@spinajs/rbac-http 2.0.131 → 2.0.133
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/lib/cjs/index.d.ts +0 -4
- package/lib/cjs/index.d.ts.map +1 -1
- package/lib/cjs/index.js +0 -4
- package/lib/cjs/index.js.map +1 -1
- package/lib/cjs/middlewares.js +3 -3
- package/lib/cjs/middlewares.js.map +1 -1
- package/lib/mjs/index.d.ts +0 -4
- package/lib/mjs/index.d.ts.map +1 -1
- package/lib/mjs/index.js +0 -4
- package/lib/mjs/index.js.map +1 -1
- package/lib/mjs/middlewares.js +5 -5
- package/lib/mjs/middlewares.js.map +1 -1
- package/lib/tsconfig.cjs.tsbuildinfo +1 -1
- package/lib/tsconfig.mjs.tsbuildinfo +1 -1
- package/package.json +16 -24
- package/lib/cjs/2fa/SpeakEasy2FaToken.d.ts +0 -14
- package/lib/cjs/2fa/SpeakEasy2FaToken.d.ts.map +0 -1
- package/lib/cjs/2fa/SpeakEasy2FaToken.js +0 -91
- package/lib/cjs/2fa/SpeakEasy2FaToken.js.map +0 -1
- package/lib/cjs/config/rbac-http.d.ts +0 -30
- package/lib/cjs/config/rbac-http.d.ts.map +0 -1
- package/lib/cjs/config/rbac-http.js +0 -43
- package/lib/cjs/config/rbac-http.js.map +0 -1
- package/lib/cjs/controllers/LoginController.d.ts +0 -35
- package/lib/cjs/controllers/LoginController.d.ts.map +0 -1
- package/lib/cjs/controllers/LoginController.js +0 -307
- package/lib/cjs/controllers/LoginController.js.map +0 -1
- package/lib/cjs/controllers/TwoFactorAuthController.d.ts +0 -12
- package/lib/cjs/controllers/TwoFactorAuthController.d.ts.map +0 -1
- package/lib/cjs/controllers/TwoFactorAuthController.js +0 -71
- package/lib/cjs/controllers/TwoFactorAuthController.js.map +0 -1
- package/lib/cjs/controllers/UserAdminController.d.ts +0 -4
- package/lib/cjs/controllers/UserAdminController.d.ts.map +0 -1
- package/lib/cjs/controllers/UserAdminController.js +0 -19
- package/lib/cjs/controllers/UserAdminController.js.map +0 -1
- package/lib/cjs/controllers/UserController.d.ts +0 -11
- package/lib/cjs/controllers/UserController.d.ts.map +0 -1
- package/lib/cjs/controllers/UserController.js +0 -110
- package/lib/cjs/controllers/UserController.js.map +0 -1
- package/lib/cjs/controllers/UserMetadata.d.ts +0 -7
- package/lib/cjs/controllers/UserMetadata.d.ts.map +0 -1
- package/lib/cjs/controllers/UserMetadata.js +0 -69
- package/lib/cjs/controllers/UserMetadata.js.map +0 -1
- package/lib/cjs/dto/login-dto.d.ts +0 -17
- package/lib/cjs/dto/login-dto.d.ts.map +0 -1
- package/lib/cjs/dto/login-dto.js +0 -33
- package/lib/cjs/dto/login-dto.js.map +0 -1
- package/lib/cjs/dto/password-dto.d.ts +0 -30
- package/lib/cjs/dto/password-dto.d.ts.map +0 -1
- package/lib/cjs/dto/password-dto.js +0 -35
- package/lib/cjs/dto/password-dto.js.map +0 -1
- package/lib/cjs/dto/restore-password-dto.d.ts +0 -24
- package/lib/cjs/dto/restore-password-dto.d.ts.map +0 -1
- package/lib/cjs/dto/restore-password-dto.js +0 -34
- package/lib/cjs/dto/restore-password-dto.js.map +0 -1
- package/lib/cjs/dto/token-dto.d.ts +0 -16
- package/lib/cjs/dto/token-dto.d.ts.map +0 -1
- package/lib/cjs/dto/token-dto.js +0 -32
- package/lib/cjs/dto/token-dto.js.map +0 -1
- package/lib/cjs/dto/user-dto.d.ts +0 -22
- package/lib/cjs/dto/user-dto.d.ts.map +0 -1
- package/lib/cjs/dto/user-dto.js +0 -33
- package/lib/cjs/dto/user-dto.js.map +0 -1
- package/lib/cjs/dto/userLogin-dto.d.ts +0 -22
- package/lib/cjs/dto/userLogin-dto.d.ts.map +0 -1
- package/lib/cjs/dto/userLogin-dto.js +0 -34
- package/lib/cjs/dto/userLogin-dto.js.map +0 -1
- package/lib/cjs/events/UserLoginFailed.d.ts +0 -6
- package/lib/cjs/events/UserLoginFailed.d.ts.map +0 -1
- package/lib/cjs/events/UserLoginFailed.js +0 -25
- package/lib/cjs/events/UserLoginFailed.js.map +0 -1
- package/lib/cjs/events/UserLoginSuccess.d.ts +0 -6
- package/lib/cjs/events/UserLoginSuccess.d.ts.map +0 -1
- package/lib/cjs/events/UserLoginSuccess.js +0 -25
- package/lib/cjs/events/UserLoginSuccess.js.map +0 -1
- package/lib/cjs/events/UserPassordRestore.d.ts +0 -7
- package/lib/cjs/events/UserPassordRestore.d.ts.map +0 -1
- package/lib/cjs/events/UserPassordRestore.js +0 -26
- package/lib/cjs/events/UserPassordRestore.js.map +0 -1
- package/lib/cjs/fingerprint/FingerprintJs.d.ts +0 -4
- package/lib/cjs/fingerprint/FingerprintJs.d.ts.map +0 -1
- package/lib/cjs/fingerprint/FingerprintJs.js +0 -18
- package/lib/cjs/fingerprint/FingerprintJs.js.map +0 -1
- package/lib/cjs/policies/2FaPolicy.d.ts +0 -8
- package/lib/cjs/policies/2FaPolicy.d.ts.map +0 -1
- package/lib/cjs/policies/2FaPolicy.js +0 -32
- package/lib/cjs/policies/2FaPolicy.js.map +0 -1
- package/lib/cjs/policies/captchaPolicy.d.ts +0 -1
- package/lib/cjs/policies/captchaPolicy.d.ts.map +0 -1
- package/lib/cjs/policies/captchaPolicy.js +0 -1
- package/lib/cjs/policies/captchaPolicy.js.map +0 -1
- package/lib/mjs/2fa/SpeakEasy2FaToken.d.ts +0 -14
- package/lib/mjs/2fa/SpeakEasy2FaToken.d.ts.map +0 -1
- package/lib/mjs/2fa/SpeakEasy2FaToken.js +0 -65
- package/lib/mjs/2fa/SpeakEasy2FaToken.js.map +0 -1
- package/lib/mjs/config/rbac-http.d.ts +0 -30
- package/lib/mjs/config/rbac-http.d.ts.map +0 -1
- package/lib/mjs/config/rbac-http.js +0 -41
- package/lib/mjs/config/rbac-http.js.map +0 -1
- package/lib/mjs/controllers/LoginController.d.ts +0 -35
- package/lib/mjs/controllers/LoginController.d.ts.map +0 -1
- package/lib/mjs/controllers/LoginController.js +0 -304
- package/lib/mjs/controllers/LoginController.js.map +0 -1
- package/lib/mjs/controllers/TwoFactorAuthController.d.ts +0 -12
- package/lib/mjs/controllers/TwoFactorAuthController.d.ts.map +0 -1
- package/lib/mjs/controllers/TwoFactorAuthController.js +0 -68
- package/lib/mjs/controllers/TwoFactorAuthController.js.map +0 -1
- package/lib/mjs/controllers/UserAdminController.d.ts +0 -4
- package/lib/mjs/controllers/UserAdminController.d.ts.map +0 -1
- package/lib/mjs/controllers/UserAdminController.js +0 -16
- package/lib/mjs/controllers/UserAdminController.js.map +0 -1
- package/lib/mjs/controllers/UserController.d.ts +0 -11
- package/lib/mjs/controllers/UserController.d.ts.map +0 -1
- package/lib/mjs/controllers/UserController.js +0 -84
- package/lib/mjs/controllers/UserController.js.map +0 -1
- package/lib/mjs/controllers/UserMetadata.d.ts +0 -7
- package/lib/mjs/controllers/UserMetadata.d.ts.map +0 -1
- package/lib/mjs/controllers/UserMetadata.js +0 -66
- package/lib/mjs/controllers/UserMetadata.js.map +0 -1
- package/lib/mjs/dto/login-dto.d.ts +0 -17
- package/lib/mjs/dto/login-dto.d.ts.map +0 -1
- package/lib/mjs/dto/login-dto.js +0 -30
- package/lib/mjs/dto/login-dto.js.map +0 -1
- package/lib/mjs/dto/password-dto.d.ts +0 -30
- package/lib/mjs/dto/password-dto.d.ts.map +0 -1
- package/lib/mjs/dto/password-dto.js +0 -32
- package/lib/mjs/dto/password-dto.js.map +0 -1
- package/lib/mjs/dto/restore-password-dto.d.ts +0 -24
- package/lib/mjs/dto/restore-password-dto.d.ts.map +0 -1
- package/lib/mjs/dto/restore-password-dto.js +0 -31
- package/lib/mjs/dto/restore-password-dto.js.map +0 -1
- package/lib/mjs/dto/token-dto.d.ts +0 -16
- package/lib/mjs/dto/token-dto.d.ts.map +0 -1
- package/lib/mjs/dto/token-dto.js +0 -29
- package/lib/mjs/dto/token-dto.js.map +0 -1
- package/lib/mjs/dto/user-dto.d.ts +0 -22
- package/lib/mjs/dto/user-dto.d.ts.map +0 -1
- package/lib/mjs/dto/user-dto.js +0 -30
- package/lib/mjs/dto/user-dto.js.map +0 -1
- package/lib/mjs/dto/userLogin-dto.d.ts +0 -22
- package/lib/mjs/dto/userLogin-dto.d.ts.map +0 -1
- package/lib/mjs/dto/userLogin-dto.js +0 -31
- package/lib/mjs/dto/userLogin-dto.js.map +0 -1
- package/lib/mjs/events/UserLoginFailed.d.ts +0 -6
- package/lib/mjs/events/UserLoginFailed.d.ts.map +0 -1
- package/lib/mjs/events/UserLoginFailed.js +0 -22
- package/lib/mjs/events/UserLoginFailed.js.map +0 -1
- package/lib/mjs/events/UserLoginSuccess.d.ts +0 -6
- package/lib/mjs/events/UserLoginSuccess.d.ts.map +0 -1
- package/lib/mjs/events/UserLoginSuccess.js +0 -22
- package/lib/mjs/events/UserLoginSuccess.js.map +0 -1
- package/lib/mjs/events/UserPassordRestore.d.ts +0 -7
- package/lib/mjs/events/UserPassordRestore.d.ts.map +0 -1
- package/lib/mjs/events/UserPassordRestore.js +0 -23
- package/lib/mjs/events/UserPassordRestore.js.map +0 -1
- package/lib/mjs/fingerprint/FingerprintJs.d.ts +0 -4
- package/lib/mjs/fingerprint/FingerprintJs.d.ts.map +0 -1
- package/lib/mjs/fingerprint/FingerprintJs.js +0 -15
- package/lib/mjs/fingerprint/FingerprintJs.js.map +0 -1
- package/lib/mjs/policies/2FaPolicy.d.ts +0 -8
- package/lib/mjs/policies/2FaPolicy.d.ts.map +0 -1
- package/lib/mjs/policies/2FaPolicy.js +0 -28
- package/lib/mjs/policies/2FaPolicy.js.map +0 -1
- package/lib/mjs/policies/captchaPolicy.d.ts +0 -2
- package/lib/mjs/policies/captchaPolicy.d.ts.map +0 -1
- package/lib/mjs/policies/captchaPolicy.js +0 -2
- package/lib/mjs/policies/captchaPolicy.js.map +0 -1
package/lib/cjs/dto/user-dto.js
DELETED
|
@@ -1,33 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
var __decorate = (this && this.__decorate) || function (decorators, target, key, desc) {
|
|
3
|
-
var c = arguments.length, r = c < 3 ? target : desc === null ? desc = Object.getOwnPropertyDescriptor(target, key) : desc, d;
|
|
4
|
-
if (typeof Reflect === "object" && typeof Reflect.decorate === "function") r = Reflect.decorate(decorators, target, key, desc);
|
|
5
|
-
else for (var i = decorators.length - 1; i >= 0; i--) if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;
|
|
6
|
-
return c > 3 && r && Object.defineProperty(target, key, r), r;
|
|
7
|
-
};
|
|
8
|
-
var __metadata = (this && this.__metadata) || function (k, v) {
|
|
9
|
-
if (typeof Reflect === "object" && typeof Reflect.metadata === "function") return Reflect.metadata(k, v);
|
|
10
|
-
};
|
|
11
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
12
|
-
exports.UserDto = exports.UserDtoSchema = void 0;
|
|
13
|
-
const validation_1 = require("@spinajs/validation");
|
|
14
|
-
exports.UserDtoSchema = {
|
|
15
|
-
$schema: 'http://json-schema.org/draft-07/schema#',
|
|
16
|
-
title: 'User DTO',
|
|
17
|
-
type: 'object',
|
|
18
|
-
properties: {
|
|
19
|
-
Email: { type: 'string', format: 'email', maxLength: 64 },
|
|
20
|
-
Login: { type: 'string', maxLength: 64 },
|
|
21
|
-
},
|
|
22
|
-
};
|
|
23
|
-
let UserDto = class UserDto {
|
|
24
|
-
constructor(data) {
|
|
25
|
-
Object.assign(this, data);
|
|
26
|
-
}
|
|
27
|
-
};
|
|
28
|
-
UserDto = __decorate([
|
|
29
|
-
(0, validation_1.Schema)(exports.UserDtoSchema),
|
|
30
|
-
__metadata("design:paramtypes", [Object])
|
|
31
|
-
], UserDto);
|
|
32
|
-
exports.UserDto = UserDto;
|
|
33
|
-
//# sourceMappingURL=user-dto.js.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"user-dto.js","sourceRoot":"","sources":["../../../src/dto/user-dto.ts"],"names":[],"mappings":";;;;;;;;;;;;AAAA,oDAA6C;AAChC,QAAA,aAAa,GAAG;IAC3B,OAAO,EAAE,yCAAyC;IAClD,KAAK,EAAE,UAAU;IACjB,IAAI,EAAE,QAAQ;IACd,UAAU,EAAE;QACV,KAAK,EAAE,EAAE,IAAI,EAAE,QAAQ,EAAE,MAAM,EAAE,OAAO,EAAE,SAAS,EAAE,EAAE,EAAE;QACzD,KAAK,EAAE,EAAE,IAAI,EAAE,QAAQ,EAAE,SAAS,EAAE,EAAE,EAAE;KACzC;CACF,CAAC;AAGK,IAAM,OAAO,GAAb,MAAM,OAAO;IAKlB,YAAY,IAAS;QACnB,MAAM,CAAC,MAAM,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;IAC5B,CAAC;CACF,CAAA;AARY,OAAO;IADnB,IAAA,mBAAM,EAAC,qBAAa,CAAC;;GACT,OAAO,CAQnB;AARY,0BAAO"}
|
|
@@ -1,22 +0,0 @@
|
|
|
1
|
-
export declare const UserLoginDtoSchema: {
|
|
2
|
-
$schema: string;
|
|
3
|
-
title: string;
|
|
4
|
-
type: string;
|
|
5
|
-
properties: {
|
|
6
|
-
Login: {
|
|
7
|
-
type: string;
|
|
8
|
-
format: string;
|
|
9
|
-
};
|
|
10
|
-
Password: {
|
|
11
|
-
type: string;
|
|
12
|
-
maxLength: number;
|
|
13
|
-
};
|
|
14
|
-
};
|
|
15
|
-
required: string[];
|
|
16
|
-
};
|
|
17
|
-
export declare class UserLoginDto {
|
|
18
|
-
Email: string;
|
|
19
|
-
Password: string;
|
|
20
|
-
constructor(data: any);
|
|
21
|
-
}
|
|
22
|
-
//# sourceMappingURL=userLogin-dto.d.ts.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"userLogin-dto.d.ts","sourceRoot":"","sources":["../../../src/dto/userLogin-dto.ts"],"names":[],"mappings":"AAEA,eAAO,MAAM,kBAAkB;;;;;;;;;;;;;;;CAS9B,CAAC;AAEF,qBACa,YAAY;IAChB,KAAK,EAAE,MAAM,CAAC;IAEd,QAAQ,EAAE,MAAM,CAAC;gBAEZ,IAAI,EAAE,GAAG;CAGtB"}
|
|
@@ -1,34 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
var __decorate = (this && this.__decorate) || function (decorators, target, key, desc) {
|
|
3
|
-
var c = arguments.length, r = c < 3 ? target : desc === null ? desc = Object.getOwnPropertyDescriptor(target, key) : desc, d;
|
|
4
|
-
if (typeof Reflect === "object" && typeof Reflect.decorate === "function") r = Reflect.decorate(decorators, target, key, desc);
|
|
5
|
-
else for (var i = decorators.length - 1; i >= 0; i--) if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;
|
|
6
|
-
return c > 3 && r && Object.defineProperty(target, key, r), r;
|
|
7
|
-
};
|
|
8
|
-
var __metadata = (this && this.__metadata) || function (k, v) {
|
|
9
|
-
if (typeof Reflect === "object" && typeof Reflect.metadata === "function") return Reflect.metadata(k, v);
|
|
10
|
-
};
|
|
11
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
12
|
-
exports.UserLoginDto = exports.UserLoginDtoSchema = void 0;
|
|
13
|
-
const validation_1 = require("@spinajs/validation");
|
|
14
|
-
exports.UserLoginDtoSchema = {
|
|
15
|
-
$schema: 'http://json-schema.org/draft-07/schema#',
|
|
16
|
-
title: 'User login DTO',
|
|
17
|
-
type: 'object',
|
|
18
|
-
properties: {
|
|
19
|
-
Login: { type: 'string', format: 'email' },
|
|
20
|
-
Password: { type: 'string', maxLength: 32 },
|
|
21
|
-
},
|
|
22
|
-
required: ['Email', 'Password'],
|
|
23
|
-
};
|
|
24
|
-
let UserLoginDto = class UserLoginDto {
|
|
25
|
-
constructor(data) {
|
|
26
|
-
Object.assign(this, data);
|
|
27
|
-
}
|
|
28
|
-
};
|
|
29
|
-
UserLoginDto = __decorate([
|
|
30
|
-
(0, validation_1.Schema)(exports.UserLoginDtoSchema),
|
|
31
|
-
__metadata("design:paramtypes", [Object])
|
|
32
|
-
], UserLoginDto);
|
|
33
|
-
exports.UserLoginDto = UserLoginDto;
|
|
34
|
-
//# sourceMappingURL=userLogin-dto.js.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"userLogin-dto.js","sourceRoot":"","sources":["../../../src/dto/userLogin-dto.ts"],"names":[],"mappings":";;;;;;;;;;;;AAAA,oDAA6C;AAEhC,QAAA,kBAAkB,GAAG;IAChC,OAAO,EAAE,yCAAyC;IAClD,KAAK,EAAE,gBAAgB;IACvB,IAAI,EAAE,QAAQ;IACd,UAAU,EAAE;QACV,KAAK,EAAE,EAAE,IAAI,EAAE,QAAQ,EAAE,MAAM,EAAE,OAAO,EAAE;QAC1C,QAAQ,EAAE,EAAE,IAAI,EAAE,QAAQ,EAAE,SAAS,EAAE,EAAE,EAAE;KAC5C;IACD,QAAQ,EAAE,CAAC,OAAO,EAAE,UAAU,CAAC;CAChC,CAAC;AAGK,IAAM,YAAY,GAAlB,MAAM,YAAY;IAKvB,YAAY,IAAS;QACnB,MAAM,CAAC,MAAM,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;IAC5B,CAAC;CACF,CAAA;AARY,YAAY;IADxB,IAAA,mBAAM,EAAC,0BAAkB,CAAC;;GACd,YAAY,CAQxB;AARY,oCAAY"}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"UserLoginFailed.d.ts","sourceRoot":"","sources":["../../../src/events/UserLoginFailed.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,UAAU,EAAS,MAAM,gBAAgB,CAAC;AAEnD,qBACa,eAAgB,SAAQ,UAAU;IAC1B,QAAQ,EAAE,MAAM;gBAAhB,QAAQ,EAAE,MAAM;CAGpC"}
|
|
@@ -1,25 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
var __decorate = (this && this.__decorate) || function (decorators, target, key, desc) {
|
|
3
|
-
var c = arguments.length, r = c < 3 ? target : desc === null ? desc = Object.getOwnPropertyDescriptor(target, key) : desc, d;
|
|
4
|
-
if (typeof Reflect === "object" && typeof Reflect.decorate === "function") r = Reflect.decorate(decorators, target, key, desc);
|
|
5
|
-
else for (var i = decorators.length - 1; i >= 0; i--) if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;
|
|
6
|
-
return c > 3 && r && Object.defineProperty(target, key, r), r;
|
|
7
|
-
};
|
|
8
|
-
var __metadata = (this && this.__metadata) || function (k, v) {
|
|
9
|
-
if (typeof Reflect === "object" && typeof Reflect.metadata === "function") return Reflect.metadata(k, v);
|
|
10
|
-
};
|
|
11
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
12
|
-
exports.UserLoginFailed = void 0;
|
|
13
|
-
const queue_1 = require("@spinajs/queue");
|
|
14
|
-
let UserLoginFailed = class UserLoginFailed extends queue_1.QueueEvent {
|
|
15
|
-
constructor(UserUUID) {
|
|
16
|
-
super();
|
|
17
|
-
this.UserUUID = UserUUID;
|
|
18
|
-
}
|
|
19
|
-
};
|
|
20
|
-
UserLoginFailed = __decorate([
|
|
21
|
-
(0, queue_1.Event)(),
|
|
22
|
-
__metadata("design:paramtypes", [String])
|
|
23
|
-
], UserLoginFailed);
|
|
24
|
-
exports.UserLoginFailed = UserLoginFailed;
|
|
25
|
-
//# sourceMappingURL=UserLoginFailed.js.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"UserLoginFailed.js","sourceRoot":"","sources":["../../../src/events/UserLoginFailed.ts"],"names":[],"mappings":";;;;;;;;;;;;AAAA,0CAAmD;AAG5C,IAAM,eAAe,GAArB,MAAM,eAAgB,SAAQ,kBAAU;IAC7C,YAAmB,QAAgB;QACjC,KAAK,EAAE,CAAC;QADS,aAAQ,GAAR,QAAQ,CAAQ;IAEnC,CAAC;CACF,CAAA;AAJY,eAAe;IAD3B,IAAA,aAAK,GAAE;;GACK,eAAe,CAI3B;AAJY,0CAAe"}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"UserLoginSuccess.d.ts","sourceRoot":"","sources":["../../../src/events/UserLoginSuccess.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,UAAU,EAAS,MAAM,gBAAgB,CAAC;AAEnD,qBACa,gBAAiB,SAAQ,UAAU;IAC3B,QAAQ,EAAE,MAAM;gBAAhB,QAAQ,EAAE,MAAM;CAGpC"}
|
|
@@ -1,25 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
var __decorate = (this && this.__decorate) || function (decorators, target, key, desc) {
|
|
3
|
-
var c = arguments.length, r = c < 3 ? target : desc === null ? desc = Object.getOwnPropertyDescriptor(target, key) : desc, d;
|
|
4
|
-
if (typeof Reflect === "object" && typeof Reflect.decorate === "function") r = Reflect.decorate(decorators, target, key, desc);
|
|
5
|
-
else for (var i = decorators.length - 1; i >= 0; i--) if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;
|
|
6
|
-
return c > 3 && r && Object.defineProperty(target, key, r), r;
|
|
7
|
-
};
|
|
8
|
-
var __metadata = (this && this.__metadata) || function (k, v) {
|
|
9
|
-
if (typeof Reflect === "object" && typeof Reflect.metadata === "function") return Reflect.metadata(k, v);
|
|
10
|
-
};
|
|
11
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
12
|
-
exports.UserLoginSuccess = void 0;
|
|
13
|
-
const queue_1 = require("@spinajs/queue");
|
|
14
|
-
let UserLoginSuccess = class UserLoginSuccess extends queue_1.QueueEvent {
|
|
15
|
-
constructor(UserUUID) {
|
|
16
|
-
super();
|
|
17
|
-
this.UserUUID = UserUUID;
|
|
18
|
-
}
|
|
19
|
-
};
|
|
20
|
-
UserLoginSuccess = __decorate([
|
|
21
|
-
(0, queue_1.Event)(),
|
|
22
|
-
__metadata("design:paramtypes", [String])
|
|
23
|
-
], UserLoginSuccess);
|
|
24
|
-
exports.UserLoginSuccess = UserLoginSuccess;
|
|
25
|
-
//# sourceMappingURL=UserLoginSuccess.js.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"UserLoginSuccess.js","sourceRoot":"","sources":["../../../src/events/UserLoginSuccess.ts"],"names":[],"mappings":";;;;;;;;;;;;AAAA,0CAAmD;AAG5C,IAAM,gBAAgB,GAAtB,MAAM,gBAAiB,SAAQ,kBAAU;IAC9C,YAAmB,QAAgB;QACjC,KAAK,EAAE,CAAC;QADS,aAAQ,GAAR,QAAQ,CAAQ;IAEnC,CAAC;CACF,CAAA;AAJY,gBAAgB;IAD5B,IAAA,aAAK,GAAE;;GACK,gBAAgB,CAI5B;AAJY,4CAAgB"}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"UserPassordRestore.d.ts","sourceRoot":"","sources":["../../../src/events/UserPassordRestore.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,UAAU,EAAS,MAAM,gBAAgB,CAAC;AAEnD,qBACa,mBAAoB,SAAQ,UAAU;IAC9B,QAAQ,EAAE,MAAM;IAAS,UAAU,EAAE,MAAM;gBAA3C,QAAQ,EAAE,MAAM,EAAS,UAAU,EAAE,MAAM;CAG/D"}
|
|
@@ -1,26 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
var __decorate = (this && this.__decorate) || function (decorators, target, key, desc) {
|
|
3
|
-
var c = arguments.length, r = c < 3 ? target : desc === null ? desc = Object.getOwnPropertyDescriptor(target, key) : desc, d;
|
|
4
|
-
if (typeof Reflect === "object" && typeof Reflect.decorate === "function") r = Reflect.decorate(decorators, target, key, desc);
|
|
5
|
-
else for (var i = decorators.length - 1; i >= 0; i--) if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;
|
|
6
|
-
return c > 3 && r && Object.defineProperty(target, key, r), r;
|
|
7
|
-
};
|
|
8
|
-
var __metadata = (this && this.__metadata) || function (k, v) {
|
|
9
|
-
if (typeof Reflect === "object" && typeof Reflect.metadata === "function") return Reflect.metadata(k, v);
|
|
10
|
-
};
|
|
11
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
12
|
-
exports.UserPasswordRestore = void 0;
|
|
13
|
-
const queue_1 = require("@spinajs/queue");
|
|
14
|
-
let UserPasswordRestore = class UserPasswordRestore extends queue_1.QueueEvent {
|
|
15
|
-
constructor(UserUUID, resetToken) {
|
|
16
|
-
super();
|
|
17
|
-
this.UserUUID = UserUUID;
|
|
18
|
-
this.resetToken = resetToken;
|
|
19
|
-
}
|
|
20
|
-
};
|
|
21
|
-
UserPasswordRestore = __decorate([
|
|
22
|
-
(0, queue_1.Event)(),
|
|
23
|
-
__metadata("design:paramtypes", [String, String])
|
|
24
|
-
], UserPasswordRestore);
|
|
25
|
-
exports.UserPasswordRestore = UserPasswordRestore;
|
|
26
|
-
//# sourceMappingURL=UserPassordRestore.js.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"UserPassordRestore.js","sourceRoot":"","sources":["../../../src/events/UserPassordRestore.ts"],"names":[],"mappings":";;;;;;;;;;;;AAAA,0CAAmD;AAG5C,IAAM,mBAAmB,GAAzB,MAAM,mBAAoB,SAAQ,kBAAU;IACjD,YAAmB,QAAgB,EAAS,UAAkB;QAC5D,KAAK,EAAE,CAAC;QADS,aAAQ,GAAR,QAAQ,CAAQ;QAAS,eAAU,GAAV,UAAU,CAAQ;IAE9D,CAAC;CACF,CAAA;AAJY,mBAAmB;IAD/B,IAAA,aAAK,GAAE;;GACK,mBAAmB,CAI/B;AAJY,kDAAmB"}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"FingerprintJs.d.ts","sourceRoot":"","sources":["../../../src/fingerprint/FingerprintJs.ts"],"names":[],"mappings":"AACA,OAAO,EAAE,mBAAmB,EAAE,MAAM,kBAAkB,CAAC;AAEvD,qBACa,aAAc,SAAQ,mBAAmB;CAAG"}
|
|
@@ -1,18 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
var __decorate = (this && this.__decorate) || function (decorators, target, key, desc) {
|
|
3
|
-
var c = arguments.length, r = c < 3 ? target : desc === null ? desc = Object.getOwnPropertyDescriptor(target, key) : desc, d;
|
|
4
|
-
if (typeof Reflect === "object" && typeof Reflect.decorate === "function") r = Reflect.decorate(decorators, target, key, desc);
|
|
5
|
-
else for (var i = decorators.length - 1; i >= 0; i--) if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;
|
|
6
|
-
return c > 3 && r && Object.defineProperty(target, key, r), r;
|
|
7
|
-
};
|
|
8
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
9
|
-
exports.FingerprintJs = void 0;
|
|
10
|
-
const di_1 = require("@spinajs/di");
|
|
11
|
-
const interfaces_js_1 = require("../interfaces.js");
|
|
12
|
-
let FingerprintJs = class FingerprintJs extends interfaces_js_1.FingerprintProvider {
|
|
13
|
-
};
|
|
14
|
-
FingerprintJs = __decorate([
|
|
15
|
-
(0, di_1.Injectable)(interfaces_js_1.FingerprintProvider)
|
|
16
|
-
], FingerprintJs);
|
|
17
|
-
exports.FingerprintJs = FingerprintJs;
|
|
18
|
-
//# sourceMappingURL=FingerprintJs.js.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"FingerprintJs.js","sourceRoot":"","sources":["../../../src/fingerprint/FingerprintJs.ts"],"names":[],"mappings":";;;;;;;;;AAAA,oCAAyC;AACzC,oDAAuD;AAGhD,IAAM,aAAa,GAAnB,MAAM,aAAc,SAAQ,mCAAmB;CAAG,CAAA;AAA5C,aAAa;IADzB,IAAA,eAAU,EAAC,mCAAmB,CAAC;GACnB,aAAa,CAA+B;AAA5C,sCAAa"}
|
|
@@ -1,8 +0,0 @@
|
|
|
1
|
-
import { BasePolicy } from '@spinajs/http';
|
|
2
|
-
import { TwoFactorAuthConfig } from '../interfaces.js';
|
|
3
|
-
export declare class TwoFacRouteEnabled extends BasePolicy {
|
|
4
|
-
protected TwoFactorConfig: TwoFactorAuthConfig;
|
|
5
|
-
isEnabled(): boolean;
|
|
6
|
-
execute(): Promise<void>;
|
|
7
|
-
}
|
|
8
|
-
//# sourceMappingURL=2FaPolicy.d.ts.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"2FaPolicy.d.ts","sourceRoot":"","sources":["../../../src/policies/2FaPolicy.ts"],"names":[],"mappings":"AAEA,OAAO,EAAE,UAAU,EAAE,MAAM,eAAe,CAAC;AAC3C,OAAO,EAAE,mBAAmB,EAAE,MAAM,kBAAkB,CAAC;AAEvD,qBAAa,kBAAmB,SAAQ,UAAU;IAEhD,SAAS,CAAC,eAAe,EAAE,mBAAmB,CAAC;IAExC,SAAS,IAAI,OAAO;IAGpB,OAAO,IAAI,OAAO,CAAC,IAAI,CAAC;CAOhC"}
|
|
@@ -1,32 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
var __decorate = (this && this.__decorate) || function (decorators, target, key, desc) {
|
|
3
|
-
var c = arguments.length, r = c < 3 ? target : desc === null ? desc = Object.getOwnPropertyDescriptor(target, key) : desc, d;
|
|
4
|
-
if (typeof Reflect === "object" && typeof Reflect.decorate === "function") r = Reflect.decorate(decorators, target, key, desc);
|
|
5
|
-
else for (var i = decorators.length - 1; i >= 0; i--) if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;
|
|
6
|
-
return c > 3 && r && Object.defineProperty(target, key, r), r;
|
|
7
|
-
};
|
|
8
|
-
var __metadata = (this && this.__metadata) || function (k, v) {
|
|
9
|
-
if (typeof Reflect === "object" && typeof Reflect.metadata === "function") return Reflect.metadata(k, v);
|
|
10
|
-
};
|
|
11
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
12
|
-
exports.TwoFacRouteEnabled = void 0;
|
|
13
|
-
const exceptions_1 = require("@spinajs/exceptions");
|
|
14
|
-
const configuration_1 = require("@spinajs/configuration");
|
|
15
|
-
const http_1 = require("@spinajs/http");
|
|
16
|
-
class TwoFacRouteEnabled extends http_1.BasePolicy {
|
|
17
|
-
isEnabled() {
|
|
18
|
-
return true;
|
|
19
|
-
}
|
|
20
|
-
execute() {
|
|
21
|
-
if (this.TwoFactorConfig.enabled === false) {
|
|
22
|
-
throw new exceptions_1.InvalidOperation('2 factor auth is not enabled');
|
|
23
|
-
}
|
|
24
|
-
return Promise.resolve();
|
|
25
|
-
}
|
|
26
|
-
}
|
|
27
|
-
__decorate([
|
|
28
|
-
(0, configuration_1.Config)('rbac.twoFactorAuth'),
|
|
29
|
-
__metadata("design:type", Object)
|
|
30
|
-
], TwoFacRouteEnabled.prototype, "TwoFactorConfig", void 0);
|
|
31
|
-
exports.TwoFacRouteEnabled = TwoFacRouteEnabled;
|
|
32
|
-
//# sourceMappingURL=2FaPolicy.js.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"2FaPolicy.js","sourceRoot":"","sources":["../../../src/policies/2FaPolicy.ts"],"names":[],"mappings":";;;;;;;;;;;;AAAA,oDAAuD;AACvD,0DAAgD;AAChD,wCAA2C;AAG3C,MAAa,kBAAmB,SAAQ,iBAAU;IAIzC,SAAS;QACd,OAAO,IAAI,CAAC;IACd,CAAC;IACM,OAAO;QACZ,IAAI,IAAI,CAAC,eAAe,CAAC,OAAO,KAAK,KAAK,EAAE;YAC1C,MAAM,IAAI,6BAAgB,CAAC,8BAA8B,CAAC,CAAC;SAC5D;QAED,OAAO,OAAO,CAAC,OAAO,EAAE,CAAC;IAC3B,CAAC;CACF;AAbC;IAAC,IAAA,sBAAM,EAAC,oBAAoB,CAAC;;2DACkB;AAFjD,gDAcC"}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
//# sourceMappingURL=captchaPolicy.d.ts.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"captchaPolicy.d.ts","sourceRoot":"","sources":["../../../src/policies/captchaPolicy.ts"],"names":[],"mappings":""}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
//# sourceMappingURL=captchaPolicy.js.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"captchaPolicy.js","sourceRoot":"","sources":["../../../src/policies/captchaPolicy.ts"],"names":[],"mappings":""}
|
|
@@ -1,14 +0,0 @@
|
|
|
1
|
-
import { TwoFactorAuthProvider } from '../interfaces.js';
|
|
2
|
-
import { User } from '@spinajs/rbac';
|
|
3
|
-
import { Log } from '@spinajs/log';
|
|
4
|
-
export declare class SpeakEasy2FaToken extends TwoFactorAuthProvider {
|
|
5
|
-
protected Config: any;
|
|
6
|
-
protected Log: Log;
|
|
7
|
-
constructor();
|
|
8
|
-
execute(_: User): Promise<void>;
|
|
9
|
-
verifyToken(token: string, user: User): Promise<boolean>;
|
|
10
|
-
initialize(user: User): Promise<any>;
|
|
11
|
-
isEnabled(user: User): Promise<boolean>;
|
|
12
|
-
isInitialized(user: User): Promise<boolean>;
|
|
13
|
-
}
|
|
14
|
-
//# sourceMappingURL=SpeakEasy2FaToken.d.ts.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"SpeakEasy2FaToken.d.ts","sourceRoot":"","sources":["../../../src/2fa/SpeakEasy2FaToken.ts"],"names":[],"mappings":"AACA,OAAO,EAAE,qBAAqB,EAAE,MAAM,kBAAkB,CAAC;AAEzD,OAAO,EAAE,IAAI,EAAE,MAAM,eAAe,CAAC;AAErC,OAAO,EAAE,GAAG,EAAU,MAAM,cAAc,CAAC;AAE3C,qBACa,iBAAkB,SAAQ,qBAAqB;IAE1D,SAAS,CAAC,MAAM,EAAE,GAAG,CAAC;IAGtB,SAAS,CAAC,GAAG,EAAE,GAAG,CAAC;;IAMZ,OAAO,CAAC,CAAC,EAAE,IAAI,GAAG,OAAO,CAAC,IAAI,CAAC;IAMzB,WAAW,CAAC,KAAK,EAAE,MAAM,EAAE,IAAI,EAAE,IAAI,GAAG,OAAO,CAAC,OAAO,CAAC;IAmBxD,UAAU,CAAC,IAAI,EAAE,IAAI,GAAG,OAAO,CAAC,GAAG,CAAC;IAMpC,SAAS,CAAC,IAAI,EAAE,IAAI,GAAG,OAAO,CAAC,OAAO,CAAC;IAKvC,aAAa,CAAC,IAAI,EAAE,IAAI,GAAG,OAAO,CAAC,OAAO,CAAC;CAIzD"}
|
|
@@ -1,65 +0,0 @@
|
|
|
1
|
-
var __decorate = (this && this.__decorate) || function (decorators, target, key, desc) {
|
|
2
|
-
var c = arguments.length, r = c < 3 ? target : desc === null ? desc = Object.getOwnPropertyDescriptor(target, key) : desc, d;
|
|
3
|
-
if (typeof Reflect === "object" && typeof Reflect.decorate === "function") r = Reflect.decorate(decorators, target, key, desc);
|
|
4
|
-
else for (var i = decorators.length - 1; i >= 0; i--) if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;
|
|
5
|
-
return c > 3 && r && Object.defineProperty(target, key, r), r;
|
|
6
|
-
};
|
|
7
|
-
var __metadata = (this && this.__metadata) || function (k, v) {
|
|
8
|
-
if (typeof Reflect === "object" && typeof Reflect.metadata === "function") return Reflect.metadata(k, v);
|
|
9
|
-
};
|
|
10
|
-
import { Injectable } from '@spinajs/di';
|
|
11
|
-
import { TwoFactorAuthProvider } from '../interfaces.js';
|
|
12
|
-
import * as speakeasy from 'speakeasy';
|
|
13
|
-
import { Config } from '@spinajs/configuration';
|
|
14
|
-
import { Log, Logger } from '@spinajs/log';
|
|
15
|
-
let SpeakEasy2FaToken = class SpeakEasy2FaToken extends TwoFactorAuthProvider {
|
|
16
|
-
constructor() {
|
|
17
|
-
super();
|
|
18
|
-
}
|
|
19
|
-
execute(_) {
|
|
20
|
-
// empty, speakasy works offline eg. google authenticator
|
|
21
|
-
// we dont send any email or sms
|
|
22
|
-
return Promise.resolve();
|
|
23
|
-
}
|
|
24
|
-
async verifyToken(token, user) {
|
|
25
|
-
const meta = user.Metadata.find((x) => x.Key === '2fa_speakeasy_token');
|
|
26
|
-
if (!meta || meta.Value === '') {
|
|
27
|
-
this.Log.trace(`Cannot verify 2fa token, no 2fa token for user ${user.Id}`);
|
|
28
|
-
return false;
|
|
29
|
-
}
|
|
30
|
-
const verified = speakeasy.totp.verify({
|
|
31
|
-
secret: meta.Value,
|
|
32
|
-
encoding: 'base32',
|
|
33
|
-
token,
|
|
34
|
-
window: 5,
|
|
35
|
-
});
|
|
36
|
-
return verified;
|
|
37
|
-
}
|
|
38
|
-
async initialize(user) {
|
|
39
|
-
const secret = speakeasy.generateSecret(this.Config);
|
|
40
|
-
await (user.Metadata['2fa_speakeasy_token'] = secret.base32);
|
|
41
|
-
return secret.base32;
|
|
42
|
-
}
|
|
43
|
-
async isEnabled(user) {
|
|
44
|
-
const val = await user.Metadata['2fa_enabled'];
|
|
45
|
-
return val;
|
|
46
|
-
}
|
|
47
|
-
async isInitialized(user) {
|
|
48
|
-
const val = await user.Metadata['2fa_speakeasy_token'];
|
|
49
|
-
return val !== '';
|
|
50
|
-
}
|
|
51
|
-
};
|
|
52
|
-
__decorate([
|
|
53
|
-
Config('rbac.speakeasy'),
|
|
54
|
-
__metadata("design:type", Object)
|
|
55
|
-
], SpeakEasy2FaToken.prototype, "Config", void 0);
|
|
56
|
-
__decorate([
|
|
57
|
-
Logger('SPEAKEASY_2FA_TOKEN'),
|
|
58
|
-
__metadata("design:type", Log)
|
|
59
|
-
], SpeakEasy2FaToken.prototype, "Log", void 0);
|
|
60
|
-
SpeakEasy2FaToken = __decorate([
|
|
61
|
-
Injectable(TwoFactorAuthProvider),
|
|
62
|
-
__metadata("design:paramtypes", [])
|
|
63
|
-
], SpeakEasy2FaToken);
|
|
64
|
-
export { SpeakEasy2FaToken };
|
|
65
|
-
//# sourceMappingURL=SpeakEasy2FaToken.js.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"SpeakEasy2FaToken.js","sourceRoot":"","sources":["../../../src/2fa/SpeakEasy2FaToken.ts"],"names":[],"mappings":";;;;;;;;;AAAA,OAAO,EAAE,UAAU,EAAE,MAAM,aAAa,CAAC;AACzC,OAAO,EAAE,qBAAqB,EAAE,MAAM,kBAAkB,CAAC;AACzD,OAAO,KAAK,SAAS,MAAM,WAAW,CAAC;AAEvC,OAAO,EAAE,MAAM,EAAE,MAAM,wBAAwB,CAAC;AAChD,OAAO,EAAE,GAAG,EAAE,MAAM,EAAE,MAAM,cAAc,CAAC;AAGpC,IAAM,iBAAiB,GAAvB,MAAM,iBAAkB,SAAQ,qBAAqB;IAO1D;QACE,KAAK,EAAE,CAAC;IACV,CAAC;IAEM,OAAO,CAAC,CAAO;QACpB,yDAAyD;QACzD,gCAAgC;QAChC,OAAO,OAAO,CAAC,OAAO,EAAE,CAAC;IAC3B,CAAC;IAEM,KAAK,CAAC,WAAW,CAAC,KAAa,EAAE,IAAU;QAChD,MAAM,IAAI,GAAG,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,GAAG,KAAK,qBAAqB,CAAC,CAAC;QAExE,IAAI,CAAC,IAAI,IAAI,IAAI,CAAC,KAAK,KAAK,EAAE,EAAE;YAC9B,IAAI,CAAC,GAAG,CAAC,KAAK,CAAC,kDAAkD,IAAI,CAAC,EAAE,EAAE,CAAC,CAAC;YAE5E,OAAO,KAAK,CAAC;SACd;QAED,MAAM,QAAQ,GAAG,SAAS,CAAC,IAAI,CAAC,MAAM,CAAC;YACrC,MAAM,EAAE,IAAI,CAAC,KAAK;YAClB,QAAQ,EAAE,QAAQ;YAClB,KAAK;YACL,MAAM,EAAE,CAAC;SACV,CAAC,CAAC;QAEH,OAAO,QAAQ,CAAC;IAClB,CAAC;IAEM,KAAK,CAAC,UAAU,CAAC,IAAU;QAChC,MAAM,MAAM,GAAG,SAAS,CAAC,cAAc,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;QACrD,MAAM,CAAC,IAAI,CAAC,QAAQ,CAAC,qBAAqB,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,CAAC;QAC7D,OAAO,MAAM,CAAC,MAAM,CAAC;IACvB,CAAC;IAEM,KAAK,CAAC,SAAS,CAAC,IAAU;QAC/B,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC,aAAa,CAAC,CAAC;QAC/C,OAAO,GAAc,CAAC;IACxB,CAAC;IAEM,KAAK,CAAC,aAAa,CAAC,IAAU;QACnC,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC,qBAAqB,CAAC,CAAC;QACvD,OAAO,GAAG,KAAK,EAAE,CAAC;IACpB,CAAC;CACF,CAAA;AAlDC;IAAC,MAAM,CAAC,gBAAgB,CAAC;;iDACH;AAEtB;IAAC,MAAM,CAAC,qBAAqB,CAAC;8BACf,GAAG;8CAAC;AALR,iBAAiB;IAD7B,UAAU,CAAC,qBAAqB,CAAC;;GACrB,iBAAiB,CAmD7B;SAnDY,iBAAiB"}
|
|
@@ -1,30 +0,0 @@
|
|
|
1
|
-
declare const rbacHttp: {
|
|
2
|
-
system: {
|
|
3
|
-
dirs: {
|
|
4
|
-
controllers: string[];
|
|
5
|
-
locales: string[];
|
|
6
|
-
views: string[];
|
|
7
|
-
};
|
|
8
|
-
};
|
|
9
|
-
rbac: {
|
|
10
|
-
twoFactorAuth: {
|
|
11
|
-
enabled: boolean;
|
|
12
|
-
service: string;
|
|
13
|
-
};
|
|
14
|
-
fingerprint: {
|
|
15
|
-
enabled: boolean;
|
|
16
|
-
maxDevices: number;
|
|
17
|
-
service: string;
|
|
18
|
-
};
|
|
19
|
-
password: {
|
|
20
|
-
tokenTTL: number;
|
|
21
|
-
/**
|
|
22
|
-
* Block account after invalid login attempts
|
|
23
|
-
*/
|
|
24
|
-
blockAfterAttempts: number;
|
|
25
|
-
};
|
|
26
|
-
};
|
|
27
|
-
http: {};
|
|
28
|
-
};
|
|
29
|
-
export default rbacHttp;
|
|
30
|
-
//# sourceMappingURL=rbac-http.d.ts.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"rbac-http.d.ts","sourceRoot":"","sources":["../../../src/config/rbac-http.ts"],"names":[],"mappings":"AAQA,QAAA,MAAM,QAAQ;;;;;;;;;;;;;;;;;;;;YAsBR;;eAEG;;;;;CASR,CAAC;AAEF,eAAe,QAAQ,CAAC"}
|
|
@@ -1,41 +0,0 @@
|
|
|
1
|
-
import { DI } from '@spinajs/di';
|
|
2
|
-
import { join, normalize, resolve } from 'path';
|
|
3
|
-
const isESMMode = DI.get('__esmMode__');
|
|
4
|
-
function dir(path) {
|
|
5
|
-
return resolve(normalize(join(process.cwd(), path)));
|
|
6
|
-
}
|
|
7
|
-
const rbacHttp = {
|
|
8
|
-
system: {
|
|
9
|
-
dirs: {
|
|
10
|
-
controllers: [dir(`node_modules/@spinajs/rbac-http/lib/${isESMMode ? 'mjs/controllers' : 'cjs/controllers'}`)],
|
|
11
|
-
locales: [dir(`node_modules/@spinajs/rbac-http/lib/${isESMMode ? 'mjs/locales' : 'cjs/locales'}`)],
|
|
12
|
-
views: [dir(`node_modules/@spinajs/rbac-http/lib/${isESMMode ? 'mjs/views' : 'cjs/views'}`)],
|
|
13
|
-
},
|
|
14
|
-
},
|
|
15
|
-
rbac: {
|
|
16
|
-
twoFactorAuth: {
|
|
17
|
-
enabled: true,
|
|
18
|
-
service: 'SpeakEasy2FaToken',
|
|
19
|
-
},
|
|
20
|
-
fingerprint: {
|
|
21
|
-
enabled: false,
|
|
22
|
-
maxDevices: 3,
|
|
23
|
-
service: 'FingerprintJs',
|
|
24
|
-
},
|
|
25
|
-
password: {
|
|
26
|
-
// password reset token ttl in minutes
|
|
27
|
-
tokenTTL: 60,
|
|
28
|
-
/**
|
|
29
|
-
* Block account after invalid login attempts
|
|
30
|
-
*/
|
|
31
|
-
blockAfterAttempts: 3,
|
|
32
|
-
},
|
|
33
|
-
},
|
|
34
|
-
http: {
|
|
35
|
-
// middlewares: [
|
|
36
|
-
// // add global user from session middleware
|
|
37
|
-
// ],
|
|
38
|
-
},
|
|
39
|
-
};
|
|
40
|
-
export default rbacHttp;
|
|
41
|
-
//# sourceMappingURL=rbac-http.js.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"rbac-http.js","sourceRoot":"","sources":["../../../src/config/rbac-http.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,EAAE,EAAE,MAAM,aAAa,CAAC;AACjC,OAAO,EAAE,IAAI,EAAE,SAAS,EAAE,OAAO,EAAE,MAAM,MAAM,CAAC;AAEhD,MAAM,SAAS,GAAG,EAAE,CAAC,GAAG,CAAU,aAAa,CAAC,CAAC;AAEjD,SAAS,GAAG,CAAC,IAAY;IACvB,OAAO,OAAO,CAAC,SAAS,CAAC,IAAI,CAAC,OAAO,CAAC,GAAG,EAAE,EAAE,IAAI,CAAC,CAAC,CAAC,CAAC;AACvD,CAAC;AACD,MAAM,QAAQ,GAAG;IACf,MAAM,EAAE;QACN,IAAI,EAAE;YACJ,WAAW,EAAE,CAAC,GAAG,CAAC,uCAAuC,SAAS,CAAC,CAAC,CAAC,iBAAiB,CAAC,CAAC,CAAC,iBAAiB,EAAE,CAAC,CAAC;YAC9G,OAAO,EAAE,CAAC,GAAG,CAAC,uCAAuC,SAAS,CAAC,CAAC,CAAC,aAAa,CAAC,CAAC,CAAC,aAAa,EAAE,CAAC,CAAC;YAClG,KAAK,EAAE,CAAC,GAAG,CAAC,uCAAuC,SAAS,CAAC,CAAC,CAAC,WAAW,CAAC,CAAC,CAAC,WAAW,EAAE,CAAC,CAAC;SAC7F;KACF;IACD,IAAI,EAAE;QACJ,aAAa,EAAE;YACb,OAAO,EAAE,IAAI;YACb,OAAO,EAAE,mBAAmB;SAC7B;QACD,WAAW,EAAE;YACX,OAAO,EAAE,KAAK;YACd,UAAU,EAAE,CAAC;YACb,OAAO,EAAE,eAAe;SACzB;QACD,QAAQ,EAAE;YACR,sCAAsC;YACtC,QAAQ,EAAE,EAAE;YAEZ;;eAEG;YACH,kBAAkB,EAAE,CAAC;SACtB;KACF;IACD,IAAI,EAAE;IACJ,iBAAiB;IACjB,+CAA+C;IAC/C,KAAK;KACN;CACF,CAAC;AAEF,eAAe,QAAQ,CAAC"}
|
|
@@ -1,35 +0,0 @@
|
|
|
1
|
-
import { InvalidOperation } from '@spinajs/exceptions';
|
|
2
|
-
import { UserLoginDto } from '../dto/userLogin-dto.js';
|
|
3
|
-
import { BaseController, Ok, CookieResponse, Unauthorized, BadRequest, NotFound } from '@spinajs/http';
|
|
4
|
-
import { AuthProvider, FederatedAuthProvider, PasswordProvider, PasswordValidationProvider, SessionProvider, User as UserModel } from '@spinajs/rbac';
|
|
5
|
-
import { Configuration } from '@spinajs/configuration';
|
|
6
|
-
import { FingerprintProvider, TwoFactorAuthProvider } from '../interfaces.js';
|
|
7
|
-
import { QueueService } from '@spinajs/queue';
|
|
8
|
-
import { RestorePasswordDto } from '../dto/restore-password-dto.js';
|
|
9
|
-
export declare class LoginController extends BaseController {
|
|
10
|
-
protected Configuration: Configuration;
|
|
11
|
-
protected AuthProvider: AuthProvider;
|
|
12
|
-
protected SessionProvider: SessionProvider;
|
|
13
|
-
protected SessionExpirationTime: number;
|
|
14
|
-
protected PasswordResetTokenTTL: number;
|
|
15
|
-
protected TwoFactorAuthProvider: TwoFactorAuthProvider;
|
|
16
|
-
protected FingerprintProvider: FingerprintProvider;
|
|
17
|
-
protected PasswordValidationService: PasswordValidationProvider;
|
|
18
|
-
protected FederatedLoginStrategies: FederatedAuthProvider<any>[];
|
|
19
|
-
protected PasswordProvider: PasswordProvider;
|
|
20
|
-
protected Queue: QueueService;
|
|
21
|
-
loginFederated(credentials: unknown, caller: string): Promise<Unauthorized | CookieResponse>;
|
|
22
|
-
/**
|
|
23
|
-
*
|
|
24
|
-
* Api call for listing avaible federated login strategies
|
|
25
|
-
*
|
|
26
|
-
* @returns response with avaible login strategies
|
|
27
|
-
*/
|
|
28
|
-
federatedLoginList(): Promise<Ok>;
|
|
29
|
-
login(credentials: UserLoginDto): Promise<Unauthorized | CookieResponse>;
|
|
30
|
-
setNewPassword(token: string, pwd: RestorePasswordDto): Promise<NotFound | BadRequest>;
|
|
31
|
-
forgotPassword(login: UserLoginDto): Promise<InvalidOperation | Ok>;
|
|
32
|
-
logout(ssid: string): Promise<CookieResponse | Ok>;
|
|
33
|
-
protected authenticate(user: UserModel, federated?: boolean): Promise<Unauthorized | CookieResponse>;
|
|
34
|
-
}
|
|
35
|
-
//# sourceMappingURL=LoginController.d.ts.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"LoginController.d.ts","sourceRoot":"","sources":["../../../src/controllers/LoginController.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,gBAAgB,EAAE,MAAM,qBAAqB,CAAC;AACvD,OAAO,EAAE,YAAY,EAAE,MAAM,yBAAyB,CAAC;AACvD,OAAO,EAAE,cAAc,EAAwB,EAAE,EAAe,cAAc,EAAE,YAAY,EAAyB,UAAU,EAAE,QAAQ,EAAE,MAAM,eAAe,CAAC;AACjK,OAAO,EAAE,YAAY,EAAE,qBAAqB,EAAE,gBAAgB,EAAE,0BAA0B,EAAW,eAAe,EAAQ,IAAI,IAAI,SAAS,EAAqC,MAAM,eAAe,CAAC;AAExM,OAAO,EAA6B,aAAa,EAAE,MAAM,wBAAwB,CAAC;AAElF,OAAO,EAAE,mBAAmB,EAAE,qBAAqB,EAAE,MAAM,kBAAkB,CAAC;AAC9E,OAAO,EAAE,YAAY,EAAE,MAAM,gBAAgB,CAAC;AAK9C,OAAO,EAAE,kBAAkB,EAAE,MAAM,gCAAgC,CAAC;AAOpE,qBACa,eAAgB,SAAQ,cAAc;IAEjD,SAAS,CAAC,aAAa,EAAE,aAAa,CAAC;IAGvC,SAAS,CAAC,YAAY,EAAE,YAAY,CAAC;IAGrC,SAAS,CAAC,eAAe,EAAE,eAAe,CAAC;IAK3C,SAAS,CAAC,qBAAqB,EAAE,MAAM,CAAC;IAGxC,SAAS,CAAC,qBAAqB,EAAE,MAAM,CAAC;IAGxC,SAAS,CAAC,qBAAqB,EAAE,qBAAqB,CAAC;IAGvD,SAAS,CAAC,mBAAmB,EAAE,mBAAmB,CAAC;IAGnD,SAAS,CAAC,yBAAyB,EAAE,0BAA0B,CAAC;IAGhE,SAAS,CAAC,wBAAwB,EAAE,qBAAqB,CAAC,GAAG,CAAC,EAAE,CAAC;IAGjE,SAAS,CAAC,gBAAgB,EAAE,gBAAgB,CAAC;IAG7C,SAAS,CAAC,KAAK,EAAE,YAAY,CAAC;IAIjB,cAAc,CAAS,WAAW,EAAE,OAAO,EAAkB,MAAM,EAAE,MAAM;IAexF;;;;;OAKG;IAGU,kBAAkB;IAMlB,KAAK,CAAS,WAAW,EAAE,YAAY;IAavC,cAAc,CAAU,KAAK,EAAE,MAAM,EAAU,GAAG,EAAE,kBAAkB;IA0EtE,cAAc,CAAS,KAAK,EAAE,YAAY;IAgC1C,MAAM,CAAW,IAAI,EAAE,MAAM;cAW1B,YAAY,CAAC,IAAI,EAAE,SAAS,EAAE,SAAS,CAAC,EAAE,OAAO;CAoFlE"}
|