts.map +1 -1
- package/dist/server/mutations/store.js +8 -23
- package/dist/server/mutations/store.js.map +1 -1
- package/dist/server/mutations/verifier.js.map +1 -1
- package/dist/server/mutations/verify.d.ts +10 -10
- package/dist/server/mutations/verify.d.ts.map +1 -1
- package/dist/server/mutations/verify.js.map +1 -1
- package/dist/server/oauth.js +53 -16
- package/dist/server/oauth.js.map +1 -1
- package/dist/server/passkey.d.ts +2 -2
- package/dist/server/passkey.d.ts.map +1 -1
- package/dist/server/passkey.js +114 -30
- package/dist/server/passkey.js.map +1 -1
- package/dist/server/redirects.js +9 -3
- package/dist/server/redirects.js.map +1 -1
- package/dist/server/refresh.js +10 -7
- package/dist/server/refresh.js.map +1 -1
- package/dist/server/runtime.d.ts +14 -14
- package/dist/server/runtime.d.ts.map +1 -1
- package/dist/server/runtime.js +61 -19
- package/dist/server/runtime.js.map +1 -1
- package/dist/server/signin.js +34 -10
- package/dist/server/signin.js.map +1 -1
- package/dist/server/ssr.d.ts.map +1 -1
- package/dist/server/ssr.js +175 -184
- package/dist/server/ssr.js.map +1 -1
- package/dist/server/totp.js +78 -18
- package/dist/server/totp.js.map +1 -1
- package/dist/server/types.d.ts +13 -21
- package/dist/server/types.d.ts.map +1 -1
- package/dist/server/types.js.map +1 -1
- package/dist/server/users.js +6 -3
- package/dist/server/users.js.map +1 -1
- package/dist/server/utils.js +10 -4
- package/dist/server/utils.js.map +1 -1
- package/package.json +2 -6
- package/src/authorization/index.ts +1 -1
- package/src/cli/index.ts +1 -1
- package/src/client/core/types.ts +14 -14
- package/src/client/factors/device.ts +10 -12
- package/src/client/factors/passkey.ts +23 -26
- package/src/client/index.ts +54 -64
- package/src/client/runtime/invite.ts +5 -7
- package/src/component/index.ts +1 -0
- package/src/component/public/enterprise/audit.ts +6 -1
- package/src/component/public/enterprise/core.ts +1 -0
- package/src/component/public/enterprise/domains.ts +5 -1
- package/src/component/public/enterprise/scim.ts +1 -0
- package/src/component/public/enterprise/secrets.ts +1 -0
- package/src/component/public/enterprise/webhooks.ts +1 -0
- package/src/component/public/factors/devices.ts +1 -0
- package/src/component/public/factors/passkeys.ts +1 -0
- package/src/component/public/factors/totp.ts +1 -0
- package/src/component/public/groups/core.ts +1 -1
- package/src/component/public/groups/invites.ts +7 -1
- package/src/component/public/groups/members.ts +1 -0
- package/src/component/public/identity/accounts.ts +1 -0
- package/src/component/public/identity/codes.ts +1 -0
- package/src/component/public/identity/sessions.ts +1 -0
- package/src/component/public/identity/tokens.ts +1 -0
- package/src/component/public/identity/users.ts +1 -0
- package/src/component/public/identity/verifiers.ts +1 -0
- package/src/component/public/security/keys.ts +1 -0
- package/src/component/public/security/limits.ts +1 -0
- package/src/providers/password.ts +89 -110
- package/src/server/auth.ts +177 -111
- package/src/server/core.ts +197 -233
- package/src/server/crypto.ts +31 -29
- package/src/server/device.ts +65 -32
- package/src/server/enterprise/domain.ts +158 -170
- package/src/server/enterprise/http.ts +46 -39
- package/src/server/http.ts +36 -30
- package/src/server/identity.ts +5 -5
- package/src/server/index.ts +2 -0
- package/src/server/limits.ts +53 -80
- package/src/server/mounts.ts +47 -74
- package/src/server/mutations/account.ts +22 -36
- package/src/server/mutations/code.ts +6 -6
- package/src/server/mutations/invalidate.ts +1 -1
- package/src/server/mutations/oauth.ts +14 -8
- package/src/server/mutations/refresh.ts +5 -4
- package/src/server/mutations/register.ts +87 -132
- package/src/server/mutations/retrieve.ts +44 -44
- package/src/server/mutations/signature.ts +13 -6
- package/src/server/mutations/signout.ts +1 -1
- package/src/server/mutations/store.ts +16 -31
- package/src/server/mutations/verifier.ts +1 -1
- package/src/server/mutations/verify.ts +3 -5
- package/src/server/oauth.ts +60 -69
- package/src/server/passkey.ts +567 -517
- package/src/server/redirects.ts +10 -6
- package/src/server/refresh.ts +14 -18
- package/src/server/runtime.ts +70 -55
- package/src/server/signin.ts +44 -37
- package/src/server/ssr.ts +390 -407
- package/src/server/totp.ts +85 -35
- package/src/server/types.ts +19 -22
- package/src/server/users.ts +7 -6
- package/src/server/utils.ts +10 -12
- package/dist/component/server/authError.js +0 -34
- package/dist/component/server/authError.js.map +0 -1
- package/dist/component/server/errors.d.ts +0 -1
- package/dist/component/server/errors.js +0 -137
- package/dist/component/server/errors.js.map +0 -1
- package/dist/server/authError.d.ts +0 -46
- package/dist/server/authError.d.ts.map +0 -1
- package/dist/server/authError.js +0 -34
- package/dist/server/authError.js.map +0 -1
- package/dist/server/errors.d.ts +0 -177
- package/dist/server/errors.d.ts.map +0 -1
- package/dist/server/errors.js +0 -212
- package/dist/server/errors.js.map +0 -1
- package/src/server/authError.ts +0 -44
- package/src/server/errors.ts +0 -290
|
@@ -1,14 +1,14 @@
|
|
|
1
1
|
import { Doc, MutationCtx, SessionInfo } from "../types.js";
|
|
2
2
|
import { Config, GetProviderOrThrowFunc } from "../crypto.js";
|
|
3
|
-
import * as
|
|
3
|
+
import * as convex_values19 from "convex/values";
|
|
4
4
|
import { Infer } from "convex/values";
|
|
5
5
|
|
|
6
6
|
//#region src/server/mutations/store.d.ts
|
|
7
|
-
declare const storeArgs:
|
|
7
|
+
declare const storeArgs: convex_values19.VObject<{
|
|
8
8
|
args: {
|
|
9
9
|
sessionId?: string | undefined;
|
|
10
|
-
userId: string;
|
|
11
10
|
type: "signIn";
|
|
11
|
+
userId: string;
|
|
12
12
|
generateTokens: boolean;
|
|
13
13
|
} | {
|
|
14
14
|
type: "signOut";
|
|
@@ -19,9 +19,9 @@ declare const storeArgs: convex_values20.VObject<{
|
|
|
19
19
|
provider?: string | undefined;
|
|
20
20
|
verifier?: string | undefined;
|
|
21
21
|
type: "verifyCodeAndSignIn";
|
|
22
|
-
allowExtraProviders: boolean;
|
|
23
|
-
generateTokens: boolean;
|
|
24
22
|
params: any;
|
|
23
|
+
generateTokens: boolean;
|
|
24
|
+
allowExtraProviders: boolean;
|
|
25
25
|
} | {
|
|
26
26
|
type: "verifier";
|
|
27
27
|
} | {
|
|
@@ -36,24 +36,24 @@ declare const storeArgs: convex_values20.VObject<{
|
|
|
36
36
|
providerAccountId: string;
|
|
37
37
|
profile: any;
|
|
38
38
|
} | {
|
|
39
|
-
email?: string | undefined;
|
|
40
|
-
accountId?: string | undefined;
|
|
41
39
|
phone?: string | undefined;
|
|
40
|
+
accountId?: string | undefined;
|
|
41
|
+
email?: string | undefined;
|
|
42
42
|
type: "createVerificationCode";
|
|
43
43
|
provider: string;
|
|
44
|
+
allowExtraProviders: boolean;
|
|
44
45
|
code: string;
|
|
45
46
|
expirationTime: number;
|
|
46
|
-
allowExtraProviders: boolean;
|
|
47
47
|
} | {
|
|
48
48
|
shouldLinkViaEmail?: boolean | undefined;
|
|
49
49
|
shouldLinkViaPhone?: boolean | undefined;
|
|
50
50
|
type: "createAccountFromCredentials";
|
|
51
51
|
provider: string;
|
|
52
|
+
profile: any;
|
|
52
53
|
account: {
|
|
53
54
|
secret?: string | undefined;
|
|
54
55
|
id: string;
|
|
55
56
|
};
|
|
56
|
-
profile: any;
|
|
57
57
|
} | {
|
|
58
58
|
type: "retrieveAccountWithCredentials";
|
|
59
59
|
provider: string;
|
|
@@ -70,14 +70,14 @@ declare const storeArgs: convex_values20.VObject<{
|
|
|
70
70
|
};
|
|
71
71
|
} | {
|
|
72
72
|
except?: string[] | undefined;
|
|
73
|
-
userId: string;
|
|
74
73
|
type: "invalidateSessions";
|
|
74
|
+
userId: string;
|
|
75
75
|
};
|
|
76
76
|
}, {
|
|
77
|
-
args:
|
|
77
|
+
args: convex_values19.VUnion<{
|
|
78
78
|
sessionId?: string | undefined;
|
|
79
|
-
userId: string;
|
|
80
79
|
type: "signIn";
|
|
80
|
+
userId: string;
|
|
81
81
|
generateTokens: boolean;
|
|
82
82
|
} | {
|
|
83
83
|
type: "signOut";
|
|
@@ -88,9 +88,9 @@ declare const storeArgs: convex_values20.VObject<{
|
|
|
88
88
|
provider?: string | undefined;
|
|
89
89
|
verifier?: string | undefined;
|
|
90
90
|
type: "verifyCodeAndSignIn";
|
|
91
|
-
allowExtraProviders: boolean;
|
|
92
|
-
generateTokens: boolean;
|
|
93
91
|
params: any;
|
|
92
|
+
generateTokens: boolean;
|
|
93
|
+
allowExtraProviders: boolean;
|
|
94
94
|
} | {
|
|
95
95
|
type: "verifier";
|
|
96
96
|
} | {
|
|
@@ -105,24 +105,24 @@ declare const storeArgs: convex_values20.VObject<{
|
|
|
105
105
|
providerAccountId: string;
|
|
106
106
|
profile: any;
|
|
107
107
|
} | {
|
|
108
|
-
email?: string | undefined;
|
|
109
|
-
accountId?: string | undefined;
|
|
110
108
|
phone?: string | undefined;
|
|
109
|
+
accountId?: string | undefined;
|
|
110
|
+
email?: string | undefined;
|
|
111
111
|
type: "createVerificationCode";
|
|
112
112
|
provider: string;
|
|
113
|
+
allowExtraProviders: boolean;
|
|
113
114
|
code: string;
|
|
114
115
|
expirationTime: number;
|
|
115
|
-
allowExtraProviders: boolean;
|
|
116
116
|
} | {
|
|
117
117
|
shouldLinkViaEmail?: boolean | undefined;
|
|
118
118
|
shouldLinkViaPhone?: boolean | undefined;
|
|
119
119
|
type: "createAccountFromCredentials";
|
|
120
120
|
provider: string;
|
|
121
|
+
profile: any;
|
|
121
122
|
account: {
|
|
122
123
|
secret?: string | undefined;
|
|
123
124
|
id: string;
|
|
124
125
|
};
|
|
125
|
-
profile: any;
|
|
126
126
|
} | {
|
|
127
127
|
type: "retrieveAccountWithCredentials";
|
|
128
128
|
provider: string;
|
|
@@ -139,55 +139,55 @@ declare const storeArgs: convex_values20.VObject<{
|
|
|
139
139
|
};
|
|
140
140
|
} | {
|
|
141
141
|
except?: string[] | undefined;
|
|
142
|
-
userId: string;
|
|
143
142
|
type: "invalidateSessions";
|
|
144
|
-
}, [convex_values20.VObject<{
|
|
145
|
-
sessionId?: string | undefined;
|
|
146
143
|
userId: string;
|
|
144
|
+
}, [convex_values19.VObject<{
|
|
145
|
+
sessionId?: string | undefined;
|
|
147
146
|
type: "signIn";
|
|
147
|
+
userId: string;
|
|
148
148
|
generateTokens: boolean;
|
|
149
149
|
}, {
|
|
150
|
-
userId:
|
|
151
|
-
sessionId:
|
|
152
|
-
generateTokens:
|
|
153
|
-
type:
|
|
154
|
-
}, "required", "
|
|
150
|
+
userId: convex_values19.VString<string, "required">;
|
|
151
|
+
sessionId: convex_values19.VString<string | undefined, "optional">;
|
|
152
|
+
generateTokens: convex_values19.VBoolean<boolean, "required">;
|
|
153
|
+
type: convex_values19.VLiteral<"signIn", "required">;
|
|
154
|
+
}, "required", "type" | "userId" | "sessionId" | "generateTokens">, convex_values19.VObject<{
|
|
155
155
|
type: "signOut";
|
|
156
156
|
}, {
|
|
157
|
-
type:
|
|
158
|
-
}, "required", "type">,
|
|
157
|
+
type: convex_values19.VLiteral<"signOut", "required">;
|
|
158
|
+
}, "required", "type">, convex_values19.VObject<{
|
|
159
159
|
type: "refreshSession";
|
|
160
160
|
refreshToken: string;
|
|
161
161
|
}, {
|
|
162
|
-
refreshToken:
|
|
163
|
-
type:
|
|
164
|
-
}, "required", "type" | "refreshToken">,
|
|
162
|
+
refreshToken: convex_values19.VString<string, "required">;
|
|
163
|
+
type: convex_values19.VLiteral<"refreshSession", "required">;
|
|
164
|
+
}, "required", "type" | "refreshToken">, convex_values19.VObject<{
|
|
165
165
|
provider?: string | undefined;
|
|
166
166
|
verifier?: string | undefined;
|
|
167
167
|
type: "verifyCodeAndSignIn";
|
|
168
|
-
allowExtraProviders: boolean;
|
|
169
|
-
generateTokens: boolean;
|
|
170
168
|
params: any;
|
|
169
|
+
generateTokens: boolean;
|
|
170
|
+
allowExtraProviders: boolean;
|
|
171
171
|
}, {
|
|
172
|
-
params:
|
|
173
|
-
provider:
|
|
174
|
-
verifier:
|
|
175
|
-
generateTokens:
|
|
176
|
-
allowExtraProviders:
|
|
177
|
-
type:
|
|
178
|
-
}, "required", "type" | "provider" | "
|
|
172
|
+
params: convex_values19.VAny<any, "required", string>;
|
|
173
|
+
provider: convex_values19.VString<string | undefined, "optional">;
|
|
174
|
+
verifier: convex_values19.VString<string | undefined, "optional">;
|
|
175
|
+
generateTokens: convex_values19.VBoolean<boolean, "required">;
|
|
176
|
+
allowExtraProviders: convex_values19.VBoolean<boolean, "required">;
|
|
177
|
+
type: convex_values19.VLiteral<"verifyCodeAndSignIn", "required">;
|
|
178
|
+
}, "required", "type" | "provider" | "params" | "verifier" | "generateTokens" | "allowExtraProviders" | `params.${string}`>, convex_values19.VObject<{
|
|
179
179
|
type: "verifier";
|
|
180
180
|
}, {
|
|
181
|
-
type:
|
|
182
|
-
}, "required", "type">,
|
|
181
|
+
type: convex_values19.VLiteral<"verifier", "required">;
|
|
182
|
+
}, "required", "type">, convex_values19.VObject<{
|
|
183
183
|
type: "verifierSignature";
|
|
184
184
|
verifier: string;
|
|
185
185
|
signature: string;
|
|
186
186
|
}, {
|
|
187
|
-
verifier:
|
|
188
|
-
signature:
|
|
189
|
-
type:
|
|
190
|
-
}, "required", "type" | "verifier" | "signature">,
|
|
187
|
+
verifier: convex_values19.VString<string, "required">;
|
|
188
|
+
signature: convex_values19.VString<string, "required">;
|
|
189
|
+
type: convex_values19.VLiteral<"verifierSignature", "required">;
|
|
190
|
+
}, "required", "type" | "verifier" | "signature">, convex_values19.VObject<{
|
|
191
191
|
accountExtend?: any;
|
|
192
192
|
type: "userOAuth";
|
|
193
193
|
provider: string;
|
|
@@ -195,54 +195,54 @@ declare const storeArgs: convex_values20.VObject<{
|
|
|
195
195
|
providerAccountId: string;
|
|
196
196
|
profile: any;
|
|
197
197
|
}, {
|
|
198
|
-
provider:
|
|
199
|
-
providerAccountId:
|
|
200
|
-
profile:
|
|
201
|
-
signature:
|
|
202
|
-
accountExtend:
|
|
203
|
-
type:
|
|
204
|
-
}, "required", "type" | "provider" | "signature" | "providerAccountId" | "profile" | "accountExtend" | `profile.${string}` | `accountExtend.${string}`>,
|
|
205
|
-
email?: string | undefined;
|
|
206
|
-
accountId?: string | undefined;
|
|
198
|
+
provider: convex_values19.VString<string, "required">;
|
|
199
|
+
providerAccountId: convex_values19.VString<string, "required">;
|
|
200
|
+
profile: convex_values19.VAny<any, "required", string>;
|
|
201
|
+
signature: convex_values19.VString<string, "required">;
|
|
202
|
+
accountExtend: convex_values19.VAny<any, "optional", string>;
|
|
203
|
+
type: convex_values19.VLiteral<"userOAuth", "required">;
|
|
204
|
+
}, "required", "type" | "provider" | "signature" | "providerAccountId" | "profile" | "accountExtend" | `profile.${string}` | `accountExtend.${string}`>, convex_values19.VObject<{
|
|
207
205
|
phone?: string | undefined;
|
|
206
|
+
accountId?: string | undefined;
|
|
207
|
+
email?: string | undefined;
|
|
208
208
|
type: "createVerificationCode";
|
|
209
209
|
provider: string;
|
|
210
|
+
allowExtraProviders: boolean;
|
|
210
211
|
code: string;
|
|
211
212
|
expirationTime: number;
|
|
212
|
-
allowExtraProviders: boolean;
|
|
213
213
|
}, {
|
|
214
|
-
accountId:
|
|
215
|
-
provider:
|
|
216
|
-
email:
|
|
217
|
-
phone:
|
|
218
|
-
code:
|
|
219
|
-
expirationTime:
|
|
220
|
-
allowExtraProviders:
|
|
221
|
-
type:
|
|
222
|
-
}, "required", "
|
|
214
|
+
accountId: convex_values19.VString<string | undefined, "optional">;
|
|
215
|
+
provider: convex_values19.VString<string, "required">;
|
|
216
|
+
email: convex_values19.VString<string | undefined, "optional">;
|
|
217
|
+
phone: convex_values19.VString<string | undefined, "optional">;
|
|
218
|
+
code: convex_values19.VString<string, "required">;
|
|
219
|
+
expirationTime: convex_values19.VFloat64<number, "required">;
|
|
220
|
+
allowExtraProviders: convex_values19.VBoolean<boolean, "required">;
|
|
221
|
+
type: convex_values19.VLiteral<"createVerificationCode", "required">;
|
|
222
|
+
}, "required", "phone" | "type" | "provider" | "allowExtraProviders" | "accountId" | "email" | "code" | "expirationTime">, convex_values19.VObject<{
|
|
223
223
|
shouldLinkViaEmail?: boolean | undefined;
|
|
224
224
|
shouldLinkViaPhone?: boolean | undefined;
|
|
225
225
|
type: "createAccountFromCredentials";
|
|
226
226
|
provider: string;
|
|
227
|
+
profile: any;
|
|
227
228
|
account: {
|
|
228
229
|
secret?: string | undefined;
|
|
229
230
|
id: string;
|
|
230
231
|
};
|
|
231
|
-
profile: any;
|
|
232
232
|
}, {
|
|
233
|
-
provider:
|
|
234
|
-
account:
|
|
233
|
+
provider: convex_values19.VString<string, "required">;
|
|
234
|
+
account: convex_values19.VObject<{
|
|
235
235
|
secret?: string | undefined;
|
|
236
236
|
id: string;
|
|
237
237
|
}, {
|
|
238
|
-
id:
|
|
239
|
-
secret:
|
|
238
|
+
id: convex_values19.VString<string, "required">;
|
|
239
|
+
secret: convex_values19.VString<string | undefined, "optional">;
|
|
240
240
|
}, "required", "id" | "secret">;
|
|
241
|
-
profile:
|
|
242
|
-
shouldLinkViaEmail:
|
|
243
|
-
shouldLinkViaPhone:
|
|
244
|
-
type:
|
|
245
|
-
}, "required", "type" | "provider" | "
|
|
241
|
+
profile: convex_values19.VAny<any, "required", string>;
|
|
242
|
+
shouldLinkViaEmail: convex_values19.VBoolean<boolean | undefined, "optional">;
|
|
243
|
+
shouldLinkViaPhone: convex_values19.VBoolean<boolean | undefined, "optional">;
|
|
244
|
+
type: convex_values19.VLiteral<"createAccountFromCredentials", "required">;
|
|
245
|
+
}, "required", "type" | "provider" | "profile" | `profile.${string}` | "account" | "shouldLinkViaEmail" | "shouldLinkViaPhone" | "account.id" | "account.secret">, convex_values19.VObject<{
|
|
246
246
|
type: "retrieveAccountWithCredentials";
|
|
247
247
|
provider: string;
|
|
248
248
|
account: {
|
|
@@ -250,16 +250,16 @@ declare const storeArgs: convex_values20.VObject<{
|
|
|
250
250
|
id: string;
|
|
251
251
|
};
|
|
252
252
|
}, {
|
|
253
|
-
provider:
|
|
254
|
-
account:
|
|
253
|
+
provider: convex_values19.VString<string, "required">;
|
|
254
|
+
account: convex_values19.VObject<{
|
|
255
255
|
secret?: string | undefined;
|
|
256
256
|
id: string;
|
|
257
257
|
}, {
|
|
258
|
-
id:
|
|
259
|
-
secret:
|
|
258
|
+
id: convex_values19.VString<string, "required">;
|
|
259
|
+
secret: convex_values19.VString<string | undefined, "optional">;
|
|
260
260
|
}, "required", "id" | "secret">;
|
|
261
|
-
type:
|
|
262
|
-
}, "required", "type" | "provider" | "account" | "account.id" | "account.secret">,
|
|
261
|
+
type: convex_values19.VLiteral<"retrieveAccountWithCredentials", "required">;
|
|
262
|
+
}, "required", "type" | "provider" | "account" | "account.id" | "account.secret">, convex_values19.VObject<{
|
|
263
263
|
type: "modifyAccount";
|
|
264
264
|
provider: string;
|
|
265
265
|
account: {
|
|
@@ -267,31 +267,31 @@ declare const storeArgs: convex_values20.VObject<{
|
|
|
267
267
|
secret: string;
|
|
268
268
|
};
|
|
269
269
|
}, {
|
|
270
|
-
provider:
|
|
271
|
-
account:
|
|
270
|
+
provider: convex_values19.VString<string, "required">;
|
|
271
|
+
account: convex_values19.VObject<{
|
|
272
272
|
id: string;
|
|
273
273
|
secret: string;
|
|
274
274
|
}, {
|
|
275
|
-
id:
|
|
276
|
-
secret:
|
|
275
|
+
id: convex_values19.VString<string, "required">;
|
|
276
|
+
secret: convex_values19.VString<string, "required">;
|
|
277
277
|
}, "required", "id" | "secret">;
|
|
278
|
-
type:
|
|
279
|
-
}, "required", "type" | "provider" | "account" | "account.id" | "account.secret">,
|
|
278
|
+
type: convex_values19.VLiteral<"modifyAccount", "required">;
|
|
279
|
+
}, "required", "type" | "provider" | "account" | "account.id" | "account.secret">, convex_values19.VObject<{
|
|
280
280
|
except?: string[] | undefined;
|
|
281
|
-
userId: string;
|
|
282
281
|
type: "invalidateSessions";
|
|
282
|
+
userId: string;
|
|
283
283
|
}, {
|
|
284
|
-
userId:
|
|
285
|
-
except:
|
|
286
|
-
type:
|
|
287
|
-
}, "required", "
|
|
288
|
-
}, "required", "args" | "args.
|
|
289
|
-
declare const storeImpl: (ctx: MutationCtx, fnArgs: Infer<typeof storeArgs>, getProviderOrThrow: GetProviderOrThrowFunc, config: Config) => Promise<string | void |
|
|
290
|
-
userId:
|
|
291
|
-
sessionId:
|
|
284
|
+
userId: convex_values19.VString<string, "required">;
|
|
285
|
+
except: convex_values19.VArray<string[] | undefined, convex_values19.VString<string, "required">, "optional">;
|
|
286
|
+
type: convex_values19.VLiteral<"invalidateSessions", "required">;
|
|
287
|
+
}, "required", "type" | "userId" | "except">], "required", "phone" | "type" | "provider" | "params" | "verifier" | "refreshToken" | "userId" | "sessionId" | "generateTokens" | "allowExtraProviders" | `params.${string}` | "signature" | "providerAccountId" | "profile" | "accountExtend" | `profile.${string}` | `accountExtend.${string}` | "accountId" | "email" | "code" | "expirationTime" | "account" | "shouldLinkViaEmail" | "shouldLinkViaPhone" | "account.id" | "account.secret" | "except">;
|
|
288
|
+
}, "required", "args" | "args.phone" | "args.type" | "args.provider" | "args.params" | "args.verifier" | "args.refreshToken" | "args.userId" | "args.sessionId" | "args.generateTokens" | "args.allowExtraProviders" | `args.params.${string}` | "args.signature" | "args.providerAccountId" | "args.profile" | "args.accountExtend" | `args.profile.${string}` | `args.accountExtend.${string}` | "args.accountId" | "args.email" | "args.code" | "args.expirationTime" | "args.account" | "args.shouldLinkViaEmail" | "args.shouldLinkViaPhone" | "args.account.id" | "args.account.secret" | "args.except">;
|
|
289
|
+
declare const storeImpl: (ctx: MutationCtx, fnArgs: Infer<typeof storeArgs>, getProviderOrThrow: GetProviderOrThrowFunc, config: Config) => Promise<string | void | {
|
|
290
|
+
userId: convex_values19.GenericId<"User">;
|
|
291
|
+
sessionId: convex_values19.GenericId<"Session">;
|
|
292
292
|
} | (string & {
|
|
293
293
|
__tableName: "AuthVerifier";
|
|
294
|
-
}) | {
|
|
294
|
+
}) | SessionInfo | {
|
|
295
295
|
token: string;
|
|
296
296
|
refreshToken: string;
|
|
297
297
|
} | {
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"store.d.ts","names":[],"sources":["../../../src/server/mutations/store.ts"],"mappings":";;;;;;cAyBa,SAAA,kBAAS,OAAA;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;YAiDpB,eAAA,CAAA,OAAA;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;cAEW,SAAA,GACX,GAAA,EAAK,WAAA,EACL,MAAA,EAAQ,KAAA,QAAa,SAAA,GACrB,kBAAA,EAAoB,sBAAA,EACpB,MAAA,EAAQ,MAAA,KAAe,OAAA
|
|
1
|
+
{"version":3,"file":"store.d.ts","names":[],"sources":["../../../src/server/mutations/store.ts"],"mappings":";;;;;;cAyBa,SAAA,kBAAS,OAAA;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;YAiDpB,eAAA,CAAA,OAAA;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;cAEW,SAAA,GACX,GAAA,EAAK,WAAA,EACL,MAAA,EAAQ,KAAA,QAAa,SAAA,GACrB,kBAAA,EAAoB,sBAAA,EACpB,MAAA,EAAQ,MAAA,KAAe,OAAA;UAAA,eAAA,CAAA,SAAA"}
|
|
@@ -50,32 +50,17 @@ const storeImpl = async (ctx, fnArgs, getProviderOrThrow, config) => {
|
|
|
50
50
|
const args = fnArgs.args;
|
|
51
51
|
logWithLevel(LOG_LEVELS.INFO, `\`auth:store\` type: ${args.type}`);
|
|
52
52
|
return Fx.run(Fx.match(args, args.type, {
|
|
53
|
-
signIn: (a) => Fx.
|
|
54
|
-
ok: () => signInImpl(ctx, a, config),
|
|
55
|
-
err: (e) => e
|
|
56
|
-
}),
|
|
53
|
+
signIn: (a) => Fx.promise(() => signInImpl(ctx, a, config)),
|
|
57
54
|
signOut: () => signOutImpl(ctx, config),
|
|
58
|
-
refreshSession: (a) => Fx.
|
|
59
|
-
|
|
60
|
-
err: (e) => e
|
|
61
|
-
}),
|
|
62
|
-
verifyCodeAndSignIn: (a) => Fx.from({
|
|
63
|
-
ok: () => verifyCodeAndSignInImpl(ctx, a, getProviderOrThrow, config),
|
|
64
|
-
err: (e) => e
|
|
65
|
-
}),
|
|
55
|
+
refreshSession: (a) => Fx.promise(() => refreshSessionImpl(ctx, a, getProviderOrThrow, config)),
|
|
56
|
+
verifyCodeAndSignIn: (a) => Fx.promise(() => verifyCodeAndSignInImpl(ctx, a, getProviderOrThrow, config)),
|
|
66
57
|
verifier: () => verifierImpl(ctx, config),
|
|
67
|
-
verifierSignature: (a) => verifierSignatureImpl(ctx, a, config).pipe(Fx.recover((e) => Fx.fatal(e
|
|
68
|
-
userOAuth: (a) => userOAuthImpl(ctx, a, getProviderOrThrow, config).pipe(Fx.recover((e) => Fx.fatal(e
|
|
69
|
-
createVerificationCode: (a) => Fx.
|
|
70
|
-
|
|
71
|
-
err: (e) => e
|
|
72
|
-
}),
|
|
73
|
-
createAccountFromCredentials: (a) => Fx.from({
|
|
74
|
-
ok: () => createAccountFromCredentialsImpl(ctx, a, getProviderOrThrow, config),
|
|
75
|
-
err: (e) => e
|
|
76
|
-
}),
|
|
58
|
+
verifierSignature: (a) => verifierSignatureImpl(ctx, a, config).pipe(Fx.recover((e) => Fx.fatal(e))),
|
|
59
|
+
userOAuth: (a) => userOAuthImpl(ctx, a, getProviderOrThrow, config).pipe(Fx.recover((e) => Fx.fatal(e))),
|
|
60
|
+
createVerificationCode: (a) => Fx.promise(() => createVerificationCodeImpl(ctx, a, getProviderOrThrow, config)),
|
|
61
|
+
createAccountFromCredentials: (a) => Fx.promise(() => createAccountFromCredentialsImpl(ctx, a, getProviderOrThrow, config)),
|
|
77
62
|
retrieveAccountWithCredentials: (a) => retrieveAccountWithCredentialsImpl(ctx, a, getProviderOrThrow, config),
|
|
78
|
-
modifyAccount: (a) => modifyAccountImpl(ctx, a, getProviderOrThrow, config).pipe(Fx.recover((e) => Fx.fatal(e
|
|
63
|
+
modifyAccount: (a) => modifyAccountImpl(ctx, a, getProviderOrThrow, config).pipe(Fx.recover((e) => Fx.fatal(e))),
|
|
79
64
|
invalidateSessions: (a) => invalidateSessionsImpl(ctx, a, config)
|
|
80
65
|
}));
|
|
81
66
|
};
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"store.js","names":[],"sources":["../../../src/server/mutations/store.ts"],"sourcesContent":["import { Fx } from \"@robelest/fx\";\nimport { Infer, v } from \"convex/values\";\n\nimport * as Provider from \"../crypto\";\nimport { MutationCtx } from \"../types\";\nimport { LOG_LEVELS, logWithLevel } from \"../utils\";\nimport { modifyAccountArgs, modifyAccountImpl } from \"./account\";\nimport { createVerificationCodeArgs, createVerificationCodeImpl } from \"./code\";\nimport { invalidateSessionsArgs, invalidateSessionsImpl } from \"./invalidate\";\nimport { userOAuthArgs, userOAuthImpl } from \"./oauth\";\nimport { refreshSessionArgs, refreshSessionImpl } from \"./refresh\";\nimport {\n createAccountFromCredentialsArgs,\n createAccountFromCredentialsImpl,\n} from \"./register\";\nimport {\n retrieveAccountWithCredentialsArgs,\n retrieveAccountWithCredentialsImpl,\n} from \"./retrieve\";\nimport { verifierSignatureArgs, verifierSignatureImpl } from \"./signature\";\nimport { signInArgs, signInImpl } from \"./signin\";\nimport { signOutImpl } from \"./signout\";\nimport { verifierImpl } from \"./verifier\";\nimport { verifyCodeAndSignInArgs, verifyCodeAndSignInImpl } from \"./verify\";\n\nexport const storeArgs = v.object({\n args: v.union(\n v.object({\n type: v.literal(\"signIn\"),\n ...signInArgs.fields,\n }),\n v.object({\n type: v.literal(\"signOut\"),\n }),\n v.object({\n type: v.literal(\"refreshSession\"),\n ...refreshSessionArgs.fields,\n }),\n v.object({\n type: v.literal(\"verifyCodeAndSignIn\"),\n ...verifyCodeAndSignInArgs.fields,\n }),\n v.object({\n type: v.literal(\"verifier\"),\n }),\n v.object({\n type: v.literal(\"verifierSignature\"),\n ...verifierSignatureArgs.fields,\n }),\n v.object({\n type: v.literal(\"userOAuth\"),\n ...userOAuthArgs.fields,\n }),\n v.object({\n type: v.literal(\"createVerificationCode\"),\n ...createVerificationCodeArgs.fields,\n }),\n v.object({\n type: v.literal(\"createAccountFromCredentials\"),\n ...createAccountFromCredentialsArgs.fields,\n }),\n v.object({\n type: v.literal(\"retrieveAccountWithCredentials\"),\n ...retrieveAccountWithCredentialsArgs.fields,\n }),\n v.object({\n type: v.literal(\"modifyAccount\"),\n ...modifyAccountArgs.fields,\n }),\n v.object({\n type: v.literal(\"invalidateSessions\"),\n ...invalidateSessionsArgs.fields,\n }),\n ),\n});\n\nexport const storeImpl = async (\n ctx: MutationCtx,\n fnArgs: Infer<typeof storeArgs>,\n getProviderOrThrow: Provider.GetProviderOrThrowFunc,\n config: Provider.Config,\n) => {\n const args = fnArgs.args;\n logWithLevel(LOG_LEVELS.INFO, `\\`auth:store\\` type: ${args.type}`);\n return Fx.run(\n Fx.match(args, args.type, {\n signIn: (a)
|
|
1
|
+
{"version":3,"file":"store.js","names":[],"sources":["../../../src/server/mutations/store.ts"],"sourcesContent":["import { Fx } from \"@robelest/fx\";\nimport { Infer, v } from \"convex/values\";\n\nimport * as Provider from \"../crypto\";\nimport { MutationCtx } from \"../types\";\nimport { LOG_LEVELS, logWithLevel } from \"../utils\";\nimport { modifyAccountArgs, modifyAccountImpl } from \"./account\";\nimport { createVerificationCodeArgs, createVerificationCodeImpl } from \"./code\";\nimport { invalidateSessionsArgs, invalidateSessionsImpl } from \"./invalidate\";\nimport { userOAuthArgs, userOAuthImpl } from \"./oauth\";\nimport { refreshSessionArgs, refreshSessionImpl } from \"./refresh\";\nimport {\n createAccountFromCredentialsArgs,\n createAccountFromCredentialsImpl,\n} from \"./register\";\nimport {\n retrieveAccountWithCredentialsArgs,\n retrieveAccountWithCredentialsImpl,\n} from \"./retrieve\";\nimport { verifierSignatureArgs, verifierSignatureImpl } from \"./signature\";\nimport { signInArgs, signInImpl } from \"./signin\";\nimport { signOutImpl } from \"./signout\";\nimport { verifierImpl } from \"./verifier\";\nimport { verifyCodeAndSignInArgs, verifyCodeAndSignInImpl } from \"./verify\";\n\nexport const storeArgs = v.object({\n args: v.union(\n v.object({\n type: v.literal(\"signIn\"),\n ...signInArgs.fields,\n }),\n v.object({\n type: v.literal(\"signOut\"),\n }),\n v.object({\n type: v.literal(\"refreshSession\"),\n ...refreshSessionArgs.fields,\n }),\n v.object({\n type: v.literal(\"verifyCodeAndSignIn\"),\n ...verifyCodeAndSignInArgs.fields,\n }),\n v.object({\n type: v.literal(\"verifier\"),\n }),\n v.object({\n type: v.literal(\"verifierSignature\"),\n ...verifierSignatureArgs.fields,\n }),\n v.object({\n type: v.literal(\"userOAuth\"),\n ...userOAuthArgs.fields,\n }),\n v.object({\n type: v.literal(\"createVerificationCode\"),\n ...createVerificationCodeArgs.fields,\n }),\n v.object({\n type: v.literal(\"createAccountFromCredentials\"),\n ...createAccountFromCredentialsArgs.fields,\n }),\n v.object({\n type: v.literal(\"retrieveAccountWithCredentials\"),\n ...retrieveAccountWithCredentialsArgs.fields,\n }),\n v.object({\n type: v.literal(\"modifyAccount\"),\n ...modifyAccountArgs.fields,\n }),\n v.object({\n type: v.literal(\"invalidateSessions\"),\n ...invalidateSessionsArgs.fields,\n }),\n ),\n});\n\nexport const storeImpl = async (\n ctx: MutationCtx,\n fnArgs: Infer<typeof storeArgs>,\n getProviderOrThrow: Provider.GetProviderOrThrowFunc,\n config: Provider.Config,\n) => {\n const args = fnArgs.args;\n logWithLevel(LOG_LEVELS.INFO, `\\`auth:store\\` type: ${args.type}`);\n return Fx.run(\n Fx.match(args, args.type, {\n signIn: (a) => Fx.promise(() => signInImpl(ctx, a, config)),\n signOut: () => signOutImpl(ctx, config),\n refreshSession: (a) =>\n Fx.promise(() =>\n refreshSessionImpl(ctx, a, getProviderOrThrow, config),\n ),\n verifyCodeAndSignIn: (a) =>\n Fx.promise(() =>\n verifyCodeAndSignInImpl(ctx, a, getProviderOrThrow, config),\n ),\n verifier: () => verifierImpl(ctx, config),\n verifierSignature: (a) =>\n verifierSignatureImpl(ctx, a, config).pipe(\n Fx.recover((e) => Fx.fatal(e)),\n ),\n userOAuth: (a) =>\n userOAuthImpl(ctx, a, getProviderOrThrow, config).pipe(\n Fx.recover((e) => Fx.fatal(e)),\n ),\n createVerificationCode: (a) =>\n Fx.promise(() =>\n createVerificationCodeImpl(ctx, a, getProviderOrThrow, config),\n ),\n createAccountFromCredentials: (a) =>\n Fx.promise(() =>\n createAccountFromCredentialsImpl(ctx, a, getProviderOrThrow, config),\n ),\n retrieveAccountWithCredentials: (a) =>\n retrieveAccountWithCredentialsImpl(ctx, a, getProviderOrThrow, config),\n modifyAccount: (a) =>\n modifyAccountImpl(ctx, a, getProviderOrThrow, config).pipe(\n Fx.recover((e) => Fx.fatal(e)),\n ),\n invalidateSessions: (a) => invalidateSessionsImpl(ctx, a, config),\n }),\n );\n};\n"],"mappings":";;;;;;;;;;;;;;;;;AAyBA,MAAa,YAAY,EAAE,OAAO,EAChC,MAAM,EAAE,MACN,EAAE,OAAO;CACP,MAAM,EAAE,QAAQ,SAAS;CACzB,GAAG,WAAW;CACf,CAAC,EACF,EAAE,OAAO,EACP,MAAM,EAAE,QAAQ,UAAU,EAC3B,CAAC,EACF,EAAE,OAAO;CACP,MAAM,EAAE,QAAQ,iBAAiB;CACjC,GAAG,mBAAmB;CACvB,CAAC,EACF,EAAE,OAAO;CACP,MAAM,EAAE,QAAQ,sBAAsB;CACtC,GAAG,wBAAwB;CAC5B,CAAC,EACF,EAAE,OAAO,EACP,MAAM,EAAE,QAAQ,WAAW,EAC5B,CAAC,EACF,EAAE,OAAO;CACP,MAAM,EAAE,QAAQ,oBAAoB;CACpC,GAAG,sBAAsB;CAC1B,CAAC,EACF,EAAE,OAAO;CACP,MAAM,EAAE,QAAQ,YAAY;CAC5B,GAAG,cAAc;CAClB,CAAC,EACF,EAAE,OAAO;CACP,MAAM,EAAE,QAAQ,yBAAyB;CACzC,GAAG,2BAA2B;CAC/B,CAAC,EACF,EAAE,OAAO;CACP,MAAM,EAAE,QAAQ,+BAA+B;CAC/C,GAAG,iCAAiC;CACrC,CAAC,EACF,EAAE,OAAO;CACP,MAAM,EAAE,QAAQ,iCAAiC;CACjD,GAAG,mCAAmC;CACvC,CAAC,EACF,EAAE,OAAO;CACP,MAAM,EAAE,QAAQ,gBAAgB;CAChC,GAAG,kBAAkB;CACtB,CAAC,EACF,EAAE,OAAO;CACP,MAAM,EAAE,QAAQ,qBAAqB;CACrC,GAAG,uBAAuB;CAC3B,CAAC,CACH,EACF,CAAC;AAEF,MAAa,YAAY,OACvB,KACA,QACA,oBACA,WACG;CACH,MAAM,OAAO,OAAO;AACpB,cAAa,WAAW,MAAM,wBAAwB,KAAK,OAAO;AAClE,QAAO,GAAG,IACR,GAAG,MAAM,MAAM,KAAK,MAAM;EACxB,SAAS,MAAM,GAAG,cAAc,WAAW,KAAK,GAAG,OAAO,CAAC;EAC3D,eAAe,YAAY,KAAK,OAAO;EACvC,iBAAiB,MACf,GAAG,cACD,mBAAmB,KAAK,GAAG,oBAAoB,OAAO,CACvD;EACH,sBAAsB,MACpB,GAAG,cACD,wBAAwB,KAAK,GAAG,oBAAoB,OAAO,CAC5D;EACH,gBAAgB,aAAa,KAAK,OAAO;EACzC,oBAAoB,MAClB,sBAAsB,KAAK,GAAG,OAAO,CAAC,KACpC,GAAG,SAAS,MAAM,GAAG,MAAM,EAAE,CAAC,CAC/B;EACH,YAAY,MACV,cAAc,KAAK,GAAG,oBAAoB,OAAO,CAAC,KAChD,GAAG,SAAS,MAAM,GAAG,MAAM,EAAE,CAAC,CAC/B;EACH,yBAAyB,MACvB,GAAG,cACD,2BAA2B,KAAK,GAAG,oBAAoB,OAAO,CAC/D;EACH,+BAA+B,MAC7B,GAAG,cACD,iCAAiC,KAAK,GAAG,oBAAoB,OAAO,CACrE;EACH,iCAAiC,MAC/B,mCAAmC,KAAK,GAAG,oBAAoB,OAAO;EACxE,gBAAgB,MACd,kBAAkB,KAAK,GAAG,oBAAoB,OAAO,CAAC,KACpD,GAAG,SAAS,MAAM,GAAG,MAAM,EAAE,CAAC,CAC/B;EACH,qBAAqB,MAAM,uBAAuB,KAAK,GAAG,OAAO;EAClE,CAAC,CACH"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"verifier.js","names":[],"sources":["../../../src/server/mutations/verifier.ts"],"sourcesContent":["import { Fx } from \"@robelest/fx\";\nimport type { GenericActionCtx, GenericDataModel } from \"convex/server\";\nimport { GenericId } from \"convex/values\";\n\nimport
|
|
1
|
+
{"version":3,"file":"verifier.js","names":[],"sources":["../../../src/server/mutations/verifier.ts"],"sourcesContent":["import { Fx } from \"@robelest/fx\";\nimport type { GenericActionCtx, GenericDataModel } from \"convex/server\";\nimport { GenericId } from \"convex/values\";\n\nimport * as Provider from \"../crypto\";\nimport { authDb } from \"../db\";\nimport { getAuthSessionId } from \"../sessions\";\nimport { MutationCtx } from \"../types\";\nimport { AUTH_STORE_REF } from \"./store/refs\";\n\ntype ReturnType = GenericId<\"AuthVerifier\">;\n\nexport function verifierImpl(\n ctx: MutationCtx,\n config: Provider.Config,\n): Fx<ReturnType, never> {\n return Fx.gen(function* () {\n return (yield* Fx.promise(async () =>\n authDb(ctx, config).verifiers.create(\n (await getAuthSessionId(ctx)) ?? undefined,\n ),\n )) as ReturnType;\n });\n}\n\nexport const callVerifier = async <DataModel extends GenericDataModel>(\n ctx: GenericActionCtx<DataModel>,\n): Promise<ReturnType> => {\n return ctx.runMutation(AUTH_STORE_REF, {\n args: {\n type: \"verifier\",\n },\n });\n};\n"],"mappings":";;;;;;AAYA,SAAgB,aACd,KACA,QACuB;AACvB,QAAO,GAAG,IAAI,aAAa;AACzB,SAAQ,OAAO,GAAG,QAAQ,YACxB,OAAO,KAAK,OAAO,CAAC,UAAU,OAC3B,MAAM,iBAAiB,IAAI,IAAK,OAClC,CACF;GACD;;AAGJ,MAAa,eAAe,OAC1B,QACwB;AACxB,QAAO,IAAI,YAAY,gBAAgB,EACrC,MAAM,EACJ,MAAM,YACP,EACF,CAAC"}
|
|
@@ -1,23 +1,23 @@
|
|
|
1
1
|
import { MutationCtx, SessionInfo } from "../types.js";
|
|
2
2
|
import { Config, GetProviderOrThrowFunc } from "../crypto.js";
|
|
3
3
|
import { GenericActionCtx, GenericDataModel } from "convex/server";
|
|
4
|
-
import * as
|
|
4
|
+
import * as convex_values13 from "convex/values";
|
|
5
5
|
import { Infer } from "convex/values";
|
|
6
6
|
|
|
7
7
|
//#region src/server/mutations/verify.d.ts
|
|
8
|
-
declare const verifyCodeAndSignInArgs:
|
|
8
|
+
declare const verifyCodeAndSignInArgs: convex_values13.VObject<{
|
|
9
9
|
provider?: string | undefined;
|
|
10
10
|
verifier?: string | undefined;
|
|
11
|
-
allowExtraProviders: boolean;
|
|
12
|
-
generateTokens: boolean;
|
|
13
11
|
params: any;
|
|
12
|
+
generateTokens: boolean;
|
|
13
|
+
allowExtraProviders: boolean;
|
|
14
14
|
}, {
|
|
15
|
-
params:
|
|
16
|
-
provider:
|
|
17
|
-
verifier:
|
|
18
|
-
generateTokens:
|
|
19
|
-
allowExtraProviders:
|
|
20
|
-
}, "required", "provider" | "
|
|
15
|
+
params: convex_values13.VAny<any, "required", string>;
|
|
16
|
+
provider: convex_values13.VString<string | undefined, "optional">;
|
|
17
|
+
verifier: convex_values13.VString<string | undefined, "optional">;
|
|
18
|
+
generateTokens: convex_values13.VBoolean<boolean, "required">;
|
|
19
|
+
allowExtraProviders: convex_values13.VBoolean<boolean, "required">;
|
|
20
|
+
}, "required", "provider" | "params" | "verifier" | "generateTokens" | "allowExtraProviders" | `params.${string}`>;
|
|
21
21
|
type ReturnType = null | SessionInfo;
|
|
22
22
|
declare function verifyCodeAndSignInImpl(ctx: MutationCtx, args: Infer<typeof verifyCodeAndSignInArgs>, getProviderOrThrow: GetProviderOrThrowFunc, config: Config): Promise<ReturnType>;
|
|
23
23
|
declare const callVerifyCodeAndSignIn: <DataModel extends GenericDataModel>(ctx: GenericActionCtx<DataModel>, args: Infer<typeof verifyCodeAndSignInArgs>) => Promise<ReturnType>;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"verify.d.ts","names":[],"sources":["../../../src/server/mutations/verify.ts"],"mappings":";;;;;;;
|
|
1
|
+
{"version":3,"file":"verify.d.ts","names":[],"sources":["../../../src/server/mutations/verify.ts"],"mappings":";;;;;;;cAwBa,uBAAA,kBAAuB,OAAA;;;;;;;UAMlC,eAAA,CAAA,IAAA;;;;;;KAEG,UAAA,UAAoB,WAAA;AAAA,iBAgBH,uBAAA,CACpB,GAAA,EAAK,WAAA,EACL,IAAA,EAAM,KAAA,QAAa,uBAAA,GACnB,kBAAA,EAAoB,sBAAA,EACpB,MAAA,EAAQ,MAAA,GACP,OAAA,CAAQ,UAAA;AAAA,cAsIE,uBAAA,qBACO,gBAAA,EAElB,GAAA,EAAK,gBAAA,CAAiB,SAAA,GACtB,IAAA,EAAM,KAAA,QAAa,uBAAA,MAClB,OAAA,CAAQ,UAAA"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"verify.js","names":[],"sources":["../../../src/server/mutations/verify.ts"],"sourcesContent":["import { Fx } from \"@robelest/fx\";\nimport type { GenericActionCtx, GenericDataModel } from \"convex/server\";\nimport { Infer, v } from \"convex/values\";\n\nimport { authDb } from \"../db\";\nimport
|
|
1
|
+
{"version":3,"file":"verify.js","names":[],"sources":["../../../src/server/mutations/verify.ts"],"sourcesContent":["import { Fx } from \"@robelest/fx\";\nimport type { GenericActionCtx, GenericDataModel } from \"convex/server\";\nimport { Infer, v } from \"convex/values\";\n\nimport * as Provider from \"../crypto\";\nimport { authDb } from \"../db\";\nimport { createSyntheticOAuthMaterializedConfig } from \"../enterprise/oidc\";\nimport { isEnterpriseProviderId } from \"../enterprise/shared\";\nimport {\n isSignInRateLimited,\n recordFailedSignIn,\n resetSignInRateLimit,\n} from \"../limits\";\nimport {\n createNewAndDeleteExistingSession,\n getAuthSessionId,\n maybeGenerateTokensForSession,\n} from \"../sessions\";\nimport { MutationCtx, SessionInfo } from \"../types\";\nimport { upsertUserAndAccount } from \"../users\";\nimport { LOG_LEVELS, logWithLevel, sha256 } from \"../utils\";\nimport { requireEnv } from \"../utils\";\nimport { AUTH_STORE_REF } from \"./store/refs\";\n\nexport const verifyCodeAndSignInArgs = v.object({\n params: v.any(),\n provider: v.optional(v.string()),\n verifier: v.optional(v.string()),\n generateTokens: v.boolean(),\n allowExtraProviders: v.boolean(),\n});\n\ntype ReturnType = null | SessionInfo;\n\n// ============================================================================\n// Small validators for the verification pipeline\n// ============================================================================\n\n/** A soft verification failure — logged and collapsed to null at the boundary. */\nclass VerifyFailure {\n readonly _tag = \"VerifyFailure\" as const;\n constructor(readonly reason: string) {}\n}\n\n// ============================================================================\n// Main exported function\n// ============================================================================\n\nexport async function verifyCodeAndSignInImpl(\n ctx: MutationCtx,\n args: Infer<typeof verifyCodeAndSignInArgs>,\n getProviderOrThrow: Provider.GetProviderOrThrowFunc,\n config: Provider.Config,\n): Promise<ReturnType> {\n logWithLevel(LOG_LEVELS.DEBUG, \"verifyCodeAndSignInImpl args:\", {\n params: { email: args.params.email, phone: args.params.phone },\n provider: args.provider,\n verifier: args.verifier,\n generateTokens: args.generateTokens,\n allowExtraProviders: args.allowExtraProviders,\n });\n\n const { generateTokens, provider, allowExtraProviders } = args;\n if (generateTokens) {\n requireEnv(\"JWT_PRIVATE_KEY\");\n requireEnv(\"JWKS\");\n requireEnv(\"CONVEX_SITE_URL\");\n }\n const identifier: string | undefined = args.params.email ?? args.params.phone;\n\n try {\n if (identifier !== undefined) {\n const limited = await Fx.run(\n isSignInRateLimited(ctx, identifier, config),\n );\n if (limited) {\n throw new VerifyFailure(\n \"Too many failed attempts to verify code for this email\",\n );\n }\n }\n\n const db = authDb(ctx, config);\n const { params, verifier } = args;\n const hash = await sha256(params.code);\n const code = await db.verificationCodes.getByCode(hash);\n if (code === null) {\n throw new VerifyFailure(\"Invalid verification code\");\n }\n\n await db.verificationCodes.delete(code._id);\n\n if (code.verifier !== verifier) {\n throw new VerifyFailure(\"Invalid verifier\");\n }\n if (code.expirationTime < Date.now()) {\n throw new VerifyFailure(\"Expired verification code\");\n }\n if (provider !== undefined && code.provider !== provider) {\n throw new VerifyFailure(\n `Invalid provider \"${provider}\" for given \\`code\\``,\n );\n }\n\n const account = await db.accounts.getById(code.accountId);\n if (account === null) {\n throw new VerifyFailure(\n \"Account associated with this email has been deleted\",\n );\n }\n\n const codeProvider = isEnterpriseProviderId(code.provider)\n ? createSyntheticOAuthMaterializedConfig(code.provider)\n : getProviderOrThrow(code.provider, allowExtraProviders);\n\n if (\n codeProvider !== null &&\n (codeProvider.type === \"email\" || codeProvider.type === \"phone\") &&\n codeProvider.authorize !== undefined\n ) {\n await codeProvider.authorize(args.params, account);\n }\n\n const methodProvider = isEnterpriseProviderId(account.provider)\n ? createSyntheticOAuthMaterializedConfig(account.provider)\n : getProviderOrThrow(account.provider);\n\n const userId =\n methodProvider.type === \"oauth\"\n ? account.userId\n : (\n await upsertUserAndAccount(\n ctx,\n await getAuthSessionId(ctx),\n { existingAccount: account },\n {\n type: \"verification\",\n provider: methodProvider,\n profile: {\n ...(code.emailVerified !== undefined\n ? { email: code.emailVerified, emailVerified: true }\n : {}),\n ...(code.phoneVerified !== undefined\n ? { phone: code.phoneVerified, phoneVerified: true }\n : {}),\n },\n },\n config,\n )\n ).userId;\n\n if (identifier !== undefined) {\n await Fx.run(resetSignInRateLimit(ctx, identifier, config));\n }\n\n const sessionId = await createNewAndDeleteExistingSession(\n ctx,\n config,\n userId,\n );\n return await maybeGenerateTokensForSession(\n ctx,\n config,\n userId,\n sessionId,\n generateTokens,\n );\n } catch (error) {\n if (error instanceof VerifyFailure) {\n logWithLevel(LOG_LEVELS.ERROR, error.reason);\n if (identifier !== undefined) {\n await Fx.run(recordFailedSignIn(ctx, identifier, config));\n }\n return null;\n }\n logWithLevel(\n LOG_LEVELS.ERROR,\n `verifyCodeAndSignInImpl failed: ${String(error)}`,\n );\n return null;\n }\n}\n\n// ============================================================================\n// Action-level caller (unchanged — just forwards to mutation)\n// ============================================================================\n\nexport const callVerifyCodeAndSignIn = async <\n DataModel extends GenericDataModel,\n>(\n ctx: GenericActionCtx<DataModel>,\n args: Infer<typeof verifyCodeAndSignInArgs>,\n): Promise<ReturnType> => {\n return ctx.runMutation(AUTH_STORE_REF, {\n args: {\n type: \"verifyCodeAndSignIn\",\n ...args,\n },\n });\n};\n"],"mappings":";;;;;;;;;;;;AAwBA,MAAa,0BAA0B,EAAE,OAAO;CAC9C,QAAQ,EAAE,KAAK;CACf,UAAU,EAAE,SAAS,EAAE,QAAQ,CAAC;CAChC,UAAU,EAAE,SAAS,EAAE,QAAQ,CAAC;CAChC,gBAAgB,EAAE,SAAS;CAC3B,qBAAqB,EAAE,SAAS;CACjC,CAAC;;AASF,IAAM,gBAAN,MAAoB;CAClB,AAAS,OAAO;CAChB,YAAY,AAAS,QAAgB;EAAhB;;;AAOvB,eAAsB,wBACpB,KACA,MACA,oBACA,QACqB;AACrB,cAAa,WAAW,OAAO,iCAAiC;EAC9D,QAAQ;GAAE,OAAO,KAAK,OAAO;GAAO,OAAO,KAAK,OAAO;GAAO;EAC9D,UAAU,KAAK;EACf,UAAU,KAAK;EACf,gBAAgB,KAAK;EACrB,qBAAqB,KAAK;EAC3B,CAAC;CAEF,MAAM,EAAE,gBAAgB,UAAU,wBAAwB;AAC1D,KAAI,gBAAgB;AAClB,aAAW,kBAAkB;AAC7B,aAAW,OAAO;AAClB,aAAW,kBAAkB;;CAE/B,MAAM,aAAiC,KAAK,OAAO,SAAS,KAAK,OAAO;AAExE,KAAI;AACF,MAAI,eAAe,QAIjB;OAHgB,MAAM,GAAG,IACvB,oBAAoB,KAAK,YAAY,OAAO,CAC7C,CAEC,OAAM,IAAI,cACR,yDACD;;EAIL,MAAM,KAAK,OAAO,KAAK,OAAO;EAC9B,MAAM,EAAE,QAAQ,aAAa;EAC7B,MAAM,OAAO,MAAM,OAAO,OAAO,KAAK;EACtC,MAAM,OAAO,MAAM,GAAG,kBAAkB,UAAU,KAAK;AACvD,MAAI,SAAS,KACX,OAAM,IAAI,cAAc,4BAA4B;AAGtD,QAAM,GAAG,kBAAkB,OAAO,KAAK,IAAI;AAE3C,MAAI,KAAK,aAAa,SACpB,OAAM,IAAI,cAAc,mBAAmB;AAE7C,MAAI,KAAK,iBAAiB,KAAK,KAAK,CAClC,OAAM,IAAI,cAAc,4BAA4B;AAEtD,MAAI,aAAa,UAAa,KAAK,aAAa,SAC9C,OAAM,IAAI,cACR,qBAAqB,SAAS,sBAC/B;EAGH,MAAM,UAAU,MAAM,GAAG,SAAS,QAAQ,KAAK,UAAU;AACzD,MAAI,YAAY,KACd,OAAM,IAAI,cACR,sDACD;EAGH,MAAM,eAAe,uBAAuB,KAAK,SAAS,GACtD,uCAAuC,KAAK,SAAS,GACrD,mBAAmB,KAAK,UAAU,oBAAoB;AAE1D,MACE,iBAAiB,SAChB,aAAa,SAAS,WAAW,aAAa,SAAS,YACxD,aAAa,cAAc,OAE3B,OAAM,aAAa,UAAU,KAAK,QAAQ,QAAQ;EAGpD,MAAM,iBAAiB,uBAAuB,QAAQ,SAAS,GAC3D,uCAAuC,QAAQ,SAAS,GACxD,mBAAmB,QAAQ,SAAS;EAExC,MAAM,SACJ,eAAe,SAAS,UACpB,QAAQ,UAEN,MAAM,qBACJ,KACA,MAAM,iBAAiB,IAAI,EAC3B,EAAE,iBAAiB,SAAS,EAC5B;GACE,MAAM;GACN,UAAU;GACV,SAAS;IACP,GAAI,KAAK,kBAAkB,SACvB;KAAE,OAAO,KAAK;KAAe,eAAe;KAAM,GAClD,EAAE;IACN,GAAI,KAAK,kBAAkB,SACvB;KAAE,OAAO,KAAK;KAAe,eAAe;KAAM,GAClD,EAAE;IACP;GACF,EACD,OACD,EACD;AAER,MAAI,eAAe,OACjB,OAAM,GAAG,IAAI,qBAAqB,KAAK,YAAY,OAAO,CAAC;AAQ7D,SAAO,MAAM,8BACX,KACA,QACA,QARgB,MAAM,kCACtB,KACA,QACA,OACD,EAMC,eACD;UACM,OAAO;AACd,MAAI,iBAAiB,eAAe;AAClC,gBAAa,WAAW,OAAO,MAAM,OAAO;AAC5C,OAAI,eAAe,OACjB,OAAM,GAAG,IAAI,mBAAmB,KAAK,YAAY,OAAO,CAAC;AAE3D,UAAO;;AAET,eACE,WAAW,OACX,mCAAmC,OAAO,MAAM,GACjD;AACD,SAAO;;;AAQX,MAAa,0BAA0B,OAGrC,KACA,SACwB;AACxB,QAAO,IAAI,YAAY,gBAAgB,EACrC,MAAM;EACJ,MAAM;EACN,GAAG;EACJ,EACF,CAAC"}
|