@rpcbase/auth 0.119.0 → 0.121.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (59) hide show
  1. package/dist/handler-BNDemOGd.js +79 -0
  2. package/dist/handler-BNDemOGd.js.map +1 -0
  3. package/dist/handler-Bt53h0sk.js +64 -0
  4. package/dist/handler-Bt53h0sk.js.map +1 -0
  5. package/dist/handler-C4cw739Z.js +59 -0
  6. package/dist/handler-C4cw739Z.js.map +1 -0
  7. package/dist/handler-Ck7oLQ_R.js +87 -0
  8. package/dist/handler-Ck7oLQ_R.js.map +1 -0
  9. package/dist/handler-CyP6R8FM.js +24 -0
  10. package/dist/handler-CyP6R8FM.js.map +1 -0
  11. package/dist/handler-D6zJn86A.js +82 -0
  12. package/dist/handler-D6zJn86A.js.map +1 -0
  13. package/dist/handler-D7KnXlx3.js +58 -0
  14. package/dist/handler-D7KnXlx3.js.map +1 -0
  15. package/dist/handler-D8HfTbUs.js +58 -0
  16. package/dist/handler-D8HfTbUs.js.map +1 -0
  17. package/dist/handler-DfEsSB4T.js +74 -0
  18. package/dist/handler-DfEsSB4T.js.map +1 -0
  19. package/dist/index-Bxz6YdiB.js +20 -0
  20. package/dist/index-Bxz6YdiB.js.map +1 -0
  21. package/dist/index-C_uBu_fP.js +20 -0
  22. package/dist/index-C_uBu_fP.js.map +1 -0
  23. package/dist/index.js +685 -705
  24. package/dist/index.js.map +1 -1
  25. package/dist/middleware-8IfSkEEy.js +25 -0
  26. package/dist/middleware-8IfSkEEy.js.map +1 -0
  27. package/dist/oauth/index.js +746 -625
  28. package/dist/oauth/index.js.map +1 -1
  29. package/dist/routes.js +9 -18
  30. package/dist/routes.js.map +1 -1
  31. package/dist/schemas-Dn3gHDGz.js +3706 -0
  32. package/dist/schemas-Dn3gHDGz.js.map +1 -0
  33. package/package.json +1 -1
  34. package/dist/handler-BH38xcvj.js +0 -60
  35. package/dist/handler-BH38xcvj.js.map +0 -1
  36. package/dist/handler-Bjxe8iM2.js +0 -67
  37. package/dist/handler-Bjxe8iM2.js.map +0 -1
  38. package/dist/handler-CVeU9Nyf.js +0 -85
  39. package/dist/handler-CVeU9Nyf.js.map +0 -1
  40. package/dist/handler-CrTy-N1A.js +0 -51
  41. package/dist/handler-CrTy-N1A.js.map +0 -1
  42. package/dist/handler-D2-FmmDc.js +0 -56
  43. package/dist/handler-D2-FmmDc.js.map +0 -1
  44. package/dist/handler-D4-sXlBe.js +0 -74
  45. package/dist/handler-D4-sXlBe.js.map +0 -1
  46. package/dist/handler-D87G4mz9.js +0 -67
  47. package/dist/handler-D87G4mz9.js.map +0 -1
  48. package/dist/handler-DKrwSIQz.js +0 -19
  49. package/dist/handler-DKrwSIQz.js.map +0 -1
  50. package/dist/handler-tJUJWqII.js +0 -59
  51. package/dist/handler-tJUJWqII.js.map +0 -1
  52. package/dist/middleware-BbKZ_rOe.js +0 -18
  53. package/dist/middleware-BbKZ_rOe.js.map +0 -1
  54. package/dist/schemas-BKnjeqQ9.js +0 -3380
  55. package/dist/schemas-BKnjeqQ9.js.map +0 -1
  56. package/dist/sign-in-C9a-NvBu.js +0 -18
  57. package/dist/sign-in-C9a-NvBu.js.map +0 -1
  58. package/dist/sign-up-DqDJxb2D.js +0 -18
  59. package/dist/sign-up-DqDJxb2D.js.map +0 -1
@@ -0,0 +1,74 @@
1
+ import { models } from "@rpcbase/db";
2
+ import { verifyPasswordFromStorage } from "@rpcbase/server";
3
+ import { R as Route, r as requestSchema } from "./index-Bxz6YdiB.js";
4
+ const signIn = async (payload, ctx) => {
5
+ const User = await models.getGlobal("RBUser", ctx);
6
+ const parsed = requestSchema.safeParse(payload);
7
+ if (!parsed.success) {
8
+ ctx.res.status(400);
9
+ return {
10
+ success: false,
11
+ error: "invalid_payload"
12
+ };
13
+ }
14
+ const {
15
+ email,
16
+ password
17
+ } = parsed.data;
18
+ const user = await User.findOne({
19
+ email
20
+ }, {
21
+ password: 1,
22
+ tenants: 1,
23
+ tenantRoles: 1
24
+ });
25
+ if (!user?.password) {
26
+ ctx.res.status(401);
27
+ return {
28
+ success: false,
29
+ error: "invalid_credentials"
30
+ };
31
+ }
32
+ const stored = String(user.password);
33
+ const passwordMatches = await verifyPasswordFromStorage(password, stored);
34
+ if (!passwordMatches) {
35
+ if (!stored.startsWith("$scrypt$")) {
36
+ console.warn("auth::sign-in invalid stored password format", user._id.toString());
37
+ }
38
+ ctx.res.status(401);
39
+ return {
40
+ success: false,
41
+ error: "invalid_credentials"
42
+ };
43
+ }
44
+ const tenantId = user.tenants?.[0]?.toString?.() || "00000000";
45
+ const signedInTenants = (user.tenants || []).map(String);
46
+ const tenantRolesMap = user.get("tenantRoles");
47
+ const tenantRoles = tenantRolesMap ? Object.fromEntries(tenantRolesMap.entries()) : void 0;
48
+ if (!ctx.req.session) {
49
+ ctx.res.status(500);
50
+ return {
51
+ success: false,
52
+ error: "session_unavailable"
53
+ };
54
+ }
55
+ ctx.req.session.user = {
56
+ id: user._id.toString(),
57
+ currentTenantId: tenantId,
58
+ signedInTenants: signedInTenants.length ? signedInTenants : [tenantId],
59
+ isEntryGateAuthorized: true,
60
+ tenantRoles
61
+ };
62
+ return {
63
+ success: true,
64
+ userId: user._id.toString(),
65
+ tenantId
66
+ };
67
+ };
68
+ const handler = (api) => {
69
+ api.post(Route, signIn);
70
+ };
71
+ export {
72
+ handler as default
73
+ };
74
+ //# sourceMappingURL=handler-DfEsSB4T.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"handler-DfEsSB4T.js","sources":["../src/api/sign-in/handler.ts"],"sourcesContent":["import { Api, ApiHandler, Ctx } from \"@rpcbase/api\"\nimport { models } from \"@rpcbase/db\"\nimport { verifyPasswordFromStorage } from \"@rpcbase/server\"\n\nimport type { AuthSessionUser } from \"../../types\"\n\nimport * as SignIn from \"./index\"\n\n\nconst signIn: ApiHandler<SignIn.RequestPayload, SignIn.ResponsePayload, AuthSessionUser> = async(\n payload,\n ctx: Ctx<AuthSessionUser>\n): Promise<SignIn.ResponsePayload> => {\n const User = await models.getGlobal(\"RBUser\", ctx)\n\n const parsed = SignIn.requestSchema.safeParse(payload)\n\n if (!parsed.success) {\n ctx.res.status(400)\n return { success: false, error: \"invalid_payload\" }\n }\n\n const { email, password } = parsed.data\n\n const user = await User.findOne({ email }, { password: 1, tenants: 1, tenantRoles: 1 })\n\n if (!user?.password) {\n ctx.res.status(401)\n return { success: false, error: \"invalid_credentials\" }\n }\n\n const stored = String(user.password)\n const passwordMatches = await verifyPasswordFromStorage(password, stored)\n\n if (!passwordMatches) {\n if (!stored.startsWith(\"$scrypt$\")) {\n console.warn(\"auth::sign-in invalid stored password format\", user._id.toString())\n }\n ctx.res.status(401)\n return { success: false, error: \"invalid_credentials\" }\n }\n\n const tenantId = user.tenants?.[0]?.toString?.() || \"00000000\"\n const signedInTenants = (user.tenants || []).map(String)\n const tenantRolesMap = user.get(\"tenantRoles\") as Map<string, string[]> | undefined\n const tenantRoles = tenantRolesMap ? Object.fromEntries(tenantRolesMap.entries()) : undefined\n\n if (!ctx.req.session) {\n ctx.res.status(500)\n return { success: false, error: \"session_unavailable\" }\n }\n\n ctx.req.session.user = {\n id: user._id.toString(),\n currentTenantId: tenantId,\n signedInTenants: signedInTenants.length ? signedInTenants : [tenantId],\n isEntryGateAuthorized: true,\n tenantRoles,\n }\n\n return { success: true, userId: user._id.toString(), tenantId }\n}\n\nexport default (api: Api<AuthSessionUser>) => {\n api.post(SignIn.Route, signIn)\n}\n"],"names":["signIn","payload","ctx","User","models","getGlobal","parsed","SignIn","safeParse","success","res","status","error","email","password","data","user","findOne","tenants","tenantRoles","stored","String","passwordMatches","verifyPasswordFromStorage","startsWith","console","warn","_id","toString","tenantId","signedInTenants","map","tenantRolesMap","get","Object","fromEntries","entries","undefined","req","session","id","currentTenantId","length","isEntryGateAuthorized","userId","api","post"],"mappings":";;;AASA,MAAMA,SAAqF,OACzFC,SACAC,QACoC;AACpC,QAAMC,OAAO,MAAMC,OAAOC,UAAU,UAAUH,GAAG;AAEjD,QAAMI,SAASC,cAAqBC,UAAUP,OAAO;AAErD,MAAI,CAACK,OAAOG,SAAS;AACnBP,QAAIQ,IAAIC,OAAO,GAAG;AAClB,WAAO;AAAA,MAAEF,SAAS;AAAA,MAAOG,OAAO;AAAA,IAAA;AAAA,EAClC;AAEA,QAAM;AAAA,IAAEC;AAAAA,IAAOC;AAAAA,EAAAA,IAAaR,OAAOS;AAEnC,QAAMC,OAAO,MAAMb,KAAKc,QAAQ;AAAA,IAAEJ;AAAAA,EAAAA,GAAS;AAAA,IAAEC,UAAU;AAAA,IAAGI,SAAS;AAAA,IAAGC,aAAa;AAAA,EAAA,CAAG;AAEtF,MAAI,CAACH,MAAMF,UAAU;AACnBZ,QAAIQ,IAAIC,OAAO,GAAG;AAClB,WAAO;AAAA,MAAEF,SAAS;AAAA,MAAOG,OAAO;AAAA,IAAA;AAAA,EAClC;AAEA,QAAMQ,SAASC,OAAOL,KAAKF,QAAQ;AACnC,QAAMQ,kBAAkB,MAAMC,0BAA0BT,UAAUM,MAAM;AAExE,MAAI,CAACE,iBAAiB;AACpB,QAAI,CAACF,OAAOI,WAAW,UAAU,GAAG;AAClCC,cAAQC,KAAK,gDAAgDV,KAAKW,IAAIC,UAAU;AAAA,IAClF;AACA1B,QAAIQ,IAAIC,OAAO,GAAG;AAClB,WAAO;AAAA,MAAEF,SAAS;AAAA,MAAOG,OAAO;AAAA,IAAA;AAAA,EAClC;AAEA,QAAMiB,WAAWb,KAAKE,UAAU,CAAC,GAAGU,gBAAgB;AACpD,QAAME,mBAAmBd,KAAKE,WAAW,CAAA,GAAIa,IAAIV,MAAM;AACvD,QAAMW,iBAAiBhB,KAAKiB,IAAI,aAAa;AAC7C,QAAMd,cAAca,iBAAiBE,OAAOC,YAAYH,eAAeI,QAAAA,CAAS,IAAIC;AAEpF,MAAI,CAACnC,IAAIoC,IAAIC,SAAS;AACpBrC,QAAIQ,IAAIC,OAAO,GAAG;AAClB,WAAO;AAAA,MAAEF,SAAS;AAAA,MAAOG,OAAO;AAAA,IAAA;AAAA,EAClC;AAEAV,MAAIoC,IAAIC,QAAQvB,OAAO;AAAA,IACrBwB,IAAIxB,KAAKW,IAAIC,SAAAA;AAAAA,IACba,iBAAiBZ;AAAAA,IACjBC,iBAAiBA,gBAAgBY,SAASZ,kBAAkB,CAACD,QAAQ;AAAA,IACrEc,uBAAuB;AAAA,IACvBxB;AAAAA,EAAAA;AAGF,SAAO;AAAA,IAAEV,SAAS;AAAA,IAAMmC,QAAQ5B,KAAKW,IAAIC,SAAAA;AAAAA,IAAYC;AAAAA,EAAAA;AACvD;AAEA,MAAA,UAAe,CAACgB,QAA8B;AAC5CA,MAAIC,KAAKvC,OAAcP,MAAM;AAC/B;"}
@@ -0,0 +1,20 @@
1
+ import { o as object, b as boolean, s as string } from "./schemas-Dn3gHDGz.js";
2
+ const Route = "/api/rb/auth/sign-in";
3
+ const requestSchema = object({
4
+ email: string().nonempty("Email is required").email("Please enter a valid email address"),
5
+ password: string().min(1, {
6
+ message: "Password is required"
7
+ }),
8
+ rememberMe: boolean().default(true)
9
+ });
10
+ object({
11
+ success: boolean(),
12
+ error: string().optional(),
13
+ userId: string().optional(),
14
+ tenantId: string().optional()
15
+ });
16
+ export {
17
+ Route as R,
18
+ requestSchema as r
19
+ };
20
+ //# sourceMappingURL=index-Bxz6YdiB.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"index-Bxz6YdiB.js","sources":["../src/api/sign-in/index.ts"],"sourcesContent":["import { z } from \"zod\"\n\n\nexport const Route = \"/api/rb/auth/sign-in\"\n\nexport const requestSchema = z.object({\n email: z\n .string()\n .nonempty(\"Email is required\")\n .email(\"Please enter a valid email address\"),\n password: z.string().min(1, { message: \"Password is required\" }),\n rememberMe: z.boolean().default(true),\n})\n\nexport type RequestPayload = z.infer<typeof requestSchema>\n\nexport const responseSchema = z.object({\n success: z.boolean(),\n error: z.string().optional(),\n userId: z.string().optional(),\n tenantId: z.string().optional(),\n})\n\nexport type ResponsePayload = z.infer<typeof responseSchema>\n"],"names":["Route","requestSchema","z","email","string","nonempty","password","min","message","rememberMe","default","success","boolean","error","optional","userId","tenantId"],"mappings":";AAGO,MAAMA,QAAQ;AAEd,MAAMC,gBAAgBC,OAAS;AAAA,EACpCC,OAAOD,OACJE,EACAC,SAAS,mBAAmB,EAC5BF,MAAM,oCAAoC;AAAA,EAC7CG,UAAUJ,OAAEE,EAASG,IAAI,GAAG;AAAA,IAAEC,SAAS;AAAA,EAAA,CAAwB;AAAA,EAC/DC,YAAYP,UAAYQ,QAAQ,IAAI;AACtC,CAAC;AAI6BR,OAAS;AAAA,EACrCS,SAAST,QAAEU;AAAAA,EACXC,OAAOX,OAAEE,EAASU,SAAAA;AAAAA,EAClBC,QAAQb,OAAEE,EAASU,SAAAA;AAAAA,EACnBE,UAAUd,OAAEE,EAASU,SAAAA;AACvB,CAAC;"}
@@ -0,0 +1,20 @@
1
+ import { o as object, b as boolean, s as string } from "./schemas-Dn3gHDGz.js";
2
+ const Route = "/api/rb/auth/sign-up";
3
+ const requestSchema = object({
4
+ email: string().nonempty("Email is required").email("Please enter a valid email address"),
5
+ password: string().min(8, {
6
+ message: "Password must be at least 8 characters long."
7
+ }),
8
+ rememberMe: boolean().default(true)
9
+ });
10
+ object({
11
+ success: boolean(),
12
+ error: string().optional(),
13
+ userId: string().optional(),
14
+ tenantId: string().optional()
15
+ });
16
+ export {
17
+ Route as R,
18
+ requestSchema as r
19
+ };
20
+ //# sourceMappingURL=index-C_uBu_fP.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"index-C_uBu_fP.js","sources":["../src/api/sign-up/index.ts"],"sourcesContent":["import { z } from \"zod\"\n\n\nexport const Route = \"/api/rb/auth/sign-up\"\n\nexport const requestSchema = z\n .object({\n email: z\n .string()\n .nonempty(\"Email is required\")\n .email(\"Please enter a valid email address\"),\n password: z.string().min(8, { message: \"Password must be at least 8 characters long.\" }),\n rememberMe: z.boolean().default(true),\n })\n\nexport type RequestPayload = z.infer<typeof requestSchema>\n\nexport const responseSchema = z.object({\n success: z.boolean(),\n error: z.string().optional(),\n userId: z.string().optional(),\n tenantId: z.string().optional(),\n})\n\nexport type ResponsePayload = z.infer<typeof responseSchema>\n"],"names":["Route","requestSchema","z","email","string","nonempty","password","min","message","rememberMe","default","success","boolean","error","optional","userId","tenantId"],"mappings":";AAGO,MAAMA,QAAQ;AAEd,MAAMC,gBAAgBC,OACnB;AAAA,EACNC,OAAOD,OACJE,EACAC,SAAS,mBAAmB,EAC5BF,MAAM,oCAAoC;AAAA,EAC7CG,UAAUJ,OAAEE,EAASG,IAAI,GAAG;AAAA,IAAEC,SAAS;AAAA,EAAA,CAAgD;AAAA,EACvFC,YAAYP,UAAYQ,QAAQ,IAAI;AACtC,CAAC;AAI2BR,OAAS;AAAA,EACrCS,SAAST,QAAEU;AAAAA,EACXC,OAAOX,OAAEE,EAASU,SAAAA;AAAAA,EAClBC,QAAQb,OAAEE,EAASU,SAAAA;AAAAA,EACnBE,UAAUd,OAAEE,EAASU,SAAAA;AACvB,CAAC;"}