@spinajs/rbac-http-user 2.0.186 → 2.0.188

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (173) hide show
  1. package/lib/cjs/2fa/SpeakEasy2FaToken.d.ts +1 -0
  2. package/lib/cjs/2fa/SpeakEasy2FaToken.d.ts.map +1 -0
  3. package/lib/cjs/2fa/SpeakEasy2FaToken.js +48 -0
  4. package/lib/cjs/2fa/SpeakEasy2FaToken.js.map +1 -0
  5. package/lib/cjs/config/rbac-http.d.ts +34 -0
  6. package/lib/cjs/config/rbac-http.d.ts.map +1 -0
  7. package/lib/cjs/config/rbac-http.js +46 -0
  8. package/lib/cjs/config/rbac-http.js.map +1 -0
  9. package/lib/cjs/controllers/AuthController.d.ts +1 -0
  10. package/lib/cjs/controllers/AuthController.d.ts.map +1 -0
  11. package/lib/cjs/controllers/AuthController.js +211 -0
  12. package/lib/cjs/controllers/AuthController.js.map +1 -0
  13. package/lib/cjs/controllers/FederatedLoginController.d.ts +1 -0
  14. package/lib/cjs/controllers/FederatedLoginController.d.ts.map +1 -0
  15. package/lib/cjs/controllers/FederatedLoginController.js +38 -0
  16. package/lib/cjs/controllers/FederatedLoginController.js.map +1 -0
  17. package/lib/cjs/controllers/LoginController.d.ts +13 -0
  18. package/lib/cjs/controllers/LoginController.d.ts.map +1 -0
  19. package/lib/cjs/controllers/LoginController.js +202 -0
  20. package/lib/cjs/controllers/LoginController.js.map +1 -0
  21. package/lib/cjs/controllers/TwoFactorAuthController.d.ts +1 -0
  22. package/lib/cjs/controllers/TwoFactorAuthController.d.ts.map +1 -0
  23. package/lib/cjs/controllers/TwoFactorAuthController.js +57 -0
  24. package/lib/cjs/controllers/TwoFactorAuthController.js.map +1 -0
  25. package/lib/cjs/controllers/UserController.d.ts +1 -0
  26. package/lib/cjs/controllers/UserController.d.ts.map +1 -0
  27. package/lib/cjs/controllers/UserController.js +50 -0
  28. package/lib/cjs/controllers/UserController.js.map +1 -0
  29. package/lib/cjs/controllers/UserMetadata.d.ts +1 -0
  30. package/lib/cjs/controllers/UserMetadata.d.ts.map +1 -0
  31. package/lib/cjs/controllers/UserMetadata.js +35 -0
  32. package/lib/cjs/controllers/UserMetadata.js.map +1 -0
  33. package/lib/cjs/dto/login-dto.d.ts +17 -0
  34. package/lib/cjs/dto/login-dto.d.ts.map +1 -0
  35. package/lib/cjs/dto/login-dto.js +33 -0
  36. package/lib/cjs/dto/login-dto.js.map +1 -0
  37. package/lib/cjs/dto/password-dto.d.ts +30 -0
  38. package/lib/cjs/dto/password-dto.d.ts.map +1 -0
  39. package/lib/cjs/dto/password-dto.js +35 -0
  40. package/lib/cjs/dto/password-dto.js.map +1 -0
  41. package/lib/cjs/dto/restore-password-dto.d.ts +24 -0
  42. package/lib/cjs/dto/restore-password-dto.d.ts.map +1 -0
  43. package/lib/cjs/dto/restore-password-dto.js +34 -0
  44. package/lib/cjs/dto/restore-password-dto.js.map +1 -0
  45. package/lib/cjs/dto/token-dto.d.ts +16 -0
  46. package/lib/cjs/dto/token-dto.d.ts.map +1 -0
  47. package/lib/cjs/dto/token-dto.js +32 -0
  48. package/lib/cjs/dto/token-dto.js.map +1 -0
  49. package/lib/cjs/dto/user-dto.d.ts +22 -0
  50. package/lib/cjs/dto/user-dto.d.ts.map +1 -0
  51. package/lib/cjs/dto/user-dto.js +33 -0
  52. package/lib/cjs/dto/user-dto.js.map +1 -0
  53. package/lib/cjs/dto/userLogin-dto.d.ts +22 -0
  54. package/lib/cjs/dto/userLogin-dto.d.ts.map +1 -0
  55. package/lib/cjs/dto/userLogin-dto.js +34 -0
  56. package/lib/cjs/dto/userLogin-dto.js.map +1 -0
  57. package/lib/cjs/events/User2FaPassed.d.ts +4 -0
  58. package/lib/cjs/events/User2FaPassed.d.ts.map +1 -0
  59. package/lib/cjs/events/User2FaPassed.js +18 -0
  60. package/lib/cjs/events/User2FaPassed.js.map +1 -0
  61. package/lib/cjs/fingerprint/FingerprintJs.d.ts +1 -0
  62. package/lib/cjs/fingerprint/FingerprintJs.d.ts.map +1 -0
  63. package/lib/cjs/fingerprint/FingerprintJs.js +5 -0
  64. package/lib/cjs/fingerprint/FingerprintJs.js.map +1 -0
  65. package/lib/cjs/index.d.ts +2 -0
  66. package/lib/cjs/index.d.ts.map +1 -0
  67. package/lib/cjs/index.js +21 -0
  68. package/lib/cjs/index.js.map +1 -0
  69. package/lib/cjs/middlewares/AttributeFilter.d.ts +11 -0
  70. package/lib/cjs/middlewares/AttributeFilter.d.ts.map +1 -0
  71. package/lib/cjs/middlewares/AttributeFilter.js +19 -0
  72. package/lib/cjs/middlewares/AttributeFilter.js.map +1 -0
  73. package/lib/cjs/package.json +1 -0
  74. package/lib/cjs/policies/2FaPolicy.d.ts +8 -0
  75. package/lib/cjs/policies/2FaPolicy.d.ts.map +1 -0
  76. package/lib/cjs/policies/2FaPolicy.js +32 -0
  77. package/lib/cjs/policies/2FaPolicy.js.map +1 -0
  78. package/lib/cjs/policies/AllowFederatedLoginPolicy.d.ts +7 -0
  79. package/lib/cjs/policies/AllowFederatedLoginPolicy.d.ts.map +1 -0
  80. package/lib/cjs/policies/AllowFederatedLoginPolicy.js +32 -0
  81. package/lib/cjs/policies/AllowFederatedLoginPolicy.js.map +1 -0
  82. package/lib/cjs/policies/CaptchaPolicy.d.ts +1 -0
  83. package/lib/cjs/policies/CaptchaPolicy.d.ts.map +1 -0
  84. package/lib/cjs/policies/CaptchaPolicy.js +1 -0
  85. package/lib/cjs/policies/CaptchaPolicy.js.map +1 -0
  86. package/lib/mjs/2fa/SpeakEasy2FaToken.d.ts +2 -0
  87. package/lib/mjs/2fa/SpeakEasy2FaToken.d.ts.map +1 -0
  88. package/lib/mjs/2fa/SpeakEasy2FaToken.js +49 -0
  89. package/lib/mjs/2fa/SpeakEasy2FaToken.js.map +1 -0
  90. package/lib/mjs/config/rbac-http.d.ts +34 -0
  91. package/lib/mjs/config/rbac-http.d.ts.map +1 -0
  92. package/lib/mjs/config/rbac-http.js +44 -0
  93. package/lib/mjs/config/rbac-http.js.map +1 -0
  94. package/lib/mjs/controllers/AuthController.d.ts +2 -0
  95. package/lib/mjs/controllers/AuthController.d.ts.map +1 -0
  96. package/lib/mjs/controllers/AuthController.js +212 -0
  97. package/lib/mjs/controllers/AuthController.js.map +1 -0
  98. package/lib/mjs/controllers/FederatedLoginController.d.ts +2 -0
  99. package/lib/mjs/controllers/FederatedLoginController.d.ts.map +1 -0
  100. package/lib/mjs/controllers/FederatedLoginController.js +39 -0
  101. package/lib/mjs/controllers/FederatedLoginController.js.map +1 -0
  102. package/lib/mjs/controllers/LoginController.d.ts +13 -0
  103. package/lib/mjs/controllers/LoginController.d.ts.map +1 -0
  104. package/lib/mjs/controllers/LoginController.js +199 -0
  105. package/lib/mjs/controllers/LoginController.js.map +1 -0
  106. package/lib/mjs/controllers/TwoFactorAuthController.d.ts +2 -0
  107. package/lib/mjs/controllers/TwoFactorAuthController.d.ts.map +1 -0
  108. package/lib/mjs/controllers/TwoFactorAuthController.js +58 -0
  109. package/lib/mjs/controllers/TwoFactorAuthController.js.map +1 -0
  110. package/lib/mjs/controllers/UserController.d.ts +2 -0
  111. package/lib/mjs/controllers/UserController.d.ts.map +1 -0
  112. package/lib/mjs/controllers/UserController.js +51 -0
  113. package/lib/mjs/controllers/UserController.js.map +1 -0
  114. package/lib/mjs/controllers/UserMetadata.d.ts +2 -0
  115. package/lib/mjs/controllers/UserMetadata.d.ts.map +1 -0
  116. package/lib/mjs/controllers/UserMetadata.js +36 -0
  117. package/lib/mjs/controllers/UserMetadata.js.map +1 -0
  118. package/lib/mjs/dto/login-dto.d.ts +17 -0
  119. package/lib/mjs/dto/login-dto.d.ts.map +1 -0
  120. package/lib/mjs/dto/login-dto.js +30 -0
  121. package/lib/mjs/dto/login-dto.js.map +1 -0
  122. package/lib/mjs/dto/password-dto.d.ts +30 -0
  123. package/lib/mjs/dto/password-dto.d.ts.map +1 -0
  124. package/lib/mjs/dto/password-dto.js +32 -0
  125. package/lib/mjs/dto/password-dto.js.map +1 -0
  126. package/lib/mjs/dto/restore-password-dto.d.ts +24 -0
  127. package/lib/mjs/dto/restore-password-dto.d.ts.map +1 -0
  128. package/lib/mjs/dto/restore-password-dto.js +31 -0
  129. package/lib/mjs/dto/restore-password-dto.js.map +1 -0
  130. package/lib/mjs/dto/token-dto.d.ts +16 -0
  131. package/lib/mjs/dto/token-dto.d.ts.map +1 -0
  132. package/lib/mjs/dto/token-dto.js +29 -0
  133. package/lib/mjs/dto/token-dto.js.map +1 -0
  134. package/lib/mjs/dto/user-dto.d.ts +22 -0
  135. package/lib/mjs/dto/user-dto.d.ts.map +1 -0
  136. package/lib/mjs/dto/user-dto.js +30 -0
  137. package/lib/mjs/dto/user-dto.js.map +1 -0
  138. package/lib/mjs/dto/userLogin-dto.d.ts +22 -0
  139. package/lib/mjs/dto/userLogin-dto.d.ts.map +1 -0
  140. package/lib/mjs/dto/userLogin-dto.js +31 -0
  141. package/lib/mjs/dto/userLogin-dto.js.map +1 -0
  142. package/lib/mjs/events/User2FaPassed.d.ts +4 -0
  143. package/lib/mjs/events/User2FaPassed.d.ts.map +1 -0
  144. package/lib/mjs/events/User2FaPassed.js +15 -0
  145. package/lib/mjs/events/User2FaPassed.js.map +1 -0
  146. package/lib/mjs/fingerprint/FingerprintJs.d.ts +2 -0
  147. package/lib/mjs/fingerprint/FingerprintJs.d.ts.map +1 -0
  148. package/lib/mjs/fingerprint/FingerprintJs.js +6 -0
  149. package/lib/mjs/fingerprint/FingerprintJs.js.map +1 -0
  150. package/lib/mjs/index.d.ts +2 -0
  151. package/lib/mjs/index.d.ts.map +1 -0
  152. package/lib/mjs/index.js +5 -0
  153. package/lib/mjs/index.js.map +1 -0
  154. package/lib/mjs/middlewares/AttributeFilter.d.ts +11 -0
  155. package/lib/mjs/middlewares/AttributeFilter.d.ts.map +1 -0
  156. package/lib/mjs/middlewares/AttributeFilter.js +15 -0
  157. package/lib/mjs/middlewares/AttributeFilter.js.map +1 -0
  158. package/lib/mjs/package.json +1 -0
  159. package/lib/mjs/policies/2FaPolicy.d.ts +8 -0
  160. package/lib/mjs/policies/2FaPolicy.d.ts.map +1 -0
  161. package/lib/mjs/policies/2FaPolicy.js +28 -0
  162. package/lib/mjs/policies/2FaPolicy.js.map +1 -0
  163. package/lib/mjs/policies/AllowFederatedLoginPolicy.d.ts +7 -0
  164. package/lib/mjs/policies/AllowFederatedLoginPolicy.d.ts.map +1 -0
  165. package/lib/mjs/policies/AllowFederatedLoginPolicy.js +28 -0
  166. package/lib/mjs/policies/AllowFederatedLoginPolicy.js.map +1 -0
  167. package/lib/mjs/policies/CaptchaPolicy.d.ts +2 -0
  168. package/lib/mjs/policies/CaptchaPolicy.d.ts.map +1 -0
  169. package/lib/mjs/policies/CaptchaPolicy.js +2 -0
  170. package/lib/mjs/policies/CaptchaPolicy.js.map +1 -0
  171. package/lib/tsconfig.cjs.tsbuildinfo +1 -0
  172. package/lib/tsconfig.mjs.tsbuildinfo +1 -0
  173. package/package.json +11 -11
@@ -0,0 +1 @@
1
+ {"version":3,"file":"TwoFactorAuthController.d.ts","sourceRoot":"","sources":["../../../src/controllers/TwoFactorAuthController.ts"],"names":[],"mappings":""}
@@ -0,0 +1,57 @@
1
+ // import { TokenDto } from './../dto/token-dto.js';
2
+ // import { BaseController, BasePath, Cookie, Ok, Post, Unauthorized } from '@spinajs/http';
3
+ // import { ISession, SessionProvider, User as UserModel, _user_ev, _user_update} from '@spinajs/rbac';
4
+ // import { Session } from "@spinajs/rbac-http";
5
+ // import { Body, Policy } from '@spinajs/http';
6
+ // import _ from 'lodash';
7
+ // import { User } from '../decorators.js';
8
+ // import { TwoFacRouteEnabled } from '../policies/2FaPolicy.js';
9
+ // import { AutoinjectService, _service } from '@spinajs/configuration';
10
+ // import { TwoFactorAuthProvider } from '../interfaces.js';
11
+ // import { DateTime } from 'luxon';
12
+ // import { UserLoginSuccess } from '../events/UserLoginSuccess.js';
13
+ // import { Autoinject } from '@spinajs/di';
14
+ // import { QueueService } from '@spinajs/queue';
15
+ // import { _chain, _check_arg, _non_empty, _non_null, _tap, _trim, _use } from '@spinajs/util';
16
+ // import { User2FaPassed } from '../events/User2FaPassed.js';
17
+ // export async function auth2Fa(user: User, token: string) {
18
+ // user = _check_arg(_non_null())(user, 'user');
19
+ // token = _check_arg(_trim(), _non_empty)(token, 'token');
20
+ // return _chain(
21
+ // _use(_service<TwoFactorAuthProvider>('rbac.twoFactorAuth'), 'twoFa'),
22
+ // _tap(async ({ twoFa }: { twoFa: TwoFactorAuthProvider }) => {
23
+ // await twoFa.verifyToken(token, user);
24
+ // }),
25
+ // _user_update({
26
+ // LastLoginAt: DateTime.now()
27
+ // }),
28
+ // _user_ev(User2FaPassed)
29
+ // );
30
+ // }
31
+ // @BasePath('user/auth')
32
+ // @Policy(TwoFacRouteEnabled)
33
+ // export class TwoFactorAuthController extends BaseController {
34
+ // @Autoinject(QueueService)
35
+ // protected Queue: QueueService;
36
+ // @AutoinjectService('rbac.session')
37
+ // protected SessionProvider: SessionProvider;
38
+ // @AutoinjectService('rbac.twoFactorAuth')
39
+ // protected TwoFactorAuthProvider: TwoFactorAuthProvider;
40
+ // @Post('2fa/verify')
41
+ // public async verifyToken(@User() logged: UserModel, @Body() token: TokenDto, @Session() session : ISession) {
42
+ // const result = await this.TwoFactorAuthProvider.verifyToken(token.Token, logged);
43
+ // if (result) {
44
+ // return new Unauthorized(`invalid token`);
45
+ // }
46
+ // logged.LastLoginAt = DateTime.now();
47
+ // await logged.update();
48
+ // await this.Queue.emit(new UserLoginSuccess(logged.Uuid));
49
+ // await this.SessionProvider.save(ssid, {
50
+ // Authorized: true,
51
+ // TwoFactorAuth_check: true,
52
+ // });
53
+ // // return user data
54
+ // return new Ok(logged.dehydrate());
55
+ // }
56
+ // }
57
+ //# sourceMappingURL=TwoFactorAuthController.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"TwoFactorAuthController.js","sourceRoot":"","sources":["../../../src/controllers/TwoFactorAuthController.ts"],"names":[],"mappings":"AAAA,oDAAoD;AACpD,4FAA4F;AAC5F,uGAAuG;AACvG,gDAAgD;AAChD,gDAAgD;AAChD,0BAA0B;AAC1B,2CAA2C;AAC3C,iEAAiE;AACjE,wEAAwE;AACxE,4DAA4D;AAC5D,oCAAoC;AACpC,oEAAoE;AACpE,4CAA4C;AAC5C,iDAAiD;AACjD,gGAAgG;AAChG,8DAA8D;AAE9D,6DAA6D;AAC7D,kDAAkD;AAClD,6DAA6D;AAE7D,mBAAmB;AACnB,4EAA4E;AAC5E,oEAAoE;AACpE,8CAA8C;AAC9C,UAAU;AACV,qBAAqB;AACrB,oCAAoC;AACpC,UAAU;AACV,8BAA8B;AAC9B,OAAO;AACP,IAAI;AAEJ,yBAAyB;AACzB,8BAA8B;AAC9B,gEAAgE;AAChE,8BAA8B;AAC9B,mCAAmC;AAEnC,uCAAuC;AACvC,gDAAgD;AAEhD,6CAA6C;AAC7C,4DAA4D;AAE5D,wBAAwB;AACxB,kHAAkH;AAClH,wFAAwF;AAExF,oBAAoB;AACpB,kDAAkD;AAClD,QAAQ;AAER,2CAA2C;AAC3C,6BAA6B;AAE7B,gEAAgE;AAEhE,8CAA8C;AAC9C,0BAA0B;AAC1B,mCAAmC;AACnC,UAAU;AAEV,0BAA0B;AAC1B,yCAAyC;AACzC,MAAM;AACN,IAAI"}
@@ -0,0 +1 @@
1
+ //# sourceMappingURL=UserController.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"UserController.d.ts","sourceRoot":"","sources":["../../../src/controllers/UserController.ts"],"names":[],"mappings":""}
@@ -0,0 +1,50 @@
1
+ // import { PasswordDto } from '../dto/password-dto.js';
2
+ // import { User as UserModel, PasswordProvider, SessionProvider } from '@spinajs/rbac';
3
+ // import { BaseController, BasePath, Get, Ok, Body, Patch, Cookie } from '@spinajs/http';
4
+ // import { InvalidArgument, Forbidden } from '@spinajs/exceptions';
5
+ // import { Autoinject } from '@spinajs/di';
6
+ // import { Permission, User, Resource } from '../decorators.js';
7
+ // import { Config } from '@spinajs/configuration';
8
+ // import * as cs from 'cookie-signature';
9
+ // import _ from 'lodash';
10
+ // @BasePath('user')
11
+ // @Resource('user')
12
+ // export class UserController extends BaseController {
13
+ // @Autoinject()
14
+ // protected PasswordProvider: PasswordProvider;
15
+ // @Config('http.cookie.secret')
16
+ // protected CoockieSecret: string;
17
+ // @Autoinject()
18
+ // protected SessionProvider: SessionProvider;
19
+ // @Get()
20
+ // @Permission('readOwn')
21
+ // public async refresh(@User() user: UserModel, @Cookie() ssid: string) {
22
+ // // get user data from db
23
+ // await user.refresh();
24
+ // await user.Metadata.populate();
25
+ // // refresh session data from DB
26
+ // const sId: string | false = cs.unsign(ssid, this.CoockieSecret);
27
+ // if (sId) {
28
+ // const session = await this.SessionProvider.restore(sId);
29
+ // if (session) {
30
+ // session.Data.set('User', user.dehydrate());
31
+ // }
32
+ // }
33
+ // return new Ok(user.dehydrate());
34
+ // }
35
+ // @Patch('/password')
36
+ // public async newPassword(@User() user: UserModel, @Body() pwd: PasswordDto) {
37
+ // if (pwd.Password !== pwd.ConfirmPassword) {
38
+ // throw new InvalidArgument('password does not match');
39
+ // }
40
+ // const isValid = await this.PasswordProvider.verify(user.Password, pwd.OldPassword);
41
+ // if (!isValid) {
42
+ // throw new Forbidden('old password do not match');
43
+ // }
44
+ // const hashedPassword = await this.PasswordProvider.hash(pwd.Password);
45
+ // user.Password = hashedPassword;
46
+ // await user.update();
47
+ // return new Ok();
48
+ // }
49
+ // }
50
+ //# sourceMappingURL=UserController.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"UserController.js","sourceRoot":"","sources":["../../../src/controllers/UserController.ts"],"names":[],"mappings":"AAAA,wDAAwD;AACxD,wFAAwF;AACxF,0FAA0F;AAC1F,oEAAoE;AACpE,4CAA4C;AAC5C,iEAAiE;AACjE,mDAAmD;AACnD,0CAA0C;AAC1C,0BAA0B;AAE1B,oBAAoB;AACpB,oBAAoB;AACpB,uDAAuD;AACvD,kBAAkB;AAClB,kDAAkD;AAElD,kCAAkC;AAClC,qCAAqC;AAErC,kBAAkB;AAClB,gDAAgD;AAEhD,WAAW;AACX,2BAA2B;AAC3B,4EAA4E;AAC5E,+BAA+B;AAC/B,4BAA4B;AAC5B,sCAAsC;AAEtC,sCAAsC;AACtC,uEAAuE;AACvE,iBAAiB;AACjB,iEAAiE;AACjE,uBAAuB;AACvB,sDAAsD;AACtD,UAAU;AACV,QAAQ;AAER,uCAAuC;AACvC,MAAM;AAEN,wBAAwB;AACxB,kFAAkF;AAClF,kDAAkD;AAClD,8DAA8D;AAC9D,QAAQ;AAER,0FAA0F;AAE1F,sBAAsB;AACtB,0DAA0D;AAC1D,QAAQ;AAER,6EAA6E;AAC7E,sCAAsC;AACtC,2BAA2B;AAC3B,uBAAuB;AACvB,MAAM;AACN,IAAI"}
@@ -0,0 +1 @@
1
+ //# sourceMappingURL=UserMetadata.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"UserMetadata.d.ts","sourceRoot":"","sources":["../../../src/controllers/UserMetadata.ts"],"names":[],"mappings":""}
@@ -0,0 +1,35 @@
1
+ // import { Put, Post, BasePath, Ok, Forbidden } from '@spinajs/http';
2
+ // import { User as UserModel, UserMetadata } from '@spinajs/rbac';
3
+ // import { Permission, User, Resource } from '../decorators.js';
4
+ // import { FromModel, AsModel } from '@spinajs/orm-http';
5
+ // @BasePath('user/:user/metadata')
6
+ // @Resource('user.metadata')
7
+ // export class UserMetaController {
8
+ // @Post()
9
+ // @Permission('updateOwn')
10
+ // public async addMetadata(@User() logged: UserModel, @FromModel() user: UserModel, @AsModel() meta: UserMetadata) {
11
+ // if (logged.Id !== user.Id) {
12
+ // throw new Forbidden('cannot add metadata to another user');
13
+ // }
14
+ // await user.Metadata.add(meta);
15
+ // return new Ok(meta);
16
+ // }
17
+ // @Put('user/:user/metadata/:meta')
18
+ // @Permission('updateOwn')
19
+ // public async updateMetadata(@User() logged: UserModel, @FromModel() user: UserModel, @FromModel() meta: UserMetadata) {
20
+ // if (logged.Id !== user.Id) {
21
+ // throw new Forbidden('cannot add metadata to another user');
22
+ // }
23
+ // await meta.User.populate();
24
+ // if (meta.User.Value.Id !== logged.Id) {
25
+ // throw new Forbidden('cannot edit metadata that is not own by user');
26
+ // }
27
+ // await meta.update();
28
+ // return new Ok();
29
+ // }
30
+ // }
31
+ // // function userOwnerPermissionStrategy(){
32
+ // // // 1. obtain current logged user
33
+ // // // 2. find
34
+ // // }
35
+ //# sourceMappingURL=UserMetadata.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"UserMetadata.js","sourceRoot":"","sources":["../../../src/controllers/UserMetadata.ts"],"names":[],"mappings":"AAAA,sEAAsE;AACtE,mEAAmE;AACnE,iEAAiE;AACjE,0DAA0D;AAE1D,mCAAmC;AACnC,6BAA6B;AAC7B,oCAAoC;AAEpC,YAAY;AACZ,6BAA6B;AAC7B,uHAAuH;AACvH,mCAAmC;AACnC,oEAAoE;AACpE,QAAQ;AAER,qCAAqC;AACrC,2BAA2B;AAC3B,MAAM;AAEN,sCAAsC;AACtC,6BAA6B;AAC7B,4HAA4H;AAC5H,mCAAmC;AACnC,oEAAoE;AACpE,QAAQ;AAER,kCAAkC;AAClC,8CAA8C;AAC9C,6EAA6E;AAC7E,QAAQ;AAER,2BAA2B;AAE3B,uBAAuB;AACvB,MAAM;AACN,IAAI;AAEJ,6CAA6C;AAE7C,yCAAyC;AACzC,mBAAmB;AAEnB,OAAO"}
@@ -0,0 +1,17 @@
1
+ export declare const LoginDtoSchema: {
2
+ $schema: string;
3
+ title: string;
4
+ type: string;
5
+ properties: {
6
+ Login: {
7
+ type: string;
8
+ format: string;
9
+ };
10
+ };
11
+ required: string[];
12
+ };
13
+ export declare class UserLoginDto {
14
+ Email: string;
15
+ constructor(data: any);
16
+ }
17
+ //# sourceMappingURL=login-dto.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"login-dto.d.ts","sourceRoot":"","sources":["../../../src/dto/login-dto.ts"],"names":[],"mappings":"AAEA,eAAO,MAAM,cAAc;;;;;;;;;;;CAQ1B,CAAC;AAEF,qBACa,YAAY;IAChB,KAAK,EAAE,MAAM,CAAC;gBAET,IAAI,EAAE,GAAG;CAGtB"}
@@ -0,0 +1,33 @@
1
+ "use strict";
2
+ var __decorate = (this && this.__decorate) || function (decorators, target, key, desc) {
3
+ var c = arguments.length, r = c < 3 ? target : desc === null ? desc = Object.getOwnPropertyDescriptor(target, key) : desc, d;
4
+ if (typeof Reflect === "object" && typeof Reflect.decorate === "function") r = Reflect.decorate(decorators, target, key, desc);
5
+ else for (var i = decorators.length - 1; i >= 0; i--) if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;
6
+ return c > 3 && r && Object.defineProperty(target, key, r), r;
7
+ };
8
+ var __metadata = (this && this.__metadata) || function (k, v) {
9
+ if (typeof Reflect === "object" && typeof Reflect.metadata === "function") return Reflect.metadata(k, v);
10
+ };
11
+ Object.defineProperty(exports, "__esModule", { value: true });
12
+ exports.UserLoginDto = exports.LoginDtoSchema = void 0;
13
+ const validation_1 = require("@spinajs/validation");
14
+ exports.LoginDtoSchema = {
15
+ $schema: 'http://json-schema.org/draft-07/schema#',
16
+ title: 'login DTO',
17
+ type: 'object',
18
+ properties: {
19
+ Login: { type: 'string', format: 'email' },
20
+ },
21
+ required: ['Email'],
22
+ };
23
+ let UserLoginDto = class UserLoginDto {
24
+ constructor(data) {
25
+ Object.assign(this, data);
26
+ }
27
+ };
28
+ exports.UserLoginDto = UserLoginDto;
29
+ exports.UserLoginDto = UserLoginDto = __decorate([
30
+ (0, validation_1.Schema)(exports.LoginDtoSchema),
31
+ __metadata("design:paramtypes", [Object])
32
+ ], UserLoginDto);
33
+ //# sourceMappingURL=login-dto.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"login-dto.js","sourceRoot":"","sources":["../../../src/dto/login-dto.ts"],"names":[],"mappings":";;;;;;;;;;;;AAAA,oDAA6C;AAEhC,QAAA,cAAc,GAAG;IAC5B,OAAO,EAAE,yCAAyC;IAClD,KAAK,EAAE,WAAW;IAClB,IAAI,EAAE,QAAQ;IACd,UAAU,EAAE;QACV,KAAK,EAAE,EAAE,IAAI,EAAE,QAAQ,EAAE,MAAM,EAAE,OAAO,EAAE;KAC3C;IACD,QAAQ,EAAE,CAAC,OAAO,CAAC;CACpB,CAAC;AAGK,IAAM,YAAY,GAAlB,MAAM,YAAY;IAGvB,YAAY,IAAS;QACnB,MAAM,CAAC,MAAM,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;IAC5B,CAAC;CACF,CAAA;AANY,oCAAY;uBAAZ,YAAY;IADxB,IAAA,mBAAM,EAAC,sBAAc,CAAC;;GACV,YAAY,CAMxB"}
@@ -0,0 +1,30 @@
1
+ export declare const PasswordDtoSchema: {
2
+ $schema: string;
3
+ title: string;
4
+ type: string;
5
+ properties: {
6
+ OldPassword: {
7
+ type: string;
8
+ maxLength: number;
9
+ minLength: number;
10
+ };
11
+ Password: {
12
+ type: string;
13
+ maxLength: number;
14
+ minLength: number;
15
+ };
16
+ ConfirmPassword: {
17
+ type: string;
18
+ maxLength: number;
19
+ minLength: number;
20
+ };
21
+ };
22
+ required: string[];
23
+ };
24
+ export declare class PasswordDto {
25
+ OldPassword: string;
26
+ Password: string;
27
+ ConfirmPassword: string;
28
+ constructor(data: any);
29
+ }
30
+ //# sourceMappingURL=password-dto.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"password-dto.d.ts","sourceRoot":"","sources":["../../../src/dto/password-dto.ts"],"names":[],"mappings":"AAEA,eAAO,MAAM,iBAAiB;;;;;;;;;;;;;;;;;;;;;;CAU7B,CAAC;AAEF,qBACa,WAAW;IACf,WAAW,EAAE,MAAM,CAAC;IAEpB,QAAQ,EAAE,MAAM,CAAC;IAEjB,eAAe,EAAE,MAAM,CAAC;gBAEnB,IAAI,EAAE,GAAG;CAGtB"}
@@ -0,0 +1,35 @@
1
+ "use strict";
2
+ var __decorate = (this && this.__decorate) || function (decorators, target, key, desc) {
3
+ var c = arguments.length, r = c < 3 ? target : desc === null ? desc = Object.getOwnPropertyDescriptor(target, key) : desc, d;
4
+ if (typeof Reflect === "object" && typeof Reflect.decorate === "function") r = Reflect.decorate(decorators, target, key, desc);
5
+ else for (var i = decorators.length - 1; i >= 0; i--) if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;
6
+ return c > 3 && r && Object.defineProperty(target, key, r), r;
7
+ };
8
+ var __metadata = (this && this.__metadata) || function (k, v) {
9
+ if (typeof Reflect === "object" && typeof Reflect.metadata === "function") return Reflect.metadata(k, v);
10
+ };
11
+ Object.defineProperty(exports, "__esModule", { value: true });
12
+ exports.PasswordDto = exports.PasswordDtoSchema = void 0;
13
+ const validation_1 = require("@spinajs/validation");
14
+ exports.PasswordDtoSchema = {
15
+ $schema: 'http://json-schema.org/draft-07/schema#',
16
+ title: 'User password DTO',
17
+ type: 'object',
18
+ properties: {
19
+ OldPassword: { type: 'string', maxLength: 32, minLength: 6 },
20
+ Password: { type: 'string', maxLength: 32, minLength: 6 },
21
+ ConfirmPassword: { type: 'string', maxLength: 32, minLength: 6 },
22
+ },
23
+ required: ['OldPassword', 'Password', 'ConfirmPassword'],
24
+ };
25
+ let PasswordDto = class PasswordDto {
26
+ constructor(data) {
27
+ Object.assign(this, data);
28
+ }
29
+ };
30
+ exports.PasswordDto = PasswordDto;
31
+ exports.PasswordDto = PasswordDto = __decorate([
32
+ (0, validation_1.Schema)(exports.PasswordDtoSchema),
33
+ __metadata("design:paramtypes", [Object])
34
+ ], PasswordDto);
35
+ //# sourceMappingURL=password-dto.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"password-dto.js","sourceRoot":"","sources":["../../../src/dto/password-dto.ts"],"names":[],"mappings":";;;;;;;;;;;;AAAA,oDAA6C;AAEhC,QAAA,iBAAiB,GAAG;IAC/B,OAAO,EAAE,yCAAyC;IAClD,KAAK,EAAE,mBAAmB;IAC1B,IAAI,EAAE,QAAQ;IACd,UAAU,EAAE;QACV,WAAW,EAAE,EAAE,IAAI,EAAE,QAAQ,EAAE,SAAS,EAAE,EAAE,EAAE,SAAS,EAAE,CAAC,EAAE;QAC5D,QAAQ,EAAE,EAAE,IAAI,EAAE,QAAQ,EAAE,SAAS,EAAE,EAAE,EAAE,SAAS,EAAE,CAAC,EAAE;QACzD,eAAe,EAAE,EAAE,IAAI,EAAE,QAAQ,EAAE,SAAS,EAAE,EAAE,EAAE,SAAS,EAAE,CAAC,EAAE;KACjE;IACD,QAAQ,EAAE,CAAC,aAAa,EAAE,UAAU,EAAE,iBAAiB,CAAC;CACzD,CAAC;AAGK,IAAM,WAAW,GAAjB,MAAM,WAAW;IAOtB,YAAY,IAAS;QACnB,MAAM,CAAC,MAAM,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;IAC5B,CAAC;CACF,CAAA;AAVY,kCAAW;sBAAX,WAAW;IADvB,IAAA,mBAAM,EAAC,yBAAiB,CAAC;;GACb,WAAW,CAUvB"}
@@ -0,0 +1,24 @@
1
+ export declare const RestorePasswordDtoSchema: {
2
+ $schema: string;
3
+ title: string;
4
+ type: string;
5
+ properties: {
6
+ Password: {
7
+ type: string;
8
+ maxLength: number;
9
+ minLength: number;
10
+ };
11
+ ConfirmPassword: {
12
+ type: string;
13
+ maxLength: number;
14
+ minLength: number;
15
+ };
16
+ };
17
+ required: string[];
18
+ };
19
+ export declare class RestorePasswordDto {
20
+ Password: string;
21
+ ConfirmPassword: string;
22
+ constructor(data: any);
23
+ }
24
+ //# sourceMappingURL=restore-password-dto.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"restore-password-dto.d.ts","sourceRoot":"","sources":["../../../src/dto/restore-password-dto.ts"],"names":[],"mappings":"AAEA,eAAO,MAAM,wBAAwB;;;;;;;;;;;;;;;;;CASpC,CAAC;AAEF,qBACa,kBAAkB;IACtB,QAAQ,EAAE,MAAM,CAAC;IAEjB,eAAe,EAAE,MAAM,CAAC;gBAEnB,IAAI,EAAE,GAAG;CAGtB"}
@@ -0,0 +1,34 @@
1
+ "use strict";
2
+ var __decorate = (this && this.__decorate) || function (decorators, target, key, desc) {
3
+ var c = arguments.length, r = c < 3 ? target : desc === null ? desc = Object.getOwnPropertyDescriptor(target, key) : desc, d;
4
+ if (typeof Reflect === "object" && typeof Reflect.decorate === "function") r = Reflect.decorate(decorators, target, key, desc);
5
+ else for (var i = decorators.length - 1; i >= 0; i--) if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;
6
+ return c > 3 && r && Object.defineProperty(target, key, r), r;
7
+ };
8
+ var __metadata = (this && this.__metadata) || function (k, v) {
9
+ if (typeof Reflect === "object" && typeof Reflect.metadata === "function") return Reflect.metadata(k, v);
10
+ };
11
+ Object.defineProperty(exports, "__esModule", { value: true });
12
+ exports.RestorePasswordDto = exports.RestorePasswordDtoSchema = void 0;
13
+ const validation_1 = require("@spinajs/validation");
14
+ exports.RestorePasswordDtoSchema = {
15
+ $schema: 'http://json-schema.org/draft-07/schema#',
16
+ title: 'User password DTO',
17
+ type: 'object',
18
+ properties: {
19
+ Password: { type: 'string', maxLength: 32, minLength: 6 },
20
+ ConfirmPassword: { type: 'string', maxLength: 32, minLength: 6 },
21
+ },
22
+ required: ['Password', 'ConfirmPassword'],
23
+ };
24
+ let RestorePasswordDto = class RestorePasswordDto {
25
+ constructor(data) {
26
+ Object.assign(this, data);
27
+ }
28
+ };
29
+ exports.RestorePasswordDto = RestorePasswordDto;
30
+ exports.RestorePasswordDto = RestorePasswordDto = __decorate([
31
+ (0, validation_1.Schema)(exports.RestorePasswordDtoSchema),
32
+ __metadata("design:paramtypes", [Object])
33
+ ], RestorePasswordDto);
34
+ //# sourceMappingURL=restore-password-dto.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"restore-password-dto.js","sourceRoot":"","sources":["../../../src/dto/restore-password-dto.ts"],"names":[],"mappings":";;;;;;;;;;;;AAAA,oDAA6C;AAEhC,QAAA,wBAAwB,GAAG;IACtC,OAAO,EAAE,yCAAyC;IAClD,KAAK,EAAE,mBAAmB;IAC1B,IAAI,EAAE,QAAQ;IACd,UAAU,EAAE;QACV,QAAQ,EAAE,EAAE,IAAI,EAAE,QAAQ,EAAE,SAAS,EAAE,EAAE,EAAE,SAAS,EAAE,CAAC,EAAE;QACzD,eAAe,EAAE,EAAE,IAAI,EAAE,QAAQ,EAAE,SAAS,EAAE,EAAE,EAAE,SAAS,EAAE,CAAC,EAAE;KACjE;IACD,QAAQ,EAAE,CAAC,UAAU,EAAE,iBAAiB,CAAC;CAC1C,CAAC;AAGK,IAAM,kBAAkB,GAAxB,MAAM,kBAAkB;IAK7B,YAAY,IAAS;QACnB,MAAM,CAAC,MAAM,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;IAC5B,CAAC;CACF,CAAA;AARY,gDAAkB;6BAAlB,kBAAkB;IAD9B,IAAA,mBAAM,EAAC,gCAAwB,CAAC;;GACpB,kBAAkB,CAQ9B"}
@@ -0,0 +1,16 @@
1
+ export declare const TokenDtoSchema: {
2
+ $schema: string;
3
+ title: string;
4
+ type: string;
5
+ properties: {
6
+ Token: {
7
+ type: string;
8
+ maxLength: number;
9
+ };
10
+ };
11
+ };
12
+ export declare class TokenDto {
13
+ Token: string;
14
+ constructor(data: any);
15
+ }
16
+ //# sourceMappingURL=token-dto.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"token-dto.d.ts","sourceRoot":"","sources":["../../../src/dto/token-dto.ts"],"names":[],"mappings":"AACA,eAAO,MAAM,cAAc;;;;;;;;;;CAO1B,CAAC;AAEF,qBACa,QAAQ;IACZ,KAAK,EAAE,MAAM,CAAC;gBAET,IAAI,EAAE,GAAG;CAGtB"}
@@ -0,0 +1,32 @@
1
+ "use strict";
2
+ var __decorate = (this && this.__decorate) || function (decorators, target, key, desc) {
3
+ var c = arguments.length, r = c < 3 ? target : desc === null ? desc = Object.getOwnPropertyDescriptor(target, key) : desc, d;
4
+ if (typeof Reflect === "object" && typeof Reflect.decorate === "function") r = Reflect.decorate(decorators, target, key, desc);
5
+ else for (var i = decorators.length - 1; i >= 0; i--) if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;
6
+ return c > 3 && r && Object.defineProperty(target, key, r), r;
7
+ };
8
+ var __metadata = (this && this.__metadata) || function (k, v) {
9
+ if (typeof Reflect === "object" && typeof Reflect.metadata === "function") return Reflect.metadata(k, v);
10
+ };
11
+ Object.defineProperty(exports, "__esModule", { value: true });
12
+ exports.TokenDto = exports.TokenDtoSchema = void 0;
13
+ const validation_1 = require("@spinajs/validation");
14
+ exports.TokenDtoSchema = {
15
+ $schema: 'http://json-schema.org/draft-07/schema#',
16
+ title: 'Token DTO',
17
+ type: 'object',
18
+ properties: {
19
+ Token: { type: 'string', maxLength: 64 },
20
+ },
21
+ };
22
+ let TokenDto = class TokenDto {
23
+ constructor(data) {
24
+ Object.assign(this, data);
25
+ }
26
+ };
27
+ exports.TokenDto = TokenDto;
28
+ exports.TokenDto = TokenDto = __decorate([
29
+ (0, validation_1.Schema)(exports.TokenDtoSchema),
30
+ __metadata("design:paramtypes", [Object])
31
+ ], TokenDto);
32
+ //# sourceMappingURL=token-dto.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"token-dto.js","sourceRoot":"","sources":["../../../src/dto/token-dto.ts"],"names":[],"mappings":";;;;;;;;;;;;AAAA,oDAA6C;AAChC,QAAA,cAAc,GAAG;IAC5B,OAAO,EAAE,yCAAyC;IAClD,KAAK,EAAE,WAAW;IAClB,IAAI,EAAE,QAAQ;IACd,UAAU,EAAE;QACV,KAAK,EAAE,EAAE,IAAI,EAAE,QAAQ,EAAE,SAAS,EAAE,EAAE,EAAE;KACzC;CACF,CAAC;AAGK,IAAM,QAAQ,GAAd,MAAM,QAAQ;IAGnB,YAAY,IAAS;QACnB,MAAM,CAAC,MAAM,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;IAC5B,CAAC;CACF,CAAA;AANY,4BAAQ;mBAAR,QAAQ;IADpB,IAAA,mBAAM,EAAC,sBAAc,CAAC;;GACV,QAAQ,CAMpB"}
@@ -0,0 +1,22 @@
1
+ export declare const UserDtoSchema: {
2
+ $schema: string;
3
+ title: string;
4
+ type: string;
5
+ properties: {
6
+ Email: {
7
+ type: string;
8
+ format: string;
9
+ maxLength: number;
10
+ };
11
+ Login: {
12
+ type: string;
13
+ maxLength: number;
14
+ };
15
+ };
16
+ };
17
+ export declare class UserDto {
18
+ Email: string;
19
+ Login: string;
20
+ constructor(data: any);
21
+ }
22
+ //# sourceMappingURL=user-dto.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"user-dto.d.ts","sourceRoot":"","sources":["../../../src/dto/user-dto.ts"],"names":[],"mappings":"AACA,eAAO,MAAM,aAAa;;;;;;;;;;;;;;;CAQzB,CAAC;AAEF,qBACa,OAAO;IACX,KAAK,EAAE,MAAM,CAAC;IAEd,KAAK,EAAE,MAAM,CAAC;gBAET,IAAI,EAAE,GAAG;CAGtB"}
@@ -0,0 +1,33 @@
1
+ "use strict";
2
+ var __decorate = (this && this.__decorate) || function (decorators, target, key, desc) {
3
+ var c = arguments.length, r = c < 3 ? target : desc === null ? desc = Object.getOwnPropertyDescriptor(target, key) : desc, d;
4
+ if (typeof Reflect === "object" && typeof Reflect.decorate === "function") r = Reflect.decorate(decorators, target, key, desc);
5
+ else for (var i = decorators.length - 1; i >= 0; i--) if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;
6
+ return c > 3 && r && Object.defineProperty(target, key, r), r;
7
+ };
8
+ var __metadata = (this && this.__metadata) || function (k, v) {
9
+ if (typeof Reflect === "object" && typeof Reflect.metadata === "function") return Reflect.metadata(k, v);
10
+ };
11
+ Object.defineProperty(exports, "__esModule", { value: true });
12
+ exports.UserDto = exports.UserDtoSchema = void 0;
13
+ const validation_1 = require("@spinajs/validation");
14
+ exports.UserDtoSchema = {
15
+ $schema: 'http://json-schema.org/draft-07/schema#',
16
+ title: 'User DTO',
17
+ type: 'object',
18
+ properties: {
19
+ Email: { type: 'string', format: 'email', maxLength: 64 },
20
+ Login: { type: 'string', maxLength: 64 },
21
+ },
22
+ };
23
+ let UserDto = class UserDto {
24
+ constructor(data) {
25
+ Object.assign(this, data);
26
+ }
27
+ };
28
+ exports.UserDto = UserDto;
29
+ exports.UserDto = UserDto = __decorate([
30
+ (0, validation_1.Schema)(exports.UserDtoSchema),
31
+ __metadata("design:paramtypes", [Object])
32
+ ], UserDto);
33
+ //# sourceMappingURL=user-dto.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"user-dto.js","sourceRoot":"","sources":["../../../src/dto/user-dto.ts"],"names":[],"mappings":";;;;;;;;;;;;AAAA,oDAA6C;AAChC,QAAA,aAAa,GAAG;IAC3B,OAAO,EAAE,yCAAyC;IAClD,KAAK,EAAE,UAAU;IACjB,IAAI,EAAE,QAAQ;IACd,UAAU,EAAE;QACV,KAAK,EAAE,EAAE,IAAI,EAAE,QAAQ,EAAE,MAAM,EAAE,OAAO,EAAE,SAAS,EAAE,EAAE,EAAE;QACzD,KAAK,EAAE,EAAE,IAAI,EAAE,QAAQ,EAAE,SAAS,EAAE,EAAE,EAAE;KACzC;CACF,CAAC;AAGK,IAAM,OAAO,GAAb,MAAM,OAAO;IAKlB,YAAY,IAAS;QACnB,MAAM,CAAC,MAAM,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;IAC5B,CAAC;CACF,CAAA;AARY,0BAAO;kBAAP,OAAO;IADnB,IAAA,mBAAM,EAAC,qBAAa,CAAC;;GACT,OAAO,CAQnB"}
@@ -0,0 +1,22 @@
1
+ export declare const UserLoginDtoSchema: {
2
+ $schema: string;
3
+ title: string;
4
+ type: string;
5
+ properties: {
6
+ Login: {
7
+ type: string;
8
+ format: string;
9
+ };
10
+ Password: {
11
+ type: string;
12
+ maxLength: number;
13
+ };
14
+ };
15
+ required: string[];
16
+ };
17
+ export declare class UserLoginDto {
18
+ Email: string;
19
+ Password: string;
20
+ constructor(data: any);
21
+ }
22
+ //# sourceMappingURL=userLogin-dto.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"userLogin-dto.d.ts","sourceRoot":"","sources":["../../../src/dto/userLogin-dto.ts"],"names":[],"mappings":"AAEA,eAAO,MAAM,kBAAkB;;;;;;;;;;;;;;;CAS9B,CAAC;AAEF,qBACa,YAAY;IAChB,KAAK,EAAE,MAAM,CAAC;IAEd,QAAQ,EAAE,MAAM,CAAC;gBAEZ,IAAI,EAAE,GAAG;CAGtB"}
@@ -0,0 +1,34 @@
1
+ "use strict";
2
+ var __decorate = (this && this.__decorate) || function (decorators, target, key, desc) {
3
+ var c = arguments.length, r = c < 3 ? target : desc === null ? desc = Object.getOwnPropertyDescriptor(target, key) : desc, d;
4
+ if (typeof Reflect === "object" && typeof Reflect.decorate === "function") r = Reflect.decorate(decorators, target, key, desc);
5
+ else for (var i = decorators.length - 1; i >= 0; i--) if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;
6
+ return c > 3 && r && Object.defineProperty(target, key, r), r;
7
+ };
8
+ var __metadata = (this && this.__metadata) || function (k, v) {
9
+ if (typeof Reflect === "object" && typeof Reflect.metadata === "function") return Reflect.metadata(k, v);
10
+ };
11
+ Object.defineProperty(exports, "__esModule", { value: true });
12
+ exports.UserLoginDto = exports.UserLoginDtoSchema = void 0;
13
+ const validation_1 = require("@spinajs/validation");
14
+ exports.UserLoginDtoSchema = {
15
+ $schema: 'http://json-schema.org/draft-07/schema#',
16
+ title: 'User login DTO',
17
+ type: 'object',
18
+ properties: {
19
+ Login: { type: 'string', format: 'email' },
20
+ Password: { type: 'string', maxLength: 32 },
21
+ },
22
+ required: ['Email', 'Password'],
23
+ };
24
+ let UserLoginDto = class UserLoginDto {
25
+ constructor(data) {
26
+ Object.assign(this, data);
27
+ }
28
+ };
29
+ exports.UserLoginDto = UserLoginDto;
30
+ exports.UserLoginDto = UserLoginDto = __decorate([
31
+ (0, validation_1.Schema)(exports.UserLoginDtoSchema),
32
+ __metadata("design:paramtypes", [Object])
33
+ ], UserLoginDto);
34
+ //# sourceMappingURL=userLogin-dto.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"userLogin-dto.js","sourceRoot":"","sources":["../../../src/dto/userLogin-dto.ts"],"names":[],"mappings":";;;;;;;;;;;;AAAA,oDAA6C;AAEhC,QAAA,kBAAkB,GAAG;IAChC,OAAO,EAAE,yCAAyC;IAClD,KAAK,EAAE,gBAAgB;IACvB,IAAI,EAAE,QAAQ;IACd,UAAU,EAAE;QACV,KAAK,EAAE,EAAE,IAAI,EAAE,QAAQ,EAAE,MAAM,EAAE,OAAO,EAAE;QAC1C,QAAQ,EAAE,EAAE,IAAI,EAAE,QAAQ,EAAE,SAAS,EAAE,EAAE,EAAE;KAC5C;IACD,QAAQ,EAAE,CAAC,OAAO,EAAE,UAAU,CAAC;CAChC,CAAC;AAGK,IAAM,YAAY,GAAlB,MAAM,YAAY;IAKvB,YAAY,IAAS;QACnB,MAAM,CAAC,MAAM,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;IAC5B,CAAC;CACF,CAAA;AARY,oCAAY;uBAAZ,YAAY;IADxB,IAAA,mBAAM,EAAC,0BAAkB,CAAC;;GACd,YAAY,CAQxB"}
@@ -0,0 +1,4 @@
1
+ import { UserEvent } from '@spinajs/rbac';
2
+ export declare class User2FaPassed extends UserEvent {
3
+ }
4
+ //# sourceMappingURL=User2FaPassed.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"User2FaPassed.d.ts","sourceRoot":"","sources":["../../../src/events/User2FaPassed.ts"],"names":[],"mappings":"AACA,OAAO,EAAE,SAAS,EAAE,MAAM,eAAe,CAAC;AAE1C,qBACa,aAAc,SAAQ,SAAS;CAAG"}
@@ -0,0 +1,18 @@
1
+ "use strict";
2
+ var __decorate = (this && this.__decorate) || function (decorators, target, key, desc) {
3
+ var c = arguments.length, r = c < 3 ? target : desc === null ? desc = Object.getOwnPropertyDescriptor(target, key) : desc, d;
4
+ if (typeof Reflect === "object" && typeof Reflect.decorate === "function") r = Reflect.decorate(decorators, target, key, desc);
5
+ else for (var i = decorators.length - 1; i >= 0; i--) if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;
6
+ return c > 3 && r && Object.defineProperty(target, key, r), r;
7
+ };
8
+ Object.defineProperty(exports, "__esModule", { value: true });
9
+ exports.User2FaPassed = void 0;
10
+ const queue_1 = require("@spinajs/queue");
11
+ const rbac_1 = require("@spinajs/rbac");
12
+ let User2FaPassed = class User2FaPassed extends rbac_1.UserEvent {
13
+ };
14
+ exports.User2FaPassed = User2FaPassed;
15
+ exports.User2FaPassed = User2FaPassed = __decorate([
16
+ (0, queue_1.Event)()
17
+ ], User2FaPassed);
18
+ //# sourceMappingURL=User2FaPassed.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"User2FaPassed.js","sourceRoot":"","sources":["../../../src/events/User2FaPassed.ts"],"names":[],"mappings":";;;;;;;;;AAAA,0CAAuC;AACvC,wCAA0C;AAGnC,IAAM,aAAa,GAAnB,MAAM,aAAc,SAAQ,gBAAS;CAAG,CAAA;AAAlC,sCAAa;wBAAb,aAAa;IADzB,IAAA,aAAK,GAAE;GACK,aAAa,CAAqB"}
@@ -0,0 +1 @@
1
+ //# sourceMappingURL=FingerprintJs.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"FingerprintJs.d.ts","sourceRoot":"","sources":["../../../src/fingerprint/FingerprintJs.ts"],"names":[],"mappings":""}
@@ -0,0 +1,5 @@
1
+ // import { Injectable } from '@spinajs/di';
2
+ // import { FingerprintProvider } from '../interfaces.js';
3
+ // @Injectable(FingerprintProvider)
4
+ // export class FingerprintJs extends FingerprintProvider {}
5
+ //# sourceMappingURL=FingerprintJs.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"FingerprintJs.js","sourceRoot":"","sources":["../../../src/fingerprint/FingerprintJs.ts"],"names":[],"mappings":"AAAA,4CAA4C;AAC5C,0DAA0D;AAE1D,mCAAmC;AACnC,4DAA4D"}
@@ -0,0 +1,2 @@
1
+ export * from './controllers/LoginController.js';
2
+ //# sourceMappingURL=index.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/index.ts"],"names":[],"mappings":"AAAA,cAAc,kCAAkC,CAAC"}