@spinajs/rbac-http-user 2.0.187 → 2.0.188
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/lib/cjs/2fa/SpeakEasy2FaToken.d.ts +1 -0
- package/lib/cjs/2fa/SpeakEasy2FaToken.d.ts.map +1 -0
- package/lib/cjs/2fa/SpeakEasy2FaToken.js +48 -0
- package/lib/cjs/2fa/SpeakEasy2FaToken.js.map +1 -0
- package/lib/cjs/config/rbac-http.d.ts +34 -0
- package/lib/cjs/config/rbac-http.d.ts.map +1 -0
- package/lib/cjs/config/rbac-http.js +46 -0
- package/lib/cjs/config/rbac-http.js.map +1 -0
- package/lib/cjs/controllers/AuthController.d.ts +1 -0
- package/lib/cjs/controllers/AuthController.d.ts.map +1 -0
- package/lib/cjs/controllers/AuthController.js +211 -0
- package/lib/cjs/controllers/AuthController.js.map +1 -0
- package/lib/cjs/controllers/FederatedLoginController.d.ts +1 -0
- package/lib/cjs/controllers/FederatedLoginController.d.ts.map +1 -0
- package/lib/cjs/controllers/FederatedLoginController.js +38 -0
- package/lib/cjs/controllers/FederatedLoginController.js.map +1 -0
- package/lib/cjs/controllers/LoginController.d.ts +13 -0
- package/lib/cjs/controllers/LoginController.d.ts.map +1 -0
- package/lib/cjs/controllers/LoginController.js +202 -0
- package/lib/cjs/controllers/LoginController.js.map +1 -0
- package/lib/cjs/controllers/TwoFactorAuthController.d.ts +1 -0
- package/lib/cjs/controllers/TwoFactorAuthController.d.ts.map +1 -0
- package/lib/cjs/controllers/TwoFactorAuthController.js +57 -0
- package/lib/cjs/controllers/TwoFactorAuthController.js.map +1 -0
- package/lib/cjs/controllers/UserController.d.ts +1 -0
- package/lib/cjs/controllers/UserController.d.ts.map +1 -0
- package/lib/cjs/controllers/UserController.js +50 -0
- package/lib/cjs/controllers/UserController.js.map +1 -0
- package/lib/cjs/controllers/UserMetadata.d.ts +1 -0
- package/lib/cjs/controllers/UserMetadata.d.ts.map +1 -0
- package/lib/cjs/controllers/UserMetadata.js +35 -0
- package/lib/cjs/controllers/UserMetadata.js.map +1 -0
- package/lib/cjs/dto/login-dto.d.ts +17 -0
- package/lib/cjs/dto/login-dto.d.ts.map +1 -0
- package/lib/cjs/dto/login-dto.js +33 -0
- package/lib/cjs/dto/login-dto.js.map +1 -0
- package/lib/cjs/dto/password-dto.d.ts +30 -0
- package/lib/cjs/dto/password-dto.d.ts.map +1 -0
- package/lib/cjs/dto/password-dto.js +35 -0
- package/lib/cjs/dto/password-dto.js.map +1 -0
- package/lib/cjs/dto/restore-password-dto.d.ts +24 -0
- package/lib/cjs/dto/restore-password-dto.d.ts.map +1 -0
- package/lib/cjs/dto/restore-password-dto.js +34 -0
- package/lib/cjs/dto/restore-password-dto.js.map +1 -0
- package/lib/cjs/dto/token-dto.d.ts +16 -0
- package/lib/cjs/dto/token-dto.d.ts.map +1 -0
- package/lib/cjs/dto/token-dto.js +32 -0
- package/lib/cjs/dto/token-dto.js.map +1 -0
- package/lib/cjs/dto/user-dto.d.ts +22 -0
- package/lib/cjs/dto/user-dto.d.ts.map +1 -0
- package/lib/cjs/dto/user-dto.js +33 -0
- package/lib/cjs/dto/user-dto.js.map +1 -0
- package/lib/cjs/dto/userLogin-dto.d.ts +22 -0
- package/lib/cjs/dto/userLogin-dto.d.ts.map +1 -0
- package/lib/cjs/dto/userLogin-dto.js +34 -0
- package/lib/cjs/dto/userLogin-dto.js.map +1 -0
- package/lib/cjs/events/User2FaPassed.d.ts +4 -0
- package/lib/cjs/events/User2FaPassed.d.ts.map +1 -0
- package/lib/cjs/events/User2FaPassed.js +18 -0
- package/lib/cjs/events/User2FaPassed.js.map +1 -0
- package/lib/cjs/fingerprint/FingerprintJs.d.ts +1 -0
- package/lib/cjs/fingerprint/FingerprintJs.d.ts.map +1 -0
- package/lib/cjs/fingerprint/FingerprintJs.js +5 -0
- package/lib/cjs/fingerprint/FingerprintJs.js.map +1 -0
- package/lib/cjs/index.d.ts +2 -0
- package/lib/cjs/index.d.ts.map +1 -0
- package/lib/cjs/index.js +21 -0
- package/lib/cjs/index.js.map +1 -0
- package/lib/cjs/middlewares/AttributeFilter.d.ts +11 -0
- package/lib/cjs/middlewares/AttributeFilter.d.ts.map +1 -0
- package/lib/cjs/middlewares/AttributeFilter.js +19 -0
- package/lib/cjs/middlewares/AttributeFilter.js.map +1 -0
- package/lib/cjs/package.json +1 -0
- package/lib/cjs/policies/2FaPolicy.d.ts +8 -0
- package/lib/cjs/policies/2FaPolicy.d.ts.map +1 -0
- package/lib/cjs/policies/2FaPolicy.js +32 -0
- package/lib/cjs/policies/2FaPolicy.js.map +1 -0
- package/lib/cjs/policies/AllowFederatedLoginPolicy.d.ts +7 -0
- package/lib/cjs/policies/AllowFederatedLoginPolicy.d.ts.map +1 -0
- package/lib/cjs/policies/AllowFederatedLoginPolicy.js +32 -0
- package/lib/cjs/policies/AllowFederatedLoginPolicy.js.map +1 -0
- package/lib/cjs/policies/CaptchaPolicy.d.ts +1 -0
- package/lib/cjs/policies/CaptchaPolicy.d.ts.map +1 -0
- package/lib/cjs/policies/CaptchaPolicy.js +1 -0
- package/lib/cjs/policies/CaptchaPolicy.js.map +1 -0
- package/lib/mjs/2fa/SpeakEasy2FaToken.d.ts +2 -0
- package/lib/mjs/2fa/SpeakEasy2FaToken.d.ts.map +1 -0
- package/lib/mjs/2fa/SpeakEasy2FaToken.js +49 -0
- package/lib/mjs/2fa/SpeakEasy2FaToken.js.map +1 -0
- package/lib/mjs/config/rbac-http.d.ts +34 -0
- package/lib/mjs/config/rbac-http.d.ts.map +1 -0
- package/lib/mjs/config/rbac-http.js +44 -0
- package/lib/mjs/config/rbac-http.js.map +1 -0
- package/lib/mjs/controllers/AuthController.d.ts +2 -0
- package/lib/mjs/controllers/AuthController.d.ts.map +1 -0
- package/lib/mjs/controllers/AuthController.js +212 -0
- package/lib/mjs/controllers/AuthController.js.map +1 -0
- package/lib/mjs/controllers/FederatedLoginController.d.ts +2 -0
- package/lib/mjs/controllers/FederatedLoginController.d.ts.map +1 -0
- package/lib/mjs/controllers/FederatedLoginController.js +39 -0
- package/lib/mjs/controllers/FederatedLoginController.js.map +1 -0
- package/lib/mjs/controllers/LoginController.d.ts +13 -0
- package/lib/mjs/controllers/LoginController.d.ts.map +1 -0
- package/lib/mjs/controllers/LoginController.js +199 -0
- package/lib/mjs/controllers/LoginController.js.map +1 -0
- package/lib/mjs/controllers/TwoFactorAuthController.d.ts +2 -0
- package/lib/mjs/controllers/TwoFactorAuthController.d.ts.map +1 -0
- package/lib/mjs/controllers/TwoFactorAuthController.js +58 -0
- package/lib/mjs/controllers/TwoFactorAuthController.js.map +1 -0
- package/lib/mjs/controllers/UserController.d.ts +2 -0
- package/lib/mjs/controllers/UserController.d.ts.map +1 -0
- package/lib/mjs/controllers/UserController.js +51 -0
- package/lib/mjs/controllers/UserController.js.map +1 -0
- package/lib/mjs/controllers/UserMetadata.d.ts +2 -0
- package/lib/mjs/controllers/UserMetadata.d.ts.map +1 -0
- package/lib/mjs/controllers/UserMetadata.js +36 -0
- package/lib/mjs/controllers/UserMetadata.js.map +1 -0
- package/lib/mjs/dto/login-dto.d.ts +17 -0
- package/lib/mjs/dto/login-dto.d.ts.map +1 -0
- package/lib/mjs/dto/login-dto.js +30 -0
- package/lib/mjs/dto/login-dto.js.map +1 -0
- package/lib/mjs/dto/password-dto.d.ts +30 -0
- package/lib/mjs/dto/password-dto.d.ts.map +1 -0
- package/lib/mjs/dto/password-dto.js +32 -0
- package/lib/mjs/dto/password-dto.js.map +1 -0
- package/lib/mjs/dto/restore-password-dto.d.ts +24 -0
- package/lib/mjs/dto/restore-password-dto.d.ts.map +1 -0
- package/lib/mjs/dto/restore-password-dto.js +31 -0
- package/lib/mjs/dto/restore-password-dto.js.map +1 -0
- package/lib/mjs/dto/token-dto.d.ts +16 -0
- package/lib/mjs/dto/token-dto.d.ts.map +1 -0
- package/lib/mjs/dto/token-dto.js +29 -0
- package/lib/mjs/dto/token-dto.js.map +1 -0
- package/lib/mjs/dto/user-dto.d.ts +22 -0
- package/lib/mjs/dto/user-dto.d.ts.map +1 -0
- package/lib/mjs/dto/user-dto.js +30 -0
- package/lib/mjs/dto/user-dto.js.map +1 -0
- package/lib/mjs/dto/userLogin-dto.d.ts +22 -0
- package/lib/mjs/dto/userLogin-dto.d.ts.map +1 -0
- package/lib/mjs/dto/userLogin-dto.js +31 -0
- package/lib/mjs/dto/userLogin-dto.js.map +1 -0
- package/lib/mjs/events/User2FaPassed.d.ts +4 -0
- package/lib/mjs/events/User2FaPassed.d.ts.map +1 -0
- package/lib/mjs/events/User2FaPassed.js +15 -0
- package/lib/mjs/events/User2FaPassed.js.map +1 -0
- package/lib/mjs/fingerprint/FingerprintJs.d.ts +2 -0
- package/lib/mjs/fingerprint/FingerprintJs.d.ts.map +1 -0
- package/lib/mjs/fingerprint/FingerprintJs.js +6 -0
- package/lib/mjs/fingerprint/FingerprintJs.js.map +1 -0
- package/lib/mjs/index.d.ts +2 -0
- package/lib/mjs/index.d.ts.map +1 -0
- package/lib/mjs/index.js +5 -0
- package/lib/mjs/index.js.map +1 -0
- package/lib/mjs/middlewares/AttributeFilter.d.ts +11 -0
- package/lib/mjs/middlewares/AttributeFilter.d.ts.map +1 -0
- package/lib/mjs/middlewares/AttributeFilter.js +15 -0
- package/lib/mjs/middlewares/AttributeFilter.js.map +1 -0
- package/lib/mjs/package.json +1 -0
- package/lib/mjs/policies/2FaPolicy.d.ts +8 -0
- package/lib/mjs/policies/2FaPolicy.d.ts.map +1 -0
- package/lib/mjs/policies/2FaPolicy.js +28 -0
- package/lib/mjs/policies/2FaPolicy.js.map +1 -0
- package/lib/mjs/policies/AllowFederatedLoginPolicy.d.ts +7 -0
- package/lib/mjs/policies/AllowFederatedLoginPolicy.d.ts.map +1 -0
- package/lib/mjs/policies/AllowFederatedLoginPolicy.js +28 -0
- package/lib/mjs/policies/AllowFederatedLoginPolicy.js.map +1 -0
- package/lib/mjs/policies/CaptchaPolicy.d.ts +2 -0
- package/lib/mjs/policies/CaptchaPolicy.d.ts.map +1 -0
- package/lib/mjs/policies/CaptchaPolicy.js +2 -0
- package/lib/mjs/policies/CaptchaPolicy.js.map +1 -0
- package/lib/tsconfig.cjs.tsbuildinfo +1 -0
- package/lib/tsconfig.mjs.tsbuildinfo +1 -0
- package/package.json +11 -11
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"TwoFactorAuthController.d.ts","sourceRoot":"","sources":["../../../src/controllers/TwoFactorAuthController.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1,57 @@
|
|
|
1
|
+
// import { TokenDto } from './../dto/token-dto.js';
|
|
2
|
+
// import { BaseController, BasePath, Cookie, Ok, Post, Unauthorized } from '@spinajs/http';
|
|
3
|
+
// import { ISession, SessionProvider, User as UserModel, _user_ev, _user_update} from '@spinajs/rbac';
|
|
4
|
+
// import { Session } from "@spinajs/rbac-http";
|
|
5
|
+
// import { Body, Policy } from '@spinajs/http';
|
|
6
|
+
// import _ from 'lodash';
|
|
7
|
+
// import { User } from '../decorators.js';
|
|
8
|
+
// import { TwoFacRouteEnabled } from '../policies/2FaPolicy.js';
|
|
9
|
+
// import { AutoinjectService, _service } from '@spinajs/configuration';
|
|
10
|
+
// import { TwoFactorAuthProvider } from '../interfaces.js';
|
|
11
|
+
// import { DateTime } from 'luxon';
|
|
12
|
+
// import { UserLoginSuccess } from '../events/UserLoginSuccess.js';
|
|
13
|
+
// import { Autoinject } from '@spinajs/di';
|
|
14
|
+
// import { QueueService } from '@spinajs/queue';
|
|
15
|
+
// import { _chain, _check_arg, _non_empty, _non_null, _tap, _trim, _use } from '@spinajs/util';
|
|
16
|
+
// import { User2FaPassed } from '../events/User2FaPassed.js';
|
|
17
|
+
// export async function auth2Fa(user: User, token: string) {
|
|
18
|
+
// user = _check_arg(_non_null())(user, 'user');
|
|
19
|
+
// token = _check_arg(_trim(), _non_empty)(token, 'token');
|
|
20
|
+
// return _chain(
|
|
21
|
+
// _use(_service<TwoFactorAuthProvider>('rbac.twoFactorAuth'), 'twoFa'),
|
|
22
|
+
// _tap(async ({ twoFa }: { twoFa: TwoFactorAuthProvider }) => {
|
|
23
|
+
// await twoFa.verifyToken(token, user);
|
|
24
|
+
// }),
|
|
25
|
+
// _user_update({
|
|
26
|
+
// LastLoginAt: DateTime.now()
|
|
27
|
+
// }),
|
|
28
|
+
// _user_ev(User2FaPassed)
|
|
29
|
+
// );
|
|
30
|
+
// }
|
|
31
|
+
// @BasePath('user/auth')
|
|
32
|
+
// @Policy(TwoFacRouteEnabled)
|
|
33
|
+
// export class TwoFactorAuthController extends BaseController {
|
|
34
|
+
// @Autoinject(QueueService)
|
|
35
|
+
// protected Queue: QueueService;
|
|
36
|
+
// @AutoinjectService('rbac.session')
|
|
37
|
+
// protected SessionProvider: SessionProvider;
|
|
38
|
+
// @AutoinjectService('rbac.twoFactorAuth')
|
|
39
|
+
// protected TwoFactorAuthProvider: TwoFactorAuthProvider;
|
|
40
|
+
// @Post('2fa/verify')
|
|
41
|
+
// public async verifyToken(@User() logged: UserModel, @Body() token: TokenDto, @Session() session : ISession) {
|
|
42
|
+
// const result = await this.TwoFactorAuthProvider.verifyToken(token.Token, logged);
|
|
43
|
+
// if (result) {
|
|
44
|
+
// return new Unauthorized(`invalid token`);
|
|
45
|
+
// }
|
|
46
|
+
// logged.LastLoginAt = DateTime.now();
|
|
47
|
+
// await logged.update();
|
|
48
|
+
// await this.Queue.emit(new UserLoginSuccess(logged.Uuid));
|
|
49
|
+
// await this.SessionProvider.save(ssid, {
|
|
50
|
+
// Authorized: true,
|
|
51
|
+
// TwoFactorAuth_check: true,
|
|
52
|
+
// });
|
|
53
|
+
// // return user data
|
|
54
|
+
// return new Ok(logged.dehydrate());
|
|
55
|
+
// }
|
|
56
|
+
// }
|
|
57
|
+
//# sourceMappingURL=TwoFactorAuthController.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"TwoFactorAuthController.js","sourceRoot":"","sources":["../../../src/controllers/TwoFactorAuthController.ts"],"names":[],"mappings":"AAAA,oDAAoD;AACpD,4FAA4F;AAC5F,uGAAuG;AACvG,gDAAgD;AAChD,gDAAgD;AAChD,0BAA0B;AAC1B,2CAA2C;AAC3C,iEAAiE;AACjE,wEAAwE;AACxE,4DAA4D;AAC5D,oCAAoC;AACpC,oEAAoE;AACpE,4CAA4C;AAC5C,iDAAiD;AACjD,gGAAgG;AAChG,8DAA8D;AAE9D,6DAA6D;AAC7D,kDAAkD;AAClD,6DAA6D;AAE7D,mBAAmB;AACnB,4EAA4E;AAC5E,oEAAoE;AACpE,8CAA8C;AAC9C,UAAU;AACV,qBAAqB;AACrB,oCAAoC;AACpC,UAAU;AACV,8BAA8B;AAC9B,OAAO;AACP,IAAI;AAEJ,yBAAyB;AACzB,8BAA8B;AAC9B,gEAAgE;AAChE,8BAA8B;AAC9B,mCAAmC;AAEnC,uCAAuC;AACvC,gDAAgD;AAEhD,6CAA6C;AAC7C,4DAA4D;AAE5D,wBAAwB;AACxB,kHAAkH;AAClH,wFAAwF;AAExF,oBAAoB;AACpB,kDAAkD;AAClD,QAAQ;AAER,2CAA2C;AAC3C,6BAA6B;AAE7B,gEAAgE;AAEhE,8CAA8C;AAC9C,0BAA0B;AAC1B,mCAAmC;AACnC,UAAU;AAEV,0BAA0B;AAC1B,yCAAyC;AACzC,MAAM;AACN,IAAI"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
//# sourceMappingURL=UserController.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"UserController.d.ts","sourceRoot":"","sources":["../../../src/controllers/UserController.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1,50 @@
|
|
|
1
|
+
// import { PasswordDto } from '../dto/password-dto.js';
|
|
2
|
+
// import { User as UserModel, PasswordProvider, SessionProvider } from '@spinajs/rbac';
|
|
3
|
+
// import { BaseController, BasePath, Get, Ok, Body, Patch, Cookie } from '@spinajs/http';
|
|
4
|
+
// import { InvalidArgument, Forbidden } from '@spinajs/exceptions';
|
|
5
|
+
// import { Autoinject } from '@spinajs/di';
|
|
6
|
+
// import { Permission, User, Resource } from '../decorators.js';
|
|
7
|
+
// import { Config } from '@spinajs/configuration';
|
|
8
|
+
// import * as cs from 'cookie-signature';
|
|
9
|
+
// import _ from 'lodash';
|
|
10
|
+
// @BasePath('user')
|
|
11
|
+
// @Resource('user')
|
|
12
|
+
// export class UserController extends BaseController {
|
|
13
|
+
// @Autoinject()
|
|
14
|
+
// protected PasswordProvider: PasswordProvider;
|
|
15
|
+
// @Config('http.cookie.secret')
|
|
16
|
+
// protected CoockieSecret: string;
|
|
17
|
+
// @Autoinject()
|
|
18
|
+
// protected SessionProvider: SessionProvider;
|
|
19
|
+
// @Get()
|
|
20
|
+
// @Permission('readOwn')
|
|
21
|
+
// public async refresh(@User() user: UserModel, @Cookie() ssid: string) {
|
|
22
|
+
// // get user data from db
|
|
23
|
+
// await user.refresh();
|
|
24
|
+
// await user.Metadata.populate();
|
|
25
|
+
// // refresh session data from DB
|
|
26
|
+
// const sId: string | false = cs.unsign(ssid, this.CoockieSecret);
|
|
27
|
+
// if (sId) {
|
|
28
|
+
// const session = await this.SessionProvider.restore(sId);
|
|
29
|
+
// if (session) {
|
|
30
|
+
// session.Data.set('User', user.dehydrate());
|
|
31
|
+
// }
|
|
32
|
+
// }
|
|
33
|
+
// return new Ok(user.dehydrate());
|
|
34
|
+
// }
|
|
35
|
+
// @Patch('/password')
|
|
36
|
+
// public async newPassword(@User() user: UserModel, @Body() pwd: PasswordDto) {
|
|
37
|
+
// if (pwd.Password !== pwd.ConfirmPassword) {
|
|
38
|
+
// throw new InvalidArgument('password does not match');
|
|
39
|
+
// }
|
|
40
|
+
// const isValid = await this.PasswordProvider.verify(user.Password, pwd.OldPassword);
|
|
41
|
+
// if (!isValid) {
|
|
42
|
+
// throw new Forbidden('old password do not match');
|
|
43
|
+
// }
|
|
44
|
+
// const hashedPassword = await this.PasswordProvider.hash(pwd.Password);
|
|
45
|
+
// user.Password = hashedPassword;
|
|
46
|
+
// await user.update();
|
|
47
|
+
// return new Ok();
|
|
48
|
+
// }
|
|
49
|
+
// }
|
|
50
|
+
//# sourceMappingURL=UserController.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"UserController.js","sourceRoot":"","sources":["../../../src/controllers/UserController.ts"],"names":[],"mappings":"AAAA,wDAAwD;AACxD,wFAAwF;AACxF,0FAA0F;AAC1F,oEAAoE;AACpE,4CAA4C;AAC5C,iEAAiE;AACjE,mDAAmD;AACnD,0CAA0C;AAC1C,0BAA0B;AAE1B,oBAAoB;AACpB,oBAAoB;AACpB,uDAAuD;AACvD,kBAAkB;AAClB,kDAAkD;AAElD,kCAAkC;AAClC,qCAAqC;AAErC,kBAAkB;AAClB,gDAAgD;AAEhD,WAAW;AACX,2BAA2B;AAC3B,4EAA4E;AAC5E,+BAA+B;AAC/B,4BAA4B;AAC5B,sCAAsC;AAEtC,sCAAsC;AACtC,uEAAuE;AACvE,iBAAiB;AACjB,iEAAiE;AACjE,uBAAuB;AACvB,sDAAsD;AACtD,UAAU;AACV,QAAQ;AAER,uCAAuC;AACvC,MAAM;AAEN,wBAAwB;AACxB,kFAAkF;AAClF,kDAAkD;AAClD,8DAA8D;AAC9D,QAAQ;AAER,0FAA0F;AAE1F,sBAAsB;AACtB,0DAA0D;AAC1D,QAAQ;AAER,6EAA6E;AAC7E,sCAAsC;AACtC,2BAA2B;AAC3B,uBAAuB;AACvB,MAAM;AACN,IAAI"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
//# sourceMappingURL=UserMetadata.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"UserMetadata.d.ts","sourceRoot":"","sources":["../../../src/controllers/UserMetadata.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1,35 @@
|
|
|
1
|
+
// import { Put, Post, BasePath, Ok, Forbidden } from '@spinajs/http';
|
|
2
|
+
// import { User as UserModel, UserMetadata } from '@spinajs/rbac';
|
|
3
|
+
// import { Permission, User, Resource } from '../decorators.js';
|
|
4
|
+
// import { FromModel, AsModel } from '@spinajs/orm-http';
|
|
5
|
+
// @BasePath('user/:user/metadata')
|
|
6
|
+
// @Resource('user.metadata')
|
|
7
|
+
// export class UserMetaController {
|
|
8
|
+
// @Post()
|
|
9
|
+
// @Permission('updateOwn')
|
|
10
|
+
// public async addMetadata(@User() logged: UserModel, @FromModel() user: UserModel, @AsModel() meta: UserMetadata) {
|
|
11
|
+
// if (logged.Id !== user.Id) {
|
|
12
|
+
// throw new Forbidden('cannot add metadata to another user');
|
|
13
|
+
// }
|
|
14
|
+
// await user.Metadata.add(meta);
|
|
15
|
+
// return new Ok(meta);
|
|
16
|
+
// }
|
|
17
|
+
// @Put('user/:user/metadata/:meta')
|
|
18
|
+
// @Permission('updateOwn')
|
|
19
|
+
// public async updateMetadata(@User() logged: UserModel, @FromModel() user: UserModel, @FromModel() meta: UserMetadata) {
|
|
20
|
+
// if (logged.Id !== user.Id) {
|
|
21
|
+
// throw new Forbidden('cannot add metadata to another user');
|
|
22
|
+
// }
|
|
23
|
+
// await meta.User.populate();
|
|
24
|
+
// if (meta.User.Value.Id !== logged.Id) {
|
|
25
|
+
// throw new Forbidden('cannot edit metadata that is not own by user');
|
|
26
|
+
// }
|
|
27
|
+
// await meta.update();
|
|
28
|
+
// return new Ok();
|
|
29
|
+
// }
|
|
30
|
+
// }
|
|
31
|
+
// // function userOwnerPermissionStrategy(){
|
|
32
|
+
// // // 1. obtain current logged user
|
|
33
|
+
// // // 2. find
|
|
34
|
+
// // }
|
|
35
|
+
//# sourceMappingURL=UserMetadata.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"UserMetadata.js","sourceRoot":"","sources":["../../../src/controllers/UserMetadata.ts"],"names":[],"mappings":"AAAA,sEAAsE;AACtE,mEAAmE;AACnE,iEAAiE;AACjE,0DAA0D;AAE1D,mCAAmC;AACnC,6BAA6B;AAC7B,oCAAoC;AAEpC,YAAY;AACZ,6BAA6B;AAC7B,uHAAuH;AACvH,mCAAmC;AACnC,oEAAoE;AACpE,QAAQ;AAER,qCAAqC;AACrC,2BAA2B;AAC3B,MAAM;AAEN,sCAAsC;AACtC,6BAA6B;AAC7B,4HAA4H;AAC5H,mCAAmC;AACnC,oEAAoE;AACpE,QAAQ;AAER,kCAAkC;AAClC,8CAA8C;AAC9C,6EAA6E;AAC7E,QAAQ;AAER,2BAA2B;AAE3B,uBAAuB;AACvB,MAAM;AACN,IAAI;AAEJ,6CAA6C;AAE7C,yCAAyC;AACzC,mBAAmB;AAEnB,OAAO"}
|
|
@@ -0,0 +1,17 @@
|
|
|
1
|
+
export declare const LoginDtoSchema: {
|
|
2
|
+
$schema: string;
|
|
3
|
+
title: string;
|
|
4
|
+
type: string;
|
|
5
|
+
properties: {
|
|
6
|
+
Login: {
|
|
7
|
+
type: string;
|
|
8
|
+
format: string;
|
|
9
|
+
};
|
|
10
|
+
};
|
|
11
|
+
required: string[];
|
|
12
|
+
};
|
|
13
|
+
export declare class UserLoginDto {
|
|
14
|
+
Email: string;
|
|
15
|
+
constructor(data: any);
|
|
16
|
+
}
|
|
17
|
+
//# sourceMappingURL=login-dto.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"login-dto.d.ts","sourceRoot":"","sources":["../../../src/dto/login-dto.ts"],"names":[],"mappings":"AAEA,eAAO,MAAM,cAAc;;;;;;;;;;;CAQ1B,CAAC;AAEF,qBACa,YAAY;IAChB,KAAK,EAAE,MAAM,CAAC;gBAET,IAAI,EAAE,GAAG;CAGtB"}
|
|
@@ -0,0 +1,33 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __decorate = (this && this.__decorate) || function (decorators, target, key, desc) {
|
|
3
|
+
var c = arguments.length, r = c < 3 ? target : desc === null ? desc = Object.getOwnPropertyDescriptor(target, key) : desc, d;
|
|
4
|
+
if (typeof Reflect === "object" && typeof Reflect.decorate === "function") r = Reflect.decorate(decorators, target, key, desc);
|
|
5
|
+
else for (var i = decorators.length - 1; i >= 0; i--) if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;
|
|
6
|
+
return c > 3 && r && Object.defineProperty(target, key, r), r;
|
|
7
|
+
};
|
|
8
|
+
var __metadata = (this && this.__metadata) || function (k, v) {
|
|
9
|
+
if (typeof Reflect === "object" && typeof Reflect.metadata === "function") return Reflect.metadata(k, v);
|
|
10
|
+
};
|
|
11
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
12
|
+
exports.UserLoginDto = exports.LoginDtoSchema = void 0;
|
|
13
|
+
const validation_1 = require("@spinajs/validation");
|
|
14
|
+
exports.LoginDtoSchema = {
|
|
15
|
+
$schema: 'http://json-schema.org/draft-07/schema#',
|
|
16
|
+
title: 'login DTO',
|
|
17
|
+
type: 'object',
|
|
18
|
+
properties: {
|
|
19
|
+
Login: { type: 'string', format: 'email' },
|
|
20
|
+
},
|
|
21
|
+
required: ['Email'],
|
|
22
|
+
};
|
|
23
|
+
let UserLoginDto = class UserLoginDto {
|
|
24
|
+
constructor(data) {
|
|
25
|
+
Object.assign(this, data);
|
|
26
|
+
}
|
|
27
|
+
};
|
|
28
|
+
exports.UserLoginDto = UserLoginDto;
|
|
29
|
+
exports.UserLoginDto = UserLoginDto = __decorate([
|
|
30
|
+
(0, validation_1.Schema)(exports.LoginDtoSchema),
|
|
31
|
+
__metadata("design:paramtypes", [Object])
|
|
32
|
+
], UserLoginDto);
|
|
33
|
+
//# sourceMappingURL=login-dto.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"login-dto.js","sourceRoot":"","sources":["../../../src/dto/login-dto.ts"],"names":[],"mappings":";;;;;;;;;;;;AAAA,oDAA6C;AAEhC,QAAA,cAAc,GAAG;IAC5B,OAAO,EAAE,yCAAyC;IAClD,KAAK,EAAE,WAAW;IAClB,IAAI,EAAE,QAAQ;IACd,UAAU,EAAE;QACV,KAAK,EAAE,EAAE,IAAI,EAAE,QAAQ,EAAE,MAAM,EAAE,OAAO,EAAE;KAC3C;IACD,QAAQ,EAAE,CAAC,OAAO,CAAC;CACpB,CAAC;AAGK,IAAM,YAAY,GAAlB,MAAM,YAAY;IAGvB,YAAY,IAAS;QACnB,MAAM,CAAC,MAAM,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;IAC5B,CAAC;CACF,CAAA;AANY,oCAAY;uBAAZ,YAAY;IADxB,IAAA,mBAAM,EAAC,sBAAc,CAAC;;GACV,YAAY,CAMxB"}
|
|
@@ -0,0 +1,30 @@
|
|
|
1
|
+
export declare const PasswordDtoSchema: {
|
|
2
|
+
$schema: string;
|
|
3
|
+
title: string;
|
|
4
|
+
type: string;
|
|
5
|
+
properties: {
|
|
6
|
+
OldPassword: {
|
|
7
|
+
type: string;
|
|
8
|
+
maxLength: number;
|
|
9
|
+
minLength: number;
|
|
10
|
+
};
|
|
11
|
+
Password: {
|
|
12
|
+
type: string;
|
|
13
|
+
maxLength: number;
|
|
14
|
+
minLength: number;
|
|
15
|
+
};
|
|
16
|
+
ConfirmPassword: {
|
|
17
|
+
type: string;
|
|
18
|
+
maxLength: number;
|
|
19
|
+
minLength: number;
|
|
20
|
+
};
|
|
21
|
+
};
|
|
22
|
+
required: string[];
|
|
23
|
+
};
|
|
24
|
+
export declare class PasswordDto {
|
|
25
|
+
OldPassword: string;
|
|
26
|
+
Password: string;
|
|
27
|
+
ConfirmPassword: string;
|
|
28
|
+
constructor(data: any);
|
|
29
|
+
}
|
|
30
|
+
//# sourceMappingURL=password-dto.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"password-dto.d.ts","sourceRoot":"","sources":["../../../src/dto/password-dto.ts"],"names":[],"mappings":"AAEA,eAAO,MAAM,iBAAiB;;;;;;;;;;;;;;;;;;;;;;CAU7B,CAAC;AAEF,qBACa,WAAW;IACf,WAAW,EAAE,MAAM,CAAC;IAEpB,QAAQ,EAAE,MAAM,CAAC;IAEjB,eAAe,EAAE,MAAM,CAAC;gBAEnB,IAAI,EAAE,GAAG;CAGtB"}
|
|
@@ -0,0 +1,35 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __decorate = (this && this.__decorate) || function (decorators, target, key, desc) {
|
|
3
|
+
var c = arguments.length, r = c < 3 ? target : desc === null ? desc = Object.getOwnPropertyDescriptor(target, key) : desc, d;
|
|
4
|
+
if (typeof Reflect === "object" && typeof Reflect.decorate === "function") r = Reflect.decorate(decorators, target, key, desc);
|
|
5
|
+
else for (var i = decorators.length - 1; i >= 0; i--) if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;
|
|
6
|
+
return c > 3 && r && Object.defineProperty(target, key, r), r;
|
|
7
|
+
};
|
|
8
|
+
var __metadata = (this && this.__metadata) || function (k, v) {
|
|
9
|
+
if (typeof Reflect === "object" && typeof Reflect.metadata === "function") return Reflect.metadata(k, v);
|
|
10
|
+
};
|
|
11
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
12
|
+
exports.PasswordDto = exports.PasswordDtoSchema = void 0;
|
|
13
|
+
const validation_1 = require("@spinajs/validation");
|
|
14
|
+
exports.PasswordDtoSchema = {
|
|
15
|
+
$schema: 'http://json-schema.org/draft-07/schema#',
|
|
16
|
+
title: 'User password DTO',
|
|
17
|
+
type: 'object',
|
|
18
|
+
properties: {
|
|
19
|
+
OldPassword: { type: 'string', maxLength: 32, minLength: 6 },
|
|
20
|
+
Password: { type: 'string', maxLength: 32, minLength: 6 },
|
|
21
|
+
ConfirmPassword: { type: 'string', maxLength: 32, minLength: 6 },
|
|
22
|
+
},
|
|
23
|
+
required: ['OldPassword', 'Password', 'ConfirmPassword'],
|
|
24
|
+
};
|
|
25
|
+
let PasswordDto = class PasswordDto {
|
|
26
|
+
constructor(data) {
|
|
27
|
+
Object.assign(this, data);
|
|
28
|
+
}
|
|
29
|
+
};
|
|
30
|
+
exports.PasswordDto = PasswordDto;
|
|
31
|
+
exports.PasswordDto = PasswordDto = __decorate([
|
|
32
|
+
(0, validation_1.Schema)(exports.PasswordDtoSchema),
|
|
33
|
+
__metadata("design:paramtypes", [Object])
|
|
34
|
+
], PasswordDto);
|
|
35
|
+
//# sourceMappingURL=password-dto.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"password-dto.js","sourceRoot":"","sources":["../../../src/dto/password-dto.ts"],"names":[],"mappings":";;;;;;;;;;;;AAAA,oDAA6C;AAEhC,QAAA,iBAAiB,GAAG;IAC/B,OAAO,EAAE,yCAAyC;IAClD,KAAK,EAAE,mBAAmB;IAC1B,IAAI,EAAE,QAAQ;IACd,UAAU,EAAE;QACV,WAAW,EAAE,EAAE,IAAI,EAAE,QAAQ,EAAE,SAAS,EAAE,EAAE,EAAE,SAAS,EAAE,CAAC,EAAE;QAC5D,QAAQ,EAAE,EAAE,IAAI,EAAE,QAAQ,EAAE,SAAS,EAAE,EAAE,EAAE,SAAS,EAAE,CAAC,EAAE;QACzD,eAAe,EAAE,EAAE,IAAI,EAAE,QAAQ,EAAE,SAAS,EAAE,EAAE,EAAE,SAAS,EAAE,CAAC,EAAE;KACjE;IACD,QAAQ,EAAE,CAAC,aAAa,EAAE,UAAU,EAAE,iBAAiB,CAAC;CACzD,CAAC;AAGK,IAAM,WAAW,GAAjB,MAAM,WAAW;IAOtB,YAAY,IAAS;QACnB,MAAM,CAAC,MAAM,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;IAC5B,CAAC;CACF,CAAA;AAVY,kCAAW;sBAAX,WAAW;IADvB,IAAA,mBAAM,EAAC,yBAAiB,CAAC;;GACb,WAAW,CAUvB"}
|
|
@@ -0,0 +1,24 @@
|
|
|
1
|
+
export declare const RestorePasswordDtoSchema: {
|
|
2
|
+
$schema: string;
|
|
3
|
+
title: string;
|
|
4
|
+
type: string;
|
|
5
|
+
properties: {
|
|
6
|
+
Password: {
|
|
7
|
+
type: string;
|
|
8
|
+
maxLength: number;
|
|
9
|
+
minLength: number;
|
|
10
|
+
};
|
|
11
|
+
ConfirmPassword: {
|
|
12
|
+
type: string;
|
|
13
|
+
maxLength: number;
|
|
14
|
+
minLength: number;
|
|
15
|
+
};
|
|
16
|
+
};
|
|
17
|
+
required: string[];
|
|
18
|
+
};
|
|
19
|
+
export declare class RestorePasswordDto {
|
|
20
|
+
Password: string;
|
|
21
|
+
ConfirmPassword: string;
|
|
22
|
+
constructor(data: any);
|
|
23
|
+
}
|
|
24
|
+
//# sourceMappingURL=restore-password-dto.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"restore-password-dto.d.ts","sourceRoot":"","sources":["../../../src/dto/restore-password-dto.ts"],"names":[],"mappings":"AAEA,eAAO,MAAM,wBAAwB;;;;;;;;;;;;;;;;;CASpC,CAAC;AAEF,qBACa,kBAAkB;IACtB,QAAQ,EAAE,MAAM,CAAC;IAEjB,eAAe,EAAE,MAAM,CAAC;gBAEnB,IAAI,EAAE,GAAG;CAGtB"}
|
|
@@ -0,0 +1,34 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __decorate = (this && this.__decorate) || function (decorators, target, key, desc) {
|
|
3
|
+
var c = arguments.length, r = c < 3 ? target : desc === null ? desc = Object.getOwnPropertyDescriptor(target, key) : desc, d;
|
|
4
|
+
if (typeof Reflect === "object" && typeof Reflect.decorate === "function") r = Reflect.decorate(decorators, target, key, desc);
|
|
5
|
+
else for (var i = decorators.length - 1; i >= 0; i--) if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;
|
|
6
|
+
return c > 3 && r && Object.defineProperty(target, key, r), r;
|
|
7
|
+
};
|
|
8
|
+
var __metadata = (this && this.__metadata) || function (k, v) {
|
|
9
|
+
if (typeof Reflect === "object" && typeof Reflect.metadata === "function") return Reflect.metadata(k, v);
|
|
10
|
+
};
|
|
11
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
12
|
+
exports.RestorePasswordDto = exports.RestorePasswordDtoSchema = void 0;
|
|
13
|
+
const validation_1 = require("@spinajs/validation");
|
|
14
|
+
exports.RestorePasswordDtoSchema = {
|
|
15
|
+
$schema: 'http://json-schema.org/draft-07/schema#',
|
|
16
|
+
title: 'User password DTO',
|
|
17
|
+
type: 'object',
|
|
18
|
+
properties: {
|
|
19
|
+
Password: { type: 'string', maxLength: 32, minLength: 6 },
|
|
20
|
+
ConfirmPassword: { type: 'string', maxLength: 32, minLength: 6 },
|
|
21
|
+
},
|
|
22
|
+
required: ['Password', 'ConfirmPassword'],
|
|
23
|
+
};
|
|
24
|
+
let RestorePasswordDto = class RestorePasswordDto {
|
|
25
|
+
constructor(data) {
|
|
26
|
+
Object.assign(this, data);
|
|
27
|
+
}
|
|
28
|
+
};
|
|
29
|
+
exports.RestorePasswordDto = RestorePasswordDto;
|
|
30
|
+
exports.RestorePasswordDto = RestorePasswordDto = __decorate([
|
|
31
|
+
(0, validation_1.Schema)(exports.RestorePasswordDtoSchema),
|
|
32
|
+
__metadata("design:paramtypes", [Object])
|
|
33
|
+
], RestorePasswordDto);
|
|
34
|
+
//# sourceMappingURL=restore-password-dto.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"restore-password-dto.js","sourceRoot":"","sources":["../../../src/dto/restore-password-dto.ts"],"names":[],"mappings":";;;;;;;;;;;;AAAA,oDAA6C;AAEhC,QAAA,wBAAwB,GAAG;IACtC,OAAO,EAAE,yCAAyC;IAClD,KAAK,EAAE,mBAAmB;IAC1B,IAAI,EAAE,QAAQ;IACd,UAAU,EAAE;QACV,QAAQ,EAAE,EAAE,IAAI,EAAE,QAAQ,EAAE,SAAS,EAAE,EAAE,EAAE,SAAS,EAAE,CAAC,EAAE;QACzD,eAAe,EAAE,EAAE,IAAI,EAAE,QAAQ,EAAE,SAAS,EAAE,EAAE,EAAE,SAAS,EAAE,CAAC,EAAE;KACjE;IACD,QAAQ,EAAE,CAAC,UAAU,EAAE,iBAAiB,CAAC;CAC1C,CAAC;AAGK,IAAM,kBAAkB,GAAxB,MAAM,kBAAkB;IAK7B,YAAY,IAAS;QACnB,MAAM,CAAC,MAAM,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;IAC5B,CAAC;CACF,CAAA;AARY,gDAAkB;6BAAlB,kBAAkB;IAD9B,IAAA,mBAAM,EAAC,gCAAwB,CAAC;;GACpB,kBAAkB,CAQ9B"}
|
|
@@ -0,0 +1,16 @@
|
|
|
1
|
+
export declare const TokenDtoSchema: {
|
|
2
|
+
$schema: string;
|
|
3
|
+
title: string;
|
|
4
|
+
type: string;
|
|
5
|
+
properties: {
|
|
6
|
+
Token: {
|
|
7
|
+
type: string;
|
|
8
|
+
maxLength: number;
|
|
9
|
+
};
|
|
10
|
+
};
|
|
11
|
+
};
|
|
12
|
+
export declare class TokenDto {
|
|
13
|
+
Token: string;
|
|
14
|
+
constructor(data: any);
|
|
15
|
+
}
|
|
16
|
+
//# sourceMappingURL=token-dto.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"token-dto.d.ts","sourceRoot":"","sources":["../../../src/dto/token-dto.ts"],"names":[],"mappings":"AACA,eAAO,MAAM,cAAc;;;;;;;;;;CAO1B,CAAC;AAEF,qBACa,QAAQ;IACZ,KAAK,EAAE,MAAM,CAAC;gBAET,IAAI,EAAE,GAAG;CAGtB"}
|
|
@@ -0,0 +1,32 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __decorate = (this && this.__decorate) || function (decorators, target, key, desc) {
|
|
3
|
+
var c = arguments.length, r = c < 3 ? target : desc === null ? desc = Object.getOwnPropertyDescriptor(target, key) : desc, d;
|
|
4
|
+
if (typeof Reflect === "object" && typeof Reflect.decorate === "function") r = Reflect.decorate(decorators, target, key, desc);
|
|
5
|
+
else for (var i = decorators.length - 1; i >= 0; i--) if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;
|
|
6
|
+
return c > 3 && r && Object.defineProperty(target, key, r), r;
|
|
7
|
+
};
|
|
8
|
+
var __metadata = (this && this.__metadata) || function (k, v) {
|
|
9
|
+
if (typeof Reflect === "object" && typeof Reflect.metadata === "function") return Reflect.metadata(k, v);
|
|
10
|
+
};
|
|
11
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
12
|
+
exports.TokenDto = exports.TokenDtoSchema = void 0;
|
|
13
|
+
const validation_1 = require("@spinajs/validation");
|
|
14
|
+
exports.TokenDtoSchema = {
|
|
15
|
+
$schema: 'http://json-schema.org/draft-07/schema#',
|
|
16
|
+
title: 'Token DTO',
|
|
17
|
+
type: 'object',
|
|
18
|
+
properties: {
|
|
19
|
+
Token: { type: 'string', maxLength: 64 },
|
|
20
|
+
},
|
|
21
|
+
};
|
|
22
|
+
let TokenDto = class TokenDto {
|
|
23
|
+
constructor(data) {
|
|
24
|
+
Object.assign(this, data);
|
|
25
|
+
}
|
|
26
|
+
};
|
|
27
|
+
exports.TokenDto = TokenDto;
|
|
28
|
+
exports.TokenDto = TokenDto = __decorate([
|
|
29
|
+
(0, validation_1.Schema)(exports.TokenDtoSchema),
|
|
30
|
+
__metadata("design:paramtypes", [Object])
|
|
31
|
+
], TokenDto);
|
|
32
|
+
//# sourceMappingURL=token-dto.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"token-dto.js","sourceRoot":"","sources":["../../../src/dto/token-dto.ts"],"names":[],"mappings":";;;;;;;;;;;;AAAA,oDAA6C;AAChC,QAAA,cAAc,GAAG;IAC5B,OAAO,EAAE,yCAAyC;IAClD,KAAK,EAAE,WAAW;IAClB,IAAI,EAAE,QAAQ;IACd,UAAU,EAAE;QACV,KAAK,EAAE,EAAE,IAAI,EAAE,QAAQ,EAAE,SAAS,EAAE,EAAE,EAAE;KACzC;CACF,CAAC;AAGK,IAAM,QAAQ,GAAd,MAAM,QAAQ;IAGnB,YAAY,IAAS;QACnB,MAAM,CAAC,MAAM,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;IAC5B,CAAC;CACF,CAAA;AANY,4BAAQ;mBAAR,QAAQ;IADpB,IAAA,mBAAM,EAAC,sBAAc,CAAC;;GACV,QAAQ,CAMpB"}
|
|
@@ -0,0 +1,22 @@
|
|
|
1
|
+
export declare const UserDtoSchema: {
|
|
2
|
+
$schema: string;
|
|
3
|
+
title: string;
|
|
4
|
+
type: string;
|
|
5
|
+
properties: {
|
|
6
|
+
Email: {
|
|
7
|
+
type: string;
|
|
8
|
+
format: string;
|
|
9
|
+
maxLength: number;
|
|
10
|
+
};
|
|
11
|
+
Login: {
|
|
12
|
+
type: string;
|
|
13
|
+
maxLength: number;
|
|
14
|
+
};
|
|
15
|
+
};
|
|
16
|
+
};
|
|
17
|
+
export declare class UserDto {
|
|
18
|
+
Email: string;
|
|
19
|
+
Login: string;
|
|
20
|
+
constructor(data: any);
|
|
21
|
+
}
|
|
22
|
+
//# sourceMappingURL=user-dto.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"user-dto.d.ts","sourceRoot":"","sources":["../../../src/dto/user-dto.ts"],"names":[],"mappings":"AACA,eAAO,MAAM,aAAa;;;;;;;;;;;;;;;CAQzB,CAAC;AAEF,qBACa,OAAO;IACX,KAAK,EAAE,MAAM,CAAC;IAEd,KAAK,EAAE,MAAM,CAAC;gBAET,IAAI,EAAE,GAAG;CAGtB"}
|
|
@@ -0,0 +1,33 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __decorate = (this && this.__decorate) || function (decorators, target, key, desc) {
|
|
3
|
+
var c = arguments.length, r = c < 3 ? target : desc === null ? desc = Object.getOwnPropertyDescriptor(target, key) : desc, d;
|
|
4
|
+
if (typeof Reflect === "object" && typeof Reflect.decorate === "function") r = Reflect.decorate(decorators, target, key, desc);
|
|
5
|
+
else for (var i = decorators.length - 1; i >= 0; i--) if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;
|
|
6
|
+
return c > 3 && r && Object.defineProperty(target, key, r), r;
|
|
7
|
+
};
|
|
8
|
+
var __metadata = (this && this.__metadata) || function (k, v) {
|
|
9
|
+
if (typeof Reflect === "object" && typeof Reflect.metadata === "function") return Reflect.metadata(k, v);
|
|
10
|
+
};
|
|
11
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
12
|
+
exports.UserDto = exports.UserDtoSchema = void 0;
|
|
13
|
+
const validation_1 = require("@spinajs/validation");
|
|
14
|
+
exports.UserDtoSchema = {
|
|
15
|
+
$schema: 'http://json-schema.org/draft-07/schema#',
|
|
16
|
+
title: 'User DTO',
|
|
17
|
+
type: 'object',
|
|
18
|
+
properties: {
|
|
19
|
+
Email: { type: 'string', format: 'email', maxLength: 64 },
|
|
20
|
+
Login: { type: 'string', maxLength: 64 },
|
|
21
|
+
},
|
|
22
|
+
};
|
|
23
|
+
let UserDto = class UserDto {
|
|
24
|
+
constructor(data) {
|
|
25
|
+
Object.assign(this, data);
|
|
26
|
+
}
|
|
27
|
+
};
|
|
28
|
+
exports.UserDto = UserDto;
|
|
29
|
+
exports.UserDto = UserDto = __decorate([
|
|
30
|
+
(0, validation_1.Schema)(exports.UserDtoSchema),
|
|
31
|
+
__metadata("design:paramtypes", [Object])
|
|
32
|
+
], UserDto);
|
|
33
|
+
//# sourceMappingURL=user-dto.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"user-dto.js","sourceRoot":"","sources":["../../../src/dto/user-dto.ts"],"names":[],"mappings":";;;;;;;;;;;;AAAA,oDAA6C;AAChC,QAAA,aAAa,GAAG;IAC3B,OAAO,EAAE,yCAAyC;IAClD,KAAK,EAAE,UAAU;IACjB,IAAI,EAAE,QAAQ;IACd,UAAU,EAAE;QACV,KAAK,EAAE,EAAE,IAAI,EAAE,QAAQ,EAAE,MAAM,EAAE,OAAO,EAAE,SAAS,EAAE,EAAE,EAAE;QACzD,KAAK,EAAE,EAAE,IAAI,EAAE,QAAQ,EAAE,SAAS,EAAE,EAAE,EAAE;KACzC;CACF,CAAC;AAGK,IAAM,OAAO,GAAb,MAAM,OAAO;IAKlB,YAAY,IAAS;QACnB,MAAM,CAAC,MAAM,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;IAC5B,CAAC;CACF,CAAA;AARY,0BAAO;kBAAP,OAAO;IADnB,IAAA,mBAAM,EAAC,qBAAa,CAAC;;GACT,OAAO,CAQnB"}
|
|
@@ -0,0 +1,22 @@
|
|
|
1
|
+
export declare const UserLoginDtoSchema: {
|
|
2
|
+
$schema: string;
|
|
3
|
+
title: string;
|
|
4
|
+
type: string;
|
|
5
|
+
properties: {
|
|
6
|
+
Login: {
|
|
7
|
+
type: string;
|
|
8
|
+
format: string;
|
|
9
|
+
};
|
|
10
|
+
Password: {
|
|
11
|
+
type: string;
|
|
12
|
+
maxLength: number;
|
|
13
|
+
};
|
|
14
|
+
};
|
|
15
|
+
required: string[];
|
|
16
|
+
};
|
|
17
|
+
export declare class UserLoginDto {
|
|
18
|
+
Email: string;
|
|
19
|
+
Password: string;
|
|
20
|
+
constructor(data: any);
|
|
21
|
+
}
|
|
22
|
+
//# sourceMappingURL=userLogin-dto.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"userLogin-dto.d.ts","sourceRoot":"","sources":["../../../src/dto/userLogin-dto.ts"],"names":[],"mappings":"AAEA,eAAO,MAAM,kBAAkB;;;;;;;;;;;;;;;CAS9B,CAAC;AAEF,qBACa,YAAY;IAChB,KAAK,EAAE,MAAM,CAAC;IAEd,QAAQ,EAAE,MAAM,CAAC;gBAEZ,IAAI,EAAE,GAAG;CAGtB"}
|
|
@@ -0,0 +1,34 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __decorate = (this && this.__decorate) || function (decorators, target, key, desc) {
|
|
3
|
+
var c = arguments.length, r = c < 3 ? target : desc === null ? desc = Object.getOwnPropertyDescriptor(target, key) : desc, d;
|
|
4
|
+
if (typeof Reflect === "object" && typeof Reflect.decorate === "function") r = Reflect.decorate(decorators, target, key, desc);
|
|
5
|
+
else for (var i = decorators.length - 1; i >= 0; i--) if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;
|
|
6
|
+
return c > 3 && r && Object.defineProperty(target, key, r), r;
|
|
7
|
+
};
|
|
8
|
+
var __metadata = (this && this.__metadata) || function (k, v) {
|
|
9
|
+
if (typeof Reflect === "object" && typeof Reflect.metadata === "function") return Reflect.metadata(k, v);
|
|
10
|
+
};
|
|
11
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
12
|
+
exports.UserLoginDto = exports.UserLoginDtoSchema = void 0;
|
|
13
|
+
const validation_1 = require("@spinajs/validation");
|
|
14
|
+
exports.UserLoginDtoSchema = {
|
|
15
|
+
$schema: 'http://json-schema.org/draft-07/schema#',
|
|
16
|
+
title: 'User login DTO',
|
|
17
|
+
type: 'object',
|
|
18
|
+
properties: {
|
|
19
|
+
Login: { type: 'string', format: 'email' },
|
|
20
|
+
Password: { type: 'string', maxLength: 32 },
|
|
21
|
+
},
|
|
22
|
+
required: ['Email', 'Password'],
|
|
23
|
+
};
|
|
24
|
+
let UserLoginDto = class UserLoginDto {
|
|
25
|
+
constructor(data) {
|
|
26
|
+
Object.assign(this, data);
|
|
27
|
+
}
|
|
28
|
+
};
|
|
29
|
+
exports.UserLoginDto = UserLoginDto;
|
|
30
|
+
exports.UserLoginDto = UserLoginDto = __decorate([
|
|
31
|
+
(0, validation_1.Schema)(exports.UserLoginDtoSchema),
|
|
32
|
+
__metadata("design:paramtypes", [Object])
|
|
33
|
+
], UserLoginDto);
|
|
34
|
+
//# sourceMappingURL=userLogin-dto.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"userLogin-dto.js","sourceRoot":"","sources":["../../../src/dto/userLogin-dto.ts"],"names":[],"mappings":";;;;;;;;;;;;AAAA,oDAA6C;AAEhC,QAAA,kBAAkB,GAAG;IAChC,OAAO,EAAE,yCAAyC;IAClD,KAAK,EAAE,gBAAgB;IACvB,IAAI,EAAE,QAAQ;IACd,UAAU,EAAE;QACV,KAAK,EAAE,EAAE,IAAI,EAAE,QAAQ,EAAE,MAAM,EAAE,OAAO,EAAE;QAC1C,QAAQ,EAAE,EAAE,IAAI,EAAE,QAAQ,EAAE,SAAS,EAAE,EAAE,EAAE;KAC5C;IACD,QAAQ,EAAE,CAAC,OAAO,EAAE,UAAU,CAAC;CAChC,CAAC;AAGK,IAAM,YAAY,GAAlB,MAAM,YAAY;IAKvB,YAAY,IAAS;QACnB,MAAM,CAAC,MAAM,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;IAC5B,CAAC;CACF,CAAA;AARY,oCAAY;uBAAZ,YAAY;IADxB,IAAA,mBAAM,EAAC,0BAAkB,CAAC;;GACd,YAAY,CAQxB"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"User2FaPassed.d.ts","sourceRoot":"","sources":["../../../src/events/User2FaPassed.ts"],"names":[],"mappings":"AACA,OAAO,EAAE,SAAS,EAAE,MAAM,eAAe,CAAC;AAE1C,qBACa,aAAc,SAAQ,SAAS;CAAG"}
|
|
@@ -0,0 +1,18 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __decorate = (this && this.__decorate) || function (decorators, target, key, desc) {
|
|
3
|
+
var c = arguments.length, r = c < 3 ? target : desc === null ? desc = Object.getOwnPropertyDescriptor(target, key) : desc, d;
|
|
4
|
+
if (typeof Reflect === "object" && typeof Reflect.decorate === "function") r = Reflect.decorate(decorators, target, key, desc);
|
|
5
|
+
else for (var i = decorators.length - 1; i >= 0; i--) if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;
|
|
6
|
+
return c > 3 && r && Object.defineProperty(target, key, r), r;
|
|
7
|
+
};
|
|
8
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
9
|
+
exports.User2FaPassed = void 0;
|
|
10
|
+
const queue_1 = require("@spinajs/queue");
|
|
11
|
+
const rbac_1 = require("@spinajs/rbac");
|
|
12
|
+
let User2FaPassed = class User2FaPassed extends rbac_1.UserEvent {
|
|
13
|
+
};
|
|
14
|
+
exports.User2FaPassed = User2FaPassed;
|
|
15
|
+
exports.User2FaPassed = User2FaPassed = __decorate([
|
|
16
|
+
(0, queue_1.Event)()
|
|
17
|
+
], User2FaPassed);
|
|
18
|
+
//# sourceMappingURL=User2FaPassed.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"User2FaPassed.js","sourceRoot":"","sources":["../../../src/events/User2FaPassed.ts"],"names":[],"mappings":";;;;;;;;;AAAA,0CAAuC;AACvC,wCAA0C;AAGnC,IAAM,aAAa,GAAnB,MAAM,aAAc,SAAQ,gBAAS;CAAG,CAAA;AAAlC,sCAAa;wBAAb,aAAa;IADzB,IAAA,aAAK,GAAE;GACK,aAAa,CAAqB"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
//# sourceMappingURL=FingerprintJs.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"FingerprintJs.d.ts","sourceRoot":"","sources":["../../../src/fingerprint/FingerprintJs.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"FingerprintJs.js","sourceRoot":"","sources":["../../../src/fingerprint/FingerprintJs.ts"],"names":[],"mappings":"AAAA,4CAA4C;AAC5C,0DAA0D;AAE1D,mCAAmC;AACnC,4DAA4D"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/index.ts"],"names":[],"mappings":"AAAA,cAAc,kCAAkC,CAAC"}
|