@strapi/core 0.0.0-experimental.00b482b8dcda6164537baf70d52b4b2535560c36 → 0.0.0-experimental.00fefb05c5c56986f41a4710d5a5e719b5ae58ed
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of @strapi/core might be problematic. Click here for more details.
- package/dist/Strapi.d.ts.map +1 -1
- package/dist/Strapi.js +16 -1
- package/dist/Strapi.js.map +1 -1
- package/dist/Strapi.mjs +16 -1
- package/dist/Strapi.mjs.map +1 -1
- package/dist/package.json.js +11 -11
- package/dist/package.json.mjs +11 -11
- package/dist/providers/index.js +1 -1
- package/dist/providers/index.js.map +1 -1
- package/dist/providers/index.mjs +1 -1
- package/dist/providers/index.mjs.map +1 -1
- package/dist/providers/{sessionManager.d.ts → session-manager.d.ts} +1 -1
- package/dist/providers/session-manager.d.ts.map +1 -0
- package/dist/providers/session-manager.js +23 -0
- package/dist/providers/session-manager.js.map +1 -0
- package/dist/providers/session-manager.mjs +21 -0
- package/dist/providers/session-manager.mjs.map +1 -0
- package/dist/services/document-service/components.d.ts +26 -1
- package/dist/services/document-service/components.d.ts.map +1 -1
- package/dist/services/document-service/components.js +16 -4
- package/dist/services/document-service/components.js.map +1 -1
- package/dist/services/document-service/components.mjs +15 -5
- package/dist/services/document-service/components.mjs.map +1 -1
- package/dist/services/document-service/utils/clean-component-join-table.d.ts +7 -0
- package/dist/services/document-service/utils/clean-component-join-table.d.ts.map +1 -0
- package/dist/services/metrics/index.js +2 -1
- package/dist/services/metrics/index.js.map +1 -1
- package/dist/services/metrics/index.mjs +2 -1
- package/dist/services/metrics/index.mjs.map +1 -1
- package/dist/services/metrics/middleware.d.ts +2 -1
- package/dist/services/metrics/middleware.d.ts.map +1 -1
- package/dist/services/metrics/middleware.js +2 -2
- package/dist/services/metrics/middleware.js.map +1 -1
- package/dist/services/metrics/middleware.mjs +2 -2
- package/dist/services/metrics/middleware.mjs.map +1 -1
- package/dist/services/metrics/sender.d.ts.map +1 -1
- package/dist/services/metrics/sender.js +2 -1
- package/dist/services/metrics/sender.js.map +1 -1
- package/dist/services/metrics/sender.mjs +2 -1
- package/dist/services/metrics/sender.mjs.map +1 -1
- package/dist/services/session-manager.d.ts +72 -20
- package/dist/services/session-manager.d.ts.map +1 -1
- package/dist/services/session-manager.js +199 -50
- package/dist/services/session-manager.js.map +1 -1
- package/dist/services/session-manager.mjs +199 -50
- package/dist/services/session-manager.mjs.map +1 -1
- package/package.json +11 -11
- package/dist/providers/sessionManager.d.ts.map +0 -1
- package/dist/providers/sessionManager.js +0 -36
- package/dist/providers/sessionManager.js.map +0 -1
- package/dist/providers/sessionManager.mjs +0 -34
- package/dist/providers/sessionManager.mjs.map +0 -1
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"sessionManager.js","sources":["../../src/providers/sessionManager.ts"],"sourcesContent":["import type { Algorithm } from 'jsonwebtoken';\nimport { defineProvider } from './provider';\nimport { createSessionManager } from '../services/session-manager';\n\ninterface AdminAuthConfig {\n secret?: string;\n options?: {\n algorithm?: Algorithm;\n [key: string]: unknown;\n };\n}\n\nexport default defineProvider({\n init(strapi) {\n // Get JWT secret from admin auth settings (same as admin token service)\n const adminAuth = strapi.config.get<AdminAuthConfig>('admin.auth', {});\n const jwtSecret = adminAuth.secret;\n\n if (!jwtSecret) {\n throw new Error(\n 'Missing admin.auth.secret configuration. The SessionManager requires a JWT secret'\n );\n }\n\n const accessTokenLifespan = strapi.config.get<number>(\n 'admin.auth.sessions.accessTokenLifespan',\n 30 * 60\n );\n const maxRefreshTokenLifespan = strapi.config.get<number>(\n 'admin.auth.sessions.maxRefreshTokenLifespan',\n 30 * 24 * 60 * 60\n );\n const idleRefreshTokenLifespan = strapi.config.get<number>(\n 'admin.auth.sessions.idleRefreshTokenLifespan',\n 7 * 24 * 60 * 60\n );\n const maxSessionLifespan = strapi.config.get<number>(\n 'admin.auth.sessions.maxSessionLifespan',\n 7 * 24 * 60 * 60\n );\n const idleSessionLifespan = strapi.config.get<number>(\n 'admin.auth.sessions.idleSessionLifespan',\n 60 * 60\n );\n\n const config = {\n jwtSecret,\n accessTokenLifespan,\n maxRefreshTokenLifespan,\n idleRefreshTokenLifespan,\n maxSessionLifespan,\n idleSessionLifespan,\n algorithm: adminAuth.options?.algorithm,\n };\n\n strapi.add('sessionManager', () =>\n createSessionManager({\n db: strapi.db,\n config,\n })\n );\n },\n});\n"],"names":["defineProvider","init","strapi","adminAuth","config","get","jwtSecret","secret","Error","accessTokenLifespan","maxRefreshTokenLifespan","idleRefreshTokenLifespan","maxSessionLifespan","idleSessionLifespan","algorithm","options","add","createSessionManager","db"],"mappings":";;;;;AAYA,qBAAeA,uBAAe,CAAA;AAC5BC,IAAAA,IAAAA,CAAAA,CAAKC,MAAM,EAAA;;AAET,QAAA,MAAMC,YAAYD,MAAOE,CAAAA,MAAM,CAACC,GAAG,CAAkB,cAAc,EAAC,CAAA;QACpE,MAAMC,SAAAA,GAAYH,UAAUI,MAAM;AAElC,QAAA,IAAI,CAACD,SAAW,EAAA;AACd,YAAA,MAAM,IAAIE,KACR,CAAA,mFAAA,CAAA;AAEJ;AAEA,QAAA,MAAMC,sBAAsBP,MAAOE,CAAAA,MAAM,CAACC,GAAG,CAC3C,2CACA,EAAK,GAAA,EAAA,CAAA;QAEP,MAAMK,uBAAAA,GAA0BR,OAAOE,MAAM,CAACC,GAAG,CAC/C,6CAAA,EACA,EAAK,GAAA,EAAA,GAAK,EAAK,GAAA,EAAA,CAAA;QAEjB,MAAMM,wBAAAA,GAA2BT,OAAOE,MAAM,CAACC,GAAG,CAChD,8CAAA,EACA,CAAI,GAAA,EAAA,GAAK,EAAK,GAAA,EAAA,CAAA;QAEhB,MAAMO,kBAAAA,GAAqBV,OAAOE,MAAM,CAACC,GAAG,CAC1C,wCAAA,EACA,CAAI,GAAA,EAAA,GAAK,EAAK,GAAA,EAAA,CAAA;AAEhB,QAAA,MAAMQ,sBAAsBX,MAAOE,CAAAA,MAAM,CAACC,GAAG,CAC3C,2CACA,EAAK,GAAA,EAAA,CAAA;AAGP,QAAA,MAAMD,MAAS,GAAA;AACbE,YAAAA,SAAAA;AACAG,YAAAA,mBAAAA;AACAC,YAAAA,uBAAAA;AACAC,YAAAA,wBAAAA;AACAC,YAAAA,kBAAAA;AACAC,YAAAA,mBAAAA;YACAC,SAAWX,EAAAA,SAAAA,CAAUY,OAAO,EAAED;AAChC,SAAA;AAEAZ,QAAAA,MAAAA,CAAOc,GAAG,CAAC,gBAAkB,EAAA,IAC3BC,qCAAqB,CAAA;AACnBC,gBAAAA,EAAAA,EAAIhB,OAAOgB,EAAE;AACbd,gBAAAA;AACF,aAAA,CAAA,CAAA;AAEJ;AACF,CAAG,CAAA;;;;"}
|
|
@@ -1,34 +0,0 @@
|
|
|
1
|
-
import { defineProvider } from './provider.mjs';
|
|
2
|
-
import { createSessionManager } from '../services/session-manager.mjs';
|
|
3
|
-
|
|
4
|
-
var sessionManager = defineProvider({
|
|
5
|
-
init (strapi) {
|
|
6
|
-
// Get JWT secret from admin auth settings (same as admin token service)
|
|
7
|
-
const adminAuth = strapi.config.get('admin.auth', {});
|
|
8
|
-
const jwtSecret = adminAuth.secret;
|
|
9
|
-
if (!jwtSecret) {
|
|
10
|
-
throw new Error('Missing admin.auth.secret configuration. The SessionManager requires a JWT secret');
|
|
11
|
-
}
|
|
12
|
-
const accessTokenLifespan = strapi.config.get('admin.auth.sessions.accessTokenLifespan', 30 * 60);
|
|
13
|
-
const maxRefreshTokenLifespan = strapi.config.get('admin.auth.sessions.maxRefreshTokenLifespan', 30 * 24 * 60 * 60);
|
|
14
|
-
const idleRefreshTokenLifespan = strapi.config.get('admin.auth.sessions.idleRefreshTokenLifespan', 7 * 24 * 60 * 60);
|
|
15
|
-
const maxSessionLifespan = strapi.config.get('admin.auth.sessions.maxSessionLifespan', 7 * 24 * 60 * 60);
|
|
16
|
-
const idleSessionLifespan = strapi.config.get('admin.auth.sessions.idleSessionLifespan', 60 * 60);
|
|
17
|
-
const config = {
|
|
18
|
-
jwtSecret,
|
|
19
|
-
accessTokenLifespan,
|
|
20
|
-
maxRefreshTokenLifespan,
|
|
21
|
-
idleRefreshTokenLifespan,
|
|
22
|
-
maxSessionLifespan,
|
|
23
|
-
idleSessionLifespan,
|
|
24
|
-
algorithm: adminAuth.options?.algorithm
|
|
25
|
-
};
|
|
26
|
-
strapi.add('sessionManager', ()=>createSessionManager({
|
|
27
|
-
db: strapi.db,
|
|
28
|
-
config
|
|
29
|
-
}));
|
|
30
|
-
}
|
|
31
|
-
});
|
|
32
|
-
|
|
33
|
-
export { sessionManager as default };
|
|
34
|
-
//# sourceMappingURL=sessionManager.mjs.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"sessionManager.mjs","sources":["../../src/providers/sessionManager.ts"],"sourcesContent":["import type { Algorithm } from 'jsonwebtoken';\nimport { defineProvider } from './provider';\nimport { createSessionManager } from '../services/session-manager';\n\ninterface AdminAuthConfig {\n secret?: string;\n options?: {\n algorithm?: Algorithm;\n [key: string]: unknown;\n };\n}\n\nexport default defineProvider({\n init(strapi) {\n // Get JWT secret from admin auth settings (same as admin token service)\n const adminAuth = strapi.config.get<AdminAuthConfig>('admin.auth', {});\n const jwtSecret = adminAuth.secret;\n\n if (!jwtSecret) {\n throw new Error(\n 'Missing admin.auth.secret configuration. The SessionManager requires a JWT secret'\n );\n }\n\n const accessTokenLifespan = strapi.config.get<number>(\n 'admin.auth.sessions.accessTokenLifespan',\n 30 * 60\n );\n const maxRefreshTokenLifespan = strapi.config.get<number>(\n 'admin.auth.sessions.maxRefreshTokenLifespan',\n 30 * 24 * 60 * 60\n );\n const idleRefreshTokenLifespan = strapi.config.get<number>(\n 'admin.auth.sessions.idleRefreshTokenLifespan',\n 7 * 24 * 60 * 60\n );\n const maxSessionLifespan = strapi.config.get<number>(\n 'admin.auth.sessions.maxSessionLifespan',\n 7 * 24 * 60 * 60\n );\n const idleSessionLifespan = strapi.config.get<number>(\n 'admin.auth.sessions.idleSessionLifespan',\n 60 * 60\n );\n\n const config = {\n jwtSecret,\n accessTokenLifespan,\n maxRefreshTokenLifespan,\n idleRefreshTokenLifespan,\n maxSessionLifespan,\n idleSessionLifespan,\n algorithm: adminAuth.options?.algorithm,\n };\n\n strapi.add('sessionManager', () =>\n createSessionManager({\n db: strapi.db,\n config,\n })\n );\n },\n});\n"],"names":["defineProvider","init","strapi","adminAuth","config","get","jwtSecret","secret","Error","accessTokenLifespan","maxRefreshTokenLifespan","idleRefreshTokenLifespan","maxSessionLifespan","idleSessionLifespan","algorithm","options","add","createSessionManager","db"],"mappings":";;;AAYA,qBAAeA,cAAe,CAAA;AAC5BC,IAAAA,IAAAA,CAAAA,CAAKC,MAAM,EAAA;;AAET,QAAA,MAAMC,YAAYD,MAAOE,CAAAA,MAAM,CAACC,GAAG,CAAkB,cAAc,EAAC,CAAA;QACpE,MAAMC,SAAAA,GAAYH,UAAUI,MAAM;AAElC,QAAA,IAAI,CAACD,SAAW,EAAA;AACd,YAAA,MAAM,IAAIE,KACR,CAAA,mFAAA,CAAA;AAEJ;AAEA,QAAA,MAAMC,sBAAsBP,MAAOE,CAAAA,MAAM,CAACC,GAAG,CAC3C,2CACA,EAAK,GAAA,EAAA,CAAA;QAEP,MAAMK,uBAAAA,GAA0BR,OAAOE,MAAM,CAACC,GAAG,CAC/C,6CAAA,EACA,EAAK,GAAA,EAAA,GAAK,EAAK,GAAA,EAAA,CAAA;QAEjB,MAAMM,wBAAAA,GAA2BT,OAAOE,MAAM,CAACC,GAAG,CAChD,8CAAA,EACA,CAAI,GAAA,EAAA,GAAK,EAAK,GAAA,EAAA,CAAA;QAEhB,MAAMO,kBAAAA,GAAqBV,OAAOE,MAAM,CAACC,GAAG,CAC1C,wCAAA,EACA,CAAI,GAAA,EAAA,GAAK,EAAK,GAAA,EAAA,CAAA;AAEhB,QAAA,MAAMQ,sBAAsBX,MAAOE,CAAAA,MAAM,CAACC,GAAG,CAC3C,2CACA,EAAK,GAAA,EAAA,CAAA;AAGP,QAAA,MAAMD,MAAS,GAAA;AACbE,YAAAA,SAAAA;AACAG,YAAAA,mBAAAA;AACAC,YAAAA,uBAAAA;AACAC,YAAAA,wBAAAA;AACAC,YAAAA,kBAAAA;AACAC,YAAAA,mBAAAA;YACAC,SAAWX,EAAAA,SAAAA,CAAUY,OAAO,EAAED;AAChC,SAAA;AAEAZ,QAAAA,MAAAA,CAAOc,GAAG,CAAC,gBAAkB,EAAA,IAC3BC,oBAAqB,CAAA;AACnBC,gBAAAA,EAAAA,EAAIhB,OAAOgB,EAAE;AACbd,gBAAAA;AACF,aAAA,CAAA,CAAA;AAEJ;AACF,CAAG,CAAA;;;;"}
|