@spinajs/rbac-http-user 2.0.187 → 2.0.189

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (173) hide show
  1. package/lib/cjs/2fa/SpeakEasy2FaToken.d.ts +1 -0
  2. package/lib/cjs/2fa/SpeakEasy2FaToken.d.ts.map +1 -0
  3. package/lib/cjs/2fa/SpeakEasy2FaToken.js +48 -0
  4. package/lib/cjs/2fa/SpeakEasy2FaToken.js.map +1 -0
  5. package/lib/cjs/config/rbac-http.d.ts +34 -0
  6. package/lib/cjs/config/rbac-http.d.ts.map +1 -0
  7. package/lib/cjs/config/rbac-http.js +46 -0
  8. package/lib/cjs/config/rbac-http.js.map +1 -0
  9. package/lib/cjs/controllers/AuthController.d.ts +1 -0
  10. package/lib/cjs/controllers/AuthController.d.ts.map +1 -0
  11. package/lib/cjs/controllers/AuthController.js +211 -0
  12. package/lib/cjs/controllers/AuthController.js.map +1 -0
  13. package/lib/cjs/controllers/FederatedLoginController.d.ts +1 -0
  14. package/lib/cjs/controllers/FederatedLoginController.d.ts.map +1 -0
  15. package/lib/cjs/controllers/FederatedLoginController.js +38 -0
  16. package/lib/cjs/controllers/FederatedLoginController.js.map +1 -0
  17. package/lib/cjs/controllers/LoginController.d.ts +13 -0
  18. package/lib/cjs/controllers/LoginController.d.ts.map +1 -0
  19. package/lib/cjs/controllers/LoginController.js +202 -0
  20. package/lib/cjs/controllers/LoginController.js.map +1 -0
  21. package/lib/cjs/controllers/TwoFactorAuthController.d.ts +1 -0
  22. package/lib/cjs/controllers/TwoFactorAuthController.d.ts.map +1 -0
  23. package/lib/cjs/controllers/TwoFactorAuthController.js +57 -0
  24. package/lib/cjs/controllers/TwoFactorAuthController.js.map +1 -0
  25. package/lib/cjs/controllers/UserController.d.ts +1 -0
  26. package/lib/cjs/controllers/UserController.d.ts.map +1 -0
  27. package/lib/cjs/controllers/UserController.js +50 -0
  28. package/lib/cjs/controllers/UserController.js.map +1 -0
  29. package/lib/cjs/controllers/UserMetadata.d.ts +1 -0
  30. package/lib/cjs/controllers/UserMetadata.d.ts.map +1 -0
  31. package/lib/cjs/controllers/UserMetadata.js +35 -0
  32. package/lib/cjs/controllers/UserMetadata.js.map +1 -0
  33. package/lib/cjs/dto/login-dto.d.ts +17 -0
  34. package/lib/cjs/dto/login-dto.d.ts.map +1 -0
  35. package/lib/cjs/dto/login-dto.js +33 -0
  36. package/lib/cjs/dto/login-dto.js.map +1 -0
  37. package/lib/cjs/dto/password-dto.d.ts +30 -0
  38. package/lib/cjs/dto/password-dto.d.ts.map +1 -0
  39. package/lib/cjs/dto/password-dto.js +35 -0
  40. package/lib/cjs/dto/password-dto.js.map +1 -0
  41. package/lib/cjs/dto/restore-password-dto.d.ts +24 -0
  42. package/lib/cjs/dto/restore-password-dto.d.ts.map +1 -0
  43. package/lib/cjs/dto/restore-password-dto.js +34 -0
  44. package/lib/cjs/dto/restore-password-dto.js.map +1 -0
  45. package/lib/cjs/dto/token-dto.d.ts +16 -0
  46. package/lib/cjs/dto/token-dto.d.ts.map +1 -0
  47. package/lib/cjs/dto/token-dto.js +32 -0
  48. package/lib/cjs/dto/token-dto.js.map +1 -0
  49. package/lib/cjs/dto/user-dto.d.ts +22 -0
  50. package/lib/cjs/dto/user-dto.d.ts.map +1 -0
  51. package/lib/cjs/dto/user-dto.js +33 -0
  52. package/lib/cjs/dto/user-dto.js.map +1 -0
  53. package/lib/cjs/dto/userLogin-dto.d.ts +22 -0
  54. package/lib/cjs/dto/userLogin-dto.d.ts.map +1 -0
  55. package/lib/cjs/dto/userLogin-dto.js +34 -0
  56. package/lib/cjs/dto/userLogin-dto.js.map +1 -0
  57. package/lib/cjs/events/User2FaPassed.d.ts +4 -0
  58. package/lib/cjs/events/User2FaPassed.d.ts.map +1 -0
  59. package/lib/cjs/events/User2FaPassed.js +18 -0
  60. package/lib/cjs/events/User2FaPassed.js.map +1 -0
  61. package/lib/cjs/fingerprint/FingerprintJs.d.ts +1 -0
  62. package/lib/cjs/fingerprint/FingerprintJs.d.ts.map +1 -0
  63. package/lib/cjs/fingerprint/FingerprintJs.js +5 -0
  64. package/lib/cjs/fingerprint/FingerprintJs.js.map +1 -0
  65. package/lib/cjs/index.d.ts +2 -0
  66. package/lib/cjs/index.d.ts.map +1 -0
  67. package/lib/cjs/index.js +21 -0
  68. package/lib/cjs/index.js.map +1 -0
  69. package/lib/cjs/middlewares/AttributeFilter.d.ts +11 -0
  70. package/lib/cjs/middlewares/AttributeFilter.d.ts.map +1 -0
  71. package/lib/cjs/middlewares/AttributeFilter.js +19 -0
  72. package/lib/cjs/middlewares/AttributeFilter.js.map +1 -0
  73. package/lib/cjs/package.json +1 -0
  74. package/lib/cjs/policies/2FaPolicy.d.ts +8 -0
  75. package/lib/cjs/policies/2FaPolicy.d.ts.map +1 -0
  76. package/lib/cjs/policies/2FaPolicy.js +32 -0
  77. package/lib/cjs/policies/2FaPolicy.js.map +1 -0
  78. package/lib/cjs/policies/AllowFederatedLoginPolicy.d.ts +7 -0
  79. package/lib/cjs/policies/AllowFederatedLoginPolicy.d.ts.map +1 -0
  80. package/lib/cjs/policies/AllowFederatedLoginPolicy.js +32 -0
  81. package/lib/cjs/policies/AllowFederatedLoginPolicy.js.map +1 -0
  82. package/lib/cjs/policies/CaptchaPolicy.d.ts +1 -0
  83. package/lib/cjs/policies/CaptchaPolicy.d.ts.map +1 -0
  84. package/lib/cjs/policies/CaptchaPolicy.js +1 -0
  85. package/lib/cjs/policies/CaptchaPolicy.js.map +1 -0
  86. package/lib/mjs/2fa/SpeakEasy2FaToken.d.ts +2 -0
  87. package/lib/mjs/2fa/SpeakEasy2FaToken.d.ts.map +1 -0
  88. package/lib/mjs/2fa/SpeakEasy2FaToken.js +49 -0
  89. package/lib/mjs/2fa/SpeakEasy2FaToken.js.map +1 -0
  90. package/lib/mjs/config/rbac-http.d.ts +34 -0
  91. package/lib/mjs/config/rbac-http.d.ts.map +1 -0
  92. package/lib/mjs/config/rbac-http.js +44 -0
  93. package/lib/mjs/config/rbac-http.js.map +1 -0
  94. package/lib/mjs/controllers/AuthController.d.ts +2 -0
  95. package/lib/mjs/controllers/AuthController.d.ts.map +1 -0
  96. package/lib/mjs/controllers/AuthController.js +212 -0
  97. package/lib/mjs/controllers/AuthController.js.map +1 -0
  98. package/lib/mjs/controllers/FederatedLoginController.d.ts +2 -0
  99. package/lib/mjs/controllers/FederatedLoginController.d.ts.map +1 -0
  100. package/lib/mjs/controllers/FederatedLoginController.js +39 -0
  101. package/lib/mjs/controllers/FederatedLoginController.js.map +1 -0
  102. package/lib/mjs/controllers/LoginController.d.ts +13 -0
  103. package/lib/mjs/controllers/LoginController.d.ts.map +1 -0
  104. package/lib/mjs/controllers/LoginController.js +199 -0
  105. package/lib/mjs/controllers/LoginController.js.map +1 -0
  106. package/lib/mjs/controllers/TwoFactorAuthController.d.ts +2 -0
  107. package/lib/mjs/controllers/TwoFactorAuthController.d.ts.map +1 -0
  108. package/lib/mjs/controllers/TwoFactorAuthController.js +58 -0
  109. package/lib/mjs/controllers/TwoFactorAuthController.js.map +1 -0
  110. package/lib/mjs/controllers/UserController.d.ts +2 -0
  111. package/lib/mjs/controllers/UserController.d.ts.map +1 -0
  112. package/lib/mjs/controllers/UserController.js +51 -0
  113. package/lib/mjs/controllers/UserController.js.map +1 -0
  114. package/lib/mjs/controllers/UserMetadata.d.ts +2 -0
  115. package/lib/mjs/controllers/UserMetadata.d.ts.map +1 -0
  116. package/lib/mjs/controllers/UserMetadata.js +36 -0
  117. package/lib/mjs/controllers/UserMetadata.js.map +1 -0
  118. package/lib/mjs/dto/login-dto.d.ts +17 -0
  119. package/lib/mjs/dto/login-dto.d.ts.map +1 -0
  120. package/lib/mjs/dto/login-dto.js +30 -0
  121. package/lib/mjs/dto/login-dto.js.map +1 -0
  122. package/lib/mjs/dto/password-dto.d.ts +30 -0
  123. package/lib/mjs/dto/password-dto.d.ts.map +1 -0
  124. package/lib/mjs/dto/password-dto.js +32 -0
  125. package/lib/mjs/dto/password-dto.js.map +1 -0
  126. package/lib/mjs/dto/restore-password-dto.d.ts +24 -0
  127. package/lib/mjs/dto/restore-password-dto.d.ts.map +1 -0
  128. package/lib/mjs/dto/restore-password-dto.js +31 -0
  129. package/lib/mjs/dto/restore-password-dto.js.map +1 -0
  130. package/lib/mjs/dto/token-dto.d.ts +16 -0
  131. package/lib/mjs/dto/token-dto.d.ts.map +1 -0
  132. package/lib/mjs/dto/token-dto.js +29 -0
  133. package/lib/mjs/dto/token-dto.js.map +1 -0
  134. package/lib/mjs/dto/user-dto.d.ts +22 -0
  135. package/lib/mjs/dto/user-dto.d.ts.map +1 -0
  136. package/lib/mjs/dto/user-dto.js +30 -0
  137. package/lib/mjs/dto/user-dto.js.map +1 -0
  138. package/lib/mjs/dto/userLogin-dto.d.ts +22 -0
  139. package/lib/mjs/dto/userLogin-dto.d.ts.map +1 -0
  140. package/lib/mjs/dto/userLogin-dto.js +31 -0
  141. package/lib/mjs/dto/userLogin-dto.js.map +1 -0
  142. package/lib/mjs/events/User2FaPassed.d.ts +4 -0
  143. package/lib/mjs/events/User2FaPassed.d.ts.map +1 -0
  144. package/lib/mjs/events/User2FaPassed.js +15 -0
  145. package/lib/mjs/events/User2FaPassed.js.map +1 -0
  146. package/lib/mjs/fingerprint/FingerprintJs.d.ts +2 -0
  147. package/lib/mjs/fingerprint/FingerprintJs.d.ts.map +1 -0
  148. package/lib/mjs/fingerprint/FingerprintJs.js +6 -0
  149. package/lib/mjs/fingerprint/FingerprintJs.js.map +1 -0
  150. package/lib/mjs/index.d.ts +2 -0
  151. package/lib/mjs/index.d.ts.map +1 -0
  152. package/lib/mjs/index.js +5 -0
  153. package/lib/mjs/index.js.map +1 -0
  154. package/lib/mjs/middlewares/AttributeFilter.d.ts +11 -0
  155. package/lib/mjs/middlewares/AttributeFilter.d.ts.map +1 -0
  156. package/lib/mjs/middlewares/AttributeFilter.js +15 -0
  157. package/lib/mjs/middlewares/AttributeFilter.js.map +1 -0
  158. package/lib/mjs/package.json +1 -0
  159. package/lib/mjs/policies/2FaPolicy.d.ts +8 -0
  160. package/lib/mjs/policies/2FaPolicy.d.ts.map +1 -0
  161. package/lib/mjs/policies/2FaPolicy.js +28 -0
  162. package/lib/mjs/policies/2FaPolicy.js.map +1 -0
  163. package/lib/mjs/policies/AllowFederatedLoginPolicy.d.ts +7 -0
  164. package/lib/mjs/policies/AllowFederatedLoginPolicy.d.ts.map +1 -0
  165. package/lib/mjs/policies/AllowFederatedLoginPolicy.js +28 -0
  166. package/lib/mjs/policies/AllowFederatedLoginPolicy.js.map +1 -0
  167. package/lib/mjs/policies/CaptchaPolicy.d.ts +2 -0
  168. package/lib/mjs/policies/CaptchaPolicy.d.ts.map +1 -0
  169. package/lib/mjs/policies/CaptchaPolicy.js +2 -0
  170. package/lib/mjs/policies/CaptchaPolicy.js.map +1 -0
  171. package/lib/tsconfig.cjs.tsbuildinfo +1 -0
  172. package/lib/tsconfig.mjs.tsbuildinfo +1 -0
  173. package/package.json +11 -11
@@ -0,0 +1,199 @@
1
+ var __decorate = (this && this.__decorate) || function (decorators, target, key, desc) {
2
+ var c = arguments.length, r = c < 3 ? target : desc === null ? desc = Object.getOwnPropertyDescriptor(target, key) : desc, d;
3
+ if (typeof Reflect === "object" && typeof Reflect.decorate === "function") r = Reflect.decorate(decorators, target, key, desc);
4
+ else for (var i = decorators.length - 1; i >= 0; i--) if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;
5
+ return c > 3 && r && Object.defineProperty(target, key, r), r;
6
+ };
7
+ var __metadata = (this && this.__metadata) || function (k, v) {
8
+ if (typeof Reflect === "object" && typeof Reflect.metadata === "function") return Reflect.metadata(k, v);
9
+ };
10
+ var __param = (this && this.__param) || function (paramIndex, decorator) {
11
+ return function (target, key) { decorator(target, key, paramIndex); }
12
+ };
13
+ import { UserLoginDto } from '../dto/userLogin-dto.js';
14
+ import { BaseController, BasePath, Post, Body, Ok, Get, Cookie, Unauthorized, Policy } from '@spinajs/http';
15
+ import { AuthProvider, SessionProvider, auth, UserSession } from '@spinajs/rbac';
16
+ import { Autoinject } from '@spinajs/di';
17
+ import { AutoinjectService, Config, Configuration } from '@spinajs/configuration';
18
+ import { LoggedPolicy, NotLoggedPolicy } from '@spinajs/rbac-http';
19
+ let LoginController = class LoginController extends BaseController {
20
+ async login(credentials) {
21
+ try {
22
+ const user = await auth(credentials.Email, credentials.Password);
23
+ const session = new UserSession();
24
+ const dUser = user.dehydrate();
25
+ session.Data.set('User', dUser);
26
+ // TEMP
27
+ session.Data.set('Authorized', true);
28
+ await this.SessionProvider.save(session);
29
+ this._log.trace('User logged in', user);
30
+ return new Ok(user, {
31
+ Coockies: [
32
+ {
33
+ Name: 'ssid',
34
+ Value: session.SessionId,
35
+ Options: {
36
+ httpOnly: true,
37
+ maxAge: this.SessionExpirationTime,
38
+ },
39
+ },
40
+ ],
41
+ });
42
+ }
43
+ catch (err) {
44
+ this._log.error(err);
45
+ return new Unauthorized({
46
+ error: {
47
+ code: 'E_AUTH_FAILED',
48
+ message: 'login or password incorrect',
49
+ },
50
+ });
51
+ }
52
+ }
53
+ // @Post('new-password')
54
+ // @Policy(NotLoggedPolicy)
55
+ // public async setNewPassword(@Query() token: string, @Body() pwd: RestorePasswordDto) {
56
+ // const user = await User.query()
57
+ // .innerJoin(UserMetadata, function () {
58
+ // this.where({
59
+ // Key: 'password:reset:token',
60
+ // Value: token,
61
+ // });
62
+ // })
63
+ // .populate('Metadata')
64
+ // .first();
65
+ // if (!user) {
66
+ // return new NotFound({
67
+ // error: {
68
+ // code: 'ERR_USER_NOT_FOUND',
69
+ // message: 'No user found for this reset token',
70
+ // },
71
+ // });
72
+ // }
73
+ // const val = (await user.Metadata['password:reset:start']) as DateTime;
74
+ // const now = DateTime.now().plus({ seconds: -this.PasswordResetTokenTTL });
75
+ // if (val < now) {
76
+ // return new BadRequest({
77
+ // error: {
78
+ // code: 'ERR_RESET_TOKEN_EXPIRED',
79
+ // message: 'Password reset token expired',
80
+ // },
81
+ // });
82
+ // }
83
+ // if (!this.PasswordValidationService.check(pwd.Password)) {
84
+ // return new BadRequest({
85
+ // error: {
86
+ // code: 'ERR_PASSWORD_RULE',
87
+ // message: 'Invalid password, does not match password rules',
88
+ // },
89
+ // });
90
+ // }
91
+ // if (pwd.Password !== pwd.ConfirmPassword) {
92
+ // return new BadRequest({
93
+ // error: {
94
+ // code: 'ERR_PASSWORD_NOT_MATCH',
95
+ // message: 'Password and repeat password does not match',
96
+ // },
97
+ // });
98
+ // }
99
+ // const hashedPassword = await this.PasswordProvider.hash(pwd.Password);
100
+ // user.Password = hashedPassword;
101
+ // await user.update();
102
+ // /**
103
+ // * Delete all reset related meta for user
104
+ // */
105
+ // await user.Metadata.delete(/password:reset.*/);
106
+ // // add to action list
107
+ // await user.Actions.add(
108
+ // new UserAction({
109
+ // Persistent: true,
110
+ // Action: 'password:reset',
111
+ // }),
112
+ // );
113
+ // // inform others
114
+ // await this.Queue.emit(new UserPasswordChanged(user.Uuid));
115
+ // }
116
+ // @Post('forgot-password')
117
+ // @Policy(NotLoggedPolicy)
118
+ // public async forgotPassword(@Body() login: UserLoginDto) {
119
+ // const user = await this.AuthProvider.getByEmail(login.Email);
120
+ // if (!user.IsActive || user.IsBanned || user.DeletedAt !== null) {
121
+ // return new InvalidOperation('User is inactive, banned or deleted. Contact system administrator');
122
+ // }
123
+ // const token = uuidv4();
124
+ // // assign meta to user
125
+ // await (user.Metadata['password:reset'] = true);
126
+ // await (user.Metadata['password:reset:token'] = token);
127
+ // await (user.Metadata['password:reset:start'] = DateTime.now());
128
+ // await user.Actions.add(
129
+ // new UserAction({
130
+ // Action: 'user:password:reset',
131
+ // Data: DateTime.now().toISO(),
132
+ // Persistent: true,
133
+ // }),
134
+ // );
135
+ // await this.Queue.emit(new UserPasswordRestore(user.Uuid, token));
136
+ // return new Ok({
137
+ // reset_token: token,
138
+ // ttl: this.PasswordResetTokenTTL,
139
+ // });
140
+ // }
141
+ async logout(ssid) {
142
+ if (!ssid) {
143
+ return new Ok();
144
+ }
145
+ await this.SessionProvider.delete(ssid);
146
+ // send empty cookie to confirm session deletion
147
+ return new Ok(null, {
148
+ Coockies: [
149
+ {
150
+ Name: 'ssid',
151
+ Value: '',
152
+ Options: {
153
+ httpOnly: true,
154
+ maxAge: 0,
155
+ },
156
+ },
157
+ ],
158
+ });
159
+ }
160
+ };
161
+ __decorate([
162
+ Autoinject(),
163
+ __metadata("design:type", Configuration)
164
+ ], LoginController.prototype, "Configuration", void 0);
165
+ __decorate([
166
+ AutoinjectService('rbac.auth'),
167
+ __metadata("design:type", AuthProvider)
168
+ ], LoginController.prototype, "AuthProvider", void 0);
169
+ __decorate([
170
+ AutoinjectService('rbac.session'),
171
+ __metadata("design:type", SessionProvider)
172
+ ], LoginController.prototype, "SessionProvider", void 0);
173
+ __decorate([
174
+ Config('rbac.session.expiration', {
175
+ defaultValue: 120,
176
+ }),
177
+ __metadata("design:type", Number)
178
+ ], LoginController.prototype, "SessionExpirationTime", void 0);
179
+ __decorate([
180
+ Post(),
181
+ Policy(NotLoggedPolicy),
182
+ __param(0, Body()),
183
+ __metadata("design:type", Function),
184
+ __metadata("design:paramtypes", [UserLoginDto]),
185
+ __metadata("design:returntype", Promise)
186
+ ], LoginController.prototype, "login", null);
187
+ __decorate([
188
+ Get(),
189
+ Policy(LoggedPolicy),
190
+ __param(0, Cookie()),
191
+ __metadata("design:type", Function),
192
+ __metadata("design:paramtypes", [String]),
193
+ __metadata("design:returntype", Promise)
194
+ ], LoginController.prototype, "logout", null);
195
+ LoginController = __decorate([
196
+ BasePath('auth')
197
+ ], LoginController);
198
+ export { LoginController };
199
+ //# sourceMappingURL=LoginController.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"LoginController.js","sourceRoot":"","sources":["../../../src/controllers/LoginController.ts"],"names":[],"mappings":";;;;;;;;;;;;AAAA,OAAO,EAAE,YAAY,EAAE,MAAM,yBAAyB,CAAC;AACvD,OAAO,EAAE,cAAc,EAAE,QAAQ,EAAE,IAAI,EAAE,IAAI,EAAE,EAAE,EAAE,GAAG,EAAE,MAAM,EAAE,YAAY,EAAE,MAAM,EAAE,MAAM,eAAe,CAAC;AAC5G,OAAO,EAAE,YAAY,EAAE,eAAe,EAAE,IAAI,EAAE,WAAW,EAAE,MAAM,eAAe,CAAC;AACjF,OAAO,EAAE,UAAU,EAAE,MAAM,aAAa,CAAC;AACzC,OAAO,EAAE,iBAAiB,EAAE,MAAM,EAAE,aAAa,EAAE,MAAM,wBAAwB,CAAC;AAElF,OAAO,EAAE,YAAY,EAAE,eAAe,EAAE,MAAM,oBAAoB,CAAC;AAG5D,IAAM,eAAe,GAArB,MAAM,eAAgB,SAAQ,cAAc;IAiBpC,AAAN,KAAK,CAAC,KAAK,CAAS,WAAyB;QAClD,IAAI;YACF,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,WAAW,CAAC,KAAK,EAAE,WAAW,CAAC,QAAQ,CAAC,CAAC;YACjE,MAAM,OAAO,GAAG,IAAI,WAAW,EAAE,CAAC;YAClC,MAAM,KAAK,GAAG,IAAI,CAAC,SAAS,EAAE,CAAC;YAC/B,OAAO,CAAC,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,KAAK,CAAC,CAAC;YAEhC,OAAO;YACP,OAAO,CAAC,IAAI,CAAC,GAAG,CAAC,YAAY,EAAE,IAAI,CAAC,CAAC;YAErC,MAAM,IAAI,CAAC,eAAe,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC;YAEzC,IAAI,CAAC,IAAI,CAAC,KAAK,CAAC,gBAAgB,EAAE,IAAI,CAAC,CAAC;YAExC,OAAO,IAAI,EAAE,CAAC,IAAI,EAAE;gBAClB,QAAQ,EAAE;oBACR;wBACE,IAAI,EAAE,MAAM;wBACZ,KAAK,EAAE,OAAO,CAAC,SAAS;wBACxB,OAAO,EAAE;4BACP,QAAQ,EAAE,IAAI;4BACd,MAAM,EAAE,IAAI,CAAC,qBAAqB;yBACnC;qBACF;iBACF;aACF,CAAC,CAAC;SACJ;QAAC,OAAO,GAAG,EAAE;YACZ,IAAI,CAAC,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;YAErB,OAAO,IAAI,YAAY,CAAC;gBACtB,KAAK,EAAE;oBACL,IAAI,EAAE,eAAe;oBACrB,OAAO,EAAE,6BAA6B;iBACvC;aACF,CAAC,CAAC;SACJ;IACH,CAAC;IAED,wBAAwB;IACxB,2BAA2B;IAC3B,yFAAyF;IACzF,oCAAoC;IACpC,6CAA6C;IAC7C,qBAAqB;IACrB,uCAAuC;IACvC,wBAAwB;IACxB,YAAY;IACZ,SAAS;IACT,4BAA4B;IAC5B,gBAAgB;IAEhB,iBAAiB;IACjB,4BAA4B;IAC5B,iBAAiB;IACjB,sCAAsC;IACtC,yDAAyD;IACzD,WAAW;IACX,UAAU;IACV,MAAM;IAEN,2EAA2E;IAC3E,+EAA+E;IAE/E,qBAAqB;IACrB,8BAA8B;IAC9B,iBAAiB;IACjB,2CAA2C;IAC3C,mDAAmD;IACnD,WAAW;IACX,UAAU;IACV,MAAM;IAEN,+DAA+D;IAC/D,8BAA8B;IAC9B,iBAAiB;IACjB,qCAAqC;IACrC,sEAAsE;IACtE,WAAW;IACX,UAAU;IACV,MAAM;IAEN,gDAAgD;IAChD,8BAA8B;IAC9B,iBAAiB;IACjB,0CAA0C;IAC1C,kEAAkE;IAClE,WAAW;IACX,UAAU;IACV,MAAM;IAEN,2EAA2E;IAC3E,oCAAoC;IAEpC,yBAAyB;IAEzB,QAAQ;IACR,8CAA8C;IAC9C,QAAQ;IACR,oDAAoD;IAEpD,0BAA0B;IAC1B,4BAA4B;IAC5B,uBAAuB;IACvB,0BAA0B;IAC1B,kCAAkC;IAClC,UAAU;IACV,OAAO;IAEP,qBAAqB;IACrB,+DAA+D;IAC/D,IAAI;IAEJ,2BAA2B;IAC3B,2BAA2B;IAC3B,6DAA6D;IAC7D,kEAAkE;IAElE,sEAAsE;IACtE,wGAAwG;IACxG,MAAM;IAEN,4BAA4B;IAE5B,2BAA2B;IAC3B,oDAAoD;IACpD,2DAA2D;IAC3D,oEAAoE;IAEpE,4BAA4B;IAC5B,uBAAuB;IACvB,uCAAuC;IACvC,sCAAsC;IACtC,0BAA0B;IAC1B,UAAU;IACV,OAAO;IAEP,sEAAsE;IAEtE,oBAAoB;IACpB,0BAA0B;IAC1B,uCAAuC;IACvC,QAAQ;IACR,IAAI;IAIS,AAAN,KAAK,CAAC,MAAM,CAAW,IAAY;QACxC,IAAI,CAAC,IAAI,EAAE;YACT,OAAO,IAAI,EAAE,EAAE,CAAC;SACjB;QAED,MAAM,IAAI,CAAC,eAAe,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC;QAExC,gDAAgD;QAChD,OAAO,IAAI,EAAE,CAAC,IAAI,EAAE;YAClB,QAAQ,EAAE;gBACR;oBACE,IAAI,EAAE,MAAM;oBACZ,KAAK,EAAE,EAAE;oBACT,OAAO,EAAE;wBACP,QAAQ,EAAE,IAAI;wBACd,MAAM,EAAE,CAAC;qBACV;iBACF;aACF;SACF,CAAC,CAAC;IACL,CAAC;CAsFF,CAAA;AA3QW;IADT,UAAU,EAAE;8BACY,aAAa;sDAAC;AAG7B;IADT,iBAAiB,CAAC,WAAW,CAAC;8BACP,YAAY;qDAAC;AAG3B;IADT,iBAAiB,CAAC,cAAc,CAAC;8BACP,eAAe;wDAAC;AAKjC;IAHT,MAAM,CAAC,yBAAyB,EAAE;QACjC,YAAY,EAAE,GAAG;KAClB,CAAC;;8DACsC;AAI3B;IAFZ,IAAI,EAAE;IACN,MAAM,CAAC,eAAe,CAAC;IACJ,WAAA,IAAI,EAAE,CAAA;;qCAAc,YAAY;;4CAoCnD;AA8GY;IAFZ,GAAG,EAAE;IACL,MAAM,CAAC,YAAY,CAAC;IACA,WAAA,MAAM,EAAE,CAAA;;;;6CAoB5B;AAvLU,eAAe;IAD3B,QAAQ,CAAC,MAAM,CAAC;GACJ,eAAe,CA6Q3B"}
@@ -0,0 +1,2 @@
1
+ export {};
2
+ //# sourceMappingURL=TwoFactorAuthController.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"TwoFactorAuthController.d.ts","sourceRoot":"","sources":["../../../src/controllers/TwoFactorAuthController.ts"],"names":[],"mappings":""}
@@ -0,0 +1,58 @@
1
+ // import { TokenDto } from './../dto/token-dto.js';
2
+ // import { BaseController, BasePath, Cookie, Ok, Post, Unauthorized } from '@spinajs/http';
3
+ // import { ISession, SessionProvider, User as UserModel, _user_ev, _user_update} from '@spinajs/rbac';
4
+ // import { Session } from "@spinajs/rbac-http";
5
+ // import { Body, Policy } from '@spinajs/http';
6
+ // import _ from 'lodash';
7
+ // import { User } from '../decorators.js';
8
+ // import { TwoFacRouteEnabled } from '../policies/2FaPolicy.js';
9
+ // import { AutoinjectService, _service } from '@spinajs/configuration';
10
+ // import { TwoFactorAuthProvider } from '../interfaces.js';
11
+ // import { DateTime } from 'luxon';
12
+ // import { UserLoginSuccess } from '../events/UserLoginSuccess.js';
13
+ // import { Autoinject } from '@spinajs/di';
14
+ // import { QueueService } from '@spinajs/queue';
15
+ // import { _chain, _check_arg, _non_empty, _non_null, _tap, _trim, _use } from '@spinajs/util';
16
+ // import { User2FaPassed } from '../events/User2FaPassed.js';
17
+ export {};
18
+ // export async function auth2Fa(user: User, token: string) {
19
+ // user = _check_arg(_non_null())(user, 'user');
20
+ // token = _check_arg(_trim(), _non_empty)(token, 'token');
21
+ // return _chain(
22
+ // _use(_service<TwoFactorAuthProvider>('rbac.twoFactorAuth'), 'twoFa'),
23
+ // _tap(async ({ twoFa }: { twoFa: TwoFactorAuthProvider }) => {
24
+ // await twoFa.verifyToken(token, user);
25
+ // }),
26
+ // _user_update({
27
+ // LastLoginAt: DateTime.now()
28
+ // }),
29
+ // _user_ev(User2FaPassed)
30
+ // );
31
+ // }
32
+ // @BasePath('user/auth')
33
+ // @Policy(TwoFacRouteEnabled)
34
+ // export class TwoFactorAuthController extends BaseController {
35
+ // @Autoinject(QueueService)
36
+ // protected Queue: QueueService;
37
+ // @AutoinjectService('rbac.session')
38
+ // protected SessionProvider: SessionProvider;
39
+ // @AutoinjectService('rbac.twoFactorAuth')
40
+ // protected TwoFactorAuthProvider: TwoFactorAuthProvider;
41
+ // @Post('2fa/verify')
42
+ // public async verifyToken(@User() logged: UserModel, @Body() token: TokenDto, @Session() session : ISession) {
43
+ // const result = await this.TwoFactorAuthProvider.verifyToken(token.Token, logged);
44
+ // if (result) {
45
+ // return new Unauthorized(`invalid token`);
46
+ // }
47
+ // logged.LastLoginAt = DateTime.now();
48
+ // await logged.update();
49
+ // await this.Queue.emit(new UserLoginSuccess(logged.Uuid));
50
+ // await this.SessionProvider.save(ssid, {
51
+ // Authorized: true,
52
+ // TwoFactorAuth_check: true,
53
+ // });
54
+ // // return user data
55
+ // return new Ok(logged.dehydrate());
56
+ // }
57
+ // }
58
+ //# sourceMappingURL=TwoFactorAuthController.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"TwoFactorAuthController.js","sourceRoot":"","sources":["../../../src/controllers/TwoFactorAuthController.ts"],"names":[],"mappings":"AAAA,oDAAoD;AACpD,4FAA4F;AAC5F,uGAAuG;AACvG,gDAAgD;AAChD,gDAAgD;AAChD,0BAA0B;AAC1B,2CAA2C;AAC3C,iEAAiE;AACjE,wEAAwE;AACxE,4DAA4D;AAC5D,oCAAoC;AACpC,oEAAoE;AACpE,4CAA4C;AAC5C,iDAAiD;AACjD,gGAAgG;AAChG,8DAA8D;;AAE9D,6DAA6D;AAC7D,kDAAkD;AAClD,6DAA6D;AAE7D,mBAAmB;AACnB,4EAA4E;AAC5E,oEAAoE;AACpE,8CAA8C;AAC9C,UAAU;AACV,qBAAqB;AACrB,oCAAoC;AACpC,UAAU;AACV,8BAA8B;AAC9B,OAAO;AACP,IAAI;AAEJ,yBAAyB;AACzB,8BAA8B;AAC9B,gEAAgE;AAChE,8BAA8B;AAC9B,mCAAmC;AAEnC,uCAAuC;AACvC,gDAAgD;AAEhD,6CAA6C;AAC7C,4DAA4D;AAE5D,wBAAwB;AACxB,kHAAkH;AAClH,wFAAwF;AAExF,oBAAoB;AACpB,kDAAkD;AAClD,QAAQ;AAER,2CAA2C;AAC3C,6BAA6B;AAE7B,gEAAgE;AAEhE,8CAA8C;AAC9C,0BAA0B;AAC1B,mCAAmC;AACnC,UAAU;AAEV,0BAA0B;AAC1B,yCAAyC;AACzC,MAAM;AACN,IAAI"}
@@ -0,0 +1,2 @@
1
+ export {};
2
+ //# sourceMappingURL=UserController.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"UserController.d.ts","sourceRoot":"","sources":["../../../src/controllers/UserController.ts"],"names":[],"mappings":""}
@@ -0,0 +1,51 @@
1
+ // import { PasswordDto } from '../dto/password-dto.js';
2
+ // import { User as UserModel, PasswordProvider, SessionProvider } from '@spinajs/rbac';
3
+ // import { BaseController, BasePath, Get, Ok, Body, Patch, Cookie } from '@spinajs/http';
4
+ // import { InvalidArgument, Forbidden } from '@spinajs/exceptions';
5
+ // import { Autoinject } from '@spinajs/di';
6
+ // import { Permission, User, Resource } from '../decorators.js';
7
+ // import { Config } from '@spinajs/configuration';
8
+ // import * as cs from 'cookie-signature';
9
+ // import _ from 'lodash';
10
+ export {};
11
+ // @BasePath('user')
12
+ // @Resource('user')
13
+ // export class UserController extends BaseController {
14
+ // @Autoinject()
15
+ // protected PasswordProvider: PasswordProvider;
16
+ // @Config('http.cookie.secret')
17
+ // protected CoockieSecret: string;
18
+ // @Autoinject()
19
+ // protected SessionProvider: SessionProvider;
20
+ // @Get()
21
+ // @Permission('readOwn')
22
+ // public async refresh(@User() user: UserModel, @Cookie() ssid: string) {
23
+ // // get user data from db
24
+ // await user.refresh();
25
+ // await user.Metadata.populate();
26
+ // // refresh session data from DB
27
+ // const sId: string | false = cs.unsign(ssid, this.CoockieSecret);
28
+ // if (sId) {
29
+ // const session = await this.SessionProvider.restore(sId);
30
+ // if (session) {
31
+ // session.Data.set('User', user.dehydrate());
32
+ // }
33
+ // }
34
+ // return new Ok(user.dehydrate());
35
+ // }
36
+ // @Patch('/password')
37
+ // public async newPassword(@User() user: UserModel, @Body() pwd: PasswordDto) {
38
+ // if (pwd.Password !== pwd.ConfirmPassword) {
39
+ // throw new InvalidArgument('password does not match');
40
+ // }
41
+ // const isValid = await this.PasswordProvider.verify(user.Password, pwd.OldPassword);
42
+ // if (!isValid) {
43
+ // throw new Forbidden('old password do not match');
44
+ // }
45
+ // const hashedPassword = await this.PasswordProvider.hash(pwd.Password);
46
+ // user.Password = hashedPassword;
47
+ // await user.update();
48
+ // return new Ok();
49
+ // }
50
+ // }
51
+ //# sourceMappingURL=UserController.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"UserController.js","sourceRoot":"","sources":["../../../src/controllers/UserController.ts"],"names":[],"mappings":"AAAA,wDAAwD;AACxD,wFAAwF;AACxF,0FAA0F;AAC1F,oEAAoE;AACpE,4CAA4C;AAC5C,iEAAiE;AACjE,mDAAmD;AACnD,0CAA0C;AAC1C,0BAA0B;;AAE1B,oBAAoB;AACpB,oBAAoB;AACpB,uDAAuD;AACvD,kBAAkB;AAClB,kDAAkD;AAElD,kCAAkC;AAClC,qCAAqC;AAErC,kBAAkB;AAClB,gDAAgD;AAEhD,WAAW;AACX,2BAA2B;AAC3B,4EAA4E;AAC5E,+BAA+B;AAC/B,4BAA4B;AAC5B,sCAAsC;AAEtC,sCAAsC;AACtC,uEAAuE;AACvE,iBAAiB;AACjB,iEAAiE;AACjE,uBAAuB;AACvB,sDAAsD;AACtD,UAAU;AACV,QAAQ;AAER,uCAAuC;AACvC,MAAM;AAEN,wBAAwB;AACxB,kFAAkF;AAClF,kDAAkD;AAClD,8DAA8D;AAC9D,QAAQ;AAER,0FAA0F;AAE1F,sBAAsB;AACtB,0DAA0D;AAC1D,QAAQ;AAER,6EAA6E;AAC7E,sCAAsC;AACtC,2BAA2B;AAC3B,uBAAuB;AACvB,MAAM;AACN,IAAI"}
@@ -0,0 +1,2 @@
1
+ export {};
2
+ //# sourceMappingURL=UserMetadata.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"UserMetadata.d.ts","sourceRoot":"","sources":["../../../src/controllers/UserMetadata.ts"],"names":[],"mappings":""}
@@ -0,0 +1,36 @@
1
+ // import { Put, Post, BasePath, Ok, Forbidden } from '@spinajs/http';
2
+ // import { User as UserModel, UserMetadata } from '@spinajs/rbac';
3
+ // import { Permission, User, Resource } from '../decorators.js';
4
+ // import { FromModel, AsModel } from '@spinajs/orm-http';
5
+ export {};
6
+ // @BasePath('user/:user/metadata')
7
+ // @Resource('user.metadata')
8
+ // export class UserMetaController {
9
+ // @Post()
10
+ // @Permission('updateOwn')
11
+ // public async addMetadata(@User() logged: UserModel, @FromModel() user: UserModel, @AsModel() meta: UserMetadata) {
12
+ // if (logged.Id !== user.Id) {
13
+ // throw new Forbidden('cannot add metadata to another user');
14
+ // }
15
+ // await user.Metadata.add(meta);
16
+ // return new Ok(meta);
17
+ // }
18
+ // @Put('user/:user/metadata/:meta')
19
+ // @Permission('updateOwn')
20
+ // public async updateMetadata(@User() logged: UserModel, @FromModel() user: UserModel, @FromModel() meta: UserMetadata) {
21
+ // if (logged.Id !== user.Id) {
22
+ // throw new Forbidden('cannot add metadata to another user');
23
+ // }
24
+ // await meta.User.populate();
25
+ // if (meta.User.Value.Id !== logged.Id) {
26
+ // throw new Forbidden('cannot edit metadata that is not own by user');
27
+ // }
28
+ // await meta.update();
29
+ // return new Ok();
30
+ // }
31
+ // }
32
+ // // function userOwnerPermissionStrategy(){
33
+ // // // 1. obtain current logged user
34
+ // // // 2. find
35
+ // // }
36
+ //# sourceMappingURL=UserMetadata.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"UserMetadata.js","sourceRoot":"","sources":["../../../src/controllers/UserMetadata.ts"],"names":[],"mappings":"AAAA,sEAAsE;AACtE,mEAAmE;AACnE,iEAAiE;AACjE,0DAA0D;;AAE1D,mCAAmC;AACnC,6BAA6B;AAC7B,oCAAoC;AAEpC,YAAY;AACZ,6BAA6B;AAC7B,uHAAuH;AACvH,mCAAmC;AACnC,oEAAoE;AACpE,QAAQ;AAER,qCAAqC;AACrC,2BAA2B;AAC3B,MAAM;AAEN,sCAAsC;AACtC,6BAA6B;AAC7B,4HAA4H;AAC5H,mCAAmC;AACnC,oEAAoE;AACpE,QAAQ;AAER,kCAAkC;AAClC,8CAA8C;AAC9C,6EAA6E;AAC7E,QAAQ;AAER,2BAA2B;AAE3B,uBAAuB;AACvB,MAAM;AACN,IAAI;AAEJ,6CAA6C;AAE7C,yCAAyC;AACzC,mBAAmB;AAEnB,OAAO"}
@@ -0,0 +1,17 @@
1
+ export declare const LoginDtoSchema: {
2
+ $schema: string;
3
+ title: string;
4
+ type: string;
5
+ properties: {
6
+ Login: {
7
+ type: string;
8
+ format: string;
9
+ };
10
+ };
11
+ required: string[];
12
+ };
13
+ export declare class UserLoginDto {
14
+ Email: string;
15
+ constructor(data: any);
16
+ }
17
+ //# sourceMappingURL=login-dto.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"login-dto.d.ts","sourceRoot":"","sources":["../../../src/dto/login-dto.ts"],"names":[],"mappings":"AAEA,eAAO,MAAM,cAAc;;;;;;;;;;;CAQ1B,CAAC;AAEF,qBACa,YAAY;IAChB,KAAK,EAAE,MAAM,CAAC;gBAET,IAAI,EAAE,GAAG;CAGtB"}
@@ -0,0 +1,30 @@
1
+ var __decorate = (this && this.__decorate) || function (decorators, target, key, desc) {
2
+ var c = arguments.length, r = c < 3 ? target : desc === null ? desc = Object.getOwnPropertyDescriptor(target, key) : desc, d;
3
+ if (typeof Reflect === "object" && typeof Reflect.decorate === "function") r = Reflect.decorate(decorators, target, key, desc);
4
+ else for (var i = decorators.length - 1; i >= 0; i--) if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;
5
+ return c > 3 && r && Object.defineProperty(target, key, r), r;
6
+ };
7
+ var __metadata = (this && this.__metadata) || function (k, v) {
8
+ if (typeof Reflect === "object" && typeof Reflect.metadata === "function") return Reflect.metadata(k, v);
9
+ };
10
+ import { Schema } from '@spinajs/validation';
11
+ export const LoginDtoSchema = {
12
+ $schema: 'http://json-schema.org/draft-07/schema#',
13
+ title: 'login DTO',
14
+ type: 'object',
15
+ properties: {
16
+ Login: { type: 'string', format: 'email' },
17
+ },
18
+ required: ['Email'],
19
+ };
20
+ let UserLoginDto = class UserLoginDto {
21
+ constructor(data) {
22
+ Object.assign(this, data);
23
+ }
24
+ };
25
+ UserLoginDto = __decorate([
26
+ Schema(LoginDtoSchema),
27
+ __metadata("design:paramtypes", [Object])
28
+ ], UserLoginDto);
29
+ export { UserLoginDto };
30
+ //# sourceMappingURL=login-dto.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"login-dto.js","sourceRoot":"","sources":["../../../src/dto/login-dto.ts"],"names":[],"mappings":";;;;;;;;;AAAA,OAAO,EAAE,MAAM,EAAE,MAAM,qBAAqB,CAAC;AAE7C,MAAM,CAAC,MAAM,cAAc,GAAG;IAC5B,OAAO,EAAE,yCAAyC;IAClD,KAAK,EAAE,WAAW;IAClB,IAAI,EAAE,QAAQ;IACd,UAAU,EAAE;QACV,KAAK,EAAE,EAAE,IAAI,EAAE,QAAQ,EAAE,MAAM,EAAE,OAAO,EAAE;KAC3C;IACD,QAAQ,EAAE,CAAC,OAAO,CAAC;CACpB,CAAC;AAGK,IAAM,YAAY,GAAlB,MAAM,YAAY;IAGvB,YAAY,IAAS;QACnB,MAAM,CAAC,MAAM,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;IAC5B,CAAC;CACF,CAAA;AANY,YAAY;IADxB,MAAM,CAAC,cAAc,CAAC;;GACV,YAAY,CAMxB"}
@@ -0,0 +1,30 @@
1
+ export declare const PasswordDtoSchema: {
2
+ $schema: string;
3
+ title: string;
4
+ type: string;
5
+ properties: {
6
+ OldPassword: {
7
+ type: string;
8
+ maxLength: number;
9
+ minLength: number;
10
+ };
11
+ Password: {
12
+ type: string;
13
+ maxLength: number;
14
+ minLength: number;
15
+ };
16
+ ConfirmPassword: {
17
+ type: string;
18
+ maxLength: number;
19
+ minLength: number;
20
+ };
21
+ };
22
+ required: string[];
23
+ };
24
+ export declare class PasswordDto {
25
+ OldPassword: string;
26
+ Password: string;
27
+ ConfirmPassword: string;
28
+ constructor(data: any);
29
+ }
30
+ //# sourceMappingURL=password-dto.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"password-dto.d.ts","sourceRoot":"","sources":["../../../src/dto/password-dto.ts"],"names":[],"mappings":"AAEA,eAAO,MAAM,iBAAiB;;;;;;;;;;;;;;;;;;;;;;CAU7B,CAAC;AAEF,qBACa,WAAW;IACf,WAAW,EAAE,MAAM,CAAC;IAEpB,QAAQ,EAAE,MAAM,CAAC;IAEjB,eAAe,EAAE,MAAM,CAAC;gBAEnB,IAAI,EAAE,GAAG;CAGtB"}
@@ -0,0 +1,32 @@
1
+ var __decorate = (this && this.__decorate) || function (decorators, target, key, desc) {
2
+ var c = arguments.length, r = c < 3 ? target : desc === null ? desc = Object.getOwnPropertyDescriptor(target, key) : desc, d;
3
+ if (typeof Reflect === "object" && typeof Reflect.decorate === "function") r = Reflect.decorate(decorators, target, key, desc);
4
+ else for (var i = decorators.length - 1; i >= 0; i--) if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;
5
+ return c > 3 && r && Object.defineProperty(target, key, r), r;
6
+ };
7
+ var __metadata = (this && this.__metadata) || function (k, v) {
8
+ if (typeof Reflect === "object" && typeof Reflect.metadata === "function") return Reflect.metadata(k, v);
9
+ };
10
+ import { Schema } from '@spinajs/validation';
11
+ export const PasswordDtoSchema = {
12
+ $schema: 'http://json-schema.org/draft-07/schema#',
13
+ title: 'User password DTO',
14
+ type: 'object',
15
+ properties: {
16
+ OldPassword: { type: 'string', maxLength: 32, minLength: 6 },
17
+ Password: { type: 'string', maxLength: 32, minLength: 6 },
18
+ ConfirmPassword: { type: 'string', maxLength: 32, minLength: 6 },
19
+ },
20
+ required: ['OldPassword', 'Password', 'ConfirmPassword'],
21
+ };
22
+ let PasswordDto = class PasswordDto {
23
+ constructor(data) {
24
+ Object.assign(this, data);
25
+ }
26
+ };
27
+ PasswordDto = __decorate([
28
+ Schema(PasswordDtoSchema),
29
+ __metadata("design:paramtypes", [Object])
30
+ ], PasswordDto);
31
+ export { PasswordDto };
32
+ //# sourceMappingURL=password-dto.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"password-dto.js","sourceRoot":"","sources":["../../../src/dto/password-dto.ts"],"names":[],"mappings":";;;;;;;;;AAAA,OAAO,EAAE,MAAM,EAAE,MAAM,qBAAqB,CAAC;AAE7C,MAAM,CAAC,MAAM,iBAAiB,GAAG;IAC/B,OAAO,EAAE,yCAAyC;IAClD,KAAK,EAAE,mBAAmB;IAC1B,IAAI,EAAE,QAAQ;IACd,UAAU,EAAE;QACV,WAAW,EAAE,EAAE,IAAI,EAAE,QAAQ,EAAE,SAAS,EAAE,EAAE,EAAE,SAAS,EAAE,CAAC,EAAE;QAC5D,QAAQ,EAAE,EAAE,IAAI,EAAE,QAAQ,EAAE,SAAS,EAAE,EAAE,EAAE,SAAS,EAAE,CAAC,EAAE;QACzD,eAAe,EAAE,EAAE,IAAI,EAAE,QAAQ,EAAE,SAAS,EAAE,EAAE,EAAE,SAAS,EAAE,CAAC,EAAE;KACjE;IACD,QAAQ,EAAE,CAAC,aAAa,EAAE,UAAU,EAAE,iBAAiB,CAAC;CACzD,CAAC;AAGK,IAAM,WAAW,GAAjB,MAAM,WAAW;IAOtB,YAAY,IAAS;QACnB,MAAM,CAAC,MAAM,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;IAC5B,CAAC;CACF,CAAA;AAVY,WAAW;IADvB,MAAM,CAAC,iBAAiB,CAAC;;GACb,WAAW,CAUvB"}
@@ -0,0 +1,24 @@
1
+ export declare const RestorePasswordDtoSchema: {
2
+ $schema: string;
3
+ title: string;
4
+ type: string;
5
+ properties: {
6
+ Password: {
7
+ type: string;
8
+ maxLength: number;
9
+ minLength: number;
10
+ };
11
+ ConfirmPassword: {
12
+ type: string;
13
+ maxLength: number;
14
+ minLength: number;
15
+ };
16
+ };
17
+ required: string[];
18
+ };
19
+ export declare class RestorePasswordDto {
20
+ Password: string;
21
+ ConfirmPassword: string;
22
+ constructor(data: any);
23
+ }
24
+ //# sourceMappingURL=restore-password-dto.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"restore-password-dto.d.ts","sourceRoot":"","sources":["../../../src/dto/restore-password-dto.ts"],"names":[],"mappings":"AAEA,eAAO,MAAM,wBAAwB;;;;;;;;;;;;;;;;;CASpC,CAAC;AAEF,qBACa,kBAAkB;IACtB,QAAQ,EAAE,MAAM,CAAC;IAEjB,eAAe,EAAE,MAAM,CAAC;gBAEnB,IAAI,EAAE,GAAG;CAGtB"}
@@ -0,0 +1,31 @@
1
+ var __decorate = (this && this.__decorate) || function (decorators, target, key, desc) {
2
+ var c = arguments.length, r = c < 3 ? target : desc === null ? desc = Object.getOwnPropertyDescriptor(target, key) : desc, d;
3
+ if (typeof Reflect === "object" && typeof Reflect.decorate === "function") r = Reflect.decorate(decorators, target, key, desc);
4
+ else for (var i = decorators.length - 1; i >= 0; i--) if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;
5
+ return c > 3 && r && Object.defineProperty(target, key, r), r;
6
+ };
7
+ var __metadata = (this && this.__metadata) || function (k, v) {
8
+ if (typeof Reflect === "object" && typeof Reflect.metadata === "function") return Reflect.metadata(k, v);
9
+ };
10
+ import { Schema } from '@spinajs/validation';
11
+ export const RestorePasswordDtoSchema = {
12
+ $schema: 'http://json-schema.org/draft-07/schema#',
13
+ title: 'User password DTO',
14
+ type: 'object',
15
+ properties: {
16
+ Password: { type: 'string', maxLength: 32, minLength: 6 },
17
+ ConfirmPassword: { type: 'string', maxLength: 32, minLength: 6 },
18
+ },
19
+ required: ['Password', 'ConfirmPassword'],
20
+ };
21
+ let RestorePasswordDto = class RestorePasswordDto {
22
+ constructor(data) {
23
+ Object.assign(this, data);
24
+ }
25
+ };
26
+ RestorePasswordDto = __decorate([
27
+ Schema(RestorePasswordDtoSchema),
28
+ __metadata("design:paramtypes", [Object])
29
+ ], RestorePasswordDto);
30
+ export { RestorePasswordDto };
31
+ //# sourceMappingURL=restore-password-dto.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"restore-password-dto.js","sourceRoot":"","sources":["../../../src/dto/restore-password-dto.ts"],"names":[],"mappings":";;;;;;;;;AAAA,OAAO,EAAE,MAAM,EAAE,MAAM,qBAAqB,CAAC;AAE7C,MAAM,CAAC,MAAM,wBAAwB,GAAG;IACtC,OAAO,EAAE,yCAAyC;IAClD,KAAK,EAAE,mBAAmB;IAC1B,IAAI,EAAE,QAAQ;IACd,UAAU,EAAE;QACV,QAAQ,EAAE,EAAE,IAAI,EAAE,QAAQ,EAAE,SAAS,EAAE,EAAE,EAAE,SAAS,EAAE,CAAC,EAAE;QACzD,eAAe,EAAE,EAAE,IAAI,EAAE,QAAQ,EAAE,SAAS,EAAE,EAAE,EAAE,SAAS,EAAE,CAAC,EAAE;KACjE;IACD,QAAQ,EAAE,CAAC,UAAU,EAAE,iBAAiB,CAAC;CAC1C,CAAC;AAGK,IAAM,kBAAkB,GAAxB,MAAM,kBAAkB;IAK7B,YAAY,IAAS;QACnB,MAAM,CAAC,MAAM,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;IAC5B,CAAC;CACF,CAAA;AARY,kBAAkB;IAD9B,MAAM,CAAC,wBAAwB,CAAC;;GACpB,kBAAkB,CAQ9B"}
@@ -0,0 +1,16 @@
1
+ export declare const TokenDtoSchema: {
2
+ $schema: string;
3
+ title: string;
4
+ type: string;
5
+ properties: {
6
+ Token: {
7
+ type: string;
8
+ maxLength: number;
9
+ };
10
+ };
11
+ };
12
+ export declare class TokenDto {
13
+ Token: string;
14
+ constructor(data: any);
15
+ }
16
+ //# sourceMappingURL=token-dto.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"token-dto.d.ts","sourceRoot":"","sources":["../../../src/dto/token-dto.ts"],"names":[],"mappings":"AACA,eAAO,MAAM,cAAc;;;;;;;;;;CAO1B,CAAC;AAEF,qBACa,QAAQ;IACZ,KAAK,EAAE,MAAM,CAAC;gBAET,IAAI,EAAE,GAAG;CAGtB"}
@@ -0,0 +1,29 @@
1
+ var __decorate = (this && this.__decorate) || function (decorators, target, key, desc) {
2
+ var c = arguments.length, r = c < 3 ? target : desc === null ? desc = Object.getOwnPropertyDescriptor(target, key) : desc, d;
3
+ if (typeof Reflect === "object" && typeof Reflect.decorate === "function") r = Reflect.decorate(decorators, target, key, desc);
4
+ else for (var i = decorators.length - 1; i >= 0; i--) if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;
5
+ return c > 3 && r && Object.defineProperty(target, key, r), r;
6
+ };
7
+ var __metadata = (this && this.__metadata) || function (k, v) {
8
+ if (typeof Reflect === "object" && typeof Reflect.metadata === "function") return Reflect.metadata(k, v);
9
+ };
10
+ import { Schema } from '@spinajs/validation';
11
+ export const TokenDtoSchema = {
12
+ $schema: 'http://json-schema.org/draft-07/schema#',
13
+ title: 'Token DTO',
14
+ type: 'object',
15
+ properties: {
16
+ Token: { type: 'string', maxLength: 64 },
17
+ },
18
+ };
19
+ let TokenDto = class TokenDto {
20
+ constructor(data) {
21
+ Object.assign(this, data);
22
+ }
23
+ };
24
+ TokenDto = __decorate([
25
+ Schema(TokenDtoSchema),
26
+ __metadata("design:paramtypes", [Object])
27
+ ], TokenDto);
28
+ export { TokenDto };
29
+ //# sourceMappingURL=token-dto.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"token-dto.js","sourceRoot":"","sources":["../../../src/dto/token-dto.ts"],"names":[],"mappings":";;;;;;;;;AAAA,OAAO,EAAE,MAAM,EAAE,MAAM,qBAAqB,CAAC;AAC7C,MAAM,CAAC,MAAM,cAAc,GAAG;IAC5B,OAAO,EAAE,yCAAyC;IAClD,KAAK,EAAE,WAAW;IAClB,IAAI,EAAE,QAAQ;IACd,UAAU,EAAE;QACV,KAAK,EAAE,EAAE,IAAI,EAAE,QAAQ,EAAE,SAAS,EAAE,EAAE,EAAE;KACzC;CACF,CAAC;AAGK,IAAM,QAAQ,GAAd,MAAM,QAAQ;IAGnB,YAAY,IAAS;QACnB,MAAM,CAAC,MAAM,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;IAC5B,CAAC;CACF,CAAA;AANY,QAAQ;IADpB,MAAM,CAAC,cAAc,CAAC;;GACV,QAAQ,CAMpB"}