@rpcbase/auth 0.101.0 → 0.102.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/{handler-2sZNHSqb.js → handler-Bt53h0sk.js} +18 -6
- package/dist/{handler-2sZNHSqb.js.map → handler-Bt53h0sk.js.map} +1 -1
- package/dist/{handler-CXncjnG5.js → handler-Ck7oLQ_R.js} +34 -8
- package/dist/{handler-CXncjnG5.js.map → handler-Ck7oLQ_R.js.map} +1 -1
- package/dist/{handler-D9OypiUL.js → handler-CyP6R8FM.js} +4 -2
- package/dist/{handler-D9OypiUL.js.map → handler-CyP6R8FM.js.map} +1 -1
- package/dist/{handler-j0RdiReb.js → handler-D6zJn86A.js} +23 -7
- package/dist/{handler-j0RdiReb.js.map → handler-D6zJn86A.js.map} +1 -1
- package/dist/{handler-Db6lpg3J.js → handler-DfEsSB4T.js} +34 -9
- package/dist/{handler-Db6lpg3J.js.map → handler-DfEsSB4T.js.map} +1 -1
- package/dist/{handler--2n6PFBR.js → handler-xEpHnzkZ.js} +2 -2
- package/dist/{handler--2n6PFBR.js.map → handler-xEpHnzkZ.js.map} +1 -1
- package/dist/{index-BfZTJlGT.js → index-Bxz6YdiB.js} +4 -2
- package/dist/{index-BfZTJlGT.js.map → index-Bxz6YdiB.js.map} +1 -1
- package/dist/{index-DQy-Vgjt.js → index-C_uBu_fP.js} +4 -2
- package/dist/{index-DQy-Vgjt.js.map → index-C_uBu_fP.js.map} +1 -1
- package/dist/index.js +407 -194
- package/dist/index.js.map +1 -1
- package/dist/{middleware-HjIzPByj.js → middleware-5Zwy7HRL.js} +4 -2
- package/dist/{middleware-HjIzPByj.js.map → middleware-5Zwy7HRL.js.map} +1 -1
- package/dist/oauth/index.js +180 -41
- package/dist/oauth/index.js.map +1 -1
- package/dist/routes.js +1 -1
- package/dist/routes.js.map +1 -1
- package/package.json +1 -1
|
@@ -15,13 +15,23 @@ const resendOtp = async (payload, ctx) => {
|
|
|
15
15
|
const parsed = requestSchema.safeParse(payload);
|
|
16
16
|
if (!parsed.success) {
|
|
17
17
|
ctx.res.status(400);
|
|
18
|
-
return {
|
|
18
|
+
return {
|
|
19
|
+
success: false,
|
|
20
|
+
error: "invalid_payload"
|
|
21
|
+
};
|
|
19
22
|
}
|
|
20
|
-
const {
|
|
21
|
-
|
|
23
|
+
const {
|
|
24
|
+
email
|
|
25
|
+
} = parsed.data;
|
|
26
|
+
const user = await User.findOne({
|
|
27
|
+
email
|
|
28
|
+
});
|
|
22
29
|
if (!user) {
|
|
23
30
|
ctx.res.status(404);
|
|
24
|
-
return {
|
|
31
|
+
return {
|
|
32
|
+
success: false,
|
|
33
|
+
error: "user_not_found"
|
|
34
|
+
};
|
|
25
35
|
}
|
|
26
36
|
const emailVerificationCode = crypto.randomInt(0, 1e6).toString().padStart(6, "0");
|
|
27
37
|
const emailVerificationExpiresAt = new Date(Date.now() + 10 * 60 * 1e3);
|
|
@@ -41,7 +51,9 @@ const resendOtp = async (payload, ctx) => {
|
|
|
41
51
|
} catch (err) {
|
|
42
52
|
console.warn("failed to resend otp email", err);
|
|
43
53
|
}
|
|
44
|
-
return {
|
|
54
|
+
return {
|
|
55
|
+
success: true
|
|
56
|
+
};
|
|
45
57
|
};
|
|
46
58
|
const handler = (api) => {
|
|
47
59
|
api.post(Route, resendOtp);
|
|
@@ -49,4 +61,4 @@ const handler = (api) => {
|
|
|
49
61
|
export {
|
|
50
62
|
handler as default
|
|
51
63
|
};
|
|
52
|
-
//# sourceMappingURL=handler-
|
|
64
|
+
//# sourceMappingURL=handler-Bt53h0sk.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"handler-
|
|
1
|
+
{"version":3,"file":"handler-Bt53h0sk.js","sources":["../src/api/resend-otp/index.ts","../src/api/resend-otp/handler.ts"],"sourcesContent":["import { z } from \"zod\"\n\n\nexport const Route = \"/api/rb/auth/resend-otp\"\n\nexport const requestSchema = z.object({\n email: z.string().email(),\n})\n\nexport type RequestPayload = z.infer<typeof requestSchema>\n\nexport const responseSchema = z.object({\n success: z.boolean(),\n error: z.string().optional(),\n})\n\nexport type ResponsePayload = z.infer<typeof responseSchema>\n\n","import crypto from \"crypto\"\n\nimport { Api, ApiHandler, Ctx } from \"@rpcbase/api\"\nimport { models } from \"@rpcbase/db\"\nimport { sendEmail } from \"@rpcbase/server\"\n\nimport type { AuthSessionUser } from \"../../types\"\n\nimport * as ResendOtp from \"./index\"\n\n\nconst resendOtp: ApiHandler<ResendOtp.RequestPayload, ResendOtp.ResponsePayload, AuthSessionUser> = async (\n payload,\n ctx: Ctx<AuthSessionUser>\n): Promise<ResendOtp.ResponsePayload> => {\n const User = await models.getGlobal(\"RBUser\", ctx)\n\n const parsed = ResendOtp.requestSchema.safeParse(payload)\n\n if (!parsed.success) {\n ctx.res.status(400)\n return { success: false, error: \"invalid_payload\" }\n }\n\n const { email } = parsed.data\n\n const user = await User.findOne({ email })\n\n if (!user) {\n // TODO(auth): avoid account enumeration (return a generic success response even when the user doesn't exist)\n ctx.res.status(404)\n return { success: false, error: \"user_not_found\" }\n }\n\n // TODO(auth): add server-side throttling / rate limiting for resend-otp\n const emailVerificationCode = crypto.randomInt(0, 1_000_000).toString().padStart(6, \"0\")\n const emailVerificationExpiresAt = new Date(Date.now() + 10 * 60 * 1000)\n\n user.emailVerificationCode = emailVerificationCode\n user.emailVerificationExpiresAt = emailVerificationExpiresAt\n await user.save()\n\n try {\n await sendEmail({\n to: email,\n subject: `Your verification code: ${emailVerificationCode}`,\n html: `\n <p>Your verification code is <strong>${emailVerificationCode}</strong>. It expires in 10 minutes.</p>\n <p>If you didn't request this, you can ignore this message.</p>\n `,\n text: `Your verification code is ${emailVerificationCode}. It expires in 10 minutes. If you didn't request this, you can ignore this message.`,\n })\n } catch (err) {\n console.warn(\"failed to resend otp email\", err)\n }\n\n return { success: true }\n}\n\nexport default (api: Api<AuthSessionUser>) => {\n api.post(ResendOtp.Route, resendOtp)\n}\n"],"names":["Route","requestSchema","z","email","string","success","boolean","error","optional","resendOtp","payload","ctx","User","models","getGlobal","parsed","ResendOtp","safeParse","res","status","data","user","findOne","emailVerificationCode","crypto","randomInt","toString","padStart","emailVerificationExpiresAt","Date","now","save","sendEmail","to","subject","html","text","err","console","warn","api","post"],"mappings":";;;;AAGO,MAAMA,QAAQ;AAEd,MAAMC,gBAAgBC,OAAS;AAAA,EACpCC,OAAOD,OAAEE,EAASD,MAAAA;AACpB,CAAC;AAI6BD,OAAS;AAAA,EACrCG,SAASH,QAAEI;AAAAA,EACXC,OAAOL,OAAEE,EAASI,SAAAA;AACpB,CAAC;ACHD,MAAMC,YAA8F,OAClGC,SACAC,QACuC;AACvC,QAAMC,OAAO,MAAMC,OAAOC,UAAU,UAAUH,GAAG;AAEjD,QAAMI,SAASC,cAAwBC,UAAUP,OAAO;AAExD,MAAI,CAACK,OAAOV,SAAS;AACnBM,QAAIO,IAAIC,OAAO,GAAG;AAClB,WAAO;AAAA,MAAEd,SAAS;AAAA,MAAOE,OAAO;AAAA,IAAA;AAAA,EAClC;AAEA,QAAM;AAAA,IAAEJ;AAAAA,EAAAA,IAAUY,OAAOK;AAEzB,QAAMC,OAAO,MAAMT,KAAKU,QAAQ;AAAA,IAAEnB;AAAAA,EAAAA,CAAO;AAEzC,MAAI,CAACkB,MAAM;AAETV,QAAIO,IAAIC,OAAO,GAAG;AAClB,WAAO;AAAA,MAAEd,SAAS;AAAA,MAAOE,OAAO;AAAA,IAAA;AAAA,EAClC;AAGA,QAAMgB,wBAAwBC,OAAOC,UAAU,GAAG,GAAS,EAAEC,WAAWC,SAAS,GAAG,GAAG;AACvF,QAAMC,6BAA6B,IAAIC,KAAKA,KAAKC,QAAQ,KAAK,KAAK,GAAI;AAEvET,OAAKE,wBAAwBA;AAC7BF,OAAKO,6BAA6BA;AAClC,QAAMP,KAAKU,KAAAA;AAEX,MAAI;AACF,UAAMC,UAAU;AAAA,MACdC,IAAI9B;AAAAA,MACJ+B,SAAS,2BAA2BX,qBAAqB;AAAA,MACzDY,MAAM;AAAA,+CACmCZ,qBAAqB;AAAA;AAAA;AAAA,MAG9Da,MAAM,6BAA6Bb,qBAAqB;AAAA,IAAA,CACzD;AAAA,EACH,SAASc,KAAK;AACZC,YAAQC,KAAK,8BAA8BF,GAAG;AAAA,EAChD;AAEA,SAAO;AAAA,IAAEhC,SAAS;AAAA,EAAA;AACpB;AAEA,MAAA,UAAe,CAACmC,QAA8B;AAC5CA,MAAIC,KAAKzB,OAAiBP,SAAS;AACrC;"}
|
|
@@ -17,20 +17,39 @@ const verifyOtp = async (payload, ctx) => {
|
|
|
17
17
|
const parsed = requestSchema.safeParse(payload);
|
|
18
18
|
if (!parsed.success) {
|
|
19
19
|
ctx.res.status(400);
|
|
20
|
-
return {
|
|
20
|
+
return {
|
|
21
|
+
success: false,
|
|
22
|
+
error: "invalid_payload"
|
|
23
|
+
};
|
|
21
24
|
}
|
|
22
|
-
const {
|
|
23
|
-
|
|
25
|
+
const {
|
|
26
|
+
email,
|
|
27
|
+
code
|
|
28
|
+
} = parsed.data;
|
|
29
|
+
const user = await User.findOne({
|
|
30
|
+
email
|
|
31
|
+
}, {
|
|
32
|
+
emailVerificationCode: 1,
|
|
33
|
+
emailVerificationExpiresAt: 1,
|
|
34
|
+
tenants: 1,
|
|
35
|
+
tenantRoles: 1
|
|
36
|
+
});
|
|
24
37
|
if (!user) {
|
|
25
38
|
ctx.res.status(404);
|
|
26
|
-
return {
|
|
39
|
+
return {
|
|
40
|
+
success: false,
|
|
41
|
+
error: "user_not_found"
|
|
42
|
+
};
|
|
27
43
|
}
|
|
28
44
|
const storedCode = user.emailVerificationCode;
|
|
29
45
|
const expiresAt = user.emailVerificationExpiresAt;
|
|
30
46
|
const isExpired = expiresAt instanceof Date && expiresAt.getTime() < Date.now();
|
|
31
47
|
if (!storedCode || storedCode !== code || isExpired) {
|
|
32
48
|
ctx.res.status(400);
|
|
33
|
-
return {
|
|
49
|
+
return {
|
|
50
|
+
success: false,
|
|
51
|
+
error: "invalid_code"
|
|
52
|
+
};
|
|
34
53
|
}
|
|
35
54
|
user.emailVerificationCode = void 0;
|
|
36
55
|
user.emailVerificationExpiresAt = void 0;
|
|
@@ -41,7 +60,10 @@ const verifyOtp = async (payload, ctx) => {
|
|
|
41
60
|
const tenantRoles = tenantRolesMap ? Object.fromEntries(tenantRolesMap.entries()) : void 0;
|
|
42
61
|
if (!ctx.req.session) {
|
|
43
62
|
ctx.res.status(500);
|
|
44
|
-
return {
|
|
63
|
+
return {
|
|
64
|
+
success: false,
|
|
65
|
+
error: "session_unavailable"
|
|
66
|
+
};
|
|
45
67
|
}
|
|
46
68
|
ctx.req.session.user = {
|
|
47
69
|
id: user._id.toString(),
|
|
@@ -50,7 +72,11 @@ const verifyOtp = async (payload, ctx) => {
|
|
|
50
72
|
isEntryGateAuthorized: true,
|
|
51
73
|
tenantRoles
|
|
52
74
|
};
|
|
53
|
-
return {
|
|
75
|
+
return {
|
|
76
|
+
success: true,
|
|
77
|
+
userId: user._id.toString(),
|
|
78
|
+
tenantId
|
|
79
|
+
};
|
|
54
80
|
};
|
|
55
81
|
const handler = (api) => {
|
|
56
82
|
api.post(Route, verifyOtp);
|
|
@@ -58,4 +84,4 @@ const handler = (api) => {
|
|
|
58
84
|
export {
|
|
59
85
|
handler as default
|
|
60
86
|
};
|
|
61
|
-
//# sourceMappingURL=handler-
|
|
87
|
+
//# sourceMappingURL=handler-Ck7oLQ_R.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"handler-
|
|
1
|
+
{"version":3,"file":"handler-Ck7oLQ_R.js","sources":["../src/api/verify-otp/index.ts","../src/api/verify-otp/handler.ts"],"sourcesContent":["import { z } from \"zod\"\n\n\nexport const Route = \"/api/rb/auth/verify-otp\"\n\nexport const requestSchema = z.object({\n email: z.string().email(),\n code: z.string().length(6, \"Code must be 6 digits\"),\n rememberMe: z.boolean().default(true),\n})\n\nexport type RequestPayload = z.infer<typeof requestSchema>\n\nexport const responseSchema = z.object({\n success: z.boolean(),\n error: z.string().optional(),\n userId: z.string().optional(),\n tenantId: z.string().optional(),\n})\n\nexport type ResponsePayload = z.infer<typeof responseSchema>\n","import { Api, ApiHandler, Ctx } from \"@rpcbase/api\"\nimport { models } from \"@rpcbase/db\"\n\nimport type { AuthSessionUser } from \"../../types\"\n\nimport * as VerifyOtp from \"./index\"\n\n\nconst verifyOtp: ApiHandler<VerifyOtp.RequestPayload, VerifyOtp.ResponsePayload, AuthSessionUser> = async (\n payload,\n ctx: Ctx<AuthSessionUser>\n): Promise<VerifyOtp.ResponsePayload> => {\n const User = await models.getGlobal(\"RBUser\", ctx)\n\n const parsed = VerifyOtp.requestSchema.safeParse(payload)\n\n if (!parsed.success) {\n ctx.res.status(400)\n return { success: false, error: \"invalid_payload\" }\n }\n\n const { email, code } = parsed.data\n\n const user = await User.findOne({ email }, { emailVerificationCode: 1, emailVerificationExpiresAt: 1, tenants: 1, tenantRoles: 1 })\n\n if (!user) {\n ctx.res.status(404)\n return { success: false, error: \"user_not_found\" }\n }\n\n const storedCode = user.emailVerificationCode\n const expiresAt = user.emailVerificationExpiresAt\n\n const isExpired = expiresAt instanceof Date && expiresAt.getTime() < Date.now()\n if (!storedCode || storedCode !== code || isExpired) {\n ctx.res.status(400)\n return { success: false, error: \"invalid_code\" }\n }\n\n user.emailVerificationCode = undefined\n user.emailVerificationExpiresAt = undefined\n await user.save()\n\n const tenantId = user.tenants?.[0]?.toString?.() || \"00000000\"\n const signedInTenants = (user.tenants || []).map(String)\n const tenantRolesMap = user.get(\"tenantRoles\") as Map<string, string[]> | undefined\n const tenantRoles = tenantRolesMap ? Object.fromEntries(tenantRolesMap.entries()) : undefined\n\n if (!ctx.req.session) {\n ctx.res.status(500)\n return { success: false, error: \"session_unavailable\" }\n }\n\n ctx.req.session.user = {\n id: user._id.toString(),\n currentTenantId: tenantId,\n signedInTenants: signedInTenants.length ? signedInTenants : [tenantId],\n isEntryGateAuthorized: true,\n tenantRoles,\n }\n\n return { success: true, userId: user._id.toString(), tenantId }\n}\n\nexport default (api: Api<AuthSessionUser>) => {\n api.post(VerifyOtp.Route, verifyOtp)\n}\n"],"names":["Route","requestSchema","z","email","string","code","length","rememberMe","default","success","boolean","error","optional","userId","tenantId","verifyOtp","payload","ctx","User","models","getGlobal","parsed","VerifyOtp","safeParse","res","status","data","user","findOne","emailVerificationCode","emailVerificationExpiresAt","tenants","tenantRoles","storedCode","expiresAt","isExpired","Date","getTime","now","undefined","save","toString","signedInTenants","map","String","tenantRolesMap","get","Object","fromEntries","entries","req","session","id","_id","currentTenantId","isEntryGateAuthorized","api","post"],"mappings":";;AAGO,MAAMA,QAAQ;AAEd,MAAMC,gBAAgBC,OAAS;AAAA,EACpCC,OAAOD,OAAEE,EAASD,MAAAA;AAAAA,EAClBE,MAAMH,OAAEE,EAASE,OAAO,GAAG,uBAAuB;AAAA,EAClDC,YAAYL,UAAYM,QAAQ,IAAI;AACtC,CAAC;AAI6BN,OAAS;AAAA,EACrCO,SAASP,QAAEQ;AAAAA,EACXC,OAAOT,OAAEE,EAASQ,SAAAA;AAAAA,EAClBC,QAAQX,OAAEE,EAASQ,SAAAA;AAAAA,EACnBE,UAAUZ,OAAEE,EAASQ,SAAAA;AACvB,CAAC;ACVD,MAAMG,YAA8F,OAClGC,SACAC,QACuC;AACvC,QAAMC,OAAO,MAAMC,OAAOC,UAAU,UAAUH,GAAG;AAEjD,QAAMI,SAASC,cAAwBC,UAAUP,OAAO;AAExD,MAAI,CAACK,OAAOZ,SAAS;AACnBQ,QAAIO,IAAIC,OAAO,GAAG;AAClB,WAAO;AAAA,MAAEhB,SAAS;AAAA,MAAOE,OAAO;AAAA,IAAA;AAAA,EAClC;AAEA,QAAM;AAAA,IAAER;AAAAA,IAAOE;AAAAA,EAAAA,IAASgB,OAAOK;AAE/B,QAAMC,OAAO,MAAMT,KAAKU,QAAQ;AAAA,IAAEzB;AAAAA,EAAAA,GAAS;AAAA,IAAE0B,uBAAuB;AAAA,IAAGC,4BAA4B;AAAA,IAAGC,SAAS;AAAA,IAAGC,aAAa;AAAA,EAAA,CAAG;AAElI,MAAI,CAACL,MAAM;AACTV,QAAIO,IAAIC,OAAO,GAAG;AAClB,WAAO;AAAA,MAAEhB,SAAS;AAAA,MAAOE,OAAO;AAAA,IAAA;AAAA,EAClC;AAEA,QAAMsB,aAAaN,KAAKE;AACxB,QAAMK,YAAYP,KAAKG;AAEvB,QAAMK,YAAYD,qBAAqBE,QAAQF,UAAUG,QAAAA,IAAYD,KAAKE,IAAAA;AAC1E,MAAI,CAACL,cAAcA,eAAe5B,QAAQ8B,WAAW;AACnDlB,QAAIO,IAAIC,OAAO,GAAG;AAClB,WAAO;AAAA,MAAEhB,SAAS;AAAA,MAAOE,OAAO;AAAA,IAAA;AAAA,EAClC;AAEAgB,OAAKE,wBAAwBU;AAC7BZ,OAAKG,6BAA6BS;AAClC,QAAMZ,KAAKa,KAAAA;AAEX,QAAM1B,WAAWa,KAAKI,UAAU,CAAC,GAAGU,gBAAgB;AACpD,QAAMC,mBAAmBf,KAAKI,WAAW,CAAA,GAAIY,IAAIC,MAAM;AACvD,QAAMC,iBAAiBlB,KAAKmB,IAAI,aAAa;AAC7C,QAAMd,cAAca,iBAAiBE,OAAOC,YAAYH,eAAeI,QAAAA,CAAS,IAAIV;AAEpF,MAAI,CAACtB,IAAIiC,IAAIC,SAAS;AACpBlC,QAAIO,IAAIC,OAAO,GAAG;AAClB,WAAO;AAAA,MAAEhB,SAAS;AAAA,MAAOE,OAAO;AAAA,IAAA;AAAA,EAClC;AAEAM,MAAIiC,IAAIC,QAAQxB,OAAO;AAAA,IACrByB,IAAIzB,KAAK0B,IAAIZ,SAAAA;AAAAA,IACba,iBAAiBxC;AAAAA,IACjB4B,iBAAiBA,gBAAgBpC,SAASoC,kBAAkB,CAAC5B,QAAQ;AAAA,IACrEyC,uBAAuB;AAAA,IACvBvB;AAAAA,EAAAA;AAGF,SAAO;AAAA,IAAEvB,SAAS;AAAA,IAAMI,QAAQc,KAAK0B,IAAIZ,SAAAA;AAAAA,IAAY3B;AAAAA,EAAAA;AACvD;AAEA,MAAA,UAAe,CAAC0C,QAA8B;AAC5CA,MAAIC,KAAKnC,OAAiBP,SAAS;AACrC;"}
|
|
@@ -6,7 +6,9 @@ object({
|
|
|
6
6
|
});
|
|
7
7
|
const handleSignOut = async (_, ctx) => {
|
|
8
8
|
if (!ctx.req.session) {
|
|
9
|
-
return {
|
|
9
|
+
return {
|
|
10
|
+
success: true
|
|
11
|
+
};
|
|
10
12
|
}
|
|
11
13
|
await new Promise((resolve) => ctx.req.session.destroy(() => resolve()));
|
|
12
14
|
return {
|
|
@@ -19,4 +21,4 @@ const handler = (api) => {
|
|
|
19
21
|
export {
|
|
20
22
|
handler as default
|
|
21
23
|
};
|
|
22
|
-
//# sourceMappingURL=handler-
|
|
24
|
+
//# sourceMappingURL=handler-CyP6R8FM.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"handler-
|
|
1
|
+
{"version":3,"file":"handler-CyP6R8FM.js","sources":["../src/api/sign-out/index.ts","../src/api/sign-out/handler.ts"],"sourcesContent":["import { z } from \"zod\"\n\n\nexport const Route = \"/api/rb/auth/sign-out\"\n\n// No request payload needed for signout\nexport const requestSchema = z.object({})\n\nexport type RequestPayload = z.infer<typeof requestSchema>;\n\nexport const responseSchema = z.object({\n success: z.boolean()\n})\n\nexport type ResponsePayload = z.infer<typeof responseSchema>;\n","import { Api, Ctx } from \"@rpcbase/api\"\n\nimport * as SignOut from \"./index\"\n\n\nconst handleSignOut = async(_: SignOut.RequestPayload, ctx: Ctx): Promise<SignOut.ResponsePayload> => {\n // Destroy the session\n if (!ctx.req.session) {\n return { success: true }\n }\n\n await new Promise<void>((resolve) => ctx.req.session!.destroy(() => resolve()))\n\n return {\n success: true\n }\n}\n\nexport default (api: Api) => {\n api.post(SignOut.Route, handleSignOut)\n}\n"],"names":["Route","z","success","boolean","handleSignOut","_","ctx","req","session","Promise","resolve","destroy","api","post","SignOut"],"mappings":";AAGO,MAAMA,QAAQ;AAGQC,OAAS,CAAA,CAAE;AAIVA,OAAS;AAAA,EACrCC,SAASD,QAAEE;AACb,CAAC;ACPD,MAAMC,gBAAgB,OAAMC,GAA2BC,QAA+C;AAEpG,MAAI,CAACA,IAAIC,IAAIC,SAAS;AACpB,WAAO;AAAA,MAAEN,SAAS;AAAA,IAAA;AAAA,EACpB;AAEA,QAAM,IAAIO,QAAeC,CAAAA,YAAYJ,IAAIC,IAAIC,QAASG,QAAQ,MAAMD,QAAAA,CAAS,CAAC;AAE9E,SAAO;AAAA,IACLR,SAAS;AAAA,EAAA;AAEb;AAEA,MAAA,UAAe,CAACU,QAAa;AAC3BA,MAAIC,KAAKC,OAAeV,aAAa;AACvC;"}
|
|
@@ -1,21 +1,33 @@
|
|
|
1
1
|
import crypto from "crypto";
|
|
2
2
|
import { models } from "@rpcbase/db";
|
|
3
3
|
import { hashPasswordForStorage, sendEmail } from "@rpcbase/server";
|
|
4
|
-
import { R as Route, r as requestSchema } from "./index-
|
|
4
|
+
import { R as Route, r as requestSchema } from "./index-C_uBu_fP.js";
|
|
5
5
|
const signUp = async (payload, ctx) => {
|
|
6
6
|
const User = await models.getGlobal("RBUser", ctx);
|
|
7
7
|
const Tenant = await models.getGlobal("RBTenant", ctx);
|
|
8
8
|
const parsed = requestSchema.safeParse(payload);
|
|
9
9
|
if (!parsed.success) {
|
|
10
10
|
ctx.res.status(400);
|
|
11
|
-
return {
|
|
11
|
+
return {
|
|
12
|
+
success: false,
|
|
13
|
+
error: "invalid_payload"
|
|
14
|
+
};
|
|
12
15
|
}
|
|
13
|
-
const {
|
|
14
|
-
|
|
16
|
+
const {
|
|
17
|
+
email,
|
|
18
|
+
password,
|
|
19
|
+
rememberMe: _rememberMe
|
|
20
|
+
} = parsed.data;
|
|
21
|
+
const existingUser = await User.findOne({
|
|
22
|
+
email
|
|
23
|
+
});
|
|
15
24
|
if (existingUser) {
|
|
16
25
|
console.log("user with email already exists", email);
|
|
17
26
|
ctx.res.status(409);
|
|
18
|
-
return {
|
|
27
|
+
return {
|
|
28
|
+
success: false,
|
|
29
|
+
error: "user_exists"
|
|
30
|
+
};
|
|
19
31
|
}
|
|
20
32
|
const hashedPassword = await hashPasswordForStorage(password);
|
|
21
33
|
const tenantId = crypto.randomUUID();
|
|
@@ -55,7 +67,11 @@ const signUp = async (payload, ctx) => {
|
|
|
55
67
|
console.warn("failed to create tenant for user", err);
|
|
56
68
|
}
|
|
57
69
|
console.log("created new user", user._id.toString());
|
|
58
|
-
return {
|
|
70
|
+
return {
|
|
71
|
+
success: true,
|
|
72
|
+
userId: user._id.toString(),
|
|
73
|
+
tenantId
|
|
74
|
+
};
|
|
59
75
|
};
|
|
60
76
|
const handler = (api) => {
|
|
61
77
|
api.post(Route, signUp);
|
|
@@ -63,4 +79,4 @@ const handler = (api) => {
|
|
|
63
79
|
export {
|
|
64
80
|
handler as default
|
|
65
81
|
};
|
|
66
|
-
//# sourceMappingURL=handler-
|
|
82
|
+
//# sourceMappingURL=handler-D6zJn86A.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"handler-
|
|
1
|
+
{"version":3,"file":"handler-D6zJn86A.js","sources":["../src/api/sign-up/handler.ts"],"sourcesContent":["import crypto from \"crypto\"\n\nimport { Api, Ctx, ApiHandler } from \"@rpcbase/api\"\nimport { models } from \"@rpcbase/db\"\nimport { hashPasswordForStorage, sendEmail } from \"@rpcbase/server\"\n\nimport type { AuthSessionUser } from \"../../types\"\n\nimport * as SignUp from \"./index\"\n\n\nconst signUp: ApiHandler<SignUp.RequestPayload, SignUp.ResponsePayload, AuthSessionUser> = async(\n payload,\n ctx: Ctx<AuthSessionUser>\n): Promise<SignUp.ResponsePayload> => {\n const User = await models.getGlobal(\"RBUser\", ctx)\n const Tenant = await models.getGlobal(\"RBTenant\", ctx)\n\n const parsed = SignUp.requestSchema.safeParse(payload)\n\n if (!parsed.success) {\n ctx.res.status(400)\n return { success: false, error: \"invalid_payload\" }\n }\n\n // eslint-disable-next-line @typescript-eslint/no-unused-vars\n const { email, password, rememberMe: _rememberMe } = parsed.data\n\n const existingUser = await User.findOne({ email })\n\n if (existingUser) {\n console.log(\"user with email already exists\", email)\n // For security, we don't want to reveal if an email is registered.\n // But for this implementation, we'll make it simple.\n ctx.res.status(409)\n return { success: false, error: \"user_exists\" }\n }\n\n const hashedPassword = await hashPasswordForStorage(password)\n\n const tenantId = crypto.randomUUID()\n\n const emailVerificationCode = crypto.randomInt(0, 1_000_000).toString().padStart(6, \"0\")\n const emailVerificationExpiresAt = new Date(Date.now() + 10 * 60 * 1000)\n\n const user = new User({\n email,\n password: hashedPassword,\n tenants: [tenantId],\n tenantRoles: {\n [tenantId]: [\"owner\"],\n },\n emailVerificationCode,\n emailVerificationExpiresAt,\n })\n await user.save()\n\n try {\n await sendEmail({\n to: email,\n subject: `Verify your email: ${emailVerificationCode}`,\n html: `\n <p>Welcome to rpcbase!</p>\n <p>Your verification code is <strong>${emailVerificationCode}</strong>. It expires in 10 minutes.</p>\n <p>If you didn't request this, you can ignore this message.</p>\n `,\n text: `Welcome to rpcbase! Your verification code is ${emailVerificationCode}. It expires in 10 minutes. If you didn't request this, you can ignore this message.`,\n })\n } catch (err) {\n console.warn(\"failed to send sign-up email\", err)\n }\n\n try {\n await Tenant.create({\n tenantId,\n name: email,\n })\n } catch (err) {\n // best-effort tenant creation; log and continue\n console.warn(\"failed to create tenant for user\", err)\n }\n\n console.log(\"created new user\", user._id.toString())\n\n return { success: true, userId: user._id.toString(), tenantId }\n}\n\nexport default (api: Api<AuthSessionUser>) => {\n api.post(SignUp.Route, signUp)\n}\n"],"names":["signUp","payload","ctx","User","models","getGlobal","Tenant","parsed","SignUp","safeParse","success","res","status","error","email","password","rememberMe","_rememberMe","data","existingUser","findOne","console","log","hashedPassword","hashPasswordForStorage","tenantId","crypto","randomUUID","emailVerificationCode","randomInt","toString","padStart","emailVerificationExpiresAt","Date","now","user","tenants","tenantRoles","save","sendEmail","to","subject","html","text","err","warn","create","name","_id","userId","api","post"],"mappings":";;;;AAWA,MAAMA,SAAqF,OACzFC,SACAC,QACoC;AACpC,QAAMC,OAAO,MAAMC,OAAOC,UAAU,UAAUH,GAAG;AACjD,QAAMI,SAAS,MAAMF,OAAOC,UAAU,YAAYH,GAAG;AAErD,QAAMK,SAASC,cAAqBC,UAAUR,OAAO;AAErD,MAAI,CAACM,OAAOG,SAAS;AACnBR,QAAIS,IAAIC,OAAO,GAAG;AAClB,WAAO;AAAA,MAAEF,SAAS;AAAA,MAAOG,OAAO;AAAA,IAAA;AAAA,EAClC;AAGA,QAAM;AAAA,IAAEC;AAAAA,IAAOC;AAAAA,IAAUC,YAAYC;AAAAA,EAAAA,IAAgBV,OAAOW;AAE5D,QAAMC,eAAe,MAAMhB,KAAKiB,QAAQ;AAAA,IAAEN;AAAAA,EAAAA,CAAO;AAEjD,MAAIK,cAAc;AAChBE,YAAQC,IAAI,kCAAkCR,KAAK;AAGnDZ,QAAIS,IAAIC,OAAO,GAAG;AAClB,WAAO;AAAA,MAAEF,SAAS;AAAA,MAAOG,OAAO;AAAA,IAAA;AAAA,EAClC;AAEA,QAAMU,iBAAiB,MAAMC,uBAAuBT,QAAQ;AAE5D,QAAMU,WAAWC,OAAOC,WAAAA;AAExB,QAAMC,wBAAwBF,OAAOG,UAAU,GAAG,GAAS,EAAEC,WAAWC,SAAS,GAAG,GAAG;AACvF,QAAMC,6BAA6B,IAAIC,KAAKA,KAAKC,QAAQ,KAAK,KAAK,GAAI;AAEvE,QAAMC,OAAO,IAAIhC,KAAK;AAAA,IACpBW;AAAAA,IACAC,UAAUQ;AAAAA,IACVa,SAAS,CAACX,QAAQ;AAAA,IAClBY,aAAa;AAAA,MACX,CAACZ,QAAQ,GAAG,CAAC,OAAO;AAAA,IAAA;AAAA,IAEtBG;AAAAA,IACAI;AAAAA,EAAAA,CACD;AACD,QAAMG,KAAKG,KAAAA;AAEX,MAAI;AACF,UAAMC,UAAU;AAAA,MACdC,IAAI1B;AAAAA,MACJ2B,SAAS,sBAAsBb,qBAAqB;AAAA,MACpDc,MAAM;AAAA;AAAA,+CAEmCd,qBAAqB;AAAA;AAAA;AAAA,MAG9De,MAAM,iDAAiDf,qBAAqB;AAAA,IAAA,CAC7E;AAAA,EACH,SAASgB,KAAK;AACZvB,YAAQwB,KAAK,gCAAgCD,GAAG;AAAA,EAClD;AAEA,MAAI;AACF,UAAMtC,OAAOwC,OAAO;AAAA,MAClBrB;AAAAA,MACAsB,MAAMjC;AAAAA,IAAAA,CACP;AAAA,EACH,SAAS8B,KAAK;AAEZvB,YAAQwB,KAAK,oCAAoCD,GAAG;AAAA,EACtD;AAEAvB,UAAQC,IAAI,oBAAoBa,KAAKa,IAAIlB,UAAU;AAEnD,SAAO;AAAA,IAAEpB,SAAS;AAAA,IAAMuC,QAAQd,KAAKa,IAAIlB,SAAAA;AAAAA,IAAYL;AAAAA,EAAAA;AACvD;AAEA,MAAA,UAAe,CAACyB,QAA8B;AAC5CA,MAAIC,KAAK3C,OAAcR,MAAM;AAC/B;"}
|
|
@@ -1,18 +1,33 @@
|
|
|
1
1
|
import { models } from "@rpcbase/db";
|
|
2
2
|
import { verifyPasswordFromStorage } from "@rpcbase/server";
|
|
3
|
-
import { R as Route, r as requestSchema } from "./index-
|
|
3
|
+
import { R as Route, r as requestSchema } from "./index-Bxz6YdiB.js";
|
|
4
4
|
const signIn = async (payload, ctx) => {
|
|
5
5
|
const User = await models.getGlobal("RBUser", ctx);
|
|
6
6
|
const parsed = requestSchema.safeParse(payload);
|
|
7
7
|
if (!parsed.success) {
|
|
8
8
|
ctx.res.status(400);
|
|
9
|
-
return {
|
|
9
|
+
return {
|
|
10
|
+
success: false,
|
|
11
|
+
error: "invalid_payload"
|
|
12
|
+
};
|
|
10
13
|
}
|
|
11
|
-
const {
|
|
12
|
-
|
|
14
|
+
const {
|
|
15
|
+
email,
|
|
16
|
+
password
|
|
17
|
+
} = parsed.data;
|
|
18
|
+
const user = await User.findOne({
|
|
19
|
+
email
|
|
20
|
+
}, {
|
|
21
|
+
password: 1,
|
|
22
|
+
tenants: 1,
|
|
23
|
+
tenantRoles: 1
|
|
24
|
+
});
|
|
13
25
|
if (!user?.password) {
|
|
14
26
|
ctx.res.status(401);
|
|
15
|
-
return {
|
|
27
|
+
return {
|
|
28
|
+
success: false,
|
|
29
|
+
error: "invalid_credentials"
|
|
30
|
+
};
|
|
16
31
|
}
|
|
17
32
|
const stored = String(user.password);
|
|
18
33
|
const passwordMatches = await verifyPasswordFromStorage(password, stored);
|
|
@@ -21,7 +36,10 @@ const signIn = async (payload, ctx) => {
|
|
|
21
36
|
console.warn("auth::sign-in invalid stored password format", user._id.toString());
|
|
22
37
|
}
|
|
23
38
|
ctx.res.status(401);
|
|
24
|
-
return {
|
|
39
|
+
return {
|
|
40
|
+
success: false,
|
|
41
|
+
error: "invalid_credentials"
|
|
42
|
+
};
|
|
25
43
|
}
|
|
26
44
|
const tenantId = user.tenants?.[0]?.toString?.() || "00000000";
|
|
27
45
|
const signedInTenants = (user.tenants || []).map(String);
|
|
@@ -29,7 +47,10 @@ const signIn = async (payload, ctx) => {
|
|
|
29
47
|
const tenantRoles = tenantRolesMap ? Object.fromEntries(tenantRolesMap.entries()) : void 0;
|
|
30
48
|
if (!ctx.req.session) {
|
|
31
49
|
ctx.res.status(500);
|
|
32
|
-
return {
|
|
50
|
+
return {
|
|
51
|
+
success: false,
|
|
52
|
+
error: "session_unavailable"
|
|
53
|
+
};
|
|
33
54
|
}
|
|
34
55
|
ctx.req.session.user = {
|
|
35
56
|
id: user._id.toString(),
|
|
@@ -38,7 +59,11 @@ const signIn = async (payload, ctx) => {
|
|
|
38
59
|
isEntryGateAuthorized: true,
|
|
39
60
|
tenantRoles
|
|
40
61
|
};
|
|
41
|
-
return {
|
|
62
|
+
return {
|
|
63
|
+
success: true,
|
|
64
|
+
userId: user._id.toString(),
|
|
65
|
+
tenantId
|
|
66
|
+
};
|
|
42
67
|
};
|
|
43
68
|
const handler = (api) => {
|
|
44
69
|
api.post(Route, signIn);
|
|
@@ -46,4 +71,4 @@ const handler = (api) => {
|
|
|
46
71
|
export {
|
|
47
72
|
handler as default
|
|
48
73
|
};
|
|
49
|
-
//# sourceMappingURL=handler-
|
|
74
|
+
//# sourceMappingURL=handler-DfEsSB4T.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"handler-
|
|
1
|
+
{"version":3,"file":"handler-DfEsSB4T.js","sources":["../src/api/sign-in/handler.ts"],"sourcesContent":["import { Api, ApiHandler, Ctx } from \"@rpcbase/api\"\nimport { models } from \"@rpcbase/db\"\nimport { verifyPasswordFromStorage } from \"@rpcbase/server\"\n\nimport type { AuthSessionUser } from \"../../types\"\n\nimport * as SignIn from \"./index\"\n\n\nconst signIn: ApiHandler<SignIn.RequestPayload, SignIn.ResponsePayload, AuthSessionUser> = async(\n payload,\n ctx: Ctx<AuthSessionUser>\n): Promise<SignIn.ResponsePayload> => {\n const User = await models.getGlobal(\"RBUser\", ctx)\n\n const parsed = SignIn.requestSchema.safeParse(payload)\n\n if (!parsed.success) {\n ctx.res.status(400)\n return { success: false, error: \"invalid_payload\" }\n }\n\n const { email, password } = parsed.data\n\n const user = await User.findOne({ email }, { password: 1, tenants: 1, tenantRoles: 1 })\n\n if (!user?.password) {\n ctx.res.status(401)\n return { success: false, error: \"invalid_credentials\" }\n }\n\n const stored = String(user.password)\n const passwordMatches = await verifyPasswordFromStorage(password, stored)\n\n if (!passwordMatches) {\n if (!stored.startsWith(\"$scrypt$\")) {\n console.warn(\"auth::sign-in invalid stored password format\", user._id.toString())\n }\n ctx.res.status(401)\n return { success: false, error: \"invalid_credentials\" }\n }\n\n const tenantId = user.tenants?.[0]?.toString?.() || \"00000000\"\n const signedInTenants = (user.tenants || []).map(String)\n const tenantRolesMap = user.get(\"tenantRoles\") as Map<string, string[]> | undefined\n const tenantRoles = tenantRolesMap ? Object.fromEntries(tenantRolesMap.entries()) : undefined\n\n if (!ctx.req.session) {\n ctx.res.status(500)\n return { success: false, error: \"session_unavailable\" }\n }\n\n ctx.req.session.user = {\n id: user._id.toString(),\n currentTenantId: tenantId,\n signedInTenants: signedInTenants.length ? signedInTenants : [tenantId],\n isEntryGateAuthorized: true,\n tenantRoles,\n }\n\n return { success: true, userId: user._id.toString(), tenantId }\n}\n\nexport default (api: Api<AuthSessionUser>) => {\n api.post(SignIn.Route, signIn)\n}\n"],"names":["signIn","payload","ctx","User","models","getGlobal","parsed","SignIn","safeParse","success","res","status","error","email","password","data","user","findOne","tenants","tenantRoles","stored","String","passwordMatches","verifyPasswordFromStorage","startsWith","console","warn","_id","toString","tenantId","signedInTenants","map","tenantRolesMap","get","Object","fromEntries","entries","undefined","req","session","id","currentTenantId","length","isEntryGateAuthorized","userId","api","post"],"mappings":";;;AASA,MAAMA,SAAqF,OACzFC,SACAC,QACoC;AACpC,QAAMC,OAAO,MAAMC,OAAOC,UAAU,UAAUH,GAAG;AAEjD,QAAMI,SAASC,cAAqBC,UAAUP,OAAO;AAErD,MAAI,CAACK,OAAOG,SAAS;AACnBP,QAAIQ,IAAIC,OAAO,GAAG;AAClB,WAAO;AAAA,MAAEF,SAAS;AAAA,MAAOG,OAAO;AAAA,IAAA;AAAA,EAClC;AAEA,QAAM;AAAA,IAAEC;AAAAA,IAAOC;AAAAA,EAAAA,IAAaR,OAAOS;AAEnC,QAAMC,OAAO,MAAMb,KAAKc,QAAQ;AAAA,IAAEJ;AAAAA,EAAAA,GAAS;AAAA,IAAEC,UAAU;AAAA,IAAGI,SAAS;AAAA,IAAGC,aAAa;AAAA,EAAA,CAAG;AAEtF,MAAI,CAACH,MAAMF,UAAU;AACnBZ,QAAIQ,IAAIC,OAAO,GAAG;AAClB,WAAO;AAAA,MAAEF,SAAS;AAAA,MAAOG,OAAO;AAAA,IAAA;AAAA,EAClC;AAEA,QAAMQ,SAASC,OAAOL,KAAKF,QAAQ;AACnC,QAAMQ,kBAAkB,MAAMC,0BAA0BT,UAAUM,MAAM;AAExE,MAAI,CAACE,iBAAiB;AACpB,QAAI,CAACF,OAAOI,WAAW,UAAU,GAAG;AAClCC,cAAQC,KAAK,gDAAgDV,KAAKW,IAAIC,UAAU;AAAA,IAClF;AACA1B,QAAIQ,IAAIC,OAAO,GAAG;AAClB,WAAO;AAAA,MAAEF,SAAS;AAAA,MAAOG,OAAO;AAAA,IAAA;AAAA,EAClC;AAEA,QAAMiB,WAAWb,KAAKE,UAAU,CAAC,GAAGU,gBAAgB;AACpD,QAAME,mBAAmBd,KAAKE,WAAW,CAAA,GAAIa,IAAIV,MAAM;AACvD,QAAMW,iBAAiBhB,KAAKiB,IAAI,aAAa;AAC7C,QAAMd,cAAca,iBAAiBE,OAAOC,YAAYH,eAAeI,QAAAA,CAAS,IAAIC;AAEpF,MAAI,CAACnC,IAAIoC,IAAIC,SAAS;AACpBrC,QAAIQ,IAAIC,OAAO,GAAG;AAClB,WAAO;AAAA,MAAEF,SAAS;AAAA,MAAOG,OAAO;AAAA,IAAA;AAAA,EAClC;AAEAV,MAAIoC,IAAIC,QAAQvB,OAAO;AAAA,IACrBwB,IAAIxB,KAAKW,IAAIC,SAAAA;AAAAA,IACba,iBAAiBZ;AAAAA,IACjBC,iBAAiBA,gBAAgBY,SAASZ,kBAAkB,CAACD,QAAQ;AAAA,IACrEc,uBAAuB;AAAA,IACvBxB;AAAAA,EAAAA;AAGF,SAAO;AAAA,IAAEV,SAAS;AAAA,IAAMmC,QAAQ5B,KAAKW,IAAIC,SAAAA;AAAAA,IAAYC;AAAAA,EAAAA;AACvD;AAEA,MAAA,UAAe,CAACgB,QAA8B;AAC5CA,MAAIC,KAAKvC,OAAcP,MAAM;AAC/B;"}
|
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
import { models } from "@rpcbase/db";
|
|
2
|
-
import { r as restrictSessionMiddleware } from "./middleware-
|
|
2
|
+
import { r as restrictSessionMiddleware } from "./middleware-5Zwy7HRL.js";
|
|
3
3
|
import { o as object, s as string, a as array } from "./schemas-Dn3gHDGz.js";
|
|
4
4
|
const Route = "/api/rb/auth/me";
|
|
5
5
|
object({});
|
|
@@ -55,4 +55,4 @@ const handler = (api) => {
|
|
|
55
55
|
export {
|
|
56
56
|
handler as default
|
|
57
57
|
};
|
|
58
|
-
//# sourceMappingURL=handler
|
|
58
|
+
//# sourceMappingURL=handler-xEpHnzkZ.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"handler
|
|
1
|
+
{"version":3,"file":"handler-xEpHnzkZ.js","sources":["../src/api/me/index.ts","../src/api/me/handler.ts"],"sourcesContent":["import { z } from \"zod\"\n\n\nexport const Route = \"/api/rb/auth/me\"\n\nexport const requestSchema = z.object({})\nexport type RequestPayload = z.infer<typeof requestSchema>\n\nexport const responseSchema = z.object({\n id: z.string().optional(),\n email: z.string().email().optional(),\n phone: z.string().optional(),\n name: z.string().optional(),\n tenants: z.array(z.string()).default([]),\n currentTenantId: z.string().optional(),\n signedInTenants: z.array(z.string()).default([]).optional(),\n error: z.string().optional(),\n})\n\nexport type ResponsePayload = z.infer<typeof responseSchema>\n","import { Api, ApiHandler, Ctx } from \"@rpcbase/api\"\nimport { models } from \"@rpcbase/db\"\n\nimport type { AuthSessionUser } from \"../../types\"\nimport { restrictSessionMiddleware } from \"../../middleware\"\n\nimport * as Me from \"./index\"\n\n\nconst me: ApiHandler<Me.RequestPayload, Me.ResponsePayload, AuthSessionUser> = async(\n _payload: Me.RequestPayload,\n ctx: Ctx<AuthSessionUser>\n): Promise<Me.ResponsePayload> => {\n const sessionUser = ctx.req.session?.user\n\n if (!sessionUser?.id) {\n ctx.res.status(401)\n return {\n id: \"\",\n currentTenantId: \"\",\n signedInTenants: [],\n tenants: [],\n error: \"not_authenticated\",\n } as unknown as Me.ResponsePayload\n }\n\n const User = await models.getGlobal(\"RBUser\", ctx)\n const user = await User.findById(sessionUser.id)\n\n if (!user) {\n ctx.res.status(404)\n return {\n id: \"\",\n currentTenantId: \"\",\n signedInTenants: [],\n tenants: [],\n error: \"user_not_found\",\n } as unknown as Me.ResponsePayload\n }\n\n const tenantId = sessionUser.currentTenantId || user.tenants?.[0]?.toString?.() || \"00000000\"\n\n return {\n id: user._id.toString(),\n email: user.email,\n phone: user.get(\"phone\") as string | undefined,\n name: user.name,\n tenants: (user.tenants || []).map(String),\n currentTenantId: tenantId,\n signedInTenants: sessionUser.signedInTenants || [],\n }\n}\n\nexport default (api: Api<AuthSessionUser>) => {\n api.use(Me.Route, restrictSessionMiddleware)\n api.get(Me.Route, me)\n}\n"],"names":["Route","z","id","string","optional","email","phone","name","tenants","default","currentTenantId","signedInTenants","error","me","_payload","ctx","sessionUser","req","session","user","res","status","User","models","getGlobal","findById","tenantId","toString","_id","get","map","String","api","use","Me","restrictSessionMiddleware"],"mappings":";;;AAGO,MAAMA,QAAQ;AAEQC,OAAS,CAAA,CAAE;AAGVA,OAAS;AAAA,EACrCC,IAAID,OAAEE,EAASC,SAAAA;AAAAA,EACfC,OAAOJ,OAAEE,EAASE,MAAAA,EAAQD,SAAAA;AAAAA,EAC1BE,OAAOL,OAAEE,EAASC,SAAAA;AAAAA,EAClBG,MAAMN,OAAEE,EAASC,SAAAA;AAAAA,EACjBI,SAASP,MAAQA,QAAU,EAAEQ,QAAQ,CAAA,CAAE;AAAA,EACvCC,iBAAiBT,OAAEE,EAASC,SAAAA;AAAAA,EAC5BO,iBAAiBV,MAAQA,OAAEE,CAAQ,EAAEM,QAAQ,CAAA,CAAE,EAAEL,SAAAA;AAAAA,EACjDQ,OAAOX,OAAEE,EAASC,SAAAA;AACpB,CAAC;ACRD,MAAMS,KAAyE,OAC7EC,UACAC,QACgC;AAChC,QAAMC,cAAcD,IAAIE,IAAIC,SAASC;AAErC,MAAI,CAACH,aAAad,IAAI;AACpBa,QAAIK,IAAIC,OAAO,GAAG;AAClB,WAAO;AAAA,MACLnB,IAAI;AAAA,MACJQ,iBAAiB;AAAA,MACjBC,iBAAiB,CAAA;AAAA,MACjBH,SAAS,CAAA;AAAA,MACTI,OAAO;AAAA,IAAA;AAAA,EAEX;AAEA,QAAMU,OAAO,MAAMC,OAAOC,UAAU,UAAUT,GAAG;AACjD,QAAMI,OAAO,MAAMG,KAAKG,SAAST,YAAYd,EAAE;AAE/C,MAAI,CAACiB,MAAM;AACTJ,QAAIK,IAAIC,OAAO,GAAG;AAClB,WAAO;AAAA,MACLnB,IAAI;AAAA,MACJQ,iBAAiB;AAAA,MACjBC,iBAAiB,CAAA;AAAA,MACjBH,SAAS,CAAA;AAAA,MACTI,OAAO;AAAA,IAAA;AAAA,EAEX;AAEA,QAAMc,WAAWV,YAAYN,mBAAmBS,KAAKX,UAAU,CAAC,GAAGmB,gBAAgB;AAEnF,SAAO;AAAA,IACLzB,IAAIiB,KAAKS,IAAID,SAAAA;AAAAA,IACbtB,OAAOc,KAAKd;AAAAA,IACZC,OAAOa,KAAKU,IAAI,OAAO;AAAA,IACvBtB,MAAMY,KAAKZ;AAAAA,IACXC,UAAUW,KAAKX,WAAW,CAAA,GAAIsB,IAAIC,MAAM;AAAA,IACxCrB,iBAAiBgB;AAAAA,IACjBf,iBAAiBK,YAAYL,mBAAmB,CAAA;AAAA,EAAA;AAEpD;AAEA,MAAA,UAAe,CAACqB,QAA8B;AAC5CA,MAAIC,IAAIC,OAAUC,yBAAyB;AAC3CH,MAAIH,IAAIK,OAAUrB,EAAE;AACtB;"}
|
|
@@ -2,7 +2,9 @@ import { o as object, b as boolean, s as string } from "./schemas-Dn3gHDGz.js";
|
|
|
2
2
|
const Route = "/api/rb/auth/sign-in";
|
|
3
3
|
const requestSchema = object({
|
|
4
4
|
email: string().nonempty("Email is required").email("Please enter a valid email address"),
|
|
5
|
-
password: string().min(1, {
|
|
5
|
+
password: string().min(1, {
|
|
6
|
+
message: "Password is required"
|
|
7
|
+
}),
|
|
6
8
|
rememberMe: boolean().default(true)
|
|
7
9
|
});
|
|
8
10
|
object({
|
|
@@ -15,4 +17,4 @@ export {
|
|
|
15
17
|
Route as R,
|
|
16
18
|
requestSchema as r
|
|
17
19
|
};
|
|
18
|
-
//# sourceMappingURL=index-
|
|
20
|
+
//# sourceMappingURL=index-Bxz6YdiB.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index-
|
|
1
|
+
{"version":3,"file":"index-Bxz6YdiB.js","sources":["../src/api/sign-in/index.ts"],"sourcesContent":["import { z } from \"zod\"\n\n\nexport const Route = \"/api/rb/auth/sign-in\"\n\nexport const requestSchema = z.object({\n email: z\n .string()\n .nonempty(\"Email is required\")\n .email(\"Please enter a valid email address\"),\n password: z.string().min(1, { message: \"Password is required\" }),\n rememberMe: z.boolean().default(true),\n})\n\nexport type RequestPayload = z.infer<typeof requestSchema>\n\nexport const responseSchema = z.object({\n success: z.boolean(),\n error: z.string().optional(),\n userId: z.string().optional(),\n tenantId: z.string().optional(),\n})\n\nexport type ResponsePayload = z.infer<typeof responseSchema>\n"],"names":["Route","requestSchema","z","email","string","nonempty","password","min","message","rememberMe","default","success","boolean","error","optional","userId","tenantId"],"mappings":";AAGO,MAAMA,QAAQ;AAEd,MAAMC,gBAAgBC,OAAS;AAAA,EACpCC,OAAOD,OACJE,EACAC,SAAS,mBAAmB,EAC5BF,MAAM,oCAAoC;AAAA,EAC7CG,UAAUJ,OAAEE,EAASG,IAAI,GAAG;AAAA,IAAEC,SAAS;AAAA,EAAA,CAAwB;AAAA,EAC/DC,YAAYP,UAAYQ,QAAQ,IAAI;AACtC,CAAC;AAI6BR,OAAS;AAAA,EACrCS,SAAST,QAAEU;AAAAA,EACXC,OAAOX,OAAEE,EAASU,SAAAA;AAAAA,EAClBC,QAAQb,OAAEE,EAASU,SAAAA;AAAAA,EACnBE,UAAUd,OAAEE,EAASU,SAAAA;AACvB,CAAC;"}
|
|
@@ -2,7 +2,9 @@ import { o as object, b as boolean, s as string } from "./schemas-Dn3gHDGz.js";
|
|
|
2
2
|
const Route = "/api/rb/auth/sign-up";
|
|
3
3
|
const requestSchema = object({
|
|
4
4
|
email: string().nonempty("Email is required").email("Please enter a valid email address"),
|
|
5
|
-
password: string().min(8, {
|
|
5
|
+
password: string().min(8, {
|
|
6
|
+
message: "Password must be at least 8 characters long."
|
|
7
|
+
}),
|
|
6
8
|
rememberMe: boolean().default(true)
|
|
7
9
|
});
|
|
8
10
|
object({
|
|
@@ -15,4 +17,4 @@ export {
|
|
|
15
17
|
Route as R,
|
|
16
18
|
requestSchema as r
|
|
17
19
|
};
|
|
18
|
-
//# sourceMappingURL=index-
|
|
20
|
+
//# sourceMappingURL=index-C_uBu_fP.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index-
|
|
1
|
+
{"version":3,"file":"index-C_uBu_fP.js","sources":["../src/api/sign-up/index.ts"],"sourcesContent":["import { z } from \"zod\"\n\n\nexport const Route = \"/api/rb/auth/sign-up\"\n\nexport const requestSchema = z\n .object({\n email: z\n .string()\n .nonempty(\"Email is required\")\n .email(\"Please enter a valid email address\"),\n password: z.string().min(8, { message: \"Password must be at least 8 characters long.\" }),\n rememberMe: z.boolean().default(true),\n })\n\nexport type RequestPayload = z.infer<typeof requestSchema>\n\nexport const responseSchema = z.object({\n success: z.boolean(),\n error: z.string().optional(),\n userId: z.string().optional(),\n tenantId: z.string().optional(),\n})\n\nexport type ResponsePayload = z.infer<typeof responseSchema>\n"],"names":["Route","requestSchema","z","email","string","nonempty","password","min","message","rememberMe","default","success","boolean","error","optional","userId","tenantId"],"mappings":";AAGO,MAAMA,QAAQ;AAEd,MAAMC,gBAAgBC,OACnB;AAAA,EACNC,OAAOD,OACJE,EACAC,SAAS,mBAAmB,EAC5BF,MAAM,oCAAoC;AAAA,EAC7CG,UAAUJ,OAAEE,EAASG,IAAI,GAAG;AAAA,IAAEC,SAAS;AAAA,EAAA,CAAgD;AAAA,EACvFC,YAAYP,UAAYQ,QAAQ,IAAI;AACtC,CAAC;AAI2BR,OAAS;AAAA,EACrCS,SAAST,QAAEU;AAAAA,EACXC,OAAOX,OAAEE,EAASU,SAAAA;AAAAA,EAClBC,QAAQb,OAAEE,EAASU,SAAAA;AAAAA,EACnBE,UAAUd,OAAEE,EAASU,SAAAA;AACvB,CAAC;"}
|