@spinajs/rbac-http-user 2.0.187 → 2.0.189
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/lib/cjs/2fa/SpeakEasy2FaToken.d.ts +1 -0
- package/lib/cjs/2fa/SpeakEasy2FaToken.d.ts.map +1 -0
- package/lib/cjs/2fa/SpeakEasy2FaToken.js +48 -0
- package/lib/cjs/2fa/SpeakEasy2FaToken.js.map +1 -0
- package/lib/cjs/config/rbac-http.d.ts +34 -0
- package/lib/cjs/config/rbac-http.d.ts.map +1 -0
- package/lib/cjs/config/rbac-http.js +46 -0
- package/lib/cjs/config/rbac-http.js.map +1 -0
- package/lib/cjs/controllers/AuthController.d.ts +1 -0
- package/lib/cjs/controllers/AuthController.d.ts.map +1 -0
- package/lib/cjs/controllers/AuthController.js +211 -0
- package/lib/cjs/controllers/AuthController.js.map +1 -0
- package/lib/cjs/controllers/FederatedLoginController.d.ts +1 -0
- package/lib/cjs/controllers/FederatedLoginController.d.ts.map +1 -0
- package/lib/cjs/controllers/FederatedLoginController.js +38 -0
- package/lib/cjs/controllers/FederatedLoginController.js.map +1 -0
- package/lib/cjs/controllers/LoginController.d.ts +13 -0
- package/lib/cjs/controllers/LoginController.d.ts.map +1 -0
- package/lib/cjs/controllers/LoginController.js +202 -0
- package/lib/cjs/controllers/LoginController.js.map +1 -0
- package/lib/cjs/controllers/TwoFactorAuthController.d.ts +1 -0
- package/lib/cjs/controllers/TwoFactorAuthController.d.ts.map +1 -0
- package/lib/cjs/controllers/TwoFactorAuthController.js +57 -0
- package/lib/cjs/controllers/TwoFactorAuthController.js.map +1 -0
- package/lib/cjs/controllers/UserController.d.ts +1 -0
- package/lib/cjs/controllers/UserController.d.ts.map +1 -0
- package/lib/cjs/controllers/UserController.js +50 -0
- package/lib/cjs/controllers/UserController.js.map +1 -0
- package/lib/cjs/controllers/UserMetadata.d.ts +1 -0
- package/lib/cjs/controllers/UserMetadata.d.ts.map +1 -0
- package/lib/cjs/controllers/UserMetadata.js +35 -0
- package/lib/cjs/controllers/UserMetadata.js.map +1 -0
- package/lib/cjs/dto/login-dto.d.ts +17 -0
- package/lib/cjs/dto/login-dto.d.ts.map +1 -0
- package/lib/cjs/dto/login-dto.js +33 -0
- package/lib/cjs/dto/login-dto.js.map +1 -0
- package/lib/cjs/dto/password-dto.d.ts +30 -0
- package/lib/cjs/dto/password-dto.d.ts.map +1 -0
- package/lib/cjs/dto/password-dto.js +35 -0
- package/lib/cjs/dto/password-dto.js.map +1 -0
- package/lib/cjs/dto/restore-password-dto.d.ts +24 -0
- package/lib/cjs/dto/restore-password-dto.d.ts.map +1 -0
- package/lib/cjs/dto/restore-password-dto.js +34 -0
- package/lib/cjs/dto/restore-password-dto.js.map +1 -0
- package/lib/cjs/dto/token-dto.d.ts +16 -0
- package/lib/cjs/dto/token-dto.d.ts.map +1 -0
- package/lib/cjs/dto/token-dto.js +32 -0
- package/lib/cjs/dto/token-dto.js.map +1 -0
- package/lib/cjs/dto/user-dto.d.ts +22 -0
- package/lib/cjs/dto/user-dto.d.ts.map +1 -0
- package/lib/cjs/dto/user-dto.js +33 -0
- package/lib/cjs/dto/user-dto.js.map +1 -0
- package/lib/cjs/dto/userLogin-dto.d.ts +22 -0
- package/lib/cjs/dto/userLogin-dto.d.ts.map +1 -0
- package/lib/cjs/dto/userLogin-dto.js +34 -0
- package/lib/cjs/dto/userLogin-dto.js.map +1 -0
- package/lib/cjs/events/User2FaPassed.d.ts +4 -0
- package/lib/cjs/events/User2FaPassed.d.ts.map +1 -0
- package/lib/cjs/events/User2FaPassed.js +18 -0
- package/lib/cjs/events/User2FaPassed.js.map +1 -0
- package/lib/cjs/fingerprint/FingerprintJs.d.ts +1 -0
- package/lib/cjs/fingerprint/FingerprintJs.d.ts.map +1 -0
- package/lib/cjs/fingerprint/FingerprintJs.js +5 -0
- package/lib/cjs/fingerprint/FingerprintJs.js.map +1 -0
- package/lib/cjs/index.d.ts +2 -0
- package/lib/cjs/index.d.ts.map +1 -0
- package/lib/cjs/index.js +21 -0
- package/lib/cjs/index.js.map +1 -0
- package/lib/cjs/middlewares/AttributeFilter.d.ts +11 -0
- package/lib/cjs/middlewares/AttributeFilter.d.ts.map +1 -0
- package/lib/cjs/middlewares/AttributeFilter.js +19 -0
- package/lib/cjs/middlewares/AttributeFilter.js.map +1 -0
- package/lib/cjs/package.json +1 -0
- package/lib/cjs/policies/2FaPolicy.d.ts +8 -0
- package/lib/cjs/policies/2FaPolicy.d.ts.map +1 -0
- package/lib/cjs/policies/2FaPolicy.js +32 -0
- package/lib/cjs/policies/2FaPolicy.js.map +1 -0
- package/lib/cjs/policies/AllowFederatedLoginPolicy.d.ts +7 -0
- package/lib/cjs/policies/AllowFederatedLoginPolicy.d.ts.map +1 -0
- package/lib/cjs/policies/AllowFederatedLoginPolicy.js +32 -0
- package/lib/cjs/policies/AllowFederatedLoginPolicy.js.map +1 -0
- package/lib/cjs/policies/CaptchaPolicy.d.ts +1 -0
- package/lib/cjs/policies/CaptchaPolicy.d.ts.map +1 -0
- package/lib/cjs/policies/CaptchaPolicy.js +1 -0
- package/lib/cjs/policies/CaptchaPolicy.js.map +1 -0
- package/lib/mjs/2fa/SpeakEasy2FaToken.d.ts +2 -0
- package/lib/mjs/2fa/SpeakEasy2FaToken.d.ts.map +1 -0
- package/lib/mjs/2fa/SpeakEasy2FaToken.js +49 -0
- package/lib/mjs/2fa/SpeakEasy2FaToken.js.map +1 -0
- package/lib/mjs/config/rbac-http.d.ts +34 -0
- package/lib/mjs/config/rbac-http.d.ts.map +1 -0
- package/lib/mjs/config/rbac-http.js +44 -0
- package/lib/mjs/config/rbac-http.js.map +1 -0
- package/lib/mjs/controllers/AuthController.d.ts +2 -0
- package/lib/mjs/controllers/AuthController.d.ts.map +1 -0
- package/lib/mjs/controllers/AuthController.js +212 -0
- package/lib/mjs/controllers/AuthController.js.map +1 -0
- package/lib/mjs/controllers/FederatedLoginController.d.ts +2 -0
- package/lib/mjs/controllers/FederatedLoginController.d.ts.map +1 -0
- package/lib/mjs/controllers/FederatedLoginController.js +39 -0
- package/lib/mjs/controllers/FederatedLoginController.js.map +1 -0
- package/lib/mjs/controllers/LoginController.d.ts +13 -0
- package/lib/mjs/controllers/LoginController.d.ts.map +1 -0
- package/lib/mjs/controllers/LoginController.js +199 -0
- package/lib/mjs/controllers/LoginController.js.map +1 -0
- package/lib/mjs/controllers/TwoFactorAuthController.d.ts +2 -0
- package/lib/mjs/controllers/TwoFactorAuthController.d.ts.map +1 -0
- package/lib/mjs/controllers/TwoFactorAuthController.js +58 -0
- package/lib/mjs/controllers/TwoFactorAuthController.js.map +1 -0
- package/lib/mjs/controllers/UserController.d.ts +2 -0
- package/lib/mjs/controllers/UserController.d.ts.map +1 -0
- package/lib/mjs/controllers/UserController.js +51 -0
- package/lib/mjs/controllers/UserController.js.map +1 -0
- package/lib/mjs/controllers/UserMetadata.d.ts +2 -0
- package/lib/mjs/controllers/UserMetadata.d.ts.map +1 -0
- package/lib/mjs/controllers/UserMetadata.js +36 -0
- package/lib/mjs/controllers/UserMetadata.js.map +1 -0
- package/lib/mjs/dto/login-dto.d.ts +17 -0
- package/lib/mjs/dto/login-dto.d.ts.map +1 -0
- package/lib/mjs/dto/login-dto.js +30 -0
- package/lib/mjs/dto/login-dto.js.map +1 -0
- package/lib/mjs/dto/password-dto.d.ts +30 -0
- package/lib/mjs/dto/password-dto.d.ts.map +1 -0
- package/lib/mjs/dto/password-dto.js +32 -0
- package/lib/mjs/dto/password-dto.js.map +1 -0
- package/lib/mjs/dto/restore-password-dto.d.ts +24 -0
- package/lib/mjs/dto/restore-password-dto.d.ts.map +1 -0
- package/lib/mjs/dto/restore-password-dto.js +31 -0
- package/lib/mjs/dto/restore-password-dto.js.map +1 -0
- package/lib/mjs/dto/token-dto.d.ts +16 -0
- package/lib/mjs/dto/token-dto.d.ts.map +1 -0
- package/lib/mjs/dto/token-dto.js +29 -0
- package/lib/mjs/dto/token-dto.js.map +1 -0
- package/lib/mjs/dto/user-dto.d.ts +22 -0
- package/lib/mjs/dto/user-dto.d.ts.map +1 -0
- package/lib/mjs/dto/user-dto.js +30 -0
- package/lib/mjs/dto/user-dto.js.map +1 -0
- package/lib/mjs/dto/userLogin-dto.d.ts +22 -0
- package/lib/mjs/dto/userLogin-dto.d.ts.map +1 -0
- package/lib/mjs/dto/userLogin-dto.js +31 -0
- package/lib/mjs/dto/userLogin-dto.js.map +1 -0
- package/lib/mjs/events/User2FaPassed.d.ts +4 -0
- package/lib/mjs/events/User2FaPassed.d.ts.map +1 -0
- package/lib/mjs/events/User2FaPassed.js +15 -0
- package/lib/mjs/events/User2FaPassed.js.map +1 -0
- package/lib/mjs/fingerprint/FingerprintJs.d.ts +2 -0
- package/lib/mjs/fingerprint/FingerprintJs.d.ts.map +1 -0
- package/lib/mjs/fingerprint/FingerprintJs.js +6 -0
- package/lib/mjs/fingerprint/FingerprintJs.js.map +1 -0
- package/lib/mjs/index.d.ts +2 -0
- package/lib/mjs/index.d.ts.map +1 -0
- package/lib/mjs/index.js +5 -0
- package/lib/mjs/index.js.map +1 -0
- package/lib/mjs/middlewares/AttributeFilter.d.ts +11 -0
- package/lib/mjs/middlewares/AttributeFilter.d.ts.map +1 -0
- package/lib/mjs/middlewares/AttributeFilter.js +15 -0
- package/lib/mjs/middlewares/AttributeFilter.js.map +1 -0
- package/lib/mjs/package.json +1 -0
- package/lib/mjs/policies/2FaPolicy.d.ts +8 -0
- package/lib/mjs/policies/2FaPolicy.d.ts.map +1 -0
- package/lib/mjs/policies/2FaPolicy.js +28 -0
- package/lib/mjs/policies/2FaPolicy.js.map +1 -0
- package/lib/mjs/policies/AllowFederatedLoginPolicy.d.ts +7 -0
- package/lib/mjs/policies/AllowFederatedLoginPolicy.d.ts.map +1 -0
- package/lib/mjs/policies/AllowFederatedLoginPolicy.js +28 -0
- package/lib/mjs/policies/AllowFederatedLoginPolicy.js.map +1 -0
- package/lib/mjs/policies/CaptchaPolicy.d.ts +2 -0
- package/lib/mjs/policies/CaptchaPolicy.d.ts.map +1 -0
- package/lib/mjs/policies/CaptchaPolicy.js +2 -0
- package/lib/mjs/policies/CaptchaPolicy.js.map +1 -0
- package/lib/tsconfig.cjs.tsbuildinfo +1 -0
- package/lib/tsconfig.mjs.tsbuildinfo +1 -0
- package/package.json +11 -11
|
@@ -0,0 +1,199 @@
|
|
|
1
|
+
var __decorate = (this && this.__decorate) || function (decorators, target, key, desc) {
|
|
2
|
+
var c = arguments.length, r = c < 3 ? target : desc === null ? desc = Object.getOwnPropertyDescriptor(target, key) : desc, d;
|
|
3
|
+
if (typeof Reflect === "object" && typeof Reflect.decorate === "function") r = Reflect.decorate(decorators, target, key, desc);
|
|
4
|
+
else for (var i = decorators.length - 1; i >= 0; i--) if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;
|
|
5
|
+
return c > 3 && r && Object.defineProperty(target, key, r), r;
|
|
6
|
+
};
|
|
7
|
+
var __metadata = (this && this.__metadata) || function (k, v) {
|
|
8
|
+
if (typeof Reflect === "object" && typeof Reflect.metadata === "function") return Reflect.metadata(k, v);
|
|
9
|
+
};
|
|
10
|
+
var __param = (this && this.__param) || function (paramIndex, decorator) {
|
|
11
|
+
return function (target, key) { decorator(target, key, paramIndex); }
|
|
12
|
+
};
|
|
13
|
+
import { UserLoginDto } from '../dto/userLogin-dto.js';
|
|
14
|
+
import { BaseController, BasePath, Post, Body, Ok, Get, Cookie, Unauthorized, Policy } from '@spinajs/http';
|
|
15
|
+
import { AuthProvider, SessionProvider, auth, UserSession } from '@spinajs/rbac';
|
|
16
|
+
import { Autoinject } from '@spinajs/di';
|
|
17
|
+
import { AutoinjectService, Config, Configuration } from '@spinajs/configuration';
|
|
18
|
+
import { LoggedPolicy, NotLoggedPolicy } from '@spinajs/rbac-http';
|
|
19
|
+
let LoginController = class LoginController extends BaseController {
|
|
20
|
+
async login(credentials) {
|
|
21
|
+
try {
|
|
22
|
+
const user = await auth(credentials.Email, credentials.Password);
|
|
23
|
+
const session = new UserSession();
|
|
24
|
+
const dUser = user.dehydrate();
|
|
25
|
+
session.Data.set('User', dUser);
|
|
26
|
+
// TEMP
|
|
27
|
+
session.Data.set('Authorized', true);
|
|
28
|
+
await this.SessionProvider.save(session);
|
|
29
|
+
this._log.trace('User logged in', user);
|
|
30
|
+
return new Ok(user, {
|
|
31
|
+
Coockies: [
|
|
32
|
+
{
|
|
33
|
+
Name: 'ssid',
|
|
34
|
+
Value: session.SessionId,
|
|
35
|
+
Options: {
|
|
36
|
+
httpOnly: true,
|
|
37
|
+
maxAge: this.SessionExpirationTime,
|
|
38
|
+
},
|
|
39
|
+
},
|
|
40
|
+
],
|
|
41
|
+
});
|
|
42
|
+
}
|
|
43
|
+
catch (err) {
|
|
44
|
+
this._log.error(err);
|
|
45
|
+
return new Unauthorized({
|
|
46
|
+
error: {
|
|
47
|
+
code: 'E_AUTH_FAILED',
|
|
48
|
+
message: 'login or password incorrect',
|
|
49
|
+
},
|
|
50
|
+
});
|
|
51
|
+
}
|
|
52
|
+
}
|
|
53
|
+
// @Post('new-password')
|
|
54
|
+
// @Policy(NotLoggedPolicy)
|
|
55
|
+
// public async setNewPassword(@Query() token: string, @Body() pwd: RestorePasswordDto) {
|
|
56
|
+
// const user = await User.query()
|
|
57
|
+
// .innerJoin(UserMetadata, function () {
|
|
58
|
+
// this.where({
|
|
59
|
+
// Key: 'password:reset:token',
|
|
60
|
+
// Value: token,
|
|
61
|
+
// });
|
|
62
|
+
// })
|
|
63
|
+
// .populate('Metadata')
|
|
64
|
+
// .first();
|
|
65
|
+
// if (!user) {
|
|
66
|
+
// return new NotFound({
|
|
67
|
+
// error: {
|
|
68
|
+
// code: 'ERR_USER_NOT_FOUND',
|
|
69
|
+
// message: 'No user found for this reset token',
|
|
70
|
+
// },
|
|
71
|
+
// });
|
|
72
|
+
// }
|
|
73
|
+
// const val = (await user.Metadata['password:reset:start']) as DateTime;
|
|
74
|
+
// const now = DateTime.now().plus({ seconds: -this.PasswordResetTokenTTL });
|
|
75
|
+
// if (val < now) {
|
|
76
|
+
// return new BadRequest({
|
|
77
|
+
// error: {
|
|
78
|
+
// code: 'ERR_RESET_TOKEN_EXPIRED',
|
|
79
|
+
// message: 'Password reset token expired',
|
|
80
|
+
// },
|
|
81
|
+
// });
|
|
82
|
+
// }
|
|
83
|
+
// if (!this.PasswordValidationService.check(pwd.Password)) {
|
|
84
|
+
// return new BadRequest({
|
|
85
|
+
// error: {
|
|
86
|
+
// code: 'ERR_PASSWORD_RULE',
|
|
87
|
+
// message: 'Invalid password, does not match password rules',
|
|
88
|
+
// },
|
|
89
|
+
// });
|
|
90
|
+
// }
|
|
91
|
+
// if (pwd.Password !== pwd.ConfirmPassword) {
|
|
92
|
+
// return new BadRequest({
|
|
93
|
+
// error: {
|
|
94
|
+
// code: 'ERR_PASSWORD_NOT_MATCH',
|
|
95
|
+
// message: 'Password and repeat password does not match',
|
|
96
|
+
// },
|
|
97
|
+
// });
|
|
98
|
+
// }
|
|
99
|
+
// const hashedPassword = await this.PasswordProvider.hash(pwd.Password);
|
|
100
|
+
// user.Password = hashedPassword;
|
|
101
|
+
// await user.update();
|
|
102
|
+
// /**
|
|
103
|
+
// * Delete all reset related meta for user
|
|
104
|
+
// */
|
|
105
|
+
// await user.Metadata.delete(/password:reset.*/);
|
|
106
|
+
// // add to action list
|
|
107
|
+
// await user.Actions.add(
|
|
108
|
+
// new UserAction({
|
|
109
|
+
// Persistent: true,
|
|
110
|
+
// Action: 'password:reset',
|
|
111
|
+
// }),
|
|
112
|
+
// );
|
|
113
|
+
// // inform others
|
|
114
|
+
// await this.Queue.emit(new UserPasswordChanged(user.Uuid));
|
|
115
|
+
// }
|
|
116
|
+
// @Post('forgot-password')
|
|
117
|
+
// @Policy(NotLoggedPolicy)
|
|
118
|
+
// public async forgotPassword(@Body() login: UserLoginDto) {
|
|
119
|
+
// const user = await this.AuthProvider.getByEmail(login.Email);
|
|
120
|
+
// if (!user.IsActive || user.IsBanned || user.DeletedAt !== null) {
|
|
121
|
+
// return new InvalidOperation('User is inactive, banned or deleted. Contact system administrator');
|
|
122
|
+
// }
|
|
123
|
+
// const token = uuidv4();
|
|
124
|
+
// // assign meta to user
|
|
125
|
+
// await (user.Metadata['password:reset'] = true);
|
|
126
|
+
// await (user.Metadata['password:reset:token'] = token);
|
|
127
|
+
// await (user.Metadata['password:reset:start'] = DateTime.now());
|
|
128
|
+
// await user.Actions.add(
|
|
129
|
+
// new UserAction({
|
|
130
|
+
// Action: 'user:password:reset',
|
|
131
|
+
// Data: DateTime.now().toISO(),
|
|
132
|
+
// Persistent: true,
|
|
133
|
+
// }),
|
|
134
|
+
// );
|
|
135
|
+
// await this.Queue.emit(new UserPasswordRestore(user.Uuid, token));
|
|
136
|
+
// return new Ok({
|
|
137
|
+
// reset_token: token,
|
|
138
|
+
// ttl: this.PasswordResetTokenTTL,
|
|
139
|
+
// });
|
|
140
|
+
// }
|
|
141
|
+
async logout(ssid) {
|
|
142
|
+
if (!ssid) {
|
|
143
|
+
return new Ok();
|
|
144
|
+
}
|
|
145
|
+
await this.SessionProvider.delete(ssid);
|
|
146
|
+
// send empty cookie to confirm session deletion
|
|
147
|
+
return new Ok(null, {
|
|
148
|
+
Coockies: [
|
|
149
|
+
{
|
|
150
|
+
Name: 'ssid',
|
|
151
|
+
Value: '',
|
|
152
|
+
Options: {
|
|
153
|
+
httpOnly: true,
|
|
154
|
+
maxAge: 0,
|
|
155
|
+
},
|
|
156
|
+
},
|
|
157
|
+
],
|
|
158
|
+
});
|
|
159
|
+
}
|
|
160
|
+
};
|
|
161
|
+
__decorate([
|
|
162
|
+
Autoinject(),
|
|
163
|
+
__metadata("design:type", Configuration)
|
|
164
|
+
], LoginController.prototype, "Configuration", void 0);
|
|
165
|
+
__decorate([
|
|
166
|
+
AutoinjectService('rbac.auth'),
|
|
167
|
+
__metadata("design:type", AuthProvider)
|
|
168
|
+
], LoginController.prototype, "AuthProvider", void 0);
|
|
169
|
+
__decorate([
|
|
170
|
+
AutoinjectService('rbac.session'),
|
|
171
|
+
__metadata("design:type", SessionProvider)
|
|
172
|
+
], LoginController.prototype, "SessionProvider", void 0);
|
|
173
|
+
__decorate([
|
|
174
|
+
Config('rbac.session.expiration', {
|
|
175
|
+
defaultValue: 120,
|
|
176
|
+
}),
|
|
177
|
+
__metadata("design:type", Number)
|
|
178
|
+
], LoginController.prototype, "SessionExpirationTime", void 0);
|
|
179
|
+
__decorate([
|
|
180
|
+
Post(),
|
|
181
|
+
Policy(NotLoggedPolicy),
|
|
182
|
+
__param(0, Body()),
|
|
183
|
+
__metadata("design:type", Function),
|
|
184
|
+
__metadata("design:paramtypes", [UserLoginDto]),
|
|
185
|
+
__metadata("design:returntype", Promise)
|
|
186
|
+
], LoginController.prototype, "login", null);
|
|
187
|
+
__decorate([
|
|
188
|
+
Get(),
|
|
189
|
+
Policy(LoggedPolicy),
|
|
190
|
+
__param(0, Cookie()),
|
|
191
|
+
__metadata("design:type", Function),
|
|
192
|
+
__metadata("design:paramtypes", [String]),
|
|
193
|
+
__metadata("design:returntype", Promise)
|
|
194
|
+
], LoginController.prototype, "logout", null);
|
|
195
|
+
LoginController = __decorate([
|
|
196
|
+
BasePath('auth')
|
|
197
|
+
], LoginController);
|
|
198
|
+
export { LoginController };
|
|
199
|
+
//# sourceMappingURL=LoginController.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"LoginController.js","sourceRoot":"","sources":["../../../src/controllers/LoginController.ts"],"names":[],"mappings":";;;;;;;;;;;;AAAA,OAAO,EAAE,YAAY,EAAE,MAAM,yBAAyB,CAAC;AACvD,OAAO,EAAE,cAAc,EAAE,QAAQ,EAAE,IAAI,EAAE,IAAI,EAAE,EAAE,EAAE,GAAG,EAAE,MAAM,EAAE,YAAY,EAAE,MAAM,EAAE,MAAM,eAAe,CAAC;AAC5G,OAAO,EAAE,YAAY,EAAE,eAAe,EAAE,IAAI,EAAE,WAAW,EAAE,MAAM,eAAe,CAAC;AACjF,OAAO,EAAE,UAAU,EAAE,MAAM,aAAa,CAAC;AACzC,OAAO,EAAE,iBAAiB,EAAE,MAAM,EAAE,aAAa,EAAE,MAAM,wBAAwB,CAAC;AAElF,OAAO,EAAE,YAAY,EAAE,eAAe,EAAE,MAAM,oBAAoB,CAAC;AAG5D,IAAM,eAAe,GAArB,MAAM,eAAgB,SAAQ,cAAc;IAiBpC,AAAN,KAAK,CAAC,KAAK,CAAS,WAAyB;QAClD,IAAI;YACF,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,WAAW,CAAC,KAAK,EAAE,WAAW,CAAC,QAAQ,CAAC,CAAC;YACjE,MAAM,OAAO,GAAG,IAAI,WAAW,EAAE,CAAC;YAClC,MAAM,KAAK,GAAG,IAAI,CAAC,SAAS,EAAE,CAAC;YAC/B,OAAO,CAAC,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,KAAK,CAAC,CAAC;YAEhC,OAAO;YACP,OAAO,CAAC,IAAI,CAAC,GAAG,CAAC,YAAY,EAAE,IAAI,CAAC,CAAC;YAErC,MAAM,IAAI,CAAC,eAAe,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC;YAEzC,IAAI,CAAC,IAAI,CAAC,KAAK,CAAC,gBAAgB,EAAE,IAAI,CAAC,CAAC;YAExC,OAAO,IAAI,EAAE,CAAC,IAAI,EAAE;gBAClB,QAAQ,EAAE;oBACR;wBACE,IAAI,EAAE,MAAM;wBACZ,KAAK,EAAE,OAAO,CAAC,SAAS;wBACxB,OAAO,EAAE;4BACP,QAAQ,EAAE,IAAI;4BACd,MAAM,EAAE,IAAI,CAAC,qBAAqB;yBACnC;qBACF;iBACF;aACF,CAAC,CAAC;SACJ;QAAC,OAAO,GAAG,EAAE;YACZ,IAAI,CAAC,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;YAErB,OAAO,IAAI,YAAY,CAAC;gBACtB,KAAK,EAAE;oBACL,IAAI,EAAE,eAAe;oBACrB,OAAO,EAAE,6BAA6B;iBACvC;aACF,CAAC,CAAC;SACJ;IACH,CAAC;IAED,wBAAwB;IACxB,2BAA2B;IAC3B,yFAAyF;IACzF,oCAAoC;IACpC,6CAA6C;IAC7C,qBAAqB;IACrB,uCAAuC;IACvC,wBAAwB;IACxB,YAAY;IACZ,SAAS;IACT,4BAA4B;IAC5B,gBAAgB;IAEhB,iBAAiB;IACjB,4BAA4B;IAC5B,iBAAiB;IACjB,sCAAsC;IACtC,yDAAyD;IACzD,WAAW;IACX,UAAU;IACV,MAAM;IAEN,2EAA2E;IAC3E,+EAA+E;IAE/E,qBAAqB;IACrB,8BAA8B;IAC9B,iBAAiB;IACjB,2CAA2C;IAC3C,mDAAmD;IACnD,WAAW;IACX,UAAU;IACV,MAAM;IAEN,+DAA+D;IAC/D,8BAA8B;IAC9B,iBAAiB;IACjB,qCAAqC;IACrC,sEAAsE;IACtE,WAAW;IACX,UAAU;IACV,MAAM;IAEN,gDAAgD;IAChD,8BAA8B;IAC9B,iBAAiB;IACjB,0CAA0C;IAC1C,kEAAkE;IAClE,WAAW;IACX,UAAU;IACV,MAAM;IAEN,2EAA2E;IAC3E,oCAAoC;IAEpC,yBAAyB;IAEzB,QAAQ;IACR,8CAA8C;IAC9C,QAAQ;IACR,oDAAoD;IAEpD,0BAA0B;IAC1B,4BAA4B;IAC5B,uBAAuB;IACvB,0BAA0B;IAC1B,kCAAkC;IAClC,UAAU;IACV,OAAO;IAEP,qBAAqB;IACrB,+DAA+D;IAC/D,IAAI;IAEJ,2BAA2B;IAC3B,2BAA2B;IAC3B,6DAA6D;IAC7D,kEAAkE;IAElE,sEAAsE;IACtE,wGAAwG;IACxG,MAAM;IAEN,4BAA4B;IAE5B,2BAA2B;IAC3B,oDAAoD;IACpD,2DAA2D;IAC3D,oEAAoE;IAEpE,4BAA4B;IAC5B,uBAAuB;IACvB,uCAAuC;IACvC,sCAAsC;IACtC,0BAA0B;IAC1B,UAAU;IACV,OAAO;IAEP,sEAAsE;IAEtE,oBAAoB;IACpB,0BAA0B;IAC1B,uCAAuC;IACvC,QAAQ;IACR,IAAI;IAIS,AAAN,KAAK,CAAC,MAAM,CAAW,IAAY;QACxC,IAAI,CAAC,IAAI,EAAE;YACT,OAAO,IAAI,EAAE,EAAE,CAAC;SACjB;QAED,MAAM,IAAI,CAAC,eAAe,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC;QAExC,gDAAgD;QAChD,OAAO,IAAI,EAAE,CAAC,IAAI,EAAE;YAClB,QAAQ,EAAE;gBACR;oBACE,IAAI,EAAE,MAAM;oBACZ,KAAK,EAAE,EAAE;oBACT,OAAO,EAAE;wBACP,QAAQ,EAAE,IAAI;wBACd,MAAM,EAAE,CAAC;qBACV;iBACF;aACF;SACF,CAAC,CAAC;IACL,CAAC;CAsFF,CAAA;AA3QW;IADT,UAAU,EAAE;8BACY,aAAa;sDAAC;AAG7B;IADT,iBAAiB,CAAC,WAAW,CAAC;8BACP,YAAY;qDAAC;AAG3B;IADT,iBAAiB,CAAC,cAAc,CAAC;8BACP,eAAe;wDAAC;AAKjC;IAHT,MAAM,CAAC,yBAAyB,EAAE;QACjC,YAAY,EAAE,GAAG;KAClB,CAAC;;8DACsC;AAI3B;IAFZ,IAAI,EAAE;IACN,MAAM,CAAC,eAAe,CAAC;IACJ,WAAA,IAAI,EAAE,CAAA;;qCAAc,YAAY;;4CAoCnD;AA8GY;IAFZ,GAAG,EAAE;IACL,MAAM,CAAC,YAAY,CAAC;IACA,WAAA,MAAM,EAAE,CAAA;;;;6CAoB5B;AAvLU,eAAe;IAD3B,QAAQ,CAAC,MAAM,CAAC;GACJ,eAAe,CA6Q3B"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"TwoFactorAuthController.d.ts","sourceRoot":"","sources":["../../../src/controllers/TwoFactorAuthController.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1,58 @@
|
|
|
1
|
+
// import { TokenDto } from './../dto/token-dto.js';
|
|
2
|
+
// import { BaseController, BasePath, Cookie, Ok, Post, Unauthorized } from '@spinajs/http';
|
|
3
|
+
// import { ISession, SessionProvider, User as UserModel, _user_ev, _user_update} from '@spinajs/rbac';
|
|
4
|
+
// import { Session } from "@spinajs/rbac-http";
|
|
5
|
+
// import { Body, Policy } from '@spinajs/http';
|
|
6
|
+
// import _ from 'lodash';
|
|
7
|
+
// import { User } from '../decorators.js';
|
|
8
|
+
// import { TwoFacRouteEnabled } from '../policies/2FaPolicy.js';
|
|
9
|
+
// import { AutoinjectService, _service } from '@spinajs/configuration';
|
|
10
|
+
// import { TwoFactorAuthProvider } from '../interfaces.js';
|
|
11
|
+
// import { DateTime } from 'luxon';
|
|
12
|
+
// import { UserLoginSuccess } from '../events/UserLoginSuccess.js';
|
|
13
|
+
// import { Autoinject } from '@spinajs/di';
|
|
14
|
+
// import { QueueService } from '@spinajs/queue';
|
|
15
|
+
// import { _chain, _check_arg, _non_empty, _non_null, _tap, _trim, _use } from '@spinajs/util';
|
|
16
|
+
// import { User2FaPassed } from '../events/User2FaPassed.js';
|
|
17
|
+
export {};
|
|
18
|
+
// export async function auth2Fa(user: User, token: string) {
|
|
19
|
+
// user = _check_arg(_non_null())(user, 'user');
|
|
20
|
+
// token = _check_arg(_trim(), _non_empty)(token, 'token');
|
|
21
|
+
// return _chain(
|
|
22
|
+
// _use(_service<TwoFactorAuthProvider>('rbac.twoFactorAuth'), 'twoFa'),
|
|
23
|
+
// _tap(async ({ twoFa }: { twoFa: TwoFactorAuthProvider }) => {
|
|
24
|
+
// await twoFa.verifyToken(token, user);
|
|
25
|
+
// }),
|
|
26
|
+
// _user_update({
|
|
27
|
+
// LastLoginAt: DateTime.now()
|
|
28
|
+
// }),
|
|
29
|
+
// _user_ev(User2FaPassed)
|
|
30
|
+
// );
|
|
31
|
+
// }
|
|
32
|
+
// @BasePath('user/auth')
|
|
33
|
+
// @Policy(TwoFacRouteEnabled)
|
|
34
|
+
// export class TwoFactorAuthController extends BaseController {
|
|
35
|
+
// @Autoinject(QueueService)
|
|
36
|
+
// protected Queue: QueueService;
|
|
37
|
+
// @AutoinjectService('rbac.session')
|
|
38
|
+
// protected SessionProvider: SessionProvider;
|
|
39
|
+
// @AutoinjectService('rbac.twoFactorAuth')
|
|
40
|
+
// protected TwoFactorAuthProvider: TwoFactorAuthProvider;
|
|
41
|
+
// @Post('2fa/verify')
|
|
42
|
+
// public async verifyToken(@User() logged: UserModel, @Body() token: TokenDto, @Session() session : ISession) {
|
|
43
|
+
// const result = await this.TwoFactorAuthProvider.verifyToken(token.Token, logged);
|
|
44
|
+
// if (result) {
|
|
45
|
+
// return new Unauthorized(`invalid token`);
|
|
46
|
+
// }
|
|
47
|
+
// logged.LastLoginAt = DateTime.now();
|
|
48
|
+
// await logged.update();
|
|
49
|
+
// await this.Queue.emit(new UserLoginSuccess(logged.Uuid));
|
|
50
|
+
// await this.SessionProvider.save(ssid, {
|
|
51
|
+
// Authorized: true,
|
|
52
|
+
// TwoFactorAuth_check: true,
|
|
53
|
+
// });
|
|
54
|
+
// // return user data
|
|
55
|
+
// return new Ok(logged.dehydrate());
|
|
56
|
+
// }
|
|
57
|
+
// }
|
|
58
|
+
//# sourceMappingURL=TwoFactorAuthController.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"TwoFactorAuthController.js","sourceRoot":"","sources":["../../../src/controllers/TwoFactorAuthController.ts"],"names":[],"mappings":"AAAA,oDAAoD;AACpD,4FAA4F;AAC5F,uGAAuG;AACvG,gDAAgD;AAChD,gDAAgD;AAChD,0BAA0B;AAC1B,2CAA2C;AAC3C,iEAAiE;AACjE,wEAAwE;AACxE,4DAA4D;AAC5D,oCAAoC;AACpC,oEAAoE;AACpE,4CAA4C;AAC5C,iDAAiD;AACjD,gGAAgG;AAChG,8DAA8D;;AAE9D,6DAA6D;AAC7D,kDAAkD;AAClD,6DAA6D;AAE7D,mBAAmB;AACnB,4EAA4E;AAC5E,oEAAoE;AACpE,8CAA8C;AAC9C,UAAU;AACV,qBAAqB;AACrB,oCAAoC;AACpC,UAAU;AACV,8BAA8B;AAC9B,OAAO;AACP,IAAI;AAEJ,yBAAyB;AACzB,8BAA8B;AAC9B,gEAAgE;AAChE,8BAA8B;AAC9B,mCAAmC;AAEnC,uCAAuC;AACvC,gDAAgD;AAEhD,6CAA6C;AAC7C,4DAA4D;AAE5D,wBAAwB;AACxB,kHAAkH;AAClH,wFAAwF;AAExF,oBAAoB;AACpB,kDAAkD;AAClD,QAAQ;AAER,2CAA2C;AAC3C,6BAA6B;AAE7B,gEAAgE;AAEhE,8CAA8C;AAC9C,0BAA0B;AAC1B,mCAAmC;AACnC,UAAU;AAEV,0BAA0B;AAC1B,yCAAyC;AACzC,MAAM;AACN,IAAI"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"UserController.d.ts","sourceRoot":"","sources":["../../../src/controllers/UserController.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1,51 @@
|
|
|
1
|
+
// import { PasswordDto } from '../dto/password-dto.js';
|
|
2
|
+
// import { User as UserModel, PasswordProvider, SessionProvider } from '@spinajs/rbac';
|
|
3
|
+
// import { BaseController, BasePath, Get, Ok, Body, Patch, Cookie } from '@spinajs/http';
|
|
4
|
+
// import { InvalidArgument, Forbidden } from '@spinajs/exceptions';
|
|
5
|
+
// import { Autoinject } from '@spinajs/di';
|
|
6
|
+
// import { Permission, User, Resource } from '../decorators.js';
|
|
7
|
+
// import { Config } from '@spinajs/configuration';
|
|
8
|
+
// import * as cs from 'cookie-signature';
|
|
9
|
+
// import _ from 'lodash';
|
|
10
|
+
export {};
|
|
11
|
+
// @BasePath('user')
|
|
12
|
+
// @Resource('user')
|
|
13
|
+
// export class UserController extends BaseController {
|
|
14
|
+
// @Autoinject()
|
|
15
|
+
// protected PasswordProvider: PasswordProvider;
|
|
16
|
+
// @Config('http.cookie.secret')
|
|
17
|
+
// protected CoockieSecret: string;
|
|
18
|
+
// @Autoinject()
|
|
19
|
+
// protected SessionProvider: SessionProvider;
|
|
20
|
+
// @Get()
|
|
21
|
+
// @Permission('readOwn')
|
|
22
|
+
// public async refresh(@User() user: UserModel, @Cookie() ssid: string) {
|
|
23
|
+
// // get user data from db
|
|
24
|
+
// await user.refresh();
|
|
25
|
+
// await user.Metadata.populate();
|
|
26
|
+
// // refresh session data from DB
|
|
27
|
+
// const sId: string | false = cs.unsign(ssid, this.CoockieSecret);
|
|
28
|
+
// if (sId) {
|
|
29
|
+
// const session = await this.SessionProvider.restore(sId);
|
|
30
|
+
// if (session) {
|
|
31
|
+
// session.Data.set('User', user.dehydrate());
|
|
32
|
+
// }
|
|
33
|
+
// }
|
|
34
|
+
// return new Ok(user.dehydrate());
|
|
35
|
+
// }
|
|
36
|
+
// @Patch('/password')
|
|
37
|
+
// public async newPassword(@User() user: UserModel, @Body() pwd: PasswordDto) {
|
|
38
|
+
// if (pwd.Password !== pwd.ConfirmPassword) {
|
|
39
|
+
// throw new InvalidArgument('password does not match');
|
|
40
|
+
// }
|
|
41
|
+
// const isValid = await this.PasswordProvider.verify(user.Password, pwd.OldPassword);
|
|
42
|
+
// if (!isValid) {
|
|
43
|
+
// throw new Forbidden('old password do not match');
|
|
44
|
+
// }
|
|
45
|
+
// const hashedPassword = await this.PasswordProvider.hash(pwd.Password);
|
|
46
|
+
// user.Password = hashedPassword;
|
|
47
|
+
// await user.update();
|
|
48
|
+
// return new Ok();
|
|
49
|
+
// }
|
|
50
|
+
// }
|
|
51
|
+
//# sourceMappingURL=UserController.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"UserController.js","sourceRoot":"","sources":["../../../src/controllers/UserController.ts"],"names":[],"mappings":"AAAA,wDAAwD;AACxD,wFAAwF;AACxF,0FAA0F;AAC1F,oEAAoE;AACpE,4CAA4C;AAC5C,iEAAiE;AACjE,mDAAmD;AACnD,0CAA0C;AAC1C,0BAA0B;;AAE1B,oBAAoB;AACpB,oBAAoB;AACpB,uDAAuD;AACvD,kBAAkB;AAClB,kDAAkD;AAElD,kCAAkC;AAClC,qCAAqC;AAErC,kBAAkB;AAClB,gDAAgD;AAEhD,WAAW;AACX,2BAA2B;AAC3B,4EAA4E;AAC5E,+BAA+B;AAC/B,4BAA4B;AAC5B,sCAAsC;AAEtC,sCAAsC;AACtC,uEAAuE;AACvE,iBAAiB;AACjB,iEAAiE;AACjE,uBAAuB;AACvB,sDAAsD;AACtD,UAAU;AACV,QAAQ;AAER,uCAAuC;AACvC,MAAM;AAEN,wBAAwB;AACxB,kFAAkF;AAClF,kDAAkD;AAClD,8DAA8D;AAC9D,QAAQ;AAER,0FAA0F;AAE1F,sBAAsB;AACtB,0DAA0D;AAC1D,QAAQ;AAER,6EAA6E;AAC7E,sCAAsC;AACtC,2BAA2B;AAC3B,uBAAuB;AACvB,MAAM;AACN,IAAI"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"UserMetadata.d.ts","sourceRoot":"","sources":["../../../src/controllers/UserMetadata.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1,36 @@
|
|
|
1
|
+
// import { Put, Post, BasePath, Ok, Forbidden } from '@spinajs/http';
|
|
2
|
+
// import { User as UserModel, UserMetadata } from '@spinajs/rbac';
|
|
3
|
+
// import { Permission, User, Resource } from '../decorators.js';
|
|
4
|
+
// import { FromModel, AsModel } from '@spinajs/orm-http';
|
|
5
|
+
export {};
|
|
6
|
+
// @BasePath('user/:user/metadata')
|
|
7
|
+
// @Resource('user.metadata')
|
|
8
|
+
// export class UserMetaController {
|
|
9
|
+
// @Post()
|
|
10
|
+
// @Permission('updateOwn')
|
|
11
|
+
// public async addMetadata(@User() logged: UserModel, @FromModel() user: UserModel, @AsModel() meta: UserMetadata) {
|
|
12
|
+
// if (logged.Id !== user.Id) {
|
|
13
|
+
// throw new Forbidden('cannot add metadata to another user');
|
|
14
|
+
// }
|
|
15
|
+
// await user.Metadata.add(meta);
|
|
16
|
+
// return new Ok(meta);
|
|
17
|
+
// }
|
|
18
|
+
// @Put('user/:user/metadata/:meta')
|
|
19
|
+
// @Permission('updateOwn')
|
|
20
|
+
// public async updateMetadata(@User() logged: UserModel, @FromModel() user: UserModel, @FromModel() meta: UserMetadata) {
|
|
21
|
+
// if (logged.Id !== user.Id) {
|
|
22
|
+
// throw new Forbidden('cannot add metadata to another user');
|
|
23
|
+
// }
|
|
24
|
+
// await meta.User.populate();
|
|
25
|
+
// if (meta.User.Value.Id !== logged.Id) {
|
|
26
|
+
// throw new Forbidden('cannot edit metadata that is not own by user');
|
|
27
|
+
// }
|
|
28
|
+
// await meta.update();
|
|
29
|
+
// return new Ok();
|
|
30
|
+
// }
|
|
31
|
+
// }
|
|
32
|
+
// // function userOwnerPermissionStrategy(){
|
|
33
|
+
// // // 1. obtain current logged user
|
|
34
|
+
// // // 2. find
|
|
35
|
+
// // }
|
|
36
|
+
//# sourceMappingURL=UserMetadata.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"UserMetadata.js","sourceRoot":"","sources":["../../../src/controllers/UserMetadata.ts"],"names":[],"mappings":"AAAA,sEAAsE;AACtE,mEAAmE;AACnE,iEAAiE;AACjE,0DAA0D;;AAE1D,mCAAmC;AACnC,6BAA6B;AAC7B,oCAAoC;AAEpC,YAAY;AACZ,6BAA6B;AAC7B,uHAAuH;AACvH,mCAAmC;AACnC,oEAAoE;AACpE,QAAQ;AAER,qCAAqC;AACrC,2BAA2B;AAC3B,MAAM;AAEN,sCAAsC;AACtC,6BAA6B;AAC7B,4HAA4H;AAC5H,mCAAmC;AACnC,oEAAoE;AACpE,QAAQ;AAER,kCAAkC;AAClC,8CAA8C;AAC9C,6EAA6E;AAC7E,QAAQ;AAER,2BAA2B;AAE3B,uBAAuB;AACvB,MAAM;AACN,IAAI;AAEJ,6CAA6C;AAE7C,yCAAyC;AACzC,mBAAmB;AAEnB,OAAO"}
|
|
@@ -0,0 +1,17 @@
|
|
|
1
|
+
export declare const LoginDtoSchema: {
|
|
2
|
+
$schema: string;
|
|
3
|
+
title: string;
|
|
4
|
+
type: string;
|
|
5
|
+
properties: {
|
|
6
|
+
Login: {
|
|
7
|
+
type: string;
|
|
8
|
+
format: string;
|
|
9
|
+
};
|
|
10
|
+
};
|
|
11
|
+
required: string[];
|
|
12
|
+
};
|
|
13
|
+
export declare class UserLoginDto {
|
|
14
|
+
Email: string;
|
|
15
|
+
constructor(data: any);
|
|
16
|
+
}
|
|
17
|
+
//# sourceMappingURL=login-dto.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"login-dto.d.ts","sourceRoot":"","sources":["../../../src/dto/login-dto.ts"],"names":[],"mappings":"AAEA,eAAO,MAAM,cAAc;;;;;;;;;;;CAQ1B,CAAC;AAEF,qBACa,YAAY;IAChB,KAAK,EAAE,MAAM,CAAC;gBAET,IAAI,EAAE,GAAG;CAGtB"}
|
|
@@ -0,0 +1,30 @@
|
|
|
1
|
+
var __decorate = (this && this.__decorate) || function (decorators, target, key, desc) {
|
|
2
|
+
var c = arguments.length, r = c < 3 ? target : desc === null ? desc = Object.getOwnPropertyDescriptor(target, key) : desc, d;
|
|
3
|
+
if (typeof Reflect === "object" && typeof Reflect.decorate === "function") r = Reflect.decorate(decorators, target, key, desc);
|
|
4
|
+
else for (var i = decorators.length - 1; i >= 0; i--) if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;
|
|
5
|
+
return c > 3 && r && Object.defineProperty(target, key, r), r;
|
|
6
|
+
};
|
|
7
|
+
var __metadata = (this && this.__metadata) || function (k, v) {
|
|
8
|
+
if (typeof Reflect === "object" && typeof Reflect.metadata === "function") return Reflect.metadata(k, v);
|
|
9
|
+
};
|
|
10
|
+
import { Schema } from '@spinajs/validation';
|
|
11
|
+
export const LoginDtoSchema = {
|
|
12
|
+
$schema: 'http://json-schema.org/draft-07/schema#',
|
|
13
|
+
title: 'login DTO',
|
|
14
|
+
type: 'object',
|
|
15
|
+
properties: {
|
|
16
|
+
Login: { type: 'string', format: 'email' },
|
|
17
|
+
},
|
|
18
|
+
required: ['Email'],
|
|
19
|
+
};
|
|
20
|
+
let UserLoginDto = class UserLoginDto {
|
|
21
|
+
constructor(data) {
|
|
22
|
+
Object.assign(this, data);
|
|
23
|
+
}
|
|
24
|
+
};
|
|
25
|
+
UserLoginDto = __decorate([
|
|
26
|
+
Schema(LoginDtoSchema),
|
|
27
|
+
__metadata("design:paramtypes", [Object])
|
|
28
|
+
], UserLoginDto);
|
|
29
|
+
export { UserLoginDto };
|
|
30
|
+
//# sourceMappingURL=login-dto.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"login-dto.js","sourceRoot":"","sources":["../../../src/dto/login-dto.ts"],"names":[],"mappings":";;;;;;;;;AAAA,OAAO,EAAE,MAAM,EAAE,MAAM,qBAAqB,CAAC;AAE7C,MAAM,CAAC,MAAM,cAAc,GAAG;IAC5B,OAAO,EAAE,yCAAyC;IAClD,KAAK,EAAE,WAAW;IAClB,IAAI,EAAE,QAAQ;IACd,UAAU,EAAE;QACV,KAAK,EAAE,EAAE,IAAI,EAAE,QAAQ,EAAE,MAAM,EAAE,OAAO,EAAE;KAC3C;IACD,QAAQ,EAAE,CAAC,OAAO,CAAC;CACpB,CAAC;AAGK,IAAM,YAAY,GAAlB,MAAM,YAAY;IAGvB,YAAY,IAAS;QACnB,MAAM,CAAC,MAAM,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;IAC5B,CAAC;CACF,CAAA;AANY,YAAY;IADxB,MAAM,CAAC,cAAc,CAAC;;GACV,YAAY,CAMxB"}
|
|
@@ -0,0 +1,30 @@
|
|
|
1
|
+
export declare const PasswordDtoSchema: {
|
|
2
|
+
$schema: string;
|
|
3
|
+
title: string;
|
|
4
|
+
type: string;
|
|
5
|
+
properties: {
|
|
6
|
+
OldPassword: {
|
|
7
|
+
type: string;
|
|
8
|
+
maxLength: number;
|
|
9
|
+
minLength: number;
|
|
10
|
+
};
|
|
11
|
+
Password: {
|
|
12
|
+
type: string;
|
|
13
|
+
maxLength: number;
|
|
14
|
+
minLength: number;
|
|
15
|
+
};
|
|
16
|
+
ConfirmPassword: {
|
|
17
|
+
type: string;
|
|
18
|
+
maxLength: number;
|
|
19
|
+
minLength: number;
|
|
20
|
+
};
|
|
21
|
+
};
|
|
22
|
+
required: string[];
|
|
23
|
+
};
|
|
24
|
+
export declare class PasswordDto {
|
|
25
|
+
OldPassword: string;
|
|
26
|
+
Password: string;
|
|
27
|
+
ConfirmPassword: string;
|
|
28
|
+
constructor(data: any);
|
|
29
|
+
}
|
|
30
|
+
//# sourceMappingURL=password-dto.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"password-dto.d.ts","sourceRoot":"","sources":["../../../src/dto/password-dto.ts"],"names":[],"mappings":"AAEA,eAAO,MAAM,iBAAiB;;;;;;;;;;;;;;;;;;;;;;CAU7B,CAAC;AAEF,qBACa,WAAW;IACf,WAAW,EAAE,MAAM,CAAC;IAEpB,QAAQ,EAAE,MAAM,CAAC;IAEjB,eAAe,EAAE,MAAM,CAAC;gBAEnB,IAAI,EAAE,GAAG;CAGtB"}
|
|
@@ -0,0 +1,32 @@
|
|
|
1
|
+
var __decorate = (this && this.__decorate) || function (decorators, target, key, desc) {
|
|
2
|
+
var c = arguments.length, r = c < 3 ? target : desc === null ? desc = Object.getOwnPropertyDescriptor(target, key) : desc, d;
|
|
3
|
+
if (typeof Reflect === "object" && typeof Reflect.decorate === "function") r = Reflect.decorate(decorators, target, key, desc);
|
|
4
|
+
else for (var i = decorators.length - 1; i >= 0; i--) if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;
|
|
5
|
+
return c > 3 && r && Object.defineProperty(target, key, r), r;
|
|
6
|
+
};
|
|
7
|
+
var __metadata = (this && this.__metadata) || function (k, v) {
|
|
8
|
+
if (typeof Reflect === "object" && typeof Reflect.metadata === "function") return Reflect.metadata(k, v);
|
|
9
|
+
};
|
|
10
|
+
import { Schema } from '@spinajs/validation';
|
|
11
|
+
export const PasswordDtoSchema = {
|
|
12
|
+
$schema: 'http://json-schema.org/draft-07/schema#',
|
|
13
|
+
title: 'User password DTO',
|
|
14
|
+
type: 'object',
|
|
15
|
+
properties: {
|
|
16
|
+
OldPassword: { type: 'string', maxLength: 32, minLength: 6 },
|
|
17
|
+
Password: { type: 'string', maxLength: 32, minLength: 6 },
|
|
18
|
+
ConfirmPassword: { type: 'string', maxLength: 32, minLength: 6 },
|
|
19
|
+
},
|
|
20
|
+
required: ['OldPassword', 'Password', 'ConfirmPassword'],
|
|
21
|
+
};
|
|
22
|
+
let PasswordDto = class PasswordDto {
|
|
23
|
+
constructor(data) {
|
|
24
|
+
Object.assign(this, data);
|
|
25
|
+
}
|
|
26
|
+
};
|
|
27
|
+
PasswordDto = __decorate([
|
|
28
|
+
Schema(PasswordDtoSchema),
|
|
29
|
+
__metadata("design:paramtypes", [Object])
|
|
30
|
+
], PasswordDto);
|
|
31
|
+
export { PasswordDto };
|
|
32
|
+
//# sourceMappingURL=password-dto.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"password-dto.js","sourceRoot":"","sources":["../../../src/dto/password-dto.ts"],"names":[],"mappings":";;;;;;;;;AAAA,OAAO,EAAE,MAAM,EAAE,MAAM,qBAAqB,CAAC;AAE7C,MAAM,CAAC,MAAM,iBAAiB,GAAG;IAC/B,OAAO,EAAE,yCAAyC;IAClD,KAAK,EAAE,mBAAmB;IAC1B,IAAI,EAAE,QAAQ;IACd,UAAU,EAAE;QACV,WAAW,EAAE,EAAE,IAAI,EAAE,QAAQ,EAAE,SAAS,EAAE,EAAE,EAAE,SAAS,EAAE,CAAC,EAAE;QAC5D,QAAQ,EAAE,EAAE,IAAI,EAAE,QAAQ,EAAE,SAAS,EAAE,EAAE,EAAE,SAAS,EAAE,CAAC,EAAE;QACzD,eAAe,EAAE,EAAE,IAAI,EAAE,QAAQ,EAAE,SAAS,EAAE,EAAE,EAAE,SAAS,EAAE,CAAC,EAAE;KACjE;IACD,QAAQ,EAAE,CAAC,aAAa,EAAE,UAAU,EAAE,iBAAiB,CAAC;CACzD,CAAC;AAGK,IAAM,WAAW,GAAjB,MAAM,WAAW;IAOtB,YAAY,IAAS;QACnB,MAAM,CAAC,MAAM,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;IAC5B,CAAC;CACF,CAAA;AAVY,WAAW;IADvB,MAAM,CAAC,iBAAiB,CAAC;;GACb,WAAW,CAUvB"}
|
|
@@ -0,0 +1,24 @@
|
|
|
1
|
+
export declare const RestorePasswordDtoSchema: {
|
|
2
|
+
$schema: string;
|
|
3
|
+
title: string;
|
|
4
|
+
type: string;
|
|
5
|
+
properties: {
|
|
6
|
+
Password: {
|
|
7
|
+
type: string;
|
|
8
|
+
maxLength: number;
|
|
9
|
+
minLength: number;
|
|
10
|
+
};
|
|
11
|
+
ConfirmPassword: {
|
|
12
|
+
type: string;
|
|
13
|
+
maxLength: number;
|
|
14
|
+
minLength: number;
|
|
15
|
+
};
|
|
16
|
+
};
|
|
17
|
+
required: string[];
|
|
18
|
+
};
|
|
19
|
+
export declare class RestorePasswordDto {
|
|
20
|
+
Password: string;
|
|
21
|
+
ConfirmPassword: string;
|
|
22
|
+
constructor(data: any);
|
|
23
|
+
}
|
|
24
|
+
//# sourceMappingURL=restore-password-dto.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"restore-password-dto.d.ts","sourceRoot":"","sources":["../../../src/dto/restore-password-dto.ts"],"names":[],"mappings":"AAEA,eAAO,MAAM,wBAAwB;;;;;;;;;;;;;;;;;CASpC,CAAC;AAEF,qBACa,kBAAkB;IACtB,QAAQ,EAAE,MAAM,CAAC;IAEjB,eAAe,EAAE,MAAM,CAAC;gBAEnB,IAAI,EAAE,GAAG;CAGtB"}
|
|
@@ -0,0 +1,31 @@
|
|
|
1
|
+
var __decorate = (this && this.__decorate) || function (decorators, target, key, desc) {
|
|
2
|
+
var c = arguments.length, r = c < 3 ? target : desc === null ? desc = Object.getOwnPropertyDescriptor(target, key) : desc, d;
|
|
3
|
+
if (typeof Reflect === "object" && typeof Reflect.decorate === "function") r = Reflect.decorate(decorators, target, key, desc);
|
|
4
|
+
else for (var i = decorators.length - 1; i >= 0; i--) if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;
|
|
5
|
+
return c > 3 && r && Object.defineProperty(target, key, r), r;
|
|
6
|
+
};
|
|
7
|
+
var __metadata = (this && this.__metadata) || function (k, v) {
|
|
8
|
+
if (typeof Reflect === "object" && typeof Reflect.metadata === "function") return Reflect.metadata(k, v);
|
|
9
|
+
};
|
|
10
|
+
import { Schema } from '@spinajs/validation';
|
|
11
|
+
export const RestorePasswordDtoSchema = {
|
|
12
|
+
$schema: 'http://json-schema.org/draft-07/schema#',
|
|
13
|
+
title: 'User password DTO',
|
|
14
|
+
type: 'object',
|
|
15
|
+
properties: {
|
|
16
|
+
Password: { type: 'string', maxLength: 32, minLength: 6 },
|
|
17
|
+
ConfirmPassword: { type: 'string', maxLength: 32, minLength: 6 },
|
|
18
|
+
},
|
|
19
|
+
required: ['Password', 'ConfirmPassword'],
|
|
20
|
+
};
|
|
21
|
+
let RestorePasswordDto = class RestorePasswordDto {
|
|
22
|
+
constructor(data) {
|
|
23
|
+
Object.assign(this, data);
|
|
24
|
+
}
|
|
25
|
+
};
|
|
26
|
+
RestorePasswordDto = __decorate([
|
|
27
|
+
Schema(RestorePasswordDtoSchema),
|
|
28
|
+
__metadata("design:paramtypes", [Object])
|
|
29
|
+
], RestorePasswordDto);
|
|
30
|
+
export { RestorePasswordDto };
|
|
31
|
+
//# sourceMappingURL=restore-password-dto.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"restore-password-dto.js","sourceRoot":"","sources":["../../../src/dto/restore-password-dto.ts"],"names":[],"mappings":";;;;;;;;;AAAA,OAAO,EAAE,MAAM,EAAE,MAAM,qBAAqB,CAAC;AAE7C,MAAM,CAAC,MAAM,wBAAwB,GAAG;IACtC,OAAO,EAAE,yCAAyC;IAClD,KAAK,EAAE,mBAAmB;IAC1B,IAAI,EAAE,QAAQ;IACd,UAAU,EAAE;QACV,QAAQ,EAAE,EAAE,IAAI,EAAE,QAAQ,EAAE,SAAS,EAAE,EAAE,EAAE,SAAS,EAAE,CAAC,EAAE;QACzD,eAAe,EAAE,EAAE,IAAI,EAAE,QAAQ,EAAE,SAAS,EAAE,EAAE,EAAE,SAAS,EAAE,CAAC,EAAE;KACjE;IACD,QAAQ,EAAE,CAAC,UAAU,EAAE,iBAAiB,CAAC;CAC1C,CAAC;AAGK,IAAM,kBAAkB,GAAxB,MAAM,kBAAkB;IAK7B,YAAY,IAAS;QACnB,MAAM,CAAC,MAAM,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;IAC5B,CAAC;CACF,CAAA;AARY,kBAAkB;IAD9B,MAAM,CAAC,wBAAwB,CAAC;;GACpB,kBAAkB,CAQ9B"}
|
|
@@ -0,0 +1,16 @@
|
|
|
1
|
+
export declare const TokenDtoSchema: {
|
|
2
|
+
$schema: string;
|
|
3
|
+
title: string;
|
|
4
|
+
type: string;
|
|
5
|
+
properties: {
|
|
6
|
+
Token: {
|
|
7
|
+
type: string;
|
|
8
|
+
maxLength: number;
|
|
9
|
+
};
|
|
10
|
+
};
|
|
11
|
+
};
|
|
12
|
+
export declare class TokenDto {
|
|
13
|
+
Token: string;
|
|
14
|
+
constructor(data: any);
|
|
15
|
+
}
|
|
16
|
+
//# sourceMappingURL=token-dto.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"token-dto.d.ts","sourceRoot":"","sources":["../../../src/dto/token-dto.ts"],"names":[],"mappings":"AACA,eAAO,MAAM,cAAc;;;;;;;;;;CAO1B,CAAC;AAEF,qBACa,QAAQ;IACZ,KAAK,EAAE,MAAM,CAAC;gBAET,IAAI,EAAE,GAAG;CAGtB"}
|
|
@@ -0,0 +1,29 @@
|
|
|
1
|
+
var __decorate = (this && this.__decorate) || function (decorators, target, key, desc) {
|
|
2
|
+
var c = arguments.length, r = c < 3 ? target : desc === null ? desc = Object.getOwnPropertyDescriptor(target, key) : desc, d;
|
|
3
|
+
if (typeof Reflect === "object" && typeof Reflect.decorate === "function") r = Reflect.decorate(decorators, target, key, desc);
|
|
4
|
+
else for (var i = decorators.length - 1; i >= 0; i--) if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;
|
|
5
|
+
return c > 3 && r && Object.defineProperty(target, key, r), r;
|
|
6
|
+
};
|
|
7
|
+
var __metadata = (this && this.__metadata) || function (k, v) {
|
|
8
|
+
if (typeof Reflect === "object" && typeof Reflect.metadata === "function") return Reflect.metadata(k, v);
|
|
9
|
+
};
|
|
10
|
+
import { Schema } from '@spinajs/validation';
|
|
11
|
+
export const TokenDtoSchema = {
|
|
12
|
+
$schema: 'http://json-schema.org/draft-07/schema#',
|
|
13
|
+
title: 'Token DTO',
|
|
14
|
+
type: 'object',
|
|
15
|
+
properties: {
|
|
16
|
+
Token: { type: 'string', maxLength: 64 },
|
|
17
|
+
},
|
|
18
|
+
};
|
|
19
|
+
let TokenDto = class TokenDto {
|
|
20
|
+
constructor(data) {
|
|
21
|
+
Object.assign(this, data);
|
|
22
|
+
}
|
|
23
|
+
};
|
|
24
|
+
TokenDto = __decorate([
|
|
25
|
+
Schema(TokenDtoSchema),
|
|
26
|
+
__metadata("design:paramtypes", [Object])
|
|
27
|
+
], TokenDto);
|
|
28
|
+
export { TokenDto };
|
|
29
|
+
//# sourceMappingURL=token-dto.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"token-dto.js","sourceRoot":"","sources":["../../../src/dto/token-dto.ts"],"names":[],"mappings":";;;;;;;;;AAAA,OAAO,EAAE,MAAM,EAAE,MAAM,qBAAqB,CAAC;AAC7C,MAAM,CAAC,MAAM,cAAc,GAAG;IAC5B,OAAO,EAAE,yCAAyC;IAClD,KAAK,EAAE,WAAW;IAClB,IAAI,EAAE,QAAQ;IACd,UAAU,EAAE;QACV,KAAK,EAAE,EAAE,IAAI,EAAE,QAAQ,EAAE,SAAS,EAAE,EAAE,EAAE;KACzC;CACF,CAAC;AAGK,IAAM,QAAQ,GAAd,MAAM,QAAQ;IAGnB,YAAY,IAAS;QACnB,MAAM,CAAC,MAAM,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;IAC5B,CAAC;CACF,CAAA;AANY,QAAQ;IADpB,MAAM,CAAC,cAAc,CAAC;;GACV,QAAQ,CAMpB"}
|