@spinajs/rbac-http 2.0.86 → 2.0.87
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/lib/{2fa → cjs/2fa}/SpeakEasy2FaToken.d.ts +0 -0
- package/lib/cjs/2fa/SpeakEasy2FaToken.d.ts.map +1 -0
- package/lib/cjs/2fa/SpeakEasy2FaToken.js +91 -0
- package/lib/cjs/2fa/SpeakEasy2FaToken.js.map +1 -0
- package/lib/{config → cjs/config}/rbac-http.d.ts +0 -0
- package/lib/cjs/config/rbac-http.d.ts.map +1 -0
- package/lib/cjs/config/rbac-http.js +41 -0
- package/lib/cjs/config/rbac-http.js.map +1 -0
- package/lib/{controllers → cjs/controllers}/LoginController.d.ts +0 -0
- package/lib/cjs/controllers/LoginController.d.ts.map +1 -0
- package/lib/cjs/controllers/LoginController.js +307 -0
- package/lib/cjs/controllers/LoginController.js.map +1 -0
- package/lib/{controllers → cjs/controllers}/TwoFactorAuthController.d.ts +0 -0
- package/lib/cjs/controllers/TwoFactorAuthController.d.ts.map +1 -0
- package/lib/cjs/controllers/TwoFactorAuthController.js +71 -0
- package/lib/cjs/controllers/TwoFactorAuthController.js.map +1 -0
- package/lib/{controllers → cjs/controllers}/UserAdminController.d.ts +0 -0
- package/lib/cjs/controllers/UserAdminController.d.ts.map +1 -0
- package/lib/cjs/controllers/UserAdminController.js +19 -0
- package/lib/cjs/controllers/UserAdminController.js.map +1 -0
- package/lib/{controllers → cjs/controllers}/UserController.d.ts +0 -0
- package/lib/cjs/controllers/UserController.d.ts.map +1 -0
- package/lib/cjs/controllers/UserController.js +110 -0
- package/lib/cjs/controllers/UserController.js.map +1 -0
- package/lib/{controllers → cjs/controllers}/UserMetadata.d.ts +0 -0
- package/lib/cjs/controllers/UserMetadata.d.ts.map +1 -0
- package/lib/cjs/controllers/UserMetadata.js +69 -0
- package/lib/cjs/controllers/UserMetadata.js.map +1 -0
- package/lib/{decorators.d.ts → cjs/decorators.d.ts} +0 -0
- package/lib/cjs/decorators.d.ts.map +1 -0
- package/lib/cjs/decorators.js +86 -0
- package/lib/cjs/decorators.js.map +1 -0
- package/lib/{dto → cjs/dto}/login-dto.d.ts +0 -0
- package/lib/cjs/dto/login-dto.d.ts.map +1 -0
- package/lib/cjs/dto/login-dto.js +33 -0
- package/lib/cjs/dto/login-dto.js.map +1 -0
- package/lib/{dto → cjs/dto}/password-dto.d.ts +0 -0
- package/lib/cjs/dto/password-dto.d.ts.map +1 -0
- package/lib/cjs/dto/password-dto.js +35 -0
- package/lib/cjs/dto/password-dto.js.map +1 -0
- package/lib/{dto → cjs/dto}/restore-password-dto.d.ts +0 -0
- package/lib/cjs/dto/restore-password-dto.d.ts.map +1 -0
- package/lib/cjs/dto/restore-password-dto.js +34 -0
- package/lib/cjs/dto/restore-password-dto.js.map +1 -0
- package/lib/{dto → cjs/dto}/token-dto.d.ts +0 -0
- package/lib/cjs/dto/token-dto.d.ts.map +1 -0
- package/lib/cjs/dto/token-dto.js +32 -0
- package/lib/cjs/dto/token-dto.js.map +1 -0
- package/lib/{dto → cjs/dto}/user-dto.d.ts +0 -0
- package/lib/cjs/dto/user-dto.d.ts.map +1 -0
- package/lib/cjs/dto/user-dto.js +33 -0
- package/lib/cjs/dto/user-dto.js.map +1 -0
- package/lib/{dto → cjs/dto}/userLogin-dto.d.ts +0 -0
- package/lib/cjs/dto/userLogin-dto.d.ts.map +1 -0
- package/lib/cjs/dto/userLogin-dto.js +34 -0
- package/lib/cjs/dto/userLogin-dto.js.map +1 -0
- package/lib/{events → cjs/events}/UserLoginFailed.d.ts +0 -0
- package/lib/cjs/events/UserLoginFailed.d.ts.map +1 -0
- package/lib/cjs/events/UserLoginFailed.js +25 -0
- package/lib/cjs/events/UserLoginFailed.js.map +1 -0
- package/lib/{events → cjs/events}/UserLoginSuccess.d.ts +0 -0
- package/lib/cjs/events/UserLoginSuccess.d.ts.map +1 -0
- package/lib/cjs/events/UserLoginSuccess.js +25 -0
- package/lib/cjs/events/UserLoginSuccess.js.map +1 -0
- package/lib/{events → cjs/events}/UserPassordRestore.d.ts +0 -0
- package/lib/cjs/events/UserPassordRestore.d.ts.map +1 -0
- package/lib/cjs/events/UserPassordRestore.js +26 -0
- package/lib/cjs/events/UserPassordRestore.js.map +1 -0
- package/lib/{fingerprint → cjs/fingerprint}/FingerprintJs.d.ts +0 -0
- package/lib/cjs/fingerprint/FingerprintJs.d.ts.map +1 -0
- package/lib/cjs/fingerprint/FingerprintJs.js +18 -0
- package/lib/cjs/fingerprint/FingerprintJs.js.map +1 -0
- package/lib/{index.d.ts → cjs/index.d.ts} +0 -0
- package/lib/cjs/index.d.ts.map +1 -0
- package/lib/cjs/index.js +25 -0
- package/lib/cjs/index.js.map +1 -0
- package/lib/{interfaces.d.ts → cjs/interfaces.d.ts} +0 -0
- package/lib/cjs/interfaces.d.ts.map +1 -0
- package/lib/cjs/interfaces.js +10 -0
- package/lib/cjs/interfaces.js.map +1 -0
- package/lib/{middlewares → cjs/middlewares}/AttributeFilter.d.ts +0 -0
- package/lib/cjs/middlewares/AttributeFilter.d.ts.map +1 -0
- package/lib/cjs/middlewares/AttributeFilter.js +19 -0
- package/lib/cjs/middlewares/AttributeFilter.js.map +1 -0
- package/lib/{middlewares.d.ts → cjs/middlewares.d.ts} +0 -0
- package/lib/cjs/middlewares.d.ts.map +1 -0
- package/lib/cjs/middlewares.js +90 -0
- package/lib/cjs/middlewares.js.map +1 -0
- package/lib/{policies → cjs/policies}/2FaPolicy.d.ts +0 -0
- package/lib/cjs/policies/2FaPolicy.d.ts.map +1 -0
- package/lib/cjs/policies/2FaPolicy.js +32 -0
- package/lib/cjs/policies/2FaPolicy.js.map +1 -0
- package/lib/{policies → cjs/policies}/LoggedPolicy.d.ts +0 -0
- package/lib/cjs/policies/LoggedPolicy.d.ts.map +1 -0
- package/lib/cjs/policies/LoggedPolicy.js +23 -0
- package/lib/cjs/policies/LoggedPolicy.js.map +1 -0
- package/lib/{policies → cjs/policies}/NotLoggedPolicy.d.ts +0 -0
- package/lib/cjs/policies/NotLoggedPolicy.d.ts.map +1 -0
- package/lib/cjs/policies/NotLoggedPolicy.js +22 -0
- package/lib/cjs/policies/NotLoggedPolicy.js.map +1 -0
- package/lib/{policies → cjs/policies}/RbacPolicy.d.ts +0 -0
- package/lib/cjs/policies/RbacPolicy.d.ts.map +1 -0
- package/lib/cjs/policies/RbacPolicy.js +59 -0
- package/lib/cjs/policies/RbacPolicy.js.map +1 -0
- package/lib/cjs/policies/captchaPolicy.d.ts +1 -0
- package/lib/cjs/policies/captchaPolicy.d.ts.map +1 -0
- package/lib/cjs/policies/captchaPolicy.js +1 -0
- package/lib/cjs/policies/captchaPolicy.js.map +1 -0
- package/lib/{route-args.d.ts → cjs/route-args.d.ts} +0 -0
- package/lib/cjs/route-args.d.ts.map +1 -0
- package/lib/cjs/route-args.js +36 -0
- package/lib/cjs/route-args.js.map +1 -0
- package/lib/{transformers.d.ts → cjs/transformers.d.ts} +0 -0
- package/lib/cjs/transformers.d.ts.map +1 -0
- package/lib/cjs/transformers.js +34 -0
- package/lib/cjs/transformers.js.map +1 -0
- package/lib/mjs/2fa/SpeakEasy2FaToken.d.ts +14 -0
- package/lib/mjs/2fa/SpeakEasy2FaToken.d.ts.map +1 -0
- package/lib/{2fa → mjs/2fa}/SpeakEasy2FaToken.js +0 -0
- package/lib/mjs/2fa/SpeakEasy2FaToken.js.map +1 -0
- package/lib/mjs/config/rbac-http.d.ts +30 -0
- package/lib/mjs/config/rbac-http.d.ts.map +1 -0
- package/lib/{config → mjs/config}/rbac-http.js +0 -0
- package/lib/mjs/config/rbac-http.js.map +1 -0
- package/lib/mjs/controllers/LoginController.d.ts +35 -0
- package/lib/mjs/controllers/LoginController.d.ts.map +1 -0
- package/lib/{controllers → mjs/controllers}/LoginController.js +0 -0
- package/lib/mjs/controllers/LoginController.js.map +1 -0
- package/lib/mjs/controllers/TwoFactorAuthController.d.ts +12 -0
- package/lib/mjs/controllers/TwoFactorAuthController.d.ts.map +1 -0
- package/lib/{controllers → mjs/controllers}/TwoFactorAuthController.js +0 -0
- package/lib/mjs/controllers/TwoFactorAuthController.js.map +1 -0
- package/lib/mjs/controllers/UserAdminController.d.ts +4 -0
- package/lib/mjs/controllers/UserAdminController.d.ts.map +1 -0
- package/lib/{controllers → mjs/controllers}/UserAdminController.js +0 -0
- package/lib/mjs/controllers/UserAdminController.js.map +1 -0
- package/lib/mjs/controllers/UserController.d.ts +11 -0
- package/lib/mjs/controllers/UserController.d.ts.map +1 -0
- package/lib/{controllers → mjs/controllers}/UserController.js +0 -0
- package/lib/mjs/controllers/UserController.js.map +1 -0
- package/lib/mjs/controllers/UserMetadata.d.ts +7 -0
- package/lib/mjs/controllers/UserMetadata.d.ts.map +1 -0
- package/lib/{controllers → mjs/controllers}/UserMetadata.js +0 -0
- package/lib/mjs/controllers/UserMetadata.js.map +1 -0
- package/lib/mjs/decorators.d.ts +26 -0
- package/lib/mjs/decorators.d.ts.map +1 -0
- package/lib/{decorators.js → mjs/decorators.js} +0 -0
- package/lib/mjs/decorators.js.map +1 -0
- package/lib/mjs/dto/login-dto.d.ts +17 -0
- package/lib/mjs/dto/login-dto.d.ts.map +1 -0
- package/lib/{dto → mjs/dto}/login-dto.js +0 -0
- package/lib/mjs/dto/login-dto.js.map +1 -0
- package/lib/mjs/dto/password-dto.d.ts +30 -0
- package/lib/mjs/dto/password-dto.d.ts.map +1 -0
- package/lib/{dto → mjs/dto}/password-dto.js +0 -0
- package/lib/mjs/dto/password-dto.js.map +1 -0
- package/lib/mjs/dto/restore-password-dto.d.ts +24 -0
- package/lib/mjs/dto/restore-password-dto.d.ts.map +1 -0
- package/lib/{dto → mjs/dto}/restore-password-dto.js +0 -0
- package/lib/mjs/dto/restore-password-dto.js.map +1 -0
- package/lib/mjs/dto/token-dto.d.ts +16 -0
- package/lib/mjs/dto/token-dto.d.ts.map +1 -0
- package/lib/{dto → mjs/dto}/token-dto.js +0 -0
- package/lib/mjs/dto/token-dto.js.map +1 -0
- package/lib/mjs/dto/user-dto.d.ts +22 -0
- package/lib/mjs/dto/user-dto.d.ts.map +1 -0
- package/lib/{dto → mjs/dto}/user-dto.js +0 -0
- package/lib/mjs/dto/user-dto.js.map +1 -0
- package/lib/mjs/dto/userLogin-dto.d.ts +22 -0
- package/lib/mjs/dto/userLogin-dto.d.ts.map +1 -0
- package/lib/{dto → mjs/dto}/userLogin-dto.js +0 -0
- package/lib/mjs/dto/userLogin-dto.js.map +1 -0
- package/lib/mjs/events/UserLoginFailed.d.ts +6 -0
- package/lib/mjs/events/UserLoginFailed.d.ts.map +1 -0
- package/lib/{events → mjs/events}/UserLoginFailed.js +0 -0
- package/lib/mjs/events/UserLoginFailed.js.map +1 -0
- package/lib/mjs/events/UserLoginSuccess.d.ts +6 -0
- package/lib/mjs/events/UserLoginSuccess.d.ts.map +1 -0
- package/lib/{events → mjs/events}/UserLoginSuccess.js +0 -0
- package/lib/mjs/events/UserLoginSuccess.js.map +1 -0
- package/lib/mjs/events/UserPassordRestore.d.ts +7 -0
- package/lib/mjs/events/UserPassordRestore.d.ts.map +1 -0
- package/lib/{events → mjs/events}/UserPassordRestore.js +0 -0
- package/lib/mjs/events/UserPassordRestore.js.map +1 -0
- package/lib/mjs/fingerprint/FingerprintJs.d.ts +4 -0
- package/lib/mjs/fingerprint/FingerprintJs.d.ts.map +1 -0
- package/lib/{fingerprint → mjs/fingerprint}/FingerprintJs.js +0 -0
- package/lib/mjs/fingerprint/FingerprintJs.js.map +1 -0
- package/lib/mjs/index.d.ts +9 -0
- package/lib/mjs/index.d.ts.map +1 -0
- package/lib/{index.js → mjs/index.js} +0 -0
- package/lib/mjs/index.js.map +1 -0
- package/lib/mjs/interfaces.d.ts +66 -0
- package/lib/mjs/interfaces.d.ts.map +1 -0
- package/lib/{interfaces.js → mjs/interfaces.js} +0 -0
- package/lib/mjs/interfaces.js.map +1 -0
- package/lib/mjs/middlewares/AttributeFilter.d.ts +11 -0
- package/lib/mjs/middlewares/AttributeFilter.d.ts.map +1 -0
- package/lib/{middlewares → mjs/middlewares}/AttributeFilter.js +0 -0
- package/lib/mjs/middlewares/AttributeFilter.js.map +1 -0
- package/lib/mjs/middlewares.d.ts +12 -0
- package/lib/mjs/middlewares.d.ts.map +1 -0
- package/lib/{middlewares.js → mjs/middlewares.js} +0 -0
- package/lib/mjs/middlewares.js.map +1 -0
- package/lib/mjs/policies/2FaPolicy.d.ts +8 -0
- package/lib/mjs/policies/2FaPolicy.d.ts.map +1 -0
- package/lib/{policies → mjs/policies}/2FaPolicy.js +0 -0
- package/lib/mjs/policies/2FaPolicy.js.map +1 -0
- package/lib/mjs/policies/LoggedPolicy.d.ts +10 -0
- package/lib/mjs/policies/LoggedPolicy.d.ts.map +1 -0
- package/lib/{policies → mjs/policies}/LoggedPolicy.js +0 -0
- package/lib/mjs/policies/LoggedPolicy.js.map +1 -0
- package/lib/mjs/policies/NotLoggedPolicy.d.ts +10 -0
- package/lib/mjs/policies/NotLoggedPolicy.d.ts.map +1 -0
- package/lib/{policies → mjs/policies}/NotLoggedPolicy.js +0 -0
- package/lib/mjs/policies/NotLoggedPolicy.js.map +1 -0
- package/lib/mjs/policies/RbacPolicy.d.ts +16 -0
- package/lib/mjs/policies/RbacPolicy.d.ts.map +1 -0
- package/lib/{policies → mjs/policies}/RbacPolicy.js +0 -0
- package/lib/mjs/policies/RbacPolicy.js.map +1 -0
- package/lib/{policies → mjs/policies}/captchaPolicy.d.ts +0 -0
- package/lib/mjs/policies/captchaPolicy.d.ts.map +1 -0
- package/lib/{policies → mjs/policies}/captchaPolicy.js +0 -0
- package/lib/mjs/policies/captchaPolicy.js.map +1 -0
- package/lib/mjs/route-args.d.ts +17 -0
- package/lib/mjs/route-args.d.ts.map +1 -0
- package/lib/{route-args.js → mjs/route-args.js} +0 -0
- package/lib/mjs/route-args.js.map +1 -0
- package/lib/mjs/transformers.d.ts +11 -0
- package/lib/mjs/transformers.d.ts.map +1 -0
- package/lib/{transformers.js → mjs/transformers.js} +0 -0
- package/lib/mjs/transformers.js.map +1 -0
- package/lib/tsconfig.cjs.tsbuildinfo +1 -0
- package/lib/tsconfig.tsbuildinfo +1 -0
- package/package.json +22 -13
- package/lib/2fa/SpeakEasy2FaToken.d.ts.map +0 -1
- package/lib/2fa/SpeakEasy2FaToken.js.map +0 -1
- package/lib/config/rbac-http.d.ts.map +0 -1
- package/lib/config/rbac-http.js.map +0 -1
- package/lib/controllers/LoginController.d.ts.map +0 -1
- package/lib/controllers/LoginController.js.map +0 -1
- package/lib/controllers/TwoFactorAuthController.d.ts.map +0 -1
- package/lib/controllers/TwoFactorAuthController.js.map +0 -1
- package/lib/controllers/UserAdminController.d.ts.map +0 -1
- package/lib/controllers/UserAdminController.js.map +0 -1
- package/lib/controllers/UserController.d.ts.map +0 -1
- package/lib/controllers/UserController.js.map +0 -1
- package/lib/controllers/UserMetadata.d.ts.map +0 -1
- package/lib/controllers/UserMetadata.js.map +0 -1
- package/lib/decorators.d.ts.map +0 -1
- package/lib/decorators.js.map +0 -1
- package/lib/dto/login-dto.d.ts.map +0 -1
- package/lib/dto/login-dto.js.map +0 -1
- package/lib/dto/password-dto.d.ts.map +0 -1
- package/lib/dto/password-dto.js.map +0 -1
- package/lib/dto/restore-password-dto.d.ts.map +0 -1
- package/lib/dto/restore-password-dto.js.map +0 -1
- package/lib/dto/token-dto.d.ts.map +0 -1
- package/lib/dto/token-dto.js.map +0 -1
- package/lib/dto/user-dto.d.ts.map +0 -1
- package/lib/dto/user-dto.js.map +0 -1
- package/lib/dto/userLogin-dto.d.ts.map +0 -1
- package/lib/dto/userLogin-dto.js.map +0 -1
- package/lib/events/UserLoginFailed.d.ts.map +0 -1
- package/lib/events/UserLoginFailed.js.map +0 -1
- package/lib/events/UserLoginSuccess.d.ts.map +0 -1
- package/lib/events/UserLoginSuccess.js.map +0 -1
- package/lib/events/UserPassordRestore.d.ts.map +0 -1
- package/lib/events/UserPassordRestore.js.map +0 -1
- package/lib/fingerprint/FingerprintJs.d.ts.map +0 -1
- package/lib/fingerprint/FingerprintJs.js.map +0 -1
- package/lib/index.d.ts.map +0 -1
- package/lib/index.js.map +0 -1
- package/lib/interfaces.d.ts.map +0 -1
- package/lib/interfaces.js.map +0 -1
- package/lib/middlewares/AttributeFilter.d.ts.map +0 -1
- package/lib/middlewares/AttributeFilter.js.map +0 -1
- package/lib/middlewares.d.ts.map +0 -1
- package/lib/middlewares.js.map +0 -1
- package/lib/policies/2FaPolicy.d.ts.map +0 -1
- package/lib/policies/2FaPolicy.js.map +0 -1
- package/lib/policies/LoggedPolicy.d.ts.map +0 -1
- package/lib/policies/LoggedPolicy.js.map +0 -1
- package/lib/policies/NotLoggedPolicy.d.ts.map +0 -1
- package/lib/policies/NotLoggedPolicy.js.map +0 -1
- package/lib/policies/RbacPolicy.d.ts.map +0 -1
- package/lib/policies/RbacPolicy.js.map +0 -1
- package/lib/policies/captchaPolicy.d.ts.map +0 -1
- package/lib/policies/captchaPolicy.js.map +0 -1
- package/lib/route-args.d.ts.map +0 -1
- package/lib/route-args.js.map +0 -1
- package/lib/transformers.d.ts.map +0 -1
- package/lib/transformers.js.map +0 -1
|
File without changes
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"SpeakEasy2FaToken.d.ts","sourceRoot":"","sources":["../../../src/2fa/SpeakEasy2FaToken.ts"],"names":[],"mappings":"AACA,OAAO,EAAE,qBAAqB,EAAE,MAAM,kBAAkB,CAAC;AAEzD,OAAO,EAAE,IAAI,EAAE,MAAM,eAAe,CAAC;AAErC,OAAO,EAAE,GAAG,EAAU,MAAM,cAAc,CAAC;AAE3C,qBACa,iBAAkB,SAAQ,qBAAqB;IAE1D,SAAS,CAAC,MAAM,EAAE,GAAG,CAAC;IAGtB,SAAS,CAAC,GAAG,EAAE,GAAG,CAAC;;IAMZ,OAAO,CAAC,CAAC,EAAE,IAAI,GAAG,OAAO,CAAC,IAAI,CAAC;IAMzB,WAAW,CAAC,KAAK,EAAE,MAAM,EAAE,IAAI,EAAE,IAAI,GAAG,OAAO,CAAC,OAAO,CAAC;IAmBxD,UAAU,CAAC,IAAI,EAAE,IAAI,GAAG,OAAO,CAAC,GAAG,CAAC;IAMpC,SAAS,CAAC,IAAI,EAAE,IAAI,GAAG,OAAO,CAAC,OAAO,CAAC;IAKvC,aAAa,CAAC,IAAI,EAAE,IAAI,GAAG,OAAO,CAAC,OAAO,CAAC;CAIzD"}
|
|
@@ -0,0 +1,91 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
3
|
+
if (k2 === undefined) k2 = k;
|
|
4
|
+
var desc = Object.getOwnPropertyDescriptor(m, k);
|
|
5
|
+
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
|
|
6
|
+
desc = { enumerable: true, get: function() { return m[k]; } };
|
|
7
|
+
}
|
|
8
|
+
Object.defineProperty(o, k2, desc);
|
|
9
|
+
}) : (function(o, m, k, k2) {
|
|
10
|
+
if (k2 === undefined) k2 = k;
|
|
11
|
+
o[k2] = m[k];
|
|
12
|
+
}));
|
|
13
|
+
var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
|
|
14
|
+
Object.defineProperty(o, "default", { enumerable: true, value: v });
|
|
15
|
+
}) : function(o, v) {
|
|
16
|
+
o["default"] = v;
|
|
17
|
+
});
|
|
18
|
+
var __decorate = (this && this.__decorate) || function (decorators, target, key, desc) {
|
|
19
|
+
var c = arguments.length, r = c < 3 ? target : desc === null ? desc = Object.getOwnPropertyDescriptor(target, key) : desc, d;
|
|
20
|
+
if (typeof Reflect === "object" && typeof Reflect.decorate === "function") r = Reflect.decorate(decorators, target, key, desc);
|
|
21
|
+
else for (var i = decorators.length - 1; i >= 0; i--) if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;
|
|
22
|
+
return c > 3 && r && Object.defineProperty(target, key, r), r;
|
|
23
|
+
};
|
|
24
|
+
var __importStar = (this && this.__importStar) || function (mod) {
|
|
25
|
+
if (mod && mod.__esModule) return mod;
|
|
26
|
+
var result = {};
|
|
27
|
+
if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
|
|
28
|
+
__setModuleDefault(result, mod);
|
|
29
|
+
return result;
|
|
30
|
+
};
|
|
31
|
+
var __metadata = (this && this.__metadata) || function (k, v) {
|
|
32
|
+
if (typeof Reflect === "object" && typeof Reflect.metadata === "function") return Reflect.metadata(k, v);
|
|
33
|
+
};
|
|
34
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
35
|
+
exports.SpeakEasy2FaToken = void 0;
|
|
36
|
+
const di_1 = require("@spinajs/di");
|
|
37
|
+
const interfaces_js_1 = require("../interfaces.js");
|
|
38
|
+
const speakeasy = __importStar(require("speakeasy"));
|
|
39
|
+
const configuration_1 = require("@spinajs/configuration");
|
|
40
|
+
const log_1 = require("@spinajs/log");
|
|
41
|
+
let SpeakEasy2FaToken = class SpeakEasy2FaToken extends interfaces_js_1.TwoFactorAuthProvider {
|
|
42
|
+
constructor() {
|
|
43
|
+
super();
|
|
44
|
+
}
|
|
45
|
+
execute(_) {
|
|
46
|
+
// empty, speakasy works offline eg. google authenticator
|
|
47
|
+
// we dont send any email or sms
|
|
48
|
+
return Promise.resolve();
|
|
49
|
+
}
|
|
50
|
+
async verifyToken(token, user) {
|
|
51
|
+
const meta = user.Metadata.find((x) => x.Key === '2fa_speakeasy_token');
|
|
52
|
+
if (!meta || meta.Value === '') {
|
|
53
|
+
this.Log.trace(`Cannot verify 2fa token, no 2fa token for user ${user.Id}`);
|
|
54
|
+
return false;
|
|
55
|
+
}
|
|
56
|
+
const verified = speakeasy.totp.verify({
|
|
57
|
+
secret: meta.Value,
|
|
58
|
+
encoding: 'base32',
|
|
59
|
+
token,
|
|
60
|
+
window: 5,
|
|
61
|
+
});
|
|
62
|
+
return verified;
|
|
63
|
+
}
|
|
64
|
+
async initialize(user) {
|
|
65
|
+
const secret = speakeasy.generateSecret(this.Config);
|
|
66
|
+
await (user.Metadata['2fa_speakeasy_token'] = secret.base32);
|
|
67
|
+
return secret.base32;
|
|
68
|
+
}
|
|
69
|
+
async isEnabled(user) {
|
|
70
|
+
const val = await user.Metadata['2fa_enabled'];
|
|
71
|
+
return val;
|
|
72
|
+
}
|
|
73
|
+
async isInitialized(user) {
|
|
74
|
+
const val = await user.Metadata['2fa_speakeasy_token'];
|
|
75
|
+
return val !== '';
|
|
76
|
+
}
|
|
77
|
+
};
|
|
78
|
+
__decorate([
|
|
79
|
+
(0, configuration_1.Config)('rbac.speakeasy'),
|
|
80
|
+
__metadata("design:type", Object)
|
|
81
|
+
], SpeakEasy2FaToken.prototype, "Config", void 0);
|
|
82
|
+
__decorate([
|
|
83
|
+
(0, log_1.Logger)('SPEAKEASY_2FA_TOKEN'),
|
|
84
|
+
__metadata("design:type", log_1.Log)
|
|
85
|
+
], SpeakEasy2FaToken.prototype, "Log", void 0);
|
|
86
|
+
SpeakEasy2FaToken = __decorate([
|
|
87
|
+
(0, di_1.Injectable)(interfaces_js_1.TwoFactorAuthProvider),
|
|
88
|
+
__metadata("design:paramtypes", [])
|
|
89
|
+
], SpeakEasy2FaToken);
|
|
90
|
+
exports.SpeakEasy2FaToken = SpeakEasy2FaToken;
|
|
91
|
+
//# sourceMappingURL=SpeakEasy2FaToken.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"SpeakEasy2FaToken.js","sourceRoot":"","sources":["../../../src/2fa/SpeakEasy2FaToken.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA,oCAAyC;AACzC,oDAAyD;AACzD,qDAAuC;AAEvC,0DAAgD;AAChD,sCAA2C;AAGpC,IAAM,iBAAiB,GAAvB,MAAM,iBAAkB,SAAQ,qCAAqB;IAO1D;QACE,KAAK,EAAE,CAAC;IACV,CAAC;IAEM,OAAO,CAAC,CAAO;QACpB,yDAAyD;QACzD,gCAAgC;QAChC,OAAO,OAAO,CAAC,OAAO,EAAE,CAAC;IAC3B,CAAC;IAEM,KAAK,CAAC,WAAW,CAAC,KAAa,EAAE,IAAU;QAChD,MAAM,IAAI,GAAG,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,GAAG,KAAK,qBAAqB,CAAC,CAAC;QAExE,IAAI,CAAC,IAAI,IAAI,IAAI,CAAC,KAAK,KAAK,EAAE,EAAE;YAC9B,IAAI,CAAC,GAAG,CAAC,KAAK,CAAC,kDAAkD,IAAI,CAAC,EAAE,EAAE,CAAC,CAAC;YAE5E,OAAO,KAAK,CAAC;SACd;QAED,MAAM,QAAQ,GAAG,SAAS,CAAC,IAAI,CAAC,MAAM,CAAC;YACrC,MAAM,EAAE,IAAI,CAAC,KAAK;YAClB,QAAQ,EAAE,QAAQ;YAClB,KAAK;YACL,MAAM,EAAE,CAAC;SACV,CAAC,CAAC;QAEH,OAAO,QAAQ,CAAC;IAClB,CAAC;IAEM,KAAK,CAAC,UAAU,CAAC,IAAU;QAChC,MAAM,MAAM,GAAG,SAAS,CAAC,cAAc,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;QACrD,MAAM,CAAC,IAAI,CAAC,QAAQ,CAAC,qBAAqB,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,CAAC;QAC7D,OAAO,MAAM,CAAC,MAAM,CAAC;IACvB,CAAC;IAEM,KAAK,CAAC,SAAS,CAAC,IAAU;QAC/B,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC,aAAa,CAAC,CAAC;QAC/C,OAAO,GAAc,CAAC;IACxB,CAAC;IAEM,KAAK,CAAC,aAAa,CAAC,IAAU;QACnC,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC,qBAAqB,CAAC,CAAC;QACvD,OAAO,GAAG,KAAK,EAAE,CAAC;IACpB,CAAC;CACF,CAAA;AAlDC;IAAC,IAAA,sBAAM,EAAC,gBAAgB,CAAC;;iDACH;AAEtB;IAAC,IAAA,YAAM,EAAC,qBAAqB,CAAC;8BACf,SAAG;8CAAC;AALR,iBAAiB;IAD7B,IAAA,eAAU,EAAC,qCAAqB,CAAC;;GACrB,iBAAiB,CAmD7B;AAnDY,8CAAiB"}
|
|
File without changes
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"rbac-http.d.ts","sourceRoot":"","sources":["../../../src/config/rbac-http.ts"],"names":[],"mappings":"AAKA,QAAA,MAAM,QAAQ;;;;;;;;;;;;;;;;;;;;YAsBR;;eAEG;;;;;CASR,CAAC;AAEF,eAAe,QAAQ,CAAC"}
|
|
@@ -0,0 +1,41 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
const path_1 = require("path");
|
|
4
|
+
function dir(path) {
|
|
5
|
+
return (0, path_1.resolve)((0, path_1.normalize)((0, path_1.join)(process.cwd(), path)));
|
|
6
|
+
}
|
|
7
|
+
const rbacHttp = {
|
|
8
|
+
system: {
|
|
9
|
+
dirs: {
|
|
10
|
+
controllers: [dir('./../controllers')],
|
|
11
|
+
locales: [dir('./../locales')],
|
|
12
|
+
views: [dir('./../views')],
|
|
13
|
+
},
|
|
14
|
+
},
|
|
15
|
+
rbac: {
|
|
16
|
+
twoFactorAuth: {
|
|
17
|
+
enabled: true,
|
|
18
|
+
service: 'SpeakEasy2FaToken',
|
|
19
|
+
},
|
|
20
|
+
fingerprint: {
|
|
21
|
+
enabled: false,
|
|
22
|
+
maxDevices: 3,
|
|
23
|
+
service: 'FingerprintJs',
|
|
24
|
+
},
|
|
25
|
+
password: {
|
|
26
|
+
// password reset token ttl in minutes
|
|
27
|
+
tokenTTL: 60,
|
|
28
|
+
/**
|
|
29
|
+
* Block account after invalid login attempts
|
|
30
|
+
*/
|
|
31
|
+
blockAfterAttempts: 3,
|
|
32
|
+
},
|
|
33
|
+
},
|
|
34
|
+
http: {
|
|
35
|
+
// middlewares: [
|
|
36
|
+
// // add global user from session middleware
|
|
37
|
+
// ],
|
|
38
|
+
},
|
|
39
|
+
};
|
|
40
|
+
exports.default = rbacHttp;
|
|
41
|
+
//# sourceMappingURL=rbac-http.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"rbac-http.js","sourceRoot":"","sources":["../../../src/config/rbac-http.ts"],"names":[],"mappings":";;AAAA,+BAAgD;AAEhD,SAAS,GAAG,CAAC,IAAY;IACvB,OAAO,IAAA,cAAO,EAAC,IAAA,gBAAS,EAAC,IAAA,WAAI,EAAC,OAAO,CAAC,GAAG,EAAE,EAAE,IAAI,CAAC,CAAC,CAAC,CAAC;AACvD,CAAC;AACD,MAAM,QAAQ,GAAG;IACf,MAAM,EAAE;QACN,IAAI,EAAE;YACJ,WAAW,EAAE,CAAC,GAAG,CAAC,kBAAkB,CAAC,CAAC;YACtC,OAAO,EAAE,CAAC,GAAG,CAAC,cAAc,CAAC,CAAC;YAC9B,KAAK,EAAE,CAAC,GAAG,CAAC,YAAY,CAAC,CAAC;SAC3B;KACF;IACD,IAAI,EAAE;QACJ,aAAa,EAAE;YACb,OAAO,EAAE,IAAI;YACb,OAAO,EAAE,mBAAmB;SAC7B;QACD,WAAW,EAAE;YACX,OAAO,EAAE,KAAK;YACd,UAAU,EAAE,CAAC;YACb,OAAO,EAAE,eAAe;SACzB;QACD,QAAQ,EAAE;YACR,sCAAsC;YACtC,QAAQ,EAAE,EAAE;YAEZ;;eAEG;YACH,kBAAkB,EAAE,CAAC;SACtB;KACF;IACD,IAAI,EAAE;IACJ,iBAAiB;IACjB,+CAA+C;IAC/C,KAAK;KACN;CACF,CAAC;AAEF,kBAAe,QAAQ,CAAC"}
|
|
File without changes
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"LoginController.d.ts","sourceRoot":"","sources":["../../../src/controllers/LoginController.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,gBAAgB,EAAE,MAAM,qBAAqB,CAAC;AACvD,OAAO,EAAE,YAAY,EAAE,MAAM,yBAAyB,CAAC;AACvD,OAAO,EAAE,cAAc,EAAwB,EAAE,EAAe,cAAc,EAAE,YAAY,EAAyB,UAAU,EAAE,QAAQ,EAAE,MAAM,eAAe,CAAC;AACjK,OAAO,EAAE,YAAY,EAAE,qBAAqB,EAAE,gBAAgB,EAAE,0BAA0B,EAAW,eAAe,EAAQ,IAAI,IAAI,SAAS,EAAqC,MAAM,eAAe,CAAC;AAExM,OAAO,EAA6B,aAAa,EAAE,MAAM,wBAAwB,CAAC;AAElF,OAAO,EAAE,mBAAmB,EAAE,qBAAqB,EAAE,MAAM,kBAAkB,CAAC;AAC9E,OAAO,EAAE,WAAW,EAAE,MAAM,gBAAgB,CAAC;AAK7C,OAAO,EAAE,kBAAkB,EAAE,MAAM,gCAAgC,CAAC;AAOpE,qBACa,eAAgB,SAAQ,cAAc;IAEjD,SAAS,CAAC,aAAa,EAAE,aAAa,CAAC;IAGvC,SAAS,CAAC,YAAY,EAAE,YAAY,CAAC;IAGrC,SAAS,CAAC,eAAe,EAAE,eAAe,CAAC;IAK3C,SAAS,CAAC,qBAAqB,EAAE,MAAM,CAAC;IAGxC,SAAS,CAAC,qBAAqB,EAAE,MAAM,CAAC;IAGxC,SAAS,CAAC,qBAAqB,EAAE,qBAAqB,CAAC;IAGvD,SAAS,CAAC,mBAAmB,EAAE,mBAAmB,CAAC;IAGnD,SAAS,CAAC,yBAAyB,EAAE,0BAA0B,CAAC;IAGhE,SAAS,CAAC,wBAAwB,EAAE,qBAAqB,CAAC,GAAG,CAAC,EAAE,CAAC;IAGjE,SAAS,CAAC,gBAAgB,EAAE,gBAAgB,CAAC;IAG7C,SAAS,CAAC,KAAK,EAAE,WAAW,CAAC;IAIhB,cAAc,CAAS,WAAW,EAAE,OAAO,EAAkB,MAAM,EAAE,MAAM;IAexF;;;;;OAKG;IAGU,kBAAkB;IAMlB,KAAK,CAAS,WAAW,EAAE,YAAY;IAavC,cAAc,CAAU,KAAK,EAAE,MAAM,EAAU,GAAG,EAAE,kBAAkB;IA0EtE,cAAc,CAAS,KAAK,EAAE,YAAY;IAgC1C,MAAM,CAAW,IAAI,EAAE,MAAM;cAW1B,YAAY,CAAC,IAAI,EAAE,SAAS,EAAE,SAAS,CAAC,EAAE,OAAO;CAoFlE"}
|
|
@@ -0,0 +1,307 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __decorate = (this && this.__decorate) || function (decorators, target, key, desc) {
|
|
3
|
+
var c = arguments.length, r = c < 3 ? target : desc === null ? desc = Object.getOwnPropertyDescriptor(target, key) : desc, d;
|
|
4
|
+
if (typeof Reflect === "object" && typeof Reflect.decorate === "function") r = Reflect.decorate(decorators, target, key, desc);
|
|
5
|
+
else for (var i = decorators.length - 1; i >= 0; i--) if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;
|
|
6
|
+
return c > 3 && r && Object.defineProperty(target, key, r), r;
|
|
7
|
+
};
|
|
8
|
+
var __metadata = (this && this.__metadata) || function (k, v) {
|
|
9
|
+
if (typeof Reflect === "object" && typeof Reflect.metadata === "function") return Reflect.metadata(k, v);
|
|
10
|
+
};
|
|
11
|
+
var __param = (this && this.__param) || function (paramIndex, decorator) {
|
|
12
|
+
return function (target, key) { decorator(target, key, paramIndex); }
|
|
13
|
+
};
|
|
14
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
15
|
+
exports.LoginController = void 0;
|
|
16
|
+
const exceptions_1 = require("@spinajs/exceptions");
|
|
17
|
+
const userLogin_dto_js_1 = require("../dto/userLogin-dto.js");
|
|
18
|
+
const http_1 = require("@spinajs/http");
|
|
19
|
+
const rbac_1 = require("@spinajs/rbac");
|
|
20
|
+
const di_1 = require("@spinajs/di");
|
|
21
|
+
const configuration_1 = require("@spinajs/configuration");
|
|
22
|
+
const interfaces_js_1 = require("../interfaces.js");
|
|
23
|
+
const queue_1 = require("@spinajs/queue");
|
|
24
|
+
const NotLoggedPolicy_js_1 = require("../policies/NotLoggedPolicy.js");
|
|
25
|
+
const LoggedPolicy_js_1 = require("../policies/LoggedPolicy.js");
|
|
26
|
+
const UserPassordRestore_js_1 = require("../events/UserPassordRestore.js");
|
|
27
|
+
const restore_password_dto_js_1 = require("../dto/restore-password-dto.js");
|
|
28
|
+
const uuid_1 = require("uuid");
|
|
29
|
+
const luxon_1 = require("luxon");
|
|
30
|
+
const rbac_2 = require("@spinajs/rbac");
|
|
31
|
+
const UserLoginSuccess_js_1 = require("../events/UserLoginSuccess.js");
|
|
32
|
+
let LoginController = class LoginController extends http_1.BaseController {
|
|
33
|
+
async loginFederated(credentials, caller) {
|
|
34
|
+
const strategy = this.FederatedLoginStrategies.find((x) => x.callerCheck(caller));
|
|
35
|
+
if (!strategy) {
|
|
36
|
+
throw new exceptions_1.InvalidOperation(`No auth stragegy registered for caller ${caller}`);
|
|
37
|
+
}
|
|
38
|
+
const result = await strategy.authenticate(credentials);
|
|
39
|
+
if (!result.Error) {
|
|
40
|
+
// proceed with standard authentication
|
|
41
|
+
return await this.authenticate(result.User);
|
|
42
|
+
}
|
|
43
|
+
return new http_1.Unauthorized(result.Error);
|
|
44
|
+
}
|
|
45
|
+
/**
|
|
46
|
+
*
|
|
47
|
+
* Api call for listing avaible federated login strategies
|
|
48
|
+
*
|
|
49
|
+
* @returns response with avaible login strategies
|
|
50
|
+
*/
|
|
51
|
+
async federatedLoginList() {
|
|
52
|
+
return new http_1.Ok(this.FederatedLoginStrategies.map((x) => x.Name));
|
|
53
|
+
}
|
|
54
|
+
async login(credentials) {
|
|
55
|
+
const result = await this.AuthProvider.authenticate(credentials.Email, credentials.Password);
|
|
56
|
+
if (!result.Error) {
|
|
57
|
+
// proceed with standard authentication
|
|
58
|
+
return await this.authenticate(result.User);
|
|
59
|
+
}
|
|
60
|
+
return new http_1.Unauthorized(result.Error);
|
|
61
|
+
}
|
|
62
|
+
async setNewPassword(token, pwd) {
|
|
63
|
+
const user = await rbac_1.User.query()
|
|
64
|
+
.innerJoin(rbac_1.UserMetadata, function () {
|
|
65
|
+
this.where({
|
|
66
|
+
Key: 'password:reset:token',
|
|
67
|
+
Value: token,
|
|
68
|
+
});
|
|
69
|
+
})
|
|
70
|
+
.populate('Metadata')
|
|
71
|
+
.first();
|
|
72
|
+
if (!user) {
|
|
73
|
+
return new http_1.NotFound({
|
|
74
|
+
error: {
|
|
75
|
+
code: 'ERR_USER_NOT_FOUND',
|
|
76
|
+
message: 'No user found for this reset token',
|
|
77
|
+
},
|
|
78
|
+
});
|
|
79
|
+
}
|
|
80
|
+
const val = (await user.Metadata['password:reset:start']);
|
|
81
|
+
const now = luxon_1.DateTime.now().plus({ seconds: -this.PasswordResetTokenTTL });
|
|
82
|
+
if (val < now) {
|
|
83
|
+
return new http_1.BadRequest({
|
|
84
|
+
error: {
|
|
85
|
+
code: 'ERR_RESET_TOKEN_EXPIRED',
|
|
86
|
+
message: 'Password reset token expired',
|
|
87
|
+
},
|
|
88
|
+
});
|
|
89
|
+
}
|
|
90
|
+
if (!this.PasswordValidationService.check(pwd.Password)) {
|
|
91
|
+
return new http_1.BadRequest({
|
|
92
|
+
error: {
|
|
93
|
+
code: 'ERR_PASSWORD_RULE',
|
|
94
|
+
message: 'Invalid password, does not match password rules',
|
|
95
|
+
},
|
|
96
|
+
});
|
|
97
|
+
}
|
|
98
|
+
if (pwd.Password !== pwd.ConfirmPassword) {
|
|
99
|
+
return new http_1.BadRequest({
|
|
100
|
+
error: {
|
|
101
|
+
code: 'ERR_PASSWORD_NOT_MATCH',
|
|
102
|
+
message: 'Password and repeat password does not match',
|
|
103
|
+
},
|
|
104
|
+
});
|
|
105
|
+
}
|
|
106
|
+
const hashedPassword = await this.PasswordProvider.hash(pwd.Password);
|
|
107
|
+
user.Password = hashedPassword;
|
|
108
|
+
await user.update();
|
|
109
|
+
/**
|
|
110
|
+
* Delete all reset related meta for user
|
|
111
|
+
*/
|
|
112
|
+
await user.Metadata.delete(/password:reset.*/);
|
|
113
|
+
// add to action list
|
|
114
|
+
await user.Actions.add(new rbac_2.UserAction({
|
|
115
|
+
Persistent: true,
|
|
116
|
+
Action: 'password:reset',
|
|
117
|
+
}));
|
|
118
|
+
// inform others
|
|
119
|
+
await this.Queue.emit(new rbac_1.UserPasswordChanged(user.Uuid));
|
|
120
|
+
}
|
|
121
|
+
async forgotPassword(login) {
|
|
122
|
+
const user = await this.AuthProvider.getByEmail(login.Email);
|
|
123
|
+
if (!user.IsActive || user.IsBanned || user.DeletedAt !== null) {
|
|
124
|
+
return new exceptions_1.InvalidOperation('User is inactive, banned or deleted. Contact system administrator');
|
|
125
|
+
}
|
|
126
|
+
const token = (0, uuid_1.v4)();
|
|
127
|
+
// assign meta to user
|
|
128
|
+
await (user.Metadata['password:reset'] = true);
|
|
129
|
+
await (user.Metadata['password:reset:token'] = token);
|
|
130
|
+
await (user.Metadata['password:reset:start'] = luxon_1.DateTime.now());
|
|
131
|
+
await user.Actions.add(new rbac_2.UserAction({
|
|
132
|
+
Action: 'user:password:reset',
|
|
133
|
+
Data: luxon_1.DateTime.now().toISO(),
|
|
134
|
+
Persistent: true,
|
|
135
|
+
}));
|
|
136
|
+
await this.Queue.emit(new UserPassordRestore_js_1.UserPasswordRestore(user.Uuid, token));
|
|
137
|
+
return new http_1.Ok({
|
|
138
|
+
reset_token: token,
|
|
139
|
+
ttl: this.PasswordResetTokenTTL,
|
|
140
|
+
});
|
|
141
|
+
}
|
|
142
|
+
async logout(ssid) {
|
|
143
|
+
if (!ssid) {
|
|
144
|
+
return new http_1.Ok();
|
|
145
|
+
}
|
|
146
|
+
await this.SessionProvider.delete(ssid);
|
|
147
|
+
// send empty cookie to confirm session deletion
|
|
148
|
+
return new http_1.CookieResponse('ssid', null, this.SessionExpirationTime);
|
|
149
|
+
}
|
|
150
|
+
async authenticate(user, federated) {
|
|
151
|
+
if (!user) {
|
|
152
|
+
return new http_1.Unauthorized({
|
|
153
|
+
error: {
|
|
154
|
+
message: 'login or password incorrect',
|
|
155
|
+
},
|
|
156
|
+
});
|
|
157
|
+
}
|
|
158
|
+
await user.Metadata.populate();
|
|
159
|
+
const session = new rbac_1.Session();
|
|
160
|
+
const dUser = user.dehydrate();
|
|
161
|
+
session.Data.set('User', dUser);
|
|
162
|
+
// we found user but we still dont know if is authorized
|
|
163
|
+
// eg. 2fa auth is not performed
|
|
164
|
+
// create session, but user is not yet authorized
|
|
165
|
+
session.Data.set('Authorized', false);
|
|
166
|
+
// if its federated login, skip 2fa - assume
|
|
167
|
+
// external login service provided it
|
|
168
|
+
if (this.TwoFactorConfig.enabled || !federated) {
|
|
169
|
+
await this.SessionProvider.save(session);
|
|
170
|
+
const enabledForUser = await this.TwoFactorAuthProvider.isEnabled(user);
|
|
171
|
+
/**
|
|
172
|
+
* if 2fa is enabled for user, proceed
|
|
173
|
+
*/
|
|
174
|
+
if (enabledForUser) {
|
|
175
|
+
/**
|
|
176
|
+
* check if 2fa system is initialized for user eg. private key is generated.
|
|
177
|
+
*/
|
|
178
|
+
const isInitialized = await this.TwoFactorAuthProvider.isInitialized(user);
|
|
179
|
+
if (!isInitialized) {
|
|
180
|
+
const twoFaResult = await this.TwoFactorAuthProvider.initialize(user);
|
|
181
|
+
return new http_1.CookieResponse('ssid', session.SessionId, this.SessionExpirationTime, true, {
|
|
182
|
+
toFactorAuth: true,
|
|
183
|
+
twoFactorAuthFirstTime: true,
|
|
184
|
+
method: this.TwoFactorConfig.service,
|
|
185
|
+
data: twoFaResult,
|
|
186
|
+
}, { httpOnly: true });
|
|
187
|
+
}
|
|
188
|
+
// give chance to execute 2fa eg. send sms or email
|
|
189
|
+
await this.TwoFactorAuthProvider.execute(user);
|
|
190
|
+
// return session to identify user
|
|
191
|
+
// and only info that twoFactor auth is requested
|
|
192
|
+
return new http_1.CookieResponse('ssid', session.SessionId, this.SessionExpirationTime, true, {
|
|
193
|
+
toFactorAuth: true,
|
|
194
|
+
}, { httpOnly: true });
|
|
195
|
+
}
|
|
196
|
+
}
|
|
197
|
+
// 2fa is not enabled, so we found user, it means it is logged
|
|
198
|
+
session.Data.set('Authorized', true);
|
|
199
|
+
await this.SessionProvider.save(session);
|
|
200
|
+
await this.Queue.emit(new UserLoginSuccess_js_1.UserLoginSuccess(user.Uuid));
|
|
201
|
+
user.LastLoginAt = luxon_1.DateTime.now();
|
|
202
|
+
await user.update();
|
|
203
|
+
// BEWARE: httpOnly coockie, only accesible via http method in browser
|
|
204
|
+
// return coockie session id with additional user data
|
|
205
|
+
return new http_1.CookieResponse('ssid', session.SessionId, this.SessionExpirationTime, true, dUser, { httpOnly: true });
|
|
206
|
+
}
|
|
207
|
+
};
|
|
208
|
+
__decorate([
|
|
209
|
+
(0, di_1.Autoinject)(),
|
|
210
|
+
__metadata("design:type", configuration_1.Configuration)
|
|
211
|
+
], LoginController.prototype, "Configuration", void 0);
|
|
212
|
+
__decorate([
|
|
213
|
+
(0, configuration_1.AutoinjectService)('rbac.auth'),
|
|
214
|
+
__metadata("design:type", rbac_1.AuthProvider)
|
|
215
|
+
], LoginController.prototype, "AuthProvider", void 0);
|
|
216
|
+
__decorate([
|
|
217
|
+
(0, configuration_1.AutoinjectService)('rbac.session'),
|
|
218
|
+
__metadata("design:type", rbac_1.SessionProvider)
|
|
219
|
+
], LoginController.prototype, "SessionProvider", void 0);
|
|
220
|
+
__decorate([
|
|
221
|
+
(0, configuration_1.Config)('rbac.session.expiration', {
|
|
222
|
+
defaultValue: 120,
|
|
223
|
+
}),
|
|
224
|
+
__metadata("design:type", Number)
|
|
225
|
+
], LoginController.prototype, "SessionExpirationTime", void 0);
|
|
226
|
+
__decorate([
|
|
227
|
+
(0, configuration_1.Config)('rbac.password_reset.ttl'),
|
|
228
|
+
__metadata("design:type", Number)
|
|
229
|
+
], LoginController.prototype, "PasswordResetTokenTTL", void 0);
|
|
230
|
+
__decorate([
|
|
231
|
+
(0, configuration_1.AutoinjectService)('rbac.twoFactorAuth'),
|
|
232
|
+
__metadata("design:type", interfaces_js_1.TwoFactorAuthProvider)
|
|
233
|
+
], LoginController.prototype, "TwoFactorAuthProvider", void 0);
|
|
234
|
+
__decorate([
|
|
235
|
+
(0, configuration_1.AutoinjectService)('rbac.fingerprint.provider'),
|
|
236
|
+
__metadata("design:type", interfaces_js_1.FingerprintProvider)
|
|
237
|
+
], LoginController.prototype, "FingerprintProvider", void 0);
|
|
238
|
+
__decorate([
|
|
239
|
+
(0, configuration_1.AutoinjectService)('rbac.password.validation'),
|
|
240
|
+
__metadata("design:type", rbac_1.PasswordValidationProvider)
|
|
241
|
+
], LoginController.prototype, "PasswordValidationService", void 0);
|
|
242
|
+
__decorate([
|
|
243
|
+
(0, di_1.Autoinject)(rbac_1.FederatedAuthProvider),
|
|
244
|
+
__metadata("design:type", Array)
|
|
245
|
+
], LoginController.prototype, "FederatedLoginStrategies", void 0);
|
|
246
|
+
__decorate([
|
|
247
|
+
(0, di_1.Autoinject)(),
|
|
248
|
+
__metadata("design:type", rbac_1.PasswordProvider)
|
|
249
|
+
], LoginController.prototype, "PasswordProvider", void 0);
|
|
250
|
+
__decorate([
|
|
251
|
+
(0, di_1.Autoinject)(queue_1.QueueClient),
|
|
252
|
+
__metadata("design:type", queue_1.QueueClient)
|
|
253
|
+
], LoginController.prototype, "Queue", void 0);
|
|
254
|
+
__decorate([
|
|
255
|
+
(0, http_1.Post)('federated-login'),
|
|
256
|
+
(0, http_1.Policy)(NotLoggedPolicy_js_1.NotLoggedPolicy),
|
|
257
|
+
__param(0, (0, http_1.Body)()),
|
|
258
|
+
__param(1, (0, http_1.Header)('Host')),
|
|
259
|
+
__metadata("design:type", Function),
|
|
260
|
+
__metadata("design:paramtypes", [Object, String]),
|
|
261
|
+
__metadata("design:returntype", Promise)
|
|
262
|
+
], LoginController.prototype, "loginFederated", null);
|
|
263
|
+
__decorate([
|
|
264
|
+
(0, http_1.Get)(),
|
|
265
|
+
(0, http_1.Policy)(NotLoggedPolicy_js_1.NotLoggedPolicy),
|
|
266
|
+
__metadata("design:type", Function),
|
|
267
|
+
__metadata("design:paramtypes", []),
|
|
268
|
+
__metadata("design:returntype", Promise)
|
|
269
|
+
], LoginController.prototype, "federatedLoginList", null);
|
|
270
|
+
__decorate([
|
|
271
|
+
(0, http_1.Post)(),
|
|
272
|
+
(0, http_1.Policy)(NotLoggedPolicy_js_1.NotLoggedPolicy),
|
|
273
|
+
__param(0, (0, http_1.Body)()),
|
|
274
|
+
__metadata("design:type", Function),
|
|
275
|
+
__metadata("design:paramtypes", [userLogin_dto_js_1.UserLoginDto]),
|
|
276
|
+
__metadata("design:returntype", Promise)
|
|
277
|
+
], LoginController.prototype, "login", null);
|
|
278
|
+
__decorate([
|
|
279
|
+
(0, http_1.Post)('new-password'),
|
|
280
|
+
(0, http_1.Policy)(NotLoggedPolicy_js_1.NotLoggedPolicy),
|
|
281
|
+
__param(0, (0, http_1.Query)()),
|
|
282
|
+
__param(1, (0, http_1.Body)()),
|
|
283
|
+
__metadata("design:type", Function),
|
|
284
|
+
__metadata("design:paramtypes", [String, restore_password_dto_js_1.RestorePasswordDto]),
|
|
285
|
+
__metadata("design:returntype", Promise)
|
|
286
|
+
], LoginController.prototype, "setNewPassword", null);
|
|
287
|
+
__decorate([
|
|
288
|
+
(0, http_1.Post)('forgot-password'),
|
|
289
|
+
(0, http_1.Policy)(NotLoggedPolicy_js_1.NotLoggedPolicy),
|
|
290
|
+
__param(0, (0, http_1.Body)()),
|
|
291
|
+
__metadata("design:type", Function),
|
|
292
|
+
__metadata("design:paramtypes", [userLogin_dto_js_1.UserLoginDto]),
|
|
293
|
+
__metadata("design:returntype", Promise)
|
|
294
|
+
], LoginController.prototype, "forgotPassword", null);
|
|
295
|
+
__decorate([
|
|
296
|
+
(0, http_1.Get)(),
|
|
297
|
+
(0, http_1.Policy)(LoggedPolicy_js_1.LoggedPolicy),
|
|
298
|
+
__param(0, (0, http_1.Cookie)()),
|
|
299
|
+
__metadata("design:type", Function),
|
|
300
|
+
__metadata("design:paramtypes", [String]),
|
|
301
|
+
__metadata("design:returntype", Promise)
|
|
302
|
+
], LoginController.prototype, "logout", null);
|
|
303
|
+
LoginController = __decorate([
|
|
304
|
+
(0, http_1.BasePath)('user/auth')
|
|
305
|
+
], LoginController);
|
|
306
|
+
exports.LoginController = LoginController;
|
|
307
|
+
//# sourceMappingURL=LoginController.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"LoginController.js","sourceRoot":"","sources":["../../../src/controllers/LoginController.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;AAAA,oDAAuD;AACvD,8DAAuD;AACvD,wCAAiK;AACjK,wCAAwM;AACxM,oCAAyC;AACzC,0DAAkF;AAElF,oDAA8E;AAC9E,0CAA6C;AAE7C,uEAAiE;AACjE,iEAA2D;AAC3D,2EAAsE;AACtE,4EAAoE;AAEpE,+BAAoC;AACpC,iCAAiC;AACjC,wCAA2C;AAC3C,uEAAiE;AAG1D,IAAM,eAAe,GAArB,MAAM,eAAgB,SAAQ,qBAAc;IAsCpC,AAAN,KAAK,CAAC,cAAc,CAAS,WAAoB,EAAkB,MAAc;QACtF,MAAM,QAAQ,GAAG,IAAI,CAAC,wBAAwB,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,WAAW,CAAC,MAAM,CAAC,CAAC,CAAC;QAClF,IAAI,CAAC,QAAQ,EAAE;YACb,MAAM,IAAI,6BAAgB,CAAC,0CAA0C,MAAM,EAAE,CAAC,CAAC;SAChF;QAED,MAAM,MAAM,GAAG,MAAM,QAAQ,CAAC,YAAY,CAAC,WAAW,CAAC,CAAC;QACxD,IAAI,CAAC,MAAM,CAAC,KAAK,EAAE;YACjB,uCAAuC;YACvC,OAAO,MAAM,IAAI,CAAC,YAAY,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC;SAC7C;QAED,OAAO,IAAI,mBAAY,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC;IACxC,CAAC;IAED;;;;;OAKG;IAGU,AAAN,KAAK,CAAC,kBAAkB;QAC7B,OAAO,IAAI,SAAE,CAAC,IAAI,CAAC,wBAAwB,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC;IAClE,CAAC;IAIY,AAAN,KAAK,CAAC,KAAK,CAAS,WAAyB;QAClD,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,YAAY,CAAC,YAAY,CAAC,WAAW,CAAC,KAAK,EAAE,WAAW,CAAC,QAAQ,CAAC,CAAC;QAE7F,IAAI,CAAC,MAAM,CAAC,KAAK,EAAE;YACjB,uCAAuC;YACvC,OAAO,MAAM,IAAI,CAAC,YAAY,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC;SAC7C;QAED,OAAO,IAAI,mBAAY,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC;IACxC,CAAC;IAIY,AAAN,KAAK,CAAC,cAAc,CAAU,KAAa,EAAU,GAAuB;QACjF,MAAM,IAAI,GAAG,MAAM,WAAI,CAAC,KAAK,EAAE;aAC5B,SAAS,CAAC,mBAAY,EAAE;YACvB,IAAI,CAAC,KAAK,CAAC;gBACT,GAAG,EAAE,sBAAsB;gBAC3B,KAAK,EAAE,KAAK;aACb,CAAC,CAAC;QACL,CAAC,CAAC;aACD,QAAQ,CAAC,UAAU,CAAC;aACpB,KAAK,EAAE,CAAC;QAEX,IAAI,CAAC,IAAI,EAAE;YACT,OAAO,IAAI,eAAQ,CAAC;gBAClB,KAAK,EAAE;oBACL,IAAI,EAAE,oBAAoB;oBAC1B,OAAO,EAAE,oCAAoC;iBAC9C;aACF,CAAC,CAAC;SACJ;QAED,MAAM,GAAG,GAAG,CAAC,MAAM,IAAI,CAAC,QAAQ,CAAC,sBAAsB,CAAC,CAAa,CAAC;QACtE,MAAM,GAAG,GAAG,gBAAQ,CAAC,GAAG,EAAE,CAAC,IAAI,CAAC,EAAE,OAAO,EAAE,CAAC,IAAI,CAAC,qBAAqB,EAAE,CAAC,CAAC;QAE1E,IAAI,GAAG,GAAG,GAAG,EAAE;YACb,OAAO,IAAI,iBAAU,CAAC;gBACpB,KAAK,EAAE;oBACL,IAAI,EAAE,yBAAyB;oBAC/B,OAAO,EAAE,8BAA8B;iBACxC;aACF,CAAC,CAAC;SACJ;QAED,IAAI,CAAC,IAAI,CAAC,yBAAyB,CAAC,KAAK,CAAC,GAAG,CAAC,QAAQ,CAAC,EAAE;YACvD,OAAO,IAAI,iBAAU,CAAC;gBACpB,KAAK,EAAE;oBACL,IAAI,EAAE,mBAAmB;oBACzB,OAAO,EAAE,iDAAiD;iBAC3D;aACF,CAAC,CAAC;SACJ;QAED,IAAI,GAAG,CAAC,QAAQ,KAAK,GAAG,CAAC,eAAe,EAAE;YACxC,OAAO,IAAI,iBAAU,CAAC;gBACpB,KAAK,EAAE;oBACL,IAAI,EAAE,wBAAwB;oBAC9B,OAAO,EAAE,6CAA6C;iBACvD;aACF,CAAC,CAAC;SACJ;QAED,MAAM,cAAc,GAAG,MAAM,IAAI,CAAC,gBAAgB,CAAC,IAAI,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;QACtE,IAAI,CAAC,QAAQ,GAAG,cAAc,CAAC;QAE/B,MAAM,IAAI,CAAC,MAAM,EAAE,CAAC;QAEpB;;WAEG;QACH,MAAM,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,kBAAkB,CAAC,CAAC;QAE/C,qBAAqB;QACrB,MAAM,IAAI,CAAC,OAAO,CAAC,GAAG,CACpB,IAAI,iBAAU,CAAC;YACb,UAAU,EAAE,IAAI;YAChB,MAAM,EAAE,gBAAgB;SACzB,CAAC,CACH,CAAC;QAEF,gBAAgB;QAChB,MAAM,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,IAAI,0BAAmB,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC;IAC5D,CAAC;IAIY,AAAN,KAAK,CAAC,cAAc,CAAS,KAAmB;QACrD,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,YAAY,CAAC,UAAU,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC;QAE7D,IAAI,CAAC,IAAI,CAAC,QAAQ,IAAI,IAAI,CAAC,QAAQ,IAAI,IAAI,CAAC,SAAS,KAAK,IAAI,EAAE;YAC9D,OAAO,IAAI,6BAAgB,CAAC,mEAAmE,CAAC,CAAC;SAClG;QAED,MAAM,KAAK,GAAG,IAAA,SAAM,GAAE,CAAC;QAEvB,sBAAsB;QACtB,MAAM,CAAC,IAAI,CAAC,QAAQ,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC;QAC/C,MAAM,CAAC,IAAI,CAAC,QAAQ,CAAC,sBAAsB,CAAC,GAAG,KAAK,CAAC,CAAC;QACtD,MAAM,CAAC,IAAI,CAAC,QAAQ,CAAC,sBAAsB,CAAC,GAAG,gBAAQ,CAAC,GAAG,EAAE,CAAC,CAAC;QAE/D,MAAM,IAAI,CAAC,OAAO,CAAC,GAAG,CACpB,IAAI,iBAAU,CAAC;YACb,MAAM,EAAE,qBAAqB;YAC7B,IAAI,EAAE,gBAAQ,CAAC,GAAG,EAAE,CAAC,KAAK,EAAE;YAC5B,UAAU,EAAE,IAAI;SACjB,CAAC,CACH,CAAC;QAEF,MAAM,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,IAAI,2CAAmB,CAAC,IAAI,CAAC,IAAI,EAAE,KAAK,CAAC,CAAC,CAAC;QAEjE,OAAO,IAAI,SAAE,CAAC;YACZ,WAAW,EAAE,KAAK;YAClB,GAAG,EAAE,IAAI,CAAC,qBAAqB;SAChC,CAAC,CAAC;IACL,CAAC;IAIY,AAAN,KAAK,CAAC,MAAM,CAAW,IAAY;QACxC,IAAI,CAAC,IAAI,EAAE;YACT,OAAO,IAAI,SAAE,EAAE,CAAC;SACjB;QAED,MAAM,IAAI,CAAC,eAAe,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC;QAExC,gDAAgD;QAChD,OAAO,IAAI,qBAAc,CAAC,MAAM,EAAE,IAAI,EAAE,IAAI,CAAC,qBAAqB,CAAC,CAAC;IACtE,CAAC;IAES,KAAK,CAAC,YAAY,CAAC,IAAe,EAAE,SAAmB;QAC/D,IAAI,CAAC,IAAI,EAAE;YACT,OAAO,IAAI,mBAAY,CAAC;gBACtB,KAAK,EAAE;oBACL,OAAO,EAAE,6BAA6B;iBACvC;aACF,CAAC,CAAC;SACJ;QAED,MAAM,IAAI,CAAC,QAAQ,CAAC,QAAQ,EAAE,CAAC;QAE/B,MAAM,OAAO,GAAG,IAAI,cAAO,EAAE,CAAC;QAC9B,MAAM,KAAK,GAAG,IAAI,CAAC,SAAS,EAAE,CAAC;QAC/B,OAAO,CAAC,IAAI,CAAC,GAAG,CAAC,MAAM,EAAE,KAAK,CAAC,CAAC;QAEhC,wDAAwD;QACxD,gCAAgC;QAChC,iDAAiD;QACjD,OAAO,CAAC,IAAI,CAAC,GAAG,CAAC,YAAY,EAAE,KAAK,CAAC,CAAC;QAEtC,4CAA4C;QAC5C,qCAAqC;QACrC,IAAI,IAAI,CAAC,eAAe,CAAC,OAAO,IAAI,CAAC,SAAS,EAAE;YAC9C,MAAM,IAAI,CAAC,eAAe,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC;YAEzC,MAAM,cAAc,GAAG,MAAM,IAAI,CAAC,qBAAqB,CAAC,SAAS,CAAC,IAAI,CAAC,CAAC;YAExE;;eAEG;YACH,IAAI,cAAc,EAAE;gBAClB;;mBAEG;gBACH,MAAM,aAAa,GAAG,MAAM,IAAI,CAAC,qBAAqB,CAAC,aAAa,CAAC,IAAI,CAAC,CAAC;gBAC3E,IAAI,CAAC,aAAa,EAAE;oBAClB,MAAM,WAAW,GAAG,MAAM,IAAI,CAAC,qBAAqB,CAAC,UAAU,CAAC,IAAI,CAAC,CAAC;oBAEtE,OAAO,IAAI,qBAAc,CACvB,MAAM,EACN,OAAO,CAAC,SAAS,EACjB,IAAI,CAAC,qBAAqB,EAC1B,IAAI,EACJ;wBACE,YAAY,EAAE,IAAI;wBAClB,sBAAsB,EAAE,IAAI;wBAC5B,MAAM,EAAE,IAAI,CAAC,eAAe,CAAC,OAAO;wBACpC,IAAI,EAAE,WAAW;qBAClB,EACD,EAAE,QAAQ,EAAE,IAAI,EAAE,CACnB,CAAC;iBACH;gBAED,mDAAmD;gBACnD,MAAM,IAAI,CAAC,qBAAqB,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC;gBAE/C,kCAAkC;gBAClC,iDAAiD;gBACjD,OAAO,IAAI,qBAAc,CACvB,MAAM,EACN,OAAO,CAAC,SAAS,EACjB,IAAI,CAAC,qBAAqB,EAC1B,IAAI,EACJ;oBACE,YAAY,EAAE,IAAI;iBACnB,EACD,EAAE,QAAQ,EAAE,IAAI,EAAE,CACnB,CAAC;aACH;SACF;QAED,8DAA8D;QAC9D,OAAO,CAAC,IAAI,CAAC,GAAG,CAAC,YAAY,EAAE,IAAI,CAAC,CAAC;QACrC,MAAM,IAAI,CAAC,eAAe,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC;QAEzC,MAAM,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,IAAI,sCAAgB,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC;QAEvD,IAAI,CAAC,WAAW,GAAG,gBAAQ,CAAC,GAAG,EAAE,CAAC;QAClC,MAAM,IAAI,CAAC,MAAM,EAAE,CAAC;QAEpB,sEAAsE;QACtE,sDAAsD;QACtD,OAAO,IAAI,qBAAc,CAAC,MAAM,EAAE,OAAO,CAAC,SAAS,EAAE,IAAI,CAAC,qBAAqB,EAAE,IAAI,EAAE,KAAK,EAAE,EAAE,QAAQ,EAAE,IAAI,EAAE,CAAC,CAAC;IACpH,CAAC;CACF,CAAA;AAxRC;IAAC,IAAA,eAAU,GAAE;8BACY,6BAAa;sDAAC;AAEvC;IAAC,IAAA,iCAAiB,EAAC,WAAW,CAAC;8BACP,mBAAY;qDAAC;AAErC;IAAC,IAAA,iCAAiB,EAAC,cAAc,CAAC;8BACP,sBAAe;wDAAC;AAE3C;IAAC,IAAA,sBAAM,EAAC,yBAAyB,EAAE;QACjC,YAAY,EAAE,GAAG;KAClB,CAAC;;8DACsC;AAExC;IAAC,IAAA,sBAAM,EAAC,yBAAyB,CAAC;;8DACM;AAExC;IAAC,IAAA,iCAAiB,EAAC,oBAAoB,CAAC;8BACP,qCAAqB;8DAAC;AAEvD;IAAC,IAAA,iCAAiB,EAAC,2BAA2B,CAAC;8BAChB,mCAAmB;4DAAC;AAEnD;IAAC,IAAA,iCAAiB,EAAC,0BAA0B,CAAC;8BACT,iCAA0B;kEAAC;AAEhE;IAAC,IAAA,eAAU,EAAC,4BAAqB,CAAC;;iEAC+B;AAEjE;IAAC,IAAA,eAAU,GAAE;8BACe,uBAAgB;yDAAC;AAE7C;IAAC,IAAA,eAAU,EAAC,mBAAW,CAAC;8BACP,mBAAW;8CAAC;AAIhB;IAFZ,IAAA,WAAI,EAAC,iBAAiB,CAAC;IACvB,IAAA,aAAM,EAAC,oCAAe,CAAC;IACK,WAAA,IAAA,WAAI,GAAE,CAAA;IAAwB,WAAA,IAAA,aAAM,EAAC,MAAM,CAAC,CAAA;;;;qDAaxE;AAUY;IAFZ,IAAA,UAAG,GAAE;IACL,IAAA,aAAM,EAAC,oCAAe,CAAC;;;;yDAGvB;AAIY;IAFZ,IAAA,WAAI,GAAE;IACN,IAAA,aAAM,EAAC,oCAAe,CAAC;IACJ,WAAA,IAAA,WAAI,GAAE,CAAA;;qCAAc,+BAAY;;4CASnD;AAIY;IAFZ,IAAA,WAAI,EAAC,cAAc,CAAC;IACpB,IAAA,aAAM,EAAC,oCAAe,CAAC;IACK,WAAA,IAAA,YAAK,GAAE,CAAA;IAAiB,WAAA,IAAA,WAAI,GAAE,CAAA;;6CAAM,4CAAkB;;qDAsElF;AAIY;IAFZ,IAAA,WAAI,EAAC,iBAAiB,CAAC;IACvB,IAAA,aAAM,EAAC,oCAAe,CAAC;IACK,WAAA,IAAA,WAAI,GAAE,CAAA;;qCAAQ,+BAAY;;qDA4BtD;AAIY;IAFZ,IAAA,UAAG,GAAE;IACL,IAAA,aAAM,EAAC,8BAAY,CAAC;IACA,WAAA,IAAA,aAAM,GAAE,CAAA;;;;6CAS5B;AAnMU,eAAe;IAD3B,IAAA,eAAQ,EAAC,WAAW,CAAC;GACT,eAAe,CAyR3B;AAzRY,0CAAe"}
|
|
File without changes
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"TwoFactorAuthController.d.ts","sourceRoot":"","sources":["../../../src/controllers/TwoFactorAuthController.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,QAAQ,EAAE,MAAM,uBAAuB,CAAC;AACjD,OAAO,EAAE,cAAc,EAAoB,EAAE,EAAQ,YAAY,EAAE,MAAM,eAAe,CAAC;AACzF,OAAO,EAAE,eAAe,EAAE,IAAI,IAAI,SAAS,EAAE,MAAM,eAAe,CAAC;AAMnE,OAAO,EAAE,qBAAqB,EAAE,MAAM,kBAAkB,CAAC;AAIzD,OAAO,EAAE,WAAW,EAAE,MAAM,gBAAgB,CAAC;AAE7C,qBAEa,uBAAwB,SAAQ,cAAc;IAEzD,SAAS,CAAC,KAAK,EAAE,WAAW,CAAC;IAG7B,SAAS,CAAC,eAAe,EAAE,eAAe,CAAC;IAG3C,SAAS,CAAC,qBAAqB,EAAE,qBAAqB,CAAC;IAG1C,WAAW,CAAS,MAAM,EAAE,SAAS,EAAU,KAAK,EAAE,QAAQ,EAAY,IAAI,EAAE,MAAM;CAoBpG"}
|
|
@@ -0,0 +1,71 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __decorate = (this && this.__decorate) || function (decorators, target, key, desc) {
|
|
3
|
+
var c = arguments.length, r = c < 3 ? target : desc === null ? desc = Object.getOwnPropertyDescriptor(target, key) : desc, d;
|
|
4
|
+
if (typeof Reflect === "object" && typeof Reflect.decorate === "function") r = Reflect.decorate(decorators, target, key, desc);
|
|
5
|
+
else for (var i = decorators.length - 1; i >= 0; i--) if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;
|
|
6
|
+
return c > 3 && r && Object.defineProperty(target, key, r), r;
|
|
7
|
+
};
|
|
8
|
+
var __metadata = (this && this.__metadata) || function (k, v) {
|
|
9
|
+
if (typeof Reflect === "object" && typeof Reflect.metadata === "function") return Reflect.metadata(k, v);
|
|
10
|
+
};
|
|
11
|
+
var __param = (this && this.__param) || function (paramIndex, decorator) {
|
|
12
|
+
return function (target, key) { decorator(target, key, paramIndex); }
|
|
13
|
+
};
|
|
14
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
15
|
+
exports.TwoFactorAuthController = void 0;
|
|
16
|
+
const token_dto_js_1 = require("./../dto/token-dto.js");
|
|
17
|
+
const http_1 = require("@spinajs/http");
|
|
18
|
+
const rbac_1 = require("@spinajs/rbac");
|
|
19
|
+
const http_2 = require("@spinajs/http");
|
|
20
|
+
const decorators_js_1 = require("../decorators.js");
|
|
21
|
+
const _2FaPolicy_js_1 = require("../policies/2FaPolicy.js");
|
|
22
|
+
const configuration_1 = require("@spinajs/configuration");
|
|
23
|
+
const interfaces_js_1 = require("../interfaces.js");
|
|
24
|
+
const luxon_1 = require("luxon");
|
|
25
|
+
const UserLoginSuccess_js_1 = require("../events/UserLoginSuccess.js");
|
|
26
|
+
const di_1 = require("@spinajs/di");
|
|
27
|
+
const queue_1 = require("@spinajs/queue");
|
|
28
|
+
let TwoFactorAuthController = class TwoFactorAuthController extends http_1.BaseController {
|
|
29
|
+
async verifyToken(logged, token, ssid) {
|
|
30
|
+
const result = await this.TwoFactorAuthProvider.verifyToken(token.Token, logged);
|
|
31
|
+
if (result) {
|
|
32
|
+
return new http_1.Unauthorized(`invalid token`);
|
|
33
|
+
}
|
|
34
|
+
logged.LastLoginAt = luxon_1.DateTime.now();
|
|
35
|
+
await logged.update();
|
|
36
|
+
await this.Queue.emit(new UserLoginSuccess_js_1.UserLoginSuccess(logged.Uuid));
|
|
37
|
+
await this.SessionProvider.save(ssid, {
|
|
38
|
+
Authorized: true,
|
|
39
|
+
TwoFactorAuth_check: true,
|
|
40
|
+
});
|
|
41
|
+
// return user data
|
|
42
|
+
return new http_1.Ok(logged.dehydrate());
|
|
43
|
+
}
|
|
44
|
+
};
|
|
45
|
+
__decorate([
|
|
46
|
+
(0, di_1.Autoinject)(queue_1.QueueClient),
|
|
47
|
+
__metadata("design:type", queue_1.QueueClient)
|
|
48
|
+
], TwoFactorAuthController.prototype, "Queue", void 0);
|
|
49
|
+
__decorate([
|
|
50
|
+
(0, configuration_1.AutoinjectService)('rbac.session'),
|
|
51
|
+
__metadata("design:type", rbac_1.SessionProvider)
|
|
52
|
+
], TwoFactorAuthController.prototype, "SessionProvider", void 0);
|
|
53
|
+
__decorate([
|
|
54
|
+
(0, configuration_1.AutoinjectService)('rbac.twoFactorAuth'),
|
|
55
|
+
__metadata("design:type", interfaces_js_1.TwoFactorAuthProvider)
|
|
56
|
+
], TwoFactorAuthController.prototype, "TwoFactorAuthProvider", void 0);
|
|
57
|
+
__decorate([
|
|
58
|
+
(0, http_1.Post)('2fa/verify'),
|
|
59
|
+
__param(0, (0, decorators_js_1.User)()),
|
|
60
|
+
__param(1, (0, http_2.Body)()),
|
|
61
|
+
__param(2, (0, http_1.Cookie)()),
|
|
62
|
+
__metadata("design:type", Function),
|
|
63
|
+
__metadata("design:paramtypes", [rbac_1.User, token_dto_js_1.TokenDto, String]),
|
|
64
|
+
__metadata("design:returntype", Promise)
|
|
65
|
+
], TwoFactorAuthController.prototype, "verifyToken", null);
|
|
66
|
+
TwoFactorAuthController = __decorate([
|
|
67
|
+
(0, http_1.BasePath)('user/auth'),
|
|
68
|
+
(0, http_2.Policy)(_2FaPolicy_js_1.TwoFacRouteEnabled)
|
|
69
|
+
], TwoFactorAuthController);
|
|
70
|
+
exports.TwoFactorAuthController = TwoFactorAuthController;
|
|
71
|
+
//# sourceMappingURL=TwoFactorAuthController.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"TwoFactorAuthController.js","sourceRoot":"","sources":["../../../src/controllers/TwoFactorAuthController.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;AAAA,wDAAiD;AACjD,wCAAyF;AACzF,wCAAmE;AACnE,wCAA6C;AAE7C,oDAAwC;AACxC,4DAA8D;AAC9D,0DAA2D;AAC3D,oDAAyD;AACzD,iCAAiC;AACjC,uEAAiE;AACjE,oCAAyC;AACzC,0CAA6C;AAItC,IAAM,uBAAuB,GAA7B,MAAM,uBAAwB,SAAQ,qBAAc;IAW5C,AAAN,KAAK,CAAC,WAAW,CAAS,MAAiB,EAAU,KAAe,EAAY,IAAY;QACjG,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,qBAAqB,CAAC,WAAW,CAAC,KAAK,CAAC,KAAK,EAAE,MAAM,CAAC,CAAC;QAEjF,IAAI,MAAM,EAAE;YACV,OAAO,IAAI,mBAAY,CAAC,eAAe,CAAC,CAAC;SAC1C;QAED,MAAM,CAAC,WAAW,GAAG,gBAAQ,CAAC,GAAG,EAAE,CAAC;QACpC,MAAM,MAAM,CAAC,MAAM,EAAE,CAAC;QAEtB,MAAM,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,IAAI,sCAAgB,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC;QAEzD,MAAM,IAAI,CAAC,eAAe,CAAC,IAAI,CAAC,IAAI,EAAE;YACpC,UAAU,EAAE,IAAI;YAChB,mBAAmB,EAAE,IAAI;SAC1B,CAAC,CAAC;QAEH,mBAAmB;QACnB,OAAO,IAAI,SAAE,CAAC,MAAM,CAAC,SAAS,EAAE,CAAC,CAAC;IACpC,CAAC;CACF,CAAA;AA9BC;IAAC,IAAA,eAAU,EAAC,mBAAW,CAAC;8BACP,mBAAW;sDAAC;AAE7B;IAAC,IAAA,iCAAiB,EAAC,cAAc,CAAC;8BACP,sBAAe;gEAAC;AAE3C;IAAC,IAAA,iCAAiB,EAAC,oBAAoB,CAAC;8BACP,qCAAqB;sEAAC;AAG1C;IADZ,IAAA,WAAI,EAAC,YAAY,CAAC;IACO,WAAA,IAAA,oBAAI,GAAE,CAAA;IAAqB,WAAA,IAAA,WAAI,GAAE,CAAA;IAAmB,WAAA,IAAA,aAAM,GAAE,CAAA;;qCAA7C,WAAS,EAAiB,uBAAQ;;0DAmB1E;AA9BU,uBAAuB;IAFnC,IAAA,eAAQ,EAAC,WAAW,CAAC;IACrB,IAAA,aAAM,EAAC,kCAAkB,CAAC;GACd,uBAAuB,CA+BnC;AA/BY,0DAAuB"}
|
|
File without changes
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"UserAdminController.d.ts","sourceRoot":"","sources":["../../../src/controllers/UserAdminController.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,cAAc,EAAY,MAAM,eAAe,CAAC;AAGzD,qBAEa,eAAgB,SAAQ,cAAc;CAuElD"}
|
|
@@ -0,0 +1,19 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __decorate = (this && this.__decorate) || function (decorators, target, key, desc) {
|
|
3
|
+
var c = arguments.length, r = c < 3 ? target : desc === null ? desc = Object.getOwnPropertyDescriptor(target, key) : desc, d;
|
|
4
|
+
if (typeof Reflect === "object" && typeof Reflect.decorate === "function") r = Reflect.decorate(decorators, target, key, desc);
|
|
5
|
+
else for (var i = decorators.length - 1; i >= 0; i--) if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;
|
|
6
|
+
return c > 3 && r && Object.defineProperty(target, key, r), r;
|
|
7
|
+
};
|
|
8
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
9
|
+
exports.UsersController = void 0;
|
|
10
|
+
const http_1 = require("@spinajs/http");
|
|
11
|
+
const decorators_js_1 = require("./../decorators.js");
|
|
12
|
+
let UsersController = class UsersController extends http_1.BaseController {
|
|
13
|
+
};
|
|
14
|
+
UsersController = __decorate([
|
|
15
|
+
(0, decorators_js_1.Resource)('user'),
|
|
16
|
+
(0, http_1.BasePath)('user')
|
|
17
|
+
], UsersController);
|
|
18
|
+
exports.UsersController = UsersController;
|
|
19
|
+
//# sourceMappingURL=UserAdminController.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"UserAdminController.js","sourceRoot":"","sources":["../../../src/controllers/UserAdminController.ts"],"names":[],"mappings":";;;;;;;;;AAAA,wCAAyD;AACzD,sDAA8C;AAIvC,IAAM,eAAe,GAArB,MAAM,eAAgB,SAAQ,qBAAc;CAuElD,CAAA;AAvEY,eAAe;IAF3B,IAAA,wBAAQ,EAAC,MAAM,CAAC;IAChB,IAAA,eAAQ,EAAC,MAAM,CAAC;GACJ,eAAe,CAuE3B;AAvEY,0CAAe"}
|
|
File without changes
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"UserController.d.ts","sourceRoot":"","sources":["../../../src/controllers/UserController.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,WAAW,EAAE,MAAM,wBAAwB,CAAC;AACrD,OAAO,EAAE,IAAI,IAAI,SAAS,EAAE,gBAAgB,EAAE,eAAe,EAAE,MAAM,eAAe,CAAC;AACrF,OAAO,EAAE,cAAc,EAAiB,EAAE,EAAuB,MAAM,eAAe,CAAC;AAQvF,qBAEa,cAAe,SAAQ,cAAc;IAEhD,SAAS,CAAC,gBAAgB,EAAE,gBAAgB,CAAC;IAG7C,SAAS,CAAC,aAAa,EAAE,MAAM,CAAC;IAGhC,SAAS,CAAC,eAAe,EAAE,eAAe,CAAC;IAI9B,OAAO,CAAS,IAAI,EAAE,SAAS,EAAY,IAAI,EAAE,MAAM;IAkBvD,WAAW,CAAS,IAAI,EAAE,SAAS,EAAU,GAAG,EAAE,WAAW;CAgB3E"}
|