@spinajs/rbac-http 2.0.375 → 2.0.378
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/lib/cjs/controllers/GrantsController.js +2 -2
- package/lib/cjs/controllers/GrantsController.js.map +1 -1
- package/lib/cjs/index.d.ts +2 -0
- package/lib/cjs/index.d.ts.map +1 -1
- package/lib/cjs/index.js +2 -0
- package/lib/cjs/index.js.map +1 -1
- package/lib/cjs/policies/AuthorizedPolicy.d.ts +10 -0
- package/lib/cjs/policies/AuthorizedPolicy.d.ts.map +1 -0
- package/lib/cjs/policies/AuthorizedPolicy.js +23 -0
- package/lib/cjs/policies/AuthorizedPolicy.js.map +1 -0
- package/lib/cjs/policies/LoggedPolicy.js +1 -1
- package/lib/cjs/policies/LoggedPolicy.js.map +1 -1
- package/lib/cjs/policies/NoSessionPolicy.d.ts +11 -0
- package/lib/cjs/policies/NoSessionPolicy.d.ts.map +1 -0
- package/lib/cjs/policies/NoSessionPolicy.js +23 -0
- package/lib/cjs/policies/NoSessionPolicy.js.map +1 -0
- package/lib/cjs/policies/NotAthorizedPolicy.d.ts +10 -0
- package/lib/cjs/policies/NotAthorizedPolicy.d.ts.map +1 -0
- package/lib/cjs/policies/NotAthorizedPolicy.js +22 -0
- package/lib/cjs/policies/NotAthorizedPolicy.js.map +1 -0
- package/lib/cjs/policies/NotLoggedPolicy.js +1 -1
- package/lib/cjs/policies/NotLoggedPolicy.js.map +1 -1
- package/lib/mjs/controllers/GrantsController.js +2 -2
- package/lib/mjs/controllers/GrantsController.js.map +1 -1
- package/lib/mjs/index.d.ts +2 -0
- package/lib/mjs/index.d.ts.map +1 -1
- package/lib/mjs/index.js +2 -0
- package/lib/mjs/index.js.map +1 -1
- package/lib/mjs/policies/AuthorizedPolicy.d.ts +10 -0
- package/lib/mjs/policies/AuthorizedPolicy.d.ts.map +1 -0
- package/lib/mjs/policies/AuthorizedPolicy.js +19 -0
- package/lib/mjs/policies/AuthorizedPolicy.js.map +1 -0
- package/lib/mjs/policies/LoggedPolicy.js +1 -1
- package/lib/mjs/policies/LoggedPolicy.js.map +1 -1
- package/lib/mjs/policies/NoSessionPolicy.d.ts +11 -0
- package/lib/mjs/policies/NoSessionPolicy.d.ts.map +1 -0
- package/lib/mjs/policies/NoSessionPolicy.js +19 -0
- package/lib/mjs/policies/NoSessionPolicy.js.map +1 -0
- package/lib/mjs/policies/NotAthorizedPolicy.d.ts +10 -0
- package/lib/mjs/policies/NotAthorizedPolicy.d.ts.map +1 -0
- package/lib/mjs/policies/NotAthorizedPolicy.js +18 -0
- package/lib/mjs/policies/NotAthorizedPolicy.js.map +1 -0
- package/lib/mjs/policies/NotLoggedPolicy.js +1 -1
- package/lib/mjs/policies/NotLoggedPolicy.js.map +1 -1
- package/lib/tsconfig.cjs.tsbuildinfo +1 -1
- package/lib/tsconfig.mjs.tsbuildinfo +1 -1
- package/package.json +10 -10
|
@@ -13,7 +13,7 @@ exports.GrantsController = void 0;
|
|
|
13
13
|
const http_1 = require("@spinajs/http");
|
|
14
14
|
const rbac_1 = require("@spinajs/rbac");
|
|
15
15
|
const di_1 = require("@spinajs/di");
|
|
16
|
-
const
|
|
16
|
+
const AuthorizedPolicy_js_1 = require("../policies/AuthorizedPolicy.js");
|
|
17
17
|
let GrantsController = class GrantsController extends http_1.BaseController {
|
|
18
18
|
getGrants() {
|
|
19
19
|
return new http_1.Ok(this.AC.getGrants());
|
|
@@ -32,6 +32,6 @@ __decorate([
|
|
|
32
32
|
], GrantsController.prototype, "getGrants", null);
|
|
33
33
|
exports.GrantsController = GrantsController = __decorate([
|
|
34
34
|
(0, http_1.BasePath)('grants'),
|
|
35
|
-
(0, http_1.Policy)(
|
|
35
|
+
(0, http_1.Policy)(AuthorizedPolicy_js_1.AuthorizedPolicy)
|
|
36
36
|
], GrantsController);
|
|
37
37
|
//# sourceMappingURL=GrantsController.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"GrantsController.js","sourceRoot":"","sources":["../../../src/controllers/GrantsController.ts"],"names":[],"mappings":";;;;;;;;;;;;AAAA,wCAA0E;AAC1E,wCAA8C;AAC9C,oCAAyC;AACzC,
|
|
1
|
+
{"version":3,"file":"GrantsController.js","sourceRoot":"","sources":["../../../src/controllers/GrantsController.ts"],"names":[],"mappings":";;;;;;;;;;;;AAAA,wCAA0E;AAC1E,wCAA8C;AAC9C,oCAAyC;AACzC,yEAAmE;AAI5D,IAAM,gBAAgB,GAAtB,MAAM,gBAAiB,SAAQ,qBAAc;IAMzC,SAAS;QACZ,OAAO,IAAI,SAAE,CAAC,IAAI,CAAC,EAAE,CAAC,SAAS,EAAE,CAAC,CAAC;IACvC,CAAC;CAEJ,CAAA;AAVY,4CAAgB;AAGf;IADT,IAAA,eAAU,EAAC,oBAAa,CAAC;8BACZ,oBAAa;4CAAC;AAGrB;IADN,IAAA,UAAG,GAAE;;;;iDAGL;2BARQ,gBAAgB;IAF5B,IAAA,eAAQ,EAAC,QAAQ,CAAC;IAClB,IAAA,aAAM,EAAC,sCAAgB,CAAC;GACZ,gBAAgB,CAU5B"}
|
package/lib/cjs/index.d.ts
CHANGED
|
@@ -9,5 +9,7 @@ export * from "./policies/BlockGuest.js";
|
|
|
9
9
|
export * from "./policies/LoggedPolicy.js";
|
|
10
10
|
export * from "./policies/NotLoggedPolicy.js";
|
|
11
11
|
export * from "./policies/RbacPolicy.js";
|
|
12
|
+
export * from "./policies/NotAthorizedPolicy.js";
|
|
13
|
+
export * from "./policies/AuthorizedPolicy.js";
|
|
12
14
|
export * from "./controllers/GrantsController.js";
|
|
13
15
|
//# sourceMappingURL=index.d.ts.map
|
package/lib/cjs/index.d.ts.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/index.ts"],"names":[],"mappings":"AAAA,cAAc,iBAAiB,CAAC;AAChC,cAAc,iBAAiB,CAAC;AAChC,cAAc,kBAAkB,CAAC;AACjC,cAAc,0BAA0B,CAAC;AACzC,cAAc,mBAAmB,CAAC;AAClC,cAAc,iBAAiB,CAAC;AAEhC,cAAc,0BAA0B,CAAC;AACzC,cAAc,0BAA0B,CAAC;AACzC,cAAc,4BAA4B,CAAC;AAC3C,cAAc,+BAA+B,CAAC;AAC9C,cAAc,0BAA0B,CAAC;
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/index.ts"],"names":[],"mappings":"AAAA,cAAc,iBAAiB,CAAC;AAChC,cAAc,iBAAiB,CAAC;AAChC,cAAc,kBAAkB,CAAC;AACjC,cAAc,0BAA0B,CAAC;AACzC,cAAc,mBAAmB,CAAC;AAClC,cAAc,iBAAiB,CAAC;AAEhC,cAAc,0BAA0B,CAAC;AACzC,cAAc,0BAA0B,CAAC;AACzC,cAAc,4BAA4B,CAAC;AAC3C,cAAc,+BAA+B,CAAC;AAC9C,cAAc,0BAA0B,CAAC;AACzC,cAAc,kCAAkC,CAAC;AACjD,cAAc,gCAAgC,CAAC;AAE/C,cAAc,mCAAmC,CAAC"}
|
package/lib/cjs/index.js
CHANGED
|
@@ -25,5 +25,7 @@ __exportStar(require("./policies/BlockGuest.js"), exports);
|
|
|
25
25
|
__exportStar(require("./policies/LoggedPolicy.js"), exports);
|
|
26
26
|
__exportStar(require("./policies/NotLoggedPolicy.js"), exports);
|
|
27
27
|
__exportStar(require("./policies/RbacPolicy.js"), exports);
|
|
28
|
+
__exportStar(require("./policies/NotAthorizedPolicy.js"), exports);
|
|
29
|
+
__exportStar(require("./policies/AuthorizedPolicy.js"), exports);
|
|
28
30
|
__exportStar(require("./controllers/GrantsController.js"), exports);
|
|
29
31
|
//# sourceMappingURL=index.js.map
|
package/lib/cjs/index.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/index.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;AAAA,kDAAgC;AAChC,kDAAgC;AAChC,mDAAiC;AACjC,2DAAyC;AACzC,oDAAkC;AAClC,kDAAgC;AAEhC,2DAAyC;AACzC,2DAAyC;AACzC,6DAA2C;AAC3C,gEAA8C;AAC9C,2DAAyC;
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/index.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;AAAA,kDAAgC;AAChC,kDAAgC;AAChC,mDAAiC;AACjC,2DAAyC;AACzC,oDAAkC;AAClC,kDAAgC;AAEhC,2DAAyC;AACzC,2DAAyC;AACzC,6DAA2C;AAC3C,gEAA8C;AAC9C,2DAAyC;AACzC,mEAAiD;AACjD,iEAA+C;AAE/C,oEAAkD"}
|
|
@@ -0,0 +1,10 @@
|
|
|
1
|
+
import { BasePolicy, IController, IRoute, Request as sRequest } from '@spinajs/http';
|
|
2
|
+
/**
|
|
3
|
+
* Simple policy to only check if user is authorized ( do not check permissions for routes)
|
|
4
|
+
* Usefull if we want to give acces for all logged users
|
|
5
|
+
*/
|
|
6
|
+
export declare class AuthorizedPolicy extends BasePolicy {
|
|
7
|
+
isEnabled(_action: IRoute, _instance: IController): boolean;
|
|
8
|
+
execute(req: sRequest): Promise<void>;
|
|
9
|
+
}
|
|
10
|
+
//# sourceMappingURL=AuthorizedPolicy.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"AuthorizedPolicy.d.ts","sourceRoot":"","sources":["../../../src/policies/AuthorizedPolicy.ts"],"names":[],"mappings":"AACA,OAAO,EAAE,UAAU,EAAE,WAAW,EAAE,MAAM,EAAE,OAAO,IAAI,QAAQ,EAAE,MAAM,eAAe,CAAC;AAErF;;;GAGG;AACH,qBAAa,gBAAiB,SAAQ,UAAU;IACvC,SAAS,CAAC,OAAO,EAAE,MAAM,EAAE,SAAS,EAAE,WAAW,GAAG,OAAO;IAKrD,OAAO,CAAC,GAAG,EAAE,QAAQ;CAOnC"}
|
|
@@ -0,0 +1,23 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.AuthorizedPolicy = void 0;
|
|
4
|
+
const exceptions_1 = require("@spinajs/exceptions");
|
|
5
|
+
const http_1 = require("@spinajs/http");
|
|
6
|
+
/**
|
|
7
|
+
* Simple policy to only check if user is authorized ( do not check permissions for routes)
|
|
8
|
+
* Usefull if we want to give acces for all logged users
|
|
9
|
+
*/
|
|
10
|
+
class AuthorizedPolicy extends http_1.BasePolicy {
|
|
11
|
+
isEnabled(_action, _instance) {
|
|
12
|
+
// acl is always on if set
|
|
13
|
+
return true;
|
|
14
|
+
}
|
|
15
|
+
async execute(req) {
|
|
16
|
+
if (!req.storage || !req.storage.User || !req.storage.Session?.Data.get('Authorized')) {
|
|
17
|
+
throw new exceptions_1.AuthenticationFailed('user not authorized or session expired');
|
|
18
|
+
}
|
|
19
|
+
return Promise.resolve();
|
|
20
|
+
}
|
|
21
|
+
}
|
|
22
|
+
exports.AuthorizedPolicy = AuthorizedPolicy;
|
|
23
|
+
//# sourceMappingURL=AuthorizedPolicy.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"AuthorizedPolicy.js","sourceRoot":"","sources":["../../../src/policies/AuthorizedPolicy.ts"],"names":[],"mappings":";;;AAAA,oDAA2D;AAC3D,wCAAqF;AAErF;;;GAGG;AACH,MAAa,gBAAiB,SAAQ,iBAAU;IACvC,SAAS,CAAC,OAAe,EAAE,SAAsB;QACtD,0BAA0B;QAC1B,OAAO,IAAI,CAAC;IACd,CAAC;IAEM,KAAK,CAAC,OAAO,CAAC,GAAa;QAChC,IAAI,CAAC,GAAG,CAAC,OAAO,IAAI,CAAC,GAAG,CAAC,OAAO,CAAC,IAAI,IAAI,CAAC,GAAG,CAAC,OAAO,CAAC,OAAO,EAAE,IAAI,CAAC,GAAG,CAAC,YAAY,CAAC,EAAE,CAAC;YACtF,MAAM,IAAI,iCAAoB,CAAC,wCAAwC,CAAC,CAAC;QAC3E,CAAC;QAED,OAAO,OAAO,CAAC,OAAO,EAAE,CAAC;IAC3B,CAAC;CACF;AAbD,4CAaC"}
|
|
@@ -13,7 +13,7 @@ class LoggedPolicy extends http_1.BasePolicy {
|
|
|
13
13
|
return true;
|
|
14
14
|
}
|
|
15
15
|
async execute(req) {
|
|
16
|
-
if (!req.storage || !req.storage.User || !req.storage.Session?.Data.get('
|
|
16
|
+
if (!req.storage || !req.storage.User || !req.storage.Session?.Data.get('Logged')) {
|
|
17
17
|
throw new exceptions_1.AuthenticationFailed('user not logged or session expired');
|
|
18
18
|
}
|
|
19
19
|
return Promise.resolve();
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"LoggedPolicy.js","sourceRoot":"","sources":["../../../src/policies/LoggedPolicy.ts"],"names":[],"mappings":";;;AAAA,oDAA2D;AAC3D,wCAAqF;AAErF;;;GAGG;AACH,MAAa,YAAa,SAAQ,iBAAU;IACnC,SAAS,CAAC,OAAe,EAAE,SAAsB;QACtD,0BAA0B;QAC1B,OAAO,IAAI,CAAC;IACd,CAAC;IAEM,KAAK,CAAC,OAAO,CAAC,GAAa;QAChC,IAAI,CAAC,GAAG,CAAC,OAAO,IAAI,CAAC,GAAG,CAAC,OAAO,CAAC,IAAI,IAAI,CAAC,GAAG,CAAC,OAAO,CAAC,OAAO,EAAE,IAAI,CAAC,GAAG,CAAC,
|
|
1
|
+
{"version":3,"file":"LoggedPolicy.js","sourceRoot":"","sources":["../../../src/policies/LoggedPolicy.ts"],"names":[],"mappings":";;;AAAA,oDAA2D;AAC3D,wCAAqF;AAErF;;;GAGG;AACH,MAAa,YAAa,SAAQ,iBAAU;IACnC,SAAS,CAAC,OAAe,EAAE,SAAsB;QACtD,0BAA0B;QAC1B,OAAO,IAAI,CAAC;IACd,CAAC;IAEM,KAAK,CAAC,OAAO,CAAC,GAAa;QAChC,IAAI,CAAC,GAAG,CAAC,OAAO,IAAI,CAAC,GAAG,CAAC,OAAO,CAAC,IAAI,IAAI,CAAC,GAAG,CAAC,OAAO,CAAC,OAAO,EAAE,IAAI,CAAC,GAAG,CAAC,QAAQ,CAAC,EAAE,CAAC;YAClF,MAAM,IAAI,iCAAoB,CAAC,oCAAoC,CAAC,CAAC;QACvE,CAAC;QAED,OAAO,OAAO,CAAC,OAAO,EAAE,CAAC;IAC3B,CAAC;CACF;AAbD,oCAaC"}
|
|
@@ -0,0 +1,11 @@
|
|
|
1
|
+
import { BasePolicy, IController, IRoute, Request as sRequest } from '@spinajs/http';
|
|
2
|
+
/**
|
|
3
|
+
* Simple policy to only check if user sends session
|
|
4
|
+
*
|
|
5
|
+
* WARN: this is not check for user auth / not auth
|
|
6
|
+
*/
|
|
7
|
+
export declare class NoSessionPolicy extends BasePolicy {
|
|
8
|
+
isEnabled(_action: IRoute, _instance: IController): boolean;
|
|
9
|
+
execute(req: sRequest): Promise<void>;
|
|
10
|
+
}
|
|
11
|
+
//# sourceMappingURL=NoSessionPolicy.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"NoSessionPolicy.d.ts","sourceRoot":"","sources":["../../../src/policies/NoSessionPolicy.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,UAAU,EAAE,WAAW,EAAE,MAAM,EAAE,OAAO,IAAI,QAAQ,EAAE,MAAM,eAAe,CAAC;AAGrF;;;;GAIG;AACH,qBAAa,eAAgB,SAAQ,UAAU;IACtC,SAAS,CAAC,OAAO,EAAE,MAAM,EAAE,SAAS,EAAE,WAAW,GAAG,OAAO;IAIrD,OAAO,CAAC,GAAG,EAAE,QAAQ;CAQnC"}
|
|
@@ -0,0 +1,23 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.NoSessionPolicy = void 0;
|
|
4
|
+
const http_1 = require("@spinajs/http");
|
|
5
|
+
const exceptions_1 = require("@spinajs/exceptions");
|
|
6
|
+
/**
|
|
7
|
+
* Simple policy to only check if user sends session
|
|
8
|
+
*
|
|
9
|
+
* WARN: this is not check for user auth / not auth
|
|
10
|
+
*/
|
|
11
|
+
class NoSessionPolicy extends http_1.BasePolicy {
|
|
12
|
+
isEnabled(_action, _instance) {
|
|
13
|
+
return true;
|
|
14
|
+
}
|
|
15
|
+
async execute(req) {
|
|
16
|
+
if (!req.storage || !req.storage.User || !req.storage.Session) {
|
|
17
|
+
return Promise.resolve();
|
|
18
|
+
}
|
|
19
|
+
throw new exceptions_1.Forbidden('User already have session');
|
|
20
|
+
}
|
|
21
|
+
}
|
|
22
|
+
exports.NoSessionPolicy = NoSessionPolicy;
|
|
23
|
+
//# sourceMappingURL=NoSessionPolicy.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"NoSessionPolicy.js","sourceRoot":"","sources":["../../../src/policies/NoSessionPolicy.ts"],"names":[],"mappings":";;;AAAA,wCAAqF;AACrF,oDAAgD;AAEhD;;;;GAIG;AACH,MAAa,eAAgB,SAAQ,iBAAU;IACtC,SAAS,CAAC,OAAe,EAAE,SAAsB;QACtD,OAAO,IAAI,CAAC;IACd,CAAC;IAEM,KAAK,CAAC,OAAO,CAAC,GAAa;QAChC,IAAI,CAAC,GAAG,CAAC,OAAO,IAAI,CAAC,GAAG,CAAC,OAAO,CAAC,IAAI,IAAI,CAAC,GAAG,CAAC,OAAO,CAAC,OAAO,EAAE,CAAC;YAC9D,OAAO,OAAO,CAAC,OAAO,EAAE,CAAC;QAC3B,CAAC;QAED,MAAM,IAAI,sBAAS,CAAC,2BAA2B,CAAC,CAAC;IAEnD,CAAC;CACF;AAbD,0CAaC"}
|
|
@@ -0,0 +1,10 @@
|
|
|
1
|
+
import { BasePolicy, IController, IRoute, Request as sRequest } from '@spinajs/http';
|
|
2
|
+
/**
|
|
3
|
+
* Simple policy to only check if user is authorized ( do not check permissions for routes)
|
|
4
|
+
* Usefull if we want to give acces for all logged users
|
|
5
|
+
*/
|
|
6
|
+
export declare class NotAuthorizedPolicy extends BasePolicy {
|
|
7
|
+
isEnabled(_action: IRoute, _instance: IController): boolean;
|
|
8
|
+
execute(req: sRequest): Promise<void>;
|
|
9
|
+
}
|
|
10
|
+
//# sourceMappingURL=NotAthorizedPolicy.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"NotAthorizedPolicy.d.ts","sourceRoot":"","sources":["../../../src/policies/NotAthorizedPolicy.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,UAAU,EAAE,WAAW,EAAE,MAAM,EAAE,OAAO,IAAI,QAAQ,EAAE,MAAM,eAAe,CAAC;AAGrF;;;GAGG;AACH,qBAAa,mBAAoB,SAAQ,UAAU;IAC1C,SAAS,CAAC,OAAO,EAAE,MAAM,EAAE,SAAS,EAAE,WAAW,GAAG,OAAO;IAIrD,OAAO,CAAC,GAAG,EAAE,QAAQ;CAQnC"}
|
|
@@ -0,0 +1,22 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.NotAuthorizedPolicy = void 0;
|
|
4
|
+
const http_1 = require("@spinajs/http");
|
|
5
|
+
const exceptions_1 = require("@spinajs/exceptions");
|
|
6
|
+
/**
|
|
7
|
+
* Simple policy to only check if user is authorized ( do not check permissions for routes)
|
|
8
|
+
* Usefull if we want to give acces for all logged users
|
|
9
|
+
*/
|
|
10
|
+
class NotAuthorizedPolicy extends http_1.BasePolicy {
|
|
11
|
+
isEnabled(_action, _instance) {
|
|
12
|
+
return true;
|
|
13
|
+
}
|
|
14
|
+
async execute(req) {
|
|
15
|
+
if (!req.storage.Session?.Data.get('Authorized')) {
|
|
16
|
+
return Promise.resolve();
|
|
17
|
+
}
|
|
18
|
+
throw new exceptions_1.Forbidden('User already authorized, please logout first');
|
|
19
|
+
}
|
|
20
|
+
}
|
|
21
|
+
exports.NotAuthorizedPolicy = NotAuthorizedPolicy;
|
|
22
|
+
//# sourceMappingURL=NotAthorizedPolicy.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"NotAthorizedPolicy.js","sourceRoot":"","sources":["../../../src/policies/NotAthorizedPolicy.ts"],"names":[],"mappings":";;;AAAA,wCAAqF;AACrF,oDAAgD;AAEhD;;;GAGG;AACH,MAAa,mBAAoB,SAAQ,iBAAU;IAC1C,SAAS,CAAC,OAAe,EAAE,SAAsB;QACtD,OAAO,IAAI,CAAC;IACd,CAAC;IAEM,KAAK,CAAC,OAAO,CAAC,GAAa;QAChC,IAAI,CAAC,GAAG,CAAC,OAAO,CAAC,OAAO,EAAE,IAAI,CAAC,GAAG,CAAC,YAAY,CAAC,EAAG,CAAC;YAClD,OAAO,OAAO,CAAC,OAAO,EAAE,CAAC;QAC3B,CAAC;QAED,MAAM,IAAI,sBAAS,CAAC,8CAA8C,CAAC,CAAC;IAEtE,CAAC;CACF;AAbD,kDAaC"}
|
|
@@ -12,7 +12,7 @@ class NotLoggedPolicy extends http_1.BasePolicy {
|
|
|
12
12
|
return true;
|
|
13
13
|
}
|
|
14
14
|
async execute(req) {
|
|
15
|
-
if (!req.storage
|
|
15
|
+
if (!req.storage.Session?.Data.get('Logged')) {
|
|
16
16
|
return Promise.resolve();
|
|
17
17
|
}
|
|
18
18
|
throw new exceptions_1.Forbidden('User already logged in, please logout first');
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"NotLoggedPolicy.js","sourceRoot":"","sources":["../../../src/policies/NotLoggedPolicy.ts"],"names":[],"mappings":";;;AAAA,wCAAqF;AACrF,oDAAgD;AAEhD;;;GAGG;AACH,MAAa,eAAgB,SAAQ,iBAAU;IACtC,SAAS,CAAC,OAAe,EAAE,SAAsB;QACtD,OAAO,IAAI,CAAC;IACd,CAAC;IAEM,KAAK,CAAC,OAAO,CAAC,GAAa;QAChC,IAAI,CAAC,GAAG,CAAC,OAAO,
|
|
1
|
+
{"version":3,"file":"NotLoggedPolicy.js","sourceRoot":"","sources":["../../../src/policies/NotLoggedPolicy.ts"],"names":[],"mappings":";;;AAAA,wCAAqF;AACrF,oDAAgD;AAEhD;;;GAGG;AACH,MAAa,eAAgB,SAAQ,iBAAU;IACtC,SAAS,CAAC,OAAe,EAAE,SAAsB;QACtD,OAAO,IAAI,CAAC;IACd,CAAC;IAEM,KAAK,CAAC,OAAO,CAAC,GAAa;QAChC,IAAI,CAAC,GAAG,CAAC,OAAO,CAAC,OAAO,EAAE,IAAI,CAAC,GAAG,CAAC,QAAQ,CAAC,EAAE,CAAC;YAC7C,OAAO,OAAO,CAAC,OAAO,EAAE,CAAC;QAC3B,CAAC;QAED,MAAM,IAAI,sBAAS,CAAC,6CAA6C,CAAC,CAAC;IAErE,CAAC;CACF;AAbD,0CAaC"}
|
|
@@ -10,7 +10,7 @@ var __metadata = (this && this.__metadata) || function (k, v) {
|
|
|
10
10
|
import { BaseController, BasePath, Get, Ok, Policy } from '@spinajs/http';
|
|
11
11
|
import { AccessControl } from '@spinajs/rbac';
|
|
12
12
|
import { Autoinject } from '@spinajs/di';
|
|
13
|
-
import {
|
|
13
|
+
import { AuthorizedPolicy } from '../policies/AuthorizedPolicy.js';
|
|
14
14
|
let GrantsController = class GrantsController extends BaseController {
|
|
15
15
|
getGrants() {
|
|
16
16
|
return new Ok(this.AC.getGrants());
|
|
@@ -28,7 +28,7 @@ __decorate([
|
|
|
28
28
|
], GrantsController.prototype, "getGrants", null);
|
|
29
29
|
GrantsController = __decorate([
|
|
30
30
|
BasePath('grants'),
|
|
31
|
-
Policy(
|
|
31
|
+
Policy(AuthorizedPolicy)
|
|
32
32
|
], GrantsController);
|
|
33
33
|
export { GrantsController };
|
|
34
34
|
//# sourceMappingURL=GrantsController.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"GrantsController.js","sourceRoot":"","sources":["../../../src/controllers/GrantsController.ts"],"names":[],"mappings":";;;;;;;;;AAAA,OAAO,EAAE,cAAc,EAAE,QAAQ,EAAE,GAAG,EAAE,EAAE,EAAE,MAAM,EAAE,MAAM,eAAe,CAAC;AAC1E,OAAO,EAAE,aAAa,EAAE,MAAM,eAAe,CAAC;AAC9C,OAAO,EAAE,UAAU,EAAE,MAAM,aAAa,CAAC;AACzC,OAAO,EAAE,
|
|
1
|
+
{"version":3,"file":"GrantsController.js","sourceRoot":"","sources":["../../../src/controllers/GrantsController.ts"],"names":[],"mappings":";;;;;;;;;AAAA,OAAO,EAAE,cAAc,EAAE,QAAQ,EAAE,GAAG,EAAE,EAAE,EAAE,MAAM,EAAE,MAAM,eAAe,CAAC;AAC1E,OAAO,EAAE,aAAa,EAAE,MAAM,eAAe,CAAC;AAC9C,OAAO,EAAE,UAAU,EAAE,MAAM,aAAa,CAAC;AACzC,OAAO,EAAE,gBAAgB,EAAE,MAAM,iCAAiC,CAAC;AAI5D,IAAM,gBAAgB,GAAtB,MAAM,gBAAiB,SAAQ,cAAc;IAMzC,SAAS;QACZ,OAAO,IAAI,EAAE,CAAC,IAAI,CAAC,EAAE,CAAC,SAAS,EAAE,CAAC,CAAC;IACvC,CAAC;CAEJ,CAAA;AAPa;IADT,UAAU,CAAC,aAAa,CAAC;8BACZ,aAAa;4CAAC;AAGrB;IADN,GAAG,EAAE;;;;iDAGL;AARQ,gBAAgB;IAF5B,QAAQ,CAAC,QAAQ,CAAC;IAClB,MAAM,CAAC,gBAAgB,CAAC;GACZ,gBAAgB,CAU5B"}
|
package/lib/mjs/index.d.ts
CHANGED
|
@@ -9,5 +9,7 @@ export * from "./policies/BlockGuest.js";
|
|
|
9
9
|
export * from "./policies/LoggedPolicy.js";
|
|
10
10
|
export * from "./policies/NotLoggedPolicy.js";
|
|
11
11
|
export * from "./policies/RbacPolicy.js";
|
|
12
|
+
export * from "./policies/NotAthorizedPolicy.js";
|
|
13
|
+
export * from "./policies/AuthorizedPolicy.js";
|
|
12
14
|
export * from "./controllers/GrantsController.js";
|
|
13
15
|
//# sourceMappingURL=index.d.ts.map
|
package/lib/mjs/index.d.ts.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/index.ts"],"names":[],"mappings":"AAAA,cAAc,iBAAiB,CAAC;AAChC,cAAc,iBAAiB,CAAC;AAChC,cAAc,kBAAkB,CAAC;AACjC,cAAc,0BAA0B,CAAC;AACzC,cAAc,mBAAmB,CAAC;AAClC,cAAc,iBAAiB,CAAC;AAEhC,cAAc,0BAA0B,CAAC;AACzC,cAAc,0BAA0B,CAAC;AACzC,cAAc,4BAA4B,CAAC;AAC3C,cAAc,+BAA+B,CAAC;AAC9C,cAAc,0BAA0B,CAAC;
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/index.ts"],"names":[],"mappings":"AAAA,cAAc,iBAAiB,CAAC;AAChC,cAAc,iBAAiB,CAAC;AAChC,cAAc,kBAAkB,CAAC;AACjC,cAAc,0BAA0B,CAAC;AACzC,cAAc,mBAAmB,CAAC;AAClC,cAAc,iBAAiB,CAAC;AAEhC,cAAc,0BAA0B,CAAC;AACzC,cAAc,0BAA0B,CAAC;AACzC,cAAc,4BAA4B,CAAC;AAC3C,cAAc,+BAA+B,CAAC;AAC9C,cAAc,0BAA0B,CAAC;AACzC,cAAc,kCAAkC,CAAC;AACjD,cAAc,gCAAgC,CAAC;AAE/C,cAAc,mCAAmC,CAAC"}
|
package/lib/mjs/index.js
CHANGED
|
@@ -9,5 +9,7 @@ export * from "./policies/BlockGuest.js";
|
|
|
9
9
|
export * from "./policies/LoggedPolicy.js";
|
|
10
10
|
export * from "./policies/NotLoggedPolicy.js";
|
|
11
11
|
export * from "./policies/RbacPolicy.js";
|
|
12
|
+
export * from "./policies/NotAthorizedPolicy.js";
|
|
13
|
+
export * from "./policies/AuthorizedPolicy.js";
|
|
12
14
|
export * from "./controllers/GrantsController.js";
|
|
13
15
|
//# sourceMappingURL=index.js.map
|
package/lib/mjs/index.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/index.ts"],"names":[],"mappings":"AAAA,cAAc,iBAAiB,CAAC;AAChC,cAAc,iBAAiB,CAAC;AAChC,cAAc,kBAAkB,CAAC;AACjC,cAAc,0BAA0B,CAAC;AACzC,cAAc,mBAAmB,CAAC;AAClC,cAAc,iBAAiB,CAAC;AAEhC,cAAc,0BAA0B,CAAC;AACzC,cAAc,0BAA0B,CAAC;AACzC,cAAc,4BAA4B,CAAC;AAC3C,cAAc,+BAA+B,CAAC;AAC9C,cAAc,0BAA0B,CAAC;
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/index.ts"],"names":[],"mappings":"AAAA,cAAc,iBAAiB,CAAC;AAChC,cAAc,iBAAiB,CAAC;AAChC,cAAc,kBAAkB,CAAC;AACjC,cAAc,0BAA0B,CAAC;AACzC,cAAc,mBAAmB,CAAC;AAClC,cAAc,iBAAiB,CAAC;AAEhC,cAAc,0BAA0B,CAAC;AACzC,cAAc,0BAA0B,CAAC;AACzC,cAAc,4BAA4B,CAAC;AAC3C,cAAc,+BAA+B,CAAC;AAC9C,cAAc,0BAA0B,CAAC;AACzC,cAAc,kCAAkC,CAAC;AACjD,cAAc,gCAAgC,CAAC;AAE/C,cAAc,mCAAmC,CAAC"}
|
|
@@ -0,0 +1,10 @@
|
|
|
1
|
+
import { BasePolicy, IController, IRoute, Request as sRequest } from '@spinajs/http';
|
|
2
|
+
/**
|
|
3
|
+
* Simple policy to only check if user is authorized ( do not check permissions for routes)
|
|
4
|
+
* Usefull if we want to give acces for all logged users
|
|
5
|
+
*/
|
|
6
|
+
export declare class AuthorizedPolicy extends BasePolicy {
|
|
7
|
+
isEnabled(_action: IRoute, _instance: IController): boolean;
|
|
8
|
+
execute(req: sRequest): Promise<void>;
|
|
9
|
+
}
|
|
10
|
+
//# sourceMappingURL=AuthorizedPolicy.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"AuthorizedPolicy.d.ts","sourceRoot":"","sources":["../../../src/policies/AuthorizedPolicy.ts"],"names":[],"mappings":"AACA,OAAO,EAAE,UAAU,EAAE,WAAW,EAAE,MAAM,EAAE,OAAO,IAAI,QAAQ,EAAE,MAAM,eAAe,CAAC;AAErF;;;GAGG;AACH,qBAAa,gBAAiB,SAAQ,UAAU;IACvC,SAAS,CAAC,OAAO,EAAE,MAAM,EAAE,SAAS,EAAE,WAAW,GAAG,OAAO;IAKrD,OAAO,CAAC,GAAG,EAAE,QAAQ;CAOnC"}
|
|
@@ -0,0 +1,19 @@
|
|
|
1
|
+
import { AuthenticationFailed } from '@spinajs/exceptions';
|
|
2
|
+
import { BasePolicy } from '@spinajs/http';
|
|
3
|
+
/**
|
|
4
|
+
* Simple policy to only check if user is authorized ( do not check permissions for routes)
|
|
5
|
+
* Usefull if we want to give acces for all logged users
|
|
6
|
+
*/
|
|
7
|
+
export class AuthorizedPolicy extends BasePolicy {
|
|
8
|
+
isEnabled(_action, _instance) {
|
|
9
|
+
// acl is always on if set
|
|
10
|
+
return true;
|
|
11
|
+
}
|
|
12
|
+
async execute(req) {
|
|
13
|
+
if (!req.storage || !req.storage.User || !req.storage.Session?.Data.get('Authorized')) {
|
|
14
|
+
throw new AuthenticationFailed('user not authorized or session expired');
|
|
15
|
+
}
|
|
16
|
+
return Promise.resolve();
|
|
17
|
+
}
|
|
18
|
+
}
|
|
19
|
+
//# sourceMappingURL=AuthorizedPolicy.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"AuthorizedPolicy.js","sourceRoot":"","sources":["../../../src/policies/AuthorizedPolicy.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,oBAAoB,EAAE,MAAM,qBAAqB,CAAC;AAC3D,OAAO,EAAE,UAAU,EAA4C,MAAM,eAAe,CAAC;AAErF;;;GAGG;AACH,MAAM,OAAO,gBAAiB,SAAQ,UAAU;IACvC,SAAS,CAAC,OAAe,EAAE,SAAsB;QACtD,0BAA0B;QAC1B,OAAO,IAAI,CAAC;IACd,CAAC;IAEM,KAAK,CAAC,OAAO,CAAC,GAAa;QAChC,IAAI,CAAC,GAAG,CAAC,OAAO,IAAI,CAAC,GAAG,CAAC,OAAO,CAAC,IAAI,IAAI,CAAC,GAAG,CAAC,OAAO,CAAC,OAAO,EAAE,IAAI,CAAC,GAAG,CAAC,YAAY,CAAC,EAAE,CAAC;YACtF,MAAM,IAAI,oBAAoB,CAAC,wCAAwC,CAAC,CAAC;QAC3E,CAAC;QAED,OAAO,OAAO,CAAC,OAAO,EAAE,CAAC;IAC3B,CAAC;CACF"}
|
|
@@ -10,7 +10,7 @@ export class LoggedPolicy extends BasePolicy {
|
|
|
10
10
|
return true;
|
|
11
11
|
}
|
|
12
12
|
async execute(req) {
|
|
13
|
-
if (!req.storage || !req.storage.User || !req.storage.Session?.Data.get('
|
|
13
|
+
if (!req.storage || !req.storage.User || !req.storage.Session?.Data.get('Logged')) {
|
|
14
14
|
throw new AuthenticationFailed('user not logged or session expired');
|
|
15
15
|
}
|
|
16
16
|
return Promise.resolve();
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"LoggedPolicy.js","sourceRoot":"","sources":["../../../src/policies/LoggedPolicy.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,oBAAoB,EAAE,MAAM,qBAAqB,CAAC;AAC3D,OAAO,EAAE,UAAU,EAA4C,MAAM,eAAe,CAAC;AAErF;;;GAGG;AACH,MAAM,OAAO,YAAa,SAAQ,UAAU;IACnC,SAAS,CAAC,OAAe,EAAE,SAAsB;QACtD,0BAA0B;QAC1B,OAAO,IAAI,CAAC;IACd,CAAC;IAEM,KAAK,CAAC,OAAO,CAAC,GAAa;QAChC,IAAI,CAAC,GAAG,CAAC,OAAO,IAAI,CAAC,GAAG,CAAC,OAAO,CAAC,IAAI,IAAI,CAAC,GAAG,CAAC,OAAO,CAAC,OAAO,EAAE,IAAI,CAAC,GAAG,CAAC,
|
|
1
|
+
{"version":3,"file":"LoggedPolicy.js","sourceRoot":"","sources":["../../../src/policies/LoggedPolicy.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,oBAAoB,EAAE,MAAM,qBAAqB,CAAC;AAC3D,OAAO,EAAE,UAAU,EAA4C,MAAM,eAAe,CAAC;AAErF;;;GAGG;AACH,MAAM,OAAO,YAAa,SAAQ,UAAU;IACnC,SAAS,CAAC,OAAe,EAAE,SAAsB;QACtD,0BAA0B;QAC1B,OAAO,IAAI,CAAC;IACd,CAAC;IAEM,KAAK,CAAC,OAAO,CAAC,GAAa;QAChC,IAAI,CAAC,GAAG,CAAC,OAAO,IAAI,CAAC,GAAG,CAAC,OAAO,CAAC,IAAI,IAAI,CAAC,GAAG,CAAC,OAAO,CAAC,OAAO,EAAE,IAAI,CAAC,GAAG,CAAC,QAAQ,CAAC,EAAE,CAAC;YAClF,MAAM,IAAI,oBAAoB,CAAC,oCAAoC,CAAC,CAAC;QACvE,CAAC;QAED,OAAO,OAAO,CAAC,OAAO,EAAE,CAAC;IAC3B,CAAC;CACF"}
|
|
@@ -0,0 +1,11 @@
|
|
|
1
|
+
import { BasePolicy, IController, IRoute, Request as sRequest } from '@spinajs/http';
|
|
2
|
+
/**
|
|
3
|
+
* Simple policy to only check if user sends session
|
|
4
|
+
*
|
|
5
|
+
* WARN: this is not check for user auth / not auth
|
|
6
|
+
*/
|
|
7
|
+
export declare class NoSessionPolicy extends BasePolicy {
|
|
8
|
+
isEnabled(_action: IRoute, _instance: IController): boolean;
|
|
9
|
+
execute(req: sRequest): Promise<void>;
|
|
10
|
+
}
|
|
11
|
+
//# sourceMappingURL=NoSessionPolicy.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"NoSessionPolicy.d.ts","sourceRoot":"","sources":["../../../src/policies/NoSessionPolicy.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,UAAU,EAAE,WAAW,EAAE,MAAM,EAAE,OAAO,IAAI,QAAQ,EAAE,MAAM,eAAe,CAAC;AAGrF;;;;GAIG;AACH,qBAAa,eAAgB,SAAQ,UAAU;IACtC,SAAS,CAAC,OAAO,EAAE,MAAM,EAAE,SAAS,EAAE,WAAW,GAAG,OAAO;IAIrD,OAAO,CAAC,GAAG,EAAE,QAAQ;CAQnC"}
|
|
@@ -0,0 +1,19 @@
|
|
|
1
|
+
import { BasePolicy } from '@spinajs/http';
|
|
2
|
+
import { Forbidden } from '@spinajs/exceptions';
|
|
3
|
+
/**
|
|
4
|
+
* Simple policy to only check if user sends session
|
|
5
|
+
*
|
|
6
|
+
* WARN: this is not check for user auth / not auth
|
|
7
|
+
*/
|
|
8
|
+
export class NoSessionPolicy extends BasePolicy {
|
|
9
|
+
isEnabled(_action, _instance) {
|
|
10
|
+
return true;
|
|
11
|
+
}
|
|
12
|
+
async execute(req) {
|
|
13
|
+
if (!req.storage || !req.storage.User || !req.storage.Session) {
|
|
14
|
+
return Promise.resolve();
|
|
15
|
+
}
|
|
16
|
+
throw new Forbidden('User already have session');
|
|
17
|
+
}
|
|
18
|
+
}
|
|
19
|
+
//# sourceMappingURL=NoSessionPolicy.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"NoSessionPolicy.js","sourceRoot":"","sources":["../../../src/policies/NoSessionPolicy.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,UAAU,EAA4C,MAAM,eAAe,CAAC;AACrF,OAAO,EAAE,SAAS,EAAE,MAAM,qBAAqB,CAAC;AAEhD;;;;GAIG;AACH,MAAM,OAAO,eAAgB,SAAQ,UAAU;IACtC,SAAS,CAAC,OAAe,EAAE,SAAsB;QACtD,OAAO,IAAI,CAAC;IACd,CAAC;IAEM,KAAK,CAAC,OAAO,CAAC,GAAa;QAChC,IAAI,CAAC,GAAG,CAAC,OAAO,IAAI,CAAC,GAAG,CAAC,OAAO,CAAC,IAAI,IAAI,CAAC,GAAG,CAAC,OAAO,CAAC,OAAO,EAAE,CAAC;YAC9D,OAAO,OAAO,CAAC,OAAO,EAAE,CAAC;QAC3B,CAAC;QAED,MAAM,IAAI,SAAS,CAAC,2BAA2B,CAAC,CAAC;IAEnD,CAAC;CACF"}
|
|
@@ -0,0 +1,10 @@
|
|
|
1
|
+
import { BasePolicy, IController, IRoute, Request as sRequest } from '@spinajs/http';
|
|
2
|
+
/**
|
|
3
|
+
* Simple policy to only check if user is authorized ( do not check permissions for routes)
|
|
4
|
+
* Usefull if we want to give acces for all logged users
|
|
5
|
+
*/
|
|
6
|
+
export declare class NotAuthorizedPolicy extends BasePolicy {
|
|
7
|
+
isEnabled(_action: IRoute, _instance: IController): boolean;
|
|
8
|
+
execute(req: sRequest): Promise<void>;
|
|
9
|
+
}
|
|
10
|
+
//# sourceMappingURL=NotAthorizedPolicy.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"NotAthorizedPolicy.d.ts","sourceRoot":"","sources":["../../../src/policies/NotAthorizedPolicy.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,UAAU,EAAE,WAAW,EAAE,MAAM,EAAE,OAAO,IAAI,QAAQ,EAAE,MAAM,eAAe,CAAC;AAGrF;;;GAGG;AACH,qBAAa,mBAAoB,SAAQ,UAAU;IAC1C,SAAS,CAAC,OAAO,EAAE,MAAM,EAAE,SAAS,EAAE,WAAW,GAAG,OAAO;IAIrD,OAAO,CAAC,GAAG,EAAE,QAAQ;CAQnC"}
|
|
@@ -0,0 +1,18 @@
|
|
|
1
|
+
import { BasePolicy } from '@spinajs/http';
|
|
2
|
+
import { Forbidden } from '@spinajs/exceptions';
|
|
3
|
+
/**
|
|
4
|
+
* Simple policy to only check if user is authorized ( do not check permissions for routes)
|
|
5
|
+
* Usefull if we want to give acces for all logged users
|
|
6
|
+
*/
|
|
7
|
+
export class NotAuthorizedPolicy extends BasePolicy {
|
|
8
|
+
isEnabled(_action, _instance) {
|
|
9
|
+
return true;
|
|
10
|
+
}
|
|
11
|
+
async execute(req) {
|
|
12
|
+
if (!req.storage.Session?.Data.get('Authorized')) {
|
|
13
|
+
return Promise.resolve();
|
|
14
|
+
}
|
|
15
|
+
throw new Forbidden('User already authorized, please logout first');
|
|
16
|
+
}
|
|
17
|
+
}
|
|
18
|
+
//# sourceMappingURL=NotAthorizedPolicy.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"NotAthorizedPolicy.js","sourceRoot":"","sources":["../../../src/policies/NotAthorizedPolicy.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,UAAU,EAA4C,MAAM,eAAe,CAAC;AACrF,OAAO,EAAE,SAAS,EAAE,MAAM,qBAAqB,CAAC;AAEhD;;;GAGG;AACH,MAAM,OAAO,mBAAoB,SAAQ,UAAU;IAC1C,SAAS,CAAC,OAAe,EAAE,SAAsB;QACtD,OAAO,IAAI,CAAC;IACd,CAAC;IAEM,KAAK,CAAC,OAAO,CAAC,GAAa;QAChC,IAAI,CAAC,GAAG,CAAC,OAAO,CAAC,OAAO,EAAE,IAAI,CAAC,GAAG,CAAC,YAAY,CAAC,EAAG,CAAC;YAClD,OAAO,OAAO,CAAC,OAAO,EAAE,CAAC;QAC3B,CAAC;QAED,MAAM,IAAI,SAAS,CAAC,8CAA8C,CAAC,CAAC;IAEtE,CAAC;CACF"}
|
|
@@ -9,7 +9,7 @@ export class NotLoggedPolicy extends BasePolicy {
|
|
|
9
9
|
return true;
|
|
10
10
|
}
|
|
11
11
|
async execute(req) {
|
|
12
|
-
if (!req.storage
|
|
12
|
+
if (!req.storage.Session?.Data.get('Logged')) {
|
|
13
13
|
return Promise.resolve();
|
|
14
14
|
}
|
|
15
15
|
throw new Forbidden('User already logged in, please logout first');
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"NotLoggedPolicy.js","sourceRoot":"","sources":["../../../src/policies/NotLoggedPolicy.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,UAAU,EAA4C,MAAM,eAAe,CAAC;AACrF,OAAO,EAAE,SAAS,EAAE,MAAM,qBAAqB,CAAC;AAEhD;;;GAGG;AACH,MAAM,OAAO,eAAgB,SAAQ,UAAU;IACtC,SAAS,CAAC,OAAe,EAAE,SAAsB;QACtD,OAAO,IAAI,CAAC;IACd,CAAC;IAEM,KAAK,CAAC,OAAO,CAAC,GAAa;QAChC,IAAI,CAAC,GAAG,CAAC,OAAO,
|
|
1
|
+
{"version":3,"file":"NotLoggedPolicy.js","sourceRoot":"","sources":["../../../src/policies/NotLoggedPolicy.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,UAAU,EAA4C,MAAM,eAAe,CAAC;AACrF,OAAO,EAAE,SAAS,EAAE,MAAM,qBAAqB,CAAC;AAEhD;;;GAGG;AACH,MAAM,OAAO,eAAgB,SAAQ,UAAU;IACtC,SAAS,CAAC,OAAe,EAAE,SAAsB;QACtD,OAAO,IAAI,CAAC;IACd,CAAC;IAEM,KAAK,CAAC,OAAO,CAAC,GAAa;QAChC,IAAI,CAAC,GAAG,CAAC,OAAO,CAAC,OAAO,EAAE,IAAI,CAAC,GAAG,CAAC,QAAQ,CAAC,EAAE,CAAC;YAC7C,OAAO,OAAO,CAAC,OAAO,EAAE,CAAC;QAC3B,CAAC;QAED,MAAM,IAAI,SAAS,CAAC,6CAA6C,CAAC,CAAC;IAErE,CAAC;CACF"}
|