@strapi/plugin-users-permissions 5.37.1 → 5.38.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (253) hide show
  1. package/dist/admin/components/BoundRoute/getMethodColor.js.map +1 -1
  2. package/dist/admin/components/BoundRoute/getMethodColor.mjs.map +1 -1
  3. package/dist/admin/components/BoundRoute/index.js.map +1 -1
  4. package/dist/admin/components/BoundRoute/index.mjs +1 -1
  5. package/dist/admin/components/BoundRoute/index.mjs.map +1 -1
  6. package/dist/admin/components/FormModal/Input/index.js.map +1 -1
  7. package/dist/admin/components/FormModal/Input/index.mjs.map +1 -1
  8. package/dist/admin/components/FormModal/index.js.map +1 -1
  9. package/dist/admin/components/FormModal/index.mjs.map +1 -1
  10. package/dist/admin/components/Permissions/PermissionRow/CheckboxWrapper.js.map +1 -1
  11. package/dist/admin/components/Permissions/PermissionRow/CheckboxWrapper.mjs +1 -1
  12. package/dist/admin/components/Permissions/PermissionRow/CheckboxWrapper.mjs.map +1 -1
  13. package/dist/admin/components/Permissions/PermissionRow/SubCategory.js.map +1 -1
  14. package/dist/admin/components/Permissions/PermissionRow/SubCategory.mjs.map +1 -1
  15. package/dist/admin/components/Permissions/PermissionRow/index.js.map +1 -1
  16. package/dist/admin/components/Permissions/PermissionRow/index.mjs.map +1 -1
  17. package/dist/admin/components/Permissions/index.js.map +1 -1
  18. package/dist/admin/components/Permissions/index.mjs.map +1 -1
  19. package/dist/admin/components/Permissions/init.js.map +1 -1
  20. package/dist/admin/components/Permissions/init.mjs.map +1 -1
  21. package/dist/admin/components/Permissions/reducer.js.map +1 -1
  22. package/dist/admin/components/Permissions/reducer.mjs.map +1 -1
  23. package/dist/admin/components/Policies/index.js.map +1 -1
  24. package/dist/admin/components/Policies/index.mjs.map +1 -1
  25. package/dist/admin/components/UsersPermissions/index.js.map +1 -1
  26. package/dist/admin/components/UsersPermissions/index.mjs +5 -5
  27. package/dist/admin/components/UsersPermissions/index.mjs.map +1 -1
  28. package/dist/admin/components/UsersPermissions/init.js.map +1 -1
  29. package/dist/admin/components/UsersPermissions/init.mjs.map +1 -1
  30. package/dist/admin/components/UsersPermissions/reducer.js.map +1 -1
  31. package/dist/admin/components/UsersPermissions/reducer.mjs.map +1 -1
  32. package/dist/admin/constants.js.map +1 -1
  33. package/dist/admin/constants.mjs.map +1 -1
  34. package/dist/admin/contexts/UsersPermissionsContext/index.js.map +1 -1
  35. package/dist/admin/contexts/UsersPermissionsContext/index.mjs.map +1 -1
  36. package/dist/admin/index.js.map +1 -1
  37. package/dist/admin/index.mjs.map +1 -1
  38. package/dist/admin/package.json.js +1 -6
  39. package/dist/admin/package.json.js.map +1 -1
  40. package/dist/admin/package.json.mjs +1 -6
  41. package/dist/admin/package.json.mjs.map +1 -1
  42. package/dist/admin/pages/AdvancedSettings/index.js.map +1 -1
  43. package/dist/admin/pages/AdvancedSettings/index.mjs.map +1 -1
  44. package/dist/admin/pages/AdvancedSettings/utils/layout.js.map +1 -1
  45. package/dist/admin/pages/AdvancedSettings/utils/layout.mjs.map +1 -1
  46. package/dist/admin/pages/AdvancedSettings/utils/schema.js.map +1 -1
  47. package/dist/admin/pages/AdvancedSettings/utils/schema.mjs.map +1 -1
  48. package/dist/admin/pages/EmailTemplates/components/EmailForm.js.map +1 -1
  49. package/dist/admin/pages/EmailTemplates/components/EmailForm.mjs.map +1 -1
  50. package/dist/admin/pages/EmailTemplates/components/EmailTable.js.map +1 -1
  51. package/dist/admin/pages/EmailTemplates/components/EmailTable.mjs.map +1 -1
  52. package/dist/admin/pages/EmailTemplates/index.js.map +1 -1
  53. package/dist/admin/pages/EmailTemplates/index.mjs.map +1 -1
  54. package/dist/admin/pages/EmailTemplates/utils/schema.js.map +1 -1
  55. package/dist/admin/pages/EmailTemplates/utils/schema.mjs.map +1 -1
  56. package/dist/admin/pages/Providers/index.js.map +1 -1
  57. package/dist/admin/pages/Providers/index.mjs.map +1 -1
  58. package/dist/admin/pages/Providers/utils/forms.js.map +1 -1
  59. package/dist/admin/pages/Providers/utils/forms.mjs.map +1 -1
  60. package/dist/admin/pages/Roles/constants.js.map +1 -1
  61. package/dist/admin/pages/Roles/constants.mjs.map +1 -1
  62. package/dist/admin/pages/Roles/hooks/usePlugins.js.map +1 -1
  63. package/dist/admin/pages/Roles/hooks/usePlugins.mjs.map +1 -1
  64. package/dist/admin/pages/Roles/index.js.map +1 -1
  65. package/dist/admin/pages/Roles/index.mjs.map +1 -1
  66. package/dist/admin/pages/Roles/pages/CreatePage.js.map +1 -1
  67. package/dist/admin/pages/Roles/pages/CreatePage.mjs +1 -1
  68. package/dist/admin/pages/Roles/pages/CreatePage.mjs.map +1 -1
  69. package/dist/admin/pages/Roles/pages/EditPage.js.map +1 -1
  70. package/dist/admin/pages/Roles/pages/EditPage.mjs +1 -1
  71. package/dist/admin/pages/Roles/pages/EditPage.mjs.map +1 -1
  72. package/dist/admin/pages/Roles/pages/ListPage/components/TableBody.js.map +1 -1
  73. package/dist/admin/pages/Roles/pages/ListPage/components/TableBody.mjs +1 -1
  74. package/dist/admin/pages/Roles/pages/ListPage/components/TableBody.mjs.map +1 -1
  75. package/dist/admin/pages/Roles/pages/ListPage/index.js.map +1 -1
  76. package/dist/admin/pages/Roles/pages/ListPage/index.mjs.map +1 -1
  77. package/dist/admin/pluginId.js.map +1 -1
  78. package/dist/admin/pluginId.mjs.map +1 -1
  79. package/dist/admin/utils/cleanPermissions.js.map +1 -1
  80. package/dist/admin/utils/cleanPermissions.mjs.map +1 -1
  81. package/dist/admin/utils/formatPluginName.js.map +1 -1
  82. package/dist/admin/utils/formatPluginName.mjs.map +1 -1
  83. package/dist/admin/utils/getTrad.js.map +1 -1
  84. package/dist/admin/utils/getTrad.mjs.map +1 -1
  85. package/dist/admin/utils/prefixPluginTranslations.js.map +1 -1
  86. package/dist/admin/utils/prefixPluginTranslations.mjs.map +1 -1
  87. package/dist/server/bootstrap/index.js.map +1 -1
  88. package/dist/server/bootstrap/index.mjs.map +1 -1
  89. package/dist/server/bootstrap/users-permissions-actions.js.map +1 -1
  90. package/dist/server/bootstrap/users-permissions-actions.mjs.map +1 -1
  91. package/dist/server/config.js.map +1 -1
  92. package/dist/server/config.mjs.map +1 -1
  93. package/dist/server/content-types/index.js +4 -4
  94. package/dist/server/content-types/index.js.map +1 -1
  95. package/dist/server/content-types/index.mjs.map +1 -1
  96. package/dist/server/content-types/permission/index.js.map +1 -1
  97. package/dist/server/content-types/permission/index.mjs.map +1 -1
  98. package/dist/server/content-types/role/index.js.map +1 -1
  99. package/dist/server/content-types/role/index.mjs.map +1 -1
  100. package/dist/server/content-types/user/index.js.map +1 -1
  101. package/dist/server/content-types/user/index.mjs.map +1 -1
  102. package/dist/server/content-types/user/schema-config.js.map +1 -1
  103. package/dist/server/content-types/user/schema-config.mjs.map +1 -1
  104. package/dist/server/controllers/auth.js +4 -4
  105. package/dist/server/controllers/auth.js.map +1 -1
  106. package/dist/server/controllers/auth.mjs +4 -4
  107. package/dist/server/controllers/auth.mjs.map +1 -1
  108. package/dist/server/controllers/content-manager-user.js.map +1 -1
  109. package/dist/server/controllers/content-manager-user.mjs.map +1 -1
  110. package/dist/server/controllers/index.js.map +1 -1
  111. package/dist/server/controllers/index.mjs.map +1 -1
  112. package/dist/server/controllers/permissions.js.map +1 -1
  113. package/dist/server/controllers/permissions.mjs.map +1 -1
  114. package/dist/server/controllers/role.js.map +1 -1
  115. package/dist/server/controllers/role.mjs.map +1 -1
  116. package/dist/server/controllers/settings.js.map +1 -1
  117. package/dist/server/controllers/settings.mjs.map +1 -1
  118. package/dist/server/controllers/user.js.map +1 -1
  119. package/dist/server/controllers/user.mjs.map +1 -1
  120. package/dist/server/controllers/validation/auth.js.map +1 -1
  121. package/dist/server/controllers/validation/auth.mjs.map +1 -1
  122. package/dist/server/controllers/validation/email-template.js.map +1 -1
  123. package/dist/server/controllers/validation/email-template.mjs.map +1 -1
  124. package/dist/server/controllers/validation/user.js.map +1 -1
  125. package/dist/server/controllers/validation/user.mjs.map +1 -1
  126. package/dist/server/graphql/index.js.map +1 -1
  127. package/dist/server/graphql/index.mjs.map +1 -1
  128. package/dist/server/graphql/mutations/auth/change-password.js.map +1 -1
  129. package/dist/server/graphql/mutations/auth/change-password.mjs.map +1 -1
  130. package/dist/server/graphql/mutations/auth/email-confirmation.js.map +1 -1
  131. package/dist/server/graphql/mutations/auth/email-confirmation.mjs.map +1 -1
  132. package/dist/server/graphql/mutations/auth/forgot-password.js.map +1 -1
  133. package/dist/server/graphql/mutations/auth/forgot-password.mjs.map +1 -1
  134. package/dist/server/graphql/mutations/auth/login.js.map +1 -1
  135. package/dist/server/graphql/mutations/auth/login.mjs.map +1 -1
  136. package/dist/server/graphql/mutations/auth/register.js.map +1 -1
  137. package/dist/server/graphql/mutations/auth/register.mjs.map +1 -1
  138. package/dist/server/graphql/mutations/auth/reset-password.js.map +1 -1
  139. package/dist/server/graphql/mutations/auth/reset-password.mjs.map +1 -1
  140. package/dist/server/graphql/mutations/crud/role/create-role.js.map +1 -1
  141. package/dist/server/graphql/mutations/crud/role/create-role.mjs.map +1 -1
  142. package/dist/server/graphql/mutations/crud/role/delete-role.js.map +1 -1
  143. package/dist/server/graphql/mutations/crud/role/delete-role.mjs.map +1 -1
  144. package/dist/server/graphql/mutations/crud/role/update-role.js.map +1 -1
  145. package/dist/server/graphql/mutations/crud/role/update-role.mjs.map +1 -1
  146. package/dist/server/graphql/mutations/crud/user/create-user.js.map +1 -1
  147. package/dist/server/graphql/mutations/crud/user/create-user.mjs.map +1 -1
  148. package/dist/server/graphql/mutations/crud/user/delete-user.js.map +1 -1
  149. package/dist/server/graphql/mutations/crud/user/delete-user.mjs.map +1 -1
  150. package/dist/server/graphql/mutations/crud/user/update-user.js.map +1 -1
  151. package/dist/server/graphql/mutations/crud/user/update-user.mjs.map +1 -1
  152. package/dist/server/graphql/mutations/index.js.map +1 -1
  153. package/dist/server/graphql/mutations/index.mjs.map +1 -1
  154. package/dist/server/graphql/queries/index.js.map +1 -1
  155. package/dist/server/graphql/queries/index.mjs.map +1 -1
  156. package/dist/server/graphql/queries/me.js.map +1 -1
  157. package/dist/server/graphql/queries/me.mjs.map +1 -1
  158. package/dist/server/graphql/resolvers-configs.js.map +1 -1
  159. package/dist/server/graphql/resolvers-configs.mjs.map +1 -1
  160. package/dist/server/graphql/types/create-role-payload.js.map +1 -1
  161. package/dist/server/graphql/types/create-role-payload.mjs.map +1 -1
  162. package/dist/server/graphql/types/delete-role-payload.js.map +1 -1
  163. package/dist/server/graphql/types/delete-role-payload.mjs.map +1 -1
  164. package/dist/server/graphql/types/index.js.map +1 -1
  165. package/dist/server/graphql/types/index.mjs.map +1 -1
  166. package/dist/server/graphql/types/login-input.js.map +1 -1
  167. package/dist/server/graphql/types/login-input.mjs.map +1 -1
  168. package/dist/server/graphql/types/login-payload.js.map +1 -1
  169. package/dist/server/graphql/types/login-payload.mjs.map +1 -1
  170. package/dist/server/graphql/types/me-role.js.map +1 -1
  171. package/dist/server/graphql/types/me-role.mjs.map +1 -1
  172. package/dist/server/graphql/types/me.js.map +1 -1
  173. package/dist/server/graphql/types/me.mjs.map +1 -1
  174. package/dist/server/graphql/types/password-payload.js.map +1 -1
  175. package/dist/server/graphql/types/password-payload.mjs.map +1 -1
  176. package/dist/server/graphql/types/register-input.js.map +1 -1
  177. package/dist/server/graphql/types/register-input.mjs.map +1 -1
  178. package/dist/server/graphql/types/update-role-payload.js.map +1 -1
  179. package/dist/server/graphql/types/update-role-payload.mjs.map +1 -1
  180. package/dist/server/graphql/types/user-input.js.map +1 -1
  181. package/dist/server/graphql/types/user-input.mjs.map +1 -1
  182. package/dist/server/graphql/utils.js.map +1 -1
  183. package/dist/server/graphql/utils.mjs.map +1 -1
  184. package/dist/server/index.js.map +1 -1
  185. package/dist/server/index.mjs.map +1 -1
  186. package/dist/server/index2.js.map +1 -1
  187. package/dist/server/index2.mjs.map +1 -1
  188. package/dist/server/middlewares/index.js.map +1 -1
  189. package/dist/server/middlewares/index.mjs.map +1 -1
  190. package/dist/server/middlewares/rateLimit.js +4 -4
  191. package/dist/server/middlewares/rateLimit.js.map +1 -1
  192. package/dist/server/middlewares/rateLimit.mjs +4 -4
  193. package/dist/server/middlewares/rateLimit.mjs.map +1 -1
  194. package/dist/server/register.js.map +1 -1
  195. package/dist/server/register.mjs.map +1 -1
  196. package/dist/server/routes/admin/index.js.map +1 -1
  197. package/dist/server/routes/admin/index.mjs.map +1 -1
  198. package/dist/server/routes/admin/permissions.js.map +1 -1
  199. package/dist/server/routes/admin/permissions.mjs.map +1 -1
  200. package/dist/server/routes/admin/role.js.map +1 -1
  201. package/dist/server/routes/admin/role.mjs.map +1 -1
  202. package/dist/server/routes/admin/settings.js.map +1 -1
  203. package/dist/server/routes/admin/settings.mjs.map +1 -1
  204. package/dist/server/routes/content-api/auth.js.map +1 -1
  205. package/dist/server/routes/content-api/auth.mjs.map +1 -1
  206. package/dist/server/routes/content-api/index.js.map +1 -1
  207. package/dist/server/routes/content-api/index.mjs.map +1 -1
  208. package/dist/server/routes/content-api/permissions.js.map +1 -1
  209. package/dist/server/routes/content-api/permissions.mjs.map +1 -1
  210. package/dist/server/routes/content-api/role.js.map +1 -1
  211. package/dist/server/routes/content-api/role.mjs.map +1 -1
  212. package/dist/server/routes/content-api/user.js.map +1 -1
  213. package/dist/server/routes/content-api/user.mjs.map +1 -1
  214. package/dist/server/routes/content-api/validation.js.map +1 -1
  215. package/dist/server/routes/content-api/validation.mjs.map +1 -1
  216. package/dist/server/routes/index.js +4 -4
  217. package/dist/server/routes/index.js.map +1 -1
  218. package/dist/server/routes/index.mjs.map +1 -1
  219. package/dist/server/services/constants.js.map +1 -1
  220. package/dist/server/services/constants.mjs.map +1 -1
  221. package/dist/server/services/index.js.map +1 -1
  222. package/dist/server/services/index.mjs.map +1 -1
  223. package/dist/server/services/jwt.js.map +1 -1
  224. package/dist/server/services/jwt.mjs.map +1 -1
  225. package/dist/server/services/permission.js.map +1 -1
  226. package/dist/server/services/permission.mjs.map +1 -1
  227. package/dist/server/services/providers-registry.js.map +1 -1
  228. package/dist/server/services/providers-registry.mjs.map +1 -1
  229. package/dist/server/services/providers.js.map +1 -1
  230. package/dist/server/services/providers.mjs.map +1 -1
  231. package/dist/server/services/role.js.map +1 -1
  232. package/dist/server/services/role.mjs.map +1 -1
  233. package/dist/server/services/user.js +8 -8
  234. package/dist/server/services/user.js.map +1 -1
  235. package/dist/server/services/user.mjs +8 -8
  236. package/dist/server/services/user.mjs.map +1 -1
  237. package/dist/server/services/users-permissions.js +4 -4
  238. package/dist/server/services/users-permissions.js.map +1 -1
  239. package/dist/server/services/users-permissions.mjs +4 -4
  240. package/dist/server/services/users-permissions.mjs.map +1 -1
  241. package/dist/server/strategies/users-permissions.js.map +1 -1
  242. package/dist/server/strategies/users-permissions.mjs.map +1 -1
  243. package/dist/server/utils/index.js.map +1 -1
  244. package/dist/server/utils/index.mjs.map +1 -1
  245. package/dist/server/utils/sanitize/index.js.map +1 -1
  246. package/dist/server/utils/sanitize/index.mjs.map +1 -1
  247. package/dist/server/utils/sanitize/sanitizers.js.map +1 -1
  248. package/dist/server/utils/sanitize/sanitizers.mjs.map +1 -1
  249. package/dist/server/utils/sanitize/visitors/index.js.map +1 -1
  250. package/dist/server/utils/sanitize/visitors/index.mjs.map +1 -1
  251. package/dist/server/utils/sanitize/visitors/remove-user-relation-from-role-entities.js.map +1 -1
  252. package/dist/server/utils/sanitize/visitors/remove-user-relation-from-role-entities.mjs.map +1 -1
  253. package/package.json +12 -7
@@ -1 +1 @@
1
- {"version":3,"file":"email-template.mjs","sources":["../../../../server/controllers/validation/email-template.js"],"sourcesContent":["'use strict';\n\nconst { trim } = require('lodash/fp');\nconst {\n template: { createLooseInterpolationRegExp, createStrictInterpolationRegExp },\n} = require('@strapi/utils');\n\nconst invalidPatternsRegexes = [\n // Ignore \"evaluation\" patterns: <% ... %>\n /<%[^=]([\\s\\S]*?)%>/m,\n // Ignore basic string interpolations\n /\\${([^{}]*)}/m,\n];\n\nconst authorizedKeys = [\n 'URL',\n 'ADMIN_URL',\n 'SERVER_URL',\n 'CODE',\n 'USER',\n 'USER.email',\n 'USER.username',\n 'TOKEN',\n];\n\nconst matchAll = (pattern, src) => {\n const matches = [];\n let match;\n\n const regexPatternWithGlobal = RegExp(pattern, 'g');\n\n // eslint-disable-next-line no-cond-assign\n while ((match = regexPatternWithGlobal.exec(src))) {\n const [, group] = match;\n\n matches.push(trim(group));\n }\n\n return matches;\n};\n\nconst isValidEmailTemplate = (template) => {\n // Check for known invalid patterns\n for (const reg of invalidPatternsRegexes) {\n if (reg.test(template)) {\n return false;\n }\n }\n\n const interpolation = {\n // Strict interpolation pattern to match only valid groups\n strict: createStrictInterpolationRegExp(authorizedKeys),\n // Weak interpolation pattern to match as many group as possible.\n loose: createLooseInterpolationRegExp(),\n };\n\n // Compute both strict & loose matches\n const strictMatches = matchAll(interpolation.strict, template);\n const looseMatches = matchAll(interpolation.loose, template);\n\n // If we have more matches with the loose RegExp than with the strict one,\n // then it means that at least one of the interpolation group is invalid\n // Note: In the future, if we wanted to give more details for error formatting\n // purposes, we could return the difference between the two arrays\n if (looseMatches.length > strictMatches.length) {\n return false;\n }\n\n return true;\n};\n\nmodule.exports = {\n isValidEmailTemplate,\n};\n"],"names":["trim","require$$0","template","createLooseInterpolationRegExp","createStrictInterpolationRegExp","require$$1","invalidPatternsRegexes","authorizedKeys","matchAll","pattern","src","matches","match","regexPatternWithGlobal","RegExp","exec","group","push","isValidEmailTemplate","reg","test","interpolation","strict","loose","strictMatches","looseMatches","length","emailTemplate"],"mappings":";;;;;;;;IAEA,MAAM,EAAEA,IAAI,EAAE,GAAGC,UAAAA;IACjB,MAAM,EACJC,UAAU,EAAEC,8BAA8B,EAAEC,+BAA+B,EAAE,EAC9E,GAAGC,UAAAA;AAEJ,IAAA,MAAMC,sBAAyB,GAAA;;AAE7B,QAAA,qBAAA;;AAEA,QAAA;AACD,KAAA;AAED,IAAA,MAAMC,cAAiB,GAAA;AACrB,QAAA,KAAA;AACA,QAAA,WAAA;AACA,QAAA,YAAA;AACA,QAAA,MAAA;AACA,QAAA,MAAA;AACA,QAAA,YAAA;AACA,QAAA,eAAA;AACA,QAAA;AACD,KAAA;IAED,MAAMC,QAAAA,GAAW,CAACC,OAASC,EAAAA,GAAAA,GAAAA;AACzB,QAAA,MAAMC,UAAU,EAAE;QAClB,IAAIC,KAAAA;QAEJ,MAAMC,sBAAAA,GAAyBC,OAAOL,OAAS,EAAA,GAAA,CAAA;;AAG/C,QAAA,MAAQG,KAAQC,GAAAA,sBAAAA,CAAuBE,IAAI,CAACL,GAAO,CAAA,CAAA;YACjD,MAAM,GAAGM,MAAM,GAAGJ,KAAAA;YAElBD,OAAQM,CAAAA,IAAI,CAACjB,IAAKgB,CAAAA,KAAAA,CAAAA,CAAAA;AACnB;QAED,OAAOL,OAAAA;AACT,KAAA;AAEA,IAAA,MAAMO,uBAAuB,CAAChB,QAAAA,GAAAA;;QAE5B,KAAK,MAAMiB,OAAOb,sBAAwB,CAAA;YACxC,IAAIa,GAAAA,CAAIC,IAAI,CAAClB,QAAW,CAAA,EAAA;gBACtB,OAAO,KAAA;AACR;AACF;AAED,QAAA,MAAMmB,aAAgB,GAAA;;AAEpBC,YAAAA,MAAAA,EAAQlB,+BAAgCG,CAAAA,cAAAA,CAAAA;;YAExCgB,KAAOpB,EAAAA,8BAAAA;AACX,SAAA;;AAGE,QAAA,MAAMqB,aAAgBhB,GAAAA,QAAAA,CAASa,aAAcC,CAAAA,MAAM,EAAEpB,QAAAA,CAAAA;AACrD,QAAA,MAAMuB,YAAejB,GAAAA,QAAAA,CAASa,aAAcE,CAAAA,KAAK,EAAErB,QAAAA,CAAAA;;;;;AAMnD,QAAA,IAAIuB,YAAaC,CAAAA,MAAM,GAAGF,aAAAA,CAAcE,MAAM,EAAE;YAC9C,OAAO,KAAA;AACR;QAED,OAAO,IAAA;AACT,KAAA;IAEAC,aAAiB,GAAA;AACfT,QAAAA;AACF,KAAA;;;;;;"}
1
+ {"version":3,"file":"email-template.mjs","sources":["../../../../server/controllers/validation/email-template.js"],"sourcesContent":["'use strict';\n\nconst { trim } = require('lodash/fp');\nconst {\n template: { createLooseInterpolationRegExp, createStrictInterpolationRegExp },\n} = require('@strapi/utils');\n\nconst invalidPatternsRegexes = [\n // Ignore \"evaluation\" patterns: <% ... %>\n /<%[^=]([\\s\\S]*?)%>/m,\n // Ignore basic string interpolations\n /\\${([^{}]*)}/m,\n];\n\nconst authorizedKeys = [\n 'URL',\n 'ADMIN_URL',\n 'SERVER_URL',\n 'CODE',\n 'USER',\n 'USER.email',\n 'USER.username',\n 'TOKEN',\n];\n\nconst matchAll = (pattern, src) => {\n const matches = [];\n let match;\n\n const regexPatternWithGlobal = RegExp(pattern, 'g');\n\n // eslint-disable-next-line no-cond-assign\n while ((match = regexPatternWithGlobal.exec(src))) {\n const [, group] = match;\n\n matches.push(trim(group));\n }\n\n return matches;\n};\n\nconst isValidEmailTemplate = (template) => {\n // Check for known invalid patterns\n for (const reg of invalidPatternsRegexes) {\n if (reg.test(template)) {\n return false;\n }\n }\n\n const interpolation = {\n // Strict interpolation pattern to match only valid groups\n strict: createStrictInterpolationRegExp(authorizedKeys),\n // Weak interpolation pattern to match as many group as possible.\n loose: createLooseInterpolationRegExp(),\n };\n\n // Compute both strict & loose matches\n const strictMatches = matchAll(interpolation.strict, template);\n const looseMatches = matchAll(interpolation.loose, template);\n\n // If we have more matches with the loose RegExp than with the strict one,\n // then it means that at least one of the interpolation group is invalid\n // Note: In the future, if we wanted to give more details for error formatting\n // purposes, we could return the difference between the two arrays\n if (looseMatches.length > strictMatches.length) {\n return false;\n }\n\n return true;\n};\n\nmodule.exports = {\n isValidEmailTemplate,\n};\n"],"names":["trim","require$$0","template","createLooseInterpolationRegExp","createStrictInterpolationRegExp","require$$1","invalidPatternsRegexes","authorizedKeys","matchAll","pattern","src","matches","match","regexPatternWithGlobal","RegExp","exec","group","push","isValidEmailTemplate","reg","test","interpolation","strict","loose","strictMatches","looseMatches","length","emailTemplate"],"mappings":";;;;;;;;IAEA,MAAM,EAAEA,IAAI,EAAE,GAAGC,UAAAA;IACjB,MAAM,EACJC,UAAU,EAAEC,8BAA8B,EAAEC,+BAA+B,EAAE,EAC9E,GAAGC,UAAAA;AAEJ,IAAA,MAAMC,sBAAAA,GAAyB;;AAE7B,QAAA,qBAAA;;AAEA,QAAA;AACD,KAAA;AAED,IAAA,MAAMC,cAAAA,GAAiB;AACrB,QAAA,KAAA;AACA,QAAA,WAAA;AACA,QAAA,YAAA;AACA,QAAA,MAAA;AACA,QAAA,MAAA;AACA,QAAA,YAAA;AACA,QAAA,eAAA;AACA,QAAA;AACD,KAAA;IAED,MAAMC,QAAAA,GAAW,CAACC,OAAAA,EAASC,GAAAA,GAAAA;AACzB,QAAA,MAAMC,UAAU,EAAE;QAClB,IAAIC,KAAAA;QAEJ,MAAMC,sBAAAA,GAAyBC,OAAOL,OAAAA,EAAS,GAAA,CAAA;;AAG/C,QAAA,MAAQG,KAAAA,GAAQC,sBAAAA,CAAuBE,IAAI,CAACL,GAAAA,CAAAA,CAAO;YACjD,MAAM,GAAGM,MAAM,GAAGJ,KAAAA;YAElBD,OAAAA,CAAQM,IAAI,CAACjB,IAAAA,CAAKgB,KAAAA,CAAAA,CAAAA;AACtB,QAAA;QAEE,OAAOL,OAAAA;AACT,IAAA,CAAA;AAEA,IAAA,MAAMO,uBAAuB,CAAChB,QAAAA,GAAAA;;QAE5B,KAAK,MAAMiB,OAAOb,sBAAAA,CAAwB;YACxC,IAAIa,GAAAA,CAAIC,IAAI,CAAClB,QAAAA,CAAAA,EAAW;gBACtB,OAAO,KAAA;AACb,YAAA;AACA,QAAA;AAEE,QAAA,MAAMmB,aAAAA,GAAgB;;AAEpBC,YAAAA,MAAAA,EAAQlB,+BAAAA,CAAgCG,cAAAA,CAAAA;;YAExCgB,KAAAA,EAAOpB,8BAAAA;AACX,SAAA;;AAGE,QAAA,MAAMqB,aAAAA,GAAgBhB,QAAAA,CAASa,aAAAA,CAAcC,MAAM,EAAEpB,QAAAA,CAAAA;AACrD,QAAA,MAAMuB,YAAAA,GAAejB,QAAAA,CAASa,aAAAA,CAAcE,KAAK,EAAErB,QAAAA,CAAAA;;;;;AAMnD,QAAA,IAAIuB,YAAAA,CAAaC,MAAM,GAAGF,aAAAA,CAAcE,MAAM,EAAE;YAC9C,OAAO,KAAA;AACX,QAAA;QAEE,OAAO,IAAA;AACT,IAAA,CAAA;IAEAC,aAAAA,GAAiB;AACfT,QAAAA;AACF,KAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"user.js","sources":["../../../../server/controllers/validation/user.js"],"sourcesContent":["'use strict';\n\nconst { yup, validateYupSchema } = require('@strapi/utils');\n\nconst deleteRoleSchema = yup.object().shape({\n role: yup.strapiID().required(),\n});\n\nconst createUserBodySchema = yup.object().shape({\n email: yup.string().email().required(),\n username: yup.string().min(1).required(),\n password: yup.string().min(1).required(),\n role: yup.lazy((value) =>\n typeof value === 'object'\n ? yup\n .object()\n .shape({\n connect: yup\n .array()\n .of(yup.object().shape({ id: yup.strapiID().required() }))\n .min(1, 'Users must have a role')\n .required(),\n })\n .required()\n : yup.strapiID().required()\n ),\n});\n\nconst updateUserBodySchema = yup.object().shape({\n email: yup.string().email().min(1),\n username: yup.string().min(1),\n password: yup\n .mixed()\n .test(\n 'password-validation',\n 'Password must be at least 1 character',\n function validatePassword(value) {\n if (value == null || value === '') {\n return true;\n }\n return typeof value === 'string' && value.length >= 1;\n }\n ),\n role: yup.lazy((value) =>\n typeof value === 'object'\n ? yup.object().shape({\n connect: yup\n .array()\n .of(yup.object().shape({ id: yup.strapiID().required() }))\n .required(),\n disconnect: yup\n .array()\n .test('CheckDisconnect', 'Cannot remove role', function test(disconnectValue) {\n if (value.connect.length === 0 && disconnectValue.length > 0) {\n return false;\n }\n\n return true;\n })\n .required(),\n })\n : yup.strapiID()\n ),\n});\n\nmodule.exports = {\n validateCreateUserBody: validateYupSchema(createUserBodySchema),\n validateUpdateUserBody: validateYupSchema(updateUserBodySchema),\n validateDeleteRoleBody: validateYupSchema(deleteRoleSchema),\n};\n"],"names":["yup","validateYupSchema","require$$0","deleteRoleSchema","object","shape","role","strapiID","required","createUserBodySchema","email","string","username","min","password","lazy","value","connect","array","of","id","updateUserBodySchema","mixed","test","validatePassword","length","disconnect","disconnectValue","user","validateCreateUserBody","validateUpdateUserBody","validateDeleteRoleBody"],"mappings":";;;;;;;;;AAEA,IAAA,MAAM,EAAEA,GAAG,EAAEC,iBAAiB,EAAE,GAAGC,UAAAA;AAEnC,IAAA,MAAMC,gBAAmBH,GAAAA,GAAAA,CAAII,MAAM,EAAA,CAAGC,KAAK,CAAC;QAC1CC,IAAMN,EAAAA,GAAAA,CAAIO,QAAQ,EAAA,CAAGC,QAAQ;AAC/B,KAAA,CAAA;AAEA,IAAA,MAAMC,oBAAuBT,GAAAA,GAAAA,CAAII,MAAM,EAAA,CAAGC,KAAK,CAAC;AAC9CK,QAAAA,KAAAA,EAAOV,GAAIW,CAAAA,MAAM,EAAGD,CAAAA,KAAK,GAAGF,QAAQ,EAAA;AACpCI,QAAAA,QAAAA,EAAUZ,IAAIW,MAAM,EAAA,CAAGE,GAAG,CAAC,GAAGL,QAAQ,EAAA;AACtCM,QAAAA,QAAAA,EAAUd,IAAIW,MAAM,EAAA,CAAGE,GAAG,CAAC,GAAGL,QAAQ,EAAA;AACtCF,QAAAA,IAAAA,EAAMN,GAAIe,CAAAA,IAAI,CAAC,CAACC,KACd,GAAA,OAAOA,KAAU,KAAA,QAAA,GACbhB,GACGI,CAAAA,MAAM,EACNC,CAAAA,KAAK,CAAC;gBACLY,OAASjB,EAAAA,GAAAA,CACNkB,KAAK,EACLC,CAAAA,EAAE,CAACnB,GAAII,CAAAA,MAAM,EAAGC,CAAAA,KAAK,CAAC;oBAAEe,EAAIpB,EAAAA,GAAAA,CAAIO,QAAQ,EAAA,CAAGC,QAAQ;AAAI,iBAAA,CAAA,CAAA,CACvDK,GAAG,CAAC,CAAG,EAAA,wBAAA,CAAA,CACPL,QAAQ;AACvB,aAAA,CAAA,CACWA,QAAQ,EAAA,GACXR,GAAIO,CAAAA,QAAQ,GAAGC,QAAQ,EAAA;AAE/B,KAAA,CAAA;AAEA,IAAA,MAAMa,oBAAuBrB,GAAAA,GAAAA,CAAII,MAAM,EAAA,CAAGC,KAAK,CAAC;AAC9CK,QAAAA,KAAAA,EAAOV,IAAIW,MAAM,EAAA,CAAGD,KAAK,EAAA,CAAGG,GAAG,CAAC,CAAA,CAAA;AAChCD,QAAAA,QAAAA,EAAUZ,GAAIW,CAAAA,MAAM,EAAGE,CAAAA,GAAG,CAAC,CAAA,CAAA;QAC3BC,QAAUd,EAAAA,GAAAA,CACPsB,KAAK,EACLC,CAAAA,IAAI,CACH,qBACA,EAAA,uCAAA,EACA,SAASC,gBAAAA,CAAiBR,KAAK,EAAA;YAC7B,IAAIA,KAAAA,IAAS,IAAQA,IAAAA,KAAAA,KAAU,EAAI,EAAA;gBACjC,OAAO,IAAA;AACR;AACD,YAAA,OAAO,OAAOA,KAAAA,KAAU,QAAYA,IAAAA,KAAAA,CAAMS,MAAM,IAAI,CAAA;AACrD,SAAA,CAAA;AAELnB,QAAAA,IAAAA,EAAMN,GAAIe,CAAAA,IAAI,CAAC,CAACC,KACd,GAAA,OAAOA,KAAU,KAAA,QAAA,GACbhB,GAAII,CAAAA,MAAM,EAAGC,CAAAA,KAAK,CAAC;gBACjBY,OAASjB,EAAAA,GAAAA,CACNkB,KAAK,EACLC,CAAAA,EAAE,CAACnB,GAAII,CAAAA,MAAM,EAAGC,CAAAA,KAAK,CAAC;oBAAEe,EAAIpB,EAAAA,GAAAA,CAAIO,QAAQ,EAAA,CAAGC,QAAQ;AAAI,iBAAA,CAAA,CAAA,CACvDA,QAAQ,EAAA;gBACXkB,UAAY1B,EAAAA,GAAAA,CACTkB,KAAK,EACLK,CAAAA,IAAI,CAAC,iBAAmB,EAAA,oBAAA,EAAsB,SAASA,IAAAA,CAAKI,eAAe,EAAA;oBAC1E,IAAIX,KAAAA,CAAMC,OAAO,CAACQ,MAAM,KAAK,CAAKE,IAAAA,eAAAA,CAAgBF,MAAM,GAAG,CAAG,EAAA;wBAC5D,OAAO,KAAA;AACR;oBAED,OAAO,IAAA;AACrB,iBAAA,CAAA,CACajB,QAAQ;AACrB,aAAA,CAAA,GACQR,IAAIO,QAAQ,EAAA;AAEpB,KAAA,CAAA;IAEAqB,IAAiB,GAAA;AACfC,QAAAA,sBAAAA,EAAwB5B,iBAAkBQ,CAAAA,oBAAAA,CAAAA;AAC1CqB,QAAAA,sBAAAA,EAAwB7B,iBAAkBoB,CAAAA,oBAAAA,CAAAA;AAC1CU,QAAAA,sBAAAA,EAAwB9B,iBAAkBE,CAAAA,gBAAAA;AAC5C,KAAA;;;;;;"}
1
+ {"version":3,"file":"user.js","sources":["../../../../server/controllers/validation/user.js"],"sourcesContent":["'use strict';\n\nconst { yup, validateYupSchema } = require('@strapi/utils');\n\nconst deleteRoleSchema = yup.object().shape({\n role: yup.strapiID().required(),\n});\n\nconst createUserBodySchema = yup.object().shape({\n email: yup.string().email().required(),\n username: yup.string().min(1).required(),\n password: yup.string().min(1).required(),\n role: yup.lazy((value) =>\n typeof value === 'object'\n ? yup\n .object()\n .shape({\n connect: yup\n .array()\n .of(yup.object().shape({ id: yup.strapiID().required() }))\n .min(1, 'Users must have a role')\n .required(),\n })\n .required()\n : yup.strapiID().required()\n ),\n});\n\nconst updateUserBodySchema = yup.object().shape({\n email: yup.string().email().min(1),\n username: yup.string().min(1),\n password: yup\n .mixed()\n .test(\n 'password-validation',\n 'Password must be at least 1 character',\n function validatePassword(value) {\n if (value == null || value === '') {\n return true;\n }\n return typeof value === 'string' && value.length >= 1;\n }\n ),\n role: yup.lazy((value) =>\n typeof value === 'object'\n ? yup.object().shape({\n connect: yup\n .array()\n .of(yup.object().shape({ id: yup.strapiID().required() }))\n .required(),\n disconnect: yup\n .array()\n .test('CheckDisconnect', 'Cannot remove role', function test(disconnectValue) {\n if (value.connect.length === 0 && disconnectValue.length > 0) {\n return false;\n }\n\n return true;\n })\n .required(),\n })\n : yup.strapiID()\n ),\n});\n\nmodule.exports = {\n validateCreateUserBody: validateYupSchema(createUserBodySchema),\n validateUpdateUserBody: validateYupSchema(updateUserBodySchema),\n validateDeleteRoleBody: validateYupSchema(deleteRoleSchema),\n};\n"],"names":["yup","validateYupSchema","require$$0","deleteRoleSchema","object","shape","role","strapiID","required","createUserBodySchema","email","string","username","min","password","lazy","value","connect","array","of","id","updateUserBodySchema","mixed","test","validatePassword","length","disconnect","disconnectValue","user","validateCreateUserBody","validateUpdateUserBody","validateDeleteRoleBody"],"mappings":";;;;;;;;;AAEA,IAAA,MAAM,EAAEA,GAAG,EAAEC,iBAAiB,EAAE,GAAGC,UAAAA;AAEnC,IAAA,MAAMC,gBAAAA,GAAmBH,GAAAA,CAAII,MAAM,EAAA,CAAGC,KAAK,CAAC;QAC1CC,IAAAA,EAAMN,GAAAA,CAAIO,QAAQ,EAAA,CAAGC,QAAQ;AAC/B,KAAA,CAAA;AAEA,IAAA,MAAMC,oBAAAA,GAAuBT,GAAAA,CAAII,MAAM,EAAA,CAAGC,KAAK,CAAC;AAC9CK,QAAAA,KAAAA,EAAOV,GAAAA,CAAIW,MAAM,EAAA,CAAGD,KAAK,GAAGF,QAAQ,EAAA;AACpCI,QAAAA,QAAAA,EAAUZ,IAAIW,MAAM,EAAA,CAAGE,GAAG,CAAC,GAAGL,QAAQ,EAAA;AACtCM,QAAAA,QAAAA,EAAUd,IAAIW,MAAM,EAAA,CAAGE,GAAG,CAAC,GAAGL,QAAQ,EAAA;AACtCF,QAAAA,IAAAA,EAAMN,GAAAA,CAAIe,IAAI,CAAC,CAACC,KAAAA,GACd,OAAOA,KAAAA,KAAU,QAAA,GACbhB,GAAAA,CACGI,MAAM,EAAA,CACNC,KAAK,CAAC;gBACLY,OAAAA,EAASjB,GAAAA,CACNkB,KAAK,EAAA,CACLC,EAAE,CAACnB,GAAAA,CAAII,MAAM,EAAA,CAAGC,KAAK,CAAC;oBAAEe,EAAAA,EAAIpB,GAAAA,CAAIO,QAAQ,EAAA,CAAGC,QAAQ;AAAE,iBAAA,CAAA,CAAA,CACrDK,GAAG,CAAC,CAAA,EAAG,wBAAA,CAAA,CACPL,QAAQ;AACvB,aAAA,CAAA,CACWA,QAAQ,EAAA,GACXR,GAAAA,CAAIO,QAAQ,GAAGC,QAAQ,EAAA;AAE/B,KAAA,CAAA;AAEA,IAAA,MAAMa,oBAAAA,GAAuBrB,GAAAA,CAAII,MAAM,EAAA,CAAGC,KAAK,CAAC;AAC9CK,QAAAA,KAAAA,EAAOV,IAAIW,MAAM,EAAA,CAAGD,KAAK,EAAA,CAAGG,GAAG,CAAC,CAAA,CAAA;AAChCD,QAAAA,QAAAA,EAAUZ,GAAAA,CAAIW,MAAM,EAAA,CAAGE,GAAG,CAAC,CAAA,CAAA;QAC3BC,QAAAA,EAAUd,GAAAA,CACPsB,KAAK,EAAA,CACLC,IAAI,CACH,qBAAA,EACA,uCAAA,EACA,SAASC,gBAAAA,CAAiBR,KAAK,EAAA;YAC7B,IAAIA,KAAAA,IAAS,IAAA,IAAQA,KAAAA,KAAU,EAAA,EAAI;gBACjC,OAAO,IAAA;AACjB,YAAA;AACQ,YAAA,OAAO,OAAOA,KAAAA,KAAU,QAAA,IAAYA,KAAAA,CAAMS,MAAM,IAAI,CAAA;AAC5D,QAAA,CAAA,CAAA;AAEEnB,QAAAA,IAAAA,EAAMN,GAAAA,CAAIe,IAAI,CAAC,CAACC,KAAAA,GACd,OAAOA,KAAAA,KAAU,QAAA,GACbhB,GAAAA,CAAII,MAAM,EAAA,CAAGC,KAAK,CAAC;gBACjBY,OAAAA,EAASjB,GAAAA,CACNkB,KAAK,EAAA,CACLC,EAAE,CAACnB,GAAAA,CAAII,MAAM,EAAA,CAAGC,KAAK,CAAC;oBAAEe,EAAAA,EAAIpB,GAAAA,CAAIO,QAAQ,EAAA,CAAGC,QAAQ;AAAE,iBAAA,CAAA,CAAA,CACrDA,QAAQ,EAAA;gBACXkB,UAAAA,EAAY1B,GAAAA,CACTkB,KAAK,EAAA,CACLK,IAAI,CAAC,iBAAA,EAAmB,oBAAA,EAAsB,SAASA,IAAAA,CAAKI,eAAe,EAAA;oBAC1E,IAAIX,KAAAA,CAAMC,OAAO,CAACQ,MAAM,KAAK,CAAA,IAAKE,eAAAA,CAAgBF,MAAM,GAAG,CAAA,EAAG;wBAC5D,OAAO,KAAA;AACvB,oBAAA;oBAEc,OAAO,IAAA;AACrB,gBAAA,CAAA,CAAA,CACajB,QAAQ;AACrB,aAAA,CAAA,GACQR,IAAIO,QAAQ,EAAA;AAEpB,KAAA,CAAA;IAEAqB,IAAAA,GAAiB;AACfC,QAAAA,sBAAAA,EAAwB5B,iBAAAA,CAAkBQ,oBAAAA,CAAAA;AAC1CqB,QAAAA,sBAAAA,EAAwB7B,iBAAAA,CAAkBoB,oBAAAA,CAAAA;AAC1CU,QAAAA,sBAAAA,EAAwB9B,iBAAAA,CAAkBE,gBAAAA;AAC5C,KAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"user.mjs","sources":["../../../../server/controllers/validation/user.js"],"sourcesContent":["'use strict';\n\nconst { yup, validateYupSchema } = require('@strapi/utils');\n\nconst deleteRoleSchema = yup.object().shape({\n role: yup.strapiID().required(),\n});\n\nconst createUserBodySchema = yup.object().shape({\n email: yup.string().email().required(),\n username: yup.string().min(1).required(),\n password: yup.string().min(1).required(),\n role: yup.lazy((value) =>\n typeof value === 'object'\n ? yup\n .object()\n .shape({\n connect: yup\n .array()\n .of(yup.object().shape({ id: yup.strapiID().required() }))\n .min(1, 'Users must have a role')\n .required(),\n })\n .required()\n : yup.strapiID().required()\n ),\n});\n\nconst updateUserBodySchema = yup.object().shape({\n email: yup.string().email().min(1),\n username: yup.string().min(1),\n password: yup\n .mixed()\n .test(\n 'password-validation',\n 'Password must be at least 1 character',\n function validatePassword(value) {\n if (value == null || value === '') {\n return true;\n }\n return typeof value === 'string' && value.length >= 1;\n }\n ),\n role: yup.lazy((value) =>\n typeof value === 'object'\n ? yup.object().shape({\n connect: yup\n .array()\n .of(yup.object().shape({ id: yup.strapiID().required() }))\n .required(),\n disconnect: yup\n .array()\n .test('CheckDisconnect', 'Cannot remove role', function test(disconnectValue) {\n if (value.connect.length === 0 && disconnectValue.length > 0) {\n return false;\n }\n\n return true;\n })\n .required(),\n })\n : yup.strapiID()\n ),\n});\n\nmodule.exports = {\n validateCreateUserBody: validateYupSchema(createUserBodySchema),\n validateUpdateUserBody: validateYupSchema(updateUserBodySchema),\n validateDeleteRoleBody: validateYupSchema(deleteRoleSchema),\n};\n"],"names":["yup","validateYupSchema","require$$0","deleteRoleSchema","object","shape","role","strapiID","required","createUserBodySchema","email","string","username","min","password","lazy","value","connect","array","of","id","updateUserBodySchema","mixed","test","validatePassword","length","disconnect","disconnectValue","user","validateCreateUserBody","validateUpdateUserBody","validateDeleteRoleBody"],"mappings":";;;;;;;AAEA,IAAA,MAAM,EAAEA,GAAG,EAAEC,iBAAiB,EAAE,GAAGC,UAAAA;AAEnC,IAAA,MAAMC,gBAAmBH,GAAAA,GAAAA,CAAII,MAAM,EAAA,CAAGC,KAAK,CAAC;QAC1CC,IAAMN,EAAAA,GAAAA,CAAIO,QAAQ,EAAA,CAAGC,QAAQ;AAC/B,KAAA,CAAA;AAEA,IAAA,MAAMC,oBAAuBT,GAAAA,GAAAA,CAAII,MAAM,EAAA,CAAGC,KAAK,CAAC;AAC9CK,QAAAA,KAAAA,EAAOV,GAAIW,CAAAA,MAAM,EAAGD,CAAAA,KAAK,GAAGF,QAAQ,EAAA;AACpCI,QAAAA,QAAAA,EAAUZ,IAAIW,MAAM,EAAA,CAAGE,GAAG,CAAC,GAAGL,QAAQ,EAAA;AACtCM,QAAAA,QAAAA,EAAUd,IAAIW,MAAM,EAAA,CAAGE,GAAG,CAAC,GAAGL,QAAQ,EAAA;AACtCF,QAAAA,IAAAA,EAAMN,GAAIe,CAAAA,IAAI,CAAC,CAACC,KACd,GAAA,OAAOA,KAAU,KAAA,QAAA,GACbhB,GACGI,CAAAA,MAAM,EACNC,CAAAA,KAAK,CAAC;gBACLY,OAASjB,EAAAA,GAAAA,CACNkB,KAAK,EACLC,CAAAA,EAAE,CAACnB,GAAII,CAAAA,MAAM,EAAGC,CAAAA,KAAK,CAAC;oBAAEe,EAAIpB,EAAAA,GAAAA,CAAIO,QAAQ,EAAA,CAAGC,QAAQ;AAAI,iBAAA,CAAA,CAAA,CACvDK,GAAG,CAAC,CAAG,EAAA,wBAAA,CAAA,CACPL,QAAQ;AACvB,aAAA,CAAA,CACWA,QAAQ,EAAA,GACXR,GAAIO,CAAAA,QAAQ,GAAGC,QAAQ,EAAA;AAE/B,KAAA,CAAA;AAEA,IAAA,MAAMa,oBAAuBrB,GAAAA,GAAAA,CAAII,MAAM,EAAA,CAAGC,KAAK,CAAC;AAC9CK,QAAAA,KAAAA,EAAOV,IAAIW,MAAM,EAAA,CAAGD,KAAK,EAAA,CAAGG,GAAG,CAAC,CAAA,CAAA;AAChCD,QAAAA,QAAAA,EAAUZ,GAAIW,CAAAA,MAAM,EAAGE,CAAAA,GAAG,CAAC,CAAA,CAAA;QAC3BC,QAAUd,EAAAA,GAAAA,CACPsB,KAAK,EACLC,CAAAA,IAAI,CACH,qBACA,EAAA,uCAAA,EACA,SAASC,gBAAAA,CAAiBR,KAAK,EAAA;YAC7B,IAAIA,KAAAA,IAAS,IAAQA,IAAAA,KAAAA,KAAU,EAAI,EAAA;gBACjC,OAAO,IAAA;AACR;AACD,YAAA,OAAO,OAAOA,KAAAA,KAAU,QAAYA,IAAAA,KAAAA,CAAMS,MAAM,IAAI,CAAA;AACrD,SAAA,CAAA;AAELnB,QAAAA,IAAAA,EAAMN,GAAIe,CAAAA,IAAI,CAAC,CAACC,KACd,GAAA,OAAOA,KAAU,KAAA,QAAA,GACbhB,GAAII,CAAAA,MAAM,EAAGC,CAAAA,KAAK,CAAC;gBACjBY,OAASjB,EAAAA,GAAAA,CACNkB,KAAK,EACLC,CAAAA,EAAE,CAACnB,GAAII,CAAAA,MAAM,EAAGC,CAAAA,KAAK,CAAC;oBAAEe,EAAIpB,EAAAA,GAAAA,CAAIO,QAAQ,EAAA,CAAGC,QAAQ;AAAI,iBAAA,CAAA,CAAA,CACvDA,QAAQ,EAAA;gBACXkB,UAAY1B,EAAAA,GAAAA,CACTkB,KAAK,EACLK,CAAAA,IAAI,CAAC,iBAAmB,EAAA,oBAAA,EAAsB,SAASA,IAAAA,CAAKI,eAAe,EAAA;oBAC1E,IAAIX,KAAAA,CAAMC,OAAO,CAACQ,MAAM,KAAK,CAAKE,IAAAA,eAAAA,CAAgBF,MAAM,GAAG,CAAG,EAAA;wBAC5D,OAAO,KAAA;AACR;oBAED,OAAO,IAAA;AACrB,iBAAA,CAAA,CACajB,QAAQ;AACrB,aAAA,CAAA,GACQR,IAAIO,QAAQ,EAAA;AAEpB,KAAA,CAAA;IAEAqB,IAAiB,GAAA;AACfC,QAAAA,sBAAAA,EAAwB5B,iBAAkBQ,CAAAA,oBAAAA,CAAAA;AAC1CqB,QAAAA,sBAAAA,EAAwB7B,iBAAkBoB,CAAAA,oBAAAA,CAAAA;AAC1CU,QAAAA,sBAAAA,EAAwB9B,iBAAkBE,CAAAA,gBAAAA;AAC5C,KAAA;;;;;;"}
1
+ {"version":3,"file":"user.mjs","sources":["../../../../server/controllers/validation/user.js"],"sourcesContent":["'use strict';\n\nconst { yup, validateYupSchema } = require('@strapi/utils');\n\nconst deleteRoleSchema = yup.object().shape({\n role: yup.strapiID().required(),\n});\n\nconst createUserBodySchema = yup.object().shape({\n email: yup.string().email().required(),\n username: yup.string().min(1).required(),\n password: yup.string().min(1).required(),\n role: yup.lazy((value) =>\n typeof value === 'object'\n ? yup\n .object()\n .shape({\n connect: yup\n .array()\n .of(yup.object().shape({ id: yup.strapiID().required() }))\n .min(1, 'Users must have a role')\n .required(),\n })\n .required()\n : yup.strapiID().required()\n ),\n});\n\nconst updateUserBodySchema = yup.object().shape({\n email: yup.string().email().min(1),\n username: yup.string().min(1),\n password: yup\n .mixed()\n .test(\n 'password-validation',\n 'Password must be at least 1 character',\n function validatePassword(value) {\n if (value == null || value === '') {\n return true;\n }\n return typeof value === 'string' && value.length >= 1;\n }\n ),\n role: yup.lazy((value) =>\n typeof value === 'object'\n ? yup.object().shape({\n connect: yup\n .array()\n .of(yup.object().shape({ id: yup.strapiID().required() }))\n .required(),\n disconnect: yup\n .array()\n .test('CheckDisconnect', 'Cannot remove role', function test(disconnectValue) {\n if (value.connect.length === 0 && disconnectValue.length > 0) {\n return false;\n }\n\n return true;\n })\n .required(),\n })\n : yup.strapiID()\n ),\n});\n\nmodule.exports = {\n validateCreateUserBody: validateYupSchema(createUserBodySchema),\n validateUpdateUserBody: validateYupSchema(updateUserBodySchema),\n validateDeleteRoleBody: validateYupSchema(deleteRoleSchema),\n};\n"],"names":["yup","validateYupSchema","require$$0","deleteRoleSchema","object","shape","role","strapiID","required","createUserBodySchema","email","string","username","min","password","lazy","value","connect","array","of","id","updateUserBodySchema","mixed","test","validatePassword","length","disconnect","disconnectValue","user","validateCreateUserBody","validateUpdateUserBody","validateDeleteRoleBody"],"mappings":";;;;;;;AAEA,IAAA,MAAM,EAAEA,GAAG,EAAEC,iBAAiB,EAAE,GAAGC,UAAAA;AAEnC,IAAA,MAAMC,gBAAAA,GAAmBH,GAAAA,CAAII,MAAM,EAAA,CAAGC,KAAK,CAAC;QAC1CC,IAAAA,EAAMN,GAAAA,CAAIO,QAAQ,EAAA,CAAGC,QAAQ;AAC/B,KAAA,CAAA;AAEA,IAAA,MAAMC,oBAAAA,GAAuBT,GAAAA,CAAII,MAAM,EAAA,CAAGC,KAAK,CAAC;AAC9CK,QAAAA,KAAAA,EAAOV,GAAAA,CAAIW,MAAM,EAAA,CAAGD,KAAK,GAAGF,QAAQ,EAAA;AACpCI,QAAAA,QAAAA,EAAUZ,IAAIW,MAAM,EAAA,CAAGE,GAAG,CAAC,GAAGL,QAAQ,EAAA;AACtCM,QAAAA,QAAAA,EAAUd,IAAIW,MAAM,EAAA,CAAGE,GAAG,CAAC,GAAGL,QAAQ,EAAA;AACtCF,QAAAA,IAAAA,EAAMN,GAAAA,CAAIe,IAAI,CAAC,CAACC,KAAAA,GACd,OAAOA,KAAAA,KAAU,QAAA,GACbhB,GAAAA,CACGI,MAAM,EAAA,CACNC,KAAK,CAAC;gBACLY,OAAAA,EAASjB,GAAAA,CACNkB,KAAK,EAAA,CACLC,EAAE,CAACnB,GAAAA,CAAII,MAAM,EAAA,CAAGC,KAAK,CAAC;oBAAEe,EAAAA,EAAIpB,GAAAA,CAAIO,QAAQ,EAAA,CAAGC,QAAQ;AAAE,iBAAA,CAAA,CAAA,CACrDK,GAAG,CAAC,CAAA,EAAG,wBAAA,CAAA,CACPL,QAAQ;AACvB,aAAA,CAAA,CACWA,QAAQ,EAAA,GACXR,GAAAA,CAAIO,QAAQ,GAAGC,QAAQ,EAAA;AAE/B,KAAA,CAAA;AAEA,IAAA,MAAMa,oBAAAA,GAAuBrB,GAAAA,CAAII,MAAM,EAAA,CAAGC,KAAK,CAAC;AAC9CK,QAAAA,KAAAA,EAAOV,IAAIW,MAAM,EAAA,CAAGD,KAAK,EAAA,CAAGG,GAAG,CAAC,CAAA,CAAA;AAChCD,QAAAA,QAAAA,EAAUZ,GAAAA,CAAIW,MAAM,EAAA,CAAGE,GAAG,CAAC,CAAA,CAAA;QAC3BC,QAAAA,EAAUd,GAAAA,CACPsB,KAAK,EAAA,CACLC,IAAI,CACH,qBAAA,EACA,uCAAA,EACA,SAASC,gBAAAA,CAAiBR,KAAK,EAAA;YAC7B,IAAIA,KAAAA,IAAS,IAAA,IAAQA,KAAAA,KAAU,EAAA,EAAI;gBACjC,OAAO,IAAA;AACjB,YAAA;AACQ,YAAA,OAAO,OAAOA,KAAAA,KAAU,QAAA,IAAYA,KAAAA,CAAMS,MAAM,IAAI,CAAA;AAC5D,QAAA,CAAA,CAAA;AAEEnB,QAAAA,IAAAA,EAAMN,GAAAA,CAAIe,IAAI,CAAC,CAACC,KAAAA,GACd,OAAOA,KAAAA,KAAU,QAAA,GACbhB,GAAAA,CAAII,MAAM,EAAA,CAAGC,KAAK,CAAC;gBACjBY,OAAAA,EAASjB,GAAAA,CACNkB,KAAK,EAAA,CACLC,EAAE,CAACnB,GAAAA,CAAII,MAAM,EAAA,CAAGC,KAAK,CAAC;oBAAEe,EAAAA,EAAIpB,GAAAA,CAAIO,QAAQ,EAAA,CAAGC,QAAQ;AAAE,iBAAA,CAAA,CAAA,CACrDA,QAAQ,EAAA;gBACXkB,UAAAA,EAAY1B,GAAAA,CACTkB,KAAK,EAAA,CACLK,IAAI,CAAC,iBAAA,EAAmB,oBAAA,EAAsB,SAASA,IAAAA,CAAKI,eAAe,EAAA;oBAC1E,IAAIX,KAAAA,CAAMC,OAAO,CAACQ,MAAM,KAAK,CAAA,IAAKE,eAAAA,CAAgBF,MAAM,GAAG,CAAA,EAAG;wBAC5D,OAAO,KAAA;AACvB,oBAAA;oBAEc,OAAO,IAAA;AACrB,gBAAA,CAAA,CAAA,CACajB,QAAQ;AACrB,aAAA,CAAA,GACQR,IAAIO,QAAQ,EAAA;AAEpB,KAAA,CAAA;IAEAqB,IAAAA,GAAiB;AACfC,QAAAA,sBAAAA,EAAwB5B,iBAAAA,CAAkBQ,oBAAAA,CAAAA;AAC1CqB,QAAAA,sBAAAA,EAAwB7B,iBAAAA,CAAkBoB,oBAAAA,CAAAA;AAC1CU,QAAAA,sBAAAA,EAAwB9B,iBAAAA,CAAkBE,gBAAAA;AAC5C,KAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"index.js","sources":["../../../server/graphql/index.js"],"sourcesContent":["'use strict';\n\nconst getTypes = require('./types');\nconst getQueries = require('./queries');\nconst getMutations = require('./mutations');\nconst getResolversConfig = require('./resolvers-configs');\n\nmodule.exports = ({ strapi }) => {\n const { config: graphQLConfig } = strapi.plugin('graphql');\n const extensionService = strapi.plugin('graphql').service('extension');\n\n const isShadowCRUDEnabled = graphQLConfig('shadowCRUD', true);\n\n if (!isShadowCRUDEnabled) {\n return;\n }\n\n // Disable Permissions queries & mutations but allow the\n // type to be used/selected in filters or nested resolvers\n extensionService\n .shadowCRUD('plugin::users-permissions.permission')\n .disableQueries()\n .disableMutations();\n\n // Disable User & Role's Create/Update/Delete actions so they can be replaced\n const actionsToDisable = ['create', 'update', 'delete'];\n\n extensionService.shadowCRUD('plugin::users-permissions.user').disableActions(actionsToDisable);\n extensionService.shadowCRUD('plugin::users-permissions.role').disableActions(actionsToDisable);\n\n // Register new types & resolvers config\n extensionService.use(({ nexus }) => {\n const types = getTypes({ strapi, nexus });\n const queries = getQueries({ strapi, nexus });\n const mutations = getMutations({ strapi, nexus });\n const resolversConfig = getResolversConfig({ strapi });\n\n return {\n types: [types, queries, mutations],\n\n resolversConfig,\n };\n });\n};\n"],"names":["getTypes","require$$0","getQueries","require$$1","getMutations","require$$2","getResolversConfig","require$$3","graphql","strapi","config","graphQLConfig","plugin","extensionService","service","isShadowCRUDEnabled","shadowCRUD","disableQueries","disableMutations","actionsToDisable","disableActions","use","nexus","types","queries","mutations","resolversConfig"],"mappings":";;;;;;;;;;;;AAEA,IAAA,MAAMA,QAAWC,GAAAA,eAAAA,EAAAA;AACjB,IAAA,MAAMC,UAAaC,GAAAA,iBAAAA,EAAAA;AACnB,IAAA,MAAMC,YAAeC,GAAAA,iBAAAA,EAAAA;AACrB,IAAA,MAAMC,kBAAqBC,GAAAA,0BAAAA,EAAAA;IAE3BC,OAAiB,GAAA,CAAC,EAAEC,MAAM,EAAE,GAAA;AAC1B,QAAA,MAAM,EAAEC,MAAQC,EAAAA,aAAa,EAAE,GAAGF,MAAAA,CAAOG,MAAM,CAAC,SAAA,CAAA;AAChD,QAAA,MAAMC,mBAAmBJ,MAAOG,CAAAA,MAAM,CAAC,SAAA,CAAA,CAAWE,OAAO,CAAC,WAAA,CAAA;QAE1D,MAAMC,mBAAAA,GAAsBJ,cAAc,YAAc,EAAA,IAAA,CAAA;AAExD,QAAA,IAAI,CAACI,mBAAqB,EAAA;AACxB,YAAA;AACD;;;AAIDF,QAAAA,gBAAAA,CACGG,UAAU,CAAC,sCACXC,CAAAA,CAAAA,cAAc,GACdC,gBAAgB,EAAA;;AAGnB,QAAA,MAAMC,gBAAmB,GAAA;AAAC,YAAA,QAAA;AAAU,YAAA,QAAA;AAAU,YAAA;AAAS,SAAA;AAEvDN,QAAAA,gBAAAA,CAAiBG,UAAU,CAAC,gCAAkCI,CAAAA,CAAAA,cAAc,CAACD,gBAAAA,CAAAA;AAC7EN,QAAAA,gBAAAA,CAAiBG,UAAU,CAAC,gCAAkCI,CAAAA,CAAAA,cAAc,CAACD,gBAAAA,CAAAA;;AAG7EN,QAAAA,gBAAAA,CAAiBQ,GAAG,CAAC,CAAC,EAAEC,KAAK,EAAE,GAAA;AAC7B,YAAA,MAAMC,QAAQvB,QAAS,CAAA;AAAES,gBAAAA,MAAAA;AAAQa,gBAAAA;AAAO,aAAA,CAAA;AACxC,YAAA,MAAME,UAAUtB,UAAW,CAAA;AAAEO,gBAAAA,MAAAA;AAAQa,gBAAAA;AAAO,aAAA,CAAA;AAC5C,YAAA,MAAMG,YAAYrB,YAAa,CAAA;AAAEK,gBAAAA,MAAAA;AAAQa,gBAAAA;AAAO,aAAA,CAAA;AAChD,YAAA,MAAMI,kBAAkBpB,kBAAmB,CAAA;AAAEG,gBAAAA;AAAQ,aAAA,CAAA;YAErD,OAAO;gBACLc,KAAO,EAAA;AAACA,oBAAAA,KAAAA;AAAOC,oBAAAA,OAAAA;AAASC,oBAAAA;AAAU,iBAAA;AAElCC,gBAAAA;AACN,aAAA;AACA,SAAA,CAAA;AACA,KAAA;;;;;;"}
1
+ {"version":3,"file":"index.js","sources":["../../../server/graphql/index.js"],"sourcesContent":["'use strict';\n\nconst getTypes = require('./types');\nconst getQueries = require('./queries');\nconst getMutations = require('./mutations');\nconst getResolversConfig = require('./resolvers-configs');\n\nmodule.exports = ({ strapi }) => {\n const { config: graphQLConfig } = strapi.plugin('graphql');\n const extensionService = strapi.plugin('graphql').service('extension');\n\n const isShadowCRUDEnabled = graphQLConfig('shadowCRUD', true);\n\n if (!isShadowCRUDEnabled) {\n return;\n }\n\n // Disable Permissions queries & mutations but allow the\n // type to be used/selected in filters or nested resolvers\n extensionService\n .shadowCRUD('plugin::users-permissions.permission')\n .disableQueries()\n .disableMutations();\n\n // Disable User & Role's Create/Update/Delete actions so they can be replaced\n const actionsToDisable = ['create', 'update', 'delete'];\n\n extensionService.shadowCRUD('plugin::users-permissions.user').disableActions(actionsToDisable);\n extensionService.shadowCRUD('plugin::users-permissions.role').disableActions(actionsToDisable);\n\n // Register new types & resolvers config\n extensionService.use(({ nexus }) => {\n const types = getTypes({ strapi, nexus });\n const queries = getQueries({ strapi, nexus });\n const mutations = getMutations({ strapi, nexus });\n const resolversConfig = getResolversConfig({ strapi });\n\n return {\n types: [types, queries, mutations],\n\n resolversConfig,\n };\n });\n};\n"],"names":["getTypes","require$$0","getQueries","require$$1","getMutations","require$$2","getResolversConfig","require$$3","graphql","strapi","config","graphQLConfig","plugin","extensionService","service","isShadowCRUDEnabled","shadowCRUD","disableQueries","disableMutations","actionsToDisable","disableActions","use","nexus","types","queries","mutations","resolversConfig"],"mappings":";;;;;;;;;;;;AAEA,IAAA,MAAMA,QAAAA,GAAWC,eAAAA,EAAAA;AACjB,IAAA,MAAMC,UAAAA,GAAaC,iBAAAA,EAAAA;AACnB,IAAA,MAAMC,YAAAA,GAAeC,iBAAAA,EAAAA;AACrB,IAAA,MAAMC,kBAAAA,GAAqBC,0BAAAA,EAAAA;IAE3BC,OAAAA,GAAiB,CAAC,EAAEC,MAAM,EAAE,GAAA;AAC1B,QAAA,MAAM,EAAEC,MAAAA,EAAQC,aAAa,EAAE,GAAGF,MAAAA,CAAOG,MAAM,CAAC,SAAA,CAAA;AAChD,QAAA,MAAMC,mBAAmBJ,MAAAA,CAAOG,MAAM,CAAC,SAAA,CAAA,CAAWE,OAAO,CAAC,WAAA,CAAA;QAE1D,MAAMC,mBAAAA,GAAsBJ,cAAc,YAAA,EAAc,IAAA,CAAA;AAExD,QAAA,IAAI,CAACI,mBAAAA,EAAqB;AACxB,YAAA;AACJ,QAAA;;;AAIEF,QAAAA,gBAAAA,CACGG,UAAU,CAAC,sCAAA,CAAA,CACXC,cAAc,GACdC,gBAAgB,EAAA;;AAGnB,QAAA,MAAMC,gBAAAA,GAAmB;AAAC,YAAA,QAAA;AAAU,YAAA,QAAA;AAAU,YAAA;AAAS,SAAA;AAEvDN,QAAAA,gBAAAA,CAAiBG,UAAU,CAAC,gCAAA,CAAA,CAAkCI,cAAc,CAACD,gBAAAA,CAAAA;AAC7EN,QAAAA,gBAAAA,CAAiBG,UAAU,CAAC,gCAAA,CAAA,CAAkCI,cAAc,CAACD,gBAAAA,CAAAA;;AAG7EN,QAAAA,gBAAAA,CAAiBQ,GAAG,CAAC,CAAC,EAAEC,KAAK,EAAE,GAAA;AAC7B,YAAA,MAAMC,QAAQvB,QAAAA,CAAS;AAAES,gBAAAA,MAAAA;AAAQa,gBAAAA;AAAK,aAAA,CAAA;AACtC,YAAA,MAAME,UAAUtB,UAAAA,CAAW;AAAEO,gBAAAA,MAAAA;AAAQa,gBAAAA;AAAK,aAAA,CAAA;AAC1C,YAAA,MAAMG,YAAYrB,YAAAA,CAAa;AAAEK,gBAAAA,MAAAA;AAAQa,gBAAAA;AAAK,aAAA,CAAA;AAC9C,YAAA,MAAMI,kBAAkBpB,kBAAAA,CAAmB;AAAEG,gBAAAA;AAAM,aAAA,CAAA;YAEnD,OAAO;gBACLc,KAAAA,EAAO;AAACA,oBAAAA,KAAAA;AAAOC,oBAAAA,OAAAA;AAASC,oBAAAA;AAAU,iBAAA;AAElCC,gBAAAA;AACN,aAAA;AACA,QAAA,CAAA,CAAA;AACA,IAAA,CAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"index.mjs","sources":["../../../server/graphql/index.js"],"sourcesContent":["'use strict';\n\nconst getTypes = require('./types');\nconst getQueries = require('./queries');\nconst getMutations = require('./mutations');\nconst getResolversConfig = require('./resolvers-configs');\n\nmodule.exports = ({ strapi }) => {\n const { config: graphQLConfig } = strapi.plugin('graphql');\n const extensionService = strapi.plugin('graphql').service('extension');\n\n const isShadowCRUDEnabled = graphQLConfig('shadowCRUD', true);\n\n if (!isShadowCRUDEnabled) {\n return;\n }\n\n // Disable Permissions queries & mutations but allow the\n // type to be used/selected in filters or nested resolvers\n extensionService\n .shadowCRUD('plugin::users-permissions.permission')\n .disableQueries()\n .disableMutations();\n\n // Disable User & Role's Create/Update/Delete actions so they can be replaced\n const actionsToDisable = ['create', 'update', 'delete'];\n\n extensionService.shadowCRUD('plugin::users-permissions.user').disableActions(actionsToDisable);\n extensionService.shadowCRUD('plugin::users-permissions.role').disableActions(actionsToDisable);\n\n // Register new types & resolvers config\n extensionService.use(({ nexus }) => {\n const types = getTypes({ strapi, nexus });\n const queries = getQueries({ strapi, nexus });\n const mutations = getMutations({ strapi, nexus });\n const resolversConfig = getResolversConfig({ strapi });\n\n return {\n types: [types, queries, mutations],\n\n resolversConfig,\n };\n });\n};\n"],"names":["getTypes","require$$0","getQueries","require$$1","getMutations","require$$2","getResolversConfig","require$$3","graphql","strapi","config","graphQLConfig","plugin","extensionService","service","isShadowCRUDEnabled","shadowCRUD","disableQueries","disableMutations","actionsToDisable","disableActions","use","nexus","types","queries","mutations","resolversConfig"],"mappings":";;;;;;;;;;AAEA,IAAA,MAAMA,QAAWC,GAAAA,YAAAA,EAAAA;AACjB,IAAA,MAAMC,UAAaC,GAAAA,cAAAA,EAAAA;AACnB,IAAA,MAAMC,YAAeC,GAAAA,gBAAAA,EAAAA;AACrB,IAAA,MAAMC,kBAAqBC,GAAAA,uBAAAA,EAAAA;IAE3BC,OAAiB,GAAA,CAAC,EAAEC,MAAM,EAAE,GAAA;AAC1B,QAAA,MAAM,EAAEC,MAAQC,EAAAA,aAAa,EAAE,GAAGF,MAAAA,CAAOG,MAAM,CAAC,SAAA,CAAA;AAChD,QAAA,MAAMC,mBAAmBJ,MAAOG,CAAAA,MAAM,CAAC,SAAA,CAAA,CAAWE,OAAO,CAAC,WAAA,CAAA;QAE1D,MAAMC,mBAAAA,GAAsBJ,cAAc,YAAc,EAAA,IAAA,CAAA;AAExD,QAAA,IAAI,CAACI,mBAAqB,EAAA;AACxB,YAAA;AACD;;;AAIDF,QAAAA,gBAAAA,CACGG,UAAU,CAAC,sCACXC,CAAAA,CAAAA,cAAc,GACdC,gBAAgB,EAAA;;AAGnB,QAAA,MAAMC,gBAAmB,GAAA;AAAC,YAAA,QAAA;AAAU,YAAA,QAAA;AAAU,YAAA;AAAS,SAAA;AAEvDN,QAAAA,gBAAAA,CAAiBG,UAAU,CAAC,gCAAkCI,CAAAA,CAAAA,cAAc,CAACD,gBAAAA,CAAAA;AAC7EN,QAAAA,gBAAAA,CAAiBG,UAAU,CAAC,gCAAkCI,CAAAA,CAAAA,cAAc,CAACD,gBAAAA,CAAAA;;AAG7EN,QAAAA,gBAAAA,CAAiBQ,GAAG,CAAC,CAAC,EAAEC,KAAK,EAAE,GAAA;AAC7B,YAAA,MAAMC,QAAQvB,QAAS,CAAA;AAAES,gBAAAA,MAAAA;AAAQa,gBAAAA;AAAO,aAAA,CAAA;AACxC,YAAA,MAAME,UAAUtB,UAAW,CAAA;AAAEO,gBAAAA,MAAAA;AAAQa,gBAAAA;AAAO,aAAA,CAAA;AAC5C,YAAA,MAAMG,YAAYrB,YAAa,CAAA;AAAEK,gBAAAA,MAAAA;AAAQa,gBAAAA;AAAO,aAAA,CAAA;AAChD,YAAA,MAAMI,kBAAkBpB,kBAAmB,CAAA;AAAEG,gBAAAA;AAAQ,aAAA,CAAA;YAErD,OAAO;gBACLc,KAAO,EAAA;AAACA,oBAAAA,KAAAA;AAAOC,oBAAAA,OAAAA;AAASC,oBAAAA;AAAU,iBAAA;AAElCC,gBAAAA;AACN,aAAA;AACA,SAAA,CAAA;AACA,KAAA;;;;;;"}
1
+ {"version":3,"file":"index.mjs","sources":["../../../server/graphql/index.js"],"sourcesContent":["'use strict';\n\nconst getTypes = require('./types');\nconst getQueries = require('./queries');\nconst getMutations = require('./mutations');\nconst getResolversConfig = require('./resolvers-configs');\n\nmodule.exports = ({ strapi }) => {\n const { config: graphQLConfig } = strapi.plugin('graphql');\n const extensionService = strapi.plugin('graphql').service('extension');\n\n const isShadowCRUDEnabled = graphQLConfig('shadowCRUD', true);\n\n if (!isShadowCRUDEnabled) {\n return;\n }\n\n // Disable Permissions queries & mutations but allow the\n // type to be used/selected in filters or nested resolvers\n extensionService\n .shadowCRUD('plugin::users-permissions.permission')\n .disableQueries()\n .disableMutations();\n\n // Disable User & Role's Create/Update/Delete actions so they can be replaced\n const actionsToDisable = ['create', 'update', 'delete'];\n\n extensionService.shadowCRUD('plugin::users-permissions.user').disableActions(actionsToDisable);\n extensionService.shadowCRUD('plugin::users-permissions.role').disableActions(actionsToDisable);\n\n // Register new types & resolvers config\n extensionService.use(({ nexus }) => {\n const types = getTypes({ strapi, nexus });\n const queries = getQueries({ strapi, nexus });\n const mutations = getMutations({ strapi, nexus });\n const resolversConfig = getResolversConfig({ strapi });\n\n return {\n types: [types, queries, mutations],\n\n resolversConfig,\n };\n });\n};\n"],"names":["getTypes","require$$0","getQueries","require$$1","getMutations","require$$2","getResolversConfig","require$$3","graphql","strapi","config","graphQLConfig","plugin","extensionService","service","isShadowCRUDEnabled","shadowCRUD","disableQueries","disableMutations","actionsToDisable","disableActions","use","nexus","types","queries","mutations","resolversConfig"],"mappings":";;;;;;;;;;AAEA,IAAA,MAAMA,QAAAA,GAAWC,YAAAA,EAAAA;AACjB,IAAA,MAAMC,UAAAA,GAAaC,cAAAA,EAAAA;AACnB,IAAA,MAAMC,YAAAA,GAAeC,gBAAAA,EAAAA;AACrB,IAAA,MAAMC,kBAAAA,GAAqBC,uBAAAA,EAAAA;IAE3BC,OAAAA,GAAiB,CAAC,EAAEC,MAAM,EAAE,GAAA;AAC1B,QAAA,MAAM,EAAEC,MAAAA,EAAQC,aAAa,EAAE,GAAGF,MAAAA,CAAOG,MAAM,CAAC,SAAA,CAAA;AAChD,QAAA,MAAMC,mBAAmBJ,MAAAA,CAAOG,MAAM,CAAC,SAAA,CAAA,CAAWE,OAAO,CAAC,WAAA,CAAA;QAE1D,MAAMC,mBAAAA,GAAsBJ,cAAc,YAAA,EAAc,IAAA,CAAA;AAExD,QAAA,IAAI,CAACI,mBAAAA,EAAqB;AACxB,YAAA;AACJ,QAAA;;;AAIEF,QAAAA,gBAAAA,CACGG,UAAU,CAAC,sCAAA,CAAA,CACXC,cAAc,GACdC,gBAAgB,EAAA;;AAGnB,QAAA,MAAMC,gBAAAA,GAAmB;AAAC,YAAA,QAAA;AAAU,YAAA,QAAA;AAAU,YAAA;AAAS,SAAA;AAEvDN,QAAAA,gBAAAA,CAAiBG,UAAU,CAAC,gCAAA,CAAA,CAAkCI,cAAc,CAACD,gBAAAA,CAAAA;AAC7EN,QAAAA,gBAAAA,CAAiBG,UAAU,CAAC,gCAAA,CAAA,CAAkCI,cAAc,CAACD,gBAAAA,CAAAA;;AAG7EN,QAAAA,gBAAAA,CAAiBQ,GAAG,CAAC,CAAC,EAAEC,KAAK,EAAE,GAAA;AAC7B,YAAA,MAAMC,QAAQvB,QAAAA,CAAS;AAAES,gBAAAA,MAAAA;AAAQa,gBAAAA;AAAK,aAAA,CAAA;AACtC,YAAA,MAAME,UAAUtB,UAAAA,CAAW;AAAEO,gBAAAA,MAAAA;AAAQa,gBAAAA;AAAK,aAAA,CAAA;AAC1C,YAAA,MAAMG,YAAYrB,YAAAA,CAAa;AAAEK,gBAAAA,MAAAA;AAAQa,gBAAAA;AAAK,aAAA,CAAA;AAC9C,YAAA,MAAMI,kBAAkBpB,kBAAAA,CAAmB;AAAEG,gBAAAA;AAAM,aAAA,CAAA;YAEnD,OAAO;gBACLc,KAAAA,EAAO;AAACA,oBAAAA,KAAAA;AAAOC,oBAAAA,OAAAA;AAASC,oBAAAA;AAAU,iBAAA;AAElCC,gBAAAA;AACN,aAAA;AACA,QAAA,CAAA,CAAA;AACA,IAAA,CAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"change-password.js","sources":["../../../../../server/graphql/mutations/auth/change-password.js"],"sourcesContent":["'use strict';\n\nconst { toPlainObject } = require('lodash/fp');\n\nconst { checkBadRequest } = require('../../utils');\n\nmodule.exports = ({ nexus, strapi }) => {\n const { nonNull } = nexus;\n\n return {\n type: 'UsersPermissionsLoginPayload',\n\n args: {\n currentPassword: nonNull('String'),\n password: nonNull('String'),\n passwordConfirmation: nonNull('String'),\n },\n\n description: 'Change user password. Confirm with the current password.',\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.request.body = toPlainObject(args);\n\n await strapi.plugin('users-permissions').controller('auth').changePassword(koaContext);\n\n const output = koaContext.body;\n\n checkBadRequest(output);\n\n return {\n user: output.user || output,\n jwt: output.jwt,\n };\n },\n };\n};\n"],"names":["toPlainObject","require$$0","checkBadRequest","require$$1","changePassword","nexus","strapi","nonNull","type","args","currentPassword","password","passwordConfirmation","description","resolve","parent","context","koaContext","request","body","plugin","controller","output","user","jwt"],"mappings":";;;;;;;;;;IAEA,MAAM,EAAEA,aAAa,EAAE,GAAGC,UAAAA;IAE1B,MAAM,EAAEC,eAAe,EAAE,GAAGC,eAAAA,EAAAA;AAE5BC,IAAAA,cAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,OAAO,EAAE,GAAGF,KAAAA;QAEpB,OAAO;YACLG,IAAM,EAAA,8BAAA;YAENC,IAAM,EAAA;AACJC,gBAAAA,eAAAA,EAAiBH,OAAQ,CAAA,QAAA,CAAA;AACzBI,gBAAAA,QAAAA,EAAUJ,OAAQ,CAAA,QAAA,CAAA;AAClBK,gBAAAA,oBAAAA,EAAsBL,OAAQ,CAAA,QAAA;AAC/B,aAAA;YAEDM,WAAa,EAAA,0DAAA;AAEb,YAAA,MAAMC,OAAQC,CAAAA,CAAAA,MAAM,EAAEN,IAAI,EAAEO,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;AAEvBC,gBAAAA,UAAAA,CAAWC,OAAO,CAACC,IAAI,GAAGnB,aAAcS,CAAAA,IAAAA,CAAAA;gBAExC,MAAMH,MAAAA,CAAOc,MAAM,CAAC,mBAAA,CAAA,CAAqBC,UAAU,CAAC,MAAA,CAAA,CAAQjB,cAAc,CAACa,UAAAA,CAAAA;gBAE3E,MAAMK,MAAAA,GAASL,WAAWE,IAAI;gBAE9BjB,eAAgBoB,CAAAA,MAAAA,CAAAA;gBAEhB,OAAO;oBACLC,IAAMD,EAAAA,MAAAA,CAAOC,IAAI,IAAID,MAAAA;AACrBE,oBAAAA,GAAAA,EAAKF,OAAOE;AACpB,iBAAA;AACK;AACL,SAAA;AACA,KAAA;;;;;;"}
1
+ {"version":3,"file":"change-password.js","sources":["../../../../../server/graphql/mutations/auth/change-password.js"],"sourcesContent":["'use strict';\n\nconst { toPlainObject } = require('lodash/fp');\n\nconst { checkBadRequest } = require('../../utils');\n\nmodule.exports = ({ nexus, strapi }) => {\n const { nonNull } = nexus;\n\n return {\n type: 'UsersPermissionsLoginPayload',\n\n args: {\n currentPassword: nonNull('String'),\n password: nonNull('String'),\n passwordConfirmation: nonNull('String'),\n },\n\n description: 'Change user password. Confirm with the current password.',\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.request.body = toPlainObject(args);\n\n await strapi.plugin('users-permissions').controller('auth').changePassword(koaContext);\n\n const output = koaContext.body;\n\n checkBadRequest(output);\n\n return {\n user: output.user || output,\n jwt: output.jwt,\n };\n },\n };\n};\n"],"names":["toPlainObject","require$$0","checkBadRequest","require$$1","changePassword","nexus","strapi","nonNull","type","args","currentPassword","password","passwordConfirmation","description","resolve","parent","context","koaContext","request","body","plugin","controller","output","user","jwt"],"mappings":";;;;;;;;;;IAEA,MAAM,EAAEA,aAAa,EAAE,GAAGC,UAAAA;IAE1B,MAAM,EAAEC,eAAe,EAAE,GAAGC,eAAAA,EAAAA;AAE5BC,IAAAA,cAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,OAAO,EAAE,GAAGF,KAAAA;QAEpB,OAAO;YACLG,IAAAA,EAAM,8BAAA;YAENC,IAAAA,EAAM;AACJC,gBAAAA,eAAAA,EAAiBH,OAAAA,CAAQ,QAAA,CAAA;AACzBI,gBAAAA,QAAAA,EAAUJ,OAAAA,CAAQ,QAAA,CAAA;AAClBK,gBAAAA,oBAAAA,EAAsBL,OAAAA,CAAQ,QAAA;AACpC,aAAA;YAEIM,WAAAA,EAAa,0DAAA;AAEb,YAAA,MAAMC,OAAAA,CAAAA,CAAQC,MAAM,EAAEN,IAAI,EAAEO,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;AAEvBC,gBAAAA,UAAAA,CAAWC,OAAO,CAACC,IAAI,GAAGnB,aAAAA,CAAcS,IAAAA,CAAAA;gBAExC,MAAMH,MAAAA,CAAOc,MAAM,CAAC,mBAAA,CAAA,CAAqBC,UAAU,CAAC,MAAA,CAAA,CAAQjB,cAAc,CAACa,UAAAA,CAAAA;gBAE3E,MAAMK,MAAAA,GAASL,WAAWE,IAAI;gBAE9BjB,eAAAA,CAAgBoB,MAAAA,CAAAA;gBAEhB,OAAO;oBACLC,IAAAA,EAAMD,MAAAA,CAAOC,IAAI,IAAID,MAAAA;AACrBE,oBAAAA,GAAAA,EAAKF,OAAOE;AACpB,iBAAA;AACA,YAAA;AACA,SAAA;AACA,IAAA,CAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"change-password.mjs","sources":["../../../../../server/graphql/mutations/auth/change-password.js"],"sourcesContent":["'use strict';\n\nconst { toPlainObject } = require('lodash/fp');\n\nconst { checkBadRequest } = require('../../utils');\n\nmodule.exports = ({ nexus, strapi }) => {\n const { nonNull } = nexus;\n\n return {\n type: 'UsersPermissionsLoginPayload',\n\n args: {\n currentPassword: nonNull('String'),\n password: nonNull('String'),\n passwordConfirmation: nonNull('String'),\n },\n\n description: 'Change user password. Confirm with the current password.',\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.request.body = toPlainObject(args);\n\n await strapi.plugin('users-permissions').controller('auth').changePassword(koaContext);\n\n const output = koaContext.body;\n\n checkBadRequest(output);\n\n return {\n user: output.user || output,\n jwt: output.jwt,\n };\n },\n };\n};\n"],"names":["toPlainObject","require$$0","checkBadRequest","require$$1","changePassword","nexus","strapi","nonNull","type","args","currentPassword","password","passwordConfirmation","description","resolve","parent","context","koaContext","request","body","plugin","controller","output","user","jwt"],"mappings":";;;;;;;;IAEA,MAAM,EAAEA,aAAa,EAAE,GAAGC,UAAAA;IAE1B,MAAM,EAAEC,eAAe,EAAE,GAAGC,YAAAA,EAAAA;AAE5BC,IAAAA,cAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,OAAO,EAAE,GAAGF,KAAAA;QAEpB,OAAO;YACLG,IAAM,EAAA,8BAAA;YAENC,IAAM,EAAA;AACJC,gBAAAA,eAAAA,EAAiBH,OAAQ,CAAA,QAAA,CAAA;AACzBI,gBAAAA,QAAAA,EAAUJ,OAAQ,CAAA,QAAA,CAAA;AAClBK,gBAAAA,oBAAAA,EAAsBL,OAAQ,CAAA,QAAA;AAC/B,aAAA;YAEDM,WAAa,EAAA,0DAAA;AAEb,YAAA,MAAMC,OAAQC,CAAAA,CAAAA,MAAM,EAAEN,IAAI,EAAEO,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;AAEvBC,gBAAAA,UAAAA,CAAWC,OAAO,CAACC,IAAI,GAAGnB,aAAcS,CAAAA,IAAAA,CAAAA;gBAExC,MAAMH,MAAAA,CAAOc,MAAM,CAAC,mBAAA,CAAA,CAAqBC,UAAU,CAAC,MAAA,CAAA,CAAQjB,cAAc,CAACa,UAAAA,CAAAA;gBAE3E,MAAMK,MAAAA,GAASL,WAAWE,IAAI;gBAE9BjB,eAAgBoB,CAAAA,MAAAA,CAAAA;gBAEhB,OAAO;oBACLC,IAAMD,EAAAA,MAAAA,CAAOC,IAAI,IAAID,MAAAA;AACrBE,oBAAAA,GAAAA,EAAKF,OAAOE;AACpB,iBAAA;AACK;AACL,SAAA;AACA,KAAA;;;;;;"}
1
+ {"version":3,"file":"change-password.mjs","sources":["../../../../../server/graphql/mutations/auth/change-password.js"],"sourcesContent":["'use strict';\n\nconst { toPlainObject } = require('lodash/fp');\n\nconst { checkBadRequest } = require('../../utils');\n\nmodule.exports = ({ nexus, strapi }) => {\n const { nonNull } = nexus;\n\n return {\n type: 'UsersPermissionsLoginPayload',\n\n args: {\n currentPassword: nonNull('String'),\n password: nonNull('String'),\n passwordConfirmation: nonNull('String'),\n },\n\n description: 'Change user password. Confirm with the current password.',\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.request.body = toPlainObject(args);\n\n await strapi.plugin('users-permissions').controller('auth').changePassword(koaContext);\n\n const output = koaContext.body;\n\n checkBadRequest(output);\n\n return {\n user: output.user || output,\n jwt: output.jwt,\n };\n },\n };\n};\n"],"names":["toPlainObject","require$$0","checkBadRequest","require$$1","changePassword","nexus","strapi","nonNull","type","args","currentPassword","password","passwordConfirmation","description","resolve","parent","context","koaContext","request","body","plugin","controller","output","user","jwt"],"mappings":";;;;;;;;IAEA,MAAM,EAAEA,aAAa,EAAE,GAAGC,UAAAA;IAE1B,MAAM,EAAEC,eAAe,EAAE,GAAGC,YAAAA,EAAAA;AAE5BC,IAAAA,cAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,OAAO,EAAE,GAAGF,KAAAA;QAEpB,OAAO;YACLG,IAAAA,EAAM,8BAAA;YAENC,IAAAA,EAAM;AACJC,gBAAAA,eAAAA,EAAiBH,OAAAA,CAAQ,QAAA,CAAA;AACzBI,gBAAAA,QAAAA,EAAUJ,OAAAA,CAAQ,QAAA,CAAA;AAClBK,gBAAAA,oBAAAA,EAAsBL,OAAAA,CAAQ,QAAA;AACpC,aAAA;YAEIM,WAAAA,EAAa,0DAAA;AAEb,YAAA,MAAMC,OAAAA,CAAAA,CAAQC,MAAM,EAAEN,IAAI,EAAEO,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;AAEvBC,gBAAAA,UAAAA,CAAWC,OAAO,CAACC,IAAI,GAAGnB,aAAAA,CAAcS,IAAAA,CAAAA;gBAExC,MAAMH,MAAAA,CAAOc,MAAM,CAAC,mBAAA,CAAA,CAAqBC,UAAU,CAAC,MAAA,CAAA,CAAQjB,cAAc,CAACa,UAAAA,CAAAA;gBAE3E,MAAMK,MAAAA,GAASL,WAAWE,IAAI;gBAE9BjB,eAAAA,CAAgBoB,MAAAA,CAAAA;gBAEhB,OAAO;oBACLC,IAAAA,EAAMD,MAAAA,CAAOC,IAAI,IAAID,MAAAA;AACrBE,oBAAAA,GAAAA,EAAKF,OAAOE;AACpB,iBAAA;AACA,YAAA;AACA,SAAA;AACA,IAAA,CAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"email-confirmation.js","sources":["../../../../../server/graphql/mutations/auth/email-confirmation.js"],"sourcesContent":["'use strict';\n\nconst { toPlainObject } = require('lodash/fp');\n\nconst { checkBadRequest } = require('../../utils');\n\nmodule.exports = ({ nexus, strapi }) => {\n const { nonNull } = nexus;\n\n return {\n type: 'UsersPermissionsLoginPayload',\n\n args: {\n confirmation: nonNull('String'),\n },\n\n description: 'Confirm an email users email address',\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.query = toPlainObject(args);\n\n await strapi\n .plugin('users-permissions')\n .controller('auth')\n .emailConfirmation(koaContext, null, true);\n\n const output = koaContext.body;\n\n checkBadRequest(output);\n\n return {\n user: output.user || output,\n jwt: output.jwt,\n };\n },\n };\n};\n"],"names":["toPlainObject","require$$0","checkBadRequest","require$$1","emailConfirmation","nexus","strapi","nonNull","type","args","confirmation","description","resolve","parent","context","koaContext","query","plugin","controller","output","body","user","jwt"],"mappings":";;;;;;;;;;IAEA,MAAM,EAAEA,aAAa,EAAE,GAAGC,UAAAA;IAE1B,MAAM,EAAEC,eAAe,EAAE,GAAGC,eAAAA,EAAAA;AAE5BC,IAAAA,iBAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,OAAO,EAAE,GAAGF,KAAAA;QAEpB,OAAO;YACLG,IAAM,EAAA,8BAAA;YAENC,IAAM,EAAA;AACJC,gBAAAA,YAAAA,EAAcH,OAAQ,CAAA,QAAA;AACvB,aAAA;YAEDI,WAAa,EAAA,sCAAA;AAEb,YAAA,MAAMC,OAAQC,CAAAA,CAAAA,MAAM,EAAEJ,IAAI,EAAEK,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;gBAEvBC,UAAWC,CAAAA,KAAK,GAAGhB,aAAcS,CAAAA,IAAAA,CAAAA;gBAEjC,MAAMH,MAAAA,CACHW,MAAM,CAAC,mBACPC,CAAAA,CAAAA,UAAU,CAAC,MACXd,CAAAA,CAAAA,iBAAiB,CAACW,UAAAA,EAAY,IAAM,EAAA,IAAA,CAAA;gBAEvC,MAAMI,MAAAA,GAASJ,WAAWK,IAAI;gBAE9BlB,eAAgBiB,CAAAA,MAAAA,CAAAA;gBAEhB,OAAO;oBACLE,IAAMF,EAAAA,MAAAA,CAAOE,IAAI,IAAIF,MAAAA;AACrBG,oBAAAA,GAAAA,EAAKH,OAAOG;AACpB,iBAAA;AACK;AACL,SAAA;AACA,KAAA;;;;;;"}
1
+ {"version":3,"file":"email-confirmation.js","sources":["../../../../../server/graphql/mutations/auth/email-confirmation.js"],"sourcesContent":["'use strict';\n\nconst { toPlainObject } = require('lodash/fp');\n\nconst { checkBadRequest } = require('../../utils');\n\nmodule.exports = ({ nexus, strapi }) => {\n const { nonNull } = nexus;\n\n return {\n type: 'UsersPermissionsLoginPayload',\n\n args: {\n confirmation: nonNull('String'),\n },\n\n description: 'Confirm an email users email address',\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.query = toPlainObject(args);\n\n await strapi\n .plugin('users-permissions')\n .controller('auth')\n .emailConfirmation(koaContext, null, true);\n\n const output = koaContext.body;\n\n checkBadRequest(output);\n\n return {\n user: output.user || output,\n jwt: output.jwt,\n };\n },\n };\n};\n"],"names":["toPlainObject","require$$0","checkBadRequest","require$$1","emailConfirmation","nexus","strapi","nonNull","type","args","confirmation","description","resolve","parent","context","koaContext","query","plugin","controller","output","body","user","jwt"],"mappings":";;;;;;;;;;IAEA,MAAM,EAAEA,aAAa,EAAE,GAAGC,UAAAA;IAE1B,MAAM,EAAEC,eAAe,EAAE,GAAGC,eAAAA,EAAAA;AAE5BC,IAAAA,iBAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,OAAO,EAAE,GAAGF,KAAAA;QAEpB,OAAO;YACLG,IAAAA,EAAM,8BAAA;YAENC,IAAAA,EAAM;AACJC,gBAAAA,YAAAA,EAAcH,OAAAA,CAAQ,QAAA;AAC5B,aAAA;YAEII,WAAAA,EAAa,sCAAA;AAEb,YAAA,MAAMC,OAAAA,CAAAA,CAAQC,MAAM,EAAEJ,IAAI,EAAEK,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;gBAEvBC,UAAAA,CAAWC,KAAK,GAAGhB,aAAAA,CAAcS,IAAAA,CAAAA;gBAEjC,MAAMH,MAAAA,CACHW,MAAM,CAAC,mBAAA,CAAA,CACPC,UAAU,CAAC,MAAA,CAAA,CACXd,iBAAiB,CAACW,UAAAA,EAAY,IAAA,EAAM,IAAA,CAAA;gBAEvC,MAAMI,MAAAA,GAASJ,WAAWK,IAAI;gBAE9BlB,eAAAA,CAAgBiB,MAAAA,CAAAA;gBAEhB,OAAO;oBACLE,IAAAA,EAAMF,MAAAA,CAAOE,IAAI,IAAIF,MAAAA;AACrBG,oBAAAA,GAAAA,EAAKH,OAAOG;AACpB,iBAAA;AACA,YAAA;AACA,SAAA;AACA,IAAA,CAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"email-confirmation.mjs","sources":["../../../../../server/graphql/mutations/auth/email-confirmation.js"],"sourcesContent":["'use strict';\n\nconst { toPlainObject } = require('lodash/fp');\n\nconst { checkBadRequest } = require('../../utils');\n\nmodule.exports = ({ nexus, strapi }) => {\n const { nonNull } = nexus;\n\n return {\n type: 'UsersPermissionsLoginPayload',\n\n args: {\n confirmation: nonNull('String'),\n },\n\n description: 'Confirm an email users email address',\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.query = toPlainObject(args);\n\n await strapi\n .plugin('users-permissions')\n .controller('auth')\n .emailConfirmation(koaContext, null, true);\n\n const output = koaContext.body;\n\n checkBadRequest(output);\n\n return {\n user: output.user || output,\n jwt: output.jwt,\n };\n },\n };\n};\n"],"names":["toPlainObject","require$$0","checkBadRequest","require$$1","emailConfirmation","nexus","strapi","nonNull","type","args","confirmation","description","resolve","parent","context","koaContext","query","plugin","controller","output","body","user","jwt"],"mappings":";;;;;;;;IAEA,MAAM,EAAEA,aAAa,EAAE,GAAGC,UAAAA;IAE1B,MAAM,EAAEC,eAAe,EAAE,GAAGC,YAAAA,EAAAA;AAE5BC,IAAAA,iBAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,OAAO,EAAE,GAAGF,KAAAA;QAEpB,OAAO;YACLG,IAAM,EAAA,8BAAA;YAENC,IAAM,EAAA;AACJC,gBAAAA,YAAAA,EAAcH,OAAQ,CAAA,QAAA;AACvB,aAAA;YAEDI,WAAa,EAAA,sCAAA;AAEb,YAAA,MAAMC,OAAQC,CAAAA,CAAAA,MAAM,EAAEJ,IAAI,EAAEK,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;gBAEvBC,UAAWC,CAAAA,KAAK,GAAGhB,aAAcS,CAAAA,IAAAA,CAAAA;gBAEjC,MAAMH,MAAAA,CACHW,MAAM,CAAC,mBACPC,CAAAA,CAAAA,UAAU,CAAC,MACXd,CAAAA,CAAAA,iBAAiB,CAACW,UAAAA,EAAY,IAAM,EAAA,IAAA,CAAA;gBAEvC,MAAMI,MAAAA,GAASJ,WAAWK,IAAI;gBAE9BlB,eAAgBiB,CAAAA,MAAAA,CAAAA;gBAEhB,OAAO;oBACLE,IAAMF,EAAAA,MAAAA,CAAOE,IAAI,IAAIF,MAAAA;AACrBG,oBAAAA,GAAAA,EAAKH,OAAOG;AACpB,iBAAA;AACK;AACL,SAAA;AACA,KAAA;;;;;;"}
1
+ {"version":3,"file":"email-confirmation.mjs","sources":["../../../../../server/graphql/mutations/auth/email-confirmation.js"],"sourcesContent":["'use strict';\n\nconst { toPlainObject } = require('lodash/fp');\n\nconst { checkBadRequest } = require('../../utils');\n\nmodule.exports = ({ nexus, strapi }) => {\n const { nonNull } = nexus;\n\n return {\n type: 'UsersPermissionsLoginPayload',\n\n args: {\n confirmation: nonNull('String'),\n },\n\n description: 'Confirm an email users email address',\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.query = toPlainObject(args);\n\n await strapi\n .plugin('users-permissions')\n .controller('auth')\n .emailConfirmation(koaContext, null, true);\n\n const output = koaContext.body;\n\n checkBadRequest(output);\n\n return {\n user: output.user || output,\n jwt: output.jwt,\n };\n },\n };\n};\n"],"names":["toPlainObject","require$$0","checkBadRequest","require$$1","emailConfirmation","nexus","strapi","nonNull","type","args","confirmation","description","resolve","parent","context","koaContext","query","plugin","controller","output","body","user","jwt"],"mappings":";;;;;;;;IAEA,MAAM,EAAEA,aAAa,EAAE,GAAGC,UAAAA;IAE1B,MAAM,EAAEC,eAAe,EAAE,GAAGC,YAAAA,EAAAA;AAE5BC,IAAAA,iBAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,OAAO,EAAE,GAAGF,KAAAA;QAEpB,OAAO;YACLG,IAAAA,EAAM,8BAAA;YAENC,IAAAA,EAAM;AACJC,gBAAAA,YAAAA,EAAcH,OAAAA,CAAQ,QAAA;AAC5B,aAAA;YAEII,WAAAA,EAAa,sCAAA;AAEb,YAAA,MAAMC,OAAAA,CAAAA,CAAQC,MAAM,EAAEJ,IAAI,EAAEK,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;gBAEvBC,UAAAA,CAAWC,KAAK,GAAGhB,aAAAA,CAAcS,IAAAA,CAAAA;gBAEjC,MAAMH,MAAAA,CACHW,MAAM,CAAC,mBAAA,CAAA,CACPC,UAAU,CAAC,MAAA,CAAA,CACXd,iBAAiB,CAACW,UAAAA,EAAY,IAAA,EAAM,IAAA,CAAA;gBAEvC,MAAMI,MAAAA,GAASJ,WAAWK,IAAI;gBAE9BlB,eAAAA,CAAgBiB,MAAAA,CAAAA;gBAEhB,OAAO;oBACLE,IAAAA,EAAMF,MAAAA,CAAOE,IAAI,IAAIF,MAAAA;AACrBG,oBAAAA,GAAAA,EAAKH,OAAOG;AACpB,iBAAA;AACA,YAAA;AACA,SAAA;AACA,IAAA,CAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"forgot-password.js","sources":["../../../../../server/graphql/mutations/auth/forgot-password.js"],"sourcesContent":["'use strict';\n\nconst { toPlainObject } = require('lodash/fp');\n\nconst { checkBadRequest } = require('../../utils');\n\nmodule.exports = ({ nexus, strapi }) => {\n const { nonNull } = nexus;\n\n return {\n type: 'UsersPermissionsPasswordPayload',\n\n args: {\n email: nonNull('String'),\n },\n\n description: 'Request a reset password token',\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.request.body = toPlainObject(args);\n\n await strapi.plugin('users-permissions').controller('auth').forgotPassword(koaContext);\n\n const output = koaContext.body;\n\n checkBadRequest(output);\n\n return {\n ok: output.ok || output,\n };\n },\n };\n};\n"],"names":["toPlainObject","require$$0","checkBadRequest","require$$1","forgotPassword","nexus","strapi","nonNull","type","args","email","description","resolve","parent","context","koaContext","request","body","plugin","controller","output","ok"],"mappings":";;;;;;;;;;IAEA,MAAM,EAAEA,aAAa,EAAE,GAAGC,UAAAA;IAE1B,MAAM,EAAEC,eAAe,EAAE,GAAGC,eAAAA,EAAAA;AAE5BC,IAAAA,cAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,OAAO,EAAE,GAAGF,KAAAA;QAEpB,OAAO;YACLG,IAAM,EAAA,iCAAA;YAENC,IAAM,EAAA;AACJC,gBAAAA,KAAAA,EAAOH,OAAQ,CAAA,QAAA;AAChB,aAAA;YAEDI,WAAa,EAAA,gCAAA;AAEb,YAAA,MAAMC,OAAQC,CAAAA,CAAAA,MAAM,EAAEJ,IAAI,EAAEK,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;AAEvBC,gBAAAA,UAAAA,CAAWC,OAAO,CAACC,IAAI,GAAGjB,aAAcS,CAAAA,IAAAA,CAAAA;gBAExC,MAAMH,MAAAA,CAAOY,MAAM,CAAC,mBAAA,CAAA,CAAqBC,UAAU,CAAC,MAAA,CAAA,CAAQf,cAAc,CAACW,UAAAA,CAAAA;gBAE3E,MAAMK,MAAAA,GAASL,WAAWE,IAAI;gBAE9Bf,eAAgBkB,CAAAA,MAAAA,CAAAA;gBAEhB,OAAO;oBACLC,EAAID,EAAAA,MAAAA,CAAOC,EAAE,IAAID;AACzB,iBAAA;AACK;AACL,SAAA;AACA,KAAA;;;;;;"}
1
+ {"version":3,"file":"forgot-password.js","sources":["../../../../../server/graphql/mutations/auth/forgot-password.js"],"sourcesContent":["'use strict';\n\nconst { toPlainObject } = require('lodash/fp');\n\nconst { checkBadRequest } = require('../../utils');\n\nmodule.exports = ({ nexus, strapi }) => {\n const { nonNull } = nexus;\n\n return {\n type: 'UsersPermissionsPasswordPayload',\n\n args: {\n email: nonNull('String'),\n },\n\n description: 'Request a reset password token',\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.request.body = toPlainObject(args);\n\n await strapi.plugin('users-permissions').controller('auth').forgotPassword(koaContext);\n\n const output = koaContext.body;\n\n checkBadRequest(output);\n\n return {\n ok: output.ok || output,\n };\n },\n };\n};\n"],"names":["toPlainObject","require$$0","checkBadRequest","require$$1","forgotPassword","nexus","strapi","nonNull","type","args","email","description","resolve","parent","context","koaContext","request","body","plugin","controller","output","ok"],"mappings":";;;;;;;;;;IAEA,MAAM,EAAEA,aAAa,EAAE,GAAGC,UAAAA;IAE1B,MAAM,EAAEC,eAAe,EAAE,GAAGC,eAAAA,EAAAA;AAE5BC,IAAAA,cAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,OAAO,EAAE,GAAGF,KAAAA;QAEpB,OAAO;YACLG,IAAAA,EAAM,iCAAA;YAENC,IAAAA,EAAM;AACJC,gBAAAA,KAAAA,EAAOH,OAAAA,CAAQ,QAAA;AACrB,aAAA;YAEII,WAAAA,EAAa,gCAAA;AAEb,YAAA,MAAMC,OAAAA,CAAAA,CAAQC,MAAM,EAAEJ,IAAI,EAAEK,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;AAEvBC,gBAAAA,UAAAA,CAAWC,OAAO,CAACC,IAAI,GAAGjB,aAAAA,CAAcS,IAAAA,CAAAA;gBAExC,MAAMH,MAAAA,CAAOY,MAAM,CAAC,mBAAA,CAAA,CAAqBC,UAAU,CAAC,MAAA,CAAA,CAAQf,cAAc,CAACW,UAAAA,CAAAA;gBAE3E,MAAMK,MAAAA,GAASL,WAAWE,IAAI;gBAE9Bf,eAAAA,CAAgBkB,MAAAA,CAAAA;gBAEhB,OAAO;oBACLC,EAAAA,EAAID,MAAAA,CAAOC,EAAE,IAAID;AACzB,iBAAA;AACA,YAAA;AACA,SAAA;AACA,IAAA,CAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"forgot-password.mjs","sources":["../../../../../server/graphql/mutations/auth/forgot-password.js"],"sourcesContent":["'use strict';\n\nconst { toPlainObject } = require('lodash/fp');\n\nconst { checkBadRequest } = require('../../utils');\n\nmodule.exports = ({ nexus, strapi }) => {\n const { nonNull } = nexus;\n\n return {\n type: 'UsersPermissionsPasswordPayload',\n\n args: {\n email: nonNull('String'),\n },\n\n description: 'Request a reset password token',\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.request.body = toPlainObject(args);\n\n await strapi.plugin('users-permissions').controller('auth').forgotPassword(koaContext);\n\n const output = koaContext.body;\n\n checkBadRequest(output);\n\n return {\n ok: output.ok || output,\n };\n },\n };\n};\n"],"names":["toPlainObject","require$$0","checkBadRequest","require$$1","forgotPassword","nexus","strapi","nonNull","type","args","email","description","resolve","parent","context","koaContext","request","body","plugin","controller","output","ok"],"mappings":";;;;;;;;IAEA,MAAM,EAAEA,aAAa,EAAE,GAAGC,UAAAA;IAE1B,MAAM,EAAEC,eAAe,EAAE,GAAGC,YAAAA,EAAAA;AAE5BC,IAAAA,cAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,OAAO,EAAE,GAAGF,KAAAA;QAEpB,OAAO;YACLG,IAAM,EAAA,iCAAA;YAENC,IAAM,EAAA;AACJC,gBAAAA,KAAAA,EAAOH,OAAQ,CAAA,QAAA;AAChB,aAAA;YAEDI,WAAa,EAAA,gCAAA;AAEb,YAAA,MAAMC,OAAQC,CAAAA,CAAAA,MAAM,EAAEJ,IAAI,EAAEK,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;AAEvBC,gBAAAA,UAAAA,CAAWC,OAAO,CAACC,IAAI,GAAGjB,aAAcS,CAAAA,IAAAA,CAAAA;gBAExC,MAAMH,MAAAA,CAAOY,MAAM,CAAC,mBAAA,CAAA,CAAqBC,UAAU,CAAC,MAAA,CAAA,CAAQf,cAAc,CAACW,UAAAA,CAAAA;gBAE3E,MAAMK,MAAAA,GAASL,WAAWE,IAAI;gBAE9Bf,eAAgBkB,CAAAA,MAAAA,CAAAA;gBAEhB,OAAO;oBACLC,EAAID,EAAAA,MAAAA,CAAOC,EAAE,IAAID;AACzB,iBAAA;AACK;AACL,SAAA;AACA,KAAA;;;;;;"}
1
+ {"version":3,"file":"forgot-password.mjs","sources":["../../../../../server/graphql/mutations/auth/forgot-password.js"],"sourcesContent":["'use strict';\n\nconst { toPlainObject } = require('lodash/fp');\n\nconst { checkBadRequest } = require('../../utils');\n\nmodule.exports = ({ nexus, strapi }) => {\n const { nonNull } = nexus;\n\n return {\n type: 'UsersPermissionsPasswordPayload',\n\n args: {\n email: nonNull('String'),\n },\n\n description: 'Request a reset password token',\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.request.body = toPlainObject(args);\n\n await strapi.plugin('users-permissions').controller('auth').forgotPassword(koaContext);\n\n const output = koaContext.body;\n\n checkBadRequest(output);\n\n return {\n ok: output.ok || output,\n };\n },\n };\n};\n"],"names":["toPlainObject","require$$0","checkBadRequest","require$$1","forgotPassword","nexus","strapi","nonNull","type","args","email","description","resolve","parent","context","koaContext","request","body","plugin","controller","output","ok"],"mappings":";;;;;;;;IAEA,MAAM,EAAEA,aAAa,EAAE,GAAGC,UAAAA;IAE1B,MAAM,EAAEC,eAAe,EAAE,GAAGC,YAAAA,EAAAA;AAE5BC,IAAAA,cAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,OAAO,EAAE,GAAGF,KAAAA;QAEpB,OAAO;YACLG,IAAAA,EAAM,iCAAA;YAENC,IAAAA,EAAM;AACJC,gBAAAA,KAAAA,EAAOH,OAAAA,CAAQ,QAAA;AACrB,aAAA;YAEII,WAAAA,EAAa,gCAAA;AAEb,YAAA,MAAMC,OAAAA,CAAAA,CAAQC,MAAM,EAAEJ,IAAI,EAAEK,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;AAEvBC,gBAAAA,UAAAA,CAAWC,OAAO,CAACC,IAAI,GAAGjB,aAAAA,CAAcS,IAAAA,CAAAA;gBAExC,MAAMH,MAAAA,CAAOY,MAAM,CAAC,mBAAA,CAAA,CAAqBC,UAAU,CAAC,MAAA,CAAA,CAAQf,cAAc,CAACW,UAAAA,CAAAA;gBAE3E,MAAMK,MAAAA,GAASL,WAAWE,IAAI;gBAE9Bf,eAAAA,CAAgBkB,MAAAA,CAAAA;gBAEhB,OAAO;oBACLC,EAAAA,EAAID,MAAAA,CAAOC,EAAE,IAAID;AACzB,iBAAA;AACA,YAAA;AACA,SAAA;AACA,IAAA,CAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"login.js","sources":["../../../../../server/graphql/mutations/auth/login.js"],"sourcesContent":["'use strict';\n\nconst { toPlainObject } = require('lodash/fp');\n\nconst { checkBadRequest } = require('../../utils');\n\nmodule.exports = ({ nexus, strapi }) => {\n const { nonNull } = nexus;\n\n return {\n type: nonNull('UsersPermissionsLoginPayload'),\n\n args: {\n input: nonNull('UsersPermissionsLoginInput'),\n },\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.params = { provider: args.input.provider };\n koaContext.request.body = toPlainObject(args.input);\n\n await strapi.plugin('users-permissions').controller('auth').callback(koaContext);\n\n const output = koaContext.body;\n\n checkBadRequest(output);\n\n return {\n user: output.user || output,\n jwt: output.jwt,\n };\n },\n };\n};\n"],"names":["toPlainObject","require$$0","checkBadRequest","require$$1","login","nexus","strapi","nonNull","type","args","input","resolve","parent","context","koaContext","params","provider","request","body","plugin","controller","callback","output","user","jwt"],"mappings":";;;;;;;;;;IAEA,MAAM,EAAEA,aAAa,EAAE,GAAGC,UAAAA;IAE1B,MAAM,EAAEC,eAAe,EAAE,GAAGC,eAAAA,EAAAA;AAE5BC,IAAAA,KAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,OAAO,EAAE,GAAGF,KAAAA;QAEpB,OAAO;AACLG,YAAAA,IAAAA,EAAMD,OAAQ,CAAA,8BAAA,CAAA;YAEdE,IAAM,EAAA;AACJC,gBAAAA,KAAAA,EAAOH,OAAQ,CAAA,4BAAA;AAChB,aAAA;AAED,YAAA,MAAMI,OAAQC,CAAAA,CAAAA,MAAM,EAAEH,IAAI,EAAEI,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;AAEvBC,gBAAAA,UAAAA,CAAWC,MAAM,GAAG;oBAAEC,QAAUP,EAAAA,IAAAA,CAAKC,KAAK,CAACM;;AAC3CF,gBAAAA,UAAAA,CAAWG,OAAO,CAACC,IAAI,GAAGlB,aAAAA,CAAcS,KAAKC,KAAK,CAAA;gBAElD,MAAMJ,MAAAA,CAAOa,MAAM,CAAC,mBAAA,CAAA,CAAqBC,UAAU,CAAC,MAAA,CAAA,CAAQC,QAAQ,CAACP,UAAAA,CAAAA;gBAErE,MAAMQ,MAAAA,GAASR,WAAWI,IAAI;gBAE9BhB,eAAgBoB,CAAAA,MAAAA,CAAAA;gBAEhB,OAAO;oBACLC,IAAMD,EAAAA,MAAAA,CAAOC,IAAI,IAAID,MAAAA;AACrBE,oBAAAA,GAAAA,EAAKF,OAAOE;AACpB,iBAAA;AACK;AACL,SAAA;AACA,KAAA;;;;;;"}
1
+ {"version":3,"file":"login.js","sources":["../../../../../server/graphql/mutations/auth/login.js"],"sourcesContent":["'use strict';\n\nconst { toPlainObject } = require('lodash/fp');\n\nconst { checkBadRequest } = require('../../utils');\n\nmodule.exports = ({ nexus, strapi }) => {\n const { nonNull } = nexus;\n\n return {\n type: nonNull('UsersPermissionsLoginPayload'),\n\n args: {\n input: nonNull('UsersPermissionsLoginInput'),\n },\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.params = { provider: args.input.provider };\n koaContext.request.body = toPlainObject(args.input);\n\n await strapi.plugin('users-permissions').controller('auth').callback(koaContext);\n\n const output = koaContext.body;\n\n checkBadRequest(output);\n\n return {\n user: output.user || output,\n jwt: output.jwt,\n };\n },\n };\n};\n"],"names":["toPlainObject","require$$0","checkBadRequest","require$$1","login","nexus","strapi","nonNull","type","args","input","resolve","parent","context","koaContext","params","provider","request","body","plugin","controller","callback","output","user","jwt"],"mappings":";;;;;;;;;;IAEA,MAAM,EAAEA,aAAa,EAAE,GAAGC,UAAAA;IAE1B,MAAM,EAAEC,eAAe,EAAE,GAAGC,eAAAA,EAAAA;AAE5BC,IAAAA,KAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,OAAO,EAAE,GAAGF,KAAAA;QAEpB,OAAO;AACLG,YAAAA,IAAAA,EAAMD,OAAAA,CAAQ,8BAAA,CAAA;YAEdE,IAAAA,EAAM;AACJC,gBAAAA,KAAAA,EAAOH,OAAAA,CAAQ,4BAAA;AACrB,aAAA;AAEI,YAAA,MAAMI,OAAAA,CAAAA,CAAQC,MAAM,EAAEH,IAAI,EAAEI,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;AAEvBC,gBAAAA,UAAAA,CAAWC,MAAM,GAAG;oBAAEC,QAAAA,EAAUP,IAAAA,CAAKC,KAAK,CAACM;;AAC3CF,gBAAAA,UAAAA,CAAWG,OAAO,CAACC,IAAI,GAAGlB,aAAAA,CAAcS,KAAKC,KAAK,CAAA;gBAElD,MAAMJ,MAAAA,CAAOa,MAAM,CAAC,mBAAA,CAAA,CAAqBC,UAAU,CAAC,MAAA,CAAA,CAAQC,QAAQ,CAACP,UAAAA,CAAAA;gBAErE,MAAMQ,MAAAA,GAASR,WAAWI,IAAI;gBAE9BhB,eAAAA,CAAgBoB,MAAAA,CAAAA;gBAEhB,OAAO;oBACLC,IAAAA,EAAMD,MAAAA,CAAOC,IAAI,IAAID,MAAAA;AACrBE,oBAAAA,GAAAA,EAAKF,OAAOE;AACpB,iBAAA;AACA,YAAA;AACA,SAAA;AACA,IAAA,CAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"login.mjs","sources":["../../../../../server/graphql/mutations/auth/login.js"],"sourcesContent":["'use strict';\n\nconst { toPlainObject } = require('lodash/fp');\n\nconst { checkBadRequest } = require('../../utils');\n\nmodule.exports = ({ nexus, strapi }) => {\n const { nonNull } = nexus;\n\n return {\n type: nonNull('UsersPermissionsLoginPayload'),\n\n args: {\n input: nonNull('UsersPermissionsLoginInput'),\n },\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.params = { provider: args.input.provider };\n koaContext.request.body = toPlainObject(args.input);\n\n await strapi.plugin('users-permissions').controller('auth').callback(koaContext);\n\n const output = koaContext.body;\n\n checkBadRequest(output);\n\n return {\n user: output.user || output,\n jwt: output.jwt,\n };\n },\n };\n};\n"],"names":["toPlainObject","require$$0","checkBadRequest","require$$1","login","nexus","strapi","nonNull","type","args","input","resolve","parent","context","koaContext","params","provider","request","body","plugin","controller","callback","output","user","jwt"],"mappings":";;;;;;;;IAEA,MAAM,EAAEA,aAAa,EAAE,GAAGC,UAAAA;IAE1B,MAAM,EAAEC,eAAe,EAAE,GAAGC,YAAAA,EAAAA;AAE5BC,IAAAA,KAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,OAAO,EAAE,GAAGF,KAAAA;QAEpB,OAAO;AACLG,YAAAA,IAAAA,EAAMD,OAAQ,CAAA,8BAAA,CAAA;YAEdE,IAAM,EAAA;AACJC,gBAAAA,KAAAA,EAAOH,OAAQ,CAAA,4BAAA;AAChB,aAAA;AAED,YAAA,MAAMI,OAAQC,CAAAA,CAAAA,MAAM,EAAEH,IAAI,EAAEI,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;AAEvBC,gBAAAA,UAAAA,CAAWC,MAAM,GAAG;oBAAEC,QAAUP,EAAAA,IAAAA,CAAKC,KAAK,CAACM;;AAC3CF,gBAAAA,UAAAA,CAAWG,OAAO,CAACC,IAAI,GAAGlB,aAAAA,CAAcS,KAAKC,KAAK,CAAA;gBAElD,MAAMJ,MAAAA,CAAOa,MAAM,CAAC,mBAAA,CAAA,CAAqBC,UAAU,CAAC,MAAA,CAAA,CAAQC,QAAQ,CAACP,UAAAA,CAAAA;gBAErE,MAAMQ,MAAAA,GAASR,WAAWI,IAAI;gBAE9BhB,eAAgBoB,CAAAA,MAAAA,CAAAA;gBAEhB,OAAO;oBACLC,IAAMD,EAAAA,MAAAA,CAAOC,IAAI,IAAID,MAAAA;AACrBE,oBAAAA,GAAAA,EAAKF,OAAOE;AACpB,iBAAA;AACK;AACL,SAAA;AACA,KAAA;;;;;;"}
1
+ {"version":3,"file":"login.mjs","sources":["../../../../../server/graphql/mutations/auth/login.js"],"sourcesContent":["'use strict';\n\nconst { toPlainObject } = require('lodash/fp');\n\nconst { checkBadRequest } = require('../../utils');\n\nmodule.exports = ({ nexus, strapi }) => {\n const { nonNull } = nexus;\n\n return {\n type: nonNull('UsersPermissionsLoginPayload'),\n\n args: {\n input: nonNull('UsersPermissionsLoginInput'),\n },\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.params = { provider: args.input.provider };\n koaContext.request.body = toPlainObject(args.input);\n\n await strapi.plugin('users-permissions').controller('auth').callback(koaContext);\n\n const output = koaContext.body;\n\n checkBadRequest(output);\n\n return {\n user: output.user || output,\n jwt: output.jwt,\n };\n },\n };\n};\n"],"names":["toPlainObject","require$$0","checkBadRequest","require$$1","login","nexus","strapi","nonNull","type","args","input","resolve","parent","context","koaContext","params","provider","request","body","plugin","controller","callback","output","user","jwt"],"mappings":";;;;;;;;IAEA,MAAM,EAAEA,aAAa,EAAE,GAAGC,UAAAA;IAE1B,MAAM,EAAEC,eAAe,EAAE,GAAGC,YAAAA,EAAAA;AAE5BC,IAAAA,KAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,OAAO,EAAE,GAAGF,KAAAA;QAEpB,OAAO;AACLG,YAAAA,IAAAA,EAAMD,OAAAA,CAAQ,8BAAA,CAAA;YAEdE,IAAAA,EAAM;AACJC,gBAAAA,KAAAA,EAAOH,OAAAA,CAAQ,4BAAA;AACrB,aAAA;AAEI,YAAA,MAAMI,OAAAA,CAAAA,CAAQC,MAAM,EAAEH,IAAI,EAAEI,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;AAEvBC,gBAAAA,UAAAA,CAAWC,MAAM,GAAG;oBAAEC,QAAAA,EAAUP,IAAAA,CAAKC,KAAK,CAACM;;AAC3CF,gBAAAA,UAAAA,CAAWG,OAAO,CAACC,IAAI,GAAGlB,aAAAA,CAAcS,KAAKC,KAAK,CAAA;gBAElD,MAAMJ,MAAAA,CAAOa,MAAM,CAAC,mBAAA,CAAA,CAAqBC,UAAU,CAAC,MAAA,CAAA,CAAQC,QAAQ,CAACP,UAAAA,CAAAA;gBAErE,MAAMQ,MAAAA,GAASR,WAAWI,IAAI;gBAE9BhB,eAAAA,CAAgBoB,MAAAA,CAAAA;gBAEhB,OAAO;oBACLC,IAAAA,EAAMD,MAAAA,CAAOC,IAAI,IAAID,MAAAA;AACrBE,oBAAAA,GAAAA,EAAKF,OAAOE;AACpB,iBAAA;AACA,YAAA;AACA,SAAA;AACA,IAAA,CAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"register.js","sources":["../../../../../server/graphql/mutations/auth/register.js"],"sourcesContent":["'use strict';\n\nconst { toPlainObject } = require('lodash/fp');\n\nconst { checkBadRequest } = require('../../utils');\n\nmodule.exports = ({ nexus, strapi }) => {\n const { nonNull } = nexus;\n\n return {\n type: nonNull('UsersPermissionsLoginPayload'),\n\n args: {\n input: nonNull('UsersPermissionsRegisterInput'),\n },\n\n description: 'Register a user',\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.request.body = toPlainObject(args.input);\n\n await strapi.plugin('users-permissions').controller('auth').register(koaContext);\n\n const output = koaContext.body;\n\n checkBadRequest(output);\n\n return {\n user: output.user || output,\n jwt: output.jwt,\n };\n },\n };\n};\n"],"names":["toPlainObject","require$$0","checkBadRequest","require$$1","register","nexus","strapi","nonNull","type","args","input","description","resolve","parent","context","koaContext","request","body","plugin","controller","output","user","jwt"],"mappings":";;;;;;;;;;IAEA,MAAM,EAAEA,aAAa,EAAE,GAAGC,UAAAA;IAE1B,MAAM,EAAEC,eAAe,EAAE,GAAGC,eAAAA,EAAAA;AAE5BC,IAAAA,QAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,OAAO,EAAE,GAAGF,KAAAA;QAEpB,OAAO;AACLG,YAAAA,IAAAA,EAAMD,OAAQ,CAAA,8BAAA,CAAA;YAEdE,IAAM,EAAA;AACJC,gBAAAA,KAAAA,EAAOH,OAAQ,CAAA,+BAAA;AAChB,aAAA;YAEDI,WAAa,EAAA,iBAAA;AAEb,YAAA,MAAMC,OAAQC,CAAAA,CAAAA,MAAM,EAAEJ,IAAI,EAAEK,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;AAEvBC,gBAAAA,UAAAA,CAAWC,OAAO,CAACC,IAAI,GAAGjB,aAAAA,CAAcS,KAAKC,KAAK,CAAA;gBAElD,MAAMJ,MAAAA,CAAOY,MAAM,CAAC,mBAAA,CAAA,CAAqBC,UAAU,CAAC,MAAA,CAAA,CAAQf,QAAQ,CAACW,UAAAA,CAAAA;gBAErE,MAAMK,MAAAA,GAASL,WAAWE,IAAI;gBAE9Bf,eAAgBkB,CAAAA,MAAAA,CAAAA;gBAEhB,OAAO;oBACLC,IAAMD,EAAAA,MAAAA,CAAOC,IAAI,IAAID,MAAAA;AACrBE,oBAAAA,GAAAA,EAAKF,OAAOE;AACpB,iBAAA;AACK;AACL,SAAA;AACA,KAAA;;;;;;"}
1
+ {"version":3,"file":"register.js","sources":["../../../../../server/graphql/mutations/auth/register.js"],"sourcesContent":["'use strict';\n\nconst { toPlainObject } = require('lodash/fp');\n\nconst { checkBadRequest } = require('../../utils');\n\nmodule.exports = ({ nexus, strapi }) => {\n const { nonNull } = nexus;\n\n return {\n type: nonNull('UsersPermissionsLoginPayload'),\n\n args: {\n input: nonNull('UsersPermissionsRegisterInput'),\n },\n\n description: 'Register a user',\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.request.body = toPlainObject(args.input);\n\n await strapi.plugin('users-permissions').controller('auth').register(koaContext);\n\n const output = koaContext.body;\n\n checkBadRequest(output);\n\n return {\n user: output.user || output,\n jwt: output.jwt,\n };\n },\n };\n};\n"],"names":["toPlainObject","require$$0","checkBadRequest","require$$1","register","nexus","strapi","nonNull","type","args","input","description","resolve","parent","context","koaContext","request","body","plugin","controller","output","user","jwt"],"mappings":";;;;;;;;;;IAEA,MAAM,EAAEA,aAAa,EAAE,GAAGC,UAAAA;IAE1B,MAAM,EAAEC,eAAe,EAAE,GAAGC,eAAAA,EAAAA;AAE5BC,IAAAA,QAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,OAAO,EAAE,GAAGF,KAAAA;QAEpB,OAAO;AACLG,YAAAA,IAAAA,EAAMD,OAAAA,CAAQ,8BAAA,CAAA;YAEdE,IAAAA,EAAM;AACJC,gBAAAA,KAAAA,EAAOH,OAAAA,CAAQ,+BAAA;AACrB,aAAA;YAEII,WAAAA,EAAa,iBAAA;AAEb,YAAA,MAAMC,OAAAA,CAAAA,CAAQC,MAAM,EAAEJ,IAAI,EAAEK,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;AAEvBC,gBAAAA,UAAAA,CAAWC,OAAO,CAACC,IAAI,GAAGjB,aAAAA,CAAcS,KAAKC,KAAK,CAAA;gBAElD,MAAMJ,MAAAA,CAAOY,MAAM,CAAC,mBAAA,CAAA,CAAqBC,UAAU,CAAC,MAAA,CAAA,CAAQf,QAAQ,CAACW,UAAAA,CAAAA;gBAErE,MAAMK,MAAAA,GAASL,WAAWE,IAAI;gBAE9Bf,eAAAA,CAAgBkB,MAAAA,CAAAA;gBAEhB,OAAO;oBACLC,IAAAA,EAAMD,MAAAA,CAAOC,IAAI,IAAID,MAAAA;AACrBE,oBAAAA,GAAAA,EAAKF,OAAOE;AACpB,iBAAA;AACA,YAAA;AACA,SAAA;AACA,IAAA,CAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"register.mjs","sources":["../../../../../server/graphql/mutations/auth/register.js"],"sourcesContent":["'use strict';\n\nconst { toPlainObject } = require('lodash/fp');\n\nconst { checkBadRequest } = require('../../utils');\n\nmodule.exports = ({ nexus, strapi }) => {\n const { nonNull } = nexus;\n\n return {\n type: nonNull('UsersPermissionsLoginPayload'),\n\n args: {\n input: nonNull('UsersPermissionsRegisterInput'),\n },\n\n description: 'Register a user',\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.request.body = toPlainObject(args.input);\n\n await strapi.plugin('users-permissions').controller('auth').register(koaContext);\n\n const output = koaContext.body;\n\n checkBadRequest(output);\n\n return {\n user: output.user || output,\n jwt: output.jwt,\n };\n },\n };\n};\n"],"names":["toPlainObject","require$$0","checkBadRequest","require$$1","register","nexus","strapi","nonNull","type","args","input","description","resolve","parent","context","koaContext","request","body","plugin","controller","output","user","jwt"],"mappings":";;;;;;;;IAEA,MAAM,EAAEA,aAAa,EAAE,GAAGC,UAAAA;IAE1B,MAAM,EAAEC,eAAe,EAAE,GAAGC,YAAAA,EAAAA;AAE5BC,IAAAA,QAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,OAAO,EAAE,GAAGF,KAAAA;QAEpB,OAAO;AACLG,YAAAA,IAAAA,EAAMD,OAAQ,CAAA,8BAAA,CAAA;YAEdE,IAAM,EAAA;AACJC,gBAAAA,KAAAA,EAAOH,OAAQ,CAAA,+BAAA;AAChB,aAAA;YAEDI,WAAa,EAAA,iBAAA;AAEb,YAAA,MAAMC,OAAQC,CAAAA,CAAAA,MAAM,EAAEJ,IAAI,EAAEK,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;AAEvBC,gBAAAA,UAAAA,CAAWC,OAAO,CAACC,IAAI,GAAGjB,aAAAA,CAAcS,KAAKC,KAAK,CAAA;gBAElD,MAAMJ,MAAAA,CAAOY,MAAM,CAAC,mBAAA,CAAA,CAAqBC,UAAU,CAAC,MAAA,CAAA,CAAQf,QAAQ,CAACW,UAAAA,CAAAA;gBAErE,MAAMK,MAAAA,GAASL,WAAWE,IAAI;gBAE9Bf,eAAgBkB,CAAAA,MAAAA,CAAAA;gBAEhB,OAAO;oBACLC,IAAMD,EAAAA,MAAAA,CAAOC,IAAI,IAAID,MAAAA;AACrBE,oBAAAA,GAAAA,EAAKF,OAAOE;AACpB,iBAAA;AACK;AACL,SAAA;AACA,KAAA;;;;;;"}
1
+ {"version":3,"file":"register.mjs","sources":["../../../../../server/graphql/mutations/auth/register.js"],"sourcesContent":["'use strict';\n\nconst { toPlainObject } = require('lodash/fp');\n\nconst { checkBadRequest } = require('../../utils');\n\nmodule.exports = ({ nexus, strapi }) => {\n const { nonNull } = nexus;\n\n return {\n type: nonNull('UsersPermissionsLoginPayload'),\n\n args: {\n input: nonNull('UsersPermissionsRegisterInput'),\n },\n\n description: 'Register a user',\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.request.body = toPlainObject(args.input);\n\n await strapi.plugin('users-permissions').controller('auth').register(koaContext);\n\n const output = koaContext.body;\n\n checkBadRequest(output);\n\n return {\n user: output.user || output,\n jwt: output.jwt,\n };\n },\n };\n};\n"],"names":["toPlainObject","require$$0","checkBadRequest","require$$1","register","nexus","strapi","nonNull","type","args","input","description","resolve","parent","context","koaContext","request","body","plugin","controller","output","user","jwt"],"mappings":";;;;;;;;IAEA,MAAM,EAAEA,aAAa,EAAE,GAAGC,UAAAA;IAE1B,MAAM,EAAEC,eAAe,EAAE,GAAGC,YAAAA,EAAAA;AAE5BC,IAAAA,QAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,OAAO,EAAE,GAAGF,KAAAA;QAEpB,OAAO;AACLG,YAAAA,IAAAA,EAAMD,OAAAA,CAAQ,8BAAA,CAAA;YAEdE,IAAAA,EAAM;AACJC,gBAAAA,KAAAA,EAAOH,OAAAA,CAAQ,+BAAA;AACrB,aAAA;YAEII,WAAAA,EAAa,iBAAA;AAEb,YAAA,MAAMC,OAAAA,CAAAA,CAAQC,MAAM,EAAEJ,IAAI,EAAEK,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;AAEvBC,gBAAAA,UAAAA,CAAWC,OAAO,CAACC,IAAI,GAAGjB,aAAAA,CAAcS,KAAKC,KAAK,CAAA;gBAElD,MAAMJ,MAAAA,CAAOY,MAAM,CAAC,mBAAA,CAAA,CAAqBC,UAAU,CAAC,MAAA,CAAA,CAAQf,QAAQ,CAACW,UAAAA,CAAAA;gBAErE,MAAMK,MAAAA,GAASL,WAAWE,IAAI;gBAE9Bf,eAAAA,CAAgBkB,MAAAA,CAAAA;gBAEhB,OAAO;oBACLC,IAAAA,EAAMD,MAAAA,CAAOC,IAAI,IAAID,MAAAA;AACrBE,oBAAAA,GAAAA,EAAKF,OAAOE;AACpB,iBAAA;AACA,YAAA;AACA,SAAA;AACA,IAAA,CAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"reset-password.js","sources":["../../../../../server/graphql/mutations/auth/reset-password.js"],"sourcesContent":["'use strict';\n\nconst { toPlainObject } = require('lodash/fp');\n\nconst { checkBadRequest } = require('../../utils');\n\nmodule.exports = ({ nexus, strapi }) => {\n const { nonNull } = nexus;\n\n return {\n type: 'UsersPermissionsLoginPayload',\n\n args: {\n password: nonNull('String'),\n passwordConfirmation: nonNull('String'),\n code: nonNull('String'),\n },\n\n description: 'Reset user password. Confirm with a code (resetToken from forgotPassword)',\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.request.body = toPlainObject(args);\n\n await strapi.plugin('users-permissions').controller('auth').resetPassword(koaContext);\n\n const output = koaContext.body;\n\n checkBadRequest(output);\n\n return {\n user: output.user || output,\n jwt: output.jwt,\n };\n },\n };\n};\n"],"names":["toPlainObject","require$$0","checkBadRequest","require$$1","resetPassword","nexus","strapi","nonNull","type","args","password","passwordConfirmation","code","description","resolve","parent","context","koaContext","request","body","plugin","controller","output","user","jwt"],"mappings":";;;;;;;;;;IAEA,MAAM,EAAEA,aAAa,EAAE,GAAGC,UAAAA;IAE1B,MAAM,EAAEC,eAAe,EAAE,GAAGC,eAAAA,EAAAA;AAE5BC,IAAAA,aAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,OAAO,EAAE,GAAGF,KAAAA;QAEpB,OAAO;YACLG,IAAM,EAAA,8BAAA;YAENC,IAAM,EAAA;AACJC,gBAAAA,QAAAA,EAAUH,OAAQ,CAAA,QAAA,CAAA;AAClBI,gBAAAA,oBAAAA,EAAsBJ,OAAQ,CAAA,QAAA,CAAA;AAC9BK,gBAAAA,IAAAA,EAAML,OAAQ,CAAA,QAAA;AACf,aAAA;YAEDM,WAAa,EAAA,2EAAA;AAEb,YAAA,MAAMC,OAAQC,CAAAA,CAAAA,MAAM,EAAEN,IAAI,EAAEO,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;AAEvBC,gBAAAA,UAAAA,CAAWC,OAAO,CAACC,IAAI,GAAGnB,aAAcS,CAAAA,IAAAA,CAAAA;gBAExC,MAAMH,MAAAA,CAAOc,MAAM,CAAC,mBAAA,CAAA,CAAqBC,UAAU,CAAC,MAAA,CAAA,CAAQjB,aAAa,CAACa,UAAAA,CAAAA;gBAE1E,MAAMK,MAAAA,GAASL,WAAWE,IAAI;gBAE9BjB,eAAgBoB,CAAAA,MAAAA,CAAAA;gBAEhB,OAAO;oBACLC,IAAMD,EAAAA,MAAAA,CAAOC,IAAI,IAAID,MAAAA;AACrBE,oBAAAA,GAAAA,EAAKF,OAAOE;AACpB,iBAAA;AACK;AACL,SAAA;AACA,KAAA;;;;;;"}
1
+ {"version":3,"file":"reset-password.js","sources":["../../../../../server/graphql/mutations/auth/reset-password.js"],"sourcesContent":["'use strict';\n\nconst { toPlainObject } = require('lodash/fp');\n\nconst { checkBadRequest } = require('../../utils');\n\nmodule.exports = ({ nexus, strapi }) => {\n const { nonNull } = nexus;\n\n return {\n type: 'UsersPermissionsLoginPayload',\n\n args: {\n password: nonNull('String'),\n passwordConfirmation: nonNull('String'),\n code: nonNull('String'),\n },\n\n description: 'Reset user password. Confirm with a code (resetToken from forgotPassword)',\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.request.body = toPlainObject(args);\n\n await strapi.plugin('users-permissions').controller('auth').resetPassword(koaContext);\n\n const output = koaContext.body;\n\n checkBadRequest(output);\n\n return {\n user: output.user || output,\n jwt: output.jwt,\n };\n },\n };\n};\n"],"names":["toPlainObject","require$$0","checkBadRequest","require$$1","resetPassword","nexus","strapi","nonNull","type","args","password","passwordConfirmation","code","description","resolve","parent","context","koaContext","request","body","plugin","controller","output","user","jwt"],"mappings":";;;;;;;;;;IAEA,MAAM,EAAEA,aAAa,EAAE,GAAGC,UAAAA;IAE1B,MAAM,EAAEC,eAAe,EAAE,GAAGC,eAAAA,EAAAA;AAE5BC,IAAAA,aAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,OAAO,EAAE,GAAGF,KAAAA;QAEpB,OAAO;YACLG,IAAAA,EAAM,8BAAA;YAENC,IAAAA,EAAM;AACJC,gBAAAA,QAAAA,EAAUH,OAAAA,CAAQ,QAAA,CAAA;AAClBI,gBAAAA,oBAAAA,EAAsBJ,OAAAA,CAAQ,QAAA,CAAA;AAC9BK,gBAAAA,IAAAA,EAAML,OAAAA,CAAQ,QAAA;AACpB,aAAA;YAEIM,WAAAA,EAAa,2EAAA;AAEb,YAAA,MAAMC,OAAAA,CAAAA,CAAQC,MAAM,EAAEN,IAAI,EAAEO,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;AAEvBC,gBAAAA,UAAAA,CAAWC,OAAO,CAACC,IAAI,GAAGnB,aAAAA,CAAcS,IAAAA,CAAAA;gBAExC,MAAMH,MAAAA,CAAOc,MAAM,CAAC,mBAAA,CAAA,CAAqBC,UAAU,CAAC,MAAA,CAAA,CAAQjB,aAAa,CAACa,UAAAA,CAAAA;gBAE1E,MAAMK,MAAAA,GAASL,WAAWE,IAAI;gBAE9BjB,eAAAA,CAAgBoB,MAAAA,CAAAA;gBAEhB,OAAO;oBACLC,IAAAA,EAAMD,MAAAA,CAAOC,IAAI,IAAID,MAAAA;AACrBE,oBAAAA,GAAAA,EAAKF,OAAOE;AACpB,iBAAA;AACA,YAAA;AACA,SAAA;AACA,IAAA,CAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"reset-password.mjs","sources":["../../../../../server/graphql/mutations/auth/reset-password.js"],"sourcesContent":["'use strict';\n\nconst { toPlainObject } = require('lodash/fp');\n\nconst { checkBadRequest } = require('../../utils');\n\nmodule.exports = ({ nexus, strapi }) => {\n const { nonNull } = nexus;\n\n return {\n type: 'UsersPermissionsLoginPayload',\n\n args: {\n password: nonNull('String'),\n passwordConfirmation: nonNull('String'),\n code: nonNull('String'),\n },\n\n description: 'Reset user password. Confirm with a code (resetToken from forgotPassword)',\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.request.body = toPlainObject(args);\n\n await strapi.plugin('users-permissions').controller('auth').resetPassword(koaContext);\n\n const output = koaContext.body;\n\n checkBadRequest(output);\n\n return {\n user: output.user || output,\n jwt: output.jwt,\n };\n },\n };\n};\n"],"names":["toPlainObject","require$$0","checkBadRequest","require$$1","resetPassword","nexus","strapi","nonNull","type","args","password","passwordConfirmation","code","description","resolve","parent","context","koaContext","request","body","plugin","controller","output","user","jwt"],"mappings":";;;;;;;;IAEA,MAAM,EAAEA,aAAa,EAAE,GAAGC,UAAAA;IAE1B,MAAM,EAAEC,eAAe,EAAE,GAAGC,YAAAA,EAAAA;AAE5BC,IAAAA,aAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,OAAO,EAAE,GAAGF,KAAAA;QAEpB,OAAO;YACLG,IAAM,EAAA,8BAAA;YAENC,IAAM,EAAA;AACJC,gBAAAA,QAAAA,EAAUH,OAAQ,CAAA,QAAA,CAAA;AAClBI,gBAAAA,oBAAAA,EAAsBJ,OAAQ,CAAA,QAAA,CAAA;AAC9BK,gBAAAA,IAAAA,EAAML,OAAQ,CAAA,QAAA;AACf,aAAA;YAEDM,WAAa,EAAA,2EAAA;AAEb,YAAA,MAAMC,OAAQC,CAAAA,CAAAA,MAAM,EAAEN,IAAI,EAAEO,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;AAEvBC,gBAAAA,UAAAA,CAAWC,OAAO,CAACC,IAAI,GAAGnB,aAAcS,CAAAA,IAAAA,CAAAA;gBAExC,MAAMH,MAAAA,CAAOc,MAAM,CAAC,mBAAA,CAAA,CAAqBC,UAAU,CAAC,MAAA,CAAA,CAAQjB,aAAa,CAACa,UAAAA,CAAAA;gBAE1E,MAAMK,MAAAA,GAASL,WAAWE,IAAI;gBAE9BjB,eAAgBoB,CAAAA,MAAAA,CAAAA;gBAEhB,OAAO;oBACLC,IAAMD,EAAAA,MAAAA,CAAOC,IAAI,IAAID,MAAAA;AACrBE,oBAAAA,GAAAA,EAAKF,OAAOE;AACpB,iBAAA;AACK;AACL,SAAA;AACA,KAAA;;;;;;"}
1
+ {"version":3,"file":"reset-password.mjs","sources":["../../../../../server/graphql/mutations/auth/reset-password.js"],"sourcesContent":["'use strict';\n\nconst { toPlainObject } = require('lodash/fp');\n\nconst { checkBadRequest } = require('../../utils');\n\nmodule.exports = ({ nexus, strapi }) => {\n const { nonNull } = nexus;\n\n return {\n type: 'UsersPermissionsLoginPayload',\n\n args: {\n password: nonNull('String'),\n passwordConfirmation: nonNull('String'),\n code: nonNull('String'),\n },\n\n description: 'Reset user password. Confirm with a code (resetToken from forgotPassword)',\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.request.body = toPlainObject(args);\n\n await strapi.plugin('users-permissions').controller('auth').resetPassword(koaContext);\n\n const output = koaContext.body;\n\n checkBadRequest(output);\n\n return {\n user: output.user || output,\n jwt: output.jwt,\n };\n },\n };\n};\n"],"names":["toPlainObject","require$$0","checkBadRequest","require$$1","resetPassword","nexus","strapi","nonNull","type","args","password","passwordConfirmation","code","description","resolve","parent","context","koaContext","request","body","plugin","controller","output","user","jwt"],"mappings":";;;;;;;;IAEA,MAAM,EAAEA,aAAa,EAAE,GAAGC,UAAAA;IAE1B,MAAM,EAAEC,eAAe,EAAE,GAAGC,YAAAA,EAAAA;AAE5BC,IAAAA,aAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,OAAO,EAAE,GAAGF,KAAAA;QAEpB,OAAO;YACLG,IAAAA,EAAM,8BAAA;YAENC,IAAAA,EAAM;AACJC,gBAAAA,QAAAA,EAAUH,OAAAA,CAAQ,QAAA,CAAA;AAClBI,gBAAAA,oBAAAA,EAAsBJ,OAAAA,CAAQ,QAAA,CAAA;AAC9BK,gBAAAA,IAAAA,EAAML,OAAAA,CAAQ,QAAA;AACpB,aAAA;YAEIM,WAAAA,EAAa,2EAAA;AAEb,YAAA,MAAMC,OAAAA,CAAAA,CAAQC,MAAM,EAAEN,IAAI,EAAEO,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;AAEvBC,gBAAAA,UAAAA,CAAWC,OAAO,CAACC,IAAI,GAAGnB,aAAAA,CAAcS,IAAAA,CAAAA;gBAExC,MAAMH,MAAAA,CAAOc,MAAM,CAAC,mBAAA,CAAA,CAAqBC,UAAU,CAAC,MAAA,CAAA,CAAQjB,aAAa,CAACa,UAAAA,CAAAA;gBAE1E,MAAMK,MAAAA,GAASL,WAAWE,IAAI;gBAE9BjB,eAAAA,CAAgBoB,MAAAA,CAAAA;gBAEhB,OAAO;oBACLC,IAAAA,EAAMD,MAAAA,CAAOC,IAAI,IAAID,MAAAA;AACrBE,oBAAAA,GAAAA,EAAKF,OAAOE;AACpB,iBAAA;AACA,YAAA;AACA,SAAA;AACA,IAAA,CAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"create-role.js","sources":["../../../../../../server/graphql/mutations/crud/role/create-role.js"],"sourcesContent":["'use strict';\n\nconst { toPlainObject } = require('lodash/fp');\n\nconst usersPermissionsRoleUID = 'plugin::users-permissions.role';\n\nmodule.exports = ({ nexus, strapi }) => {\n const { getContentTypeInputName } = strapi.plugin('graphql').service('utils').naming;\n const { nonNull } = nexus;\n\n const roleContentType = strapi.getModel(usersPermissionsRoleUID);\n\n const roleInputName = getContentTypeInputName(roleContentType);\n\n return {\n type: 'UsersPermissionsCreateRolePayload',\n\n args: {\n data: nonNull(roleInputName),\n },\n\n description: 'Create a new role',\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.request.body = toPlainObject(args.data);\n\n await strapi.plugin('users-permissions').controller('role').createRole(koaContext);\n\n return { ok: true };\n },\n };\n};\n"],"names":["toPlainObject","require$$0","usersPermissionsRoleUID","createRole","nexus","strapi","getContentTypeInputName","plugin","service","naming","nonNull","roleContentType","getModel","roleInputName","type","args","data","description","resolve","parent","context","koaContext","request","body","controller","ok"],"mappings":";;;;;;;;;IAEA,MAAM,EAAEA,aAAa,EAAE,GAAGC,UAAAA;AAE1B,IAAA,MAAMC,uBAA0B,GAAA,gCAAA;AAEhCC,IAAAA,UAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,uBAAuB,EAAE,GAAGD,MAAAA,CAAOE,MAAM,CAAC,SAAWC,CAAAA,CAAAA,OAAO,CAAC,OAAA,CAAA,CAASC,MAAM;QACpF,MAAM,EAAEC,OAAO,EAAE,GAAGN,KAAAA;QAEpB,MAAMO,eAAAA,GAAkBN,MAAOO,CAAAA,QAAQ,CAACV,uBAAAA,CAAAA;AAExC,QAAA,MAAMW,gBAAgBP,uBAAwBK,CAAAA,eAAAA,CAAAA;QAE9C,OAAO;YACLG,IAAM,EAAA,mCAAA;YAENC,IAAM,EAAA;AACJC,gBAAAA,IAAAA,EAAMN,OAAQG,CAAAA,aAAAA;AACf,aAAA;YAEDI,WAAa,EAAA,mBAAA;AAEb,YAAA,MAAMC,OAAQC,CAAAA,CAAAA,MAAM,EAAEJ,IAAI,EAAEK,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;AAEvBC,gBAAAA,UAAAA,CAAWC,OAAO,CAACC,IAAI,GAAGvB,aAAAA,CAAce,KAAKC,IAAI,CAAA;gBAEjD,MAAMX,MAAAA,CAAOE,MAAM,CAAC,mBAAA,CAAA,CAAqBiB,UAAU,CAAC,MAAA,CAAA,CAAQrB,UAAU,CAACkB,UAAAA,CAAAA;gBAEvE,OAAO;oBAAEI,EAAI,EAAA;;AACd;AACL,SAAA;AACA,KAAA;;;;;;"}
1
+ {"version":3,"file":"create-role.js","sources":["../../../../../../server/graphql/mutations/crud/role/create-role.js"],"sourcesContent":["'use strict';\n\nconst { toPlainObject } = require('lodash/fp');\n\nconst usersPermissionsRoleUID = 'plugin::users-permissions.role';\n\nmodule.exports = ({ nexus, strapi }) => {\n const { getContentTypeInputName } = strapi.plugin('graphql').service('utils').naming;\n const { nonNull } = nexus;\n\n const roleContentType = strapi.getModel(usersPermissionsRoleUID);\n\n const roleInputName = getContentTypeInputName(roleContentType);\n\n return {\n type: 'UsersPermissionsCreateRolePayload',\n\n args: {\n data: nonNull(roleInputName),\n },\n\n description: 'Create a new role',\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.request.body = toPlainObject(args.data);\n\n await strapi.plugin('users-permissions').controller('role').createRole(koaContext);\n\n return { ok: true };\n },\n };\n};\n"],"names":["toPlainObject","require$$0","usersPermissionsRoleUID","createRole","nexus","strapi","getContentTypeInputName","plugin","service","naming","nonNull","roleContentType","getModel","roleInputName","type","args","data","description","resolve","parent","context","koaContext","request","body","controller","ok"],"mappings":";;;;;;;;;IAEA,MAAM,EAAEA,aAAa,EAAE,GAAGC,UAAAA;AAE1B,IAAA,MAAMC,uBAAAA,GAA0B,gCAAA;AAEhCC,IAAAA,UAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,uBAAuB,EAAE,GAAGD,MAAAA,CAAOE,MAAM,CAAC,SAAA,CAAA,CAAWC,OAAO,CAAC,OAAA,CAAA,CAASC,MAAM;QACpF,MAAM,EAAEC,OAAO,EAAE,GAAGN,KAAAA;QAEpB,MAAMO,eAAAA,GAAkBN,MAAAA,CAAOO,QAAQ,CAACV,uBAAAA,CAAAA;AAExC,QAAA,MAAMW,gBAAgBP,uBAAAA,CAAwBK,eAAAA,CAAAA;QAE9C,OAAO;YACLG,IAAAA,EAAM,mCAAA;YAENC,IAAAA,EAAM;AACJC,gBAAAA,IAAAA,EAAMN,OAAAA,CAAQG,aAAAA;AACpB,aAAA;YAEII,WAAAA,EAAa,mBAAA;AAEb,YAAA,MAAMC,OAAAA,CAAAA,CAAQC,MAAM,EAAEJ,IAAI,EAAEK,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;AAEvBC,gBAAAA,UAAAA,CAAWC,OAAO,CAACC,IAAI,GAAGvB,aAAAA,CAAce,KAAKC,IAAI,CAAA;gBAEjD,MAAMX,MAAAA,CAAOE,MAAM,CAAC,mBAAA,CAAA,CAAqBiB,UAAU,CAAC,MAAA,CAAA,CAAQrB,UAAU,CAACkB,UAAAA,CAAAA;gBAEvE,OAAO;oBAAEI,EAAAA,EAAI;;AACnB,YAAA;AACA,SAAA;AACA,IAAA,CAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"create-role.mjs","sources":["../../../../../../server/graphql/mutations/crud/role/create-role.js"],"sourcesContent":["'use strict';\n\nconst { toPlainObject } = require('lodash/fp');\n\nconst usersPermissionsRoleUID = 'plugin::users-permissions.role';\n\nmodule.exports = ({ nexus, strapi }) => {\n const { getContentTypeInputName } = strapi.plugin('graphql').service('utils').naming;\n const { nonNull } = nexus;\n\n const roleContentType = strapi.getModel(usersPermissionsRoleUID);\n\n const roleInputName = getContentTypeInputName(roleContentType);\n\n return {\n type: 'UsersPermissionsCreateRolePayload',\n\n args: {\n data: nonNull(roleInputName),\n },\n\n description: 'Create a new role',\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.request.body = toPlainObject(args.data);\n\n await strapi.plugin('users-permissions').controller('role').createRole(koaContext);\n\n return { ok: true };\n },\n };\n};\n"],"names":["toPlainObject","require$$0","usersPermissionsRoleUID","createRole","nexus","strapi","getContentTypeInputName","plugin","service","naming","nonNull","roleContentType","getModel","roleInputName","type","args","data","description","resolve","parent","context","koaContext","request","body","controller","ok"],"mappings":";;;;;;;IAEA,MAAM,EAAEA,aAAa,EAAE,GAAGC,UAAAA;AAE1B,IAAA,MAAMC,uBAA0B,GAAA,gCAAA;AAEhCC,IAAAA,UAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,uBAAuB,EAAE,GAAGD,MAAAA,CAAOE,MAAM,CAAC,SAAWC,CAAAA,CAAAA,OAAO,CAAC,OAAA,CAAA,CAASC,MAAM;QACpF,MAAM,EAAEC,OAAO,EAAE,GAAGN,KAAAA;QAEpB,MAAMO,eAAAA,GAAkBN,MAAOO,CAAAA,QAAQ,CAACV,uBAAAA,CAAAA;AAExC,QAAA,MAAMW,gBAAgBP,uBAAwBK,CAAAA,eAAAA,CAAAA;QAE9C,OAAO;YACLG,IAAM,EAAA,mCAAA;YAENC,IAAM,EAAA;AACJC,gBAAAA,IAAAA,EAAMN,OAAQG,CAAAA,aAAAA;AACf,aAAA;YAEDI,WAAa,EAAA,mBAAA;AAEb,YAAA,MAAMC,OAAQC,CAAAA,CAAAA,MAAM,EAAEJ,IAAI,EAAEK,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;AAEvBC,gBAAAA,UAAAA,CAAWC,OAAO,CAACC,IAAI,GAAGvB,aAAAA,CAAce,KAAKC,IAAI,CAAA;gBAEjD,MAAMX,MAAAA,CAAOE,MAAM,CAAC,mBAAA,CAAA,CAAqBiB,UAAU,CAAC,MAAA,CAAA,CAAQrB,UAAU,CAACkB,UAAAA,CAAAA;gBAEvE,OAAO;oBAAEI,EAAI,EAAA;;AACd;AACL,SAAA;AACA,KAAA;;;;;;"}
1
+ {"version":3,"file":"create-role.mjs","sources":["../../../../../../server/graphql/mutations/crud/role/create-role.js"],"sourcesContent":["'use strict';\n\nconst { toPlainObject } = require('lodash/fp');\n\nconst usersPermissionsRoleUID = 'plugin::users-permissions.role';\n\nmodule.exports = ({ nexus, strapi }) => {\n const { getContentTypeInputName } = strapi.plugin('graphql').service('utils').naming;\n const { nonNull } = nexus;\n\n const roleContentType = strapi.getModel(usersPermissionsRoleUID);\n\n const roleInputName = getContentTypeInputName(roleContentType);\n\n return {\n type: 'UsersPermissionsCreateRolePayload',\n\n args: {\n data: nonNull(roleInputName),\n },\n\n description: 'Create a new role',\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.request.body = toPlainObject(args.data);\n\n await strapi.plugin('users-permissions').controller('role').createRole(koaContext);\n\n return { ok: true };\n },\n };\n};\n"],"names":["toPlainObject","require$$0","usersPermissionsRoleUID","createRole","nexus","strapi","getContentTypeInputName","plugin","service","naming","nonNull","roleContentType","getModel","roleInputName","type","args","data","description","resolve","parent","context","koaContext","request","body","controller","ok"],"mappings":";;;;;;;IAEA,MAAM,EAAEA,aAAa,EAAE,GAAGC,UAAAA;AAE1B,IAAA,MAAMC,uBAAAA,GAA0B,gCAAA;AAEhCC,IAAAA,UAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,uBAAuB,EAAE,GAAGD,MAAAA,CAAOE,MAAM,CAAC,SAAA,CAAA,CAAWC,OAAO,CAAC,OAAA,CAAA,CAASC,MAAM;QACpF,MAAM,EAAEC,OAAO,EAAE,GAAGN,KAAAA;QAEpB,MAAMO,eAAAA,GAAkBN,MAAAA,CAAOO,QAAQ,CAACV,uBAAAA,CAAAA;AAExC,QAAA,MAAMW,gBAAgBP,uBAAAA,CAAwBK,eAAAA,CAAAA;QAE9C,OAAO;YACLG,IAAAA,EAAM,mCAAA;YAENC,IAAAA,EAAM;AACJC,gBAAAA,IAAAA,EAAMN,OAAAA,CAAQG,aAAAA;AACpB,aAAA;YAEII,WAAAA,EAAa,mBAAA;AAEb,YAAA,MAAMC,OAAAA,CAAAA,CAAQC,MAAM,EAAEJ,IAAI,EAAEK,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;AAEvBC,gBAAAA,UAAAA,CAAWC,OAAO,CAACC,IAAI,GAAGvB,aAAAA,CAAce,KAAKC,IAAI,CAAA;gBAEjD,MAAMX,MAAAA,CAAOE,MAAM,CAAC,mBAAA,CAAA,CAAqBiB,UAAU,CAAC,MAAA,CAAA,CAAQrB,UAAU,CAACkB,UAAAA,CAAAA;gBAEvE,OAAO;oBAAEI,EAAAA,EAAI;;AACnB,YAAA;AACA,SAAA;AACA,IAAA,CAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"delete-role.js","sources":["../../../../../../server/graphql/mutations/crud/role/delete-role.js"],"sourcesContent":["'use strict';\n\nmodule.exports = ({ nexus, strapi }) => {\n const { nonNull } = nexus;\n\n return {\n type: 'UsersPermissionsDeleteRolePayload',\n\n args: {\n id: nonNull('ID'),\n },\n\n description: 'Delete an existing role',\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.params = { role: args.id };\n\n await strapi.plugin('users-permissions').controller('role').deleteRole(koaContext);\n\n return { ok: true };\n },\n };\n};\n"],"names":["deleteRole","nexus","strapi","nonNull","type","args","id","description","resolve","parent","context","koaContext","params","role","plugin","controller","ok"],"mappings":";;;;;;;AAEAA,IAAAA,UAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,OAAO,EAAE,GAAGF,KAAAA;QAEpB,OAAO;YACLG,IAAM,EAAA,mCAAA;YAENC,IAAM,EAAA;AACJC,gBAAAA,EAAAA,EAAIH,OAAQ,CAAA,IAAA;AACb,aAAA;YAEDI,WAAa,EAAA,yBAAA;AAEb,YAAA,MAAMC,OAAQC,CAAAA,CAAAA,MAAM,EAAEJ,IAAI,EAAEK,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;AAEvBC,gBAAAA,UAAAA,CAAWC,MAAM,GAAG;AAAEC,oBAAAA,IAAAA,EAAMR,KAAKC;AAAE,iBAAA;gBAEnC,MAAMJ,MAAAA,CAAOY,MAAM,CAAC,mBAAA,CAAA,CAAqBC,UAAU,CAAC,MAAA,CAAA,CAAQf,UAAU,CAACW,UAAAA,CAAAA;gBAEvE,OAAO;oBAAEK,EAAI,EAAA;;AACd;AACL,SAAA;AACA,KAAA;;;;;;"}
1
+ {"version":3,"file":"delete-role.js","sources":["../../../../../../server/graphql/mutations/crud/role/delete-role.js"],"sourcesContent":["'use strict';\n\nmodule.exports = ({ nexus, strapi }) => {\n const { nonNull } = nexus;\n\n return {\n type: 'UsersPermissionsDeleteRolePayload',\n\n args: {\n id: nonNull('ID'),\n },\n\n description: 'Delete an existing role',\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.params = { role: args.id };\n\n await strapi.plugin('users-permissions').controller('role').deleteRole(koaContext);\n\n return { ok: true };\n },\n };\n};\n"],"names":["deleteRole","nexus","strapi","nonNull","type","args","id","description","resolve","parent","context","koaContext","params","role","plugin","controller","ok"],"mappings":";;;;;;;AAEAA,IAAAA,UAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,OAAO,EAAE,GAAGF,KAAAA;QAEpB,OAAO;YACLG,IAAAA,EAAM,mCAAA;YAENC,IAAAA,EAAM;AACJC,gBAAAA,EAAAA,EAAIH,OAAAA,CAAQ,IAAA;AAClB,aAAA;YAEII,WAAAA,EAAa,yBAAA;AAEb,YAAA,MAAMC,OAAAA,CAAAA,CAAQC,MAAM,EAAEJ,IAAI,EAAEK,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;AAEvBC,gBAAAA,UAAAA,CAAWC,MAAM,GAAG;AAAEC,oBAAAA,IAAAA,EAAMR,KAAKC;AAAE,iBAAA;gBAEnC,MAAMJ,MAAAA,CAAOY,MAAM,CAAC,mBAAA,CAAA,CAAqBC,UAAU,CAAC,MAAA,CAAA,CAAQf,UAAU,CAACW,UAAAA,CAAAA;gBAEvE,OAAO;oBAAEK,EAAAA,EAAI;;AACnB,YAAA;AACA,SAAA;AACA,IAAA,CAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"delete-role.mjs","sources":["../../../../../../server/graphql/mutations/crud/role/delete-role.js"],"sourcesContent":["'use strict';\n\nmodule.exports = ({ nexus, strapi }) => {\n const { nonNull } = nexus;\n\n return {\n type: 'UsersPermissionsDeleteRolePayload',\n\n args: {\n id: nonNull('ID'),\n },\n\n description: 'Delete an existing role',\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.params = { role: args.id };\n\n await strapi.plugin('users-permissions').controller('role').deleteRole(koaContext);\n\n return { ok: true };\n },\n };\n};\n"],"names":["deleteRole","nexus","strapi","nonNull","type","args","id","description","resolve","parent","context","koaContext","params","role","plugin","controller","ok"],"mappings":";;;;;AAEAA,IAAAA,UAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,OAAO,EAAE,GAAGF,KAAAA;QAEpB,OAAO;YACLG,IAAM,EAAA,mCAAA;YAENC,IAAM,EAAA;AACJC,gBAAAA,EAAAA,EAAIH,OAAQ,CAAA,IAAA;AACb,aAAA;YAEDI,WAAa,EAAA,yBAAA;AAEb,YAAA,MAAMC,OAAQC,CAAAA,CAAAA,MAAM,EAAEJ,IAAI,EAAEK,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;AAEvBC,gBAAAA,UAAAA,CAAWC,MAAM,GAAG;AAAEC,oBAAAA,IAAAA,EAAMR,KAAKC;AAAE,iBAAA;gBAEnC,MAAMJ,MAAAA,CAAOY,MAAM,CAAC,mBAAA,CAAA,CAAqBC,UAAU,CAAC,MAAA,CAAA,CAAQf,UAAU,CAACW,UAAAA,CAAAA;gBAEvE,OAAO;oBAAEK,EAAI,EAAA;;AACd;AACL,SAAA;AACA,KAAA;;;;;;"}
1
+ {"version":3,"file":"delete-role.mjs","sources":["../../../../../../server/graphql/mutations/crud/role/delete-role.js"],"sourcesContent":["'use strict';\n\nmodule.exports = ({ nexus, strapi }) => {\n const { nonNull } = nexus;\n\n return {\n type: 'UsersPermissionsDeleteRolePayload',\n\n args: {\n id: nonNull('ID'),\n },\n\n description: 'Delete an existing role',\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.params = { role: args.id };\n\n await strapi.plugin('users-permissions').controller('role').deleteRole(koaContext);\n\n return { ok: true };\n },\n };\n};\n"],"names":["deleteRole","nexus","strapi","nonNull","type","args","id","description","resolve","parent","context","koaContext","params","role","plugin","controller","ok"],"mappings":";;;;;AAEAA,IAAAA,UAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,OAAO,EAAE,GAAGF,KAAAA;QAEpB,OAAO;YACLG,IAAAA,EAAM,mCAAA;YAENC,IAAAA,EAAM;AACJC,gBAAAA,EAAAA,EAAIH,OAAAA,CAAQ,IAAA;AAClB,aAAA;YAEII,WAAAA,EAAa,yBAAA;AAEb,YAAA,MAAMC,OAAAA,CAAAA,CAAQC,MAAM,EAAEJ,IAAI,EAAEK,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;AAEvBC,gBAAAA,UAAAA,CAAWC,MAAM,GAAG;AAAEC,oBAAAA,IAAAA,EAAMR,KAAKC;AAAE,iBAAA;gBAEnC,MAAMJ,MAAAA,CAAOY,MAAM,CAAC,mBAAA,CAAA,CAAqBC,UAAU,CAAC,MAAA,CAAA,CAAQf,UAAU,CAACW,UAAAA,CAAAA;gBAEvE,OAAO;oBAAEK,EAAAA,EAAI;;AACnB,YAAA;AACA,SAAA;AACA,IAAA,CAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"update-role.js","sources":["../../../../../../server/graphql/mutations/crud/role/update-role.js"],"sourcesContent":["'use strict';\n\nconst usersPermissionsRoleUID = 'plugin::users-permissions.role';\n\nmodule.exports = ({ nexus, strapi }) => {\n const { getContentTypeInputName } = strapi.plugin('graphql').service('utils').naming;\n const { nonNull } = nexus;\n\n const roleContentType = strapi.getModel(usersPermissionsRoleUID);\n\n const roleInputName = getContentTypeInputName(roleContentType);\n\n return {\n type: 'UsersPermissionsUpdateRolePayload',\n\n args: {\n id: nonNull('ID'),\n data: nonNull(roleInputName),\n },\n\n description: 'Update an existing role',\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.params = { role: args.id };\n koaContext.request.body = args.data;\n koaContext.request.body.role = args.id;\n\n await strapi.plugin('users-permissions').controller('role').updateRole(koaContext);\n\n return { ok: true };\n },\n };\n};\n"],"names":["usersPermissionsRoleUID","updateRole","nexus","strapi","getContentTypeInputName","plugin","service","naming","nonNull","roleContentType","getModel","roleInputName","type","args","id","data","description","resolve","parent","context","koaContext","params","role","request","body","controller","ok"],"mappings":";;;;;;;AAEA,IAAA,MAAMA,uBAA0B,GAAA,gCAAA;AAEhCC,IAAAA,UAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,uBAAuB,EAAE,GAAGD,MAAAA,CAAOE,MAAM,CAAC,SAAWC,CAAAA,CAAAA,OAAO,CAAC,OAAA,CAAA,CAASC,MAAM;QACpF,MAAM,EAAEC,OAAO,EAAE,GAAGN,KAAAA;QAEpB,MAAMO,eAAAA,GAAkBN,MAAOO,CAAAA,QAAQ,CAACV,uBAAAA,CAAAA;AAExC,QAAA,MAAMW,gBAAgBP,uBAAwBK,CAAAA,eAAAA,CAAAA;QAE9C,OAAO;YACLG,IAAM,EAAA,mCAAA;YAENC,IAAM,EAAA;AACJC,gBAAAA,EAAAA,EAAIN,OAAQ,CAAA,IAAA,CAAA;AACZO,gBAAAA,IAAAA,EAAMP,OAAQG,CAAAA,aAAAA;AACf,aAAA;YAEDK,WAAa,EAAA,yBAAA;AAEb,YAAA,MAAMC,OAAQC,CAAAA,CAAAA,MAAM,EAAEL,IAAI,EAAEM,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;AAEvBC,gBAAAA,UAAAA,CAAWC,MAAM,GAAG;AAAEC,oBAAAA,IAAAA,EAAMT,KAAKC;AAAE,iBAAA;AACnCM,gBAAAA,UAAAA,CAAWG,OAAO,CAACC,IAAI,GAAGX,KAAKE,IAAI;AACnCK,gBAAAA,UAAAA,CAAWG,OAAO,CAACC,IAAI,CAACF,IAAI,GAAGT,KAAKC,EAAE;gBAEtC,MAAMX,MAAAA,CAAOE,MAAM,CAAC,mBAAA,CAAA,CAAqBoB,UAAU,CAAC,MAAA,CAAA,CAAQxB,UAAU,CAACmB,UAAAA,CAAAA;gBAEvE,OAAO;oBAAEM,EAAI,EAAA;;AACd;AACL,SAAA;AACA,KAAA;;;;;;"}
1
+ {"version":3,"file":"update-role.js","sources":["../../../../../../server/graphql/mutations/crud/role/update-role.js"],"sourcesContent":["'use strict';\n\nconst usersPermissionsRoleUID = 'plugin::users-permissions.role';\n\nmodule.exports = ({ nexus, strapi }) => {\n const { getContentTypeInputName } = strapi.plugin('graphql').service('utils').naming;\n const { nonNull } = nexus;\n\n const roleContentType = strapi.getModel(usersPermissionsRoleUID);\n\n const roleInputName = getContentTypeInputName(roleContentType);\n\n return {\n type: 'UsersPermissionsUpdateRolePayload',\n\n args: {\n id: nonNull('ID'),\n data: nonNull(roleInputName),\n },\n\n description: 'Update an existing role',\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.params = { role: args.id };\n koaContext.request.body = args.data;\n koaContext.request.body.role = args.id;\n\n await strapi.plugin('users-permissions').controller('role').updateRole(koaContext);\n\n return { ok: true };\n },\n };\n};\n"],"names":["usersPermissionsRoleUID","updateRole","nexus","strapi","getContentTypeInputName","plugin","service","naming","nonNull","roleContentType","getModel","roleInputName","type","args","id","data","description","resolve","parent","context","koaContext","params","role","request","body","controller","ok"],"mappings":";;;;;;;AAEA,IAAA,MAAMA,uBAAAA,GAA0B,gCAAA;AAEhCC,IAAAA,UAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,uBAAuB,EAAE,GAAGD,MAAAA,CAAOE,MAAM,CAAC,SAAA,CAAA,CAAWC,OAAO,CAAC,OAAA,CAAA,CAASC,MAAM;QACpF,MAAM,EAAEC,OAAO,EAAE,GAAGN,KAAAA;QAEpB,MAAMO,eAAAA,GAAkBN,MAAAA,CAAOO,QAAQ,CAACV,uBAAAA,CAAAA;AAExC,QAAA,MAAMW,gBAAgBP,uBAAAA,CAAwBK,eAAAA,CAAAA;QAE9C,OAAO;YACLG,IAAAA,EAAM,mCAAA;YAENC,IAAAA,EAAM;AACJC,gBAAAA,EAAAA,EAAIN,OAAAA,CAAQ,IAAA,CAAA;AACZO,gBAAAA,IAAAA,EAAMP,OAAAA,CAAQG,aAAAA;AACpB,aAAA;YAEIK,WAAAA,EAAa,yBAAA;AAEb,YAAA,MAAMC,OAAAA,CAAAA,CAAQC,MAAM,EAAEL,IAAI,EAAEM,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;AAEvBC,gBAAAA,UAAAA,CAAWC,MAAM,GAAG;AAAEC,oBAAAA,IAAAA,EAAMT,KAAKC;AAAE,iBAAA;AACnCM,gBAAAA,UAAAA,CAAWG,OAAO,CAACC,IAAI,GAAGX,KAAKE,IAAI;AACnCK,gBAAAA,UAAAA,CAAWG,OAAO,CAACC,IAAI,CAACF,IAAI,GAAGT,KAAKC,EAAE;gBAEtC,MAAMX,MAAAA,CAAOE,MAAM,CAAC,mBAAA,CAAA,CAAqBoB,UAAU,CAAC,MAAA,CAAA,CAAQxB,UAAU,CAACmB,UAAAA,CAAAA;gBAEvE,OAAO;oBAAEM,EAAAA,EAAI;;AACnB,YAAA;AACA,SAAA;AACA,IAAA,CAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"update-role.mjs","sources":["../../../../../../server/graphql/mutations/crud/role/update-role.js"],"sourcesContent":["'use strict';\n\nconst usersPermissionsRoleUID = 'plugin::users-permissions.role';\n\nmodule.exports = ({ nexus, strapi }) => {\n const { getContentTypeInputName } = strapi.plugin('graphql').service('utils').naming;\n const { nonNull } = nexus;\n\n const roleContentType = strapi.getModel(usersPermissionsRoleUID);\n\n const roleInputName = getContentTypeInputName(roleContentType);\n\n return {\n type: 'UsersPermissionsUpdateRolePayload',\n\n args: {\n id: nonNull('ID'),\n data: nonNull(roleInputName),\n },\n\n description: 'Update an existing role',\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.params = { role: args.id };\n koaContext.request.body = args.data;\n koaContext.request.body.role = args.id;\n\n await strapi.plugin('users-permissions').controller('role').updateRole(koaContext);\n\n return { ok: true };\n },\n };\n};\n"],"names":["usersPermissionsRoleUID","updateRole","nexus","strapi","getContentTypeInputName","plugin","service","naming","nonNull","roleContentType","getModel","roleInputName","type","args","id","data","description","resolve","parent","context","koaContext","params","role","request","body","controller","ok"],"mappings":";;;;;AAEA,IAAA,MAAMA,uBAA0B,GAAA,gCAAA;AAEhCC,IAAAA,UAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,uBAAuB,EAAE,GAAGD,MAAAA,CAAOE,MAAM,CAAC,SAAWC,CAAAA,CAAAA,OAAO,CAAC,OAAA,CAAA,CAASC,MAAM;QACpF,MAAM,EAAEC,OAAO,EAAE,GAAGN,KAAAA;QAEpB,MAAMO,eAAAA,GAAkBN,MAAOO,CAAAA,QAAQ,CAACV,uBAAAA,CAAAA;AAExC,QAAA,MAAMW,gBAAgBP,uBAAwBK,CAAAA,eAAAA,CAAAA;QAE9C,OAAO;YACLG,IAAM,EAAA,mCAAA;YAENC,IAAM,EAAA;AACJC,gBAAAA,EAAAA,EAAIN,OAAQ,CAAA,IAAA,CAAA;AACZO,gBAAAA,IAAAA,EAAMP,OAAQG,CAAAA,aAAAA;AACf,aAAA;YAEDK,WAAa,EAAA,yBAAA;AAEb,YAAA,MAAMC,OAAQC,CAAAA,CAAAA,MAAM,EAAEL,IAAI,EAAEM,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;AAEvBC,gBAAAA,UAAAA,CAAWC,MAAM,GAAG;AAAEC,oBAAAA,IAAAA,EAAMT,KAAKC;AAAE,iBAAA;AACnCM,gBAAAA,UAAAA,CAAWG,OAAO,CAACC,IAAI,GAAGX,KAAKE,IAAI;AACnCK,gBAAAA,UAAAA,CAAWG,OAAO,CAACC,IAAI,CAACF,IAAI,GAAGT,KAAKC,EAAE;gBAEtC,MAAMX,MAAAA,CAAOE,MAAM,CAAC,mBAAA,CAAA,CAAqBoB,UAAU,CAAC,MAAA,CAAA,CAAQxB,UAAU,CAACmB,UAAAA,CAAAA;gBAEvE,OAAO;oBAAEM,EAAI,EAAA;;AACd;AACL,SAAA;AACA,KAAA;;;;;;"}
1
+ {"version":3,"file":"update-role.mjs","sources":["../../../../../../server/graphql/mutations/crud/role/update-role.js"],"sourcesContent":["'use strict';\n\nconst usersPermissionsRoleUID = 'plugin::users-permissions.role';\n\nmodule.exports = ({ nexus, strapi }) => {\n const { getContentTypeInputName } = strapi.plugin('graphql').service('utils').naming;\n const { nonNull } = nexus;\n\n const roleContentType = strapi.getModel(usersPermissionsRoleUID);\n\n const roleInputName = getContentTypeInputName(roleContentType);\n\n return {\n type: 'UsersPermissionsUpdateRolePayload',\n\n args: {\n id: nonNull('ID'),\n data: nonNull(roleInputName),\n },\n\n description: 'Update an existing role',\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.params = { role: args.id };\n koaContext.request.body = args.data;\n koaContext.request.body.role = args.id;\n\n await strapi.plugin('users-permissions').controller('role').updateRole(koaContext);\n\n return { ok: true };\n },\n };\n};\n"],"names":["usersPermissionsRoleUID","updateRole","nexus","strapi","getContentTypeInputName","plugin","service","naming","nonNull","roleContentType","getModel","roleInputName","type","args","id","data","description","resolve","parent","context","koaContext","params","role","request","body","controller","ok"],"mappings":";;;;;AAEA,IAAA,MAAMA,uBAAAA,GAA0B,gCAAA;AAEhCC,IAAAA,UAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,uBAAuB,EAAE,GAAGD,MAAAA,CAAOE,MAAM,CAAC,SAAA,CAAA,CAAWC,OAAO,CAAC,OAAA,CAAA,CAASC,MAAM;QACpF,MAAM,EAAEC,OAAO,EAAE,GAAGN,KAAAA;QAEpB,MAAMO,eAAAA,GAAkBN,MAAAA,CAAOO,QAAQ,CAACV,uBAAAA,CAAAA;AAExC,QAAA,MAAMW,gBAAgBP,uBAAAA,CAAwBK,eAAAA,CAAAA;QAE9C,OAAO;YACLG,IAAAA,EAAM,mCAAA;YAENC,IAAAA,EAAM;AACJC,gBAAAA,EAAAA,EAAIN,OAAAA,CAAQ,IAAA,CAAA;AACZO,gBAAAA,IAAAA,EAAMP,OAAAA,CAAQG,aAAAA;AACpB,aAAA;YAEIK,WAAAA,EAAa,yBAAA;AAEb,YAAA,MAAMC,OAAAA,CAAAA,CAAQC,MAAM,EAAEL,IAAI,EAAEM,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;AAEvBC,gBAAAA,UAAAA,CAAWC,MAAM,GAAG;AAAEC,oBAAAA,IAAAA,EAAMT,KAAKC;AAAE,iBAAA;AACnCM,gBAAAA,UAAAA,CAAWG,OAAO,CAACC,IAAI,GAAGX,KAAKE,IAAI;AACnCK,gBAAAA,UAAAA,CAAWG,OAAO,CAACC,IAAI,CAACF,IAAI,GAAGT,KAAKC,EAAE;gBAEtC,MAAMX,MAAAA,CAAOE,MAAM,CAAC,mBAAA,CAAA,CAAqBoB,UAAU,CAAC,MAAA,CAAA,CAAQxB,UAAU,CAACmB,UAAAA,CAAAA;gBAEvE,OAAO;oBAAEM,EAAAA,EAAI;;AACnB,YAAA;AACA,SAAA;AACA,IAAA,CAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"create-user.js","sources":["../../../../../../server/graphql/mutations/crud/user/create-user.js"],"sourcesContent":["'use strict';\n\nconst { toPlainObject } = require('lodash/fp');\n\nconst { checkBadRequest } = require('../../../utils');\n\nconst usersPermissionsUserUID = 'plugin::users-permissions.user';\n\nmodule.exports = ({ nexus, strapi }) => {\n const { nonNull } = nexus;\n const { getContentTypeInputName, getEntityResponseName } = strapi\n .plugin('graphql')\n .service('utils').naming;\n\n const userContentType = strapi.getModel(usersPermissionsUserUID);\n\n const userInputName = getContentTypeInputName(userContentType);\n const responseName = getEntityResponseName(userContentType);\n\n return {\n type: nonNull(responseName),\n\n args: {\n data: nonNull(userInputName),\n },\n\n description: 'Create a new user',\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.params = {};\n koaContext.request.body = toPlainObject(args.data);\n\n await strapi.plugin('users-permissions').controller('user').create(koaContext);\n\n checkBadRequest(koaContext.body);\n\n return {\n value: koaContext.body,\n info: { args, resourceUID: 'plugin::users-permissions.user' },\n };\n },\n };\n};\n"],"names":["toPlainObject","require$$0","checkBadRequest","require$$1","usersPermissionsUserUID","createUser","nexus","strapi","nonNull","getContentTypeInputName","getEntityResponseName","plugin","service","naming","userContentType","getModel","userInputName","responseName","type","args","data","description","resolve","parent","context","koaContext","params","request","body","controller","create","value","info","resourceUID"],"mappings":";;;;;;;;;;IAEA,MAAM,EAAEA,aAAa,EAAE,GAAGC,UAAAA;IAE1B,MAAM,EAAEC,eAAe,EAAE,GAAGC,eAAAA,EAAAA;AAE5B,IAAA,MAAMC,uBAA0B,GAAA,gCAAA;AAEhCC,IAAAA,UAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,OAAO,EAAE,GAAGF,KAAAA;AACpB,QAAA,MAAM,EAAEG,uBAAuB,EAAEC,qBAAqB,EAAE,GAAGH,MACxDI,CAAAA,MAAM,CAAC,SAAA,CAAA,CACPC,OAAO,CAAC,SAASC,MAAM;QAE1B,MAAMC,eAAAA,GAAkBP,MAAOQ,CAAAA,QAAQ,CAACX,uBAAAA,CAAAA;AAExC,QAAA,MAAMY,gBAAgBP,uBAAwBK,CAAAA,eAAAA,CAAAA;AAC9C,QAAA,MAAMG,eAAeP,qBAAsBI,CAAAA,eAAAA,CAAAA;QAE3C,OAAO;AACLI,YAAAA,IAAAA,EAAMV,OAAQS,CAAAA,YAAAA,CAAAA;YAEdE,IAAM,EAAA;AACJC,gBAAAA,IAAAA,EAAMZ,OAAQQ,CAAAA,aAAAA;AACf,aAAA;YAEDK,WAAa,EAAA,mBAAA;AAEb,YAAA,MAAMC,OAAQC,CAAAA,CAAAA,MAAM,EAAEJ,IAAI,EAAEK,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;gBAEvBC,UAAWC,CAAAA,MAAM,GAAG;AACpBD,gBAAAA,UAAAA,CAAWE,OAAO,CAACC,IAAI,GAAG5B,aAAAA,CAAcmB,KAAKC,IAAI,CAAA;gBAEjD,MAAMb,MAAAA,CAAOI,MAAM,CAAC,mBAAA,CAAA,CAAqBkB,UAAU,CAAC,MAAA,CAAA,CAAQC,MAAM,CAACL,UAAAA,CAAAA;AAEnEvB,gBAAAA,eAAAA,CAAgBuB,WAAWG,IAAI,CAAA;gBAE/B,OAAO;AACLG,oBAAAA,KAAAA,EAAON,WAAWG,IAAI;oBACtBI,IAAM,EAAA;AAAEb,wBAAAA,IAAAA;wBAAMc,WAAa,EAAA;AAAkC;AACrE,iBAAA;AACK;AACL,SAAA;AACA,KAAA;;;;;;"}
1
+ {"version":3,"file":"create-user.js","sources":["../../../../../../server/graphql/mutations/crud/user/create-user.js"],"sourcesContent":["'use strict';\n\nconst { toPlainObject } = require('lodash/fp');\n\nconst { checkBadRequest } = require('../../../utils');\n\nconst usersPermissionsUserUID = 'plugin::users-permissions.user';\n\nmodule.exports = ({ nexus, strapi }) => {\n const { nonNull } = nexus;\n const { getContentTypeInputName, getEntityResponseName } = strapi\n .plugin('graphql')\n .service('utils').naming;\n\n const userContentType = strapi.getModel(usersPermissionsUserUID);\n\n const userInputName = getContentTypeInputName(userContentType);\n const responseName = getEntityResponseName(userContentType);\n\n return {\n type: nonNull(responseName),\n\n args: {\n data: nonNull(userInputName),\n },\n\n description: 'Create a new user',\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.params = {};\n koaContext.request.body = toPlainObject(args.data);\n\n await strapi.plugin('users-permissions').controller('user').create(koaContext);\n\n checkBadRequest(koaContext.body);\n\n return {\n value: koaContext.body,\n info: { args, resourceUID: 'plugin::users-permissions.user' },\n };\n },\n };\n};\n"],"names":["toPlainObject","require$$0","checkBadRequest","require$$1","usersPermissionsUserUID","createUser","nexus","strapi","nonNull","getContentTypeInputName","getEntityResponseName","plugin","service","naming","userContentType","getModel","userInputName","responseName","type","args","data","description","resolve","parent","context","koaContext","params","request","body","controller","create","value","info","resourceUID"],"mappings":";;;;;;;;;;IAEA,MAAM,EAAEA,aAAa,EAAE,GAAGC,UAAAA;IAE1B,MAAM,EAAEC,eAAe,EAAE,GAAGC,eAAAA,EAAAA;AAE5B,IAAA,MAAMC,uBAAAA,GAA0B,gCAAA;AAEhCC,IAAAA,UAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,OAAO,EAAE,GAAGF,KAAAA;AACpB,QAAA,MAAM,EAAEG,uBAAuB,EAAEC,qBAAqB,EAAE,GAAGH,MAAAA,CACxDI,MAAM,CAAC,SAAA,CAAA,CACPC,OAAO,CAAC,SAASC,MAAM;QAE1B,MAAMC,eAAAA,GAAkBP,MAAAA,CAAOQ,QAAQ,CAACX,uBAAAA,CAAAA;AAExC,QAAA,MAAMY,gBAAgBP,uBAAAA,CAAwBK,eAAAA,CAAAA;AAC9C,QAAA,MAAMG,eAAeP,qBAAAA,CAAsBI,eAAAA,CAAAA;QAE3C,OAAO;AACLI,YAAAA,IAAAA,EAAMV,OAAAA,CAAQS,YAAAA,CAAAA;YAEdE,IAAAA,EAAM;AACJC,gBAAAA,IAAAA,EAAMZ,OAAAA,CAAQQ,aAAAA;AACpB,aAAA;YAEIK,WAAAA,EAAa,mBAAA;AAEb,YAAA,MAAMC,OAAAA,CAAAA,CAAQC,MAAM,EAAEJ,IAAI,EAAEK,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;gBAEvBC,UAAAA,CAAWC,MAAM,GAAG;AACpBD,gBAAAA,UAAAA,CAAWE,OAAO,CAACC,IAAI,GAAG5B,aAAAA,CAAcmB,KAAKC,IAAI,CAAA;gBAEjD,MAAMb,MAAAA,CAAOI,MAAM,CAAC,mBAAA,CAAA,CAAqBkB,UAAU,CAAC,MAAA,CAAA,CAAQC,MAAM,CAACL,UAAAA,CAAAA;AAEnEvB,gBAAAA,eAAAA,CAAgBuB,WAAWG,IAAI,CAAA;gBAE/B,OAAO;AACLG,oBAAAA,KAAAA,EAAON,WAAWG,IAAI;oBACtBI,IAAAA,EAAM;AAAEb,wBAAAA,IAAAA;wBAAMc,WAAAA,EAAa;AAAgC;AACnE,iBAAA;AACA,YAAA;AACA,SAAA;AACA,IAAA,CAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"create-user.mjs","sources":["../../../../../../server/graphql/mutations/crud/user/create-user.js"],"sourcesContent":["'use strict';\n\nconst { toPlainObject } = require('lodash/fp');\n\nconst { checkBadRequest } = require('../../../utils');\n\nconst usersPermissionsUserUID = 'plugin::users-permissions.user';\n\nmodule.exports = ({ nexus, strapi }) => {\n const { nonNull } = nexus;\n const { getContentTypeInputName, getEntityResponseName } = strapi\n .plugin('graphql')\n .service('utils').naming;\n\n const userContentType = strapi.getModel(usersPermissionsUserUID);\n\n const userInputName = getContentTypeInputName(userContentType);\n const responseName = getEntityResponseName(userContentType);\n\n return {\n type: nonNull(responseName),\n\n args: {\n data: nonNull(userInputName),\n },\n\n description: 'Create a new user',\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.params = {};\n koaContext.request.body = toPlainObject(args.data);\n\n await strapi.plugin('users-permissions').controller('user').create(koaContext);\n\n checkBadRequest(koaContext.body);\n\n return {\n value: koaContext.body,\n info: { args, resourceUID: 'plugin::users-permissions.user' },\n };\n },\n };\n};\n"],"names":["toPlainObject","require$$0","checkBadRequest","require$$1","usersPermissionsUserUID","createUser","nexus","strapi","nonNull","getContentTypeInputName","getEntityResponseName","plugin","service","naming","userContentType","getModel","userInputName","responseName","type","args","data","description","resolve","parent","context","koaContext","params","request","body","controller","create","value","info","resourceUID"],"mappings":";;;;;;;;IAEA,MAAM,EAAEA,aAAa,EAAE,GAAGC,UAAAA;IAE1B,MAAM,EAAEC,eAAe,EAAE,GAAGC,YAAAA,EAAAA;AAE5B,IAAA,MAAMC,uBAA0B,GAAA,gCAAA;AAEhCC,IAAAA,UAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,OAAO,EAAE,GAAGF,KAAAA;AACpB,QAAA,MAAM,EAAEG,uBAAuB,EAAEC,qBAAqB,EAAE,GAAGH,MACxDI,CAAAA,MAAM,CAAC,SAAA,CAAA,CACPC,OAAO,CAAC,SAASC,MAAM;QAE1B,MAAMC,eAAAA,GAAkBP,MAAOQ,CAAAA,QAAQ,CAACX,uBAAAA,CAAAA;AAExC,QAAA,MAAMY,gBAAgBP,uBAAwBK,CAAAA,eAAAA,CAAAA;AAC9C,QAAA,MAAMG,eAAeP,qBAAsBI,CAAAA,eAAAA,CAAAA;QAE3C,OAAO;AACLI,YAAAA,IAAAA,EAAMV,OAAQS,CAAAA,YAAAA,CAAAA;YAEdE,IAAM,EAAA;AACJC,gBAAAA,IAAAA,EAAMZ,OAAQQ,CAAAA,aAAAA;AACf,aAAA;YAEDK,WAAa,EAAA,mBAAA;AAEb,YAAA,MAAMC,OAAQC,CAAAA,CAAAA,MAAM,EAAEJ,IAAI,EAAEK,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;gBAEvBC,UAAWC,CAAAA,MAAM,GAAG;AACpBD,gBAAAA,UAAAA,CAAWE,OAAO,CAACC,IAAI,GAAG5B,aAAAA,CAAcmB,KAAKC,IAAI,CAAA;gBAEjD,MAAMb,MAAAA,CAAOI,MAAM,CAAC,mBAAA,CAAA,CAAqBkB,UAAU,CAAC,MAAA,CAAA,CAAQC,MAAM,CAACL,UAAAA,CAAAA;AAEnEvB,gBAAAA,eAAAA,CAAgBuB,WAAWG,IAAI,CAAA;gBAE/B,OAAO;AACLG,oBAAAA,KAAAA,EAAON,WAAWG,IAAI;oBACtBI,IAAM,EAAA;AAAEb,wBAAAA,IAAAA;wBAAMc,WAAa,EAAA;AAAkC;AACrE,iBAAA;AACK;AACL,SAAA;AACA,KAAA;;;;;;"}
1
+ {"version":3,"file":"create-user.mjs","sources":["../../../../../../server/graphql/mutations/crud/user/create-user.js"],"sourcesContent":["'use strict';\n\nconst { toPlainObject } = require('lodash/fp');\n\nconst { checkBadRequest } = require('../../../utils');\n\nconst usersPermissionsUserUID = 'plugin::users-permissions.user';\n\nmodule.exports = ({ nexus, strapi }) => {\n const { nonNull } = nexus;\n const { getContentTypeInputName, getEntityResponseName } = strapi\n .plugin('graphql')\n .service('utils').naming;\n\n const userContentType = strapi.getModel(usersPermissionsUserUID);\n\n const userInputName = getContentTypeInputName(userContentType);\n const responseName = getEntityResponseName(userContentType);\n\n return {\n type: nonNull(responseName),\n\n args: {\n data: nonNull(userInputName),\n },\n\n description: 'Create a new user',\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.params = {};\n koaContext.request.body = toPlainObject(args.data);\n\n await strapi.plugin('users-permissions').controller('user').create(koaContext);\n\n checkBadRequest(koaContext.body);\n\n return {\n value: koaContext.body,\n info: { args, resourceUID: 'plugin::users-permissions.user' },\n };\n },\n };\n};\n"],"names":["toPlainObject","require$$0","checkBadRequest","require$$1","usersPermissionsUserUID","createUser","nexus","strapi","nonNull","getContentTypeInputName","getEntityResponseName","plugin","service","naming","userContentType","getModel","userInputName","responseName","type","args","data","description","resolve","parent","context","koaContext","params","request","body","controller","create","value","info","resourceUID"],"mappings":";;;;;;;;IAEA,MAAM,EAAEA,aAAa,EAAE,GAAGC,UAAAA;IAE1B,MAAM,EAAEC,eAAe,EAAE,GAAGC,YAAAA,EAAAA;AAE5B,IAAA,MAAMC,uBAAAA,GAA0B,gCAAA;AAEhCC,IAAAA,UAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,OAAO,EAAE,GAAGF,KAAAA;AACpB,QAAA,MAAM,EAAEG,uBAAuB,EAAEC,qBAAqB,EAAE,GAAGH,MAAAA,CACxDI,MAAM,CAAC,SAAA,CAAA,CACPC,OAAO,CAAC,SAASC,MAAM;QAE1B,MAAMC,eAAAA,GAAkBP,MAAAA,CAAOQ,QAAQ,CAACX,uBAAAA,CAAAA;AAExC,QAAA,MAAMY,gBAAgBP,uBAAAA,CAAwBK,eAAAA,CAAAA;AAC9C,QAAA,MAAMG,eAAeP,qBAAAA,CAAsBI,eAAAA,CAAAA;QAE3C,OAAO;AACLI,YAAAA,IAAAA,EAAMV,OAAAA,CAAQS,YAAAA,CAAAA;YAEdE,IAAAA,EAAM;AACJC,gBAAAA,IAAAA,EAAMZ,OAAAA,CAAQQ,aAAAA;AACpB,aAAA;YAEIK,WAAAA,EAAa,mBAAA;AAEb,YAAA,MAAMC,OAAAA,CAAAA,CAAQC,MAAM,EAAEJ,IAAI,EAAEK,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;gBAEvBC,UAAAA,CAAWC,MAAM,GAAG;AACpBD,gBAAAA,UAAAA,CAAWE,OAAO,CAACC,IAAI,GAAG5B,aAAAA,CAAcmB,KAAKC,IAAI,CAAA;gBAEjD,MAAMb,MAAAA,CAAOI,MAAM,CAAC,mBAAA,CAAA,CAAqBkB,UAAU,CAAC,MAAA,CAAA,CAAQC,MAAM,CAACL,UAAAA,CAAAA;AAEnEvB,gBAAAA,eAAAA,CAAgBuB,WAAWG,IAAI,CAAA;gBAE/B,OAAO;AACLG,oBAAAA,KAAAA,EAAON,WAAWG,IAAI;oBACtBI,IAAAA,EAAM;AAAEb,wBAAAA,IAAAA;wBAAMc,WAAAA,EAAa;AAAgC;AACnE,iBAAA;AACA,YAAA;AACA,SAAA;AACA,IAAA,CAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"delete-user.js","sources":["../../../../../../server/graphql/mutations/crud/user/delete-user.js"],"sourcesContent":["'use strict';\n\nconst { checkBadRequest } = require('../../../utils');\n\nconst usersPermissionsUserUID = 'plugin::users-permissions.user';\n\nmodule.exports = ({ nexus, strapi }) => {\n const { nonNull } = nexus;\n const { getEntityResponseName } = strapi.plugin('graphql').service('utils').naming;\n\n const userContentType = strapi.getModel(usersPermissionsUserUID);\n\n const responseName = getEntityResponseName(userContentType);\n\n return {\n type: nonNull(responseName),\n\n args: {\n id: nonNull('ID'),\n },\n\n description: 'Delete an existing user',\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.params = { id: args.id };\n\n await strapi.plugin('users-permissions').controller('user').destroy(koaContext);\n\n checkBadRequest(koaContext.body);\n\n return {\n value: koaContext.body,\n info: { args, resourceUID: 'plugin::users-permissions.user' },\n };\n },\n };\n};\n"],"names":["checkBadRequest","require$$0","usersPermissionsUserUID","deleteUser","nexus","strapi","nonNull","getEntityResponseName","plugin","service","naming","userContentType","getModel","responseName","type","args","id","description","resolve","parent","context","koaContext","params","controller","destroy","body","value","info","resourceUID"],"mappings":";;;;;;;;;IAEA,MAAM,EAAEA,eAAe,EAAE,GAAGC,eAAAA,EAAAA;AAE5B,IAAA,MAAMC,uBAA0B,GAAA,gCAAA;AAEhCC,IAAAA,UAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,OAAO,EAAE,GAAGF,KAAAA;QACpB,MAAM,EAAEG,qBAAqB,EAAE,GAAGF,MAAAA,CAAOG,MAAM,CAAC,SAAWC,CAAAA,CAAAA,OAAO,CAAC,OAAA,CAAA,CAASC,MAAM;QAElF,MAAMC,eAAAA,GAAkBN,MAAOO,CAAAA,QAAQ,CAACV,uBAAAA,CAAAA;AAExC,QAAA,MAAMW,eAAeN,qBAAsBI,CAAAA,eAAAA,CAAAA;QAE3C,OAAO;AACLG,YAAAA,IAAAA,EAAMR,OAAQO,CAAAA,YAAAA,CAAAA;YAEdE,IAAM,EAAA;AACJC,gBAAAA,EAAAA,EAAIV,OAAQ,CAAA,IAAA;AACb,aAAA;YAEDW,WAAa,EAAA,yBAAA;AAEb,YAAA,MAAMC,OAAQC,CAAAA,CAAAA,MAAM,EAAEJ,IAAI,EAAEK,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;AAEvBC,gBAAAA,UAAAA,CAAWC,MAAM,GAAG;AAAEN,oBAAAA,EAAAA,EAAID,KAAKC;AAAE,iBAAA;gBAEjC,MAAMX,MAAAA,CAAOG,MAAM,CAAC,mBAAA,CAAA,CAAqBe,UAAU,CAAC,MAAA,CAAA,CAAQC,OAAO,CAACH,UAAAA,CAAAA;AAEpErB,gBAAAA,eAAAA,CAAgBqB,WAAWI,IAAI,CAAA;gBAE/B,OAAO;AACLC,oBAAAA,KAAAA,EAAOL,WAAWI,IAAI;oBACtBE,IAAM,EAAA;AAAEZ,wBAAAA,IAAAA;wBAAMa,WAAa,EAAA;AAAkC;AACrE,iBAAA;AACK;AACL,SAAA;AACA,KAAA;;;;;;"}
1
+ {"version":3,"file":"delete-user.js","sources":["../../../../../../server/graphql/mutations/crud/user/delete-user.js"],"sourcesContent":["'use strict';\n\nconst { checkBadRequest } = require('../../../utils');\n\nconst usersPermissionsUserUID = 'plugin::users-permissions.user';\n\nmodule.exports = ({ nexus, strapi }) => {\n const { nonNull } = nexus;\n const { getEntityResponseName } = strapi.plugin('graphql').service('utils').naming;\n\n const userContentType = strapi.getModel(usersPermissionsUserUID);\n\n const responseName = getEntityResponseName(userContentType);\n\n return {\n type: nonNull(responseName),\n\n args: {\n id: nonNull('ID'),\n },\n\n description: 'Delete an existing user',\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.params = { id: args.id };\n\n await strapi.plugin('users-permissions').controller('user').destroy(koaContext);\n\n checkBadRequest(koaContext.body);\n\n return {\n value: koaContext.body,\n info: { args, resourceUID: 'plugin::users-permissions.user' },\n };\n },\n };\n};\n"],"names":["checkBadRequest","require$$0","usersPermissionsUserUID","deleteUser","nexus","strapi","nonNull","getEntityResponseName","plugin","service","naming","userContentType","getModel","responseName","type","args","id","description","resolve","parent","context","koaContext","params","controller","destroy","body","value","info","resourceUID"],"mappings":";;;;;;;;;IAEA,MAAM,EAAEA,eAAe,EAAE,GAAGC,eAAAA,EAAAA;AAE5B,IAAA,MAAMC,uBAAAA,GAA0B,gCAAA;AAEhCC,IAAAA,UAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,OAAO,EAAE,GAAGF,KAAAA;QACpB,MAAM,EAAEG,qBAAqB,EAAE,GAAGF,MAAAA,CAAOG,MAAM,CAAC,SAAA,CAAA,CAAWC,OAAO,CAAC,OAAA,CAAA,CAASC,MAAM;QAElF,MAAMC,eAAAA,GAAkBN,MAAAA,CAAOO,QAAQ,CAACV,uBAAAA,CAAAA;AAExC,QAAA,MAAMW,eAAeN,qBAAAA,CAAsBI,eAAAA,CAAAA;QAE3C,OAAO;AACLG,YAAAA,IAAAA,EAAMR,OAAAA,CAAQO,YAAAA,CAAAA;YAEdE,IAAAA,EAAM;AACJC,gBAAAA,EAAAA,EAAIV,OAAAA,CAAQ,IAAA;AAClB,aAAA;YAEIW,WAAAA,EAAa,yBAAA;AAEb,YAAA,MAAMC,OAAAA,CAAAA,CAAQC,MAAM,EAAEJ,IAAI,EAAEK,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;AAEvBC,gBAAAA,UAAAA,CAAWC,MAAM,GAAG;AAAEN,oBAAAA,EAAAA,EAAID,KAAKC;AAAE,iBAAA;gBAEjC,MAAMX,MAAAA,CAAOG,MAAM,CAAC,mBAAA,CAAA,CAAqBe,UAAU,CAAC,MAAA,CAAA,CAAQC,OAAO,CAACH,UAAAA,CAAAA;AAEpErB,gBAAAA,eAAAA,CAAgBqB,WAAWI,IAAI,CAAA;gBAE/B,OAAO;AACLC,oBAAAA,KAAAA,EAAOL,WAAWI,IAAI;oBACtBE,IAAAA,EAAM;AAAEZ,wBAAAA,IAAAA;wBAAMa,WAAAA,EAAa;AAAgC;AACnE,iBAAA;AACA,YAAA;AACA,SAAA;AACA,IAAA,CAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"delete-user.mjs","sources":["../../../../../../server/graphql/mutations/crud/user/delete-user.js"],"sourcesContent":["'use strict';\n\nconst { checkBadRequest } = require('../../../utils');\n\nconst usersPermissionsUserUID = 'plugin::users-permissions.user';\n\nmodule.exports = ({ nexus, strapi }) => {\n const { nonNull } = nexus;\n const { getEntityResponseName } = strapi.plugin('graphql').service('utils').naming;\n\n const userContentType = strapi.getModel(usersPermissionsUserUID);\n\n const responseName = getEntityResponseName(userContentType);\n\n return {\n type: nonNull(responseName),\n\n args: {\n id: nonNull('ID'),\n },\n\n description: 'Delete an existing user',\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.params = { id: args.id };\n\n await strapi.plugin('users-permissions').controller('user').destroy(koaContext);\n\n checkBadRequest(koaContext.body);\n\n return {\n value: koaContext.body,\n info: { args, resourceUID: 'plugin::users-permissions.user' },\n };\n },\n };\n};\n"],"names":["checkBadRequest","require$$0","usersPermissionsUserUID","deleteUser","nexus","strapi","nonNull","getEntityResponseName","plugin","service","naming","userContentType","getModel","responseName","type","args","id","description","resolve","parent","context","koaContext","params","controller","destroy","body","value","info","resourceUID"],"mappings":";;;;;;;IAEA,MAAM,EAAEA,eAAe,EAAE,GAAGC,YAAAA,EAAAA;AAE5B,IAAA,MAAMC,uBAA0B,GAAA,gCAAA;AAEhCC,IAAAA,UAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,OAAO,EAAE,GAAGF,KAAAA;QACpB,MAAM,EAAEG,qBAAqB,EAAE,GAAGF,MAAAA,CAAOG,MAAM,CAAC,SAAWC,CAAAA,CAAAA,OAAO,CAAC,OAAA,CAAA,CAASC,MAAM;QAElF,MAAMC,eAAAA,GAAkBN,MAAOO,CAAAA,QAAQ,CAACV,uBAAAA,CAAAA;AAExC,QAAA,MAAMW,eAAeN,qBAAsBI,CAAAA,eAAAA,CAAAA;QAE3C,OAAO;AACLG,YAAAA,IAAAA,EAAMR,OAAQO,CAAAA,YAAAA,CAAAA;YAEdE,IAAM,EAAA;AACJC,gBAAAA,EAAAA,EAAIV,OAAQ,CAAA,IAAA;AACb,aAAA;YAEDW,WAAa,EAAA,yBAAA;AAEb,YAAA,MAAMC,OAAQC,CAAAA,CAAAA,MAAM,EAAEJ,IAAI,EAAEK,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;AAEvBC,gBAAAA,UAAAA,CAAWC,MAAM,GAAG;AAAEN,oBAAAA,EAAAA,EAAID,KAAKC;AAAE,iBAAA;gBAEjC,MAAMX,MAAAA,CAAOG,MAAM,CAAC,mBAAA,CAAA,CAAqBe,UAAU,CAAC,MAAA,CAAA,CAAQC,OAAO,CAACH,UAAAA,CAAAA;AAEpErB,gBAAAA,eAAAA,CAAgBqB,WAAWI,IAAI,CAAA;gBAE/B,OAAO;AACLC,oBAAAA,KAAAA,EAAOL,WAAWI,IAAI;oBACtBE,IAAM,EAAA;AAAEZ,wBAAAA,IAAAA;wBAAMa,WAAa,EAAA;AAAkC;AACrE,iBAAA;AACK;AACL,SAAA;AACA,KAAA;;;;;;"}
1
+ {"version":3,"file":"delete-user.mjs","sources":["../../../../../../server/graphql/mutations/crud/user/delete-user.js"],"sourcesContent":["'use strict';\n\nconst { checkBadRequest } = require('../../../utils');\n\nconst usersPermissionsUserUID = 'plugin::users-permissions.user';\n\nmodule.exports = ({ nexus, strapi }) => {\n const { nonNull } = nexus;\n const { getEntityResponseName } = strapi.plugin('graphql').service('utils').naming;\n\n const userContentType = strapi.getModel(usersPermissionsUserUID);\n\n const responseName = getEntityResponseName(userContentType);\n\n return {\n type: nonNull(responseName),\n\n args: {\n id: nonNull('ID'),\n },\n\n description: 'Delete an existing user',\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.params = { id: args.id };\n\n await strapi.plugin('users-permissions').controller('user').destroy(koaContext);\n\n checkBadRequest(koaContext.body);\n\n return {\n value: koaContext.body,\n info: { args, resourceUID: 'plugin::users-permissions.user' },\n };\n },\n };\n};\n"],"names":["checkBadRequest","require$$0","usersPermissionsUserUID","deleteUser","nexus","strapi","nonNull","getEntityResponseName","plugin","service","naming","userContentType","getModel","responseName","type","args","id","description","resolve","parent","context","koaContext","params","controller","destroy","body","value","info","resourceUID"],"mappings":";;;;;;;IAEA,MAAM,EAAEA,eAAe,EAAE,GAAGC,YAAAA,EAAAA;AAE5B,IAAA,MAAMC,uBAAAA,GAA0B,gCAAA;AAEhCC,IAAAA,UAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,OAAO,EAAE,GAAGF,KAAAA;QACpB,MAAM,EAAEG,qBAAqB,EAAE,GAAGF,MAAAA,CAAOG,MAAM,CAAC,SAAA,CAAA,CAAWC,OAAO,CAAC,OAAA,CAAA,CAASC,MAAM;QAElF,MAAMC,eAAAA,GAAkBN,MAAAA,CAAOO,QAAQ,CAACV,uBAAAA,CAAAA;AAExC,QAAA,MAAMW,eAAeN,qBAAAA,CAAsBI,eAAAA,CAAAA;QAE3C,OAAO;AACLG,YAAAA,IAAAA,EAAMR,OAAAA,CAAQO,YAAAA,CAAAA;YAEdE,IAAAA,EAAM;AACJC,gBAAAA,EAAAA,EAAIV,OAAAA,CAAQ,IAAA;AAClB,aAAA;YAEIW,WAAAA,EAAa,yBAAA;AAEb,YAAA,MAAMC,OAAAA,CAAAA,CAAQC,MAAM,EAAEJ,IAAI,EAAEK,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;AAEvBC,gBAAAA,UAAAA,CAAWC,MAAM,GAAG;AAAEN,oBAAAA,EAAAA,EAAID,KAAKC;AAAE,iBAAA;gBAEjC,MAAMX,MAAAA,CAAOG,MAAM,CAAC,mBAAA,CAAA,CAAqBe,UAAU,CAAC,MAAA,CAAA,CAAQC,OAAO,CAACH,UAAAA,CAAAA;AAEpErB,gBAAAA,eAAAA,CAAgBqB,WAAWI,IAAI,CAAA;gBAE/B,OAAO;AACLC,oBAAAA,KAAAA,EAAOL,WAAWI,IAAI;oBACtBE,IAAAA,EAAM;AAAEZ,wBAAAA,IAAAA;wBAAMa,WAAAA,EAAa;AAAgC;AACnE,iBAAA;AACA,YAAA;AACA,SAAA;AACA,IAAA,CAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"update-user.js","sources":["../../../../../../server/graphql/mutations/crud/user/update-user.js"],"sourcesContent":["'use strict';\n\nconst { toPlainObject } = require('lodash/fp');\n\nconst { checkBadRequest } = require('../../../utils');\n\nconst usersPermissionsUserUID = 'plugin::users-permissions.user';\n\nmodule.exports = ({ nexus, strapi }) => {\n const { nonNull } = nexus;\n const { getContentTypeInputName, getEntityResponseName } = strapi\n .plugin('graphql')\n .service('utils').naming;\n\n const userContentType = strapi.getModel(usersPermissionsUserUID);\n\n const userInputName = getContentTypeInputName(userContentType);\n const responseName = getEntityResponseName(userContentType);\n\n return {\n type: nonNull(responseName),\n\n args: {\n id: nonNull('ID'),\n data: nonNull(userInputName),\n },\n\n description: 'Update an existing user',\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.params = { id: args.id };\n koaContext.request.body = toPlainObject(args.data);\n\n await strapi.plugin('users-permissions').controller('user').update(koaContext);\n\n checkBadRequest(koaContext.body);\n\n return {\n value: koaContext.body,\n info: { args, resourceUID: 'plugin::users-permissions.user' },\n };\n },\n };\n};\n"],"names":["toPlainObject","require$$0","checkBadRequest","require$$1","usersPermissionsUserUID","updateUser","nexus","strapi","nonNull","getContentTypeInputName","getEntityResponseName","plugin","service","naming","userContentType","getModel","userInputName","responseName","type","args","id","data","description","resolve","parent","context","koaContext","params","request","body","controller","update","value","info","resourceUID"],"mappings":";;;;;;;;;;IAEA,MAAM,EAAEA,aAAa,EAAE,GAAGC,UAAAA;IAE1B,MAAM,EAAEC,eAAe,EAAE,GAAGC,eAAAA,EAAAA;AAE5B,IAAA,MAAMC,uBAA0B,GAAA,gCAAA;AAEhCC,IAAAA,UAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,OAAO,EAAE,GAAGF,KAAAA;AACpB,QAAA,MAAM,EAAEG,uBAAuB,EAAEC,qBAAqB,EAAE,GAAGH,MACxDI,CAAAA,MAAM,CAAC,SAAA,CAAA,CACPC,OAAO,CAAC,SAASC,MAAM;QAE1B,MAAMC,eAAAA,GAAkBP,MAAOQ,CAAAA,QAAQ,CAACX,uBAAAA,CAAAA;AAExC,QAAA,MAAMY,gBAAgBP,uBAAwBK,CAAAA,eAAAA,CAAAA;AAC9C,QAAA,MAAMG,eAAeP,qBAAsBI,CAAAA,eAAAA,CAAAA;QAE3C,OAAO;AACLI,YAAAA,IAAAA,EAAMV,OAAQS,CAAAA,YAAAA,CAAAA;YAEdE,IAAM,EAAA;AACJC,gBAAAA,EAAAA,EAAIZ,OAAQ,CAAA,IAAA,CAAA;AACZa,gBAAAA,IAAAA,EAAMb,OAAQQ,CAAAA,aAAAA;AACf,aAAA;YAEDM,WAAa,EAAA,yBAAA;AAEb,YAAA,MAAMC,OAAQC,CAAAA,CAAAA,MAAM,EAAEL,IAAI,EAAEM,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;AAEvBC,gBAAAA,UAAAA,CAAWC,MAAM,GAAG;AAAEP,oBAAAA,EAAAA,EAAID,KAAKC;AAAE,iBAAA;AACjCM,gBAAAA,UAAAA,CAAWE,OAAO,CAACC,IAAI,GAAG7B,aAAAA,CAAcmB,KAAKE,IAAI,CAAA;gBAEjD,MAAMd,MAAAA,CAAOI,MAAM,CAAC,mBAAA,CAAA,CAAqBmB,UAAU,CAAC,MAAA,CAAA,CAAQC,MAAM,CAACL,UAAAA,CAAAA;AAEnExB,gBAAAA,eAAAA,CAAgBwB,WAAWG,IAAI,CAAA;gBAE/B,OAAO;AACLG,oBAAAA,KAAAA,EAAON,WAAWG,IAAI;oBACtBI,IAAM,EAAA;AAAEd,wBAAAA,IAAAA;wBAAMe,WAAa,EAAA;AAAkC;AACrE,iBAAA;AACK;AACL,SAAA;AACA,KAAA;;;;;;"}
1
+ {"version":3,"file":"update-user.js","sources":["../../../../../../server/graphql/mutations/crud/user/update-user.js"],"sourcesContent":["'use strict';\n\nconst { toPlainObject } = require('lodash/fp');\n\nconst { checkBadRequest } = require('../../../utils');\n\nconst usersPermissionsUserUID = 'plugin::users-permissions.user';\n\nmodule.exports = ({ nexus, strapi }) => {\n const { nonNull } = nexus;\n const { getContentTypeInputName, getEntityResponseName } = strapi\n .plugin('graphql')\n .service('utils').naming;\n\n const userContentType = strapi.getModel(usersPermissionsUserUID);\n\n const userInputName = getContentTypeInputName(userContentType);\n const responseName = getEntityResponseName(userContentType);\n\n return {\n type: nonNull(responseName),\n\n args: {\n id: nonNull('ID'),\n data: nonNull(userInputName),\n },\n\n description: 'Update an existing user',\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.params = { id: args.id };\n koaContext.request.body = toPlainObject(args.data);\n\n await strapi.plugin('users-permissions').controller('user').update(koaContext);\n\n checkBadRequest(koaContext.body);\n\n return {\n value: koaContext.body,\n info: { args, resourceUID: 'plugin::users-permissions.user' },\n };\n },\n };\n};\n"],"names":["toPlainObject","require$$0","checkBadRequest","require$$1","usersPermissionsUserUID","updateUser","nexus","strapi","nonNull","getContentTypeInputName","getEntityResponseName","plugin","service","naming","userContentType","getModel","userInputName","responseName","type","args","id","data","description","resolve","parent","context","koaContext","params","request","body","controller","update","value","info","resourceUID"],"mappings":";;;;;;;;;;IAEA,MAAM,EAAEA,aAAa,EAAE,GAAGC,UAAAA;IAE1B,MAAM,EAAEC,eAAe,EAAE,GAAGC,eAAAA,EAAAA;AAE5B,IAAA,MAAMC,uBAAAA,GAA0B,gCAAA;AAEhCC,IAAAA,UAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,OAAO,EAAE,GAAGF,KAAAA;AACpB,QAAA,MAAM,EAAEG,uBAAuB,EAAEC,qBAAqB,EAAE,GAAGH,MAAAA,CACxDI,MAAM,CAAC,SAAA,CAAA,CACPC,OAAO,CAAC,SAASC,MAAM;QAE1B,MAAMC,eAAAA,GAAkBP,MAAAA,CAAOQ,QAAQ,CAACX,uBAAAA,CAAAA;AAExC,QAAA,MAAMY,gBAAgBP,uBAAAA,CAAwBK,eAAAA,CAAAA;AAC9C,QAAA,MAAMG,eAAeP,qBAAAA,CAAsBI,eAAAA,CAAAA;QAE3C,OAAO;AACLI,YAAAA,IAAAA,EAAMV,OAAAA,CAAQS,YAAAA,CAAAA;YAEdE,IAAAA,EAAM;AACJC,gBAAAA,EAAAA,EAAIZ,OAAAA,CAAQ,IAAA,CAAA;AACZa,gBAAAA,IAAAA,EAAMb,OAAAA,CAAQQ,aAAAA;AACpB,aAAA;YAEIM,WAAAA,EAAa,yBAAA;AAEb,YAAA,MAAMC,OAAAA,CAAAA,CAAQC,MAAM,EAAEL,IAAI,EAAEM,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;AAEvBC,gBAAAA,UAAAA,CAAWC,MAAM,GAAG;AAAEP,oBAAAA,EAAAA,EAAID,KAAKC;AAAE,iBAAA;AACjCM,gBAAAA,UAAAA,CAAWE,OAAO,CAACC,IAAI,GAAG7B,aAAAA,CAAcmB,KAAKE,IAAI,CAAA;gBAEjD,MAAMd,MAAAA,CAAOI,MAAM,CAAC,mBAAA,CAAA,CAAqBmB,UAAU,CAAC,MAAA,CAAA,CAAQC,MAAM,CAACL,UAAAA,CAAAA;AAEnExB,gBAAAA,eAAAA,CAAgBwB,WAAWG,IAAI,CAAA;gBAE/B,OAAO;AACLG,oBAAAA,KAAAA,EAAON,WAAWG,IAAI;oBACtBI,IAAAA,EAAM;AAAEd,wBAAAA,IAAAA;wBAAMe,WAAAA,EAAa;AAAgC;AACnE,iBAAA;AACA,YAAA;AACA,SAAA;AACA,IAAA,CAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"update-user.mjs","sources":["../../../../../../server/graphql/mutations/crud/user/update-user.js"],"sourcesContent":["'use strict';\n\nconst { toPlainObject } = require('lodash/fp');\n\nconst { checkBadRequest } = require('../../../utils');\n\nconst usersPermissionsUserUID = 'plugin::users-permissions.user';\n\nmodule.exports = ({ nexus, strapi }) => {\n const { nonNull } = nexus;\n const { getContentTypeInputName, getEntityResponseName } = strapi\n .plugin('graphql')\n .service('utils').naming;\n\n const userContentType = strapi.getModel(usersPermissionsUserUID);\n\n const userInputName = getContentTypeInputName(userContentType);\n const responseName = getEntityResponseName(userContentType);\n\n return {\n type: nonNull(responseName),\n\n args: {\n id: nonNull('ID'),\n data: nonNull(userInputName),\n },\n\n description: 'Update an existing user',\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.params = { id: args.id };\n koaContext.request.body = toPlainObject(args.data);\n\n await strapi.plugin('users-permissions').controller('user').update(koaContext);\n\n checkBadRequest(koaContext.body);\n\n return {\n value: koaContext.body,\n info: { args, resourceUID: 'plugin::users-permissions.user' },\n };\n },\n };\n};\n"],"names":["toPlainObject","require$$0","checkBadRequest","require$$1","usersPermissionsUserUID","updateUser","nexus","strapi","nonNull","getContentTypeInputName","getEntityResponseName","plugin","service","naming","userContentType","getModel","userInputName","responseName","type","args","id","data","description","resolve","parent","context","koaContext","params","request","body","controller","update","value","info","resourceUID"],"mappings":";;;;;;;;IAEA,MAAM,EAAEA,aAAa,EAAE,GAAGC,UAAAA;IAE1B,MAAM,EAAEC,eAAe,EAAE,GAAGC,YAAAA,EAAAA;AAE5B,IAAA,MAAMC,uBAA0B,GAAA,gCAAA;AAEhCC,IAAAA,UAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,OAAO,EAAE,GAAGF,KAAAA;AACpB,QAAA,MAAM,EAAEG,uBAAuB,EAAEC,qBAAqB,EAAE,GAAGH,MACxDI,CAAAA,MAAM,CAAC,SAAA,CAAA,CACPC,OAAO,CAAC,SAASC,MAAM;QAE1B,MAAMC,eAAAA,GAAkBP,MAAOQ,CAAAA,QAAQ,CAACX,uBAAAA,CAAAA;AAExC,QAAA,MAAMY,gBAAgBP,uBAAwBK,CAAAA,eAAAA,CAAAA;AAC9C,QAAA,MAAMG,eAAeP,qBAAsBI,CAAAA,eAAAA,CAAAA;QAE3C,OAAO;AACLI,YAAAA,IAAAA,EAAMV,OAAQS,CAAAA,YAAAA,CAAAA;YAEdE,IAAM,EAAA;AACJC,gBAAAA,EAAAA,EAAIZ,OAAQ,CAAA,IAAA,CAAA;AACZa,gBAAAA,IAAAA,EAAMb,OAAQQ,CAAAA,aAAAA;AACf,aAAA;YAEDM,WAAa,EAAA,yBAAA;AAEb,YAAA,MAAMC,OAAQC,CAAAA,CAAAA,MAAM,EAAEL,IAAI,EAAEM,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;AAEvBC,gBAAAA,UAAAA,CAAWC,MAAM,GAAG;AAAEP,oBAAAA,EAAAA,EAAID,KAAKC;AAAE,iBAAA;AACjCM,gBAAAA,UAAAA,CAAWE,OAAO,CAACC,IAAI,GAAG7B,aAAAA,CAAcmB,KAAKE,IAAI,CAAA;gBAEjD,MAAMd,MAAAA,CAAOI,MAAM,CAAC,mBAAA,CAAA,CAAqBmB,UAAU,CAAC,MAAA,CAAA,CAAQC,MAAM,CAACL,UAAAA,CAAAA;AAEnExB,gBAAAA,eAAAA,CAAgBwB,WAAWG,IAAI,CAAA;gBAE/B,OAAO;AACLG,oBAAAA,KAAAA,EAAON,WAAWG,IAAI;oBACtBI,IAAM,EAAA;AAAEd,wBAAAA,IAAAA;wBAAMe,WAAa,EAAA;AAAkC;AACrE,iBAAA;AACK;AACL,SAAA;AACA,KAAA;;;;;;"}
1
+ {"version":3,"file":"update-user.mjs","sources":["../../../../../../server/graphql/mutations/crud/user/update-user.js"],"sourcesContent":["'use strict';\n\nconst { toPlainObject } = require('lodash/fp');\n\nconst { checkBadRequest } = require('../../../utils');\n\nconst usersPermissionsUserUID = 'plugin::users-permissions.user';\n\nmodule.exports = ({ nexus, strapi }) => {\n const { nonNull } = nexus;\n const { getContentTypeInputName, getEntityResponseName } = strapi\n .plugin('graphql')\n .service('utils').naming;\n\n const userContentType = strapi.getModel(usersPermissionsUserUID);\n\n const userInputName = getContentTypeInputName(userContentType);\n const responseName = getEntityResponseName(userContentType);\n\n return {\n type: nonNull(responseName),\n\n args: {\n id: nonNull('ID'),\n data: nonNull(userInputName),\n },\n\n description: 'Update an existing user',\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.params = { id: args.id };\n koaContext.request.body = toPlainObject(args.data);\n\n await strapi.plugin('users-permissions').controller('user').update(koaContext);\n\n checkBadRequest(koaContext.body);\n\n return {\n value: koaContext.body,\n info: { args, resourceUID: 'plugin::users-permissions.user' },\n };\n },\n };\n};\n"],"names":["toPlainObject","require$$0","checkBadRequest","require$$1","usersPermissionsUserUID","updateUser","nexus","strapi","nonNull","getContentTypeInputName","getEntityResponseName","plugin","service","naming","userContentType","getModel","userInputName","responseName","type","args","id","data","description","resolve","parent","context","koaContext","params","request","body","controller","update","value","info","resourceUID"],"mappings":";;;;;;;;IAEA,MAAM,EAAEA,aAAa,EAAE,GAAGC,UAAAA;IAE1B,MAAM,EAAEC,eAAe,EAAE,GAAGC,YAAAA,EAAAA;AAE5B,IAAA,MAAMC,uBAAAA,GAA0B,gCAAA;AAEhCC,IAAAA,UAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,OAAO,EAAE,GAAGF,KAAAA;AACpB,QAAA,MAAM,EAAEG,uBAAuB,EAAEC,qBAAqB,EAAE,GAAGH,MAAAA,CACxDI,MAAM,CAAC,SAAA,CAAA,CACPC,OAAO,CAAC,SAASC,MAAM;QAE1B,MAAMC,eAAAA,GAAkBP,MAAAA,CAAOQ,QAAQ,CAACX,uBAAAA,CAAAA;AAExC,QAAA,MAAMY,gBAAgBP,uBAAAA,CAAwBK,eAAAA,CAAAA;AAC9C,QAAA,MAAMG,eAAeP,qBAAAA,CAAsBI,eAAAA,CAAAA;QAE3C,OAAO;AACLI,YAAAA,IAAAA,EAAMV,OAAAA,CAAQS,YAAAA,CAAAA;YAEdE,IAAAA,EAAM;AACJC,gBAAAA,EAAAA,EAAIZ,OAAAA,CAAQ,IAAA,CAAA;AACZa,gBAAAA,IAAAA,EAAMb,OAAAA,CAAQQ,aAAAA;AACpB,aAAA;YAEIM,WAAAA,EAAa,yBAAA;AAEb,YAAA,MAAMC,OAAAA,CAAAA,CAAQC,MAAM,EAAEL,IAAI,EAAEM,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;AAEvBC,gBAAAA,UAAAA,CAAWC,MAAM,GAAG;AAAEP,oBAAAA,EAAAA,EAAID,KAAKC;AAAE,iBAAA;AACjCM,gBAAAA,UAAAA,CAAWE,OAAO,CAACC,IAAI,GAAG7B,aAAAA,CAAcmB,KAAKE,IAAI,CAAA;gBAEjD,MAAMd,MAAAA,CAAOI,MAAM,CAAC,mBAAA,CAAA,CAAqBmB,UAAU,CAAC,MAAA,CAAA,CAAQC,MAAM,CAACL,UAAAA,CAAAA;AAEnExB,gBAAAA,eAAAA,CAAgBwB,WAAWG,IAAI,CAAA;gBAE/B,OAAO;AACLG,oBAAAA,KAAAA,EAAON,WAAWG,IAAI;oBACtBI,IAAAA,EAAM;AAAEd,wBAAAA,IAAAA;wBAAMe,WAAAA,EAAa;AAAgC;AACnE,iBAAA;AACA,YAAA;AACA,SAAA;AACA,IAAA,CAAA;;;;;;"}