@social-mail/social-mail-web-server 1.8.403 → 1.8.405
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/WebServer.d.ts +1 -0
- package/dist/WebServer.d.ts.map +1 -1
- package/dist/WebServer.js +3 -2
- package/dist/WebServer.js.map +1 -1
- package/dist/common/BaseDiskCache.d.ts +1 -0
- package/dist/common/BaseDiskCache.d.ts.map +1 -1
- package/dist/common/BaseDiskCache.js +4 -0
- package/dist/common/BaseDiskCache.js.map +1 -1
- package/dist/server/model/ReadOnlySocialMailContext.d.ts +1 -0
- package/dist/server/model/ReadOnlySocialMailContext.d.ts.map +1 -1
- package/dist/server/model/ReadOnlySocialMailContext.js +15 -12
- package/dist/server/model/ReadOnlySocialMailContext.js.map +1 -1
- package/dist/server/model/events/AppFileAccessEvents.d.ts +1 -1
- package/dist/server/model/events/AppFileAccessEvents.d.ts.map +1 -1
- package/dist/server/model/events/AppFileAccessEvents.js +6 -6
- package/dist/server/model/events/AppFileAccessEvents.js.map +1 -1
- package/dist/server/model/events/LoginSessionEvents.d.ts.map +1 -1
- package/dist/server/model/events/LoginSessionEvents.js +5 -11
- package/dist/server/model/events/LoginSessionEvents.js.map +1 -1
- package/dist/server/model/events/VerificationTokenEvents.d.ts.map +1 -1
- package/dist/server/model/events/VerificationTokenEvents.js +1 -3
- package/dist/server/model/events/VerificationTokenEvents.js.map +1 -1
- package/dist/server/services/AppKeyProvider.d.ts +2 -2
- package/dist/server/services/AppKeyProvider.d.ts.map +1 -1
- package/dist/server/services/AppKeyProvider.js +9 -7
- package/dist/server/services/AppKeyProvider.js.map +1 -1
- package/dist/server/services/CryptoService.d.ts +4 -2
- package/dist/server/services/CryptoService.d.ts.map +1 -1
- package/dist/server/services/CryptoService.js.map +1 -1
- package/dist/server/services/UserAuthorizationService.d.ts +25 -0
- package/dist/server/services/UserAuthorizationService.d.ts.map +1 -0
- package/dist/server/services/{UserInfoProvider.js → UserAuthorizationService.js} +79 -14
- package/dist/server/services/UserAuthorizationService.js.map +1 -0
- package/dist/server/services/encryption/TokenService.d.ts +6 -0
- package/dist/server/services/encryption/TokenService.d.ts.map +1 -0
- package/dist/server/services/encryption/TokenService.js +26 -0
- package/dist/server/services/encryption/TokenService.js.map +1 -0
- package/dist/server/services/message-events/MessagingService.d.ts +3 -0
- package/dist/server/services/message-events/MessagingService.d.ts.map +1 -1
- package/dist/server/services/message-events/MessagingService.js +1 -0
- package/dist/server/services/message-events/MessagingService.js.map +1 -1
- package/dist/tsconfig.tsbuildinfo +1 -1
- package/dist/wwwroot/routes/callback/smtp/data/index.d.ts +1 -1
- package/dist/wwwroot/routes/callback/smtp/data/index.d.ts.map +1 -1
- package/dist/wwwroot/routes/callback/smtp/data/index.js +5 -5
- package/dist/wwwroot/routes/callback/smtp/data/index.js.map +1 -1
- package/dist/wwwroot/routes/callback/smtp/rcpt/index.d.ts +1 -1
- package/dist/wwwroot/routes/callback/smtp/rcpt/index.d.ts.map +1 -1
- package/dist/wwwroot/routes/callback/smtp/rcpt/index.js +5 -5
- package/dist/wwwroot/routes/callback/smtp/rcpt/index.js.map +1 -1
- package/dist/wwwroot/routes/social-mail/site/signup/post.d.ts.map +1 -1
- package/dist/wwwroot/routes/social-mail/site/signup/post.js +1 -3
- package/dist/wwwroot/routes/social-mail/site/signup/post.js.map +1 -1
- package/dist/wwwroot/routes/social-mail/user/signup/post.d.ts.map +1 -1
- package/dist/wwwroot/routes/social-mail/user/signup/post.js +1 -3
- package/dist/wwwroot/routes/social-mail/user/signup/post.js.map +1 -1
- package/package.json +5 -5
- package/src/WebServer.ts +4 -2
- package/src/common/BaseDiskCache.ts +5 -0
- package/src/server/model/ReadOnlySocialMailContext.ts +15 -15
- package/src/server/model/events/AppFileAccessEvents.ts +4 -4
- package/src/server/model/events/LoginSessionEvents.ts +5 -11
- package/src/server/model/events/VerificationTokenEvents.ts +1 -3
- package/src/server/services/AppKeyProvider.ts +9 -7
- package/src/server/services/CryptoService.ts +1 -2
- package/src/server/services/UserAuthorizationService.ts +111 -0
- package/src/server/services/encryption/TokenService.ts +17 -0
- package/src/server/services/message-events/MessagingService.ts +3 -0
- package/src/wwwroot/routes/callback/smtp/data/index.ts +4 -3
- package/src/wwwroot/routes/callback/smtp/rcpt/index.ts +3 -4
- package/src/wwwroot/routes/social-mail/site/signup/post.tsx +1 -3
- package/src/wwwroot/routes/social-mail/user/signup/post.tsx +1 -3
- package/dist/server/services/UserInfoProvider.d.ts +0 -17
- package/dist/server/services/UserInfoProvider.d.ts.map +0 -1
- package/dist/server/services/UserInfoProvider.js.map +0 -1
- package/src/server/services/UserInfoProvider.ts +0 -46
|
@@ -0,0 +1,25 @@
|
|
|
1
|
+
import AuthorizationService, { ICookie } from "@entity-access/server-pages/dist/services/AuthorizationService.js";
|
|
2
|
+
import { SessionUser } from "@entity-access/server-pages/dist/core/SessionUser.js";
|
|
3
|
+
import BaseDiskCache from "../../common/BaseDiskCache.js";
|
|
4
|
+
import { IAuthorizationCookie } from "@entity-access/server-pages/dist/services/IAuthorizationCookie.js";
|
|
5
|
+
import MessagingService from "./message-events/MessagingService.js";
|
|
6
|
+
export default class UserAuthorizationService extends AuthorizationService {
|
|
7
|
+
diskCache: BaseDiskCache;
|
|
8
|
+
ms: MessagingService;
|
|
9
|
+
constructor();
|
|
10
|
+
loadUserSessionFromCookie(cookie: string, user: SessionUser): Promise<void>;
|
|
11
|
+
setAuthCookie(user: SessionUser, authCookie: IAuthorizationCookie): Promise<ICookie>;
|
|
12
|
+
loadSessionFromDb(sessionID: any): Promise<{
|
|
13
|
+
sessionID: any;
|
|
14
|
+
userID: number;
|
|
15
|
+
expiry: Date;
|
|
16
|
+
roles: string[];
|
|
17
|
+
fileAccessList: {
|
|
18
|
+
type: "create" | "read" | "write" | "delegate";
|
|
19
|
+
path: string;
|
|
20
|
+
}[];
|
|
21
|
+
invalid: boolean;
|
|
22
|
+
}>;
|
|
23
|
+
private clearLogin;
|
|
24
|
+
}
|
|
25
|
+
//# sourceMappingURL=UserAuthorizationService.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"UserAuthorizationService.d.ts","sourceRoot":"","sources":["../../../src/server/services/UserAuthorizationService.ts"],"names":[],"mappings":"AACA,OAAO,oBAAoB,EAAE,EAAE,OAAO,EAAE,MAAM,mEAAmE,CAAC;AAGlH,OAAO,EAAE,WAAW,EAAE,MAAM,sDAAsD,CAAC;AAEnF,OAAO,aAAa,MAAM,+BAA+B,CAAC;AAG1D,OAAO,EAAE,oBAAoB,EAAE,MAAM,mEAAmE,CAAC;AACzG,OAAO,gBAAgB,MAAM,sCAAsC,CAAC;AAGpE,MAAM,CAAC,OAAO,OAAO,wBAAyB,SAAQ,oBAAoB;IAEtE,SAAS,gBAIN;IAGH,EAAE,EAAE,gBAAgB,CAAC;;IASf,yBAAyB,CAAC,MAAM,EAAE,MAAM,EAAE,IAAI,EAAE,WAAW;IAgB3D,aAAa,CAAC,IAAI,EAAE,WAAW,EAAE,UAAU,EAAE,oBAAoB,GAAG,OAAO,CAAC,OAAO,CAAC;IAWpF,iBAAiB,CAAC,SAAS,EAAE,GAAG;;;;;;;;;;;YAmCxB,UAAU;CAiB3B"}
|
|
@@ -4,6 +4,9 @@ var __decorate = (this && this.__decorate) || function (decorators, target, key,
|
|
|
4
4
|
else for (var i = decorators.length - 1; i >= 0; i--) if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;
|
|
5
5
|
return c > 3 && r && Object.defineProperty(target, key, r), r;
|
|
6
6
|
};
|
|
7
|
+
var __metadata = (this && this.__metadata) || function (k, v) {
|
|
8
|
+
if (typeof Reflect === "object" && typeof Reflect.metadata === "function") return Reflect.metadata(k, v);
|
|
9
|
+
};
|
|
7
10
|
var __addDisposableResource = (this && this.__addDisposableResource) || function (env, value, async) {
|
|
8
11
|
if (value !== null && value !== void 0) {
|
|
9
12
|
if (typeof value !== "object" && typeof value !== "function") throw new TypeError("Object expected.");
|
|
@@ -56,19 +59,60 @@ var __disposeResources = (this && this.__disposeResources) || (function (Suppres
|
|
|
56
59
|
var e = new Error(message);
|
|
57
60
|
return e.name = "SuppressedError", e.error = error, e.suppressed = suppressed, e;
|
|
58
61
|
});
|
|
59
|
-
import { RegisterSingleton, ServiceProvider } from "@entity-access/entity-access/dist/di/di.js";
|
|
60
|
-
import
|
|
62
|
+
import Inject, { RegisterSingleton, ServiceProvider } from "@entity-access/entity-access/dist/di/di.js";
|
|
63
|
+
import AuthorizationService from "@entity-access/server-pages/dist/services/AuthorizationService.js";
|
|
61
64
|
import SocialMailContext from "../model/SocialMailContext.js";
|
|
62
65
|
import Sql from "@entity-access/entity-access/dist/sql/Sql.js";
|
|
63
|
-
|
|
64
|
-
|
|
66
|
+
import EntityAccessError from "@entity-access/entity-access/dist/common/EntityAccessError.js";
|
|
67
|
+
import BaseDiskCache from "../../common/BaseDiskCache.js";
|
|
68
|
+
import { join } from "path";
|
|
69
|
+
import { globalEnv } from "../../common/globalEnv.js";
|
|
70
|
+
import MessagingService from "./message-events/MessagingService.js";
|
|
71
|
+
let UserAuthorizationService = class UserAuthorizationService extends AuthorizationService {
|
|
72
|
+
constructor() {
|
|
73
|
+
super();
|
|
74
|
+
this.diskCache = new BaseDiskCache({
|
|
75
|
+
root: join(globalEnv.cacheDir, globalEnv.serverID, "user-sessions"),
|
|
76
|
+
keepTTLSeconds: 60 * 60 * 1000,
|
|
77
|
+
maxAge: 24 * 60 * 60 * 1000
|
|
78
|
+
});
|
|
79
|
+
process.nextTick(() => {
|
|
80
|
+
this.ms.removeUserLoginSessions.on(({ userID }) => this.clearLogin(userID));
|
|
81
|
+
});
|
|
82
|
+
}
|
|
83
|
+
async loadUserSessionFromCookie(cookie, user) {
|
|
84
|
+
const keyPath = cookie.replaceAll(":", "-");
|
|
85
|
+
const info = await this.diskCache.getOrCreateJsonAsync(keyPath, async () => {
|
|
86
|
+
const sessionID = await this.decode(cookie);
|
|
87
|
+
return await this.loadSessionFromDb(sessionID);
|
|
88
|
+
});
|
|
89
|
+
user.sessionID = info.sessionID;
|
|
90
|
+
user.userID = info.userID;
|
|
91
|
+
user.roles = info.roles;
|
|
92
|
+
user.expiry = info.expiry;
|
|
93
|
+
user.keyPath = keyPath;
|
|
94
|
+
user.fileAccessList = info.fileAccessList;
|
|
95
|
+
user.isAuthorized = true;
|
|
96
|
+
await this.diskCache.getOrCreateJsonAsync(user.userID.toString(36), () => Promise.resolve(keyPath));
|
|
97
|
+
}
|
|
98
|
+
async setAuthCookie(user, authCookie) {
|
|
99
|
+
if (authCookie === null) {
|
|
100
|
+
// delete key path...
|
|
101
|
+
if (user.keyPath) {
|
|
102
|
+
await this.diskCache.deleteAt(user.keyPath);
|
|
103
|
+
await this.diskCache.deleteAt(user.userID.toString(36));
|
|
104
|
+
}
|
|
105
|
+
}
|
|
106
|
+
return super.setAuthCookie(user, authCookie);
|
|
107
|
+
}
|
|
108
|
+
async loadSessionFromDb(sessionID) {
|
|
65
109
|
const env_1 = { stack: [], error: void 0, hasError: false };
|
|
66
110
|
try {
|
|
67
111
|
/** The new scope will not interfere with existing DbContext for current request */
|
|
68
112
|
const scope = __addDisposableResource(env_1, ServiceProvider.createScope(this), false);
|
|
69
113
|
const db = scope.resolve(SocialMailContext);
|
|
70
|
-
const session = await db.loginSessions.where({
|
|
71
|
-
&& x.
|
|
114
|
+
const session = await db.loginSessions.where({ sessionID }, (p) => (x) => x.sessionID === p.sessionID
|
|
115
|
+
&& x.invalid === false)
|
|
72
116
|
.include((x) => [
|
|
73
117
|
x.user.roles,
|
|
74
118
|
x.user.fileAccessList.forEach((f) => f.file),
|
|
@@ -76,7 +120,7 @@ let UserSessionProvider = class UserSessionProvider extends USP {
|
|
|
76
120
|
])
|
|
77
121
|
.first();
|
|
78
122
|
if (!session?.user) {
|
|
79
|
-
|
|
123
|
+
throw new EntityAccessError(`Session not found`);
|
|
80
124
|
}
|
|
81
125
|
// extend session...
|
|
82
126
|
await db.loginSessions.where({ sessionID }, (p) => (x) => x.sessionID === p.sessionID)
|
|
@@ -84,9 +128,8 @@ let UserSessionProvider = class UserSessionProvider extends USP {
|
|
|
84
128
|
expiry: Sql.date.addDays(x.expiry, 7)
|
|
85
129
|
}));
|
|
86
130
|
return {
|
|
87
|
-
userID,
|
|
88
131
|
sessionID,
|
|
89
|
-
|
|
132
|
+
userID: session.userID,
|
|
90
133
|
expiry: session.expiry.asJSDate,
|
|
91
134
|
roles: session.user.roles?.map((x) => x.roleName) ?? [],
|
|
92
135
|
fileAccessList: session.user.fileAccessList?.map(({ type, file: { path } }) => ({ type, path })),
|
|
@@ -101,9 +144,31 @@ let UserSessionProvider = class UserSessionProvider extends USP {
|
|
|
101
144
|
__disposeResources(env_1);
|
|
102
145
|
}
|
|
103
146
|
}
|
|
147
|
+
async clearLogin(userID) {
|
|
148
|
+
try {
|
|
149
|
+
const userKey = userID.toString(36);
|
|
150
|
+
const keyPath = await this.diskCache.getOrCreateJsonAsync(userKey, () => Promise.reject(new Error("not found")));
|
|
151
|
+
if (keyPath) {
|
|
152
|
+
await this.diskCache.deleteAt(keyPath);
|
|
153
|
+
}
|
|
154
|
+
await this.diskCache.deleteAt(userKey);
|
|
155
|
+
}
|
|
156
|
+
catch (error) {
|
|
157
|
+
// ignore this error...
|
|
158
|
+
if (error?.message === "not found") {
|
|
159
|
+
return;
|
|
160
|
+
}
|
|
161
|
+
console.error(error);
|
|
162
|
+
}
|
|
163
|
+
}
|
|
104
164
|
};
|
|
105
|
-
|
|
106
|
-
|
|
107
|
-
|
|
108
|
-
|
|
109
|
-
|
|
165
|
+
__decorate([
|
|
166
|
+
Inject,
|
|
167
|
+
__metadata("design:type", MessagingService)
|
|
168
|
+
], UserAuthorizationService.prototype, "ms", void 0);
|
|
169
|
+
UserAuthorizationService = __decorate([
|
|
170
|
+
RegisterSingleton,
|
|
171
|
+
__metadata("design:paramtypes", [])
|
|
172
|
+
], UserAuthorizationService);
|
|
173
|
+
export default UserAuthorizationService;
|
|
174
|
+
//# sourceMappingURL=UserAuthorizationService.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"UserAuthorizationService.js","sourceRoot":"","sources":["../../../src/server/services/UserAuthorizationService.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA,OAAO,MAAM,EAAE,EAAE,iBAAiB,EAAE,eAAe,EAAE,MAAM,4CAA4C,CAAC;AACxG,OAAO,oBAAiC,MAAM,mEAAmE,CAAC;AAClH,OAAO,iBAAiB,MAAM,+BAA+B,CAAC;AAC9D,OAAO,GAAG,MAAM,8CAA8C,CAAC;AAE/D,OAAO,iBAAiB,MAAM,+DAA+D,CAAC;AAC9F,OAAO,aAAa,MAAM,+BAA+B,CAAC;AAC1D,OAAO,EAAE,IAAI,EAAE,MAAM,MAAM,CAAC;AAC5B,OAAO,EAAE,SAAS,EAAE,MAAM,2BAA2B,CAAC;AAEtD,OAAO,gBAAgB,MAAM,sCAAsC,CAAC;AAGrD,IAAM,wBAAwB,GAA9B,MAAM,wBAAyB,SAAQ,oBAAoB;IAWtE;QACI,KAAK,EAAE,CAAC;QAVZ,cAAS,GAAG,IAAI,aAAa,CAAC;YAC1B,IAAI,EAAE,IAAI,CAAC,SAAS,CAAC,QAAQ,EAAE,SAAS,CAAC,QAAQ,EAAE,eAAe,CAAC;YACnE,cAAc,EAAE,EAAE,GAAC,EAAE,GAAC,IAAI;YAC1B,MAAM,EAAE,EAAE,GAAC,EAAE,GAAC,EAAE,GAAC,IAAI;SACxB,CAAC,CAAC;QAOC,OAAO,CAAC,QAAQ,CAAC,GAAG,EAAE;YAClB,IAAI,CAAC,EAAE,CAAC,uBAAuB,CAAC,EAAE,CAAC,CAAC,EAAE,MAAM,EAAE,EAAE,EAAE,CAAC,IAAI,CAAC,UAAU,CAAC,MAAM,CAAC,CAAC,CAAC;QAChF,CAAC,CAAC,CAAC;IACP,CAAC;IAED,KAAK,CAAC,yBAAyB,CAAC,MAAc,EAAE,IAAiB;QAC7D,MAAM,OAAO,GAAG,MAAM,CAAC,UAAU,CAAC,GAAG,EAAE,GAAG,CAAC,CAAC;QAC5C,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,SAAS,CAAC,oBAAoB,CAAC,OAAO,EAAE,KAAK,IAAI,EAAE;YACvE,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC;YAC5C,OAAO,MAAM,IAAI,CAAC,iBAAiB,CAAC,SAAS,CAAC,CAAC;QACnD,CAAC,CAAC,CAAC;QACH,IAAI,CAAC,SAAS,GAAG,IAAI,CAAC,SAAS,CAAC;QAChC,IAAI,CAAC,MAAM,GAAG,IAAI,CAAC,MAAM,CAAC;QAC1B,IAAI,CAAC,KAAK,GAAG,IAAI,CAAC,KAAK,CAAC;QACxB,IAAI,CAAC,MAAM,GAAG,IAAI,CAAC,MAAM,CAAC;QAC1B,IAAI,CAAC,OAAO,GAAG,OAAO,CAAC;QACvB,IAAI,CAAC,cAAc,GAAG,IAAI,CAAC,cAAc,CAAC;QACzC,IAAY,CAAC,YAAY,GAAG,IAAI,CAAC;QAClC,MAAM,IAAI,CAAC,SAAS,CAAC,oBAAoB,CAAS,IAAI,CAAC,MAAM,CAAC,QAAQ,CAAC,EAAE,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,OAAO,CAAC,OAAO,CAAC,CAAC,CAAC;IAChH,CAAC;IAED,KAAK,CAAC,aAAa,CAAC,IAAiB,EAAE,UAAgC;QACnE,IAAI,UAAU,KAAK,IAAI,EAAE,CAAC;YACtB,qBAAqB;YACrB,IAAI,IAAI,CAAC,OAAO,EAAE,CAAC;gBACf,MAAM,IAAI,CAAC,SAAS,CAAC,QAAQ,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC;gBAC5C,MAAM,IAAI,CAAC,SAAS,CAAC,QAAQ,CAAC,IAAI,CAAC,MAAM,CAAC,QAAQ,CAAC,EAAE,CAAC,CAAC,CAAC;YAC5D,CAAC;QACL,CAAC;QACD,OAAO,KAAK,CAAC,aAAa,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;IACjD,CAAC;IAED,KAAK,CAAC,iBAAiB,CAAC,SAAc;;;YAElC,mFAAmF;YAEnF,MAAM,KAAK,kCAAG,eAAe,CAAC,WAAW,CAAC,IAAI,CAAC,QAAA,CAAC;YAChD,MAAM,EAAE,GAAG,KAAK,CAAC,OAAO,CAAC,iBAAiB,CAAC,CAAC;YAE5C,MAAM,OAAO,GAAG,MAAM,EAAE,CAAC,aAAa,CAAC,KAAK,CAAC,EAAE,SAAS,EAAE,EAAE,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,SAAS,KAAK,CAAC,CAAC,SAAS;mBAC9F,CAAC,CAAC,OAAO,KAAK,KAAK,CAAC;iBACtB,OAAO,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC;gBACZ,CAAC,CAAC,IAAI,CAAC,KAAK;gBACZ,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,OAAO,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,IAAI,CAAC;gBAC5C,gFAAgF;aACnF,CAAC;iBACD,KAAK,EAAE,CAAC;YACb,IAAI,CAAC,OAAO,EAAE,IAAI,EAAE,CAAC;gBACjB,MAAM,IAAI,iBAAiB,CAAC,mBAAmB,CAAC,CAAC;YACrD,CAAC;YAED,oBAAoB;YACpB,MAAM,EAAE,CAAC,aAAa,CAAC,KAAK,CAAC,EAAE,SAAS,EAAE,EAAE,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,EAAC,EAAE,CAAC,CAAC,CAAC,SAAS,KAAK,CAAC,CAAC,SAAS,CAAC;iBAChF,MAAM,CAAC,KAAK,CAAC,EAAE,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC;gBAC3B,MAAM,EAAE,GAAG,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,CAAC;aACxC,CAAC,CAAC,CAAC;YAER,OAAO;gBACH,SAAS;gBACT,MAAM,EAAE,OAAO,CAAC,MAAM;gBACtB,MAAM,EAAE,OAAO,CAAC,MAAM,CAAC,QAAQ;gBAC/B,KAAK,EAAE,OAAO,CAAC,IAAI,CAAC,KAAK,EAAE,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,QAAQ,CAAC,IAAI,EAAE;gBACvD,cAAc,EAAE,OAAO,CAAC,IAAI,CAAC,cAAc,EAAE,GAAG,CAAC,CAAC,EAAE,IAAI,EAAE,IAAI,EAAE,EAAE,IAAI,EAAE,EAAC,EAAE,EAAE,CAAC,CAAC,EAAE,IAAI,EAAE,IAAI,EAAE,CAAC,CAAC;gBAC/F,OAAO,EAAE,KAAK;aACjB,CAAC;;;;;;;;;KACL;IAEO,KAAK,CAAC,UAAU,CAAC,MAAM;QAC3B,IAAI,CAAC;YACD,MAAM,OAAO,GAAG,MAAM,CAAC,QAAQ,CAAC,EAAE,CAAC,CAAC;YACpC,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,SAAS,CAAC,oBAAoB,CAAS,OAAO,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,MAAM,CAAC,IAAI,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,CAAC;YACzH,IAAI,OAAO,EAAE,CAAC;gBACV,MAAM,IAAI,CAAC,SAAS,CAAC,QAAQ,CAAC,OAAO,CAAC,CAAC;YAC3C,CAAC;YACD,MAAM,IAAI,CAAC,SAAS,CAAC,QAAQ,CAAC,OAAO,CAAC,CAAC;QAC3C,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACb,uBAAuB;YACvB,IAAI,KAAK,EAAE,OAAO,KAAK,WAAW,EAAE,CAAC;gBACjC,OAAO;YACX,CAAC;YACD,OAAO,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC;QACzB,CAAC;IACL,CAAC;CAEJ,CAAA;AAxFG;IADC,MAAM;8BACH,gBAAgB;oDAAC;AATJ,wBAAwB;IAD5C,iBAAiB;;GACG,wBAAwB,CAiG5C;eAjGoB,wBAAwB"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"TokenService.d.ts","sourceRoot":"","sources":["../../../../src/server/services/encryption/TokenService.ts"],"names":[],"mappings":"AAIA,MAAM,CAAC,OAAO,OAAO,YAAY;IAC7B,MAAM,CAAC,OAAO,EAAE,MAAM,GAAG,MAAM,EAAE,SAAS,EAAE,MAAM,EAAE,GAAG,EAAE;QAAE,SAAS,EAAE,MAAM,CAAA;KAAC,EAAE,IAAI,UAAO;CAW7F"}
|
|
@@ -0,0 +1,26 @@
|
|
|
1
|
+
var __decorate = (this && this.__decorate) || function (decorators, target, key, desc) {
|
|
2
|
+
var c = arguments.length, r = c < 3 ? target : desc === null ? desc = Object.getOwnPropertyDescriptor(target, key) : desc, d;
|
|
3
|
+
if (typeof Reflect === "object" && typeof Reflect.decorate === "function") r = Reflect.decorate(decorators, target, key, desc);
|
|
4
|
+
else for (var i = decorators.length - 1; i >= 0; i--) if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;
|
|
5
|
+
return c > 3 && r && Object.defineProperty(target, key, r), r;
|
|
6
|
+
};
|
|
7
|
+
import { RegisterSingleton } from "@entity-access/entity-access/dist/di/di.js";
|
|
8
|
+
import { createVerify } from "node:crypto";
|
|
9
|
+
let TokenService = class TokenService {
|
|
10
|
+
verify(content, signature, key, fail = true) {
|
|
11
|
+
const verify = createVerify("SHA256");
|
|
12
|
+
verify.write(content);
|
|
13
|
+
verify.end();
|
|
14
|
+
if (verify.verify(key.publicKey, signature, "hex")) {
|
|
15
|
+
return true;
|
|
16
|
+
}
|
|
17
|
+
if (fail) {
|
|
18
|
+
throw new Error("Invalid signature");
|
|
19
|
+
}
|
|
20
|
+
}
|
|
21
|
+
};
|
|
22
|
+
TokenService = __decorate([
|
|
23
|
+
RegisterSingleton
|
|
24
|
+
], TokenService);
|
|
25
|
+
export default TokenService;
|
|
26
|
+
//# sourceMappingURL=TokenService.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"TokenService.js","sourceRoot":"","sources":["../../../../src/server/services/encryption/TokenService.ts"],"names":[],"mappings":";;;;;;AAAA,OAAO,EAAE,iBAAiB,EAAE,MAAM,4CAA4C,CAAC;AAC/E,OAAO,EAAE,YAAY,EAAE,MAAM,aAAa,CAAC;AAG5B,IAAM,YAAY,GAAlB,MAAM,YAAY;IAC7B,MAAM,CAAC,OAAwB,EAAE,SAAiB,EAAE,GAAyB,EAAE,IAAI,GAAG,IAAI;QACtF,MAAM,MAAM,GAAG,YAAY,CAAC,QAAQ,CAAC,CAAC;QACtC,MAAM,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC;QACtB,MAAM,CAAC,GAAG,EAAE,CAAC;QACb,IAAG,MAAM,CAAC,MAAM,CAAC,GAAG,CAAC,SAAS,EAAE,SAAS,EAAE,KAAK,CAAC,EAAE,CAAC;YAChD,OAAO,IAAI,CAAC;QAChB,CAAC;QACD,IAAI,IAAI,EAAE,CAAC;YACP,MAAM,IAAI,KAAK,CAAC,mBAAmB,CAAC,CAAC;QACzC,CAAC;IACL,CAAC;CACJ,CAAA;AAZoB,YAAY;IADhC,iBAAiB;GACG,YAAY,CAYhC;eAZoB,YAAY"}
|
|
@@ -18,6 +18,9 @@ export default class MessagingService extends ServiceObject {
|
|
|
18
18
|
name: string;
|
|
19
19
|
}>;
|
|
20
20
|
clearDnsCache: IMessageChannel;
|
|
21
|
+
removeUserLoginSessions: IMessageChannel<{
|
|
22
|
+
userID: any;
|
|
23
|
+
}>;
|
|
21
24
|
private pgEvents;
|
|
22
25
|
postInit(): void;
|
|
23
26
|
notify(messageName: string, data: any): any;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"MessagingService.d.ts","sourceRoot":"","sources":["../../../../src/server/services/message-events/MessagingService.ts"],"names":[],"mappings":"AACA,OAAe,EAAqB,aAAa,EAAE,MAAM,4CAA4C,CAAC;AAItG,MAAM,WAAW,eAAe,CAAC,CAAC,GAAG,MAAM;IACvC,EAAE,CAAC,EAAE,EAAE,CAAC,IAAI,EAAE,CAAC,KAAK,GAAG,OAAE;IACzB,MAAM,CAAC,IAAI,EAAE,CAAC,OAAE;CACnB;AAGD,MAAM,CAAC,OAAO,OAAO,gBAAiB,SAAQ,aAAa;IAEvD,cAAc,EAAE,eAAe,CAAC;IAEhC,eAAe,EAAE,eAAe,CAAC;QAAE,QAAQ,MAAA;KAAE,CAAC,CAAC;IAE/C,UAAU,EAAE,eAAe,CAAC;QAAE,QAAQ,MAAA;KAAE,CAAC,CAAC;IAE1C,UAAU,EAAE,eAAe,CAAC;IAE5B,iBAAiB,EAAE,eAAe,CAAC;IAEnC,iBAAiB,EAAE,eAAe,CAAC;IAEnC,oBAAoB,EAAE,eAAe,CAAC;QAAE,IAAI,EAAE,MAAM,CAAA;KAAE,CAAC,CAAC;IAExD,aAAa,EAAE,eAAe,CAAC;
|
|
1
|
+
{"version":3,"file":"MessagingService.d.ts","sourceRoot":"","sources":["../../../../src/server/services/message-events/MessagingService.ts"],"names":[],"mappings":"AACA,OAAe,EAAqB,aAAa,EAAE,MAAM,4CAA4C,CAAC;AAItG,MAAM,WAAW,eAAe,CAAC,CAAC,GAAG,MAAM;IACvC,EAAE,CAAC,EAAE,EAAE,CAAC,IAAI,EAAE,CAAC,KAAK,GAAG,OAAE;IACzB,MAAM,CAAC,IAAI,EAAE,CAAC,OAAE;CACnB;AAGD,MAAM,CAAC,OAAO,OAAO,gBAAiB,SAAQ,aAAa;IAEvD,cAAc,EAAE,eAAe,CAAC;IAEhC,eAAe,EAAE,eAAe,CAAC;QAAE,QAAQ,MAAA;KAAE,CAAC,CAAC;IAE/C,UAAU,EAAE,eAAe,CAAC;QAAE,QAAQ,MAAA;KAAE,CAAC,CAAC;IAE1C,UAAU,EAAE,eAAe,CAAC;IAE5B,iBAAiB,EAAE,eAAe,CAAC;IAEnC,iBAAiB,EAAE,eAAe,CAAC;IAEnC,oBAAoB,EAAE,eAAe,CAAC;QAAE,IAAI,EAAE,MAAM,CAAA;KAAE,CAAC,CAAC;IAExD,aAAa,EAAE,eAAe,CAAC;IAE/B,uBAAuB,EAAE,eAAe,CAAC;QAAE,MAAM,MAAA;KAAE,CAAC,CAAC;IAGrD,OAAO,CAAC,QAAQ,CAAW;IAE3B,QAAQ;IAYR,MAAM,CAAC,WAAW,EAAE,MAAM,EAAE,IAAI,EAAE,GAAG,GAAG,GAAG;IAI3C,MAAM,CAAC,WAAW,EAAE,MAAM,EAAE,EAAE,EAAE,CAAC,IAAI,EAAE,MAAM,EAAE,IAAI,EAAE,GAAG,KAAK,GAAG,GAAG,GAAG;IAMtE,OAAO,CAAC,OAAO;CAOlB"}
|
|
@@ -16,6 +16,7 @@ let MessagingService = class MessagingService extends ServiceObject {
|
|
|
16
16
|
this.channelRefresh = this.segment(`web-site-channel-host-clear-${globalEnv.serverID}`);
|
|
17
17
|
this.refreshDns = this.segment("refresh-dns");
|
|
18
18
|
this.restartDns = this.segment("restart-dns");
|
|
19
|
+
this.removeUserLoginSessions = this.segment(`remove-user-login-sessions-${globalEnv.serverID}`);
|
|
19
20
|
this.snapshotRefresh = this.segment(`snapshot-refresh-${globalEnv.serverID}`);
|
|
20
21
|
this.reputationCleared = this.segment(`reputation-cleared-${globalEnv.serverID}`);
|
|
21
22
|
this.certificateIssued = this.segment(`certificate-issued`);
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"MessagingService.js","sourceRoot":"","sources":["../../../../src/server/services/message-events/MessagingService.ts"],"names":[],"mappings":";;;;;;;;;AAAA,+BAA+B;AAC/B,OAAO,MAAM,EAAE,EAAE,iBAAiB,EAAE,aAAa,EAAE,MAAM,4CAA4C,CAAC;AACtG,OAAO,QAAQ,MAAM,eAAe,CAAC;AACrC,OAAO,EAAE,SAAS,EAAE,MAAM,8BAA8B,CAAC;AAQ1C,IAAM,gBAAgB,GAAtB,MAAM,gBAAiB,SAAQ,aAAa;
|
|
1
|
+
{"version":3,"file":"MessagingService.js","sourceRoot":"","sources":["../../../../src/server/services/message-events/MessagingService.ts"],"names":[],"mappings":";;;;;;;;;AAAA,+BAA+B;AAC/B,OAAO,MAAM,EAAE,EAAE,iBAAiB,EAAE,aAAa,EAAE,MAAM,4CAA4C,CAAC;AACtG,OAAO,QAAQ,MAAM,eAAe,CAAC;AACrC,OAAO,EAAE,SAAS,EAAE,MAAM,8BAA8B,CAAC;AAQ1C,IAAM,gBAAgB,GAAtB,MAAM,gBAAiB,SAAQ,aAAa;IAuBvD,QAAQ;QACJ,IAAI,CAAC,cAAc,GAAG,IAAI,CAAC,OAAO,CAAC,+BAA+B,SAAS,CAAC,QAAQ,EAAE,CAAC,CAAC;QACxF,IAAI,CAAC,UAAU,GAAG,IAAI,CAAC,OAAO,CAAC,aAAa,CAAC,CAAC;QAC9C,IAAI,CAAC,UAAU,GAAG,IAAI,CAAC,OAAO,CAAC,aAAa,CAAC,CAAC;QAC9C,IAAI,CAAC,uBAAuB,GAAG,IAAI,CAAC,OAAO,CAAC,8BAA8B,SAAS,CAAC,QAAQ,EAAE,CAAC,CAAC;QAChG,IAAI,CAAC,eAAe,GAAG,IAAI,CAAC,OAAO,CAAC,oBAAoB,SAAS,CAAC,QAAQ,EAAE,CAAC,CAAC;QAC9E,IAAI,CAAC,iBAAiB,GAAG,IAAI,CAAC,OAAO,CAAC,sBAAsB,SAAS,CAAC,QAAQ,EAAE,CAAC,CAAC;QAClF,IAAI,CAAC,iBAAiB,GAAG,IAAI,CAAC,OAAO,CAAC,oBAAoB,CAAC,CAAC;QAC5D,IAAI,CAAC,oBAAoB,GAAG,IAAI,CAAC,OAAO,CAAC,yBAAyB,SAAS,CAAC,QAAQ,EAAE,CAAC,CAAC;QACxF,IAAI,CAAC,aAAa,GAAG,IAAI,CAAC,OAAO,CAAC,iBAAiB,CAAC,CAAC;IACzD,CAAC;IAED,MAAM,CAAC,WAAmB,EAAE,IAAS;QACjC,OAAO,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,WAAW,EAAE,IAAI,CAAC,CAAC;IACjD,CAAC;IAED,MAAM,CAAC,WAAmB,EAAE,EAAoC;QAC5D,OAAO,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,WAAW,EAAE,CAAC,GAAG,EAAE,IAAI,EAAE,EAAE;YACnD,OAAO,EAAE,CAAC,GAAG,EAAE,IAAI,CAAC,CAAC;QACzB,CAAC,CAAC,CAAC;IACP,CAAC;IAEO,OAAO,CAAC,WAAmB;QAC/B,OAAO;YACH,EAAE,EAAE,CAAC,EAAE,EAAE,EAAE,CAAC,IAAI,CAAC,MAAM,CAAC,WAAW,EAAE,CAAC,GAAG,EAAE,IAAI,EAAE,EAAE,CAAC,EAAE,CAAC,IAAI,CAAC,EAAE,KAAK,EAAE,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC;YACrF,MAAM,EAAE,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,MAAM,CAAC,WAAW,EAAE,IAAI,CAAC,EAAE,KAAK,EAAE,CAAC,OAAO,CAAC,KAAK,CAAC;SAC3E,CAAC;IACN,CAAC;CAEJ,CAAA;AA/BW;IADP,MAAM;8BACW,QAAQ;kDAAC;AArBV,gBAAgB;IADpC,iBAAiB;GACG,gBAAgB,CAoDpC;eApDoB,gBAAgB"}
|