@strapi/plugin-users-permissions 5.37.1 → 5.38.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/admin/components/BoundRoute/getMethodColor.js.map +1 -1
- package/dist/admin/components/BoundRoute/getMethodColor.mjs.map +1 -1
- package/dist/admin/components/BoundRoute/index.js.map +1 -1
- package/dist/admin/components/BoundRoute/index.mjs +1 -1
- package/dist/admin/components/BoundRoute/index.mjs.map +1 -1
- package/dist/admin/components/FormModal/Input/index.js.map +1 -1
- package/dist/admin/components/FormModal/Input/index.mjs.map +1 -1
- package/dist/admin/components/FormModal/index.js.map +1 -1
- package/dist/admin/components/FormModal/index.mjs.map +1 -1
- package/dist/admin/components/Permissions/PermissionRow/CheckboxWrapper.js.map +1 -1
- package/dist/admin/components/Permissions/PermissionRow/CheckboxWrapper.mjs +1 -1
- package/dist/admin/components/Permissions/PermissionRow/CheckboxWrapper.mjs.map +1 -1
- package/dist/admin/components/Permissions/PermissionRow/SubCategory.js.map +1 -1
- package/dist/admin/components/Permissions/PermissionRow/SubCategory.mjs.map +1 -1
- package/dist/admin/components/Permissions/PermissionRow/index.js.map +1 -1
- package/dist/admin/components/Permissions/PermissionRow/index.mjs.map +1 -1
- package/dist/admin/components/Permissions/index.js.map +1 -1
- package/dist/admin/components/Permissions/index.mjs.map +1 -1
- package/dist/admin/components/Permissions/init.js.map +1 -1
- package/dist/admin/components/Permissions/init.mjs.map +1 -1
- package/dist/admin/components/Permissions/reducer.js.map +1 -1
- package/dist/admin/components/Permissions/reducer.mjs.map +1 -1
- package/dist/admin/components/Policies/index.js.map +1 -1
- package/dist/admin/components/Policies/index.mjs.map +1 -1
- package/dist/admin/components/UsersPermissions/index.js.map +1 -1
- package/dist/admin/components/UsersPermissions/index.mjs +5 -5
- package/dist/admin/components/UsersPermissions/index.mjs.map +1 -1
- package/dist/admin/components/UsersPermissions/init.js.map +1 -1
- package/dist/admin/components/UsersPermissions/init.mjs.map +1 -1
- package/dist/admin/components/UsersPermissions/reducer.js.map +1 -1
- package/dist/admin/components/UsersPermissions/reducer.mjs.map +1 -1
- package/dist/admin/constants.js.map +1 -1
- package/dist/admin/constants.mjs.map +1 -1
- package/dist/admin/contexts/UsersPermissionsContext/index.js.map +1 -1
- package/dist/admin/contexts/UsersPermissionsContext/index.mjs.map +1 -1
- package/dist/admin/index.js.map +1 -1
- package/dist/admin/index.mjs.map +1 -1
- package/dist/admin/package.json.js +1 -6
- package/dist/admin/package.json.js.map +1 -1
- package/dist/admin/package.json.mjs +1 -6
- package/dist/admin/package.json.mjs.map +1 -1
- package/dist/admin/pages/AdvancedSettings/index.js.map +1 -1
- package/dist/admin/pages/AdvancedSettings/index.mjs.map +1 -1
- package/dist/admin/pages/AdvancedSettings/utils/layout.js.map +1 -1
- package/dist/admin/pages/AdvancedSettings/utils/layout.mjs.map +1 -1
- package/dist/admin/pages/AdvancedSettings/utils/schema.js.map +1 -1
- package/dist/admin/pages/AdvancedSettings/utils/schema.mjs.map +1 -1
- package/dist/admin/pages/EmailTemplates/components/EmailForm.js.map +1 -1
- package/dist/admin/pages/EmailTemplates/components/EmailForm.mjs.map +1 -1
- package/dist/admin/pages/EmailTemplates/components/EmailTable.js.map +1 -1
- package/dist/admin/pages/EmailTemplates/components/EmailTable.mjs.map +1 -1
- package/dist/admin/pages/EmailTemplates/index.js.map +1 -1
- package/dist/admin/pages/EmailTemplates/index.mjs.map +1 -1
- package/dist/admin/pages/EmailTemplates/utils/schema.js.map +1 -1
- package/dist/admin/pages/EmailTemplates/utils/schema.mjs.map +1 -1
- package/dist/admin/pages/Providers/index.js.map +1 -1
- package/dist/admin/pages/Providers/index.mjs.map +1 -1
- package/dist/admin/pages/Providers/utils/forms.js.map +1 -1
- package/dist/admin/pages/Providers/utils/forms.mjs.map +1 -1
- package/dist/admin/pages/Roles/constants.js.map +1 -1
- package/dist/admin/pages/Roles/constants.mjs.map +1 -1
- package/dist/admin/pages/Roles/hooks/usePlugins.js.map +1 -1
- package/dist/admin/pages/Roles/hooks/usePlugins.mjs.map +1 -1
- package/dist/admin/pages/Roles/index.js.map +1 -1
- package/dist/admin/pages/Roles/index.mjs.map +1 -1
- package/dist/admin/pages/Roles/pages/CreatePage.js.map +1 -1
- package/dist/admin/pages/Roles/pages/CreatePage.mjs +1 -1
- package/dist/admin/pages/Roles/pages/CreatePage.mjs.map +1 -1
- package/dist/admin/pages/Roles/pages/EditPage.js.map +1 -1
- package/dist/admin/pages/Roles/pages/EditPage.mjs +1 -1
- package/dist/admin/pages/Roles/pages/EditPage.mjs.map +1 -1
- package/dist/admin/pages/Roles/pages/ListPage/components/TableBody.js.map +1 -1
- package/dist/admin/pages/Roles/pages/ListPage/components/TableBody.mjs +1 -1
- package/dist/admin/pages/Roles/pages/ListPage/components/TableBody.mjs.map +1 -1
- package/dist/admin/pages/Roles/pages/ListPage/index.js.map +1 -1
- package/dist/admin/pages/Roles/pages/ListPage/index.mjs.map +1 -1
- package/dist/admin/pluginId.js.map +1 -1
- package/dist/admin/pluginId.mjs.map +1 -1
- package/dist/admin/utils/cleanPermissions.js.map +1 -1
- package/dist/admin/utils/cleanPermissions.mjs.map +1 -1
- package/dist/admin/utils/formatPluginName.js.map +1 -1
- package/dist/admin/utils/formatPluginName.mjs.map +1 -1
- package/dist/admin/utils/getTrad.js.map +1 -1
- package/dist/admin/utils/getTrad.mjs.map +1 -1
- package/dist/admin/utils/prefixPluginTranslations.js.map +1 -1
- package/dist/admin/utils/prefixPluginTranslations.mjs.map +1 -1
- package/dist/server/bootstrap/index.js.map +1 -1
- package/dist/server/bootstrap/index.mjs.map +1 -1
- package/dist/server/bootstrap/users-permissions-actions.js.map +1 -1
- package/dist/server/bootstrap/users-permissions-actions.mjs.map +1 -1
- package/dist/server/config.js.map +1 -1
- package/dist/server/config.mjs.map +1 -1
- package/dist/server/content-types/index.js +4 -4
- package/dist/server/content-types/index.js.map +1 -1
- package/dist/server/content-types/index.mjs.map +1 -1
- package/dist/server/content-types/permission/index.js.map +1 -1
- package/dist/server/content-types/permission/index.mjs.map +1 -1
- package/dist/server/content-types/role/index.js.map +1 -1
- package/dist/server/content-types/role/index.mjs.map +1 -1
- package/dist/server/content-types/user/index.js.map +1 -1
- package/dist/server/content-types/user/index.mjs.map +1 -1
- package/dist/server/content-types/user/schema-config.js.map +1 -1
- package/dist/server/content-types/user/schema-config.mjs.map +1 -1
- package/dist/server/controllers/auth.js +4 -4
- package/dist/server/controllers/auth.js.map +1 -1
- package/dist/server/controllers/auth.mjs +4 -4
- package/dist/server/controllers/auth.mjs.map +1 -1
- package/dist/server/controllers/content-manager-user.js.map +1 -1
- package/dist/server/controllers/content-manager-user.mjs.map +1 -1
- package/dist/server/controllers/index.js.map +1 -1
- package/dist/server/controllers/index.mjs.map +1 -1
- package/dist/server/controllers/permissions.js.map +1 -1
- package/dist/server/controllers/permissions.mjs.map +1 -1
- package/dist/server/controllers/role.js.map +1 -1
- package/dist/server/controllers/role.mjs.map +1 -1
- package/dist/server/controllers/settings.js.map +1 -1
- package/dist/server/controllers/settings.mjs.map +1 -1
- package/dist/server/controllers/user.js.map +1 -1
- package/dist/server/controllers/user.mjs.map +1 -1
- package/dist/server/controllers/validation/auth.js.map +1 -1
- package/dist/server/controllers/validation/auth.mjs.map +1 -1
- package/dist/server/controllers/validation/email-template.js.map +1 -1
- package/dist/server/controllers/validation/email-template.mjs.map +1 -1
- package/dist/server/controllers/validation/user.js.map +1 -1
- package/dist/server/controllers/validation/user.mjs.map +1 -1
- package/dist/server/graphql/index.js.map +1 -1
- package/dist/server/graphql/index.mjs.map +1 -1
- package/dist/server/graphql/mutations/auth/change-password.js.map +1 -1
- package/dist/server/graphql/mutations/auth/change-password.mjs.map +1 -1
- package/dist/server/graphql/mutations/auth/email-confirmation.js.map +1 -1
- package/dist/server/graphql/mutations/auth/email-confirmation.mjs.map +1 -1
- package/dist/server/graphql/mutations/auth/forgot-password.js.map +1 -1
- package/dist/server/graphql/mutations/auth/forgot-password.mjs.map +1 -1
- package/dist/server/graphql/mutations/auth/login.js.map +1 -1
- package/dist/server/graphql/mutations/auth/login.mjs.map +1 -1
- package/dist/server/graphql/mutations/auth/register.js.map +1 -1
- package/dist/server/graphql/mutations/auth/register.mjs.map +1 -1
- package/dist/server/graphql/mutations/auth/reset-password.js.map +1 -1
- package/dist/server/graphql/mutations/auth/reset-password.mjs.map +1 -1
- package/dist/server/graphql/mutations/crud/role/create-role.js.map +1 -1
- package/dist/server/graphql/mutations/crud/role/create-role.mjs.map +1 -1
- package/dist/server/graphql/mutations/crud/role/delete-role.js.map +1 -1
- package/dist/server/graphql/mutations/crud/role/delete-role.mjs.map +1 -1
- package/dist/server/graphql/mutations/crud/role/update-role.js.map +1 -1
- package/dist/server/graphql/mutations/crud/role/update-role.mjs.map +1 -1
- package/dist/server/graphql/mutations/crud/user/create-user.js.map +1 -1
- package/dist/server/graphql/mutations/crud/user/create-user.mjs.map +1 -1
- package/dist/server/graphql/mutations/crud/user/delete-user.js.map +1 -1
- package/dist/server/graphql/mutations/crud/user/delete-user.mjs.map +1 -1
- package/dist/server/graphql/mutations/crud/user/update-user.js.map +1 -1
- package/dist/server/graphql/mutations/crud/user/update-user.mjs.map +1 -1
- package/dist/server/graphql/mutations/index.js.map +1 -1
- package/dist/server/graphql/mutations/index.mjs.map +1 -1
- package/dist/server/graphql/queries/index.js.map +1 -1
- package/dist/server/graphql/queries/index.mjs.map +1 -1
- package/dist/server/graphql/queries/me.js.map +1 -1
- package/dist/server/graphql/queries/me.mjs.map +1 -1
- package/dist/server/graphql/resolvers-configs.js.map +1 -1
- package/dist/server/graphql/resolvers-configs.mjs.map +1 -1
- package/dist/server/graphql/types/create-role-payload.js.map +1 -1
- package/dist/server/graphql/types/create-role-payload.mjs.map +1 -1
- package/dist/server/graphql/types/delete-role-payload.js.map +1 -1
- package/dist/server/graphql/types/delete-role-payload.mjs.map +1 -1
- package/dist/server/graphql/types/index.js.map +1 -1
- package/dist/server/graphql/types/index.mjs.map +1 -1
- package/dist/server/graphql/types/login-input.js.map +1 -1
- package/dist/server/graphql/types/login-input.mjs.map +1 -1
- package/dist/server/graphql/types/login-payload.js.map +1 -1
- package/dist/server/graphql/types/login-payload.mjs.map +1 -1
- package/dist/server/graphql/types/me-role.js.map +1 -1
- package/dist/server/graphql/types/me-role.mjs.map +1 -1
- package/dist/server/graphql/types/me.js.map +1 -1
- package/dist/server/graphql/types/me.mjs.map +1 -1
- package/dist/server/graphql/types/password-payload.js.map +1 -1
- package/dist/server/graphql/types/password-payload.mjs.map +1 -1
- package/dist/server/graphql/types/register-input.js.map +1 -1
- package/dist/server/graphql/types/register-input.mjs.map +1 -1
- package/dist/server/graphql/types/update-role-payload.js.map +1 -1
- package/dist/server/graphql/types/update-role-payload.mjs.map +1 -1
- package/dist/server/graphql/types/user-input.js.map +1 -1
- package/dist/server/graphql/types/user-input.mjs.map +1 -1
- package/dist/server/graphql/utils.js.map +1 -1
- package/dist/server/graphql/utils.mjs.map +1 -1
- package/dist/server/index.js.map +1 -1
- package/dist/server/index.mjs.map +1 -1
- package/dist/server/index2.js.map +1 -1
- package/dist/server/index2.mjs.map +1 -1
- package/dist/server/middlewares/index.js.map +1 -1
- package/dist/server/middlewares/index.mjs.map +1 -1
- package/dist/server/middlewares/rateLimit.js +4 -4
- package/dist/server/middlewares/rateLimit.js.map +1 -1
- package/dist/server/middlewares/rateLimit.mjs +4 -4
- package/dist/server/middlewares/rateLimit.mjs.map +1 -1
- package/dist/server/register.js.map +1 -1
- package/dist/server/register.mjs.map +1 -1
- package/dist/server/routes/admin/index.js.map +1 -1
- package/dist/server/routes/admin/index.mjs.map +1 -1
- package/dist/server/routes/admin/permissions.js.map +1 -1
- package/dist/server/routes/admin/permissions.mjs.map +1 -1
- package/dist/server/routes/admin/role.js.map +1 -1
- package/dist/server/routes/admin/role.mjs.map +1 -1
- package/dist/server/routes/admin/settings.js.map +1 -1
- package/dist/server/routes/admin/settings.mjs.map +1 -1
- package/dist/server/routes/content-api/auth.js.map +1 -1
- package/dist/server/routes/content-api/auth.mjs.map +1 -1
- package/dist/server/routes/content-api/index.js.map +1 -1
- package/dist/server/routes/content-api/index.mjs.map +1 -1
- package/dist/server/routes/content-api/permissions.js.map +1 -1
- package/dist/server/routes/content-api/permissions.mjs.map +1 -1
- package/dist/server/routes/content-api/role.js.map +1 -1
- package/dist/server/routes/content-api/role.mjs.map +1 -1
- package/dist/server/routes/content-api/user.js.map +1 -1
- package/dist/server/routes/content-api/user.mjs.map +1 -1
- package/dist/server/routes/content-api/validation.js.map +1 -1
- package/dist/server/routes/content-api/validation.mjs.map +1 -1
- package/dist/server/routes/index.js +4 -4
- package/dist/server/routes/index.js.map +1 -1
- package/dist/server/routes/index.mjs.map +1 -1
- package/dist/server/services/constants.js.map +1 -1
- package/dist/server/services/constants.mjs.map +1 -1
- package/dist/server/services/index.js.map +1 -1
- package/dist/server/services/index.mjs.map +1 -1
- package/dist/server/services/jwt.js.map +1 -1
- package/dist/server/services/jwt.mjs.map +1 -1
- package/dist/server/services/permission.js.map +1 -1
- package/dist/server/services/permission.mjs.map +1 -1
- package/dist/server/services/providers-registry.js.map +1 -1
- package/dist/server/services/providers-registry.mjs.map +1 -1
- package/dist/server/services/providers.js.map +1 -1
- package/dist/server/services/providers.mjs.map +1 -1
- package/dist/server/services/role.js.map +1 -1
- package/dist/server/services/role.mjs.map +1 -1
- package/dist/server/services/user.js +8 -8
- package/dist/server/services/user.js.map +1 -1
- package/dist/server/services/user.mjs +8 -8
- package/dist/server/services/user.mjs.map +1 -1
- package/dist/server/services/users-permissions.js +4 -4
- package/dist/server/services/users-permissions.js.map +1 -1
- package/dist/server/services/users-permissions.mjs +4 -4
- package/dist/server/services/users-permissions.mjs.map +1 -1
- package/dist/server/strategies/users-permissions.js.map +1 -1
- package/dist/server/strategies/users-permissions.mjs.map +1 -1
- package/dist/server/utils/index.js.map +1 -1
- package/dist/server/utils/index.mjs.map +1 -1
- package/dist/server/utils/sanitize/index.js.map +1 -1
- package/dist/server/utils/sanitize/index.mjs.map +1 -1
- package/dist/server/utils/sanitize/sanitizers.js.map +1 -1
- package/dist/server/utils/sanitize/sanitizers.mjs.map +1 -1
- package/dist/server/utils/sanitize/visitors/index.js.map +1 -1
- package/dist/server/utils/sanitize/visitors/index.mjs.map +1 -1
- package/dist/server/utils/sanitize/visitors/remove-user-relation-from-role-entities.js.map +1 -1
- package/dist/server/utils/sanitize/visitors/remove-user-relation-from-role-entities.mjs.map +1 -1
- package/package.json +5 -5
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.js","sources":["../../../server/bootstrap/index.js"],"sourcesContent":["'use strict';\n\n/**\n * An asynchronous bootstrap function that runs before\n * your application gets started.\n *\n * This gives you an opportunity to set up your data model,\n * run jobs, or perform some special logic.\n */\nconst crypto = require('crypto');\nconst _ = require('lodash');\nconst { getService } = require('../utils');\nconst usersPermissionsActions = require('./users-permissions-actions');\nconst {\n DEFAULT_ACCESS_TOKEN_LIFESPAN,\n DEFAULT_MAX_REFRESH_TOKEN_LIFESPAN,\n DEFAULT_IDLE_REFRESH_TOKEN_LIFESPAN,\n DEFAULT_MAX_SESSION_LIFESPAN,\n DEFAULT_IDLE_SESSION_LIFESPAN,\n} = require('../services/constants');\n\nconst getSessionManager = () => {\n const manager = strapi.sessionManager;\n return manager ?? null;\n};\n\nconst initGrant = async (pluginStore) => {\n const allProviders = getService('providers-registry').getAll();\n\n const grantConfig = Object.entries(allProviders).reduce((acc, [name, provider]) => {\n const { icon, enabled, grantConfig } = provider;\n\n acc[name] = {\n icon,\n enabled,\n ...grantConfig,\n };\n return acc;\n }, {});\n\n const prevGrantConfig = (await pluginStore.get({ key: 'grant' })) || {};\n\n if (!prevGrantConfig || !_.isEqual(prevGrantConfig, grantConfig)) {\n // merge with the previous provider config.\n _.keys(grantConfig).forEach((key) => {\n if (key in prevGrantConfig) {\n grantConfig[key] = _.merge(grantConfig[key], prevGrantConfig[key]);\n }\n });\n await pluginStore.set({ key: 'grant', value: grantConfig });\n }\n};\n\nconst initEmails = async (pluginStore) => {\n if (!(await pluginStore.get({ key: 'email' }))) {\n const value = {\n reset_password: {\n display: 'Email.template.reset_password',\n icon: 'sync',\n options: {\n from: {\n name: 'Administration Panel',\n email: 'no-reply@strapi.io',\n },\n response_email: '',\n object: 'Reset password',\n message: `<p>We heard that you lost your password. Sorry about that!</p>\n\n<p>But don’t worry! You can use the following link to reset your password:</p>\n<p><%= URL %>?code=<%= TOKEN %></p>\n\n<p>Thanks.</p>`,\n },\n },\n email_confirmation: {\n display: 'Email.template.email_confirmation',\n icon: 'check-square',\n options: {\n from: {\n name: 'Administration Panel',\n email: 'no-reply@strapi.io',\n },\n response_email: '',\n object: 'Account confirmation',\n message: `<p>Thank you for registering!</p>\n\n<p>You have to confirm your email address. Please click on the link below.</p>\n\n<p><%= URL %>?confirmation=<%= CODE %></p>\n\n<p>Thanks.</p>`,\n },\n },\n };\n\n await pluginStore.set({ key: 'email', value });\n }\n};\n\nconst initAdvancedOptions = async (pluginStore) => {\n if (!(await pluginStore.get({ key: 'advanced' }))) {\n const value = {\n unique_email: true,\n allow_register: true,\n email_confirmation: false,\n email_reset_password: null,\n email_confirmation_redirection: null,\n default_role: 'authenticated',\n };\n\n await pluginStore.set({ key: 'advanced', value });\n }\n};\n\nmodule.exports = async ({ strapi }) => {\n const pluginStore = strapi.store({ type: 'plugin', name: 'users-permissions' });\n\n await initGrant(pluginStore);\n await initEmails(pluginStore);\n await initAdvancedOptions(pluginStore);\n\n await strapi\n .service('admin::permission')\n .actionProvider.registerMany(usersPermissionsActions.actions);\n\n await getService('users-permissions').initialize();\n\n // Define users-permissions origin configuration for sessionManager\n const upConfig = strapi.config.get('plugin::users-permissions');\n const sessionManager = getSessionManager();\n\n if (sessionManager) {\n sessionManager.defineOrigin('users-permissions', {\n jwtSecret: upConfig.jwtSecret || strapi.config.get('admin.auth.secret'),\n accessTokenLifespan: upConfig.sessions?.accessTokenLifespan || DEFAULT_ACCESS_TOKEN_LIFESPAN,\n maxRefreshTokenLifespan:\n upConfig.sessions?.maxRefreshTokenLifespan || DEFAULT_MAX_REFRESH_TOKEN_LIFESPAN,\n idleRefreshTokenLifespan:\n upConfig.sessions?.idleRefreshTokenLifespan || DEFAULT_IDLE_REFRESH_TOKEN_LIFESPAN,\n maxSessionLifespan: upConfig.sessions?.maxSessionLifespan || DEFAULT_MAX_SESSION_LIFESPAN,\n idleSessionLifespan: upConfig.sessions?.idleSessionLifespan || DEFAULT_IDLE_SESSION_LIFESPAN,\n algorithm: upConfig.jwt?.algorithm,\n jwtOptions: upConfig.jwt || {},\n });\n }\n\n if (!strapi.config.get('plugin::users-permissions.jwtSecret')) {\n if (process.env.NODE_ENV !== 'development') {\n throw new Error(\n `Missing jwtSecret. Please, set configuration variable \"jwtSecret\" for the users-permissions plugin in config/plugins.js (ex: you can generate one using Node with \\`crypto.randomBytes(16).toString('base64')\\`).\nFor security reasons, prefer storing the secret in an environment variable and read it in config/plugins.js. See https://docs.strapi.io/developer-docs/latest/setup-deployment-guides/configurations/optional/environment.html#configuration-using-environment-variables.`\n );\n }\n\n const jwtSecret = crypto.randomBytes(16).toString('base64');\n\n strapi.config.set('plugin::users-permissions.jwtSecret', jwtSecret);\n\n if (!process.env.JWT_SECRET) {\n const envPath = process.env.ENV_PATH || '.env';\n strapi.fs.appendFile(envPath, `JWT_SECRET=${jwtSecret}\\n`);\n strapi.log.info(\n `The Users & Permissions plugin automatically generated a jwt secret and stored it in ${envPath} under the name JWT_SECRET.`\n );\n }\n }\n};\n"],"names":["crypto","require$$0","_","require$$1","getService","require$$2","usersPermissionsActions","require$$3","DEFAULT_ACCESS_TOKEN_LIFESPAN","DEFAULT_MAX_REFRESH_TOKEN_LIFESPAN","DEFAULT_IDLE_REFRESH_TOKEN_LIFESPAN","DEFAULT_MAX_SESSION_LIFESPAN","DEFAULT_IDLE_SESSION_LIFESPAN","require$$4","getSessionManager","manager","strapi","sessionManager","initGrant","pluginStore","allProviders","getAll","grantConfig","Object","entries","reduce","acc","name","provider","icon","enabled","prevGrantConfig","get","key","isEqual","keys","forEach","merge","set","value","initEmails","reset_password","display","options","from","email","response_email","object","message","email_confirmation","initAdvancedOptions","unique_email","allow_register","email_reset_password","email_confirmation_redirection","default_role","bootstrap","store","type","service","actionProvider","registerMany","actions","initialize","upConfig","config","defineOrigin","jwtSecret","accessTokenLifespan","sessions","maxRefreshTokenLifespan","idleRefreshTokenLifespan","maxSessionLifespan","idleSessionLifespan","algorithm","jwt","jwtOptions","process","env","NODE_ENV","Error","randomBytes","toString","JWT_SECRET","envPath","ENV_PATH","fs","appendFile","log","info"],"mappings":";;;;;;;;;;;;;AAEA;;;;;;AAMA,KACA,MAAMA,MAASC,GAAAA,UAAAA;AACf,IAAA,MAAMC,CAAIC,GAAAA,YAAAA;IACV,MAAM,EAAEC,UAAU,EAAE,GAAGC,eAAAA,EAAAA;AACvB,IAAA,MAAMC,yBAA0BC,GAAAA,iCAAAA,EAAAA;IAChC,MAAM,EACJC,6BAA6B,EAC7BC,kCAAkC,EAClCC,mCAAmC,EACnCC,4BAA4B,EAC5BC,6BAA6B,EAC9B,GAAGC,mBAAAA,EAAAA;AAEJ,IAAA,MAAMC,iBAAoB,GAAA,IAAA;QACxB,MAAMC,OAAAA,GAAUC,OAAOC,cAAc;AACrC,QAAA,OAAOF,OAAW,IAAA,IAAA;AACpB,KAAA;AAEA,IAAA,MAAMG,YAAY,OAAOC,WAAAA,GAAAA;QACvB,MAAMC,YAAAA,GAAehB,UAAW,CAAA,oBAAA,CAAA,CAAsBiB,MAAM,EAAA;QAE5D,MAAMC,WAAAA,GAAcC,MAAOC,CAAAA,OAAO,CAACJ,YAAAA,CAAAA,CAAcK,MAAM,CAAC,CAACC,GAAAA,EAAK,CAACC,IAAAA,EAAMC,QAAS,CAAA,GAAA;AAC5E,YAAA,MAAM,EAAEC,IAAI,EAAEC,OAAO,EAAER,WAAW,EAAE,GAAGM,QAAAA;YAEvCF,GAAG,CAACC,KAAK,GAAG;AACVE,gBAAAA,IAAAA;AACAC,gBAAAA,OAAAA;AACA,gBAAA,GAAGR;AACT,aAAA;YACI,OAAOI,GAAAA;AACR,SAAA,EAAE,EAAE,CAAA;AAEL,QAAA,MAAMK,eAAkB,GAAC,MAAMZ,WAAAA,CAAYa,GAAG,CAAC;YAAEC,GAAK,EAAA;cAAe;AAErE,QAAA,IAAI,CAACF,eAAmB,IAAA,CAAC7B,EAAEgC,OAAO,CAACH,iBAAiBT,WAAc,CAAA,EAAA;;AAEhEpB,YAAAA,CAAAA,CAAEiC,IAAI,CAACb,WAAac,CAAAA,CAAAA,OAAO,CAAC,CAACH,GAAAA,GAAAA;AAC3B,gBAAA,IAAIA,OAAOF,eAAiB,EAAA;AAC1BT,oBAAAA,WAAW,CAACW,GAAAA,CAAI,GAAG/B,CAAAA,CAAEmC,KAAK,CAACf,WAAW,CAACW,GAAI,CAAA,EAAEF,eAAe,CAACE,GAAI,CAAA,CAAA;AAClE;AACP,aAAA,CAAA;YACI,MAAMd,WAAAA,CAAYmB,GAAG,CAAC;gBAAEL,GAAK,EAAA,OAAA;gBAASM,KAAOjB,EAAAA;AAAW,aAAA,CAAA;AACzD;AACH,KAAA;AAEA,IAAA,MAAMkB,aAAa,OAAOrB,WAAAA,GAAAA;AACxB,QAAA,IAAI,CAAE,MAAMA,WAAYa,CAAAA,GAAG,CAAC;YAAEC,GAAK,EAAA;SAAa,CAAA,EAAA;AAC9C,YAAA,MAAMM,KAAQ,GAAA;gBACZE,cAAgB,EAAA;oBACdC,OAAS,EAAA,+BAAA;oBACTb,IAAM,EAAA,MAAA;oBACNc,OAAS,EAAA;wBACPC,IAAM,EAAA;4BACJjB,IAAM,EAAA,sBAAA;4BACNkB,KAAO,EAAA;AACR,yBAAA;wBACDC,cAAgB,EAAA,EAAA;wBAChBC,MAAQ,EAAA,gBAAA;AACRC,wBAAAA,OAAAA,EAAS,CAAC;;;;;cAKN;AACL;AACF,iBAAA;gBACDC,kBAAoB,EAAA;oBAClBP,OAAS,EAAA,mCAAA;oBACTb,IAAM,EAAA,cAAA;oBACNc,OAAS,EAAA;wBACPC,IAAM,EAAA;4BACJjB,IAAM,EAAA,sBAAA;4BACNkB,KAAO,EAAA;AACR,yBAAA;wBACDC,cAAgB,EAAA,EAAA;wBAChBC,MAAQ,EAAA,sBAAA;AACRC,wBAAAA,OAAAA,EAAS,CAAC;;;;;;cAMN;AACL;AACF;AACP,aAAA;YAEI,MAAM7B,WAAAA,CAAYmB,GAAG,CAAC;gBAAEL,GAAK,EAAA,OAAA;AAASM,gBAAAA;AAAK,aAAA,CAAA;AAC5C;AACH,KAAA;AAEA,IAAA,MAAMW,sBAAsB,OAAO/B,WAAAA,GAAAA;AACjC,QAAA,IAAI,CAAE,MAAMA,WAAYa,CAAAA,GAAG,CAAC;YAAEC,GAAK,EAAA;SAAgB,CAAA,EAAA;AACjD,YAAA,MAAMM,KAAQ,GAAA;gBACZY,YAAc,EAAA,IAAA;gBACdC,cAAgB,EAAA,IAAA;gBAChBH,kBAAoB,EAAA,KAAA;gBACpBI,oBAAsB,EAAA,IAAA;gBACtBC,8BAAgC,EAAA,IAAA;gBAChCC,YAAc,EAAA;AACpB,aAAA;YAEI,MAAMpC,WAAAA,CAAYmB,GAAG,CAAC;gBAAEL,GAAK,EAAA,UAAA;AAAYM,gBAAAA;AAAK,aAAA,CAAA;AAC/C;AACH,KAAA;AAEAiB,IAAAA,SAAAA,GAAiB,OAAO,EAAExC,MAAAA,EAAAA,OAAM,EAAE,GAAA;QAChC,MAAMG,WAAAA,GAAcH,OAAOyC,CAAAA,KAAK,CAAC;YAAEC,IAAM,EAAA,QAAA;YAAU/B,IAAM,EAAA;AAAmB,SAAA,CAAA;AAE5E,QAAA,MAAMT,SAAUC,CAAAA,WAAAA,CAAAA;AAChB,QAAA,MAAMqB,UAAWrB,CAAAA,WAAAA,CAAAA;AACjB,QAAA,MAAM+B,mBAAoB/B,CAAAA,WAAAA,CAAAA;QAE1B,MAAMH,OAAAA,CACH2C,OAAO,CAAC,mBAAA,CAAA,CACRC,cAAc,CAACC,YAAY,CAACvD,yBAAAA,CAAwBwD,OAAO,CAAA;QAE9D,MAAM1D,UAAAA,CAAW,qBAAqB2D,UAAU,EAAA;;AAGhD,QAAA,MAAMC,QAAWhD,GAAAA,OAAAA,CAAOiD,MAAM,CAACjC,GAAG,CAAC,2BAAA,CAAA;AACnC,QAAA,MAAMf,cAAiBH,GAAAA,iBAAAA,EAAAA;AAEvB,QAAA,IAAIG,cAAgB,EAAA;YAClBA,cAAeiD,CAAAA,YAAY,CAAC,mBAAqB,EAAA;AAC/CC,gBAAAA,SAAAA,EAAWH,SAASG,SAAS,IAAInD,QAAOiD,MAAM,CAACjC,GAAG,CAAC,mBAAA,CAAA;gBACnDoC,mBAAqBJ,EAAAA,QAAAA,CAASK,QAAQ,EAAED,mBAAuB5D,IAAAA,6BAAAA;gBAC/D8D,uBACEN,EAAAA,QAAAA,CAASK,QAAQ,EAAEC,uBAA2B7D,IAAAA,kCAAAA;gBAChD8D,wBACEP,EAAAA,QAAAA,CAASK,QAAQ,EAAEE,wBAA4B7D,IAAAA,mCAAAA;gBACjD8D,kBAAoBR,EAAAA,QAAAA,CAASK,QAAQ,EAAEG,kBAAsB7D,IAAAA,4BAAAA;gBAC7D8D,mBAAqBT,EAAAA,QAAAA,CAASK,QAAQ,EAAEI,mBAAuB7D,IAAAA,6BAAAA;gBAC/D8D,SAAWV,EAAAA,QAAAA,CAASW,GAAG,EAAED,SAAAA;gBACzBE,UAAYZ,EAAAA,QAAAA,CAASW,GAAG,IAAI;AAClC,aAAA,CAAA;AACG;AAED,QAAA,IAAI,CAAC3D,OAAOiD,CAAAA,MAAM,CAACjC,GAAG,CAAC,qCAAwC,CAAA,EAAA;AAC7D,YAAA,IAAI6C,OAAQC,CAAAA,GAAG,CAACC,QAAQ,KAAK,aAAe,EAAA;gBAC1C,MAAM,IAAIC,MACR,CAAC;yQACgQ,CAAC,CAAA;AAErQ;AAED,YAAA,MAAMb,YAAYnE,MAAOiF,CAAAA,WAAW,CAAC,EAAA,CAAA,CAAIC,QAAQ,CAAC,QAAA,CAAA;AAElDlE,YAAAA,OAAAA,CAAOiD,MAAM,CAAC3B,GAAG,CAAC,qCAAuC6B,EAAAA,SAAAA,CAAAA;AAEzD,YAAA,IAAI,CAACU,OAAAA,CAAQC,GAAG,CAACK,UAAU,EAAE;AAC3B,gBAAA,MAAMC,OAAUP,GAAAA,OAAAA,CAAQC,GAAG,CAACO,QAAQ,IAAI,MAAA;gBACxCrE,OAAOsE,CAAAA,EAAE,CAACC,UAAU,CAACH,OAAAA,EAAS,CAAC,WAAW,EAAEjB,SAAU,CAAA,EAAE,CAAC,CAAA;gBACzDnD,OAAOwE,CAAAA,GAAG,CAACC,IAAI,CACb,CAAC,qFAAqF,EAAEL,OAAQ,CAAA,2BAA2B,CAAC,CAAA;AAE/H;AACF;AACH,KAAA;;;;;;"}
|
|
1
|
+
{"version":3,"file":"index.js","sources":["../../../server/bootstrap/index.js"],"sourcesContent":["'use strict';\n\n/**\n * An asynchronous bootstrap function that runs before\n * your application gets started.\n *\n * This gives you an opportunity to set up your data model,\n * run jobs, or perform some special logic.\n */\nconst crypto = require('crypto');\nconst _ = require('lodash');\nconst { getService } = require('../utils');\nconst usersPermissionsActions = require('./users-permissions-actions');\nconst {\n DEFAULT_ACCESS_TOKEN_LIFESPAN,\n DEFAULT_MAX_REFRESH_TOKEN_LIFESPAN,\n DEFAULT_IDLE_REFRESH_TOKEN_LIFESPAN,\n DEFAULT_MAX_SESSION_LIFESPAN,\n DEFAULT_IDLE_SESSION_LIFESPAN,\n} = require('../services/constants');\n\nconst getSessionManager = () => {\n const manager = strapi.sessionManager;\n return manager ?? null;\n};\n\nconst initGrant = async (pluginStore) => {\n const allProviders = getService('providers-registry').getAll();\n\n const grantConfig = Object.entries(allProviders).reduce((acc, [name, provider]) => {\n const { icon, enabled, grantConfig } = provider;\n\n acc[name] = {\n icon,\n enabled,\n ...grantConfig,\n };\n return acc;\n }, {});\n\n const prevGrantConfig = (await pluginStore.get({ key: 'grant' })) || {};\n\n if (!prevGrantConfig || !_.isEqual(prevGrantConfig, grantConfig)) {\n // merge with the previous provider config.\n _.keys(grantConfig).forEach((key) => {\n if (key in prevGrantConfig) {\n grantConfig[key] = _.merge(grantConfig[key], prevGrantConfig[key]);\n }\n });\n await pluginStore.set({ key: 'grant', value: grantConfig });\n }\n};\n\nconst initEmails = async (pluginStore) => {\n if (!(await pluginStore.get({ key: 'email' }))) {\n const value = {\n reset_password: {\n display: 'Email.template.reset_password',\n icon: 'sync',\n options: {\n from: {\n name: 'Administration Panel',\n email: 'no-reply@strapi.io',\n },\n response_email: '',\n object: 'Reset password',\n message: `<p>We heard that you lost your password. Sorry about that!</p>\n\n<p>But don’t worry! You can use the following link to reset your password:</p>\n<p><%= URL %>?code=<%= TOKEN %></p>\n\n<p>Thanks.</p>`,\n },\n },\n email_confirmation: {\n display: 'Email.template.email_confirmation',\n icon: 'check-square',\n options: {\n from: {\n name: 'Administration Panel',\n email: 'no-reply@strapi.io',\n },\n response_email: '',\n object: 'Account confirmation',\n message: `<p>Thank you for registering!</p>\n\n<p>You have to confirm your email address. Please click on the link below.</p>\n\n<p><%= URL %>?confirmation=<%= CODE %></p>\n\n<p>Thanks.</p>`,\n },\n },\n };\n\n await pluginStore.set({ key: 'email', value });\n }\n};\n\nconst initAdvancedOptions = async (pluginStore) => {\n if (!(await pluginStore.get({ key: 'advanced' }))) {\n const value = {\n unique_email: true,\n allow_register: true,\n email_confirmation: false,\n email_reset_password: null,\n email_confirmation_redirection: null,\n default_role: 'authenticated',\n };\n\n await pluginStore.set({ key: 'advanced', value });\n }\n};\n\nmodule.exports = async ({ strapi }) => {\n const pluginStore = strapi.store({ type: 'plugin', name: 'users-permissions' });\n\n await initGrant(pluginStore);\n await initEmails(pluginStore);\n await initAdvancedOptions(pluginStore);\n\n await strapi\n .service('admin::permission')\n .actionProvider.registerMany(usersPermissionsActions.actions);\n\n await getService('users-permissions').initialize();\n\n // Define users-permissions origin configuration for sessionManager\n const upConfig = strapi.config.get('plugin::users-permissions');\n const sessionManager = getSessionManager();\n\n if (sessionManager) {\n sessionManager.defineOrigin('users-permissions', {\n jwtSecret: upConfig.jwtSecret || strapi.config.get('admin.auth.secret'),\n accessTokenLifespan: upConfig.sessions?.accessTokenLifespan || DEFAULT_ACCESS_TOKEN_LIFESPAN,\n maxRefreshTokenLifespan:\n upConfig.sessions?.maxRefreshTokenLifespan || DEFAULT_MAX_REFRESH_TOKEN_LIFESPAN,\n idleRefreshTokenLifespan:\n upConfig.sessions?.idleRefreshTokenLifespan || DEFAULT_IDLE_REFRESH_TOKEN_LIFESPAN,\n maxSessionLifespan: upConfig.sessions?.maxSessionLifespan || DEFAULT_MAX_SESSION_LIFESPAN,\n idleSessionLifespan: upConfig.sessions?.idleSessionLifespan || DEFAULT_IDLE_SESSION_LIFESPAN,\n algorithm: upConfig.jwt?.algorithm,\n jwtOptions: upConfig.jwt || {},\n });\n }\n\n if (!strapi.config.get('plugin::users-permissions.jwtSecret')) {\n if (process.env.NODE_ENV !== 'development') {\n throw new Error(\n `Missing jwtSecret. Please, set configuration variable \"jwtSecret\" for the users-permissions plugin in config/plugins.js (ex: you can generate one using Node with \\`crypto.randomBytes(16).toString('base64')\\`).\nFor security reasons, prefer storing the secret in an environment variable and read it in config/plugins.js. See https://docs.strapi.io/developer-docs/latest/setup-deployment-guides/configurations/optional/environment.html#configuration-using-environment-variables.`\n );\n }\n\n const jwtSecret = crypto.randomBytes(16).toString('base64');\n\n strapi.config.set('plugin::users-permissions.jwtSecret', jwtSecret);\n\n if (!process.env.JWT_SECRET) {\n const envPath = process.env.ENV_PATH || '.env';\n strapi.fs.appendFile(envPath, `JWT_SECRET=${jwtSecret}\\n`);\n strapi.log.info(\n `The Users & Permissions plugin automatically generated a jwt secret and stored it in ${envPath} under the name JWT_SECRET.`\n );\n }\n }\n};\n"],"names":["crypto","require$$0","_","require$$1","getService","require$$2","usersPermissionsActions","require$$3","DEFAULT_ACCESS_TOKEN_LIFESPAN","DEFAULT_MAX_REFRESH_TOKEN_LIFESPAN","DEFAULT_IDLE_REFRESH_TOKEN_LIFESPAN","DEFAULT_MAX_SESSION_LIFESPAN","DEFAULT_IDLE_SESSION_LIFESPAN","require$$4","getSessionManager","manager","strapi","sessionManager","initGrant","pluginStore","allProviders","getAll","grantConfig","Object","entries","reduce","acc","name","provider","icon","enabled","prevGrantConfig","get","key","isEqual","keys","forEach","merge","set","value","initEmails","reset_password","display","options","from","email","response_email","object","message","email_confirmation","initAdvancedOptions","unique_email","allow_register","email_reset_password","email_confirmation_redirection","default_role","bootstrap","store","type","service","actionProvider","registerMany","actions","initialize","upConfig","config","defineOrigin","jwtSecret","accessTokenLifespan","sessions","maxRefreshTokenLifespan","idleRefreshTokenLifespan","maxSessionLifespan","idleSessionLifespan","algorithm","jwt","jwtOptions","process","env","NODE_ENV","Error","randomBytes","toString","JWT_SECRET","envPath","ENV_PATH","fs","appendFile","log","info"],"mappings":";;;;;;;;;;;;;AAEA;;;;;;AAMA,KACA,MAAMA,MAAAA,GAASC,UAAAA;AACf,IAAA,MAAMC,CAAAA,GAAIC,YAAAA;IACV,MAAM,EAAEC,UAAU,EAAE,GAAGC,eAAAA,EAAAA;AACvB,IAAA,MAAMC,yBAAAA,GAA0BC,iCAAAA,EAAAA;IAChC,MAAM,EACJC,6BAA6B,EAC7BC,kCAAkC,EAClCC,mCAAmC,EACnCC,4BAA4B,EAC5BC,6BAA6B,EAC9B,GAAGC,mBAAAA,EAAAA;AAEJ,IAAA,MAAMC,iBAAAA,GAAoB,IAAA;QACxB,MAAMC,OAAAA,GAAUC,OAAOC,cAAc;AACrC,QAAA,OAAOF,OAAAA,IAAW,IAAA;AACpB,IAAA,CAAA;AAEA,IAAA,MAAMG,YAAY,OAAOC,WAAAA,GAAAA;QACvB,MAAMC,YAAAA,GAAehB,UAAAA,CAAW,oBAAA,CAAA,CAAsBiB,MAAM,EAAA;QAE5D,MAAMC,WAAAA,GAAcC,MAAAA,CAAOC,OAAO,CAACJ,YAAAA,CAAAA,CAAcK,MAAM,CAAC,CAACC,GAAAA,EAAK,CAACC,IAAAA,EAAMC,QAAAA,CAAS,GAAA;AAC5E,YAAA,MAAM,EAAEC,IAAI,EAAEC,OAAO,EAAER,WAAW,EAAE,GAAGM,QAAAA;YAEvCF,GAAG,CAACC,KAAK,GAAG;AACVE,gBAAAA,IAAAA;AACAC,gBAAAA,OAAAA;AACA,gBAAA,GAAGR;AACT,aAAA;YACI,OAAOI,GAAAA;AACX,QAAA,CAAA,EAAK,EAAA,CAAA;AAEH,QAAA,MAAMK,eAAAA,GAAmB,MAAMZ,WAAAA,CAAYa,GAAG,CAAC;YAAEC,GAAAA,EAAK;cAAe;AAErE,QAAA,IAAI,CAACF,eAAAA,IAAmB,CAAC7B,EAAEgC,OAAO,CAACH,iBAAiBT,WAAAA,CAAAA,EAAc;;AAEhEpB,YAAAA,CAAAA,CAAEiC,IAAI,CAACb,WAAAA,CAAAA,CAAac,OAAO,CAAC,CAACH,GAAAA,GAAAA;AAC3B,gBAAA,IAAIA,OAAOF,eAAAA,EAAiB;AAC1BT,oBAAAA,WAAW,CAACW,GAAAA,CAAI,GAAG/B,CAAAA,CAAEmC,KAAK,CAACf,WAAW,CAACW,GAAAA,CAAI,EAAEF,eAAe,CAACE,GAAAA,CAAI,CAAA;AACzE,gBAAA;AACA,YAAA,CAAA,CAAA;YACI,MAAMd,WAAAA,CAAYmB,GAAG,CAAC;gBAAEL,GAAAA,EAAK,OAAA;gBAASM,KAAAA,EAAOjB;AAAW,aAAA,CAAA;AAC5D,QAAA;AACA,IAAA,CAAA;AAEA,IAAA,MAAMkB,aAAa,OAAOrB,WAAAA,GAAAA;AACxB,QAAA,IAAI,CAAE,MAAMA,WAAAA,CAAYa,GAAG,CAAC;YAAEC,GAAAA,EAAK;SAAO,CAAA,EAAM;AAC9C,YAAA,MAAMM,KAAAA,GAAQ;gBACZE,cAAAA,EAAgB;oBACdC,OAAAA,EAAS,+BAAA;oBACTb,IAAAA,EAAM,MAAA;oBACNc,OAAAA,EAAS;wBACPC,IAAAA,EAAM;4BACJjB,IAAAA,EAAM,sBAAA;4BACNkB,KAAAA,EAAO;AACnB,yBAAA;wBACUC,cAAAA,EAAgB,EAAA;wBAChBC,MAAAA,EAAQ,gBAAA;AACRC,wBAAAA,OAAAA,EAAS,CAAC;;;;;cAKN;AACd;AACA,iBAAA;gBACMC,kBAAAA,EAAoB;oBAClBP,OAAAA,EAAS,mCAAA;oBACTb,IAAAA,EAAM,cAAA;oBACNc,OAAAA,EAAS;wBACPC,IAAAA,EAAM;4BACJjB,IAAAA,EAAM,sBAAA;4BACNkB,KAAAA,EAAO;AACnB,yBAAA;wBACUC,cAAAA,EAAgB,EAAA;wBAChBC,MAAAA,EAAQ,sBAAA;AACRC,wBAAAA,OAAAA,EAAS,CAAC;;;;;;cAMN;AACd;AACA;AACA,aAAA;YAEI,MAAM7B,WAAAA,CAAYmB,GAAG,CAAC;gBAAEL,GAAAA,EAAK,OAAA;AAASM,gBAAAA;AAAK,aAAA,CAAA;AAC/C,QAAA;AACA,IAAA,CAAA;AAEA,IAAA,MAAMW,sBAAsB,OAAO/B,WAAAA,GAAAA;AACjC,QAAA,IAAI,CAAE,MAAMA,WAAAA,CAAYa,GAAG,CAAC;YAAEC,GAAAA,EAAK;SAAU,CAAA,EAAM;AACjD,YAAA,MAAMM,KAAAA,GAAQ;gBACZY,YAAAA,EAAc,IAAA;gBACdC,cAAAA,EAAgB,IAAA;gBAChBH,kBAAAA,EAAoB,KAAA;gBACpBI,oBAAAA,EAAsB,IAAA;gBACtBC,8BAAAA,EAAgC,IAAA;gBAChCC,YAAAA,EAAc;AACpB,aAAA;YAEI,MAAMpC,WAAAA,CAAYmB,GAAG,CAAC;gBAAEL,GAAAA,EAAK,UAAA;AAAYM,gBAAAA;AAAK,aAAA,CAAA;AAClD,QAAA;AACA,IAAA,CAAA;AAEAiB,IAAAA,SAAAA,GAAiB,OAAO,EAAExC,MAAAA,EAAAA,OAAM,EAAE,GAAA;QAChC,MAAMG,WAAAA,GAAcH,OAAAA,CAAOyC,KAAK,CAAC;YAAEC,IAAAA,EAAM,QAAA;YAAU/B,IAAAA,EAAM;AAAmB,SAAA,CAAA;AAE5E,QAAA,MAAMT,SAAAA,CAAUC,WAAAA,CAAAA;AAChB,QAAA,MAAMqB,UAAAA,CAAWrB,WAAAA,CAAAA;AACjB,QAAA,MAAM+B,mBAAAA,CAAoB/B,WAAAA,CAAAA;QAE1B,MAAMH,OAAAA,CACH2C,OAAO,CAAC,mBAAA,CAAA,CACRC,cAAc,CAACC,YAAY,CAACvD,yBAAAA,CAAwBwD,OAAO,CAAA;QAE9D,MAAM1D,UAAAA,CAAW,qBAAqB2D,UAAU,EAAA;;AAGhD,QAAA,MAAMC,QAAAA,GAAWhD,OAAAA,CAAOiD,MAAM,CAACjC,GAAG,CAAC,2BAAA,CAAA;AACnC,QAAA,MAAMf,cAAAA,GAAiBH,iBAAAA,EAAAA;AAEvB,QAAA,IAAIG,cAAAA,EAAgB;YAClBA,cAAAA,CAAeiD,YAAY,CAAC,mBAAA,EAAqB;AAC/CC,gBAAAA,SAAAA,EAAWH,SAASG,SAAS,IAAInD,QAAOiD,MAAM,CAACjC,GAAG,CAAC,mBAAA,CAAA;gBACnDoC,mBAAAA,EAAqBJ,QAAAA,CAASK,QAAQ,EAAED,mBAAAA,IAAuB5D,6BAAAA;gBAC/D8D,uBAAAA,EACEN,QAAAA,CAASK,QAAQ,EAAEC,uBAAAA,IAA2B7D,kCAAAA;gBAChD8D,wBAAAA,EACEP,QAAAA,CAASK,QAAQ,EAAEE,wBAAAA,IAA4B7D,mCAAAA;gBACjD8D,kBAAAA,EAAoBR,QAAAA,CAASK,QAAQ,EAAEG,kBAAAA,IAAsB7D,4BAAAA;gBAC7D8D,mBAAAA,EAAqBT,QAAAA,CAASK,QAAQ,EAAEI,mBAAAA,IAAuB7D,6BAAAA;gBAC/D8D,SAAAA,EAAWV,QAAAA,CAASW,GAAG,EAAED,SAAAA;gBACzBE,UAAAA,EAAYZ,QAAAA,CAASW,GAAG,IAAI;AAClC,aAAA,CAAA;AACA,QAAA;AAEE,QAAA,IAAI,CAAC3D,OAAAA,CAAOiD,MAAM,CAACjC,GAAG,CAAC,qCAAA,CAAA,EAAwC;AAC7D,YAAA,IAAI6C,OAAAA,CAAQC,GAAG,CAACC,QAAQ,KAAK,aAAA,EAAe;gBAC1C,MAAM,IAAIC,MACR,CAAC;yQACgQ,CAAC,CAAA;AAE1Q,YAAA;AAEI,YAAA,MAAMb,YAAYnE,MAAAA,CAAOiF,WAAW,CAAC,EAAA,CAAA,CAAIC,QAAQ,CAAC,QAAA,CAAA;AAElDlE,YAAAA,OAAAA,CAAOiD,MAAM,CAAC3B,GAAG,CAAC,qCAAA,EAAuC6B,SAAAA,CAAAA;AAEzD,YAAA,IAAI,CAACU,OAAAA,CAAQC,GAAG,CAACK,UAAU,EAAE;AAC3B,gBAAA,MAAMC,OAAAA,GAAUP,OAAAA,CAAQC,GAAG,CAACO,QAAQ,IAAI,MAAA;gBACxCrE,OAAAA,CAAOsE,EAAE,CAACC,UAAU,CAACH,OAAAA,EAAS,CAAC,WAAW,EAAEjB,SAAAA,CAAU,EAAE,CAAC,CAAA;gBACzDnD,OAAAA,CAAOwE,GAAG,CAACC,IAAI,CACb,CAAC,qFAAqF,EAAEL,OAAAA,CAAQ,2BAA2B,CAAC,CAAA;AAEpI,YAAA;AACA,QAAA;AACA,IAAA,CAAA;;;;;;"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.mjs","sources":["../../../server/bootstrap/index.js"],"sourcesContent":["'use strict';\n\n/**\n * An asynchronous bootstrap function that runs before\n * your application gets started.\n *\n * This gives you an opportunity to set up your data model,\n * run jobs, or perform some special logic.\n */\nconst crypto = require('crypto');\nconst _ = require('lodash');\nconst { getService } = require('../utils');\nconst usersPermissionsActions = require('./users-permissions-actions');\nconst {\n DEFAULT_ACCESS_TOKEN_LIFESPAN,\n DEFAULT_MAX_REFRESH_TOKEN_LIFESPAN,\n DEFAULT_IDLE_REFRESH_TOKEN_LIFESPAN,\n DEFAULT_MAX_SESSION_LIFESPAN,\n DEFAULT_IDLE_SESSION_LIFESPAN,\n} = require('../services/constants');\n\nconst getSessionManager = () => {\n const manager = strapi.sessionManager;\n return manager ?? null;\n};\n\nconst initGrant = async (pluginStore) => {\n const allProviders = getService('providers-registry').getAll();\n\n const grantConfig = Object.entries(allProviders).reduce((acc, [name, provider]) => {\n const { icon, enabled, grantConfig } = provider;\n\n acc[name] = {\n icon,\n enabled,\n ...grantConfig,\n };\n return acc;\n }, {});\n\n const prevGrantConfig = (await pluginStore.get({ key: 'grant' })) || {};\n\n if (!prevGrantConfig || !_.isEqual(prevGrantConfig, grantConfig)) {\n // merge with the previous provider config.\n _.keys(grantConfig).forEach((key) => {\n if (key in prevGrantConfig) {\n grantConfig[key] = _.merge(grantConfig[key], prevGrantConfig[key]);\n }\n });\n await pluginStore.set({ key: 'grant', value: grantConfig });\n }\n};\n\nconst initEmails = async (pluginStore) => {\n if (!(await pluginStore.get({ key: 'email' }))) {\n const value = {\n reset_password: {\n display: 'Email.template.reset_password',\n icon: 'sync',\n options: {\n from: {\n name: 'Administration Panel',\n email: 'no-reply@strapi.io',\n },\n response_email: '',\n object: 'Reset password',\n message: `<p>We heard that you lost your password. Sorry about that!</p>\n\n<p>But don’t worry! You can use the following link to reset your password:</p>\n<p><%= URL %>?code=<%= TOKEN %></p>\n\n<p>Thanks.</p>`,\n },\n },\n email_confirmation: {\n display: 'Email.template.email_confirmation',\n icon: 'check-square',\n options: {\n from: {\n name: 'Administration Panel',\n email: 'no-reply@strapi.io',\n },\n response_email: '',\n object: 'Account confirmation',\n message: `<p>Thank you for registering!</p>\n\n<p>You have to confirm your email address. Please click on the link below.</p>\n\n<p><%= URL %>?confirmation=<%= CODE %></p>\n\n<p>Thanks.</p>`,\n },\n },\n };\n\n await pluginStore.set({ key: 'email', value });\n }\n};\n\nconst initAdvancedOptions = async (pluginStore) => {\n if (!(await pluginStore.get({ key: 'advanced' }))) {\n const value = {\n unique_email: true,\n allow_register: true,\n email_confirmation: false,\n email_reset_password: null,\n email_confirmation_redirection: null,\n default_role: 'authenticated',\n };\n\n await pluginStore.set({ key: 'advanced', value });\n }\n};\n\nmodule.exports = async ({ strapi }) => {\n const pluginStore = strapi.store({ type: 'plugin', name: 'users-permissions' });\n\n await initGrant(pluginStore);\n await initEmails(pluginStore);\n await initAdvancedOptions(pluginStore);\n\n await strapi\n .service('admin::permission')\n .actionProvider.registerMany(usersPermissionsActions.actions);\n\n await getService('users-permissions').initialize();\n\n // Define users-permissions origin configuration for sessionManager\n const upConfig = strapi.config.get('plugin::users-permissions');\n const sessionManager = getSessionManager();\n\n if (sessionManager) {\n sessionManager.defineOrigin('users-permissions', {\n jwtSecret: upConfig.jwtSecret || strapi.config.get('admin.auth.secret'),\n accessTokenLifespan: upConfig.sessions?.accessTokenLifespan || DEFAULT_ACCESS_TOKEN_LIFESPAN,\n maxRefreshTokenLifespan:\n upConfig.sessions?.maxRefreshTokenLifespan || DEFAULT_MAX_REFRESH_TOKEN_LIFESPAN,\n idleRefreshTokenLifespan:\n upConfig.sessions?.idleRefreshTokenLifespan || DEFAULT_IDLE_REFRESH_TOKEN_LIFESPAN,\n maxSessionLifespan: upConfig.sessions?.maxSessionLifespan || DEFAULT_MAX_SESSION_LIFESPAN,\n idleSessionLifespan: upConfig.sessions?.idleSessionLifespan || DEFAULT_IDLE_SESSION_LIFESPAN,\n algorithm: upConfig.jwt?.algorithm,\n jwtOptions: upConfig.jwt || {},\n });\n }\n\n if (!strapi.config.get('plugin::users-permissions.jwtSecret')) {\n if (process.env.NODE_ENV !== 'development') {\n throw new Error(\n `Missing jwtSecret. Please, set configuration variable \"jwtSecret\" for the users-permissions plugin in config/plugins.js (ex: you can generate one using Node with \\`crypto.randomBytes(16).toString('base64')\\`).\nFor security reasons, prefer storing the secret in an environment variable and read it in config/plugins.js. See https://docs.strapi.io/developer-docs/latest/setup-deployment-guides/configurations/optional/environment.html#configuration-using-environment-variables.`\n );\n }\n\n const jwtSecret = crypto.randomBytes(16).toString('base64');\n\n strapi.config.set('plugin::users-permissions.jwtSecret', jwtSecret);\n\n if (!process.env.JWT_SECRET) {\n const envPath = process.env.ENV_PATH || '.env';\n strapi.fs.appendFile(envPath, `JWT_SECRET=${jwtSecret}\\n`);\n strapi.log.info(\n `The Users & Permissions plugin automatically generated a jwt secret and stored it in ${envPath} under the name JWT_SECRET.`\n );\n }\n }\n};\n"],"names":["crypto","require$$0","_","require$$1","getService","require$$2","usersPermissionsActions","require$$3","DEFAULT_ACCESS_TOKEN_LIFESPAN","DEFAULT_MAX_REFRESH_TOKEN_LIFESPAN","DEFAULT_IDLE_REFRESH_TOKEN_LIFESPAN","DEFAULT_MAX_SESSION_LIFESPAN","DEFAULT_IDLE_SESSION_LIFESPAN","require$$4","getSessionManager","manager","strapi","sessionManager","initGrant","pluginStore","allProviders","getAll","grantConfig","Object","entries","reduce","acc","name","provider","icon","enabled","prevGrantConfig","get","key","isEqual","keys","forEach","merge","set","value","initEmails","reset_password","display","options","from","email","response_email","object","message","email_confirmation","initAdvancedOptions","unique_email","allow_register","email_reset_password","email_confirmation_redirection","default_role","bootstrap","store","type","service","actionProvider","registerMany","actions","initialize","upConfig","config","defineOrigin","jwtSecret","accessTokenLifespan","sessions","maxRefreshTokenLifespan","idleRefreshTokenLifespan","maxSessionLifespan","idleSessionLifespan","algorithm","jwt","jwtOptions","process","env","NODE_ENV","Error","randomBytes","toString","JWT_SECRET","envPath","ENV_PATH","fs","appendFile","log","info"],"mappings":";;;;;;;;;;;AAEA;;;;;;AAMA,KACA,MAAMA,MAASC,GAAAA,UAAAA;AACf,IAAA,MAAMC,CAAIC,GAAAA,YAAAA;IACV,MAAM,EAAEC,UAAU,EAAE,GAAGC,YAAAA,EAAAA;AACvB,IAAA,MAAMC,uBAA0BC,GAAAA,8BAAAA,EAAAA;IAChC,MAAM,EACJC,6BAA6B,EAC7BC,kCAAkC,EAClCC,mCAAmC,EACnCC,4BAA4B,EAC5BC,6BAA6B,EAC9B,GAAGC,gBAAAA,EAAAA;AAEJ,IAAA,MAAMC,iBAAoB,GAAA,IAAA;QACxB,MAAMC,OAAAA,GAAUC,OAAOC,cAAc;AACrC,QAAA,OAAOF,OAAW,IAAA,IAAA;AACpB,KAAA;AAEA,IAAA,MAAMG,YAAY,OAAOC,WAAAA,GAAAA;QACvB,MAAMC,YAAAA,GAAehB,UAAW,CAAA,oBAAA,CAAA,CAAsBiB,MAAM,EAAA;QAE5D,MAAMC,WAAAA,GAAcC,MAAOC,CAAAA,OAAO,CAACJ,YAAAA,CAAAA,CAAcK,MAAM,CAAC,CAACC,GAAAA,EAAK,CAACC,IAAAA,EAAMC,QAAS,CAAA,GAAA;AAC5E,YAAA,MAAM,EAAEC,IAAI,EAAEC,OAAO,EAAER,WAAW,EAAE,GAAGM,QAAAA;YAEvCF,GAAG,CAACC,KAAK,GAAG;AACVE,gBAAAA,IAAAA;AACAC,gBAAAA,OAAAA;AACA,gBAAA,GAAGR;AACT,aAAA;YACI,OAAOI,GAAAA;AACR,SAAA,EAAE,EAAE,CAAA;AAEL,QAAA,MAAMK,eAAkB,GAAC,MAAMZ,WAAAA,CAAYa,GAAG,CAAC;YAAEC,GAAK,EAAA;cAAe;AAErE,QAAA,IAAI,CAACF,eAAmB,IAAA,CAAC7B,EAAEgC,OAAO,CAACH,iBAAiBT,WAAc,CAAA,EAAA;;AAEhEpB,YAAAA,CAAAA,CAAEiC,IAAI,CAACb,WAAac,CAAAA,CAAAA,OAAO,CAAC,CAACH,GAAAA,GAAAA;AAC3B,gBAAA,IAAIA,OAAOF,eAAiB,EAAA;AAC1BT,oBAAAA,WAAW,CAACW,GAAAA,CAAI,GAAG/B,CAAAA,CAAEmC,KAAK,CAACf,WAAW,CAACW,GAAI,CAAA,EAAEF,eAAe,CAACE,GAAI,CAAA,CAAA;AAClE;AACP,aAAA,CAAA;YACI,MAAMd,WAAAA,CAAYmB,GAAG,CAAC;gBAAEL,GAAK,EAAA,OAAA;gBAASM,KAAOjB,EAAAA;AAAW,aAAA,CAAA;AACzD;AACH,KAAA;AAEA,IAAA,MAAMkB,aAAa,OAAOrB,WAAAA,GAAAA;AACxB,QAAA,IAAI,CAAE,MAAMA,WAAYa,CAAAA,GAAG,CAAC;YAAEC,GAAK,EAAA;SAAa,CAAA,EAAA;AAC9C,YAAA,MAAMM,KAAQ,GAAA;gBACZE,cAAgB,EAAA;oBACdC,OAAS,EAAA,+BAAA;oBACTb,IAAM,EAAA,MAAA;oBACNc,OAAS,EAAA;wBACPC,IAAM,EAAA;4BACJjB,IAAM,EAAA,sBAAA;4BACNkB,KAAO,EAAA;AACR,yBAAA;wBACDC,cAAgB,EAAA,EAAA;wBAChBC,MAAQ,EAAA,gBAAA;AACRC,wBAAAA,OAAAA,EAAS,CAAC;;;;;cAKN;AACL;AACF,iBAAA;gBACDC,kBAAoB,EAAA;oBAClBP,OAAS,EAAA,mCAAA;oBACTb,IAAM,EAAA,cAAA;oBACNc,OAAS,EAAA;wBACPC,IAAM,EAAA;4BACJjB,IAAM,EAAA,sBAAA;4BACNkB,KAAO,EAAA;AACR,yBAAA;wBACDC,cAAgB,EAAA,EAAA;wBAChBC,MAAQ,EAAA,sBAAA;AACRC,wBAAAA,OAAAA,EAAS,CAAC;;;;;;cAMN;AACL;AACF;AACP,aAAA;YAEI,MAAM7B,WAAAA,CAAYmB,GAAG,CAAC;gBAAEL,GAAK,EAAA,OAAA;AAASM,gBAAAA;AAAK,aAAA,CAAA;AAC5C;AACH,KAAA;AAEA,IAAA,MAAMW,sBAAsB,OAAO/B,WAAAA,GAAAA;AACjC,QAAA,IAAI,CAAE,MAAMA,WAAYa,CAAAA,GAAG,CAAC;YAAEC,GAAK,EAAA;SAAgB,CAAA,EAAA;AACjD,YAAA,MAAMM,KAAQ,GAAA;gBACZY,YAAc,EAAA,IAAA;gBACdC,cAAgB,EAAA,IAAA;gBAChBH,kBAAoB,EAAA,KAAA;gBACpBI,oBAAsB,EAAA,IAAA;gBACtBC,8BAAgC,EAAA,IAAA;gBAChCC,YAAc,EAAA;AACpB,aAAA;YAEI,MAAMpC,WAAAA,CAAYmB,GAAG,CAAC;gBAAEL,GAAK,EAAA,UAAA;AAAYM,gBAAAA;AAAK,aAAA,CAAA;AAC/C;AACH,KAAA;AAEAiB,IAAAA,SAAAA,GAAiB,OAAO,EAAExC,MAAAA,EAAAA,OAAM,EAAE,GAAA;QAChC,MAAMG,WAAAA,GAAcH,OAAOyC,CAAAA,KAAK,CAAC;YAAEC,IAAM,EAAA,QAAA;YAAU/B,IAAM,EAAA;AAAmB,SAAA,CAAA;AAE5E,QAAA,MAAMT,SAAUC,CAAAA,WAAAA,CAAAA;AAChB,QAAA,MAAMqB,UAAWrB,CAAAA,WAAAA,CAAAA;AACjB,QAAA,MAAM+B,mBAAoB/B,CAAAA,WAAAA,CAAAA;QAE1B,MAAMH,OAAAA,CACH2C,OAAO,CAAC,mBAAA,CAAA,CACRC,cAAc,CAACC,YAAY,CAACvD,uBAAAA,CAAwBwD,OAAO,CAAA;QAE9D,MAAM1D,UAAAA,CAAW,qBAAqB2D,UAAU,EAAA;;AAGhD,QAAA,MAAMC,QAAWhD,GAAAA,OAAAA,CAAOiD,MAAM,CAACjC,GAAG,CAAC,2BAAA,CAAA;AACnC,QAAA,MAAMf,cAAiBH,GAAAA,iBAAAA,EAAAA;AAEvB,QAAA,IAAIG,cAAgB,EAAA;YAClBA,cAAeiD,CAAAA,YAAY,CAAC,mBAAqB,EAAA;AAC/CC,gBAAAA,SAAAA,EAAWH,SAASG,SAAS,IAAInD,QAAOiD,MAAM,CAACjC,GAAG,CAAC,mBAAA,CAAA;gBACnDoC,mBAAqBJ,EAAAA,QAAAA,CAASK,QAAQ,EAAED,mBAAuB5D,IAAAA,6BAAAA;gBAC/D8D,uBACEN,EAAAA,QAAAA,CAASK,QAAQ,EAAEC,uBAA2B7D,IAAAA,kCAAAA;gBAChD8D,wBACEP,EAAAA,QAAAA,CAASK,QAAQ,EAAEE,wBAA4B7D,IAAAA,mCAAAA;gBACjD8D,kBAAoBR,EAAAA,QAAAA,CAASK,QAAQ,EAAEG,kBAAsB7D,IAAAA,4BAAAA;gBAC7D8D,mBAAqBT,EAAAA,QAAAA,CAASK,QAAQ,EAAEI,mBAAuB7D,IAAAA,6BAAAA;gBAC/D8D,SAAWV,EAAAA,QAAAA,CAASW,GAAG,EAAED,SAAAA;gBACzBE,UAAYZ,EAAAA,QAAAA,CAASW,GAAG,IAAI;AAClC,aAAA,CAAA;AACG;AAED,QAAA,IAAI,CAAC3D,OAAOiD,CAAAA,MAAM,CAACjC,GAAG,CAAC,qCAAwC,CAAA,EAAA;AAC7D,YAAA,IAAI6C,OAAQC,CAAAA,GAAG,CAACC,QAAQ,KAAK,aAAe,EAAA;gBAC1C,MAAM,IAAIC,MACR,CAAC;yQACgQ,CAAC,CAAA;AAErQ;AAED,YAAA,MAAMb,YAAYnE,MAAOiF,CAAAA,WAAW,CAAC,EAAA,CAAA,CAAIC,QAAQ,CAAC,QAAA,CAAA;AAElDlE,YAAAA,OAAAA,CAAOiD,MAAM,CAAC3B,GAAG,CAAC,qCAAuC6B,EAAAA,SAAAA,CAAAA;AAEzD,YAAA,IAAI,CAACU,OAAAA,CAAQC,GAAG,CAACK,UAAU,EAAE;AAC3B,gBAAA,MAAMC,OAAUP,GAAAA,OAAAA,CAAQC,GAAG,CAACO,QAAQ,IAAI,MAAA;gBACxCrE,OAAOsE,CAAAA,EAAE,CAACC,UAAU,CAACH,OAAAA,EAAS,CAAC,WAAW,EAAEjB,SAAU,CAAA,EAAE,CAAC,CAAA;gBACzDnD,OAAOwE,CAAAA,GAAG,CAACC,IAAI,CACb,CAAC,qFAAqF,EAAEL,OAAQ,CAAA,2BAA2B,CAAC,CAAA;AAE/H;AACF;AACH,KAAA;;;;;;"}
|
|
1
|
+
{"version":3,"file":"index.mjs","sources":["../../../server/bootstrap/index.js"],"sourcesContent":["'use strict';\n\n/**\n * An asynchronous bootstrap function that runs before\n * your application gets started.\n *\n * This gives you an opportunity to set up your data model,\n * run jobs, or perform some special logic.\n */\nconst crypto = require('crypto');\nconst _ = require('lodash');\nconst { getService } = require('../utils');\nconst usersPermissionsActions = require('./users-permissions-actions');\nconst {\n DEFAULT_ACCESS_TOKEN_LIFESPAN,\n DEFAULT_MAX_REFRESH_TOKEN_LIFESPAN,\n DEFAULT_IDLE_REFRESH_TOKEN_LIFESPAN,\n DEFAULT_MAX_SESSION_LIFESPAN,\n DEFAULT_IDLE_SESSION_LIFESPAN,\n} = require('../services/constants');\n\nconst getSessionManager = () => {\n const manager = strapi.sessionManager;\n return manager ?? null;\n};\n\nconst initGrant = async (pluginStore) => {\n const allProviders = getService('providers-registry').getAll();\n\n const grantConfig = Object.entries(allProviders).reduce((acc, [name, provider]) => {\n const { icon, enabled, grantConfig } = provider;\n\n acc[name] = {\n icon,\n enabled,\n ...grantConfig,\n };\n return acc;\n }, {});\n\n const prevGrantConfig = (await pluginStore.get({ key: 'grant' })) || {};\n\n if (!prevGrantConfig || !_.isEqual(prevGrantConfig, grantConfig)) {\n // merge with the previous provider config.\n _.keys(grantConfig).forEach((key) => {\n if (key in prevGrantConfig) {\n grantConfig[key] = _.merge(grantConfig[key], prevGrantConfig[key]);\n }\n });\n await pluginStore.set({ key: 'grant', value: grantConfig });\n }\n};\n\nconst initEmails = async (pluginStore) => {\n if (!(await pluginStore.get({ key: 'email' }))) {\n const value = {\n reset_password: {\n display: 'Email.template.reset_password',\n icon: 'sync',\n options: {\n from: {\n name: 'Administration Panel',\n email: 'no-reply@strapi.io',\n },\n response_email: '',\n object: 'Reset password',\n message: `<p>We heard that you lost your password. Sorry about that!</p>\n\n<p>But don’t worry! You can use the following link to reset your password:</p>\n<p><%= URL %>?code=<%= TOKEN %></p>\n\n<p>Thanks.</p>`,\n },\n },\n email_confirmation: {\n display: 'Email.template.email_confirmation',\n icon: 'check-square',\n options: {\n from: {\n name: 'Administration Panel',\n email: 'no-reply@strapi.io',\n },\n response_email: '',\n object: 'Account confirmation',\n message: `<p>Thank you for registering!</p>\n\n<p>You have to confirm your email address. Please click on the link below.</p>\n\n<p><%= URL %>?confirmation=<%= CODE %></p>\n\n<p>Thanks.</p>`,\n },\n },\n };\n\n await pluginStore.set({ key: 'email', value });\n }\n};\n\nconst initAdvancedOptions = async (pluginStore) => {\n if (!(await pluginStore.get({ key: 'advanced' }))) {\n const value = {\n unique_email: true,\n allow_register: true,\n email_confirmation: false,\n email_reset_password: null,\n email_confirmation_redirection: null,\n default_role: 'authenticated',\n };\n\n await pluginStore.set({ key: 'advanced', value });\n }\n};\n\nmodule.exports = async ({ strapi }) => {\n const pluginStore = strapi.store({ type: 'plugin', name: 'users-permissions' });\n\n await initGrant(pluginStore);\n await initEmails(pluginStore);\n await initAdvancedOptions(pluginStore);\n\n await strapi\n .service('admin::permission')\n .actionProvider.registerMany(usersPermissionsActions.actions);\n\n await getService('users-permissions').initialize();\n\n // Define users-permissions origin configuration for sessionManager\n const upConfig = strapi.config.get('plugin::users-permissions');\n const sessionManager = getSessionManager();\n\n if (sessionManager) {\n sessionManager.defineOrigin('users-permissions', {\n jwtSecret: upConfig.jwtSecret || strapi.config.get('admin.auth.secret'),\n accessTokenLifespan: upConfig.sessions?.accessTokenLifespan || DEFAULT_ACCESS_TOKEN_LIFESPAN,\n maxRefreshTokenLifespan:\n upConfig.sessions?.maxRefreshTokenLifespan || DEFAULT_MAX_REFRESH_TOKEN_LIFESPAN,\n idleRefreshTokenLifespan:\n upConfig.sessions?.idleRefreshTokenLifespan || DEFAULT_IDLE_REFRESH_TOKEN_LIFESPAN,\n maxSessionLifespan: upConfig.sessions?.maxSessionLifespan || DEFAULT_MAX_SESSION_LIFESPAN,\n idleSessionLifespan: upConfig.sessions?.idleSessionLifespan || DEFAULT_IDLE_SESSION_LIFESPAN,\n algorithm: upConfig.jwt?.algorithm,\n jwtOptions: upConfig.jwt || {},\n });\n }\n\n if (!strapi.config.get('plugin::users-permissions.jwtSecret')) {\n if (process.env.NODE_ENV !== 'development') {\n throw new Error(\n `Missing jwtSecret. Please, set configuration variable \"jwtSecret\" for the users-permissions plugin in config/plugins.js (ex: you can generate one using Node with \\`crypto.randomBytes(16).toString('base64')\\`).\nFor security reasons, prefer storing the secret in an environment variable and read it in config/plugins.js. See https://docs.strapi.io/developer-docs/latest/setup-deployment-guides/configurations/optional/environment.html#configuration-using-environment-variables.`\n );\n }\n\n const jwtSecret = crypto.randomBytes(16).toString('base64');\n\n strapi.config.set('plugin::users-permissions.jwtSecret', jwtSecret);\n\n if (!process.env.JWT_SECRET) {\n const envPath = process.env.ENV_PATH || '.env';\n strapi.fs.appendFile(envPath, `JWT_SECRET=${jwtSecret}\\n`);\n strapi.log.info(\n `The Users & Permissions plugin automatically generated a jwt secret and stored it in ${envPath} under the name JWT_SECRET.`\n );\n }\n }\n};\n"],"names":["crypto","require$$0","_","require$$1","getService","require$$2","usersPermissionsActions","require$$3","DEFAULT_ACCESS_TOKEN_LIFESPAN","DEFAULT_MAX_REFRESH_TOKEN_LIFESPAN","DEFAULT_IDLE_REFRESH_TOKEN_LIFESPAN","DEFAULT_MAX_SESSION_LIFESPAN","DEFAULT_IDLE_SESSION_LIFESPAN","require$$4","getSessionManager","manager","strapi","sessionManager","initGrant","pluginStore","allProviders","getAll","grantConfig","Object","entries","reduce","acc","name","provider","icon","enabled","prevGrantConfig","get","key","isEqual","keys","forEach","merge","set","value","initEmails","reset_password","display","options","from","email","response_email","object","message","email_confirmation","initAdvancedOptions","unique_email","allow_register","email_reset_password","email_confirmation_redirection","default_role","bootstrap","store","type","service","actionProvider","registerMany","actions","initialize","upConfig","config","defineOrigin","jwtSecret","accessTokenLifespan","sessions","maxRefreshTokenLifespan","idleRefreshTokenLifespan","maxSessionLifespan","idleSessionLifespan","algorithm","jwt","jwtOptions","process","env","NODE_ENV","Error","randomBytes","toString","JWT_SECRET","envPath","ENV_PATH","fs","appendFile","log","info"],"mappings":";;;;;;;;;;;AAEA;;;;;;AAMA,KACA,MAAMA,MAAAA,GAASC,UAAAA;AACf,IAAA,MAAMC,CAAAA,GAAIC,YAAAA;IACV,MAAM,EAAEC,UAAU,EAAE,GAAGC,YAAAA,EAAAA;AACvB,IAAA,MAAMC,uBAAAA,GAA0BC,8BAAAA,EAAAA;IAChC,MAAM,EACJC,6BAA6B,EAC7BC,kCAAkC,EAClCC,mCAAmC,EACnCC,4BAA4B,EAC5BC,6BAA6B,EAC9B,GAAGC,gBAAAA,EAAAA;AAEJ,IAAA,MAAMC,iBAAAA,GAAoB,IAAA;QACxB,MAAMC,OAAAA,GAAUC,OAAOC,cAAc;AACrC,QAAA,OAAOF,OAAAA,IAAW,IAAA;AACpB,IAAA,CAAA;AAEA,IAAA,MAAMG,YAAY,OAAOC,WAAAA,GAAAA;QACvB,MAAMC,YAAAA,GAAehB,UAAAA,CAAW,oBAAA,CAAA,CAAsBiB,MAAM,EAAA;QAE5D,MAAMC,WAAAA,GAAcC,MAAAA,CAAOC,OAAO,CAACJ,YAAAA,CAAAA,CAAcK,MAAM,CAAC,CAACC,GAAAA,EAAK,CAACC,IAAAA,EAAMC,QAAAA,CAAS,GAAA;AAC5E,YAAA,MAAM,EAAEC,IAAI,EAAEC,OAAO,EAAER,WAAW,EAAE,GAAGM,QAAAA;YAEvCF,GAAG,CAACC,KAAK,GAAG;AACVE,gBAAAA,IAAAA;AACAC,gBAAAA,OAAAA;AACA,gBAAA,GAAGR;AACT,aAAA;YACI,OAAOI,GAAAA;AACX,QAAA,CAAA,EAAK,EAAA,CAAA;AAEH,QAAA,MAAMK,eAAAA,GAAmB,MAAMZ,WAAAA,CAAYa,GAAG,CAAC;YAAEC,GAAAA,EAAK;cAAe;AAErE,QAAA,IAAI,CAACF,eAAAA,IAAmB,CAAC7B,EAAEgC,OAAO,CAACH,iBAAiBT,WAAAA,CAAAA,EAAc;;AAEhEpB,YAAAA,CAAAA,CAAEiC,IAAI,CAACb,WAAAA,CAAAA,CAAac,OAAO,CAAC,CAACH,GAAAA,GAAAA;AAC3B,gBAAA,IAAIA,OAAOF,eAAAA,EAAiB;AAC1BT,oBAAAA,WAAW,CAACW,GAAAA,CAAI,GAAG/B,CAAAA,CAAEmC,KAAK,CAACf,WAAW,CAACW,GAAAA,CAAI,EAAEF,eAAe,CAACE,GAAAA,CAAI,CAAA;AACzE,gBAAA;AACA,YAAA,CAAA,CAAA;YACI,MAAMd,WAAAA,CAAYmB,GAAG,CAAC;gBAAEL,GAAAA,EAAK,OAAA;gBAASM,KAAAA,EAAOjB;AAAW,aAAA,CAAA;AAC5D,QAAA;AACA,IAAA,CAAA;AAEA,IAAA,MAAMkB,aAAa,OAAOrB,WAAAA,GAAAA;AACxB,QAAA,IAAI,CAAE,MAAMA,WAAAA,CAAYa,GAAG,CAAC;YAAEC,GAAAA,EAAK;SAAO,CAAA,EAAM;AAC9C,YAAA,MAAMM,KAAAA,GAAQ;gBACZE,cAAAA,EAAgB;oBACdC,OAAAA,EAAS,+BAAA;oBACTb,IAAAA,EAAM,MAAA;oBACNc,OAAAA,EAAS;wBACPC,IAAAA,EAAM;4BACJjB,IAAAA,EAAM,sBAAA;4BACNkB,KAAAA,EAAO;AACnB,yBAAA;wBACUC,cAAAA,EAAgB,EAAA;wBAChBC,MAAAA,EAAQ,gBAAA;AACRC,wBAAAA,OAAAA,EAAS,CAAC;;;;;cAKN;AACd;AACA,iBAAA;gBACMC,kBAAAA,EAAoB;oBAClBP,OAAAA,EAAS,mCAAA;oBACTb,IAAAA,EAAM,cAAA;oBACNc,OAAAA,EAAS;wBACPC,IAAAA,EAAM;4BACJjB,IAAAA,EAAM,sBAAA;4BACNkB,KAAAA,EAAO;AACnB,yBAAA;wBACUC,cAAAA,EAAgB,EAAA;wBAChBC,MAAAA,EAAQ,sBAAA;AACRC,wBAAAA,OAAAA,EAAS,CAAC;;;;;;cAMN;AACd;AACA;AACA,aAAA;YAEI,MAAM7B,WAAAA,CAAYmB,GAAG,CAAC;gBAAEL,GAAAA,EAAK,OAAA;AAASM,gBAAAA;AAAK,aAAA,CAAA;AAC/C,QAAA;AACA,IAAA,CAAA;AAEA,IAAA,MAAMW,sBAAsB,OAAO/B,WAAAA,GAAAA;AACjC,QAAA,IAAI,CAAE,MAAMA,WAAAA,CAAYa,GAAG,CAAC;YAAEC,GAAAA,EAAK;SAAU,CAAA,EAAM;AACjD,YAAA,MAAMM,KAAAA,GAAQ;gBACZY,YAAAA,EAAc,IAAA;gBACdC,cAAAA,EAAgB,IAAA;gBAChBH,kBAAAA,EAAoB,KAAA;gBACpBI,oBAAAA,EAAsB,IAAA;gBACtBC,8BAAAA,EAAgC,IAAA;gBAChCC,YAAAA,EAAc;AACpB,aAAA;YAEI,MAAMpC,WAAAA,CAAYmB,GAAG,CAAC;gBAAEL,GAAAA,EAAK,UAAA;AAAYM,gBAAAA;AAAK,aAAA,CAAA;AAClD,QAAA;AACA,IAAA,CAAA;AAEAiB,IAAAA,SAAAA,GAAiB,OAAO,EAAExC,MAAAA,EAAAA,OAAM,EAAE,GAAA;QAChC,MAAMG,WAAAA,GAAcH,OAAAA,CAAOyC,KAAK,CAAC;YAAEC,IAAAA,EAAM,QAAA;YAAU/B,IAAAA,EAAM;AAAmB,SAAA,CAAA;AAE5E,QAAA,MAAMT,SAAAA,CAAUC,WAAAA,CAAAA;AAChB,QAAA,MAAMqB,UAAAA,CAAWrB,WAAAA,CAAAA;AACjB,QAAA,MAAM+B,mBAAAA,CAAoB/B,WAAAA,CAAAA;QAE1B,MAAMH,OAAAA,CACH2C,OAAO,CAAC,mBAAA,CAAA,CACRC,cAAc,CAACC,YAAY,CAACvD,uBAAAA,CAAwBwD,OAAO,CAAA;QAE9D,MAAM1D,UAAAA,CAAW,qBAAqB2D,UAAU,EAAA;;AAGhD,QAAA,MAAMC,QAAAA,GAAWhD,OAAAA,CAAOiD,MAAM,CAACjC,GAAG,CAAC,2BAAA,CAAA;AACnC,QAAA,MAAMf,cAAAA,GAAiBH,iBAAAA,EAAAA;AAEvB,QAAA,IAAIG,cAAAA,EAAgB;YAClBA,cAAAA,CAAeiD,YAAY,CAAC,mBAAA,EAAqB;AAC/CC,gBAAAA,SAAAA,EAAWH,SAASG,SAAS,IAAInD,QAAOiD,MAAM,CAACjC,GAAG,CAAC,mBAAA,CAAA;gBACnDoC,mBAAAA,EAAqBJ,QAAAA,CAASK,QAAQ,EAAED,mBAAAA,IAAuB5D,6BAAAA;gBAC/D8D,uBAAAA,EACEN,QAAAA,CAASK,QAAQ,EAAEC,uBAAAA,IAA2B7D,kCAAAA;gBAChD8D,wBAAAA,EACEP,QAAAA,CAASK,QAAQ,EAAEE,wBAAAA,IAA4B7D,mCAAAA;gBACjD8D,kBAAAA,EAAoBR,QAAAA,CAASK,QAAQ,EAAEG,kBAAAA,IAAsB7D,4BAAAA;gBAC7D8D,mBAAAA,EAAqBT,QAAAA,CAASK,QAAQ,EAAEI,mBAAAA,IAAuB7D,6BAAAA;gBAC/D8D,SAAAA,EAAWV,QAAAA,CAASW,GAAG,EAAED,SAAAA;gBACzBE,UAAAA,EAAYZ,QAAAA,CAASW,GAAG,IAAI;AAClC,aAAA,CAAA;AACA,QAAA;AAEE,QAAA,IAAI,CAAC3D,OAAAA,CAAOiD,MAAM,CAACjC,GAAG,CAAC,qCAAA,CAAA,EAAwC;AAC7D,YAAA,IAAI6C,OAAAA,CAAQC,GAAG,CAACC,QAAQ,KAAK,aAAA,EAAe;gBAC1C,MAAM,IAAIC,MACR,CAAC;yQACgQ,CAAC,CAAA;AAE1Q,YAAA;AAEI,YAAA,MAAMb,YAAYnE,MAAAA,CAAOiF,WAAW,CAAC,EAAA,CAAA,CAAIC,QAAQ,CAAC,QAAA,CAAA;AAElDlE,YAAAA,OAAAA,CAAOiD,MAAM,CAAC3B,GAAG,CAAC,qCAAA,EAAuC6B,SAAAA,CAAAA;AAEzD,YAAA,IAAI,CAACU,OAAAA,CAAQC,GAAG,CAACK,UAAU,EAAE;AAC3B,gBAAA,MAAMC,OAAAA,GAAUP,OAAAA,CAAQC,GAAG,CAACO,QAAQ,IAAI,MAAA;gBACxCrE,OAAAA,CAAOsE,EAAE,CAACC,UAAU,CAACH,OAAAA,EAAS,CAAC,WAAW,EAAEjB,SAAAA,CAAU,EAAE,CAAC,CAAA;gBACzDnD,OAAAA,CAAOwE,GAAG,CAACC,IAAI,CACb,CAAC,qFAAqF,EAAEL,OAAAA,CAAQ,2BAA2B,CAAC,CAAA;AAEpI,YAAA;AACA,QAAA;AACA,IAAA,CAAA;;;;;;"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"users-permissions-actions.js","sources":["../../../server/bootstrap/users-permissions-actions.js"],"sourcesContent":["'use strict';\n\nmodule.exports = {\n actions: [\n {\n // Roles\n section: 'plugins',\n displayName: 'Create',\n uid: 'roles.create',\n subCategory: 'roles',\n pluginName: 'users-permissions',\n },\n {\n section: 'plugins',\n displayName: 'Read',\n uid: 'roles.read',\n subCategory: 'roles',\n pluginName: 'users-permissions',\n aliases: [\n {\n actionId: 'plugin::content-manager.explorer.read',\n subjects: ['plugin::users-permissions.role'],\n },\n ],\n },\n {\n section: 'plugins',\n displayName: 'Update',\n uid: 'roles.update',\n subCategory: 'roles',\n pluginName: 'users-permissions',\n },\n {\n section: 'plugins',\n displayName: 'Delete',\n uid: 'roles.delete',\n subCategory: 'roles',\n pluginName: 'users-permissions',\n },\n {\n // providers\n section: 'plugins',\n displayName: 'Read',\n uid: 'providers.read',\n subCategory: 'providers',\n pluginName: 'users-permissions',\n },\n {\n section: 'plugins',\n displayName: 'Edit',\n uid: 'providers.update',\n subCategory: 'providers',\n pluginName: 'users-permissions',\n },\n {\n // emailTemplates\n section: 'plugins',\n displayName: 'Read',\n uid: 'email-templates.read',\n subCategory: 'emailTemplates',\n pluginName: 'users-permissions',\n },\n {\n section: 'plugins',\n displayName: 'Edit',\n uid: 'email-templates.update',\n subCategory: 'emailTemplates',\n pluginName: 'users-permissions',\n },\n {\n // advancedSettings\n section: 'plugins',\n displayName: 'Read',\n uid: 'advanced-settings.read',\n subCategory: 'advancedSettings',\n pluginName: 'users-permissions',\n },\n {\n section: 'plugins',\n displayName: 'Edit',\n uid: 'advanced-settings.update',\n subCategory: 'advancedSettings',\n pluginName: 'users-permissions',\n },\n ],\n};\n"],"names":["usersPermissionsActions","actions","section","displayName","uid","subCategory","pluginName","aliases","actionId","subjects"],"mappings":";;;;;;;IAEAA,
|
|
1
|
+
{"version":3,"file":"users-permissions-actions.js","sources":["../../../server/bootstrap/users-permissions-actions.js"],"sourcesContent":["'use strict';\n\nmodule.exports = {\n actions: [\n {\n // Roles\n section: 'plugins',\n displayName: 'Create',\n uid: 'roles.create',\n subCategory: 'roles',\n pluginName: 'users-permissions',\n },\n {\n section: 'plugins',\n displayName: 'Read',\n uid: 'roles.read',\n subCategory: 'roles',\n pluginName: 'users-permissions',\n aliases: [\n {\n actionId: 'plugin::content-manager.explorer.read',\n subjects: ['plugin::users-permissions.role'],\n },\n ],\n },\n {\n section: 'plugins',\n displayName: 'Update',\n uid: 'roles.update',\n subCategory: 'roles',\n pluginName: 'users-permissions',\n },\n {\n section: 'plugins',\n displayName: 'Delete',\n uid: 'roles.delete',\n subCategory: 'roles',\n pluginName: 'users-permissions',\n },\n {\n // providers\n section: 'plugins',\n displayName: 'Read',\n uid: 'providers.read',\n subCategory: 'providers',\n pluginName: 'users-permissions',\n },\n {\n section: 'plugins',\n displayName: 'Edit',\n uid: 'providers.update',\n subCategory: 'providers',\n pluginName: 'users-permissions',\n },\n {\n // emailTemplates\n section: 'plugins',\n displayName: 'Read',\n uid: 'email-templates.read',\n subCategory: 'emailTemplates',\n pluginName: 'users-permissions',\n },\n {\n section: 'plugins',\n displayName: 'Edit',\n uid: 'email-templates.update',\n subCategory: 'emailTemplates',\n pluginName: 'users-permissions',\n },\n {\n // advancedSettings\n section: 'plugins',\n displayName: 'Read',\n uid: 'advanced-settings.read',\n subCategory: 'advancedSettings',\n pluginName: 'users-permissions',\n },\n {\n section: 'plugins',\n displayName: 'Edit',\n uid: 'advanced-settings.update',\n subCategory: 'advancedSettings',\n pluginName: 'users-permissions',\n },\n ],\n};\n"],"names":["usersPermissionsActions","actions","section","displayName","uid","subCategory","pluginName","aliases","actionId","subjects"],"mappings":";;;;;;;IAEAA,uBAAAA,GAAiB;QACfC,OAAAA,EAAS;AACP,YAAA;;gBAEEC,OAAAA,EAAS,SAAA;gBACTC,WAAAA,EAAa,QAAA;gBACbC,GAAAA,EAAK,cAAA;gBACLC,WAAAA,EAAa,OAAA;gBACbC,UAAAA,EAAY;AAClB,aAAA;AACI,YAAA;gBACEJ,OAAAA,EAAS,SAAA;gBACTC,WAAAA,EAAa,MAAA;gBACbC,GAAAA,EAAK,YAAA;gBACLC,WAAAA,EAAa,OAAA;gBACbC,UAAAA,EAAY,mBAAA;gBACZC,OAAAA,EAAS;AACP,oBAAA;wBACEC,QAAAA,EAAU,uCAAA;wBACVC,QAAAA,EAAU;AAAC,4BAAA;AAAiC;AACtD;AACO;AACP,aAAA;AACI,YAAA;gBACEP,OAAAA,EAAS,SAAA;gBACTC,WAAAA,EAAa,QAAA;gBACbC,GAAAA,EAAK,cAAA;gBACLC,WAAAA,EAAa,OAAA;gBACbC,UAAAA,EAAY;AAClB,aAAA;AACI,YAAA;gBACEJ,OAAAA,EAAS,SAAA;gBACTC,WAAAA,EAAa,QAAA;gBACbC,GAAAA,EAAK,cAAA;gBACLC,WAAAA,EAAa,OAAA;gBACbC,UAAAA,EAAY;AAClB,aAAA;AACI,YAAA;;gBAEEJ,OAAAA,EAAS,SAAA;gBACTC,WAAAA,EAAa,MAAA;gBACbC,GAAAA,EAAK,gBAAA;gBACLC,WAAAA,EAAa,WAAA;gBACbC,UAAAA,EAAY;AAClB,aAAA;AACI,YAAA;gBACEJ,OAAAA,EAAS,SAAA;gBACTC,WAAAA,EAAa,MAAA;gBACbC,GAAAA,EAAK,kBAAA;gBACLC,WAAAA,EAAa,WAAA;gBACbC,UAAAA,EAAY;AAClB,aAAA;AACI,YAAA;;gBAEEJ,OAAAA,EAAS,SAAA;gBACTC,WAAAA,EAAa,MAAA;gBACbC,GAAAA,EAAK,sBAAA;gBACLC,WAAAA,EAAa,gBAAA;gBACbC,UAAAA,EAAY;AAClB,aAAA;AACI,YAAA;gBACEJ,OAAAA,EAAS,SAAA;gBACTC,WAAAA,EAAa,MAAA;gBACbC,GAAAA,EAAK,wBAAA;gBACLC,WAAAA,EAAa,gBAAA;gBACbC,UAAAA,EAAY;AAClB,aAAA;AACI,YAAA;;gBAEEJ,OAAAA,EAAS,SAAA;gBACTC,WAAAA,EAAa,MAAA;gBACbC,GAAAA,EAAK,wBAAA;gBACLC,WAAAA,EAAa,kBAAA;gBACbC,UAAAA,EAAY;AAClB,aAAA;AACI,YAAA;gBACEJ,OAAAA,EAAS,SAAA;gBACTC,WAAAA,EAAa,MAAA;gBACbC,GAAAA,EAAK,0BAAA;gBACLC,WAAAA,EAAa,kBAAA;gBACbC,UAAAA,EAAY;AAClB;AACG;AACH,KAAA;;;;;;"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"users-permissions-actions.mjs","sources":["../../../server/bootstrap/users-permissions-actions.js"],"sourcesContent":["'use strict';\n\nmodule.exports = {\n actions: [\n {\n // Roles\n section: 'plugins',\n displayName: 'Create',\n uid: 'roles.create',\n subCategory: 'roles',\n pluginName: 'users-permissions',\n },\n {\n section: 'plugins',\n displayName: 'Read',\n uid: 'roles.read',\n subCategory: 'roles',\n pluginName: 'users-permissions',\n aliases: [\n {\n actionId: 'plugin::content-manager.explorer.read',\n subjects: ['plugin::users-permissions.role'],\n },\n ],\n },\n {\n section: 'plugins',\n displayName: 'Update',\n uid: 'roles.update',\n subCategory: 'roles',\n pluginName: 'users-permissions',\n },\n {\n section: 'plugins',\n displayName: 'Delete',\n uid: 'roles.delete',\n subCategory: 'roles',\n pluginName: 'users-permissions',\n },\n {\n // providers\n section: 'plugins',\n displayName: 'Read',\n uid: 'providers.read',\n subCategory: 'providers',\n pluginName: 'users-permissions',\n },\n {\n section: 'plugins',\n displayName: 'Edit',\n uid: 'providers.update',\n subCategory: 'providers',\n pluginName: 'users-permissions',\n },\n {\n // emailTemplates\n section: 'plugins',\n displayName: 'Read',\n uid: 'email-templates.read',\n subCategory: 'emailTemplates',\n pluginName: 'users-permissions',\n },\n {\n section: 'plugins',\n displayName: 'Edit',\n uid: 'email-templates.update',\n subCategory: 'emailTemplates',\n pluginName: 'users-permissions',\n },\n {\n // advancedSettings\n section: 'plugins',\n displayName: 'Read',\n uid: 'advanced-settings.read',\n subCategory: 'advancedSettings',\n pluginName: 'users-permissions',\n },\n {\n section: 'plugins',\n displayName: 'Edit',\n uid: 'advanced-settings.update',\n subCategory: 'advancedSettings',\n pluginName: 'users-permissions',\n },\n ],\n};\n"],"names":["usersPermissionsActions","actions","section","displayName","uid","subCategory","pluginName","aliases","actionId","subjects"],"mappings":";;;;;IAEAA,
|
|
1
|
+
{"version":3,"file":"users-permissions-actions.mjs","sources":["../../../server/bootstrap/users-permissions-actions.js"],"sourcesContent":["'use strict';\n\nmodule.exports = {\n actions: [\n {\n // Roles\n section: 'plugins',\n displayName: 'Create',\n uid: 'roles.create',\n subCategory: 'roles',\n pluginName: 'users-permissions',\n },\n {\n section: 'plugins',\n displayName: 'Read',\n uid: 'roles.read',\n subCategory: 'roles',\n pluginName: 'users-permissions',\n aliases: [\n {\n actionId: 'plugin::content-manager.explorer.read',\n subjects: ['plugin::users-permissions.role'],\n },\n ],\n },\n {\n section: 'plugins',\n displayName: 'Update',\n uid: 'roles.update',\n subCategory: 'roles',\n pluginName: 'users-permissions',\n },\n {\n section: 'plugins',\n displayName: 'Delete',\n uid: 'roles.delete',\n subCategory: 'roles',\n pluginName: 'users-permissions',\n },\n {\n // providers\n section: 'plugins',\n displayName: 'Read',\n uid: 'providers.read',\n subCategory: 'providers',\n pluginName: 'users-permissions',\n },\n {\n section: 'plugins',\n displayName: 'Edit',\n uid: 'providers.update',\n subCategory: 'providers',\n pluginName: 'users-permissions',\n },\n {\n // emailTemplates\n section: 'plugins',\n displayName: 'Read',\n uid: 'email-templates.read',\n subCategory: 'emailTemplates',\n pluginName: 'users-permissions',\n },\n {\n section: 'plugins',\n displayName: 'Edit',\n uid: 'email-templates.update',\n subCategory: 'emailTemplates',\n pluginName: 'users-permissions',\n },\n {\n // advancedSettings\n section: 'plugins',\n displayName: 'Read',\n uid: 'advanced-settings.read',\n subCategory: 'advancedSettings',\n pluginName: 'users-permissions',\n },\n {\n section: 'plugins',\n displayName: 'Edit',\n uid: 'advanced-settings.update',\n subCategory: 'advancedSettings',\n pluginName: 'users-permissions',\n },\n ],\n};\n"],"names":["usersPermissionsActions","actions","section","displayName","uid","subCategory","pluginName","aliases","actionId","subjects"],"mappings":";;;;;IAEAA,uBAAAA,GAAiB;QACfC,OAAAA,EAAS;AACP,YAAA;;gBAEEC,OAAAA,EAAS,SAAA;gBACTC,WAAAA,EAAa,QAAA;gBACbC,GAAAA,EAAK,cAAA;gBACLC,WAAAA,EAAa,OAAA;gBACbC,UAAAA,EAAY;AAClB,aAAA;AACI,YAAA;gBACEJ,OAAAA,EAAS,SAAA;gBACTC,WAAAA,EAAa,MAAA;gBACbC,GAAAA,EAAK,YAAA;gBACLC,WAAAA,EAAa,OAAA;gBACbC,UAAAA,EAAY,mBAAA;gBACZC,OAAAA,EAAS;AACP,oBAAA;wBACEC,QAAAA,EAAU,uCAAA;wBACVC,QAAAA,EAAU;AAAC,4BAAA;AAAiC;AACtD;AACO;AACP,aAAA;AACI,YAAA;gBACEP,OAAAA,EAAS,SAAA;gBACTC,WAAAA,EAAa,QAAA;gBACbC,GAAAA,EAAK,cAAA;gBACLC,WAAAA,EAAa,OAAA;gBACbC,UAAAA,EAAY;AAClB,aAAA;AACI,YAAA;gBACEJ,OAAAA,EAAS,SAAA;gBACTC,WAAAA,EAAa,QAAA;gBACbC,GAAAA,EAAK,cAAA;gBACLC,WAAAA,EAAa,OAAA;gBACbC,UAAAA,EAAY;AAClB,aAAA;AACI,YAAA;;gBAEEJ,OAAAA,EAAS,SAAA;gBACTC,WAAAA,EAAa,MAAA;gBACbC,GAAAA,EAAK,gBAAA;gBACLC,WAAAA,EAAa,WAAA;gBACbC,UAAAA,EAAY;AAClB,aAAA;AACI,YAAA;gBACEJ,OAAAA,EAAS,SAAA;gBACTC,WAAAA,EAAa,MAAA;gBACbC,GAAAA,EAAK,kBAAA;gBACLC,WAAAA,EAAa,WAAA;gBACbC,UAAAA,EAAY;AAClB,aAAA;AACI,YAAA;;gBAEEJ,OAAAA,EAAS,SAAA;gBACTC,WAAAA,EAAa,MAAA;gBACbC,GAAAA,EAAK,sBAAA;gBACLC,WAAAA,EAAa,gBAAA;gBACbC,UAAAA,EAAY;AAClB,aAAA;AACI,YAAA;gBACEJ,OAAAA,EAAS,SAAA;gBACTC,WAAAA,EAAa,MAAA;gBACbC,GAAAA,EAAK,wBAAA;gBACLC,WAAAA,EAAa,gBAAA;gBACbC,UAAAA,EAAY;AAClB,aAAA;AACI,YAAA;;gBAEEJ,OAAAA,EAAS,SAAA;gBACTC,WAAAA,EAAa,MAAA;gBACbC,GAAAA,EAAK,wBAAA;gBACLC,WAAAA,EAAa,kBAAA;gBACbC,UAAAA,EAAY;AAClB,aAAA;AACI,YAAA;gBACEJ,OAAAA,EAAS,SAAA;gBACTC,WAAAA,EAAa,MAAA;gBACbC,GAAAA,EAAK,0BAAA;gBACLC,WAAAA,EAAa,kBAAA;gBACbC,UAAAA,EAAY;AAClB;AACG;AACH,KAAA;;;;;;"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"config.js","sources":["../../server/config.js"],"sourcesContent":["'use strict';\n\nconst {\n DEFAULT_ACCESS_TOKEN_LIFESPAN,\n DEFAULT_MAX_REFRESH_TOKEN_LIFESPAN,\n DEFAULT_IDLE_REFRESH_TOKEN_LIFESPAN,\n DEFAULT_MAX_SESSION_LIFESPAN,\n DEFAULT_IDLE_SESSION_LIFESPAN,\n} = require('./services/constants');\n\nmodule.exports = {\n default: ({ env }) => ({\n jwtSecret: env('JWT_SECRET'),\n jwt: {\n expiresIn: '30d',\n },\n /**\n * JWT management mode for the Content API authentication\n * - \"legacy-support\": use plugin JWTs (backward compatible)\n * - \"refresh\": use SessionManager (access/refresh tokens)\n */\n jwtManagement: 'legacy-support',\n sessions: {\n accessTokenLifespan: DEFAULT_ACCESS_TOKEN_LIFESPAN,\n maxRefreshTokenLifespan: DEFAULT_MAX_REFRESH_TOKEN_LIFESPAN,\n idleRefreshTokenLifespan: DEFAULT_IDLE_REFRESH_TOKEN_LIFESPAN,\n maxSessionLifespan: DEFAULT_MAX_SESSION_LIFESPAN,\n idleSessionLifespan: DEFAULT_IDLE_SESSION_LIFESPAN,\n httpOnly: false,\n },\n ratelimit: {\n interval: 60000,\n max: 10,\n },\n layout: {\n user: {\n actions: {\n create: 'contentManagerUser.create', // Use the User plugin's controller.\n update: 'contentManagerUser.update',\n },\n },\n },\n callback: {\n validate(callback, provider) {\n let uCallback;\n let uProviderCallback;\n\n try {\n uCallback = new URL(callback);\n uProviderCallback = new URL(provider.callback);\n } catch {\n throw new Error('The callback is not a valid URL');\n }\n\n // Make sure the different origin matches\n if (uCallback.origin !== uProviderCallback.origin) {\n throw new Error(\n `Forbidden callback provided: origins don't match. Please verify your config.`\n );\n }\n\n // Make sure the different pathname matches\n if (uCallback.pathname !== uProviderCallback.pathname) {\n throw new Error(\n `Forbidden callback provided: pathname don't match. Please verify your config.`\n );\n }\n\n // NOTE: We're not checking the search parameters on purpose to allow passing different states\n },\n },\n }),\n validator() {},\n};\n"],"names":["DEFAULT_ACCESS_TOKEN_LIFESPAN","DEFAULT_MAX_REFRESH_TOKEN_LIFESPAN","DEFAULT_IDLE_REFRESH_TOKEN_LIFESPAN","DEFAULT_MAX_SESSION_LIFESPAN","DEFAULT_IDLE_SESSION_LIFESPAN","require$$0","config","default","env","jwtSecret","jwt","expiresIn","jwtManagement","sessions","accessTokenLifespan","maxRefreshTokenLifespan","idleRefreshTokenLifespan","maxSessionLifespan","idleSessionLifespan","httpOnly","ratelimit","interval","max","layout","user","actions","create","update","callback","validate","provider","uCallback","uProviderCallback","URL","Error","origin","pathname","validator"],"mappings":";;;;;;;;;IAEA,MAAM,EACJA,6BAA6B,EAC7BC,kCAAkC,EAClCC,mCAAmC,EACnCC,4BAA4B,EAC5BC,6BAA6B,EAC9B,GAAGC,mBAAAA,EAAAA;IAEJC,
|
|
1
|
+
{"version":3,"file":"config.js","sources":["../../server/config.js"],"sourcesContent":["'use strict';\n\nconst {\n DEFAULT_ACCESS_TOKEN_LIFESPAN,\n DEFAULT_MAX_REFRESH_TOKEN_LIFESPAN,\n DEFAULT_IDLE_REFRESH_TOKEN_LIFESPAN,\n DEFAULT_MAX_SESSION_LIFESPAN,\n DEFAULT_IDLE_SESSION_LIFESPAN,\n} = require('./services/constants');\n\nmodule.exports = {\n default: ({ env }) => ({\n jwtSecret: env('JWT_SECRET'),\n jwt: {\n expiresIn: '30d',\n },\n /**\n * JWT management mode for the Content API authentication\n * - \"legacy-support\": use plugin JWTs (backward compatible)\n * - \"refresh\": use SessionManager (access/refresh tokens)\n */\n jwtManagement: 'legacy-support',\n sessions: {\n accessTokenLifespan: DEFAULT_ACCESS_TOKEN_LIFESPAN,\n maxRefreshTokenLifespan: DEFAULT_MAX_REFRESH_TOKEN_LIFESPAN,\n idleRefreshTokenLifespan: DEFAULT_IDLE_REFRESH_TOKEN_LIFESPAN,\n maxSessionLifespan: DEFAULT_MAX_SESSION_LIFESPAN,\n idleSessionLifespan: DEFAULT_IDLE_SESSION_LIFESPAN,\n httpOnly: false,\n },\n ratelimit: {\n interval: 60000,\n max: 10,\n },\n layout: {\n user: {\n actions: {\n create: 'contentManagerUser.create', // Use the User plugin's controller.\n update: 'contentManagerUser.update',\n },\n },\n },\n callback: {\n validate(callback, provider) {\n let uCallback;\n let uProviderCallback;\n\n try {\n uCallback = new URL(callback);\n uProviderCallback = new URL(provider.callback);\n } catch {\n throw new Error('The callback is not a valid URL');\n }\n\n // Make sure the different origin matches\n if (uCallback.origin !== uProviderCallback.origin) {\n throw new Error(\n `Forbidden callback provided: origins don't match. Please verify your config.`\n );\n }\n\n // Make sure the different pathname matches\n if (uCallback.pathname !== uProviderCallback.pathname) {\n throw new Error(\n `Forbidden callback provided: pathname don't match. Please verify your config.`\n );\n }\n\n // NOTE: We're not checking the search parameters on purpose to allow passing different states\n },\n },\n }),\n validator() {},\n};\n"],"names":["DEFAULT_ACCESS_TOKEN_LIFESPAN","DEFAULT_MAX_REFRESH_TOKEN_LIFESPAN","DEFAULT_IDLE_REFRESH_TOKEN_LIFESPAN","DEFAULT_MAX_SESSION_LIFESPAN","DEFAULT_IDLE_SESSION_LIFESPAN","require$$0","config","default","env","jwtSecret","jwt","expiresIn","jwtManagement","sessions","accessTokenLifespan","maxRefreshTokenLifespan","idleRefreshTokenLifespan","maxSessionLifespan","idleSessionLifespan","httpOnly","ratelimit","interval","max","layout","user","actions","create","update","callback","validate","provider","uCallback","uProviderCallback","URL","Error","origin","pathname","validator"],"mappings":";;;;;;;;;IAEA,MAAM,EACJA,6BAA6B,EAC7BC,kCAAkC,EAClCC,mCAAmC,EACnCC,4BAA4B,EAC5BC,6BAA6B,EAC9B,GAAGC,mBAAAA,EAAAA;IAEJC,MAAAA,GAAiB;AACfC,QAAAA,OAAAA,EAAS,CAAC,EAAEC,GAAG,EAAE,IAAM;AACrBC,gBAAAA,SAAAA,EAAWD,GAAAA,CAAI,YAAA,CAAA;gBACfE,GAAAA,EAAK;oBACHC,SAAAA,EAAW;AACjB,iBAAA;AACA;;;;AAIA,SACIC,aAAAA,EAAe,gBAAA;gBACfC,QAAAA,EAAU;oBACRC,mBAAAA,EAAqBd,6BAAAA;oBACrBe,uBAAAA,EAAyBd,kCAAAA;oBACzBe,wBAAAA,EAA0Bd,mCAAAA;oBAC1Be,kBAAAA,EAAoBd,4BAAAA;oBACpBe,mBAAAA,EAAqBd,6BAAAA;oBACrBe,QAAAA,EAAU;AAChB,iBAAA;gBACIC,SAAAA,EAAW;oBACTC,QAAAA,EAAU,KAAA;oBACVC,GAAAA,EAAK;AACX,iBAAA;gBACIC,MAAAA,EAAQ;oBACNC,IAAAA,EAAM;wBACJC,OAAAA,EAAS;4BACPC,MAAAA,EAAQ,2BAAA;4BACRC,MAAAA,EAAQ;AAClB;AACA;AACA,iBAAA;gBACIC,QAAAA,EAAU;oBACRC,QAAAA,CAAAA,CAASD,QAAQ,EAAEE,QAAQ,EAAA;wBACzB,IAAIC,SAAAA;wBACJ,IAAIC,iBAAAA;wBAEJ,IAAI;AACFD,4BAAAA,SAAAA,GAAY,IAAIE,GAAAA,CAAIL,QAAAA,CAAAA;4BACpBI,iBAAAA,GAAoB,IAAIC,GAAAA,CAAIH,QAAAA,CAASF,QAAQ,CAAA;AACvD,wBAAA,CAAA,CAAU,OAAM;AACN,4BAAA,MAAM,IAAIM,KAAAA,CAAM,iCAAA,CAAA;AAC1B,wBAAA;;AAGQ,wBAAA,IAAIH,SAAAA,CAAUI,MAAM,KAAKH,iBAAAA,CAAkBG,MAAM,EAAE;AACjD,4BAAA,MAAM,IAAID,KAAAA,CACR,CAAC,4EAA4E,CAAC,CAAA;AAE1F,wBAAA;;AAGQ,wBAAA,IAAIH,SAAAA,CAAUK,QAAQ,KAAKJ,iBAAAA,CAAkBI,QAAQ,EAAE;AACrD,4BAAA,MAAM,IAAIF,KAAAA,CACR,CAAC,6EAA6E,CAAC,CAAA;AAE3F,wBAAA;;AAGA,oBAAA;AACA;aACA,CAAA;QACEG,SAAAA,CAAAA,GAAAA,CAAY;AACd,KAAA;;;;;;"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"config.mjs","sources":["../../server/config.js"],"sourcesContent":["'use strict';\n\nconst {\n DEFAULT_ACCESS_TOKEN_LIFESPAN,\n DEFAULT_MAX_REFRESH_TOKEN_LIFESPAN,\n DEFAULT_IDLE_REFRESH_TOKEN_LIFESPAN,\n DEFAULT_MAX_SESSION_LIFESPAN,\n DEFAULT_IDLE_SESSION_LIFESPAN,\n} = require('./services/constants');\n\nmodule.exports = {\n default: ({ env }) => ({\n jwtSecret: env('JWT_SECRET'),\n jwt: {\n expiresIn: '30d',\n },\n /**\n * JWT management mode for the Content API authentication\n * - \"legacy-support\": use plugin JWTs (backward compatible)\n * - \"refresh\": use SessionManager (access/refresh tokens)\n */\n jwtManagement: 'legacy-support',\n sessions: {\n accessTokenLifespan: DEFAULT_ACCESS_TOKEN_LIFESPAN,\n maxRefreshTokenLifespan: DEFAULT_MAX_REFRESH_TOKEN_LIFESPAN,\n idleRefreshTokenLifespan: DEFAULT_IDLE_REFRESH_TOKEN_LIFESPAN,\n maxSessionLifespan: DEFAULT_MAX_SESSION_LIFESPAN,\n idleSessionLifespan: DEFAULT_IDLE_SESSION_LIFESPAN,\n httpOnly: false,\n },\n ratelimit: {\n interval: 60000,\n max: 10,\n },\n layout: {\n user: {\n actions: {\n create: 'contentManagerUser.create', // Use the User plugin's controller.\n update: 'contentManagerUser.update',\n },\n },\n },\n callback: {\n validate(callback, provider) {\n let uCallback;\n let uProviderCallback;\n\n try {\n uCallback = new URL(callback);\n uProviderCallback = new URL(provider.callback);\n } catch {\n throw new Error('The callback is not a valid URL');\n }\n\n // Make sure the different origin matches\n if (uCallback.origin !== uProviderCallback.origin) {\n throw new Error(\n `Forbidden callback provided: origins don't match. Please verify your config.`\n );\n }\n\n // Make sure the different pathname matches\n if (uCallback.pathname !== uProviderCallback.pathname) {\n throw new Error(\n `Forbidden callback provided: pathname don't match. Please verify your config.`\n );\n }\n\n // NOTE: We're not checking the search parameters on purpose to allow passing different states\n },\n },\n }),\n validator() {},\n};\n"],"names":["DEFAULT_ACCESS_TOKEN_LIFESPAN","DEFAULT_MAX_REFRESH_TOKEN_LIFESPAN","DEFAULT_IDLE_REFRESH_TOKEN_LIFESPAN","DEFAULT_MAX_SESSION_LIFESPAN","DEFAULT_IDLE_SESSION_LIFESPAN","require$$0","config","default","env","jwtSecret","jwt","expiresIn","jwtManagement","sessions","accessTokenLifespan","maxRefreshTokenLifespan","idleRefreshTokenLifespan","maxSessionLifespan","idleSessionLifespan","httpOnly","ratelimit","interval","max","layout","user","actions","create","update","callback","validate","provider","uCallback","uProviderCallback","URL","Error","origin","pathname","validator"],"mappings":";;;;;;;IAEA,MAAM,EACJA,6BAA6B,EAC7BC,kCAAkC,EAClCC,mCAAmC,EACnCC,4BAA4B,EAC5BC,6BAA6B,EAC9B,GAAGC,gBAAAA,EAAAA;IAEJC,
|
|
1
|
+
{"version":3,"file":"config.mjs","sources":["../../server/config.js"],"sourcesContent":["'use strict';\n\nconst {\n DEFAULT_ACCESS_TOKEN_LIFESPAN,\n DEFAULT_MAX_REFRESH_TOKEN_LIFESPAN,\n DEFAULT_IDLE_REFRESH_TOKEN_LIFESPAN,\n DEFAULT_MAX_SESSION_LIFESPAN,\n DEFAULT_IDLE_SESSION_LIFESPAN,\n} = require('./services/constants');\n\nmodule.exports = {\n default: ({ env }) => ({\n jwtSecret: env('JWT_SECRET'),\n jwt: {\n expiresIn: '30d',\n },\n /**\n * JWT management mode for the Content API authentication\n * - \"legacy-support\": use plugin JWTs (backward compatible)\n * - \"refresh\": use SessionManager (access/refresh tokens)\n */\n jwtManagement: 'legacy-support',\n sessions: {\n accessTokenLifespan: DEFAULT_ACCESS_TOKEN_LIFESPAN,\n maxRefreshTokenLifespan: DEFAULT_MAX_REFRESH_TOKEN_LIFESPAN,\n idleRefreshTokenLifespan: DEFAULT_IDLE_REFRESH_TOKEN_LIFESPAN,\n maxSessionLifespan: DEFAULT_MAX_SESSION_LIFESPAN,\n idleSessionLifespan: DEFAULT_IDLE_SESSION_LIFESPAN,\n httpOnly: false,\n },\n ratelimit: {\n interval: 60000,\n max: 10,\n },\n layout: {\n user: {\n actions: {\n create: 'contentManagerUser.create', // Use the User plugin's controller.\n update: 'contentManagerUser.update',\n },\n },\n },\n callback: {\n validate(callback, provider) {\n let uCallback;\n let uProviderCallback;\n\n try {\n uCallback = new URL(callback);\n uProviderCallback = new URL(provider.callback);\n } catch {\n throw new Error('The callback is not a valid URL');\n }\n\n // Make sure the different origin matches\n if (uCallback.origin !== uProviderCallback.origin) {\n throw new Error(\n `Forbidden callback provided: origins don't match. Please verify your config.`\n );\n }\n\n // Make sure the different pathname matches\n if (uCallback.pathname !== uProviderCallback.pathname) {\n throw new Error(\n `Forbidden callback provided: pathname don't match. Please verify your config.`\n );\n }\n\n // NOTE: We're not checking the search parameters on purpose to allow passing different states\n },\n },\n }),\n validator() {},\n};\n"],"names":["DEFAULT_ACCESS_TOKEN_LIFESPAN","DEFAULT_MAX_REFRESH_TOKEN_LIFESPAN","DEFAULT_IDLE_REFRESH_TOKEN_LIFESPAN","DEFAULT_MAX_SESSION_LIFESPAN","DEFAULT_IDLE_SESSION_LIFESPAN","require$$0","config","default","env","jwtSecret","jwt","expiresIn","jwtManagement","sessions","accessTokenLifespan","maxRefreshTokenLifespan","idleRefreshTokenLifespan","maxSessionLifespan","idleSessionLifespan","httpOnly","ratelimit","interval","max","layout","user","actions","create","update","callback","validate","provider","uCallback","uProviderCallback","URL","Error","origin","pathname","validator"],"mappings":";;;;;;;IAEA,MAAM,EACJA,6BAA6B,EAC7BC,kCAAkC,EAClCC,mCAAmC,EACnCC,4BAA4B,EAC5BC,6BAA6B,EAC9B,GAAGC,gBAAAA,EAAAA;IAEJC,MAAAA,GAAiB;AACfC,QAAAA,OAAAA,EAAS,CAAC,EAAEC,GAAG,EAAE,IAAM;AACrBC,gBAAAA,SAAAA,EAAWD,GAAAA,CAAI,YAAA,CAAA;gBACfE,GAAAA,EAAK;oBACHC,SAAAA,EAAW;AACjB,iBAAA;AACA;;;;AAIA,SACIC,aAAAA,EAAe,gBAAA;gBACfC,QAAAA,EAAU;oBACRC,mBAAAA,EAAqBd,6BAAAA;oBACrBe,uBAAAA,EAAyBd,kCAAAA;oBACzBe,wBAAAA,EAA0Bd,mCAAAA;oBAC1Be,kBAAAA,EAAoBd,4BAAAA;oBACpBe,mBAAAA,EAAqBd,6BAAAA;oBACrBe,QAAAA,EAAU;AAChB,iBAAA;gBACIC,SAAAA,EAAW;oBACTC,QAAAA,EAAU,KAAA;oBACVC,GAAAA,EAAK;AACX,iBAAA;gBACIC,MAAAA,EAAQ;oBACNC,IAAAA,EAAM;wBACJC,OAAAA,EAAS;4BACPC,MAAAA,EAAQ,2BAAA;4BACRC,MAAAA,EAAQ;AAClB;AACA;AACA,iBAAA;gBACIC,QAAAA,EAAU;oBACRC,QAAAA,CAAAA,CAASD,QAAQ,EAAEE,QAAQ,EAAA;wBACzB,IAAIC,SAAAA;wBACJ,IAAIC,iBAAAA;wBAEJ,IAAI;AACFD,4BAAAA,SAAAA,GAAY,IAAIE,GAAAA,CAAIL,QAAAA,CAAAA;4BACpBI,iBAAAA,GAAoB,IAAIC,GAAAA,CAAIH,QAAAA,CAASF,QAAQ,CAAA;AACvD,wBAAA,CAAA,CAAU,OAAM;AACN,4BAAA,MAAM,IAAIM,KAAAA,CAAM,iCAAA,CAAA;AAC1B,wBAAA;;AAGQ,wBAAA,IAAIH,SAAAA,CAAUI,MAAM,KAAKH,iBAAAA,CAAkBG,MAAM,EAAE;AACjD,4BAAA,MAAM,IAAID,KAAAA,CACR,CAAC,4EAA4E,CAAC,CAAA;AAE1F,wBAAA;;AAGQ,wBAAA,IAAIH,SAAAA,CAAUK,QAAQ,KAAKJ,iBAAAA,CAAkBI,QAAQ,EAAE;AACrD,4BAAA,MAAM,IAAIF,KAAAA,CACR,CAAC,6EAA6E,CAAC,CAAA;AAE3F,wBAAA;;AAGA,oBAAA;AACA;aACA,CAAA;QACEG,SAAAA,CAAAA,GAAAA,CAAY;AACd,KAAA;;;;;;"}
|
|
@@ -1,17 +1,17 @@
|
|
|
1
1
|
'use strict';
|
|
2
2
|
|
|
3
|
-
var index = require('./permission/index.js');
|
|
3
|
+
var index$2 = require('./permission/index.js');
|
|
4
4
|
var index$1 = require('./role/index.js');
|
|
5
|
-
var index
|
|
5
|
+
var index = require('./user/index.js');
|
|
6
6
|
|
|
7
7
|
var contentTypes;
|
|
8
8
|
var hasRequiredContentTypes;
|
|
9
9
|
function requireContentTypes() {
|
|
10
10
|
if (hasRequiredContentTypes) return contentTypes;
|
|
11
11
|
hasRequiredContentTypes = 1;
|
|
12
|
-
const permission = index.__require();
|
|
12
|
+
const permission = index$2.__require();
|
|
13
13
|
const role = index$1.__require();
|
|
14
|
-
const user = index
|
|
14
|
+
const user = index.__require();
|
|
15
15
|
contentTypes = {
|
|
16
16
|
permission: {
|
|
17
17
|
schema: permission
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.js","sources":["../../../server/content-types/index.js"],"sourcesContent":["'use strict';\n\nconst permission = require('./permission');\nconst role = require('./role');\nconst user = require('./user');\n\nmodule.exports = {\n permission: { schema: permission },\n role: { schema: role },\n user: { schema: user },\n};\n"],"names":["permission","require$$0","role","require$$1","user","require$$2","contentTypes","schema"],"mappings":";;;;;;;;;;;AAEA,IAAA,MAAMA,
|
|
1
|
+
{"version":3,"file":"index.js","sources":["../../../server/content-types/index.js"],"sourcesContent":["'use strict';\n\nconst permission = require('./permission');\nconst role = require('./role');\nconst user = require('./user');\n\nmodule.exports = {\n permission: { schema: permission },\n role: { schema: role },\n user: { schema: user },\n};\n"],"names":["permission","require$$0","role","require$$1","user","require$$2","contentTypes","schema"],"mappings":";;;;;;;;;;;AAEA,IAAA,MAAMA,UAAAA,GAAaC,iBAAAA,EAAAA;AACnB,IAAA,MAAMC,IAAAA,GAAOC,iBAAAA,EAAAA;AACb,IAAA,MAAMC,IAAAA,GAAOC,eAAAA,EAAAA;IAEbC,YAAAA,GAAiB;QACfN,UAAAA,EAAY;YAAEO,MAAAA,EAAQP;AAAU,SAAA;QAChCE,IAAAA,EAAM;YAAEK,MAAAA,EAAQL;AAAI,SAAA;QACpBE,IAAAA,EAAM;YAAEG,MAAAA,EAAQH;AAAI;AACtB,KAAA;;;;;;"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.mjs","sources":["../../../server/content-types/index.js"],"sourcesContent":["'use strict';\n\nconst permission = require('./permission');\nconst role = require('./role');\nconst user = require('./user');\n\nmodule.exports = {\n permission: { schema: permission },\n role: { schema: role },\n user: { schema: user },\n};\n"],"names":["permission","require$$0","role","require$$1","user","require$$2","contentTypes","schema"],"mappings":";;;;;;;;;AAEA,IAAA,MAAMA,
|
|
1
|
+
{"version":3,"file":"index.mjs","sources":["../../../server/content-types/index.js"],"sourcesContent":["'use strict';\n\nconst permission = require('./permission');\nconst role = require('./role');\nconst user = require('./user');\n\nmodule.exports = {\n permission: { schema: permission },\n role: { schema: role },\n user: { schema: user },\n};\n"],"names":["permission","require$$0","role","require$$1","user","require$$2","contentTypes","schema"],"mappings":";;;;;;;;;AAEA,IAAA,MAAMA,UAAAA,GAAaC,iBAAAA,EAAAA;AACnB,IAAA,MAAMC,IAAAA,GAAOC,WAAAA,EAAAA;AACb,IAAA,MAAMC,IAAAA,GAAOC,WAAAA,EAAAA;IAEbC,YAAAA,GAAiB;QACfN,UAAAA,EAAY;YAAEO,MAAAA,EAAQP;AAAU,SAAA;QAChCE,IAAAA,EAAM;YAAEK,MAAAA,EAAQL;AAAI,SAAA;QACpBE,IAAAA,EAAM;YAAEG,MAAAA,EAAQH;AAAI;AACtB,KAAA;;;;;;"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.js","sources":["../../../../server/content-types/permission/index.js"],"sourcesContent":["'use strict';\n\nmodule.exports = {\n collectionName: 'up_permissions',\n info: {\n name: 'permission',\n description: '',\n singularName: 'permission',\n pluralName: 'permissions',\n displayName: 'Permission',\n },\n pluginOptions: {\n 'content-manager': {\n visible: false,\n },\n 'content-type-builder': {\n visible: false,\n },\n },\n attributes: {\n action: {\n type: 'string',\n required: true,\n configurable: false,\n },\n role: {\n type: 'relation',\n relation: 'manyToOne',\n target: 'plugin::users-permissions.role',\n inversedBy: 'permissions',\n configurable: false,\n },\n },\n};\n"],"names":["permission","collectionName","info","name","description","singularName","pluralName","displayName","pluginOptions","visible","attributes","action","type","required","configurable","role","relation","target","inversedBy"],"mappings":";;;;;;;IAEAA,
|
|
1
|
+
{"version":3,"file":"index.js","sources":["../../../../server/content-types/permission/index.js"],"sourcesContent":["'use strict';\n\nmodule.exports = {\n collectionName: 'up_permissions',\n info: {\n name: 'permission',\n description: '',\n singularName: 'permission',\n pluralName: 'permissions',\n displayName: 'Permission',\n },\n pluginOptions: {\n 'content-manager': {\n visible: false,\n },\n 'content-type-builder': {\n visible: false,\n },\n },\n attributes: {\n action: {\n type: 'string',\n required: true,\n configurable: false,\n },\n role: {\n type: 'relation',\n relation: 'manyToOne',\n target: 'plugin::users-permissions.role',\n inversedBy: 'permissions',\n configurable: false,\n },\n },\n};\n"],"names":["permission","collectionName","info","name","description","singularName","pluralName","displayName","pluginOptions","visible","attributes","action","type","required","configurable","role","relation","target","inversedBy"],"mappings":";;;;;;;IAEAA,UAAAA,GAAiB;QACfC,cAAAA,EAAgB,gBAAA;QAChBC,IAAAA,EAAM;YACJC,IAAAA,EAAM,YAAA;YACNC,WAAAA,EAAa,EAAA;YACbC,YAAAA,EAAc,YAAA;YACdC,UAAAA,EAAY,aAAA;YACZC,WAAAA,EAAa;AACjB,SAAA;QACEC,aAAAA,EAAe;YACb,iBAAA,EAAmB;gBACjBC,OAAAA,EAAS;AACf,aAAA;YACI,sBAAA,EAAwB;gBACtBA,OAAAA,EAAS;AACf;AACA,SAAA;QACEC,UAAAA,EAAY;YACVC,MAAAA,EAAQ;gBACNC,IAAAA,EAAM,QAAA;gBACNC,QAAAA,EAAU,IAAA;gBACVC,YAAAA,EAAc;AACpB,aAAA;YACIC,IAAAA,EAAM;gBACJH,IAAAA,EAAM,UAAA;gBACNI,QAAAA,EAAU,WAAA;gBACVC,MAAAA,EAAQ,gCAAA;gBACRC,UAAAA,EAAY,aAAA;gBACZJ,YAAAA,EAAc;AACpB;AACA;AACA,KAAA;;;;;;"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.mjs","sources":["../../../../server/content-types/permission/index.js"],"sourcesContent":["'use strict';\n\nmodule.exports = {\n collectionName: 'up_permissions',\n info: {\n name: 'permission',\n description: '',\n singularName: 'permission',\n pluralName: 'permissions',\n displayName: 'Permission',\n },\n pluginOptions: {\n 'content-manager': {\n visible: false,\n },\n 'content-type-builder': {\n visible: false,\n },\n },\n attributes: {\n action: {\n type: 'string',\n required: true,\n configurable: false,\n },\n role: {\n type: 'relation',\n relation: 'manyToOne',\n target: 'plugin::users-permissions.role',\n inversedBy: 'permissions',\n configurable: false,\n },\n },\n};\n"],"names":["permission","collectionName","info","name","description","singularName","pluralName","displayName","pluginOptions","visible","attributes","action","type","required","configurable","role","relation","target","inversedBy"],"mappings":";;;;;IAEAA,
|
|
1
|
+
{"version":3,"file":"index.mjs","sources":["../../../../server/content-types/permission/index.js"],"sourcesContent":["'use strict';\n\nmodule.exports = {\n collectionName: 'up_permissions',\n info: {\n name: 'permission',\n description: '',\n singularName: 'permission',\n pluralName: 'permissions',\n displayName: 'Permission',\n },\n pluginOptions: {\n 'content-manager': {\n visible: false,\n },\n 'content-type-builder': {\n visible: false,\n },\n },\n attributes: {\n action: {\n type: 'string',\n required: true,\n configurable: false,\n },\n role: {\n type: 'relation',\n relation: 'manyToOne',\n target: 'plugin::users-permissions.role',\n inversedBy: 'permissions',\n configurable: false,\n },\n },\n};\n"],"names":["permission","collectionName","info","name","description","singularName","pluralName","displayName","pluginOptions","visible","attributes","action","type","required","configurable","role","relation","target","inversedBy"],"mappings":";;;;;IAEAA,UAAAA,GAAiB;QACfC,cAAAA,EAAgB,gBAAA;QAChBC,IAAAA,EAAM;YACJC,IAAAA,EAAM,YAAA;YACNC,WAAAA,EAAa,EAAA;YACbC,YAAAA,EAAc,YAAA;YACdC,UAAAA,EAAY,aAAA;YACZC,WAAAA,EAAa;AACjB,SAAA;QACEC,aAAAA,EAAe;YACb,iBAAA,EAAmB;gBACjBC,OAAAA,EAAS;AACf,aAAA;YACI,sBAAA,EAAwB;gBACtBA,OAAAA,EAAS;AACf;AACA,SAAA;QACEC,UAAAA,EAAY;YACVC,MAAAA,EAAQ;gBACNC,IAAAA,EAAM,QAAA;gBACNC,QAAAA,EAAU,IAAA;gBACVC,YAAAA,EAAc;AACpB,aAAA;YACIC,IAAAA,EAAM;gBACJH,IAAAA,EAAM,UAAA;gBACNI,QAAAA,EAAU,WAAA;gBACVC,MAAAA,EAAQ,gCAAA;gBACRC,UAAAA,EAAY,aAAA;gBACZJ,YAAAA,EAAc;AACpB;AACA;AACA,KAAA;;;;;;"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.js","sources":["../../../../server/content-types/role/index.js"],"sourcesContent":["'use strict';\n\nmodule.exports = {\n collectionName: 'up_roles',\n info: {\n name: 'role',\n description: '',\n singularName: 'role',\n pluralName: 'roles',\n displayName: 'Role',\n },\n pluginOptions: {\n 'content-manager': {\n visible: false,\n },\n 'content-type-builder': {\n visible: false,\n },\n },\n attributes: {\n name: {\n type: 'string',\n minLength: 3,\n required: true,\n configurable: false,\n },\n description: {\n type: 'string',\n configurable: false,\n },\n type: {\n type: 'string',\n unique: true,\n configurable: false,\n },\n permissions: {\n type: 'relation',\n relation: 'oneToMany',\n target: 'plugin::users-permissions.permission',\n mappedBy: 'role',\n configurable: false,\n },\n users: {\n type: 'relation',\n relation: 'oneToMany',\n target: 'plugin::users-permissions.user',\n mappedBy: 'role',\n configurable: false,\n },\n },\n};\n"],"names":["role","collectionName","info","name","description","singularName","pluralName","displayName","pluginOptions","visible","attributes","type","minLength","required","configurable","unique","permissions","relation","target","mappedBy","users"],"mappings":";;;;;;;IAEAA,
|
|
1
|
+
{"version":3,"file":"index.js","sources":["../../../../server/content-types/role/index.js"],"sourcesContent":["'use strict';\n\nmodule.exports = {\n collectionName: 'up_roles',\n info: {\n name: 'role',\n description: '',\n singularName: 'role',\n pluralName: 'roles',\n displayName: 'Role',\n },\n pluginOptions: {\n 'content-manager': {\n visible: false,\n },\n 'content-type-builder': {\n visible: false,\n },\n },\n attributes: {\n name: {\n type: 'string',\n minLength: 3,\n required: true,\n configurable: false,\n },\n description: {\n type: 'string',\n configurable: false,\n },\n type: {\n type: 'string',\n unique: true,\n configurable: false,\n },\n permissions: {\n type: 'relation',\n relation: 'oneToMany',\n target: 'plugin::users-permissions.permission',\n mappedBy: 'role',\n configurable: false,\n },\n users: {\n type: 'relation',\n relation: 'oneToMany',\n target: 'plugin::users-permissions.user',\n mappedBy: 'role',\n configurable: false,\n },\n },\n};\n"],"names":["role","collectionName","info","name","description","singularName","pluralName","displayName","pluginOptions","visible","attributes","type","minLength","required","configurable","unique","permissions","relation","target","mappedBy","users"],"mappings":";;;;;;;IAEAA,IAAAA,GAAiB;QACfC,cAAAA,EAAgB,UAAA;QAChBC,IAAAA,EAAM;YACJC,IAAAA,EAAM,MAAA;YACNC,WAAAA,EAAa,EAAA;YACbC,YAAAA,EAAc,MAAA;YACdC,UAAAA,EAAY,OAAA;YACZC,WAAAA,EAAa;AACjB,SAAA;QACEC,aAAAA,EAAe;YACb,iBAAA,EAAmB;gBACjBC,OAAAA,EAAS;AACf,aAAA;YACI,sBAAA,EAAwB;gBACtBA,OAAAA,EAAS;AACf;AACA,SAAA;QACEC,UAAAA,EAAY;YACVP,IAAAA,EAAM;gBACJQ,IAAAA,EAAM,QAAA;gBACNC,SAAAA,EAAW,CAAA;gBACXC,QAAAA,EAAU,IAAA;gBACVC,YAAAA,EAAc;AACpB,aAAA;YACIV,WAAAA,EAAa;gBACXO,IAAAA,EAAM,QAAA;gBACNG,YAAAA,EAAc;AACpB,aAAA;YACIH,IAAAA,EAAM;gBACJA,IAAAA,EAAM,QAAA;gBACNI,MAAAA,EAAQ,IAAA;gBACRD,YAAAA,EAAc;AACpB,aAAA;YACIE,WAAAA,EAAa;gBACXL,IAAAA,EAAM,UAAA;gBACNM,QAAAA,EAAU,WAAA;gBACVC,MAAAA,EAAQ,sCAAA;gBACRC,QAAAA,EAAU,MAAA;gBACVL,YAAAA,EAAc;AACpB,aAAA;YACIM,KAAAA,EAAO;gBACLT,IAAAA,EAAM,UAAA;gBACNM,QAAAA,EAAU,WAAA;gBACVC,MAAAA,EAAQ,gCAAA;gBACRC,QAAAA,EAAU,MAAA;gBACVL,YAAAA,EAAc;AACpB;AACA;AACA,KAAA;;;;;;"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.mjs","sources":["../../../../server/content-types/role/index.js"],"sourcesContent":["'use strict';\n\nmodule.exports = {\n collectionName: 'up_roles',\n info: {\n name: 'role',\n description: '',\n singularName: 'role',\n pluralName: 'roles',\n displayName: 'Role',\n },\n pluginOptions: {\n 'content-manager': {\n visible: false,\n },\n 'content-type-builder': {\n visible: false,\n },\n },\n attributes: {\n name: {\n type: 'string',\n minLength: 3,\n required: true,\n configurable: false,\n },\n description: {\n type: 'string',\n configurable: false,\n },\n type: {\n type: 'string',\n unique: true,\n configurable: false,\n },\n permissions: {\n type: 'relation',\n relation: 'oneToMany',\n target: 'plugin::users-permissions.permission',\n mappedBy: 'role',\n configurable: false,\n },\n users: {\n type: 'relation',\n relation: 'oneToMany',\n target: 'plugin::users-permissions.user',\n mappedBy: 'role',\n configurable: false,\n },\n },\n};\n"],"names":["role","collectionName","info","name","description","singularName","pluralName","displayName","pluginOptions","visible","attributes","type","minLength","required","configurable","unique","permissions","relation","target","mappedBy","users"],"mappings":";;;;;IAEAA,
|
|
1
|
+
{"version":3,"file":"index.mjs","sources":["../../../../server/content-types/role/index.js"],"sourcesContent":["'use strict';\n\nmodule.exports = {\n collectionName: 'up_roles',\n info: {\n name: 'role',\n description: '',\n singularName: 'role',\n pluralName: 'roles',\n displayName: 'Role',\n },\n pluginOptions: {\n 'content-manager': {\n visible: false,\n },\n 'content-type-builder': {\n visible: false,\n },\n },\n attributes: {\n name: {\n type: 'string',\n minLength: 3,\n required: true,\n configurable: false,\n },\n description: {\n type: 'string',\n configurable: false,\n },\n type: {\n type: 'string',\n unique: true,\n configurable: false,\n },\n permissions: {\n type: 'relation',\n relation: 'oneToMany',\n target: 'plugin::users-permissions.permission',\n mappedBy: 'role',\n configurable: false,\n },\n users: {\n type: 'relation',\n relation: 'oneToMany',\n target: 'plugin::users-permissions.user',\n mappedBy: 'role',\n configurable: false,\n },\n },\n};\n"],"names":["role","collectionName","info","name","description","singularName","pluralName","displayName","pluginOptions","visible","attributes","type","minLength","required","configurable","unique","permissions","relation","target","mappedBy","users"],"mappings":";;;;;IAEAA,IAAAA,GAAiB;QACfC,cAAAA,EAAgB,UAAA;QAChBC,IAAAA,EAAM;YACJC,IAAAA,EAAM,MAAA;YACNC,WAAAA,EAAa,EAAA;YACbC,YAAAA,EAAc,MAAA;YACdC,UAAAA,EAAY,OAAA;YACZC,WAAAA,EAAa;AACjB,SAAA;QACEC,aAAAA,EAAe;YACb,iBAAA,EAAmB;gBACjBC,OAAAA,EAAS;AACf,aAAA;YACI,sBAAA,EAAwB;gBACtBA,OAAAA,EAAS;AACf;AACA,SAAA;QACEC,UAAAA,EAAY;YACVP,IAAAA,EAAM;gBACJQ,IAAAA,EAAM,QAAA;gBACNC,SAAAA,EAAW,CAAA;gBACXC,QAAAA,EAAU,IAAA;gBACVC,YAAAA,EAAc;AACpB,aAAA;YACIV,WAAAA,EAAa;gBACXO,IAAAA,EAAM,QAAA;gBACNG,YAAAA,EAAc;AACpB,aAAA;YACIH,IAAAA,EAAM;gBACJA,IAAAA,EAAM,QAAA;gBACNI,MAAAA,EAAQ,IAAA;gBACRD,YAAAA,EAAc;AACpB,aAAA;YACIE,WAAAA,EAAa;gBACXL,IAAAA,EAAM,UAAA;gBACNM,QAAAA,EAAU,WAAA;gBACVC,MAAAA,EAAQ,sCAAA;gBACRC,QAAAA,EAAU,MAAA;gBACVL,YAAAA,EAAc;AACpB,aAAA;YACIM,KAAAA,EAAO;gBACLT,IAAAA,EAAM,UAAA;gBACNM,QAAAA,EAAU,WAAA;gBACVC,MAAAA,EAAQ,gCAAA;gBACRC,QAAAA,EAAU,MAAA;gBACVL,YAAAA,EAAc;AACpB;AACA;AACA,KAAA;;;;;;"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.js","sources":["../../../../server/content-types/user/index.js"],"sourcesContent":["'use strict';\n\nconst schemaConfig = require('./schema-config');\n\nmodule.exports = {\n collectionName: 'up_users',\n info: {\n name: 'user',\n description: '',\n singularName: 'user',\n pluralName: 'users',\n displayName: 'User',\n },\n options: {\n timestamps: true,\n },\n attributes: {\n username: {\n type: 'string',\n minLength: 3,\n unique: true,\n configurable: false,\n required: true,\n },\n email: {\n type: 'email',\n minLength: 6,\n configurable: false,\n required: true,\n },\n provider: {\n type: 'string',\n configurable: false,\n },\n password: {\n type: 'password',\n minLength: 6,\n configurable: false,\n private: true,\n searchable: false,\n },\n resetPasswordToken: {\n type: 'string',\n configurable: false,\n private: true,\n searchable: false,\n },\n confirmationToken: {\n type: 'string',\n configurable: false,\n private: true,\n searchable: false,\n },\n confirmed: {\n type: 'boolean',\n default: false,\n configurable: false,\n },\n blocked: {\n type: 'boolean',\n default: false,\n configurable: false,\n },\n role: {\n type: 'relation',\n relation: 'manyToOne',\n target: 'plugin::users-permissions.role',\n inversedBy: 'users',\n configurable: false,\n },\n },\n\n config: schemaConfig, // TODO: to move to content-manager options\n};\n"],"names":["schemaConfig","require$$0","user","collectionName","info","name","description","singularName","pluralName","displayName","options","timestamps","attributes","username","type","minLength","unique","configurable","required","email","provider","password","private","searchable","resetPasswordToken","confirmationToken","confirmed","default","blocked","role","relation","target","inversedBy","config"],"mappings":";;;;;;;;;AAEA,IAAA,MAAMA,
|
|
1
|
+
{"version":3,"file":"index.js","sources":["../../../../server/content-types/user/index.js"],"sourcesContent":["'use strict';\n\nconst schemaConfig = require('./schema-config');\n\nmodule.exports = {\n collectionName: 'up_users',\n info: {\n name: 'user',\n description: '',\n singularName: 'user',\n pluralName: 'users',\n displayName: 'User',\n },\n options: {\n timestamps: true,\n },\n attributes: {\n username: {\n type: 'string',\n minLength: 3,\n unique: true,\n configurable: false,\n required: true,\n },\n email: {\n type: 'email',\n minLength: 6,\n configurable: false,\n required: true,\n },\n provider: {\n type: 'string',\n configurable: false,\n },\n password: {\n type: 'password',\n minLength: 6,\n configurable: false,\n private: true,\n searchable: false,\n },\n resetPasswordToken: {\n type: 'string',\n configurable: false,\n private: true,\n searchable: false,\n },\n confirmationToken: {\n type: 'string',\n configurable: false,\n private: true,\n searchable: false,\n },\n confirmed: {\n type: 'boolean',\n default: false,\n configurable: false,\n },\n blocked: {\n type: 'boolean',\n default: false,\n configurable: false,\n },\n role: {\n type: 'relation',\n relation: 'manyToOne',\n target: 'plugin::users-permissions.role',\n inversedBy: 'users',\n configurable: false,\n },\n },\n\n config: schemaConfig, // TODO: to move to content-manager options\n};\n"],"names":["schemaConfig","require$$0","user","collectionName","info","name","description","singularName","pluralName","displayName","options","timestamps","attributes","username","type","minLength","unique","configurable","required","email","provider","password","private","searchable","resetPasswordToken","confirmationToken","confirmed","default","blocked","role","relation","target","inversedBy","config"],"mappings":";;;;;;;;;AAEA,IAAA,MAAMA,cAAAA,GAAeC,sBAAAA,EAAAA;IAErBC,IAAAA,GAAiB;QACfC,cAAAA,EAAgB,UAAA;QAChBC,IAAAA,EAAM;YACJC,IAAAA,EAAM,MAAA;YACNC,WAAAA,EAAa,EAAA;YACbC,YAAAA,EAAc,MAAA;YACdC,UAAAA,EAAY,OAAA;YACZC,WAAAA,EAAa;AACjB,SAAA;QACEC,OAAAA,EAAS;YACPC,UAAAA,EAAY;AAChB,SAAA;QACEC,UAAAA,EAAY;YACVC,QAAAA,EAAU;gBACRC,IAAAA,EAAM,QAAA;gBACNC,SAAAA,EAAW,CAAA;gBACXC,MAAAA,EAAQ,IAAA;gBACRC,YAAAA,EAAc,KAAA;gBACdC,QAAAA,EAAU;AAChB,aAAA;YACIC,KAAAA,EAAO;gBACLL,IAAAA,EAAM,OAAA;gBACNC,SAAAA,EAAW,CAAA;gBACXE,YAAAA,EAAc,KAAA;gBACdC,QAAAA,EAAU;AAChB,aAAA;YACIE,QAAAA,EAAU;gBACRN,IAAAA,EAAM,QAAA;gBACNG,YAAAA,EAAc;AACpB,aAAA;YACII,QAAAA,EAAU;gBACRP,IAAAA,EAAM,UAAA;gBACNC,SAAAA,EAAW,CAAA;gBACXE,YAAAA,EAAc,KAAA;gBACdK,OAAAA,EAAS,IAAA;gBACTC,UAAAA,EAAY;AAClB,aAAA;YACIC,kBAAAA,EAAoB;gBAClBV,IAAAA,EAAM,QAAA;gBACNG,YAAAA,EAAc,KAAA;gBACdK,OAAAA,EAAS,IAAA;gBACTC,UAAAA,EAAY;AAClB,aAAA;YACIE,iBAAAA,EAAmB;gBACjBX,IAAAA,EAAM,QAAA;gBACNG,YAAAA,EAAc,KAAA;gBACdK,OAAAA,EAAS,IAAA;gBACTC,UAAAA,EAAY;AAClB,aAAA;YACIG,SAAAA,EAAW;gBACTZ,IAAAA,EAAM,SAAA;gBACNa,OAAAA,EAAS,KAAA;gBACTV,YAAAA,EAAc;AACpB,aAAA;YACIW,OAAAA,EAAS;gBACPd,IAAAA,EAAM,SAAA;gBACNa,OAAAA,EAAS,KAAA;gBACTV,YAAAA,EAAc;AACpB,aAAA;YACIY,IAAAA,EAAM;gBACJf,IAAAA,EAAM,UAAA;gBACNgB,QAAAA,EAAU,WAAA;gBACVC,MAAAA,EAAQ,gCAAA;gBACRC,UAAAA,EAAY,OAAA;gBACZf,YAAAA,EAAc;AACpB;AACA,SAAA;QAEEgB,MAAAA,EAAQjC;AACV,KAAA;;;;;;"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.mjs","sources":["../../../../server/content-types/user/index.js"],"sourcesContent":["'use strict';\n\nconst schemaConfig = require('./schema-config');\n\nmodule.exports = {\n collectionName: 'up_users',\n info: {\n name: 'user',\n description: '',\n singularName: 'user',\n pluralName: 'users',\n displayName: 'User',\n },\n options: {\n timestamps: true,\n },\n attributes: {\n username: {\n type: 'string',\n minLength: 3,\n unique: true,\n configurable: false,\n required: true,\n },\n email: {\n type: 'email',\n minLength: 6,\n configurable: false,\n required: true,\n },\n provider: {\n type: 'string',\n configurable: false,\n },\n password: {\n type: 'password',\n minLength: 6,\n configurable: false,\n private: true,\n searchable: false,\n },\n resetPasswordToken: {\n type: 'string',\n configurable: false,\n private: true,\n searchable: false,\n },\n confirmationToken: {\n type: 'string',\n configurable: false,\n private: true,\n searchable: false,\n },\n confirmed: {\n type: 'boolean',\n default: false,\n configurable: false,\n },\n blocked: {\n type: 'boolean',\n default: false,\n configurable: false,\n },\n role: {\n type: 'relation',\n relation: 'manyToOne',\n target: 'plugin::users-permissions.role',\n inversedBy: 'users',\n configurable: false,\n },\n },\n\n config: schemaConfig, // TODO: to move to content-manager options\n};\n"],"names":["schemaConfig","require$$0","user","collectionName","info","name","description","singularName","pluralName","displayName","options","timestamps","attributes","username","type","minLength","unique","configurable","required","email","provider","password","private","searchable","resetPasswordToken","confirmationToken","confirmed","default","blocked","role","relation","target","inversedBy","config"],"mappings":";;;;;;;AAEA,IAAA,MAAMA,
|
|
1
|
+
{"version":3,"file":"index.mjs","sources":["../../../../server/content-types/user/index.js"],"sourcesContent":["'use strict';\n\nconst schemaConfig = require('./schema-config');\n\nmodule.exports = {\n collectionName: 'up_users',\n info: {\n name: 'user',\n description: '',\n singularName: 'user',\n pluralName: 'users',\n displayName: 'User',\n },\n options: {\n timestamps: true,\n },\n attributes: {\n username: {\n type: 'string',\n minLength: 3,\n unique: true,\n configurable: false,\n required: true,\n },\n email: {\n type: 'email',\n minLength: 6,\n configurable: false,\n required: true,\n },\n provider: {\n type: 'string',\n configurable: false,\n },\n password: {\n type: 'password',\n minLength: 6,\n configurable: false,\n private: true,\n searchable: false,\n },\n resetPasswordToken: {\n type: 'string',\n configurable: false,\n private: true,\n searchable: false,\n },\n confirmationToken: {\n type: 'string',\n configurable: false,\n private: true,\n searchable: false,\n },\n confirmed: {\n type: 'boolean',\n default: false,\n configurable: false,\n },\n blocked: {\n type: 'boolean',\n default: false,\n configurable: false,\n },\n role: {\n type: 'relation',\n relation: 'manyToOne',\n target: 'plugin::users-permissions.role',\n inversedBy: 'users',\n configurable: false,\n },\n },\n\n config: schemaConfig, // TODO: to move to content-manager options\n};\n"],"names":["schemaConfig","require$$0","user","collectionName","info","name","description","singularName","pluralName","displayName","options","timestamps","attributes","username","type","minLength","unique","configurable","required","email","provider","password","private","searchable","resetPasswordToken","confirmationToken","confirmed","default","blocked","role","relation","target","inversedBy","config"],"mappings":";;;;;;;AAEA,IAAA,MAAMA,YAAAA,GAAeC,mBAAAA,EAAAA;IAErBC,IAAAA,GAAiB;QACfC,cAAAA,EAAgB,UAAA;QAChBC,IAAAA,EAAM;YACJC,IAAAA,EAAM,MAAA;YACNC,WAAAA,EAAa,EAAA;YACbC,YAAAA,EAAc,MAAA;YACdC,UAAAA,EAAY,OAAA;YACZC,WAAAA,EAAa;AACjB,SAAA;QACEC,OAAAA,EAAS;YACPC,UAAAA,EAAY;AAChB,SAAA;QACEC,UAAAA,EAAY;YACVC,QAAAA,EAAU;gBACRC,IAAAA,EAAM,QAAA;gBACNC,SAAAA,EAAW,CAAA;gBACXC,MAAAA,EAAQ,IAAA;gBACRC,YAAAA,EAAc,KAAA;gBACdC,QAAAA,EAAU;AAChB,aAAA;YACIC,KAAAA,EAAO;gBACLL,IAAAA,EAAM,OAAA;gBACNC,SAAAA,EAAW,CAAA;gBACXE,YAAAA,EAAc,KAAA;gBACdC,QAAAA,EAAU;AAChB,aAAA;YACIE,QAAAA,EAAU;gBACRN,IAAAA,EAAM,QAAA;gBACNG,YAAAA,EAAc;AACpB,aAAA;YACII,QAAAA,EAAU;gBACRP,IAAAA,EAAM,UAAA;gBACNC,SAAAA,EAAW,CAAA;gBACXE,YAAAA,EAAc,KAAA;gBACdK,OAAAA,EAAS,IAAA;gBACTC,UAAAA,EAAY;AAClB,aAAA;YACIC,kBAAAA,EAAoB;gBAClBV,IAAAA,EAAM,QAAA;gBACNG,YAAAA,EAAc,KAAA;gBACdK,OAAAA,EAAS,IAAA;gBACTC,UAAAA,EAAY;AAClB,aAAA;YACIE,iBAAAA,EAAmB;gBACjBX,IAAAA,EAAM,QAAA;gBACNG,YAAAA,EAAc,KAAA;gBACdK,OAAAA,EAAS,IAAA;gBACTC,UAAAA,EAAY;AAClB,aAAA;YACIG,SAAAA,EAAW;gBACTZ,IAAAA,EAAM,SAAA;gBACNa,OAAAA,EAAS,KAAA;gBACTV,YAAAA,EAAc;AACpB,aAAA;YACIW,OAAAA,EAAS;gBACPd,IAAAA,EAAM,SAAA;gBACNa,OAAAA,EAAS,KAAA;gBACTV,YAAAA,EAAc;AACpB,aAAA;YACIY,IAAAA,EAAM;gBACJf,IAAAA,EAAM,UAAA;gBACNgB,QAAAA,EAAU,WAAA;gBACVC,MAAAA,EAAQ,gCAAA;gBACRC,UAAAA,EAAY,OAAA;gBACZf,YAAAA,EAAc;AACpB;AACA,SAAA;QAEEgB,MAAAA,EAAQjC;AACV,KAAA;;;;;;"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"schema-config.js","sources":["../../../../server/content-types/user/schema-config.js"],"sourcesContent":["'use strict';\n\nmodule.exports = {\n attributes: {\n resetPasswordToken: {\n hidden: true,\n },\n confirmationToken: {\n hidden: true,\n },\n provider: {\n hidden: true,\n },\n },\n};\n"],"names":["schemaConfig","attributes","resetPasswordToken","hidden","confirmationToken","provider"],"mappings":";;;;;;;IAEAA,
|
|
1
|
+
{"version":3,"file":"schema-config.js","sources":["../../../../server/content-types/user/schema-config.js"],"sourcesContent":["'use strict';\n\nmodule.exports = {\n attributes: {\n resetPasswordToken: {\n hidden: true,\n },\n confirmationToken: {\n hidden: true,\n },\n provider: {\n hidden: true,\n },\n },\n};\n"],"names":["schemaConfig","attributes","resetPasswordToken","hidden","confirmationToken","provider"],"mappings":";;;;;;;IAEAA,YAAAA,GAAiB;QACfC,UAAAA,EAAY;YACVC,kBAAAA,EAAoB;gBAClBC,MAAAA,EAAQ;AACd,aAAA;YACIC,iBAAAA,EAAmB;gBACjBD,MAAAA,EAAQ;AACd,aAAA;YACIE,QAAAA,EAAU;gBACRF,MAAAA,EAAQ;AACd;AACA;AACA,KAAA;;;;;;"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"schema-config.mjs","sources":["../../../../server/content-types/user/schema-config.js"],"sourcesContent":["'use strict';\n\nmodule.exports = {\n attributes: {\n resetPasswordToken: {\n hidden: true,\n },\n confirmationToken: {\n hidden: true,\n },\n provider: {\n hidden: true,\n },\n },\n};\n"],"names":["schemaConfig","attributes","resetPasswordToken","hidden","confirmationToken","provider"],"mappings":";;;;;IAEAA,
|
|
1
|
+
{"version":3,"file":"schema-config.mjs","sources":["../../../../server/content-types/user/schema-config.js"],"sourcesContent":["'use strict';\n\nmodule.exports = {\n attributes: {\n resetPasswordToken: {\n hidden: true,\n },\n confirmationToken: {\n hidden: true,\n },\n provider: {\n hidden: true,\n },\n },\n};\n"],"names":["schemaConfig","attributes","resetPasswordToken","hidden","confirmationToken","provider"],"mappings":";;;;;IAEAA,YAAAA,GAAiB;QACfC,UAAAA,EAAY;YACVC,kBAAAA,EAAoB;gBAClBC,MAAAA,EAAQ;AACd,aAAA;YACIC,iBAAAA,EAAmB;gBACjBD,MAAAA,EAAQ;AACd,aAAA;YACIE,QAAAA,EAAU;gBACRF,MAAAA,EAAQ;AACd;AACA;AACA,KAAA;;;;;;"}
|
|
@@ -1,8 +1,8 @@
|
|
|
1
1
|
'use strict';
|
|
2
2
|
|
|
3
|
-
var require$$0 = require('crypto');
|
|
3
|
+
var require$$0$2 = require('crypto');
|
|
4
4
|
var require$$0$1 = require('lodash');
|
|
5
|
-
var require$$0
|
|
5
|
+
var require$$0 = require('lodash/fp');
|
|
6
6
|
var require$$1 = require('@strapi/utils');
|
|
7
7
|
var index = require('../utils/index.js');
|
|
8
8
|
var auth$1 = require('./validation/auth.js');
|
|
@@ -17,9 +17,9 @@ function requireAuth() {
|
|
|
17
17
|
* Auth.js controller
|
|
18
18
|
*
|
|
19
19
|
* @description: A set of functions called "actions" for managing `Auth`.
|
|
20
|
-
*/ /* eslint-disable no-useless-escape */ const crypto = require$$0;
|
|
20
|
+
*/ /* eslint-disable no-useless-escape */ const crypto = require$$0$2;
|
|
21
21
|
const _ = require$$0$1;
|
|
22
|
-
const { concat, compact, isArray } = require$$0
|
|
22
|
+
const { concat, compact, isArray } = require$$0;
|
|
23
23
|
const utils = require$$1;
|
|
24
24
|
const { getService } = index.__require();
|
|
25
25
|
const { validateCallbackBody, validateRegisterBody, validateSendEmailConfirmationBody, validateForgotPasswordBody, validateResetPasswordBody, validateEmailConfirmationBody, validateChangePasswordBody } = auth$1.__require();
|