@rpcbase/auth 0.118.0 → 0.120.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/handler-BNDemOGd.js +79 -0
- package/dist/handler-BNDemOGd.js.map +1 -0
- package/dist/handler-Bt53h0sk.js +64 -0
- package/dist/handler-Bt53h0sk.js.map +1 -0
- package/dist/handler-C4cw739Z.js +59 -0
- package/dist/handler-C4cw739Z.js.map +1 -0
- package/dist/handler-Ck7oLQ_R.js +87 -0
- package/dist/handler-Ck7oLQ_R.js.map +1 -0
- package/dist/handler-CyP6R8FM.js +24 -0
- package/dist/handler-CyP6R8FM.js.map +1 -0
- package/dist/handler-D6zJn86A.js +82 -0
- package/dist/handler-D6zJn86A.js.map +1 -0
- package/dist/handler-D7KnXlx3.js +58 -0
- package/dist/handler-D7KnXlx3.js.map +1 -0
- package/dist/handler-D8HfTbUs.js +58 -0
- package/dist/handler-D8HfTbUs.js.map +1 -0
- package/dist/handler-DfEsSB4T.js +74 -0
- package/dist/handler-DfEsSB4T.js.map +1 -0
- package/dist/index-Bxz6YdiB.js +20 -0
- package/dist/index-Bxz6YdiB.js.map +1 -0
- package/dist/index-C_uBu_fP.js +20 -0
- package/dist/index-C_uBu_fP.js.map +1 -0
- package/dist/index.js +685 -705
- package/dist/index.js.map +1 -1
- package/dist/middleware-8IfSkEEy.js +25 -0
- package/dist/middleware-8IfSkEEy.js.map +1 -0
- package/dist/oauth/index.js +746 -625
- package/dist/oauth/index.js.map +1 -1
- package/dist/routes.js +9 -18
- package/dist/routes.js.map +1 -1
- package/dist/schemas-Dn3gHDGz.js +3706 -0
- package/dist/schemas-Dn3gHDGz.js.map +1 -0
- package/package.json +1 -1
- package/dist/handler-BH38xcvj.js +0 -60
- package/dist/handler-BH38xcvj.js.map +0 -1
- package/dist/handler-Bjxe8iM2.js +0 -67
- package/dist/handler-Bjxe8iM2.js.map +0 -1
- package/dist/handler-CVeU9Nyf.js +0 -85
- package/dist/handler-CVeU9Nyf.js.map +0 -1
- package/dist/handler-CrTy-N1A.js +0 -51
- package/dist/handler-CrTy-N1A.js.map +0 -1
- package/dist/handler-D2-FmmDc.js +0 -56
- package/dist/handler-D2-FmmDc.js.map +0 -1
- package/dist/handler-D4-sXlBe.js +0 -74
- package/dist/handler-D4-sXlBe.js.map +0 -1
- package/dist/handler-D87G4mz9.js +0 -67
- package/dist/handler-D87G4mz9.js.map +0 -1
- package/dist/handler-DKrwSIQz.js +0 -19
- package/dist/handler-DKrwSIQz.js.map +0 -1
- package/dist/handler-tJUJWqII.js +0 -59
- package/dist/handler-tJUJWqII.js.map +0 -1
- package/dist/middleware-BbKZ_rOe.js +0 -18
- package/dist/middleware-BbKZ_rOe.js.map +0 -1
- package/dist/schemas-BKnjeqQ9.js +0 -3380
- package/dist/schemas-BKnjeqQ9.js.map +0 -1
- package/dist/sign-in-C9a-NvBu.js +0 -18
- package/dist/sign-in-C9a-NvBu.js.map +0 -1
- package/dist/sign-up-DqDJxb2D.js +0 -18
- package/dist/sign-up-DqDJxb2D.js.map +0 -1
|
@@ -0,0 +1,74 @@
|
|
|
1
|
+
import { models } from "@rpcbase/db";
|
|
2
|
+
import { verifyPasswordFromStorage } from "@rpcbase/server";
|
|
3
|
+
import { R as Route, r as requestSchema } from "./index-Bxz6YdiB.js";
|
|
4
|
+
const signIn = async (payload, ctx) => {
|
|
5
|
+
const User = await models.getGlobal("RBUser", ctx);
|
|
6
|
+
const parsed = requestSchema.safeParse(payload);
|
|
7
|
+
if (!parsed.success) {
|
|
8
|
+
ctx.res.status(400);
|
|
9
|
+
return {
|
|
10
|
+
success: false,
|
|
11
|
+
error: "invalid_payload"
|
|
12
|
+
};
|
|
13
|
+
}
|
|
14
|
+
const {
|
|
15
|
+
email,
|
|
16
|
+
password
|
|
17
|
+
} = parsed.data;
|
|
18
|
+
const user = await User.findOne({
|
|
19
|
+
email
|
|
20
|
+
}, {
|
|
21
|
+
password: 1,
|
|
22
|
+
tenants: 1,
|
|
23
|
+
tenantRoles: 1
|
|
24
|
+
});
|
|
25
|
+
if (!user?.password) {
|
|
26
|
+
ctx.res.status(401);
|
|
27
|
+
return {
|
|
28
|
+
success: false,
|
|
29
|
+
error: "invalid_credentials"
|
|
30
|
+
};
|
|
31
|
+
}
|
|
32
|
+
const stored = String(user.password);
|
|
33
|
+
const passwordMatches = await verifyPasswordFromStorage(password, stored);
|
|
34
|
+
if (!passwordMatches) {
|
|
35
|
+
if (!stored.startsWith("$scrypt$")) {
|
|
36
|
+
console.warn("auth::sign-in invalid stored password format", user._id.toString());
|
|
37
|
+
}
|
|
38
|
+
ctx.res.status(401);
|
|
39
|
+
return {
|
|
40
|
+
success: false,
|
|
41
|
+
error: "invalid_credentials"
|
|
42
|
+
};
|
|
43
|
+
}
|
|
44
|
+
const tenantId = user.tenants?.[0]?.toString?.() || "00000000";
|
|
45
|
+
const signedInTenants = (user.tenants || []).map(String);
|
|
46
|
+
const tenantRolesMap = user.get("tenantRoles");
|
|
47
|
+
const tenantRoles = tenantRolesMap ? Object.fromEntries(tenantRolesMap.entries()) : void 0;
|
|
48
|
+
if (!ctx.req.session) {
|
|
49
|
+
ctx.res.status(500);
|
|
50
|
+
return {
|
|
51
|
+
success: false,
|
|
52
|
+
error: "session_unavailable"
|
|
53
|
+
};
|
|
54
|
+
}
|
|
55
|
+
ctx.req.session.user = {
|
|
56
|
+
id: user._id.toString(),
|
|
57
|
+
currentTenantId: tenantId,
|
|
58
|
+
signedInTenants: signedInTenants.length ? signedInTenants : [tenantId],
|
|
59
|
+
isEntryGateAuthorized: true,
|
|
60
|
+
tenantRoles
|
|
61
|
+
};
|
|
62
|
+
return {
|
|
63
|
+
success: true,
|
|
64
|
+
userId: user._id.toString(),
|
|
65
|
+
tenantId
|
|
66
|
+
};
|
|
67
|
+
};
|
|
68
|
+
const handler = (api) => {
|
|
69
|
+
api.post(Route, signIn);
|
|
70
|
+
};
|
|
71
|
+
export {
|
|
72
|
+
handler as default
|
|
73
|
+
};
|
|
74
|
+
//# sourceMappingURL=handler-DfEsSB4T.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"handler-DfEsSB4T.js","sources":["../src/api/sign-in/handler.ts"],"sourcesContent":["import { Api, ApiHandler, Ctx } from \"@rpcbase/api\"\nimport { models } from \"@rpcbase/db\"\nimport { verifyPasswordFromStorage } from \"@rpcbase/server\"\n\nimport type { AuthSessionUser } from \"../../types\"\n\nimport * as SignIn from \"./index\"\n\n\nconst signIn: ApiHandler<SignIn.RequestPayload, SignIn.ResponsePayload, AuthSessionUser> = async(\n payload,\n ctx: Ctx<AuthSessionUser>\n): Promise<SignIn.ResponsePayload> => {\n const User = await models.getGlobal(\"RBUser\", ctx)\n\n const parsed = SignIn.requestSchema.safeParse(payload)\n\n if (!parsed.success) {\n ctx.res.status(400)\n return { success: false, error: \"invalid_payload\" }\n }\n\n const { email, password } = parsed.data\n\n const user = await User.findOne({ email }, { password: 1, tenants: 1, tenantRoles: 1 })\n\n if (!user?.password) {\n ctx.res.status(401)\n return { success: false, error: \"invalid_credentials\" }\n }\n\n const stored = String(user.password)\n const passwordMatches = await verifyPasswordFromStorage(password, stored)\n\n if (!passwordMatches) {\n if (!stored.startsWith(\"$scrypt$\")) {\n console.warn(\"auth::sign-in invalid stored password format\", user._id.toString())\n }\n ctx.res.status(401)\n return { success: false, error: \"invalid_credentials\" }\n }\n\n const tenantId = user.tenants?.[0]?.toString?.() || \"00000000\"\n const signedInTenants = (user.tenants || []).map(String)\n const tenantRolesMap = user.get(\"tenantRoles\") as Map<string, string[]> | undefined\n const tenantRoles = tenantRolesMap ? Object.fromEntries(tenantRolesMap.entries()) : undefined\n\n if (!ctx.req.session) {\n ctx.res.status(500)\n return { success: false, error: \"session_unavailable\" }\n }\n\n ctx.req.session.user = {\n id: user._id.toString(),\n currentTenantId: tenantId,\n signedInTenants: signedInTenants.length ? signedInTenants : [tenantId],\n isEntryGateAuthorized: true,\n tenantRoles,\n }\n\n return { success: true, userId: user._id.toString(), tenantId }\n}\n\nexport default (api: Api<AuthSessionUser>) => {\n api.post(SignIn.Route, signIn)\n}\n"],"names":["signIn","payload","ctx","User","models","getGlobal","parsed","SignIn","safeParse","success","res","status","error","email","password","data","user","findOne","tenants","tenantRoles","stored","String","passwordMatches","verifyPasswordFromStorage","startsWith","console","warn","_id","toString","tenantId","signedInTenants","map","tenantRolesMap","get","Object","fromEntries","entries","undefined","req","session","id","currentTenantId","length","isEntryGateAuthorized","userId","api","post"],"mappings":";;;AASA,MAAMA,SAAqF,OACzFC,SACAC,QACoC;AACpC,QAAMC,OAAO,MAAMC,OAAOC,UAAU,UAAUH,GAAG;AAEjD,QAAMI,SAASC,cAAqBC,UAAUP,OAAO;AAErD,MAAI,CAACK,OAAOG,SAAS;AACnBP,QAAIQ,IAAIC,OAAO,GAAG;AAClB,WAAO;AAAA,MAAEF,SAAS;AAAA,MAAOG,OAAO;AAAA,IAAA;AAAA,EAClC;AAEA,QAAM;AAAA,IAAEC;AAAAA,IAAOC;AAAAA,EAAAA,IAAaR,OAAOS;AAEnC,QAAMC,OAAO,MAAMb,KAAKc,QAAQ;AAAA,IAAEJ;AAAAA,EAAAA,GAAS;AAAA,IAAEC,UAAU;AAAA,IAAGI,SAAS;AAAA,IAAGC,aAAa;AAAA,EAAA,CAAG;AAEtF,MAAI,CAACH,MAAMF,UAAU;AACnBZ,QAAIQ,IAAIC,OAAO,GAAG;AAClB,WAAO;AAAA,MAAEF,SAAS;AAAA,MAAOG,OAAO;AAAA,IAAA;AAAA,EAClC;AAEA,QAAMQ,SAASC,OAAOL,KAAKF,QAAQ;AACnC,QAAMQ,kBAAkB,MAAMC,0BAA0BT,UAAUM,MAAM;AAExE,MAAI,CAACE,iBAAiB;AACpB,QAAI,CAACF,OAAOI,WAAW,UAAU,GAAG;AAClCC,cAAQC,KAAK,gDAAgDV,KAAKW,IAAIC,UAAU;AAAA,IAClF;AACA1B,QAAIQ,IAAIC,OAAO,GAAG;AAClB,WAAO;AAAA,MAAEF,SAAS;AAAA,MAAOG,OAAO;AAAA,IAAA;AAAA,EAClC;AAEA,QAAMiB,WAAWb,KAAKE,UAAU,CAAC,GAAGU,gBAAgB;AACpD,QAAME,mBAAmBd,KAAKE,WAAW,CAAA,GAAIa,IAAIV,MAAM;AACvD,QAAMW,iBAAiBhB,KAAKiB,IAAI,aAAa;AAC7C,QAAMd,cAAca,iBAAiBE,OAAOC,YAAYH,eAAeI,QAAAA,CAAS,IAAIC;AAEpF,MAAI,CAACnC,IAAIoC,IAAIC,SAAS;AACpBrC,QAAIQ,IAAIC,OAAO,GAAG;AAClB,WAAO;AAAA,MAAEF,SAAS;AAAA,MAAOG,OAAO;AAAA,IAAA;AAAA,EAClC;AAEAV,MAAIoC,IAAIC,QAAQvB,OAAO;AAAA,IACrBwB,IAAIxB,KAAKW,IAAIC,SAAAA;AAAAA,IACba,iBAAiBZ;AAAAA,IACjBC,iBAAiBA,gBAAgBY,SAASZ,kBAAkB,CAACD,QAAQ;AAAA,IACrEc,uBAAuB;AAAA,IACvBxB;AAAAA,EAAAA;AAGF,SAAO;AAAA,IAAEV,SAAS;AAAA,IAAMmC,QAAQ5B,KAAKW,IAAIC,SAAAA;AAAAA,IAAYC;AAAAA,EAAAA;AACvD;AAEA,MAAA,UAAe,CAACgB,QAA8B;AAC5CA,MAAIC,KAAKvC,OAAcP,MAAM;AAC/B;"}
|
|
@@ -0,0 +1,20 @@
|
|
|
1
|
+
import { o as object, b as boolean, s as string } from "./schemas-Dn3gHDGz.js";
|
|
2
|
+
const Route = "/api/rb/auth/sign-in";
|
|
3
|
+
const requestSchema = object({
|
|
4
|
+
email: string().nonempty("Email is required").email("Please enter a valid email address"),
|
|
5
|
+
password: string().min(1, {
|
|
6
|
+
message: "Password is required"
|
|
7
|
+
}),
|
|
8
|
+
rememberMe: boolean().default(true)
|
|
9
|
+
});
|
|
10
|
+
object({
|
|
11
|
+
success: boolean(),
|
|
12
|
+
error: string().optional(),
|
|
13
|
+
userId: string().optional(),
|
|
14
|
+
tenantId: string().optional()
|
|
15
|
+
});
|
|
16
|
+
export {
|
|
17
|
+
Route as R,
|
|
18
|
+
requestSchema as r
|
|
19
|
+
};
|
|
20
|
+
//# sourceMappingURL=index-Bxz6YdiB.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"index-Bxz6YdiB.js","sources":["../src/api/sign-in/index.ts"],"sourcesContent":["import { z } from \"zod\"\n\n\nexport const Route = \"/api/rb/auth/sign-in\"\n\nexport const requestSchema = z.object({\n email: z\n .string()\n .nonempty(\"Email is required\")\n .email(\"Please enter a valid email address\"),\n password: z.string().min(1, { message: \"Password is required\" }),\n rememberMe: z.boolean().default(true),\n})\n\nexport type RequestPayload = z.infer<typeof requestSchema>\n\nexport const responseSchema = z.object({\n success: z.boolean(),\n error: z.string().optional(),\n userId: z.string().optional(),\n tenantId: z.string().optional(),\n})\n\nexport type ResponsePayload = z.infer<typeof responseSchema>\n"],"names":["Route","requestSchema","z","email","string","nonempty","password","min","message","rememberMe","default","success","boolean","error","optional","userId","tenantId"],"mappings":";AAGO,MAAMA,QAAQ;AAEd,MAAMC,gBAAgBC,OAAS;AAAA,EACpCC,OAAOD,OACJE,EACAC,SAAS,mBAAmB,EAC5BF,MAAM,oCAAoC;AAAA,EAC7CG,UAAUJ,OAAEE,EAASG,IAAI,GAAG;AAAA,IAAEC,SAAS;AAAA,EAAA,CAAwB;AAAA,EAC/DC,YAAYP,UAAYQ,QAAQ,IAAI;AACtC,CAAC;AAI6BR,OAAS;AAAA,EACrCS,SAAST,QAAEU;AAAAA,EACXC,OAAOX,OAAEE,EAASU,SAAAA;AAAAA,EAClBC,QAAQb,OAAEE,EAASU,SAAAA;AAAAA,EACnBE,UAAUd,OAAEE,EAASU,SAAAA;AACvB,CAAC;"}
|
|
@@ -0,0 +1,20 @@
|
|
|
1
|
+
import { o as object, b as boolean, s as string } from "./schemas-Dn3gHDGz.js";
|
|
2
|
+
const Route = "/api/rb/auth/sign-up";
|
|
3
|
+
const requestSchema = object({
|
|
4
|
+
email: string().nonempty("Email is required").email("Please enter a valid email address"),
|
|
5
|
+
password: string().min(8, {
|
|
6
|
+
message: "Password must be at least 8 characters long."
|
|
7
|
+
}),
|
|
8
|
+
rememberMe: boolean().default(true)
|
|
9
|
+
});
|
|
10
|
+
object({
|
|
11
|
+
success: boolean(),
|
|
12
|
+
error: string().optional(),
|
|
13
|
+
userId: string().optional(),
|
|
14
|
+
tenantId: string().optional()
|
|
15
|
+
});
|
|
16
|
+
export {
|
|
17
|
+
Route as R,
|
|
18
|
+
requestSchema as r
|
|
19
|
+
};
|
|
20
|
+
//# sourceMappingURL=index-C_uBu_fP.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"index-C_uBu_fP.js","sources":["../src/api/sign-up/index.ts"],"sourcesContent":["import { z } from \"zod\"\n\n\nexport const Route = \"/api/rb/auth/sign-up\"\n\nexport const requestSchema = z\n .object({\n email: z\n .string()\n .nonempty(\"Email is required\")\n .email(\"Please enter a valid email address\"),\n password: z.string().min(8, { message: \"Password must be at least 8 characters long.\" }),\n rememberMe: z.boolean().default(true),\n })\n\nexport type RequestPayload = z.infer<typeof requestSchema>\n\nexport const responseSchema = z.object({\n success: z.boolean(),\n error: z.string().optional(),\n userId: z.string().optional(),\n tenantId: z.string().optional(),\n})\n\nexport type ResponsePayload = z.infer<typeof responseSchema>\n"],"names":["Route","requestSchema","z","email","string","nonempty","password","min","message","rememberMe","default","success","boolean","error","optional","userId","tenantId"],"mappings":";AAGO,MAAMA,QAAQ;AAEd,MAAMC,gBAAgBC,OACnB;AAAA,EACNC,OAAOD,OACJE,EACAC,SAAS,mBAAmB,EAC5BF,MAAM,oCAAoC;AAAA,EAC7CG,UAAUJ,OAAEE,EAASG,IAAI,GAAG;AAAA,IAAEC,SAAS;AAAA,EAAA,CAAgD;AAAA,EACvFC,YAAYP,UAAYQ,QAAQ,IAAI;AACtC,CAAC;AAI2BR,OAAS;AAAA,EACrCS,SAAST,QAAEU;AAAAA,EACXC,OAAOX,OAAEE,EAASU,SAAAA;AAAAA,EAClBC,QAAQb,OAAEE,EAASU,SAAAA;AAAAA,EACnBE,UAAUd,OAAEE,EAASU,SAAAA;AACvB,CAAC;"}
|