@spinajs/rbac-http-user 2.0.319 → 2.0.320

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1 +1,11 @@
1
+ import { PasswordDto } from '../dto/password-dto.js';
2
+ import { User as UserModel, PasswordProvider, SessionProvider } from '@spinajs/rbac';
3
+ import { BaseController, Ok } from '@spinajs/http';
4
+ export declare class UserController extends BaseController {
5
+ protected PasswordProvider: PasswordProvider;
6
+ protected CoockieSecret: string;
7
+ protected SessionProvider: SessionProvider;
8
+ refresh(user: UserModel, ssid: string): Promise<Ok>;
9
+ newPassword(user: UserModel, pwd: PasswordDto): Promise<Ok>;
10
+ }
1
11
  //# sourceMappingURL=UserController.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"UserController.d.ts","sourceRoot":"","sources":["../../../src/controllers/UserController.ts"],"names":[],"mappings":""}
1
+ {"version":3,"file":"UserController.d.ts","sourceRoot":"","sources":["../../../src/controllers/UserController.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,WAAW,EAAE,MAAM,wBAAwB,CAAC;AACrD,OAAO,EAAE,IAAI,IAAI,SAAS,EAAE,gBAAgB,EAAE,eAAe,EAAiC,MAAM,eAAe,CAAC;AACpH,OAAO,EAAE,cAAc,EAAiB,EAAE,EAAuB,MAAM,eAAe,CAAC;AASvF,qBAEa,cAAe,SAAQ,cAAc;IAEhD,SAAS,CAAC,gBAAgB,EAAE,gBAAgB,CAAC;IAG7C,SAAS,CAAC,aAAa,EAAE,MAAM,CAAC;IAGhC,SAAS,CAAC,eAAe,EAAE,eAAe,CAAC;IAI9B,OAAO,CAAS,IAAI,EAAE,SAAS,EAAY,IAAI,EAAE,MAAM;IAkBvD,WAAW,CAAS,IAAI,EAAE,SAAS,EAAU,GAAG,EAAE,WAAW;CAkB3E"}
@@ -1,50 +1,106 @@
1
- // import { PasswordDto } from '../dto/password-dto.js';
2
- // import { User as UserModel, PasswordProvider, SessionProvider } from '@spinajs/rbac';
3
- // import { BaseController, BasePath, Get, Ok, Body, Patch, Cookie } from '@spinajs/http';
4
- // import { InvalidArgument, Forbidden } from '@spinajs/exceptions';
5
- // import { Autoinject } from '@spinajs/di';
6
- // import { Permission, User, Resource } from '../decorators.js';
7
- // import { Config } from '@spinajs/configuration';
8
- // import * as cs from 'cookie-signature';
9
- // import _ from 'lodash';
10
- // @BasePath('user')
11
- // @Resource('user')
12
- // export class UserController extends BaseController {
13
- // @Autoinject()
14
- // protected PasswordProvider: PasswordProvider;
15
- // @Config('http.cookie.secret')
16
- // protected CoockieSecret: string;
17
- // @Autoinject()
18
- // protected SessionProvider: SessionProvider;
19
- // @Get()
20
- // @Permission('readOwn')
21
- // public async refresh(@User() user: UserModel, @Cookie() ssid: string) {
22
- // // get user data from db
23
- // await user.refresh();
24
- // await user.Metadata.populate();
25
- // // refresh session data from DB
26
- // const sId: string | false = cs.unsign(ssid, this.CoockieSecret);
27
- // if (sId) {
28
- // const session = await this.SessionProvider.restore(sId);
29
- // if (session) {
30
- // session.Data.set('User', user.dehydrate());
31
- // }
32
- // }
33
- // return new Ok(user.dehydrate());
34
- // }
35
- // @Patch('/password')
36
- // public async newPassword(@User() user: UserModel, @Body() pwd: PasswordDto) {
37
- // if (pwd.Password !== pwd.ConfirmPassword) {
38
- // throw new InvalidArgument('password does not match');
39
- // }
40
- // const isValid = await this.PasswordProvider.verify(user.Password, pwd.OldPassword);
41
- // if (!isValid) {
42
- // throw new Forbidden('old password do not match');
43
- // }
44
- // const hashedPassword = await this.PasswordProvider.hash(pwd.Password);
45
- // user.Password = hashedPassword;
46
- // await user.update();
47
- // return new Ok();
48
- // }
49
- // }
1
+ "use strict";
2
+ var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
3
+ if (k2 === undefined) k2 = k;
4
+ var desc = Object.getOwnPropertyDescriptor(m, k);
5
+ if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
6
+ desc = { enumerable: true, get: function() { return m[k]; } };
7
+ }
8
+ Object.defineProperty(o, k2, desc);
9
+ }) : (function(o, m, k, k2) {
10
+ if (k2 === undefined) k2 = k;
11
+ o[k2] = m[k];
12
+ }));
13
+ var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
14
+ Object.defineProperty(o, "default", { enumerable: true, value: v });
15
+ }) : function(o, v) {
16
+ o["default"] = v;
17
+ });
18
+ var __decorate = (this && this.__decorate) || function (decorators, target, key, desc) {
19
+ var c = arguments.length, r = c < 3 ? target : desc === null ? desc = Object.getOwnPropertyDescriptor(target, key) : desc, d;
20
+ if (typeof Reflect === "object" && typeof Reflect.decorate === "function") r = Reflect.decorate(decorators, target, key, desc);
21
+ else for (var i = decorators.length - 1; i >= 0; i--) if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;
22
+ return c > 3 && r && Object.defineProperty(target, key, r), r;
23
+ };
24
+ var __importStar = (this && this.__importStar) || function (mod) {
25
+ if (mod && mod.__esModule) return mod;
26
+ var result = {};
27
+ if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
28
+ __setModuleDefault(result, mod);
29
+ return result;
30
+ };
31
+ var __metadata = (this && this.__metadata) || function (k, v) {
32
+ if (typeof Reflect === "object" && typeof Reflect.metadata === "function") return Reflect.metadata(k, v);
33
+ };
34
+ var __param = (this && this.__param) || function (paramIndex, decorator) {
35
+ return function (target, key) { decorator(target, key, paramIndex); }
36
+ };
37
+ Object.defineProperty(exports, "__esModule", { value: true });
38
+ exports.UserController = void 0;
39
+ const password_dto_js_1 = require("../dto/password-dto.js");
40
+ const rbac_1 = require("@spinajs/rbac");
41
+ const http_1 = require("@spinajs/http");
42
+ const exceptions_1 = require("@spinajs/exceptions");
43
+ const di_1 = require("@spinajs/di");
44
+ const configuration_1 = require("@spinajs/configuration");
45
+ const cs = __importStar(require("cookie-signature"));
46
+ const rbac_http_1 = require("@spinajs/rbac-http");
47
+ const util_1 = require("@spinajs/util");
48
+ let UserController = class UserController extends http_1.BaseController {
49
+ async refresh(user, ssid) {
50
+ // get user data from db
51
+ await user.refresh();
52
+ await user.Metadata.populate();
53
+ // refresh session data from DB
54
+ const sId = cs.unsign(ssid, this.CoockieSecret);
55
+ if (sId) {
56
+ const session = await this.SessionProvider.restore(sId);
57
+ if (session) {
58
+ session.Data.set('User', user.dehydrate());
59
+ }
60
+ }
61
+ return new http_1.Ok(user.dehydrate());
62
+ }
63
+ async newPassword(user, pwd) {
64
+ if (pwd.Password !== pwd.ConfirmPassword) {
65
+ throw new exceptions_1.InvalidArgument('password does not match');
66
+ }
67
+ return new http_1.Ok((0, util_1._chain)(user, (0, util_1._either)((0, rbac_1.passwordMatch)(pwd.OldPassword), (0, rbac_1.changePassword)(pwd.Password), () => {
68
+ throw new exceptions_1.InvalidArgument('Old password is incorrect');
69
+ })));
70
+ }
71
+ };
72
+ exports.UserController = UserController;
73
+ __decorate([
74
+ (0, di_1.Autoinject)(),
75
+ __metadata("design:type", rbac_1.PasswordProvider)
76
+ ], UserController.prototype, "PasswordProvider", void 0);
77
+ __decorate([
78
+ (0, configuration_1.Config)('http.cookie.secret'),
79
+ __metadata("design:type", String)
80
+ ], UserController.prototype, "CoockieSecret", void 0);
81
+ __decorate([
82
+ (0, di_1.Autoinject)(),
83
+ __metadata("design:type", rbac_1.SessionProvider)
84
+ ], UserController.prototype, "SessionProvider", void 0);
85
+ __decorate([
86
+ (0, http_1.Get)(),
87
+ (0, rbac_http_1.Permission)('readOwn'),
88
+ __param(0, (0, rbac_http_1.User)()),
89
+ __param(1, (0, http_1.Cookie)()),
90
+ __metadata("design:type", Function),
91
+ __metadata("design:paramtypes", [rbac_1.User, String]),
92
+ __metadata("design:returntype", Promise)
93
+ ], UserController.prototype, "refresh", null);
94
+ __decorate([
95
+ (0, http_1.Patch)('/password'),
96
+ __param(0, (0, rbac_http_1.User)()),
97
+ __param(1, (0, http_1.Body)()),
98
+ __metadata("design:type", Function),
99
+ __metadata("design:paramtypes", [rbac_1.User, password_dto_js_1.PasswordDto]),
100
+ __metadata("design:returntype", Promise)
101
+ ], UserController.prototype, "newPassword", null);
102
+ exports.UserController = UserController = __decorate([
103
+ (0, http_1.BasePath)('user'),
104
+ (0, rbac_http_1.Resource)('user')
105
+ ], UserController);
50
106
  //# sourceMappingURL=UserController.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"UserController.js","sourceRoot":"","sources":["../../../src/controllers/UserController.ts"],"names":[],"mappings":"AAAA,wDAAwD;AACxD,wFAAwF;AACxF,0FAA0F;AAC1F,oEAAoE;AACpE,4CAA4C;AAC5C,iEAAiE;AACjE,mDAAmD;AACnD,0CAA0C;AAC1C,0BAA0B;AAE1B,oBAAoB;AACpB,oBAAoB;AACpB,uDAAuD;AACvD,kBAAkB;AAClB,kDAAkD;AAElD,kCAAkC;AAClC,qCAAqC;AAErC,kBAAkB;AAClB,gDAAgD;AAEhD,WAAW;AACX,2BAA2B;AAC3B,4EAA4E;AAC5E,+BAA+B;AAC/B,4BAA4B;AAC5B,sCAAsC;AAEtC,sCAAsC;AACtC,uEAAuE;AACvE,iBAAiB;AACjB,iEAAiE;AACjE,uBAAuB;AACvB,sDAAsD;AACtD,UAAU;AACV,QAAQ;AAER,uCAAuC;AACvC,MAAM;AAEN,wBAAwB;AACxB,kFAAkF;AAClF,kDAAkD;AAClD,8DAA8D;AAC9D,QAAQ;AAER,0FAA0F;AAE1F,sBAAsB;AACtB,0DAA0D;AAC1D,QAAQ;AAER,6EAA6E;AAC7E,sCAAsC;AACtC,2BAA2B;AAC3B,uBAAuB;AACvB,MAAM;AACN,IAAI"}
1
+ {"version":3,"file":"UserController.js","sourceRoot":"","sources":["../../../src/controllers/UserController.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA,4DAAqD;AACrD,wCAAoH;AACpH,wCAAuF;AACvF,oDAAsD;AACtD,oCAAyC;AACzC,0DAAgD;AAChD,qDAAuC;AAEvC,kDAAgE;AAChE,wCAAgD;AAIzC,IAAM,cAAc,GAApB,MAAM,cAAe,SAAQ,qBAAc;IAYnC,AAAN,KAAK,CAAC,OAAO,CAAS,IAAe,EAAY,IAAY;QAClE,wBAAwB;QACxB,MAAM,IAAI,CAAC,OAAO,EAAE,CAAC;QACrB,MAAM,IAAI,CAAC,QAAQ,CAAC,QAAQ,EAAE,CAAC;QAE/B,+BAA+B;QAC/B,MAAM,GAAG,GAAmB,EAAE,CAAC,MAAM,CAAC,IAAI,EAAE,IAAI,CAAC,aAAa,CAAC,CAAC;QAChE,IAAI,GAAG,EAAE;YACP,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,eAAe,CAAC,OAAO,CAAC,GAAG,CAAC,CAAC;YACxD,IAAI,OAAO,EAAE;gBACX,OAAO,CAAC,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,IAAI,CAAC,SAAS,EAAE,CAAC,CAAC;aAC5C;SACF;QAED,OAAO,IAAI,SAAE,CAAC,IAAI,CAAC,SAAS,EAAE,CAAC,CAAC;IAClC,CAAC;IAGY,AAAN,KAAK,CAAC,WAAW,CAAS,IAAe,EAAU,GAAgB;QACxE,IAAI,GAAG,CAAC,QAAQ,KAAK,GAAG,CAAC,eAAe,EAAE;YACxC,MAAM,IAAI,4BAAe,CAAC,yBAAyB,CAAC,CAAC;SACtD;QAGD,OAAO,IAAI,SAAE,CACX,IAAA,aAAM,EACJ,IAAI,EACJ,IAAA,cAAO,EACH,IAAA,oBAAa,EAAC,GAAG,CAAC,WAAW,CAAC,EAC9B,IAAA,qBAAc,EAAC,GAAG,CAAC,QAAQ,CAAC,EAC5B,GAAG,EAAE;YACD,MAAM,IAAI,4BAAe,CAAC,2BAA2B,CAAC,CAAC;QAC3D,CAAC,CAAC,CACP,CACF,CAAC;IACJ,CAAC;CACF,CAAA;AAhDY,wCAAc;AAEf;IADT,IAAA,eAAU,GAAE;8BACe,uBAAgB;wDAAC;AAGnC;IADT,IAAA,sBAAM,EAAC,oBAAoB,CAAC;;qDACG;AAGtB;IADT,IAAA,eAAU,GAAE;8BACc,sBAAe;uDAAC;AAI9B;IAFZ,IAAA,UAAG,GAAE;IACL,IAAA,sBAAU,EAAC,SAAS,CAAC;IACA,WAAA,IAAA,gBAAI,GAAE,CAAA;IAAmB,WAAA,IAAA,aAAM,GAAE,CAAA;;qCAApB,WAAS;;6CAe3C;AAGY;IADZ,IAAA,YAAK,EAAC,WAAW,CAAC;IACO,WAAA,IAAA,gBAAI,GAAE,CAAA;IAAmB,WAAA,IAAA,WAAI,GAAE,CAAA;;qCAAlB,WAAS,EAAe,6BAAW;;iDAiBzE;yBA/CU,cAAc;IAF1B,IAAA,eAAQ,EAAC,MAAM,CAAC;IAChB,IAAA,oBAAQ,EAAC,MAAM,CAAC;GACJ,cAAc,CAgD1B"}
@@ -1,2 +1,11 @@
1
- export {};
1
+ import { PasswordDto } from '../dto/password-dto.js';
2
+ import { User as UserModel, PasswordProvider, SessionProvider } from '@spinajs/rbac';
3
+ import { BaseController, Ok } from '@spinajs/http';
4
+ export declare class UserController extends BaseController {
5
+ protected PasswordProvider: PasswordProvider;
6
+ protected CoockieSecret: string;
7
+ protected SessionProvider: SessionProvider;
8
+ refresh(user: UserModel, ssid: string): Promise<Ok>;
9
+ newPassword(user: UserModel, pwd: PasswordDto): Promise<Ok>;
10
+ }
2
11
  //# sourceMappingURL=UserController.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"UserController.d.ts","sourceRoot":"","sources":["../../../src/controllers/UserController.ts"],"names":[],"mappings":""}
1
+ {"version":3,"file":"UserController.d.ts","sourceRoot":"","sources":["../../../src/controllers/UserController.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,WAAW,EAAE,MAAM,wBAAwB,CAAC;AACrD,OAAO,EAAE,IAAI,IAAI,SAAS,EAAE,gBAAgB,EAAE,eAAe,EAAiC,MAAM,eAAe,CAAC;AACpH,OAAO,EAAE,cAAc,EAAiB,EAAE,EAAuB,MAAM,eAAe,CAAC;AASvF,qBAEa,cAAe,SAAQ,cAAc;IAEhD,SAAS,CAAC,gBAAgB,EAAE,gBAAgB,CAAC;IAG7C,SAAS,CAAC,aAAa,EAAE,MAAM,CAAC;IAGhC,SAAS,CAAC,eAAe,EAAE,eAAe,CAAC;IAI9B,OAAO,CAAS,IAAI,EAAE,SAAS,EAAY,IAAI,EAAE,MAAM;IAkBvD,WAAW,CAAS,IAAI,EAAE,SAAS,EAAU,GAAG,EAAE,WAAW;CAkB3E"}
@@ -1,51 +1,80 @@
1
- // import { PasswordDto } from '../dto/password-dto.js';
2
- // import { User as UserModel, PasswordProvider, SessionProvider } from '@spinajs/rbac';
3
- // import { BaseController, BasePath, Get, Ok, Body, Patch, Cookie } from '@spinajs/http';
4
- // import { InvalidArgument, Forbidden } from '@spinajs/exceptions';
5
- // import { Autoinject } from '@spinajs/di';
6
- // import { Permission, User, Resource } from '../decorators.js';
7
- // import { Config } from '@spinajs/configuration';
8
- // import * as cs from 'cookie-signature';
9
- // import _ from 'lodash';
10
- export {};
11
- // @BasePath('user')
12
- // @Resource('user')
13
- // export class UserController extends BaseController {
14
- // @Autoinject()
15
- // protected PasswordProvider: PasswordProvider;
16
- // @Config('http.cookie.secret')
17
- // protected CoockieSecret: string;
18
- // @Autoinject()
19
- // protected SessionProvider: SessionProvider;
20
- // @Get()
21
- // @Permission('readOwn')
22
- // public async refresh(@User() user: UserModel, @Cookie() ssid: string) {
23
- // // get user data from db
24
- // await user.refresh();
25
- // await user.Metadata.populate();
26
- // // refresh session data from DB
27
- // const sId: string | false = cs.unsign(ssid, this.CoockieSecret);
28
- // if (sId) {
29
- // const session = await this.SessionProvider.restore(sId);
30
- // if (session) {
31
- // session.Data.set('User', user.dehydrate());
32
- // }
33
- // }
34
- // return new Ok(user.dehydrate());
35
- // }
36
- // @Patch('/password')
37
- // public async newPassword(@User() user: UserModel, @Body() pwd: PasswordDto) {
38
- // if (pwd.Password !== pwd.ConfirmPassword) {
39
- // throw new InvalidArgument('password does not match');
40
- // }
41
- // const isValid = await this.PasswordProvider.verify(user.Password, pwd.OldPassword);
42
- // if (!isValid) {
43
- // throw new Forbidden('old password do not match');
44
- // }
45
- // const hashedPassword = await this.PasswordProvider.hash(pwd.Password);
46
- // user.Password = hashedPassword;
47
- // await user.update();
48
- // return new Ok();
49
- // }
50
- // }
1
+ var __decorate = (this && this.__decorate) || function (decorators, target, key, desc) {
2
+ var c = arguments.length, r = c < 3 ? target : desc === null ? desc = Object.getOwnPropertyDescriptor(target, key) : desc, d;
3
+ if (typeof Reflect === "object" && typeof Reflect.decorate === "function") r = Reflect.decorate(decorators, target, key, desc);
4
+ else for (var i = decorators.length - 1; i >= 0; i--) if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;
5
+ return c > 3 && r && Object.defineProperty(target, key, r), r;
6
+ };
7
+ var __metadata = (this && this.__metadata) || function (k, v) {
8
+ if (typeof Reflect === "object" && typeof Reflect.metadata === "function") return Reflect.metadata(k, v);
9
+ };
10
+ var __param = (this && this.__param) || function (paramIndex, decorator) {
11
+ return function (target, key) { decorator(target, key, paramIndex); }
12
+ };
13
+ import { PasswordDto } from '../dto/password-dto.js';
14
+ import { User as UserModel, PasswordProvider, SessionProvider, passwordMatch, changePassword } from '@spinajs/rbac';
15
+ import { BaseController, BasePath, Get, Ok, Body, Patch, Cookie } from '@spinajs/http';
16
+ import { InvalidArgument } from '@spinajs/exceptions';
17
+ import { Autoinject } from '@spinajs/di';
18
+ import { Config } from '@spinajs/configuration';
19
+ import * as cs from 'cookie-signature';
20
+ import { Permission, Resource, User } from '@spinajs/rbac-http';
21
+ import { _chain, _either } from '@spinajs/util';
22
+ let UserController = class UserController extends BaseController {
23
+ async refresh(user, ssid) {
24
+ // get user data from db
25
+ await user.refresh();
26
+ await user.Metadata.populate();
27
+ // refresh session data from DB
28
+ const sId = cs.unsign(ssid, this.CoockieSecret);
29
+ if (sId) {
30
+ const session = await this.SessionProvider.restore(sId);
31
+ if (session) {
32
+ session.Data.set('User', user.dehydrate());
33
+ }
34
+ }
35
+ return new Ok(user.dehydrate());
36
+ }
37
+ async newPassword(user, pwd) {
38
+ if (pwd.Password !== pwd.ConfirmPassword) {
39
+ throw new InvalidArgument('password does not match');
40
+ }
41
+ return new Ok(_chain(user, _either(passwordMatch(pwd.OldPassword), changePassword(pwd.Password), () => {
42
+ throw new InvalidArgument('Old password is incorrect');
43
+ })));
44
+ }
45
+ };
46
+ __decorate([
47
+ Autoinject(),
48
+ __metadata("design:type", PasswordProvider)
49
+ ], UserController.prototype, "PasswordProvider", void 0);
50
+ __decorate([
51
+ Config('http.cookie.secret'),
52
+ __metadata("design:type", String)
53
+ ], UserController.prototype, "CoockieSecret", void 0);
54
+ __decorate([
55
+ Autoinject(),
56
+ __metadata("design:type", SessionProvider)
57
+ ], UserController.prototype, "SessionProvider", void 0);
58
+ __decorate([
59
+ Get(),
60
+ Permission('readOwn'),
61
+ __param(0, User()),
62
+ __param(1, Cookie()),
63
+ __metadata("design:type", Function),
64
+ __metadata("design:paramtypes", [UserModel, String]),
65
+ __metadata("design:returntype", Promise)
66
+ ], UserController.prototype, "refresh", null);
67
+ __decorate([
68
+ Patch('/password'),
69
+ __param(0, User()),
70
+ __param(1, Body()),
71
+ __metadata("design:type", Function),
72
+ __metadata("design:paramtypes", [UserModel, PasswordDto]),
73
+ __metadata("design:returntype", Promise)
74
+ ], UserController.prototype, "newPassword", null);
75
+ UserController = __decorate([
76
+ BasePath('user'),
77
+ Resource('user')
78
+ ], UserController);
79
+ export { UserController };
51
80
  //# sourceMappingURL=UserController.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"UserController.js","sourceRoot":"","sources":["../../../src/controllers/UserController.ts"],"names":[],"mappings":"AAAA,wDAAwD;AACxD,wFAAwF;AACxF,0FAA0F;AAC1F,oEAAoE;AACpE,4CAA4C;AAC5C,iEAAiE;AACjE,mDAAmD;AACnD,0CAA0C;AAC1C,0BAA0B;;AAE1B,oBAAoB;AACpB,oBAAoB;AACpB,uDAAuD;AACvD,kBAAkB;AAClB,kDAAkD;AAElD,kCAAkC;AAClC,qCAAqC;AAErC,kBAAkB;AAClB,gDAAgD;AAEhD,WAAW;AACX,2BAA2B;AAC3B,4EAA4E;AAC5E,+BAA+B;AAC/B,4BAA4B;AAC5B,sCAAsC;AAEtC,sCAAsC;AACtC,uEAAuE;AACvE,iBAAiB;AACjB,iEAAiE;AACjE,uBAAuB;AACvB,sDAAsD;AACtD,UAAU;AACV,QAAQ;AAER,uCAAuC;AACvC,MAAM;AAEN,wBAAwB;AACxB,kFAAkF;AAClF,kDAAkD;AAClD,8DAA8D;AAC9D,QAAQ;AAER,0FAA0F;AAE1F,sBAAsB;AACtB,0DAA0D;AAC1D,QAAQ;AAER,6EAA6E;AAC7E,sCAAsC;AACtC,2BAA2B;AAC3B,uBAAuB;AACvB,MAAM;AACN,IAAI"}
1
+ {"version":3,"file":"UserController.js","sourceRoot":"","sources":["../../../src/controllers/UserController.ts"],"names":[],"mappings":";;;;;;;;;;;;AAAA,OAAO,EAAE,WAAW,EAAE,MAAM,wBAAwB,CAAC;AACrD,OAAO,EAAE,IAAI,IAAI,SAAS,EAAE,gBAAgB,EAAE,eAAe,EAAE,aAAa,EAAE,cAAc,EAAE,MAAM,eAAe,CAAC;AACpH,OAAO,EAAE,cAAc,EAAE,QAAQ,EAAE,GAAG,EAAE,EAAE,EAAE,IAAI,EAAE,KAAK,EAAE,MAAM,EAAE,MAAM,eAAe,CAAC;AACvF,OAAO,EAAE,eAAe,EAAE,MAAM,qBAAqB,CAAC;AACtD,OAAO,EAAE,UAAU,EAAE,MAAM,aAAa,CAAC;AACzC,OAAO,EAAE,MAAM,EAAE,MAAM,wBAAwB,CAAC;AAChD,OAAO,KAAK,EAAE,MAAM,kBAAkB,CAAC;AAEvC,OAAO,EAAE,UAAU,EAAE,QAAQ,EAAE,IAAI,EAAE,MAAM,oBAAoB,CAAC;AAChE,OAAO,EAAE,MAAM,EAAE,OAAO,EAAE,MAAM,eAAe,CAAC;AAIzC,IAAM,cAAc,GAApB,MAAM,cAAe,SAAQ,cAAc;IAYnC,AAAN,KAAK,CAAC,OAAO,CAAS,IAAe,EAAY,IAAY;QAClE,wBAAwB;QACxB,MAAM,IAAI,CAAC,OAAO,EAAE,CAAC;QACrB,MAAM,IAAI,CAAC,QAAQ,CAAC,QAAQ,EAAE,CAAC;QAE/B,+BAA+B;QAC/B,MAAM,GAAG,GAAmB,EAAE,CAAC,MAAM,CAAC,IAAI,EAAE,IAAI,CAAC,aAAa,CAAC,CAAC;QAChE,IAAI,GAAG,EAAE;YACP,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,eAAe,CAAC,OAAO,CAAC,GAAG,CAAC,CAAC;YACxD,IAAI,OAAO,EAAE;gBACX,OAAO,CAAC,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,IAAI,CAAC,SAAS,EAAE,CAAC,CAAC;aAC5C;SACF;QAED,OAAO,IAAI,EAAE,CAAC,IAAI,CAAC,SAAS,EAAE,CAAC,CAAC;IAClC,CAAC;IAGY,AAAN,KAAK,CAAC,WAAW,CAAS,IAAe,EAAU,GAAgB;QACxE,IAAI,GAAG,CAAC,QAAQ,KAAK,GAAG,CAAC,eAAe,EAAE;YACxC,MAAM,IAAI,eAAe,CAAC,yBAAyB,CAAC,CAAC;SACtD;QAGD,OAAO,IAAI,EAAE,CACX,MAAM,CACJ,IAAI,EACJ,OAAO,CACH,aAAa,CAAC,GAAG,CAAC,WAAW,CAAC,EAC9B,cAAc,CAAC,GAAG,CAAC,QAAQ,CAAC,EAC5B,GAAG,EAAE;YACD,MAAM,IAAI,eAAe,CAAC,2BAA2B,CAAC,CAAC;QAC3D,CAAC,CAAC,CACP,CACF,CAAC;IACJ,CAAC;CACF,CAAA;AA9CW;IADT,UAAU,EAAE;8BACe,gBAAgB;wDAAC;AAGnC;IADT,MAAM,CAAC,oBAAoB,CAAC;;qDACG;AAGtB;IADT,UAAU,EAAE;8BACc,eAAe;uDAAC;AAI9B;IAFZ,GAAG,EAAE;IACL,UAAU,CAAC,SAAS,CAAC;IACA,WAAA,IAAI,EAAE,CAAA;IAAmB,WAAA,MAAM,EAAE,CAAA;;qCAApB,SAAS;;6CAe3C;AAGY;IADZ,KAAK,CAAC,WAAW,CAAC;IACO,WAAA,IAAI,EAAE,CAAA;IAAmB,WAAA,IAAI,EAAE,CAAA;;qCAAlB,SAAS,EAAe,WAAW;;iDAiBzE;AA/CU,cAAc;IAF1B,QAAQ,CAAC,MAAM,CAAC;IAChB,QAAQ,CAAC,MAAM,CAAC;GACJ,cAAc,CAgD1B"}