@strapi/plugin-users-permissions 5.37.1 → 5.38.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (253) hide show
  1. package/dist/admin/components/BoundRoute/getMethodColor.js.map +1 -1
  2. package/dist/admin/components/BoundRoute/getMethodColor.mjs.map +1 -1
  3. package/dist/admin/components/BoundRoute/index.js.map +1 -1
  4. package/dist/admin/components/BoundRoute/index.mjs +1 -1
  5. package/dist/admin/components/BoundRoute/index.mjs.map +1 -1
  6. package/dist/admin/components/FormModal/Input/index.js.map +1 -1
  7. package/dist/admin/components/FormModal/Input/index.mjs.map +1 -1
  8. package/dist/admin/components/FormModal/index.js.map +1 -1
  9. package/dist/admin/components/FormModal/index.mjs.map +1 -1
  10. package/dist/admin/components/Permissions/PermissionRow/CheckboxWrapper.js.map +1 -1
  11. package/dist/admin/components/Permissions/PermissionRow/CheckboxWrapper.mjs +1 -1
  12. package/dist/admin/components/Permissions/PermissionRow/CheckboxWrapper.mjs.map +1 -1
  13. package/dist/admin/components/Permissions/PermissionRow/SubCategory.js.map +1 -1
  14. package/dist/admin/components/Permissions/PermissionRow/SubCategory.mjs.map +1 -1
  15. package/dist/admin/components/Permissions/PermissionRow/index.js.map +1 -1
  16. package/dist/admin/components/Permissions/PermissionRow/index.mjs.map +1 -1
  17. package/dist/admin/components/Permissions/index.js.map +1 -1
  18. package/dist/admin/components/Permissions/index.mjs.map +1 -1
  19. package/dist/admin/components/Permissions/init.js.map +1 -1
  20. package/dist/admin/components/Permissions/init.mjs.map +1 -1
  21. package/dist/admin/components/Permissions/reducer.js.map +1 -1
  22. package/dist/admin/components/Permissions/reducer.mjs.map +1 -1
  23. package/dist/admin/components/Policies/index.js.map +1 -1
  24. package/dist/admin/components/Policies/index.mjs.map +1 -1
  25. package/dist/admin/components/UsersPermissions/index.js.map +1 -1
  26. package/dist/admin/components/UsersPermissions/index.mjs +5 -5
  27. package/dist/admin/components/UsersPermissions/index.mjs.map +1 -1
  28. package/dist/admin/components/UsersPermissions/init.js.map +1 -1
  29. package/dist/admin/components/UsersPermissions/init.mjs.map +1 -1
  30. package/dist/admin/components/UsersPermissions/reducer.js.map +1 -1
  31. package/dist/admin/components/UsersPermissions/reducer.mjs.map +1 -1
  32. package/dist/admin/constants.js.map +1 -1
  33. package/dist/admin/constants.mjs.map +1 -1
  34. package/dist/admin/contexts/UsersPermissionsContext/index.js.map +1 -1
  35. package/dist/admin/contexts/UsersPermissionsContext/index.mjs.map +1 -1
  36. package/dist/admin/index.js.map +1 -1
  37. package/dist/admin/index.mjs.map +1 -1
  38. package/dist/admin/package.json.js +1 -6
  39. package/dist/admin/package.json.js.map +1 -1
  40. package/dist/admin/package.json.mjs +1 -6
  41. package/dist/admin/package.json.mjs.map +1 -1
  42. package/dist/admin/pages/AdvancedSettings/index.js.map +1 -1
  43. package/dist/admin/pages/AdvancedSettings/index.mjs.map +1 -1
  44. package/dist/admin/pages/AdvancedSettings/utils/layout.js.map +1 -1
  45. package/dist/admin/pages/AdvancedSettings/utils/layout.mjs.map +1 -1
  46. package/dist/admin/pages/AdvancedSettings/utils/schema.js.map +1 -1
  47. package/dist/admin/pages/AdvancedSettings/utils/schema.mjs.map +1 -1
  48. package/dist/admin/pages/EmailTemplates/components/EmailForm.js.map +1 -1
  49. package/dist/admin/pages/EmailTemplates/components/EmailForm.mjs.map +1 -1
  50. package/dist/admin/pages/EmailTemplates/components/EmailTable.js.map +1 -1
  51. package/dist/admin/pages/EmailTemplates/components/EmailTable.mjs.map +1 -1
  52. package/dist/admin/pages/EmailTemplates/index.js.map +1 -1
  53. package/dist/admin/pages/EmailTemplates/index.mjs.map +1 -1
  54. package/dist/admin/pages/EmailTemplates/utils/schema.js.map +1 -1
  55. package/dist/admin/pages/EmailTemplates/utils/schema.mjs.map +1 -1
  56. package/dist/admin/pages/Providers/index.js.map +1 -1
  57. package/dist/admin/pages/Providers/index.mjs.map +1 -1
  58. package/dist/admin/pages/Providers/utils/forms.js.map +1 -1
  59. package/dist/admin/pages/Providers/utils/forms.mjs.map +1 -1
  60. package/dist/admin/pages/Roles/constants.js.map +1 -1
  61. package/dist/admin/pages/Roles/constants.mjs.map +1 -1
  62. package/dist/admin/pages/Roles/hooks/usePlugins.js.map +1 -1
  63. package/dist/admin/pages/Roles/hooks/usePlugins.mjs.map +1 -1
  64. package/dist/admin/pages/Roles/index.js.map +1 -1
  65. package/dist/admin/pages/Roles/index.mjs.map +1 -1
  66. package/dist/admin/pages/Roles/pages/CreatePage.js.map +1 -1
  67. package/dist/admin/pages/Roles/pages/CreatePage.mjs +1 -1
  68. package/dist/admin/pages/Roles/pages/CreatePage.mjs.map +1 -1
  69. package/dist/admin/pages/Roles/pages/EditPage.js.map +1 -1
  70. package/dist/admin/pages/Roles/pages/EditPage.mjs +1 -1
  71. package/dist/admin/pages/Roles/pages/EditPage.mjs.map +1 -1
  72. package/dist/admin/pages/Roles/pages/ListPage/components/TableBody.js.map +1 -1
  73. package/dist/admin/pages/Roles/pages/ListPage/components/TableBody.mjs +1 -1
  74. package/dist/admin/pages/Roles/pages/ListPage/components/TableBody.mjs.map +1 -1
  75. package/dist/admin/pages/Roles/pages/ListPage/index.js.map +1 -1
  76. package/dist/admin/pages/Roles/pages/ListPage/index.mjs.map +1 -1
  77. package/dist/admin/pluginId.js.map +1 -1
  78. package/dist/admin/pluginId.mjs.map +1 -1
  79. package/dist/admin/utils/cleanPermissions.js.map +1 -1
  80. package/dist/admin/utils/cleanPermissions.mjs.map +1 -1
  81. package/dist/admin/utils/formatPluginName.js.map +1 -1
  82. package/dist/admin/utils/formatPluginName.mjs.map +1 -1
  83. package/dist/admin/utils/getTrad.js.map +1 -1
  84. package/dist/admin/utils/getTrad.mjs.map +1 -1
  85. package/dist/admin/utils/prefixPluginTranslations.js.map +1 -1
  86. package/dist/admin/utils/prefixPluginTranslations.mjs.map +1 -1
  87. package/dist/server/bootstrap/index.js.map +1 -1
  88. package/dist/server/bootstrap/index.mjs.map +1 -1
  89. package/dist/server/bootstrap/users-permissions-actions.js.map +1 -1
  90. package/dist/server/bootstrap/users-permissions-actions.mjs.map +1 -1
  91. package/dist/server/config.js.map +1 -1
  92. package/dist/server/config.mjs.map +1 -1
  93. package/dist/server/content-types/index.js +4 -4
  94. package/dist/server/content-types/index.js.map +1 -1
  95. package/dist/server/content-types/index.mjs.map +1 -1
  96. package/dist/server/content-types/permission/index.js.map +1 -1
  97. package/dist/server/content-types/permission/index.mjs.map +1 -1
  98. package/dist/server/content-types/role/index.js.map +1 -1
  99. package/dist/server/content-types/role/index.mjs.map +1 -1
  100. package/dist/server/content-types/user/index.js.map +1 -1
  101. package/dist/server/content-types/user/index.mjs.map +1 -1
  102. package/dist/server/content-types/user/schema-config.js.map +1 -1
  103. package/dist/server/content-types/user/schema-config.mjs.map +1 -1
  104. package/dist/server/controllers/auth.js +4 -4
  105. package/dist/server/controllers/auth.js.map +1 -1
  106. package/dist/server/controllers/auth.mjs +4 -4
  107. package/dist/server/controllers/auth.mjs.map +1 -1
  108. package/dist/server/controllers/content-manager-user.js.map +1 -1
  109. package/dist/server/controllers/content-manager-user.mjs.map +1 -1
  110. package/dist/server/controllers/index.js.map +1 -1
  111. package/dist/server/controllers/index.mjs.map +1 -1
  112. package/dist/server/controllers/permissions.js.map +1 -1
  113. package/dist/server/controllers/permissions.mjs.map +1 -1
  114. package/dist/server/controllers/role.js.map +1 -1
  115. package/dist/server/controllers/role.mjs.map +1 -1
  116. package/dist/server/controllers/settings.js.map +1 -1
  117. package/dist/server/controllers/settings.mjs.map +1 -1
  118. package/dist/server/controllers/user.js.map +1 -1
  119. package/dist/server/controllers/user.mjs.map +1 -1
  120. package/dist/server/controllers/validation/auth.js.map +1 -1
  121. package/dist/server/controllers/validation/auth.mjs.map +1 -1
  122. package/dist/server/controllers/validation/email-template.js.map +1 -1
  123. package/dist/server/controllers/validation/email-template.mjs.map +1 -1
  124. package/dist/server/controllers/validation/user.js.map +1 -1
  125. package/dist/server/controllers/validation/user.mjs.map +1 -1
  126. package/dist/server/graphql/index.js.map +1 -1
  127. package/dist/server/graphql/index.mjs.map +1 -1
  128. package/dist/server/graphql/mutations/auth/change-password.js.map +1 -1
  129. package/dist/server/graphql/mutations/auth/change-password.mjs.map +1 -1
  130. package/dist/server/graphql/mutations/auth/email-confirmation.js.map +1 -1
  131. package/dist/server/graphql/mutations/auth/email-confirmation.mjs.map +1 -1
  132. package/dist/server/graphql/mutations/auth/forgot-password.js.map +1 -1
  133. package/dist/server/graphql/mutations/auth/forgot-password.mjs.map +1 -1
  134. package/dist/server/graphql/mutations/auth/login.js.map +1 -1
  135. package/dist/server/graphql/mutations/auth/login.mjs.map +1 -1
  136. package/dist/server/graphql/mutations/auth/register.js.map +1 -1
  137. package/dist/server/graphql/mutations/auth/register.mjs.map +1 -1
  138. package/dist/server/graphql/mutations/auth/reset-password.js.map +1 -1
  139. package/dist/server/graphql/mutations/auth/reset-password.mjs.map +1 -1
  140. package/dist/server/graphql/mutations/crud/role/create-role.js.map +1 -1
  141. package/dist/server/graphql/mutations/crud/role/create-role.mjs.map +1 -1
  142. package/dist/server/graphql/mutations/crud/role/delete-role.js.map +1 -1
  143. package/dist/server/graphql/mutations/crud/role/delete-role.mjs.map +1 -1
  144. package/dist/server/graphql/mutations/crud/role/update-role.js.map +1 -1
  145. package/dist/server/graphql/mutations/crud/role/update-role.mjs.map +1 -1
  146. package/dist/server/graphql/mutations/crud/user/create-user.js.map +1 -1
  147. package/dist/server/graphql/mutations/crud/user/create-user.mjs.map +1 -1
  148. package/dist/server/graphql/mutations/crud/user/delete-user.js.map +1 -1
  149. package/dist/server/graphql/mutations/crud/user/delete-user.mjs.map +1 -1
  150. package/dist/server/graphql/mutations/crud/user/update-user.js.map +1 -1
  151. package/dist/server/graphql/mutations/crud/user/update-user.mjs.map +1 -1
  152. package/dist/server/graphql/mutations/index.js.map +1 -1
  153. package/dist/server/graphql/mutations/index.mjs.map +1 -1
  154. package/dist/server/graphql/queries/index.js.map +1 -1
  155. package/dist/server/graphql/queries/index.mjs.map +1 -1
  156. package/dist/server/graphql/queries/me.js.map +1 -1
  157. package/dist/server/graphql/queries/me.mjs.map +1 -1
  158. package/dist/server/graphql/resolvers-configs.js.map +1 -1
  159. package/dist/server/graphql/resolvers-configs.mjs.map +1 -1
  160. package/dist/server/graphql/types/create-role-payload.js.map +1 -1
  161. package/dist/server/graphql/types/create-role-payload.mjs.map +1 -1
  162. package/dist/server/graphql/types/delete-role-payload.js.map +1 -1
  163. package/dist/server/graphql/types/delete-role-payload.mjs.map +1 -1
  164. package/dist/server/graphql/types/index.js.map +1 -1
  165. package/dist/server/graphql/types/index.mjs.map +1 -1
  166. package/dist/server/graphql/types/login-input.js.map +1 -1
  167. package/dist/server/graphql/types/login-input.mjs.map +1 -1
  168. package/dist/server/graphql/types/login-payload.js.map +1 -1
  169. package/dist/server/graphql/types/login-payload.mjs.map +1 -1
  170. package/dist/server/graphql/types/me-role.js.map +1 -1
  171. package/dist/server/graphql/types/me-role.mjs.map +1 -1
  172. package/dist/server/graphql/types/me.js.map +1 -1
  173. package/dist/server/graphql/types/me.mjs.map +1 -1
  174. package/dist/server/graphql/types/password-payload.js.map +1 -1
  175. package/dist/server/graphql/types/password-payload.mjs.map +1 -1
  176. package/dist/server/graphql/types/register-input.js.map +1 -1
  177. package/dist/server/graphql/types/register-input.mjs.map +1 -1
  178. package/dist/server/graphql/types/update-role-payload.js.map +1 -1
  179. package/dist/server/graphql/types/update-role-payload.mjs.map +1 -1
  180. package/dist/server/graphql/types/user-input.js.map +1 -1
  181. package/dist/server/graphql/types/user-input.mjs.map +1 -1
  182. package/dist/server/graphql/utils.js.map +1 -1
  183. package/dist/server/graphql/utils.mjs.map +1 -1
  184. package/dist/server/index.js.map +1 -1
  185. package/dist/server/index.mjs.map +1 -1
  186. package/dist/server/index2.js.map +1 -1
  187. package/dist/server/index2.mjs.map +1 -1
  188. package/dist/server/middlewares/index.js.map +1 -1
  189. package/dist/server/middlewares/index.mjs.map +1 -1
  190. package/dist/server/middlewares/rateLimit.js +4 -4
  191. package/dist/server/middlewares/rateLimit.js.map +1 -1
  192. package/dist/server/middlewares/rateLimit.mjs +4 -4
  193. package/dist/server/middlewares/rateLimit.mjs.map +1 -1
  194. package/dist/server/register.js.map +1 -1
  195. package/dist/server/register.mjs.map +1 -1
  196. package/dist/server/routes/admin/index.js.map +1 -1
  197. package/dist/server/routes/admin/index.mjs.map +1 -1
  198. package/dist/server/routes/admin/permissions.js.map +1 -1
  199. package/dist/server/routes/admin/permissions.mjs.map +1 -1
  200. package/dist/server/routes/admin/role.js.map +1 -1
  201. package/dist/server/routes/admin/role.mjs.map +1 -1
  202. package/dist/server/routes/admin/settings.js.map +1 -1
  203. package/dist/server/routes/admin/settings.mjs.map +1 -1
  204. package/dist/server/routes/content-api/auth.js.map +1 -1
  205. package/dist/server/routes/content-api/auth.mjs.map +1 -1
  206. package/dist/server/routes/content-api/index.js.map +1 -1
  207. package/dist/server/routes/content-api/index.mjs.map +1 -1
  208. package/dist/server/routes/content-api/permissions.js.map +1 -1
  209. package/dist/server/routes/content-api/permissions.mjs.map +1 -1
  210. package/dist/server/routes/content-api/role.js.map +1 -1
  211. package/dist/server/routes/content-api/role.mjs.map +1 -1
  212. package/dist/server/routes/content-api/user.js.map +1 -1
  213. package/dist/server/routes/content-api/user.mjs.map +1 -1
  214. package/dist/server/routes/content-api/validation.js.map +1 -1
  215. package/dist/server/routes/content-api/validation.mjs.map +1 -1
  216. package/dist/server/routes/index.js +4 -4
  217. package/dist/server/routes/index.js.map +1 -1
  218. package/dist/server/routes/index.mjs.map +1 -1
  219. package/dist/server/services/constants.js.map +1 -1
  220. package/dist/server/services/constants.mjs.map +1 -1
  221. package/dist/server/services/index.js.map +1 -1
  222. package/dist/server/services/index.mjs.map +1 -1
  223. package/dist/server/services/jwt.js.map +1 -1
  224. package/dist/server/services/jwt.mjs.map +1 -1
  225. package/dist/server/services/permission.js.map +1 -1
  226. package/dist/server/services/permission.mjs.map +1 -1
  227. package/dist/server/services/providers-registry.js.map +1 -1
  228. package/dist/server/services/providers-registry.mjs.map +1 -1
  229. package/dist/server/services/providers.js.map +1 -1
  230. package/dist/server/services/providers.mjs.map +1 -1
  231. package/dist/server/services/role.js.map +1 -1
  232. package/dist/server/services/role.mjs.map +1 -1
  233. package/dist/server/services/user.js +8 -8
  234. package/dist/server/services/user.js.map +1 -1
  235. package/dist/server/services/user.mjs +8 -8
  236. package/dist/server/services/user.mjs.map +1 -1
  237. package/dist/server/services/users-permissions.js +4 -4
  238. package/dist/server/services/users-permissions.js.map +1 -1
  239. package/dist/server/services/users-permissions.mjs +4 -4
  240. package/dist/server/services/users-permissions.mjs.map +1 -1
  241. package/dist/server/strategies/users-permissions.js.map +1 -1
  242. package/dist/server/strategies/users-permissions.mjs.map +1 -1
  243. package/dist/server/utils/index.js.map +1 -1
  244. package/dist/server/utils/index.mjs.map +1 -1
  245. package/dist/server/utils/sanitize/index.js.map +1 -1
  246. package/dist/server/utils/sanitize/index.mjs.map +1 -1
  247. package/dist/server/utils/sanitize/sanitizers.js.map +1 -1
  248. package/dist/server/utils/sanitize/sanitizers.mjs.map +1 -1
  249. package/dist/server/utils/sanitize/visitors/index.js.map +1 -1
  250. package/dist/server/utils/sanitize/visitors/index.mjs.map +1 -1
  251. package/dist/server/utils/sanitize/visitors/remove-user-relation-from-role-entities.js.map +1 -1
  252. package/dist/server/utils/sanitize/visitors/remove-user-relation-from-role-entities.mjs.map +1 -1
  253. package/package.json +12 -7
@@ -1 +1 @@
1
- {"version":3,"file":"index.js","sources":["../../../server/bootstrap/index.js"],"sourcesContent":["'use strict';\n\n/**\n * An asynchronous bootstrap function that runs before\n * your application gets started.\n *\n * This gives you an opportunity to set up your data model,\n * run jobs, or perform some special logic.\n */\nconst crypto = require('crypto');\nconst _ = require('lodash');\nconst { getService } = require('../utils');\nconst usersPermissionsActions = require('./users-permissions-actions');\nconst {\n DEFAULT_ACCESS_TOKEN_LIFESPAN,\n DEFAULT_MAX_REFRESH_TOKEN_LIFESPAN,\n DEFAULT_IDLE_REFRESH_TOKEN_LIFESPAN,\n DEFAULT_MAX_SESSION_LIFESPAN,\n DEFAULT_IDLE_SESSION_LIFESPAN,\n} = require('../services/constants');\n\nconst getSessionManager = () => {\n const manager = strapi.sessionManager;\n return manager ?? null;\n};\n\nconst initGrant = async (pluginStore) => {\n const allProviders = getService('providers-registry').getAll();\n\n const grantConfig = Object.entries(allProviders).reduce((acc, [name, provider]) => {\n const { icon, enabled, grantConfig } = provider;\n\n acc[name] = {\n icon,\n enabled,\n ...grantConfig,\n };\n return acc;\n }, {});\n\n const prevGrantConfig = (await pluginStore.get({ key: 'grant' })) || {};\n\n if (!prevGrantConfig || !_.isEqual(prevGrantConfig, grantConfig)) {\n // merge with the previous provider config.\n _.keys(grantConfig).forEach((key) => {\n if (key in prevGrantConfig) {\n grantConfig[key] = _.merge(grantConfig[key], prevGrantConfig[key]);\n }\n });\n await pluginStore.set({ key: 'grant', value: grantConfig });\n }\n};\n\nconst initEmails = async (pluginStore) => {\n if (!(await pluginStore.get({ key: 'email' }))) {\n const value = {\n reset_password: {\n display: 'Email.template.reset_password',\n icon: 'sync',\n options: {\n from: {\n name: 'Administration Panel',\n email: 'no-reply@strapi.io',\n },\n response_email: '',\n object: 'Reset password',\n message: `<p>We heard that you lost your password. Sorry about that!</p>\n\n<p>But don’t worry! You can use the following link to reset your password:</p>\n<p><%= URL %>?code=<%= TOKEN %></p>\n\n<p>Thanks.</p>`,\n },\n },\n email_confirmation: {\n display: 'Email.template.email_confirmation',\n icon: 'check-square',\n options: {\n from: {\n name: 'Administration Panel',\n email: 'no-reply@strapi.io',\n },\n response_email: '',\n object: 'Account confirmation',\n message: `<p>Thank you for registering!</p>\n\n<p>You have to confirm your email address. Please click on the link below.</p>\n\n<p><%= URL %>?confirmation=<%= CODE %></p>\n\n<p>Thanks.</p>`,\n },\n },\n };\n\n await pluginStore.set({ key: 'email', value });\n }\n};\n\nconst initAdvancedOptions = async (pluginStore) => {\n if (!(await pluginStore.get({ key: 'advanced' }))) {\n const value = {\n unique_email: true,\n allow_register: true,\n email_confirmation: false,\n email_reset_password: null,\n email_confirmation_redirection: null,\n default_role: 'authenticated',\n };\n\n await pluginStore.set({ key: 'advanced', value });\n }\n};\n\nmodule.exports = async ({ strapi }) => {\n const pluginStore = strapi.store({ type: 'plugin', name: 'users-permissions' });\n\n await initGrant(pluginStore);\n await initEmails(pluginStore);\n await initAdvancedOptions(pluginStore);\n\n await strapi\n .service('admin::permission')\n .actionProvider.registerMany(usersPermissionsActions.actions);\n\n await getService('users-permissions').initialize();\n\n // Define users-permissions origin configuration for sessionManager\n const upConfig = strapi.config.get('plugin::users-permissions');\n const sessionManager = getSessionManager();\n\n if (sessionManager) {\n sessionManager.defineOrigin('users-permissions', {\n jwtSecret: upConfig.jwtSecret || strapi.config.get('admin.auth.secret'),\n accessTokenLifespan: upConfig.sessions?.accessTokenLifespan || DEFAULT_ACCESS_TOKEN_LIFESPAN,\n maxRefreshTokenLifespan:\n upConfig.sessions?.maxRefreshTokenLifespan || DEFAULT_MAX_REFRESH_TOKEN_LIFESPAN,\n idleRefreshTokenLifespan:\n upConfig.sessions?.idleRefreshTokenLifespan || DEFAULT_IDLE_REFRESH_TOKEN_LIFESPAN,\n maxSessionLifespan: upConfig.sessions?.maxSessionLifespan || DEFAULT_MAX_SESSION_LIFESPAN,\n idleSessionLifespan: upConfig.sessions?.idleSessionLifespan || DEFAULT_IDLE_SESSION_LIFESPAN,\n algorithm: upConfig.jwt?.algorithm,\n jwtOptions: upConfig.jwt || {},\n });\n }\n\n if (!strapi.config.get('plugin::users-permissions.jwtSecret')) {\n if (process.env.NODE_ENV !== 'development') {\n throw new Error(\n `Missing jwtSecret. Please, set configuration variable \"jwtSecret\" for the users-permissions plugin in config/plugins.js (ex: you can generate one using Node with \\`crypto.randomBytes(16).toString('base64')\\`).\nFor security reasons, prefer storing the secret in an environment variable and read it in config/plugins.js. See https://docs.strapi.io/developer-docs/latest/setup-deployment-guides/configurations/optional/environment.html#configuration-using-environment-variables.`\n );\n }\n\n const jwtSecret = crypto.randomBytes(16).toString('base64');\n\n strapi.config.set('plugin::users-permissions.jwtSecret', jwtSecret);\n\n if (!process.env.JWT_SECRET) {\n const envPath = process.env.ENV_PATH || '.env';\n strapi.fs.appendFile(envPath, `JWT_SECRET=${jwtSecret}\\n`);\n strapi.log.info(\n `The Users & Permissions plugin automatically generated a jwt secret and stored it in ${envPath} under the name JWT_SECRET.`\n );\n }\n }\n};\n"],"names":["crypto","require$$0","_","require$$1","getService","require$$2","usersPermissionsActions","require$$3","DEFAULT_ACCESS_TOKEN_LIFESPAN","DEFAULT_MAX_REFRESH_TOKEN_LIFESPAN","DEFAULT_IDLE_REFRESH_TOKEN_LIFESPAN","DEFAULT_MAX_SESSION_LIFESPAN","DEFAULT_IDLE_SESSION_LIFESPAN","require$$4","getSessionManager","manager","strapi","sessionManager","initGrant","pluginStore","allProviders","getAll","grantConfig","Object","entries","reduce","acc","name","provider","icon","enabled","prevGrantConfig","get","key","isEqual","keys","forEach","merge","set","value","initEmails","reset_password","display","options","from","email","response_email","object","message","email_confirmation","initAdvancedOptions","unique_email","allow_register","email_reset_password","email_confirmation_redirection","default_role","bootstrap","store","type","service","actionProvider","registerMany","actions","initialize","upConfig","config","defineOrigin","jwtSecret","accessTokenLifespan","sessions","maxRefreshTokenLifespan","idleRefreshTokenLifespan","maxSessionLifespan","idleSessionLifespan","algorithm","jwt","jwtOptions","process","env","NODE_ENV","Error","randomBytes","toString","JWT_SECRET","envPath","ENV_PATH","fs","appendFile","log","info"],"mappings":";;;;;;;;;;;;;AAEA;;;;;;AAMA,KACA,MAAMA,MAASC,GAAAA,UAAAA;AACf,IAAA,MAAMC,CAAIC,GAAAA,YAAAA;IACV,MAAM,EAAEC,UAAU,EAAE,GAAGC,eAAAA,EAAAA;AACvB,IAAA,MAAMC,yBAA0BC,GAAAA,iCAAAA,EAAAA;IAChC,MAAM,EACJC,6BAA6B,EAC7BC,kCAAkC,EAClCC,mCAAmC,EACnCC,4BAA4B,EAC5BC,6BAA6B,EAC9B,GAAGC,mBAAAA,EAAAA;AAEJ,IAAA,MAAMC,iBAAoB,GAAA,IAAA;QACxB,MAAMC,OAAAA,GAAUC,OAAOC,cAAc;AACrC,QAAA,OAAOF,OAAW,IAAA,IAAA;AACpB,KAAA;AAEA,IAAA,MAAMG,YAAY,OAAOC,WAAAA,GAAAA;QACvB,MAAMC,YAAAA,GAAehB,UAAW,CAAA,oBAAA,CAAA,CAAsBiB,MAAM,EAAA;QAE5D,MAAMC,WAAAA,GAAcC,MAAOC,CAAAA,OAAO,CAACJ,YAAAA,CAAAA,CAAcK,MAAM,CAAC,CAACC,GAAAA,EAAK,CAACC,IAAAA,EAAMC,QAAS,CAAA,GAAA;AAC5E,YAAA,MAAM,EAAEC,IAAI,EAAEC,OAAO,EAAER,WAAW,EAAE,GAAGM,QAAAA;YAEvCF,GAAG,CAACC,KAAK,GAAG;AACVE,gBAAAA,IAAAA;AACAC,gBAAAA,OAAAA;AACA,gBAAA,GAAGR;AACT,aAAA;YACI,OAAOI,GAAAA;AACR,SAAA,EAAE,EAAE,CAAA;AAEL,QAAA,MAAMK,eAAkB,GAAC,MAAMZ,WAAAA,CAAYa,GAAG,CAAC;YAAEC,GAAK,EAAA;cAAe;AAErE,QAAA,IAAI,CAACF,eAAmB,IAAA,CAAC7B,EAAEgC,OAAO,CAACH,iBAAiBT,WAAc,CAAA,EAAA;;AAEhEpB,YAAAA,CAAAA,CAAEiC,IAAI,CAACb,WAAac,CAAAA,CAAAA,OAAO,CAAC,CAACH,GAAAA,GAAAA;AAC3B,gBAAA,IAAIA,OAAOF,eAAiB,EAAA;AAC1BT,oBAAAA,WAAW,CAACW,GAAAA,CAAI,GAAG/B,CAAAA,CAAEmC,KAAK,CAACf,WAAW,CAACW,GAAI,CAAA,EAAEF,eAAe,CAACE,GAAI,CAAA,CAAA;AAClE;AACP,aAAA,CAAA;YACI,MAAMd,WAAAA,CAAYmB,GAAG,CAAC;gBAAEL,GAAK,EAAA,OAAA;gBAASM,KAAOjB,EAAAA;AAAW,aAAA,CAAA;AACzD;AACH,KAAA;AAEA,IAAA,MAAMkB,aAAa,OAAOrB,WAAAA,GAAAA;AACxB,QAAA,IAAI,CAAE,MAAMA,WAAYa,CAAAA,GAAG,CAAC;YAAEC,GAAK,EAAA;SAAa,CAAA,EAAA;AAC9C,YAAA,MAAMM,KAAQ,GAAA;gBACZE,cAAgB,EAAA;oBACdC,OAAS,EAAA,+BAAA;oBACTb,IAAM,EAAA,MAAA;oBACNc,OAAS,EAAA;wBACPC,IAAM,EAAA;4BACJjB,IAAM,EAAA,sBAAA;4BACNkB,KAAO,EAAA;AACR,yBAAA;wBACDC,cAAgB,EAAA,EAAA;wBAChBC,MAAQ,EAAA,gBAAA;AACRC,wBAAAA,OAAAA,EAAS,CAAC;;;;;cAKN;AACL;AACF,iBAAA;gBACDC,kBAAoB,EAAA;oBAClBP,OAAS,EAAA,mCAAA;oBACTb,IAAM,EAAA,cAAA;oBACNc,OAAS,EAAA;wBACPC,IAAM,EAAA;4BACJjB,IAAM,EAAA,sBAAA;4BACNkB,KAAO,EAAA;AACR,yBAAA;wBACDC,cAAgB,EAAA,EAAA;wBAChBC,MAAQ,EAAA,sBAAA;AACRC,wBAAAA,OAAAA,EAAS,CAAC;;;;;;cAMN;AACL;AACF;AACP,aAAA;YAEI,MAAM7B,WAAAA,CAAYmB,GAAG,CAAC;gBAAEL,GAAK,EAAA,OAAA;AAASM,gBAAAA;AAAK,aAAA,CAAA;AAC5C;AACH,KAAA;AAEA,IAAA,MAAMW,sBAAsB,OAAO/B,WAAAA,GAAAA;AACjC,QAAA,IAAI,CAAE,MAAMA,WAAYa,CAAAA,GAAG,CAAC;YAAEC,GAAK,EAAA;SAAgB,CAAA,EAAA;AACjD,YAAA,MAAMM,KAAQ,GAAA;gBACZY,YAAc,EAAA,IAAA;gBACdC,cAAgB,EAAA,IAAA;gBAChBH,kBAAoB,EAAA,KAAA;gBACpBI,oBAAsB,EAAA,IAAA;gBACtBC,8BAAgC,EAAA,IAAA;gBAChCC,YAAc,EAAA;AACpB,aAAA;YAEI,MAAMpC,WAAAA,CAAYmB,GAAG,CAAC;gBAAEL,GAAK,EAAA,UAAA;AAAYM,gBAAAA;AAAK,aAAA,CAAA;AAC/C;AACH,KAAA;AAEAiB,IAAAA,SAAAA,GAAiB,OAAO,EAAExC,MAAAA,EAAAA,OAAM,EAAE,GAAA;QAChC,MAAMG,WAAAA,GAAcH,OAAOyC,CAAAA,KAAK,CAAC;YAAEC,IAAM,EAAA,QAAA;YAAU/B,IAAM,EAAA;AAAmB,SAAA,CAAA;AAE5E,QAAA,MAAMT,SAAUC,CAAAA,WAAAA,CAAAA;AAChB,QAAA,MAAMqB,UAAWrB,CAAAA,WAAAA,CAAAA;AACjB,QAAA,MAAM+B,mBAAoB/B,CAAAA,WAAAA,CAAAA;QAE1B,MAAMH,OAAAA,CACH2C,OAAO,CAAC,mBAAA,CAAA,CACRC,cAAc,CAACC,YAAY,CAACvD,yBAAAA,CAAwBwD,OAAO,CAAA;QAE9D,MAAM1D,UAAAA,CAAW,qBAAqB2D,UAAU,EAAA;;AAGhD,QAAA,MAAMC,QAAWhD,GAAAA,OAAAA,CAAOiD,MAAM,CAACjC,GAAG,CAAC,2BAAA,CAAA;AACnC,QAAA,MAAMf,cAAiBH,GAAAA,iBAAAA,EAAAA;AAEvB,QAAA,IAAIG,cAAgB,EAAA;YAClBA,cAAeiD,CAAAA,YAAY,CAAC,mBAAqB,EAAA;AAC/CC,gBAAAA,SAAAA,EAAWH,SAASG,SAAS,IAAInD,QAAOiD,MAAM,CAACjC,GAAG,CAAC,mBAAA,CAAA;gBACnDoC,mBAAqBJ,EAAAA,QAAAA,CAASK,QAAQ,EAAED,mBAAuB5D,IAAAA,6BAAAA;gBAC/D8D,uBACEN,EAAAA,QAAAA,CAASK,QAAQ,EAAEC,uBAA2B7D,IAAAA,kCAAAA;gBAChD8D,wBACEP,EAAAA,QAAAA,CAASK,QAAQ,EAAEE,wBAA4B7D,IAAAA,mCAAAA;gBACjD8D,kBAAoBR,EAAAA,QAAAA,CAASK,QAAQ,EAAEG,kBAAsB7D,IAAAA,4BAAAA;gBAC7D8D,mBAAqBT,EAAAA,QAAAA,CAASK,QAAQ,EAAEI,mBAAuB7D,IAAAA,6BAAAA;gBAC/D8D,SAAWV,EAAAA,QAAAA,CAASW,GAAG,EAAED,SAAAA;gBACzBE,UAAYZ,EAAAA,QAAAA,CAASW,GAAG,IAAI;AAClC,aAAA,CAAA;AACG;AAED,QAAA,IAAI,CAAC3D,OAAOiD,CAAAA,MAAM,CAACjC,GAAG,CAAC,qCAAwC,CAAA,EAAA;AAC7D,YAAA,IAAI6C,OAAQC,CAAAA,GAAG,CAACC,QAAQ,KAAK,aAAe,EAAA;gBAC1C,MAAM,IAAIC,MACR,CAAC;yQACgQ,CAAC,CAAA;AAErQ;AAED,YAAA,MAAMb,YAAYnE,MAAOiF,CAAAA,WAAW,CAAC,EAAA,CAAA,CAAIC,QAAQ,CAAC,QAAA,CAAA;AAElDlE,YAAAA,OAAAA,CAAOiD,MAAM,CAAC3B,GAAG,CAAC,qCAAuC6B,EAAAA,SAAAA,CAAAA;AAEzD,YAAA,IAAI,CAACU,OAAAA,CAAQC,GAAG,CAACK,UAAU,EAAE;AAC3B,gBAAA,MAAMC,OAAUP,GAAAA,OAAAA,CAAQC,GAAG,CAACO,QAAQ,IAAI,MAAA;gBACxCrE,OAAOsE,CAAAA,EAAE,CAACC,UAAU,CAACH,OAAAA,EAAS,CAAC,WAAW,EAAEjB,SAAU,CAAA,EAAE,CAAC,CAAA;gBACzDnD,OAAOwE,CAAAA,GAAG,CAACC,IAAI,CACb,CAAC,qFAAqF,EAAEL,OAAQ,CAAA,2BAA2B,CAAC,CAAA;AAE/H;AACF;AACH,KAAA;;;;;;"}
1
+ {"version":3,"file":"index.js","sources":["../../../server/bootstrap/index.js"],"sourcesContent":["'use strict';\n\n/**\n * An asynchronous bootstrap function that runs before\n * your application gets started.\n *\n * This gives you an opportunity to set up your data model,\n * run jobs, or perform some special logic.\n */\nconst crypto = require('crypto');\nconst _ = require('lodash');\nconst { getService } = require('../utils');\nconst usersPermissionsActions = require('./users-permissions-actions');\nconst {\n DEFAULT_ACCESS_TOKEN_LIFESPAN,\n DEFAULT_MAX_REFRESH_TOKEN_LIFESPAN,\n DEFAULT_IDLE_REFRESH_TOKEN_LIFESPAN,\n DEFAULT_MAX_SESSION_LIFESPAN,\n DEFAULT_IDLE_SESSION_LIFESPAN,\n} = require('../services/constants');\n\nconst getSessionManager = () => {\n const manager = strapi.sessionManager;\n return manager ?? null;\n};\n\nconst initGrant = async (pluginStore) => {\n const allProviders = getService('providers-registry').getAll();\n\n const grantConfig = Object.entries(allProviders).reduce((acc, [name, provider]) => {\n const { icon, enabled, grantConfig } = provider;\n\n acc[name] = {\n icon,\n enabled,\n ...grantConfig,\n };\n return acc;\n }, {});\n\n const prevGrantConfig = (await pluginStore.get({ key: 'grant' })) || {};\n\n if (!prevGrantConfig || !_.isEqual(prevGrantConfig, grantConfig)) {\n // merge with the previous provider config.\n _.keys(grantConfig).forEach((key) => {\n if (key in prevGrantConfig) {\n grantConfig[key] = _.merge(grantConfig[key], prevGrantConfig[key]);\n }\n });\n await pluginStore.set({ key: 'grant', value: grantConfig });\n }\n};\n\nconst initEmails = async (pluginStore) => {\n if (!(await pluginStore.get({ key: 'email' }))) {\n const value = {\n reset_password: {\n display: 'Email.template.reset_password',\n icon: 'sync',\n options: {\n from: {\n name: 'Administration Panel',\n email: 'no-reply@strapi.io',\n },\n response_email: '',\n object: 'Reset password',\n message: `<p>We heard that you lost your password. Sorry about that!</p>\n\n<p>But don’t worry! You can use the following link to reset your password:</p>\n<p><%= URL %>?code=<%= TOKEN %></p>\n\n<p>Thanks.</p>`,\n },\n },\n email_confirmation: {\n display: 'Email.template.email_confirmation',\n icon: 'check-square',\n options: {\n from: {\n name: 'Administration Panel',\n email: 'no-reply@strapi.io',\n },\n response_email: '',\n object: 'Account confirmation',\n message: `<p>Thank you for registering!</p>\n\n<p>You have to confirm your email address. Please click on the link below.</p>\n\n<p><%= URL %>?confirmation=<%= CODE %></p>\n\n<p>Thanks.</p>`,\n },\n },\n };\n\n await pluginStore.set({ key: 'email', value });\n }\n};\n\nconst initAdvancedOptions = async (pluginStore) => {\n if (!(await pluginStore.get({ key: 'advanced' }))) {\n const value = {\n unique_email: true,\n allow_register: true,\n email_confirmation: false,\n email_reset_password: null,\n email_confirmation_redirection: null,\n default_role: 'authenticated',\n };\n\n await pluginStore.set({ key: 'advanced', value });\n }\n};\n\nmodule.exports = async ({ strapi }) => {\n const pluginStore = strapi.store({ type: 'plugin', name: 'users-permissions' });\n\n await initGrant(pluginStore);\n await initEmails(pluginStore);\n await initAdvancedOptions(pluginStore);\n\n await strapi\n .service('admin::permission')\n .actionProvider.registerMany(usersPermissionsActions.actions);\n\n await getService('users-permissions').initialize();\n\n // Define users-permissions origin configuration for sessionManager\n const upConfig = strapi.config.get('plugin::users-permissions');\n const sessionManager = getSessionManager();\n\n if (sessionManager) {\n sessionManager.defineOrigin('users-permissions', {\n jwtSecret: upConfig.jwtSecret || strapi.config.get('admin.auth.secret'),\n accessTokenLifespan: upConfig.sessions?.accessTokenLifespan || DEFAULT_ACCESS_TOKEN_LIFESPAN,\n maxRefreshTokenLifespan:\n upConfig.sessions?.maxRefreshTokenLifespan || DEFAULT_MAX_REFRESH_TOKEN_LIFESPAN,\n idleRefreshTokenLifespan:\n upConfig.sessions?.idleRefreshTokenLifespan || DEFAULT_IDLE_REFRESH_TOKEN_LIFESPAN,\n maxSessionLifespan: upConfig.sessions?.maxSessionLifespan || DEFAULT_MAX_SESSION_LIFESPAN,\n idleSessionLifespan: upConfig.sessions?.idleSessionLifespan || DEFAULT_IDLE_SESSION_LIFESPAN,\n algorithm: upConfig.jwt?.algorithm,\n jwtOptions: upConfig.jwt || {},\n });\n }\n\n if (!strapi.config.get('plugin::users-permissions.jwtSecret')) {\n if (process.env.NODE_ENV !== 'development') {\n throw new Error(\n `Missing jwtSecret. Please, set configuration variable \"jwtSecret\" for the users-permissions plugin in config/plugins.js (ex: you can generate one using Node with \\`crypto.randomBytes(16).toString('base64')\\`).\nFor security reasons, prefer storing the secret in an environment variable and read it in config/plugins.js. See https://docs.strapi.io/developer-docs/latest/setup-deployment-guides/configurations/optional/environment.html#configuration-using-environment-variables.`\n );\n }\n\n const jwtSecret = crypto.randomBytes(16).toString('base64');\n\n strapi.config.set('plugin::users-permissions.jwtSecret', jwtSecret);\n\n if (!process.env.JWT_SECRET) {\n const envPath = process.env.ENV_PATH || '.env';\n strapi.fs.appendFile(envPath, `JWT_SECRET=${jwtSecret}\\n`);\n strapi.log.info(\n `The Users & Permissions plugin automatically generated a jwt secret and stored it in ${envPath} under the name JWT_SECRET.`\n );\n }\n }\n};\n"],"names":["crypto","require$$0","_","require$$1","getService","require$$2","usersPermissionsActions","require$$3","DEFAULT_ACCESS_TOKEN_LIFESPAN","DEFAULT_MAX_REFRESH_TOKEN_LIFESPAN","DEFAULT_IDLE_REFRESH_TOKEN_LIFESPAN","DEFAULT_MAX_SESSION_LIFESPAN","DEFAULT_IDLE_SESSION_LIFESPAN","require$$4","getSessionManager","manager","strapi","sessionManager","initGrant","pluginStore","allProviders","getAll","grantConfig","Object","entries","reduce","acc","name","provider","icon","enabled","prevGrantConfig","get","key","isEqual","keys","forEach","merge","set","value","initEmails","reset_password","display","options","from","email","response_email","object","message","email_confirmation","initAdvancedOptions","unique_email","allow_register","email_reset_password","email_confirmation_redirection","default_role","bootstrap","store","type","service","actionProvider","registerMany","actions","initialize","upConfig","config","defineOrigin","jwtSecret","accessTokenLifespan","sessions","maxRefreshTokenLifespan","idleRefreshTokenLifespan","maxSessionLifespan","idleSessionLifespan","algorithm","jwt","jwtOptions","process","env","NODE_ENV","Error","randomBytes","toString","JWT_SECRET","envPath","ENV_PATH","fs","appendFile","log","info"],"mappings":";;;;;;;;;;;;;AAEA;;;;;;AAMA,KACA,MAAMA,MAAAA,GAASC,UAAAA;AACf,IAAA,MAAMC,CAAAA,GAAIC,YAAAA;IACV,MAAM,EAAEC,UAAU,EAAE,GAAGC,eAAAA,EAAAA;AACvB,IAAA,MAAMC,yBAAAA,GAA0BC,iCAAAA,EAAAA;IAChC,MAAM,EACJC,6BAA6B,EAC7BC,kCAAkC,EAClCC,mCAAmC,EACnCC,4BAA4B,EAC5BC,6BAA6B,EAC9B,GAAGC,mBAAAA,EAAAA;AAEJ,IAAA,MAAMC,iBAAAA,GAAoB,IAAA;QACxB,MAAMC,OAAAA,GAAUC,OAAOC,cAAc;AACrC,QAAA,OAAOF,OAAAA,IAAW,IAAA;AACpB,IAAA,CAAA;AAEA,IAAA,MAAMG,YAAY,OAAOC,WAAAA,GAAAA;QACvB,MAAMC,YAAAA,GAAehB,UAAAA,CAAW,oBAAA,CAAA,CAAsBiB,MAAM,EAAA;QAE5D,MAAMC,WAAAA,GAAcC,MAAAA,CAAOC,OAAO,CAACJ,YAAAA,CAAAA,CAAcK,MAAM,CAAC,CAACC,GAAAA,EAAK,CAACC,IAAAA,EAAMC,QAAAA,CAAS,GAAA;AAC5E,YAAA,MAAM,EAAEC,IAAI,EAAEC,OAAO,EAAER,WAAW,EAAE,GAAGM,QAAAA;YAEvCF,GAAG,CAACC,KAAK,GAAG;AACVE,gBAAAA,IAAAA;AACAC,gBAAAA,OAAAA;AACA,gBAAA,GAAGR;AACT,aAAA;YACI,OAAOI,GAAAA;AACX,QAAA,CAAA,EAAK,EAAA,CAAA;AAEH,QAAA,MAAMK,eAAAA,GAAmB,MAAMZ,WAAAA,CAAYa,GAAG,CAAC;YAAEC,GAAAA,EAAK;cAAe;AAErE,QAAA,IAAI,CAACF,eAAAA,IAAmB,CAAC7B,EAAEgC,OAAO,CAACH,iBAAiBT,WAAAA,CAAAA,EAAc;;AAEhEpB,YAAAA,CAAAA,CAAEiC,IAAI,CAACb,WAAAA,CAAAA,CAAac,OAAO,CAAC,CAACH,GAAAA,GAAAA;AAC3B,gBAAA,IAAIA,OAAOF,eAAAA,EAAiB;AAC1BT,oBAAAA,WAAW,CAACW,GAAAA,CAAI,GAAG/B,CAAAA,CAAEmC,KAAK,CAACf,WAAW,CAACW,GAAAA,CAAI,EAAEF,eAAe,CAACE,GAAAA,CAAI,CAAA;AACzE,gBAAA;AACA,YAAA,CAAA,CAAA;YACI,MAAMd,WAAAA,CAAYmB,GAAG,CAAC;gBAAEL,GAAAA,EAAK,OAAA;gBAASM,KAAAA,EAAOjB;AAAW,aAAA,CAAA;AAC5D,QAAA;AACA,IAAA,CAAA;AAEA,IAAA,MAAMkB,aAAa,OAAOrB,WAAAA,GAAAA;AACxB,QAAA,IAAI,CAAE,MAAMA,WAAAA,CAAYa,GAAG,CAAC;YAAEC,GAAAA,EAAK;SAAO,CAAA,EAAM;AAC9C,YAAA,MAAMM,KAAAA,GAAQ;gBACZE,cAAAA,EAAgB;oBACdC,OAAAA,EAAS,+BAAA;oBACTb,IAAAA,EAAM,MAAA;oBACNc,OAAAA,EAAS;wBACPC,IAAAA,EAAM;4BACJjB,IAAAA,EAAM,sBAAA;4BACNkB,KAAAA,EAAO;AACnB,yBAAA;wBACUC,cAAAA,EAAgB,EAAA;wBAChBC,MAAAA,EAAQ,gBAAA;AACRC,wBAAAA,OAAAA,EAAS,CAAC;;;;;cAKN;AACd;AACA,iBAAA;gBACMC,kBAAAA,EAAoB;oBAClBP,OAAAA,EAAS,mCAAA;oBACTb,IAAAA,EAAM,cAAA;oBACNc,OAAAA,EAAS;wBACPC,IAAAA,EAAM;4BACJjB,IAAAA,EAAM,sBAAA;4BACNkB,KAAAA,EAAO;AACnB,yBAAA;wBACUC,cAAAA,EAAgB,EAAA;wBAChBC,MAAAA,EAAQ,sBAAA;AACRC,wBAAAA,OAAAA,EAAS,CAAC;;;;;;cAMN;AACd;AACA;AACA,aAAA;YAEI,MAAM7B,WAAAA,CAAYmB,GAAG,CAAC;gBAAEL,GAAAA,EAAK,OAAA;AAASM,gBAAAA;AAAK,aAAA,CAAA;AAC/C,QAAA;AACA,IAAA,CAAA;AAEA,IAAA,MAAMW,sBAAsB,OAAO/B,WAAAA,GAAAA;AACjC,QAAA,IAAI,CAAE,MAAMA,WAAAA,CAAYa,GAAG,CAAC;YAAEC,GAAAA,EAAK;SAAU,CAAA,EAAM;AACjD,YAAA,MAAMM,KAAAA,GAAQ;gBACZY,YAAAA,EAAc,IAAA;gBACdC,cAAAA,EAAgB,IAAA;gBAChBH,kBAAAA,EAAoB,KAAA;gBACpBI,oBAAAA,EAAsB,IAAA;gBACtBC,8BAAAA,EAAgC,IAAA;gBAChCC,YAAAA,EAAc;AACpB,aAAA;YAEI,MAAMpC,WAAAA,CAAYmB,GAAG,CAAC;gBAAEL,GAAAA,EAAK,UAAA;AAAYM,gBAAAA;AAAK,aAAA,CAAA;AAClD,QAAA;AACA,IAAA,CAAA;AAEAiB,IAAAA,SAAAA,GAAiB,OAAO,EAAExC,MAAAA,EAAAA,OAAM,EAAE,GAAA;QAChC,MAAMG,WAAAA,GAAcH,OAAAA,CAAOyC,KAAK,CAAC;YAAEC,IAAAA,EAAM,QAAA;YAAU/B,IAAAA,EAAM;AAAmB,SAAA,CAAA;AAE5E,QAAA,MAAMT,SAAAA,CAAUC,WAAAA,CAAAA;AAChB,QAAA,MAAMqB,UAAAA,CAAWrB,WAAAA,CAAAA;AACjB,QAAA,MAAM+B,mBAAAA,CAAoB/B,WAAAA,CAAAA;QAE1B,MAAMH,OAAAA,CACH2C,OAAO,CAAC,mBAAA,CAAA,CACRC,cAAc,CAACC,YAAY,CAACvD,yBAAAA,CAAwBwD,OAAO,CAAA;QAE9D,MAAM1D,UAAAA,CAAW,qBAAqB2D,UAAU,EAAA;;AAGhD,QAAA,MAAMC,QAAAA,GAAWhD,OAAAA,CAAOiD,MAAM,CAACjC,GAAG,CAAC,2BAAA,CAAA;AACnC,QAAA,MAAMf,cAAAA,GAAiBH,iBAAAA,EAAAA;AAEvB,QAAA,IAAIG,cAAAA,EAAgB;YAClBA,cAAAA,CAAeiD,YAAY,CAAC,mBAAA,EAAqB;AAC/CC,gBAAAA,SAAAA,EAAWH,SAASG,SAAS,IAAInD,QAAOiD,MAAM,CAACjC,GAAG,CAAC,mBAAA,CAAA;gBACnDoC,mBAAAA,EAAqBJ,QAAAA,CAASK,QAAQ,EAAED,mBAAAA,IAAuB5D,6BAAAA;gBAC/D8D,uBAAAA,EACEN,QAAAA,CAASK,QAAQ,EAAEC,uBAAAA,IAA2B7D,kCAAAA;gBAChD8D,wBAAAA,EACEP,QAAAA,CAASK,QAAQ,EAAEE,wBAAAA,IAA4B7D,mCAAAA;gBACjD8D,kBAAAA,EAAoBR,QAAAA,CAASK,QAAQ,EAAEG,kBAAAA,IAAsB7D,4BAAAA;gBAC7D8D,mBAAAA,EAAqBT,QAAAA,CAASK,QAAQ,EAAEI,mBAAAA,IAAuB7D,6BAAAA;gBAC/D8D,SAAAA,EAAWV,QAAAA,CAASW,GAAG,EAAED,SAAAA;gBACzBE,UAAAA,EAAYZ,QAAAA,CAASW,GAAG,IAAI;AAClC,aAAA,CAAA;AACA,QAAA;AAEE,QAAA,IAAI,CAAC3D,OAAAA,CAAOiD,MAAM,CAACjC,GAAG,CAAC,qCAAA,CAAA,EAAwC;AAC7D,YAAA,IAAI6C,OAAAA,CAAQC,GAAG,CAACC,QAAQ,KAAK,aAAA,EAAe;gBAC1C,MAAM,IAAIC,MACR,CAAC;yQACgQ,CAAC,CAAA;AAE1Q,YAAA;AAEI,YAAA,MAAMb,YAAYnE,MAAAA,CAAOiF,WAAW,CAAC,EAAA,CAAA,CAAIC,QAAQ,CAAC,QAAA,CAAA;AAElDlE,YAAAA,OAAAA,CAAOiD,MAAM,CAAC3B,GAAG,CAAC,qCAAA,EAAuC6B,SAAAA,CAAAA;AAEzD,YAAA,IAAI,CAACU,OAAAA,CAAQC,GAAG,CAACK,UAAU,EAAE;AAC3B,gBAAA,MAAMC,OAAAA,GAAUP,OAAAA,CAAQC,GAAG,CAACO,QAAQ,IAAI,MAAA;gBACxCrE,OAAAA,CAAOsE,EAAE,CAACC,UAAU,CAACH,OAAAA,EAAS,CAAC,WAAW,EAAEjB,SAAAA,CAAU,EAAE,CAAC,CAAA;gBACzDnD,OAAAA,CAAOwE,GAAG,CAACC,IAAI,CACb,CAAC,qFAAqF,EAAEL,OAAAA,CAAQ,2BAA2B,CAAC,CAAA;AAEpI,YAAA;AACA,QAAA;AACA,IAAA,CAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"index.mjs","sources":["../../../server/bootstrap/index.js"],"sourcesContent":["'use strict';\n\n/**\n * An asynchronous bootstrap function that runs before\n * your application gets started.\n *\n * This gives you an opportunity to set up your data model,\n * run jobs, or perform some special logic.\n */\nconst crypto = require('crypto');\nconst _ = require('lodash');\nconst { getService } = require('../utils');\nconst usersPermissionsActions = require('./users-permissions-actions');\nconst {\n DEFAULT_ACCESS_TOKEN_LIFESPAN,\n DEFAULT_MAX_REFRESH_TOKEN_LIFESPAN,\n DEFAULT_IDLE_REFRESH_TOKEN_LIFESPAN,\n DEFAULT_MAX_SESSION_LIFESPAN,\n DEFAULT_IDLE_SESSION_LIFESPAN,\n} = require('../services/constants');\n\nconst getSessionManager = () => {\n const manager = strapi.sessionManager;\n return manager ?? null;\n};\n\nconst initGrant = async (pluginStore) => {\n const allProviders = getService('providers-registry').getAll();\n\n const grantConfig = Object.entries(allProviders).reduce((acc, [name, provider]) => {\n const { icon, enabled, grantConfig } = provider;\n\n acc[name] = {\n icon,\n enabled,\n ...grantConfig,\n };\n return acc;\n }, {});\n\n const prevGrantConfig = (await pluginStore.get({ key: 'grant' })) || {};\n\n if (!prevGrantConfig || !_.isEqual(prevGrantConfig, grantConfig)) {\n // merge with the previous provider config.\n _.keys(grantConfig).forEach((key) => {\n if (key in prevGrantConfig) {\n grantConfig[key] = _.merge(grantConfig[key], prevGrantConfig[key]);\n }\n });\n await pluginStore.set({ key: 'grant', value: grantConfig });\n }\n};\n\nconst initEmails = async (pluginStore) => {\n if (!(await pluginStore.get({ key: 'email' }))) {\n const value = {\n reset_password: {\n display: 'Email.template.reset_password',\n icon: 'sync',\n options: {\n from: {\n name: 'Administration Panel',\n email: 'no-reply@strapi.io',\n },\n response_email: '',\n object: 'Reset password',\n message: `<p>We heard that you lost your password. Sorry about that!</p>\n\n<p>But don’t worry! You can use the following link to reset your password:</p>\n<p><%= URL %>?code=<%= TOKEN %></p>\n\n<p>Thanks.</p>`,\n },\n },\n email_confirmation: {\n display: 'Email.template.email_confirmation',\n icon: 'check-square',\n options: {\n from: {\n name: 'Administration Panel',\n email: 'no-reply@strapi.io',\n },\n response_email: '',\n object: 'Account confirmation',\n message: `<p>Thank you for registering!</p>\n\n<p>You have to confirm your email address. Please click on the link below.</p>\n\n<p><%= URL %>?confirmation=<%= CODE %></p>\n\n<p>Thanks.</p>`,\n },\n },\n };\n\n await pluginStore.set({ key: 'email', value });\n }\n};\n\nconst initAdvancedOptions = async (pluginStore) => {\n if (!(await pluginStore.get({ key: 'advanced' }))) {\n const value = {\n unique_email: true,\n allow_register: true,\n email_confirmation: false,\n email_reset_password: null,\n email_confirmation_redirection: null,\n default_role: 'authenticated',\n };\n\n await pluginStore.set({ key: 'advanced', value });\n }\n};\n\nmodule.exports = async ({ strapi }) => {\n const pluginStore = strapi.store({ type: 'plugin', name: 'users-permissions' });\n\n await initGrant(pluginStore);\n await initEmails(pluginStore);\n await initAdvancedOptions(pluginStore);\n\n await strapi\n .service('admin::permission')\n .actionProvider.registerMany(usersPermissionsActions.actions);\n\n await getService('users-permissions').initialize();\n\n // Define users-permissions origin configuration for sessionManager\n const upConfig = strapi.config.get('plugin::users-permissions');\n const sessionManager = getSessionManager();\n\n if (sessionManager) {\n sessionManager.defineOrigin('users-permissions', {\n jwtSecret: upConfig.jwtSecret || strapi.config.get('admin.auth.secret'),\n accessTokenLifespan: upConfig.sessions?.accessTokenLifespan || DEFAULT_ACCESS_TOKEN_LIFESPAN,\n maxRefreshTokenLifespan:\n upConfig.sessions?.maxRefreshTokenLifespan || DEFAULT_MAX_REFRESH_TOKEN_LIFESPAN,\n idleRefreshTokenLifespan:\n upConfig.sessions?.idleRefreshTokenLifespan || DEFAULT_IDLE_REFRESH_TOKEN_LIFESPAN,\n maxSessionLifespan: upConfig.sessions?.maxSessionLifespan || DEFAULT_MAX_SESSION_LIFESPAN,\n idleSessionLifespan: upConfig.sessions?.idleSessionLifespan || DEFAULT_IDLE_SESSION_LIFESPAN,\n algorithm: upConfig.jwt?.algorithm,\n jwtOptions: upConfig.jwt || {},\n });\n }\n\n if (!strapi.config.get('plugin::users-permissions.jwtSecret')) {\n if (process.env.NODE_ENV !== 'development') {\n throw new Error(\n `Missing jwtSecret. Please, set configuration variable \"jwtSecret\" for the users-permissions plugin in config/plugins.js (ex: you can generate one using Node with \\`crypto.randomBytes(16).toString('base64')\\`).\nFor security reasons, prefer storing the secret in an environment variable and read it in config/plugins.js. See https://docs.strapi.io/developer-docs/latest/setup-deployment-guides/configurations/optional/environment.html#configuration-using-environment-variables.`\n );\n }\n\n const jwtSecret = crypto.randomBytes(16).toString('base64');\n\n strapi.config.set('plugin::users-permissions.jwtSecret', jwtSecret);\n\n if (!process.env.JWT_SECRET) {\n const envPath = process.env.ENV_PATH || '.env';\n strapi.fs.appendFile(envPath, `JWT_SECRET=${jwtSecret}\\n`);\n strapi.log.info(\n `The Users & Permissions plugin automatically generated a jwt secret and stored it in ${envPath} under the name JWT_SECRET.`\n );\n }\n }\n};\n"],"names":["crypto","require$$0","_","require$$1","getService","require$$2","usersPermissionsActions","require$$3","DEFAULT_ACCESS_TOKEN_LIFESPAN","DEFAULT_MAX_REFRESH_TOKEN_LIFESPAN","DEFAULT_IDLE_REFRESH_TOKEN_LIFESPAN","DEFAULT_MAX_SESSION_LIFESPAN","DEFAULT_IDLE_SESSION_LIFESPAN","require$$4","getSessionManager","manager","strapi","sessionManager","initGrant","pluginStore","allProviders","getAll","grantConfig","Object","entries","reduce","acc","name","provider","icon","enabled","prevGrantConfig","get","key","isEqual","keys","forEach","merge","set","value","initEmails","reset_password","display","options","from","email","response_email","object","message","email_confirmation","initAdvancedOptions","unique_email","allow_register","email_reset_password","email_confirmation_redirection","default_role","bootstrap","store","type","service","actionProvider","registerMany","actions","initialize","upConfig","config","defineOrigin","jwtSecret","accessTokenLifespan","sessions","maxRefreshTokenLifespan","idleRefreshTokenLifespan","maxSessionLifespan","idleSessionLifespan","algorithm","jwt","jwtOptions","process","env","NODE_ENV","Error","randomBytes","toString","JWT_SECRET","envPath","ENV_PATH","fs","appendFile","log","info"],"mappings":";;;;;;;;;;;AAEA;;;;;;AAMA,KACA,MAAMA,MAASC,GAAAA,UAAAA;AACf,IAAA,MAAMC,CAAIC,GAAAA,YAAAA;IACV,MAAM,EAAEC,UAAU,EAAE,GAAGC,YAAAA,EAAAA;AACvB,IAAA,MAAMC,uBAA0BC,GAAAA,8BAAAA,EAAAA;IAChC,MAAM,EACJC,6BAA6B,EAC7BC,kCAAkC,EAClCC,mCAAmC,EACnCC,4BAA4B,EAC5BC,6BAA6B,EAC9B,GAAGC,gBAAAA,EAAAA;AAEJ,IAAA,MAAMC,iBAAoB,GAAA,IAAA;QACxB,MAAMC,OAAAA,GAAUC,OAAOC,cAAc;AACrC,QAAA,OAAOF,OAAW,IAAA,IAAA;AACpB,KAAA;AAEA,IAAA,MAAMG,YAAY,OAAOC,WAAAA,GAAAA;QACvB,MAAMC,YAAAA,GAAehB,UAAW,CAAA,oBAAA,CAAA,CAAsBiB,MAAM,EAAA;QAE5D,MAAMC,WAAAA,GAAcC,MAAOC,CAAAA,OAAO,CAACJ,YAAAA,CAAAA,CAAcK,MAAM,CAAC,CAACC,GAAAA,EAAK,CAACC,IAAAA,EAAMC,QAAS,CAAA,GAAA;AAC5E,YAAA,MAAM,EAAEC,IAAI,EAAEC,OAAO,EAAER,WAAW,EAAE,GAAGM,QAAAA;YAEvCF,GAAG,CAACC,KAAK,GAAG;AACVE,gBAAAA,IAAAA;AACAC,gBAAAA,OAAAA;AACA,gBAAA,GAAGR;AACT,aAAA;YACI,OAAOI,GAAAA;AACR,SAAA,EAAE,EAAE,CAAA;AAEL,QAAA,MAAMK,eAAkB,GAAC,MAAMZ,WAAAA,CAAYa,GAAG,CAAC;YAAEC,GAAK,EAAA;cAAe;AAErE,QAAA,IAAI,CAACF,eAAmB,IAAA,CAAC7B,EAAEgC,OAAO,CAACH,iBAAiBT,WAAc,CAAA,EAAA;;AAEhEpB,YAAAA,CAAAA,CAAEiC,IAAI,CAACb,WAAac,CAAAA,CAAAA,OAAO,CAAC,CAACH,GAAAA,GAAAA;AAC3B,gBAAA,IAAIA,OAAOF,eAAiB,EAAA;AAC1BT,oBAAAA,WAAW,CAACW,GAAAA,CAAI,GAAG/B,CAAAA,CAAEmC,KAAK,CAACf,WAAW,CAACW,GAAI,CAAA,EAAEF,eAAe,CAACE,GAAI,CAAA,CAAA;AAClE;AACP,aAAA,CAAA;YACI,MAAMd,WAAAA,CAAYmB,GAAG,CAAC;gBAAEL,GAAK,EAAA,OAAA;gBAASM,KAAOjB,EAAAA;AAAW,aAAA,CAAA;AACzD;AACH,KAAA;AAEA,IAAA,MAAMkB,aAAa,OAAOrB,WAAAA,GAAAA;AACxB,QAAA,IAAI,CAAE,MAAMA,WAAYa,CAAAA,GAAG,CAAC;YAAEC,GAAK,EAAA;SAAa,CAAA,EAAA;AAC9C,YAAA,MAAMM,KAAQ,GAAA;gBACZE,cAAgB,EAAA;oBACdC,OAAS,EAAA,+BAAA;oBACTb,IAAM,EAAA,MAAA;oBACNc,OAAS,EAAA;wBACPC,IAAM,EAAA;4BACJjB,IAAM,EAAA,sBAAA;4BACNkB,KAAO,EAAA;AACR,yBAAA;wBACDC,cAAgB,EAAA,EAAA;wBAChBC,MAAQ,EAAA,gBAAA;AACRC,wBAAAA,OAAAA,EAAS,CAAC;;;;;cAKN;AACL;AACF,iBAAA;gBACDC,kBAAoB,EAAA;oBAClBP,OAAS,EAAA,mCAAA;oBACTb,IAAM,EAAA,cAAA;oBACNc,OAAS,EAAA;wBACPC,IAAM,EAAA;4BACJjB,IAAM,EAAA,sBAAA;4BACNkB,KAAO,EAAA;AACR,yBAAA;wBACDC,cAAgB,EAAA,EAAA;wBAChBC,MAAQ,EAAA,sBAAA;AACRC,wBAAAA,OAAAA,EAAS,CAAC;;;;;;cAMN;AACL;AACF;AACP,aAAA;YAEI,MAAM7B,WAAAA,CAAYmB,GAAG,CAAC;gBAAEL,GAAK,EAAA,OAAA;AAASM,gBAAAA;AAAK,aAAA,CAAA;AAC5C;AACH,KAAA;AAEA,IAAA,MAAMW,sBAAsB,OAAO/B,WAAAA,GAAAA;AACjC,QAAA,IAAI,CAAE,MAAMA,WAAYa,CAAAA,GAAG,CAAC;YAAEC,GAAK,EAAA;SAAgB,CAAA,EAAA;AACjD,YAAA,MAAMM,KAAQ,GAAA;gBACZY,YAAc,EAAA,IAAA;gBACdC,cAAgB,EAAA,IAAA;gBAChBH,kBAAoB,EAAA,KAAA;gBACpBI,oBAAsB,EAAA,IAAA;gBACtBC,8BAAgC,EAAA,IAAA;gBAChCC,YAAc,EAAA;AACpB,aAAA;YAEI,MAAMpC,WAAAA,CAAYmB,GAAG,CAAC;gBAAEL,GAAK,EAAA,UAAA;AAAYM,gBAAAA;AAAK,aAAA,CAAA;AAC/C;AACH,KAAA;AAEAiB,IAAAA,SAAAA,GAAiB,OAAO,EAAExC,MAAAA,EAAAA,OAAM,EAAE,GAAA;QAChC,MAAMG,WAAAA,GAAcH,OAAOyC,CAAAA,KAAK,CAAC;YAAEC,IAAM,EAAA,QAAA;YAAU/B,IAAM,EAAA;AAAmB,SAAA,CAAA;AAE5E,QAAA,MAAMT,SAAUC,CAAAA,WAAAA,CAAAA;AAChB,QAAA,MAAMqB,UAAWrB,CAAAA,WAAAA,CAAAA;AACjB,QAAA,MAAM+B,mBAAoB/B,CAAAA,WAAAA,CAAAA;QAE1B,MAAMH,OAAAA,CACH2C,OAAO,CAAC,mBAAA,CAAA,CACRC,cAAc,CAACC,YAAY,CAACvD,uBAAAA,CAAwBwD,OAAO,CAAA;QAE9D,MAAM1D,UAAAA,CAAW,qBAAqB2D,UAAU,EAAA;;AAGhD,QAAA,MAAMC,QAAWhD,GAAAA,OAAAA,CAAOiD,MAAM,CAACjC,GAAG,CAAC,2BAAA,CAAA;AACnC,QAAA,MAAMf,cAAiBH,GAAAA,iBAAAA,EAAAA;AAEvB,QAAA,IAAIG,cAAgB,EAAA;YAClBA,cAAeiD,CAAAA,YAAY,CAAC,mBAAqB,EAAA;AAC/CC,gBAAAA,SAAAA,EAAWH,SAASG,SAAS,IAAInD,QAAOiD,MAAM,CAACjC,GAAG,CAAC,mBAAA,CAAA;gBACnDoC,mBAAqBJ,EAAAA,QAAAA,CAASK,QAAQ,EAAED,mBAAuB5D,IAAAA,6BAAAA;gBAC/D8D,uBACEN,EAAAA,QAAAA,CAASK,QAAQ,EAAEC,uBAA2B7D,IAAAA,kCAAAA;gBAChD8D,wBACEP,EAAAA,QAAAA,CAASK,QAAQ,EAAEE,wBAA4B7D,IAAAA,mCAAAA;gBACjD8D,kBAAoBR,EAAAA,QAAAA,CAASK,QAAQ,EAAEG,kBAAsB7D,IAAAA,4BAAAA;gBAC7D8D,mBAAqBT,EAAAA,QAAAA,CAASK,QAAQ,EAAEI,mBAAuB7D,IAAAA,6BAAAA;gBAC/D8D,SAAWV,EAAAA,QAAAA,CAASW,GAAG,EAAED,SAAAA;gBACzBE,UAAYZ,EAAAA,QAAAA,CAASW,GAAG,IAAI;AAClC,aAAA,CAAA;AACG;AAED,QAAA,IAAI,CAAC3D,OAAOiD,CAAAA,MAAM,CAACjC,GAAG,CAAC,qCAAwC,CAAA,EAAA;AAC7D,YAAA,IAAI6C,OAAQC,CAAAA,GAAG,CAACC,QAAQ,KAAK,aAAe,EAAA;gBAC1C,MAAM,IAAIC,MACR,CAAC;yQACgQ,CAAC,CAAA;AAErQ;AAED,YAAA,MAAMb,YAAYnE,MAAOiF,CAAAA,WAAW,CAAC,EAAA,CAAA,CAAIC,QAAQ,CAAC,QAAA,CAAA;AAElDlE,YAAAA,OAAAA,CAAOiD,MAAM,CAAC3B,GAAG,CAAC,qCAAuC6B,EAAAA,SAAAA,CAAAA;AAEzD,YAAA,IAAI,CAACU,OAAAA,CAAQC,GAAG,CAACK,UAAU,EAAE;AAC3B,gBAAA,MAAMC,OAAUP,GAAAA,OAAAA,CAAQC,GAAG,CAACO,QAAQ,IAAI,MAAA;gBACxCrE,OAAOsE,CAAAA,EAAE,CAACC,UAAU,CAACH,OAAAA,EAAS,CAAC,WAAW,EAAEjB,SAAU,CAAA,EAAE,CAAC,CAAA;gBACzDnD,OAAOwE,CAAAA,GAAG,CAACC,IAAI,CACb,CAAC,qFAAqF,EAAEL,OAAQ,CAAA,2BAA2B,CAAC,CAAA;AAE/H;AACF;AACH,KAAA;;;;;;"}
1
+ {"version":3,"file":"index.mjs","sources":["../../../server/bootstrap/index.js"],"sourcesContent":["'use strict';\n\n/**\n * An asynchronous bootstrap function that runs before\n * your application gets started.\n *\n * This gives you an opportunity to set up your data model,\n * run jobs, or perform some special logic.\n */\nconst crypto = require('crypto');\nconst _ = require('lodash');\nconst { getService } = require('../utils');\nconst usersPermissionsActions = require('./users-permissions-actions');\nconst {\n DEFAULT_ACCESS_TOKEN_LIFESPAN,\n DEFAULT_MAX_REFRESH_TOKEN_LIFESPAN,\n DEFAULT_IDLE_REFRESH_TOKEN_LIFESPAN,\n DEFAULT_MAX_SESSION_LIFESPAN,\n DEFAULT_IDLE_SESSION_LIFESPAN,\n} = require('../services/constants');\n\nconst getSessionManager = () => {\n const manager = strapi.sessionManager;\n return manager ?? null;\n};\n\nconst initGrant = async (pluginStore) => {\n const allProviders = getService('providers-registry').getAll();\n\n const grantConfig = Object.entries(allProviders).reduce((acc, [name, provider]) => {\n const { icon, enabled, grantConfig } = provider;\n\n acc[name] = {\n icon,\n enabled,\n ...grantConfig,\n };\n return acc;\n }, {});\n\n const prevGrantConfig = (await pluginStore.get({ key: 'grant' })) || {};\n\n if (!prevGrantConfig || !_.isEqual(prevGrantConfig, grantConfig)) {\n // merge with the previous provider config.\n _.keys(grantConfig).forEach((key) => {\n if (key in prevGrantConfig) {\n grantConfig[key] = _.merge(grantConfig[key], prevGrantConfig[key]);\n }\n });\n await pluginStore.set({ key: 'grant', value: grantConfig });\n }\n};\n\nconst initEmails = async (pluginStore) => {\n if (!(await pluginStore.get({ key: 'email' }))) {\n const value = {\n reset_password: {\n display: 'Email.template.reset_password',\n icon: 'sync',\n options: {\n from: {\n name: 'Administration Panel',\n email: 'no-reply@strapi.io',\n },\n response_email: '',\n object: 'Reset password',\n message: `<p>We heard that you lost your password. Sorry about that!</p>\n\n<p>But don’t worry! You can use the following link to reset your password:</p>\n<p><%= URL %>?code=<%= TOKEN %></p>\n\n<p>Thanks.</p>`,\n },\n },\n email_confirmation: {\n display: 'Email.template.email_confirmation',\n icon: 'check-square',\n options: {\n from: {\n name: 'Administration Panel',\n email: 'no-reply@strapi.io',\n },\n response_email: '',\n object: 'Account confirmation',\n message: `<p>Thank you for registering!</p>\n\n<p>You have to confirm your email address. Please click on the link below.</p>\n\n<p><%= URL %>?confirmation=<%= CODE %></p>\n\n<p>Thanks.</p>`,\n },\n },\n };\n\n await pluginStore.set({ key: 'email', value });\n }\n};\n\nconst initAdvancedOptions = async (pluginStore) => {\n if (!(await pluginStore.get({ key: 'advanced' }))) {\n const value = {\n unique_email: true,\n allow_register: true,\n email_confirmation: false,\n email_reset_password: null,\n email_confirmation_redirection: null,\n default_role: 'authenticated',\n };\n\n await pluginStore.set({ key: 'advanced', value });\n }\n};\n\nmodule.exports = async ({ strapi }) => {\n const pluginStore = strapi.store({ type: 'plugin', name: 'users-permissions' });\n\n await initGrant(pluginStore);\n await initEmails(pluginStore);\n await initAdvancedOptions(pluginStore);\n\n await strapi\n .service('admin::permission')\n .actionProvider.registerMany(usersPermissionsActions.actions);\n\n await getService('users-permissions').initialize();\n\n // Define users-permissions origin configuration for sessionManager\n const upConfig = strapi.config.get('plugin::users-permissions');\n const sessionManager = getSessionManager();\n\n if (sessionManager) {\n sessionManager.defineOrigin('users-permissions', {\n jwtSecret: upConfig.jwtSecret || strapi.config.get('admin.auth.secret'),\n accessTokenLifespan: upConfig.sessions?.accessTokenLifespan || DEFAULT_ACCESS_TOKEN_LIFESPAN,\n maxRefreshTokenLifespan:\n upConfig.sessions?.maxRefreshTokenLifespan || DEFAULT_MAX_REFRESH_TOKEN_LIFESPAN,\n idleRefreshTokenLifespan:\n upConfig.sessions?.idleRefreshTokenLifespan || DEFAULT_IDLE_REFRESH_TOKEN_LIFESPAN,\n maxSessionLifespan: upConfig.sessions?.maxSessionLifespan || DEFAULT_MAX_SESSION_LIFESPAN,\n idleSessionLifespan: upConfig.sessions?.idleSessionLifespan || DEFAULT_IDLE_SESSION_LIFESPAN,\n algorithm: upConfig.jwt?.algorithm,\n jwtOptions: upConfig.jwt || {},\n });\n }\n\n if (!strapi.config.get('plugin::users-permissions.jwtSecret')) {\n if (process.env.NODE_ENV !== 'development') {\n throw new Error(\n `Missing jwtSecret. Please, set configuration variable \"jwtSecret\" for the users-permissions plugin in config/plugins.js (ex: you can generate one using Node with \\`crypto.randomBytes(16).toString('base64')\\`).\nFor security reasons, prefer storing the secret in an environment variable and read it in config/plugins.js. See https://docs.strapi.io/developer-docs/latest/setup-deployment-guides/configurations/optional/environment.html#configuration-using-environment-variables.`\n );\n }\n\n const jwtSecret = crypto.randomBytes(16).toString('base64');\n\n strapi.config.set('plugin::users-permissions.jwtSecret', jwtSecret);\n\n if (!process.env.JWT_SECRET) {\n const envPath = process.env.ENV_PATH || '.env';\n strapi.fs.appendFile(envPath, `JWT_SECRET=${jwtSecret}\\n`);\n strapi.log.info(\n `The Users & Permissions plugin automatically generated a jwt secret and stored it in ${envPath} under the name JWT_SECRET.`\n );\n }\n }\n};\n"],"names":["crypto","require$$0","_","require$$1","getService","require$$2","usersPermissionsActions","require$$3","DEFAULT_ACCESS_TOKEN_LIFESPAN","DEFAULT_MAX_REFRESH_TOKEN_LIFESPAN","DEFAULT_IDLE_REFRESH_TOKEN_LIFESPAN","DEFAULT_MAX_SESSION_LIFESPAN","DEFAULT_IDLE_SESSION_LIFESPAN","require$$4","getSessionManager","manager","strapi","sessionManager","initGrant","pluginStore","allProviders","getAll","grantConfig","Object","entries","reduce","acc","name","provider","icon","enabled","prevGrantConfig","get","key","isEqual","keys","forEach","merge","set","value","initEmails","reset_password","display","options","from","email","response_email","object","message","email_confirmation","initAdvancedOptions","unique_email","allow_register","email_reset_password","email_confirmation_redirection","default_role","bootstrap","store","type","service","actionProvider","registerMany","actions","initialize","upConfig","config","defineOrigin","jwtSecret","accessTokenLifespan","sessions","maxRefreshTokenLifespan","idleRefreshTokenLifespan","maxSessionLifespan","idleSessionLifespan","algorithm","jwt","jwtOptions","process","env","NODE_ENV","Error","randomBytes","toString","JWT_SECRET","envPath","ENV_PATH","fs","appendFile","log","info"],"mappings":";;;;;;;;;;;AAEA;;;;;;AAMA,KACA,MAAMA,MAAAA,GAASC,UAAAA;AACf,IAAA,MAAMC,CAAAA,GAAIC,YAAAA;IACV,MAAM,EAAEC,UAAU,EAAE,GAAGC,YAAAA,EAAAA;AACvB,IAAA,MAAMC,uBAAAA,GAA0BC,8BAAAA,EAAAA;IAChC,MAAM,EACJC,6BAA6B,EAC7BC,kCAAkC,EAClCC,mCAAmC,EACnCC,4BAA4B,EAC5BC,6BAA6B,EAC9B,GAAGC,gBAAAA,EAAAA;AAEJ,IAAA,MAAMC,iBAAAA,GAAoB,IAAA;QACxB,MAAMC,OAAAA,GAAUC,OAAOC,cAAc;AACrC,QAAA,OAAOF,OAAAA,IAAW,IAAA;AACpB,IAAA,CAAA;AAEA,IAAA,MAAMG,YAAY,OAAOC,WAAAA,GAAAA;QACvB,MAAMC,YAAAA,GAAehB,UAAAA,CAAW,oBAAA,CAAA,CAAsBiB,MAAM,EAAA;QAE5D,MAAMC,WAAAA,GAAcC,MAAAA,CAAOC,OAAO,CAACJ,YAAAA,CAAAA,CAAcK,MAAM,CAAC,CAACC,GAAAA,EAAK,CAACC,IAAAA,EAAMC,QAAAA,CAAS,GAAA;AAC5E,YAAA,MAAM,EAAEC,IAAI,EAAEC,OAAO,EAAER,WAAW,EAAE,GAAGM,QAAAA;YAEvCF,GAAG,CAACC,KAAK,GAAG;AACVE,gBAAAA,IAAAA;AACAC,gBAAAA,OAAAA;AACA,gBAAA,GAAGR;AACT,aAAA;YACI,OAAOI,GAAAA;AACX,QAAA,CAAA,EAAK,EAAA,CAAA;AAEH,QAAA,MAAMK,eAAAA,GAAmB,MAAMZ,WAAAA,CAAYa,GAAG,CAAC;YAAEC,GAAAA,EAAK;cAAe;AAErE,QAAA,IAAI,CAACF,eAAAA,IAAmB,CAAC7B,EAAEgC,OAAO,CAACH,iBAAiBT,WAAAA,CAAAA,EAAc;;AAEhEpB,YAAAA,CAAAA,CAAEiC,IAAI,CAACb,WAAAA,CAAAA,CAAac,OAAO,CAAC,CAACH,GAAAA,GAAAA;AAC3B,gBAAA,IAAIA,OAAOF,eAAAA,EAAiB;AAC1BT,oBAAAA,WAAW,CAACW,GAAAA,CAAI,GAAG/B,CAAAA,CAAEmC,KAAK,CAACf,WAAW,CAACW,GAAAA,CAAI,EAAEF,eAAe,CAACE,GAAAA,CAAI,CAAA;AACzE,gBAAA;AACA,YAAA,CAAA,CAAA;YACI,MAAMd,WAAAA,CAAYmB,GAAG,CAAC;gBAAEL,GAAAA,EAAK,OAAA;gBAASM,KAAAA,EAAOjB;AAAW,aAAA,CAAA;AAC5D,QAAA;AACA,IAAA,CAAA;AAEA,IAAA,MAAMkB,aAAa,OAAOrB,WAAAA,GAAAA;AACxB,QAAA,IAAI,CAAE,MAAMA,WAAAA,CAAYa,GAAG,CAAC;YAAEC,GAAAA,EAAK;SAAO,CAAA,EAAM;AAC9C,YAAA,MAAMM,KAAAA,GAAQ;gBACZE,cAAAA,EAAgB;oBACdC,OAAAA,EAAS,+BAAA;oBACTb,IAAAA,EAAM,MAAA;oBACNc,OAAAA,EAAS;wBACPC,IAAAA,EAAM;4BACJjB,IAAAA,EAAM,sBAAA;4BACNkB,KAAAA,EAAO;AACnB,yBAAA;wBACUC,cAAAA,EAAgB,EAAA;wBAChBC,MAAAA,EAAQ,gBAAA;AACRC,wBAAAA,OAAAA,EAAS,CAAC;;;;;cAKN;AACd;AACA,iBAAA;gBACMC,kBAAAA,EAAoB;oBAClBP,OAAAA,EAAS,mCAAA;oBACTb,IAAAA,EAAM,cAAA;oBACNc,OAAAA,EAAS;wBACPC,IAAAA,EAAM;4BACJjB,IAAAA,EAAM,sBAAA;4BACNkB,KAAAA,EAAO;AACnB,yBAAA;wBACUC,cAAAA,EAAgB,EAAA;wBAChBC,MAAAA,EAAQ,sBAAA;AACRC,wBAAAA,OAAAA,EAAS,CAAC;;;;;;cAMN;AACd;AACA;AACA,aAAA;YAEI,MAAM7B,WAAAA,CAAYmB,GAAG,CAAC;gBAAEL,GAAAA,EAAK,OAAA;AAASM,gBAAAA;AAAK,aAAA,CAAA;AAC/C,QAAA;AACA,IAAA,CAAA;AAEA,IAAA,MAAMW,sBAAsB,OAAO/B,WAAAA,GAAAA;AACjC,QAAA,IAAI,CAAE,MAAMA,WAAAA,CAAYa,GAAG,CAAC;YAAEC,GAAAA,EAAK;SAAU,CAAA,EAAM;AACjD,YAAA,MAAMM,KAAAA,GAAQ;gBACZY,YAAAA,EAAc,IAAA;gBACdC,cAAAA,EAAgB,IAAA;gBAChBH,kBAAAA,EAAoB,KAAA;gBACpBI,oBAAAA,EAAsB,IAAA;gBACtBC,8BAAAA,EAAgC,IAAA;gBAChCC,YAAAA,EAAc;AACpB,aAAA;YAEI,MAAMpC,WAAAA,CAAYmB,GAAG,CAAC;gBAAEL,GAAAA,EAAK,UAAA;AAAYM,gBAAAA;AAAK,aAAA,CAAA;AAClD,QAAA;AACA,IAAA,CAAA;AAEAiB,IAAAA,SAAAA,GAAiB,OAAO,EAAExC,MAAAA,EAAAA,OAAM,EAAE,GAAA;QAChC,MAAMG,WAAAA,GAAcH,OAAAA,CAAOyC,KAAK,CAAC;YAAEC,IAAAA,EAAM,QAAA;YAAU/B,IAAAA,EAAM;AAAmB,SAAA,CAAA;AAE5E,QAAA,MAAMT,SAAAA,CAAUC,WAAAA,CAAAA;AAChB,QAAA,MAAMqB,UAAAA,CAAWrB,WAAAA,CAAAA;AACjB,QAAA,MAAM+B,mBAAAA,CAAoB/B,WAAAA,CAAAA;QAE1B,MAAMH,OAAAA,CACH2C,OAAO,CAAC,mBAAA,CAAA,CACRC,cAAc,CAACC,YAAY,CAACvD,uBAAAA,CAAwBwD,OAAO,CAAA;QAE9D,MAAM1D,UAAAA,CAAW,qBAAqB2D,UAAU,EAAA;;AAGhD,QAAA,MAAMC,QAAAA,GAAWhD,OAAAA,CAAOiD,MAAM,CAACjC,GAAG,CAAC,2BAAA,CAAA;AACnC,QAAA,MAAMf,cAAAA,GAAiBH,iBAAAA,EAAAA;AAEvB,QAAA,IAAIG,cAAAA,EAAgB;YAClBA,cAAAA,CAAeiD,YAAY,CAAC,mBAAA,EAAqB;AAC/CC,gBAAAA,SAAAA,EAAWH,SAASG,SAAS,IAAInD,QAAOiD,MAAM,CAACjC,GAAG,CAAC,mBAAA,CAAA;gBACnDoC,mBAAAA,EAAqBJ,QAAAA,CAASK,QAAQ,EAAED,mBAAAA,IAAuB5D,6BAAAA;gBAC/D8D,uBAAAA,EACEN,QAAAA,CAASK,QAAQ,EAAEC,uBAAAA,IAA2B7D,kCAAAA;gBAChD8D,wBAAAA,EACEP,QAAAA,CAASK,QAAQ,EAAEE,wBAAAA,IAA4B7D,mCAAAA;gBACjD8D,kBAAAA,EAAoBR,QAAAA,CAASK,QAAQ,EAAEG,kBAAAA,IAAsB7D,4BAAAA;gBAC7D8D,mBAAAA,EAAqBT,QAAAA,CAASK,QAAQ,EAAEI,mBAAAA,IAAuB7D,6BAAAA;gBAC/D8D,SAAAA,EAAWV,QAAAA,CAASW,GAAG,EAAED,SAAAA;gBACzBE,UAAAA,EAAYZ,QAAAA,CAASW,GAAG,IAAI;AAClC,aAAA,CAAA;AACA,QAAA;AAEE,QAAA,IAAI,CAAC3D,OAAAA,CAAOiD,MAAM,CAACjC,GAAG,CAAC,qCAAA,CAAA,EAAwC;AAC7D,YAAA,IAAI6C,OAAAA,CAAQC,GAAG,CAACC,QAAQ,KAAK,aAAA,EAAe;gBAC1C,MAAM,IAAIC,MACR,CAAC;yQACgQ,CAAC,CAAA;AAE1Q,YAAA;AAEI,YAAA,MAAMb,YAAYnE,MAAAA,CAAOiF,WAAW,CAAC,EAAA,CAAA,CAAIC,QAAQ,CAAC,QAAA,CAAA;AAElDlE,YAAAA,OAAAA,CAAOiD,MAAM,CAAC3B,GAAG,CAAC,qCAAA,EAAuC6B,SAAAA,CAAAA;AAEzD,YAAA,IAAI,CAACU,OAAAA,CAAQC,GAAG,CAACK,UAAU,EAAE;AAC3B,gBAAA,MAAMC,OAAAA,GAAUP,OAAAA,CAAQC,GAAG,CAACO,QAAQ,IAAI,MAAA;gBACxCrE,OAAAA,CAAOsE,EAAE,CAACC,UAAU,CAACH,OAAAA,EAAS,CAAC,WAAW,EAAEjB,SAAAA,CAAU,EAAE,CAAC,CAAA;gBACzDnD,OAAAA,CAAOwE,GAAG,CAACC,IAAI,CACb,CAAC,qFAAqF,EAAEL,OAAAA,CAAQ,2BAA2B,CAAC,CAAA;AAEpI,YAAA;AACA,QAAA;AACA,IAAA,CAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"users-permissions-actions.js","sources":["../../../server/bootstrap/users-permissions-actions.js"],"sourcesContent":["'use strict';\n\nmodule.exports = {\n actions: [\n {\n // Roles\n section: 'plugins',\n displayName: 'Create',\n uid: 'roles.create',\n subCategory: 'roles',\n pluginName: 'users-permissions',\n },\n {\n section: 'plugins',\n displayName: 'Read',\n uid: 'roles.read',\n subCategory: 'roles',\n pluginName: 'users-permissions',\n aliases: [\n {\n actionId: 'plugin::content-manager.explorer.read',\n subjects: ['plugin::users-permissions.role'],\n },\n ],\n },\n {\n section: 'plugins',\n displayName: 'Update',\n uid: 'roles.update',\n subCategory: 'roles',\n pluginName: 'users-permissions',\n },\n {\n section: 'plugins',\n displayName: 'Delete',\n uid: 'roles.delete',\n subCategory: 'roles',\n pluginName: 'users-permissions',\n },\n {\n // providers\n section: 'plugins',\n displayName: 'Read',\n uid: 'providers.read',\n subCategory: 'providers',\n pluginName: 'users-permissions',\n },\n {\n section: 'plugins',\n displayName: 'Edit',\n uid: 'providers.update',\n subCategory: 'providers',\n pluginName: 'users-permissions',\n },\n {\n // emailTemplates\n section: 'plugins',\n displayName: 'Read',\n uid: 'email-templates.read',\n subCategory: 'emailTemplates',\n pluginName: 'users-permissions',\n },\n {\n section: 'plugins',\n displayName: 'Edit',\n uid: 'email-templates.update',\n subCategory: 'emailTemplates',\n pluginName: 'users-permissions',\n },\n {\n // advancedSettings\n section: 'plugins',\n displayName: 'Read',\n uid: 'advanced-settings.read',\n subCategory: 'advancedSettings',\n pluginName: 'users-permissions',\n },\n {\n section: 'plugins',\n displayName: 'Edit',\n uid: 'advanced-settings.update',\n subCategory: 'advancedSettings',\n pluginName: 'users-permissions',\n },\n ],\n};\n"],"names":["usersPermissionsActions","actions","section","displayName","uid","subCategory","pluginName","aliases","actionId","subjects"],"mappings":";;;;;;;IAEAA,uBAAiB,GAAA;QACfC,OAAS,EAAA;AACP,YAAA;;gBAEEC,OAAS,EAAA,SAAA;gBACTC,WAAa,EAAA,QAAA;gBACbC,GAAK,EAAA,cAAA;gBACLC,WAAa,EAAA,OAAA;gBACbC,UAAY,EAAA;AACb,aAAA;AACD,YAAA;gBACEJ,OAAS,EAAA,SAAA;gBACTC,WAAa,EAAA,MAAA;gBACbC,GAAK,EAAA,YAAA;gBACLC,WAAa,EAAA,OAAA;gBACbC,UAAY,EAAA,mBAAA;gBACZC,OAAS,EAAA;AACP,oBAAA;wBACEC,QAAU,EAAA,uCAAA;wBACVC,QAAU,EAAA;AAAC,4BAAA;AAAiC;AAC7C;AACF;AACF,aAAA;AACD,YAAA;gBACEP,OAAS,EAAA,SAAA;gBACTC,WAAa,EAAA,QAAA;gBACbC,GAAK,EAAA,cAAA;gBACLC,WAAa,EAAA,OAAA;gBACbC,UAAY,EAAA;AACb,aAAA;AACD,YAAA;gBACEJ,OAAS,EAAA,SAAA;gBACTC,WAAa,EAAA,QAAA;gBACbC,GAAK,EAAA,cAAA;gBACLC,WAAa,EAAA,OAAA;gBACbC,UAAY,EAAA;AACb,aAAA;AACD,YAAA;;gBAEEJ,OAAS,EAAA,SAAA;gBACTC,WAAa,EAAA,MAAA;gBACbC,GAAK,EAAA,gBAAA;gBACLC,WAAa,EAAA,WAAA;gBACbC,UAAY,EAAA;AACb,aAAA;AACD,YAAA;gBACEJ,OAAS,EAAA,SAAA;gBACTC,WAAa,EAAA,MAAA;gBACbC,GAAK,EAAA,kBAAA;gBACLC,WAAa,EAAA,WAAA;gBACbC,UAAY,EAAA;AACb,aAAA;AACD,YAAA;;gBAEEJ,OAAS,EAAA,SAAA;gBACTC,WAAa,EAAA,MAAA;gBACbC,GAAK,EAAA,sBAAA;gBACLC,WAAa,EAAA,gBAAA;gBACbC,UAAY,EAAA;AACb,aAAA;AACD,YAAA;gBACEJ,OAAS,EAAA,SAAA;gBACTC,WAAa,EAAA,MAAA;gBACbC,GAAK,EAAA,wBAAA;gBACLC,WAAa,EAAA,gBAAA;gBACbC,UAAY,EAAA;AACb,aAAA;AACD,YAAA;;gBAEEJ,OAAS,EAAA,SAAA;gBACTC,WAAa,EAAA,MAAA;gBACbC,GAAK,EAAA,wBAAA;gBACLC,WAAa,EAAA,kBAAA;gBACbC,UAAY,EAAA;AACb,aAAA;AACD,YAAA;gBACEJ,OAAS,EAAA,SAAA;gBACTC,WAAa,EAAA,MAAA;gBACbC,GAAK,EAAA,0BAAA;gBACLC,WAAa,EAAA,kBAAA;gBACbC,UAAY,EAAA;AACb;AACF;AACH,KAAA;;;;;;"}
1
+ {"version":3,"file":"users-permissions-actions.js","sources":["../../../server/bootstrap/users-permissions-actions.js"],"sourcesContent":["'use strict';\n\nmodule.exports = {\n actions: [\n {\n // Roles\n section: 'plugins',\n displayName: 'Create',\n uid: 'roles.create',\n subCategory: 'roles',\n pluginName: 'users-permissions',\n },\n {\n section: 'plugins',\n displayName: 'Read',\n uid: 'roles.read',\n subCategory: 'roles',\n pluginName: 'users-permissions',\n aliases: [\n {\n actionId: 'plugin::content-manager.explorer.read',\n subjects: ['plugin::users-permissions.role'],\n },\n ],\n },\n {\n section: 'plugins',\n displayName: 'Update',\n uid: 'roles.update',\n subCategory: 'roles',\n pluginName: 'users-permissions',\n },\n {\n section: 'plugins',\n displayName: 'Delete',\n uid: 'roles.delete',\n subCategory: 'roles',\n pluginName: 'users-permissions',\n },\n {\n // providers\n section: 'plugins',\n displayName: 'Read',\n uid: 'providers.read',\n subCategory: 'providers',\n pluginName: 'users-permissions',\n },\n {\n section: 'plugins',\n displayName: 'Edit',\n uid: 'providers.update',\n subCategory: 'providers',\n pluginName: 'users-permissions',\n },\n {\n // emailTemplates\n section: 'plugins',\n displayName: 'Read',\n uid: 'email-templates.read',\n subCategory: 'emailTemplates',\n pluginName: 'users-permissions',\n },\n {\n section: 'plugins',\n displayName: 'Edit',\n uid: 'email-templates.update',\n subCategory: 'emailTemplates',\n pluginName: 'users-permissions',\n },\n {\n // advancedSettings\n section: 'plugins',\n displayName: 'Read',\n uid: 'advanced-settings.read',\n subCategory: 'advancedSettings',\n pluginName: 'users-permissions',\n },\n {\n section: 'plugins',\n displayName: 'Edit',\n uid: 'advanced-settings.update',\n subCategory: 'advancedSettings',\n pluginName: 'users-permissions',\n },\n ],\n};\n"],"names":["usersPermissionsActions","actions","section","displayName","uid","subCategory","pluginName","aliases","actionId","subjects"],"mappings":";;;;;;;IAEAA,uBAAAA,GAAiB;QACfC,OAAAA,EAAS;AACP,YAAA;;gBAEEC,OAAAA,EAAS,SAAA;gBACTC,WAAAA,EAAa,QAAA;gBACbC,GAAAA,EAAK,cAAA;gBACLC,WAAAA,EAAa,OAAA;gBACbC,UAAAA,EAAY;AAClB,aAAA;AACI,YAAA;gBACEJ,OAAAA,EAAS,SAAA;gBACTC,WAAAA,EAAa,MAAA;gBACbC,GAAAA,EAAK,YAAA;gBACLC,WAAAA,EAAa,OAAA;gBACbC,UAAAA,EAAY,mBAAA;gBACZC,OAAAA,EAAS;AACP,oBAAA;wBACEC,QAAAA,EAAU,uCAAA;wBACVC,QAAAA,EAAU;AAAC,4BAAA;AAAiC;AACtD;AACO;AACP,aAAA;AACI,YAAA;gBACEP,OAAAA,EAAS,SAAA;gBACTC,WAAAA,EAAa,QAAA;gBACbC,GAAAA,EAAK,cAAA;gBACLC,WAAAA,EAAa,OAAA;gBACbC,UAAAA,EAAY;AAClB,aAAA;AACI,YAAA;gBACEJ,OAAAA,EAAS,SAAA;gBACTC,WAAAA,EAAa,QAAA;gBACbC,GAAAA,EAAK,cAAA;gBACLC,WAAAA,EAAa,OAAA;gBACbC,UAAAA,EAAY;AAClB,aAAA;AACI,YAAA;;gBAEEJ,OAAAA,EAAS,SAAA;gBACTC,WAAAA,EAAa,MAAA;gBACbC,GAAAA,EAAK,gBAAA;gBACLC,WAAAA,EAAa,WAAA;gBACbC,UAAAA,EAAY;AAClB,aAAA;AACI,YAAA;gBACEJ,OAAAA,EAAS,SAAA;gBACTC,WAAAA,EAAa,MAAA;gBACbC,GAAAA,EAAK,kBAAA;gBACLC,WAAAA,EAAa,WAAA;gBACbC,UAAAA,EAAY;AAClB,aAAA;AACI,YAAA;;gBAEEJ,OAAAA,EAAS,SAAA;gBACTC,WAAAA,EAAa,MAAA;gBACbC,GAAAA,EAAK,sBAAA;gBACLC,WAAAA,EAAa,gBAAA;gBACbC,UAAAA,EAAY;AAClB,aAAA;AACI,YAAA;gBACEJ,OAAAA,EAAS,SAAA;gBACTC,WAAAA,EAAa,MAAA;gBACbC,GAAAA,EAAK,wBAAA;gBACLC,WAAAA,EAAa,gBAAA;gBACbC,UAAAA,EAAY;AAClB,aAAA;AACI,YAAA;;gBAEEJ,OAAAA,EAAS,SAAA;gBACTC,WAAAA,EAAa,MAAA;gBACbC,GAAAA,EAAK,wBAAA;gBACLC,WAAAA,EAAa,kBAAA;gBACbC,UAAAA,EAAY;AAClB,aAAA;AACI,YAAA;gBACEJ,OAAAA,EAAS,SAAA;gBACTC,WAAAA,EAAa,MAAA;gBACbC,GAAAA,EAAK,0BAAA;gBACLC,WAAAA,EAAa,kBAAA;gBACbC,UAAAA,EAAY;AAClB;AACG;AACH,KAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"users-permissions-actions.mjs","sources":["../../../server/bootstrap/users-permissions-actions.js"],"sourcesContent":["'use strict';\n\nmodule.exports = {\n actions: [\n {\n // Roles\n section: 'plugins',\n displayName: 'Create',\n uid: 'roles.create',\n subCategory: 'roles',\n pluginName: 'users-permissions',\n },\n {\n section: 'plugins',\n displayName: 'Read',\n uid: 'roles.read',\n subCategory: 'roles',\n pluginName: 'users-permissions',\n aliases: [\n {\n actionId: 'plugin::content-manager.explorer.read',\n subjects: ['plugin::users-permissions.role'],\n },\n ],\n },\n {\n section: 'plugins',\n displayName: 'Update',\n uid: 'roles.update',\n subCategory: 'roles',\n pluginName: 'users-permissions',\n },\n {\n section: 'plugins',\n displayName: 'Delete',\n uid: 'roles.delete',\n subCategory: 'roles',\n pluginName: 'users-permissions',\n },\n {\n // providers\n section: 'plugins',\n displayName: 'Read',\n uid: 'providers.read',\n subCategory: 'providers',\n pluginName: 'users-permissions',\n },\n {\n section: 'plugins',\n displayName: 'Edit',\n uid: 'providers.update',\n subCategory: 'providers',\n pluginName: 'users-permissions',\n },\n {\n // emailTemplates\n section: 'plugins',\n displayName: 'Read',\n uid: 'email-templates.read',\n subCategory: 'emailTemplates',\n pluginName: 'users-permissions',\n },\n {\n section: 'plugins',\n displayName: 'Edit',\n uid: 'email-templates.update',\n subCategory: 'emailTemplates',\n pluginName: 'users-permissions',\n },\n {\n // advancedSettings\n section: 'plugins',\n displayName: 'Read',\n uid: 'advanced-settings.read',\n subCategory: 'advancedSettings',\n pluginName: 'users-permissions',\n },\n {\n section: 'plugins',\n displayName: 'Edit',\n uid: 'advanced-settings.update',\n subCategory: 'advancedSettings',\n pluginName: 'users-permissions',\n },\n ],\n};\n"],"names":["usersPermissionsActions","actions","section","displayName","uid","subCategory","pluginName","aliases","actionId","subjects"],"mappings":";;;;;IAEAA,uBAAiB,GAAA;QACfC,OAAS,EAAA;AACP,YAAA;;gBAEEC,OAAS,EAAA,SAAA;gBACTC,WAAa,EAAA,QAAA;gBACbC,GAAK,EAAA,cAAA;gBACLC,WAAa,EAAA,OAAA;gBACbC,UAAY,EAAA;AACb,aAAA;AACD,YAAA;gBACEJ,OAAS,EAAA,SAAA;gBACTC,WAAa,EAAA,MAAA;gBACbC,GAAK,EAAA,YAAA;gBACLC,WAAa,EAAA,OAAA;gBACbC,UAAY,EAAA,mBAAA;gBACZC,OAAS,EAAA;AACP,oBAAA;wBACEC,QAAU,EAAA,uCAAA;wBACVC,QAAU,EAAA;AAAC,4BAAA;AAAiC;AAC7C;AACF;AACF,aAAA;AACD,YAAA;gBACEP,OAAS,EAAA,SAAA;gBACTC,WAAa,EAAA,QAAA;gBACbC,GAAK,EAAA,cAAA;gBACLC,WAAa,EAAA,OAAA;gBACbC,UAAY,EAAA;AACb,aAAA;AACD,YAAA;gBACEJ,OAAS,EAAA,SAAA;gBACTC,WAAa,EAAA,QAAA;gBACbC,GAAK,EAAA,cAAA;gBACLC,WAAa,EAAA,OAAA;gBACbC,UAAY,EAAA;AACb,aAAA;AACD,YAAA;;gBAEEJ,OAAS,EAAA,SAAA;gBACTC,WAAa,EAAA,MAAA;gBACbC,GAAK,EAAA,gBAAA;gBACLC,WAAa,EAAA,WAAA;gBACbC,UAAY,EAAA;AACb,aAAA;AACD,YAAA;gBACEJ,OAAS,EAAA,SAAA;gBACTC,WAAa,EAAA,MAAA;gBACbC,GAAK,EAAA,kBAAA;gBACLC,WAAa,EAAA,WAAA;gBACbC,UAAY,EAAA;AACb,aAAA;AACD,YAAA;;gBAEEJ,OAAS,EAAA,SAAA;gBACTC,WAAa,EAAA,MAAA;gBACbC,GAAK,EAAA,sBAAA;gBACLC,WAAa,EAAA,gBAAA;gBACbC,UAAY,EAAA;AACb,aAAA;AACD,YAAA;gBACEJ,OAAS,EAAA,SAAA;gBACTC,WAAa,EAAA,MAAA;gBACbC,GAAK,EAAA,wBAAA;gBACLC,WAAa,EAAA,gBAAA;gBACbC,UAAY,EAAA;AACb,aAAA;AACD,YAAA;;gBAEEJ,OAAS,EAAA,SAAA;gBACTC,WAAa,EAAA,MAAA;gBACbC,GAAK,EAAA,wBAAA;gBACLC,WAAa,EAAA,kBAAA;gBACbC,UAAY,EAAA;AACb,aAAA;AACD,YAAA;gBACEJ,OAAS,EAAA,SAAA;gBACTC,WAAa,EAAA,MAAA;gBACbC,GAAK,EAAA,0BAAA;gBACLC,WAAa,EAAA,kBAAA;gBACbC,UAAY,EAAA;AACb;AACF;AACH,KAAA;;;;;;"}
1
+ {"version":3,"file":"users-permissions-actions.mjs","sources":["../../../server/bootstrap/users-permissions-actions.js"],"sourcesContent":["'use strict';\n\nmodule.exports = {\n actions: [\n {\n // Roles\n section: 'plugins',\n displayName: 'Create',\n uid: 'roles.create',\n subCategory: 'roles',\n pluginName: 'users-permissions',\n },\n {\n section: 'plugins',\n displayName: 'Read',\n uid: 'roles.read',\n subCategory: 'roles',\n pluginName: 'users-permissions',\n aliases: [\n {\n actionId: 'plugin::content-manager.explorer.read',\n subjects: ['plugin::users-permissions.role'],\n },\n ],\n },\n {\n section: 'plugins',\n displayName: 'Update',\n uid: 'roles.update',\n subCategory: 'roles',\n pluginName: 'users-permissions',\n },\n {\n section: 'plugins',\n displayName: 'Delete',\n uid: 'roles.delete',\n subCategory: 'roles',\n pluginName: 'users-permissions',\n },\n {\n // providers\n section: 'plugins',\n displayName: 'Read',\n uid: 'providers.read',\n subCategory: 'providers',\n pluginName: 'users-permissions',\n },\n {\n section: 'plugins',\n displayName: 'Edit',\n uid: 'providers.update',\n subCategory: 'providers',\n pluginName: 'users-permissions',\n },\n {\n // emailTemplates\n section: 'plugins',\n displayName: 'Read',\n uid: 'email-templates.read',\n subCategory: 'emailTemplates',\n pluginName: 'users-permissions',\n },\n {\n section: 'plugins',\n displayName: 'Edit',\n uid: 'email-templates.update',\n subCategory: 'emailTemplates',\n pluginName: 'users-permissions',\n },\n {\n // advancedSettings\n section: 'plugins',\n displayName: 'Read',\n uid: 'advanced-settings.read',\n subCategory: 'advancedSettings',\n pluginName: 'users-permissions',\n },\n {\n section: 'plugins',\n displayName: 'Edit',\n uid: 'advanced-settings.update',\n subCategory: 'advancedSettings',\n pluginName: 'users-permissions',\n },\n ],\n};\n"],"names":["usersPermissionsActions","actions","section","displayName","uid","subCategory","pluginName","aliases","actionId","subjects"],"mappings":";;;;;IAEAA,uBAAAA,GAAiB;QACfC,OAAAA,EAAS;AACP,YAAA;;gBAEEC,OAAAA,EAAS,SAAA;gBACTC,WAAAA,EAAa,QAAA;gBACbC,GAAAA,EAAK,cAAA;gBACLC,WAAAA,EAAa,OAAA;gBACbC,UAAAA,EAAY;AAClB,aAAA;AACI,YAAA;gBACEJ,OAAAA,EAAS,SAAA;gBACTC,WAAAA,EAAa,MAAA;gBACbC,GAAAA,EAAK,YAAA;gBACLC,WAAAA,EAAa,OAAA;gBACbC,UAAAA,EAAY,mBAAA;gBACZC,OAAAA,EAAS;AACP,oBAAA;wBACEC,QAAAA,EAAU,uCAAA;wBACVC,QAAAA,EAAU;AAAC,4BAAA;AAAiC;AACtD;AACO;AACP,aAAA;AACI,YAAA;gBACEP,OAAAA,EAAS,SAAA;gBACTC,WAAAA,EAAa,QAAA;gBACbC,GAAAA,EAAK,cAAA;gBACLC,WAAAA,EAAa,OAAA;gBACbC,UAAAA,EAAY;AAClB,aAAA;AACI,YAAA;gBACEJ,OAAAA,EAAS,SAAA;gBACTC,WAAAA,EAAa,QAAA;gBACbC,GAAAA,EAAK,cAAA;gBACLC,WAAAA,EAAa,OAAA;gBACbC,UAAAA,EAAY;AAClB,aAAA;AACI,YAAA;;gBAEEJ,OAAAA,EAAS,SAAA;gBACTC,WAAAA,EAAa,MAAA;gBACbC,GAAAA,EAAK,gBAAA;gBACLC,WAAAA,EAAa,WAAA;gBACbC,UAAAA,EAAY;AAClB,aAAA;AACI,YAAA;gBACEJ,OAAAA,EAAS,SAAA;gBACTC,WAAAA,EAAa,MAAA;gBACbC,GAAAA,EAAK,kBAAA;gBACLC,WAAAA,EAAa,WAAA;gBACbC,UAAAA,EAAY;AAClB,aAAA;AACI,YAAA;;gBAEEJ,OAAAA,EAAS,SAAA;gBACTC,WAAAA,EAAa,MAAA;gBACbC,GAAAA,EAAK,sBAAA;gBACLC,WAAAA,EAAa,gBAAA;gBACbC,UAAAA,EAAY;AAClB,aAAA;AACI,YAAA;gBACEJ,OAAAA,EAAS,SAAA;gBACTC,WAAAA,EAAa,MAAA;gBACbC,GAAAA,EAAK,wBAAA;gBACLC,WAAAA,EAAa,gBAAA;gBACbC,UAAAA,EAAY;AAClB,aAAA;AACI,YAAA;;gBAEEJ,OAAAA,EAAS,SAAA;gBACTC,WAAAA,EAAa,MAAA;gBACbC,GAAAA,EAAK,wBAAA;gBACLC,WAAAA,EAAa,kBAAA;gBACbC,UAAAA,EAAY;AAClB,aAAA;AACI,YAAA;gBACEJ,OAAAA,EAAS,SAAA;gBACTC,WAAAA,EAAa,MAAA;gBACbC,GAAAA,EAAK,0BAAA;gBACLC,WAAAA,EAAa,kBAAA;gBACbC,UAAAA,EAAY;AAClB;AACG;AACH,KAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"config.js","sources":["../../server/config.js"],"sourcesContent":["'use strict';\n\nconst {\n DEFAULT_ACCESS_TOKEN_LIFESPAN,\n DEFAULT_MAX_REFRESH_TOKEN_LIFESPAN,\n DEFAULT_IDLE_REFRESH_TOKEN_LIFESPAN,\n DEFAULT_MAX_SESSION_LIFESPAN,\n DEFAULT_IDLE_SESSION_LIFESPAN,\n} = require('./services/constants');\n\nmodule.exports = {\n default: ({ env }) => ({\n jwtSecret: env('JWT_SECRET'),\n jwt: {\n expiresIn: '30d',\n },\n /**\n * JWT management mode for the Content API authentication\n * - \"legacy-support\": use plugin JWTs (backward compatible)\n * - \"refresh\": use SessionManager (access/refresh tokens)\n */\n jwtManagement: 'legacy-support',\n sessions: {\n accessTokenLifespan: DEFAULT_ACCESS_TOKEN_LIFESPAN,\n maxRefreshTokenLifespan: DEFAULT_MAX_REFRESH_TOKEN_LIFESPAN,\n idleRefreshTokenLifespan: DEFAULT_IDLE_REFRESH_TOKEN_LIFESPAN,\n maxSessionLifespan: DEFAULT_MAX_SESSION_LIFESPAN,\n idleSessionLifespan: DEFAULT_IDLE_SESSION_LIFESPAN,\n httpOnly: false,\n },\n ratelimit: {\n interval: 60000,\n max: 10,\n },\n layout: {\n user: {\n actions: {\n create: 'contentManagerUser.create', // Use the User plugin's controller.\n update: 'contentManagerUser.update',\n },\n },\n },\n callback: {\n validate(callback, provider) {\n let uCallback;\n let uProviderCallback;\n\n try {\n uCallback = new URL(callback);\n uProviderCallback = new URL(provider.callback);\n } catch {\n throw new Error('The callback is not a valid URL');\n }\n\n // Make sure the different origin matches\n if (uCallback.origin !== uProviderCallback.origin) {\n throw new Error(\n `Forbidden callback provided: origins don't match. Please verify your config.`\n );\n }\n\n // Make sure the different pathname matches\n if (uCallback.pathname !== uProviderCallback.pathname) {\n throw new Error(\n `Forbidden callback provided: pathname don't match. Please verify your config.`\n );\n }\n\n // NOTE: We're not checking the search parameters on purpose to allow passing different states\n },\n },\n }),\n validator() {},\n};\n"],"names":["DEFAULT_ACCESS_TOKEN_LIFESPAN","DEFAULT_MAX_REFRESH_TOKEN_LIFESPAN","DEFAULT_IDLE_REFRESH_TOKEN_LIFESPAN","DEFAULT_MAX_SESSION_LIFESPAN","DEFAULT_IDLE_SESSION_LIFESPAN","require$$0","config","default","env","jwtSecret","jwt","expiresIn","jwtManagement","sessions","accessTokenLifespan","maxRefreshTokenLifespan","idleRefreshTokenLifespan","maxSessionLifespan","idleSessionLifespan","httpOnly","ratelimit","interval","max","layout","user","actions","create","update","callback","validate","provider","uCallback","uProviderCallback","URL","Error","origin","pathname","validator"],"mappings":";;;;;;;;;IAEA,MAAM,EACJA,6BAA6B,EAC7BC,kCAAkC,EAClCC,mCAAmC,EACnCC,4BAA4B,EAC5BC,6BAA6B,EAC9B,GAAGC,mBAAAA,EAAAA;IAEJC,MAAiB,GAAA;AACfC,QAAAA,OAAAA,EAAS,CAAC,EAAEC,GAAG,EAAE,IAAM;AACrBC,gBAAAA,SAAAA,EAAWD,GAAI,CAAA,YAAA,CAAA;gBACfE,GAAK,EAAA;oBACHC,SAAW,EAAA;AACZ,iBAAA;AACL;;;;AAIA,SACIC,aAAe,EAAA,gBAAA;gBACfC,QAAU,EAAA;oBACRC,mBAAqBd,EAAAA,6BAAAA;oBACrBe,uBAAyBd,EAAAA,kCAAAA;oBACzBe,wBAA0Bd,EAAAA,mCAAAA;oBAC1Be,kBAAoBd,EAAAA,4BAAAA;oBACpBe,mBAAqBd,EAAAA,6BAAAA;oBACrBe,QAAU,EAAA;AACX,iBAAA;gBACDC,SAAW,EAAA;oBACTC,QAAU,EAAA,KAAA;oBACVC,GAAK,EAAA;AACN,iBAAA;gBACDC,MAAQ,EAAA;oBACNC,IAAM,EAAA;wBACJC,OAAS,EAAA;4BACPC,MAAQ,EAAA,2BAAA;4BACRC,MAAQ,EAAA;AACT;AACF;AACF,iBAAA;gBACDC,QAAU,EAAA;oBACRC,QAASD,CAAAA,CAAAA,QAAQ,EAAEE,QAAQ,EAAA;wBACzB,IAAIC,SAAAA;wBACJ,IAAIC,iBAAAA;wBAEJ,IAAI;AACFD,4BAAAA,SAAAA,GAAY,IAAIE,GAAIL,CAAAA,QAAAA,CAAAA;4BACpBI,iBAAoB,GAAA,IAAIC,GAAIH,CAAAA,QAAAA,CAASF,QAAQ,CAAA;AACvD,yBAAA,CAAU,OAAM;AACN,4BAAA,MAAM,IAAIM,KAAM,CAAA,iCAAA,CAAA;AACjB;;AAGD,wBAAA,IAAIH,SAAUI,CAAAA,MAAM,KAAKH,iBAAAA,CAAkBG,MAAM,EAAE;AACjD,4BAAA,MAAM,IAAID,KAAAA,CACR,CAAC,4EAA4E,CAAC,CAAA;AAEjF;;AAGD,wBAAA,IAAIH,SAAUK,CAAAA,QAAQ,KAAKJ,iBAAAA,CAAkBI,QAAQ,EAAE;AACrD,4BAAA,MAAM,IAAIF,KAAAA,CACR,CAAC,6EAA6E,CAAC,CAAA;AAElF;;AAGF;AACF;aACL,CAAA;QACEG,SAAc,CAAA,GAAA;AAChB,KAAA;;;;;;"}
1
+ {"version":3,"file":"config.js","sources":["../../server/config.js"],"sourcesContent":["'use strict';\n\nconst {\n DEFAULT_ACCESS_TOKEN_LIFESPAN,\n DEFAULT_MAX_REFRESH_TOKEN_LIFESPAN,\n DEFAULT_IDLE_REFRESH_TOKEN_LIFESPAN,\n DEFAULT_MAX_SESSION_LIFESPAN,\n DEFAULT_IDLE_SESSION_LIFESPAN,\n} = require('./services/constants');\n\nmodule.exports = {\n default: ({ env }) => ({\n jwtSecret: env('JWT_SECRET'),\n jwt: {\n expiresIn: '30d',\n },\n /**\n * JWT management mode for the Content API authentication\n * - \"legacy-support\": use plugin JWTs (backward compatible)\n * - \"refresh\": use SessionManager (access/refresh tokens)\n */\n jwtManagement: 'legacy-support',\n sessions: {\n accessTokenLifespan: DEFAULT_ACCESS_TOKEN_LIFESPAN,\n maxRefreshTokenLifespan: DEFAULT_MAX_REFRESH_TOKEN_LIFESPAN,\n idleRefreshTokenLifespan: DEFAULT_IDLE_REFRESH_TOKEN_LIFESPAN,\n maxSessionLifespan: DEFAULT_MAX_SESSION_LIFESPAN,\n idleSessionLifespan: DEFAULT_IDLE_SESSION_LIFESPAN,\n httpOnly: false,\n },\n ratelimit: {\n interval: 60000,\n max: 10,\n },\n layout: {\n user: {\n actions: {\n create: 'contentManagerUser.create', // Use the User plugin's controller.\n update: 'contentManagerUser.update',\n },\n },\n },\n callback: {\n validate(callback, provider) {\n let uCallback;\n let uProviderCallback;\n\n try {\n uCallback = new URL(callback);\n uProviderCallback = new URL(provider.callback);\n } catch {\n throw new Error('The callback is not a valid URL');\n }\n\n // Make sure the different origin matches\n if (uCallback.origin !== uProviderCallback.origin) {\n throw new Error(\n `Forbidden callback provided: origins don't match. Please verify your config.`\n );\n }\n\n // Make sure the different pathname matches\n if (uCallback.pathname !== uProviderCallback.pathname) {\n throw new Error(\n `Forbidden callback provided: pathname don't match. Please verify your config.`\n );\n }\n\n // NOTE: We're not checking the search parameters on purpose to allow passing different states\n },\n },\n }),\n validator() {},\n};\n"],"names":["DEFAULT_ACCESS_TOKEN_LIFESPAN","DEFAULT_MAX_REFRESH_TOKEN_LIFESPAN","DEFAULT_IDLE_REFRESH_TOKEN_LIFESPAN","DEFAULT_MAX_SESSION_LIFESPAN","DEFAULT_IDLE_SESSION_LIFESPAN","require$$0","config","default","env","jwtSecret","jwt","expiresIn","jwtManagement","sessions","accessTokenLifespan","maxRefreshTokenLifespan","idleRefreshTokenLifespan","maxSessionLifespan","idleSessionLifespan","httpOnly","ratelimit","interval","max","layout","user","actions","create","update","callback","validate","provider","uCallback","uProviderCallback","URL","Error","origin","pathname","validator"],"mappings":";;;;;;;;;IAEA,MAAM,EACJA,6BAA6B,EAC7BC,kCAAkC,EAClCC,mCAAmC,EACnCC,4BAA4B,EAC5BC,6BAA6B,EAC9B,GAAGC,mBAAAA,EAAAA;IAEJC,MAAAA,GAAiB;AACfC,QAAAA,OAAAA,EAAS,CAAC,EAAEC,GAAG,EAAE,IAAM;AACrBC,gBAAAA,SAAAA,EAAWD,GAAAA,CAAI,YAAA,CAAA;gBACfE,GAAAA,EAAK;oBACHC,SAAAA,EAAW;AACjB,iBAAA;AACA;;;;AAIA,SACIC,aAAAA,EAAe,gBAAA;gBACfC,QAAAA,EAAU;oBACRC,mBAAAA,EAAqBd,6BAAAA;oBACrBe,uBAAAA,EAAyBd,kCAAAA;oBACzBe,wBAAAA,EAA0Bd,mCAAAA;oBAC1Be,kBAAAA,EAAoBd,4BAAAA;oBACpBe,mBAAAA,EAAqBd,6BAAAA;oBACrBe,QAAAA,EAAU;AAChB,iBAAA;gBACIC,SAAAA,EAAW;oBACTC,QAAAA,EAAU,KAAA;oBACVC,GAAAA,EAAK;AACX,iBAAA;gBACIC,MAAAA,EAAQ;oBACNC,IAAAA,EAAM;wBACJC,OAAAA,EAAS;4BACPC,MAAAA,EAAQ,2BAAA;4BACRC,MAAAA,EAAQ;AAClB;AACA;AACA,iBAAA;gBACIC,QAAAA,EAAU;oBACRC,QAAAA,CAAAA,CAASD,QAAQ,EAAEE,QAAQ,EAAA;wBACzB,IAAIC,SAAAA;wBACJ,IAAIC,iBAAAA;wBAEJ,IAAI;AACFD,4BAAAA,SAAAA,GAAY,IAAIE,GAAAA,CAAIL,QAAAA,CAAAA;4BACpBI,iBAAAA,GAAoB,IAAIC,GAAAA,CAAIH,QAAAA,CAASF,QAAQ,CAAA;AACvD,wBAAA,CAAA,CAAU,OAAM;AACN,4BAAA,MAAM,IAAIM,KAAAA,CAAM,iCAAA,CAAA;AAC1B,wBAAA;;AAGQ,wBAAA,IAAIH,SAAAA,CAAUI,MAAM,KAAKH,iBAAAA,CAAkBG,MAAM,EAAE;AACjD,4BAAA,MAAM,IAAID,KAAAA,CACR,CAAC,4EAA4E,CAAC,CAAA;AAE1F,wBAAA;;AAGQ,wBAAA,IAAIH,SAAAA,CAAUK,QAAQ,KAAKJ,iBAAAA,CAAkBI,QAAQ,EAAE;AACrD,4BAAA,MAAM,IAAIF,KAAAA,CACR,CAAC,6EAA6E,CAAC,CAAA;AAE3F,wBAAA;;AAGA,oBAAA;AACA;aACA,CAAA;QACEG,SAAAA,CAAAA,GAAAA,CAAY;AACd,KAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"config.mjs","sources":["../../server/config.js"],"sourcesContent":["'use strict';\n\nconst {\n DEFAULT_ACCESS_TOKEN_LIFESPAN,\n DEFAULT_MAX_REFRESH_TOKEN_LIFESPAN,\n DEFAULT_IDLE_REFRESH_TOKEN_LIFESPAN,\n DEFAULT_MAX_SESSION_LIFESPAN,\n DEFAULT_IDLE_SESSION_LIFESPAN,\n} = require('./services/constants');\n\nmodule.exports = {\n default: ({ env }) => ({\n jwtSecret: env('JWT_SECRET'),\n jwt: {\n expiresIn: '30d',\n },\n /**\n * JWT management mode for the Content API authentication\n * - \"legacy-support\": use plugin JWTs (backward compatible)\n * - \"refresh\": use SessionManager (access/refresh tokens)\n */\n jwtManagement: 'legacy-support',\n sessions: {\n accessTokenLifespan: DEFAULT_ACCESS_TOKEN_LIFESPAN,\n maxRefreshTokenLifespan: DEFAULT_MAX_REFRESH_TOKEN_LIFESPAN,\n idleRefreshTokenLifespan: DEFAULT_IDLE_REFRESH_TOKEN_LIFESPAN,\n maxSessionLifespan: DEFAULT_MAX_SESSION_LIFESPAN,\n idleSessionLifespan: DEFAULT_IDLE_SESSION_LIFESPAN,\n httpOnly: false,\n },\n ratelimit: {\n interval: 60000,\n max: 10,\n },\n layout: {\n user: {\n actions: {\n create: 'contentManagerUser.create', // Use the User plugin's controller.\n update: 'contentManagerUser.update',\n },\n },\n },\n callback: {\n validate(callback, provider) {\n let uCallback;\n let uProviderCallback;\n\n try {\n uCallback = new URL(callback);\n uProviderCallback = new URL(provider.callback);\n } catch {\n throw new Error('The callback is not a valid URL');\n }\n\n // Make sure the different origin matches\n if (uCallback.origin !== uProviderCallback.origin) {\n throw new Error(\n `Forbidden callback provided: origins don't match. Please verify your config.`\n );\n }\n\n // Make sure the different pathname matches\n if (uCallback.pathname !== uProviderCallback.pathname) {\n throw new Error(\n `Forbidden callback provided: pathname don't match. Please verify your config.`\n );\n }\n\n // NOTE: We're not checking the search parameters on purpose to allow passing different states\n },\n },\n }),\n validator() {},\n};\n"],"names":["DEFAULT_ACCESS_TOKEN_LIFESPAN","DEFAULT_MAX_REFRESH_TOKEN_LIFESPAN","DEFAULT_IDLE_REFRESH_TOKEN_LIFESPAN","DEFAULT_MAX_SESSION_LIFESPAN","DEFAULT_IDLE_SESSION_LIFESPAN","require$$0","config","default","env","jwtSecret","jwt","expiresIn","jwtManagement","sessions","accessTokenLifespan","maxRefreshTokenLifespan","idleRefreshTokenLifespan","maxSessionLifespan","idleSessionLifespan","httpOnly","ratelimit","interval","max","layout","user","actions","create","update","callback","validate","provider","uCallback","uProviderCallback","URL","Error","origin","pathname","validator"],"mappings":";;;;;;;IAEA,MAAM,EACJA,6BAA6B,EAC7BC,kCAAkC,EAClCC,mCAAmC,EACnCC,4BAA4B,EAC5BC,6BAA6B,EAC9B,GAAGC,gBAAAA,EAAAA;IAEJC,MAAiB,GAAA;AACfC,QAAAA,OAAAA,EAAS,CAAC,EAAEC,GAAG,EAAE,IAAM;AACrBC,gBAAAA,SAAAA,EAAWD,GAAI,CAAA,YAAA,CAAA;gBACfE,GAAK,EAAA;oBACHC,SAAW,EAAA;AACZ,iBAAA;AACL;;;;AAIA,SACIC,aAAe,EAAA,gBAAA;gBACfC,QAAU,EAAA;oBACRC,mBAAqBd,EAAAA,6BAAAA;oBACrBe,uBAAyBd,EAAAA,kCAAAA;oBACzBe,wBAA0Bd,EAAAA,mCAAAA;oBAC1Be,kBAAoBd,EAAAA,4BAAAA;oBACpBe,mBAAqBd,EAAAA,6BAAAA;oBACrBe,QAAU,EAAA;AACX,iBAAA;gBACDC,SAAW,EAAA;oBACTC,QAAU,EAAA,KAAA;oBACVC,GAAK,EAAA;AACN,iBAAA;gBACDC,MAAQ,EAAA;oBACNC,IAAM,EAAA;wBACJC,OAAS,EAAA;4BACPC,MAAQ,EAAA,2BAAA;4BACRC,MAAQ,EAAA;AACT;AACF;AACF,iBAAA;gBACDC,QAAU,EAAA;oBACRC,QAASD,CAAAA,CAAAA,QAAQ,EAAEE,QAAQ,EAAA;wBACzB,IAAIC,SAAAA;wBACJ,IAAIC,iBAAAA;wBAEJ,IAAI;AACFD,4BAAAA,SAAAA,GAAY,IAAIE,GAAIL,CAAAA,QAAAA,CAAAA;4BACpBI,iBAAoB,GAAA,IAAIC,GAAIH,CAAAA,QAAAA,CAASF,QAAQ,CAAA;AACvD,yBAAA,CAAU,OAAM;AACN,4BAAA,MAAM,IAAIM,KAAM,CAAA,iCAAA,CAAA;AACjB;;AAGD,wBAAA,IAAIH,SAAUI,CAAAA,MAAM,KAAKH,iBAAAA,CAAkBG,MAAM,EAAE;AACjD,4BAAA,MAAM,IAAID,KAAAA,CACR,CAAC,4EAA4E,CAAC,CAAA;AAEjF;;AAGD,wBAAA,IAAIH,SAAUK,CAAAA,QAAQ,KAAKJ,iBAAAA,CAAkBI,QAAQ,EAAE;AACrD,4BAAA,MAAM,IAAIF,KAAAA,CACR,CAAC,6EAA6E,CAAC,CAAA;AAElF;;AAGF;AACF;aACL,CAAA;QACEG,SAAc,CAAA,GAAA;AAChB,KAAA;;;;;;"}
1
+ {"version":3,"file":"config.mjs","sources":["../../server/config.js"],"sourcesContent":["'use strict';\n\nconst {\n DEFAULT_ACCESS_TOKEN_LIFESPAN,\n DEFAULT_MAX_REFRESH_TOKEN_LIFESPAN,\n DEFAULT_IDLE_REFRESH_TOKEN_LIFESPAN,\n DEFAULT_MAX_SESSION_LIFESPAN,\n DEFAULT_IDLE_SESSION_LIFESPAN,\n} = require('./services/constants');\n\nmodule.exports = {\n default: ({ env }) => ({\n jwtSecret: env('JWT_SECRET'),\n jwt: {\n expiresIn: '30d',\n },\n /**\n * JWT management mode for the Content API authentication\n * - \"legacy-support\": use plugin JWTs (backward compatible)\n * - \"refresh\": use SessionManager (access/refresh tokens)\n */\n jwtManagement: 'legacy-support',\n sessions: {\n accessTokenLifespan: DEFAULT_ACCESS_TOKEN_LIFESPAN,\n maxRefreshTokenLifespan: DEFAULT_MAX_REFRESH_TOKEN_LIFESPAN,\n idleRefreshTokenLifespan: DEFAULT_IDLE_REFRESH_TOKEN_LIFESPAN,\n maxSessionLifespan: DEFAULT_MAX_SESSION_LIFESPAN,\n idleSessionLifespan: DEFAULT_IDLE_SESSION_LIFESPAN,\n httpOnly: false,\n },\n ratelimit: {\n interval: 60000,\n max: 10,\n },\n layout: {\n user: {\n actions: {\n create: 'contentManagerUser.create', // Use the User plugin's controller.\n update: 'contentManagerUser.update',\n },\n },\n },\n callback: {\n validate(callback, provider) {\n let uCallback;\n let uProviderCallback;\n\n try {\n uCallback = new URL(callback);\n uProviderCallback = new URL(provider.callback);\n } catch {\n throw new Error('The callback is not a valid URL');\n }\n\n // Make sure the different origin matches\n if (uCallback.origin !== uProviderCallback.origin) {\n throw new Error(\n `Forbidden callback provided: origins don't match. Please verify your config.`\n );\n }\n\n // Make sure the different pathname matches\n if (uCallback.pathname !== uProviderCallback.pathname) {\n throw new Error(\n `Forbidden callback provided: pathname don't match. Please verify your config.`\n );\n }\n\n // NOTE: We're not checking the search parameters on purpose to allow passing different states\n },\n },\n }),\n validator() {},\n};\n"],"names":["DEFAULT_ACCESS_TOKEN_LIFESPAN","DEFAULT_MAX_REFRESH_TOKEN_LIFESPAN","DEFAULT_IDLE_REFRESH_TOKEN_LIFESPAN","DEFAULT_MAX_SESSION_LIFESPAN","DEFAULT_IDLE_SESSION_LIFESPAN","require$$0","config","default","env","jwtSecret","jwt","expiresIn","jwtManagement","sessions","accessTokenLifespan","maxRefreshTokenLifespan","idleRefreshTokenLifespan","maxSessionLifespan","idleSessionLifespan","httpOnly","ratelimit","interval","max","layout","user","actions","create","update","callback","validate","provider","uCallback","uProviderCallback","URL","Error","origin","pathname","validator"],"mappings":";;;;;;;IAEA,MAAM,EACJA,6BAA6B,EAC7BC,kCAAkC,EAClCC,mCAAmC,EACnCC,4BAA4B,EAC5BC,6BAA6B,EAC9B,GAAGC,gBAAAA,EAAAA;IAEJC,MAAAA,GAAiB;AACfC,QAAAA,OAAAA,EAAS,CAAC,EAAEC,GAAG,EAAE,IAAM;AACrBC,gBAAAA,SAAAA,EAAWD,GAAAA,CAAI,YAAA,CAAA;gBACfE,GAAAA,EAAK;oBACHC,SAAAA,EAAW;AACjB,iBAAA;AACA;;;;AAIA,SACIC,aAAAA,EAAe,gBAAA;gBACfC,QAAAA,EAAU;oBACRC,mBAAAA,EAAqBd,6BAAAA;oBACrBe,uBAAAA,EAAyBd,kCAAAA;oBACzBe,wBAAAA,EAA0Bd,mCAAAA;oBAC1Be,kBAAAA,EAAoBd,4BAAAA;oBACpBe,mBAAAA,EAAqBd,6BAAAA;oBACrBe,QAAAA,EAAU;AAChB,iBAAA;gBACIC,SAAAA,EAAW;oBACTC,QAAAA,EAAU,KAAA;oBACVC,GAAAA,EAAK;AACX,iBAAA;gBACIC,MAAAA,EAAQ;oBACNC,IAAAA,EAAM;wBACJC,OAAAA,EAAS;4BACPC,MAAAA,EAAQ,2BAAA;4BACRC,MAAAA,EAAQ;AAClB;AACA;AACA,iBAAA;gBACIC,QAAAA,EAAU;oBACRC,QAAAA,CAAAA,CAASD,QAAQ,EAAEE,QAAQ,EAAA;wBACzB,IAAIC,SAAAA;wBACJ,IAAIC,iBAAAA;wBAEJ,IAAI;AACFD,4BAAAA,SAAAA,GAAY,IAAIE,GAAAA,CAAIL,QAAAA,CAAAA;4BACpBI,iBAAAA,GAAoB,IAAIC,GAAAA,CAAIH,QAAAA,CAASF,QAAQ,CAAA;AACvD,wBAAA,CAAA,CAAU,OAAM;AACN,4BAAA,MAAM,IAAIM,KAAAA,CAAM,iCAAA,CAAA;AAC1B,wBAAA;;AAGQ,wBAAA,IAAIH,SAAAA,CAAUI,MAAM,KAAKH,iBAAAA,CAAkBG,MAAM,EAAE;AACjD,4BAAA,MAAM,IAAID,KAAAA,CACR,CAAC,4EAA4E,CAAC,CAAA;AAE1F,wBAAA;;AAGQ,wBAAA,IAAIH,SAAAA,CAAUK,QAAQ,KAAKJ,iBAAAA,CAAkBI,QAAQ,EAAE;AACrD,4BAAA,MAAM,IAAIF,KAAAA,CACR,CAAC,6EAA6E,CAAC,CAAA;AAE3F,wBAAA;;AAGA,oBAAA;AACA;aACA,CAAA;QACEG,SAAAA,CAAAA,GAAAA,CAAY;AACd,KAAA;;;;;;"}
@@ -1,17 +1,17 @@
1
1
  'use strict';
2
2
 
3
- var index = require('./permission/index.js');
3
+ var index$2 = require('./permission/index.js');
4
4
  var index$1 = require('./role/index.js');
5
- var index$2 = require('./user/index.js');
5
+ var index = require('./user/index.js');
6
6
 
7
7
  var contentTypes;
8
8
  var hasRequiredContentTypes;
9
9
  function requireContentTypes() {
10
10
  if (hasRequiredContentTypes) return contentTypes;
11
11
  hasRequiredContentTypes = 1;
12
- const permission = index.__require();
12
+ const permission = index$2.__require();
13
13
  const role = index$1.__require();
14
- const user = index$2.__require();
14
+ const user = index.__require();
15
15
  contentTypes = {
16
16
  permission: {
17
17
  schema: permission
@@ -1 +1 @@
1
- {"version":3,"file":"index.js","sources":["../../../server/content-types/index.js"],"sourcesContent":["'use strict';\n\nconst permission = require('./permission');\nconst role = require('./role');\nconst user = require('./user');\n\nmodule.exports = {\n permission: { schema: permission },\n role: { schema: role },\n user: { schema: user },\n};\n"],"names":["permission","require$$0","role","require$$1","user","require$$2","contentTypes","schema"],"mappings":";;;;;;;;;;;AAEA,IAAA,MAAMA,UAAaC,GAAAA,eAAAA,EAAAA;AACnB,IAAA,MAAMC,IAAOC,GAAAA,iBAAAA,EAAAA;AACb,IAAA,MAAMC,IAAOC,GAAAA,iBAAAA,EAAAA;IAEbC,YAAiB,GAAA;QACfN,UAAY,EAAA;YAAEO,MAAQP,EAAAA;AAAY,SAAA;QAClCE,IAAM,EAAA;YAAEK,MAAQL,EAAAA;AAAM,SAAA;QACtBE,IAAM,EAAA;YAAEG,MAAQH,EAAAA;AAAM;AACxB,KAAA;;;;;;"}
1
+ {"version":3,"file":"index.js","sources":["../../../server/content-types/index.js"],"sourcesContent":["'use strict';\n\nconst permission = require('./permission');\nconst role = require('./role');\nconst user = require('./user');\n\nmodule.exports = {\n permission: { schema: permission },\n role: { schema: role },\n user: { schema: user },\n};\n"],"names":["permission","require$$0","role","require$$1","user","require$$2","contentTypes","schema"],"mappings":";;;;;;;;;;;AAEA,IAAA,MAAMA,UAAAA,GAAaC,iBAAAA,EAAAA;AACnB,IAAA,MAAMC,IAAAA,GAAOC,iBAAAA,EAAAA;AACb,IAAA,MAAMC,IAAAA,GAAOC,eAAAA,EAAAA;IAEbC,YAAAA,GAAiB;QACfN,UAAAA,EAAY;YAAEO,MAAAA,EAAQP;AAAU,SAAA;QAChCE,IAAAA,EAAM;YAAEK,MAAAA,EAAQL;AAAI,SAAA;QACpBE,IAAAA,EAAM;YAAEG,MAAAA,EAAQH;AAAI;AACtB,KAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"index.mjs","sources":["../../../server/content-types/index.js"],"sourcesContent":["'use strict';\n\nconst permission = require('./permission');\nconst role = require('./role');\nconst user = require('./user');\n\nmodule.exports = {\n permission: { schema: permission },\n role: { schema: role },\n user: { schema: user },\n};\n"],"names":["permission","require$$0","role","require$$1","user","require$$2","contentTypes","schema"],"mappings":";;;;;;;;;AAEA,IAAA,MAAMA,UAAaC,GAAAA,iBAAAA,EAAAA;AACnB,IAAA,MAAMC,IAAOC,GAAAA,WAAAA,EAAAA;AACb,IAAA,MAAMC,IAAOC,GAAAA,WAAAA,EAAAA;IAEbC,YAAiB,GAAA;QACfN,UAAY,EAAA;YAAEO,MAAQP,EAAAA;AAAY,SAAA;QAClCE,IAAM,EAAA;YAAEK,MAAQL,EAAAA;AAAM,SAAA;QACtBE,IAAM,EAAA;YAAEG,MAAQH,EAAAA;AAAM;AACxB,KAAA;;;;;;"}
1
+ {"version":3,"file":"index.mjs","sources":["../../../server/content-types/index.js"],"sourcesContent":["'use strict';\n\nconst permission = require('./permission');\nconst role = require('./role');\nconst user = require('./user');\n\nmodule.exports = {\n permission: { schema: permission },\n role: { schema: role },\n user: { schema: user },\n};\n"],"names":["permission","require$$0","role","require$$1","user","require$$2","contentTypes","schema"],"mappings":";;;;;;;;;AAEA,IAAA,MAAMA,UAAAA,GAAaC,iBAAAA,EAAAA;AACnB,IAAA,MAAMC,IAAAA,GAAOC,WAAAA,EAAAA;AACb,IAAA,MAAMC,IAAAA,GAAOC,WAAAA,EAAAA;IAEbC,YAAAA,GAAiB;QACfN,UAAAA,EAAY;YAAEO,MAAAA,EAAQP;AAAU,SAAA;QAChCE,IAAAA,EAAM;YAAEK,MAAAA,EAAQL;AAAI,SAAA;QACpBE,IAAAA,EAAM;YAAEG,MAAAA,EAAQH;AAAI;AACtB,KAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"index.js","sources":["../../../../server/content-types/permission/index.js"],"sourcesContent":["'use strict';\n\nmodule.exports = {\n collectionName: 'up_permissions',\n info: {\n name: 'permission',\n description: '',\n singularName: 'permission',\n pluralName: 'permissions',\n displayName: 'Permission',\n },\n pluginOptions: {\n 'content-manager': {\n visible: false,\n },\n 'content-type-builder': {\n visible: false,\n },\n },\n attributes: {\n action: {\n type: 'string',\n required: true,\n configurable: false,\n },\n role: {\n type: 'relation',\n relation: 'manyToOne',\n target: 'plugin::users-permissions.role',\n inversedBy: 'permissions',\n configurable: false,\n },\n },\n};\n"],"names":["permission","collectionName","info","name","description","singularName","pluralName","displayName","pluginOptions","visible","attributes","action","type","required","configurable","role","relation","target","inversedBy"],"mappings":";;;;;;;IAEAA,UAAiB,GAAA;QACfC,cAAgB,EAAA,gBAAA;QAChBC,IAAM,EAAA;YACJC,IAAM,EAAA,YAAA;YACNC,WAAa,EAAA,EAAA;YACbC,YAAc,EAAA,YAAA;YACdC,UAAY,EAAA,aAAA;YACZC,WAAa,EAAA;AACd,SAAA;QACDC,aAAe,EAAA;YACb,iBAAmB,EAAA;gBACjBC,OAAS,EAAA;AACV,aAAA;YACD,sBAAwB,EAAA;gBACtBA,OAAS,EAAA;AACV;AACF,SAAA;QACDC,UAAY,EAAA;YACVC,MAAQ,EAAA;gBACNC,IAAM,EAAA,QAAA;gBACNC,QAAU,EAAA,IAAA;gBACVC,YAAc,EAAA;AACf,aAAA;YACDC,IAAM,EAAA;gBACJH,IAAM,EAAA,UAAA;gBACNI,QAAU,EAAA,WAAA;gBACVC,MAAQ,EAAA,gCAAA;gBACRC,UAAY,EAAA,aAAA;gBACZJ,YAAc,EAAA;AACf;AACF;AACH,KAAA;;;;;;"}
1
+ {"version":3,"file":"index.js","sources":["../../../../server/content-types/permission/index.js"],"sourcesContent":["'use strict';\n\nmodule.exports = {\n collectionName: 'up_permissions',\n info: {\n name: 'permission',\n description: '',\n singularName: 'permission',\n pluralName: 'permissions',\n displayName: 'Permission',\n },\n pluginOptions: {\n 'content-manager': {\n visible: false,\n },\n 'content-type-builder': {\n visible: false,\n },\n },\n attributes: {\n action: {\n type: 'string',\n required: true,\n configurable: false,\n },\n role: {\n type: 'relation',\n relation: 'manyToOne',\n target: 'plugin::users-permissions.role',\n inversedBy: 'permissions',\n configurable: false,\n },\n },\n};\n"],"names":["permission","collectionName","info","name","description","singularName","pluralName","displayName","pluginOptions","visible","attributes","action","type","required","configurable","role","relation","target","inversedBy"],"mappings":";;;;;;;IAEAA,UAAAA,GAAiB;QACfC,cAAAA,EAAgB,gBAAA;QAChBC,IAAAA,EAAM;YACJC,IAAAA,EAAM,YAAA;YACNC,WAAAA,EAAa,EAAA;YACbC,YAAAA,EAAc,YAAA;YACdC,UAAAA,EAAY,aAAA;YACZC,WAAAA,EAAa;AACjB,SAAA;QACEC,aAAAA,EAAe;YACb,iBAAA,EAAmB;gBACjBC,OAAAA,EAAS;AACf,aAAA;YACI,sBAAA,EAAwB;gBACtBA,OAAAA,EAAS;AACf;AACA,SAAA;QACEC,UAAAA,EAAY;YACVC,MAAAA,EAAQ;gBACNC,IAAAA,EAAM,QAAA;gBACNC,QAAAA,EAAU,IAAA;gBACVC,YAAAA,EAAc;AACpB,aAAA;YACIC,IAAAA,EAAM;gBACJH,IAAAA,EAAM,UAAA;gBACNI,QAAAA,EAAU,WAAA;gBACVC,MAAAA,EAAQ,gCAAA;gBACRC,UAAAA,EAAY,aAAA;gBACZJ,YAAAA,EAAc;AACpB;AACA;AACA,KAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"index.mjs","sources":["../../../../server/content-types/permission/index.js"],"sourcesContent":["'use strict';\n\nmodule.exports = {\n collectionName: 'up_permissions',\n info: {\n name: 'permission',\n description: '',\n singularName: 'permission',\n pluralName: 'permissions',\n displayName: 'Permission',\n },\n pluginOptions: {\n 'content-manager': {\n visible: false,\n },\n 'content-type-builder': {\n visible: false,\n },\n },\n attributes: {\n action: {\n type: 'string',\n required: true,\n configurable: false,\n },\n role: {\n type: 'relation',\n relation: 'manyToOne',\n target: 'plugin::users-permissions.role',\n inversedBy: 'permissions',\n configurable: false,\n },\n },\n};\n"],"names":["permission","collectionName","info","name","description","singularName","pluralName","displayName","pluginOptions","visible","attributes","action","type","required","configurable","role","relation","target","inversedBy"],"mappings":";;;;;IAEAA,UAAiB,GAAA;QACfC,cAAgB,EAAA,gBAAA;QAChBC,IAAM,EAAA;YACJC,IAAM,EAAA,YAAA;YACNC,WAAa,EAAA,EAAA;YACbC,YAAc,EAAA,YAAA;YACdC,UAAY,EAAA,aAAA;YACZC,WAAa,EAAA;AACd,SAAA;QACDC,aAAe,EAAA;YACb,iBAAmB,EAAA;gBACjBC,OAAS,EAAA;AACV,aAAA;YACD,sBAAwB,EAAA;gBACtBA,OAAS,EAAA;AACV;AACF,SAAA;QACDC,UAAY,EAAA;YACVC,MAAQ,EAAA;gBACNC,IAAM,EAAA,QAAA;gBACNC,QAAU,EAAA,IAAA;gBACVC,YAAc,EAAA;AACf,aAAA;YACDC,IAAM,EAAA;gBACJH,IAAM,EAAA,UAAA;gBACNI,QAAU,EAAA,WAAA;gBACVC,MAAQ,EAAA,gCAAA;gBACRC,UAAY,EAAA,aAAA;gBACZJ,YAAc,EAAA;AACf;AACF;AACH,KAAA;;;;;;"}
1
+ {"version":3,"file":"index.mjs","sources":["../../../../server/content-types/permission/index.js"],"sourcesContent":["'use strict';\n\nmodule.exports = {\n collectionName: 'up_permissions',\n info: {\n name: 'permission',\n description: '',\n singularName: 'permission',\n pluralName: 'permissions',\n displayName: 'Permission',\n },\n pluginOptions: {\n 'content-manager': {\n visible: false,\n },\n 'content-type-builder': {\n visible: false,\n },\n },\n attributes: {\n action: {\n type: 'string',\n required: true,\n configurable: false,\n },\n role: {\n type: 'relation',\n relation: 'manyToOne',\n target: 'plugin::users-permissions.role',\n inversedBy: 'permissions',\n configurable: false,\n },\n },\n};\n"],"names":["permission","collectionName","info","name","description","singularName","pluralName","displayName","pluginOptions","visible","attributes","action","type","required","configurable","role","relation","target","inversedBy"],"mappings":";;;;;IAEAA,UAAAA,GAAiB;QACfC,cAAAA,EAAgB,gBAAA;QAChBC,IAAAA,EAAM;YACJC,IAAAA,EAAM,YAAA;YACNC,WAAAA,EAAa,EAAA;YACbC,YAAAA,EAAc,YAAA;YACdC,UAAAA,EAAY,aAAA;YACZC,WAAAA,EAAa;AACjB,SAAA;QACEC,aAAAA,EAAe;YACb,iBAAA,EAAmB;gBACjBC,OAAAA,EAAS;AACf,aAAA;YACI,sBAAA,EAAwB;gBACtBA,OAAAA,EAAS;AACf;AACA,SAAA;QACEC,UAAAA,EAAY;YACVC,MAAAA,EAAQ;gBACNC,IAAAA,EAAM,QAAA;gBACNC,QAAAA,EAAU,IAAA;gBACVC,YAAAA,EAAc;AACpB,aAAA;YACIC,IAAAA,EAAM;gBACJH,IAAAA,EAAM,UAAA;gBACNI,QAAAA,EAAU,WAAA;gBACVC,MAAAA,EAAQ,gCAAA;gBACRC,UAAAA,EAAY,aAAA;gBACZJ,YAAAA,EAAc;AACpB;AACA;AACA,KAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"index.js","sources":["../../../../server/content-types/role/index.js"],"sourcesContent":["'use strict';\n\nmodule.exports = {\n collectionName: 'up_roles',\n info: {\n name: 'role',\n description: '',\n singularName: 'role',\n pluralName: 'roles',\n displayName: 'Role',\n },\n pluginOptions: {\n 'content-manager': {\n visible: false,\n },\n 'content-type-builder': {\n visible: false,\n },\n },\n attributes: {\n name: {\n type: 'string',\n minLength: 3,\n required: true,\n configurable: false,\n },\n description: {\n type: 'string',\n configurable: false,\n },\n type: {\n type: 'string',\n unique: true,\n configurable: false,\n },\n permissions: {\n type: 'relation',\n relation: 'oneToMany',\n target: 'plugin::users-permissions.permission',\n mappedBy: 'role',\n configurable: false,\n },\n users: {\n type: 'relation',\n relation: 'oneToMany',\n target: 'plugin::users-permissions.user',\n mappedBy: 'role',\n configurable: false,\n },\n },\n};\n"],"names":["role","collectionName","info","name","description","singularName","pluralName","displayName","pluginOptions","visible","attributes","type","minLength","required","configurable","unique","permissions","relation","target","mappedBy","users"],"mappings":";;;;;;;IAEAA,IAAiB,GAAA;QACfC,cAAgB,EAAA,UAAA;QAChBC,IAAM,EAAA;YACJC,IAAM,EAAA,MAAA;YACNC,WAAa,EAAA,EAAA;YACbC,YAAc,EAAA,MAAA;YACdC,UAAY,EAAA,OAAA;YACZC,WAAa,EAAA;AACd,SAAA;QACDC,aAAe,EAAA;YACb,iBAAmB,EAAA;gBACjBC,OAAS,EAAA;AACV,aAAA;YACD,sBAAwB,EAAA;gBACtBA,OAAS,EAAA;AACV;AACF,SAAA;QACDC,UAAY,EAAA;YACVP,IAAM,EAAA;gBACJQ,IAAM,EAAA,QAAA;gBACNC,SAAW,EAAA,CAAA;gBACXC,QAAU,EAAA,IAAA;gBACVC,YAAc,EAAA;AACf,aAAA;YACDV,WAAa,EAAA;gBACXO,IAAM,EAAA,QAAA;gBACNG,YAAc,EAAA;AACf,aAAA;YACDH,IAAM,EAAA;gBACJA,IAAM,EAAA,QAAA;gBACNI,MAAQ,EAAA,IAAA;gBACRD,YAAc,EAAA;AACf,aAAA;YACDE,WAAa,EAAA;gBACXL,IAAM,EAAA,UAAA;gBACNM,QAAU,EAAA,WAAA;gBACVC,MAAQ,EAAA,sCAAA;gBACRC,QAAU,EAAA,MAAA;gBACVL,YAAc,EAAA;AACf,aAAA;YACDM,KAAO,EAAA;gBACLT,IAAM,EAAA,UAAA;gBACNM,QAAU,EAAA,WAAA;gBACVC,MAAQ,EAAA,gCAAA;gBACRC,QAAU,EAAA,MAAA;gBACVL,YAAc,EAAA;AACf;AACF;AACH,KAAA;;;;;;"}
1
+ {"version":3,"file":"index.js","sources":["../../../../server/content-types/role/index.js"],"sourcesContent":["'use strict';\n\nmodule.exports = {\n collectionName: 'up_roles',\n info: {\n name: 'role',\n description: '',\n singularName: 'role',\n pluralName: 'roles',\n displayName: 'Role',\n },\n pluginOptions: {\n 'content-manager': {\n visible: false,\n },\n 'content-type-builder': {\n visible: false,\n },\n },\n attributes: {\n name: {\n type: 'string',\n minLength: 3,\n required: true,\n configurable: false,\n },\n description: {\n type: 'string',\n configurable: false,\n },\n type: {\n type: 'string',\n unique: true,\n configurable: false,\n },\n permissions: {\n type: 'relation',\n relation: 'oneToMany',\n target: 'plugin::users-permissions.permission',\n mappedBy: 'role',\n configurable: false,\n },\n users: {\n type: 'relation',\n relation: 'oneToMany',\n target: 'plugin::users-permissions.user',\n mappedBy: 'role',\n configurable: false,\n },\n },\n};\n"],"names":["role","collectionName","info","name","description","singularName","pluralName","displayName","pluginOptions","visible","attributes","type","minLength","required","configurable","unique","permissions","relation","target","mappedBy","users"],"mappings":";;;;;;;IAEAA,IAAAA,GAAiB;QACfC,cAAAA,EAAgB,UAAA;QAChBC,IAAAA,EAAM;YACJC,IAAAA,EAAM,MAAA;YACNC,WAAAA,EAAa,EAAA;YACbC,YAAAA,EAAc,MAAA;YACdC,UAAAA,EAAY,OAAA;YACZC,WAAAA,EAAa;AACjB,SAAA;QACEC,aAAAA,EAAe;YACb,iBAAA,EAAmB;gBACjBC,OAAAA,EAAS;AACf,aAAA;YACI,sBAAA,EAAwB;gBACtBA,OAAAA,EAAS;AACf;AACA,SAAA;QACEC,UAAAA,EAAY;YACVP,IAAAA,EAAM;gBACJQ,IAAAA,EAAM,QAAA;gBACNC,SAAAA,EAAW,CAAA;gBACXC,QAAAA,EAAU,IAAA;gBACVC,YAAAA,EAAc;AACpB,aAAA;YACIV,WAAAA,EAAa;gBACXO,IAAAA,EAAM,QAAA;gBACNG,YAAAA,EAAc;AACpB,aAAA;YACIH,IAAAA,EAAM;gBACJA,IAAAA,EAAM,QAAA;gBACNI,MAAAA,EAAQ,IAAA;gBACRD,YAAAA,EAAc;AACpB,aAAA;YACIE,WAAAA,EAAa;gBACXL,IAAAA,EAAM,UAAA;gBACNM,QAAAA,EAAU,WAAA;gBACVC,MAAAA,EAAQ,sCAAA;gBACRC,QAAAA,EAAU,MAAA;gBACVL,YAAAA,EAAc;AACpB,aAAA;YACIM,KAAAA,EAAO;gBACLT,IAAAA,EAAM,UAAA;gBACNM,QAAAA,EAAU,WAAA;gBACVC,MAAAA,EAAQ,gCAAA;gBACRC,QAAAA,EAAU,MAAA;gBACVL,YAAAA,EAAc;AACpB;AACA;AACA,KAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"index.mjs","sources":["../../../../server/content-types/role/index.js"],"sourcesContent":["'use strict';\n\nmodule.exports = {\n collectionName: 'up_roles',\n info: {\n name: 'role',\n description: '',\n singularName: 'role',\n pluralName: 'roles',\n displayName: 'Role',\n },\n pluginOptions: {\n 'content-manager': {\n visible: false,\n },\n 'content-type-builder': {\n visible: false,\n },\n },\n attributes: {\n name: {\n type: 'string',\n minLength: 3,\n required: true,\n configurable: false,\n },\n description: {\n type: 'string',\n configurable: false,\n },\n type: {\n type: 'string',\n unique: true,\n configurable: false,\n },\n permissions: {\n type: 'relation',\n relation: 'oneToMany',\n target: 'plugin::users-permissions.permission',\n mappedBy: 'role',\n configurable: false,\n },\n users: {\n type: 'relation',\n relation: 'oneToMany',\n target: 'plugin::users-permissions.user',\n mappedBy: 'role',\n configurable: false,\n },\n },\n};\n"],"names":["role","collectionName","info","name","description","singularName","pluralName","displayName","pluginOptions","visible","attributes","type","minLength","required","configurable","unique","permissions","relation","target","mappedBy","users"],"mappings":";;;;;IAEAA,IAAiB,GAAA;QACfC,cAAgB,EAAA,UAAA;QAChBC,IAAM,EAAA;YACJC,IAAM,EAAA,MAAA;YACNC,WAAa,EAAA,EAAA;YACbC,YAAc,EAAA,MAAA;YACdC,UAAY,EAAA,OAAA;YACZC,WAAa,EAAA;AACd,SAAA;QACDC,aAAe,EAAA;YACb,iBAAmB,EAAA;gBACjBC,OAAS,EAAA;AACV,aAAA;YACD,sBAAwB,EAAA;gBACtBA,OAAS,EAAA;AACV;AACF,SAAA;QACDC,UAAY,EAAA;YACVP,IAAM,EAAA;gBACJQ,IAAM,EAAA,QAAA;gBACNC,SAAW,EAAA,CAAA;gBACXC,QAAU,EAAA,IAAA;gBACVC,YAAc,EAAA;AACf,aAAA;YACDV,WAAa,EAAA;gBACXO,IAAM,EAAA,QAAA;gBACNG,YAAc,EAAA;AACf,aAAA;YACDH,IAAM,EAAA;gBACJA,IAAM,EAAA,QAAA;gBACNI,MAAQ,EAAA,IAAA;gBACRD,YAAc,EAAA;AACf,aAAA;YACDE,WAAa,EAAA;gBACXL,IAAM,EAAA,UAAA;gBACNM,QAAU,EAAA,WAAA;gBACVC,MAAQ,EAAA,sCAAA;gBACRC,QAAU,EAAA,MAAA;gBACVL,YAAc,EAAA;AACf,aAAA;YACDM,KAAO,EAAA;gBACLT,IAAM,EAAA,UAAA;gBACNM,QAAU,EAAA,WAAA;gBACVC,MAAQ,EAAA,gCAAA;gBACRC,QAAU,EAAA,MAAA;gBACVL,YAAc,EAAA;AACf;AACF;AACH,KAAA;;;;;;"}
1
+ {"version":3,"file":"index.mjs","sources":["../../../../server/content-types/role/index.js"],"sourcesContent":["'use strict';\n\nmodule.exports = {\n collectionName: 'up_roles',\n info: {\n name: 'role',\n description: '',\n singularName: 'role',\n pluralName: 'roles',\n displayName: 'Role',\n },\n pluginOptions: {\n 'content-manager': {\n visible: false,\n },\n 'content-type-builder': {\n visible: false,\n },\n },\n attributes: {\n name: {\n type: 'string',\n minLength: 3,\n required: true,\n configurable: false,\n },\n description: {\n type: 'string',\n configurable: false,\n },\n type: {\n type: 'string',\n unique: true,\n configurable: false,\n },\n permissions: {\n type: 'relation',\n relation: 'oneToMany',\n target: 'plugin::users-permissions.permission',\n mappedBy: 'role',\n configurable: false,\n },\n users: {\n type: 'relation',\n relation: 'oneToMany',\n target: 'plugin::users-permissions.user',\n mappedBy: 'role',\n configurable: false,\n },\n },\n};\n"],"names":["role","collectionName","info","name","description","singularName","pluralName","displayName","pluginOptions","visible","attributes","type","minLength","required","configurable","unique","permissions","relation","target","mappedBy","users"],"mappings":";;;;;IAEAA,IAAAA,GAAiB;QACfC,cAAAA,EAAgB,UAAA;QAChBC,IAAAA,EAAM;YACJC,IAAAA,EAAM,MAAA;YACNC,WAAAA,EAAa,EAAA;YACbC,YAAAA,EAAc,MAAA;YACdC,UAAAA,EAAY,OAAA;YACZC,WAAAA,EAAa;AACjB,SAAA;QACEC,aAAAA,EAAe;YACb,iBAAA,EAAmB;gBACjBC,OAAAA,EAAS;AACf,aAAA;YACI,sBAAA,EAAwB;gBACtBA,OAAAA,EAAS;AACf;AACA,SAAA;QACEC,UAAAA,EAAY;YACVP,IAAAA,EAAM;gBACJQ,IAAAA,EAAM,QAAA;gBACNC,SAAAA,EAAW,CAAA;gBACXC,QAAAA,EAAU,IAAA;gBACVC,YAAAA,EAAc;AACpB,aAAA;YACIV,WAAAA,EAAa;gBACXO,IAAAA,EAAM,QAAA;gBACNG,YAAAA,EAAc;AACpB,aAAA;YACIH,IAAAA,EAAM;gBACJA,IAAAA,EAAM,QAAA;gBACNI,MAAAA,EAAQ,IAAA;gBACRD,YAAAA,EAAc;AACpB,aAAA;YACIE,WAAAA,EAAa;gBACXL,IAAAA,EAAM,UAAA;gBACNM,QAAAA,EAAU,WAAA;gBACVC,MAAAA,EAAQ,sCAAA;gBACRC,QAAAA,EAAU,MAAA;gBACVL,YAAAA,EAAc;AACpB,aAAA;YACIM,KAAAA,EAAO;gBACLT,IAAAA,EAAM,UAAA;gBACNM,QAAAA,EAAU,WAAA;gBACVC,MAAAA,EAAQ,gCAAA;gBACRC,QAAAA,EAAU,MAAA;gBACVL,YAAAA,EAAc;AACpB;AACA;AACA,KAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"index.js","sources":["../../../../server/content-types/user/index.js"],"sourcesContent":["'use strict';\n\nconst schemaConfig = require('./schema-config');\n\nmodule.exports = {\n collectionName: 'up_users',\n info: {\n name: 'user',\n description: '',\n singularName: 'user',\n pluralName: 'users',\n displayName: 'User',\n },\n options: {\n timestamps: true,\n },\n attributes: {\n username: {\n type: 'string',\n minLength: 3,\n unique: true,\n configurable: false,\n required: true,\n },\n email: {\n type: 'email',\n minLength: 6,\n configurable: false,\n required: true,\n },\n provider: {\n type: 'string',\n configurable: false,\n },\n password: {\n type: 'password',\n minLength: 6,\n configurable: false,\n private: true,\n searchable: false,\n },\n resetPasswordToken: {\n type: 'string',\n configurable: false,\n private: true,\n searchable: false,\n },\n confirmationToken: {\n type: 'string',\n configurable: false,\n private: true,\n searchable: false,\n },\n confirmed: {\n type: 'boolean',\n default: false,\n configurable: false,\n },\n blocked: {\n type: 'boolean',\n default: false,\n configurable: false,\n },\n role: {\n type: 'relation',\n relation: 'manyToOne',\n target: 'plugin::users-permissions.role',\n inversedBy: 'users',\n configurable: false,\n },\n },\n\n config: schemaConfig, // TODO: to move to content-manager options\n};\n"],"names":["schemaConfig","require$$0","user","collectionName","info","name","description","singularName","pluralName","displayName","options","timestamps","attributes","username","type","minLength","unique","configurable","required","email","provider","password","private","searchable","resetPasswordToken","confirmationToken","confirmed","default","blocked","role","relation","target","inversedBy","config"],"mappings":";;;;;;;;;AAEA,IAAA,MAAMA,cAAeC,GAAAA,sBAAAA,EAAAA;IAErBC,IAAiB,GAAA;QACfC,cAAgB,EAAA,UAAA;QAChBC,IAAM,EAAA;YACJC,IAAM,EAAA,MAAA;YACNC,WAAa,EAAA,EAAA;YACbC,YAAc,EAAA,MAAA;YACdC,UAAY,EAAA,OAAA;YACZC,WAAa,EAAA;AACd,SAAA;QACDC,OAAS,EAAA;YACPC,UAAY,EAAA;AACb,SAAA;QACDC,UAAY,EAAA;YACVC,QAAU,EAAA;gBACRC,IAAM,EAAA,QAAA;gBACNC,SAAW,EAAA,CAAA;gBACXC,MAAQ,EAAA,IAAA;gBACRC,YAAc,EAAA,KAAA;gBACdC,QAAU,EAAA;AACX,aAAA;YACDC,KAAO,EAAA;gBACLL,IAAM,EAAA,OAAA;gBACNC,SAAW,EAAA,CAAA;gBACXE,YAAc,EAAA,KAAA;gBACdC,QAAU,EAAA;AACX,aAAA;YACDE,QAAU,EAAA;gBACRN,IAAM,EAAA,QAAA;gBACNG,YAAc,EAAA;AACf,aAAA;YACDI,QAAU,EAAA;gBACRP,IAAM,EAAA,UAAA;gBACNC,SAAW,EAAA,CAAA;gBACXE,YAAc,EAAA,KAAA;gBACdK,OAAS,EAAA,IAAA;gBACTC,UAAY,EAAA;AACb,aAAA;YACDC,kBAAoB,EAAA;gBAClBV,IAAM,EAAA,QAAA;gBACNG,YAAc,EAAA,KAAA;gBACdK,OAAS,EAAA,IAAA;gBACTC,UAAY,EAAA;AACb,aAAA;YACDE,iBAAmB,EAAA;gBACjBX,IAAM,EAAA,QAAA;gBACNG,YAAc,EAAA,KAAA;gBACdK,OAAS,EAAA,IAAA;gBACTC,UAAY,EAAA;AACb,aAAA;YACDG,SAAW,EAAA;gBACTZ,IAAM,EAAA,SAAA;gBACNa,OAAS,EAAA,KAAA;gBACTV,YAAc,EAAA;AACf,aAAA;YACDW,OAAS,EAAA;gBACPd,IAAM,EAAA,SAAA;gBACNa,OAAS,EAAA,KAAA;gBACTV,YAAc,EAAA;AACf,aAAA;YACDY,IAAM,EAAA;gBACJf,IAAM,EAAA,UAAA;gBACNgB,QAAU,EAAA,WAAA;gBACVC,MAAQ,EAAA,gCAAA;gBACRC,UAAY,EAAA,OAAA;gBACZf,YAAc,EAAA;AACf;AACF,SAAA;QAEDgB,MAAQjC,EAAAA;AACV,KAAA;;;;;;"}
1
+ {"version":3,"file":"index.js","sources":["../../../../server/content-types/user/index.js"],"sourcesContent":["'use strict';\n\nconst schemaConfig = require('./schema-config');\n\nmodule.exports = {\n collectionName: 'up_users',\n info: {\n name: 'user',\n description: '',\n singularName: 'user',\n pluralName: 'users',\n displayName: 'User',\n },\n options: {\n timestamps: true,\n },\n attributes: {\n username: {\n type: 'string',\n minLength: 3,\n unique: true,\n configurable: false,\n required: true,\n },\n email: {\n type: 'email',\n minLength: 6,\n configurable: false,\n required: true,\n },\n provider: {\n type: 'string',\n configurable: false,\n },\n password: {\n type: 'password',\n minLength: 6,\n configurable: false,\n private: true,\n searchable: false,\n },\n resetPasswordToken: {\n type: 'string',\n configurable: false,\n private: true,\n searchable: false,\n },\n confirmationToken: {\n type: 'string',\n configurable: false,\n private: true,\n searchable: false,\n },\n confirmed: {\n type: 'boolean',\n default: false,\n configurable: false,\n },\n blocked: {\n type: 'boolean',\n default: false,\n configurable: false,\n },\n role: {\n type: 'relation',\n relation: 'manyToOne',\n target: 'plugin::users-permissions.role',\n inversedBy: 'users',\n configurable: false,\n },\n },\n\n config: schemaConfig, // TODO: to move to content-manager options\n};\n"],"names":["schemaConfig","require$$0","user","collectionName","info","name","description","singularName","pluralName","displayName","options","timestamps","attributes","username","type","minLength","unique","configurable","required","email","provider","password","private","searchable","resetPasswordToken","confirmationToken","confirmed","default","blocked","role","relation","target","inversedBy","config"],"mappings":";;;;;;;;;AAEA,IAAA,MAAMA,cAAAA,GAAeC,sBAAAA,EAAAA;IAErBC,IAAAA,GAAiB;QACfC,cAAAA,EAAgB,UAAA;QAChBC,IAAAA,EAAM;YACJC,IAAAA,EAAM,MAAA;YACNC,WAAAA,EAAa,EAAA;YACbC,YAAAA,EAAc,MAAA;YACdC,UAAAA,EAAY,OAAA;YACZC,WAAAA,EAAa;AACjB,SAAA;QACEC,OAAAA,EAAS;YACPC,UAAAA,EAAY;AAChB,SAAA;QACEC,UAAAA,EAAY;YACVC,QAAAA,EAAU;gBACRC,IAAAA,EAAM,QAAA;gBACNC,SAAAA,EAAW,CAAA;gBACXC,MAAAA,EAAQ,IAAA;gBACRC,YAAAA,EAAc,KAAA;gBACdC,QAAAA,EAAU;AAChB,aAAA;YACIC,KAAAA,EAAO;gBACLL,IAAAA,EAAM,OAAA;gBACNC,SAAAA,EAAW,CAAA;gBACXE,YAAAA,EAAc,KAAA;gBACdC,QAAAA,EAAU;AAChB,aAAA;YACIE,QAAAA,EAAU;gBACRN,IAAAA,EAAM,QAAA;gBACNG,YAAAA,EAAc;AACpB,aAAA;YACII,QAAAA,EAAU;gBACRP,IAAAA,EAAM,UAAA;gBACNC,SAAAA,EAAW,CAAA;gBACXE,YAAAA,EAAc,KAAA;gBACdK,OAAAA,EAAS,IAAA;gBACTC,UAAAA,EAAY;AAClB,aAAA;YACIC,kBAAAA,EAAoB;gBAClBV,IAAAA,EAAM,QAAA;gBACNG,YAAAA,EAAc,KAAA;gBACdK,OAAAA,EAAS,IAAA;gBACTC,UAAAA,EAAY;AAClB,aAAA;YACIE,iBAAAA,EAAmB;gBACjBX,IAAAA,EAAM,QAAA;gBACNG,YAAAA,EAAc,KAAA;gBACdK,OAAAA,EAAS,IAAA;gBACTC,UAAAA,EAAY;AAClB,aAAA;YACIG,SAAAA,EAAW;gBACTZ,IAAAA,EAAM,SAAA;gBACNa,OAAAA,EAAS,KAAA;gBACTV,YAAAA,EAAc;AACpB,aAAA;YACIW,OAAAA,EAAS;gBACPd,IAAAA,EAAM,SAAA;gBACNa,OAAAA,EAAS,KAAA;gBACTV,YAAAA,EAAc;AACpB,aAAA;YACIY,IAAAA,EAAM;gBACJf,IAAAA,EAAM,UAAA;gBACNgB,QAAAA,EAAU,WAAA;gBACVC,MAAAA,EAAQ,gCAAA;gBACRC,UAAAA,EAAY,OAAA;gBACZf,YAAAA,EAAc;AACpB;AACA,SAAA;QAEEgB,MAAAA,EAAQjC;AACV,KAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"index.mjs","sources":["../../../../server/content-types/user/index.js"],"sourcesContent":["'use strict';\n\nconst schemaConfig = require('./schema-config');\n\nmodule.exports = {\n collectionName: 'up_users',\n info: {\n name: 'user',\n description: '',\n singularName: 'user',\n pluralName: 'users',\n displayName: 'User',\n },\n options: {\n timestamps: true,\n },\n attributes: {\n username: {\n type: 'string',\n minLength: 3,\n unique: true,\n configurable: false,\n required: true,\n },\n email: {\n type: 'email',\n minLength: 6,\n configurable: false,\n required: true,\n },\n provider: {\n type: 'string',\n configurable: false,\n },\n password: {\n type: 'password',\n minLength: 6,\n configurable: false,\n private: true,\n searchable: false,\n },\n resetPasswordToken: {\n type: 'string',\n configurable: false,\n private: true,\n searchable: false,\n },\n confirmationToken: {\n type: 'string',\n configurable: false,\n private: true,\n searchable: false,\n },\n confirmed: {\n type: 'boolean',\n default: false,\n configurable: false,\n },\n blocked: {\n type: 'boolean',\n default: false,\n configurable: false,\n },\n role: {\n type: 'relation',\n relation: 'manyToOne',\n target: 'plugin::users-permissions.role',\n inversedBy: 'users',\n configurable: false,\n },\n },\n\n config: schemaConfig, // TODO: to move to content-manager options\n};\n"],"names":["schemaConfig","require$$0","user","collectionName","info","name","description","singularName","pluralName","displayName","options","timestamps","attributes","username","type","minLength","unique","configurable","required","email","provider","password","private","searchable","resetPasswordToken","confirmationToken","confirmed","default","blocked","role","relation","target","inversedBy","config"],"mappings":";;;;;;;AAEA,IAAA,MAAMA,YAAeC,GAAAA,mBAAAA,EAAAA;IAErBC,IAAiB,GAAA;QACfC,cAAgB,EAAA,UAAA;QAChBC,IAAM,EAAA;YACJC,IAAM,EAAA,MAAA;YACNC,WAAa,EAAA,EAAA;YACbC,YAAc,EAAA,MAAA;YACdC,UAAY,EAAA,OAAA;YACZC,WAAa,EAAA;AACd,SAAA;QACDC,OAAS,EAAA;YACPC,UAAY,EAAA;AACb,SAAA;QACDC,UAAY,EAAA;YACVC,QAAU,EAAA;gBACRC,IAAM,EAAA,QAAA;gBACNC,SAAW,EAAA,CAAA;gBACXC,MAAQ,EAAA,IAAA;gBACRC,YAAc,EAAA,KAAA;gBACdC,QAAU,EAAA;AACX,aAAA;YACDC,KAAO,EAAA;gBACLL,IAAM,EAAA,OAAA;gBACNC,SAAW,EAAA,CAAA;gBACXE,YAAc,EAAA,KAAA;gBACdC,QAAU,EAAA;AACX,aAAA;YACDE,QAAU,EAAA;gBACRN,IAAM,EAAA,QAAA;gBACNG,YAAc,EAAA;AACf,aAAA;YACDI,QAAU,EAAA;gBACRP,IAAM,EAAA,UAAA;gBACNC,SAAW,EAAA,CAAA;gBACXE,YAAc,EAAA,KAAA;gBACdK,OAAS,EAAA,IAAA;gBACTC,UAAY,EAAA;AACb,aAAA;YACDC,kBAAoB,EAAA;gBAClBV,IAAM,EAAA,QAAA;gBACNG,YAAc,EAAA,KAAA;gBACdK,OAAS,EAAA,IAAA;gBACTC,UAAY,EAAA;AACb,aAAA;YACDE,iBAAmB,EAAA;gBACjBX,IAAM,EAAA,QAAA;gBACNG,YAAc,EAAA,KAAA;gBACdK,OAAS,EAAA,IAAA;gBACTC,UAAY,EAAA;AACb,aAAA;YACDG,SAAW,EAAA;gBACTZ,IAAM,EAAA,SAAA;gBACNa,OAAS,EAAA,KAAA;gBACTV,YAAc,EAAA;AACf,aAAA;YACDW,OAAS,EAAA;gBACPd,IAAM,EAAA,SAAA;gBACNa,OAAS,EAAA,KAAA;gBACTV,YAAc,EAAA;AACf,aAAA;YACDY,IAAM,EAAA;gBACJf,IAAM,EAAA,UAAA;gBACNgB,QAAU,EAAA,WAAA;gBACVC,MAAQ,EAAA,gCAAA;gBACRC,UAAY,EAAA,OAAA;gBACZf,YAAc,EAAA;AACf;AACF,SAAA;QAEDgB,MAAQjC,EAAAA;AACV,KAAA;;;;;;"}
1
+ {"version":3,"file":"index.mjs","sources":["../../../../server/content-types/user/index.js"],"sourcesContent":["'use strict';\n\nconst schemaConfig = require('./schema-config');\n\nmodule.exports = {\n collectionName: 'up_users',\n info: {\n name: 'user',\n description: '',\n singularName: 'user',\n pluralName: 'users',\n displayName: 'User',\n },\n options: {\n timestamps: true,\n },\n attributes: {\n username: {\n type: 'string',\n minLength: 3,\n unique: true,\n configurable: false,\n required: true,\n },\n email: {\n type: 'email',\n minLength: 6,\n configurable: false,\n required: true,\n },\n provider: {\n type: 'string',\n configurable: false,\n },\n password: {\n type: 'password',\n minLength: 6,\n configurable: false,\n private: true,\n searchable: false,\n },\n resetPasswordToken: {\n type: 'string',\n configurable: false,\n private: true,\n searchable: false,\n },\n confirmationToken: {\n type: 'string',\n configurable: false,\n private: true,\n searchable: false,\n },\n confirmed: {\n type: 'boolean',\n default: false,\n configurable: false,\n },\n blocked: {\n type: 'boolean',\n default: false,\n configurable: false,\n },\n role: {\n type: 'relation',\n relation: 'manyToOne',\n target: 'plugin::users-permissions.role',\n inversedBy: 'users',\n configurable: false,\n },\n },\n\n config: schemaConfig, // TODO: to move to content-manager options\n};\n"],"names":["schemaConfig","require$$0","user","collectionName","info","name","description","singularName","pluralName","displayName","options","timestamps","attributes","username","type","minLength","unique","configurable","required","email","provider","password","private","searchable","resetPasswordToken","confirmationToken","confirmed","default","blocked","role","relation","target","inversedBy","config"],"mappings":";;;;;;;AAEA,IAAA,MAAMA,YAAAA,GAAeC,mBAAAA,EAAAA;IAErBC,IAAAA,GAAiB;QACfC,cAAAA,EAAgB,UAAA;QAChBC,IAAAA,EAAM;YACJC,IAAAA,EAAM,MAAA;YACNC,WAAAA,EAAa,EAAA;YACbC,YAAAA,EAAc,MAAA;YACdC,UAAAA,EAAY,OAAA;YACZC,WAAAA,EAAa;AACjB,SAAA;QACEC,OAAAA,EAAS;YACPC,UAAAA,EAAY;AAChB,SAAA;QACEC,UAAAA,EAAY;YACVC,QAAAA,EAAU;gBACRC,IAAAA,EAAM,QAAA;gBACNC,SAAAA,EAAW,CAAA;gBACXC,MAAAA,EAAQ,IAAA;gBACRC,YAAAA,EAAc,KAAA;gBACdC,QAAAA,EAAU;AAChB,aAAA;YACIC,KAAAA,EAAO;gBACLL,IAAAA,EAAM,OAAA;gBACNC,SAAAA,EAAW,CAAA;gBACXE,YAAAA,EAAc,KAAA;gBACdC,QAAAA,EAAU;AAChB,aAAA;YACIE,QAAAA,EAAU;gBACRN,IAAAA,EAAM,QAAA;gBACNG,YAAAA,EAAc;AACpB,aAAA;YACII,QAAAA,EAAU;gBACRP,IAAAA,EAAM,UAAA;gBACNC,SAAAA,EAAW,CAAA;gBACXE,YAAAA,EAAc,KAAA;gBACdK,OAAAA,EAAS,IAAA;gBACTC,UAAAA,EAAY;AAClB,aAAA;YACIC,kBAAAA,EAAoB;gBAClBV,IAAAA,EAAM,QAAA;gBACNG,YAAAA,EAAc,KAAA;gBACdK,OAAAA,EAAS,IAAA;gBACTC,UAAAA,EAAY;AAClB,aAAA;YACIE,iBAAAA,EAAmB;gBACjBX,IAAAA,EAAM,QAAA;gBACNG,YAAAA,EAAc,KAAA;gBACdK,OAAAA,EAAS,IAAA;gBACTC,UAAAA,EAAY;AAClB,aAAA;YACIG,SAAAA,EAAW;gBACTZ,IAAAA,EAAM,SAAA;gBACNa,OAAAA,EAAS,KAAA;gBACTV,YAAAA,EAAc;AACpB,aAAA;YACIW,OAAAA,EAAS;gBACPd,IAAAA,EAAM,SAAA;gBACNa,OAAAA,EAAS,KAAA;gBACTV,YAAAA,EAAc;AACpB,aAAA;YACIY,IAAAA,EAAM;gBACJf,IAAAA,EAAM,UAAA;gBACNgB,QAAAA,EAAU,WAAA;gBACVC,MAAAA,EAAQ,gCAAA;gBACRC,UAAAA,EAAY,OAAA;gBACZf,YAAAA,EAAc;AACpB;AACA,SAAA;QAEEgB,MAAAA,EAAQjC;AACV,KAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"schema-config.js","sources":["../../../../server/content-types/user/schema-config.js"],"sourcesContent":["'use strict';\n\nmodule.exports = {\n attributes: {\n resetPasswordToken: {\n hidden: true,\n },\n confirmationToken: {\n hidden: true,\n },\n provider: {\n hidden: true,\n },\n },\n};\n"],"names":["schemaConfig","attributes","resetPasswordToken","hidden","confirmationToken","provider"],"mappings":";;;;;;;IAEAA,YAAiB,GAAA;QACfC,UAAY,EAAA;YACVC,kBAAoB,EAAA;gBAClBC,MAAQ,EAAA;AACT,aAAA;YACDC,iBAAmB,EAAA;gBACjBD,MAAQ,EAAA;AACT,aAAA;YACDE,QAAU,EAAA;gBACRF,MAAQ,EAAA;AACT;AACF;AACH,KAAA;;;;;;"}
1
+ {"version":3,"file":"schema-config.js","sources":["../../../../server/content-types/user/schema-config.js"],"sourcesContent":["'use strict';\n\nmodule.exports = {\n attributes: {\n resetPasswordToken: {\n hidden: true,\n },\n confirmationToken: {\n hidden: true,\n },\n provider: {\n hidden: true,\n },\n },\n};\n"],"names":["schemaConfig","attributes","resetPasswordToken","hidden","confirmationToken","provider"],"mappings":";;;;;;;IAEAA,YAAAA,GAAiB;QACfC,UAAAA,EAAY;YACVC,kBAAAA,EAAoB;gBAClBC,MAAAA,EAAQ;AACd,aAAA;YACIC,iBAAAA,EAAmB;gBACjBD,MAAAA,EAAQ;AACd,aAAA;YACIE,QAAAA,EAAU;gBACRF,MAAAA,EAAQ;AACd;AACA;AACA,KAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"schema-config.mjs","sources":["../../../../server/content-types/user/schema-config.js"],"sourcesContent":["'use strict';\n\nmodule.exports = {\n attributes: {\n resetPasswordToken: {\n hidden: true,\n },\n confirmationToken: {\n hidden: true,\n },\n provider: {\n hidden: true,\n },\n },\n};\n"],"names":["schemaConfig","attributes","resetPasswordToken","hidden","confirmationToken","provider"],"mappings":";;;;;IAEAA,YAAiB,GAAA;QACfC,UAAY,EAAA;YACVC,kBAAoB,EAAA;gBAClBC,MAAQ,EAAA;AACT,aAAA;YACDC,iBAAmB,EAAA;gBACjBD,MAAQ,EAAA;AACT,aAAA;YACDE,QAAU,EAAA;gBACRF,MAAQ,EAAA;AACT;AACF;AACH,KAAA;;;;;;"}
1
+ {"version":3,"file":"schema-config.mjs","sources":["../../../../server/content-types/user/schema-config.js"],"sourcesContent":["'use strict';\n\nmodule.exports = {\n attributes: {\n resetPasswordToken: {\n hidden: true,\n },\n confirmationToken: {\n hidden: true,\n },\n provider: {\n hidden: true,\n },\n },\n};\n"],"names":["schemaConfig","attributes","resetPasswordToken","hidden","confirmationToken","provider"],"mappings":";;;;;IAEAA,YAAAA,GAAiB;QACfC,UAAAA,EAAY;YACVC,kBAAAA,EAAoB;gBAClBC,MAAAA,EAAQ;AACd,aAAA;YACIC,iBAAAA,EAAmB;gBACjBD,MAAAA,EAAQ;AACd,aAAA;YACIE,QAAAA,EAAU;gBACRF,MAAAA,EAAQ;AACd;AACA;AACA,KAAA;;;;;;"}
@@ -1,8 +1,8 @@
1
1
  'use strict';
2
2
 
3
- var require$$0 = require('crypto');
3
+ var require$$0$2 = require('crypto');
4
4
  var require$$0$1 = require('lodash');
5
- var require$$0$2 = require('lodash/fp');
5
+ var require$$0 = require('lodash/fp');
6
6
  var require$$1 = require('@strapi/utils');
7
7
  var index = require('../utils/index.js');
8
8
  var auth$1 = require('./validation/auth.js');
@@ -17,9 +17,9 @@ function requireAuth() {
17
17
  * Auth.js controller
18
18
  *
19
19
  * @description: A set of functions called "actions" for managing `Auth`.
20
- */ /* eslint-disable no-useless-escape */ const crypto = require$$0;
20
+ */ /* eslint-disable no-useless-escape */ const crypto = require$$0$2;
21
21
  const _ = require$$0$1;
22
- const { concat, compact, isArray } = require$$0$2;
22
+ const { concat, compact, isArray } = require$$0;
23
23
  const utils = require$$1;
24
24
  const { getService } = index.__require();
25
25
  const { validateCallbackBody, validateRegisterBody, validateSendEmailConfirmationBody, validateForgotPasswordBody, validateResetPasswordBody, validateEmailConfirmationBody, validateChangePasswordBody } = auth$1.__require();