@strapi/plugin-users-permissions 5.12.1 → 5.12.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/admin/components/BoundRoute/getMethodColor.js +49 -0
- package/dist/admin/components/BoundRoute/getMethodColor.js.map +1 -0
- package/dist/admin/components/BoundRoute/getMethodColor.mjs +47 -0
- package/dist/admin/components/BoundRoute/getMethodColor.mjs.map +1 -0
- package/dist/admin/components/BoundRoute/index.js +98 -0
- package/dist/admin/components/BoundRoute/index.js.map +1 -0
- package/dist/admin/components/BoundRoute/index.mjs +96 -0
- package/dist/admin/components/BoundRoute/index.mjs.map +1 -0
- package/dist/admin/components/FormModal/Input/index.js +123 -0
- package/dist/admin/components/FormModal/Input/index.js.map +1 -0
- package/dist/admin/components/FormModal/Input/index.mjs +121 -0
- package/dist/admin/components/FormModal/Input/index.mjs.map +1 -0
- package/dist/admin/components/FormModal/index.js +110 -0
- package/dist/admin/components/FormModal/index.js.map +1 -0
- package/dist/admin/components/FormModal/index.mjs +108 -0
- package/dist/admin/components/FormModal/index.mjs.map +1 -0
- package/dist/admin/components/Permissions/PermissionRow/CheckboxWrapper.js +33 -0
- package/dist/admin/components/Permissions/PermissionRow/CheckboxWrapper.js.map +1 -0
- package/dist/admin/components/Permissions/PermissionRow/CheckboxWrapper.mjs +31 -0
- package/dist/admin/components/Permissions/PermissionRow/CheckboxWrapper.mjs.map +1 -0
- package/dist/admin/components/Permissions/PermissionRow/SubCategory.js +156 -0
- package/dist/admin/components/Permissions/PermissionRow/SubCategory.js.map +1 -0
- package/dist/admin/components/Permissions/PermissionRow/SubCategory.mjs +154 -0
- package/dist/admin/components/Permissions/PermissionRow/SubCategory.mjs.map +1 -0
- package/dist/admin/components/Permissions/PermissionRow/index.js +50 -0
- package/dist/admin/components/Permissions/PermissionRow/index.js.map +1 -0
- package/dist/admin/components/Permissions/PermissionRow/index.mjs +48 -0
- package/dist/admin/components/Permissions/PermissionRow/index.mjs.map +1 -0
- package/dist/admin/components/Permissions/index.js +52 -0
- package/dist/admin/components/Permissions/index.js.map +1 -0
- package/dist/admin/components/Permissions/index.mjs +50 -0
- package/dist/admin/components/Permissions/index.mjs.map +1 -0
- package/dist/admin/components/Permissions/init.js +15 -0
- package/dist/admin/components/Permissions/init.js.map +1 -0
- package/dist/admin/components/Permissions/init.mjs +13 -0
- package/dist/admin/components/Permissions/init.mjs.map +1 -0
- package/dist/admin/components/Permissions/reducer.js +34 -0
- package/dist/admin/components/Permissions/reducer.js.map +1 -0
- package/dist/admin/components/Permissions/reducer.mjs +31 -0
- package/dist/admin/components/Permissions/reducer.mjs.map +1 -0
- package/dist/admin/components/Policies/index.js +67 -0
- package/dist/admin/components/Policies/index.js.map +1 -0
- package/dist/admin/components/Policies/index.mjs +65 -0
- package/dist/admin/components/Policies/index.mjs.map +1 -0
- package/dist/admin/components/UsersPermissions/index.js +115 -0
- package/dist/admin/components/UsersPermissions/index.js.map +1 -0
- package/dist/admin/components/UsersPermissions/index.mjs +113 -0
- package/dist/admin/components/UsersPermissions/index.mjs.map +1 -0
- package/dist/admin/components/UsersPermissions/init.js +13 -0
- package/dist/admin/components/UsersPermissions/init.js.map +1 -0
- package/dist/admin/components/UsersPermissions/init.mjs +11 -0
- package/dist/admin/components/UsersPermissions/init.mjs.map +1 -0
- package/dist/admin/components/UsersPermissions/reducer.js +73 -0
- package/dist/admin/components/UsersPermissions/reducer.js.map +1 -0
- package/dist/admin/components/UsersPermissions/reducer.mjs +68 -0
- package/dist/admin/components/UsersPermissions/reducer.mjs.map +1 -0
- package/dist/admin/constants.js +81 -0
- package/dist/admin/constants.js.map +1 -0
- package/dist/admin/constants.mjs +79 -0
- package/dist/admin/constants.mjs.map +1 -0
- package/dist/admin/contexts/UsersPermissionsContext/index.js +23 -0
- package/dist/admin/contexts/UsersPermissionsContext/index.js.map +1 -0
- package/dist/admin/contexts/UsersPermissionsContext/index.mjs +19 -0
- package/dist/admin/contexts/UsersPermissionsContext/index.mjs.map +1 -0
- package/dist/admin/index.js +119 -2
- package/dist/admin/index.js.map +1 -1
- package/dist/admin/index.mjs +120 -1
- package/dist/admin/index.mjs.map +1 -1
- package/dist/admin/package.json.js +14 -0
- package/dist/admin/package.json.js.map +1 -0
- package/dist/admin/package.json.mjs +11 -0
- package/dist/admin/package.json.mjs.map +1 -0
- package/dist/admin/{chunks/index-DFnYIqrB.js → pages/AdvancedSettings/index.js} +14 -121
- package/dist/admin/pages/AdvancedSettings/index.js.map +1 -0
- package/dist/admin/{chunks/index-Cy-tPfRk.mjs → pages/AdvancedSettings/index.mjs} +6 -94
- package/dist/admin/pages/AdvancedSettings/index.mjs.map +1 -0
- package/dist/admin/pages/AdvancedSettings/utils/layout.js +83 -0
- package/dist/admin/pages/AdvancedSettings/utils/layout.js.map +1 -0
- package/dist/admin/pages/AdvancedSettings/utils/layout.mjs +81 -0
- package/dist/admin/pages/AdvancedSettings/utils/layout.mjs.map +1 -0
- package/dist/admin/pages/AdvancedSettings/utils/schema.js +40 -0
- package/dist/admin/pages/AdvancedSettings/utils/schema.js.map +1 -0
- package/dist/admin/pages/AdvancedSettings/utils/schema.mjs +19 -0
- package/dist/admin/pages/AdvancedSettings/utils/schema.mjs.map +1 -0
- package/dist/admin/pages/EmailTemplates/components/EmailForm.js +171 -0
- package/dist/admin/pages/EmailTemplates/components/EmailForm.js.map +1 -0
- package/dist/admin/pages/EmailTemplates/components/EmailForm.mjs +169 -0
- package/dist/admin/pages/EmailTemplates/components/EmailForm.mjs.map +1 -0
- package/dist/admin/pages/EmailTemplates/components/EmailTable.js +145 -0
- package/dist/admin/pages/EmailTemplates/components/EmailTable.js.map +1 -0
- package/dist/admin/pages/EmailTemplates/components/EmailTable.mjs +143 -0
- package/dist/admin/pages/EmailTemplates/components/EmailTable.mjs.map +1 -0
- package/dist/admin/pages/EmailTemplates/index.js +157 -0
- package/dist/admin/pages/EmailTemplates/index.js.map +1 -0
- package/dist/admin/pages/EmailTemplates/index.mjs +135 -0
- package/dist/admin/pages/EmailTemplates/index.mjs.map +1 -0
- package/dist/admin/pages/EmailTemplates/utils/schema.js +50 -0
- package/dist/admin/pages/EmailTemplates/utils/schema.js.map +1 -0
- package/dist/admin/pages/EmailTemplates/utils/schema.mjs +29 -0
- package/dist/admin/pages/EmailTemplates/utils/schema.mjs.map +1 -0
- package/dist/admin/pages/Providers/index.js +278 -0
- package/dist/admin/pages/Providers/index.js.map +1 -0
- package/dist/admin/pages/Providers/index.mjs +254 -0
- package/dist/admin/pages/Providers/index.mjs.map +1 -0
- package/dist/admin/pages/Providers/utils/forms.js +281 -0
- package/dist/admin/pages/Providers/utils/forms.js.map +1 -0
- package/dist/admin/pages/Providers/utils/forms.mjs +260 -0
- package/dist/admin/pages/Providers/utils/forms.mjs.map +1 -0
- package/dist/admin/pages/Roles/constants.js +31 -0
- package/dist/admin/pages/Roles/constants.js.map +1 -0
- package/dist/admin/pages/Roles/constants.mjs +10 -0
- package/dist/admin/pages/Roles/constants.mjs.map +1 -0
- package/dist/admin/pages/Roles/hooks/usePlugins.js +78 -0
- package/dist/admin/pages/Roles/hooks/usePlugins.js.map +1 -0
- package/dist/admin/pages/Roles/hooks/usePlugins.mjs +76 -0
- package/dist/admin/pages/Roles/hooks/usePlugins.mjs.map +1 -0
- package/dist/admin/pages/Roles/index.js +35 -0
- package/dist/admin/pages/Roles/index.js.map +1 -0
- package/dist/admin/pages/Roles/index.mjs +33 -0
- package/dist/admin/pages/Roles/index.mjs.map +1 -0
- package/dist/admin/pages/Roles/pages/CreatePage.js +225 -0
- package/dist/admin/pages/Roles/pages/CreatePage.js.map +1 -0
- package/dist/admin/pages/Roles/pages/CreatePage.mjs +203 -0
- package/dist/admin/pages/Roles/pages/CreatePage.mjs.map +1 -0
- package/dist/admin/pages/Roles/pages/EditPage.js +229 -0
- package/dist/admin/pages/Roles/pages/EditPage.js.map +1 -0
- package/dist/admin/pages/Roles/pages/EditPage.mjs +207 -0
- package/dist/admin/pages/Roles/pages/EditPage.mjs.map +1 -0
- package/dist/admin/pages/Roles/pages/ListPage/components/TableBody.js +125 -0
- package/dist/admin/pages/Roles/pages/ListPage/components/TableBody.js.map +1 -0
- package/dist/admin/pages/Roles/pages/ListPage/components/TableBody.mjs +123 -0
- package/dist/admin/pages/Roles/pages/ListPage/components/TableBody.mjs.map +1 -0
- package/dist/admin/pages/Roles/pages/ListPage/index.js +237 -0
- package/dist/admin/pages/Roles/pages/ListPage/index.js.map +1 -0
- package/dist/admin/pages/Roles/pages/ListPage/index.mjs +234 -0
- package/dist/admin/pages/Roles/pages/ListPage/index.mjs.map +1 -0
- package/dist/admin/pluginId.js +8 -0
- package/dist/admin/pluginId.js.map +1 -0
- package/dist/admin/pluginId.mjs +6 -0
- package/dist/admin/pluginId.mjs.map +1 -0
- package/dist/admin/{chunks/ar-BJwjobLp.js → translations/ar.json.js} +2 -2
- package/dist/admin/translations/ar.json.js.map +1 -0
- package/dist/admin/{chunks/ar-G6bUGuUb.mjs → translations/ar.json.mjs} +1 -1
- package/dist/admin/translations/ar.json.mjs.map +1 -0
- package/dist/admin/{chunks/cs-uS_SIEo8.js → translations/cs.json.js} +2 -2
- package/dist/admin/translations/cs.json.js.map +1 -0
- package/dist/admin/{chunks/cs-Bu59JqhG.mjs → translations/cs.json.mjs} +1 -1
- package/dist/admin/translations/cs.json.mjs.map +1 -0
- package/dist/admin/{chunks/de-7MVMrqqI.js → translations/de.json.js} +2 -2
- package/dist/admin/translations/de.json.js.map +1 -0
- package/dist/admin/{chunks/de-B81A69_5.mjs → translations/de.json.mjs} +1 -1
- package/dist/admin/translations/de.json.mjs.map +1 -0
- package/dist/admin/{chunks/dk-DwCLGmy9.js → translations/dk.json.js} +2 -2
- package/dist/admin/translations/dk.json.js.map +1 -0
- package/dist/admin/{chunks/dk-BaelzvBE.mjs → translations/dk.json.mjs} +1 -1
- package/dist/admin/translations/dk.json.mjs.map +1 -0
- package/dist/admin/{chunks/en-DwQjkHi_.js → translations/en.json.js} +2 -2
- package/dist/admin/translations/en.json.js.map +1 -0
- package/dist/admin/{chunks/en-BhgCBe7M.mjs → translations/en.json.mjs} +1 -1
- package/dist/admin/translations/en.json.mjs.map +1 -0
- package/dist/admin/{chunks/es-BOJOedG5.js → translations/es.json.js} +2 -2
- package/dist/admin/translations/es.json.js.map +1 -0
- package/dist/admin/{chunks/es-B0wXmvRj.mjs → translations/es.json.mjs} +1 -1
- package/dist/admin/translations/es.json.mjs.map +1 -0
- package/dist/admin/{chunks/fr-BDNWCNs0.js → translations/fr.json.js} +2 -2
- package/dist/admin/translations/fr.json.js.map +1 -0
- package/dist/admin/{chunks/fr-CGYvGUXg.mjs → translations/fr.json.mjs} +1 -1
- package/dist/admin/translations/fr.json.mjs.map +1 -0
- package/dist/admin/{chunks/id-UqUPykHZ.js → translations/id.json.js} +2 -2
- package/dist/admin/translations/id.json.js.map +1 -0
- package/dist/admin/{chunks/id-CNzbwFjA.mjs → translations/id.json.mjs} +1 -1
- package/dist/admin/translations/id.json.mjs.map +1 -0
- package/dist/admin/{chunks/it-D5VuyoLU.js → translations/it.json.js} +2 -2
- package/dist/admin/translations/it.json.js.map +1 -0
- package/dist/admin/{chunks/it-B2H2foTf.mjs → translations/it.json.mjs} +1 -1
- package/dist/admin/translations/it.json.mjs.map +1 -0
- package/dist/admin/{chunks/ja-MpqVsCgs.js → translations/ja.json.js} +2 -2
- package/dist/admin/translations/ja.json.js.map +1 -0
- package/dist/admin/{chunks/ja-C0z9d7L9.mjs → translations/ja.json.mjs} +1 -1
- package/dist/admin/translations/ja.json.mjs.map +1 -0
- package/dist/admin/{chunks/ko-Bm-grPSc.js → translations/ko.json.js} +2 -2
- package/dist/admin/translations/ko.json.js.map +1 -0
- package/dist/admin/{chunks/ko-CzUgzpeS.mjs → translations/ko.json.mjs} +1 -1
- package/dist/admin/translations/ko.json.mjs.map +1 -0
- package/dist/admin/{chunks/ms-D7eyBD5H.js → translations/ms.json.js} +2 -2
- package/dist/admin/translations/ms.json.js.map +1 -0
- package/dist/admin/{chunks/ms-CCacxjim.mjs → translations/ms.json.mjs} +1 -1
- package/dist/admin/translations/ms.json.mjs.map +1 -0
- package/dist/admin/{chunks/nl-BIOwAQtI.js → translations/nl.json.js} +2 -2
- package/dist/admin/translations/nl.json.js.map +1 -0
- package/dist/admin/{chunks/nl-DDC3nZW-.mjs → translations/nl.json.mjs} +1 -1
- package/dist/admin/translations/nl.json.mjs.map +1 -0
- package/dist/admin/{chunks/pl-D5BeNrg_.js → translations/pl.json.js} +2 -2
- package/dist/admin/translations/pl.json.js.map +1 -0
- package/dist/admin/{chunks/pl-XkS463rN.mjs → translations/pl.json.mjs} +1 -1
- package/dist/admin/translations/pl.json.mjs.map +1 -0
- package/dist/admin/{chunks/pt-BR-DxPBzQGx.js → translations/pt-BR.json.js} +2 -2
- package/dist/admin/translations/pt-BR.json.js.map +1 -0
- package/dist/admin/{chunks/pt-BR-8cC7z8Km.mjs → translations/pt-BR.json.mjs} +1 -1
- package/dist/admin/translations/pt-BR.json.mjs.map +1 -0
- package/dist/admin/{chunks/pt-kkCwzNvH.js → translations/pt.json.js} +2 -2
- package/dist/admin/translations/pt.json.js.map +1 -0
- package/dist/admin/{chunks/pt-DQpEvio8.mjs → translations/pt.json.mjs} +1 -1
- package/dist/admin/translations/pt.json.mjs.map +1 -0
- package/dist/admin/{chunks/ru-BQ0gHmp3.js → translations/ru.json.js} +2 -2
- package/dist/admin/translations/ru.json.js.map +1 -0
- package/dist/admin/{chunks/ru-nzL_7Mhg.mjs → translations/ru.json.mjs} +1 -1
- package/dist/admin/translations/ru.json.mjs.map +1 -0
- package/dist/admin/{chunks/sk-nVwAPdYC.js → translations/sk.json.js} +2 -2
- package/dist/admin/translations/sk.json.js.map +1 -0
- package/dist/admin/{chunks/sk-Ddxc_tZA.mjs → translations/sk.json.mjs} +1 -1
- package/dist/admin/translations/sk.json.mjs.map +1 -0
- package/dist/admin/{chunks/sv-BDfk2A-F.js → translations/sv.json.js} +2 -2
- package/dist/admin/translations/sv.json.js.map +1 -0
- package/dist/admin/{chunks/sv-By3RYpMG.mjs → translations/sv.json.mjs} +1 -1
- package/dist/admin/translations/sv.json.mjs.map +1 -0
- package/dist/admin/{chunks/th-BtTtpHe2.js → translations/th.json.js} +2 -2
- package/dist/admin/translations/th.json.js.map +1 -0
- package/dist/admin/{chunks/th-COl50vqb.mjs → translations/th.json.mjs} +1 -1
- package/dist/admin/translations/th.json.mjs.map +1 -0
- package/dist/admin/{chunks/tr-Di-Nf7cT.js → translations/tr.json.js} +2 -2
- package/dist/admin/translations/tr.json.js.map +1 -0
- package/dist/admin/{chunks/tr-80SJU6jg.mjs → translations/tr.json.mjs} +1 -1
- package/dist/admin/translations/tr.json.mjs.map +1 -0
- package/dist/admin/{chunks/uk-r5zXTAS7.js → translations/uk.json.js} +2 -2
- package/dist/admin/translations/uk.json.js.map +1 -0
- package/dist/admin/{chunks/uk-DnrIlPwG.mjs → translations/uk.json.mjs} +1 -1
- package/dist/admin/translations/uk.json.mjs.map +1 -0
- package/dist/admin/{chunks/vi-D9cCsHsU.js → translations/vi.json.js} +2 -2
- package/dist/admin/translations/vi.json.js.map +1 -0
- package/dist/admin/{chunks/vi-69AF03Iv.mjs → translations/vi.json.mjs} +1 -1
- package/dist/admin/translations/vi.json.mjs.map +1 -0
- package/dist/admin/{chunks/zh-Hans-CKqQbpsM.js → translations/zh-Hans.json.js} +2 -2
- package/dist/admin/translations/zh-Hans.json.js.map +1 -0
- package/dist/admin/{chunks/zh-Hans-DmDcSsp7.mjs → translations/zh-Hans.json.mjs} +1 -1
- package/dist/admin/translations/zh-Hans.json.mjs.map +1 -0
- package/dist/admin/{chunks/zh-BzWgJEzz.js → translations/zh.json.js} +2 -2
- package/dist/admin/translations/zh.json.js.map +1 -0
- package/dist/admin/{chunks/zh-BzSkqxo-.mjs → translations/zh.json.mjs} +1 -1
- package/dist/admin/translations/zh.json.mjs.map +1 -0
- package/dist/admin/utils/cleanPermissions.js +24 -0
- package/dist/admin/utils/cleanPermissions.js.map +1 -0
- package/dist/admin/utils/cleanPermissions.mjs +22 -0
- package/dist/admin/utils/cleanPermissions.mjs.map +1 -0
- package/dist/admin/utils/formatPluginName.js +29 -0
- package/dist/admin/utils/formatPluginName.js.map +1 -0
- package/dist/admin/utils/formatPluginName.mjs +27 -0
- package/dist/admin/utils/formatPluginName.mjs.map +1 -0
- package/dist/admin/utils/getTrad.js +8 -0
- package/dist/admin/utils/getTrad.js.map +1 -0
- package/dist/admin/utils/getTrad.mjs +6 -0
- package/dist/admin/utils/getTrad.mjs.map +1 -0
- package/dist/admin/utils/prefixPluginTranslations.js +11 -0
- package/dist/admin/utils/prefixPluginTranslations.js.map +1 -0
- package/dist/admin/utils/prefixPluginTranslations.mjs +9 -0
- package/dist/admin/utils/prefixPluginTranslations.mjs.map +1 -0
- package/dist/server/_virtual/_commonjsHelpers.js +8 -0
- package/dist/server/_virtual/_commonjsHelpers.js.map +1 -0
- package/dist/server/_virtual/_commonjsHelpers.mjs +6 -0
- package/dist/server/_virtual/_commonjsHelpers.mjs.map +1 -0
- package/dist/server/bootstrap/index.js +145 -0
- package/dist/server/bootstrap/index.js.map +1 -0
- package/dist/server/bootstrap/index.mjs +143 -0
- package/dist/server/bootstrap/index.mjs.map +1 -0
- package/dist/server/bootstrap/users-permissions-actions.js +98 -0
- package/dist/server/bootstrap/users-permissions-actions.js.map +1 -0
- package/dist/server/bootstrap/users-permissions-actions.mjs +96 -0
- package/dist/server/bootstrap/users-permissions-actions.mjs.map +1 -0
- package/dist/server/config.js +54 -0
- package/dist/server/config.js.map +1 -0
- package/dist/server/config.mjs +52 -0
- package/dist/server/config.mjs.map +1 -0
- package/dist/server/content-types/index.js +30 -0
- package/dist/server/content-types/index.js.map +1 -0
- package/dist/server/content-types/index.mjs +28 -0
- package/dist/server/content-types/index.mjs.map +1 -0
- package/dist/server/content-types/permission/index.js +44 -0
- package/dist/server/content-types/permission/index.js.map +1 -0
- package/dist/server/content-types/permission/index.mjs +42 -0
- package/dist/server/content-types/permission/index.mjs.map +1 -0
- package/dist/server/content-types/role/index.js +61 -0
- package/dist/server/content-types/role/index.js.map +1 -0
- package/dist/server/content-types/role/index.mjs +59 -0
- package/dist/server/content-types/role/index.mjs.map +1 -0
- package/dist/server/content-types/user/index.js +84 -0
- package/dist/server/content-types/user/index.js.map +1 -0
- package/dist/server/content-types/user/index.mjs +82 -0
- package/dist/server/content-types/user/index.mjs.map +1 -0
- package/dist/server/content-types/user/schema-config.js +25 -0
- package/dist/server/content-types/user/schema-config.js.map +1 -0
- package/dist/server/content-types/user/schema-config.mjs +23 -0
- package/dist/server/content-types/user/schema-config.mjs.map +1 -0
- package/dist/server/controllers/auth.js +429 -0
- package/dist/server/controllers/auth.js.map +1 -0
- package/dist/server/controllers/auth.mjs +427 -0
- package/dist/server/controllers/auth.mjs.map +1 -0
- package/dist/server/controllers/content-manager-user.js +168 -0
- package/dist/server/controllers/content-manager-user.js.map +1 -0
- package/dist/server/controllers/content-manager-user.mjs +166 -0
- package/dist/server/controllers/content-manager-user.mjs.map +1 -0
- package/dist/server/controllers/index.js +33 -0
- package/dist/server/controllers/index.js.map +1 -0
- package/dist/server/controllers/index.mjs +31 -0
- package/dist/server/controllers/index.mjs.map +1 -0
- package/dist/server/controllers/permissions.js +37 -0
- package/dist/server/controllers/permissions.js.map +1 -0
- package/dist/server/controllers/permissions.mjs +35 -0
- package/dist/server/controllers/permissions.mjs.map +1 -0
- package/dist/server/controllers/role.js +91 -0
- package/dist/server/controllers/role.js.map +1 -0
- package/dist/server/controllers/role.mjs +89 -0
- package/dist/server/controllers/role.mjs.map +1 -0
- package/dist/server/controllers/settings.js +107 -0
- package/dist/server/controllers/settings.js.map +1 -0
- package/dist/server/controllers/settings.mjs +105 -0
- package/dist/server/controllers/settings.mjs.map +1 -0
- package/dist/server/controllers/user.js +201 -0
- package/dist/server/controllers/user.js.map +1 -0
- package/dist/server/controllers/user.mjs +199 -0
- package/dist/server/controllers/user.mjs.map +1 -0
- package/dist/server/controllers/validation/auth.js +131 -0
- package/dist/server/controllers/validation/auth.js.map +1 -0
- package/dist/server/controllers/validation/auth.mjs +129 -0
- package/dist/server/controllers/validation/auth.mjs.map +1 -0
- package/dist/server/controllers/validation/email-template.js +72 -0
- package/dist/server/controllers/validation/email-template.js.map +1 -0
- package/dist/server/controllers/validation/email-template.mjs +70 -0
- package/dist/server/controllers/validation/email-template.mjs.map +1 -0
- package/dist/server/controllers/validation/user.js +49 -0
- package/dist/server/controllers/validation/user.js.map +1 -0
- package/dist/server/controllers/validation/user.mjs +47 -0
- package/dist/server/controllers/validation/user.mjs.map +1 -0
- package/dist/server/graphql/index.js +66 -0
- package/dist/server/graphql/index.js.map +1 -0
- package/dist/server/graphql/index.mjs +64 -0
- package/dist/server/graphql/index.mjs.map +1 -0
- package/dist/server/graphql/mutations/auth/change-password.js +40 -0
- package/dist/server/graphql/mutations/auth/change-password.js.map +1 -0
- package/dist/server/graphql/mutations/auth/change-password.mjs +38 -0
- package/dist/server/graphql/mutations/auth/change-password.mjs.map +1 -0
- package/dist/server/graphql/mutations/auth/email-confirmation.js +38 -0
- package/dist/server/graphql/mutations/auth/email-confirmation.js.map +1 -0
- package/dist/server/graphql/mutations/auth/email-confirmation.mjs +36 -0
- package/dist/server/graphql/mutations/auth/email-confirmation.mjs.map +1 -0
- package/dist/server/graphql/mutations/auth/forgot-password.js +37 -0
- package/dist/server/graphql/mutations/auth/forgot-password.js.map +1 -0
- package/dist/server/graphql/mutations/auth/forgot-password.mjs +35 -0
- package/dist/server/graphql/mutations/auth/forgot-password.mjs.map +1 -0
- package/dist/server/graphql/mutations/auth/login.js +40 -0
- package/dist/server/graphql/mutations/auth/login.js.map +1 -0
- package/dist/server/graphql/mutations/auth/login.mjs +38 -0
- package/dist/server/graphql/mutations/auth/login.mjs.map +1 -0
- package/dist/server/graphql/mutations/auth/register.js +38 -0
- package/dist/server/graphql/mutations/auth/register.js.map +1 -0
- package/dist/server/graphql/mutations/auth/register.mjs +36 -0
- package/dist/server/graphql/mutations/auth/register.mjs.map +1 -0
- package/dist/server/graphql/mutations/auth/reset-password.js +40 -0
- package/dist/server/graphql/mutations/auth/reset-password.js.map +1 -0
- package/dist/server/graphql/mutations/auth/reset-password.mjs +38 -0
- package/dist/server/graphql/mutations/auth/reset-password.mjs.map +1 -0
- package/dist/server/graphql/mutations/crud/role/create-role.js +37 -0
- package/dist/server/graphql/mutations/crud/role/create-role.js.map +1 -0
- package/dist/server/graphql/mutations/crud/role/create-role.mjs +35 -0
- package/dist/server/graphql/mutations/crud/role/create-role.mjs.map +1 -0
- package/dist/server/graphql/mutations/crud/role/delete-role.js +32 -0
- package/dist/server/graphql/mutations/crud/role/delete-role.js.map +1 -0
- package/dist/server/graphql/mutations/crud/role/delete-role.mjs +30 -0
- package/dist/server/graphql/mutations/crud/role/delete-role.mjs.map +1 -0
- package/dist/server/graphql/mutations/crud/role/update-role.js +39 -0
- package/dist/server/graphql/mutations/crud/role/update-role.js.map +1 -0
- package/dist/server/graphql/mutations/crud/role/update-role.mjs +37 -0
- package/dist/server/graphql/mutations/crud/role/update-role.mjs.map +1 -0
- package/dist/server/graphql/mutations/crud/user/create-user.js +46 -0
- package/dist/server/graphql/mutations/crud/user/create-user.js.map +1 -0
- package/dist/server/graphql/mutations/crud/user/create-user.mjs +44 -0
- package/dist/server/graphql/mutations/crud/user/create-user.mjs.map +1 -0
- package/dist/server/graphql/mutations/crud/user/delete-user.js +44 -0
- package/dist/server/graphql/mutations/crud/user/delete-user.js.map +1 -0
- package/dist/server/graphql/mutations/crud/user/delete-user.mjs +42 -0
- package/dist/server/graphql/mutations/crud/user/delete-user.mjs.map +1 -0
- package/dist/server/graphql/mutations/crud/user/update-user.js +49 -0
- package/dist/server/graphql/mutations/crud/user/update-user.js.map +1 -0
- package/dist/server/graphql/mutations/crud/user/update-user.mjs +47 -0
- package/dist/server/graphql/mutations/crud/user/update-user.mjs.map +1 -0
- package/dist/server/graphql/mutations/index.js +58 -0
- package/dist/server/graphql/mutations/index.js.map +1 -0
- package/dist/server/graphql/mutations/index.mjs +56 -0
- package/dist/server/graphql/mutations/index.mjs.map +1 -0
- package/dist/server/graphql/queries/index.js +25 -0
- package/dist/server/graphql/queries/index.js.map +1 -0
- package/dist/server/graphql/queries/index.mjs +23 -0
- package/dist/server/graphql/queries/index.mjs.map +1 -0
- package/dist/server/graphql/queries/me.js +23 -0
- package/dist/server/graphql/queries/me.js.map +1 -0
- package/dist/server/graphql/queries/me.mjs +21 -0
- package/dist/server/graphql/queries/me.mjs.map +1 -0
- package/dist/server/graphql/resolvers-configs.js +93 -0
- package/dist/server/graphql/resolvers-configs.js.map +1 -0
- package/dist/server/graphql/resolvers-configs.mjs +91 -0
- package/dist/server/graphql/resolvers-configs.mjs.map +1 -0
- package/dist/server/graphql/types/create-role-payload.js +20 -0
- package/dist/server/graphql/types/create-role-payload.js.map +1 -0
- package/dist/server/graphql/types/create-role-payload.mjs +18 -0
- package/dist/server/graphql/types/create-role-payload.mjs.map +1 -0
- package/dist/server/graphql/types/delete-role-payload.js +20 -0
- package/dist/server/graphql/types/delete-role-payload.js.map +1 -0
- package/dist/server/graphql/types/delete-role-payload.mjs +18 -0
- package/dist/server/graphql/types/delete-role-payload.mjs.map +1 -0
- package/dist/server/graphql/types/index.js +41 -0
- package/dist/server/graphql/types/index.js.map +1 -0
- package/dist/server/graphql/types/index.mjs +39 -0
- package/dist/server/graphql/types/index.mjs.map +1 -0
- package/dist/server/graphql/types/login-input.js +24 -0
- package/dist/server/graphql/types/login-input.js.map +1 -0
- package/dist/server/graphql/types/login-input.mjs +22 -0
- package/dist/server/graphql/types/login-input.mjs.map +1 -0
- package/dist/server/graphql/types/login-payload.js +23 -0
- package/dist/server/graphql/types/login-payload.js.map +1 -0
- package/dist/server/graphql/types/login-payload.mjs +21 -0
- package/dist/server/graphql/types/login-payload.mjs.map +1 -0
- package/dist/server/graphql/types/me-role.js +23 -0
- package/dist/server/graphql/types/me-role.js.map +1 -0
- package/dist/server/graphql/types/me-role.mjs +21 -0
- package/dist/server/graphql/types/me-role.mjs.map +1 -0
- package/dist/server/graphql/types/me.js +28 -0
- package/dist/server/graphql/types/me.js.map +1 -0
- package/dist/server/graphql/types/me.mjs +26 -0
- package/dist/server/graphql/types/me.mjs.map +1 -0
- package/dist/server/graphql/types/password-payload.js +20 -0
- package/dist/server/graphql/types/password-payload.js.map +1 -0
- package/dist/server/graphql/types/password-payload.mjs +18 -0
- package/dist/server/graphql/types/password-payload.mjs.map +1 -0
- package/dist/server/graphql/types/register-input.js +22 -0
- package/dist/server/graphql/types/register-input.js.map +1 -0
- package/dist/server/graphql/types/register-input.mjs +20 -0
- package/dist/server/graphql/types/register-input.mjs.map +1 -0
- package/dist/server/graphql/types/update-role-payload.js +20 -0
- package/dist/server/graphql/types/update-role-payload.js.map +1 -0
- package/dist/server/graphql/types/update-role-payload.mjs +18 -0
- package/dist/server/graphql/types/update-role-payload.mjs.map +1 -0
- package/dist/server/graphql/types/user-input.js +26 -0
- package/dist/server/graphql/types/user-input.js.map +1 -0
- package/dist/server/graphql/types/user-input.mjs +24 -0
- package/dist/server/graphql/types/user-input.mjs.map +1 -0
- package/dist/server/graphql/utils.js +32 -0
- package/dist/server/graphql/utils.js.map +1 -0
- package/dist/server/graphql/utils.mjs +30 -0
- package/dist/server/graphql/utils.mjs.map +1 -0
- package/dist/server/index.js +4 -4760
- package/dist/server/index.js.map +1 -1
- package/dist/server/index.mjs +2 -4758
- package/dist/server/index.mjs.map +1 -1
- package/dist/server/index2.js +39 -0
- package/dist/server/index2.js.map +1 -0
- package/dist/server/index2.mjs +37 -0
- package/dist/server/index2.mjs.map +1 -0
- package/dist/server/middlewares/index.js +18 -0
- package/dist/server/middlewares/index.js.map +1 -0
- package/dist/server/middlewares/index.mjs +16 -0
- package/dist/server/middlewares/index.mjs.map +1 -0
- package/dist/server/middlewares/rateLimit.js +51 -0
- package/dist/server/middlewares/rateLimit.js.map +1 -0
- package/dist/server/middlewares/rateLimit.mjs +49 -0
- package/dist/server/middlewares/rateLimit.mjs.map +1 -0
- package/dist/server/register.js +41 -0
- package/dist/server/register.js.map +1 -0
- package/dist/server/register.mjs +39 -0
- package/dist/server/register.mjs.map +1 -0
- package/dist/server/routes/admin/index.js +27 -0
- package/dist/server/routes/admin/index.js.map +1 -0
- package/dist/server/routes/admin/index.mjs +25 -0
- package/dist/server/routes/admin/index.mjs.map +1 -0
- package/dist/server/routes/admin/permissions.js +29 -0
- package/dist/server/routes/admin/permissions.js.map +1 -0
- package/dist/server/routes/admin/permissions.mjs +27 -0
- package/dist/server/routes/admin/permissions.mjs.map +1 -0
- package/dist/server/routes/admin/role.js +99 -0
- package/dist/server/routes/admin/role.js.map +1 -0
- package/dist/server/routes/admin/role.mjs +97 -0
- package/dist/server/routes/admin/role.mjs.map +1 -0
- package/dist/server/routes/admin/settings.js +116 -0
- package/dist/server/routes/admin/settings.js.map +1 -0
- package/dist/server/routes/admin/settings.mjs +114 -0
- package/dist/server/routes/admin/settings.mjs.map +1 -0
- package/dist/server/routes/content-api/auth.js +104 -0
- package/dist/server/routes/content-api/auth.js.map +1 -0
- package/dist/server/routes/content-api/auth.mjs +102 -0
- package/dist/server/routes/content-api/auth.mjs.map +1 -0
- package/dist/server/routes/content-api/index.js +30 -0
- package/dist/server/routes/content-api/index.js.map +1 -0
- package/dist/server/routes/content-api/index.mjs +28 -0
- package/dist/server/routes/content-api/index.mjs.map +1 -0
- package/dist/server/routes/content-api/permissions.js +19 -0
- package/dist/server/routes/content-api/permissions.js.map +1 -0
- package/dist/server/routes/content-api/permissions.mjs +17 -0
- package/dist/server/routes/content-api/permissions.mjs.map +1 -0
- package/dist/server/routes/content-api/role.js +39 -0
- package/dist/server/routes/content-api/role.js.map +1 -0
- package/dist/server/routes/content-api/role.mjs +37 -0
- package/dist/server/routes/content-api/role.mjs.map +1 -0
- package/dist/server/routes/content-api/user.js +70 -0
- package/dist/server/routes/content-api/user.js.map +1 -0
- package/dist/server/routes/content-api/user.mjs +68 -0
- package/dist/server/routes/content-api/user.mjs.map +1 -0
- package/dist/server/routes/index.js +19 -0
- package/dist/server/routes/index.js.map +1 -0
- package/dist/server/routes/index.mjs +17 -0
- package/dist/server/routes/index.mjs.map +1 -0
- package/dist/server/services/index.js +36 -0
- package/dist/server/services/index.js.map +1 -0
- package/dist/server/services/index.mjs +34 -0
- package/dist/server/services/index.mjs.map +1 -0
- package/dist/server/services/jwt.js +50 -0
- package/dist/server/services/jwt.js.map +1 -0
- package/dist/server/services/jwt.mjs +48 -0
- package/dist/server/services/jwt.mjs.map +1 -0
- package/dist/server/services/permission.js +52 -0
- package/dist/server/services/permission.js.map +1 -0
- package/dist/server/services/permission.mjs +50 -0
- package/dist/server/services/permission.mjs.map +1 -0
- package/dist/server/services/providers-registry.js +555 -0
- package/dist/server/services/providers-registry.js.map +1 -0
- package/dist/server/services/providers-registry.mjs +553 -0
- package/dist/server/services/providers-registry.mjs.map +1 -0
- package/dist/server/services/providers.js +111 -0
- package/dist/server/services/providers.js.map +1 -0
- package/dist/server/services/providers.mjs +109 -0
- package/dist/server/services/providers.mjs.map +1 -0
- package/dist/server/services/role.js +186 -0
- package/dist/server/services/role.js.map +1 -0
- package/dist/server/services/role.mjs +184 -0
- package/dist/server/services/role.mjs.map +1 -0
- package/dist/server/services/user.js +179 -0
- package/dist/server/services/user.js.map +1 -0
- package/dist/server/services/user.mjs +177 -0
- package/dist/server/services/user.mjs.map +1 -0
- package/dist/server/services/users-permissions.js +247 -0
- package/dist/server/services/users-permissions.js.map +1 -0
- package/dist/server/services/users-permissions.mjs +245 -0
- package/dist/server/services/users-permissions.mjs.map +1 -0
- package/dist/server/strategies/users-permissions.js +114 -0
- package/dist/server/strategies/users-permissions.js.map +1 -0
- package/dist/server/strategies/users-permissions.mjs +112 -0
- package/dist/server/strategies/users-permissions.mjs.map +1 -0
- package/dist/server/utils/index.js +22 -0
- package/dist/server/utils/index.js.map +1 -0
- package/dist/server/utils/index.mjs +20 -0
- package/dist/server/utils/index.mjs.map +1 -0
- package/dist/server/utils/sanitize/index.js +21 -0
- package/dist/server/utils/sanitize/index.js.map +1 -0
- package/dist/server/utils/sanitize/index.mjs +19 -0
- package/dist/server/utils/sanitize/index.mjs.map +1 -0
- package/dist/server/utils/sanitize/sanitizers.js +32 -0
- package/dist/server/utils/sanitize/sanitizers.js.map +1 -0
- package/dist/server/utils/sanitize/sanitizers.mjs +30 -0
- package/dist/server/utils/sanitize/sanitizers.mjs.map +1 -0
- package/dist/server/utils/sanitize/visitors/index.js +17 -0
- package/dist/server/utils/sanitize/visitors/index.js.map +1 -0
- package/dist/server/utils/sanitize/visitors/index.mjs +15 -0
- package/dist/server/utils/sanitize/visitors/index.mjs.map +1 -0
- package/dist/server/utils/sanitize/visitors/remove-user-relation-from-role-entities.js +17 -0
- package/dist/server/utils/sanitize/visitors/remove-user-relation-from-role-entities.js.map +1 -0
- package/dist/server/utils/sanitize/visitors/remove-user-relation-from-role-entities.mjs +15 -0
- package/dist/server/utils/sanitize/visitors/remove-user-relation-from-role-entities.mjs.map +1 -0
- package/package.json +3 -3
- package/rollup.config.mjs +15 -48
- package/dist/admin/chunks/ar-BJwjobLp.js.map +0 -1
- package/dist/admin/chunks/ar-G6bUGuUb.mjs.map +0 -1
- package/dist/admin/chunks/cs-Bu59JqhG.mjs.map +0 -1
- package/dist/admin/chunks/cs-uS_SIEo8.js.map +0 -1
- package/dist/admin/chunks/de-7MVMrqqI.js.map +0 -1
- package/dist/admin/chunks/de-B81A69_5.mjs.map +0 -1
- package/dist/admin/chunks/dk-BaelzvBE.mjs.map +0 -1
- package/dist/admin/chunks/dk-DwCLGmy9.js.map +0 -1
- package/dist/admin/chunks/en-BhgCBe7M.mjs.map +0 -1
- package/dist/admin/chunks/en-DwQjkHi_.js.map +0 -1
- package/dist/admin/chunks/es-B0wXmvRj.mjs.map +0 -1
- package/dist/admin/chunks/es-BOJOedG5.js.map +0 -1
- package/dist/admin/chunks/fr-BDNWCNs0.js.map +0 -1
- package/dist/admin/chunks/fr-CGYvGUXg.mjs.map +0 -1
- package/dist/admin/chunks/id-CNzbwFjA.mjs.map +0 -1
- package/dist/admin/chunks/id-UqUPykHZ.js.map +0 -1
- package/dist/admin/chunks/index--_o6btSC.js +0 -471
- package/dist/admin/chunks/index--_o6btSC.js.map +0 -1
- package/dist/admin/chunks/index-BBjNJt_G.mjs +0 -448
- package/dist/admin/chunks/index-BBjNJt_G.mjs.map +0 -1
- package/dist/admin/chunks/index-BgAfLcWs.mjs +0 -1516
- package/dist/admin/chunks/index-BgAfLcWs.mjs.map +0 -1
- package/dist/admin/chunks/index-CHTUC0LM.mjs +0 -718
- package/dist/admin/chunks/index-CHTUC0LM.mjs.map +0 -1
- package/dist/admin/chunks/index-CY5JZ38k.mjs +0 -213
- package/dist/admin/chunks/index-CY5JZ38k.mjs.map +0 -1
- package/dist/admin/chunks/index-Cu1VuLS3.js +0 -741
- package/dist/admin/chunks/index-Cu1VuLS3.js.map +0 -1
- package/dist/admin/chunks/index-Cy-tPfRk.mjs.map +0 -1
- package/dist/admin/chunks/index-DD-Z6c1S.js +0 -217
- package/dist/admin/chunks/index-DD-Z6c1S.js.map +0 -1
- package/dist/admin/chunks/index-DFnYIqrB.js.map +0 -1
- package/dist/admin/chunks/index-DvubCYNe.js +0 -1537
- package/dist/admin/chunks/index-DvubCYNe.js.map +0 -1
- package/dist/admin/chunks/it-B2H2foTf.mjs.map +0 -1
- package/dist/admin/chunks/it-D5VuyoLU.js.map +0 -1
- package/dist/admin/chunks/ja-C0z9d7L9.mjs.map +0 -1
- package/dist/admin/chunks/ja-MpqVsCgs.js.map +0 -1
- package/dist/admin/chunks/ko-Bm-grPSc.js.map +0 -1
- package/dist/admin/chunks/ko-CzUgzpeS.mjs.map +0 -1
- package/dist/admin/chunks/ms-CCacxjim.mjs.map +0 -1
- package/dist/admin/chunks/ms-D7eyBD5H.js.map +0 -1
- package/dist/admin/chunks/nl-BIOwAQtI.js.map +0 -1
- package/dist/admin/chunks/nl-DDC3nZW-.mjs.map +0 -1
- package/dist/admin/chunks/pl-D5BeNrg_.js.map +0 -1
- package/dist/admin/chunks/pl-XkS463rN.mjs.map +0 -1
- package/dist/admin/chunks/pt-BR-8cC7z8Km.mjs.map +0 -1
- package/dist/admin/chunks/pt-BR-DxPBzQGx.js.map +0 -1
- package/dist/admin/chunks/pt-DQpEvio8.mjs.map +0 -1
- package/dist/admin/chunks/pt-kkCwzNvH.js.map +0 -1
- package/dist/admin/chunks/ru-BQ0gHmp3.js.map +0 -1
- package/dist/admin/chunks/ru-nzL_7Mhg.mjs.map +0 -1
- package/dist/admin/chunks/sk-Ddxc_tZA.mjs.map +0 -1
- package/dist/admin/chunks/sk-nVwAPdYC.js.map +0 -1
- package/dist/admin/chunks/sv-BDfk2A-F.js.map +0 -1
- package/dist/admin/chunks/sv-By3RYpMG.mjs.map +0 -1
- package/dist/admin/chunks/th-BtTtpHe2.js.map +0 -1
- package/dist/admin/chunks/th-COl50vqb.mjs.map +0 -1
- package/dist/admin/chunks/tr-80SJU6jg.mjs.map +0 -1
- package/dist/admin/chunks/tr-Di-Nf7cT.js.map +0 -1
- package/dist/admin/chunks/uk-DnrIlPwG.mjs.map +0 -1
- package/dist/admin/chunks/uk-r5zXTAS7.js.map +0 -1
- package/dist/admin/chunks/vi-69AF03Iv.mjs.map +0 -1
- package/dist/admin/chunks/vi-D9cCsHsU.js.map +0 -1
- package/dist/admin/chunks/zh-BzSkqxo-.mjs.map +0 -1
- package/dist/admin/chunks/zh-BzWgJEzz.js.map +0 -1
- package/dist/admin/chunks/zh-Hans-CKqQbpsM.js.map +0 -1
- package/dist/admin/chunks/zh-Hans-DmDcSsp7.mjs.map +0 -1
|
@@ -0,0 +1,427 @@
|
|
|
1
|
+
import require$$0 from 'crypto';
|
|
2
|
+
import require$$0$1 from 'lodash';
|
|
3
|
+
import require$$0$2 from 'lodash/fp';
|
|
4
|
+
import require$$1 from '@strapi/utils';
|
|
5
|
+
import { __require as requireUtils } from '../utils/index.mjs';
|
|
6
|
+
import { __require as requireAuth$1 } from './validation/auth.mjs';
|
|
7
|
+
import require$$6 from 'grant';
|
|
8
|
+
|
|
9
|
+
var auth;
|
|
10
|
+
var hasRequiredAuth;
|
|
11
|
+
function requireAuth() {
|
|
12
|
+
if (hasRequiredAuth) return auth;
|
|
13
|
+
hasRequiredAuth = 1;
|
|
14
|
+
/**
|
|
15
|
+
* Auth.js controller
|
|
16
|
+
*
|
|
17
|
+
* @description: A set of functions called "actions" for managing `Auth`.
|
|
18
|
+
*/ /* eslint-disable no-useless-escape */ const crypto = require$$0;
|
|
19
|
+
const _ = require$$0$1;
|
|
20
|
+
const { concat, compact, isArray } = require$$0$2;
|
|
21
|
+
const utils = require$$1;
|
|
22
|
+
const { getService } = requireUtils();
|
|
23
|
+
const { validateCallbackBody, validateRegisterBody, validateSendEmailConfirmationBody, validateForgotPasswordBody, validateResetPasswordBody, validateEmailConfirmationBody, validateChangePasswordBody } = requireAuth$1();
|
|
24
|
+
const { ApplicationError, ValidationError, ForbiddenError } = utils.errors;
|
|
25
|
+
const sanitizeUser = (user, ctx)=>{
|
|
26
|
+
const { auth } = ctx.state;
|
|
27
|
+
const userSchema = strapi.getModel('plugin::users-permissions.user');
|
|
28
|
+
return strapi.contentAPI.sanitize.output(user, userSchema, {
|
|
29
|
+
auth
|
|
30
|
+
});
|
|
31
|
+
};
|
|
32
|
+
auth = ({ strapi: strapi1 })=>({
|
|
33
|
+
async callback (ctx) {
|
|
34
|
+
const provider = ctx.params.provider || 'local';
|
|
35
|
+
const params = ctx.request.body;
|
|
36
|
+
const store = strapi1.store({
|
|
37
|
+
type: 'plugin',
|
|
38
|
+
name: 'users-permissions'
|
|
39
|
+
});
|
|
40
|
+
const grantSettings = await store.get({
|
|
41
|
+
key: 'grant'
|
|
42
|
+
});
|
|
43
|
+
const grantProvider = provider === 'local' ? 'email' : provider;
|
|
44
|
+
if (!_.get(grantSettings, [
|
|
45
|
+
grantProvider,
|
|
46
|
+
'enabled'
|
|
47
|
+
])) {
|
|
48
|
+
throw new ApplicationError('This provider is disabled');
|
|
49
|
+
}
|
|
50
|
+
if (provider === 'local') {
|
|
51
|
+
await validateCallbackBody(params);
|
|
52
|
+
const { identifier } = params;
|
|
53
|
+
// Check if the user exists.
|
|
54
|
+
const user = await strapi1.db.query('plugin::users-permissions.user').findOne({
|
|
55
|
+
where: {
|
|
56
|
+
provider,
|
|
57
|
+
$or: [
|
|
58
|
+
{
|
|
59
|
+
email: identifier.toLowerCase()
|
|
60
|
+
},
|
|
61
|
+
{
|
|
62
|
+
username: identifier
|
|
63
|
+
}
|
|
64
|
+
]
|
|
65
|
+
}
|
|
66
|
+
});
|
|
67
|
+
if (!user) {
|
|
68
|
+
throw new ValidationError('Invalid identifier or password');
|
|
69
|
+
}
|
|
70
|
+
if (!user.password) {
|
|
71
|
+
throw new ValidationError('Invalid identifier or password');
|
|
72
|
+
}
|
|
73
|
+
const validPassword = await getService('user').validatePassword(params.password, user.password);
|
|
74
|
+
if (!validPassword) {
|
|
75
|
+
throw new ValidationError('Invalid identifier or password');
|
|
76
|
+
}
|
|
77
|
+
const advancedSettings = await store.get({
|
|
78
|
+
key: 'advanced'
|
|
79
|
+
});
|
|
80
|
+
const requiresConfirmation = _.get(advancedSettings, 'email_confirmation');
|
|
81
|
+
if (requiresConfirmation && user.confirmed !== true) {
|
|
82
|
+
throw new ApplicationError('Your account email is not confirmed');
|
|
83
|
+
}
|
|
84
|
+
if (user.blocked === true) {
|
|
85
|
+
throw new ApplicationError('Your account has been blocked by an administrator');
|
|
86
|
+
}
|
|
87
|
+
return ctx.send({
|
|
88
|
+
jwt: getService('jwt').issue({
|
|
89
|
+
id: user.id
|
|
90
|
+
}),
|
|
91
|
+
user: await sanitizeUser(user, ctx)
|
|
92
|
+
});
|
|
93
|
+
}
|
|
94
|
+
// Connect the user with the third-party provider.
|
|
95
|
+
try {
|
|
96
|
+
const user = await getService('providers').connect(provider, ctx.query);
|
|
97
|
+
if (user.blocked) {
|
|
98
|
+
throw new ForbiddenError('Your account has been blocked by an administrator');
|
|
99
|
+
}
|
|
100
|
+
return ctx.send({
|
|
101
|
+
jwt: getService('jwt').issue({
|
|
102
|
+
id: user.id
|
|
103
|
+
}),
|
|
104
|
+
user: await sanitizeUser(user, ctx)
|
|
105
|
+
});
|
|
106
|
+
} catch (error) {
|
|
107
|
+
throw new ApplicationError(error.message);
|
|
108
|
+
}
|
|
109
|
+
},
|
|
110
|
+
async changePassword (ctx) {
|
|
111
|
+
if (!ctx.state.user) {
|
|
112
|
+
throw new ApplicationError('You must be authenticated to reset your password');
|
|
113
|
+
}
|
|
114
|
+
const validations = strapi1.config.get('plugin::users-permissions.validationRules');
|
|
115
|
+
const { currentPassword, password } = await validateChangePasswordBody(ctx.request.body, validations);
|
|
116
|
+
const user = await strapi1.db.query('plugin::users-permissions.user').findOne({
|
|
117
|
+
where: {
|
|
118
|
+
id: ctx.state.user.id
|
|
119
|
+
}
|
|
120
|
+
});
|
|
121
|
+
const validPassword = await getService('user').validatePassword(currentPassword, user.password);
|
|
122
|
+
if (!validPassword) {
|
|
123
|
+
throw new ValidationError('The provided current password is invalid');
|
|
124
|
+
}
|
|
125
|
+
if (currentPassword === password) {
|
|
126
|
+
throw new ValidationError('Your new password must be different than your current password');
|
|
127
|
+
}
|
|
128
|
+
await getService('user').edit(user.id, {
|
|
129
|
+
password
|
|
130
|
+
});
|
|
131
|
+
ctx.send({
|
|
132
|
+
jwt: getService('jwt').issue({
|
|
133
|
+
id: user.id
|
|
134
|
+
}),
|
|
135
|
+
user: await sanitizeUser(user, ctx)
|
|
136
|
+
});
|
|
137
|
+
},
|
|
138
|
+
async resetPassword (ctx) {
|
|
139
|
+
const validations = strapi1.config.get('plugin::users-permissions.validationRules');
|
|
140
|
+
const { password, passwordConfirmation, code } = await validateResetPasswordBody(ctx.request.body, validations);
|
|
141
|
+
if (password !== passwordConfirmation) {
|
|
142
|
+
throw new ValidationError('Passwords do not match');
|
|
143
|
+
}
|
|
144
|
+
const user = await strapi1.db.query('plugin::users-permissions.user').findOne({
|
|
145
|
+
where: {
|
|
146
|
+
resetPasswordToken: code
|
|
147
|
+
}
|
|
148
|
+
});
|
|
149
|
+
if (!user) {
|
|
150
|
+
throw new ValidationError('Incorrect code provided');
|
|
151
|
+
}
|
|
152
|
+
await getService('user').edit(user.id, {
|
|
153
|
+
resetPasswordToken: null,
|
|
154
|
+
password
|
|
155
|
+
});
|
|
156
|
+
// Update the user.
|
|
157
|
+
ctx.send({
|
|
158
|
+
jwt: getService('jwt').issue({
|
|
159
|
+
id: user.id
|
|
160
|
+
}),
|
|
161
|
+
user: await sanitizeUser(user, ctx)
|
|
162
|
+
});
|
|
163
|
+
},
|
|
164
|
+
async connect (ctx, next) {
|
|
165
|
+
const grant = require$$6.koa();
|
|
166
|
+
const providers = await strapi1.store({
|
|
167
|
+
type: 'plugin',
|
|
168
|
+
name: 'users-permissions',
|
|
169
|
+
key: 'grant'
|
|
170
|
+
}).get();
|
|
171
|
+
const apiPrefix = strapi1.config.get('api.rest.prefix');
|
|
172
|
+
const grantConfig = {
|
|
173
|
+
defaults: {
|
|
174
|
+
prefix: `${apiPrefix}/connect`
|
|
175
|
+
},
|
|
176
|
+
...providers
|
|
177
|
+
};
|
|
178
|
+
const [requestPath] = ctx.request.url.split('?');
|
|
179
|
+
const provider = requestPath.split('/connect/')[1].split('/')[0];
|
|
180
|
+
if (!_.get(grantConfig[provider], 'enabled')) {
|
|
181
|
+
throw new ApplicationError('This provider is disabled');
|
|
182
|
+
}
|
|
183
|
+
if (!strapi1.config.server.url.startsWith('http')) {
|
|
184
|
+
strapi1.log.warn('You are using a third party provider for login. Make sure to set an absolute url in config/server.js. More info here: https://docs.strapi.io/developer-docs/latest/plugins/users-permissions.html#setting-up-the-server-url');
|
|
185
|
+
}
|
|
186
|
+
// Ability to pass OAuth callback dynamically
|
|
187
|
+
const queryCustomCallback = _.get(ctx, 'query.callback');
|
|
188
|
+
const dynamicSessionCallback = _.get(ctx, 'session.grant.dynamic.callback');
|
|
189
|
+
const customCallback = queryCustomCallback ?? dynamicSessionCallback;
|
|
190
|
+
// The custom callback is validated to make sure it's not redirecting to an unwanted actor.
|
|
191
|
+
if (customCallback !== undefined) {
|
|
192
|
+
try {
|
|
193
|
+
// We're extracting the callback validator from the plugin config since it can be user-customized
|
|
194
|
+
const { validate: validateCallback } = strapi1.plugin('users-permissions').config('callback');
|
|
195
|
+
await validateCallback(customCallback, grantConfig[provider]);
|
|
196
|
+
grantConfig[provider].callback = customCallback;
|
|
197
|
+
} catch (e) {
|
|
198
|
+
throw new ValidationError('Invalid callback URL provided', {
|
|
199
|
+
callback: customCallback
|
|
200
|
+
});
|
|
201
|
+
}
|
|
202
|
+
}
|
|
203
|
+
// Build a valid redirect URI for the current provider
|
|
204
|
+
grantConfig[provider].redirect_uri = getService('providers').buildRedirectUri(provider);
|
|
205
|
+
return grant(grantConfig)(ctx, next);
|
|
206
|
+
},
|
|
207
|
+
async forgotPassword (ctx) {
|
|
208
|
+
const { email } = await validateForgotPasswordBody(ctx.request.body);
|
|
209
|
+
const pluginStore = await strapi1.store({
|
|
210
|
+
type: 'plugin',
|
|
211
|
+
name: 'users-permissions'
|
|
212
|
+
});
|
|
213
|
+
const emailSettings = await pluginStore.get({
|
|
214
|
+
key: 'email'
|
|
215
|
+
});
|
|
216
|
+
const advancedSettings = await pluginStore.get({
|
|
217
|
+
key: 'advanced'
|
|
218
|
+
});
|
|
219
|
+
// Find the user by email.
|
|
220
|
+
const user = await strapi1.db.query('plugin::users-permissions.user').findOne({
|
|
221
|
+
where: {
|
|
222
|
+
email: email.toLowerCase()
|
|
223
|
+
}
|
|
224
|
+
});
|
|
225
|
+
if (!user || user.blocked) {
|
|
226
|
+
return ctx.send({
|
|
227
|
+
ok: true
|
|
228
|
+
});
|
|
229
|
+
}
|
|
230
|
+
// Generate random token.
|
|
231
|
+
const userInfo = await sanitizeUser(user, ctx);
|
|
232
|
+
const resetPasswordToken = crypto.randomBytes(64).toString('hex');
|
|
233
|
+
const resetPasswordSettings = _.get(emailSettings, 'reset_password.options', {});
|
|
234
|
+
const emailBody = await getService('users-permissions').template(resetPasswordSettings.message, {
|
|
235
|
+
URL: advancedSettings.email_reset_password,
|
|
236
|
+
SERVER_URL: strapi1.config.get('server.absoluteUrl'),
|
|
237
|
+
ADMIN_URL: strapi1.config.get('admin.absoluteUrl'),
|
|
238
|
+
USER: userInfo,
|
|
239
|
+
TOKEN: resetPasswordToken
|
|
240
|
+
});
|
|
241
|
+
const emailObject = await getService('users-permissions').template(resetPasswordSettings.object, {
|
|
242
|
+
USER: userInfo
|
|
243
|
+
});
|
|
244
|
+
const emailToSend = {
|
|
245
|
+
to: user.email,
|
|
246
|
+
from: resetPasswordSettings.from.email || resetPasswordSettings.from.name ? `${resetPasswordSettings.from.name} <${resetPasswordSettings.from.email}>` : undefined,
|
|
247
|
+
replyTo: resetPasswordSettings.response_email,
|
|
248
|
+
subject: emailObject,
|
|
249
|
+
text: emailBody,
|
|
250
|
+
html: emailBody
|
|
251
|
+
};
|
|
252
|
+
// NOTE: Update the user before sending the email so an Admin can generate the link if the email fails
|
|
253
|
+
await getService('user').edit(user.id, {
|
|
254
|
+
resetPasswordToken
|
|
255
|
+
});
|
|
256
|
+
// Send an email to the user.
|
|
257
|
+
await strapi1.plugin('email').service('email').send(emailToSend);
|
|
258
|
+
ctx.send({
|
|
259
|
+
ok: true
|
|
260
|
+
});
|
|
261
|
+
},
|
|
262
|
+
async register (ctx) {
|
|
263
|
+
const pluginStore = await strapi1.store({
|
|
264
|
+
type: 'plugin',
|
|
265
|
+
name: 'users-permissions'
|
|
266
|
+
});
|
|
267
|
+
const settings = await pluginStore.get({
|
|
268
|
+
key: 'advanced'
|
|
269
|
+
});
|
|
270
|
+
if (!settings.allow_register) {
|
|
271
|
+
throw new ApplicationError('Register action is currently disabled');
|
|
272
|
+
}
|
|
273
|
+
const { register } = strapi1.config.get('plugin::users-permissions');
|
|
274
|
+
const alwaysAllowedKeys = [
|
|
275
|
+
'username',
|
|
276
|
+
'password',
|
|
277
|
+
'email'
|
|
278
|
+
];
|
|
279
|
+
// Note that we intentionally do not filter allowedFields to allow a project to explicitly accept private or other Strapi field on registration
|
|
280
|
+
const allowedKeys = compact(concat(alwaysAllowedKeys, isArray(register?.allowedFields) ? register.allowedFields : []));
|
|
281
|
+
// Check if there are any keys in requestBody that are not in allowedKeys
|
|
282
|
+
const invalidKeys = Object.keys(ctx.request.body).filter((key)=>!allowedKeys.includes(key));
|
|
283
|
+
if (invalidKeys.length > 0) {
|
|
284
|
+
// If there are invalid keys, throw an error
|
|
285
|
+
throw new ValidationError(`Invalid parameters: ${invalidKeys.join(', ')}`);
|
|
286
|
+
}
|
|
287
|
+
const params = {
|
|
288
|
+
..._.pick(ctx.request.body, allowedKeys),
|
|
289
|
+
provider: 'local'
|
|
290
|
+
};
|
|
291
|
+
const validations = strapi1.config.get('plugin::users-permissions.validationRules');
|
|
292
|
+
await validateRegisterBody(params, validations);
|
|
293
|
+
const role = await strapi1.db.query('plugin::users-permissions.role').findOne({
|
|
294
|
+
where: {
|
|
295
|
+
type: settings.default_role
|
|
296
|
+
}
|
|
297
|
+
});
|
|
298
|
+
if (!role) {
|
|
299
|
+
throw new ApplicationError('Impossible to find the default role');
|
|
300
|
+
}
|
|
301
|
+
const { email, username, provider } = params;
|
|
302
|
+
const identifierFilter = {
|
|
303
|
+
$or: [
|
|
304
|
+
{
|
|
305
|
+
email: email.toLowerCase()
|
|
306
|
+
},
|
|
307
|
+
{
|
|
308
|
+
username: email.toLowerCase()
|
|
309
|
+
},
|
|
310
|
+
{
|
|
311
|
+
username
|
|
312
|
+
},
|
|
313
|
+
{
|
|
314
|
+
email: username
|
|
315
|
+
}
|
|
316
|
+
]
|
|
317
|
+
};
|
|
318
|
+
const conflictingUserCount = await strapi1.db.query('plugin::users-permissions.user').count({
|
|
319
|
+
where: {
|
|
320
|
+
...identifierFilter,
|
|
321
|
+
provider
|
|
322
|
+
}
|
|
323
|
+
});
|
|
324
|
+
if (conflictingUserCount > 0) {
|
|
325
|
+
throw new ApplicationError('Email or Username are already taken');
|
|
326
|
+
}
|
|
327
|
+
if (settings.unique_email) {
|
|
328
|
+
const conflictingUserCount = await strapi1.db.query('plugin::users-permissions.user').count({
|
|
329
|
+
where: {
|
|
330
|
+
...identifierFilter
|
|
331
|
+
}
|
|
332
|
+
});
|
|
333
|
+
if (conflictingUserCount > 0) {
|
|
334
|
+
throw new ApplicationError('Email or Username are already taken');
|
|
335
|
+
}
|
|
336
|
+
}
|
|
337
|
+
const newUser = {
|
|
338
|
+
...params,
|
|
339
|
+
role: role.id,
|
|
340
|
+
email: email.toLowerCase(),
|
|
341
|
+
username,
|
|
342
|
+
confirmed: !settings.email_confirmation
|
|
343
|
+
};
|
|
344
|
+
const user = await getService('user').add(newUser);
|
|
345
|
+
const sanitizedUser = await sanitizeUser(user, ctx);
|
|
346
|
+
if (settings.email_confirmation) {
|
|
347
|
+
try {
|
|
348
|
+
await getService('user').sendConfirmationEmail(sanitizedUser);
|
|
349
|
+
} catch (err) {
|
|
350
|
+
strapi1.log.error(err);
|
|
351
|
+
throw new ApplicationError('Error sending confirmation email');
|
|
352
|
+
}
|
|
353
|
+
return ctx.send({
|
|
354
|
+
user: sanitizedUser
|
|
355
|
+
});
|
|
356
|
+
}
|
|
357
|
+
const jwt = getService('jwt').issue(_.pick(user, [
|
|
358
|
+
'id'
|
|
359
|
+
]));
|
|
360
|
+
return ctx.send({
|
|
361
|
+
jwt,
|
|
362
|
+
user: sanitizedUser
|
|
363
|
+
});
|
|
364
|
+
},
|
|
365
|
+
async emailConfirmation (ctx, next, returnUser) {
|
|
366
|
+
const { confirmation: confirmationToken } = await validateEmailConfirmationBody(ctx.query);
|
|
367
|
+
const userService = getService('user');
|
|
368
|
+
const jwtService = getService('jwt');
|
|
369
|
+
const [user] = await userService.fetchAll({
|
|
370
|
+
filters: {
|
|
371
|
+
confirmationToken
|
|
372
|
+
}
|
|
373
|
+
});
|
|
374
|
+
if (!user) {
|
|
375
|
+
throw new ValidationError('Invalid token');
|
|
376
|
+
}
|
|
377
|
+
await userService.edit(user.id, {
|
|
378
|
+
confirmed: true,
|
|
379
|
+
confirmationToken: null
|
|
380
|
+
});
|
|
381
|
+
if (returnUser) {
|
|
382
|
+
ctx.send({
|
|
383
|
+
jwt: jwtService.issue({
|
|
384
|
+
id: user.id
|
|
385
|
+
}),
|
|
386
|
+
user: await sanitizeUser(user, ctx)
|
|
387
|
+
});
|
|
388
|
+
} else {
|
|
389
|
+
const settings = await strapi1.store({
|
|
390
|
+
type: 'plugin',
|
|
391
|
+
name: 'users-permissions',
|
|
392
|
+
key: 'advanced'
|
|
393
|
+
}).get();
|
|
394
|
+
ctx.redirect(settings.email_confirmation_redirection || '/');
|
|
395
|
+
}
|
|
396
|
+
},
|
|
397
|
+
async sendEmailConfirmation (ctx) {
|
|
398
|
+
const { email } = await validateSendEmailConfirmationBody(ctx.request.body);
|
|
399
|
+
const user = await strapi1.db.query('plugin::users-permissions.user').findOne({
|
|
400
|
+
where: {
|
|
401
|
+
email: email.toLowerCase()
|
|
402
|
+
}
|
|
403
|
+
});
|
|
404
|
+
if (!user) {
|
|
405
|
+
return ctx.send({
|
|
406
|
+
email,
|
|
407
|
+
sent: true
|
|
408
|
+
});
|
|
409
|
+
}
|
|
410
|
+
if (user.confirmed) {
|
|
411
|
+
throw new ApplicationError('Already confirmed');
|
|
412
|
+
}
|
|
413
|
+
if (user.blocked) {
|
|
414
|
+
throw new ApplicationError('User blocked');
|
|
415
|
+
}
|
|
416
|
+
await getService('user').sendConfirmationEmail(user);
|
|
417
|
+
ctx.send({
|
|
418
|
+
email: user.email,
|
|
419
|
+
sent: true
|
|
420
|
+
});
|
|
421
|
+
}
|
|
422
|
+
});
|
|
423
|
+
return auth;
|
|
424
|
+
}
|
|
425
|
+
|
|
426
|
+
export { requireAuth as __require };
|
|
427
|
+
//# sourceMappingURL=auth.mjs.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"auth.mjs","sources":["../../../server/controllers/auth.js"],"sourcesContent":["'use strict';\n\n/**\n * Auth.js controller\n *\n * @description: A set of functions called \"actions\" for managing `Auth`.\n */\n\n/* eslint-disable no-useless-escape */\nconst crypto = require('crypto');\nconst _ = require('lodash');\nconst { concat, compact, isArray } = require('lodash/fp');\nconst utils = require('@strapi/utils');\nconst { getService } = require('../utils');\nconst {\n validateCallbackBody,\n validateRegisterBody,\n validateSendEmailConfirmationBody,\n validateForgotPasswordBody,\n validateResetPasswordBody,\n validateEmailConfirmationBody,\n validateChangePasswordBody,\n} = require('./validation/auth');\n\nconst { ApplicationError, ValidationError, ForbiddenError } = utils.errors;\n\nconst sanitizeUser = (user, ctx) => {\n const { auth } = ctx.state;\n const userSchema = strapi.getModel('plugin::users-permissions.user');\n\n return strapi.contentAPI.sanitize.output(user, userSchema, { auth });\n};\n\nmodule.exports = ({ strapi }) => ({\n async callback(ctx) {\n const provider = ctx.params.provider || 'local';\n const params = ctx.request.body;\n\n const store = strapi.store({ type: 'plugin', name: 'users-permissions' });\n const grantSettings = await store.get({ key: 'grant' });\n\n const grantProvider = provider === 'local' ? 'email' : provider;\n\n if (!_.get(grantSettings, [grantProvider, 'enabled'])) {\n throw new ApplicationError('This provider is disabled');\n }\n\n if (provider === 'local') {\n await validateCallbackBody(params);\n\n const { identifier } = params;\n\n // Check if the user exists.\n const user = await strapi.db.query('plugin::users-permissions.user').findOne({\n where: {\n provider,\n $or: [{ email: identifier.toLowerCase() }, { username: identifier }],\n },\n });\n\n if (!user) {\n throw new ValidationError('Invalid identifier or password');\n }\n\n if (!user.password) {\n throw new ValidationError('Invalid identifier or password');\n }\n\n const validPassword = await getService('user').validatePassword(\n params.password,\n user.password\n );\n\n if (!validPassword) {\n throw new ValidationError('Invalid identifier or password');\n }\n\n const advancedSettings = await store.get({ key: 'advanced' });\n const requiresConfirmation = _.get(advancedSettings, 'email_confirmation');\n\n if (requiresConfirmation && user.confirmed !== true) {\n throw new ApplicationError('Your account email is not confirmed');\n }\n\n if (user.blocked === true) {\n throw new ApplicationError('Your account has been blocked by an administrator');\n }\n\n return ctx.send({\n jwt: getService('jwt').issue({ id: user.id }),\n user: await sanitizeUser(user, ctx),\n });\n }\n\n // Connect the user with the third-party provider.\n try {\n const user = await getService('providers').connect(provider, ctx.query);\n\n if (user.blocked) {\n throw new ForbiddenError('Your account has been blocked by an administrator');\n }\n\n return ctx.send({\n jwt: getService('jwt').issue({ id: user.id }),\n user: await sanitizeUser(user, ctx),\n });\n } catch (error) {\n throw new ApplicationError(error.message);\n }\n },\n\n async changePassword(ctx) {\n if (!ctx.state.user) {\n throw new ApplicationError('You must be authenticated to reset your password');\n }\n\n const validations = strapi.config.get('plugin::users-permissions.validationRules');\n\n const { currentPassword, password } = await validateChangePasswordBody(\n ctx.request.body,\n validations\n );\n\n const user = await strapi.db\n .query('plugin::users-permissions.user')\n .findOne({ where: { id: ctx.state.user.id } });\n\n const validPassword = await getService('user').validatePassword(currentPassword, user.password);\n\n if (!validPassword) {\n throw new ValidationError('The provided current password is invalid');\n }\n\n if (currentPassword === password) {\n throw new ValidationError('Your new password must be different than your current password');\n }\n\n await getService('user').edit(user.id, { password });\n\n ctx.send({\n jwt: getService('jwt').issue({ id: user.id }),\n user: await sanitizeUser(user, ctx),\n });\n },\n\n async resetPassword(ctx) {\n const validations = strapi.config.get('plugin::users-permissions.validationRules');\n\n const { password, passwordConfirmation, code } = await validateResetPasswordBody(\n ctx.request.body,\n validations\n );\n\n if (password !== passwordConfirmation) {\n throw new ValidationError('Passwords do not match');\n }\n\n const user = await strapi.db\n .query('plugin::users-permissions.user')\n .findOne({ where: { resetPasswordToken: code } });\n\n if (!user) {\n throw new ValidationError('Incorrect code provided');\n }\n\n await getService('user').edit(user.id, {\n resetPasswordToken: null,\n password,\n });\n\n // Update the user.\n ctx.send({\n jwt: getService('jwt').issue({ id: user.id }),\n user: await sanitizeUser(user, ctx),\n });\n },\n\n async connect(ctx, next) {\n const grant = require('grant').koa();\n\n const providers = await strapi\n .store({ type: 'plugin', name: 'users-permissions', key: 'grant' })\n .get();\n\n const apiPrefix = strapi.config.get('api.rest.prefix');\n const grantConfig = {\n defaults: {\n prefix: `${apiPrefix}/connect`,\n },\n ...providers,\n };\n\n const [requestPath] = ctx.request.url.split('?');\n const provider = requestPath.split('/connect/')[1].split('/')[0];\n\n if (!_.get(grantConfig[provider], 'enabled')) {\n throw new ApplicationError('This provider is disabled');\n }\n\n if (!strapi.config.server.url.startsWith('http')) {\n strapi.log.warn(\n 'You are using a third party provider for login. Make sure to set an absolute url in config/server.js. More info here: https://docs.strapi.io/developer-docs/latest/plugins/users-permissions.html#setting-up-the-server-url'\n );\n }\n\n // Ability to pass OAuth callback dynamically\n const queryCustomCallback = _.get(ctx, 'query.callback');\n const dynamicSessionCallback = _.get(ctx, 'session.grant.dynamic.callback');\n\n const customCallback = queryCustomCallback ?? dynamicSessionCallback;\n\n // The custom callback is validated to make sure it's not redirecting to an unwanted actor.\n if (customCallback !== undefined) {\n try {\n // We're extracting the callback validator from the plugin config since it can be user-customized\n const { validate: validateCallback } = strapi\n .plugin('users-permissions')\n .config('callback');\n\n await validateCallback(customCallback, grantConfig[provider]);\n\n grantConfig[provider].callback = customCallback;\n } catch (e) {\n throw new ValidationError('Invalid callback URL provided', { callback: customCallback });\n }\n }\n\n // Build a valid redirect URI for the current provider\n grantConfig[provider].redirect_uri = getService('providers').buildRedirectUri(provider);\n\n return grant(grantConfig)(ctx, next);\n },\n\n async forgotPassword(ctx) {\n const { email } = await validateForgotPasswordBody(ctx.request.body);\n\n const pluginStore = await strapi.store({ type: 'plugin', name: 'users-permissions' });\n\n const emailSettings = await pluginStore.get({ key: 'email' });\n const advancedSettings = await pluginStore.get({ key: 'advanced' });\n\n // Find the user by email.\n const user = await strapi.db\n .query('plugin::users-permissions.user')\n .findOne({ where: { email: email.toLowerCase() } });\n\n if (!user || user.blocked) {\n return ctx.send({ ok: true });\n }\n\n // Generate random token.\n const userInfo = await sanitizeUser(user, ctx);\n\n const resetPasswordToken = crypto.randomBytes(64).toString('hex');\n\n const resetPasswordSettings = _.get(emailSettings, 'reset_password.options', {});\n const emailBody = await getService('users-permissions').template(\n resetPasswordSettings.message,\n {\n URL: advancedSettings.email_reset_password,\n SERVER_URL: strapi.config.get('server.absoluteUrl'),\n ADMIN_URL: strapi.config.get('admin.absoluteUrl'),\n USER: userInfo,\n TOKEN: resetPasswordToken,\n }\n );\n\n const emailObject = await getService('users-permissions').template(\n resetPasswordSettings.object,\n {\n USER: userInfo,\n }\n );\n\n const emailToSend = {\n to: user.email,\n from:\n resetPasswordSettings.from.email || resetPasswordSettings.from.name\n ? `${resetPasswordSettings.from.name} <${resetPasswordSettings.from.email}>`\n : undefined,\n replyTo: resetPasswordSettings.response_email,\n subject: emailObject,\n text: emailBody,\n html: emailBody,\n };\n\n // NOTE: Update the user before sending the email so an Admin can generate the link if the email fails\n await getService('user').edit(user.id, { resetPasswordToken });\n\n // Send an email to the user.\n await strapi.plugin('email').service('email').send(emailToSend);\n\n ctx.send({ ok: true });\n },\n\n async register(ctx) {\n const pluginStore = await strapi.store({ type: 'plugin', name: 'users-permissions' });\n\n const settings = await pluginStore.get({ key: 'advanced' });\n\n if (!settings.allow_register) {\n throw new ApplicationError('Register action is currently disabled');\n }\n\n const { register } = strapi.config.get('plugin::users-permissions');\n const alwaysAllowedKeys = ['username', 'password', 'email'];\n\n // Note that we intentionally do not filter allowedFields to allow a project to explicitly accept private or other Strapi field on registration\n const allowedKeys = compact(\n concat(alwaysAllowedKeys, isArray(register?.allowedFields) ? register.allowedFields : [])\n );\n\n // Check if there are any keys in requestBody that are not in allowedKeys\n const invalidKeys = Object.keys(ctx.request.body).filter((key) => !allowedKeys.includes(key));\n\n if (invalidKeys.length > 0) {\n // If there are invalid keys, throw an error\n throw new ValidationError(`Invalid parameters: ${invalidKeys.join(', ')}`);\n }\n\n const params = {\n ..._.pick(ctx.request.body, allowedKeys),\n provider: 'local',\n };\n\n const validations = strapi.config.get('plugin::users-permissions.validationRules');\n\n await validateRegisterBody(params, validations);\n\n const role = await strapi.db\n .query('plugin::users-permissions.role')\n .findOne({ where: { type: settings.default_role } });\n\n if (!role) {\n throw new ApplicationError('Impossible to find the default role');\n }\n\n const { email, username, provider } = params;\n\n const identifierFilter = {\n $or: [\n { email: email.toLowerCase() },\n { username: email.toLowerCase() },\n { username },\n { email: username },\n ],\n };\n\n const conflictingUserCount = await strapi.db.query('plugin::users-permissions.user').count({\n where: { ...identifierFilter, provider },\n });\n\n if (conflictingUserCount > 0) {\n throw new ApplicationError('Email or Username are already taken');\n }\n\n if (settings.unique_email) {\n const conflictingUserCount = await strapi.db.query('plugin::users-permissions.user').count({\n where: { ...identifierFilter },\n });\n\n if (conflictingUserCount > 0) {\n throw new ApplicationError('Email or Username are already taken');\n }\n }\n\n const newUser = {\n ...params,\n role: role.id,\n email: email.toLowerCase(),\n username,\n confirmed: !settings.email_confirmation,\n };\n\n const user = await getService('user').add(newUser);\n\n const sanitizedUser = await sanitizeUser(user, ctx);\n\n if (settings.email_confirmation) {\n try {\n await getService('user').sendConfirmationEmail(sanitizedUser);\n } catch (err) {\n strapi.log.error(err);\n throw new ApplicationError('Error sending confirmation email');\n }\n\n return ctx.send({ user: sanitizedUser });\n }\n\n const jwt = getService('jwt').issue(_.pick(user, ['id']));\n\n return ctx.send({\n jwt,\n user: sanitizedUser,\n });\n },\n\n async emailConfirmation(ctx, next, returnUser) {\n const { confirmation: confirmationToken } = await validateEmailConfirmationBody(ctx.query);\n\n const userService = getService('user');\n const jwtService = getService('jwt');\n\n const [user] = await userService.fetchAll({ filters: { confirmationToken } });\n\n if (!user) {\n throw new ValidationError('Invalid token');\n }\n\n await userService.edit(user.id, { confirmed: true, confirmationToken: null });\n\n if (returnUser) {\n ctx.send({\n jwt: jwtService.issue({ id: user.id }),\n user: await sanitizeUser(user, ctx),\n });\n } else {\n const settings = await strapi\n .store({ type: 'plugin', name: 'users-permissions', key: 'advanced' })\n .get();\n\n ctx.redirect(settings.email_confirmation_redirection || '/');\n }\n },\n\n async sendEmailConfirmation(ctx) {\n const { email } = await validateSendEmailConfirmationBody(ctx.request.body);\n\n const user = await strapi.db.query('plugin::users-permissions.user').findOne({\n where: { email: email.toLowerCase() },\n });\n\n if (!user) {\n return ctx.send({ email, sent: true });\n }\n\n if (user.confirmed) {\n throw new ApplicationError('Already confirmed');\n }\n\n if (user.blocked) {\n throw new ApplicationError('User blocked');\n }\n\n await getService('user').sendConfirmationEmail(user);\n\n ctx.send({\n email: user.email,\n sent: true,\n });\n },\n});\n"],"names":["crypto","require$$0","_","require$$1","concat","compact","isArray","require$$2","utils","require$$3","getService","require$$4","validateCallbackBody","validateRegisterBody","validateSendEmailConfirmationBody","validateForgotPasswordBody","validateResetPasswordBody","validateEmailConfirmationBody","validateChangePasswordBody","require$$5","ApplicationError","ValidationError","ForbiddenError","errors","sanitizeUser","user","ctx","auth","state","userSchema","strapi","getModel","contentAPI","sanitize","output","callback","provider","params","request","body","store","type","name","grantSettings","get","key","grantProvider","identifier","db","query","findOne","where","$or","email","toLowerCase","username","password","validPassword","validatePassword","advancedSettings","requiresConfirmation","confirmed","blocked","send","jwt","issue","id","connect","error","message","changePassword","validations","config","currentPassword","edit","resetPassword","passwordConfirmation","code","resetPasswordToken","next","grant","require$$6","koa","providers","apiPrefix","grantConfig","defaults","prefix","requestPath","url","split","server","startsWith","log","warn","queryCustomCallback","dynamicSessionCallback","customCallback","undefined","validate","validateCallback","plugin","e","redirect_uri","buildRedirectUri","forgotPassword","pluginStore","emailSettings","ok","userInfo","randomBytes","toString","resetPasswordSettings","emailBody","template","URL","email_reset_password","SERVER_URL","ADMIN_URL","USER","TOKEN","emailObject","object","emailToSend","to","from","replyTo","response_email","subject","text","html","service","register","settings","allow_register","alwaysAllowedKeys","allowedKeys","allowedFields","invalidKeys","Object","keys","filter","includes","length","join","pick","role","default_role","identifierFilter","conflictingUserCount","count","unique_email","newUser","email_confirmation","add","sanitizedUser","sendConfirmationEmail","err","emailConfirmation","returnUser","confirmation","confirmationToken","userService","jwtService","fetchAll","filters","redirect","email_confirmation_redirection","sendEmailConfirmation","sent"],"mappings":";;;;;;;;;;;;;AAEA;;;;4CAOA,MAAMA,MAASC,GAAAA,UAAAA;AACf,IAAA,MAAMC,CAAIC,GAAAA,YAAAA;AACV,IAAA,MAAM,EAAEC,MAAM,EAAEC,OAAO,EAAEC,OAAO,EAAE,GAAGC,YAAAA;AACrC,IAAA,MAAMC,KAAQC,GAAAA,UAAAA;IACd,MAAM,EAAEC,UAAU,EAAE,GAAGC,YAAAA,EAAAA;AACvB,IAAA,MAAM,EACJC,oBAAoB,EACpBC,oBAAoB,EACpBC,iCAAiC,EACjCC,0BAA0B,EAC1BC,yBAAyB,EACzBC,6BAA6B,EAC7BC,0BAA0B,EAC3B,GAAGC,aAAAA,EAAAA;IAEJ,MAAM,EAAEC,gBAAgB,EAAEC,eAAe,EAAEC,cAAc,EAAE,GAAGd,KAAAA,CAAMe,MAAM;IAE1E,MAAMC,YAAAA,GAAe,CAACC,IAAMC,EAAAA,GAAAA,GAAAA;AAC1B,QAAA,MAAM,EAAEC,IAAI,EAAE,GAAGD,IAAIE,KAAK;QAC1B,MAAMC,UAAAA,GAAaC,MAAOC,CAAAA,QAAQ,CAAC,gCAAA,CAAA;QAEnC,OAAOD,MAAAA,CAAOE,UAAU,CAACC,QAAQ,CAACC,MAAM,CAACT,MAAMI,UAAY,EAAA;AAAEF,YAAAA;AAAI,SAAA,CAAA;AACnE,KAAA;AAEAA,IAAAA,IAAAA,GAAiB,CAAC,EAAEG,MAAAA,EAAAA,OAAM,EAAE,IAAM;AAChC,YAAA,MAAMK,UAAST,GAAG,EAAA;AAChB,gBAAA,MAAMU,QAAWV,GAAAA,GAAAA,CAAIW,MAAM,CAACD,QAAQ,IAAI,OAAA;AACxC,gBAAA,MAAMC,MAASX,GAAAA,GAAAA,CAAIY,OAAO,CAACC,IAAI;gBAE/B,MAAMC,KAAAA,GAAQV,OAAOU,CAAAA,KAAK,CAAC;oBAAEC,IAAM,EAAA,QAAA;oBAAUC,IAAM,EAAA;AAAmB,iBAAA,CAAA;AACtE,gBAAA,MAAMC,aAAgB,GAAA,MAAMH,KAAMI,CAAAA,GAAG,CAAC;oBAAEC,GAAK,EAAA;AAAO,iBAAA,CAAA;gBAEpD,MAAMC,aAAAA,GAAgBV,QAAa,KAAA,OAAA,GAAU,OAAUA,GAAAA,QAAAA;AAEvD,gBAAA,IAAI,CAAClC,CAAAA,CAAE0C,GAAG,CAACD,aAAe,EAAA;AAACG,oBAAAA,aAAAA;AAAe,oBAAA;iBAAU,CAAG,EAAA;AACrD,oBAAA,MAAM,IAAI1B,gBAAiB,CAAA,2BAAA,CAAA;AAC5B;AAED,gBAAA,IAAIgB,aAAa,OAAS,EAAA;AACxB,oBAAA,MAAMxB,oBAAqByB,CAAAA,MAAAA,CAAAA;oBAE3B,MAAM,EAAEU,UAAU,EAAE,GAAGV,MAAAA;;oBAGvB,MAAMZ,IAAAA,GAAO,MAAMK,OAAOkB,CAAAA,EAAE,CAACC,KAAK,CAAC,gCAAkCC,CAAAA,CAAAA,OAAO,CAAC;wBAC3EC,KAAO,EAAA;AACLf,4BAAAA,QAAAA;4BACAgB,GAAK,EAAA;AAAC,gCAAA;AAAEC,oCAAAA,KAAAA,EAAON,WAAWO,WAAW;;AAAM,gCAAA;oCAAEC,QAAUR,EAAAA;;AAAa;AACrE;AACT,qBAAA,CAAA;AAEM,oBAAA,IAAI,CAACtB,IAAM,EAAA;AACT,wBAAA,MAAM,IAAIJ,eAAgB,CAAA,gCAAA,CAAA;AAC3B;oBAED,IAAI,CAACI,IAAK+B,CAAAA,QAAQ,EAAE;AAClB,wBAAA,MAAM,IAAInC,eAAgB,CAAA,gCAAA,CAAA;AAC3B;oBAED,MAAMoC,aAAAA,GAAgB,MAAM/C,UAAAA,CAAW,MAAQgD,CAAAA,CAAAA,gBAAgB,CAC7DrB,MAAOmB,CAAAA,QAAQ,EACf/B,IAAAA,CAAK+B,QAAQ,CAAA;AAGf,oBAAA,IAAI,CAACC,aAAe,EAAA;AAClB,wBAAA,MAAM,IAAIpC,eAAgB,CAAA,gCAAA,CAAA;AAC3B;AAED,oBAAA,MAAMsC,gBAAmB,GAAA,MAAMnB,KAAMI,CAAAA,GAAG,CAAC;wBAAEC,GAAK,EAAA;AAAU,qBAAA,CAAA;AAC1D,oBAAA,MAAMe,oBAAuB1D,GAAAA,CAAAA,CAAE0C,GAAG,CAACe,gBAAkB,EAAA,oBAAA,CAAA;AAErD,oBAAA,IAAIC,oBAAwBnC,IAAAA,IAAAA,CAAKoC,SAAS,KAAK,IAAM,EAAA;AACnD,wBAAA,MAAM,IAAIzC,gBAAiB,CAAA,qCAAA,CAAA;AAC5B;oBAED,IAAIK,IAAAA,CAAKqC,OAAO,KAAK,IAAM,EAAA;AACzB,wBAAA,MAAM,IAAI1C,gBAAiB,CAAA,mDAAA,CAAA;AAC5B;oBAED,OAAOM,GAAAA,CAAIqC,IAAI,CAAC;wBACdC,GAAKtD,EAAAA,UAAAA,CAAW,KAAOuD,CAAAA,CAAAA,KAAK,CAAC;AAAEC,4BAAAA,EAAAA,EAAIzC,KAAKyC;;wBACxCzC,IAAM,EAAA,MAAMD,aAAaC,IAAMC,EAAAA,GAAAA;AACvC,qBAAA,CAAA;AACK;;gBAGD,IAAI;oBACF,MAAMD,IAAAA,GAAO,MAAMf,UAAW,CAAA,WAAA,CAAA,CAAayD,OAAO,CAAC/B,QAAAA,EAAUV,IAAIuB,KAAK,CAAA;oBAEtE,IAAIxB,IAAAA,CAAKqC,OAAO,EAAE;AAChB,wBAAA,MAAM,IAAIxC,cAAe,CAAA,mDAAA,CAAA;AAC1B;oBAED,OAAOI,GAAAA,CAAIqC,IAAI,CAAC;wBACdC,GAAKtD,EAAAA,UAAAA,CAAW,KAAOuD,CAAAA,CAAAA,KAAK,CAAC;AAAEC,4BAAAA,EAAAA,EAAIzC,KAAKyC;;wBACxCzC,IAAM,EAAA,MAAMD,aAAaC,IAAMC,EAAAA,GAAAA;AACvC,qBAAA,CAAA;AACK,iBAAA,CAAC,OAAO0C,KAAO,EAAA;oBACd,MAAM,IAAIhD,gBAAiBgD,CAAAA,KAAAA,CAAMC,OAAO,CAAA;AACzC;AACF,aAAA;AAED,YAAA,MAAMC,gBAAe5C,GAAG,EAAA;AACtB,gBAAA,IAAI,CAACA,GAAAA,CAAIE,KAAK,CAACH,IAAI,EAAE;AACnB,oBAAA,MAAM,IAAIL,gBAAiB,CAAA,kDAAA,CAAA;AAC5B;AAED,gBAAA,MAAMmD,WAAczC,GAAAA,OAAAA,CAAO0C,MAAM,CAAC5B,GAAG,CAAC,2CAAA,CAAA;AAEtC,gBAAA,MAAM,EAAE6B,eAAe,EAAEjB,QAAQ,EAAE,GAAG,MAAMtC,0BAAAA,CAC1CQ,GAAIY,CAAAA,OAAO,CAACC,IAAI,EAChBgC,WAAAA,CAAAA;gBAGF,MAAM9C,IAAAA,GAAO,MAAMK,OAAOkB,CAAAA,EAAE,CACzBC,KAAK,CAAC,gCACNC,CAAAA,CAAAA,OAAO,CAAC;oBAAEC,KAAO,EAAA;AAAEe,wBAAAA,EAAAA,EAAIxC,GAAIE,CAAAA,KAAK,CAACH,IAAI,CAACyC;AAAI;AAAA,iBAAA,CAAA;gBAE7C,MAAMT,aAAAA,GAAgB,MAAM/C,UAAW,CAAA,MAAA,CAAA,CAAQgD,gBAAgB,CAACe,eAAAA,EAAiBhD,KAAK+B,QAAQ,CAAA;AAE9F,gBAAA,IAAI,CAACC,aAAe,EAAA;AAClB,oBAAA,MAAM,IAAIpC,eAAgB,CAAA,0CAAA,CAAA;AAC3B;AAED,gBAAA,IAAIoD,oBAAoBjB,QAAU,EAAA;AAChC,oBAAA,MAAM,IAAInC,eAAgB,CAAA,gEAAA,CAAA;AAC3B;AAED,gBAAA,MAAMX,WAAW,MAAQgE,CAAAA,CAAAA,IAAI,CAACjD,IAAAA,CAAKyC,EAAE,EAAE;AAAEV,oBAAAA;AAAQ,iBAAA,CAAA;AAEjD9B,gBAAAA,GAAAA,CAAIqC,IAAI,CAAC;oBACPC,GAAKtD,EAAAA,UAAAA,CAAW,KAAOuD,CAAAA,CAAAA,KAAK,CAAC;AAAEC,wBAAAA,EAAAA,EAAIzC,KAAKyC;;oBACxCzC,IAAM,EAAA,MAAMD,aAAaC,IAAMC,EAAAA,GAAAA;AACrC,iBAAA,CAAA;AACG,aAAA;AAED,YAAA,MAAMiD,eAAcjD,GAAG,EAAA;AACrB,gBAAA,MAAM6C,WAAczC,GAAAA,OAAAA,CAAO0C,MAAM,CAAC5B,GAAG,CAAC,2CAAA,CAAA;AAEtC,gBAAA,MAAM,EAAEY,QAAQ,EAAEoB,oBAAoB,EAAEC,IAAI,EAAE,GAAG,MAAM7D,yBACrDU,CAAAA,GAAAA,CAAIY,OAAO,CAACC,IAAI,EAChBgC,WAAAA,CAAAA;AAGF,gBAAA,IAAIf,aAAaoB,oBAAsB,EAAA;AACrC,oBAAA,MAAM,IAAIvD,eAAgB,CAAA,wBAAA,CAAA;AAC3B;gBAED,MAAMI,IAAAA,GAAO,MAAMK,OAAOkB,CAAAA,EAAE,CACzBC,KAAK,CAAC,gCACNC,CAAAA,CAAAA,OAAO,CAAC;oBAAEC,KAAO,EAAA;wBAAE2B,kBAAoBD,EAAAA;AAAI;AAAI,iBAAA,CAAA;AAElD,gBAAA,IAAI,CAACpD,IAAM,EAAA;AACT,oBAAA,MAAM,IAAIJ,eAAgB,CAAA,yBAAA,CAAA;AAC3B;AAED,gBAAA,MAAMX,WAAW,MAAQgE,CAAAA,CAAAA,IAAI,CAACjD,IAAAA,CAAKyC,EAAE,EAAE;oBACrCY,kBAAoB,EAAA,IAAA;AACpBtB,oBAAAA;AACN,iBAAA,CAAA;;AAGI9B,gBAAAA,GAAAA,CAAIqC,IAAI,CAAC;oBACPC,GAAKtD,EAAAA,UAAAA,CAAW,KAAOuD,CAAAA,CAAAA,KAAK,CAAC;AAAEC,wBAAAA,EAAAA,EAAIzC,KAAKyC;;oBACxCzC,IAAM,EAAA,MAAMD,aAAaC,IAAMC,EAAAA,GAAAA;AACrC,iBAAA,CAAA;AACG,aAAA;YAED,MAAMyC,OAAAA,CAAAA,CAAQzC,GAAG,EAAEqD,IAAI,EAAA;gBACrB,MAAMC,KAAAA,GAAQC,WAAiBC,GAAG,EAAA;AAElC,gBAAA,MAAMC,SAAY,GAAA,MAAMrD,OACrBU,CAAAA,KAAK,CAAC;oBAAEC,IAAM,EAAA,QAAA;oBAAUC,IAAM,EAAA,mBAAA;oBAAqBG,GAAK,EAAA;mBACxDD,GAAG,EAAA;AAEN,gBAAA,MAAMwC,SAAYtD,GAAAA,OAAAA,CAAO0C,MAAM,CAAC5B,GAAG,CAAC,iBAAA,CAAA;AACpC,gBAAA,MAAMyC,WAAc,GAAA;oBAClBC,QAAU,EAAA;AACRC,wBAAAA,MAAAA,EAAQ,CAAC,EAAEH,SAAU,CAAA,QAAQ;AAC9B,qBAAA;AACD,oBAAA,GAAGD;AACT,iBAAA;gBAEI,MAAM,CAACK,YAAY,GAAG9D,GAAAA,CAAIY,OAAO,CAACmD,GAAG,CAACC,KAAK,CAAC,GAAA,CAAA;AAC5C,gBAAA,MAAMtD,QAAWoD,GAAAA,WAAAA,CAAYE,KAAK,CAAC,WAAY,CAAA,CAAC,CAAE,CAAA,CAACA,KAAK,CAAC,GAAI,CAAA,CAAC,CAAE,CAAA;gBAEhE,IAAI,CAACxF,EAAE0C,GAAG,CAACyC,WAAW,CAACjD,QAAAA,CAAS,EAAE,SAAY,CAAA,EAAA;AAC5C,oBAAA,MAAM,IAAIhB,gBAAiB,CAAA,2BAAA,CAAA;AAC5B;gBAED,IAAI,CAACU,OAAO0C,CAAAA,MAAM,CAACmB,MAAM,CAACF,GAAG,CAACG,UAAU,CAAC,MAAS,CAAA,EAAA;oBAChD9D,OAAO+D,CAAAA,GAAG,CAACC,IAAI,CACb,6NAAA,CAAA;AAEH;;AAGD,gBAAA,MAAMC,mBAAsB7F,GAAAA,CAAAA,CAAE0C,GAAG,CAAClB,GAAK,EAAA,gBAAA,CAAA;AACvC,gBAAA,MAAMsE,sBAAyB9F,GAAAA,CAAAA,CAAE0C,GAAG,CAAClB,GAAK,EAAA,gCAAA,CAAA;AAE1C,gBAAA,MAAMuE,iBAAiBF,mBAAuBC,IAAAA,sBAAAA;;AAG9C,gBAAA,IAAIC,mBAAmBC,SAAW,EAAA;oBAChC,IAAI;;wBAEF,MAAM,EAAEC,QAAUC,EAAAA,gBAAgB,EAAE,GAAGtE,QACpCuE,MAAM,CAAC,mBACP7B,CAAAA,CAAAA,MAAM,CAAC,UAAA,CAAA;AAEV,wBAAA,MAAM4B,gBAAiBH,CAAAA,cAAAA,EAAgBZ,WAAW,CAACjD,QAAS,CAAA,CAAA;AAE5DiD,wBAAAA,WAAW,CAACjD,QAAAA,CAAS,CAACD,QAAQ,GAAG8D,cAAAA;AAClC,qBAAA,CAAC,OAAOK,CAAG,EAAA;wBACV,MAAM,IAAIjF,gBAAgB,+BAAiC,EAAA;4BAAEc,QAAU8D,EAAAA;AAAgB,yBAAA,CAAA;AACxF;AACF;;gBAGDZ,WAAW,CAACjD,SAAS,CAACmE,YAAY,GAAG7F,UAAW,CAAA,WAAA,CAAA,CAAa8F,gBAAgB,CAACpE,QAAAA,CAAAA;gBAE9E,OAAO4C,KAAAA,CAAMK,aAAa3D,GAAKqD,EAAAA,IAAAA,CAAAA;AAChC,aAAA;AAED,YAAA,MAAM0B,gBAAe/E,GAAG,EAAA;gBACtB,MAAM,EAAE2B,KAAK,EAAE,GAAG,MAAMtC,0BAA2BW,CAAAA,GAAAA,CAAIY,OAAO,CAACC,IAAI,CAAA;AAEnE,gBAAA,MAAMmE,WAAc,GAAA,MAAM5E,OAAOU,CAAAA,KAAK,CAAC;oBAAEC,IAAM,EAAA,QAAA;oBAAUC,IAAM,EAAA;AAAmB,iBAAA,CAAA;AAElF,gBAAA,MAAMiE,aAAgB,GAAA,MAAMD,WAAY9D,CAAAA,GAAG,CAAC;oBAAEC,GAAK,EAAA;AAAO,iBAAA,CAAA;AAC1D,gBAAA,MAAMc,gBAAmB,GAAA,MAAM+C,WAAY9D,CAAAA,GAAG,CAAC;oBAAEC,GAAK,EAAA;AAAU,iBAAA,CAAA;;gBAGhE,MAAMpB,IAAAA,GAAO,MAAMK,OAAOkB,CAAAA,EAAE,CACzBC,KAAK,CAAC,gCACNC,CAAAA,CAAAA,OAAO,CAAC;oBAAEC,KAAO,EAAA;AAAEE,wBAAAA,KAAAA,EAAOA,MAAMC,WAAW;AAAI;AAAA,iBAAA,CAAA;AAElD,gBAAA,IAAI,CAAC7B,IAAAA,IAAQA,IAAKqC,CAAAA,OAAO,EAAE;oBACzB,OAAOpC,GAAAA,CAAIqC,IAAI,CAAC;wBAAE6C,EAAI,EAAA;AAAM,qBAAA,CAAA;AAC7B;;gBAGD,MAAMC,QAAAA,GAAW,MAAMrF,YAAAA,CAAaC,IAAMC,EAAAA,GAAAA,CAAAA;AAE1C,gBAAA,MAAMoD,qBAAqB9E,MAAO8G,CAAAA,WAAW,CAAC,EAAA,CAAA,CAAIC,QAAQ,CAAC,KAAA,CAAA;AAE3D,gBAAA,MAAMC,wBAAwB9G,CAAE0C,CAAAA,GAAG,CAAC+D,aAAAA,EAAe,0BAA0B,EAAA,CAAA;gBAC7E,MAAMM,SAAAA,GAAY,MAAMvG,UAAW,CAAA,mBAAA,CAAA,CAAqBwG,QAAQ,CAC9DF,qBAAAA,CAAsB3C,OAAO,EAC7B;AACE8C,oBAAAA,GAAAA,EAAKxD,iBAAiByD,oBAAoB;AAC1CC,oBAAAA,UAAAA,EAAYvF,OAAO0C,CAAAA,MAAM,CAAC5B,GAAG,CAAC,oBAAA,CAAA;AAC9B0E,oBAAAA,SAAAA,EAAWxF,OAAO0C,CAAAA,MAAM,CAAC5B,GAAG,CAAC,mBAAA,CAAA;oBAC7B2E,IAAMV,EAAAA,QAAAA;oBACNW,KAAO1C,EAAAA;AACR,iBAAA,CAAA;gBAGH,MAAM2C,WAAAA,GAAc,MAAM/G,UAAW,CAAA,mBAAA,CAAA,CAAqBwG,QAAQ,CAChEF,qBAAAA,CAAsBU,MAAM,EAC5B;oBACEH,IAAMV,EAAAA;AACP,iBAAA,CAAA;AAGH,gBAAA,MAAMc,WAAc,GAAA;AAClBC,oBAAAA,EAAAA,EAAInG,KAAK4B,KAAK;oBACdwE,IACEb,EAAAA,qBAAAA,CAAsBa,IAAI,CAACxE,KAAK,IAAI2D,qBAAsBa,CAAAA,IAAI,CAACnF,IAAI,GAC/D,CAAC,EAAEsE,qBAAAA,CAAsBa,IAAI,CAACnF,IAAI,CAAC,EAAE,EAAEsE,qBAAAA,CAAsBa,IAAI,CAACxE,KAAK,CAAC,CAAC,CAAC,GAC1E6C,SAAAA;AACN4B,oBAAAA,OAAAA,EAASd,sBAAsBe,cAAc;oBAC7CC,OAASP,EAAAA,WAAAA;oBACTQ,IAAMhB,EAAAA,SAAAA;oBACNiB,IAAMjB,EAAAA;AACZ,iBAAA;;AAGI,gBAAA,MAAMvG,WAAW,MAAQgE,CAAAA,CAAAA,IAAI,CAACjD,IAAAA,CAAKyC,EAAE,EAAE;AAAEY,oBAAAA;AAAkB,iBAAA,CAAA;;gBAG3D,MAAMhD,OAAAA,CAAOuE,MAAM,CAAC,OAAA,CAAA,CAAS8B,OAAO,CAAC,OAAA,CAAA,CAASpE,IAAI,CAAC4D,WAAAA,CAAAA;AAEnDjG,gBAAAA,GAAAA,CAAIqC,IAAI,CAAC;oBAAE6C,EAAI,EAAA;AAAM,iBAAA,CAAA;AACtB,aAAA;AAED,YAAA,MAAMwB,UAAS1G,GAAG,EAAA;AAChB,gBAAA,MAAMgF,WAAc,GAAA,MAAM5E,OAAOU,CAAAA,KAAK,CAAC;oBAAEC,IAAM,EAAA,QAAA;oBAAUC,IAAM,EAAA;AAAmB,iBAAA,CAAA;AAElF,gBAAA,MAAM2F,QAAW,GAAA,MAAM3B,WAAY9D,CAAAA,GAAG,CAAC;oBAAEC,GAAK,EAAA;AAAU,iBAAA,CAAA;gBAExD,IAAI,CAACwF,QAASC,CAAAA,cAAc,EAAE;AAC5B,oBAAA,MAAM,IAAIlH,gBAAiB,CAAA,uCAAA,CAAA;AAC5B;gBAED,MAAM,EAAEgH,QAAQ,EAAE,GAAGtG,QAAO0C,MAAM,CAAC5B,GAAG,CAAC,2BAAA,CAAA;AACvC,gBAAA,MAAM2F,iBAAoB,GAAA;AAAC,oBAAA,UAAA;AAAY,oBAAA,UAAA;AAAY,oBAAA;AAAQ,iBAAA;;gBAG3D,MAAMC,WAAAA,GAAcnI,OAClBD,CAAAA,MAAAA,CAAOmI,iBAAmBjI,EAAAA,OAAAA,CAAQ8H,UAAUK,aAAiBL,CAAAA,GAAAA,QAAAA,CAASK,aAAa,GAAG,EAAE,CAAA,CAAA;;AAI1F,gBAAA,MAAMC,cAAcC,MAAOC,CAAAA,IAAI,CAAClH,GAAAA,CAAIY,OAAO,CAACC,IAAI,CAAEsG,CAAAA,MAAM,CAAC,CAAChG,GAAAA,GAAQ,CAAC2F,WAAAA,CAAYM,QAAQ,CAACjG,GAAAA,CAAAA,CAAAA;gBAExF,IAAI6F,WAAAA,CAAYK,MAAM,GAAG,CAAG,EAAA;;oBAE1B,MAAM,IAAI1H,gBAAgB,CAAC,oBAAoB,EAAEqH,WAAYM,CAAAA,IAAI,CAAC,IAAA,CAAA,CAAM,CAAC,CAAA;AAC1E;AAED,gBAAA,MAAM3G,MAAS,GAAA;oBACb,GAAGnC,CAAAA,CAAE+I,IAAI,CAACvH,GAAAA,CAAIY,OAAO,CAACC,IAAI,EAAEiG,WAAY,CAAA;oBACxCpG,QAAU,EAAA;AAChB,iBAAA;AAEI,gBAAA,MAAMmC,WAAczC,GAAAA,OAAAA,CAAO0C,MAAM,CAAC5B,GAAG,CAAC,2CAAA,CAAA;AAEtC,gBAAA,MAAM/B,qBAAqBwB,MAAQkC,EAAAA,WAAAA,CAAAA;gBAEnC,MAAM2E,IAAAA,GAAO,MAAMpH,OAAOkB,CAAAA,EAAE,CACzBC,KAAK,CAAC,gCACNC,CAAAA,CAAAA,OAAO,CAAC;oBAAEC,KAAO,EAAA;AAAEV,wBAAAA,IAAAA,EAAM4F,SAASc;AAAc;AAAA,iBAAA,CAAA;AAEnD,gBAAA,IAAI,CAACD,IAAM,EAAA;AACT,oBAAA,MAAM,IAAI9H,gBAAiB,CAAA,qCAAA,CAAA;AAC5B;AAED,gBAAA,MAAM,EAAEiC,KAAK,EAAEE,QAAQ,EAAEnB,QAAQ,EAAE,GAAGC,MAAAA;AAEtC,gBAAA,MAAM+G,gBAAmB,GAAA;oBACvBhG,GAAK,EAAA;AACH,wBAAA;AAAEC,4BAAAA,KAAAA,EAAOA,MAAMC,WAAW;AAAI,yBAAA;AAC9B,wBAAA;AAAEC,4BAAAA,QAAAA,EAAUF,MAAMC,WAAW;AAAI,yBAAA;AACjC,wBAAA;AAAEC,4BAAAA;AAAU,yBAAA;AACZ,wBAAA;4BAAEF,KAAOE,EAAAA;AAAU;AACpB;AACP,iBAAA;gBAEI,MAAM8F,oBAAAA,GAAuB,MAAMvH,OAAOkB,CAAAA,EAAE,CAACC,KAAK,CAAC,gCAAkCqG,CAAAA,CAAAA,KAAK,CAAC;oBACzFnG,KAAO,EAAA;AAAE,wBAAA,GAAGiG,gBAAgB;AAAEhH,wBAAAA;AAAU;AAC9C,iBAAA,CAAA;AAEI,gBAAA,IAAIiH,uBAAuB,CAAG,EAAA;AAC5B,oBAAA,MAAM,IAAIjI,gBAAiB,CAAA,qCAAA,CAAA;AAC5B;gBAED,IAAIiH,QAAAA,CAASkB,YAAY,EAAE;oBACzB,MAAMF,oBAAAA,GAAuB,MAAMvH,OAAOkB,CAAAA,EAAE,CAACC,KAAK,CAAC,gCAAkCqG,CAAAA,CAAAA,KAAK,CAAC;wBACzFnG,KAAO,EAAA;AAAE,4BAAA,GAAGiG;AAAkB;AACtC,qBAAA,CAAA;AAEM,oBAAA,IAAIC,uBAAuB,CAAG,EAAA;AAC5B,wBAAA,MAAM,IAAIjI,gBAAiB,CAAA,qCAAA,CAAA;AAC5B;AACF;AAED,gBAAA,MAAMoI,OAAU,GAAA;AACd,oBAAA,GAAGnH,MAAM;AACT6G,oBAAAA,IAAAA,EAAMA,KAAKhF,EAAE;AACbb,oBAAAA,KAAAA,EAAOA,MAAMC,WAAW,EAAA;AACxBC,oBAAAA,QAAAA;oBACAM,SAAW,EAAA,CAACwE,SAASoB;AAC3B,iBAAA;AAEI,gBAAA,MAAMhI,IAAO,GAAA,MAAMf,UAAW,CAAA,MAAA,CAAA,CAAQgJ,GAAG,CAACF,OAAAA,CAAAA;gBAE1C,MAAMG,aAAAA,GAAgB,MAAMnI,YAAAA,CAAaC,IAAMC,EAAAA,GAAAA,CAAAA;gBAE/C,IAAI2G,QAAAA,CAASoB,kBAAkB,EAAE;oBAC/B,IAAI;wBACF,MAAM/I,UAAAA,CAAW,MAAQkJ,CAAAA,CAAAA,qBAAqB,CAACD,aAAAA,CAAAA;AAChD,qBAAA,CAAC,OAAOE,GAAK,EAAA;wBACZ/H,OAAO+D,CAAAA,GAAG,CAACzB,KAAK,CAACyF,GAAAA,CAAAA;AACjB,wBAAA,MAAM,IAAIzI,gBAAiB,CAAA,kCAAA,CAAA;AAC5B;oBAED,OAAOM,GAAAA,CAAIqC,IAAI,CAAC;wBAAEtC,IAAMkI,EAAAA;AAAe,qBAAA,CAAA;AACxC;gBAED,MAAM3F,GAAAA,GAAMtD,WAAW,KAAOuD,CAAAA,CAAAA,KAAK,CAAC/D,CAAE+I,CAAAA,IAAI,CAACxH,IAAM,EAAA;AAAC,oBAAA;AAAK,iBAAA,CAAA,CAAA;gBAEvD,OAAOC,GAAAA,CAAIqC,IAAI,CAAC;AACdC,oBAAAA,GAAAA;oBACAvC,IAAMkI,EAAAA;AACZ,iBAAA,CAAA;AACG,aAAA;AAED,YAAA,MAAMG,iBAAkBpI,CAAAA,CAAAA,GAAG,EAAEqD,IAAI,EAAEgF,UAAU,EAAA;gBAC3C,MAAM,EAAEC,cAAcC,iBAAiB,EAAE,GAAG,MAAMhJ,6BAAAA,CAA8BS,IAAIuB,KAAK,CAAA;AAEzF,gBAAA,MAAMiH,cAAcxJ,UAAW,CAAA,MAAA,CAAA;AAC/B,gBAAA,MAAMyJ,aAAazJ,UAAW,CAAA,KAAA,CAAA;AAE9B,gBAAA,MAAM,CAACe,IAAK,CAAA,GAAG,MAAMyI,WAAAA,CAAYE,QAAQ,CAAC;oBAAEC,OAAS,EAAA;AAAEJ,wBAAAA;AAAmB;AAAA,iBAAA,CAAA;AAE1E,gBAAA,IAAI,CAACxI,IAAM,EAAA;AACT,oBAAA,MAAM,IAAIJ,eAAgB,CAAA,eAAA,CAAA;AAC3B;AAED,gBAAA,MAAM6I,WAAYxF,CAAAA,IAAI,CAACjD,IAAAA,CAAKyC,EAAE,EAAE;oBAAEL,SAAW,EAAA,IAAA;oBAAMoG,iBAAmB,EAAA;AAAI,iBAAA,CAAA;AAE1E,gBAAA,IAAIF,UAAY,EAAA;AACdrI,oBAAAA,GAAAA,CAAIqC,IAAI,CAAC;wBACPC,GAAKmG,EAAAA,UAAAA,CAAWlG,KAAK,CAAC;AAAEC,4BAAAA,EAAAA,EAAIzC,KAAKyC;;wBACjCzC,IAAM,EAAA,MAAMD,aAAaC,IAAMC,EAAAA,GAAAA;AACvC,qBAAA,CAAA;iBACW,MAAA;AACL,oBAAA,MAAM2G,QAAW,GAAA,MAAMvG,OACpBU,CAAAA,KAAK,CAAC;wBAAEC,IAAM,EAAA,QAAA;wBAAUC,IAAM,EAAA,mBAAA;wBAAqBG,GAAK,EAAA;uBACxDD,GAAG,EAAA;AAENlB,oBAAAA,GAAAA,CAAI4I,QAAQ,CAACjC,QAASkC,CAAAA,8BAA8B,IAAI,GAAA,CAAA;AACzD;AACF,aAAA;AAED,YAAA,MAAMC,uBAAsB9I,GAAG,EAAA;gBAC7B,MAAM,EAAE2B,KAAK,EAAE,GAAG,MAAMvC,iCAAkCY,CAAAA,GAAAA,CAAIY,OAAO,CAACC,IAAI,CAAA;gBAE1E,MAAMd,IAAAA,GAAO,MAAMK,OAAOkB,CAAAA,EAAE,CAACC,KAAK,CAAC,gCAAkCC,CAAAA,CAAAA,OAAO,CAAC;oBAC3EC,KAAO,EAAA;AAAEE,wBAAAA,KAAAA,EAAOA,MAAMC,WAAW;AAAI;AAC3C,iBAAA,CAAA;AAEI,gBAAA,IAAI,CAAC7B,IAAM,EAAA;oBACT,OAAOC,GAAAA,CAAIqC,IAAI,CAAC;AAAEV,wBAAAA,KAAAA;wBAAOoH,IAAM,EAAA;AAAI,qBAAA,CAAA;AACpC;gBAED,IAAIhJ,IAAAA,CAAKoC,SAAS,EAAE;AAClB,oBAAA,MAAM,IAAIzC,gBAAiB,CAAA,mBAAA,CAAA;AAC5B;gBAED,IAAIK,IAAAA,CAAKqC,OAAO,EAAE;AAChB,oBAAA,MAAM,IAAI1C,gBAAiB,CAAA,cAAA,CAAA;AAC5B;gBAED,MAAMV,UAAAA,CAAW,MAAQkJ,CAAAA,CAAAA,qBAAqB,CAACnI,IAAAA,CAAAA;AAE/CC,gBAAAA,GAAAA,CAAIqC,IAAI,CAAC;AACPV,oBAAAA,KAAAA,EAAO5B,KAAK4B,KAAK;oBACjBoH,IAAM,EAAA;AACZ,iBAAA,CAAA;AACG;SACH,CAAA;;;;;;"}
|
|
@@ -0,0 +1,168 @@
|
|
|
1
|
+
'use strict';
|
|
2
|
+
|
|
3
|
+
var require$$0 = require('lodash');
|
|
4
|
+
var require$$1 = require('@strapi/utils');
|
|
5
|
+
var user = require('./validation/user.js');
|
|
6
|
+
|
|
7
|
+
var contentManagerUser;
|
|
8
|
+
var hasRequiredContentManagerUser;
|
|
9
|
+
function requireContentManagerUser() {
|
|
10
|
+
if (hasRequiredContentManagerUser) return contentManagerUser;
|
|
11
|
+
hasRequiredContentManagerUser = 1;
|
|
12
|
+
const _ = require$$0;
|
|
13
|
+
const { contentTypes: contentTypesUtils } = require$$1;
|
|
14
|
+
const { ApplicationError, ValidationError, NotFoundError, ForbiddenError } = require$$1.errors;
|
|
15
|
+
const { validateCreateUserBody, validateUpdateUserBody } = user.__require();
|
|
16
|
+
const { UPDATED_BY_ATTRIBUTE, CREATED_BY_ATTRIBUTE } = contentTypesUtils.constants;
|
|
17
|
+
const userModel = 'plugin::users-permissions.user';
|
|
18
|
+
const ACTIONS = {
|
|
19
|
+
read: 'plugin::content-manager.explorer.read',
|
|
20
|
+
create: 'plugin::content-manager.explorer.create',
|
|
21
|
+
edit: 'plugin::content-manager.explorer.update',
|
|
22
|
+
delete: 'plugin::content-manager.explorer.delete'
|
|
23
|
+
};
|
|
24
|
+
const findEntityAndCheckPermissions = async (ability, action, model, id)=>{
|
|
25
|
+
const doc = await strapi.service('plugin::content-manager.document-manager').findOne(id, model, {
|
|
26
|
+
populate: [
|
|
27
|
+
`${CREATED_BY_ATTRIBUTE}.roles`
|
|
28
|
+
]
|
|
29
|
+
});
|
|
30
|
+
if (_.isNil(doc)) {
|
|
31
|
+
throw new NotFoundError();
|
|
32
|
+
}
|
|
33
|
+
const pm = strapi.service('admin::permission').createPermissionsManager({
|
|
34
|
+
ability,
|
|
35
|
+
action,
|
|
36
|
+
model
|
|
37
|
+
});
|
|
38
|
+
if (pm.ability.cannot(pm.action, pm.toSubject(doc))) {
|
|
39
|
+
throw new ForbiddenError();
|
|
40
|
+
}
|
|
41
|
+
const docWithoutCreatorRoles = _.omit(doc, `${CREATED_BY_ATTRIBUTE}.roles`);
|
|
42
|
+
return {
|
|
43
|
+
pm,
|
|
44
|
+
doc: docWithoutCreatorRoles
|
|
45
|
+
};
|
|
46
|
+
};
|
|
47
|
+
contentManagerUser = {
|
|
48
|
+
/**
|
|
49
|
+
* Create a/an user record.
|
|
50
|
+
* @return {Object}
|
|
51
|
+
*/ async create (ctx) {
|
|
52
|
+
const { body } = ctx.request;
|
|
53
|
+
const { user: admin, userAbility } = ctx.state;
|
|
54
|
+
const { email, username } = body;
|
|
55
|
+
const pm = strapi.service('admin::permission').createPermissionsManager({
|
|
56
|
+
ability: userAbility,
|
|
57
|
+
action: ACTIONS.create,
|
|
58
|
+
model: userModel
|
|
59
|
+
});
|
|
60
|
+
if (!pm.isAllowed) {
|
|
61
|
+
return ctx.forbidden();
|
|
62
|
+
}
|
|
63
|
+
const sanitizedBody = await pm.pickPermittedFieldsOf(body, {
|
|
64
|
+
subject: userModel
|
|
65
|
+
});
|
|
66
|
+
const advanced = await strapi.store({
|
|
67
|
+
type: 'plugin',
|
|
68
|
+
name: 'users-permissions',
|
|
69
|
+
key: 'advanced'
|
|
70
|
+
}).get();
|
|
71
|
+
await validateCreateUserBody(ctx.request.body);
|
|
72
|
+
const userWithSameUsername = await strapi.db.query('plugin::users-permissions.user').findOne({
|
|
73
|
+
where: {
|
|
74
|
+
username
|
|
75
|
+
}
|
|
76
|
+
});
|
|
77
|
+
if (userWithSameUsername) {
|
|
78
|
+
throw new ApplicationError('Username already taken');
|
|
79
|
+
}
|
|
80
|
+
if (advanced.unique_email) {
|
|
81
|
+
const userWithSameEmail = await strapi.db.query('plugin::users-permissions.user').findOne({
|
|
82
|
+
where: {
|
|
83
|
+
email: email.toLowerCase()
|
|
84
|
+
}
|
|
85
|
+
});
|
|
86
|
+
if (userWithSameEmail) {
|
|
87
|
+
throw new ApplicationError('Email already taken');
|
|
88
|
+
}
|
|
89
|
+
}
|
|
90
|
+
const user = {
|
|
91
|
+
...sanitizedBody,
|
|
92
|
+
provider: 'local',
|
|
93
|
+
[CREATED_BY_ATTRIBUTE]: admin.id,
|
|
94
|
+
[UPDATED_BY_ATTRIBUTE]: admin.id
|
|
95
|
+
};
|
|
96
|
+
user.email = _.toLower(user.email);
|
|
97
|
+
try {
|
|
98
|
+
const data = await strapi.service('plugin::content-manager.document-manager').create(userModel, {
|
|
99
|
+
data: user
|
|
100
|
+
});
|
|
101
|
+
const sanitizedData = await pm.sanitizeOutput(data, {
|
|
102
|
+
action: ACTIONS.read
|
|
103
|
+
});
|
|
104
|
+
ctx.created(sanitizedData);
|
|
105
|
+
} catch (error) {
|
|
106
|
+
throw new ApplicationError(error.message);
|
|
107
|
+
}
|
|
108
|
+
},
|
|
109
|
+
/**
|
|
110
|
+
* Update a/an user record.
|
|
111
|
+
* @return {Object}
|
|
112
|
+
*/ async update (ctx) {
|
|
113
|
+
const { id: documentId } = ctx.params;
|
|
114
|
+
const { body } = ctx.request;
|
|
115
|
+
const { user: admin, userAbility } = ctx.state;
|
|
116
|
+
const advancedConfigs = await strapi.store({
|
|
117
|
+
type: 'plugin',
|
|
118
|
+
name: 'users-permissions',
|
|
119
|
+
key: 'advanced'
|
|
120
|
+
}).get();
|
|
121
|
+
const { email, username, password } = body;
|
|
122
|
+
const { pm, doc } = await findEntityAndCheckPermissions(userAbility, ACTIONS.edit, userModel, documentId);
|
|
123
|
+
const user = doc;
|
|
124
|
+
await validateUpdateUserBody(ctx.request.body);
|
|
125
|
+
if (_.has(body, 'password') && !password && user.provider === 'local') {
|
|
126
|
+
throw new ValidationError('password.notNull');
|
|
127
|
+
}
|
|
128
|
+
if (_.has(body, 'username')) {
|
|
129
|
+
const userWithSameUsername = await strapi.db.query('plugin::users-permissions.user').findOne({
|
|
130
|
+
where: {
|
|
131
|
+
username
|
|
132
|
+
}
|
|
133
|
+
});
|
|
134
|
+
if (userWithSameUsername && _.toString(userWithSameUsername.id) !== _.toString(user.id)) {
|
|
135
|
+
throw new ApplicationError('Username already taken');
|
|
136
|
+
}
|
|
137
|
+
}
|
|
138
|
+
if (_.has(body, 'email') && advancedConfigs.unique_email) {
|
|
139
|
+
const userWithSameEmail = await strapi.db.query('plugin::users-permissions.user').findOne({
|
|
140
|
+
where: {
|
|
141
|
+
email: _.toLower(email)
|
|
142
|
+
}
|
|
143
|
+
});
|
|
144
|
+
if (userWithSameEmail && _.toString(userWithSameEmail.id) !== _.toString(user.id)) {
|
|
145
|
+
throw new ApplicationError('Email already taken');
|
|
146
|
+
}
|
|
147
|
+
body.email = _.toLower(body.email);
|
|
148
|
+
}
|
|
149
|
+
const sanitizedData = await pm.pickPermittedFieldsOf(body, {
|
|
150
|
+
subject: pm.toSubject(user)
|
|
151
|
+
});
|
|
152
|
+
const updateData = _.omit({
|
|
153
|
+
...sanitizedData,
|
|
154
|
+
updatedBy: admin.id
|
|
155
|
+
}, 'createdBy');
|
|
156
|
+
const data = await strapi.service('plugin::content-manager.document-manager').update(documentId, userModel, {
|
|
157
|
+
data: updateData
|
|
158
|
+
});
|
|
159
|
+
ctx.body = await pm.sanitizeOutput(data, {
|
|
160
|
+
action: ACTIONS.read
|
|
161
|
+
});
|
|
162
|
+
}
|
|
163
|
+
};
|
|
164
|
+
return contentManagerUser;
|
|
165
|
+
}
|
|
166
|
+
|
|
167
|
+
exports.__require = requireContentManagerUser;
|
|
168
|
+
//# sourceMappingURL=content-manager-user.js.map
|