@strapi/plugin-users-permissions 0.0.0-next.f6dca5adf05ef6bed9605a1535999ab0bbbf063e → 0.0.0-next.f86041c89a8c1545c6437a881dc613e98bc52bd7

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (740) hide show
  1. package/.eslintignore +2 -1
  2. package/admin/src/components/BoundRoute/index.jsx +1 -1
  3. package/admin/src/components/FormModal/Input/index.jsx +1 -1
  4. package/admin/src/components/FormModal/index.jsx +1 -1
  5. package/admin/src/components/Permissions/PermissionRow/SubCategory.jsx +9 -2
  6. package/admin/src/components/Policies/index.jsx +2 -1
  7. package/admin/src/components/UsersPermissions/index.jsx +1 -0
  8. package/admin/src/index.js +2 -2
  9. package/admin/src/pages/AdvancedSettings/index.jsx +1 -1
  10. package/admin/src/pages/EmailTemplates/components/EmailForm.jsx +3 -2
  11. package/admin/src/pages/EmailTemplates/components/EmailTable.jsx +3 -3
  12. package/admin/src/pages/Providers/index.jsx +74 -76
  13. package/admin/src/pages/Roles/index.jsx +1 -1
  14. package/admin/src/pages/Roles/pages/CreatePage.jsx +20 -7
  15. package/admin/src/pages/Roles/pages/EditPage.jsx +12 -7
  16. package/admin/src/pages/Roles/pages/ListPage/components/TableBody.jsx +2 -2
  17. package/admin/src/pages/Roles/pages/ListPage/index.jsx +91 -93
  18. package/admin/src/pluginId.js +2 -2
  19. package/admin/src/translations/en.json +1 -0
  20. package/admin/src/translations/uk.json +41 -4
  21. package/admin/src/utils/formatPluginName.js +1 -1
  22. package/dist/admin/components/BoundRoute/getMethodColor.js +49 -0
  23. package/dist/admin/components/BoundRoute/getMethodColor.js.map +1 -0
  24. package/dist/admin/components/BoundRoute/getMethodColor.mjs +47 -0
  25. package/dist/admin/components/BoundRoute/getMethodColor.mjs.map +1 -0
  26. package/dist/admin/components/BoundRoute/index.js +98 -0
  27. package/dist/admin/components/BoundRoute/index.js.map +1 -0
  28. package/dist/admin/components/BoundRoute/index.mjs +96 -0
  29. package/dist/admin/components/BoundRoute/index.mjs.map +1 -0
  30. package/dist/admin/components/FormModal/Input/index.js +123 -0
  31. package/dist/admin/components/FormModal/Input/index.js.map +1 -0
  32. package/dist/admin/components/FormModal/Input/index.mjs +121 -0
  33. package/dist/admin/components/FormModal/Input/index.mjs.map +1 -0
  34. package/dist/admin/components/FormModal/index.js +110 -0
  35. package/dist/admin/components/FormModal/index.js.map +1 -0
  36. package/dist/admin/components/FormModal/index.mjs +108 -0
  37. package/dist/admin/components/FormModal/index.mjs.map +1 -0
  38. package/dist/admin/components/Permissions/PermissionRow/CheckboxWrapper.js +33 -0
  39. package/dist/admin/components/Permissions/PermissionRow/CheckboxWrapper.js.map +1 -0
  40. package/dist/admin/components/Permissions/PermissionRow/CheckboxWrapper.mjs +31 -0
  41. package/dist/admin/components/Permissions/PermissionRow/CheckboxWrapper.mjs.map +1 -0
  42. package/dist/admin/components/Permissions/PermissionRow/SubCategory.js +158 -0
  43. package/dist/admin/components/Permissions/PermissionRow/SubCategory.js.map +1 -0
  44. package/dist/admin/components/Permissions/PermissionRow/SubCategory.mjs +156 -0
  45. package/dist/admin/components/Permissions/PermissionRow/SubCategory.mjs.map +1 -0
  46. package/dist/admin/components/Permissions/PermissionRow/index.js +50 -0
  47. package/dist/admin/components/Permissions/PermissionRow/index.js.map +1 -0
  48. package/dist/admin/components/Permissions/PermissionRow/index.mjs +48 -0
  49. package/dist/admin/components/Permissions/PermissionRow/index.mjs.map +1 -0
  50. package/dist/admin/components/Permissions/index.js +52 -0
  51. package/dist/admin/components/Permissions/index.js.map +1 -0
  52. package/dist/admin/components/Permissions/index.mjs +50 -0
  53. package/dist/admin/components/Permissions/index.mjs.map +1 -0
  54. package/dist/admin/components/Permissions/init.js +15 -0
  55. package/dist/admin/components/Permissions/init.js.map +1 -0
  56. package/dist/admin/components/Permissions/init.mjs +13 -0
  57. package/dist/admin/components/Permissions/init.mjs.map +1 -0
  58. package/dist/admin/components/Permissions/reducer.js +34 -0
  59. package/dist/admin/components/Permissions/reducer.js.map +1 -0
  60. package/dist/admin/components/Permissions/reducer.mjs +31 -0
  61. package/dist/admin/components/Permissions/reducer.mjs.map +1 -0
  62. package/dist/admin/components/Policies/index.js +68 -0
  63. package/dist/admin/components/Policies/index.js.map +1 -0
  64. package/dist/admin/components/Policies/index.mjs +66 -0
  65. package/dist/admin/components/Policies/index.mjs.map +1 -0
  66. package/dist/admin/components/UsersPermissions/index.js +116 -0
  67. package/dist/admin/components/UsersPermissions/index.js.map +1 -0
  68. package/dist/admin/components/UsersPermissions/index.mjs +114 -0
  69. package/dist/admin/components/UsersPermissions/index.mjs.map +1 -0
  70. package/dist/admin/components/UsersPermissions/init.js +13 -0
  71. package/dist/admin/components/UsersPermissions/init.js.map +1 -0
  72. package/dist/admin/components/UsersPermissions/init.mjs +11 -0
  73. package/dist/admin/components/UsersPermissions/init.mjs.map +1 -0
  74. package/dist/admin/components/UsersPermissions/reducer.js +73 -0
  75. package/dist/admin/components/UsersPermissions/reducer.js.map +1 -0
  76. package/dist/admin/components/UsersPermissions/reducer.mjs +68 -0
  77. package/dist/admin/components/UsersPermissions/reducer.mjs.map +1 -0
  78. package/dist/admin/constants.js +81 -0
  79. package/dist/admin/constants.js.map +1 -0
  80. package/dist/admin/constants.mjs +79 -0
  81. package/dist/admin/constants.mjs.map +1 -0
  82. package/dist/admin/contexts/UsersPermissionsContext/index.js +23 -0
  83. package/dist/admin/contexts/UsersPermissionsContext/index.js.map +1 -0
  84. package/dist/admin/contexts/UsersPermissionsContext/index.mjs +19 -0
  85. package/dist/admin/contexts/UsersPermissionsContext/index.mjs.map +1 -0
  86. package/dist/admin/index.js +124 -3
  87. package/dist/admin/index.js.map +1 -1
  88. package/dist/admin/index.mjs +119 -3
  89. package/dist/admin/index.mjs.map +1 -1
  90. package/dist/admin/package.json.js +14 -0
  91. package/dist/admin/package.json.js.map +1 -0
  92. package/dist/admin/package.json.mjs +11 -0
  93. package/dist/admin/package.json.mjs.map +1 -0
  94. package/dist/admin/pages/AdvancedSettings/index.js +194 -0
  95. package/dist/admin/pages/AdvancedSettings/index.js.map +1 -0
  96. package/dist/admin/pages/AdvancedSettings/index.mjs +191 -0
  97. package/dist/admin/pages/AdvancedSettings/index.mjs.map +1 -0
  98. package/dist/admin/pages/AdvancedSettings/utils/layout.js +83 -0
  99. package/dist/admin/pages/AdvancedSettings/utils/layout.js.map +1 -0
  100. package/dist/admin/pages/AdvancedSettings/utils/layout.mjs +81 -0
  101. package/dist/admin/pages/AdvancedSettings/utils/layout.mjs.map +1 -0
  102. package/dist/admin/pages/AdvancedSettings/utils/schema.js +40 -0
  103. package/dist/admin/pages/AdvancedSettings/utils/schema.js.map +1 -0
  104. package/dist/admin/pages/AdvancedSettings/utils/schema.mjs +19 -0
  105. package/dist/admin/pages/AdvancedSettings/utils/schema.mjs.map +1 -0
  106. package/dist/admin/pages/EmailTemplates/components/EmailForm.js +172 -0
  107. package/dist/admin/pages/EmailTemplates/components/EmailForm.js.map +1 -0
  108. package/dist/admin/pages/EmailTemplates/components/EmailForm.mjs +170 -0
  109. package/dist/admin/pages/EmailTemplates/components/EmailForm.mjs.map +1 -0
  110. package/dist/admin/pages/EmailTemplates/components/EmailTable.js +145 -0
  111. package/dist/admin/pages/EmailTemplates/components/EmailTable.js.map +1 -0
  112. package/dist/admin/pages/EmailTemplates/components/EmailTable.mjs +143 -0
  113. package/dist/admin/pages/EmailTemplates/components/EmailTable.mjs.map +1 -0
  114. package/dist/admin/pages/EmailTemplates/index.js +157 -0
  115. package/dist/admin/pages/EmailTemplates/index.js.map +1 -0
  116. package/dist/admin/pages/EmailTemplates/index.mjs +135 -0
  117. package/dist/admin/pages/EmailTemplates/index.mjs.map +1 -0
  118. package/dist/admin/pages/EmailTemplates/utils/schema.js +50 -0
  119. package/dist/admin/pages/EmailTemplates/utils/schema.js.map +1 -0
  120. package/dist/admin/pages/EmailTemplates/utils/schema.mjs +29 -0
  121. package/dist/admin/pages/EmailTemplates/utils/schema.mjs.map +1 -0
  122. package/dist/admin/pages/Providers/index.js +274 -0
  123. package/dist/admin/pages/Providers/index.js.map +1 -0
  124. package/dist/admin/pages/Providers/index.mjs +250 -0
  125. package/dist/admin/pages/Providers/index.mjs.map +1 -0
  126. package/dist/admin/pages/Providers/utils/forms.js +281 -0
  127. package/dist/admin/pages/Providers/utils/forms.js.map +1 -0
  128. package/dist/admin/pages/Providers/utils/forms.mjs +260 -0
  129. package/dist/admin/pages/Providers/utils/forms.mjs.map +1 -0
  130. package/dist/admin/pages/Roles/constants.js +31 -0
  131. package/dist/admin/pages/Roles/constants.js.map +1 -0
  132. package/dist/admin/pages/Roles/constants.mjs +10 -0
  133. package/dist/admin/pages/Roles/constants.mjs.map +1 -0
  134. package/dist/admin/pages/Roles/hooks/usePlugins.js +78 -0
  135. package/dist/admin/pages/Roles/hooks/usePlugins.js.map +1 -0
  136. package/dist/admin/pages/Roles/hooks/usePlugins.mjs +76 -0
  137. package/dist/admin/pages/Roles/hooks/usePlugins.mjs.map +1 -0
  138. package/dist/admin/pages/Roles/index.js +35 -0
  139. package/dist/admin/pages/Roles/index.js.map +1 -0
  140. package/dist/admin/pages/Roles/index.mjs +33 -0
  141. package/dist/admin/pages/Roles/index.mjs.map +1 -0
  142. package/dist/admin/pages/Roles/pages/CreatePage.js +238 -0
  143. package/dist/admin/pages/Roles/pages/CreatePage.js.map +1 -0
  144. package/dist/admin/pages/Roles/pages/CreatePage.mjs +216 -0
  145. package/dist/admin/pages/Roles/pages/CreatePage.mjs.map +1 -0
  146. package/dist/admin/pages/Roles/pages/EditPage.js +239 -0
  147. package/dist/admin/pages/Roles/pages/EditPage.js.map +1 -0
  148. package/dist/admin/pages/Roles/pages/EditPage.mjs +217 -0
  149. package/dist/admin/pages/Roles/pages/EditPage.mjs.map +1 -0
  150. package/dist/admin/pages/Roles/pages/ListPage/components/TableBody.js +125 -0
  151. package/dist/admin/pages/Roles/pages/ListPage/components/TableBody.js.map +1 -0
  152. package/dist/admin/pages/Roles/pages/ListPage/components/TableBody.mjs +123 -0
  153. package/dist/admin/pages/Roles/pages/ListPage/components/TableBody.mjs.map +1 -0
  154. package/dist/admin/pages/Roles/pages/ListPage/index.js +233 -0
  155. package/dist/admin/pages/Roles/pages/ListPage/index.js.map +1 -0
  156. package/dist/admin/pages/Roles/pages/ListPage/index.mjs +230 -0
  157. package/dist/admin/pages/Roles/pages/ListPage/index.mjs.map +1 -0
  158. package/dist/admin/pluginId.js +8 -0
  159. package/dist/admin/pluginId.js.map +1 -0
  160. package/dist/admin/pluginId.mjs +6 -0
  161. package/dist/admin/pluginId.mjs.map +1 -0
  162. package/dist/admin/translations/ar.json.js +45 -0
  163. package/dist/admin/translations/ar.json.js.map +1 -0
  164. package/dist/admin/translations/ar.json.mjs +43 -0
  165. package/dist/admin/translations/ar.json.mjs.map +1 -0
  166. package/dist/admin/translations/cs.json.js +51 -0
  167. package/dist/admin/translations/cs.json.js.map +1 -0
  168. package/dist/admin/translations/cs.json.mjs +49 -0
  169. package/dist/admin/translations/cs.json.mjs.map +1 -0
  170. package/dist/admin/translations/de.json.js +63 -0
  171. package/dist/admin/translations/de.json.js.map +1 -0
  172. package/dist/admin/translations/de.json.mjs +61 -0
  173. package/dist/admin/translations/de.json.mjs.map +1 -0
  174. package/dist/admin/translations/dk.json.js +87 -0
  175. package/dist/admin/translations/dk.json.js.map +1 -0
  176. package/dist/admin/translations/dk.json.mjs +85 -0
  177. package/dist/admin/translations/dk.json.mjs.map +1 -0
  178. package/dist/admin/translations/en.json.js +88 -0
  179. package/dist/admin/translations/en.json.js.map +1 -0
  180. package/dist/admin/translations/en.json.mjs +86 -0
  181. package/dist/admin/translations/en.json.mjs.map +1 -0
  182. package/dist/admin/translations/es.json.js +87 -0
  183. package/dist/admin/translations/es.json.js.map +1 -0
  184. package/dist/admin/translations/es.json.mjs +85 -0
  185. package/dist/admin/translations/es.json.mjs.map +1 -0
  186. package/dist/admin/translations/fr.json.js +51 -0
  187. package/dist/admin/translations/fr.json.js.map +1 -0
  188. package/dist/admin/translations/fr.json.mjs +49 -0
  189. package/dist/admin/translations/fr.json.mjs.map +1 -0
  190. package/dist/admin/translations/id.json.js +63 -0
  191. package/dist/admin/translations/id.json.js.map +1 -0
  192. package/dist/admin/translations/id.json.mjs +61 -0
  193. package/dist/admin/translations/id.json.mjs.map +1 -0
  194. package/dist/admin/translations/it.json.js +63 -0
  195. package/dist/admin/translations/it.json.js.map +1 -0
  196. package/dist/admin/translations/it.json.mjs +61 -0
  197. package/dist/admin/translations/it.json.mjs.map +1 -0
  198. package/dist/admin/translations/ja.json.js +49 -0
  199. package/dist/admin/translations/ja.json.js.map +1 -0
  200. package/dist/admin/translations/ja.json.mjs +47 -0
  201. package/dist/admin/translations/ja.json.mjs.map +1 -0
  202. package/dist/admin/translations/ko.json.js +87 -0
  203. package/dist/admin/translations/ko.json.js.map +1 -0
  204. package/dist/admin/translations/ko.json.mjs +85 -0
  205. package/dist/admin/translations/ko.json.mjs.map +1 -0
  206. package/dist/admin/translations/ms.json.js +50 -0
  207. package/dist/admin/translations/ms.json.js.map +1 -0
  208. package/dist/admin/translations/ms.json.mjs +48 -0
  209. package/dist/admin/translations/ms.json.mjs.map +1 -0
  210. package/dist/admin/translations/nl.json.js +49 -0
  211. package/dist/admin/translations/nl.json.js.map +1 -0
  212. package/dist/admin/translations/nl.json.mjs +47 -0
  213. package/dist/admin/translations/nl.json.mjs.map +1 -0
  214. package/dist/admin/translations/pl.json.js +87 -0
  215. package/dist/admin/translations/pl.json.js.map +1 -0
  216. package/dist/admin/translations/pl.json.mjs +85 -0
  217. package/dist/admin/translations/pl.json.mjs.map +1 -0
  218. package/dist/admin/translations/pt-BR.json.js +45 -0
  219. package/dist/admin/translations/pt-BR.json.js.map +1 -0
  220. package/dist/admin/translations/pt-BR.json.mjs +43 -0
  221. package/dist/admin/translations/pt-BR.json.mjs.map +1 -0
  222. package/dist/admin/translations/pt.json.js +49 -0
  223. package/dist/admin/translations/pt.json.js.map +1 -0
  224. package/dist/admin/translations/pt.json.mjs +47 -0
  225. package/dist/admin/translations/pt.json.mjs.map +1 -0
  226. package/dist/admin/translations/ru.json.js +87 -0
  227. package/dist/admin/translations/ru.json.js.map +1 -0
  228. package/dist/admin/translations/ru.json.mjs +85 -0
  229. package/dist/admin/translations/ru.json.mjs.map +1 -0
  230. package/dist/admin/translations/sk.json.js +51 -0
  231. package/dist/admin/translations/sk.json.js.map +1 -0
  232. package/dist/admin/translations/sk.json.mjs +49 -0
  233. package/dist/admin/translations/sk.json.mjs.map +1 -0
  234. package/dist/admin/translations/sv.json.js +87 -0
  235. package/dist/admin/translations/sv.json.js.map +1 -0
  236. package/dist/admin/translations/sv.json.mjs +85 -0
  237. package/dist/admin/translations/sv.json.mjs.map +1 -0
  238. package/dist/admin/translations/th.json.js +61 -0
  239. package/dist/admin/translations/th.json.js.map +1 -0
  240. package/dist/admin/translations/th.json.mjs +59 -0
  241. package/dist/admin/translations/th.json.mjs.map +1 -0
  242. package/dist/admin/translations/tr.json.js +86 -0
  243. package/dist/admin/translations/tr.json.js.map +1 -0
  244. package/dist/admin/translations/tr.json.mjs +84 -0
  245. package/dist/admin/translations/tr.json.mjs.map +1 -0
  246. package/dist/admin/translations/uk.json.js +87 -0
  247. package/dist/admin/translations/uk.json.js.map +1 -0
  248. package/dist/admin/translations/uk.json.mjs +85 -0
  249. package/dist/admin/translations/uk.json.mjs.map +1 -0
  250. package/dist/admin/translations/vi.json.js +51 -0
  251. package/dist/admin/translations/vi.json.js.map +1 -0
  252. package/dist/admin/translations/vi.json.mjs +49 -0
  253. package/dist/admin/translations/vi.json.mjs.map +1 -0
  254. package/dist/admin/translations/zh-Hans.json.js +87 -0
  255. package/dist/admin/translations/zh-Hans.json.js.map +1 -0
  256. package/dist/admin/translations/zh-Hans.json.mjs +85 -0
  257. package/dist/admin/translations/zh-Hans.json.mjs.map +1 -0
  258. package/dist/admin/translations/zh.json.js +87 -0
  259. package/dist/admin/translations/zh.json.js.map +1 -0
  260. package/dist/admin/translations/zh.json.mjs +85 -0
  261. package/dist/admin/translations/zh.json.mjs.map +1 -0
  262. package/dist/admin/utils/cleanPermissions.js +24 -0
  263. package/dist/admin/utils/cleanPermissions.js.map +1 -0
  264. package/dist/admin/utils/cleanPermissions.mjs +22 -0
  265. package/dist/admin/utils/cleanPermissions.mjs.map +1 -0
  266. package/dist/admin/utils/formatPluginName.js +29 -0
  267. package/dist/admin/utils/formatPluginName.js.map +1 -0
  268. package/dist/admin/utils/formatPluginName.mjs +27 -0
  269. package/dist/admin/utils/formatPluginName.mjs.map +1 -0
  270. package/dist/admin/utils/getTrad.js +8 -0
  271. package/dist/admin/utils/getTrad.js.map +1 -0
  272. package/dist/admin/utils/getTrad.mjs +6 -0
  273. package/dist/admin/utils/getTrad.mjs.map +1 -0
  274. package/dist/admin/utils/prefixPluginTranslations.js +11 -0
  275. package/dist/admin/utils/prefixPluginTranslations.js.map +1 -0
  276. package/dist/admin/utils/prefixPluginTranslations.mjs +9 -0
  277. package/dist/admin/utils/prefixPluginTranslations.mjs.map +1 -0
  278. package/dist/server/_virtual/_commonjsHelpers.js +8 -0
  279. package/dist/server/_virtual/_commonjsHelpers.js.map +1 -0
  280. package/dist/server/_virtual/_commonjsHelpers.mjs +6 -0
  281. package/dist/server/_virtual/_commonjsHelpers.mjs.map +1 -0
  282. package/dist/server/bootstrap/index.js +166 -0
  283. package/dist/server/bootstrap/index.js.map +1 -0
  284. package/dist/server/bootstrap/index.mjs +164 -0
  285. package/dist/server/bootstrap/index.mjs.map +1 -0
  286. package/dist/server/bootstrap/users-permissions-actions.js +98 -0
  287. package/dist/server/bootstrap/users-permissions-actions.js.map +1 -0
  288. package/dist/server/bootstrap/users-permissions-actions.mjs +96 -0
  289. package/dist/server/bootstrap/users-permissions-actions.mjs.map +1 -0
  290. package/dist/server/config.js +70 -0
  291. package/dist/server/config.js.map +1 -0
  292. package/dist/server/config.mjs +68 -0
  293. package/dist/server/config.mjs.map +1 -0
  294. package/dist/server/content-types/index.js +30 -0
  295. package/dist/server/content-types/index.js.map +1 -0
  296. package/dist/server/content-types/index.mjs +28 -0
  297. package/dist/server/content-types/index.mjs.map +1 -0
  298. package/dist/server/content-types/permission/index.js +44 -0
  299. package/dist/server/content-types/permission/index.js.map +1 -0
  300. package/dist/server/content-types/permission/index.mjs +42 -0
  301. package/dist/server/content-types/permission/index.mjs.map +1 -0
  302. package/dist/server/content-types/role/index.js +61 -0
  303. package/dist/server/content-types/role/index.js.map +1 -0
  304. package/dist/server/content-types/role/index.mjs +59 -0
  305. package/dist/server/content-types/role/index.mjs.map +1 -0
  306. package/dist/server/content-types/user/index.js +84 -0
  307. package/dist/server/content-types/user/index.js.map +1 -0
  308. package/dist/server/content-types/user/index.mjs +82 -0
  309. package/dist/server/content-types/user/index.mjs.map +1 -0
  310. package/dist/server/content-types/user/schema-config.js +25 -0
  311. package/dist/server/content-types/user/schema-config.js.map +1 -0
  312. package/dist/server/content-types/user/schema-config.mjs +23 -0
  313. package/dist/server/content-types/user/schema-config.mjs.map +1 -0
  314. package/dist/server/controllers/auth.js +630 -0
  315. package/dist/server/controllers/auth.js.map +1 -0
  316. package/dist/server/controllers/auth.mjs +628 -0
  317. package/dist/server/controllers/auth.mjs.map +1 -0
  318. package/dist/server/controllers/content-manager-user.js +168 -0
  319. package/dist/server/controllers/content-manager-user.js.map +1 -0
  320. package/dist/server/controllers/content-manager-user.mjs +166 -0
  321. package/dist/server/controllers/content-manager-user.mjs.map +1 -0
  322. package/dist/server/controllers/index.js +33 -0
  323. package/dist/server/controllers/index.js.map +1 -0
  324. package/dist/server/controllers/index.mjs +31 -0
  325. package/dist/server/controllers/index.mjs.map +1 -0
  326. package/dist/server/controllers/permissions.js +37 -0
  327. package/dist/server/controllers/permissions.js.map +1 -0
  328. package/dist/server/controllers/permissions.mjs +35 -0
  329. package/dist/server/controllers/permissions.mjs.map +1 -0
  330. package/dist/server/controllers/role.js +91 -0
  331. package/dist/server/controllers/role.js.map +1 -0
  332. package/dist/server/controllers/role.mjs +89 -0
  333. package/dist/server/controllers/role.mjs.map +1 -0
  334. package/dist/server/controllers/settings.js +107 -0
  335. package/dist/server/controllers/settings.js.map +1 -0
  336. package/dist/server/controllers/settings.mjs +105 -0
  337. package/dist/server/controllers/settings.mjs.map +1 -0
  338. package/dist/server/controllers/user.js +201 -0
  339. package/dist/server/controllers/user.js.map +1 -0
  340. package/dist/server/controllers/user.mjs +199 -0
  341. package/dist/server/controllers/user.mjs.map +1 -0
  342. package/dist/server/controllers/validation/auth.js +131 -0
  343. package/dist/server/controllers/validation/auth.js.map +1 -0
  344. package/dist/server/controllers/validation/auth.mjs +129 -0
  345. package/dist/server/controllers/validation/auth.mjs.map +1 -0
  346. package/dist/server/controllers/validation/email-template.js +72 -0
  347. package/dist/server/controllers/validation/email-template.js.map +1 -0
  348. package/dist/server/controllers/validation/email-template.mjs +70 -0
  349. package/dist/server/controllers/validation/email-template.mjs.map +1 -0
  350. package/dist/server/controllers/validation/user.js +54 -0
  351. package/dist/server/controllers/validation/user.js.map +1 -0
  352. package/dist/server/controllers/validation/user.mjs +52 -0
  353. package/dist/server/controllers/validation/user.mjs.map +1 -0
  354. package/dist/server/graphql/index.js +66 -0
  355. package/dist/server/graphql/index.js.map +1 -0
  356. package/dist/server/graphql/index.mjs +64 -0
  357. package/dist/server/graphql/index.mjs.map +1 -0
  358. package/dist/server/graphql/mutations/auth/change-password.js +40 -0
  359. package/dist/server/graphql/mutations/auth/change-password.js.map +1 -0
  360. package/dist/server/graphql/mutations/auth/change-password.mjs +38 -0
  361. package/dist/server/graphql/mutations/auth/change-password.mjs.map +1 -0
  362. package/dist/server/graphql/mutations/auth/email-confirmation.js +38 -0
  363. package/dist/server/graphql/mutations/auth/email-confirmation.js.map +1 -0
  364. package/dist/server/graphql/mutations/auth/email-confirmation.mjs +36 -0
  365. package/dist/server/graphql/mutations/auth/email-confirmation.mjs.map +1 -0
  366. package/dist/server/graphql/mutations/auth/forgot-password.js +37 -0
  367. package/dist/server/graphql/mutations/auth/forgot-password.js.map +1 -0
  368. package/dist/server/graphql/mutations/auth/forgot-password.mjs +35 -0
  369. package/dist/server/graphql/mutations/auth/forgot-password.mjs.map +1 -0
  370. package/dist/server/graphql/mutations/auth/login.js +40 -0
  371. package/dist/server/graphql/mutations/auth/login.js.map +1 -0
  372. package/dist/server/graphql/mutations/auth/login.mjs +38 -0
  373. package/dist/server/graphql/mutations/auth/login.mjs.map +1 -0
  374. package/dist/server/graphql/mutations/auth/register.js +38 -0
  375. package/dist/server/graphql/mutations/auth/register.js.map +1 -0
  376. package/dist/server/graphql/mutations/auth/register.mjs +36 -0
  377. package/dist/server/graphql/mutations/auth/register.mjs.map +1 -0
  378. package/dist/server/graphql/mutations/auth/reset-password.js +40 -0
  379. package/dist/server/graphql/mutations/auth/reset-password.js.map +1 -0
  380. package/dist/server/graphql/mutations/auth/reset-password.mjs +38 -0
  381. package/dist/server/graphql/mutations/auth/reset-password.mjs.map +1 -0
  382. package/dist/server/graphql/mutations/crud/role/create-role.js +37 -0
  383. package/dist/server/graphql/mutations/crud/role/create-role.js.map +1 -0
  384. package/dist/server/graphql/mutations/crud/role/create-role.mjs +35 -0
  385. package/dist/server/graphql/mutations/crud/role/create-role.mjs.map +1 -0
  386. package/dist/server/graphql/mutations/crud/role/delete-role.js +32 -0
  387. package/dist/server/graphql/mutations/crud/role/delete-role.js.map +1 -0
  388. package/dist/server/graphql/mutations/crud/role/delete-role.mjs +30 -0
  389. package/dist/server/graphql/mutations/crud/role/delete-role.mjs.map +1 -0
  390. package/dist/server/graphql/mutations/crud/role/update-role.js +39 -0
  391. package/dist/server/graphql/mutations/crud/role/update-role.js.map +1 -0
  392. package/dist/server/graphql/mutations/crud/role/update-role.mjs +37 -0
  393. package/dist/server/graphql/mutations/crud/role/update-role.mjs.map +1 -0
  394. package/dist/server/graphql/mutations/crud/user/create-user.js +46 -0
  395. package/dist/server/graphql/mutations/crud/user/create-user.js.map +1 -0
  396. package/dist/server/graphql/mutations/crud/user/create-user.mjs +44 -0
  397. package/dist/server/graphql/mutations/crud/user/create-user.mjs.map +1 -0
  398. package/dist/server/graphql/mutations/crud/user/delete-user.js +44 -0
  399. package/dist/server/graphql/mutations/crud/user/delete-user.js.map +1 -0
  400. package/dist/server/graphql/mutations/crud/user/delete-user.mjs +42 -0
  401. package/dist/server/graphql/mutations/crud/user/delete-user.mjs.map +1 -0
  402. package/dist/server/graphql/mutations/crud/user/update-user.js +49 -0
  403. package/dist/server/graphql/mutations/crud/user/update-user.js.map +1 -0
  404. package/dist/server/graphql/mutations/crud/user/update-user.mjs +47 -0
  405. package/dist/server/graphql/mutations/crud/user/update-user.mjs.map +1 -0
  406. package/dist/server/graphql/mutations/index.js +58 -0
  407. package/dist/server/graphql/mutations/index.js.map +1 -0
  408. package/dist/server/graphql/mutations/index.mjs +56 -0
  409. package/dist/server/graphql/mutations/index.mjs.map +1 -0
  410. package/dist/server/graphql/queries/index.js +25 -0
  411. package/dist/server/graphql/queries/index.js.map +1 -0
  412. package/dist/server/graphql/queries/index.mjs +23 -0
  413. package/dist/server/graphql/queries/index.mjs.map +1 -0
  414. package/dist/server/graphql/queries/me.js +23 -0
  415. package/dist/server/graphql/queries/me.js.map +1 -0
  416. package/dist/server/graphql/queries/me.mjs +21 -0
  417. package/dist/server/graphql/queries/me.mjs.map +1 -0
  418. package/dist/server/graphql/resolvers-configs.js +93 -0
  419. package/dist/server/graphql/resolvers-configs.js.map +1 -0
  420. package/dist/server/graphql/resolvers-configs.mjs +91 -0
  421. package/dist/server/graphql/resolvers-configs.mjs.map +1 -0
  422. package/dist/server/graphql/types/create-role-payload.js +20 -0
  423. package/dist/server/graphql/types/create-role-payload.js.map +1 -0
  424. package/dist/server/graphql/types/create-role-payload.mjs +18 -0
  425. package/dist/server/graphql/types/create-role-payload.mjs.map +1 -0
  426. package/dist/server/graphql/types/delete-role-payload.js +20 -0
  427. package/dist/server/graphql/types/delete-role-payload.js.map +1 -0
  428. package/dist/server/graphql/types/delete-role-payload.mjs +18 -0
  429. package/dist/server/graphql/types/delete-role-payload.mjs.map +1 -0
  430. package/dist/server/graphql/types/index.js +41 -0
  431. package/dist/server/graphql/types/index.js.map +1 -0
  432. package/dist/server/graphql/types/index.mjs +39 -0
  433. package/dist/server/graphql/types/index.mjs.map +1 -0
  434. package/dist/server/graphql/types/login-input.js +24 -0
  435. package/dist/server/graphql/types/login-input.js.map +1 -0
  436. package/dist/server/graphql/types/login-input.mjs +22 -0
  437. package/dist/server/graphql/types/login-input.mjs.map +1 -0
  438. package/dist/server/graphql/types/login-payload.js +23 -0
  439. package/dist/server/graphql/types/login-payload.js.map +1 -0
  440. package/dist/server/graphql/types/login-payload.mjs +21 -0
  441. package/dist/server/graphql/types/login-payload.mjs.map +1 -0
  442. package/dist/server/graphql/types/me-role.js +23 -0
  443. package/dist/server/graphql/types/me-role.js.map +1 -0
  444. package/dist/server/graphql/types/me-role.mjs +21 -0
  445. package/dist/server/graphql/types/me-role.mjs.map +1 -0
  446. package/dist/server/graphql/types/me.js +28 -0
  447. package/dist/server/graphql/types/me.js.map +1 -0
  448. package/dist/server/graphql/types/me.mjs +26 -0
  449. package/dist/server/graphql/types/me.mjs.map +1 -0
  450. package/dist/server/graphql/types/password-payload.js +20 -0
  451. package/dist/server/graphql/types/password-payload.js.map +1 -0
  452. package/dist/server/graphql/types/password-payload.mjs +18 -0
  453. package/dist/server/graphql/types/password-payload.mjs.map +1 -0
  454. package/dist/server/graphql/types/register-input.js +22 -0
  455. package/dist/server/graphql/types/register-input.js.map +1 -0
  456. package/dist/server/graphql/types/register-input.mjs +20 -0
  457. package/dist/server/graphql/types/register-input.mjs.map +1 -0
  458. package/dist/server/graphql/types/update-role-payload.js +20 -0
  459. package/dist/server/graphql/types/update-role-payload.js.map +1 -0
  460. package/dist/server/graphql/types/update-role-payload.mjs +18 -0
  461. package/dist/server/graphql/types/update-role-payload.mjs.map +1 -0
  462. package/dist/server/graphql/types/user-input.js +26 -0
  463. package/dist/server/graphql/types/user-input.js.map +1 -0
  464. package/dist/server/graphql/types/user-input.mjs +24 -0
  465. package/dist/server/graphql/types/user-input.mjs.map +1 -0
  466. package/dist/server/graphql/utils.js +32 -0
  467. package/dist/server/graphql/utils.js.map +1 -0
  468. package/dist/server/graphql/utils.mjs +30 -0
  469. package/dist/server/graphql/utils.mjs.map +1 -0
  470. package/dist/server/index.js +10 -0
  471. package/dist/server/index.js.map +1 -0
  472. package/dist/server/index.mjs +8 -0
  473. package/dist/server/index.mjs.map +1 -0
  474. package/dist/server/index2.js +39 -0
  475. package/dist/server/index2.js.map +1 -0
  476. package/dist/server/index2.mjs +37 -0
  477. package/dist/server/index2.mjs.map +1 -0
  478. package/dist/server/middlewares/index.js +18 -0
  479. package/dist/server/middlewares/index.js.map +1 -0
  480. package/dist/server/middlewares/index.mjs +16 -0
  481. package/dist/server/middlewares/index.mjs.map +1 -0
  482. package/dist/server/middlewares/rateLimit.js +51 -0
  483. package/dist/server/middlewares/rateLimit.js.map +1 -0
  484. package/dist/server/middlewares/rateLimit.mjs +49 -0
  485. package/dist/server/middlewares/rateLimit.mjs.map +1 -0
  486. package/dist/server/register.js +41 -0
  487. package/dist/server/register.js.map +1 -0
  488. package/dist/server/register.mjs +39 -0
  489. package/dist/server/register.mjs.map +1 -0
  490. package/dist/server/routes/admin/index.js +27 -0
  491. package/dist/server/routes/admin/index.js.map +1 -0
  492. package/dist/server/routes/admin/index.mjs +25 -0
  493. package/dist/server/routes/admin/index.mjs.map +1 -0
  494. package/dist/server/routes/admin/permissions.js +29 -0
  495. package/dist/server/routes/admin/permissions.js.map +1 -0
  496. package/dist/server/routes/admin/permissions.mjs +27 -0
  497. package/dist/server/routes/admin/permissions.mjs.map +1 -0
  498. package/dist/server/routes/admin/role.js +99 -0
  499. package/dist/server/routes/admin/role.js.map +1 -0
  500. package/dist/server/routes/admin/role.mjs +97 -0
  501. package/dist/server/routes/admin/role.mjs.map +1 -0
  502. package/dist/server/routes/admin/settings.js +116 -0
  503. package/dist/server/routes/admin/settings.js.map +1 -0
  504. package/dist/server/routes/admin/settings.mjs +114 -0
  505. package/dist/server/routes/admin/settings.mjs.map +1 -0
  506. package/dist/server/routes/content-api/auth.js +168 -0
  507. package/dist/server/routes/content-api/auth.js.map +1 -0
  508. package/dist/server/routes/content-api/auth.mjs +166 -0
  509. package/dist/server/routes/content-api/auth.mjs.map +1 -0
  510. package/dist/server/routes/content-api/index.js +32 -0
  511. package/dist/server/routes/content-api/index.js.map +1 -0
  512. package/dist/server/routes/content-api/index.mjs +30 -0
  513. package/dist/server/routes/content-api/index.mjs.map +1 -0
  514. package/dist/server/routes/content-api/permissions.js +26 -0
  515. package/dist/server/routes/content-api/permissions.js.map +1 -0
  516. package/dist/server/routes/content-api/permissions.mjs +24 -0
  517. package/dist/server/routes/content-api/permissions.mjs.map +1 -0
  518. package/dist/server/routes/content-api/role.js +73 -0
  519. package/dist/server/routes/content-api/role.js.map +1 -0
  520. package/dist/server/routes/content-api/role.mjs +71 -0
  521. package/dist/server/routes/content-api/role.mjs.map +1 -0
  522. package/dist/server/routes/content-api/user.js +132 -0
  523. package/dist/server/routes/content-api/user.js.map +1 -0
  524. package/dist/server/routes/content-api/user.mjs +130 -0
  525. package/dist/server/routes/content-api/user.mjs.map +1 -0
  526. package/dist/server/routes/content-api/validation.js +217 -0
  527. package/dist/server/routes/content-api/validation.js.map +1 -0
  528. package/dist/server/routes/content-api/validation.mjs +215 -0
  529. package/dist/server/routes/content-api/validation.mjs.map +1 -0
  530. package/dist/server/routes/index.js +19 -0
  531. package/dist/server/routes/index.js.map +1 -0
  532. package/dist/server/routes/index.mjs +17 -0
  533. package/dist/server/routes/index.mjs.map +1 -0
  534. package/dist/server/services/constants.js +19 -0
  535. package/dist/server/services/constants.js.map +1 -0
  536. package/dist/server/services/constants.mjs +17 -0
  537. package/dist/server/services/constants.mjs.map +1 -0
  538. package/dist/server/services/index.js +36 -0
  539. package/dist/server/services/index.js.map +1 -0
  540. package/dist/server/services/index.mjs +34 -0
  541. package/dist/server/services/index.mjs.map +1 -0
  542. package/dist/server/services/jwt.js +93 -0
  543. package/dist/server/services/jwt.js.map +1 -0
  544. package/dist/server/services/jwt.mjs +91 -0
  545. package/dist/server/services/jwt.mjs.map +1 -0
  546. package/dist/server/services/permission.js +52 -0
  547. package/dist/server/services/permission.js.map +1 -0
  548. package/dist/server/services/permission.mjs +50 -0
  549. package/dist/server/services/permission.mjs.map +1 -0
  550. package/dist/server/services/providers-registry.js +555 -0
  551. package/dist/server/services/providers-registry.js.map +1 -0
  552. package/dist/server/services/providers-registry.mjs +553 -0
  553. package/dist/server/services/providers-registry.mjs.map +1 -0
  554. package/dist/server/services/providers.js +111 -0
  555. package/dist/server/services/providers.js.map +1 -0
  556. package/dist/server/services/providers.mjs +109 -0
  557. package/dist/server/services/providers.mjs.map +1 -0
  558. package/dist/server/services/role.js +186 -0
  559. package/dist/server/services/role.js.map +1 -0
  560. package/dist/server/services/role.mjs +184 -0
  561. package/dist/server/services/role.mjs.map +1 -0
  562. package/dist/server/services/user.js +188 -0
  563. package/dist/server/services/user.js.map +1 -0
  564. package/dist/server/services/user.mjs +186 -0
  565. package/dist/server/services/user.mjs.map +1 -0
  566. package/dist/server/services/users-permissions.js +256 -0
  567. package/dist/server/services/users-permissions.js.map +1 -0
  568. package/dist/server/services/users-permissions.mjs +254 -0
  569. package/dist/server/services/users-permissions.mjs.map +1 -0
  570. package/dist/server/strategies/users-permissions.js +114 -0
  571. package/dist/server/strategies/users-permissions.js.map +1 -0
  572. package/dist/server/strategies/users-permissions.mjs +112 -0
  573. package/dist/server/strategies/users-permissions.mjs.map +1 -0
  574. package/dist/server/utils/index.js +22 -0
  575. package/dist/server/utils/index.js.map +1 -0
  576. package/dist/server/utils/index.mjs +20 -0
  577. package/dist/server/utils/index.mjs.map +1 -0
  578. package/dist/server/utils/sanitize/index.js +21 -0
  579. package/dist/server/utils/sanitize/index.js.map +1 -0
  580. package/dist/server/utils/sanitize/index.mjs +19 -0
  581. package/dist/server/utils/sanitize/index.mjs.map +1 -0
  582. package/dist/server/utils/sanitize/sanitizers.js +32 -0
  583. package/dist/server/utils/sanitize/sanitizers.js.map +1 -0
  584. package/dist/server/utils/sanitize/sanitizers.mjs +30 -0
  585. package/dist/server/utils/sanitize/sanitizers.mjs.map +1 -0
  586. package/dist/server/utils/sanitize/visitors/index.js +17 -0
  587. package/dist/server/utils/sanitize/visitors/index.js.map +1 -0
  588. package/dist/server/utils/sanitize/visitors/index.mjs +15 -0
  589. package/dist/server/utils/sanitize/visitors/index.mjs.map +1 -0
  590. package/dist/server/utils/sanitize/visitors/remove-user-relation-from-role-entities.js +17 -0
  591. package/dist/server/utils/sanitize/visitors/remove-user-relation-from-role-entities.js.map +1 -0
  592. package/dist/server/utils/sanitize/visitors/remove-user-relation-from-role-entities.mjs +15 -0
  593. package/dist/server/utils/sanitize/visitors/remove-user-relation-from-role-entities.mjs.map +1 -0
  594. package/package.json +21 -20
  595. package/rollup.config.mjs +19 -0
  596. package/server/bootstrap/index.js +31 -0
  597. package/server/config.js +22 -0
  598. package/server/controllers/auth.js +249 -9
  599. package/server/controllers/content-manager-user.js +3 -4
  600. package/server/controllers/validation/auth.js +24 -1
  601. package/server/controllers/validation/user.js +12 -1
  602. package/server/graphql/types/index.js +1 -0
  603. package/server/graphql/types/me.js +1 -0
  604. package/server/graphql/types/user-input.js +20 -0
  605. package/server/register.js +1 -1
  606. package/server/routes/content-api/auth.js +119 -71
  607. package/server/routes/content-api/index.js +11 -4
  608. package/server/routes/content-api/permissions.js +14 -7
  609. package/server/routes/content-api/role.js +57 -27
  610. package/server/routes/content-api/user.js +108 -51
  611. package/server/routes/content-api/validation.js +250 -0
  612. package/server/services/constants.js +9 -0
  613. package/server/services/jwt.js +50 -2
  614. package/server/services/user.js +11 -0
  615. package/server/services/users-permissions.js +6 -2
  616. package/dist/_chunks/ar-BguGUqwK.js +0 -44
  617. package/dist/_chunks/ar-BguGUqwK.js.map +0 -1
  618. package/dist/_chunks/ar-CK8BRRXB.mjs +0 -44
  619. package/dist/_chunks/ar-CK8BRRXB.mjs.map +0 -1
  620. package/dist/_chunks/cs-BVigMk0l.mjs +0 -50
  621. package/dist/_chunks/cs-BVigMk0l.mjs.map +0 -1
  622. package/dist/_chunks/cs-BW8-K_GY.js +0 -50
  623. package/dist/_chunks/cs-BW8-K_GY.js.map +0 -1
  624. package/dist/_chunks/de-BKUdRFI4.mjs +0 -62
  625. package/dist/_chunks/de-BKUdRFI4.mjs.map +0 -1
  626. package/dist/_chunks/de-owXpVluI.js +0 -62
  627. package/dist/_chunks/de-owXpVluI.js.map +0 -1
  628. package/dist/_chunks/dk-BQiTK50l.mjs +0 -86
  629. package/dist/_chunks/dk-BQiTK50l.mjs.map +0 -1
  630. package/dist/_chunks/dk-LXAnbuBk.js +0 -86
  631. package/dist/_chunks/dk-LXAnbuBk.js.map +0 -1
  632. package/dist/_chunks/en-DOHtPf-2.mjs +0 -86
  633. package/dist/_chunks/en-DOHtPf-2.mjs.map +0 -1
  634. package/dist/_chunks/en-MHo5mcsU.js +0 -86
  635. package/dist/_chunks/en-MHo5mcsU.js.map +0 -1
  636. package/dist/_chunks/es-BwLCLXAQ.js +0 -86
  637. package/dist/_chunks/es-BwLCLXAQ.js.map +0 -1
  638. package/dist/_chunks/es-DNgOVMjD.mjs +0 -86
  639. package/dist/_chunks/es-DNgOVMjD.mjs.map +0 -1
  640. package/dist/_chunks/fr-DkgRugiU.mjs +0 -50
  641. package/dist/_chunks/fr-DkgRugiU.mjs.map +0 -1
  642. package/dist/_chunks/fr-DkhpSjjm.js +0 -50
  643. package/dist/_chunks/fr-DkhpSjjm.js.map +0 -1
  644. package/dist/_chunks/id-BTemOeTZ.js +0 -62
  645. package/dist/_chunks/id-BTemOeTZ.js.map +0 -1
  646. package/dist/_chunks/id-BdEsvnaF.mjs +0 -62
  647. package/dist/_chunks/id-BdEsvnaF.mjs.map +0 -1
  648. package/dist/_chunks/index-BH6NqE8I.js +0 -245
  649. package/dist/_chunks/index-BH6NqE8I.js.map +0 -1
  650. package/dist/_chunks/index-C3i__jX-.js +0 -281
  651. package/dist/_chunks/index-C3i__jX-.js.map +0 -1
  652. package/dist/_chunks/index-CFzpNgIL.js +0 -640
  653. package/dist/_chunks/index-CFzpNgIL.js.map +0 -1
  654. package/dist/_chunks/index-CJUWqtrZ.mjs +0 -344
  655. package/dist/_chunks/index-CJUWqtrZ.mjs.map +0 -1
  656. package/dist/_chunks/index-CcWTKtCY.js +0 -366
  657. package/dist/_chunks/index-CcWTKtCY.js.map +0 -1
  658. package/dist/_chunks/index-CnX2wiLY.mjs +0 -1142
  659. package/dist/_chunks/index-CnX2wiLY.mjs.map +0 -1
  660. package/dist/_chunks/index-DUWx-KG9-C1E7ADbJ.mjs +0 -11984
  661. package/dist/_chunks/index-DUWx-KG9-C1E7ADbJ.mjs.map +0 -1
  662. package/dist/_chunks/index-DUWx-KG9-fMZ4nmrb.js +0 -12008
  663. package/dist/_chunks/index-DUWx-KG9-fMZ4nmrb.js.map +0 -1
  664. package/dist/_chunks/index-DruWuFWL.js +0 -1172
  665. package/dist/_chunks/index-DruWuFWL.js.map +0 -1
  666. package/dist/_chunks/index-PJoz36kJ.mjs +0 -262
  667. package/dist/_chunks/index-PJoz36kJ.mjs.map +0 -1
  668. package/dist/_chunks/index-R4R0dEOv.mjs +0 -246
  669. package/dist/_chunks/index-R4R0dEOv.mjs.map +0 -1
  670. package/dist/_chunks/index-XOcQhJMB.mjs +0 -617
  671. package/dist/_chunks/index-XOcQhJMB.mjs.map +0 -1
  672. package/dist/_chunks/it-B-rv0E24.mjs +0 -62
  673. package/dist/_chunks/it-B-rv0E24.mjs.map +0 -1
  674. package/dist/_chunks/it-D1rH6V6_.js +0 -62
  675. package/dist/_chunks/it-D1rH6V6_.js.map +0 -1
  676. package/dist/_chunks/ja-C8K-VBPD.mjs +0 -48
  677. package/dist/_chunks/ja-C8K-VBPD.mjs.map +0 -1
  678. package/dist/_chunks/ja-DqShgTMf.js +0 -48
  679. package/dist/_chunks/ja-DqShgTMf.js.map +0 -1
  680. package/dist/_chunks/ko-B9DGEPWH.js +0 -86
  681. package/dist/_chunks/ko-B9DGEPWH.js.map +0 -1
  682. package/dist/_chunks/ko-Busb0wIY.mjs +0 -86
  683. package/dist/_chunks/ko-Busb0wIY.mjs.map +0 -1
  684. package/dist/_chunks/ms-ByvsQjRt.mjs +0 -49
  685. package/dist/_chunks/ms-ByvsQjRt.mjs.map +0 -1
  686. package/dist/_chunks/ms-CPBU3LWf.js +0 -49
  687. package/dist/_chunks/ms-CPBU3LWf.js.map +0 -1
  688. package/dist/_chunks/nl-5qO8Rpcy.mjs +0 -48
  689. package/dist/_chunks/nl-5qO8Rpcy.mjs.map +0 -1
  690. package/dist/_chunks/nl-CwNB6YoO.js +0 -48
  691. package/dist/_chunks/nl-CwNB6YoO.js.map +0 -1
  692. package/dist/_chunks/pl-BdIzifBE.mjs +0 -86
  693. package/dist/_chunks/pl-BdIzifBE.mjs.map +0 -1
  694. package/dist/_chunks/pl-Do9UD69f.js +0 -86
  695. package/dist/_chunks/pl-Do9UD69f.js.map +0 -1
  696. package/dist/_chunks/pt-BIO24ioG.mjs +0 -48
  697. package/dist/_chunks/pt-BIO24ioG.mjs.map +0 -1
  698. package/dist/_chunks/pt-BR-D7dZhxuP.js +0 -44
  699. package/dist/_chunks/pt-BR-D7dZhxuP.js.map +0 -1
  700. package/dist/_chunks/pt-BR-f0p23AQZ.mjs +0 -44
  701. package/dist/_chunks/pt-BR-f0p23AQZ.mjs.map +0 -1
  702. package/dist/_chunks/pt-fdvyOnUp.js +0 -48
  703. package/dist/_chunks/pt-fdvyOnUp.js.map +0 -1
  704. package/dist/_chunks/ru-C94rjPGA.js +0 -86
  705. package/dist/_chunks/ru-C94rjPGA.js.map +0 -1
  706. package/dist/_chunks/ru-VWy-IB7K.mjs +0 -86
  707. package/dist/_chunks/ru-VWy-IB7K.mjs.map +0 -1
  708. package/dist/_chunks/sk-BABEhykl.js +0 -50
  709. package/dist/_chunks/sk-BABEhykl.js.map +0 -1
  710. package/dist/_chunks/sk-B_LIcepm.mjs +0 -50
  711. package/dist/_chunks/sk-B_LIcepm.mjs.map +0 -1
  712. package/dist/_chunks/sv-ABLKOokl.mjs +0 -86
  713. package/dist/_chunks/sv-ABLKOokl.mjs.map +0 -1
  714. package/dist/_chunks/sv-Be43LhA9.js +0 -86
  715. package/dist/_chunks/sv-Be43LhA9.js.map +0 -1
  716. package/dist/_chunks/th-DKyP7ueR.mjs +0 -60
  717. package/dist/_chunks/th-DKyP7ueR.mjs.map +0 -1
  718. package/dist/_chunks/th-DgVhVLhL.js +0 -60
  719. package/dist/_chunks/th-DgVhVLhL.js.map +0 -1
  720. package/dist/_chunks/tr-B_idhkEs.js +0 -85
  721. package/dist/_chunks/tr-B_idhkEs.js.map +0 -1
  722. package/dist/_chunks/tr-qa1Q5UjC.mjs +0 -85
  723. package/dist/_chunks/tr-qa1Q5UjC.mjs.map +0 -1
  724. package/dist/_chunks/uk-BmRqbeQc.mjs +0 -49
  725. package/dist/_chunks/uk-BmRqbeQc.mjs.map +0 -1
  726. package/dist/_chunks/uk-LHOivnhP.js +0 -49
  727. package/dist/_chunks/uk-LHOivnhP.js.map +0 -1
  728. package/dist/_chunks/vi-CdVRdKDw.js +0 -50
  729. package/dist/_chunks/vi-CdVRdKDw.js.map +0 -1
  730. package/dist/_chunks/vi-HW-EdMea.mjs +0 -50
  731. package/dist/_chunks/vi-HW-EdMea.mjs.map +0 -1
  732. package/dist/_chunks/zh-5hKkVPA4.mjs +0 -86
  733. package/dist/_chunks/zh-5hKkVPA4.mjs.map +0 -1
  734. package/dist/_chunks/zh-Cuq8gMnF.js +0 -86
  735. package/dist/_chunks/zh-Cuq8gMnF.js.map +0 -1
  736. package/dist/_chunks/zh-Hans-BHilK-yc.mjs +0 -86
  737. package/dist/_chunks/zh-Hans-BHilK-yc.mjs.map +0 -1
  738. package/dist/_chunks/zh-Hans-GQDMKtY4.js +0 -86
  739. package/dist/_chunks/zh-Hans-GQDMKtY4.js.map +0 -1
  740. package/packup.config.ts +0 -22
@@ -0,0 +1 @@
1
+ {"version":3,"file":"auth.mjs","sources":["../../../server/controllers/auth.js"],"sourcesContent":["'use strict';\n\n/**\n * Auth.js controller\n *\n * @description: A set of functions called \"actions\" for managing `Auth`.\n */\n\n/* eslint-disable no-useless-escape */\nconst crypto = require('crypto');\nconst _ = require('lodash');\nconst { concat, compact, isArray } = require('lodash/fp');\nconst utils = require('@strapi/utils');\nconst { getService } = require('../utils');\nconst {\n validateCallbackBody,\n validateRegisterBody,\n validateSendEmailConfirmationBody,\n validateForgotPasswordBody,\n validateResetPasswordBody,\n validateEmailConfirmationBody,\n validateChangePasswordBody,\n} = require('./validation/auth');\n\nconst { ApplicationError, ValidationError, ForbiddenError } = utils.errors;\n\nconst sanitizeUser = (user, ctx) => {\n const { auth } = ctx.state;\n const userSchema = strapi.getModel('plugin::users-permissions.user');\n\n return strapi.contentAPI.sanitize.output(user, userSchema, { auth });\n};\n\nconst extractDeviceId = (requestBody) => {\n const { deviceId } = requestBody || {};\n\n return typeof deviceId === 'string' && deviceId.length > 0 ? deviceId : undefined;\n};\n\nmodule.exports = ({ strapi }) => ({\n async callback(ctx) {\n const provider = ctx.params.provider || 'local';\n const params = ctx.request.body;\n\n const store = strapi.store({ type: 'plugin', name: 'users-permissions' });\n const grantSettings = await store.get({ key: 'grant' });\n\n const grantProvider = provider === 'local' ? 'email' : provider;\n\n if (!_.get(grantSettings, [grantProvider, 'enabled'])) {\n throw new ApplicationError('This provider is disabled');\n }\n\n if (provider === 'local') {\n await validateCallbackBody(params);\n\n const { identifier } = params;\n\n // Check if the user exists.\n const user = await strapi.db.query('plugin::users-permissions.user').findOne({\n where: {\n provider,\n $or: [{ email: identifier.toLowerCase() }, { username: identifier }],\n },\n });\n\n if (!user) {\n throw new ValidationError('Invalid identifier or password');\n }\n\n if (!user.password) {\n throw new ValidationError('Invalid identifier or password');\n }\n\n const validPassword = await getService('user').validatePassword(\n params.password,\n user.password\n );\n\n if (!validPassword) {\n throw new ValidationError('Invalid identifier or password');\n }\n\n const advancedSettings = await store.get({ key: 'advanced' });\n const requiresConfirmation = _.get(advancedSettings, 'email_confirmation');\n\n if (requiresConfirmation && user.confirmed !== true) {\n throw new ApplicationError('Your account email is not confirmed');\n }\n\n if (user.blocked === true) {\n throw new ApplicationError('Your account has been blocked by an administrator');\n }\n\n const mode = strapi.config.get('plugin::users-permissions.jwtManagement', 'legacy-support');\n if (mode === 'refresh') {\n const deviceId = extractDeviceId(ctx.request.body);\n\n const refresh = await strapi\n .sessionManager('users-permissions')\n .generateRefreshToken(String(user.id), deviceId, { type: 'refresh' });\n\n const access = await strapi\n .sessionManager('users-permissions')\n .generateAccessToken(refresh.token);\n if ('error' in access) {\n throw new ApplicationError('Invalid credentials');\n }\n\n const upSessions = strapi.config.get('plugin::users-permissions.sessions');\n const requestHttpOnly = ctx.request.header['x-strapi-refresh-cookie'] === 'httpOnly';\n if (upSessions?.httpOnly || requestHttpOnly) {\n const cookieName = upSessions.cookie?.name || 'strapi_up_refresh';\n const isProduction = process.env.NODE_ENV === 'production';\n const isSecure =\n typeof upSessions.cookie?.secure === 'boolean'\n ? upSessions.cookie?.secure\n : isProduction;\n\n const cookieOptions = {\n httpOnly: true,\n secure: isSecure,\n sameSite: upSessions.cookie?.sameSite ?? 'lax',\n path: upSessions.cookie?.path ?? '/',\n domain: upSessions.cookie?.domain,\n overwrite: true,\n };\n\n ctx.cookies.set(cookieName, refresh.token, cookieOptions);\n return ctx.send({ jwt: access.token, user: await sanitizeUser(user, ctx) });\n }\n\n return ctx.send({\n jwt: access.token,\n refreshToken: refresh.token,\n user: await sanitizeUser(user, ctx),\n });\n }\n\n return ctx.send({\n jwt: getService('jwt').issue({ id: user.id }),\n user: await sanitizeUser(user, ctx),\n });\n }\n\n // Connect the user with the third-party provider.\n try {\n const user = await getService('providers').connect(provider, ctx.query);\n\n if (user.blocked) {\n throw new ForbiddenError('Your account has been blocked by an administrator');\n }\n\n const mode = strapi.config.get('plugin::users-permissions.jwtManagement', 'legacy-support');\n if (mode === 'refresh') {\n const deviceId = extractDeviceId(ctx.request.body);\n\n const refresh = await strapi\n .sessionManager('users-permissions')\n .generateRefreshToken(String(user.id), deviceId, { type: 'refresh' });\n\n const access = await strapi\n .sessionManager('users-permissions')\n .generateAccessToken(refresh.token);\n if ('error' in access) {\n throw new ApplicationError('Invalid credentials');\n }\n\n const upSessions = strapi.config.get('plugin::users-permissions.sessions');\n const requestHttpOnly = ctx.request.header['x-strapi-refresh-cookie'] === 'httpOnly';\n if (upSessions?.httpOnly || requestHttpOnly) {\n const cookieName = upSessions.cookie?.name || 'strapi_up_refresh';\n const isProduction = process.env.NODE_ENV === 'production';\n const isSecure =\n typeof upSessions.cookie?.secure === 'boolean'\n ? upSessions.cookie?.secure\n : isProduction;\n\n const cookieOptions = {\n httpOnly: true,\n secure: isSecure,\n sameSite: upSessions.cookie?.sameSite ?? 'lax',\n path: upSessions.cookie?.path ?? '/',\n domain: upSessions.cookie?.domain,\n overwrite: true,\n };\n ctx.cookies.set(cookieName, refresh.token, cookieOptions);\n return ctx.send({ jwt: access.token, user: await sanitizeUser(user, ctx) });\n }\n return ctx.send({\n jwt: access.token,\n refreshToken: refresh.token,\n user: await sanitizeUser(user, ctx),\n });\n }\n\n return ctx.send({\n jwt: getService('jwt').issue({ id: user.id }),\n user: await sanitizeUser(user, ctx),\n });\n } catch (error) {\n throw new ApplicationError(error.message);\n }\n },\n\n async changePassword(ctx) {\n if (!ctx.state.user) {\n throw new ApplicationError('You must be authenticated to reset your password');\n }\n\n const validations = strapi.config.get('plugin::users-permissions.validationRules');\n\n const { currentPassword, password } = await validateChangePasswordBody(\n ctx.request.body,\n validations\n );\n\n const user = await strapi.db\n .query('plugin::users-permissions.user')\n .findOne({ where: { id: ctx.state.user.id } });\n\n const validPassword = await getService('user').validatePassword(currentPassword, user.password);\n\n if (!validPassword) {\n throw new ValidationError('The provided current password is invalid');\n }\n\n if (currentPassword === password) {\n throw new ValidationError('Your new password must be different than your current password');\n }\n\n await getService('user').edit(user.id, { password });\n\n const mode = strapi.config.get('plugin::users-permissions.jwtManagement', 'legacy-support');\n if (mode === 'refresh') {\n const deviceId = extractDeviceId(ctx.request.body);\n\n if (deviceId) {\n // Invalidate sessions: specific device if deviceId provided\n await strapi\n .sessionManager('users-permissions')\n .invalidateRefreshToken(String(user.id), deviceId);\n }\n\n const newDeviceId = deviceId || crypto.randomUUID();\n const refresh = await strapi\n .sessionManager('users-permissions')\n .generateRefreshToken(String(user.id), newDeviceId, { type: 'refresh' });\n\n const access = await strapi\n .sessionManager('users-permissions')\n .generateAccessToken(refresh.token);\n if ('error' in access) {\n throw new ApplicationError('Invalid credentials');\n }\n\n return ctx.send({\n jwt: access.token,\n refreshToken: refresh.token,\n user: await sanitizeUser(user, ctx),\n });\n }\n\n return ctx.send({\n jwt: getService('jwt').issue({ id: user.id }),\n user: await sanitizeUser(user, ctx),\n });\n },\n\n async resetPassword(ctx) {\n const validations = strapi.config.get('plugin::users-permissions.validationRules');\n\n const { password, passwordConfirmation, code } = await validateResetPasswordBody(\n ctx.request.body,\n validations\n );\n\n if (password !== passwordConfirmation) {\n throw new ValidationError('Passwords do not match');\n }\n\n const user = await strapi.db\n .query('plugin::users-permissions.user')\n .findOne({ where: { resetPasswordToken: code } });\n\n if (!user) {\n throw new ValidationError('Incorrect code provided');\n }\n\n await getService('user').edit(user.id, {\n resetPasswordToken: null,\n password,\n });\n\n const mode = strapi.config.get('plugin::users-permissions.jwtManagement', 'legacy-support');\n if (mode === 'refresh') {\n const deviceId = extractDeviceId(ctx.request.body);\n\n if (deviceId) {\n // Invalidate sessions: specific device if deviceId provided\n await strapi\n .sessionManager('users-permissions')\n .invalidateRefreshToken(String(user.id), deviceId);\n }\n\n const newDeviceId = deviceId || crypto.randomUUID();\n const refresh = await strapi\n .sessionManager('users-permissions')\n .generateRefreshToken(String(user.id), newDeviceId, { type: 'refresh' });\n\n const access = await strapi\n .sessionManager('users-permissions')\n .generateAccessToken(refresh.token);\n if ('error' in access) {\n throw new ApplicationError('Invalid credentials');\n }\n\n return ctx.send({\n jwt: access.token,\n refreshToken: refresh.token,\n user: await sanitizeUser(user, ctx),\n });\n }\n\n return ctx.send({\n jwt: getService('jwt').issue({ id: user.id }),\n user: await sanitizeUser(user, ctx),\n });\n },\n async refresh(ctx) {\n const mode = strapi.config.get('plugin::users-permissions.jwtManagement', 'legacy-support');\n if (mode !== 'refresh') {\n return ctx.notFound();\n }\n\n const { refreshToken } = ctx.request.body || {};\n if (!refreshToken || typeof refreshToken !== 'string') {\n return ctx.badRequest('Missing refresh token');\n }\n\n const rotation = await strapi\n .sessionManager('users-permissions')\n .rotateRefreshToken(refreshToken);\n if ('error' in rotation) {\n return ctx.unauthorized('Invalid refresh token');\n }\n\n const result = await strapi\n .sessionManager('users-permissions')\n .generateAccessToken(rotation.token);\n if ('error' in result) {\n return ctx.unauthorized('Invalid refresh token');\n }\n\n const upSessions = strapi.config.get('plugin::users-permissions.sessions');\n const requestHttpOnly = ctx.request.header['x-strapi-refresh-cookie'] === 'httpOnly';\n if (upSessions?.httpOnly || requestHttpOnly) {\n const cookieName = upSessions.cookie?.name || 'strapi_up_refresh';\n const isProduction = process.env.NODE_ENV === 'production';\n const isSecure =\n typeof upSessions.cookie?.secure === 'boolean' ? upSessions.cookie?.secure : isProduction;\n\n const cookieOptions = {\n httpOnly: true,\n secure: isSecure,\n sameSite: upSessions.cookie?.sameSite ?? 'lax',\n path: upSessions.cookie?.path ?? '/',\n domain: upSessions.cookie?.domain,\n overwrite: true,\n };\n ctx.cookies.set(cookieName, rotation.token, cookieOptions);\n return ctx.send({ jwt: result.token });\n }\n return ctx.send({ jwt: result.token, refreshToken: rotation.token });\n },\n async logout(ctx) {\n const mode = strapi.config.get('plugin::users-permissions.jwtManagement', 'legacy-support');\n if (mode !== 'refresh') {\n return ctx.notFound();\n }\n\n // Invalidate all sessions for the authenticated user, or by deviceId if provided\n if (!ctx.state.user) {\n return ctx.unauthorized('Missing authentication');\n }\n\n const deviceId = extractDeviceId(ctx.request.body);\n try {\n await strapi\n .sessionManager('users-permissions')\n .invalidateRefreshToken(String(ctx.state.user.id), deviceId);\n } catch (err) {\n strapi.log.error('UP logout failed', err);\n }\n\n const upSessions = strapi.config.get('plugin::users-permissions.sessions');\n const requestHttpOnly = ctx.request.header['x-strapi-refresh-cookie'] === 'httpOnly';\n if (upSessions?.httpOnly || requestHttpOnly) {\n const cookieName = upSessions.cookie?.name || 'strapi_up_refresh';\n ctx.cookies.set(cookieName, '', { expires: new Date(0) });\n }\n return ctx.send({ ok: true });\n },\n async connect(ctx, next) {\n const grant = require('grant').koa();\n\n const providers = await strapi\n .store({ type: 'plugin', name: 'users-permissions', key: 'grant' })\n .get();\n\n const apiPrefix = strapi.config.get('api.rest.prefix');\n const grantConfig = {\n defaults: {\n prefix: `${apiPrefix}/connect`,\n },\n ...providers,\n };\n\n const [requestPath] = ctx.request.url.split('?');\n const provider = requestPath.split('/connect/')[1].split('/')[0];\n\n if (!_.get(grantConfig[provider], 'enabled')) {\n throw new ApplicationError('This provider is disabled');\n }\n\n if (!strapi.config.server.url.startsWith('http')) {\n strapi.log.warn(\n 'You are using a third party provider for login. Make sure to set an absolute url in config/server.js. More info here: https://docs.strapi.io/developer-docs/latest/plugins/users-permissions.html#setting-up-the-server-url'\n );\n }\n\n // Ability to pass OAuth callback dynamically\n const queryCustomCallback = _.get(ctx, 'query.callback');\n const dynamicSessionCallback = _.get(ctx, 'session.grant.dynamic.callback');\n\n const customCallback = queryCustomCallback ?? dynamicSessionCallback;\n\n // The custom callback is validated to make sure it's not redirecting to an unwanted actor.\n if (customCallback !== undefined) {\n try {\n // We're extracting the callback validator from the plugin config since it can be user-customized\n const { validate: validateCallback } = strapi\n .plugin('users-permissions')\n .config('callback');\n\n await validateCallback(customCallback, grantConfig[provider]);\n\n grantConfig[provider].callback = customCallback;\n } catch (e) {\n throw new ValidationError('Invalid callback URL provided', { callback: customCallback });\n }\n }\n\n // Build a valid redirect URI for the current provider\n grantConfig[provider].redirect_uri = getService('providers').buildRedirectUri(provider);\n\n return grant(grantConfig)(ctx, next);\n },\n\n async forgotPassword(ctx) {\n const { email } = await validateForgotPasswordBody(ctx.request.body);\n\n const pluginStore = await strapi.store({ type: 'plugin', name: 'users-permissions' });\n\n const emailSettings = await pluginStore.get({ key: 'email' });\n const advancedSettings = await pluginStore.get({ key: 'advanced' });\n\n // Find the user by email.\n const user = await strapi.db\n .query('plugin::users-permissions.user')\n .findOne({ where: { email: email.toLowerCase() } });\n\n if (!user || user.blocked) {\n return ctx.send({ ok: true });\n }\n\n // Generate random token.\n const userInfo = await sanitizeUser(user, ctx);\n\n const resetPasswordToken = crypto.randomBytes(64).toString('hex');\n\n const resetPasswordSettings = _.get(emailSettings, 'reset_password.options', {});\n const emailBody = await getService('users-permissions').template(\n resetPasswordSettings.message,\n {\n URL: advancedSettings.email_reset_password,\n SERVER_URL: strapi.config.get('server.absoluteUrl'),\n ADMIN_URL: strapi.config.get('admin.absoluteUrl'),\n USER: userInfo,\n TOKEN: resetPasswordToken,\n }\n );\n\n const emailObject = await getService('users-permissions').template(\n resetPasswordSettings.object,\n {\n USER: userInfo,\n }\n );\n\n const emailToSend = {\n to: user.email,\n from:\n resetPasswordSettings.from.email || resetPasswordSettings.from.name\n ? `${resetPasswordSettings.from.name} <${resetPasswordSettings.from.email}>`\n : undefined,\n replyTo: resetPasswordSettings.response_email,\n subject: emailObject,\n text: emailBody,\n html: emailBody,\n };\n\n // NOTE: Update the user before sending the email so an Admin can generate the link if the email fails\n await getService('user').edit(user.id, { resetPasswordToken });\n\n // Send an email to the user.\n await strapi.plugin('email').service('email').send(emailToSend);\n\n ctx.send({ ok: true });\n },\n\n async register(ctx) {\n const pluginStore = await strapi.store({ type: 'plugin', name: 'users-permissions' });\n\n const settings = await pluginStore.get({ key: 'advanced' });\n\n if (!settings.allow_register) {\n throw new ApplicationError('Register action is currently disabled');\n }\n\n const { register } = strapi.config.get('plugin::users-permissions');\n const alwaysAllowedKeys = ['username', 'password', 'email'];\n\n // Note that we intentionally do not filter allowedFields to allow a project to explicitly accept private or other Strapi field on registration\n const allowedKeys = compact(\n concat(alwaysAllowedKeys, isArray(register?.allowedFields) ? register.allowedFields : [])\n );\n\n // Check if there are any keys in requestBody that are not in allowedKeys\n const invalidKeys = Object.keys(ctx.request.body).filter((key) => !allowedKeys.includes(key));\n\n if (invalidKeys.length > 0) {\n // If there are invalid keys, throw an error\n throw new ValidationError(`Invalid parameters: ${invalidKeys.join(', ')}`);\n }\n\n const params = {\n ..._.pick(ctx.request.body, allowedKeys),\n provider: 'local',\n };\n\n const validations = strapi.config.get('plugin::users-permissions.validationRules');\n\n await validateRegisterBody(params, validations);\n\n const role = await strapi.db\n .query('plugin::users-permissions.role')\n .findOne({ where: { type: settings.default_role } });\n\n if (!role) {\n throw new ApplicationError('Impossible to find the default role');\n }\n\n const { email, username, provider } = params;\n\n const identifierFilter = {\n $or: [\n { email: email.toLowerCase() },\n { username: email.toLowerCase() },\n { username },\n { email: username },\n ],\n };\n\n const conflictingUserCount = await strapi.db.query('plugin::users-permissions.user').count({\n where: { ...identifierFilter, provider },\n });\n\n if (conflictingUserCount > 0) {\n throw new ApplicationError('Email or Username are already taken');\n }\n\n if (settings.unique_email) {\n const conflictingUserCount = await strapi.db.query('plugin::users-permissions.user').count({\n where: { ...identifierFilter },\n });\n\n if (conflictingUserCount > 0) {\n throw new ApplicationError('Email or Username are already taken');\n }\n }\n\n const newUser = {\n ...params,\n role: role.id,\n email: email.toLowerCase(),\n username,\n confirmed: !settings.email_confirmation,\n };\n\n const user = await getService('user').add(newUser);\n\n const sanitizedUser = await sanitizeUser(user, ctx);\n\n if (settings.email_confirmation) {\n try {\n await getService('user').sendConfirmationEmail(sanitizedUser);\n } catch (err) {\n strapi.log.error(err);\n throw new ApplicationError('Error sending confirmation email');\n }\n\n return ctx.send({ user: sanitizedUser });\n }\n\n const mode = strapi.config.get('plugin::users-permissions.jwtManagement', 'legacy-support');\n if (mode === 'refresh') {\n const deviceId = extractDeviceId(ctx.request.body) || crypto.randomUUID();\n\n const refresh = await strapi\n .sessionManager('users-permissions')\n .generateRefreshToken(String(user.id), deviceId, { type: 'refresh' });\n\n const access = await strapi\n .sessionManager('users-permissions')\n .generateAccessToken(refresh.token);\n if ('error' in access) {\n throw new ApplicationError('Invalid credentials');\n }\n\n return ctx.send({ jwt: access.token, refreshToken: refresh.token, user: sanitizedUser });\n }\n\n const jwt = getService('jwt').issue(_.pick(user, ['id']));\n return ctx.send({ jwt, user: sanitizedUser });\n },\n\n async emailConfirmation(ctx, next, returnUser) {\n const { confirmation: confirmationToken } = await validateEmailConfirmationBody(ctx.query);\n\n const userService = getService('user');\n const jwtService = getService('jwt');\n\n const [user] = await userService.fetchAll({ filters: { confirmationToken } });\n\n if (!user) {\n throw new ValidationError('Invalid token');\n }\n\n await userService.edit(user.id, { confirmed: true, confirmationToken: null });\n\n if (returnUser) {\n ctx.send({\n jwt: jwtService.issue({ id: user.id }),\n user: await sanitizeUser(user, ctx),\n });\n } else {\n const settings = await strapi\n .store({ type: 'plugin', name: 'users-permissions', key: 'advanced' })\n .get();\n\n ctx.redirect(settings.email_confirmation_redirection || '/');\n }\n },\n\n async sendEmailConfirmation(ctx) {\n const { email } = await validateSendEmailConfirmationBody(ctx.request.body);\n\n const user = await strapi.db.query('plugin::users-permissions.user').findOne({\n where: { email: email.toLowerCase() },\n });\n\n if (!user) {\n return ctx.send({ email, sent: true });\n }\n\n if (user.confirmed) {\n throw new ApplicationError('Already confirmed');\n }\n\n if (user.blocked) {\n throw new ApplicationError('User blocked');\n }\n\n await getService('user').sendConfirmationEmail(user);\n\n ctx.send({\n email: user.email,\n sent: true,\n });\n },\n});\n"],"names":["crypto","require$$0","_","require$$1","concat","compact","isArray","require$$2","utils","require$$3","getService","require$$4","validateCallbackBody","validateRegisterBody","validateSendEmailConfirmationBody","validateForgotPasswordBody","validateResetPasswordBody","validateEmailConfirmationBody","validateChangePasswordBody","require$$5","ApplicationError","ValidationError","ForbiddenError","errors","sanitizeUser","user","ctx","auth","state","userSchema","strapi","getModel","contentAPI","sanitize","output","extractDeviceId","requestBody","deviceId","length","undefined","callback","provider","params","request","body","store","type","name","grantSettings","get","key","grantProvider","identifier","db","query","findOne","where","$or","email","toLowerCase","username","password","validPassword","validatePassword","advancedSettings","requiresConfirmation","confirmed","blocked","mode","config","refresh","sessionManager","generateRefreshToken","String","id","access","generateAccessToken","token","upSessions","requestHttpOnly","header","httpOnly","cookieName","cookie","isProduction","process","env","NODE_ENV","isSecure","secure","cookieOptions","sameSite","path","domain","overwrite","cookies","set","send","jwt","refreshToken","issue","connect","error","message","changePassword","validations","currentPassword","edit","invalidateRefreshToken","newDeviceId","randomUUID","resetPassword","passwordConfirmation","code","resetPasswordToken","notFound","badRequest","rotation","rotateRefreshToken","unauthorized","result","logout","err","log","expires","Date","ok","next","grant","require$$6","koa","providers","apiPrefix","grantConfig","defaults","prefix","requestPath","url","split","server","startsWith","warn","queryCustomCallback","dynamicSessionCallback","customCallback","validate","validateCallback","plugin","e","redirect_uri","buildRedirectUri","forgotPassword","pluginStore","emailSettings","userInfo","randomBytes","toString","resetPasswordSettings","emailBody","template","URL","email_reset_password","SERVER_URL","ADMIN_URL","USER","TOKEN","emailObject","object","emailToSend","to","from","replyTo","response_email","subject","text","html","service","register","settings","allow_register","alwaysAllowedKeys","allowedKeys","allowedFields","invalidKeys","Object","keys","filter","includes","join","pick","role","default_role","identifierFilter","conflictingUserCount","count","unique_email","newUser","email_confirmation","add","sanitizedUser","sendConfirmationEmail","emailConfirmation","returnUser","confirmation","confirmationToken","userService","jwtService","fetchAll","filters","redirect","email_confirmation_redirection","sendEmailConfirmation","sent"],"mappings":";;;;;;;;;;;;;AAEA;;;;4CAOA,MAAMA,MAASC,GAAAA,UAAAA;AACf,IAAA,MAAMC,CAAIC,GAAAA,YAAAA;AACV,IAAA,MAAM,EAAEC,MAAM,EAAEC,OAAO,EAAEC,OAAO,EAAE,GAAGC,YAAAA;AACrC,IAAA,MAAMC,KAAQC,GAAAA,UAAAA;IACd,MAAM,EAAEC,UAAU,EAAE,GAAGC,YAAAA,EAAAA;AACvB,IAAA,MAAM,EACJC,oBAAoB,EACpBC,oBAAoB,EACpBC,iCAAiC,EACjCC,0BAA0B,EAC1BC,yBAAyB,EACzBC,6BAA6B,EAC7BC,0BAA0B,EAC3B,GAAGC,aAAAA,EAAAA;IAEJ,MAAM,EAAEC,gBAAgB,EAAEC,eAAe,EAAEC,cAAc,EAAE,GAAGd,KAAAA,CAAMe,MAAM;IAE1E,MAAMC,YAAAA,GAAe,CAACC,IAAMC,EAAAA,GAAAA,GAAAA;AAC1B,QAAA,MAAM,EAAEC,IAAI,EAAE,GAAGD,IAAIE,KAAK;QAC1B,MAAMC,UAAAA,GAAaC,MAAOC,CAAAA,QAAQ,CAAC,gCAAA,CAAA;QAEnC,OAAOD,MAAAA,CAAOE,UAAU,CAACC,QAAQ,CAACC,MAAM,CAACT,MAAMI,UAAY,EAAA;AAAEF,YAAAA;AAAI,SAAA,CAAA;AACnE,KAAA;AAEA,IAAA,MAAMQ,kBAAkB,CAACC,WAAAA,GAAAA;AACvB,QAAA,MAAM,EAAEC,QAAQ,EAAE,GAAGD,eAAe;AAEpC,QAAA,OAAO,OAAOC,QAAa,KAAA,QAAA,IAAYA,SAASC,MAAM,GAAG,IAAID,QAAWE,GAAAA,SAAAA;AAC1E,KAAA;AAEAZ,IAAAA,IAAAA,GAAiB,CAAC,EAAEG,MAAAA,EAAAA,OAAM,EAAE,IAAM;AAChC,YAAA,MAAMU,UAASd,GAAG,EAAA;AAChB,gBAAA,MAAMe,QAAWf,GAAAA,GAAAA,CAAIgB,MAAM,CAACD,QAAQ,IAAI,OAAA;AACxC,gBAAA,MAAMC,MAAShB,GAAAA,GAAAA,CAAIiB,OAAO,CAACC,IAAI;gBAE/B,MAAMC,KAAAA,GAAQf,OAAOe,CAAAA,KAAK,CAAC;oBAAEC,IAAM,EAAA,QAAA;oBAAUC,IAAM,EAAA;AAAmB,iBAAA,CAAA;AACtE,gBAAA,MAAMC,aAAgB,GAAA,MAAMH,KAAMI,CAAAA,GAAG,CAAC;oBAAEC,GAAK,EAAA;AAAO,iBAAA,CAAA;gBAEpD,MAAMC,aAAAA,GAAgBV,QAAa,KAAA,OAAA,GAAU,OAAUA,GAAAA,QAAAA;AAEvD,gBAAA,IAAI,CAACvC,CAAAA,CAAE+C,GAAG,CAACD,aAAe,EAAA;AAACG,oBAAAA,aAAAA;AAAe,oBAAA;iBAAU,CAAG,EAAA;AACrD,oBAAA,MAAM,IAAI/B,gBAAiB,CAAA,2BAAA,CAAA;AAC5B;AAED,gBAAA,IAAIqB,aAAa,OAAS,EAAA;AACxB,oBAAA,MAAM7B,oBAAqB8B,CAAAA,MAAAA,CAAAA;oBAE3B,MAAM,EAAEU,UAAU,EAAE,GAAGV,MAAAA;;oBAGvB,MAAMjB,IAAAA,GAAO,MAAMK,OAAOuB,CAAAA,EAAE,CAACC,KAAK,CAAC,gCAAkCC,CAAAA,CAAAA,OAAO,CAAC;wBAC3EC,KAAO,EAAA;AACLf,4BAAAA,QAAAA;4BACAgB,GAAK,EAAA;AAAC,gCAAA;AAAEC,oCAAAA,KAAAA,EAAON,WAAWO,WAAW;;AAAM,gCAAA;oCAAEC,QAAUR,EAAAA;;AAAa;AACrE;AACT,qBAAA,CAAA;AAEM,oBAAA,IAAI,CAAC3B,IAAM,EAAA;AACT,wBAAA,MAAM,IAAIJ,eAAgB,CAAA,gCAAA,CAAA;AAC3B;oBAED,IAAI,CAACI,IAAKoC,CAAAA,QAAQ,EAAE;AAClB,wBAAA,MAAM,IAAIxC,eAAgB,CAAA,gCAAA,CAAA;AAC3B;oBAED,MAAMyC,aAAAA,GAAgB,MAAMpD,UAAAA,CAAW,MAAQqD,CAAAA,CAAAA,gBAAgB,CAC7DrB,MAAOmB,CAAAA,QAAQ,EACfpC,IAAAA,CAAKoC,QAAQ,CAAA;AAGf,oBAAA,IAAI,CAACC,aAAe,EAAA;AAClB,wBAAA,MAAM,IAAIzC,eAAgB,CAAA,gCAAA,CAAA;AAC3B;AAED,oBAAA,MAAM2C,gBAAmB,GAAA,MAAMnB,KAAMI,CAAAA,GAAG,CAAC;wBAAEC,GAAK,EAAA;AAAU,qBAAA,CAAA;AAC1D,oBAAA,MAAMe,oBAAuB/D,GAAAA,CAAAA,CAAE+C,GAAG,CAACe,gBAAkB,EAAA,oBAAA,CAAA;AAErD,oBAAA,IAAIC,oBAAwBxC,IAAAA,IAAAA,CAAKyC,SAAS,KAAK,IAAM,EAAA;AACnD,wBAAA,MAAM,IAAI9C,gBAAiB,CAAA,qCAAA,CAAA;AAC5B;oBAED,IAAIK,IAAAA,CAAK0C,OAAO,KAAK,IAAM,EAAA;AACzB,wBAAA,MAAM,IAAI/C,gBAAiB,CAAA,mDAAA,CAAA;AAC5B;AAED,oBAAA,MAAMgD,OAAOtC,OAAOuC,CAAAA,MAAM,CAACpB,GAAG,CAAC,yCAA2C,EAAA,gBAAA,CAAA;AAC1E,oBAAA,IAAImB,SAAS,SAAW,EAAA;AACtB,wBAAA,MAAM/B,QAAWF,GAAAA,eAAAA,CAAgBT,GAAIiB,CAAAA,OAAO,CAACC,IAAI,CAAA;AAEjD,wBAAA,MAAM0B,OAAU,GAAA,MAAMxC,OACnByC,CAAAA,cAAc,CAAC,mBAAA,CAAA,CACfC,oBAAoB,CAACC,MAAOhD,CAAAA,IAAAA,CAAKiD,EAAE,CAAA,EAAGrC,QAAU,EAAA;4BAAES,IAAM,EAAA;AAAS,yBAAA,CAAA;wBAEpE,MAAM6B,MAAAA,GAAS,MAAM7C,OAClByC,CAAAA,cAAc,CAAC,mBACfK,CAAAA,CAAAA,mBAAmB,CAACN,OAAAA,CAAQO,KAAK,CAAA;AACpC,wBAAA,IAAI,WAAWF,MAAQ,EAAA;AACrB,4BAAA,MAAM,IAAIvD,gBAAiB,CAAA,qBAAA,CAAA;AAC5B;AAED,wBAAA,MAAM0D,UAAahD,GAAAA,OAAAA,CAAOuC,MAAM,CAACpB,GAAG,CAAC,oCAAA,CAAA;AACrC,wBAAA,MAAM8B,kBAAkBrD,GAAIiB,CAAAA,OAAO,CAACqC,MAAM,CAAC,0BAA0B,KAAK,UAAA;wBAC1E,IAAIF,UAAAA,EAAYG,YAAYF,eAAiB,EAAA;AAC3C,4BAAA,MAAMG,UAAaJ,GAAAA,UAAAA,CAAWK,MAAM,EAAEpC,IAAQ,IAAA,mBAAA;AAC9C,4BAAA,MAAMqC,YAAeC,GAAAA,OAAAA,CAAQC,GAAG,CAACC,QAAQ,KAAK,YAAA;4BAC9C,MAAMC,QAAAA,GACJ,OAAOV,UAAAA,CAAWK,MAAM,EAAEM,WAAW,SACjCX,GAAAA,UAAAA,CAAWK,MAAM,EAAEM,MACnBL,GAAAA,YAAAA;AAEN,4BAAA,MAAMM,aAAgB,GAAA;gCACpBT,QAAU,EAAA,IAAA;gCACVQ,MAAQD,EAAAA,QAAAA;gCACRG,QAAUb,EAAAA,UAAAA,CAAWK,MAAM,EAAEQ,QAAY,IAAA,KAAA;gCACzCC,IAAMd,EAAAA,UAAAA,CAAWK,MAAM,EAAES,IAAQ,IAAA,GAAA;gCACjCC,MAAQf,EAAAA,UAAAA,CAAWK,MAAM,EAAEU,MAAAA;gCAC3BC,SAAW,EAAA;AACvB,6BAAA;AAEUpE,4BAAAA,GAAAA,CAAIqE,OAAO,CAACC,GAAG,CAACd,UAAYZ,EAAAA,OAAAA,CAAQO,KAAK,EAAEa,aAAAA,CAAAA;4BAC3C,OAAOhE,GAAAA,CAAIuE,IAAI,CAAC;AAAEC,gCAAAA,GAAAA,EAAKvB,OAAOE,KAAK;gCAAEpD,IAAM,EAAA,MAAMD,aAAaC,IAAMC,EAAAA,GAAAA;AAAM,6BAAA,CAAA;AAC3E;wBAED,OAAOA,GAAAA,CAAIuE,IAAI,CAAC;AACdC,4BAAAA,GAAAA,EAAKvB,OAAOE,KAAK;AACjBsB,4BAAAA,YAAAA,EAAc7B,QAAQO,KAAK;4BAC3BpD,IAAM,EAAA,MAAMD,aAAaC,IAAMC,EAAAA,GAAAA;AACzC,yBAAA,CAAA;AACO;oBAED,OAAOA,GAAAA,CAAIuE,IAAI,CAAC;wBACdC,GAAKxF,EAAAA,UAAAA,CAAW,KAAO0F,CAAAA,CAAAA,KAAK,CAAC;AAAE1B,4BAAAA,EAAAA,EAAIjD,KAAKiD;;wBACxCjD,IAAM,EAAA,MAAMD,aAAaC,IAAMC,EAAAA,GAAAA;AACvC,qBAAA,CAAA;AACK;;gBAGD,IAAI;oBACF,MAAMD,IAAAA,GAAO,MAAMf,UAAW,CAAA,WAAA,CAAA,CAAa2F,OAAO,CAAC5D,QAAAA,EAAUf,IAAI4B,KAAK,CAAA;oBAEtE,IAAI7B,IAAAA,CAAK0C,OAAO,EAAE;AAChB,wBAAA,MAAM,IAAI7C,cAAe,CAAA,mDAAA,CAAA;AAC1B;AAED,oBAAA,MAAM8C,OAAOtC,OAAOuC,CAAAA,MAAM,CAACpB,GAAG,CAAC,yCAA2C,EAAA,gBAAA,CAAA;AAC1E,oBAAA,IAAImB,SAAS,SAAW,EAAA;AACtB,wBAAA,MAAM/B,QAAWF,GAAAA,eAAAA,CAAgBT,GAAIiB,CAAAA,OAAO,CAACC,IAAI,CAAA;AAEjD,wBAAA,MAAM0B,OAAU,GAAA,MAAMxC,OACnByC,CAAAA,cAAc,CAAC,mBAAA,CAAA,CACfC,oBAAoB,CAACC,MAAOhD,CAAAA,IAAAA,CAAKiD,EAAE,CAAA,EAAGrC,QAAU,EAAA;4BAAES,IAAM,EAAA;AAAS,yBAAA,CAAA;wBAEpE,MAAM6B,MAAAA,GAAS,MAAM7C,OAClByC,CAAAA,cAAc,CAAC,mBACfK,CAAAA,CAAAA,mBAAmB,CAACN,OAAAA,CAAQO,KAAK,CAAA;AACpC,wBAAA,IAAI,WAAWF,MAAQ,EAAA;AACrB,4BAAA,MAAM,IAAIvD,gBAAiB,CAAA,qBAAA,CAAA;AAC5B;AAED,wBAAA,MAAM0D,UAAahD,GAAAA,OAAAA,CAAOuC,MAAM,CAACpB,GAAG,CAAC,oCAAA,CAAA;AACrC,wBAAA,MAAM8B,kBAAkBrD,GAAIiB,CAAAA,OAAO,CAACqC,MAAM,CAAC,0BAA0B,KAAK,UAAA;wBAC1E,IAAIF,UAAAA,EAAYG,YAAYF,eAAiB,EAAA;AAC3C,4BAAA,MAAMG,UAAaJ,GAAAA,UAAAA,CAAWK,MAAM,EAAEpC,IAAQ,IAAA,mBAAA;AAC9C,4BAAA,MAAMqC,YAAeC,GAAAA,OAAAA,CAAQC,GAAG,CAACC,QAAQ,KAAK,YAAA;4BAC9C,MAAMC,QAAAA,GACJ,OAAOV,UAAAA,CAAWK,MAAM,EAAEM,WAAW,SACjCX,GAAAA,UAAAA,CAAWK,MAAM,EAAEM,MACnBL,GAAAA,YAAAA;AAEN,4BAAA,MAAMM,aAAgB,GAAA;gCACpBT,QAAU,EAAA,IAAA;gCACVQ,MAAQD,EAAAA,QAAAA;gCACRG,QAAUb,EAAAA,UAAAA,CAAWK,MAAM,EAAEQ,QAAY,IAAA,KAAA;gCACzCC,IAAMd,EAAAA,UAAAA,CAAWK,MAAM,EAAES,IAAQ,IAAA,GAAA;gCACjCC,MAAQf,EAAAA,UAAAA,CAAWK,MAAM,EAAEU,MAAAA;gCAC3BC,SAAW,EAAA;AACvB,6BAAA;AACUpE,4BAAAA,GAAAA,CAAIqE,OAAO,CAACC,GAAG,CAACd,UAAYZ,EAAAA,OAAAA,CAAQO,KAAK,EAAEa,aAAAA,CAAAA;4BAC3C,OAAOhE,GAAAA,CAAIuE,IAAI,CAAC;AAAEC,gCAAAA,GAAAA,EAAKvB,OAAOE,KAAK;gCAAEpD,IAAM,EAAA,MAAMD,aAAaC,IAAMC,EAAAA,GAAAA;AAAM,6BAAA,CAAA;AAC3E;wBACD,OAAOA,GAAAA,CAAIuE,IAAI,CAAC;AACdC,4BAAAA,GAAAA,EAAKvB,OAAOE,KAAK;AACjBsB,4BAAAA,YAAAA,EAAc7B,QAAQO,KAAK;4BAC3BpD,IAAM,EAAA,MAAMD,aAAaC,IAAMC,EAAAA,GAAAA;AACzC,yBAAA,CAAA;AACO;oBAED,OAAOA,GAAAA,CAAIuE,IAAI,CAAC;wBACdC,GAAKxF,EAAAA,UAAAA,CAAW,KAAO0F,CAAAA,CAAAA,KAAK,CAAC;AAAE1B,4BAAAA,EAAAA,EAAIjD,KAAKiD;;wBACxCjD,IAAM,EAAA,MAAMD,aAAaC,IAAMC,EAAAA,GAAAA;AACvC,qBAAA,CAAA;AACK,iBAAA,CAAC,OAAO4E,KAAO,EAAA;oBACd,MAAM,IAAIlF,gBAAiBkF,CAAAA,KAAAA,CAAMC,OAAO,CAAA;AACzC;AACF,aAAA;AAED,YAAA,MAAMC,gBAAe9E,GAAG,EAAA;AACtB,gBAAA,IAAI,CAACA,GAAAA,CAAIE,KAAK,CAACH,IAAI,EAAE;AACnB,oBAAA,MAAM,IAAIL,gBAAiB,CAAA,kDAAA,CAAA;AAC5B;AAED,gBAAA,MAAMqF,WAAc3E,GAAAA,OAAAA,CAAOuC,MAAM,CAACpB,GAAG,CAAC,2CAAA,CAAA;AAEtC,gBAAA,MAAM,EAAEyD,eAAe,EAAE7C,QAAQ,EAAE,GAAG,MAAM3C,0BAAAA,CAC1CQ,GAAIiB,CAAAA,OAAO,CAACC,IAAI,EAChB6D,WAAAA,CAAAA;gBAGF,MAAMhF,IAAAA,GAAO,MAAMK,OAAOuB,CAAAA,EAAE,CACzBC,KAAK,CAAC,gCACNC,CAAAA,CAAAA,OAAO,CAAC;oBAAEC,KAAO,EAAA;AAAEkB,wBAAAA,EAAAA,EAAIhD,GAAIE,CAAAA,KAAK,CAACH,IAAI,CAACiD;AAAI;AAAA,iBAAA,CAAA;gBAE7C,MAAMZ,aAAAA,GAAgB,MAAMpD,UAAW,CAAA,MAAA,CAAA,CAAQqD,gBAAgB,CAAC2C,eAAAA,EAAiBjF,KAAKoC,QAAQ,CAAA;AAE9F,gBAAA,IAAI,CAACC,aAAe,EAAA;AAClB,oBAAA,MAAM,IAAIzC,eAAgB,CAAA,0CAAA,CAAA;AAC3B;AAED,gBAAA,IAAIqF,oBAAoB7C,QAAU,EAAA;AAChC,oBAAA,MAAM,IAAIxC,eAAgB,CAAA,gEAAA,CAAA;AAC3B;AAED,gBAAA,MAAMX,WAAW,MAAQiG,CAAAA,CAAAA,IAAI,CAAClF,IAAAA,CAAKiD,EAAE,EAAE;AAAEb,oBAAAA;AAAQ,iBAAA,CAAA;AAEjD,gBAAA,MAAMO,OAAOtC,OAAOuC,CAAAA,MAAM,CAACpB,GAAG,CAAC,yCAA2C,EAAA,gBAAA,CAAA;AAC1E,gBAAA,IAAImB,SAAS,SAAW,EAAA;AACtB,oBAAA,MAAM/B,QAAWF,GAAAA,eAAAA,CAAgBT,GAAIiB,CAAAA,OAAO,CAACC,IAAI,CAAA;AAEjD,oBAAA,IAAIP,QAAU,EAAA;;wBAEZ,MAAMP,OAAAA,CACHyC,cAAc,CAAC,mBAAA,CAAA,CACfqC,sBAAsB,CAACnC,MAAAA,CAAOhD,IAAKiD,CAAAA,EAAE,CAAGrC,EAAAA,QAAAA,CAAAA;AAC5C;oBAED,MAAMwE,WAAAA,GAAcxE,QAAYrC,IAAAA,MAAAA,CAAO8G,UAAU,EAAA;AACjD,oBAAA,MAAMxC,OAAU,GAAA,MAAMxC,OACnByC,CAAAA,cAAc,CAAC,mBAAA,CAAA,CACfC,oBAAoB,CAACC,MAAOhD,CAAAA,IAAAA,CAAKiD,EAAE,CAAA,EAAGmC,WAAa,EAAA;wBAAE/D,IAAM,EAAA;AAAS,qBAAA,CAAA;oBAEvE,MAAM6B,MAAAA,GAAS,MAAM7C,OAClByC,CAAAA,cAAc,CAAC,mBACfK,CAAAA,CAAAA,mBAAmB,CAACN,OAAAA,CAAQO,KAAK,CAAA;AACpC,oBAAA,IAAI,WAAWF,MAAQ,EAAA;AACrB,wBAAA,MAAM,IAAIvD,gBAAiB,CAAA,qBAAA,CAAA;AAC5B;oBAED,OAAOM,GAAAA,CAAIuE,IAAI,CAAC;AACdC,wBAAAA,GAAAA,EAAKvB,OAAOE,KAAK;AACjBsB,wBAAAA,YAAAA,EAAc7B,QAAQO,KAAK;wBAC3BpD,IAAM,EAAA,MAAMD,aAAaC,IAAMC,EAAAA,GAAAA;AACvC,qBAAA,CAAA;AACK;gBAED,OAAOA,GAAAA,CAAIuE,IAAI,CAAC;oBACdC,GAAKxF,EAAAA,UAAAA,CAAW,KAAO0F,CAAAA,CAAAA,KAAK,CAAC;AAAE1B,wBAAAA,EAAAA,EAAIjD,KAAKiD;;oBACxCjD,IAAM,EAAA,MAAMD,aAAaC,IAAMC,EAAAA,GAAAA;AACrC,iBAAA,CAAA;AACG,aAAA;AAED,YAAA,MAAMqF,eAAcrF,GAAG,EAAA;AACrB,gBAAA,MAAM+E,WAAc3E,GAAAA,OAAAA,CAAOuC,MAAM,CAACpB,GAAG,CAAC,2CAAA,CAAA;AAEtC,gBAAA,MAAM,EAAEY,QAAQ,EAAEmD,oBAAoB,EAAEC,IAAI,EAAE,GAAG,MAAMjG,yBACrDU,CAAAA,GAAAA,CAAIiB,OAAO,CAACC,IAAI,EAChB6D,WAAAA,CAAAA;AAGF,gBAAA,IAAI5C,aAAamD,oBAAsB,EAAA;AACrC,oBAAA,MAAM,IAAI3F,eAAgB,CAAA,wBAAA,CAAA;AAC3B;gBAED,MAAMI,IAAAA,GAAO,MAAMK,OAAOuB,CAAAA,EAAE,CACzBC,KAAK,CAAC,gCACNC,CAAAA,CAAAA,OAAO,CAAC;oBAAEC,KAAO,EAAA;wBAAE0D,kBAAoBD,EAAAA;AAAI;AAAI,iBAAA,CAAA;AAElD,gBAAA,IAAI,CAACxF,IAAM,EAAA;AACT,oBAAA,MAAM,IAAIJ,eAAgB,CAAA,yBAAA,CAAA;AAC3B;AAED,gBAAA,MAAMX,WAAW,MAAQiG,CAAAA,CAAAA,IAAI,CAAClF,IAAAA,CAAKiD,EAAE,EAAE;oBACrCwC,kBAAoB,EAAA,IAAA;AACpBrD,oBAAAA;AACN,iBAAA,CAAA;AAEI,gBAAA,MAAMO,OAAOtC,OAAOuC,CAAAA,MAAM,CAACpB,GAAG,CAAC,yCAA2C,EAAA,gBAAA,CAAA;AAC1E,gBAAA,IAAImB,SAAS,SAAW,EAAA;AACtB,oBAAA,MAAM/B,QAAWF,GAAAA,eAAAA,CAAgBT,GAAIiB,CAAAA,OAAO,CAACC,IAAI,CAAA;AAEjD,oBAAA,IAAIP,QAAU,EAAA;;wBAEZ,MAAMP,OAAAA,CACHyC,cAAc,CAAC,mBAAA,CAAA,CACfqC,sBAAsB,CAACnC,MAAAA,CAAOhD,IAAKiD,CAAAA,EAAE,CAAGrC,EAAAA,QAAAA,CAAAA;AAC5C;oBAED,MAAMwE,WAAAA,GAAcxE,QAAYrC,IAAAA,MAAAA,CAAO8G,UAAU,EAAA;AACjD,oBAAA,MAAMxC,OAAU,GAAA,MAAMxC,OACnByC,CAAAA,cAAc,CAAC,mBAAA,CAAA,CACfC,oBAAoB,CAACC,MAAOhD,CAAAA,IAAAA,CAAKiD,EAAE,CAAA,EAAGmC,WAAa,EAAA;wBAAE/D,IAAM,EAAA;AAAS,qBAAA,CAAA;oBAEvE,MAAM6B,MAAAA,GAAS,MAAM7C,OAClByC,CAAAA,cAAc,CAAC,mBACfK,CAAAA,CAAAA,mBAAmB,CAACN,OAAAA,CAAQO,KAAK,CAAA;AACpC,oBAAA,IAAI,WAAWF,MAAQ,EAAA;AACrB,wBAAA,MAAM,IAAIvD,gBAAiB,CAAA,qBAAA,CAAA;AAC5B;oBAED,OAAOM,GAAAA,CAAIuE,IAAI,CAAC;AACdC,wBAAAA,GAAAA,EAAKvB,OAAOE,KAAK;AACjBsB,wBAAAA,YAAAA,EAAc7B,QAAQO,KAAK;wBAC3BpD,IAAM,EAAA,MAAMD,aAAaC,IAAMC,EAAAA,GAAAA;AACvC,qBAAA,CAAA;AACK;gBAED,OAAOA,GAAAA,CAAIuE,IAAI,CAAC;oBACdC,GAAKxF,EAAAA,UAAAA,CAAW,KAAO0F,CAAAA,CAAAA,KAAK,CAAC;AAAE1B,wBAAAA,EAAAA,EAAIjD,KAAKiD;;oBACxCjD,IAAM,EAAA,MAAMD,aAAaC,IAAMC,EAAAA,GAAAA;AACrC,iBAAA,CAAA;AACG,aAAA;AACD,YAAA,MAAM4C,SAAQ5C,GAAG,EAAA;AACf,gBAAA,MAAM0C,OAAOtC,OAAOuC,CAAAA,MAAM,CAACpB,GAAG,CAAC,yCAA2C,EAAA,gBAAA,CAAA;AAC1E,gBAAA,IAAImB,SAAS,SAAW,EAAA;AACtB,oBAAA,OAAO1C,IAAIyF,QAAQ,EAAA;AACpB;gBAED,MAAM,EAAEhB,YAAY,EAAE,GAAGzE,IAAIiB,OAAO,CAACC,IAAI,IAAI,EAAA;AAC7C,gBAAA,IAAI,CAACuD,YAAAA,IAAgB,OAAOA,YAAAA,KAAiB,QAAU,EAAA;oBACrD,OAAOzE,GAAAA,CAAI0F,UAAU,CAAC,uBAAA,CAAA;AACvB;AAED,gBAAA,MAAMC,WAAW,MAAMvF,OAAAA,CACpByC,cAAc,CAAC,mBAAA,CAAA,CACf+C,kBAAkB,CAACnB,YAAAA,CAAAA;AACtB,gBAAA,IAAI,WAAWkB,QAAU,EAAA;oBACvB,OAAO3F,GAAAA,CAAI6F,YAAY,CAAC,uBAAA,CAAA;AACzB;gBAED,MAAMC,MAAAA,GAAS,MAAM1F,OAClByC,CAAAA,cAAc,CAAC,mBACfK,CAAAA,CAAAA,mBAAmB,CAACyC,QAAAA,CAASxC,KAAK,CAAA;AACrC,gBAAA,IAAI,WAAW2C,MAAQ,EAAA;oBACrB,OAAO9F,GAAAA,CAAI6F,YAAY,CAAC,uBAAA,CAAA;AACzB;AAED,gBAAA,MAAMzC,UAAahD,GAAAA,OAAAA,CAAOuC,MAAM,CAACpB,GAAG,CAAC,oCAAA,CAAA;AACrC,gBAAA,MAAM8B,kBAAkBrD,GAAIiB,CAAAA,OAAO,CAACqC,MAAM,CAAC,0BAA0B,KAAK,UAAA;gBAC1E,IAAIF,UAAAA,EAAYG,YAAYF,eAAiB,EAAA;AAC3C,oBAAA,MAAMG,UAAaJ,GAAAA,UAAAA,CAAWK,MAAM,EAAEpC,IAAQ,IAAA,mBAAA;AAC9C,oBAAA,MAAMqC,YAAeC,GAAAA,OAAAA,CAAQC,GAAG,CAACC,QAAQ,KAAK,YAAA;oBAC9C,MAAMC,QAAAA,GACJ,OAAOV,UAAAA,CAAWK,MAAM,EAAEM,WAAW,SAAYX,GAAAA,UAAAA,CAAWK,MAAM,EAAEM,MAASL,GAAAA,YAAAA;AAE/E,oBAAA,MAAMM,aAAgB,GAAA;wBACpBT,QAAU,EAAA,IAAA;wBACVQ,MAAQD,EAAAA,QAAAA;wBACRG,QAAUb,EAAAA,UAAAA,CAAWK,MAAM,EAAEQ,QAAY,IAAA,KAAA;wBACzCC,IAAMd,EAAAA,UAAAA,CAAWK,MAAM,EAAES,IAAQ,IAAA,GAAA;wBACjCC,MAAQf,EAAAA,UAAAA,CAAWK,MAAM,EAAEU,MAAAA;wBAC3BC,SAAW,EAAA;AACnB,qBAAA;AACMpE,oBAAAA,GAAAA,CAAIqE,OAAO,CAACC,GAAG,CAACd,UAAYmC,EAAAA,QAAAA,CAASxC,KAAK,EAAEa,aAAAA,CAAAA;oBAC5C,OAAOhE,GAAAA,CAAIuE,IAAI,CAAC;AAAEC,wBAAAA,GAAAA,EAAKsB,OAAO3C;AAAK,qBAAA,CAAA;AACpC;gBACD,OAAOnD,GAAAA,CAAIuE,IAAI,CAAC;AAAEC,oBAAAA,GAAAA,EAAKsB,OAAO3C,KAAK;AAAEsB,oBAAAA,YAAAA,EAAckB,SAASxC;AAAK,iBAAA,CAAA;AAClE,aAAA;AACD,YAAA,MAAM4C,QAAO/F,GAAG,EAAA;AACd,gBAAA,MAAM0C,OAAOtC,OAAOuC,CAAAA,MAAM,CAACpB,GAAG,CAAC,yCAA2C,EAAA,gBAAA,CAAA;AAC1E,gBAAA,IAAImB,SAAS,SAAW,EAAA;AACtB,oBAAA,OAAO1C,IAAIyF,QAAQ,EAAA;AACpB;;AAGD,gBAAA,IAAI,CAACzF,GAAAA,CAAIE,KAAK,CAACH,IAAI,EAAE;oBACnB,OAAOC,GAAAA,CAAI6F,YAAY,CAAC,wBAAA,CAAA;AACzB;AAED,gBAAA,MAAMlF,QAAWF,GAAAA,eAAAA,CAAgBT,GAAIiB,CAAAA,OAAO,CAACC,IAAI,CAAA;gBACjD,IAAI;AACF,oBAAA,MAAMd,OACHyC,CAAAA,cAAc,CAAC,mBAAA,CAAA,CACfqC,sBAAsB,CAACnC,MAAO/C,CAAAA,GAAAA,CAAIE,KAAK,CAACH,IAAI,CAACiD,EAAE,CAAGrC,EAAAA,QAAAA,CAAAA;AACtD,iBAAA,CAAC,OAAOqF,GAAK,EAAA;AACZ5F,oBAAAA,OAAAA,CAAO6F,GAAG,CAACrB,KAAK,CAAC,kBAAoBoB,EAAAA,GAAAA,CAAAA;AACtC;AAED,gBAAA,MAAM5C,UAAahD,GAAAA,OAAAA,CAAOuC,MAAM,CAACpB,GAAG,CAAC,oCAAA,CAAA;AACrC,gBAAA,MAAM8B,kBAAkBrD,GAAIiB,CAAAA,OAAO,CAACqC,MAAM,CAAC,0BAA0B,KAAK,UAAA;gBAC1E,IAAIF,UAAAA,EAAYG,YAAYF,eAAiB,EAAA;AAC3C,oBAAA,MAAMG,UAAaJ,GAAAA,UAAAA,CAAWK,MAAM,EAAEpC,IAAQ,IAAA,mBAAA;AAC9CrB,oBAAAA,GAAAA,CAAIqE,OAAO,CAACC,GAAG,CAACd,YAAY,EAAI,EAAA;AAAE0C,wBAAAA,OAAAA,EAAS,IAAIC,IAAK,CAAA,CAAA;AAAE,qBAAA,CAAA;AACvD;gBACD,OAAOnG,GAAAA,CAAIuE,IAAI,CAAC;oBAAE6B,EAAI,EAAA;AAAM,iBAAA,CAAA;AAC7B,aAAA;YACD,MAAMzB,OAAAA,CAAAA,CAAQ3E,GAAG,EAAEqG,IAAI,EAAA;gBACrB,MAAMC,KAAAA,GAAQC,WAAiBC,GAAG,EAAA;AAElC,gBAAA,MAAMC,SAAY,GAAA,MAAMrG,OACrBe,CAAAA,KAAK,CAAC;oBAAEC,IAAM,EAAA,QAAA;oBAAUC,IAAM,EAAA,mBAAA;oBAAqBG,GAAK,EAAA;mBACxDD,GAAG,EAAA;AAEN,gBAAA,MAAMmF,SAAYtG,GAAAA,OAAAA,CAAOuC,MAAM,CAACpB,GAAG,CAAC,iBAAA,CAAA;AACpC,gBAAA,MAAMoF,WAAc,GAAA;oBAClBC,QAAU,EAAA;wBACRC,MAAQ,EAAA,CAAA,EAAGH,SAAU,CAAA,QAAQ;AAC9B,qBAAA;AACD,oBAAA,GAAGD;AACT,iBAAA;gBAEI,MAAM,CAACK,YAAY,GAAG9G,GAAAA,CAAIiB,OAAO,CAAC8F,GAAG,CAACC,KAAK,CAAC,GAAA,CAAA;AAC5C,gBAAA,MAAMjG,QAAW+F,GAAAA,WAAAA,CAAYE,KAAK,CAAC,WAAY,CAAA,CAAC,CAAE,CAAA,CAACA,KAAK,CAAC,GAAI,CAAA,CAAC,CAAE,CAAA;gBAEhE,IAAI,CAACxI,EAAE+C,GAAG,CAACoF,WAAW,CAAC5F,QAAAA,CAAS,EAAE,SAAY,CAAA,EAAA;AAC5C,oBAAA,MAAM,IAAIrB,gBAAiB,CAAA,2BAAA,CAAA;AAC5B;gBAED,IAAI,CAACU,OAAOuC,CAAAA,MAAM,CAACsE,MAAM,CAACF,GAAG,CAACG,UAAU,CAAC,MAAS,CAAA,EAAA;oBAChD9G,OAAO6F,CAAAA,GAAG,CAACkB,IAAI,CACb,6NAAA,CAAA;AAEH;;AAGD,gBAAA,MAAMC,mBAAsB5I,GAAAA,CAAAA,CAAE+C,GAAG,CAACvB,GAAK,EAAA,gBAAA,CAAA;AACvC,gBAAA,MAAMqH,sBAAyB7I,GAAAA,CAAAA,CAAE+C,GAAG,CAACvB,GAAK,EAAA,gCAAA,CAAA;AAE1C,gBAAA,MAAMsH,iBAAiBF,mBAAuBC,IAAAA,sBAAAA;;AAG9C,gBAAA,IAAIC,mBAAmBzG,SAAW,EAAA;oBAChC,IAAI;;wBAEF,MAAM,EAAE0G,QAAUC,EAAAA,gBAAgB,EAAE,GAAGpH,QACpCqH,MAAM,CAAC,mBACP9E,CAAAA,CAAAA,MAAM,CAAC,UAAA,CAAA;AAEV,wBAAA,MAAM6E,gBAAiBF,CAAAA,cAAAA,EAAgBX,WAAW,CAAC5F,QAAS,CAAA,CAAA;AAE5D4F,wBAAAA,WAAW,CAAC5F,QAAAA,CAAS,CAACD,QAAQ,GAAGwG,cAAAA;AAClC,qBAAA,CAAC,OAAOI,CAAG,EAAA;wBACV,MAAM,IAAI/H,gBAAgB,+BAAiC,EAAA;4BAAEmB,QAAUwG,EAAAA;AAAgB,yBAAA,CAAA;AACxF;AACF;;gBAGDX,WAAW,CAAC5F,SAAS,CAAC4G,YAAY,GAAG3I,UAAW,CAAA,WAAA,CAAA,CAAa4I,gBAAgB,CAAC7G,QAAAA,CAAAA;gBAE9E,OAAOuF,KAAAA,CAAMK,aAAa3G,GAAKqG,EAAAA,IAAAA,CAAAA;AAChC,aAAA;AAED,YAAA,MAAMwB,gBAAe7H,GAAG,EAAA;gBACtB,MAAM,EAAEgC,KAAK,EAAE,GAAG,MAAM3C,0BAA2BW,CAAAA,GAAAA,CAAIiB,OAAO,CAACC,IAAI,CAAA;AAEnE,gBAAA,MAAM4G,WAAc,GAAA,MAAM1H,OAAOe,CAAAA,KAAK,CAAC;oBAAEC,IAAM,EAAA,QAAA;oBAAUC,IAAM,EAAA;AAAmB,iBAAA,CAAA;AAElF,gBAAA,MAAM0G,aAAgB,GAAA,MAAMD,WAAYvG,CAAAA,GAAG,CAAC;oBAAEC,GAAK,EAAA;AAAO,iBAAA,CAAA;AAC1D,gBAAA,MAAMc,gBAAmB,GAAA,MAAMwF,WAAYvG,CAAAA,GAAG,CAAC;oBAAEC,GAAK,EAAA;AAAU,iBAAA,CAAA;;gBAGhE,MAAMzB,IAAAA,GAAO,MAAMK,OAAOuB,CAAAA,EAAE,CACzBC,KAAK,CAAC,gCACNC,CAAAA,CAAAA,OAAO,CAAC;oBAAEC,KAAO,EAAA;AAAEE,wBAAAA,KAAAA,EAAOA,MAAMC,WAAW;AAAI;AAAA,iBAAA,CAAA;AAElD,gBAAA,IAAI,CAAClC,IAAAA,IAAQA,IAAK0C,CAAAA,OAAO,EAAE;oBACzB,OAAOzC,GAAAA,CAAIuE,IAAI,CAAC;wBAAE6B,EAAI,EAAA;AAAM,qBAAA,CAAA;AAC7B;;gBAGD,MAAM4B,QAAAA,GAAW,MAAMlI,YAAAA,CAAaC,IAAMC,EAAAA,GAAAA,CAAAA;AAE1C,gBAAA,MAAMwF,qBAAqBlH,MAAO2J,CAAAA,WAAW,CAAC,EAAA,CAAA,CAAIC,QAAQ,CAAC,KAAA,CAAA;AAE3D,gBAAA,MAAMC,wBAAwB3J,CAAE+C,CAAAA,GAAG,CAACwG,aAAAA,EAAe,0BAA0B,EAAA,CAAA;gBAC7E,MAAMK,SAAAA,GAAY,MAAMpJ,UAAW,CAAA,mBAAA,CAAA,CAAqBqJ,QAAQ,CAC9DF,qBAAAA,CAAsBtD,OAAO,EAC7B;AACEyD,oBAAAA,GAAAA,EAAKhG,iBAAiBiG,oBAAoB;AAC1CC,oBAAAA,UAAAA,EAAYpI,OAAOuC,CAAAA,MAAM,CAACpB,GAAG,CAAC,oBAAA,CAAA;AAC9BkH,oBAAAA,SAAAA,EAAWrI,OAAOuC,CAAAA,MAAM,CAACpB,GAAG,CAAC,mBAAA,CAAA;oBAC7BmH,IAAMV,EAAAA,QAAAA;oBACNW,KAAOnD,EAAAA;AACR,iBAAA,CAAA;gBAGH,MAAMoD,WAAAA,GAAc,MAAM5J,UAAW,CAAA,mBAAA,CAAA,CAAqBqJ,QAAQ,CAChEF,qBAAAA,CAAsBU,MAAM,EAC5B;oBACEH,IAAMV,EAAAA;AACP,iBAAA,CAAA;AAGH,gBAAA,MAAMc,WAAc,GAAA;AAClBC,oBAAAA,EAAAA,EAAIhJ,KAAKiC,KAAK;oBACdgH,IACEb,EAAAA,qBAAAA,CAAsBa,IAAI,CAAChH,KAAK,IAAImG,sBAAsBa,IAAI,CAAC3H,IAAI,GAC/D,CAAG8G,EAAAA,qBAAAA,CAAsBa,IAAI,CAAC3H,IAAI,CAAC,EAAE,EAAE8G,qBAAAA,CAAsBa,IAAI,CAAChH,KAAK,CAAC,CAAC,CAAC,GAC1EnB,SAAAA;AACNoI,oBAAAA,OAAAA,EAASd,sBAAsBe,cAAc;oBAC7CC,OAASP,EAAAA,WAAAA;oBACTQ,IAAMhB,EAAAA,SAAAA;oBACNiB,IAAMjB,EAAAA;AACZ,iBAAA;;AAGI,gBAAA,MAAMpJ,WAAW,MAAQiG,CAAAA,CAAAA,IAAI,CAAClF,IAAAA,CAAKiD,EAAE,EAAE;AAAEwC,oBAAAA;AAAkB,iBAAA,CAAA;;gBAG3D,MAAMpF,OAAAA,CAAOqH,MAAM,CAAC,OAAA,CAAA,CAAS6B,OAAO,CAAC,OAAA,CAAA,CAAS/E,IAAI,CAACuE,WAAAA,CAAAA;AAEnD9I,gBAAAA,GAAAA,CAAIuE,IAAI,CAAC;oBAAE6B,EAAI,EAAA;AAAM,iBAAA,CAAA;AACtB,aAAA;AAED,YAAA,MAAMmD,UAASvJ,GAAG,EAAA;AAChB,gBAAA,MAAM8H,WAAc,GAAA,MAAM1H,OAAOe,CAAAA,KAAK,CAAC;oBAAEC,IAAM,EAAA,QAAA;oBAAUC,IAAM,EAAA;AAAmB,iBAAA,CAAA;AAElF,gBAAA,MAAMmI,QAAW,GAAA,MAAM1B,WAAYvG,CAAAA,GAAG,CAAC;oBAAEC,GAAK,EAAA;AAAU,iBAAA,CAAA;gBAExD,IAAI,CAACgI,QAASC,CAAAA,cAAc,EAAE;AAC5B,oBAAA,MAAM,IAAI/J,gBAAiB,CAAA,uCAAA,CAAA;AAC5B;gBAED,MAAM,EAAE6J,QAAQ,EAAE,GAAGnJ,QAAOuC,MAAM,CAACpB,GAAG,CAAC,2BAAA,CAAA;AACvC,gBAAA,MAAMmI,iBAAoB,GAAA;AAAC,oBAAA,UAAA;AAAY,oBAAA,UAAA;AAAY,oBAAA;AAAQ,iBAAA;;gBAG3D,MAAMC,WAAAA,GAAchL,OAClBD,CAAAA,MAAAA,CAAOgL,iBAAmB9K,EAAAA,OAAAA,CAAQ2K,UAAUK,aAAiBL,CAAAA,GAAAA,QAAAA,CAASK,aAAa,GAAG,EAAE,CAAA,CAAA;;AAI1F,gBAAA,MAAMC,cAAcC,MAAOC,CAAAA,IAAI,CAAC/J,GAAAA,CAAIiB,OAAO,CAACC,IAAI,CAAE8I,CAAAA,MAAM,CAAC,CAACxI,GAAAA,GAAQ,CAACmI,WAAAA,CAAYM,QAAQ,CAACzI,GAAAA,CAAAA,CAAAA;gBAExF,IAAIqI,WAAAA,CAAYjJ,MAAM,GAAG,CAAG,EAAA;;oBAE1B,MAAM,IAAIjB,gBAAgB,CAAC,oBAAoB,EAAEkK,WAAYK,CAAAA,IAAI,CAAC,IAAO,CAAA,CAAA,CAAA,CAAA;AAC1E;AAED,gBAAA,MAAMlJ,MAAS,GAAA;oBACb,GAAGxC,CAAAA,CAAE2L,IAAI,CAACnK,GAAAA,CAAIiB,OAAO,CAACC,IAAI,EAAEyI,WAAY,CAAA;oBACxC5I,QAAU,EAAA;AAChB,iBAAA;AAEI,gBAAA,MAAMgE,WAAc3E,GAAAA,OAAAA,CAAOuC,MAAM,CAACpB,GAAG,CAAC,2CAAA,CAAA;AAEtC,gBAAA,MAAMpC,qBAAqB6B,MAAQ+D,EAAAA,WAAAA,CAAAA;gBAEnC,MAAMqF,IAAAA,GAAO,MAAMhK,OAAOuB,CAAAA,EAAE,CACzBC,KAAK,CAAC,gCACNC,CAAAA,CAAAA,OAAO,CAAC;oBAAEC,KAAO,EAAA;AAAEV,wBAAAA,IAAAA,EAAMoI,SAASa;AAAc;AAAA,iBAAA,CAAA;AAEnD,gBAAA,IAAI,CAACD,IAAM,EAAA;AACT,oBAAA,MAAM,IAAI1K,gBAAiB,CAAA,qCAAA,CAAA;AAC5B;AAED,gBAAA,MAAM,EAAEsC,KAAK,EAAEE,QAAQ,EAAEnB,QAAQ,EAAE,GAAGC,MAAAA;AAEtC,gBAAA,MAAMsJ,gBAAmB,GAAA;oBACvBvI,GAAK,EAAA;AACH,wBAAA;AAAEC,4BAAAA,KAAAA,EAAOA,MAAMC,WAAW;AAAI,yBAAA;AAC9B,wBAAA;AAAEC,4BAAAA,QAAAA,EAAUF,MAAMC,WAAW;AAAI,yBAAA;AACjC,wBAAA;AAAEC,4BAAAA;AAAU,yBAAA;AACZ,wBAAA;4BAAEF,KAAOE,EAAAA;AAAU;AACpB;AACP,iBAAA;gBAEI,MAAMqI,oBAAAA,GAAuB,MAAMnK,OAAOuB,CAAAA,EAAE,CAACC,KAAK,CAAC,gCAAkC4I,CAAAA,CAAAA,KAAK,CAAC;oBACzF1I,KAAO,EAAA;AAAE,wBAAA,GAAGwI,gBAAgB;AAAEvJ,wBAAAA;AAAU;AAC9C,iBAAA,CAAA;AAEI,gBAAA,IAAIwJ,uBAAuB,CAAG,EAAA;AAC5B,oBAAA,MAAM,IAAI7K,gBAAiB,CAAA,qCAAA,CAAA;AAC5B;gBAED,IAAI8J,QAAAA,CAASiB,YAAY,EAAE;oBACzB,MAAMF,oBAAAA,GAAuB,MAAMnK,OAAOuB,CAAAA,EAAE,CAACC,KAAK,CAAC,gCAAkC4I,CAAAA,CAAAA,KAAK,CAAC;wBACzF1I,KAAO,EAAA;AAAE,4BAAA,GAAGwI;AAAkB;AACtC,qBAAA,CAAA;AAEM,oBAAA,IAAIC,uBAAuB,CAAG,EAAA;AAC5B,wBAAA,MAAM,IAAI7K,gBAAiB,CAAA,qCAAA,CAAA;AAC5B;AACF;AAED,gBAAA,MAAMgL,OAAU,GAAA;AACd,oBAAA,GAAG1J,MAAM;AACToJ,oBAAAA,IAAAA,EAAMA,KAAKpH,EAAE;AACbhB,oBAAAA,KAAAA,EAAOA,MAAMC,WAAW,EAAA;AACxBC,oBAAAA,QAAAA;oBACAM,SAAW,EAAA,CAACgH,SAASmB;AAC3B,iBAAA;AAEI,gBAAA,MAAM5K,IAAO,GAAA,MAAMf,UAAW,CAAA,MAAA,CAAA,CAAQ4L,GAAG,CAACF,OAAAA,CAAAA;gBAE1C,MAAMG,aAAAA,GAAgB,MAAM/K,YAAAA,CAAaC,IAAMC,EAAAA,GAAAA,CAAAA;gBAE/C,IAAIwJ,QAAAA,CAASmB,kBAAkB,EAAE;oBAC/B,IAAI;wBACF,MAAM3L,UAAAA,CAAW,MAAQ8L,CAAAA,CAAAA,qBAAqB,CAACD,aAAAA,CAAAA;AAChD,qBAAA,CAAC,OAAO7E,GAAK,EAAA;wBACZ5F,OAAO6F,CAAAA,GAAG,CAACrB,KAAK,CAACoB,GAAAA,CAAAA;AACjB,wBAAA,MAAM,IAAItG,gBAAiB,CAAA,kCAAA,CAAA;AAC5B;oBAED,OAAOM,GAAAA,CAAIuE,IAAI,CAAC;wBAAExE,IAAM8K,EAAAA;AAAe,qBAAA,CAAA;AACxC;AAED,gBAAA,MAAMnI,OAAOtC,OAAOuC,CAAAA,MAAM,CAACpB,GAAG,CAAC,yCAA2C,EAAA,gBAAA,CAAA;AAC1E,gBAAA,IAAImB,SAAS,SAAW,EAAA;oBACtB,MAAM/B,QAAAA,GAAWF,gBAAgBT,GAAIiB,CAAAA,OAAO,CAACC,IAAI,CAAA,IAAK5C,OAAO8G,UAAU,EAAA;AAEvE,oBAAA,MAAMxC,OAAU,GAAA,MAAMxC,OACnByC,CAAAA,cAAc,CAAC,mBAAA,CAAA,CACfC,oBAAoB,CAACC,MAAOhD,CAAAA,IAAAA,CAAKiD,EAAE,CAAA,EAAGrC,QAAU,EAAA;wBAAES,IAAM,EAAA;AAAS,qBAAA,CAAA;oBAEpE,MAAM6B,MAAAA,GAAS,MAAM7C,OAClByC,CAAAA,cAAc,CAAC,mBACfK,CAAAA,CAAAA,mBAAmB,CAACN,OAAAA,CAAQO,KAAK,CAAA;AACpC,oBAAA,IAAI,WAAWF,MAAQ,EAAA;AACrB,wBAAA,MAAM,IAAIvD,gBAAiB,CAAA,qBAAA,CAAA;AAC5B;oBAED,OAAOM,GAAAA,CAAIuE,IAAI,CAAC;AAAEC,wBAAAA,GAAAA,EAAKvB,OAAOE,KAAK;AAAEsB,wBAAAA,YAAAA,EAAc7B,QAAQO,KAAK;wBAAEpD,IAAM8K,EAAAA;AAAe,qBAAA,CAAA;AACxF;gBAED,MAAMrG,GAAAA,GAAMxF,WAAW,KAAO0F,CAAAA,CAAAA,KAAK,CAAClG,CAAE2L,CAAAA,IAAI,CAACpK,IAAM,EAAA;AAAC,oBAAA;AAAK,iBAAA,CAAA,CAAA;gBACvD,OAAOC,GAAAA,CAAIuE,IAAI,CAAC;AAAEC,oBAAAA,GAAAA;oBAAKzE,IAAM8K,EAAAA;AAAa,iBAAA,CAAA;AAC3C,aAAA;AAED,YAAA,MAAME,iBAAkB/K,CAAAA,CAAAA,GAAG,EAAEqG,IAAI,EAAE2E,UAAU,EAAA;gBAC3C,MAAM,EAAEC,cAAcC,iBAAiB,EAAE,GAAG,MAAM3L,6BAAAA,CAA8BS,IAAI4B,KAAK,CAAA;AAEzF,gBAAA,MAAMuJ,cAAcnM,UAAW,CAAA,MAAA,CAAA;AAC/B,gBAAA,MAAMoM,aAAapM,UAAW,CAAA,KAAA,CAAA;AAE9B,gBAAA,MAAM,CAACe,IAAK,CAAA,GAAG,MAAMoL,WAAAA,CAAYE,QAAQ,CAAC;oBAAEC,OAAS,EAAA;AAAEJ,wBAAAA;AAAmB;AAAA,iBAAA,CAAA;AAE1E,gBAAA,IAAI,CAACnL,IAAM,EAAA;AACT,oBAAA,MAAM,IAAIJ,eAAgB,CAAA,eAAA,CAAA;AAC3B;AAED,gBAAA,MAAMwL,WAAYlG,CAAAA,IAAI,CAAClF,IAAAA,CAAKiD,EAAE,EAAE;oBAAER,SAAW,EAAA,IAAA;oBAAM0I,iBAAmB,EAAA;AAAI,iBAAA,CAAA;AAE1E,gBAAA,IAAIF,UAAY,EAAA;AACdhL,oBAAAA,GAAAA,CAAIuE,IAAI,CAAC;wBACPC,GAAK4G,EAAAA,UAAAA,CAAW1G,KAAK,CAAC;AAAE1B,4BAAAA,EAAAA,EAAIjD,KAAKiD;;wBACjCjD,IAAM,EAAA,MAAMD,aAAaC,IAAMC,EAAAA,GAAAA;AACvC,qBAAA,CAAA;iBACW,MAAA;AACL,oBAAA,MAAMwJ,QAAW,GAAA,MAAMpJ,OACpBe,CAAAA,KAAK,CAAC;wBAAEC,IAAM,EAAA,QAAA;wBAAUC,IAAM,EAAA,mBAAA;wBAAqBG,GAAK,EAAA;uBACxDD,GAAG,EAAA;AAENvB,oBAAAA,GAAAA,CAAIuL,QAAQ,CAAC/B,QAASgC,CAAAA,8BAA8B,IAAI,GAAA,CAAA;AACzD;AACF,aAAA;AAED,YAAA,MAAMC,uBAAsBzL,GAAG,EAAA;gBAC7B,MAAM,EAAEgC,KAAK,EAAE,GAAG,MAAM5C,iCAAkCY,CAAAA,GAAAA,CAAIiB,OAAO,CAACC,IAAI,CAAA;gBAE1E,MAAMnB,IAAAA,GAAO,MAAMK,OAAOuB,CAAAA,EAAE,CAACC,KAAK,CAAC,gCAAkCC,CAAAA,CAAAA,OAAO,CAAC;oBAC3EC,KAAO,EAAA;AAAEE,wBAAAA,KAAAA,EAAOA,MAAMC,WAAW;AAAI;AAC3C,iBAAA,CAAA;AAEI,gBAAA,IAAI,CAAClC,IAAM,EAAA;oBACT,OAAOC,GAAAA,CAAIuE,IAAI,CAAC;AAAEvC,wBAAAA,KAAAA;wBAAO0J,IAAM,EAAA;AAAI,qBAAA,CAAA;AACpC;gBAED,IAAI3L,IAAAA,CAAKyC,SAAS,EAAE;AAClB,oBAAA,MAAM,IAAI9C,gBAAiB,CAAA,mBAAA,CAAA;AAC5B;gBAED,IAAIK,IAAAA,CAAK0C,OAAO,EAAE;AAChB,oBAAA,MAAM,IAAI/C,gBAAiB,CAAA,cAAA,CAAA;AAC5B;gBAED,MAAMV,UAAAA,CAAW,MAAQ8L,CAAAA,CAAAA,qBAAqB,CAAC/K,IAAAA,CAAAA;AAE/CC,gBAAAA,GAAAA,CAAIuE,IAAI,CAAC;AACPvC,oBAAAA,KAAAA,EAAOjC,KAAKiC,KAAK;oBACjB0J,IAAM,EAAA;AACZ,iBAAA,CAAA;AACG;SACH,CAAA;;;;;;"}
@@ -0,0 +1,168 @@
1
+ 'use strict';
2
+
3
+ var require$$0 = require('lodash');
4
+ var require$$1 = require('@strapi/utils');
5
+ var user = require('./validation/user.js');
6
+
7
+ var contentManagerUser;
8
+ var hasRequiredContentManagerUser;
9
+ function requireContentManagerUser() {
10
+ if (hasRequiredContentManagerUser) return contentManagerUser;
11
+ hasRequiredContentManagerUser = 1;
12
+ const _ = require$$0;
13
+ const { contentTypes: contentTypesUtils } = require$$1;
14
+ const { ApplicationError, NotFoundError, ForbiddenError } = require$$1.errors;
15
+ const { validateCreateUserBody, validateUpdateUserBody } = user.__require();
16
+ const { UPDATED_BY_ATTRIBUTE, CREATED_BY_ATTRIBUTE } = contentTypesUtils.constants;
17
+ const userModel = 'plugin::users-permissions.user';
18
+ const ACTIONS = {
19
+ read: 'plugin::content-manager.explorer.read',
20
+ create: 'plugin::content-manager.explorer.create',
21
+ edit: 'plugin::content-manager.explorer.update',
22
+ delete: 'plugin::content-manager.explorer.delete'
23
+ };
24
+ const findEntityAndCheckPermissions = async (ability, action, model, id)=>{
25
+ const doc = await strapi.service('plugin::content-manager.document-manager').findOne(id, model, {
26
+ populate: [
27
+ `${CREATED_BY_ATTRIBUTE}.roles`
28
+ ]
29
+ });
30
+ if (_.isNil(doc)) {
31
+ throw new NotFoundError();
32
+ }
33
+ const pm = strapi.service('admin::permission').createPermissionsManager({
34
+ ability,
35
+ action,
36
+ model
37
+ });
38
+ if (pm.ability.cannot(pm.action, pm.toSubject(doc))) {
39
+ throw new ForbiddenError();
40
+ }
41
+ const docWithoutCreatorRoles = _.omit(doc, `${CREATED_BY_ATTRIBUTE}.roles`);
42
+ return {
43
+ pm,
44
+ doc: docWithoutCreatorRoles
45
+ };
46
+ };
47
+ contentManagerUser = {
48
+ /**
49
+ * Create a/an user record.
50
+ * @return {Object}
51
+ */ async create (ctx) {
52
+ const { body } = ctx.request;
53
+ const { user: admin, userAbility } = ctx.state;
54
+ const { email, username } = body;
55
+ const pm = strapi.service('admin::permission').createPermissionsManager({
56
+ ability: userAbility,
57
+ action: ACTIONS.create,
58
+ model: userModel
59
+ });
60
+ if (!pm.isAllowed) {
61
+ return ctx.forbidden();
62
+ }
63
+ const sanitizedBody = await pm.pickPermittedFieldsOf(body, {
64
+ subject: userModel
65
+ });
66
+ const advanced = await strapi.store({
67
+ type: 'plugin',
68
+ name: 'users-permissions',
69
+ key: 'advanced'
70
+ }).get();
71
+ await validateCreateUserBody(ctx.request.body);
72
+ const userWithSameUsername = await strapi.db.query('plugin::users-permissions.user').findOne({
73
+ where: {
74
+ username
75
+ }
76
+ });
77
+ if (userWithSameUsername) {
78
+ throw new ApplicationError('Username already taken');
79
+ }
80
+ if (advanced.unique_email) {
81
+ const userWithSameEmail = await strapi.db.query('plugin::users-permissions.user').findOne({
82
+ where: {
83
+ email: email.toLowerCase()
84
+ }
85
+ });
86
+ if (userWithSameEmail) {
87
+ throw new ApplicationError('Email already taken');
88
+ }
89
+ }
90
+ const user = {
91
+ ...sanitizedBody,
92
+ provider: 'local',
93
+ [CREATED_BY_ATTRIBUTE]: admin.id,
94
+ [UPDATED_BY_ATTRIBUTE]: admin.id
95
+ };
96
+ user.email = _.toLower(user.email);
97
+ try {
98
+ const data = await strapi.service('plugin::content-manager.document-manager').create(userModel, {
99
+ data: user
100
+ });
101
+ const sanitizedData = await pm.sanitizeOutput(data, {
102
+ action: ACTIONS.read
103
+ });
104
+ ctx.created(sanitizedData);
105
+ } catch (error) {
106
+ throw new ApplicationError(error.message);
107
+ }
108
+ },
109
+ /**
110
+ * Update a/an user record.
111
+ * @return {Object}
112
+ */ async update (ctx) {
113
+ const { id: documentId } = ctx.params;
114
+ const { body } = ctx.request;
115
+ const { user: admin, userAbility } = ctx.state;
116
+ const advancedConfigs = await strapi.store({
117
+ type: 'plugin',
118
+ name: 'users-permissions',
119
+ key: 'advanced'
120
+ }).get();
121
+ const { email, username, password } = body;
122
+ const { pm, doc } = await findEntityAndCheckPermissions(userAbility, ACTIONS.edit, userModel, documentId);
123
+ const user = doc;
124
+ await validateUpdateUserBody(ctx.request.body);
125
+ if (_.has(body, 'password') && (password == null || password === '')) {
126
+ delete body.password;
127
+ }
128
+ if (_.has(body, 'username')) {
129
+ const userWithSameUsername = await strapi.db.query('plugin::users-permissions.user').findOne({
130
+ where: {
131
+ username
132
+ }
133
+ });
134
+ if (userWithSameUsername && _.toString(userWithSameUsername.id) !== _.toString(user.id)) {
135
+ throw new ApplicationError('Username already taken');
136
+ }
137
+ }
138
+ if (_.has(body, 'email') && advancedConfigs.unique_email) {
139
+ const userWithSameEmail = await strapi.db.query('plugin::users-permissions.user').findOne({
140
+ where: {
141
+ email: _.toLower(email)
142
+ }
143
+ });
144
+ if (userWithSameEmail && _.toString(userWithSameEmail.id) !== _.toString(user.id)) {
145
+ throw new ApplicationError('Email already taken');
146
+ }
147
+ body.email = _.toLower(body.email);
148
+ }
149
+ const sanitizedData = await pm.pickPermittedFieldsOf(body, {
150
+ subject: pm.toSubject(user)
151
+ });
152
+ const updateData = _.omit({
153
+ ...sanitizedData,
154
+ updatedBy: admin.id
155
+ }, 'createdBy');
156
+ const data = await strapi.service('plugin::content-manager.document-manager').update(documentId, userModel, {
157
+ data: updateData
158
+ });
159
+ ctx.body = await pm.sanitizeOutput(data, {
160
+ action: ACTIONS.read
161
+ });
162
+ }
163
+ };
164
+ return contentManagerUser;
165
+ }
166
+
167
+ exports.__require = requireContentManagerUser;
168
+ //# sourceMappingURL=content-manager-user.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"content-manager-user.js","sources":["../../../server/controllers/content-manager-user.js"],"sourcesContent":["'use strict';\n\nconst _ = require('lodash');\nconst { contentTypes: contentTypesUtils } = require('@strapi/utils');\nconst { ApplicationError, NotFoundError, ForbiddenError } = require('@strapi/utils').errors;\nconst { validateCreateUserBody, validateUpdateUserBody } = require('./validation/user');\n\nconst { UPDATED_BY_ATTRIBUTE, CREATED_BY_ATTRIBUTE } = contentTypesUtils.constants;\n\nconst userModel = 'plugin::users-permissions.user';\nconst ACTIONS = {\n read: 'plugin::content-manager.explorer.read',\n create: 'plugin::content-manager.explorer.create',\n edit: 'plugin::content-manager.explorer.update',\n delete: 'plugin::content-manager.explorer.delete',\n};\n\nconst findEntityAndCheckPermissions = async (ability, action, model, id) => {\n const doc = await strapi.service('plugin::content-manager.document-manager').findOne(id, model, {\n populate: [`${CREATED_BY_ATTRIBUTE}.roles`],\n });\n\n if (_.isNil(doc)) {\n throw new NotFoundError();\n }\n\n const pm = strapi\n .service('admin::permission')\n .createPermissionsManager({ ability, action, model });\n\n if (pm.ability.cannot(pm.action, pm.toSubject(doc))) {\n throw new ForbiddenError();\n }\n\n const docWithoutCreatorRoles = _.omit(doc, `${CREATED_BY_ATTRIBUTE}.roles`);\n\n return { pm, doc: docWithoutCreatorRoles };\n};\n\nmodule.exports = {\n /**\n * Create a/an user record.\n * @return {Object}\n */\n async create(ctx) {\n const { body } = ctx.request;\n const { user: admin, userAbility } = ctx.state;\n\n const { email, username } = body;\n\n const pm = strapi.service('admin::permission').createPermissionsManager({\n ability: userAbility,\n action: ACTIONS.create,\n model: userModel,\n });\n\n if (!pm.isAllowed) {\n return ctx.forbidden();\n }\n\n const sanitizedBody = await pm.pickPermittedFieldsOf(body, { subject: userModel });\n\n const advanced = await strapi\n .store({ type: 'plugin', name: 'users-permissions', key: 'advanced' })\n .get();\n\n await validateCreateUserBody(ctx.request.body);\n\n const userWithSameUsername = await strapi.db\n .query('plugin::users-permissions.user')\n .findOne({ where: { username } });\n\n if (userWithSameUsername) {\n throw new ApplicationError('Username already taken');\n }\n\n if (advanced.unique_email) {\n const userWithSameEmail = await strapi.db\n .query('plugin::users-permissions.user')\n .findOne({ where: { email: email.toLowerCase() } });\n\n if (userWithSameEmail) {\n throw new ApplicationError('Email already taken');\n }\n }\n\n const user = {\n ...sanitizedBody,\n provider: 'local',\n [CREATED_BY_ATTRIBUTE]: admin.id,\n [UPDATED_BY_ATTRIBUTE]: admin.id,\n };\n\n user.email = _.toLower(user.email);\n\n try {\n const data = await strapi\n .service('plugin::content-manager.document-manager')\n .create(userModel, { data: user });\n\n const sanitizedData = await pm.sanitizeOutput(data, { action: ACTIONS.read });\n\n ctx.created(sanitizedData);\n } catch (error) {\n throw new ApplicationError(error.message);\n }\n },\n /**\n * Update a/an user record.\n * @return {Object}\n */\n\n async update(ctx) {\n const { id: documentId } = ctx.params;\n const { body } = ctx.request;\n const { user: admin, userAbility } = ctx.state;\n\n const advancedConfigs = await strapi\n .store({ type: 'plugin', name: 'users-permissions', key: 'advanced' })\n .get();\n\n const { email, username, password } = body;\n\n const { pm, doc } = await findEntityAndCheckPermissions(\n userAbility,\n ACTIONS.edit,\n userModel,\n documentId\n );\n\n const user = doc;\n\n await validateUpdateUserBody(ctx.request.body);\n\n if (_.has(body, 'password') && (password == null || password === '')) {\n delete body.password;\n }\n\n if (_.has(body, 'username')) {\n const userWithSameUsername = await strapi.db\n .query('plugin::users-permissions.user')\n .findOne({ where: { username } });\n\n if (userWithSameUsername && _.toString(userWithSameUsername.id) !== _.toString(user.id)) {\n throw new ApplicationError('Username already taken');\n }\n }\n\n if (_.has(body, 'email') && advancedConfigs.unique_email) {\n const userWithSameEmail = await strapi.db\n .query('plugin::users-permissions.user')\n .findOne({ where: { email: _.toLower(email) } });\n\n if (userWithSameEmail && _.toString(userWithSameEmail.id) !== _.toString(user.id)) {\n throw new ApplicationError('Email already taken');\n }\n\n body.email = _.toLower(body.email);\n }\n\n const sanitizedData = await pm.pickPermittedFieldsOf(body, { subject: pm.toSubject(user) });\n const updateData = _.omit({ ...sanitizedData, updatedBy: admin.id }, 'createdBy');\n\n const data = await strapi\n .service('plugin::content-manager.document-manager')\n .update(documentId, userModel, {\n data: updateData,\n });\n\n ctx.body = await pm.sanitizeOutput(data, { action: ACTIONS.read });\n },\n};\n"],"names":["_","require$$0","contentTypes","contentTypesUtils","require$$1","ApplicationError","NotFoundError","ForbiddenError","errors","validateCreateUserBody","validateUpdateUserBody","require$$2","UPDATED_BY_ATTRIBUTE","CREATED_BY_ATTRIBUTE","constants","userModel","ACTIONS","read","create","edit","delete","findEntityAndCheckPermissions","ability","action","model","id","doc","strapi","service","findOne","populate","isNil","pm","createPermissionsManager","cannot","toSubject","docWithoutCreatorRoles","omit","contentManagerUser","ctx","body","request","user","admin","userAbility","state","email","username","isAllowed","forbidden","sanitizedBody","pickPermittedFieldsOf","subject","advanced","store","type","name","key","get","userWithSameUsername","db","query","where","unique_email","userWithSameEmail","toLowerCase","provider","toLower","data","sanitizedData","sanitizeOutput","created","error","message","update","documentId","params","advancedConfigs","password","has","toString","updateData","updatedBy"],"mappings":";;;;;;;;;;;AAEA,IAAA,MAAMA,CAAIC,GAAAA,UAAAA;AACV,IAAA,MAAM,EAAEC,YAAAA,EAAcC,iBAAiB,EAAE,GAAGC,UAAAA;IAC5C,MAAM,EAAEC,gBAAgB,EAAEC,aAAa,EAAEC,cAAc,EAAE,GAAGH,UAAAA,CAAyBI,MAAM;AAC3F,IAAA,MAAM,EAAEC,sBAAsB,EAAEC,sBAAsB,EAAE,GAAGC,cAAAA,EAAAA;AAE3D,IAAA,MAAM,EAAEC,oBAAoB,EAAEC,oBAAoB,EAAE,GAAGV,kBAAkBW,SAAS;AAElF,IAAA,MAAMC,SAAY,GAAA,gCAAA;AAClB,IAAA,MAAMC,OAAU,GAAA;QACdC,IAAM,EAAA,uCAAA;QACNC,MAAQ,EAAA,yCAAA;QACRC,IAAM,EAAA,yCAAA;QACNC,MAAQ,EAAA;AACV,KAAA;AAEA,IAAA,MAAMC,6BAAgC,GAAA,OAAOC,OAASC,EAAAA,MAAAA,EAAQC,KAAOC,EAAAA,EAAAA,GAAAA;QACnE,MAAMC,GAAAA,GAAM,MAAMC,MAAOC,CAAAA,OAAO,CAAC,0CAA4CC,CAAAA,CAAAA,OAAO,CAACJ,EAAAA,EAAID,KAAO,EAAA;YAC9FM,QAAU,EAAA;gBAAC,CAAGjB,EAAAA,oBAAAA,CAAqB,MAAM;AAAE;AAC/C,SAAA,CAAA;QAEE,IAAIb,CAAAA,CAAE+B,KAAK,CAACL,GAAM,CAAA,EAAA;AAChB,YAAA,MAAM,IAAIpB,aAAAA,EAAAA;AACX;AAED,QAAA,MAAM0B,KAAKL,MACRC,CAAAA,OAAO,CAAC,mBAAA,CAAA,CACRK,wBAAwB,CAAC;AAAEX,YAAAA,OAAAA;AAASC,YAAAA,MAAAA;AAAQC,YAAAA;AAAO,SAAA,CAAA;QAEtD,IAAIQ,EAAAA,CAAGV,OAAO,CAACY,MAAM,CAACF,EAAGT,CAAAA,MAAM,EAAES,EAAAA,CAAGG,SAAS,CAACT,GAAO,CAAA,CAAA,EAAA;AACnD,YAAA,MAAM,IAAInB,cAAAA,EAAAA;AACX;QAED,MAAM6B,sBAAAA,GAAyBpC,EAAEqC,IAAI,CAACX,KAAK,CAAGb,EAAAA,oBAAAA,CAAqB,MAAM,CAAC,CAAA;QAE1E,OAAO;AAAEmB,YAAAA,EAAAA;YAAIN,GAAKU,EAAAA;;AACpB,KAAA;IAEAE,kBAAiB,GAAA;AACjB;;;OAIE,MAAMpB,QAAOqB,GAAG,EAAA;AACd,YAAA,MAAM,EAAEC,IAAI,EAAE,GAAGD,IAAIE,OAAO;YAC5B,MAAM,EAAEC,MAAMC,KAAK,EAAEC,WAAW,EAAE,GAAGL,IAAIM,KAAK;AAE9C,YAAA,MAAM,EAAEC,KAAK,EAAEC,QAAQ,EAAE,GAAGP,IAAAA;AAE5B,YAAA,MAAMR,KAAKL,MAAOC,CAAAA,OAAO,CAAC,mBAAA,CAAA,CAAqBK,wBAAwB,CAAC;gBACtEX,OAASsB,EAAAA,WAAAA;AACTrB,gBAAAA,MAAAA,EAAQP,QAAQE,MAAM;gBACtBM,KAAOT,EAAAA;AACb,aAAA,CAAA;YAEI,IAAI,CAACiB,EAAGgB,CAAAA,SAAS,EAAE;AACjB,gBAAA,OAAOT,IAAIU,SAAS,EAAA;AACrB;AAED,YAAA,MAAMC,aAAgB,GAAA,MAAMlB,EAAGmB,CAAAA,qBAAqB,CAACX,IAAM,EAAA;gBAAEY,OAASrC,EAAAA;AAAS,aAAA,CAAA;AAE/E,YAAA,MAAMsC,QAAW,GAAA,MAAM1B,MACpB2B,CAAAA,KAAK,CAAC;gBAAEC,IAAM,EAAA,QAAA;gBAAUC,IAAM,EAAA,mBAAA;gBAAqBC,GAAK,EAAA;eACxDC,GAAG,EAAA;AAEN,YAAA,MAAMjD,sBAAuB8B,CAAAA,GAAAA,CAAIE,OAAO,CAACD,IAAI,CAAA;YAE7C,MAAMmB,oBAAAA,GAAuB,MAAMhC,MAAOiC,CAAAA,EAAE,CACzCC,KAAK,CAAC,gCACNhC,CAAAA,CAAAA,OAAO,CAAC;gBAAEiC,KAAO,EAAA;AAAEf,oBAAAA;AAAQ;AAAI,aAAA,CAAA;AAElC,YAAA,IAAIY,oBAAsB,EAAA;AACxB,gBAAA,MAAM,IAAItD,gBAAiB,CAAA,wBAAA,CAAA;AAC5B;YAED,IAAIgD,QAAAA,CAASU,YAAY,EAAE;gBACzB,MAAMC,iBAAAA,GAAoB,MAAMrC,MAAOiC,CAAAA,EAAE,CACtCC,KAAK,CAAC,gCACNhC,CAAAA,CAAAA,OAAO,CAAC;oBAAEiC,KAAO,EAAA;AAAEhB,wBAAAA,KAAAA,EAAOA,MAAMmB,WAAW;AAAI;AAAA,iBAAA,CAAA;AAElD,gBAAA,IAAID,iBAAmB,EAAA;AACrB,oBAAA,MAAM,IAAI3D,gBAAiB,CAAA,qBAAA,CAAA;AAC5B;AACF;AAED,YAAA,MAAMqC,IAAO,GAAA;AACX,gBAAA,GAAGQ,aAAa;gBAChBgB,QAAU,EAAA,OAAA;gBACV,CAACrD,oBAAAA,GAAuB8B,KAAAA,CAAMlB,EAAE;gBAChC,CAACb,oBAAAA,GAAuB+B,KAAAA,CAAMlB;AACpC,aAAA;AAEIiB,YAAAA,IAAAA,CAAKI,KAAK,GAAG9C,CAAAA,CAAEmE,OAAO,CAACzB,KAAKI,KAAK,CAAA;YAEjC,IAAI;gBACF,MAAMsB,IAAAA,GAAO,MAAMzC,MAChBC,CAAAA,OAAO,CAAC,0CACRV,CAAAA,CAAAA,MAAM,CAACH,SAAW,EAAA;oBAAEqD,IAAM1B,EAAAA;AAAM,iBAAA,CAAA;AAEnC,gBAAA,MAAM2B,aAAgB,GAAA,MAAMrC,EAAGsC,CAAAA,cAAc,CAACF,IAAM,EAAA;AAAE7C,oBAAAA,MAAAA,EAAQP,QAAQC;AAAI,iBAAA,CAAA;AAE1EsB,gBAAAA,GAAAA,CAAIgC,OAAO,CAACF,aAAAA,CAAAA;AACb,aAAA,CAAC,OAAOG,KAAO,EAAA;gBACd,MAAM,IAAInE,gBAAiBmE,CAAAA,KAAAA,CAAMC,OAAO,CAAA;AACzC;AACF,SAAA;AACH;;;OAKE,MAAMC,QAAOnC,GAAG,EAAA;AACd,YAAA,MAAM,EAAEd,EAAIkD,EAAAA,UAAU,EAAE,GAAGpC,IAAIqC,MAAM;AACrC,YAAA,MAAM,EAAEpC,IAAI,EAAE,GAAGD,IAAIE,OAAO;YAC5B,MAAM,EAAEC,MAAMC,KAAK,EAAEC,WAAW,EAAE,GAAGL,IAAIM,KAAK;AAE9C,YAAA,MAAMgC,eAAkB,GAAA,MAAMlD,MAC3B2B,CAAAA,KAAK,CAAC;gBAAEC,IAAM,EAAA,QAAA;gBAAUC,IAAM,EAAA,mBAAA;gBAAqBC,GAAK,EAAA;eACxDC,GAAG,EAAA;AAEN,YAAA,MAAM,EAAEZ,KAAK,EAAEC,QAAQ,EAAE+B,QAAQ,EAAE,GAAGtC,IAAAA;AAEtC,YAAA,MAAM,EAAER,EAAE,EAAEN,GAAG,EAAE,GAAG,MAAML,6BAAAA,CACxBuB,WACA5B,EAAAA,OAAAA,CAAQG,IAAI,EACZJ,SACA4D,EAAAA,UAAAA,CAAAA;AAGF,YAAA,MAAMjC,IAAOhB,GAAAA,GAAAA;AAEb,YAAA,MAAMhB,sBAAuB6B,CAAAA,GAAAA,CAAIE,OAAO,CAACD,IAAI,CAAA;YAE7C,IAAIxC,CAAAA,CAAE+E,GAAG,CAACvC,IAAM,EAAA,UAAA,CAAA,KAAgBsC,QAAY,IAAA,IAAA,IAAQA,QAAa,KAAA,EAAA,CAAK,EAAA;AACpE,gBAAA,OAAOtC,KAAKsC,QAAQ;AACrB;AAED,YAAA,IAAI9E,CAAE+E,CAAAA,GAAG,CAACvC,IAAAA,EAAM,UAAa,CAAA,EAAA;gBAC3B,MAAMmB,oBAAAA,GAAuB,MAAMhC,MAAOiC,CAAAA,EAAE,CACzCC,KAAK,CAAC,gCACNhC,CAAAA,CAAAA,OAAO,CAAC;oBAAEiC,KAAO,EAAA;AAAEf,wBAAAA;AAAQ;AAAI,iBAAA,CAAA;AAElC,gBAAA,IAAIY,oBAAwB3D,IAAAA,CAAAA,CAAEgF,QAAQ,CAACrB,oBAAqBlC,CAAAA,EAAE,CAAMzB,KAAAA,CAAAA,CAAEgF,QAAQ,CAACtC,IAAKjB,CAAAA,EAAE,CAAG,EAAA;AACvF,oBAAA,MAAM,IAAIpB,gBAAiB,CAAA,wBAAA,CAAA;AAC5B;AACF;AAED,YAAA,IAAIL,EAAE+E,GAAG,CAACvC,MAAM,OAAYqC,CAAAA,IAAAA,eAAAA,CAAgBd,YAAY,EAAE;gBACxD,MAAMC,iBAAAA,GAAoB,MAAMrC,MAAOiC,CAAAA,EAAE,CACtCC,KAAK,CAAC,gCACNhC,CAAAA,CAAAA,OAAO,CAAC;oBAAEiC,KAAO,EAAA;wBAAEhB,KAAO9C,EAAAA,CAAAA,CAAEmE,OAAO,CAACrB,KAAAA;AAAQ;AAAA,iBAAA,CAAA;AAE/C,gBAAA,IAAIkB,iBAAqBhE,IAAAA,CAAAA,CAAEgF,QAAQ,CAAChB,iBAAkBvC,CAAAA,EAAE,CAAMzB,KAAAA,CAAAA,CAAEgF,QAAQ,CAACtC,IAAKjB,CAAAA,EAAE,CAAG,EAAA;AACjF,oBAAA,MAAM,IAAIpB,gBAAiB,CAAA,qBAAA,CAAA;AAC5B;AAEDmC,gBAAAA,IAAAA,CAAKM,KAAK,GAAG9C,CAAAA,CAAEmE,OAAO,CAAC3B,KAAKM,KAAK,CAAA;AAClC;AAED,YAAA,MAAMuB,aAAgB,GAAA,MAAMrC,EAAGmB,CAAAA,qBAAqB,CAACX,IAAM,EAAA;gBAAEY,OAASpB,EAAAA,EAAAA,CAAGG,SAAS,CAACO,IAAAA;AAAO,aAAA,CAAA;YAC1F,MAAMuC,UAAAA,GAAajF,CAAEqC,CAAAA,IAAI,CAAC;AAAE,gBAAA,GAAGgC,aAAa;AAAEa,gBAAAA,SAAAA,EAAWvC,MAAMlB;aAAM,EAAA,WAAA,CAAA;YAErE,MAAM2C,IAAAA,GAAO,MAAMzC,MAChBC,CAAAA,OAAO,CAAC,0CACR8C,CAAAA,CAAAA,MAAM,CAACC,UAAAA,EAAY5D,SAAW,EAAA;gBAC7BqD,IAAMa,EAAAA;AACd,aAAA,CAAA;AAEI1C,YAAAA,GAAAA,CAAIC,IAAI,GAAG,MAAMR,EAAGsC,CAAAA,cAAc,CAACF,IAAM,EAAA;AAAE7C,gBAAAA,MAAAA,EAAQP,QAAQC;AAAI,aAAA,CAAA;AAChE;AACH,KAAA;;;;;;"}
@@ -0,0 +1,166 @@
1
+ import require$$0 from 'lodash';
2
+ import require$$1 from '@strapi/utils';
3
+ import { __require as requireUser } from './validation/user.mjs';
4
+
5
+ var contentManagerUser;
6
+ var hasRequiredContentManagerUser;
7
+ function requireContentManagerUser() {
8
+ if (hasRequiredContentManagerUser) return contentManagerUser;
9
+ hasRequiredContentManagerUser = 1;
10
+ const _ = require$$0;
11
+ const { contentTypes: contentTypesUtils } = require$$1;
12
+ const { ApplicationError, NotFoundError, ForbiddenError } = require$$1.errors;
13
+ const { validateCreateUserBody, validateUpdateUserBody } = requireUser();
14
+ const { UPDATED_BY_ATTRIBUTE, CREATED_BY_ATTRIBUTE } = contentTypesUtils.constants;
15
+ const userModel = 'plugin::users-permissions.user';
16
+ const ACTIONS = {
17
+ read: 'plugin::content-manager.explorer.read',
18
+ create: 'plugin::content-manager.explorer.create',
19
+ edit: 'plugin::content-manager.explorer.update',
20
+ delete: 'plugin::content-manager.explorer.delete'
21
+ };
22
+ const findEntityAndCheckPermissions = async (ability, action, model, id)=>{
23
+ const doc = await strapi.service('plugin::content-manager.document-manager').findOne(id, model, {
24
+ populate: [
25
+ `${CREATED_BY_ATTRIBUTE}.roles`
26
+ ]
27
+ });
28
+ if (_.isNil(doc)) {
29
+ throw new NotFoundError();
30
+ }
31
+ const pm = strapi.service('admin::permission').createPermissionsManager({
32
+ ability,
33
+ action,
34
+ model
35
+ });
36
+ if (pm.ability.cannot(pm.action, pm.toSubject(doc))) {
37
+ throw new ForbiddenError();
38
+ }
39
+ const docWithoutCreatorRoles = _.omit(doc, `${CREATED_BY_ATTRIBUTE}.roles`);
40
+ return {
41
+ pm,
42
+ doc: docWithoutCreatorRoles
43
+ };
44
+ };
45
+ contentManagerUser = {
46
+ /**
47
+ * Create a/an user record.
48
+ * @return {Object}
49
+ */ async create (ctx) {
50
+ const { body } = ctx.request;
51
+ const { user: admin, userAbility } = ctx.state;
52
+ const { email, username } = body;
53
+ const pm = strapi.service('admin::permission').createPermissionsManager({
54
+ ability: userAbility,
55
+ action: ACTIONS.create,
56
+ model: userModel
57
+ });
58
+ if (!pm.isAllowed) {
59
+ return ctx.forbidden();
60
+ }
61
+ const sanitizedBody = await pm.pickPermittedFieldsOf(body, {
62
+ subject: userModel
63
+ });
64
+ const advanced = await strapi.store({
65
+ type: 'plugin',
66
+ name: 'users-permissions',
67
+ key: 'advanced'
68
+ }).get();
69
+ await validateCreateUserBody(ctx.request.body);
70
+ const userWithSameUsername = await strapi.db.query('plugin::users-permissions.user').findOne({
71
+ where: {
72
+ username
73
+ }
74
+ });
75
+ if (userWithSameUsername) {
76
+ throw new ApplicationError('Username already taken');
77
+ }
78
+ if (advanced.unique_email) {
79
+ const userWithSameEmail = await strapi.db.query('plugin::users-permissions.user').findOne({
80
+ where: {
81
+ email: email.toLowerCase()
82
+ }
83
+ });
84
+ if (userWithSameEmail) {
85
+ throw new ApplicationError('Email already taken');
86
+ }
87
+ }
88
+ const user = {
89
+ ...sanitizedBody,
90
+ provider: 'local',
91
+ [CREATED_BY_ATTRIBUTE]: admin.id,
92
+ [UPDATED_BY_ATTRIBUTE]: admin.id
93
+ };
94
+ user.email = _.toLower(user.email);
95
+ try {
96
+ const data = await strapi.service('plugin::content-manager.document-manager').create(userModel, {
97
+ data: user
98
+ });
99
+ const sanitizedData = await pm.sanitizeOutput(data, {
100
+ action: ACTIONS.read
101
+ });
102
+ ctx.created(sanitizedData);
103
+ } catch (error) {
104
+ throw new ApplicationError(error.message);
105
+ }
106
+ },
107
+ /**
108
+ * Update a/an user record.
109
+ * @return {Object}
110
+ */ async update (ctx) {
111
+ const { id: documentId } = ctx.params;
112
+ const { body } = ctx.request;
113
+ const { user: admin, userAbility } = ctx.state;
114
+ const advancedConfigs = await strapi.store({
115
+ type: 'plugin',
116
+ name: 'users-permissions',
117
+ key: 'advanced'
118
+ }).get();
119
+ const { email, username, password } = body;
120
+ const { pm, doc } = await findEntityAndCheckPermissions(userAbility, ACTIONS.edit, userModel, documentId);
121
+ const user = doc;
122
+ await validateUpdateUserBody(ctx.request.body);
123
+ if (_.has(body, 'password') && (password == null || password === '')) {
124
+ delete body.password;
125
+ }
126
+ if (_.has(body, 'username')) {
127
+ const userWithSameUsername = await strapi.db.query('plugin::users-permissions.user').findOne({
128
+ where: {
129
+ username
130
+ }
131
+ });
132
+ if (userWithSameUsername && _.toString(userWithSameUsername.id) !== _.toString(user.id)) {
133
+ throw new ApplicationError('Username already taken');
134
+ }
135
+ }
136
+ if (_.has(body, 'email') && advancedConfigs.unique_email) {
137
+ const userWithSameEmail = await strapi.db.query('plugin::users-permissions.user').findOne({
138
+ where: {
139
+ email: _.toLower(email)
140
+ }
141
+ });
142
+ if (userWithSameEmail && _.toString(userWithSameEmail.id) !== _.toString(user.id)) {
143
+ throw new ApplicationError('Email already taken');
144
+ }
145
+ body.email = _.toLower(body.email);
146
+ }
147
+ const sanitizedData = await pm.pickPermittedFieldsOf(body, {
148
+ subject: pm.toSubject(user)
149
+ });
150
+ const updateData = _.omit({
151
+ ...sanitizedData,
152
+ updatedBy: admin.id
153
+ }, 'createdBy');
154
+ const data = await strapi.service('plugin::content-manager.document-manager').update(documentId, userModel, {
155
+ data: updateData
156
+ });
157
+ ctx.body = await pm.sanitizeOutput(data, {
158
+ action: ACTIONS.read
159
+ });
160
+ }
161
+ };
162
+ return contentManagerUser;
163
+ }
164
+
165
+ export { requireContentManagerUser as __require };
166
+ //# sourceMappingURL=content-manager-user.mjs.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"content-manager-user.mjs","sources":["../../../server/controllers/content-manager-user.js"],"sourcesContent":["'use strict';\n\nconst _ = require('lodash');\nconst { contentTypes: contentTypesUtils } = require('@strapi/utils');\nconst { ApplicationError, NotFoundError, ForbiddenError } = require('@strapi/utils').errors;\nconst { validateCreateUserBody, validateUpdateUserBody } = require('./validation/user');\n\nconst { UPDATED_BY_ATTRIBUTE, CREATED_BY_ATTRIBUTE } = contentTypesUtils.constants;\n\nconst userModel = 'plugin::users-permissions.user';\nconst ACTIONS = {\n read: 'plugin::content-manager.explorer.read',\n create: 'plugin::content-manager.explorer.create',\n edit: 'plugin::content-manager.explorer.update',\n delete: 'plugin::content-manager.explorer.delete',\n};\n\nconst findEntityAndCheckPermissions = async (ability, action, model, id) => {\n const doc = await strapi.service('plugin::content-manager.document-manager').findOne(id, model, {\n populate: [`${CREATED_BY_ATTRIBUTE}.roles`],\n });\n\n if (_.isNil(doc)) {\n throw new NotFoundError();\n }\n\n const pm = strapi\n .service('admin::permission')\n .createPermissionsManager({ ability, action, model });\n\n if (pm.ability.cannot(pm.action, pm.toSubject(doc))) {\n throw new ForbiddenError();\n }\n\n const docWithoutCreatorRoles = _.omit(doc, `${CREATED_BY_ATTRIBUTE}.roles`);\n\n return { pm, doc: docWithoutCreatorRoles };\n};\n\nmodule.exports = {\n /**\n * Create a/an user record.\n * @return {Object}\n */\n async create(ctx) {\n const { body } = ctx.request;\n const { user: admin, userAbility } = ctx.state;\n\n const { email, username } = body;\n\n const pm = strapi.service('admin::permission').createPermissionsManager({\n ability: userAbility,\n action: ACTIONS.create,\n model: userModel,\n });\n\n if (!pm.isAllowed) {\n return ctx.forbidden();\n }\n\n const sanitizedBody = await pm.pickPermittedFieldsOf(body, { subject: userModel });\n\n const advanced = await strapi\n .store({ type: 'plugin', name: 'users-permissions', key: 'advanced' })\n .get();\n\n await validateCreateUserBody(ctx.request.body);\n\n const userWithSameUsername = await strapi.db\n .query('plugin::users-permissions.user')\n .findOne({ where: { username } });\n\n if (userWithSameUsername) {\n throw new ApplicationError('Username already taken');\n }\n\n if (advanced.unique_email) {\n const userWithSameEmail = await strapi.db\n .query('plugin::users-permissions.user')\n .findOne({ where: { email: email.toLowerCase() } });\n\n if (userWithSameEmail) {\n throw new ApplicationError('Email already taken');\n }\n }\n\n const user = {\n ...sanitizedBody,\n provider: 'local',\n [CREATED_BY_ATTRIBUTE]: admin.id,\n [UPDATED_BY_ATTRIBUTE]: admin.id,\n };\n\n user.email = _.toLower(user.email);\n\n try {\n const data = await strapi\n .service('plugin::content-manager.document-manager')\n .create(userModel, { data: user });\n\n const sanitizedData = await pm.sanitizeOutput(data, { action: ACTIONS.read });\n\n ctx.created(sanitizedData);\n } catch (error) {\n throw new ApplicationError(error.message);\n }\n },\n /**\n * Update a/an user record.\n * @return {Object}\n */\n\n async update(ctx) {\n const { id: documentId } = ctx.params;\n const { body } = ctx.request;\n const { user: admin, userAbility } = ctx.state;\n\n const advancedConfigs = await strapi\n .store({ type: 'plugin', name: 'users-permissions', key: 'advanced' })\n .get();\n\n const { email, username, password } = body;\n\n const { pm, doc } = await findEntityAndCheckPermissions(\n userAbility,\n ACTIONS.edit,\n userModel,\n documentId\n );\n\n const user = doc;\n\n await validateUpdateUserBody(ctx.request.body);\n\n if (_.has(body, 'password') && (password == null || password === '')) {\n delete body.password;\n }\n\n if (_.has(body, 'username')) {\n const userWithSameUsername = await strapi.db\n .query('plugin::users-permissions.user')\n .findOne({ where: { username } });\n\n if (userWithSameUsername && _.toString(userWithSameUsername.id) !== _.toString(user.id)) {\n throw new ApplicationError('Username already taken');\n }\n }\n\n if (_.has(body, 'email') && advancedConfigs.unique_email) {\n const userWithSameEmail = await strapi.db\n .query('plugin::users-permissions.user')\n .findOne({ where: { email: _.toLower(email) } });\n\n if (userWithSameEmail && _.toString(userWithSameEmail.id) !== _.toString(user.id)) {\n throw new ApplicationError('Email already taken');\n }\n\n body.email = _.toLower(body.email);\n }\n\n const sanitizedData = await pm.pickPermittedFieldsOf(body, { subject: pm.toSubject(user) });\n const updateData = _.omit({ ...sanitizedData, updatedBy: admin.id }, 'createdBy');\n\n const data = await strapi\n .service('plugin::content-manager.document-manager')\n .update(documentId, userModel, {\n data: updateData,\n });\n\n ctx.body = await pm.sanitizeOutput(data, { action: ACTIONS.read });\n },\n};\n"],"names":["_","require$$0","contentTypes","contentTypesUtils","require$$1","ApplicationError","NotFoundError","ForbiddenError","errors","validateCreateUserBody","validateUpdateUserBody","require$$2","UPDATED_BY_ATTRIBUTE","CREATED_BY_ATTRIBUTE","constants","userModel","ACTIONS","read","create","edit","delete","findEntityAndCheckPermissions","ability","action","model","id","doc","strapi","service","findOne","populate","isNil","pm","createPermissionsManager","cannot","toSubject","docWithoutCreatorRoles","omit","contentManagerUser","ctx","body","request","user","admin","userAbility","state","email","username","isAllowed","forbidden","sanitizedBody","pickPermittedFieldsOf","subject","advanced","store","type","name","key","get","userWithSameUsername","db","query","where","unique_email","userWithSameEmail","toLowerCase","provider","toLower","data","sanitizedData","sanitizeOutput","created","error","message","update","documentId","params","advancedConfigs","password","has","toString","updateData","updatedBy"],"mappings":";;;;;;;;;AAEA,IAAA,MAAMA,CAAIC,GAAAA,UAAAA;AACV,IAAA,MAAM,EAAEC,YAAAA,EAAcC,iBAAiB,EAAE,GAAGC,UAAAA;IAC5C,MAAM,EAAEC,gBAAgB,EAAEC,aAAa,EAAEC,cAAc,EAAE,GAAGH,UAAAA,CAAyBI,MAAM;AAC3F,IAAA,MAAM,EAAEC,sBAAsB,EAAEC,sBAAsB,EAAE,GAAGC,WAAAA,EAAAA;AAE3D,IAAA,MAAM,EAAEC,oBAAoB,EAAEC,oBAAoB,EAAE,GAAGV,kBAAkBW,SAAS;AAElF,IAAA,MAAMC,SAAY,GAAA,gCAAA;AAClB,IAAA,MAAMC,OAAU,GAAA;QACdC,IAAM,EAAA,uCAAA;QACNC,MAAQ,EAAA,yCAAA;QACRC,IAAM,EAAA,yCAAA;QACNC,MAAQ,EAAA;AACV,KAAA;AAEA,IAAA,MAAMC,6BAAgC,GAAA,OAAOC,OAASC,EAAAA,MAAAA,EAAQC,KAAOC,EAAAA,EAAAA,GAAAA;QACnE,MAAMC,GAAAA,GAAM,MAAMC,MAAOC,CAAAA,OAAO,CAAC,0CAA4CC,CAAAA,CAAAA,OAAO,CAACJ,EAAAA,EAAID,KAAO,EAAA;YAC9FM,QAAU,EAAA;gBAAC,CAAGjB,EAAAA,oBAAAA,CAAqB,MAAM;AAAE;AAC/C,SAAA,CAAA;QAEE,IAAIb,CAAAA,CAAE+B,KAAK,CAACL,GAAM,CAAA,EAAA;AAChB,YAAA,MAAM,IAAIpB,aAAAA,EAAAA;AACX;AAED,QAAA,MAAM0B,KAAKL,MACRC,CAAAA,OAAO,CAAC,mBAAA,CAAA,CACRK,wBAAwB,CAAC;AAAEX,YAAAA,OAAAA;AAASC,YAAAA,MAAAA;AAAQC,YAAAA;AAAO,SAAA,CAAA;QAEtD,IAAIQ,EAAAA,CAAGV,OAAO,CAACY,MAAM,CAACF,EAAGT,CAAAA,MAAM,EAAES,EAAAA,CAAGG,SAAS,CAACT,GAAO,CAAA,CAAA,EAAA;AACnD,YAAA,MAAM,IAAInB,cAAAA,EAAAA;AACX;QAED,MAAM6B,sBAAAA,GAAyBpC,EAAEqC,IAAI,CAACX,KAAK,CAAGb,EAAAA,oBAAAA,CAAqB,MAAM,CAAC,CAAA;QAE1E,OAAO;AAAEmB,YAAAA,EAAAA;YAAIN,GAAKU,EAAAA;;AACpB,KAAA;IAEAE,kBAAiB,GAAA;AACjB;;;OAIE,MAAMpB,QAAOqB,GAAG,EAAA;AACd,YAAA,MAAM,EAAEC,IAAI,EAAE,GAAGD,IAAIE,OAAO;YAC5B,MAAM,EAAEC,MAAMC,KAAK,EAAEC,WAAW,EAAE,GAAGL,IAAIM,KAAK;AAE9C,YAAA,MAAM,EAAEC,KAAK,EAAEC,QAAQ,EAAE,GAAGP,IAAAA;AAE5B,YAAA,MAAMR,KAAKL,MAAOC,CAAAA,OAAO,CAAC,mBAAA,CAAA,CAAqBK,wBAAwB,CAAC;gBACtEX,OAASsB,EAAAA,WAAAA;AACTrB,gBAAAA,MAAAA,EAAQP,QAAQE,MAAM;gBACtBM,KAAOT,EAAAA;AACb,aAAA,CAAA;YAEI,IAAI,CAACiB,EAAGgB,CAAAA,SAAS,EAAE;AACjB,gBAAA,OAAOT,IAAIU,SAAS,EAAA;AACrB;AAED,YAAA,MAAMC,aAAgB,GAAA,MAAMlB,EAAGmB,CAAAA,qBAAqB,CAACX,IAAM,EAAA;gBAAEY,OAASrC,EAAAA;AAAS,aAAA,CAAA;AAE/E,YAAA,MAAMsC,QAAW,GAAA,MAAM1B,MACpB2B,CAAAA,KAAK,CAAC;gBAAEC,IAAM,EAAA,QAAA;gBAAUC,IAAM,EAAA,mBAAA;gBAAqBC,GAAK,EAAA;eACxDC,GAAG,EAAA;AAEN,YAAA,MAAMjD,sBAAuB8B,CAAAA,GAAAA,CAAIE,OAAO,CAACD,IAAI,CAAA;YAE7C,MAAMmB,oBAAAA,GAAuB,MAAMhC,MAAOiC,CAAAA,EAAE,CACzCC,KAAK,CAAC,gCACNhC,CAAAA,CAAAA,OAAO,CAAC;gBAAEiC,KAAO,EAAA;AAAEf,oBAAAA;AAAQ;AAAI,aAAA,CAAA;AAElC,YAAA,IAAIY,oBAAsB,EAAA;AACxB,gBAAA,MAAM,IAAItD,gBAAiB,CAAA,wBAAA,CAAA;AAC5B;YAED,IAAIgD,QAAAA,CAASU,YAAY,EAAE;gBACzB,MAAMC,iBAAAA,GAAoB,MAAMrC,MAAOiC,CAAAA,EAAE,CACtCC,KAAK,CAAC,gCACNhC,CAAAA,CAAAA,OAAO,CAAC;oBAAEiC,KAAO,EAAA;AAAEhB,wBAAAA,KAAAA,EAAOA,MAAMmB,WAAW;AAAI;AAAA,iBAAA,CAAA;AAElD,gBAAA,IAAID,iBAAmB,EAAA;AACrB,oBAAA,MAAM,IAAI3D,gBAAiB,CAAA,qBAAA,CAAA;AAC5B;AACF;AAED,YAAA,MAAMqC,IAAO,GAAA;AACX,gBAAA,GAAGQ,aAAa;gBAChBgB,QAAU,EAAA,OAAA;gBACV,CAACrD,oBAAAA,GAAuB8B,KAAAA,CAAMlB,EAAE;gBAChC,CAACb,oBAAAA,GAAuB+B,KAAAA,CAAMlB;AACpC,aAAA;AAEIiB,YAAAA,IAAAA,CAAKI,KAAK,GAAG9C,CAAAA,CAAEmE,OAAO,CAACzB,KAAKI,KAAK,CAAA;YAEjC,IAAI;gBACF,MAAMsB,IAAAA,GAAO,MAAMzC,MAChBC,CAAAA,OAAO,CAAC,0CACRV,CAAAA,CAAAA,MAAM,CAACH,SAAW,EAAA;oBAAEqD,IAAM1B,EAAAA;AAAM,iBAAA,CAAA;AAEnC,gBAAA,MAAM2B,aAAgB,GAAA,MAAMrC,EAAGsC,CAAAA,cAAc,CAACF,IAAM,EAAA;AAAE7C,oBAAAA,MAAAA,EAAQP,QAAQC;AAAI,iBAAA,CAAA;AAE1EsB,gBAAAA,GAAAA,CAAIgC,OAAO,CAACF,aAAAA,CAAAA;AACb,aAAA,CAAC,OAAOG,KAAO,EAAA;gBACd,MAAM,IAAInE,gBAAiBmE,CAAAA,KAAAA,CAAMC,OAAO,CAAA;AACzC;AACF,SAAA;AACH;;;OAKE,MAAMC,QAAOnC,GAAG,EAAA;AACd,YAAA,MAAM,EAAEd,EAAIkD,EAAAA,UAAU,EAAE,GAAGpC,IAAIqC,MAAM;AACrC,YAAA,MAAM,EAAEpC,IAAI,EAAE,GAAGD,IAAIE,OAAO;YAC5B,MAAM,EAAEC,MAAMC,KAAK,EAAEC,WAAW,EAAE,GAAGL,IAAIM,KAAK;AAE9C,YAAA,MAAMgC,eAAkB,GAAA,MAAMlD,MAC3B2B,CAAAA,KAAK,CAAC;gBAAEC,IAAM,EAAA,QAAA;gBAAUC,IAAM,EAAA,mBAAA;gBAAqBC,GAAK,EAAA;eACxDC,GAAG,EAAA;AAEN,YAAA,MAAM,EAAEZ,KAAK,EAAEC,QAAQ,EAAE+B,QAAQ,EAAE,GAAGtC,IAAAA;AAEtC,YAAA,MAAM,EAAER,EAAE,EAAEN,GAAG,EAAE,GAAG,MAAML,6BAAAA,CACxBuB,WACA5B,EAAAA,OAAAA,CAAQG,IAAI,EACZJ,SACA4D,EAAAA,UAAAA,CAAAA;AAGF,YAAA,MAAMjC,IAAOhB,GAAAA,GAAAA;AAEb,YAAA,MAAMhB,sBAAuB6B,CAAAA,GAAAA,CAAIE,OAAO,CAACD,IAAI,CAAA;YAE7C,IAAIxC,CAAAA,CAAE+E,GAAG,CAACvC,IAAM,EAAA,UAAA,CAAA,KAAgBsC,QAAY,IAAA,IAAA,IAAQA,QAAa,KAAA,EAAA,CAAK,EAAA;AACpE,gBAAA,OAAOtC,KAAKsC,QAAQ;AACrB;AAED,YAAA,IAAI9E,CAAE+E,CAAAA,GAAG,CAACvC,IAAAA,EAAM,UAAa,CAAA,EAAA;gBAC3B,MAAMmB,oBAAAA,GAAuB,MAAMhC,MAAOiC,CAAAA,EAAE,CACzCC,KAAK,CAAC,gCACNhC,CAAAA,CAAAA,OAAO,CAAC;oBAAEiC,KAAO,EAAA;AAAEf,wBAAAA;AAAQ;AAAI,iBAAA,CAAA;AAElC,gBAAA,IAAIY,oBAAwB3D,IAAAA,CAAAA,CAAEgF,QAAQ,CAACrB,oBAAqBlC,CAAAA,EAAE,CAAMzB,KAAAA,CAAAA,CAAEgF,QAAQ,CAACtC,IAAKjB,CAAAA,EAAE,CAAG,EAAA;AACvF,oBAAA,MAAM,IAAIpB,gBAAiB,CAAA,wBAAA,CAAA;AAC5B;AACF;AAED,YAAA,IAAIL,EAAE+E,GAAG,CAACvC,MAAM,OAAYqC,CAAAA,IAAAA,eAAAA,CAAgBd,YAAY,EAAE;gBACxD,MAAMC,iBAAAA,GAAoB,MAAMrC,MAAOiC,CAAAA,EAAE,CACtCC,KAAK,CAAC,gCACNhC,CAAAA,CAAAA,OAAO,CAAC;oBAAEiC,KAAO,EAAA;wBAAEhB,KAAO9C,EAAAA,CAAAA,CAAEmE,OAAO,CAACrB,KAAAA;AAAQ;AAAA,iBAAA,CAAA;AAE/C,gBAAA,IAAIkB,iBAAqBhE,IAAAA,CAAAA,CAAEgF,QAAQ,CAAChB,iBAAkBvC,CAAAA,EAAE,CAAMzB,KAAAA,CAAAA,CAAEgF,QAAQ,CAACtC,IAAKjB,CAAAA,EAAE,CAAG,EAAA;AACjF,oBAAA,MAAM,IAAIpB,gBAAiB,CAAA,qBAAA,CAAA;AAC5B;AAEDmC,gBAAAA,IAAAA,CAAKM,KAAK,GAAG9C,CAAAA,CAAEmE,OAAO,CAAC3B,KAAKM,KAAK,CAAA;AAClC;AAED,YAAA,MAAMuB,aAAgB,GAAA,MAAMrC,EAAGmB,CAAAA,qBAAqB,CAACX,IAAM,EAAA;gBAAEY,OAASpB,EAAAA,EAAAA,CAAGG,SAAS,CAACO,IAAAA;AAAO,aAAA,CAAA;YAC1F,MAAMuC,UAAAA,GAAajF,CAAEqC,CAAAA,IAAI,CAAC;AAAE,gBAAA,GAAGgC,aAAa;AAAEa,gBAAAA,SAAAA,EAAWvC,MAAMlB;aAAM,EAAA,WAAA,CAAA;YAErE,MAAM2C,IAAAA,GAAO,MAAMzC,MAChBC,CAAAA,OAAO,CAAC,0CACR8C,CAAAA,CAAAA,MAAM,CAACC,UAAAA,EAAY5D,SAAW,EAAA;gBAC7BqD,IAAMa,EAAAA;AACd,aAAA,CAAA;AAEI1C,YAAAA,GAAAA,CAAIC,IAAI,GAAG,MAAMR,EAAGsC,CAAAA,cAAc,CAACF,IAAM,EAAA;AAAE7C,gBAAAA,MAAAA,EAAQP,QAAQC;AAAI,aAAA,CAAA;AAChE;AACH,KAAA;;;;;;"}
@@ -0,0 +1,33 @@
1
+ 'use strict';
2
+
3
+ var auth = require('./auth.js');
4
+ var user = require('./user.js');
5
+ var role = require('./role.js');
6
+ var permissions = require('./permissions.js');
7
+ var settings = require('./settings.js');
8
+ var contentManagerUser = require('./content-manager-user.js');
9
+
10
+ var controllers;
11
+ var hasRequiredControllers;
12
+ function requireControllers() {
13
+ if (hasRequiredControllers) return controllers;
14
+ hasRequiredControllers = 1;
15
+ const auth$1 = auth.__require();
16
+ const user$1 = user.__require();
17
+ const role$1 = role.__require();
18
+ const permissions$1 = permissions.__require();
19
+ const settings$1 = settings.__require();
20
+ const contentmanageruser = contentManagerUser.__require();
21
+ controllers = {
22
+ auth: auth$1,
23
+ user: user$1,
24
+ role: role$1,
25
+ permissions: permissions$1,
26
+ settings: settings$1,
27
+ contentmanageruser
28
+ };
29
+ return controllers;
30
+ }
31
+
32
+ exports.__require = requireControllers;
33
+ //# sourceMappingURL=index.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"index.js","sources":["../../../server/controllers/index.js"],"sourcesContent":["'use strict';\n\nconst auth = require('./auth');\nconst user = require('./user');\nconst role = require('./role');\nconst permissions = require('./permissions');\nconst settings = require('./settings');\nconst contentmanageruser = require('./content-manager-user');\n\nmodule.exports = {\n auth,\n user,\n role,\n permissions,\n settings,\n contentmanageruser,\n};\n"],"names":["auth","require$$0","user","require$$1","role","require$$2","permissions","require$$3","settings","require$$4","contentmanageruser","require$$5","controllers"],"mappings":";;;;;;;;;;;;;;AAEA,IAAA,MAAMA,MAAOC,GAAAA,cAAAA,EAAAA;AACb,IAAA,MAAMC,MAAOC,GAAAA,cAAAA,EAAAA;AACb,IAAA,MAAMC,MAAOC,GAAAA,cAAAA,EAAAA;AACb,IAAA,MAAMC,aAAcC,GAAAA,qBAAAA,EAAAA;AACpB,IAAA,MAAMC,UAAWC,GAAAA,kBAAAA,EAAAA;AACjB,IAAA,MAAMC,kBAAqBC,GAAAA,4BAAAA,EAAAA;IAE3BC,WAAiB,GAAA;AACfZ,cAAAA,MAAAA;AACAE,cAAAA,MAAAA;AACAE,cAAAA,MAAAA;AACAE,qBAAAA,aAAAA;AACAE,kBAAAA,UAAAA;AACAE,QAAAA;AACF,KAAA;;;;;;"}
@@ -0,0 +1,31 @@
1
+ import { __require as requireAuth } from './auth.mjs';
2
+ import { __require as requireUser } from './user.mjs';
3
+ import { __require as requireRole } from './role.mjs';
4
+ import { __require as requirePermissions } from './permissions.mjs';
5
+ import { __require as requireSettings } from './settings.mjs';
6
+ import { __require as requireContentManagerUser } from './content-manager-user.mjs';
7
+
8
+ var controllers;
9
+ var hasRequiredControllers;
10
+ function requireControllers() {
11
+ if (hasRequiredControllers) return controllers;
12
+ hasRequiredControllers = 1;
13
+ const auth = requireAuth();
14
+ const user = requireUser();
15
+ const role = requireRole();
16
+ const permissions = requirePermissions();
17
+ const settings = requireSettings();
18
+ const contentmanageruser = requireContentManagerUser();
19
+ controllers = {
20
+ auth,
21
+ user,
22
+ role,
23
+ permissions,
24
+ settings,
25
+ contentmanageruser
26
+ };
27
+ return controllers;
28
+ }
29
+
30
+ export { requireControllers as __require };
31
+ //# sourceMappingURL=index.mjs.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"index.mjs","sources":["../../../server/controllers/index.js"],"sourcesContent":["'use strict';\n\nconst auth = require('./auth');\nconst user = require('./user');\nconst role = require('./role');\nconst permissions = require('./permissions');\nconst settings = require('./settings');\nconst contentmanageruser = require('./content-manager-user');\n\nmodule.exports = {\n auth,\n user,\n role,\n permissions,\n settings,\n contentmanageruser,\n};\n"],"names":["auth","require$$0","user","require$$1","role","require$$2","permissions","require$$3","settings","require$$4","contentmanageruser","require$$5","controllers"],"mappings":";;;;;;;;;;;;AAEA,IAAA,MAAMA,IAAOC,GAAAA,WAAAA,EAAAA;AACb,IAAA,MAAMC,IAAOC,GAAAA,WAAAA,EAAAA;AACb,IAAA,MAAMC,IAAOC,GAAAA,WAAAA,EAAAA;AACb,IAAA,MAAMC,WAAcC,GAAAA,kBAAAA,EAAAA;AACpB,IAAA,MAAMC,QAAWC,GAAAA,eAAAA,EAAAA;AACjB,IAAA,MAAMC,kBAAqBC,GAAAA,yBAAAA,EAAAA;IAE3BC,WAAiB,GAAA;AACfZ,QAAAA,IAAAA;AACAE,QAAAA,IAAAA;AACAE,QAAAA,IAAAA;AACAE,QAAAA,WAAAA;AACAE,QAAAA,QAAAA;AACAE,QAAAA;AACF,KAAA;;;;;;"}
@@ -0,0 +1,37 @@
1
+ 'use strict';
2
+
3
+ var require$$0 = require('lodash');
4
+ var index = require('../utils/index.js');
5
+
6
+ var permissions;
7
+ var hasRequiredPermissions;
8
+ function requirePermissions() {
9
+ if (hasRequiredPermissions) return permissions;
10
+ hasRequiredPermissions = 1;
11
+ const _ = require$$0;
12
+ const { getService } = index.__require();
13
+ permissions = {
14
+ async getPermissions (ctx) {
15
+ const permissions = await getService('users-permissions').getActions();
16
+ ctx.send({
17
+ permissions
18
+ });
19
+ },
20
+ async getPolicies (ctx) {
21
+ const policies = _.keys(strapi.plugin('users-permissions').policies);
22
+ ctx.send({
23
+ policies: _.without(policies, 'permissions')
24
+ });
25
+ },
26
+ async getRoutes (ctx) {
27
+ const routes = await getService('users-permissions').getRoutes();
28
+ ctx.send({
29
+ routes
30
+ });
31
+ }
32
+ };
33
+ return permissions;
34
+ }
35
+
36
+ exports.__require = requirePermissions;
37
+ //# sourceMappingURL=permissions.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"permissions.js","sources":["../../../server/controllers/permissions.js"],"sourcesContent":["'use strict';\n\nconst _ = require('lodash');\nconst { getService } = require('../utils');\n\nmodule.exports = {\n async getPermissions(ctx) {\n const permissions = await getService('users-permissions').getActions();\n\n ctx.send({ permissions });\n },\n\n async getPolicies(ctx) {\n const policies = _.keys(strapi.plugin('users-permissions').policies);\n\n ctx.send({\n policies: _.without(policies, 'permissions'),\n });\n },\n\n async getRoutes(ctx) {\n const routes = await getService('users-permissions').getRoutes();\n\n ctx.send({ routes });\n },\n};\n"],"names":["_","require$$0","getService","require$$1","permissions","getPermissions","ctx","getActions","send","getPolicies","policies","keys","strapi","plugin","without","getRoutes","routes"],"mappings":";;;;;;;;;;AAEA,IAAA,MAAMA,CAAIC,GAAAA,UAAAA;IACV,MAAM,EAAEC,UAAU,EAAE,GAAGC,eAAAA,EAAAA;IAEvBC,WAAiB,GAAA;AACf,QAAA,MAAMC,gBAAeC,GAAG,EAAA;AACtB,YAAA,MAAMF,WAAc,GAAA,MAAMF,UAAW,CAAA,mBAAA,CAAA,CAAqBK,UAAU,EAAA;AAEpED,YAAAA,GAAAA,CAAIE,IAAI,CAAC;AAAEJ,gBAAAA;AAAW,aAAA,CAAA;AACvB,SAAA;AAED,QAAA,MAAMK,aAAYH,GAAG,EAAA;YACnB,MAAMI,QAAAA,GAAWV,EAAEW,IAAI,CAACC,OAAOC,MAAM,CAAC,qBAAqBH,QAAQ,CAAA;AAEnEJ,YAAAA,GAAAA,CAAIE,IAAI,CAAC;gBACPE,QAAUV,EAAAA,CAAAA,CAAEc,OAAO,CAACJ,QAAU,EAAA,aAAA;AACpC,aAAA,CAAA;AACG,SAAA;AAED,QAAA,MAAMK,WAAUT,GAAG,EAAA;AACjB,YAAA,MAAMU,MAAS,GAAA,MAAMd,UAAW,CAAA,mBAAA,CAAA,CAAqBa,SAAS,EAAA;AAE9DT,YAAAA,GAAAA,CAAIE,IAAI,CAAC;AAAEQ,gBAAAA;AAAM,aAAA,CAAA;AAClB;AACH,KAAA;;;;;;"}