@strapi/plugin-users-permissions 5.39.0 → 5.41.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (55) hide show
  1. package/dist/server/bootstrap/index.js.map +1 -1
  2. package/dist/server/bootstrap/index.mjs.map +1 -1
  3. package/dist/server/config.js.map +1 -1
  4. package/dist/server/config.mjs.map +1 -1
  5. package/dist/server/controllers/auth.js.map +1 -1
  6. package/dist/server/controllers/auth.mjs.map +1 -1
  7. package/dist/server/controllers/content-manager-user.js.map +1 -1
  8. package/dist/server/controllers/content-manager-user.mjs.map +1 -1
  9. package/dist/server/controllers/permissions.js.map +1 -1
  10. package/dist/server/controllers/permissions.mjs.map +1 -1
  11. package/dist/server/controllers/role.js.map +1 -1
  12. package/dist/server/controllers/role.mjs.map +1 -1
  13. package/dist/server/controllers/settings.js.map +1 -1
  14. package/dist/server/controllers/settings.mjs.map +1 -1
  15. package/dist/server/controllers/user.js.map +1 -1
  16. package/dist/server/controllers/user.mjs.map +1 -1
  17. package/dist/server/controllers/validation/auth.js.map +1 -1
  18. package/dist/server/controllers/validation/auth.mjs.map +1 -1
  19. package/dist/server/controllers/validation/user.js.map +1 -1
  20. package/dist/server/controllers/validation/user.mjs.map +1 -1
  21. package/dist/server/graphql/index.js.map +1 -1
  22. package/dist/server/graphql/index.mjs.map +1 -1
  23. package/dist/server/graphql/mutations/auth/login.js.map +1 -1
  24. package/dist/server/graphql/mutations/auth/login.mjs.map +1 -1
  25. package/dist/server/graphql/mutations/crud/role/create-role.js.map +1 -1
  26. package/dist/server/graphql/mutations/crud/role/create-role.mjs.map +1 -1
  27. package/dist/server/graphql/mutations/crud/role/delete-role.js.map +1 -1
  28. package/dist/server/graphql/mutations/crud/role/delete-role.mjs.map +1 -1
  29. package/dist/server/graphql/mutations/crud/role/update-role.js.map +1 -1
  30. package/dist/server/graphql/mutations/crud/role/update-role.mjs.map +1 -1
  31. package/dist/server/graphql/mutations/crud/user/create-user.js.map +1 -1
  32. package/dist/server/graphql/mutations/crud/user/create-user.mjs.map +1 -1
  33. package/dist/server/graphql/types/login-input.js.map +1 -1
  34. package/dist/server/graphql/types/login-input.mjs.map +1 -1
  35. package/dist/server/graphql/types/login-payload.js.map +1 -1
  36. package/dist/server/graphql/types/login-payload.mjs.map +1 -1
  37. package/dist/server/register.js.map +1 -1
  38. package/dist/server/register.mjs.map +1 -1
  39. package/dist/server/services/jwt.js.map +1 -1
  40. package/dist/server/services/jwt.mjs.map +1 -1
  41. package/dist/server/services/permission.js.map +1 -1
  42. package/dist/server/services/permission.mjs.map +1 -1
  43. package/dist/server/services/providers-registry.js.map +1 -1
  44. package/dist/server/services/providers-registry.mjs.map +1 -1
  45. package/dist/server/services/providers.js.map +1 -1
  46. package/dist/server/services/providers.mjs.map +1 -1
  47. package/dist/server/services/role.js.map +1 -1
  48. package/dist/server/services/role.mjs.map +1 -1
  49. package/dist/server/services/user.js.map +1 -1
  50. package/dist/server/services/user.mjs.map +1 -1
  51. package/dist/server/services/users-permissions.js.map +1 -1
  52. package/dist/server/services/users-permissions.mjs.map +1 -1
  53. package/dist/server/strategies/users-permissions.js.map +1 -1
  54. package/dist/server/strategies/users-permissions.mjs.map +1 -1
  55. package/package.json +5 -5
@@ -1 +1 @@
1
- {"version":3,"file":"user.js","sources":["../../../server/controllers/user.js"],"sourcesContent":["'use strict';\n\n/**\n * User.js controller\n *\n * @description: A set of functions called \"actions\" for managing `User`.\n */\n\nconst _ = require('lodash');\nconst utils = require('@strapi/utils');\nconst { getService } = require('../utils');\nconst { validateCreateUserBody, validateUpdateUserBody } = require('./validation/user');\n\nconst { ApplicationError, ValidationError, NotFoundError } = utils.errors;\n\nconst sanitizeOutput = async (user, ctx) => {\n const schema = strapi.getModel('plugin::users-permissions.user');\n const { auth } = ctx.state;\n\n return strapi.contentAPI.sanitize.output(user, schema, { auth });\n};\n\nconst validateQuery = async (query, ctx) => {\n const schema = strapi.getModel('plugin::users-permissions.user');\n const { auth } = ctx.state;\n\n return strapi.contentAPI.validate.query(query, schema, { auth });\n};\n\nconst sanitizeQuery = async (query, ctx) => {\n const schema = strapi.getModel('plugin::users-permissions.user');\n const { auth } = ctx.state;\n\n return strapi.contentAPI.sanitize.query(query, schema, { auth });\n};\n\nmodule.exports = {\n /**\n * Create a/an user record.\n * @return {Object}\n */\n async create(ctx) {\n const advanced = await strapi\n .store({ type: 'plugin', name: 'users-permissions', key: 'advanced' })\n .get();\n\n await validateCreateUserBody(ctx.request.body);\n\n const { email, username, role } = ctx.request.body;\n\n const userWithSameUsername = await strapi.db\n .query('plugin::users-permissions.user')\n .findOne({ where: { username } });\n\n if (userWithSameUsername) {\n if (!email) throw new ApplicationError('Username already taken');\n }\n\n if (advanced.unique_email) {\n const userWithSameEmail = await strapi.db\n .query('plugin::users-permissions.user')\n .findOne({ where: { email: email.toLowerCase() } });\n\n if (userWithSameEmail) {\n throw new ApplicationError('Email already taken');\n }\n }\n\n const user = {\n ...ctx.request.body,\n email: email.toLowerCase(),\n provider: 'local',\n };\n\n if (!role) {\n const defaultRole = await strapi.db\n .query('plugin::users-permissions.role')\n .findOne({ where: { type: advanced.default_role } });\n\n user.role = defaultRole.id;\n }\n\n try {\n const data = await getService('user').add(user);\n const sanitizedData = await sanitizeOutput(data, ctx);\n\n ctx.created(sanitizedData);\n } catch (error) {\n throw new ApplicationError(error.message);\n }\n },\n\n /**\n * Update a/an user record.\n * @return {Object}\n */\n async update(ctx) {\n const advancedConfigs = await strapi\n .store({ type: 'plugin', name: 'users-permissions', key: 'advanced' })\n .get();\n\n const { id } = ctx.params;\n const { email, username, password } = ctx.request.body;\n\n const user = await getService('user').fetch(id);\n if (!user) {\n throw new NotFoundError(`User not found`);\n }\n\n await validateUpdateUserBody(ctx.request.body);\n\n if (user.provider === 'local' && _.has(ctx.request.body, 'password') && !password) {\n throw new ValidationError('password.notNull');\n }\n\n if (_.has(ctx.request.body, 'username')) {\n const userWithSameUsername = await strapi.db\n .query('plugin::users-permissions.user')\n .findOne({ where: { username } });\n\n if (userWithSameUsername && _.toString(userWithSameUsername.id) !== _.toString(id)) {\n throw new ApplicationError('Username already taken');\n }\n }\n\n if (_.has(ctx.request.body, 'email') && advancedConfigs.unique_email) {\n const userWithSameEmail = await strapi.db\n .query('plugin::users-permissions.user')\n .findOne({ where: { email: email.toLowerCase() } });\n\n if (userWithSameEmail && _.toString(userWithSameEmail.id) !== _.toString(id)) {\n throw new ApplicationError('Email already taken');\n }\n ctx.request.body.email = ctx.request.body.email.toLowerCase();\n }\n\n const updateData = {\n ...ctx.request.body,\n };\n\n const data = await getService('user').edit(user.id, updateData);\n const sanitizedData = await sanitizeOutput(data, ctx);\n\n ctx.send(sanitizedData);\n },\n\n /**\n * Retrieve user records.\n * @return {Object|Array}\n */\n async find(ctx) {\n await validateQuery(ctx.query, ctx);\n const sanitizedQuery = await sanitizeQuery(ctx.query, ctx);\n const users = await getService('user').fetchAll(sanitizedQuery);\n\n ctx.body = await Promise.all(users.map((user) => sanitizeOutput(user, ctx)));\n },\n\n /**\n * Retrieve a user record.\n * @return {Object}\n */\n async findOne(ctx) {\n const { id } = ctx.params;\n await validateQuery(ctx.query, ctx);\n const sanitizedQuery = await sanitizeQuery(ctx.query, ctx);\n\n let data = await getService('user').fetch(id, sanitizedQuery);\n\n if (data) {\n data = await sanitizeOutput(data, ctx);\n }\n\n ctx.body = data;\n },\n\n /**\n * Retrieve user count.\n * @return {Number}\n */\n async count(ctx) {\n await validateQuery(ctx.query, ctx);\n const sanitizedQuery = await sanitizeQuery(ctx.query, ctx);\n\n ctx.body = await getService('user').count(sanitizedQuery);\n },\n\n /**\n * Destroy a/an user record.\n * @return {Object}\n */\n async destroy(ctx) {\n const { id } = ctx.params;\n\n const data = await getService('user').remove({ id });\n const sanitizedUser = await sanitizeOutput(data, ctx);\n\n ctx.send(sanitizedUser);\n },\n\n /**\n * Retrieve authenticated user.\n * @return {Object|Array}\n */\n async me(ctx) {\n const authUser = ctx.state.user;\n const { query } = ctx;\n\n if (!authUser) {\n return ctx.unauthorized();\n }\n\n await validateQuery(query, ctx);\n const sanitizedQuery = await sanitizeQuery(query, ctx);\n const user = await getService('user').fetch(authUser.id, sanitizedQuery);\n\n ctx.body = await sanitizeOutput(user, ctx);\n },\n};\n"],"names":["_","require$$0","utils","require$$1","getService","require$$2","validateCreateUserBody","validateUpdateUserBody","require$$3","ApplicationError","ValidationError","NotFoundError","errors","sanitizeOutput","user","ctx","schema","strapi","getModel","auth","state","contentAPI","sanitize","output","validateQuery","query","validate","sanitizeQuery","create","advanced","store","type","name","key","get","request","body","email","username","role","userWithSameUsername","db","findOne","where","unique_email","userWithSameEmail","toLowerCase","provider","defaultRole","default_role","id","data","add","sanitizedData","created","error","message","update","advancedConfigs","params","password","fetch","has","toString","updateData","edit","send","find","sanitizedQuery","users","fetchAll","Promise","all","map","count","destroy","remove","sanitizedUser","me","authUser","unauthorized"],"mappings":";;;;;;;;;;;;AAEA;;;;AAIA,KAEA,MAAMA,CAAAA,GAAIC,UAAAA;AACV,IAAA,MAAMC,KAAAA,GAAQC,UAAAA;IACd,MAAM,EAAEC,UAAU,EAAE,GAAGC,eAAAA,EAAAA;AACvB,IAAA,MAAM,EAAEC,sBAAsB,EAAEC,sBAAsB,EAAE,GAAGC,gBAAAA,EAAAA;IAE3D,MAAM,EAAEC,gBAAgB,EAAEC,eAAe,EAAEC,aAAa,EAAE,GAAGT,KAAAA,CAAMU,MAAM;IAEzE,MAAMC,cAAAA,GAAiB,OAAOC,IAAAA,EAAMC,GAAAA,GAAAA;QAClC,MAAMC,MAAAA,GAASC,MAAAA,CAAOC,QAAQ,CAAC,gCAAA,CAAA;AAC/B,QAAA,MAAM,EAAEC,IAAI,EAAE,GAAGJ,IAAIK,KAAK;QAE1B,OAAOH,MAAAA,CAAOI,UAAU,CAACC,QAAQ,CAACC,MAAM,CAACT,MAAME,MAAAA,EAAQ;AAAEG,YAAAA;AAAI,SAAA,CAAA;AAC/D,IAAA,CAAA;IAEA,MAAMK,aAAAA,GAAgB,OAAOC,KAAAA,EAAOV,GAAAA,GAAAA;QAClC,MAAMC,MAAAA,GAASC,MAAAA,CAAOC,QAAQ,CAAC,gCAAA,CAAA;AAC/B,QAAA,MAAM,EAAEC,IAAI,EAAE,GAAGJ,IAAIK,KAAK;QAE1B,OAAOH,MAAAA,CAAOI,UAAU,CAACK,QAAQ,CAACD,KAAK,CAACA,OAAOT,MAAAA,EAAQ;AAAEG,YAAAA;AAAI,SAAA,CAAA;AAC/D,IAAA,CAAA;IAEA,MAAMQ,aAAAA,GAAgB,OAAOF,KAAAA,EAAOV,GAAAA,GAAAA;QAClC,MAAMC,MAAAA,GAASC,MAAAA,CAAOC,QAAQ,CAAC,gCAAA,CAAA;AAC/B,QAAA,MAAM,EAAEC,IAAI,EAAE,GAAGJ,IAAIK,KAAK;QAE1B,OAAOH,MAAAA,CAAOI,UAAU,CAACC,QAAQ,CAACG,KAAK,CAACA,OAAOT,MAAAA,EAAQ;AAAEG,YAAAA;AAAI,SAAA,CAAA;AAC/D,IAAA,CAAA;IAEAL,IAAAA,GAAiB;AACjB;;;OAIE,MAAMc,QAAOb,GAAG,EAAA;AACd,YAAA,MAAMc,QAAAA,GAAW,MAAMZ,MAAAA,CACpBa,KAAK,CAAC;gBAAEC,IAAAA,EAAM,QAAA;gBAAUC,IAAAA,EAAM,mBAAA;gBAAqBC,GAAAA,EAAK;eACxDC,GAAG,EAAA;AAEN,YAAA,MAAM5B,sBAAAA,CAAuBS,GAAAA,CAAIoB,OAAO,CAACC,IAAI,CAAA;YAE7C,MAAM,EAAEC,KAAK,EAAEC,QAAQ,EAAEC,IAAI,EAAE,GAAGxB,GAAAA,CAAIoB,OAAO,CAACC,IAAI;YAElD,MAAMI,oBAAAA,GAAuB,MAAMvB,MAAAA,CAAOwB,EAAE,CACzChB,KAAK,CAAC,gCAAA,CAAA,CACNiB,OAAO,CAAC;gBAAEC,KAAAA,EAAO;AAAEL,oBAAAA;AAAQ;AAAE,aAAA,CAAA;AAEhC,YAAA,IAAIE,oBAAAA,EAAsB;AACxB,gBAAA,IAAI,CAACH,KAAAA,EAAO,MAAM,IAAI5B,gBAAAA,CAAiB,wBAAA,CAAA;AAC7C,YAAA;YAEI,IAAIoB,QAAAA,CAASe,YAAY,EAAE;gBACzB,MAAMC,iBAAAA,GAAoB,MAAM5B,MAAAA,CAAOwB,EAAE,CACtChB,KAAK,CAAC,gCAAA,CAAA,CACNiB,OAAO,CAAC;oBAAEC,KAAAA,EAAO;AAAEN,wBAAAA,KAAAA,EAAOA,MAAMS,WAAW;AAAE;AAAE,iBAAA,CAAA;AAElD,gBAAA,IAAID,iBAAAA,EAAmB;AACrB,oBAAA,MAAM,IAAIpC,gBAAAA,CAAiB,qBAAA,CAAA;AACnC,gBAAA;AACA,YAAA;AAEI,YAAA,MAAMK,IAAAA,GAAO;gBACX,GAAGC,GAAAA,CAAIoB,OAAO,CAACC,IAAI;AACnBC,gBAAAA,KAAAA,EAAOA,MAAMS,WAAW,EAAA;gBACxBC,QAAAA,EAAU;AAChB,aAAA;AAEI,YAAA,IAAI,CAACR,IAAAA,EAAM;gBACT,MAAMS,WAAAA,GAAc,MAAM/B,MAAAA,CAAOwB,EAAE,CAChChB,KAAK,CAAC,gCAAA,CAAA,CACNiB,OAAO,CAAC;oBAAEC,KAAAA,EAAO;AAAEZ,wBAAAA,IAAAA,EAAMF,SAASoB;AAAY;AAAE,iBAAA,CAAA;gBAEnDnC,IAAAA,CAAKyB,IAAI,GAAGS,WAAAA,CAAYE,EAAE;AAChC,YAAA;YAEI,IAAI;AACF,gBAAA,MAAMC,IAAAA,GAAO,MAAM/C,UAAAA,CAAW,MAAA,CAAA,CAAQgD,GAAG,CAACtC,IAAAA,CAAAA;gBAC1C,MAAMuC,aAAAA,GAAgB,MAAMxC,cAAAA,CAAesC,IAAAA,EAAMpC,GAAAA,CAAAA;AAEjDA,gBAAAA,GAAAA,CAAIuC,OAAO,CAACD,aAAAA,CAAAA;AAClB,YAAA,CAAA,CAAM,OAAOE,KAAAA,EAAO;gBACd,MAAM,IAAI9C,gBAAAA,CAAiB8C,KAAAA,CAAMC,OAAO,CAAA;AAC9C,YAAA;AACA,QAAA,CAAA;AAEA;;;OAIE,MAAMC,QAAO1C,GAAG,EAAA;AACd,YAAA,MAAM2C,eAAAA,GAAkB,MAAMzC,MAAAA,CAC3Ba,KAAK,CAAC;gBAAEC,IAAAA,EAAM,QAAA;gBAAUC,IAAAA,EAAM,mBAAA;gBAAqBC,GAAAA,EAAK;eACxDC,GAAG,EAAA;AAEN,YAAA,MAAM,EAAEgB,EAAE,EAAE,GAAGnC,IAAI4C,MAAM;YACzB,MAAM,EAAEtB,KAAK,EAAEC,QAAQ,EAAEsB,QAAQ,EAAE,GAAG7C,GAAAA,CAAIoB,OAAO,CAACC,IAAI;AAEtD,YAAA,MAAMtB,IAAAA,GAAO,MAAMV,UAAAA,CAAW,MAAA,CAAA,CAAQyD,KAAK,CAACX,EAAAA,CAAAA;AAC5C,YAAA,IAAI,CAACpC,IAAAA,EAAM;AACT,gBAAA,MAAM,IAAIH,aAAAA,CAAc,CAAC,cAAc,CAAC,CAAA;AAC9C,YAAA;AAEI,YAAA,MAAMJ,sBAAAA,CAAuBQ,GAAAA,CAAIoB,OAAO,CAACC,IAAI,CAAA;AAE7C,YAAA,IAAItB,IAAAA,CAAKiC,QAAQ,KAAK,OAAA,IAAW/C,EAAE8D,GAAG,CAAC/C,GAAAA,CAAIoB,OAAO,CAACC,IAAI,EAAE,UAAA,CAAA,IAAe,CAACwB,QAAAA,EAAU;AACjF,gBAAA,MAAM,IAAIlD,eAAAA,CAAgB,kBAAA,CAAA;AAChC,YAAA;YAEI,IAAIV,CAAAA,CAAE8D,GAAG,CAAC/C,GAAAA,CAAIoB,OAAO,CAACC,IAAI,EAAE,UAAA,CAAA,EAAa;gBACvC,MAAMI,oBAAAA,GAAuB,MAAMvB,MAAAA,CAAOwB,EAAE,CACzChB,KAAK,CAAC,gCAAA,CAAA,CACNiB,OAAO,CAAC;oBAAEC,KAAAA,EAAO;AAAEL,wBAAAA;AAAQ;AAAE,iBAAA,CAAA;gBAEhC,IAAIE,oBAAAA,IAAwBxC,CAAAA,CAAE+D,QAAQ,CAACvB,oBAAAA,CAAqBU,EAAE,CAAA,KAAMlD,CAAAA,CAAE+D,QAAQ,CAACb,EAAAA,CAAAA,EAAK;AAClF,oBAAA,MAAM,IAAIzC,gBAAAA,CAAiB,wBAAA,CAAA;AACnC,gBAAA;AACA,YAAA;YAEI,IAAIT,CAAAA,CAAE8D,GAAG,CAAC/C,GAAAA,CAAIoB,OAAO,CAACC,IAAI,EAAE,OAAA,CAAA,IAAYsB,eAAAA,CAAgBd,YAAY,EAAE;gBACpE,MAAMC,iBAAAA,GAAoB,MAAM5B,MAAAA,CAAOwB,EAAE,CACtChB,KAAK,CAAC,gCAAA,CAAA,CACNiB,OAAO,CAAC;oBAAEC,KAAAA,EAAO;AAAEN,wBAAAA,KAAAA,EAAOA,MAAMS,WAAW;AAAE;AAAE,iBAAA,CAAA;gBAElD,IAAID,iBAAAA,IAAqB7C,CAAAA,CAAE+D,QAAQ,CAAClB,iBAAAA,CAAkBK,EAAE,CAAA,KAAMlD,CAAAA,CAAE+D,QAAQ,CAACb,EAAAA,CAAAA,EAAK;AAC5E,oBAAA,MAAM,IAAIzC,gBAAAA,CAAiB,qBAAA,CAAA;AACnC,gBAAA;AACMM,gBAAAA,GAAAA,CAAIoB,OAAO,CAACC,IAAI,CAACC,KAAK,GAAGtB,GAAAA,CAAIoB,OAAO,CAACC,IAAI,CAACC,KAAK,CAACS,WAAW,EAAA;AACjE,YAAA;AAEI,YAAA,MAAMkB,UAAAA,GAAa;gBACjB,GAAGjD,GAAAA,CAAIoB,OAAO,CAACC;AACrB,aAAA;YAEI,MAAMe,IAAAA,GAAO,MAAM/C,UAAAA,CAAW,MAAA,CAAA,CAAQ6D,IAAI,CAACnD,IAAAA,CAAKoC,EAAE,EAAEc,UAAAA,CAAAA;YACpD,MAAMX,aAAAA,GAAgB,MAAMxC,cAAAA,CAAesC,IAAAA,EAAMpC,GAAAA,CAAAA;AAEjDA,YAAAA,GAAAA,CAAImD,IAAI,CAACb,aAAAA,CAAAA;AACb,QAAA,CAAA;AAEA;;;OAIE,MAAMc,MAAKpD,GAAG,EAAA;YACZ,MAAMS,aAAAA,CAAcT,GAAAA,CAAIU,KAAK,EAAEV,GAAAA,CAAAA;AAC/B,YAAA,MAAMqD,cAAAA,GAAiB,MAAMzC,aAAAA,CAAcZ,GAAAA,CAAIU,KAAK,EAAEV,GAAAA,CAAAA;AACtD,YAAA,MAAMsD,KAAAA,GAAQ,MAAMjE,UAAAA,CAAW,MAAA,CAAA,CAAQkE,QAAQ,CAACF,cAAAA,CAAAA;AAEhDrD,YAAAA,GAAAA,CAAIqB,IAAI,GAAG,MAAMmC,OAAAA,CAAQC,GAAG,CAACH,KAAAA,CAAMI,GAAG,CAAC,CAAC3D,IAAAA,GAASD,cAAAA,CAAeC,IAAAA,EAAMC,GAAAA,CAAAA,CAAAA,CAAAA;AAC1E,QAAA,CAAA;AAEA;;;OAIE,MAAM2B,SAAQ3B,GAAG,EAAA;AACf,YAAA,MAAM,EAAEmC,EAAE,EAAE,GAAGnC,IAAI4C,MAAM;YACzB,MAAMnC,aAAAA,CAAcT,GAAAA,CAAIU,KAAK,EAAEV,GAAAA,CAAAA;AAC/B,YAAA,MAAMqD,cAAAA,GAAiB,MAAMzC,aAAAA,CAAcZ,GAAAA,CAAIU,KAAK,EAAEV,GAAAA,CAAAA;AAEtD,YAAA,IAAIoC,OAAO,MAAM/C,UAAAA,CAAW,MAAA,CAAA,CAAQyD,KAAK,CAACX,EAAAA,EAAIkB,cAAAA,CAAAA;AAE9C,YAAA,IAAIjB,IAAAA,EAAM;gBACRA,IAAAA,GAAO,MAAMtC,eAAesC,IAAAA,EAAMpC,GAAAA,CAAAA;AACxC,YAAA;AAEIA,YAAAA,GAAAA,CAAIqB,IAAI,GAAGe,IAAAA;AACf,QAAA,CAAA;AAEA;;;OAIE,MAAMuB,OAAM3D,GAAG,EAAA;YACb,MAAMS,aAAAA,CAAcT,GAAAA,CAAIU,KAAK,EAAEV,GAAAA,CAAAA;AAC/B,YAAA,MAAMqD,cAAAA,GAAiB,MAAMzC,aAAAA,CAAcZ,GAAAA,CAAIU,KAAK,EAAEV,GAAAA,CAAAA;AAEtDA,YAAAA,GAAAA,CAAIqB,IAAI,GAAG,MAAMhC,UAAAA,CAAW,MAAA,CAAA,CAAQsE,KAAK,CAACN,cAAAA,CAAAA;AAC9C,QAAA,CAAA;AAEA;;;OAIE,MAAMO,SAAQ5D,GAAG,EAAA;AACf,YAAA,MAAM,EAAEmC,EAAE,EAAE,GAAGnC,IAAI4C,MAAM;AAEzB,YAAA,MAAMR,IAAAA,GAAO,MAAM/C,UAAAA,CAAW,MAAA,CAAA,CAAQwE,MAAM,CAAC;AAAE1B,gBAAAA;AAAE,aAAA,CAAA;YACjD,MAAM2B,aAAAA,GAAgB,MAAMhE,cAAAA,CAAesC,IAAAA,EAAMpC,GAAAA,CAAAA;AAEjDA,YAAAA,GAAAA,CAAImD,IAAI,CAACW,aAAAA,CAAAA;AACb,QAAA,CAAA;AAEA;;;OAIE,MAAMC,IAAG/D,GAAG,EAAA;AACV,YAAA,MAAMgE,QAAAA,GAAWhE,GAAAA,CAAIK,KAAK,CAACN,IAAI;YAC/B,MAAM,EAAEW,KAAK,EAAE,GAAGV,GAAAA;AAElB,YAAA,IAAI,CAACgE,QAAAA,EAAU;AACb,gBAAA,OAAOhE,IAAIiE,YAAY,EAAA;AAC7B,YAAA;AAEI,YAAA,MAAMxD,cAAcC,KAAAA,EAAOV,GAAAA,CAAAA;YAC3B,MAAMqD,cAAAA,GAAiB,MAAMzC,aAAAA,CAAcF,KAAAA,EAAOV,GAAAA,CAAAA;YAClD,MAAMD,IAAAA,GAAO,MAAMV,UAAAA,CAAW,MAAA,CAAA,CAAQyD,KAAK,CAACkB,QAAAA,CAAS7B,EAAE,EAAEkB,cAAAA,CAAAA;AAEzDrD,YAAAA,GAAAA,CAAIqB,IAAI,GAAG,MAAMvB,cAAAA,CAAeC,IAAAA,EAAMC,GAAAA,CAAAA;AAC1C,QAAA;AACA,KAAA;;;;;;"}
1
+ {"version":3,"file":"user.js","sources":["../../../server/controllers/user.js"],"sourcesContent":["'use strict';\n\n/**\n * User.js controller\n *\n * @description: A set of functions called \"actions\" for managing `User`.\n */\n\nconst _ = require('lodash');\nconst utils = require('@strapi/utils');\nconst { getService } = require('../utils');\nconst { validateCreateUserBody, validateUpdateUserBody } = require('./validation/user');\n\nconst { ApplicationError, ValidationError, NotFoundError } = utils.errors;\n\nconst sanitizeOutput = async (user, ctx) => {\n const schema = strapi.getModel('plugin::users-permissions.user');\n const { auth } = ctx.state;\n\n return strapi.contentAPI.sanitize.output(user, schema, { auth });\n};\n\nconst validateQuery = async (query, ctx) => {\n const schema = strapi.getModel('plugin::users-permissions.user');\n const { auth } = ctx.state;\n\n return strapi.contentAPI.validate.query(query, schema, { auth });\n};\n\nconst sanitizeQuery = async (query, ctx) => {\n const schema = strapi.getModel('plugin::users-permissions.user');\n const { auth } = ctx.state;\n\n return strapi.contentAPI.sanitize.query(query, schema, { auth });\n};\n\nmodule.exports = {\n /**\n * Create a/an user record.\n * @return {Object}\n */\n async create(ctx) {\n const advanced = await strapi\n .store({ type: 'plugin', name: 'users-permissions', key: 'advanced' })\n .get();\n\n await validateCreateUserBody(ctx.request.body);\n\n const { email, username, role } = ctx.request.body;\n\n const userWithSameUsername = await strapi.db\n .query('plugin::users-permissions.user')\n .findOne({ where: { username } });\n\n if (userWithSameUsername) {\n if (!email) throw new ApplicationError('Username already taken');\n }\n\n if (advanced.unique_email) {\n const userWithSameEmail = await strapi.db\n .query('plugin::users-permissions.user')\n .findOne({ where: { email: email.toLowerCase() } });\n\n if (userWithSameEmail) {\n throw new ApplicationError('Email already taken');\n }\n }\n\n const user = {\n ...ctx.request.body,\n email: email.toLowerCase(),\n provider: 'local',\n };\n\n if (!role) {\n const defaultRole = await strapi.db\n .query('plugin::users-permissions.role')\n .findOne({ where: { type: advanced.default_role } });\n\n user.role = defaultRole.id;\n }\n\n try {\n const data = await getService('user').add(user);\n const sanitizedData = await sanitizeOutput(data, ctx);\n\n ctx.created(sanitizedData);\n } catch (error) {\n throw new ApplicationError(error.message);\n }\n },\n\n /**\n * Update a/an user record.\n * @return {Object}\n */\n async update(ctx) {\n const advancedConfigs = await strapi\n .store({ type: 'plugin', name: 'users-permissions', key: 'advanced' })\n .get();\n\n const { id } = ctx.params;\n const { email, username, password } = ctx.request.body;\n\n const user = await getService('user').fetch(id);\n if (!user) {\n throw new NotFoundError(`User not found`);\n }\n\n await validateUpdateUserBody(ctx.request.body);\n\n if (user.provider === 'local' && _.has(ctx.request.body, 'password') && !password) {\n throw new ValidationError('password.notNull');\n }\n\n if (_.has(ctx.request.body, 'username')) {\n const userWithSameUsername = await strapi.db\n .query('plugin::users-permissions.user')\n .findOne({ where: { username } });\n\n if (userWithSameUsername && _.toString(userWithSameUsername.id) !== _.toString(id)) {\n throw new ApplicationError('Username already taken');\n }\n }\n\n if (_.has(ctx.request.body, 'email') && advancedConfigs.unique_email) {\n const userWithSameEmail = await strapi.db\n .query('plugin::users-permissions.user')\n .findOne({ where: { email: email.toLowerCase() } });\n\n if (userWithSameEmail && _.toString(userWithSameEmail.id) !== _.toString(id)) {\n throw new ApplicationError('Email already taken');\n }\n ctx.request.body.email = ctx.request.body.email.toLowerCase();\n }\n\n const updateData = {\n ...ctx.request.body,\n };\n\n const data = await getService('user').edit(user.id, updateData);\n const sanitizedData = await sanitizeOutput(data, ctx);\n\n ctx.send(sanitizedData);\n },\n\n /**\n * Retrieve user records.\n * @return {Object|Array}\n */\n async find(ctx) {\n await validateQuery(ctx.query, ctx);\n const sanitizedQuery = await sanitizeQuery(ctx.query, ctx);\n const users = await getService('user').fetchAll(sanitizedQuery);\n\n ctx.body = await Promise.all(users.map((user) => sanitizeOutput(user, ctx)));\n },\n\n /**\n * Retrieve a user record.\n * @return {Object}\n */\n async findOne(ctx) {\n const { id } = ctx.params;\n await validateQuery(ctx.query, ctx);\n const sanitizedQuery = await sanitizeQuery(ctx.query, ctx);\n\n let data = await getService('user').fetch(id, sanitizedQuery);\n\n if (data) {\n data = await sanitizeOutput(data, ctx);\n }\n\n ctx.body = data;\n },\n\n /**\n * Retrieve user count.\n * @return {Number}\n */\n async count(ctx) {\n await validateQuery(ctx.query, ctx);\n const sanitizedQuery = await sanitizeQuery(ctx.query, ctx);\n\n ctx.body = await getService('user').count(sanitizedQuery);\n },\n\n /**\n * Destroy a/an user record.\n * @return {Object}\n */\n async destroy(ctx) {\n const { id } = ctx.params;\n\n const data = await getService('user').remove({ id });\n const sanitizedUser = await sanitizeOutput(data, ctx);\n\n ctx.send(sanitizedUser);\n },\n\n /**\n * Retrieve authenticated user.\n * @return {Object|Array}\n */\n async me(ctx) {\n const authUser = ctx.state.user;\n const { query } = ctx;\n\n if (!authUser) {\n return ctx.unauthorized();\n }\n\n await validateQuery(query, ctx);\n const sanitizedQuery = await sanitizeQuery(query, ctx);\n const user = await getService('user').fetch(authUser.id, sanitizedQuery);\n\n ctx.body = await sanitizeOutput(user, ctx);\n },\n};\n"],"names":["_","require$$0","utils","require$$1","getService","require$$2","validateCreateUserBody","validateUpdateUserBody","require$$3","ApplicationError","ValidationError","NotFoundError","errors","sanitizeOutput","user","ctx","schema","strapi","getModel","auth","state","contentAPI","sanitize","output","validateQuery","query","validate","sanitizeQuery","create","advanced","store","type","name","key","get","request","body","email","username","role","userWithSameUsername","db","findOne","where","unique_email","userWithSameEmail","toLowerCase","provider","defaultRole","default_role","id","data","add","sanitizedData","created","error","message","update","advancedConfigs","params","password","fetch","has","toString","updateData","edit","send","find","sanitizedQuery","users","fetchAll","Promise","all","map","count","destroy","remove","sanitizedUser","me","authUser","unauthorized"],"mappings":";;;;;;;;;;;;AAEA;;;;AAIA,KAEA,MAAMA,CAAAA,GAAIC,UAAAA;AACV,IAAA,MAAMC,KAAAA,GAAQC,UAAAA;IACd,MAAM,EAAEC,UAAU,EAAE,GAAGC,eAAAA,EAAAA;AACvB,IAAA,MAAM,EAAEC,sBAAsB,EAAEC,sBAAsB,EAAE,GAAGC,gBAAAA,EAAAA;IAE3D,MAAM,EAAEC,gBAAgB,EAAEC,eAAe,EAAEC,aAAa,EAAE,GAAGT,KAAAA,CAAMU,MAAM;IAEzE,MAAMC,cAAAA,GAAiB,OAAOC,IAAAA,EAAMC,GAAAA,GAAAA;QAClC,MAAMC,MAAAA,GAASC,MAAAA,CAAOC,QAAQ,CAAC,gCAAA,CAAA;AAC/B,QAAA,MAAM,EAAEC,IAAI,EAAE,GAAGJ,IAAIK,KAAK;QAE1B,OAAOH,MAAAA,CAAOI,UAAU,CAACC,QAAQ,CAACC,MAAM,CAACT,MAAME,MAAAA,EAAQ;AAAEG,YAAAA;;AAC3D,IAAA,CAAA;IAEA,MAAMK,aAAAA,GAAgB,OAAOC,KAAAA,EAAOV,GAAAA,GAAAA;QAClC,MAAMC,MAAAA,GAASC,MAAAA,CAAOC,QAAQ,CAAC,gCAAA,CAAA;AAC/B,QAAA,MAAM,EAAEC,IAAI,EAAE,GAAGJ,IAAIK,KAAK;QAE1B,OAAOH,MAAAA,CAAOI,UAAU,CAACK,QAAQ,CAACD,KAAK,CAACA,OAAOT,MAAAA,EAAQ;AAAEG,YAAAA;;AAC3D,IAAA,CAAA;IAEA,MAAMQ,aAAAA,GAAgB,OAAOF,KAAAA,EAAOV,GAAAA,GAAAA;QAClC,MAAMC,MAAAA,GAASC,MAAAA,CAAOC,QAAQ,CAAC,gCAAA,CAAA;AAC/B,QAAA,MAAM,EAAEC,IAAI,EAAE,GAAGJ,IAAIK,KAAK;QAE1B,OAAOH,MAAAA,CAAOI,UAAU,CAACC,QAAQ,CAACG,KAAK,CAACA,OAAOT,MAAAA,EAAQ;AAAEG,YAAAA;;AAC3D,IAAA,CAAA;IAEAL,IAAAA,GAAiB;AACjB;;;OAIE,MAAMc,QAAOb,GAAG,EAAA;AACd,YAAA,MAAMc,QAAAA,GAAW,MAAMZ,MAAAA,CACpBa,KAAK,CAAC;gBAAEC,IAAAA,EAAM,QAAA;gBAAUC,IAAAA,EAAM,mBAAA;gBAAqBC,GAAAA,EAAK;AAAU,aAAA,CAAA,CAClEC,GAAG,EAAA;AAEN,YAAA,MAAM5B,sBAAAA,CAAuBS,GAAAA,CAAIoB,OAAO,CAACC,IAAI,CAAA;YAE7C,MAAM,EAAEC,KAAK,EAAEC,QAAQ,EAAEC,IAAI,EAAE,GAAGxB,GAAAA,CAAIoB,OAAO,CAACC,IAAI;YAElD,MAAMI,oBAAAA,GAAuB,MAAMvB,MAAAA,CAAOwB,EAAA,CACvChB,KAAK,CAAC,gCAAA,CAAA,CACNiB,OAAO,CAAC;gBAAEC,KAAAA,EAAO;AAAEL,oBAAAA;AAAQ;AAAE,aAAA,CAAA;AAEhC,YAAA,IAAIE,oBAAAA,EAAsB;AACxB,gBAAA,IAAI,CAACH,KAAAA,EAAO,MAAM,IAAI5B,gBAAAA,CAAiB,wBAAA,CAAA;AAC7C,YAAA;YAEI,IAAIoB,QAAAA,CAASe,YAAY,EAAE;gBACzB,MAAMC,iBAAAA,GAAoB,MAAM5B,MAAAA,CAAOwB,EAAA,CACpChB,KAAK,CAAC,gCAAA,CAAA,CACNiB,OAAO,CAAC;oBAAEC,KAAAA,EAAO;AAAEN,wBAAAA,KAAAA,EAAOA,MAAMS,WAAW;AAAE;;AAEhD,gBAAA,IAAID,iBAAAA,EAAmB;AACrB,oBAAA,MAAM,IAAIpC,gBAAAA,CAAiB,qBAAA,CAAA;AACnC,gBAAA;AACA,YAAA;AAEI,YAAA,MAAMK,IAAAA,GAAO;gBACX,GAAGC,GAAAA,CAAIoB,OAAO,CAACC,IAAI;AACnBC,gBAAAA,KAAAA,EAAOA,MAAMS,WAAW,EAAA;gBACxBC,QAAAA,EAAU;AAChB,aAAA;AAEI,YAAA,IAAI,CAACR,IAAAA,EAAM;gBACT,MAAMS,WAAAA,GAAc,MAAM/B,MAAAA,CAAOwB,EAAA,CAC9BhB,KAAK,CAAC,gCAAA,CAAA,CACNiB,OAAO,CAAC;oBAAEC,KAAAA,EAAO;AAAEZ,wBAAAA,IAAAA,EAAMF,SAASoB;AAAY;;gBAEjDnC,IAAAA,CAAKyB,IAAI,GAAGS,WAAAA,CAAYE,EAAE;AAChC,YAAA;YAEI,IAAI;AACF,gBAAA,MAAMC,IAAAA,GAAO,MAAM/C,UAAAA,CAAW,MAAA,CAAA,CAAQgD,GAAG,CAACtC,IAAAA,CAAAA;gBAC1C,MAAMuC,aAAAA,GAAgB,MAAMxC,cAAAA,CAAesC,IAAAA,EAAMpC,GAAAA,CAAAA;AAEjDA,gBAAAA,GAAAA,CAAIuC,OAAO,CAACD,aAAAA,CAAAA;AAClB,YAAA,CAAA,CAAM,OAAOE,KAAAA,EAAO;gBACd,MAAM,IAAI9C,gBAAAA,CAAiB8C,KAAAA,CAAMC,OAAO,CAAA;AAC9C,YAAA;AACA,QAAA,CAAA;AAEA;;;OAIE,MAAMC,QAAO1C,GAAG,EAAA;AACd,YAAA,MAAM2C,eAAAA,GAAkB,MAAMzC,MAAAA,CAC3Ba,KAAK,CAAC;gBAAEC,IAAAA,EAAM,QAAA;gBAAUC,IAAAA,EAAM,mBAAA;gBAAqBC,GAAAA,EAAK;AAAU,aAAA,CAAA,CAClEC,GAAG,EAAA;AAEN,YAAA,MAAM,EAAEgB,EAAE,EAAE,GAAGnC,IAAI4C,MAAM;YACzB,MAAM,EAAEtB,KAAK,EAAEC,QAAQ,EAAEsB,QAAQ,EAAE,GAAG7C,GAAAA,CAAIoB,OAAO,CAACC,IAAI;AAEtD,YAAA,MAAMtB,IAAAA,GAAO,MAAMV,UAAAA,CAAW,MAAA,CAAA,CAAQyD,KAAK,CAACX,EAAAA,CAAAA;AAC5C,YAAA,IAAI,CAACpC,IAAAA,EAAM;AACT,gBAAA,MAAM,IAAIH,aAAAA,CAAc,CAAC,cAAc,CAAC,CAAA;AAC9C,YAAA;AAEI,YAAA,MAAMJ,sBAAAA,CAAuBQ,GAAAA,CAAIoB,OAAO,CAACC,IAAI,CAAA;AAE7C,YAAA,IAAItB,IAAAA,CAAKiC,QAAQ,KAAK,OAAA,IAAW/C,EAAE8D,GAAG,CAAC/C,GAAAA,CAAIoB,OAAO,CAACC,IAAI,EAAE,UAAA,CAAA,IAAe,CAACwB,QAAAA,EAAU;AACjF,gBAAA,MAAM,IAAIlD,eAAAA,CAAgB,kBAAA,CAAA;AAChC,YAAA;YAEI,IAAIV,CAAAA,CAAE8D,GAAG,CAAC/C,GAAAA,CAAIoB,OAAO,CAACC,IAAI,EAAE,UAAA,CAAA,EAAa;gBACvC,MAAMI,oBAAAA,GAAuB,MAAMvB,MAAAA,CAAOwB,EAAA,CACvChB,KAAK,CAAC,gCAAA,CAAA,CACNiB,OAAO,CAAC;oBAAEC,KAAAA,EAAO;AAAEL,wBAAAA;AAAQ;AAAE,iBAAA,CAAA;gBAEhC,IAAIE,oBAAAA,IAAwBxC,CAAAA,CAAE+D,QAAQ,CAACvB,oBAAAA,CAAqBU,EAAE,CAAA,KAAMlD,CAAAA,CAAE+D,QAAQ,CAACb,EAAAA,CAAAA,EAAK;AAClF,oBAAA,MAAM,IAAIzC,gBAAAA,CAAiB,wBAAA,CAAA;AACnC,gBAAA;AACA,YAAA;YAEI,IAAIT,CAAAA,CAAE8D,GAAG,CAAC/C,GAAAA,CAAIoB,OAAO,CAACC,IAAI,EAAE,OAAA,CAAA,IAAYsB,eAAAA,CAAgBd,YAAY,EAAE;gBACpE,MAAMC,iBAAAA,GAAoB,MAAM5B,MAAAA,CAAOwB,EAAA,CACpChB,KAAK,CAAC,gCAAA,CAAA,CACNiB,OAAO,CAAC;oBAAEC,KAAAA,EAAO;AAAEN,wBAAAA,KAAAA,EAAOA,MAAMS,WAAW;AAAE;;gBAEhD,IAAID,iBAAAA,IAAqB7C,CAAAA,CAAE+D,QAAQ,CAAClB,iBAAAA,CAAkBK,EAAE,CAAA,KAAMlD,CAAAA,CAAE+D,QAAQ,CAACb,EAAAA,CAAAA,EAAK;AAC5E,oBAAA,MAAM,IAAIzC,gBAAAA,CAAiB,qBAAA,CAAA;AACnC,gBAAA;AACMM,gBAAAA,GAAAA,CAAIoB,OAAO,CAACC,IAAI,CAACC,KAAK,GAAGtB,GAAAA,CAAIoB,OAAO,CAACC,IAAI,CAACC,KAAK,CAACS,WAAW,EAAA;AACjE,YAAA;AAEI,YAAA,MAAMkB,UAAAA,GAAa;gBACjB,GAAGjD,GAAAA,CAAIoB,OAAO,CAACC;AACrB,aAAA;YAEI,MAAMe,IAAAA,GAAO,MAAM/C,UAAAA,CAAW,MAAA,CAAA,CAAQ6D,IAAI,CAACnD,IAAAA,CAAKoC,EAAE,EAAEc,UAAAA,CAAAA;YACpD,MAAMX,aAAAA,GAAgB,MAAMxC,cAAAA,CAAesC,IAAAA,EAAMpC,GAAAA,CAAAA;AAEjDA,YAAAA,GAAAA,CAAImD,IAAI,CAACb,aAAAA,CAAAA;AACb,QAAA,CAAA;AAEA;;;OAIE,MAAMc,MAAKpD,GAAG,EAAA;YACZ,MAAMS,aAAAA,CAAcT,GAAAA,CAAIU,KAAK,EAAEV,GAAAA,CAAAA;AAC/B,YAAA,MAAMqD,cAAAA,GAAiB,MAAMzC,aAAAA,CAAcZ,GAAAA,CAAIU,KAAK,EAAEV,GAAAA,CAAAA;AACtD,YAAA,MAAMsD,KAAAA,GAAQ,MAAMjE,UAAAA,CAAW,MAAA,CAAA,CAAQkE,QAAQ,CAACF,cAAAA,CAAAA;AAEhDrD,YAAAA,GAAAA,CAAIqB,IAAI,GAAG,MAAMmC,OAAAA,CAAQC,GAAG,CAACH,KAAAA,CAAMI,GAAG,CAAC,CAAC3D,IAAAA,GAASD,cAAAA,CAAeC,IAAAA,EAAMC,GAAAA,CAAAA,CAAAA,CAAAA;AAC1E,QAAA,CAAA;AAEA;;;OAIE,MAAM2B,SAAQ3B,GAAG,EAAA;AACf,YAAA,MAAM,EAAEmC,EAAE,EAAE,GAAGnC,IAAI4C,MAAM;YACzB,MAAMnC,aAAAA,CAAcT,GAAAA,CAAIU,KAAK,EAAEV,GAAAA,CAAAA;AAC/B,YAAA,MAAMqD,cAAAA,GAAiB,MAAMzC,aAAAA,CAAcZ,GAAAA,CAAIU,KAAK,EAAEV,GAAAA,CAAAA;AAEtD,YAAA,IAAIoC,OAAO,MAAM/C,UAAAA,CAAW,MAAA,CAAA,CAAQyD,KAAK,CAACX,EAAAA,EAAIkB,cAAAA,CAAAA;AAE9C,YAAA,IAAIjB,IAAAA,EAAM;gBACRA,IAAAA,GAAO,MAAMtC,eAAesC,IAAAA,EAAMpC,GAAAA,CAAAA;AACxC,YAAA;AAEIA,YAAAA,GAAAA,CAAIqB,IAAI,GAAGe,IAAAA;AACf,QAAA,CAAA;AAEA;;;OAIE,MAAMuB,OAAM3D,GAAG,EAAA;YACb,MAAMS,aAAAA,CAAcT,GAAAA,CAAIU,KAAK,EAAEV,GAAAA,CAAAA;AAC/B,YAAA,MAAMqD,cAAAA,GAAiB,MAAMzC,aAAAA,CAAcZ,GAAAA,CAAIU,KAAK,EAAEV,GAAAA,CAAAA;AAEtDA,YAAAA,GAAAA,CAAIqB,IAAI,GAAG,MAAMhC,UAAAA,CAAW,MAAA,CAAA,CAAQsE,KAAK,CAACN,cAAAA,CAAAA;AAC9C,QAAA,CAAA;AAEA;;;OAIE,MAAMO,SAAQ5D,GAAG,EAAA;AACf,YAAA,MAAM,EAAEmC,EAAE,EAAE,GAAGnC,IAAI4C,MAAM;AAEzB,YAAA,MAAMR,IAAAA,GAAO,MAAM/C,UAAAA,CAAW,MAAA,CAAA,CAAQwE,MAAM,CAAC;AAAE1B,gBAAAA;;YAC/C,MAAM2B,aAAAA,GAAgB,MAAMhE,cAAAA,CAAesC,IAAAA,EAAMpC,GAAAA,CAAAA;AAEjDA,YAAAA,GAAAA,CAAImD,IAAI,CAACW,aAAAA,CAAAA;AACb,QAAA,CAAA;AAEA;;;OAIE,MAAMC,IAAG/D,GAAG,EAAA;AACV,YAAA,MAAMgE,QAAAA,GAAWhE,GAAAA,CAAIK,KAAK,CAACN,IAAI;YAC/B,MAAM,EAAEW,KAAK,EAAE,GAAGV,GAAAA;AAElB,YAAA,IAAI,CAACgE,QAAAA,EAAU;AACb,gBAAA,OAAOhE,IAAIiE,YAAY,EAAA;AAC7B,YAAA;AAEI,YAAA,MAAMxD,cAAcC,KAAAA,EAAOV,GAAAA,CAAAA;YAC3B,MAAMqD,cAAAA,GAAiB,MAAMzC,aAAAA,CAAcF,KAAAA,EAAOV,GAAAA,CAAAA;YAClD,MAAMD,IAAAA,GAAO,MAAMV,UAAAA,CAAW,MAAA,CAAA,CAAQyD,KAAK,CAACkB,QAAAA,CAAS7B,EAAE,EAAEkB,cAAAA,CAAAA;AAEzDrD,YAAAA,GAAAA,CAAIqB,IAAI,GAAG,MAAMvB,cAAAA,CAAeC,IAAAA,EAAMC,GAAAA,CAAAA;AAC1C,QAAA;AACA,KAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"user.mjs","sources":["../../../server/controllers/user.js"],"sourcesContent":["'use strict';\n\n/**\n * User.js controller\n *\n * @description: A set of functions called \"actions\" for managing `User`.\n */\n\nconst _ = require('lodash');\nconst utils = require('@strapi/utils');\nconst { getService } = require('../utils');\nconst { validateCreateUserBody, validateUpdateUserBody } = require('./validation/user');\n\nconst { ApplicationError, ValidationError, NotFoundError } = utils.errors;\n\nconst sanitizeOutput = async (user, ctx) => {\n const schema = strapi.getModel('plugin::users-permissions.user');\n const { auth } = ctx.state;\n\n return strapi.contentAPI.sanitize.output(user, schema, { auth });\n};\n\nconst validateQuery = async (query, ctx) => {\n const schema = strapi.getModel('plugin::users-permissions.user');\n const { auth } = ctx.state;\n\n return strapi.contentAPI.validate.query(query, schema, { auth });\n};\n\nconst sanitizeQuery = async (query, ctx) => {\n const schema = strapi.getModel('plugin::users-permissions.user');\n const { auth } = ctx.state;\n\n return strapi.contentAPI.sanitize.query(query, schema, { auth });\n};\n\nmodule.exports = {\n /**\n * Create a/an user record.\n * @return {Object}\n */\n async create(ctx) {\n const advanced = await strapi\n .store({ type: 'plugin', name: 'users-permissions', key: 'advanced' })\n .get();\n\n await validateCreateUserBody(ctx.request.body);\n\n const { email, username, role } = ctx.request.body;\n\n const userWithSameUsername = await strapi.db\n .query('plugin::users-permissions.user')\n .findOne({ where: { username } });\n\n if (userWithSameUsername) {\n if (!email) throw new ApplicationError('Username already taken');\n }\n\n if (advanced.unique_email) {\n const userWithSameEmail = await strapi.db\n .query('plugin::users-permissions.user')\n .findOne({ where: { email: email.toLowerCase() } });\n\n if (userWithSameEmail) {\n throw new ApplicationError('Email already taken');\n }\n }\n\n const user = {\n ...ctx.request.body,\n email: email.toLowerCase(),\n provider: 'local',\n };\n\n if (!role) {\n const defaultRole = await strapi.db\n .query('plugin::users-permissions.role')\n .findOne({ where: { type: advanced.default_role } });\n\n user.role = defaultRole.id;\n }\n\n try {\n const data = await getService('user').add(user);\n const sanitizedData = await sanitizeOutput(data, ctx);\n\n ctx.created(sanitizedData);\n } catch (error) {\n throw new ApplicationError(error.message);\n }\n },\n\n /**\n * Update a/an user record.\n * @return {Object}\n */\n async update(ctx) {\n const advancedConfigs = await strapi\n .store({ type: 'plugin', name: 'users-permissions', key: 'advanced' })\n .get();\n\n const { id } = ctx.params;\n const { email, username, password } = ctx.request.body;\n\n const user = await getService('user').fetch(id);\n if (!user) {\n throw new NotFoundError(`User not found`);\n }\n\n await validateUpdateUserBody(ctx.request.body);\n\n if (user.provider === 'local' && _.has(ctx.request.body, 'password') && !password) {\n throw new ValidationError('password.notNull');\n }\n\n if (_.has(ctx.request.body, 'username')) {\n const userWithSameUsername = await strapi.db\n .query('plugin::users-permissions.user')\n .findOne({ where: { username } });\n\n if (userWithSameUsername && _.toString(userWithSameUsername.id) !== _.toString(id)) {\n throw new ApplicationError('Username already taken');\n }\n }\n\n if (_.has(ctx.request.body, 'email') && advancedConfigs.unique_email) {\n const userWithSameEmail = await strapi.db\n .query('plugin::users-permissions.user')\n .findOne({ where: { email: email.toLowerCase() } });\n\n if (userWithSameEmail && _.toString(userWithSameEmail.id) !== _.toString(id)) {\n throw new ApplicationError('Email already taken');\n }\n ctx.request.body.email = ctx.request.body.email.toLowerCase();\n }\n\n const updateData = {\n ...ctx.request.body,\n };\n\n const data = await getService('user').edit(user.id, updateData);\n const sanitizedData = await sanitizeOutput(data, ctx);\n\n ctx.send(sanitizedData);\n },\n\n /**\n * Retrieve user records.\n * @return {Object|Array}\n */\n async find(ctx) {\n await validateQuery(ctx.query, ctx);\n const sanitizedQuery = await sanitizeQuery(ctx.query, ctx);\n const users = await getService('user').fetchAll(sanitizedQuery);\n\n ctx.body = await Promise.all(users.map((user) => sanitizeOutput(user, ctx)));\n },\n\n /**\n * Retrieve a user record.\n * @return {Object}\n */\n async findOne(ctx) {\n const { id } = ctx.params;\n await validateQuery(ctx.query, ctx);\n const sanitizedQuery = await sanitizeQuery(ctx.query, ctx);\n\n let data = await getService('user').fetch(id, sanitizedQuery);\n\n if (data) {\n data = await sanitizeOutput(data, ctx);\n }\n\n ctx.body = data;\n },\n\n /**\n * Retrieve user count.\n * @return {Number}\n */\n async count(ctx) {\n await validateQuery(ctx.query, ctx);\n const sanitizedQuery = await sanitizeQuery(ctx.query, ctx);\n\n ctx.body = await getService('user').count(sanitizedQuery);\n },\n\n /**\n * Destroy a/an user record.\n * @return {Object}\n */\n async destroy(ctx) {\n const { id } = ctx.params;\n\n const data = await getService('user').remove({ id });\n const sanitizedUser = await sanitizeOutput(data, ctx);\n\n ctx.send(sanitizedUser);\n },\n\n /**\n * Retrieve authenticated user.\n * @return {Object|Array}\n */\n async me(ctx) {\n const authUser = ctx.state.user;\n const { query } = ctx;\n\n if (!authUser) {\n return ctx.unauthorized();\n }\n\n await validateQuery(query, ctx);\n const sanitizedQuery = await sanitizeQuery(query, ctx);\n const user = await getService('user').fetch(authUser.id, sanitizedQuery);\n\n ctx.body = await sanitizeOutput(user, ctx);\n },\n};\n"],"names":["_","require$$0","utils","require$$1","getService","require$$2","validateCreateUserBody","validateUpdateUserBody","require$$3","ApplicationError","ValidationError","NotFoundError","errors","sanitizeOutput","user","ctx","schema","strapi","getModel","auth","state","contentAPI","sanitize","output","validateQuery","query","validate","sanitizeQuery","create","advanced","store","type","name","key","get","request","body","email","username","role","userWithSameUsername","db","findOne","where","unique_email","userWithSameEmail","toLowerCase","provider","defaultRole","default_role","id","data","add","sanitizedData","created","error","message","update","advancedConfigs","params","password","fetch","has","toString","updateData","edit","send","find","sanitizedQuery","users","fetchAll","Promise","all","map","count","destroy","remove","sanitizedUser","me","authUser","unauthorized"],"mappings":";;;;;;;;;;AAEA;;;;AAIA,KAEA,MAAMA,CAAAA,GAAIC,UAAAA;AACV,IAAA,MAAMC,KAAAA,GAAQC,UAAAA;IACd,MAAM,EAAEC,UAAU,EAAE,GAAGC,YAAAA,EAAAA;AACvB,IAAA,MAAM,EAAEC,sBAAsB,EAAEC,sBAAsB,EAAE,GAAGC,aAAAA,EAAAA;IAE3D,MAAM,EAAEC,gBAAgB,EAAEC,eAAe,EAAEC,aAAa,EAAE,GAAGT,KAAAA,CAAMU,MAAM;IAEzE,MAAMC,cAAAA,GAAiB,OAAOC,IAAAA,EAAMC,GAAAA,GAAAA;QAClC,MAAMC,MAAAA,GAASC,MAAAA,CAAOC,QAAQ,CAAC,gCAAA,CAAA;AAC/B,QAAA,MAAM,EAAEC,IAAI,EAAE,GAAGJ,IAAIK,KAAK;QAE1B,OAAOH,MAAAA,CAAOI,UAAU,CAACC,QAAQ,CAACC,MAAM,CAACT,MAAME,MAAAA,EAAQ;AAAEG,YAAAA;AAAI,SAAA,CAAA;AAC/D,IAAA,CAAA;IAEA,MAAMK,aAAAA,GAAgB,OAAOC,KAAAA,EAAOV,GAAAA,GAAAA;QAClC,MAAMC,MAAAA,GAASC,MAAAA,CAAOC,QAAQ,CAAC,gCAAA,CAAA;AAC/B,QAAA,MAAM,EAAEC,IAAI,EAAE,GAAGJ,IAAIK,KAAK;QAE1B,OAAOH,MAAAA,CAAOI,UAAU,CAACK,QAAQ,CAACD,KAAK,CAACA,OAAOT,MAAAA,EAAQ;AAAEG,YAAAA;AAAI,SAAA,CAAA;AAC/D,IAAA,CAAA;IAEA,MAAMQ,aAAAA,GAAgB,OAAOF,KAAAA,EAAOV,GAAAA,GAAAA;QAClC,MAAMC,MAAAA,GAASC,MAAAA,CAAOC,QAAQ,CAAC,gCAAA,CAAA;AAC/B,QAAA,MAAM,EAAEC,IAAI,EAAE,GAAGJ,IAAIK,KAAK;QAE1B,OAAOH,MAAAA,CAAOI,UAAU,CAACC,QAAQ,CAACG,KAAK,CAACA,OAAOT,MAAAA,EAAQ;AAAEG,YAAAA;AAAI,SAAA,CAAA;AAC/D,IAAA,CAAA;IAEAL,IAAAA,GAAiB;AACjB;;;OAIE,MAAMc,QAAOb,GAAG,EAAA;AACd,YAAA,MAAMc,QAAAA,GAAW,MAAMZ,MAAAA,CACpBa,KAAK,CAAC;gBAAEC,IAAAA,EAAM,QAAA;gBAAUC,IAAAA,EAAM,mBAAA;gBAAqBC,GAAAA,EAAK;eACxDC,GAAG,EAAA;AAEN,YAAA,MAAM5B,sBAAAA,CAAuBS,GAAAA,CAAIoB,OAAO,CAACC,IAAI,CAAA;YAE7C,MAAM,EAAEC,KAAK,EAAEC,QAAQ,EAAEC,IAAI,EAAE,GAAGxB,GAAAA,CAAIoB,OAAO,CAACC,IAAI;YAElD,MAAMI,oBAAAA,GAAuB,MAAMvB,MAAAA,CAAOwB,EAAE,CACzChB,KAAK,CAAC,gCAAA,CAAA,CACNiB,OAAO,CAAC;gBAAEC,KAAAA,EAAO;AAAEL,oBAAAA;AAAQ;AAAE,aAAA,CAAA;AAEhC,YAAA,IAAIE,oBAAAA,EAAsB;AACxB,gBAAA,IAAI,CAACH,KAAAA,EAAO,MAAM,IAAI5B,gBAAAA,CAAiB,wBAAA,CAAA;AAC7C,YAAA;YAEI,IAAIoB,QAAAA,CAASe,YAAY,EAAE;gBACzB,MAAMC,iBAAAA,GAAoB,MAAM5B,MAAAA,CAAOwB,EAAE,CACtChB,KAAK,CAAC,gCAAA,CAAA,CACNiB,OAAO,CAAC;oBAAEC,KAAAA,EAAO;AAAEN,wBAAAA,KAAAA,EAAOA,MAAMS,WAAW;AAAE;AAAE,iBAAA,CAAA;AAElD,gBAAA,IAAID,iBAAAA,EAAmB;AACrB,oBAAA,MAAM,IAAIpC,gBAAAA,CAAiB,qBAAA,CAAA;AACnC,gBAAA;AACA,YAAA;AAEI,YAAA,MAAMK,IAAAA,GAAO;gBACX,GAAGC,GAAAA,CAAIoB,OAAO,CAACC,IAAI;AACnBC,gBAAAA,KAAAA,EAAOA,MAAMS,WAAW,EAAA;gBACxBC,QAAAA,EAAU;AAChB,aAAA;AAEI,YAAA,IAAI,CAACR,IAAAA,EAAM;gBACT,MAAMS,WAAAA,GAAc,MAAM/B,MAAAA,CAAOwB,EAAE,CAChChB,KAAK,CAAC,gCAAA,CAAA,CACNiB,OAAO,CAAC;oBAAEC,KAAAA,EAAO;AAAEZ,wBAAAA,IAAAA,EAAMF,SAASoB;AAAY;AAAE,iBAAA,CAAA;gBAEnDnC,IAAAA,CAAKyB,IAAI,GAAGS,WAAAA,CAAYE,EAAE;AAChC,YAAA;YAEI,IAAI;AACF,gBAAA,MAAMC,IAAAA,GAAO,MAAM/C,UAAAA,CAAW,MAAA,CAAA,CAAQgD,GAAG,CAACtC,IAAAA,CAAAA;gBAC1C,MAAMuC,aAAAA,GAAgB,MAAMxC,cAAAA,CAAesC,IAAAA,EAAMpC,GAAAA,CAAAA;AAEjDA,gBAAAA,GAAAA,CAAIuC,OAAO,CAACD,aAAAA,CAAAA;AAClB,YAAA,CAAA,CAAM,OAAOE,KAAAA,EAAO;gBACd,MAAM,IAAI9C,gBAAAA,CAAiB8C,KAAAA,CAAMC,OAAO,CAAA;AAC9C,YAAA;AACA,QAAA,CAAA;AAEA;;;OAIE,MAAMC,QAAO1C,GAAG,EAAA;AACd,YAAA,MAAM2C,eAAAA,GAAkB,MAAMzC,MAAAA,CAC3Ba,KAAK,CAAC;gBAAEC,IAAAA,EAAM,QAAA;gBAAUC,IAAAA,EAAM,mBAAA;gBAAqBC,GAAAA,EAAK;eACxDC,GAAG,EAAA;AAEN,YAAA,MAAM,EAAEgB,EAAE,EAAE,GAAGnC,IAAI4C,MAAM;YACzB,MAAM,EAAEtB,KAAK,EAAEC,QAAQ,EAAEsB,QAAQ,EAAE,GAAG7C,GAAAA,CAAIoB,OAAO,CAACC,IAAI;AAEtD,YAAA,MAAMtB,IAAAA,GAAO,MAAMV,UAAAA,CAAW,MAAA,CAAA,CAAQyD,KAAK,CAACX,EAAAA,CAAAA;AAC5C,YAAA,IAAI,CAACpC,IAAAA,EAAM;AACT,gBAAA,MAAM,IAAIH,aAAAA,CAAc,CAAC,cAAc,CAAC,CAAA;AAC9C,YAAA;AAEI,YAAA,MAAMJ,sBAAAA,CAAuBQ,GAAAA,CAAIoB,OAAO,CAACC,IAAI,CAAA;AAE7C,YAAA,IAAItB,IAAAA,CAAKiC,QAAQ,KAAK,OAAA,IAAW/C,EAAE8D,GAAG,CAAC/C,GAAAA,CAAIoB,OAAO,CAACC,IAAI,EAAE,UAAA,CAAA,IAAe,CAACwB,QAAAA,EAAU;AACjF,gBAAA,MAAM,IAAIlD,eAAAA,CAAgB,kBAAA,CAAA;AAChC,YAAA;YAEI,IAAIV,CAAAA,CAAE8D,GAAG,CAAC/C,GAAAA,CAAIoB,OAAO,CAACC,IAAI,EAAE,UAAA,CAAA,EAAa;gBACvC,MAAMI,oBAAAA,GAAuB,MAAMvB,MAAAA,CAAOwB,EAAE,CACzChB,KAAK,CAAC,gCAAA,CAAA,CACNiB,OAAO,CAAC;oBAAEC,KAAAA,EAAO;AAAEL,wBAAAA;AAAQ;AAAE,iBAAA,CAAA;gBAEhC,IAAIE,oBAAAA,IAAwBxC,CAAAA,CAAE+D,QAAQ,CAACvB,oBAAAA,CAAqBU,EAAE,CAAA,KAAMlD,CAAAA,CAAE+D,QAAQ,CAACb,EAAAA,CAAAA,EAAK;AAClF,oBAAA,MAAM,IAAIzC,gBAAAA,CAAiB,wBAAA,CAAA;AACnC,gBAAA;AACA,YAAA;YAEI,IAAIT,CAAAA,CAAE8D,GAAG,CAAC/C,GAAAA,CAAIoB,OAAO,CAACC,IAAI,EAAE,OAAA,CAAA,IAAYsB,eAAAA,CAAgBd,YAAY,EAAE;gBACpE,MAAMC,iBAAAA,GAAoB,MAAM5B,MAAAA,CAAOwB,EAAE,CACtChB,KAAK,CAAC,gCAAA,CAAA,CACNiB,OAAO,CAAC;oBAAEC,KAAAA,EAAO;AAAEN,wBAAAA,KAAAA,EAAOA,MAAMS,WAAW;AAAE;AAAE,iBAAA,CAAA;gBAElD,IAAID,iBAAAA,IAAqB7C,CAAAA,CAAE+D,QAAQ,CAAClB,iBAAAA,CAAkBK,EAAE,CAAA,KAAMlD,CAAAA,CAAE+D,QAAQ,CAACb,EAAAA,CAAAA,EAAK;AAC5E,oBAAA,MAAM,IAAIzC,gBAAAA,CAAiB,qBAAA,CAAA;AACnC,gBAAA;AACMM,gBAAAA,GAAAA,CAAIoB,OAAO,CAACC,IAAI,CAACC,KAAK,GAAGtB,GAAAA,CAAIoB,OAAO,CAACC,IAAI,CAACC,KAAK,CAACS,WAAW,EAAA;AACjE,YAAA;AAEI,YAAA,MAAMkB,UAAAA,GAAa;gBACjB,GAAGjD,GAAAA,CAAIoB,OAAO,CAACC;AACrB,aAAA;YAEI,MAAMe,IAAAA,GAAO,MAAM/C,UAAAA,CAAW,MAAA,CAAA,CAAQ6D,IAAI,CAACnD,IAAAA,CAAKoC,EAAE,EAAEc,UAAAA,CAAAA;YACpD,MAAMX,aAAAA,GAAgB,MAAMxC,cAAAA,CAAesC,IAAAA,EAAMpC,GAAAA,CAAAA;AAEjDA,YAAAA,GAAAA,CAAImD,IAAI,CAACb,aAAAA,CAAAA;AACb,QAAA,CAAA;AAEA;;;OAIE,MAAMc,MAAKpD,GAAG,EAAA;YACZ,MAAMS,aAAAA,CAAcT,GAAAA,CAAIU,KAAK,EAAEV,GAAAA,CAAAA;AAC/B,YAAA,MAAMqD,cAAAA,GAAiB,MAAMzC,aAAAA,CAAcZ,GAAAA,CAAIU,KAAK,EAAEV,GAAAA,CAAAA;AACtD,YAAA,MAAMsD,KAAAA,GAAQ,MAAMjE,UAAAA,CAAW,MAAA,CAAA,CAAQkE,QAAQ,CAACF,cAAAA,CAAAA;AAEhDrD,YAAAA,GAAAA,CAAIqB,IAAI,GAAG,MAAMmC,OAAAA,CAAQC,GAAG,CAACH,KAAAA,CAAMI,GAAG,CAAC,CAAC3D,IAAAA,GAASD,cAAAA,CAAeC,IAAAA,EAAMC,GAAAA,CAAAA,CAAAA,CAAAA;AAC1E,QAAA,CAAA;AAEA;;;OAIE,MAAM2B,SAAQ3B,GAAG,EAAA;AACf,YAAA,MAAM,EAAEmC,EAAE,EAAE,GAAGnC,IAAI4C,MAAM;YACzB,MAAMnC,aAAAA,CAAcT,GAAAA,CAAIU,KAAK,EAAEV,GAAAA,CAAAA;AAC/B,YAAA,MAAMqD,cAAAA,GAAiB,MAAMzC,aAAAA,CAAcZ,GAAAA,CAAIU,KAAK,EAAEV,GAAAA,CAAAA;AAEtD,YAAA,IAAIoC,OAAO,MAAM/C,UAAAA,CAAW,MAAA,CAAA,CAAQyD,KAAK,CAACX,EAAAA,EAAIkB,cAAAA,CAAAA;AAE9C,YAAA,IAAIjB,IAAAA,EAAM;gBACRA,IAAAA,GAAO,MAAMtC,eAAesC,IAAAA,EAAMpC,GAAAA,CAAAA;AACxC,YAAA;AAEIA,YAAAA,GAAAA,CAAIqB,IAAI,GAAGe,IAAAA;AACf,QAAA,CAAA;AAEA;;;OAIE,MAAMuB,OAAM3D,GAAG,EAAA;YACb,MAAMS,aAAAA,CAAcT,GAAAA,CAAIU,KAAK,EAAEV,GAAAA,CAAAA;AAC/B,YAAA,MAAMqD,cAAAA,GAAiB,MAAMzC,aAAAA,CAAcZ,GAAAA,CAAIU,KAAK,EAAEV,GAAAA,CAAAA;AAEtDA,YAAAA,GAAAA,CAAIqB,IAAI,GAAG,MAAMhC,UAAAA,CAAW,MAAA,CAAA,CAAQsE,KAAK,CAACN,cAAAA,CAAAA;AAC9C,QAAA,CAAA;AAEA;;;OAIE,MAAMO,SAAQ5D,GAAG,EAAA;AACf,YAAA,MAAM,EAAEmC,EAAE,EAAE,GAAGnC,IAAI4C,MAAM;AAEzB,YAAA,MAAMR,IAAAA,GAAO,MAAM/C,UAAAA,CAAW,MAAA,CAAA,CAAQwE,MAAM,CAAC;AAAE1B,gBAAAA;AAAE,aAAA,CAAA;YACjD,MAAM2B,aAAAA,GAAgB,MAAMhE,cAAAA,CAAesC,IAAAA,EAAMpC,GAAAA,CAAAA;AAEjDA,YAAAA,GAAAA,CAAImD,IAAI,CAACW,aAAAA,CAAAA;AACb,QAAA,CAAA;AAEA;;;OAIE,MAAMC,IAAG/D,GAAG,EAAA;AACV,YAAA,MAAMgE,QAAAA,GAAWhE,GAAAA,CAAIK,KAAK,CAACN,IAAI;YAC/B,MAAM,EAAEW,KAAK,EAAE,GAAGV,GAAAA;AAElB,YAAA,IAAI,CAACgE,QAAAA,EAAU;AACb,gBAAA,OAAOhE,IAAIiE,YAAY,EAAA;AAC7B,YAAA;AAEI,YAAA,MAAMxD,cAAcC,KAAAA,EAAOV,GAAAA,CAAAA;YAC3B,MAAMqD,cAAAA,GAAiB,MAAMzC,aAAAA,CAAcF,KAAAA,EAAOV,GAAAA,CAAAA;YAClD,MAAMD,IAAAA,GAAO,MAAMV,UAAAA,CAAW,MAAA,CAAA,CAAQyD,KAAK,CAACkB,QAAAA,CAAS7B,EAAE,EAAEkB,cAAAA,CAAAA;AAEzDrD,YAAAA,GAAAA,CAAIqB,IAAI,GAAG,MAAMvB,cAAAA,CAAeC,IAAAA,EAAMC,GAAAA,CAAAA;AAC1C,QAAA;AACA,KAAA;;;;;;"}
1
+ {"version":3,"file":"user.mjs","sources":["../../../server/controllers/user.js"],"sourcesContent":["'use strict';\n\n/**\n * User.js controller\n *\n * @description: A set of functions called \"actions\" for managing `User`.\n */\n\nconst _ = require('lodash');\nconst utils = require('@strapi/utils');\nconst { getService } = require('../utils');\nconst { validateCreateUserBody, validateUpdateUserBody } = require('./validation/user');\n\nconst { ApplicationError, ValidationError, NotFoundError } = utils.errors;\n\nconst sanitizeOutput = async (user, ctx) => {\n const schema = strapi.getModel('plugin::users-permissions.user');\n const { auth } = ctx.state;\n\n return strapi.contentAPI.sanitize.output(user, schema, { auth });\n};\n\nconst validateQuery = async (query, ctx) => {\n const schema = strapi.getModel('plugin::users-permissions.user');\n const { auth } = ctx.state;\n\n return strapi.contentAPI.validate.query(query, schema, { auth });\n};\n\nconst sanitizeQuery = async (query, ctx) => {\n const schema = strapi.getModel('plugin::users-permissions.user');\n const { auth } = ctx.state;\n\n return strapi.contentAPI.sanitize.query(query, schema, { auth });\n};\n\nmodule.exports = {\n /**\n * Create a/an user record.\n * @return {Object}\n */\n async create(ctx) {\n const advanced = await strapi\n .store({ type: 'plugin', name: 'users-permissions', key: 'advanced' })\n .get();\n\n await validateCreateUserBody(ctx.request.body);\n\n const { email, username, role } = ctx.request.body;\n\n const userWithSameUsername = await strapi.db\n .query('plugin::users-permissions.user')\n .findOne({ where: { username } });\n\n if (userWithSameUsername) {\n if (!email) throw new ApplicationError('Username already taken');\n }\n\n if (advanced.unique_email) {\n const userWithSameEmail = await strapi.db\n .query('plugin::users-permissions.user')\n .findOne({ where: { email: email.toLowerCase() } });\n\n if (userWithSameEmail) {\n throw new ApplicationError('Email already taken');\n }\n }\n\n const user = {\n ...ctx.request.body,\n email: email.toLowerCase(),\n provider: 'local',\n };\n\n if (!role) {\n const defaultRole = await strapi.db\n .query('plugin::users-permissions.role')\n .findOne({ where: { type: advanced.default_role } });\n\n user.role = defaultRole.id;\n }\n\n try {\n const data = await getService('user').add(user);\n const sanitizedData = await sanitizeOutput(data, ctx);\n\n ctx.created(sanitizedData);\n } catch (error) {\n throw new ApplicationError(error.message);\n }\n },\n\n /**\n * Update a/an user record.\n * @return {Object}\n */\n async update(ctx) {\n const advancedConfigs = await strapi\n .store({ type: 'plugin', name: 'users-permissions', key: 'advanced' })\n .get();\n\n const { id } = ctx.params;\n const { email, username, password } = ctx.request.body;\n\n const user = await getService('user').fetch(id);\n if (!user) {\n throw new NotFoundError(`User not found`);\n }\n\n await validateUpdateUserBody(ctx.request.body);\n\n if (user.provider === 'local' && _.has(ctx.request.body, 'password') && !password) {\n throw new ValidationError('password.notNull');\n }\n\n if (_.has(ctx.request.body, 'username')) {\n const userWithSameUsername = await strapi.db\n .query('plugin::users-permissions.user')\n .findOne({ where: { username } });\n\n if (userWithSameUsername && _.toString(userWithSameUsername.id) !== _.toString(id)) {\n throw new ApplicationError('Username already taken');\n }\n }\n\n if (_.has(ctx.request.body, 'email') && advancedConfigs.unique_email) {\n const userWithSameEmail = await strapi.db\n .query('plugin::users-permissions.user')\n .findOne({ where: { email: email.toLowerCase() } });\n\n if (userWithSameEmail && _.toString(userWithSameEmail.id) !== _.toString(id)) {\n throw new ApplicationError('Email already taken');\n }\n ctx.request.body.email = ctx.request.body.email.toLowerCase();\n }\n\n const updateData = {\n ...ctx.request.body,\n };\n\n const data = await getService('user').edit(user.id, updateData);\n const sanitizedData = await sanitizeOutput(data, ctx);\n\n ctx.send(sanitizedData);\n },\n\n /**\n * Retrieve user records.\n * @return {Object|Array}\n */\n async find(ctx) {\n await validateQuery(ctx.query, ctx);\n const sanitizedQuery = await sanitizeQuery(ctx.query, ctx);\n const users = await getService('user').fetchAll(sanitizedQuery);\n\n ctx.body = await Promise.all(users.map((user) => sanitizeOutput(user, ctx)));\n },\n\n /**\n * Retrieve a user record.\n * @return {Object}\n */\n async findOne(ctx) {\n const { id } = ctx.params;\n await validateQuery(ctx.query, ctx);\n const sanitizedQuery = await sanitizeQuery(ctx.query, ctx);\n\n let data = await getService('user').fetch(id, sanitizedQuery);\n\n if (data) {\n data = await sanitizeOutput(data, ctx);\n }\n\n ctx.body = data;\n },\n\n /**\n * Retrieve user count.\n * @return {Number}\n */\n async count(ctx) {\n await validateQuery(ctx.query, ctx);\n const sanitizedQuery = await sanitizeQuery(ctx.query, ctx);\n\n ctx.body = await getService('user').count(sanitizedQuery);\n },\n\n /**\n * Destroy a/an user record.\n * @return {Object}\n */\n async destroy(ctx) {\n const { id } = ctx.params;\n\n const data = await getService('user').remove({ id });\n const sanitizedUser = await sanitizeOutput(data, ctx);\n\n ctx.send(sanitizedUser);\n },\n\n /**\n * Retrieve authenticated user.\n * @return {Object|Array}\n */\n async me(ctx) {\n const authUser = ctx.state.user;\n const { query } = ctx;\n\n if (!authUser) {\n return ctx.unauthorized();\n }\n\n await validateQuery(query, ctx);\n const sanitizedQuery = await sanitizeQuery(query, ctx);\n const user = await getService('user').fetch(authUser.id, sanitizedQuery);\n\n ctx.body = await sanitizeOutput(user, ctx);\n },\n};\n"],"names":["_","require$$0","utils","require$$1","getService","require$$2","validateCreateUserBody","validateUpdateUserBody","require$$3","ApplicationError","ValidationError","NotFoundError","errors","sanitizeOutput","user","ctx","schema","strapi","getModel","auth","state","contentAPI","sanitize","output","validateQuery","query","validate","sanitizeQuery","create","advanced","store","type","name","key","get","request","body","email","username","role","userWithSameUsername","db","findOne","where","unique_email","userWithSameEmail","toLowerCase","provider","defaultRole","default_role","id","data","add","sanitizedData","created","error","message","update","advancedConfigs","params","password","fetch","has","toString","updateData","edit","send","find","sanitizedQuery","users","fetchAll","Promise","all","map","count","destroy","remove","sanitizedUser","me","authUser","unauthorized"],"mappings":";;;;;;;;;;AAEA;;;;AAIA,KAEA,MAAMA,CAAAA,GAAIC,UAAAA;AACV,IAAA,MAAMC,KAAAA,GAAQC,UAAAA;IACd,MAAM,EAAEC,UAAU,EAAE,GAAGC,YAAAA,EAAAA;AACvB,IAAA,MAAM,EAAEC,sBAAsB,EAAEC,sBAAsB,EAAE,GAAGC,aAAAA,EAAAA;IAE3D,MAAM,EAAEC,gBAAgB,EAAEC,eAAe,EAAEC,aAAa,EAAE,GAAGT,KAAAA,CAAMU,MAAM;IAEzE,MAAMC,cAAAA,GAAiB,OAAOC,IAAAA,EAAMC,GAAAA,GAAAA;QAClC,MAAMC,MAAAA,GAASC,MAAAA,CAAOC,QAAQ,CAAC,gCAAA,CAAA;AAC/B,QAAA,MAAM,EAAEC,IAAI,EAAE,GAAGJ,IAAIK,KAAK;QAE1B,OAAOH,MAAAA,CAAOI,UAAU,CAACC,QAAQ,CAACC,MAAM,CAACT,MAAME,MAAAA,EAAQ;AAAEG,YAAAA;;AAC3D,IAAA,CAAA;IAEA,MAAMK,aAAAA,GAAgB,OAAOC,KAAAA,EAAOV,GAAAA,GAAAA;QAClC,MAAMC,MAAAA,GAASC,MAAAA,CAAOC,QAAQ,CAAC,gCAAA,CAAA;AAC/B,QAAA,MAAM,EAAEC,IAAI,EAAE,GAAGJ,IAAIK,KAAK;QAE1B,OAAOH,MAAAA,CAAOI,UAAU,CAACK,QAAQ,CAACD,KAAK,CAACA,OAAOT,MAAAA,EAAQ;AAAEG,YAAAA;;AAC3D,IAAA,CAAA;IAEA,MAAMQ,aAAAA,GAAgB,OAAOF,KAAAA,EAAOV,GAAAA,GAAAA;QAClC,MAAMC,MAAAA,GAASC,MAAAA,CAAOC,QAAQ,CAAC,gCAAA,CAAA;AAC/B,QAAA,MAAM,EAAEC,IAAI,EAAE,GAAGJ,IAAIK,KAAK;QAE1B,OAAOH,MAAAA,CAAOI,UAAU,CAACC,QAAQ,CAACG,KAAK,CAACA,OAAOT,MAAAA,EAAQ;AAAEG,YAAAA;;AAC3D,IAAA,CAAA;IAEAL,IAAAA,GAAiB;AACjB;;;OAIE,MAAMc,QAAOb,GAAG,EAAA;AACd,YAAA,MAAMc,QAAAA,GAAW,MAAMZ,MAAAA,CACpBa,KAAK,CAAC;gBAAEC,IAAAA,EAAM,QAAA;gBAAUC,IAAAA,EAAM,mBAAA;gBAAqBC,GAAAA,EAAK;AAAU,aAAA,CAAA,CAClEC,GAAG,EAAA;AAEN,YAAA,MAAM5B,sBAAAA,CAAuBS,GAAAA,CAAIoB,OAAO,CAACC,IAAI,CAAA;YAE7C,MAAM,EAAEC,KAAK,EAAEC,QAAQ,EAAEC,IAAI,EAAE,GAAGxB,GAAAA,CAAIoB,OAAO,CAACC,IAAI;YAElD,MAAMI,oBAAAA,GAAuB,MAAMvB,MAAAA,CAAOwB,EAAA,CACvChB,KAAK,CAAC,gCAAA,CAAA,CACNiB,OAAO,CAAC;gBAAEC,KAAAA,EAAO;AAAEL,oBAAAA;AAAQ;AAAE,aAAA,CAAA;AAEhC,YAAA,IAAIE,oBAAAA,EAAsB;AACxB,gBAAA,IAAI,CAACH,KAAAA,EAAO,MAAM,IAAI5B,gBAAAA,CAAiB,wBAAA,CAAA;AAC7C,YAAA;YAEI,IAAIoB,QAAAA,CAASe,YAAY,EAAE;gBACzB,MAAMC,iBAAAA,GAAoB,MAAM5B,MAAAA,CAAOwB,EAAA,CACpChB,KAAK,CAAC,gCAAA,CAAA,CACNiB,OAAO,CAAC;oBAAEC,KAAAA,EAAO;AAAEN,wBAAAA,KAAAA,EAAOA,MAAMS,WAAW;AAAE;;AAEhD,gBAAA,IAAID,iBAAAA,EAAmB;AACrB,oBAAA,MAAM,IAAIpC,gBAAAA,CAAiB,qBAAA,CAAA;AACnC,gBAAA;AACA,YAAA;AAEI,YAAA,MAAMK,IAAAA,GAAO;gBACX,GAAGC,GAAAA,CAAIoB,OAAO,CAACC,IAAI;AACnBC,gBAAAA,KAAAA,EAAOA,MAAMS,WAAW,EAAA;gBACxBC,QAAAA,EAAU;AAChB,aAAA;AAEI,YAAA,IAAI,CAACR,IAAAA,EAAM;gBACT,MAAMS,WAAAA,GAAc,MAAM/B,MAAAA,CAAOwB,EAAA,CAC9BhB,KAAK,CAAC,gCAAA,CAAA,CACNiB,OAAO,CAAC;oBAAEC,KAAAA,EAAO;AAAEZ,wBAAAA,IAAAA,EAAMF,SAASoB;AAAY;;gBAEjDnC,IAAAA,CAAKyB,IAAI,GAAGS,WAAAA,CAAYE,EAAE;AAChC,YAAA;YAEI,IAAI;AACF,gBAAA,MAAMC,IAAAA,GAAO,MAAM/C,UAAAA,CAAW,MAAA,CAAA,CAAQgD,GAAG,CAACtC,IAAAA,CAAAA;gBAC1C,MAAMuC,aAAAA,GAAgB,MAAMxC,cAAAA,CAAesC,IAAAA,EAAMpC,GAAAA,CAAAA;AAEjDA,gBAAAA,GAAAA,CAAIuC,OAAO,CAACD,aAAAA,CAAAA;AAClB,YAAA,CAAA,CAAM,OAAOE,KAAAA,EAAO;gBACd,MAAM,IAAI9C,gBAAAA,CAAiB8C,KAAAA,CAAMC,OAAO,CAAA;AAC9C,YAAA;AACA,QAAA,CAAA;AAEA;;;OAIE,MAAMC,QAAO1C,GAAG,EAAA;AACd,YAAA,MAAM2C,eAAAA,GAAkB,MAAMzC,MAAAA,CAC3Ba,KAAK,CAAC;gBAAEC,IAAAA,EAAM,QAAA;gBAAUC,IAAAA,EAAM,mBAAA;gBAAqBC,GAAAA,EAAK;AAAU,aAAA,CAAA,CAClEC,GAAG,EAAA;AAEN,YAAA,MAAM,EAAEgB,EAAE,EAAE,GAAGnC,IAAI4C,MAAM;YACzB,MAAM,EAAEtB,KAAK,EAAEC,QAAQ,EAAEsB,QAAQ,EAAE,GAAG7C,GAAAA,CAAIoB,OAAO,CAACC,IAAI;AAEtD,YAAA,MAAMtB,IAAAA,GAAO,MAAMV,UAAAA,CAAW,MAAA,CAAA,CAAQyD,KAAK,CAACX,EAAAA,CAAAA;AAC5C,YAAA,IAAI,CAACpC,IAAAA,EAAM;AACT,gBAAA,MAAM,IAAIH,aAAAA,CAAc,CAAC,cAAc,CAAC,CAAA;AAC9C,YAAA;AAEI,YAAA,MAAMJ,sBAAAA,CAAuBQ,GAAAA,CAAIoB,OAAO,CAACC,IAAI,CAAA;AAE7C,YAAA,IAAItB,IAAAA,CAAKiC,QAAQ,KAAK,OAAA,IAAW/C,EAAE8D,GAAG,CAAC/C,GAAAA,CAAIoB,OAAO,CAACC,IAAI,EAAE,UAAA,CAAA,IAAe,CAACwB,QAAAA,EAAU;AACjF,gBAAA,MAAM,IAAIlD,eAAAA,CAAgB,kBAAA,CAAA;AAChC,YAAA;YAEI,IAAIV,CAAAA,CAAE8D,GAAG,CAAC/C,GAAAA,CAAIoB,OAAO,CAACC,IAAI,EAAE,UAAA,CAAA,EAAa;gBACvC,MAAMI,oBAAAA,GAAuB,MAAMvB,MAAAA,CAAOwB,EAAA,CACvChB,KAAK,CAAC,gCAAA,CAAA,CACNiB,OAAO,CAAC;oBAAEC,KAAAA,EAAO;AAAEL,wBAAAA;AAAQ;AAAE,iBAAA,CAAA;gBAEhC,IAAIE,oBAAAA,IAAwBxC,CAAAA,CAAE+D,QAAQ,CAACvB,oBAAAA,CAAqBU,EAAE,CAAA,KAAMlD,CAAAA,CAAE+D,QAAQ,CAACb,EAAAA,CAAAA,EAAK;AAClF,oBAAA,MAAM,IAAIzC,gBAAAA,CAAiB,wBAAA,CAAA;AACnC,gBAAA;AACA,YAAA;YAEI,IAAIT,CAAAA,CAAE8D,GAAG,CAAC/C,GAAAA,CAAIoB,OAAO,CAACC,IAAI,EAAE,OAAA,CAAA,IAAYsB,eAAAA,CAAgBd,YAAY,EAAE;gBACpE,MAAMC,iBAAAA,GAAoB,MAAM5B,MAAAA,CAAOwB,EAAA,CACpChB,KAAK,CAAC,gCAAA,CAAA,CACNiB,OAAO,CAAC;oBAAEC,KAAAA,EAAO;AAAEN,wBAAAA,KAAAA,EAAOA,MAAMS,WAAW;AAAE;;gBAEhD,IAAID,iBAAAA,IAAqB7C,CAAAA,CAAE+D,QAAQ,CAAClB,iBAAAA,CAAkBK,EAAE,CAAA,KAAMlD,CAAAA,CAAE+D,QAAQ,CAACb,EAAAA,CAAAA,EAAK;AAC5E,oBAAA,MAAM,IAAIzC,gBAAAA,CAAiB,qBAAA,CAAA;AACnC,gBAAA;AACMM,gBAAAA,GAAAA,CAAIoB,OAAO,CAACC,IAAI,CAACC,KAAK,GAAGtB,GAAAA,CAAIoB,OAAO,CAACC,IAAI,CAACC,KAAK,CAACS,WAAW,EAAA;AACjE,YAAA;AAEI,YAAA,MAAMkB,UAAAA,GAAa;gBACjB,GAAGjD,GAAAA,CAAIoB,OAAO,CAACC;AACrB,aAAA;YAEI,MAAMe,IAAAA,GAAO,MAAM/C,UAAAA,CAAW,MAAA,CAAA,CAAQ6D,IAAI,CAACnD,IAAAA,CAAKoC,EAAE,EAAEc,UAAAA,CAAAA;YACpD,MAAMX,aAAAA,GAAgB,MAAMxC,cAAAA,CAAesC,IAAAA,EAAMpC,GAAAA,CAAAA;AAEjDA,YAAAA,GAAAA,CAAImD,IAAI,CAACb,aAAAA,CAAAA;AACb,QAAA,CAAA;AAEA;;;OAIE,MAAMc,MAAKpD,GAAG,EAAA;YACZ,MAAMS,aAAAA,CAAcT,GAAAA,CAAIU,KAAK,EAAEV,GAAAA,CAAAA;AAC/B,YAAA,MAAMqD,cAAAA,GAAiB,MAAMzC,aAAAA,CAAcZ,GAAAA,CAAIU,KAAK,EAAEV,GAAAA,CAAAA;AACtD,YAAA,MAAMsD,KAAAA,GAAQ,MAAMjE,UAAAA,CAAW,MAAA,CAAA,CAAQkE,QAAQ,CAACF,cAAAA,CAAAA;AAEhDrD,YAAAA,GAAAA,CAAIqB,IAAI,GAAG,MAAMmC,OAAAA,CAAQC,GAAG,CAACH,KAAAA,CAAMI,GAAG,CAAC,CAAC3D,IAAAA,GAASD,cAAAA,CAAeC,IAAAA,EAAMC,GAAAA,CAAAA,CAAAA,CAAAA;AAC1E,QAAA,CAAA;AAEA;;;OAIE,MAAM2B,SAAQ3B,GAAG,EAAA;AACf,YAAA,MAAM,EAAEmC,EAAE,EAAE,GAAGnC,IAAI4C,MAAM;YACzB,MAAMnC,aAAAA,CAAcT,GAAAA,CAAIU,KAAK,EAAEV,GAAAA,CAAAA;AAC/B,YAAA,MAAMqD,cAAAA,GAAiB,MAAMzC,aAAAA,CAAcZ,GAAAA,CAAIU,KAAK,EAAEV,GAAAA,CAAAA;AAEtD,YAAA,IAAIoC,OAAO,MAAM/C,UAAAA,CAAW,MAAA,CAAA,CAAQyD,KAAK,CAACX,EAAAA,EAAIkB,cAAAA,CAAAA;AAE9C,YAAA,IAAIjB,IAAAA,EAAM;gBACRA,IAAAA,GAAO,MAAMtC,eAAesC,IAAAA,EAAMpC,GAAAA,CAAAA;AACxC,YAAA;AAEIA,YAAAA,GAAAA,CAAIqB,IAAI,GAAGe,IAAAA;AACf,QAAA,CAAA;AAEA;;;OAIE,MAAMuB,OAAM3D,GAAG,EAAA;YACb,MAAMS,aAAAA,CAAcT,GAAAA,CAAIU,KAAK,EAAEV,GAAAA,CAAAA;AAC/B,YAAA,MAAMqD,cAAAA,GAAiB,MAAMzC,aAAAA,CAAcZ,GAAAA,CAAIU,KAAK,EAAEV,GAAAA,CAAAA;AAEtDA,YAAAA,GAAAA,CAAIqB,IAAI,GAAG,MAAMhC,UAAAA,CAAW,MAAA,CAAA,CAAQsE,KAAK,CAACN,cAAAA,CAAAA;AAC9C,QAAA,CAAA;AAEA;;;OAIE,MAAMO,SAAQ5D,GAAG,EAAA;AACf,YAAA,MAAM,EAAEmC,EAAE,EAAE,GAAGnC,IAAI4C,MAAM;AAEzB,YAAA,MAAMR,IAAAA,GAAO,MAAM/C,UAAAA,CAAW,MAAA,CAAA,CAAQwE,MAAM,CAAC;AAAE1B,gBAAAA;;YAC/C,MAAM2B,aAAAA,GAAgB,MAAMhE,cAAAA,CAAesC,IAAAA,EAAMpC,GAAAA,CAAAA;AAEjDA,YAAAA,GAAAA,CAAImD,IAAI,CAACW,aAAAA,CAAAA;AACb,QAAA,CAAA;AAEA;;;OAIE,MAAMC,IAAG/D,GAAG,EAAA;AACV,YAAA,MAAMgE,QAAAA,GAAWhE,GAAAA,CAAIK,KAAK,CAACN,IAAI;YAC/B,MAAM,EAAEW,KAAK,EAAE,GAAGV,GAAAA;AAElB,YAAA,IAAI,CAACgE,QAAAA,EAAU;AACb,gBAAA,OAAOhE,IAAIiE,YAAY,EAAA;AAC7B,YAAA;AAEI,YAAA,MAAMxD,cAAcC,KAAAA,EAAOV,GAAAA,CAAAA;YAC3B,MAAMqD,cAAAA,GAAiB,MAAMzC,aAAAA,CAAcF,KAAAA,EAAOV,GAAAA,CAAAA;YAClD,MAAMD,IAAAA,GAAO,MAAMV,UAAAA,CAAW,MAAA,CAAA,CAAQyD,KAAK,CAACkB,QAAAA,CAAS7B,EAAE,EAAEkB,cAAAA,CAAAA;AAEzDrD,YAAAA,GAAAA,CAAIqB,IAAI,GAAG,MAAMvB,cAAAA,CAAeC,IAAAA,EAAMC,GAAAA,CAAAA;AAC1C,QAAA;AACA,KAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"auth.js","sources":["../../../../server/controllers/validation/auth.js"],"sourcesContent":["'use strict';\n\nconst { yup, validateYupSchema } = require('@strapi/utils');\n\nconst callbackSchema = yup.object({\n identifier: yup.string().required(),\n password: yup.string().required(),\n});\n\nconst createRegisterSchema = (config) =>\n yup.object({\n email: yup.string().email().required(),\n username: yup.string().required(),\n password: yup\n .string()\n .required()\n .test(function (value) {\n if (!value) return true;\n const isValid = new TextEncoder().encode(value).length <= 72;\n if (!isValid) {\n return this.createError({ message: 'Password must be less than 73 bytes' });\n }\n return true;\n })\n .test(async function (value) {\n if (typeof config?.validatePassword === 'function') {\n try {\n const isValid = await config.validatePassword(value);\n if (!isValid) {\n return this.createError({ message: 'Password validation failed.' });\n }\n } catch (error) {\n return this.createError({ message: error.message || 'An error occurred.' });\n }\n }\n return true;\n }),\n });\n\nconst sendEmailConfirmationSchema = yup.object({\n email: yup.string().email().required(),\n});\n\nconst validateEmailConfirmationSchema = yup.object({\n confirmation: yup.string().required(),\n});\n\nconst forgotPasswordSchema = yup\n .object({\n email: yup.string().email().required(),\n })\n .noUnknown();\n\nconst createResetPasswordSchema = (config) =>\n yup\n .object({\n password: yup\n .string()\n .required()\n .test(function (value) {\n if (!value) return true;\n const isValid = new TextEncoder().encode(value).length <= 72;\n if (!isValid) {\n return this.createError({ message: 'Password must be less than 73 bytes' });\n }\n return true;\n })\n .test(async function (value) {\n if (typeof config?.validatePassword === 'function') {\n try {\n const isValid = await config.validatePassword(value);\n if (!isValid) {\n return this.createError({ message: 'Password validation failed.' });\n }\n } catch (error) {\n return this.createError({ message: error.message || 'An error occurred.' });\n }\n }\n return true;\n }),\n passwordConfirmation: yup\n .string()\n .required()\n .oneOf([yup.ref('password')], 'Passwords do not match'),\n\n code: yup.string().required(),\n })\n .noUnknown();\n\nconst createChangePasswordSchema = (config) =>\n yup\n .object({\n password: yup\n .string()\n .required()\n .test(function (value) {\n if (!value) return true;\n const isValid = new TextEncoder().encode(value).length <= 72;\n if (!isValid) {\n return this.createError({ message: 'Password must be less than 73 bytes' });\n }\n return true;\n })\n .test(async function (value) {\n if (typeof config?.validatePassword === 'function') {\n try {\n const isValid = await config.validatePassword(value);\n if (!isValid) {\n return this.createError({ message: 'Password validation failed.' });\n }\n } catch (error) {\n return this.createError({ message: error.message || 'An error occurred.' });\n }\n }\n return true;\n }),\n passwordConfirmation: yup\n .string()\n .required()\n .oneOf([yup.ref('password')], 'Passwords do not match'),\n currentPassword: yup.string().required(),\n })\n .noUnknown();\n\nmodule.exports = {\n validateCallbackBody: validateYupSchema(callbackSchema),\n validateRegisterBody: (payload, config) =>\n validateYupSchema(createRegisterSchema(config))(payload),\n validateSendEmailConfirmationBody: validateYupSchema(sendEmailConfirmationSchema),\n validateEmailConfirmationBody: validateYupSchema(validateEmailConfirmationSchema),\n validateForgotPasswordBody: validateYupSchema(forgotPasswordSchema),\n validateResetPasswordBody: (payload, config) =>\n validateYupSchema(createResetPasswordSchema(config))(payload),\n validateChangePasswordBody: (payload, config) =>\n validateYupSchema(createChangePasswordSchema(config))(payload),\n};\n"],"names":["yup","validateYupSchema","require$$0","callbackSchema","object","identifier","string","required","password","createRegisterSchema","config","email","username","test","value","isValid","TextEncoder","encode","length","createError","message","validatePassword","error","sendEmailConfirmationSchema","validateEmailConfirmationSchema","confirmation","forgotPasswordSchema","noUnknown","createResetPasswordSchema","passwordConfirmation","oneOf","ref","code","createChangePasswordSchema","currentPassword","auth","validateCallbackBody","validateRegisterBody","payload","validateSendEmailConfirmationBody","validateEmailConfirmationBody","validateForgotPasswordBody","validateResetPasswordBody","validateChangePasswordBody"],"mappings":";;;;;;;;;AAEA,IAAA,MAAM,EAAEA,GAAG,EAAEC,iBAAiB,EAAE,GAAGC,UAAAA;IAEnC,MAAMC,cAAAA,GAAiBH,GAAAA,CAAII,MAAM,CAAC;QAChCC,UAAAA,EAAYL,GAAAA,CAAIM,MAAM,EAAA,CAAGC,QAAQ,EAAA;QACjCC,QAAAA,EAAUR,GAAAA,CAAIM,MAAM,EAAA,CAAGC,QAAQ;AACjC,KAAA,CAAA;AAEA,IAAA,MAAME,oBAAAA,GAAuB,CAACC,MAAAA,GAC5BV,GAAAA,CAAII,MAAM,CAAC;AACTO,YAAAA,KAAAA,EAAOX,GAAAA,CAAIM,MAAM,EAAA,CAAGK,KAAK,GAAGJ,QAAQ,EAAA;YACpCK,QAAAA,EAAUZ,GAAAA,CAAIM,MAAM,EAAA,CAAGC,QAAQ,EAAA;YAC/BC,QAAAA,EAAUR,GAAAA,CACPM,MAAM,EAAA,CACNC,QAAQ,GACRM,IAAI,CAAC,SAAUC,KAAK,EAAA;gBACnB,IAAI,CAACA,OAAO,OAAO,IAAA;AACnB,gBAAA,MAAMC,UAAU,IAAIC,WAAAA,EAAAA,CAAcC,MAAM,CAACH,KAAAA,CAAAA,CAAOI,MAAM,IAAI,EAAA;AAC1D,gBAAA,IAAI,CAACH,OAAAA,EAAS;oBACZ,OAAO,IAAI,CAACI,WAAW,CAAC;wBAAEC,OAAAA,EAAS;AAAqC,qBAAA,CAAA;AAClF,gBAAA;gBACQ,OAAO,IAAA;YACf,CAAA,CAAA,CACOP,IAAI,CAAC,eAAgBC,KAAK,EAAA;gBACzB,IAAI,OAAOJ,MAAAA,EAAQW,gBAAAA,KAAqB,UAAA,EAAY;oBAClD,IAAI;AACF,wBAAA,MAAMN,OAAAA,GAAU,MAAML,MAAAA,CAAOW,gBAAgB,CAACP,KAAAA,CAAAA;AAC9C,wBAAA,IAAI,CAACC,OAAAA,EAAS;4BACZ,OAAO,IAAI,CAACI,WAAW,CAAC;gCAAEC,OAAAA,EAAS;AAA6B,6BAAA,CAAA;AAC9E,wBAAA;AACA,oBAAA,CAAA,CAAY,OAAOE,KAAAA,EAAO;wBACd,OAAO,IAAI,CAACH,WAAW,CAAC;4BAAEC,OAAAA,EAASE,KAAAA,CAAMF,OAAO,IAAI;AAAoB,yBAAA,CAAA;AACpF,oBAAA;AACA,gBAAA;gBACQ,OAAO,IAAA;AACf,YAAA,CAAA;AACA,SAAA,CAAA;IAEA,MAAMG,2BAAAA,GAA8BvB,GAAAA,CAAII,MAAM,CAAC;AAC7CO,QAAAA,KAAAA,EAAOX,GAAAA,CAAIM,MAAM,EAAA,CAAGK,KAAK,GAAGJ,QAAQ;AACtC,KAAA,CAAA;IAEA,MAAMiB,+BAAAA,GAAkCxB,GAAAA,CAAII,MAAM,CAAC;QACjDqB,YAAAA,EAAczB,GAAAA,CAAIM,MAAM,EAAA,CAAGC,QAAQ;AACrC,KAAA,CAAA;IAEA,MAAMmB,oBAAAA,GAAuB1B,GAAAA,CAC1BI,MAAM,CAAC;AACNO,QAAAA,KAAAA,EAAOX,GAAAA,CAAIM,MAAM,EAAA,CAAGK,KAAK,GAAGJ,QAAQ;AACxC,KAAA,CAAA,CACGoB,SAAS,EAAA;AAEZ,IAAA,MAAMC,yBAAAA,GAA4B,CAAClB,MAAAA,GACjCV,GAAAA,CACGI,MAAM,CAAC;YACNI,QAAAA,EAAUR,GAAAA,CACPM,MAAM,EAAA,CACNC,QAAQ,GACRM,IAAI,CAAC,SAAUC,KAAK,EAAA;gBACnB,IAAI,CAACA,OAAO,OAAO,IAAA;AACnB,gBAAA,MAAMC,UAAU,IAAIC,WAAAA,EAAAA,CAAcC,MAAM,CAACH,KAAAA,CAAAA,CAAOI,MAAM,IAAI,EAAA;AAC1D,gBAAA,IAAI,CAACH,OAAAA,EAAS;oBACZ,OAAO,IAAI,CAACI,WAAW,CAAC;wBAAEC,OAAAA,EAAS;AAAqC,qBAAA,CAAA;AACpF,gBAAA;gBACU,OAAO,IAAA;YACjB,CAAA,CAAA,CACSP,IAAI,CAAC,eAAgBC,KAAK,EAAA;gBACzB,IAAI,OAAOJ,MAAAA,EAAQW,gBAAAA,KAAqB,UAAA,EAAY;oBAClD,IAAI;AACF,wBAAA,MAAMN,OAAAA,GAAU,MAAML,MAAAA,CAAOW,gBAAgB,CAACP,KAAAA,CAAAA;AAC9C,wBAAA,IAAI,CAACC,OAAAA,EAAS;4BACZ,OAAO,IAAI,CAACI,WAAW,CAAC;gCAAEC,OAAAA,EAAS;AAA6B,6BAAA,CAAA;AAChF,wBAAA;AACA,oBAAA,CAAA,CAAc,OAAOE,KAAAA,EAAO;wBACd,OAAO,IAAI,CAACH,WAAW,CAAC;4BAAEC,OAAAA,EAASE,KAAAA,CAAMF,OAAO,IAAI;AAAoB,yBAAA,CAAA;AACtF,oBAAA;AACA,gBAAA;gBACU,OAAO,IAAA;AACjB,YAAA,CAAA,CAAA;AACMS,YAAAA,oBAAAA,EAAsB7B,IACnBM,MAAM,EAAA,CACNC,QAAQ,EAAA,CACRuB,KAAK,CAAC;AAAC9B,gBAAAA,GAAAA,CAAI+B,GAAG,CAAC,UAAA;aAAY,EAAE,wBAAA,CAAA;YAEhCC,IAAAA,EAAMhC,GAAAA,CAAIM,MAAM,EAAA,CAAGC,QAAQ;AACjC,SAAA,CAAA,CACKoB,SAAS,EAAA;AAEd,IAAA,MAAMM,0BAAAA,GAA6B,CAACvB,MAAAA,GAClCV,GAAAA,CACGI,MAAM,CAAC;YACNI,QAAAA,EAAUR,GAAAA,CACPM,MAAM,EAAA,CACNC,QAAQ,GACRM,IAAI,CAAC,SAAUC,KAAK,EAAA;gBACnB,IAAI,CAACA,OAAO,OAAO,IAAA;AACnB,gBAAA,MAAMC,UAAU,IAAIC,WAAAA,EAAAA,CAAcC,MAAM,CAACH,KAAAA,CAAAA,CAAOI,MAAM,IAAI,EAAA;AAC1D,gBAAA,IAAI,CAACH,OAAAA,EAAS;oBACZ,OAAO,IAAI,CAACI,WAAW,CAAC;wBAAEC,OAAAA,EAAS;AAAqC,qBAAA,CAAA;AACpF,gBAAA;gBACU,OAAO,IAAA;YACjB,CAAA,CAAA,CACSP,IAAI,CAAC,eAAgBC,KAAK,EAAA;gBACzB,IAAI,OAAOJ,MAAAA,EAAQW,gBAAAA,KAAqB,UAAA,EAAY;oBAClD,IAAI;AACF,wBAAA,MAAMN,OAAAA,GAAU,MAAML,MAAAA,CAAOW,gBAAgB,CAACP,KAAAA,CAAAA;AAC9C,wBAAA,IAAI,CAACC,OAAAA,EAAS;4BACZ,OAAO,IAAI,CAACI,WAAW,CAAC;gCAAEC,OAAAA,EAAS;AAA6B,6BAAA,CAAA;AAChF,wBAAA;AACA,oBAAA,CAAA,CAAc,OAAOE,KAAAA,EAAO;wBACd,OAAO,IAAI,CAACH,WAAW,CAAC;4BAAEC,OAAAA,EAASE,KAAAA,CAAMF,OAAO,IAAI;AAAoB,yBAAA,CAAA;AACtF,oBAAA;AACA,gBAAA;gBACU,OAAO,IAAA;AACjB,YAAA,CAAA,CAAA;AACMS,YAAAA,oBAAAA,EAAsB7B,IACnBM,MAAM,EAAA,CACNC,QAAQ,EAAA,CACRuB,KAAK,CAAC;AAAC9B,gBAAAA,GAAAA,CAAI+B,GAAG,CAAC,UAAA;aAAY,EAAE,wBAAA,CAAA;YAChCG,eAAAA,EAAiBlC,GAAAA,CAAIM,MAAM,EAAA,CAAGC,QAAQ;AAC5C,SAAA,CAAA,CACKoB,SAAS,EAAA;IAEdQ,IAAAA,GAAiB;AACfC,QAAAA,oBAAAA,EAAsBnC,iBAAAA,CAAkBE,cAAAA,CAAAA;AACxCkC,QAAAA,oBAAAA,EAAsB,CAACC,OAAAA,EAAS5B,MAAAA,GAC9BT,iBAAAA,CAAkBQ,qBAAqBC,MAAAA,CAAAA,CAAAA,CAAS4B,OAAAA,CAAAA;AAClDC,QAAAA,iCAAAA,EAAmCtC,iBAAAA,CAAkBsB,2BAAAA,CAAAA;AACrDiB,QAAAA,6BAAAA,EAA+BvC,iBAAAA,CAAkBuB,+BAAAA,CAAAA;AACjDiB,QAAAA,0BAAAA,EAA4BxC,iBAAAA,CAAkByB,oBAAAA,CAAAA;AAC9CgB,QAAAA,yBAAAA,EAA2B,CAACJ,OAAAA,EAAS5B,MAAAA,GACnCT,iBAAAA,CAAkB2B,0BAA0BlB,MAAAA,CAAAA,CAAAA,CAAS4B,OAAAA,CAAAA;AACvDK,QAAAA,0BAAAA,EAA4B,CAACL,OAAAA,EAAS5B,MAAAA,GACpCT,iBAAAA,CAAkBgC,2BAA2BvB,MAAAA,CAAAA,CAAAA,CAAS4B,OAAAA;AAC1D,KAAA;;;;;;"}
1
+ {"version":3,"file":"auth.js","sources":["../../../../server/controllers/validation/auth.js"],"sourcesContent":["'use strict';\n\nconst { yup, validateYupSchema } = require('@strapi/utils');\n\nconst callbackSchema = yup.object({\n identifier: yup.string().required(),\n password: yup.string().required(),\n});\n\nconst createRegisterSchema = (config) =>\n yup.object({\n email: yup.string().email().required(),\n username: yup.string().required(),\n password: yup\n .string()\n .required()\n .test(function (value) {\n if (!value) return true;\n const isValid = new TextEncoder().encode(value).length <= 72;\n if (!isValid) {\n return this.createError({ message: 'Password must be less than 73 bytes' });\n }\n return true;\n })\n .test(async function (value) {\n if (typeof config?.validatePassword === 'function') {\n try {\n const isValid = await config.validatePassword(value);\n if (!isValid) {\n return this.createError({ message: 'Password validation failed.' });\n }\n } catch (error) {\n return this.createError({ message: error.message || 'An error occurred.' });\n }\n }\n return true;\n }),\n });\n\nconst sendEmailConfirmationSchema = yup.object({\n email: yup.string().email().required(),\n});\n\nconst validateEmailConfirmationSchema = yup.object({\n confirmation: yup.string().required(),\n});\n\nconst forgotPasswordSchema = yup\n .object({\n email: yup.string().email().required(),\n })\n .noUnknown();\n\nconst createResetPasswordSchema = (config) =>\n yup\n .object({\n password: yup\n .string()\n .required()\n .test(function (value) {\n if (!value) return true;\n const isValid = new TextEncoder().encode(value).length <= 72;\n if (!isValid) {\n return this.createError({ message: 'Password must be less than 73 bytes' });\n }\n return true;\n })\n .test(async function (value) {\n if (typeof config?.validatePassword === 'function') {\n try {\n const isValid = await config.validatePassword(value);\n if (!isValid) {\n return this.createError({ message: 'Password validation failed.' });\n }\n } catch (error) {\n return this.createError({ message: error.message || 'An error occurred.' });\n }\n }\n return true;\n }),\n passwordConfirmation: yup\n .string()\n .required()\n .oneOf([yup.ref('password')], 'Passwords do not match'),\n\n code: yup.string().required(),\n })\n .noUnknown();\n\nconst createChangePasswordSchema = (config) =>\n yup\n .object({\n password: yup\n .string()\n .required()\n .test(function (value) {\n if (!value) return true;\n const isValid = new TextEncoder().encode(value).length <= 72;\n if (!isValid) {\n return this.createError({ message: 'Password must be less than 73 bytes' });\n }\n return true;\n })\n .test(async function (value) {\n if (typeof config?.validatePassword === 'function') {\n try {\n const isValid = await config.validatePassword(value);\n if (!isValid) {\n return this.createError({ message: 'Password validation failed.' });\n }\n } catch (error) {\n return this.createError({ message: error.message || 'An error occurred.' });\n }\n }\n return true;\n }),\n passwordConfirmation: yup\n .string()\n .required()\n .oneOf([yup.ref('password')], 'Passwords do not match'),\n currentPassword: yup.string().required(),\n })\n .noUnknown();\n\nmodule.exports = {\n validateCallbackBody: validateYupSchema(callbackSchema),\n validateRegisterBody: (payload, config) =>\n validateYupSchema(createRegisterSchema(config))(payload),\n validateSendEmailConfirmationBody: validateYupSchema(sendEmailConfirmationSchema),\n validateEmailConfirmationBody: validateYupSchema(validateEmailConfirmationSchema),\n validateForgotPasswordBody: validateYupSchema(forgotPasswordSchema),\n validateResetPasswordBody: (payload, config) =>\n validateYupSchema(createResetPasswordSchema(config))(payload),\n validateChangePasswordBody: (payload, config) =>\n validateYupSchema(createChangePasswordSchema(config))(payload),\n};\n"],"names":["yup","validateYupSchema","require$$0","callbackSchema","object","identifier","string","required","password","createRegisterSchema","config","email","username","test","value","isValid","TextEncoder","encode","length","createError","message","validatePassword","error","sendEmailConfirmationSchema","validateEmailConfirmationSchema","confirmation","forgotPasswordSchema","noUnknown","createResetPasswordSchema","passwordConfirmation","oneOf","ref","code","createChangePasswordSchema","currentPassword","auth","validateCallbackBody","validateRegisterBody","payload","validateSendEmailConfirmationBody","validateEmailConfirmationBody","validateForgotPasswordBody","validateResetPasswordBody","validateChangePasswordBody"],"mappings":";;;;;;;;;AAEA,IAAA,MAAM,EAAEA,GAAG,EAAEC,iBAAiB,EAAE,GAAGC,UAAAA;IAEnC,MAAMC,cAAAA,GAAiBH,GAAAA,CAAII,MAAM,CAAC;QAChCC,UAAAA,EAAYL,GAAAA,CAAIM,MAAM,EAAA,CAAGC,QAAQ,EAAA;QACjCC,QAAAA,EAAUR,GAAAA,CAAIM,MAAM,EAAA,CAAGC,QAAQ;AACjC,KAAA,CAAA;AAEA,IAAA,MAAME,oBAAAA,GAAuB,CAACC,MAAAA,GAC5BV,GAAAA,CAAII,MAAM,CAAC;AACTO,YAAAA,KAAAA,EAAOX,GAAAA,CAAIM,MAAM,EAAA,CAAGK,KAAK,GAAGJ,QAAQ,EAAA;YACpCK,QAAAA,EAAUZ,GAAAA,CAAIM,MAAM,EAAA,CAAGC,QAAQ,EAAA;YAC/BC,QAAAA,EAAUR,GAAAA,CACPM,MAAM,EAAA,CACNC,QAAQ,GACRM,IAAI,CAAC,SAAUC,KAAK,EAAA;gBACnB,IAAI,CAACA,OAAO,OAAO,IAAA;AACnB,gBAAA,MAAMC,UAAU,IAAIC,WAAAA,EAAAA,CAAcC,MAAM,CAACH,KAAAA,CAAAA,CAAOI,MAAM,IAAI,EAAA;AAC1D,gBAAA,IAAI,CAACH,OAAAA,EAAS;oBACZ,OAAO,IAAI,CAACI,WAAW,CAAC;wBAAEC,OAAAA,EAAS;AAAqC,qBAAA,CAAA;AAClF,gBAAA;gBACQ,OAAO,IAAA;YACf,CAAA,CAAA,CACOP,IAAI,CAAC,eAAgBC,KAAK,EAAA;gBACzB,IAAI,OAAOJ,MAAAA,EAAQW,gBAAAA,KAAqB,UAAA,EAAY;oBAClD,IAAI;AACF,wBAAA,MAAMN,OAAAA,GAAU,MAAML,MAAAA,CAAOW,gBAAgB,CAACP,KAAAA,CAAAA;AAC9C,wBAAA,IAAI,CAACC,OAAAA,EAAS;4BACZ,OAAO,IAAI,CAACI,WAAW,CAAC;gCAAEC,OAAAA,EAAS;AAA6B,6BAAA,CAAA;AAC9E,wBAAA;AACA,oBAAA,CAAA,CAAY,OAAOE,KAAAA,EAAO;wBACd,OAAO,IAAI,CAACH,WAAW,CAAC;4BAAEC,OAAAA,EAASE,KAAAA,CAAMF,OAAO,IAAI;;AAChE,oBAAA;AACA,gBAAA;gBACQ,OAAO,IAAA;AACf,YAAA,CAAA;AACA,SAAA,CAAA;IAEA,MAAMG,2BAAAA,GAA8BvB,GAAAA,CAAII,MAAM,CAAC;AAC7CO,QAAAA,KAAAA,EAAOX,GAAAA,CAAIM,MAAM,EAAA,CAAGK,KAAK,GAAGJ,QAAQ;AACtC,KAAA,CAAA;IAEA,MAAMiB,+BAAAA,GAAkCxB,GAAAA,CAAII,MAAM,CAAC;QACjDqB,YAAAA,EAAczB,GAAAA,CAAIM,MAAM,EAAA,CAAGC,QAAQ;AACrC,KAAA,CAAA;IAEA,MAAMmB,oBAAAA,GAAuB1B,GAAAA,CAC1BI,MAAM,CAAC;AACNO,QAAAA,KAAAA,EAAOX,GAAAA,CAAIM,MAAM,EAAA,CAAGK,KAAK,GAAGJ,QAAQ;AACxC,KAAA,CAAA,CACGoB,SAAS,EAAA;AAEZ,IAAA,MAAMC,yBAAAA,GAA4B,CAAClB,MAAAA,GACjCV,GAAAA,CACGI,MAAM,CAAC;YACNI,QAAAA,EAAUR,GAAAA,CACPM,MAAM,EAAA,CACNC,QAAQ,GACRM,IAAI,CAAC,SAAUC,KAAK,EAAA;gBACnB,IAAI,CAACA,OAAO,OAAO,IAAA;AACnB,gBAAA,MAAMC,UAAU,IAAIC,WAAAA,EAAAA,CAAcC,MAAM,CAACH,KAAAA,CAAAA,CAAOI,MAAM,IAAI,EAAA;AAC1D,gBAAA,IAAI,CAACH,OAAAA,EAAS;oBACZ,OAAO,IAAI,CAACI,WAAW,CAAC;wBAAEC,OAAAA,EAAS;AAAqC,qBAAA,CAAA;AACpF,gBAAA;gBACU,OAAO,IAAA;YACjB,CAAA,CAAA,CACSP,IAAI,CAAC,eAAgBC,KAAK,EAAA;gBACzB,IAAI,OAAOJ,MAAAA,EAAQW,gBAAAA,KAAqB,UAAA,EAAY;oBAClD,IAAI;AACF,wBAAA,MAAMN,OAAAA,GAAU,MAAML,MAAAA,CAAOW,gBAAgB,CAACP,KAAAA,CAAAA;AAC9C,wBAAA,IAAI,CAACC,OAAAA,EAAS;4BACZ,OAAO,IAAI,CAACI,WAAW,CAAC;gCAAEC,OAAAA,EAAS;AAA6B,6BAAA,CAAA;AAChF,wBAAA;AACA,oBAAA,CAAA,CAAc,OAAOE,KAAAA,EAAO;wBACd,OAAO,IAAI,CAACH,WAAW,CAAC;4BAAEC,OAAAA,EAASE,KAAAA,CAAMF,OAAO,IAAI;;AAClE,oBAAA;AACA,gBAAA;gBACU,OAAO,IAAA;AACjB,YAAA,CAAA,CAAA;AACMS,YAAAA,oBAAAA,EAAsB7B,IACnBM,MAAM,EAAA,CACNC,QAAQ,EAAA,CACRuB,KAAK,CAAC;AAAC9B,gBAAAA,GAAAA,CAAI+B,GAAG,CAAC,UAAA;aAAY,EAAE,wBAAA,CAAA;YAEhCC,IAAAA,EAAMhC,GAAAA,CAAIM,MAAM,EAAA,CAAGC,QAAQ;AACjC,SAAA,CAAA,CACKoB,SAAS,EAAA;AAEd,IAAA,MAAMM,0BAAAA,GAA6B,CAACvB,MAAAA,GAClCV,GAAAA,CACGI,MAAM,CAAC;YACNI,QAAAA,EAAUR,GAAAA,CACPM,MAAM,EAAA,CACNC,QAAQ,GACRM,IAAI,CAAC,SAAUC,KAAK,EAAA;gBACnB,IAAI,CAACA,OAAO,OAAO,IAAA;AACnB,gBAAA,MAAMC,UAAU,IAAIC,WAAAA,EAAAA,CAAcC,MAAM,CAACH,KAAAA,CAAAA,CAAOI,MAAM,IAAI,EAAA;AAC1D,gBAAA,IAAI,CAACH,OAAAA,EAAS;oBACZ,OAAO,IAAI,CAACI,WAAW,CAAC;wBAAEC,OAAAA,EAAS;AAAqC,qBAAA,CAAA;AACpF,gBAAA;gBACU,OAAO,IAAA;YACjB,CAAA,CAAA,CACSP,IAAI,CAAC,eAAgBC,KAAK,EAAA;gBACzB,IAAI,OAAOJ,MAAAA,EAAQW,gBAAAA,KAAqB,UAAA,EAAY;oBAClD,IAAI;AACF,wBAAA,MAAMN,OAAAA,GAAU,MAAML,MAAAA,CAAOW,gBAAgB,CAACP,KAAAA,CAAAA;AAC9C,wBAAA,IAAI,CAACC,OAAAA,EAAS;4BACZ,OAAO,IAAI,CAACI,WAAW,CAAC;gCAAEC,OAAAA,EAAS;AAA6B,6BAAA,CAAA;AAChF,wBAAA;AACA,oBAAA,CAAA,CAAc,OAAOE,KAAAA,EAAO;wBACd,OAAO,IAAI,CAACH,WAAW,CAAC;4BAAEC,OAAAA,EAASE,KAAAA,CAAMF,OAAO,IAAI;;AAClE,oBAAA;AACA,gBAAA;gBACU,OAAO,IAAA;AACjB,YAAA,CAAA,CAAA;AACMS,YAAAA,oBAAAA,EAAsB7B,IACnBM,MAAM,EAAA,CACNC,QAAQ,EAAA,CACRuB,KAAK,CAAC;AAAC9B,gBAAAA,GAAAA,CAAI+B,GAAG,CAAC,UAAA;aAAY,EAAE,wBAAA,CAAA;YAChCG,eAAAA,EAAiBlC,GAAAA,CAAIM,MAAM,EAAA,CAAGC,QAAQ;AAC5C,SAAA,CAAA,CACKoB,SAAS,EAAA;IAEdQ,IAAAA,GAAiB;AACfC,QAAAA,oBAAAA,EAAsBnC,iBAAAA,CAAkBE,cAAAA,CAAAA;AACxCkC,QAAAA,oBAAAA,EAAsB,CAACC,OAAAA,EAAS5B,MAAAA,GAC9BT,iBAAAA,CAAkBQ,qBAAqBC,MAAAA,CAAAA,CAAAA,CAAS4B,OAAAA,CAAAA;AAClDC,QAAAA,iCAAAA,EAAmCtC,iBAAAA,CAAkBsB,2BAAAA,CAAAA;AACrDiB,QAAAA,6BAAAA,EAA+BvC,iBAAAA,CAAkBuB,+BAAAA,CAAAA;AACjDiB,QAAAA,0BAAAA,EAA4BxC,iBAAAA,CAAkByB,oBAAAA,CAAAA;AAC9CgB,QAAAA,yBAAAA,EAA2B,CAACJ,OAAAA,EAAS5B,MAAAA,GACnCT,iBAAAA,CAAkB2B,0BAA0BlB,MAAAA,CAAAA,CAAAA,CAAS4B,OAAAA,CAAAA;AACvDK,QAAAA,0BAAAA,EAA4B,CAACL,OAAAA,EAAS5B,MAAAA,GACpCT,iBAAAA,CAAkBgC,2BAA2BvB,MAAAA,CAAAA,CAAAA,CAAS4B,OAAAA;AAC1D,KAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"auth.mjs","sources":["../../../../server/controllers/validation/auth.js"],"sourcesContent":["'use strict';\n\nconst { yup, validateYupSchema } = require('@strapi/utils');\n\nconst callbackSchema = yup.object({\n identifier: yup.string().required(),\n password: yup.string().required(),\n});\n\nconst createRegisterSchema = (config) =>\n yup.object({\n email: yup.string().email().required(),\n username: yup.string().required(),\n password: yup\n .string()\n .required()\n .test(function (value) {\n if (!value) return true;\n const isValid = new TextEncoder().encode(value).length <= 72;\n if (!isValid) {\n return this.createError({ message: 'Password must be less than 73 bytes' });\n }\n return true;\n })\n .test(async function (value) {\n if (typeof config?.validatePassword === 'function') {\n try {\n const isValid = await config.validatePassword(value);\n if (!isValid) {\n return this.createError({ message: 'Password validation failed.' });\n }\n } catch (error) {\n return this.createError({ message: error.message || 'An error occurred.' });\n }\n }\n return true;\n }),\n });\n\nconst sendEmailConfirmationSchema = yup.object({\n email: yup.string().email().required(),\n});\n\nconst validateEmailConfirmationSchema = yup.object({\n confirmation: yup.string().required(),\n});\n\nconst forgotPasswordSchema = yup\n .object({\n email: yup.string().email().required(),\n })\n .noUnknown();\n\nconst createResetPasswordSchema = (config) =>\n yup\n .object({\n password: yup\n .string()\n .required()\n .test(function (value) {\n if (!value) return true;\n const isValid = new TextEncoder().encode(value).length <= 72;\n if (!isValid) {\n return this.createError({ message: 'Password must be less than 73 bytes' });\n }\n return true;\n })\n .test(async function (value) {\n if (typeof config?.validatePassword === 'function') {\n try {\n const isValid = await config.validatePassword(value);\n if (!isValid) {\n return this.createError({ message: 'Password validation failed.' });\n }\n } catch (error) {\n return this.createError({ message: error.message || 'An error occurred.' });\n }\n }\n return true;\n }),\n passwordConfirmation: yup\n .string()\n .required()\n .oneOf([yup.ref('password')], 'Passwords do not match'),\n\n code: yup.string().required(),\n })\n .noUnknown();\n\nconst createChangePasswordSchema = (config) =>\n yup\n .object({\n password: yup\n .string()\n .required()\n .test(function (value) {\n if (!value) return true;\n const isValid = new TextEncoder().encode(value).length <= 72;\n if (!isValid) {\n return this.createError({ message: 'Password must be less than 73 bytes' });\n }\n return true;\n })\n .test(async function (value) {\n if (typeof config?.validatePassword === 'function') {\n try {\n const isValid = await config.validatePassword(value);\n if (!isValid) {\n return this.createError({ message: 'Password validation failed.' });\n }\n } catch (error) {\n return this.createError({ message: error.message || 'An error occurred.' });\n }\n }\n return true;\n }),\n passwordConfirmation: yup\n .string()\n .required()\n .oneOf([yup.ref('password')], 'Passwords do not match'),\n currentPassword: yup.string().required(),\n })\n .noUnknown();\n\nmodule.exports = {\n validateCallbackBody: validateYupSchema(callbackSchema),\n validateRegisterBody: (payload, config) =>\n validateYupSchema(createRegisterSchema(config))(payload),\n validateSendEmailConfirmationBody: validateYupSchema(sendEmailConfirmationSchema),\n validateEmailConfirmationBody: validateYupSchema(validateEmailConfirmationSchema),\n validateForgotPasswordBody: validateYupSchema(forgotPasswordSchema),\n validateResetPasswordBody: (payload, config) =>\n validateYupSchema(createResetPasswordSchema(config))(payload),\n validateChangePasswordBody: (payload, config) =>\n validateYupSchema(createChangePasswordSchema(config))(payload),\n};\n"],"names":["yup","validateYupSchema","require$$0","callbackSchema","object","identifier","string","required","password","createRegisterSchema","config","email","username","test","value","isValid","TextEncoder","encode","length","createError","message","validatePassword","error","sendEmailConfirmationSchema","validateEmailConfirmationSchema","confirmation","forgotPasswordSchema","noUnknown","createResetPasswordSchema","passwordConfirmation","oneOf","ref","code","createChangePasswordSchema","currentPassword","auth","validateCallbackBody","validateRegisterBody","payload","validateSendEmailConfirmationBody","validateEmailConfirmationBody","validateForgotPasswordBody","validateResetPasswordBody","validateChangePasswordBody"],"mappings":";;;;;;;AAEA,IAAA,MAAM,EAAEA,GAAG,EAAEC,iBAAiB,EAAE,GAAGC,UAAAA;IAEnC,MAAMC,cAAAA,GAAiBH,GAAAA,CAAII,MAAM,CAAC;QAChCC,UAAAA,EAAYL,GAAAA,CAAIM,MAAM,EAAA,CAAGC,QAAQ,EAAA;QACjCC,QAAAA,EAAUR,GAAAA,CAAIM,MAAM,EAAA,CAAGC,QAAQ;AACjC,KAAA,CAAA;AAEA,IAAA,MAAME,oBAAAA,GAAuB,CAACC,MAAAA,GAC5BV,GAAAA,CAAII,MAAM,CAAC;AACTO,YAAAA,KAAAA,EAAOX,GAAAA,CAAIM,MAAM,EAAA,CAAGK,KAAK,GAAGJ,QAAQ,EAAA;YACpCK,QAAAA,EAAUZ,GAAAA,CAAIM,MAAM,EAAA,CAAGC,QAAQ,EAAA;YAC/BC,QAAAA,EAAUR,GAAAA,CACPM,MAAM,EAAA,CACNC,QAAQ,GACRM,IAAI,CAAC,SAAUC,KAAK,EAAA;gBACnB,IAAI,CAACA,OAAO,OAAO,IAAA;AACnB,gBAAA,MAAMC,UAAU,IAAIC,WAAAA,EAAAA,CAAcC,MAAM,CAACH,KAAAA,CAAAA,CAAOI,MAAM,IAAI,EAAA;AAC1D,gBAAA,IAAI,CAACH,OAAAA,EAAS;oBACZ,OAAO,IAAI,CAACI,WAAW,CAAC;wBAAEC,OAAAA,EAAS;AAAqC,qBAAA,CAAA;AAClF,gBAAA;gBACQ,OAAO,IAAA;YACf,CAAA,CAAA,CACOP,IAAI,CAAC,eAAgBC,KAAK,EAAA;gBACzB,IAAI,OAAOJ,MAAAA,EAAQW,gBAAAA,KAAqB,UAAA,EAAY;oBAClD,IAAI;AACF,wBAAA,MAAMN,OAAAA,GAAU,MAAML,MAAAA,CAAOW,gBAAgB,CAACP,KAAAA,CAAAA;AAC9C,wBAAA,IAAI,CAACC,OAAAA,EAAS;4BACZ,OAAO,IAAI,CAACI,WAAW,CAAC;gCAAEC,OAAAA,EAAS;AAA6B,6BAAA,CAAA;AAC9E,wBAAA;AACA,oBAAA,CAAA,CAAY,OAAOE,KAAAA,EAAO;wBACd,OAAO,IAAI,CAACH,WAAW,CAAC;4BAAEC,OAAAA,EAASE,KAAAA,CAAMF,OAAO,IAAI;AAAoB,yBAAA,CAAA;AACpF,oBAAA;AACA,gBAAA;gBACQ,OAAO,IAAA;AACf,YAAA,CAAA;AACA,SAAA,CAAA;IAEA,MAAMG,2BAAAA,GAA8BvB,GAAAA,CAAII,MAAM,CAAC;AAC7CO,QAAAA,KAAAA,EAAOX,GAAAA,CAAIM,MAAM,EAAA,CAAGK,KAAK,GAAGJ,QAAQ;AACtC,KAAA,CAAA;IAEA,MAAMiB,+BAAAA,GAAkCxB,GAAAA,CAAII,MAAM,CAAC;QACjDqB,YAAAA,EAAczB,GAAAA,CAAIM,MAAM,EAAA,CAAGC,QAAQ;AACrC,KAAA,CAAA;IAEA,MAAMmB,oBAAAA,GAAuB1B,GAAAA,CAC1BI,MAAM,CAAC;AACNO,QAAAA,KAAAA,EAAOX,GAAAA,CAAIM,MAAM,EAAA,CAAGK,KAAK,GAAGJ,QAAQ;AACxC,KAAA,CAAA,CACGoB,SAAS,EAAA;AAEZ,IAAA,MAAMC,yBAAAA,GAA4B,CAAClB,MAAAA,GACjCV,GAAAA,CACGI,MAAM,CAAC;YACNI,QAAAA,EAAUR,GAAAA,CACPM,MAAM,EAAA,CACNC,QAAQ,GACRM,IAAI,CAAC,SAAUC,KAAK,EAAA;gBACnB,IAAI,CAACA,OAAO,OAAO,IAAA;AACnB,gBAAA,MAAMC,UAAU,IAAIC,WAAAA,EAAAA,CAAcC,MAAM,CAACH,KAAAA,CAAAA,CAAOI,MAAM,IAAI,EAAA;AAC1D,gBAAA,IAAI,CAACH,OAAAA,EAAS;oBACZ,OAAO,IAAI,CAACI,WAAW,CAAC;wBAAEC,OAAAA,EAAS;AAAqC,qBAAA,CAAA;AACpF,gBAAA;gBACU,OAAO,IAAA;YACjB,CAAA,CAAA,CACSP,IAAI,CAAC,eAAgBC,KAAK,EAAA;gBACzB,IAAI,OAAOJ,MAAAA,EAAQW,gBAAAA,KAAqB,UAAA,EAAY;oBAClD,IAAI;AACF,wBAAA,MAAMN,OAAAA,GAAU,MAAML,MAAAA,CAAOW,gBAAgB,CAACP,KAAAA,CAAAA;AAC9C,wBAAA,IAAI,CAACC,OAAAA,EAAS;4BACZ,OAAO,IAAI,CAACI,WAAW,CAAC;gCAAEC,OAAAA,EAAS;AAA6B,6BAAA,CAAA;AAChF,wBAAA;AACA,oBAAA,CAAA,CAAc,OAAOE,KAAAA,EAAO;wBACd,OAAO,IAAI,CAACH,WAAW,CAAC;4BAAEC,OAAAA,EAASE,KAAAA,CAAMF,OAAO,IAAI;AAAoB,yBAAA,CAAA;AACtF,oBAAA;AACA,gBAAA;gBACU,OAAO,IAAA;AACjB,YAAA,CAAA,CAAA;AACMS,YAAAA,oBAAAA,EAAsB7B,IACnBM,MAAM,EAAA,CACNC,QAAQ,EAAA,CACRuB,KAAK,CAAC;AAAC9B,gBAAAA,GAAAA,CAAI+B,GAAG,CAAC,UAAA;aAAY,EAAE,wBAAA,CAAA;YAEhCC,IAAAA,EAAMhC,GAAAA,CAAIM,MAAM,EAAA,CAAGC,QAAQ;AACjC,SAAA,CAAA,CACKoB,SAAS,EAAA;AAEd,IAAA,MAAMM,0BAAAA,GAA6B,CAACvB,MAAAA,GAClCV,GAAAA,CACGI,MAAM,CAAC;YACNI,QAAAA,EAAUR,GAAAA,CACPM,MAAM,EAAA,CACNC,QAAQ,GACRM,IAAI,CAAC,SAAUC,KAAK,EAAA;gBACnB,IAAI,CAACA,OAAO,OAAO,IAAA;AACnB,gBAAA,MAAMC,UAAU,IAAIC,WAAAA,EAAAA,CAAcC,MAAM,CAACH,KAAAA,CAAAA,CAAOI,MAAM,IAAI,EAAA;AAC1D,gBAAA,IAAI,CAACH,OAAAA,EAAS;oBACZ,OAAO,IAAI,CAACI,WAAW,CAAC;wBAAEC,OAAAA,EAAS;AAAqC,qBAAA,CAAA;AACpF,gBAAA;gBACU,OAAO,IAAA;YACjB,CAAA,CAAA,CACSP,IAAI,CAAC,eAAgBC,KAAK,EAAA;gBACzB,IAAI,OAAOJ,MAAAA,EAAQW,gBAAAA,KAAqB,UAAA,EAAY;oBAClD,IAAI;AACF,wBAAA,MAAMN,OAAAA,GAAU,MAAML,MAAAA,CAAOW,gBAAgB,CAACP,KAAAA,CAAAA;AAC9C,wBAAA,IAAI,CAACC,OAAAA,EAAS;4BACZ,OAAO,IAAI,CAACI,WAAW,CAAC;gCAAEC,OAAAA,EAAS;AAA6B,6BAAA,CAAA;AAChF,wBAAA;AACA,oBAAA,CAAA,CAAc,OAAOE,KAAAA,EAAO;wBACd,OAAO,IAAI,CAACH,WAAW,CAAC;4BAAEC,OAAAA,EAASE,KAAAA,CAAMF,OAAO,IAAI;AAAoB,yBAAA,CAAA;AACtF,oBAAA;AACA,gBAAA;gBACU,OAAO,IAAA;AACjB,YAAA,CAAA,CAAA;AACMS,YAAAA,oBAAAA,EAAsB7B,IACnBM,MAAM,EAAA,CACNC,QAAQ,EAAA,CACRuB,KAAK,CAAC;AAAC9B,gBAAAA,GAAAA,CAAI+B,GAAG,CAAC,UAAA;aAAY,EAAE,wBAAA,CAAA;YAChCG,eAAAA,EAAiBlC,GAAAA,CAAIM,MAAM,EAAA,CAAGC,QAAQ;AAC5C,SAAA,CAAA,CACKoB,SAAS,EAAA;IAEdQ,IAAAA,GAAiB;AACfC,QAAAA,oBAAAA,EAAsBnC,iBAAAA,CAAkBE,cAAAA,CAAAA;AACxCkC,QAAAA,oBAAAA,EAAsB,CAACC,OAAAA,EAAS5B,MAAAA,GAC9BT,iBAAAA,CAAkBQ,qBAAqBC,MAAAA,CAAAA,CAAAA,CAAS4B,OAAAA,CAAAA;AAClDC,QAAAA,iCAAAA,EAAmCtC,iBAAAA,CAAkBsB,2BAAAA,CAAAA;AACrDiB,QAAAA,6BAAAA,EAA+BvC,iBAAAA,CAAkBuB,+BAAAA,CAAAA;AACjDiB,QAAAA,0BAAAA,EAA4BxC,iBAAAA,CAAkByB,oBAAAA,CAAAA;AAC9CgB,QAAAA,yBAAAA,EAA2B,CAACJ,OAAAA,EAAS5B,MAAAA,GACnCT,iBAAAA,CAAkB2B,0BAA0BlB,MAAAA,CAAAA,CAAAA,CAAS4B,OAAAA,CAAAA;AACvDK,QAAAA,0BAAAA,EAA4B,CAACL,OAAAA,EAAS5B,MAAAA,GACpCT,iBAAAA,CAAkBgC,2BAA2BvB,MAAAA,CAAAA,CAAAA,CAAS4B,OAAAA;AAC1D,KAAA;;;;;;"}
1
+ {"version":3,"file":"auth.mjs","sources":["../../../../server/controllers/validation/auth.js"],"sourcesContent":["'use strict';\n\nconst { yup, validateYupSchema } = require('@strapi/utils');\n\nconst callbackSchema = yup.object({\n identifier: yup.string().required(),\n password: yup.string().required(),\n});\n\nconst createRegisterSchema = (config) =>\n yup.object({\n email: yup.string().email().required(),\n username: yup.string().required(),\n password: yup\n .string()\n .required()\n .test(function (value) {\n if (!value) return true;\n const isValid = new TextEncoder().encode(value).length <= 72;\n if (!isValid) {\n return this.createError({ message: 'Password must be less than 73 bytes' });\n }\n return true;\n })\n .test(async function (value) {\n if (typeof config?.validatePassword === 'function') {\n try {\n const isValid = await config.validatePassword(value);\n if (!isValid) {\n return this.createError({ message: 'Password validation failed.' });\n }\n } catch (error) {\n return this.createError({ message: error.message || 'An error occurred.' });\n }\n }\n return true;\n }),\n });\n\nconst sendEmailConfirmationSchema = yup.object({\n email: yup.string().email().required(),\n});\n\nconst validateEmailConfirmationSchema = yup.object({\n confirmation: yup.string().required(),\n});\n\nconst forgotPasswordSchema = yup\n .object({\n email: yup.string().email().required(),\n })\n .noUnknown();\n\nconst createResetPasswordSchema = (config) =>\n yup\n .object({\n password: yup\n .string()\n .required()\n .test(function (value) {\n if (!value) return true;\n const isValid = new TextEncoder().encode(value).length <= 72;\n if (!isValid) {\n return this.createError({ message: 'Password must be less than 73 bytes' });\n }\n return true;\n })\n .test(async function (value) {\n if (typeof config?.validatePassword === 'function') {\n try {\n const isValid = await config.validatePassword(value);\n if (!isValid) {\n return this.createError({ message: 'Password validation failed.' });\n }\n } catch (error) {\n return this.createError({ message: error.message || 'An error occurred.' });\n }\n }\n return true;\n }),\n passwordConfirmation: yup\n .string()\n .required()\n .oneOf([yup.ref('password')], 'Passwords do not match'),\n\n code: yup.string().required(),\n })\n .noUnknown();\n\nconst createChangePasswordSchema = (config) =>\n yup\n .object({\n password: yup\n .string()\n .required()\n .test(function (value) {\n if (!value) return true;\n const isValid = new TextEncoder().encode(value).length <= 72;\n if (!isValid) {\n return this.createError({ message: 'Password must be less than 73 bytes' });\n }\n return true;\n })\n .test(async function (value) {\n if (typeof config?.validatePassword === 'function') {\n try {\n const isValid = await config.validatePassword(value);\n if (!isValid) {\n return this.createError({ message: 'Password validation failed.' });\n }\n } catch (error) {\n return this.createError({ message: error.message || 'An error occurred.' });\n }\n }\n return true;\n }),\n passwordConfirmation: yup\n .string()\n .required()\n .oneOf([yup.ref('password')], 'Passwords do not match'),\n currentPassword: yup.string().required(),\n })\n .noUnknown();\n\nmodule.exports = {\n validateCallbackBody: validateYupSchema(callbackSchema),\n validateRegisterBody: (payload, config) =>\n validateYupSchema(createRegisterSchema(config))(payload),\n validateSendEmailConfirmationBody: validateYupSchema(sendEmailConfirmationSchema),\n validateEmailConfirmationBody: validateYupSchema(validateEmailConfirmationSchema),\n validateForgotPasswordBody: validateYupSchema(forgotPasswordSchema),\n validateResetPasswordBody: (payload, config) =>\n validateYupSchema(createResetPasswordSchema(config))(payload),\n validateChangePasswordBody: (payload, config) =>\n validateYupSchema(createChangePasswordSchema(config))(payload),\n};\n"],"names":["yup","validateYupSchema","require$$0","callbackSchema","object","identifier","string","required","password","createRegisterSchema","config","email","username","test","value","isValid","TextEncoder","encode","length","createError","message","validatePassword","error","sendEmailConfirmationSchema","validateEmailConfirmationSchema","confirmation","forgotPasswordSchema","noUnknown","createResetPasswordSchema","passwordConfirmation","oneOf","ref","code","createChangePasswordSchema","currentPassword","auth","validateCallbackBody","validateRegisterBody","payload","validateSendEmailConfirmationBody","validateEmailConfirmationBody","validateForgotPasswordBody","validateResetPasswordBody","validateChangePasswordBody"],"mappings":";;;;;;;AAEA,IAAA,MAAM,EAAEA,GAAG,EAAEC,iBAAiB,EAAE,GAAGC,UAAAA;IAEnC,MAAMC,cAAAA,GAAiBH,GAAAA,CAAII,MAAM,CAAC;QAChCC,UAAAA,EAAYL,GAAAA,CAAIM,MAAM,EAAA,CAAGC,QAAQ,EAAA;QACjCC,QAAAA,EAAUR,GAAAA,CAAIM,MAAM,EAAA,CAAGC,QAAQ;AACjC,KAAA,CAAA;AAEA,IAAA,MAAME,oBAAAA,GAAuB,CAACC,MAAAA,GAC5BV,GAAAA,CAAII,MAAM,CAAC;AACTO,YAAAA,KAAAA,EAAOX,GAAAA,CAAIM,MAAM,EAAA,CAAGK,KAAK,GAAGJ,QAAQ,EAAA;YACpCK,QAAAA,EAAUZ,GAAAA,CAAIM,MAAM,EAAA,CAAGC,QAAQ,EAAA;YAC/BC,QAAAA,EAAUR,GAAAA,CACPM,MAAM,EAAA,CACNC,QAAQ,GACRM,IAAI,CAAC,SAAUC,KAAK,EAAA;gBACnB,IAAI,CAACA,OAAO,OAAO,IAAA;AACnB,gBAAA,MAAMC,UAAU,IAAIC,WAAAA,EAAAA,CAAcC,MAAM,CAACH,KAAAA,CAAAA,CAAOI,MAAM,IAAI,EAAA;AAC1D,gBAAA,IAAI,CAACH,OAAAA,EAAS;oBACZ,OAAO,IAAI,CAACI,WAAW,CAAC;wBAAEC,OAAAA,EAAS;AAAqC,qBAAA,CAAA;AAClF,gBAAA;gBACQ,OAAO,IAAA;YACf,CAAA,CAAA,CACOP,IAAI,CAAC,eAAgBC,KAAK,EAAA;gBACzB,IAAI,OAAOJ,MAAAA,EAAQW,gBAAAA,KAAqB,UAAA,EAAY;oBAClD,IAAI;AACF,wBAAA,MAAMN,OAAAA,GAAU,MAAML,MAAAA,CAAOW,gBAAgB,CAACP,KAAAA,CAAAA;AAC9C,wBAAA,IAAI,CAACC,OAAAA,EAAS;4BACZ,OAAO,IAAI,CAACI,WAAW,CAAC;gCAAEC,OAAAA,EAAS;AAA6B,6BAAA,CAAA;AAC9E,wBAAA;AACA,oBAAA,CAAA,CAAY,OAAOE,KAAAA,EAAO;wBACd,OAAO,IAAI,CAACH,WAAW,CAAC;4BAAEC,OAAAA,EAASE,KAAAA,CAAMF,OAAO,IAAI;;AAChE,oBAAA;AACA,gBAAA;gBACQ,OAAO,IAAA;AACf,YAAA,CAAA;AACA,SAAA,CAAA;IAEA,MAAMG,2BAAAA,GAA8BvB,GAAAA,CAAII,MAAM,CAAC;AAC7CO,QAAAA,KAAAA,EAAOX,GAAAA,CAAIM,MAAM,EAAA,CAAGK,KAAK,GAAGJ,QAAQ;AACtC,KAAA,CAAA;IAEA,MAAMiB,+BAAAA,GAAkCxB,GAAAA,CAAII,MAAM,CAAC;QACjDqB,YAAAA,EAAczB,GAAAA,CAAIM,MAAM,EAAA,CAAGC,QAAQ;AACrC,KAAA,CAAA;IAEA,MAAMmB,oBAAAA,GAAuB1B,GAAAA,CAC1BI,MAAM,CAAC;AACNO,QAAAA,KAAAA,EAAOX,GAAAA,CAAIM,MAAM,EAAA,CAAGK,KAAK,GAAGJ,QAAQ;AACxC,KAAA,CAAA,CACGoB,SAAS,EAAA;AAEZ,IAAA,MAAMC,yBAAAA,GAA4B,CAAClB,MAAAA,GACjCV,GAAAA,CACGI,MAAM,CAAC;YACNI,QAAAA,EAAUR,GAAAA,CACPM,MAAM,EAAA,CACNC,QAAQ,GACRM,IAAI,CAAC,SAAUC,KAAK,EAAA;gBACnB,IAAI,CAACA,OAAO,OAAO,IAAA;AACnB,gBAAA,MAAMC,UAAU,IAAIC,WAAAA,EAAAA,CAAcC,MAAM,CAACH,KAAAA,CAAAA,CAAOI,MAAM,IAAI,EAAA;AAC1D,gBAAA,IAAI,CAACH,OAAAA,EAAS;oBACZ,OAAO,IAAI,CAACI,WAAW,CAAC;wBAAEC,OAAAA,EAAS;AAAqC,qBAAA,CAAA;AACpF,gBAAA;gBACU,OAAO,IAAA;YACjB,CAAA,CAAA,CACSP,IAAI,CAAC,eAAgBC,KAAK,EAAA;gBACzB,IAAI,OAAOJ,MAAAA,EAAQW,gBAAAA,KAAqB,UAAA,EAAY;oBAClD,IAAI;AACF,wBAAA,MAAMN,OAAAA,GAAU,MAAML,MAAAA,CAAOW,gBAAgB,CAACP,KAAAA,CAAAA;AAC9C,wBAAA,IAAI,CAACC,OAAAA,EAAS;4BACZ,OAAO,IAAI,CAACI,WAAW,CAAC;gCAAEC,OAAAA,EAAS;AAA6B,6BAAA,CAAA;AAChF,wBAAA;AACA,oBAAA,CAAA,CAAc,OAAOE,KAAAA,EAAO;wBACd,OAAO,IAAI,CAACH,WAAW,CAAC;4BAAEC,OAAAA,EAASE,KAAAA,CAAMF,OAAO,IAAI;;AAClE,oBAAA;AACA,gBAAA;gBACU,OAAO,IAAA;AACjB,YAAA,CAAA,CAAA;AACMS,YAAAA,oBAAAA,EAAsB7B,IACnBM,MAAM,EAAA,CACNC,QAAQ,EAAA,CACRuB,KAAK,CAAC;AAAC9B,gBAAAA,GAAAA,CAAI+B,GAAG,CAAC,UAAA;aAAY,EAAE,wBAAA,CAAA;YAEhCC,IAAAA,EAAMhC,GAAAA,CAAIM,MAAM,EAAA,CAAGC,QAAQ;AACjC,SAAA,CAAA,CACKoB,SAAS,EAAA;AAEd,IAAA,MAAMM,0BAAAA,GAA6B,CAACvB,MAAAA,GAClCV,GAAAA,CACGI,MAAM,CAAC;YACNI,QAAAA,EAAUR,GAAAA,CACPM,MAAM,EAAA,CACNC,QAAQ,GACRM,IAAI,CAAC,SAAUC,KAAK,EAAA;gBACnB,IAAI,CAACA,OAAO,OAAO,IAAA;AACnB,gBAAA,MAAMC,UAAU,IAAIC,WAAAA,EAAAA,CAAcC,MAAM,CAACH,KAAAA,CAAAA,CAAOI,MAAM,IAAI,EAAA;AAC1D,gBAAA,IAAI,CAACH,OAAAA,EAAS;oBACZ,OAAO,IAAI,CAACI,WAAW,CAAC;wBAAEC,OAAAA,EAAS;AAAqC,qBAAA,CAAA;AACpF,gBAAA;gBACU,OAAO,IAAA;YACjB,CAAA,CAAA,CACSP,IAAI,CAAC,eAAgBC,KAAK,EAAA;gBACzB,IAAI,OAAOJ,MAAAA,EAAQW,gBAAAA,KAAqB,UAAA,EAAY;oBAClD,IAAI;AACF,wBAAA,MAAMN,OAAAA,GAAU,MAAML,MAAAA,CAAOW,gBAAgB,CAACP,KAAAA,CAAAA;AAC9C,wBAAA,IAAI,CAACC,OAAAA,EAAS;4BACZ,OAAO,IAAI,CAACI,WAAW,CAAC;gCAAEC,OAAAA,EAAS;AAA6B,6BAAA,CAAA;AAChF,wBAAA;AACA,oBAAA,CAAA,CAAc,OAAOE,KAAAA,EAAO;wBACd,OAAO,IAAI,CAACH,WAAW,CAAC;4BAAEC,OAAAA,EAASE,KAAAA,CAAMF,OAAO,IAAI;;AAClE,oBAAA;AACA,gBAAA;gBACU,OAAO,IAAA;AACjB,YAAA,CAAA,CAAA;AACMS,YAAAA,oBAAAA,EAAsB7B,IACnBM,MAAM,EAAA,CACNC,QAAQ,EAAA,CACRuB,KAAK,CAAC;AAAC9B,gBAAAA,GAAAA,CAAI+B,GAAG,CAAC,UAAA;aAAY,EAAE,wBAAA,CAAA;YAChCG,eAAAA,EAAiBlC,GAAAA,CAAIM,MAAM,EAAA,CAAGC,QAAQ;AAC5C,SAAA,CAAA,CACKoB,SAAS,EAAA;IAEdQ,IAAAA,GAAiB;AACfC,QAAAA,oBAAAA,EAAsBnC,iBAAAA,CAAkBE,cAAAA,CAAAA;AACxCkC,QAAAA,oBAAAA,EAAsB,CAACC,OAAAA,EAAS5B,MAAAA,GAC9BT,iBAAAA,CAAkBQ,qBAAqBC,MAAAA,CAAAA,CAAAA,CAAS4B,OAAAA,CAAAA;AAClDC,QAAAA,iCAAAA,EAAmCtC,iBAAAA,CAAkBsB,2BAAAA,CAAAA;AACrDiB,QAAAA,6BAAAA,EAA+BvC,iBAAAA,CAAkBuB,+BAAAA,CAAAA;AACjDiB,QAAAA,0BAAAA,EAA4BxC,iBAAAA,CAAkByB,oBAAAA,CAAAA;AAC9CgB,QAAAA,yBAAAA,EAA2B,CAACJ,OAAAA,EAAS5B,MAAAA,GACnCT,iBAAAA,CAAkB2B,0BAA0BlB,MAAAA,CAAAA,CAAAA,CAAS4B,OAAAA,CAAAA;AACvDK,QAAAA,0BAAAA,EAA4B,CAACL,OAAAA,EAAS5B,MAAAA,GACpCT,iBAAAA,CAAkBgC,2BAA2BvB,MAAAA,CAAAA,CAAAA,CAAS4B,OAAAA;AAC1D,KAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"user.js","sources":["../../../../server/controllers/validation/user.js"],"sourcesContent":["'use strict';\n\nconst { yup, validateYupSchema } = require('@strapi/utils');\n\nconst deleteRoleSchema = yup.object().shape({\n role: yup.strapiID().required(),\n});\n\nconst createUserBodySchema = yup.object().shape({\n email: yup.string().email().required(),\n username: yup.string().min(1).required(),\n password: yup.string().min(1).required(),\n role: yup.lazy((value) =>\n typeof value === 'object'\n ? yup\n .object()\n .shape({\n connect: yup\n .array()\n .of(yup.object().shape({ id: yup.strapiID().required() }))\n .min(1, 'Users must have a role')\n .required(),\n })\n .required()\n : yup.strapiID().required()\n ),\n});\n\nconst updateUserBodySchema = yup.object().shape({\n email: yup.string().email().min(1),\n username: yup.string().min(1),\n password: yup\n .mixed()\n .test(\n 'password-validation',\n 'Password must be at least 1 character',\n function validatePassword(value) {\n if (value == null || value === '') {\n return true;\n }\n return typeof value === 'string' && value.length >= 1;\n }\n ),\n role: yup.lazy((value) =>\n typeof value === 'object'\n ? yup.object().shape({\n connect: yup\n .array()\n .of(yup.object().shape({ id: yup.strapiID().required() }))\n .required(),\n disconnect: yup\n .array()\n .test('CheckDisconnect', 'Cannot remove role', function test(disconnectValue) {\n if (value.connect.length === 0 && disconnectValue.length > 0) {\n return false;\n }\n\n return true;\n })\n .required(),\n })\n : yup.strapiID()\n ),\n});\n\nmodule.exports = {\n validateCreateUserBody: validateYupSchema(createUserBodySchema),\n validateUpdateUserBody: validateYupSchema(updateUserBodySchema),\n validateDeleteRoleBody: validateYupSchema(deleteRoleSchema),\n};\n"],"names":["yup","validateYupSchema","require$$0","deleteRoleSchema","object","shape","role","strapiID","required","createUserBodySchema","email","string","username","min","password","lazy","value","connect","array","of","id","updateUserBodySchema","mixed","test","validatePassword","length","disconnect","disconnectValue","user","validateCreateUserBody","validateUpdateUserBody","validateDeleteRoleBody"],"mappings":";;;;;;;;;AAEA,IAAA,MAAM,EAAEA,GAAG,EAAEC,iBAAiB,EAAE,GAAGC,UAAAA;AAEnC,IAAA,MAAMC,gBAAAA,GAAmBH,GAAAA,CAAII,MAAM,EAAA,CAAGC,KAAK,CAAC;QAC1CC,IAAAA,EAAMN,GAAAA,CAAIO,QAAQ,EAAA,CAAGC,QAAQ;AAC/B,KAAA,CAAA;AAEA,IAAA,MAAMC,oBAAAA,GAAuBT,GAAAA,CAAII,MAAM,EAAA,CAAGC,KAAK,CAAC;AAC9CK,QAAAA,KAAAA,EAAOV,GAAAA,CAAIW,MAAM,EAAA,CAAGD,KAAK,GAAGF,QAAQ,EAAA;AACpCI,QAAAA,QAAAA,EAAUZ,IAAIW,MAAM,EAAA,CAAGE,GAAG,CAAC,GAAGL,QAAQ,EAAA;AACtCM,QAAAA,QAAAA,EAAUd,IAAIW,MAAM,EAAA,CAAGE,GAAG,CAAC,GAAGL,QAAQ,EAAA;AACtCF,QAAAA,IAAAA,EAAMN,GAAAA,CAAIe,IAAI,CAAC,CAACC,KAAAA,GACd,OAAOA,KAAAA,KAAU,QAAA,GACbhB,GAAAA,CACGI,MAAM,EAAA,CACNC,KAAK,CAAC;gBACLY,OAAAA,EAASjB,GAAAA,CACNkB,KAAK,EAAA,CACLC,EAAE,CAACnB,GAAAA,CAAII,MAAM,EAAA,CAAGC,KAAK,CAAC;oBAAEe,EAAAA,EAAIpB,GAAAA,CAAIO,QAAQ,EAAA,CAAGC,QAAQ;AAAE,iBAAA,CAAA,CAAA,CACrDK,GAAG,CAAC,CAAA,EAAG,wBAAA,CAAA,CACPL,QAAQ;AACvB,aAAA,CAAA,CACWA,QAAQ,EAAA,GACXR,GAAAA,CAAIO,QAAQ,GAAGC,QAAQ,EAAA;AAE/B,KAAA,CAAA;AAEA,IAAA,MAAMa,oBAAAA,GAAuBrB,GAAAA,CAAII,MAAM,EAAA,CAAGC,KAAK,CAAC;AAC9CK,QAAAA,KAAAA,EAAOV,IAAIW,MAAM,EAAA,CAAGD,KAAK,EAAA,CAAGG,GAAG,CAAC,CAAA,CAAA;AAChCD,QAAAA,QAAAA,EAAUZ,GAAAA,CAAIW,MAAM,EAAA,CAAGE,GAAG,CAAC,CAAA,CAAA;QAC3BC,QAAAA,EAAUd,GAAAA,CACPsB,KAAK,EAAA,CACLC,IAAI,CACH,qBAAA,EACA,uCAAA,EACA,SAASC,gBAAAA,CAAiBR,KAAK,EAAA;YAC7B,IAAIA,KAAAA,IAAS,IAAA,IAAQA,KAAAA,KAAU,EAAA,EAAI;gBACjC,OAAO,IAAA;AACjB,YAAA;AACQ,YAAA,OAAO,OAAOA,KAAAA,KAAU,QAAA,IAAYA,KAAAA,CAAMS,MAAM,IAAI,CAAA;AAC5D,QAAA,CAAA,CAAA;AAEEnB,QAAAA,IAAAA,EAAMN,GAAAA,CAAIe,IAAI,CAAC,CAACC,KAAAA,GACd,OAAOA,KAAAA,KAAU,QAAA,GACbhB,GAAAA,CAAII,MAAM,EAAA,CAAGC,KAAK,CAAC;gBACjBY,OAAAA,EAASjB,GAAAA,CACNkB,KAAK,EAAA,CACLC,EAAE,CAACnB,GAAAA,CAAII,MAAM,EAAA,CAAGC,KAAK,CAAC;oBAAEe,EAAAA,EAAIpB,GAAAA,CAAIO,QAAQ,EAAA,CAAGC,QAAQ;AAAE,iBAAA,CAAA,CAAA,CACrDA,QAAQ,EAAA;gBACXkB,UAAAA,EAAY1B,GAAAA,CACTkB,KAAK,EAAA,CACLK,IAAI,CAAC,iBAAA,EAAmB,oBAAA,EAAsB,SAASA,IAAAA,CAAKI,eAAe,EAAA;oBAC1E,IAAIX,KAAAA,CAAMC,OAAO,CAACQ,MAAM,KAAK,CAAA,IAAKE,eAAAA,CAAgBF,MAAM,GAAG,CAAA,EAAG;wBAC5D,OAAO,KAAA;AACvB,oBAAA;oBAEc,OAAO,IAAA;AACrB,gBAAA,CAAA,CAAA,CACajB,QAAQ;AACrB,aAAA,CAAA,GACQR,IAAIO,QAAQ,EAAA;AAEpB,KAAA,CAAA;IAEAqB,IAAAA,GAAiB;AACfC,QAAAA,sBAAAA,EAAwB5B,iBAAAA,CAAkBQ,oBAAAA,CAAAA;AAC1CqB,QAAAA,sBAAAA,EAAwB7B,iBAAAA,CAAkBoB,oBAAAA,CAAAA;AAC1CU,QAAAA,sBAAAA,EAAwB9B,iBAAAA,CAAkBE,gBAAAA;AAC5C,KAAA;;;;;;"}
1
+ {"version":3,"file":"user.js","sources":["../../../../server/controllers/validation/user.js"],"sourcesContent":["'use strict';\n\nconst { yup, validateYupSchema } = require('@strapi/utils');\n\nconst deleteRoleSchema = yup.object().shape({\n role: yup.strapiID().required(),\n});\n\nconst createUserBodySchema = yup.object().shape({\n email: yup.string().email().required(),\n username: yup.string().min(1).required(),\n password: yup.string().min(1).required(),\n role: yup.lazy((value) =>\n typeof value === 'object'\n ? yup\n .object()\n .shape({\n connect: yup\n .array()\n .of(yup.object().shape({ id: yup.strapiID().required() }))\n .min(1, 'Users must have a role')\n .required(),\n })\n .required()\n : yup.strapiID().required()\n ),\n});\n\nconst updateUserBodySchema = yup.object().shape({\n email: yup.string().email().min(1),\n username: yup.string().min(1),\n password: yup\n .mixed()\n .test(\n 'password-validation',\n 'Password must be at least 1 character',\n function validatePassword(value) {\n if (value == null || value === '') {\n return true;\n }\n return typeof value === 'string' && value.length >= 1;\n }\n ),\n role: yup.lazy((value) =>\n typeof value === 'object'\n ? yup.object().shape({\n connect: yup\n .array()\n .of(yup.object().shape({ id: yup.strapiID().required() }))\n .required(),\n disconnect: yup\n .array()\n .test('CheckDisconnect', 'Cannot remove role', function test(disconnectValue) {\n if (value.connect.length === 0 && disconnectValue.length > 0) {\n return false;\n }\n\n return true;\n })\n .required(),\n })\n : yup.strapiID()\n ),\n});\n\nmodule.exports = {\n validateCreateUserBody: validateYupSchema(createUserBodySchema),\n validateUpdateUserBody: validateYupSchema(updateUserBodySchema),\n validateDeleteRoleBody: validateYupSchema(deleteRoleSchema),\n};\n"],"names":["yup","validateYupSchema","require$$0","deleteRoleSchema","object","shape","role","strapiID","required","createUserBodySchema","email","string","username","min","password","lazy","value","connect","array","of","id","updateUserBodySchema","mixed","test","validatePassword","length","disconnect","disconnectValue","user","validateCreateUserBody","validateUpdateUserBody","validateDeleteRoleBody"],"mappings":";;;;;;;;;AAEA,IAAA,MAAM,EAAEA,GAAG,EAAEC,iBAAiB,EAAE,GAAGC,UAAAA;AAEnC,IAAA,MAAMC,gBAAAA,GAAmBH,GAAAA,CAAII,MAAM,EAAA,CAAGC,KAAK,CAAC;QAC1CC,IAAAA,EAAMN,GAAAA,CAAIO,QAAQ,EAAA,CAAGC,QAAQ;AAC/B,KAAA,CAAA;AAEA,IAAA,MAAMC,oBAAAA,GAAuBT,GAAAA,CAAII,MAAM,EAAA,CAAGC,KAAK,CAAC;AAC9CK,QAAAA,KAAAA,EAAOV,GAAAA,CAAIW,MAAM,EAAA,CAAGD,KAAK,GAAGF,QAAQ,EAAA;AACpCI,QAAAA,QAAAA,EAAUZ,IAAIW,MAAM,EAAA,CAAGE,GAAG,CAAC,GAAGL,QAAQ,EAAA;AACtCM,QAAAA,QAAAA,EAAUd,IAAIW,MAAM,EAAA,CAAGE,GAAG,CAAC,GAAGL,QAAQ,EAAA;AACtCF,QAAAA,IAAAA,EAAMN,GAAAA,CAAIe,IAAI,CAAC,CAACC,KAAAA,GACd,OAAOA,KAAAA,KAAU,QAAA,GACbhB,GAAAA,CACGI,MAAM,EAAA,CACNC,KAAK,CAAC;gBACLY,OAAAA,EAASjB,GAAAA,CACNkB,KAAK,EAAA,CACLC,EAAE,CAACnB,GAAAA,CAAII,MAAM,EAAA,CAAGC,KAAK,CAAC;oBAAEe,EAAAA,EAAIpB,GAAAA,CAAIO,QAAQ,EAAA,CAAGC,QAAQ;oBACnDK,GAAG,CAAC,CAAA,EAAG,wBAAA,CAAA,CACPL,QAAQ;AACvB,aAAA,CAAA,CACWA,QAAQ,EAAA,GACXR,GAAAA,CAAIO,QAAQ,GAAGC,QAAQ,EAAA;AAE/B,KAAA,CAAA;AAEA,IAAA,MAAMa,oBAAAA,GAAuBrB,GAAAA,CAAII,MAAM,EAAA,CAAGC,KAAK,CAAC;AAC9CK,QAAAA,KAAAA,EAAOV,IAAIW,MAAM,EAAA,CAAGD,KAAK,EAAA,CAAGG,GAAG,CAAC,CAAA,CAAA;AAChCD,QAAAA,QAAAA,EAAUZ,GAAAA,CAAIW,MAAM,EAAA,CAAGE,GAAG,CAAC,CAAA,CAAA;QAC3BC,QAAAA,EAAUd,GAAAA,CACPsB,KAAK,EAAA,CACLC,IAAI,CACH,qBAAA,EACA,uCAAA,EACA,SAASC,gBAAAA,CAAiBR,KAAK,EAAA;YAC7B,IAAIA,KAAAA,IAAS,IAAA,IAAQA,KAAAA,KAAU,EAAA,EAAI;gBACjC,OAAO,IAAA;AACjB,YAAA;AACQ,YAAA,OAAO,OAAOA,KAAAA,KAAU,QAAA,IAAYA,KAAAA,CAAMS,MAAM,IAAI,CAAA;AAC5D,QAAA,CAAA,CAAA;AAEEnB,QAAAA,IAAAA,EAAMN,GAAAA,CAAIe,IAAI,CAAC,CAACC,KAAAA,GACd,OAAOA,KAAAA,KAAU,QAAA,GACbhB,GAAAA,CAAII,MAAM,EAAA,CAAGC,KAAK,CAAC;gBACjBY,OAAAA,EAASjB,GAAAA,CACNkB,KAAK,EAAA,CACLC,EAAE,CAACnB,GAAAA,CAAII,MAAM,EAAA,CAAGC,KAAK,CAAC;oBAAEe,EAAAA,EAAIpB,GAAAA,CAAIO,QAAQ,EAAA,CAAGC,QAAQ;oBACnDA,QAAQ,EAAA;gBACXkB,UAAAA,EAAY1B,GAAAA,CACTkB,KAAK,EAAA,CACLK,IAAI,CAAC,iBAAA,EAAmB,oBAAA,EAAsB,SAASA,IAAAA,CAAKI,eAAe,EAAA;oBAC1E,IAAIX,KAAAA,CAAMC,OAAO,CAACQ,MAAM,KAAK,CAAA,IAAKE,eAAAA,CAAgBF,MAAM,GAAG,CAAA,EAAG;wBAC5D,OAAO,KAAA;AACvB,oBAAA;oBAEc,OAAO,IAAA;AACrB,gBAAA,CAAA,CAAA,CACajB,QAAQ;AACrB,aAAA,CAAA,GACQR,IAAIO,QAAQ,EAAA;AAEpB,KAAA,CAAA;IAEAqB,IAAAA,GAAiB;AACfC,QAAAA,sBAAAA,EAAwB5B,iBAAAA,CAAkBQ,oBAAAA,CAAAA;AAC1CqB,QAAAA,sBAAAA,EAAwB7B,iBAAAA,CAAkBoB,oBAAAA,CAAAA;AAC1CU,QAAAA,sBAAAA,EAAwB9B,iBAAAA,CAAkBE,gBAAAA;AAC5C,KAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"user.mjs","sources":["../../../../server/controllers/validation/user.js"],"sourcesContent":["'use strict';\n\nconst { yup, validateYupSchema } = require('@strapi/utils');\n\nconst deleteRoleSchema = yup.object().shape({\n role: yup.strapiID().required(),\n});\n\nconst createUserBodySchema = yup.object().shape({\n email: yup.string().email().required(),\n username: yup.string().min(1).required(),\n password: yup.string().min(1).required(),\n role: yup.lazy((value) =>\n typeof value === 'object'\n ? yup\n .object()\n .shape({\n connect: yup\n .array()\n .of(yup.object().shape({ id: yup.strapiID().required() }))\n .min(1, 'Users must have a role')\n .required(),\n })\n .required()\n : yup.strapiID().required()\n ),\n});\n\nconst updateUserBodySchema = yup.object().shape({\n email: yup.string().email().min(1),\n username: yup.string().min(1),\n password: yup\n .mixed()\n .test(\n 'password-validation',\n 'Password must be at least 1 character',\n function validatePassword(value) {\n if (value == null || value === '') {\n return true;\n }\n return typeof value === 'string' && value.length >= 1;\n }\n ),\n role: yup.lazy((value) =>\n typeof value === 'object'\n ? yup.object().shape({\n connect: yup\n .array()\n .of(yup.object().shape({ id: yup.strapiID().required() }))\n .required(),\n disconnect: yup\n .array()\n .test('CheckDisconnect', 'Cannot remove role', function test(disconnectValue) {\n if (value.connect.length === 0 && disconnectValue.length > 0) {\n return false;\n }\n\n return true;\n })\n .required(),\n })\n : yup.strapiID()\n ),\n});\n\nmodule.exports = {\n validateCreateUserBody: validateYupSchema(createUserBodySchema),\n validateUpdateUserBody: validateYupSchema(updateUserBodySchema),\n validateDeleteRoleBody: validateYupSchema(deleteRoleSchema),\n};\n"],"names":["yup","validateYupSchema","require$$0","deleteRoleSchema","object","shape","role","strapiID","required","createUserBodySchema","email","string","username","min","password","lazy","value","connect","array","of","id","updateUserBodySchema","mixed","test","validatePassword","length","disconnect","disconnectValue","user","validateCreateUserBody","validateUpdateUserBody","validateDeleteRoleBody"],"mappings":";;;;;;;AAEA,IAAA,MAAM,EAAEA,GAAG,EAAEC,iBAAiB,EAAE,GAAGC,UAAAA;AAEnC,IAAA,MAAMC,gBAAAA,GAAmBH,GAAAA,CAAII,MAAM,EAAA,CAAGC,KAAK,CAAC;QAC1CC,IAAAA,EAAMN,GAAAA,CAAIO,QAAQ,EAAA,CAAGC,QAAQ;AAC/B,KAAA,CAAA;AAEA,IAAA,MAAMC,oBAAAA,GAAuBT,GAAAA,CAAII,MAAM,EAAA,CAAGC,KAAK,CAAC;AAC9CK,QAAAA,KAAAA,EAAOV,GAAAA,CAAIW,MAAM,EAAA,CAAGD,KAAK,GAAGF,QAAQ,EAAA;AACpCI,QAAAA,QAAAA,EAAUZ,IAAIW,MAAM,EAAA,CAAGE,GAAG,CAAC,GAAGL,QAAQ,EAAA;AACtCM,QAAAA,QAAAA,EAAUd,IAAIW,MAAM,EAAA,CAAGE,GAAG,CAAC,GAAGL,QAAQ,EAAA;AACtCF,QAAAA,IAAAA,EAAMN,GAAAA,CAAIe,IAAI,CAAC,CAACC,KAAAA,GACd,OAAOA,KAAAA,KAAU,QAAA,GACbhB,GAAAA,CACGI,MAAM,EAAA,CACNC,KAAK,CAAC;gBACLY,OAAAA,EAASjB,GAAAA,CACNkB,KAAK,EAAA,CACLC,EAAE,CAACnB,GAAAA,CAAII,MAAM,EAAA,CAAGC,KAAK,CAAC;oBAAEe,EAAAA,EAAIpB,GAAAA,CAAIO,QAAQ,EAAA,CAAGC,QAAQ;AAAE,iBAAA,CAAA,CAAA,CACrDK,GAAG,CAAC,CAAA,EAAG,wBAAA,CAAA,CACPL,QAAQ;AACvB,aAAA,CAAA,CACWA,QAAQ,EAAA,GACXR,GAAAA,CAAIO,QAAQ,GAAGC,QAAQ,EAAA;AAE/B,KAAA,CAAA;AAEA,IAAA,MAAMa,oBAAAA,GAAuBrB,GAAAA,CAAII,MAAM,EAAA,CAAGC,KAAK,CAAC;AAC9CK,QAAAA,KAAAA,EAAOV,IAAIW,MAAM,EAAA,CAAGD,KAAK,EAAA,CAAGG,GAAG,CAAC,CAAA,CAAA;AAChCD,QAAAA,QAAAA,EAAUZ,GAAAA,CAAIW,MAAM,EAAA,CAAGE,GAAG,CAAC,CAAA,CAAA;QAC3BC,QAAAA,EAAUd,GAAAA,CACPsB,KAAK,EAAA,CACLC,IAAI,CACH,qBAAA,EACA,uCAAA,EACA,SAASC,gBAAAA,CAAiBR,KAAK,EAAA;YAC7B,IAAIA,KAAAA,IAAS,IAAA,IAAQA,KAAAA,KAAU,EAAA,EAAI;gBACjC,OAAO,IAAA;AACjB,YAAA;AACQ,YAAA,OAAO,OAAOA,KAAAA,KAAU,QAAA,IAAYA,KAAAA,CAAMS,MAAM,IAAI,CAAA;AAC5D,QAAA,CAAA,CAAA;AAEEnB,QAAAA,IAAAA,EAAMN,GAAAA,CAAIe,IAAI,CAAC,CAACC,KAAAA,GACd,OAAOA,KAAAA,KAAU,QAAA,GACbhB,GAAAA,CAAII,MAAM,EAAA,CAAGC,KAAK,CAAC;gBACjBY,OAAAA,EAASjB,GAAAA,CACNkB,KAAK,EAAA,CACLC,EAAE,CAACnB,GAAAA,CAAII,MAAM,EAAA,CAAGC,KAAK,CAAC;oBAAEe,EAAAA,EAAIpB,GAAAA,CAAIO,QAAQ,EAAA,CAAGC,QAAQ;AAAE,iBAAA,CAAA,CAAA,CACrDA,QAAQ,EAAA;gBACXkB,UAAAA,EAAY1B,GAAAA,CACTkB,KAAK,EAAA,CACLK,IAAI,CAAC,iBAAA,EAAmB,oBAAA,EAAsB,SAASA,IAAAA,CAAKI,eAAe,EAAA;oBAC1E,IAAIX,KAAAA,CAAMC,OAAO,CAACQ,MAAM,KAAK,CAAA,IAAKE,eAAAA,CAAgBF,MAAM,GAAG,CAAA,EAAG;wBAC5D,OAAO,KAAA;AACvB,oBAAA;oBAEc,OAAO,IAAA;AACrB,gBAAA,CAAA,CAAA,CACajB,QAAQ;AACrB,aAAA,CAAA,GACQR,IAAIO,QAAQ,EAAA;AAEpB,KAAA,CAAA;IAEAqB,IAAAA,GAAiB;AACfC,QAAAA,sBAAAA,EAAwB5B,iBAAAA,CAAkBQ,oBAAAA,CAAAA;AAC1CqB,QAAAA,sBAAAA,EAAwB7B,iBAAAA,CAAkBoB,oBAAAA,CAAAA;AAC1CU,QAAAA,sBAAAA,EAAwB9B,iBAAAA,CAAkBE,gBAAAA;AAC5C,KAAA;;;;;;"}
1
+ {"version":3,"file":"user.mjs","sources":["../../../../server/controllers/validation/user.js"],"sourcesContent":["'use strict';\n\nconst { yup, validateYupSchema } = require('@strapi/utils');\n\nconst deleteRoleSchema = yup.object().shape({\n role: yup.strapiID().required(),\n});\n\nconst createUserBodySchema = yup.object().shape({\n email: yup.string().email().required(),\n username: yup.string().min(1).required(),\n password: yup.string().min(1).required(),\n role: yup.lazy((value) =>\n typeof value === 'object'\n ? yup\n .object()\n .shape({\n connect: yup\n .array()\n .of(yup.object().shape({ id: yup.strapiID().required() }))\n .min(1, 'Users must have a role')\n .required(),\n })\n .required()\n : yup.strapiID().required()\n ),\n});\n\nconst updateUserBodySchema = yup.object().shape({\n email: yup.string().email().min(1),\n username: yup.string().min(1),\n password: yup\n .mixed()\n .test(\n 'password-validation',\n 'Password must be at least 1 character',\n function validatePassword(value) {\n if (value == null || value === '') {\n return true;\n }\n return typeof value === 'string' && value.length >= 1;\n }\n ),\n role: yup.lazy((value) =>\n typeof value === 'object'\n ? yup.object().shape({\n connect: yup\n .array()\n .of(yup.object().shape({ id: yup.strapiID().required() }))\n .required(),\n disconnect: yup\n .array()\n .test('CheckDisconnect', 'Cannot remove role', function test(disconnectValue) {\n if (value.connect.length === 0 && disconnectValue.length > 0) {\n return false;\n }\n\n return true;\n })\n .required(),\n })\n : yup.strapiID()\n ),\n});\n\nmodule.exports = {\n validateCreateUserBody: validateYupSchema(createUserBodySchema),\n validateUpdateUserBody: validateYupSchema(updateUserBodySchema),\n validateDeleteRoleBody: validateYupSchema(deleteRoleSchema),\n};\n"],"names":["yup","validateYupSchema","require$$0","deleteRoleSchema","object","shape","role","strapiID","required","createUserBodySchema","email","string","username","min","password","lazy","value","connect","array","of","id","updateUserBodySchema","mixed","test","validatePassword","length","disconnect","disconnectValue","user","validateCreateUserBody","validateUpdateUserBody","validateDeleteRoleBody"],"mappings":";;;;;;;AAEA,IAAA,MAAM,EAAEA,GAAG,EAAEC,iBAAiB,EAAE,GAAGC,UAAAA;AAEnC,IAAA,MAAMC,gBAAAA,GAAmBH,GAAAA,CAAII,MAAM,EAAA,CAAGC,KAAK,CAAC;QAC1CC,IAAAA,EAAMN,GAAAA,CAAIO,QAAQ,EAAA,CAAGC,QAAQ;AAC/B,KAAA,CAAA;AAEA,IAAA,MAAMC,oBAAAA,GAAuBT,GAAAA,CAAII,MAAM,EAAA,CAAGC,KAAK,CAAC;AAC9CK,QAAAA,KAAAA,EAAOV,GAAAA,CAAIW,MAAM,EAAA,CAAGD,KAAK,GAAGF,QAAQ,EAAA;AACpCI,QAAAA,QAAAA,EAAUZ,IAAIW,MAAM,EAAA,CAAGE,GAAG,CAAC,GAAGL,QAAQ,EAAA;AACtCM,QAAAA,QAAAA,EAAUd,IAAIW,MAAM,EAAA,CAAGE,GAAG,CAAC,GAAGL,QAAQ,EAAA;AACtCF,QAAAA,IAAAA,EAAMN,GAAAA,CAAIe,IAAI,CAAC,CAACC,KAAAA,GACd,OAAOA,KAAAA,KAAU,QAAA,GACbhB,GAAAA,CACGI,MAAM,EAAA,CACNC,KAAK,CAAC;gBACLY,OAAAA,EAASjB,GAAAA,CACNkB,KAAK,EAAA,CACLC,EAAE,CAACnB,GAAAA,CAAII,MAAM,EAAA,CAAGC,KAAK,CAAC;oBAAEe,EAAAA,EAAIpB,GAAAA,CAAIO,QAAQ,EAAA,CAAGC,QAAQ;oBACnDK,GAAG,CAAC,CAAA,EAAG,wBAAA,CAAA,CACPL,QAAQ;AACvB,aAAA,CAAA,CACWA,QAAQ,EAAA,GACXR,GAAAA,CAAIO,QAAQ,GAAGC,QAAQ,EAAA;AAE/B,KAAA,CAAA;AAEA,IAAA,MAAMa,oBAAAA,GAAuBrB,GAAAA,CAAII,MAAM,EAAA,CAAGC,KAAK,CAAC;AAC9CK,QAAAA,KAAAA,EAAOV,IAAIW,MAAM,EAAA,CAAGD,KAAK,EAAA,CAAGG,GAAG,CAAC,CAAA,CAAA;AAChCD,QAAAA,QAAAA,EAAUZ,GAAAA,CAAIW,MAAM,EAAA,CAAGE,GAAG,CAAC,CAAA,CAAA;QAC3BC,QAAAA,EAAUd,GAAAA,CACPsB,KAAK,EAAA,CACLC,IAAI,CACH,qBAAA,EACA,uCAAA,EACA,SAASC,gBAAAA,CAAiBR,KAAK,EAAA;YAC7B,IAAIA,KAAAA,IAAS,IAAA,IAAQA,KAAAA,KAAU,EAAA,EAAI;gBACjC,OAAO,IAAA;AACjB,YAAA;AACQ,YAAA,OAAO,OAAOA,KAAAA,KAAU,QAAA,IAAYA,KAAAA,CAAMS,MAAM,IAAI,CAAA;AAC5D,QAAA,CAAA,CAAA;AAEEnB,QAAAA,IAAAA,EAAMN,GAAAA,CAAIe,IAAI,CAAC,CAACC,KAAAA,GACd,OAAOA,KAAAA,KAAU,QAAA,GACbhB,GAAAA,CAAII,MAAM,EAAA,CAAGC,KAAK,CAAC;gBACjBY,OAAAA,EAASjB,GAAAA,CACNkB,KAAK,EAAA,CACLC,EAAE,CAACnB,GAAAA,CAAII,MAAM,EAAA,CAAGC,KAAK,CAAC;oBAAEe,EAAAA,EAAIpB,GAAAA,CAAIO,QAAQ,EAAA,CAAGC,QAAQ;oBACnDA,QAAQ,EAAA;gBACXkB,UAAAA,EAAY1B,GAAAA,CACTkB,KAAK,EAAA,CACLK,IAAI,CAAC,iBAAA,EAAmB,oBAAA,EAAsB,SAASA,IAAAA,CAAKI,eAAe,EAAA;oBAC1E,IAAIX,KAAAA,CAAMC,OAAO,CAACQ,MAAM,KAAK,CAAA,IAAKE,eAAAA,CAAgBF,MAAM,GAAG,CAAA,EAAG;wBAC5D,OAAO,KAAA;AACvB,oBAAA;oBAEc,OAAO,IAAA;AACrB,gBAAA,CAAA,CAAA,CACajB,QAAQ;AACrB,aAAA,CAAA,GACQR,IAAIO,QAAQ,EAAA;AAEpB,KAAA,CAAA;IAEAqB,IAAAA,GAAiB;AACfC,QAAAA,sBAAAA,EAAwB5B,iBAAAA,CAAkBQ,oBAAAA,CAAAA;AAC1CqB,QAAAA,sBAAAA,EAAwB7B,iBAAAA,CAAkBoB,oBAAAA,CAAAA;AAC1CU,QAAAA,sBAAAA,EAAwB9B,iBAAAA,CAAkBE,gBAAAA;AAC5C,KAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"index.js","sources":["../../../server/graphql/index.js"],"sourcesContent":["'use strict';\n\nconst getTypes = require('./types');\nconst getQueries = require('./queries');\nconst getMutations = require('./mutations');\nconst getResolversConfig = require('./resolvers-configs');\n\nmodule.exports = ({ strapi }) => {\n const { config: graphQLConfig } = strapi.plugin('graphql');\n const extensionService = strapi.plugin('graphql').service('extension');\n\n const isShadowCRUDEnabled = graphQLConfig('shadowCRUD', true);\n\n if (!isShadowCRUDEnabled) {\n return;\n }\n\n // Disable Permissions queries & mutations but allow the\n // type to be used/selected in filters or nested resolvers\n extensionService\n .shadowCRUD('plugin::users-permissions.permission')\n .disableQueries()\n .disableMutations();\n\n // Disable User & Role's Create/Update/Delete actions so they can be replaced\n const actionsToDisable = ['create', 'update', 'delete'];\n\n extensionService.shadowCRUD('plugin::users-permissions.user').disableActions(actionsToDisable);\n extensionService.shadowCRUD('plugin::users-permissions.role').disableActions(actionsToDisable);\n\n // Register new types & resolvers config\n extensionService.use(({ nexus }) => {\n const types = getTypes({ strapi, nexus });\n const queries = getQueries({ strapi, nexus });\n const mutations = getMutations({ strapi, nexus });\n const resolversConfig = getResolversConfig({ strapi });\n\n return {\n types: [types, queries, mutations],\n\n resolversConfig,\n };\n });\n};\n"],"names":["getTypes","require$$0","getQueries","require$$1","getMutations","require$$2","getResolversConfig","require$$3","graphql","strapi","config","graphQLConfig","plugin","extensionService","service","isShadowCRUDEnabled","shadowCRUD","disableQueries","disableMutations","actionsToDisable","disableActions","use","nexus","types","queries","mutations","resolversConfig"],"mappings":";;;;;;;;;;;;AAEA,IAAA,MAAMA,QAAAA,GAAWC,eAAAA,EAAAA;AACjB,IAAA,MAAMC,UAAAA,GAAaC,iBAAAA,EAAAA;AACnB,IAAA,MAAMC,YAAAA,GAAeC,iBAAAA,EAAAA;AACrB,IAAA,MAAMC,kBAAAA,GAAqBC,0BAAAA,EAAAA;IAE3BC,OAAAA,GAAiB,CAAC,EAAEC,MAAM,EAAE,GAAA;AAC1B,QAAA,MAAM,EAAEC,MAAAA,EAAQC,aAAa,EAAE,GAAGF,MAAAA,CAAOG,MAAM,CAAC,SAAA,CAAA;AAChD,QAAA,MAAMC,mBAAmBJ,MAAAA,CAAOG,MAAM,CAAC,SAAA,CAAA,CAAWE,OAAO,CAAC,WAAA,CAAA;QAE1D,MAAMC,mBAAAA,GAAsBJ,cAAc,YAAA,EAAc,IAAA,CAAA;AAExD,QAAA,IAAI,CAACI,mBAAAA,EAAqB;AACxB,YAAA;AACJ,QAAA;;;AAIEF,QAAAA,gBAAAA,CACGG,UAAU,CAAC,sCAAA,CAAA,CACXC,cAAc,GACdC,gBAAgB,EAAA;;AAGnB,QAAA,MAAMC,gBAAAA,GAAmB;AAAC,YAAA,QAAA;AAAU,YAAA,QAAA;AAAU,YAAA;AAAS,SAAA;AAEvDN,QAAAA,gBAAAA,CAAiBG,UAAU,CAAC,gCAAA,CAAA,CAAkCI,cAAc,CAACD,gBAAAA,CAAAA;AAC7EN,QAAAA,gBAAAA,CAAiBG,UAAU,CAAC,gCAAA,CAAA,CAAkCI,cAAc,CAACD,gBAAAA,CAAAA;;AAG7EN,QAAAA,gBAAAA,CAAiBQ,GAAG,CAAC,CAAC,EAAEC,KAAK,EAAE,GAAA;AAC7B,YAAA,MAAMC,QAAQvB,QAAAA,CAAS;AAAES,gBAAAA,MAAAA;AAAQa,gBAAAA;AAAK,aAAA,CAAA;AACtC,YAAA,MAAME,UAAUtB,UAAAA,CAAW;AAAEO,gBAAAA,MAAAA;AAAQa,gBAAAA;AAAK,aAAA,CAAA;AAC1C,YAAA,MAAMG,YAAYrB,YAAAA,CAAa;AAAEK,gBAAAA,MAAAA;AAAQa,gBAAAA;AAAK,aAAA,CAAA;AAC9C,YAAA,MAAMI,kBAAkBpB,kBAAAA,CAAmB;AAAEG,gBAAAA;AAAM,aAAA,CAAA;YAEnD,OAAO;gBACLc,KAAAA,EAAO;AAACA,oBAAAA,KAAAA;AAAOC,oBAAAA,OAAAA;AAASC,oBAAAA;AAAU,iBAAA;AAElCC,gBAAAA;AACN,aAAA;AACA,QAAA,CAAA,CAAA;AACA,IAAA,CAAA;;;;;;"}
1
+ {"version":3,"file":"index.js","sources":["../../../server/graphql/index.js"],"sourcesContent":["'use strict';\n\nconst getTypes = require('./types');\nconst getQueries = require('./queries');\nconst getMutations = require('./mutations');\nconst getResolversConfig = require('./resolvers-configs');\n\nmodule.exports = ({ strapi }) => {\n const { config: graphQLConfig } = strapi.plugin('graphql');\n const extensionService = strapi.plugin('graphql').service('extension');\n\n const isShadowCRUDEnabled = graphQLConfig('shadowCRUD', true);\n\n if (!isShadowCRUDEnabled) {\n return;\n }\n\n // Disable Permissions queries & mutations but allow the\n // type to be used/selected in filters or nested resolvers\n extensionService\n .shadowCRUD('plugin::users-permissions.permission')\n .disableQueries()\n .disableMutations();\n\n // Disable User & Role's Create/Update/Delete actions so they can be replaced\n const actionsToDisable = ['create', 'update', 'delete'];\n\n extensionService.shadowCRUD('plugin::users-permissions.user').disableActions(actionsToDisable);\n extensionService.shadowCRUD('plugin::users-permissions.role').disableActions(actionsToDisable);\n\n // Register new types & resolvers config\n extensionService.use(({ nexus }) => {\n const types = getTypes({ strapi, nexus });\n const queries = getQueries({ strapi, nexus });\n const mutations = getMutations({ strapi, nexus });\n const resolversConfig = getResolversConfig({ strapi });\n\n return {\n types: [types, queries, mutations],\n\n resolversConfig,\n };\n });\n};\n"],"names":["getTypes","require$$0","getQueries","require$$1","getMutations","require$$2","getResolversConfig","require$$3","graphql","strapi","config","graphQLConfig","plugin","extensionService","service","isShadowCRUDEnabled","shadowCRUD","disableQueries","disableMutations","actionsToDisable","disableActions","use","nexus","types","queries","mutations","resolversConfig"],"mappings":";;;;;;;;;;;;AAEA,IAAA,MAAMA,QAAAA,GAAWC,eAAAA,EAAAA;AACjB,IAAA,MAAMC,UAAAA,GAAaC,iBAAAA,EAAAA;AACnB,IAAA,MAAMC,YAAAA,GAAeC,iBAAAA,EAAAA;AACrB,IAAA,MAAMC,kBAAAA,GAAqBC,0BAAAA,EAAAA;IAE3BC,OAAAA,GAAiB,CAAC,EAAEC,MAAM,EAAE,GAAA;AAC1B,QAAA,MAAM,EAAEC,MAAAA,EAAQC,aAAa,EAAE,GAAGF,MAAAA,CAAOG,MAAM,CAAC,SAAA,CAAA;AAChD,QAAA,MAAMC,mBAAmBJ,MAAAA,CAAOG,MAAM,CAAC,SAAA,CAAA,CAAWE,OAAO,CAAC,WAAA,CAAA;QAE1D,MAAMC,mBAAAA,GAAsBJ,cAAc,YAAA,EAAc,IAAA,CAAA;AAExD,QAAA,IAAI,CAACI,mBAAAA,EAAqB;AACxB,YAAA;AACJ,QAAA;;;AAIEF,QAAAA,gBAAAA,CACGG,UAAU,CAAC,sCAAA,CAAA,CACXC,cAAc,GACdC,gBAAgB,EAAA;;AAGnB,QAAA,MAAMC,gBAAAA,GAAmB;AAAC,YAAA,QAAA;AAAU,YAAA,QAAA;AAAU,YAAA;AAAS,SAAA;AAEvDN,QAAAA,gBAAAA,CAAiBG,UAAU,CAAC,gCAAA,CAAA,CAAkCI,cAAc,CAACD,gBAAAA,CAAAA;AAC7EN,QAAAA,gBAAAA,CAAiBG,UAAU,CAAC,gCAAA,CAAA,CAAkCI,cAAc,CAACD,gBAAAA,CAAAA;;AAG7EN,QAAAA,gBAAAA,CAAiBQ,GAAG,CAAC,CAAC,EAAEC,KAAK,EAAE,GAAA;AAC7B,YAAA,MAAMC,QAAQvB,QAAAA,CAAS;AAAES,gBAAAA,MAAAA;AAAQa,gBAAAA;AAAK,aAAA,CAAA;AACtC,YAAA,MAAME,UAAUtB,UAAAA,CAAW;AAAEO,gBAAAA,MAAAA;AAAQa,gBAAAA;AAAK,aAAA,CAAA;AAC1C,YAAA,MAAMG,YAAYrB,YAAAA,CAAa;AAAEK,gBAAAA,MAAAA;AAAQa,gBAAAA;AAAK,aAAA,CAAA;AAC9C,YAAA,MAAMI,kBAAkBpB,kBAAAA,CAAmB;AAAEG,gBAAAA;;YAE7C,OAAO;gBACLc,KAAAA,EAAO;AAACA,oBAAAA,KAAAA;AAAOC,oBAAAA,OAAAA;AAASC,oBAAAA;AAAU,iBAAA;AAElCC,gBAAAA;AACN,aAAA;AACA,QAAA,CAAA,CAAA;AACA,IAAA,CAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"index.mjs","sources":["../../../server/graphql/index.js"],"sourcesContent":["'use strict';\n\nconst getTypes = require('./types');\nconst getQueries = require('./queries');\nconst getMutations = require('./mutations');\nconst getResolversConfig = require('./resolvers-configs');\n\nmodule.exports = ({ strapi }) => {\n const { config: graphQLConfig } = strapi.plugin('graphql');\n const extensionService = strapi.plugin('graphql').service('extension');\n\n const isShadowCRUDEnabled = graphQLConfig('shadowCRUD', true);\n\n if (!isShadowCRUDEnabled) {\n return;\n }\n\n // Disable Permissions queries & mutations but allow the\n // type to be used/selected in filters or nested resolvers\n extensionService\n .shadowCRUD('plugin::users-permissions.permission')\n .disableQueries()\n .disableMutations();\n\n // Disable User & Role's Create/Update/Delete actions so they can be replaced\n const actionsToDisable = ['create', 'update', 'delete'];\n\n extensionService.shadowCRUD('plugin::users-permissions.user').disableActions(actionsToDisable);\n extensionService.shadowCRUD('plugin::users-permissions.role').disableActions(actionsToDisable);\n\n // Register new types & resolvers config\n extensionService.use(({ nexus }) => {\n const types = getTypes({ strapi, nexus });\n const queries = getQueries({ strapi, nexus });\n const mutations = getMutations({ strapi, nexus });\n const resolversConfig = getResolversConfig({ strapi });\n\n return {\n types: [types, queries, mutations],\n\n resolversConfig,\n };\n });\n};\n"],"names":["getTypes","require$$0","getQueries","require$$1","getMutations","require$$2","getResolversConfig","require$$3","graphql","strapi","config","graphQLConfig","plugin","extensionService","service","isShadowCRUDEnabled","shadowCRUD","disableQueries","disableMutations","actionsToDisable","disableActions","use","nexus","types","queries","mutations","resolversConfig"],"mappings":";;;;;;;;;;AAEA,IAAA,MAAMA,QAAAA,GAAWC,YAAAA,EAAAA;AACjB,IAAA,MAAMC,UAAAA,GAAaC,cAAAA,EAAAA;AACnB,IAAA,MAAMC,YAAAA,GAAeC,gBAAAA,EAAAA;AACrB,IAAA,MAAMC,kBAAAA,GAAqBC,uBAAAA,EAAAA;IAE3BC,OAAAA,GAAiB,CAAC,EAAEC,MAAM,EAAE,GAAA;AAC1B,QAAA,MAAM,EAAEC,MAAAA,EAAQC,aAAa,EAAE,GAAGF,MAAAA,CAAOG,MAAM,CAAC,SAAA,CAAA;AAChD,QAAA,MAAMC,mBAAmBJ,MAAAA,CAAOG,MAAM,CAAC,SAAA,CAAA,CAAWE,OAAO,CAAC,WAAA,CAAA;QAE1D,MAAMC,mBAAAA,GAAsBJ,cAAc,YAAA,EAAc,IAAA,CAAA;AAExD,QAAA,IAAI,CAACI,mBAAAA,EAAqB;AACxB,YAAA;AACJ,QAAA;;;AAIEF,QAAAA,gBAAAA,CACGG,UAAU,CAAC,sCAAA,CAAA,CACXC,cAAc,GACdC,gBAAgB,EAAA;;AAGnB,QAAA,MAAMC,gBAAAA,GAAmB;AAAC,YAAA,QAAA;AAAU,YAAA,QAAA;AAAU,YAAA;AAAS,SAAA;AAEvDN,QAAAA,gBAAAA,CAAiBG,UAAU,CAAC,gCAAA,CAAA,CAAkCI,cAAc,CAACD,gBAAAA,CAAAA;AAC7EN,QAAAA,gBAAAA,CAAiBG,UAAU,CAAC,gCAAA,CAAA,CAAkCI,cAAc,CAACD,gBAAAA,CAAAA;;AAG7EN,QAAAA,gBAAAA,CAAiBQ,GAAG,CAAC,CAAC,EAAEC,KAAK,EAAE,GAAA;AAC7B,YAAA,MAAMC,QAAQvB,QAAAA,CAAS;AAAES,gBAAAA,MAAAA;AAAQa,gBAAAA;AAAK,aAAA,CAAA;AACtC,YAAA,MAAME,UAAUtB,UAAAA,CAAW;AAAEO,gBAAAA,MAAAA;AAAQa,gBAAAA;AAAK,aAAA,CAAA;AAC1C,YAAA,MAAMG,YAAYrB,YAAAA,CAAa;AAAEK,gBAAAA,MAAAA;AAAQa,gBAAAA;AAAK,aAAA,CAAA;AAC9C,YAAA,MAAMI,kBAAkBpB,kBAAAA,CAAmB;AAAEG,gBAAAA;AAAM,aAAA,CAAA;YAEnD,OAAO;gBACLc,KAAAA,EAAO;AAACA,oBAAAA,KAAAA;AAAOC,oBAAAA,OAAAA;AAASC,oBAAAA;AAAU,iBAAA;AAElCC,gBAAAA;AACN,aAAA;AACA,QAAA,CAAA,CAAA;AACA,IAAA,CAAA;;;;;;"}
1
+ {"version":3,"file":"index.mjs","sources":["../../../server/graphql/index.js"],"sourcesContent":["'use strict';\n\nconst getTypes = require('./types');\nconst getQueries = require('./queries');\nconst getMutations = require('./mutations');\nconst getResolversConfig = require('./resolvers-configs');\n\nmodule.exports = ({ strapi }) => {\n const { config: graphQLConfig } = strapi.plugin('graphql');\n const extensionService = strapi.plugin('graphql').service('extension');\n\n const isShadowCRUDEnabled = graphQLConfig('shadowCRUD', true);\n\n if (!isShadowCRUDEnabled) {\n return;\n }\n\n // Disable Permissions queries & mutations but allow the\n // type to be used/selected in filters or nested resolvers\n extensionService\n .shadowCRUD('plugin::users-permissions.permission')\n .disableQueries()\n .disableMutations();\n\n // Disable User & Role's Create/Update/Delete actions so they can be replaced\n const actionsToDisable = ['create', 'update', 'delete'];\n\n extensionService.shadowCRUD('plugin::users-permissions.user').disableActions(actionsToDisable);\n extensionService.shadowCRUD('plugin::users-permissions.role').disableActions(actionsToDisable);\n\n // Register new types & resolvers config\n extensionService.use(({ nexus }) => {\n const types = getTypes({ strapi, nexus });\n const queries = getQueries({ strapi, nexus });\n const mutations = getMutations({ strapi, nexus });\n const resolversConfig = getResolversConfig({ strapi });\n\n return {\n types: [types, queries, mutations],\n\n resolversConfig,\n };\n });\n};\n"],"names":["getTypes","require$$0","getQueries","require$$1","getMutations","require$$2","getResolversConfig","require$$3","graphql","strapi","config","graphQLConfig","plugin","extensionService","service","isShadowCRUDEnabled","shadowCRUD","disableQueries","disableMutations","actionsToDisable","disableActions","use","nexus","types","queries","mutations","resolversConfig"],"mappings":";;;;;;;;;;AAEA,IAAA,MAAMA,QAAAA,GAAWC,YAAAA,EAAAA;AACjB,IAAA,MAAMC,UAAAA,GAAaC,cAAAA,EAAAA;AACnB,IAAA,MAAMC,YAAAA,GAAeC,gBAAAA,EAAAA;AACrB,IAAA,MAAMC,kBAAAA,GAAqBC,uBAAAA,EAAAA;IAE3BC,OAAAA,GAAiB,CAAC,EAAEC,MAAM,EAAE,GAAA;AAC1B,QAAA,MAAM,EAAEC,MAAAA,EAAQC,aAAa,EAAE,GAAGF,MAAAA,CAAOG,MAAM,CAAC,SAAA,CAAA;AAChD,QAAA,MAAMC,mBAAmBJ,MAAAA,CAAOG,MAAM,CAAC,SAAA,CAAA,CAAWE,OAAO,CAAC,WAAA,CAAA;QAE1D,MAAMC,mBAAAA,GAAsBJ,cAAc,YAAA,EAAc,IAAA,CAAA;AAExD,QAAA,IAAI,CAACI,mBAAAA,EAAqB;AACxB,YAAA;AACJ,QAAA;;;AAIEF,QAAAA,gBAAAA,CACGG,UAAU,CAAC,sCAAA,CAAA,CACXC,cAAc,GACdC,gBAAgB,EAAA;;AAGnB,QAAA,MAAMC,gBAAAA,GAAmB;AAAC,YAAA,QAAA;AAAU,YAAA,QAAA;AAAU,YAAA;AAAS,SAAA;AAEvDN,QAAAA,gBAAAA,CAAiBG,UAAU,CAAC,gCAAA,CAAA,CAAkCI,cAAc,CAACD,gBAAAA,CAAAA;AAC7EN,QAAAA,gBAAAA,CAAiBG,UAAU,CAAC,gCAAA,CAAA,CAAkCI,cAAc,CAACD,gBAAAA,CAAAA;;AAG7EN,QAAAA,gBAAAA,CAAiBQ,GAAG,CAAC,CAAC,EAAEC,KAAK,EAAE,GAAA;AAC7B,YAAA,MAAMC,QAAQvB,QAAAA,CAAS;AAAES,gBAAAA,MAAAA;AAAQa,gBAAAA;AAAK,aAAA,CAAA;AACtC,YAAA,MAAME,UAAUtB,UAAAA,CAAW;AAAEO,gBAAAA,MAAAA;AAAQa,gBAAAA;AAAK,aAAA,CAAA;AAC1C,YAAA,MAAMG,YAAYrB,YAAAA,CAAa;AAAEK,gBAAAA,MAAAA;AAAQa,gBAAAA;AAAK,aAAA,CAAA;AAC9C,YAAA,MAAMI,kBAAkBpB,kBAAAA,CAAmB;AAAEG,gBAAAA;;YAE7C,OAAO;gBACLc,KAAAA,EAAO;AAACA,oBAAAA,KAAAA;AAAOC,oBAAAA,OAAAA;AAASC,oBAAAA;AAAU,iBAAA;AAElCC,gBAAAA;AACN,aAAA;AACA,QAAA,CAAA,CAAA;AACA,IAAA,CAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"login.js","sources":["../../../../../server/graphql/mutations/auth/login.js"],"sourcesContent":["'use strict';\n\nconst { toPlainObject } = require('lodash/fp');\n\nconst { checkBadRequest } = require('../../utils');\n\nmodule.exports = ({ nexus, strapi }) => {\n const { nonNull } = nexus;\n\n return {\n type: nonNull('UsersPermissionsLoginPayload'),\n\n args: {\n input: nonNull('UsersPermissionsLoginInput'),\n },\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.params = { provider: args.input.provider };\n koaContext.request.body = toPlainObject(args.input);\n\n await strapi.plugin('users-permissions').controller('auth').callback(koaContext);\n\n const output = koaContext.body;\n\n checkBadRequest(output);\n\n return {\n user: output.user || output,\n jwt: output.jwt,\n };\n },\n };\n};\n"],"names":["toPlainObject","require$$0","checkBadRequest","require$$1","login","nexus","strapi","nonNull","type","args","input","resolve","parent","context","koaContext","params","provider","request","body","plugin","controller","callback","output","user","jwt"],"mappings":";;;;;;;;;;IAEA,MAAM,EAAEA,aAAa,EAAE,GAAGC,UAAAA;IAE1B,MAAM,EAAEC,eAAe,EAAE,GAAGC,eAAAA,EAAAA;AAE5BC,IAAAA,KAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,OAAO,EAAE,GAAGF,KAAAA;QAEpB,OAAO;AACLG,YAAAA,IAAAA,EAAMD,OAAAA,CAAQ,8BAAA,CAAA;YAEdE,IAAAA,EAAM;AACJC,gBAAAA,KAAAA,EAAOH,OAAAA,CAAQ,4BAAA;AACrB,aAAA;AAEI,YAAA,MAAMI,OAAAA,CAAAA,CAAQC,MAAM,EAAEH,IAAI,EAAEI,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;AAEvBC,gBAAAA,UAAAA,CAAWC,MAAM,GAAG;oBAAEC,QAAAA,EAAUP,IAAAA,CAAKC,KAAK,CAACM;;AAC3CF,gBAAAA,UAAAA,CAAWG,OAAO,CAACC,IAAI,GAAGlB,aAAAA,CAAcS,KAAKC,KAAK,CAAA;gBAElD,MAAMJ,MAAAA,CAAOa,MAAM,CAAC,mBAAA,CAAA,CAAqBC,UAAU,CAAC,MAAA,CAAA,CAAQC,QAAQ,CAACP,UAAAA,CAAAA;gBAErE,MAAMQ,MAAAA,GAASR,WAAWI,IAAI;gBAE9BhB,eAAAA,CAAgBoB,MAAAA,CAAAA;gBAEhB,OAAO;oBACLC,IAAAA,EAAMD,MAAAA,CAAOC,IAAI,IAAID,MAAAA;AACrBE,oBAAAA,GAAAA,EAAKF,OAAOE;AACpB,iBAAA;AACA,YAAA;AACA,SAAA;AACA,IAAA,CAAA;;;;;;"}
1
+ {"version":3,"file":"login.js","sources":["../../../../../server/graphql/mutations/auth/login.js"],"sourcesContent":["'use strict';\n\nconst { toPlainObject } = require('lodash/fp');\n\nconst { checkBadRequest } = require('../../utils');\n\nmodule.exports = ({ nexus, strapi }) => {\n const { nonNull } = nexus;\n\n return {\n type: nonNull('UsersPermissionsLoginPayload'),\n\n args: {\n input: nonNull('UsersPermissionsLoginInput'),\n },\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.params = { provider: args.input.provider };\n koaContext.request.body = toPlainObject(args.input);\n\n await strapi.plugin('users-permissions').controller('auth').callback(koaContext);\n\n const output = koaContext.body;\n\n checkBadRequest(output);\n\n return {\n user: output.user || output,\n jwt: output.jwt,\n };\n },\n };\n};\n"],"names":["toPlainObject","require$$0","checkBadRequest","require$$1","login","nexus","strapi","nonNull","type","args","input","resolve","parent","context","koaContext","params","provider","request","body","plugin","controller","callback","output","user","jwt"],"mappings":";;;;;;;;;;IAEA,MAAM,EAAEA,aAAa,EAAE,GAAGC,UAAAA;IAE1B,MAAM,EAAEC,eAAe,EAAE,GAAGC,eAAAA,EAAAA;AAE5BC,IAAAA,KAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,OAAO,EAAE,GAAGF,KAAAA;QAEpB,OAAO;AACLG,YAAAA,IAAAA,EAAMD,OAAAA,CAAQ,8BAAA,CAAA;YAEdE,IAAAA,EAAM;AACJC,gBAAAA,KAAAA,EAAOH,OAAAA,CAAQ,4BAAA;AACrB,aAAA;AAEI,YAAA,MAAMI,OAAAA,CAAAA,CAAQC,MAAM,EAAEH,IAAI,EAAEI,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;AAEvBC,gBAAAA,UAAAA,CAAWC,MAAM,GAAG;oBAAEC,QAAAA,EAAUP,IAAAA,CAAKC,KAAK,CAACM;AAAQ,iBAAA;AACnDF,gBAAAA,UAAAA,CAAWG,OAAO,CAACC,IAAI,GAAGlB,aAAAA,CAAcS,KAAKC,KAAK,CAAA;gBAElD,MAAMJ,MAAAA,CAAOa,MAAM,CAAC,mBAAA,CAAA,CAAqBC,UAAU,CAAC,MAAA,CAAA,CAAQC,QAAQ,CAACP,UAAAA,CAAAA;gBAErE,MAAMQ,MAAAA,GAASR,WAAWI,IAAI;gBAE9BhB,eAAAA,CAAgBoB,MAAAA,CAAAA;gBAEhB,OAAO;oBACLC,IAAAA,EAAMD,MAAAA,CAAOC,IAAI,IAAID,MAAAA;AACrBE,oBAAAA,GAAAA,EAAKF,OAAOE;AACpB,iBAAA;AACA,YAAA;AACA,SAAA;AACA,IAAA,CAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"login.mjs","sources":["../../../../../server/graphql/mutations/auth/login.js"],"sourcesContent":["'use strict';\n\nconst { toPlainObject } = require('lodash/fp');\n\nconst { checkBadRequest } = require('../../utils');\n\nmodule.exports = ({ nexus, strapi }) => {\n const { nonNull } = nexus;\n\n return {\n type: nonNull('UsersPermissionsLoginPayload'),\n\n args: {\n input: nonNull('UsersPermissionsLoginInput'),\n },\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.params = { provider: args.input.provider };\n koaContext.request.body = toPlainObject(args.input);\n\n await strapi.plugin('users-permissions').controller('auth').callback(koaContext);\n\n const output = koaContext.body;\n\n checkBadRequest(output);\n\n return {\n user: output.user || output,\n jwt: output.jwt,\n };\n },\n };\n};\n"],"names":["toPlainObject","require$$0","checkBadRequest","require$$1","login","nexus","strapi","nonNull","type","args","input","resolve","parent","context","koaContext","params","provider","request","body","plugin","controller","callback","output","user","jwt"],"mappings":";;;;;;;;IAEA,MAAM,EAAEA,aAAa,EAAE,GAAGC,UAAAA;IAE1B,MAAM,EAAEC,eAAe,EAAE,GAAGC,YAAAA,EAAAA;AAE5BC,IAAAA,KAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,OAAO,EAAE,GAAGF,KAAAA;QAEpB,OAAO;AACLG,YAAAA,IAAAA,EAAMD,OAAAA,CAAQ,8BAAA,CAAA;YAEdE,IAAAA,EAAM;AACJC,gBAAAA,KAAAA,EAAOH,OAAAA,CAAQ,4BAAA;AACrB,aAAA;AAEI,YAAA,MAAMI,OAAAA,CAAAA,CAAQC,MAAM,EAAEH,IAAI,EAAEI,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;AAEvBC,gBAAAA,UAAAA,CAAWC,MAAM,GAAG;oBAAEC,QAAAA,EAAUP,IAAAA,CAAKC,KAAK,CAACM;;AAC3CF,gBAAAA,UAAAA,CAAWG,OAAO,CAACC,IAAI,GAAGlB,aAAAA,CAAcS,KAAKC,KAAK,CAAA;gBAElD,MAAMJ,MAAAA,CAAOa,MAAM,CAAC,mBAAA,CAAA,CAAqBC,UAAU,CAAC,MAAA,CAAA,CAAQC,QAAQ,CAACP,UAAAA,CAAAA;gBAErE,MAAMQ,MAAAA,GAASR,WAAWI,IAAI;gBAE9BhB,eAAAA,CAAgBoB,MAAAA,CAAAA;gBAEhB,OAAO;oBACLC,IAAAA,EAAMD,MAAAA,CAAOC,IAAI,IAAID,MAAAA;AACrBE,oBAAAA,GAAAA,EAAKF,OAAOE;AACpB,iBAAA;AACA,YAAA;AACA,SAAA;AACA,IAAA,CAAA;;;;;;"}
1
+ {"version":3,"file":"login.mjs","sources":["../../../../../server/graphql/mutations/auth/login.js"],"sourcesContent":["'use strict';\n\nconst { toPlainObject } = require('lodash/fp');\n\nconst { checkBadRequest } = require('../../utils');\n\nmodule.exports = ({ nexus, strapi }) => {\n const { nonNull } = nexus;\n\n return {\n type: nonNull('UsersPermissionsLoginPayload'),\n\n args: {\n input: nonNull('UsersPermissionsLoginInput'),\n },\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.params = { provider: args.input.provider };\n koaContext.request.body = toPlainObject(args.input);\n\n await strapi.plugin('users-permissions').controller('auth').callback(koaContext);\n\n const output = koaContext.body;\n\n checkBadRequest(output);\n\n return {\n user: output.user || output,\n jwt: output.jwt,\n };\n },\n };\n};\n"],"names":["toPlainObject","require$$0","checkBadRequest","require$$1","login","nexus","strapi","nonNull","type","args","input","resolve","parent","context","koaContext","params","provider","request","body","plugin","controller","callback","output","user","jwt"],"mappings":";;;;;;;;IAEA,MAAM,EAAEA,aAAa,EAAE,GAAGC,UAAAA;IAE1B,MAAM,EAAEC,eAAe,EAAE,GAAGC,YAAAA,EAAAA;AAE5BC,IAAAA,KAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,OAAO,EAAE,GAAGF,KAAAA;QAEpB,OAAO;AACLG,YAAAA,IAAAA,EAAMD,OAAAA,CAAQ,8BAAA,CAAA;YAEdE,IAAAA,EAAM;AACJC,gBAAAA,KAAAA,EAAOH,OAAAA,CAAQ,4BAAA;AACrB,aAAA;AAEI,YAAA,MAAMI,OAAAA,CAAAA,CAAQC,MAAM,EAAEH,IAAI,EAAEI,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;AAEvBC,gBAAAA,UAAAA,CAAWC,MAAM,GAAG;oBAAEC,QAAAA,EAAUP,IAAAA,CAAKC,KAAK,CAACM;AAAQ,iBAAA;AACnDF,gBAAAA,UAAAA,CAAWG,OAAO,CAACC,IAAI,GAAGlB,aAAAA,CAAcS,KAAKC,KAAK,CAAA;gBAElD,MAAMJ,MAAAA,CAAOa,MAAM,CAAC,mBAAA,CAAA,CAAqBC,UAAU,CAAC,MAAA,CAAA,CAAQC,QAAQ,CAACP,UAAAA,CAAAA;gBAErE,MAAMQ,MAAAA,GAASR,WAAWI,IAAI;gBAE9BhB,eAAAA,CAAgBoB,MAAAA,CAAAA;gBAEhB,OAAO;oBACLC,IAAAA,EAAMD,MAAAA,CAAOC,IAAI,IAAID,MAAAA;AACrBE,oBAAAA,GAAAA,EAAKF,OAAOE;AACpB,iBAAA;AACA,YAAA;AACA,SAAA;AACA,IAAA,CAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"create-role.js","sources":["../../../../../../server/graphql/mutations/crud/role/create-role.js"],"sourcesContent":["'use strict';\n\nconst { toPlainObject } = require('lodash/fp');\n\nconst usersPermissionsRoleUID = 'plugin::users-permissions.role';\n\nmodule.exports = ({ nexus, strapi }) => {\n const { getContentTypeInputName } = strapi.plugin('graphql').service('utils').naming;\n const { nonNull } = nexus;\n\n const roleContentType = strapi.getModel(usersPermissionsRoleUID);\n\n const roleInputName = getContentTypeInputName(roleContentType);\n\n return {\n type: 'UsersPermissionsCreateRolePayload',\n\n args: {\n data: nonNull(roleInputName),\n },\n\n description: 'Create a new role',\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.request.body = toPlainObject(args.data);\n\n await strapi.plugin('users-permissions').controller('role').createRole(koaContext);\n\n return { ok: true };\n },\n };\n};\n"],"names":["toPlainObject","require$$0","usersPermissionsRoleUID","createRole","nexus","strapi","getContentTypeInputName","plugin","service","naming","nonNull","roleContentType","getModel","roleInputName","type","args","data","description","resolve","parent","context","koaContext","request","body","controller","ok"],"mappings":";;;;;;;;;IAEA,MAAM,EAAEA,aAAa,EAAE,GAAGC,UAAAA;AAE1B,IAAA,MAAMC,uBAAAA,GAA0B,gCAAA;AAEhCC,IAAAA,UAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,uBAAuB,EAAE,GAAGD,MAAAA,CAAOE,MAAM,CAAC,SAAA,CAAA,CAAWC,OAAO,CAAC,OAAA,CAAA,CAASC,MAAM;QACpF,MAAM,EAAEC,OAAO,EAAE,GAAGN,KAAAA;QAEpB,MAAMO,eAAAA,GAAkBN,MAAAA,CAAOO,QAAQ,CAACV,uBAAAA,CAAAA;AAExC,QAAA,MAAMW,gBAAgBP,uBAAAA,CAAwBK,eAAAA,CAAAA;QAE9C,OAAO;YACLG,IAAAA,EAAM,mCAAA;YAENC,IAAAA,EAAM;AACJC,gBAAAA,IAAAA,EAAMN,OAAAA,CAAQG,aAAAA;AACpB,aAAA;YAEII,WAAAA,EAAa,mBAAA;AAEb,YAAA,MAAMC,OAAAA,CAAAA,CAAQC,MAAM,EAAEJ,IAAI,EAAEK,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;AAEvBC,gBAAAA,UAAAA,CAAWC,OAAO,CAACC,IAAI,GAAGvB,aAAAA,CAAce,KAAKC,IAAI,CAAA;gBAEjD,MAAMX,MAAAA,CAAOE,MAAM,CAAC,mBAAA,CAAA,CAAqBiB,UAAU,CAAC,MAAA,CAAA,CAAQrB,UAAU,CAACkB,UAAAA,CAAAA;gBAEvE,OAAO;oBAAEI,EAAAA,EAAI;;AACnB,YAAA;AACA,SAAA;AACA,IAAA,CAAA;;;;;;"}
1
+ {"version":3,"file":"create-role.js","sources":["../../../../../../server/graphql/mutations/crud/role/create-role.js"],"sourcesContent":["'use strict';\n\nconst { toPlainObject } = require('lodash/fp');\n\nconst usersPermissionsRoleUID = 'plugin::users-permissions.role';\n\nmodule.exports = ({ nexus, strapi }) => {\n const { getContentTypeInputName } = strapi.plugin('graphql').service('utils').naming;\n const { nonNull } = nexus;\n\n const roleContentType = strapi.getModel(usersPermissionsRoleUID);\n\n const roleInputName = getContentTypeInputName(roleContentType);\n\n return {\n type: 'UsersPermissionsCreateRolePayload',\n\n args: {\n data: nonNull(roleInputName),\n },\n\n description: 'Create a new role',\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.request.body = toPlainObject(args.data);\n\n await strapi.plugin('users-permissions').controller('role').createRole(koaContext);\n\n return { ok: true };\n },\n };\n};\n"],"names":["toPlainObject","require$$0","usersPermissionsRoleUID","createRole","nexus","strapi","getContentTypeInputName","plugin","service","naming","nonNull","roleContentType","getModel","roleInputName","type","args","data","description","resolve","parent","context","koaContext","request","body","controller","ok"],"mappings":";;;;;;;;;IAEA,MAAM,EAAEA,aAAa,EAAE,GAAGC,UAAAA;AAE1B,IAAA,MAAMC,uBAAAA,GAA0B,gCAAA;AAEhCC,IAAAA,UAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,uBAAuB,EAAE,GAAGD,MAAAA,CAAOE,MAAM,CAAC,SAAA,CAAA,CAAWC,OAAO,CAAC,OAAA,CAAA,CAASC,MAAM;QACpF,MAAM,EAAEC,OAAO,EAAE,GAAGN,KAAAA;QAEpB,MAAMO,eAAAA,GAAkBN,MAAAA,CAAOO,QAAQ,CAACV,uBAAAA,CAAAA;AAExC,QAAA,MAAMW,gBAAgBP,uBAAAA,CAAwBK,eAAAA,CAAAA;QAE9C,OAAO;YACLG,IAAAA,EAAM,mCAAA;YAENC,IAAAA,EAAM;AACJC,gBAAAA,IAAAA,EAAMN,OAAAA,CAAQG,aAAAA;AACpB,aAAA;YAEII,WAAAA,EAAa,mBAAA;AAEb,YAAA,MAAMC,OAAAA,CAAAA,CAAQC,MAAM,EAAEJ,IAAI,EAAEK,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;AAEvBC,gBAAAA,UAAAA,CAAWC,OAAO,CAACC,IAAI,GAAGvB,aAAAA,CAAce,KAAKC,IAAI,CAAA;gBAEjD,MAAMX,MAAAA,CAAOE,MAAM,CAAC,mBAAA,CAAA,CAAqBiB,UAAU,CAAC,MAAA,CAAA,CAAQrB,UAAU,CAACkB,UAAAA,CAAAA;gBAEvE,OAAO;oBAAEI,EAAAA,EAAI;AAAI,iBAAA;AACvB,YAAA;AACA,SAAA;AACA,IAAA,CAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"create-role.mjs","sources":["../../../../../../server/graphql/mutations/crud/role/create-role.js"],"sourcesContent":["'use strict';\n\nconst { toPlainObject } = require('lodash/fp');\n\nconst usersPermissionsRoleUID = 'plugin::users-permissions.role';\n\nmodule.exports = ({ nexus, strapi }) => {\n const { getContentTypeInputName } = strapi.plugin('graphql').service('utils').naming;\n const { nonNull } = nexus;\n\n const roleContentType = strapi.getModel(usersPermissionsRoleUID);\n\n const roleInputName = getContentTypeInputName(roleContentType);\n\n return {\n type: 'UsersPermissionsCreateRolePayload',\n\n args: {\n data: nonNull(roleInputName),\n },\n\n description: 'Create a new role',\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.request.body = toPlainObject(args.data);\n\n await strapi.plugin('users-permissions').controller('role').createRole(koaContext);\n\n return { ok: true };\n },\n };\n};\n"],"names":["toPlainObject","require$$0","usersPermissionsRoleUID","createRole","nexus","strapi","getContentTypeInputName","plugin","service","naming","nonNull","roleContentType","getModel","roleInputName","type","args","data","description","resolve","parent","context","koaContext","request","body","controller","ok"],"mappings":";;;;;;;IAEA,MAAM,EAAEA,aAAa,EAAE,GAAGC,UAAAA;AAE1B,IAAA,MAAMC,uBAAAA,GAA0B,gCAAA;AAEhCC,IAAAA,UAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,uBAAuB,EAAE,GAAGD,MAAAA,CAAOE,MAAM,CAAC,SAAA,CAAA,CAAWC,OAAO,CAAC,OAAA,CAAA,CAASC,MAAM;QACpF,MAAM,EAAEC,OAAO,EAAE,GAAGN,KAAAA;QAEpB,MAAMO,eAAAA,GAAkBN,MAAAA,CAAOO,QAAQ,CAACV,uBAAAA,CAAAA;AAExC,QAAA,MAAMW,gBAAgBP,uBAAAA,CAAwBK,eAAAA,CAAAA;QAE9C,OAAO;YACLG,IAAAA,EAAM,mCAAA;YAENC,IAAAA,EAAM;AACJC,gBAAAA,IAAAA,EAAMN,OAAAA,CAAQG,aAAAA;AACpB,aAAA;YAEII,WAAAA,EAAa,mBAAA;AAEb,YAAA,MAAMC,OAAAA,CAAAA,CAAQC,MAAM,EAAEJ,IAAI,EAAEK,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;AAEvBC,gBAAAA,UAAAA,CAAWC,OAAO,CAACC,IAAI,GAAGvB,aAAAA,CAAce,KAAKC,IAAI,CAAA;gBAEjD,MAAMX,MAAAA,CAAOE,MAAM,CAAC,mBAAA,CAAA,CAAqBiB,UAAU,CAAC,MAAA,CAAA,CAAQrB,UAAU,CAACkB,UAAAA,CAAAA;gBAEvE,OAAO;oBAAEI,EAAAA,EAAI;;AACnB,YAAA;AACA,SAAA;AACA,IAAA,CAAA;;;;;;"}
1
+ {"version":3,"file":"create-role.mjs","sources":["../../../../../../server/graphql/mutations/crud/role/create-role.js"],"sourcesContent":["'use strict';\n\nconst { toPlainObject } = require('lodash/fp');\n\nconst usersPermissionsRoleUID = 'plugin::users-permissions.role';\n\nmodule.exports = ({ nexus, strapi }) => {\n const { getContentTypeInputName } = strapi.plugin('graphql').service('utils').naming;\n const { nonNull } = nexus;\n\n const roleContentType = strapi.getModel(usersPermissionsRoleUID);\n\n const roleInputName = getContentTypeInputName(roleContentType);\n\n return {\n type: 'UsersPermissionsCreateRolePayload',\n\n args: {\n data: nonNull(roleInputName),\n },\n\n description: 'Create a new role',\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.request.body = toPlainObject(args.data);\n\n await strapi.plugin('users-permissions').controller('role').createRole(koaContext);\n\n return { ok: true };\n },\n };\n};\n"],"names":["toPlainObject","require$$0","usersPermissionsRoleUID","createRole","nexus","strapi","getContentTypeInputName","plugin","service","naming","nonNull","roleContentType","getModel","roleInputName","type","args","data","description","resolve","parent","context","koaContext","request","body","controller","ok"],"mappings":";;;;;;;IAEA,MAAM,EAAEA,aAAa,EAAE,GAAGC,UAAAA;AAE1B,IAAA,MAAMC,uBAAAA,GAA0B,gCAAA;AAEhCC,IAAAA,UAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,uBAAuB,EAAE,GAAGD,MAAAA,CAAOE,MAAM,CAAC,SAAA,CAAA,CAAWC,OAAO,CAAC,OAAA,CAAA,CAASC,MAAM;QACpF,MAAM,EAAEC,OAAO,EAAE,GAAGN,KAAAA;QAEpB,MAAMO,eAAAA,GAAkBN,MAAAA,CAAOO,QAAQ,CAACV,uBAAAA,CAAAA;AAExC,QAAA,MAAMW,gBAAgBP,uBAAAA,CAAwBK,eAAAA,CAAAA;QAE9C,OAAO;YACLG,IAAAA,EAAM,mCAAA;YAENC,IAAAA,EAAM;AACJC,gBAAAA,IAAAA,EAAMN,OAAAA,CAAQG,aAAAA;AACpB,aAAA;YAEII,WAAAA,EAAa,mBAAA;AAEb,YAAA,MAAMC,OAAAA,CAAAA,CAAQC,MAAM,EAAEJ,IAAI,EAAEK,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;AAEvBC,gBAAAA,UAAAA,CAAWC,OAAO,CAACC,IAAI,GAAGvB,aAAAA,CAAce,KAAKC,IAAI,CAAA;gBAEjD,MAAMX,MAAAA,CAAOE,MAAM,CAAC,mBAAA,CAAA,CAAqBiB,UAAU,CAAC,MAAA,CAAA,CAAQrB,UAAU,CAACkB,UAAAA,CAAAA;gBAEvE,OAAO;oBAAEI,EAAAA,EAAI;AAAI,iBAAA;AACvB,YAAA;AACA,SAAA;AACA,IAAA,CAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"delete-role.js","sources":["../../../../../../server/graphql/mutations/crud/role/delete-role.js"],"sourcesContent":["'use strict';\n\nmodule.exports = ({ nexus, strapi }) => {\n const { nonNull } = nexus;\n\n return {\n type: 'UsersPermissionsDeleteRolePayload',\n\n args: {\n id: nonNull('ID'),\n },\n\n description: 'Delete an existing role',\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.params = { role: args.id };\n\n await strapi.plugin('users-permissions').controller('role').deleteRole(koaContext);\n\n return { ok: true };\n },\n };\n};\n"],"names":["deleteRole","nexus","strapi","nonNull","type","args","id","description","resolve","parent","context","koaContext","params","role","plugin","controller","ok"],"mappings":";;;;;;;AAEAA,IAAAA,UAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,OAAO,EAAE,GAAGF,KAAAA;QAEpB,OAAO;YACLG,IAAAA,EAAM,mCAAA;YAENC,IAAAA,EAAM;AACJC,gBAAAA,EAAAA,EAAIH,OAAAA,CAAQ,IAAA;AAClB,aAAA;YAEII,WAAAA,EAAa,yBAAA;AAEb,YAAA,MAAMC,OAAAA,CAAAA,CAAQC,MAAM,EAAEJ,IAAI,EAAEK,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;AAEvBC,gBAAAA,UAAAA,CAAWC,MAAM,GAAG;AAAEC,oBAAAA,IAAAA,EAAMR,KAAKC;AAAE,iBAAA;gBAEnC,MAAMJ,MAAAA,CAAOY,MAAM,CAAC,mBAAA,CAAA,CAAqBC,UAAU,CAAC,MAAA,CAAA,CAAQf,UAAU,CAACW,UAAAA,CAAAA;gBAEvE,OAAO;oBAAEK,EAAAA,EAAI;;AACnB,YAAA;AACA,SAAA;AACA,IAAA,CAAA;;;;;;"}
1
+ {"version":3,"file":"delete-role.js","sources":["../../../../../../server/graphql/mutations/crud/role/delete-role.js"],"sourcesContent":["'use strict';\n\nmodule.exports = ({ nexus, strapi }) => {\n const { nonNull } = nexus;\n\n return {\n type: 'UsersPermissionsDeleteRolePayload',\n\n args: {\n id: nonNull('ID'),\n },\n\n description: 'Delete an existing role',\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.params = { role: args.id };\n\n await strapi.plugin('users-permissions').controller('role').deleteRole(koaContext);\n\n return { ok: true };\n },\n };\n};\n"],"names":["deleteRole","nexus","strapi","nonNull","type","args","id","description","resolve","parent","context","koaContext","params","role","plugin","controller","ok"],"mappings":";;;;;;;AAEAA,IAAAA,UAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,OAAO,EAAE,GAAGF,KAAAA;QAEpB,OAAO;YACLG,IAAAA,EAAM,mCAAA;YAENC,IAAAA,EAAM;AACJC,gBAAAA,EAAAA,EAAIH,OAAAA,CAAQ,IAAA;AAClB,aAAA;YAEII,WAAAA,EAAa,yBAAA;AAEb,YAAA,MAAMC,OAAAA,CAAAA,CAAQC,MAAM,EAAEJ,IAAI,EAAEK,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;AAEvBC,gBAAAA,UAAAA,CAAWC,MAAM,GAAG;AAAEC,oBAAAA,IAAAA,EAAMR,KAAKC;AAAE,iBAAA;gBAEnC,MAAMJ,MAAAA,CAAOY,MAAM,CAAC,mBAAA,CAAA,CAAqBC,UAAU,CAAC,MAAA,CAAA,CAAQf,UAAU,CAACW,UAAAA,CAAAA;gBAEvE,OAAO;oBAAEK,EAAAA,EAAI;AAAI,iBAAA;AACvB,YAAA;AACA,SAAA;AACA,IAAA,CAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"delete-role.mjs","sources":["../../../../../../server/graphql/mutations/crud/role/delete-role.js"],"sourcesContent":["'use strict';\n\nmodule.exports = ({ nexus, strapi }) => {\n const { nonNull } = nexus;\n\n return {\n type: 'UsersPermissionsDeleteRolePayload',\n\n args: {\n id: nonNull('ID'),\n },\n\n description: 'Delete an existing role',\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.params = { role: args.id };\n\n await strapi.plugin('users-permissions').controller('role').deleteRole(koaContext);\n\n return { ok: true };\n },\n };\n};\n"],"names":["deleteRole","nexus","strapi","nonNull","type","args","id","description","resolve","parent","context","koaContext","params","role","plugin","controller","ok"],"mappings":";;;;;AAEAA,IAAAA,UAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,OAAO,EAAE,GAAGF,KAAAA;QAEpB,OAAO;YACLG,IAAAA,EAAM,mCAAA;YAENC,IAAAA,EAAM;AACJC,gBAAAA,EAAAA,EAAIH,OAAAA,CAAQ,IAAA;AAClB,aAAA;YAEII,WAAAA,EAAa,yBAAA;AAEb,YAAA,MAAMC,OAAAA,CAAAA,CAAQC,MAAM,EAAEJ,IAAI,EAAEK,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;AAEvBC,gBAAAA,UAAAA,CAAWC,MAAM,GAAG;AAAEC,oBAAAA,IAAAA,EAAMR,KAAKC;AAAE,iBAAA;gBAEnC,MAAMJ,MAAAA,CAAOY,MAAM,CAAC,mBAAA,CAAA,CAAqBC,UAAU,CAAC,MAAA,CAAA,CAAQf,UAAU,CAACW,UAAAA,CAAAA;gBAEvE,OAAO;oBAAEK,EAAAA,EAAI;;AACnB,YAAA;AACA,SAAA;AACA,IAAA,CAAA;;;;;;"}
1
+ {"version":3,"file":"delete-role.mjs","sources":["../../../../../../server/graphql/mutations/crud/role/delete-role.js"],"sourcesContent":["'use strict';\n\nmodule.exports = ({ nexus, strapi }) => {\n const { nonNull } = nexus;\n\n return {\n type: 'UsersPermissionsDeleteRolePayload',\n\n args: {\n id: nonNull('ID'),\n },\n\n description: 'Delete an existing role',\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.params = { role: args.id };\n\n await strapi.plugin('users-permissions').controller('role').deleteRole(koaContext);\n\n return { ok: true };\n },\n };\n};\n"],"names":["deleteRole","nexus","strapi","nonNull","type","args","id","description","resolve","parent","context","koaContext","params","role","plugin","controller","ok"],"mappings":";;;;;AAEAA,IAAAA,UAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,OAAO,EAAE,GAAGF,KAAAA;QAEpB,OAAO;YACLG,IAAAA,EAAM,mCAAA;YAENC,IAAAA,EAAM;AACJC,gBAAAA,EAAAA,EAAIH,OAAAA,CAAQ,IAAA;AAClB,aAAA;YAEII,WAAAA,EAAa,yBAAA;AAEb,YAAA,MAAMC,OAAAA,CAAAA,CAAQC,MAAM,EAAEJ,IAAI,EAAEK,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;AAEvBC,gBAAAA,UAAAA,CAAWC,MAAM,GAAG;AAAEC,oBAAAA,IAAAA,EAAMR,KAAKC;AAAE,iBAAA;gBAEnC,MAAMJ,MAAAA,CAAOY,MAAM,CAAC,mBAAA,CAAA,CAAqBC,UAAU,CAAC,MAAA,CAAA,CAAQf,UAAU,CAACW,UAAAA,CAAAA;gBAEvE,OAAO;oBAAEK,EAAAA,EAAI;AAAI,iBAAA;AACvB,YAAA;AACA,SAAA;AACA,IAAA,CAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"update-role.js","sources":["../../../../../../server/graphql/mutations/crud/role/update-role.js"],"sourcesContent":["'use strict';\n\nconst usersPermissionsRoleUID = 'plugin::users-permissions.role';\n\nmodule.exports = ({ nexus, strapi }) => {\n const { getContentTypeInputName } = strapi.plugin('graphql').service('utils').naming;\n const { nonNull } = nexus;\n\n const roleContentType = strapi.getModel(usersPermissionsRoleUID);\n\n const roleInputName = getContentTypeInputName(roleContentType);\n\n return {\n type: 'UsersPermissionsUpdateRolePayload',\n\n args: {\n id: nonNull('ID'),\n data: nonNull(roleInputName),\n },\n\n description: 'Update an existing role',\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.params = { role: args.id };\n koaContext.request.body = args.data;\n koaContext.request.body.role = args.id;\n\n await strapi.plugin('users-permissions').controller('role').updateRole(koaContext);\n\n return { ok: true };\n },\n };\n};\n"],"names":["usersPermissionsRoleUID","updateRole","nexus","strapi","getContentTypeInputName","plugin","service","naming","nonNull","roleContentType","getModel","roleInputName","type","args","id","data","description","resolve","parent","context","koaContext","params","role","request","body","controller","ok"],"mappings":";;;;;;;AAEA,IAAA,MAAMA,uBAAAA,GAA0B,gCAAA;AAEhCC,IAAAA,UAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,uBAAuB,EAAE,GAAGD,MAAAA,CAAOE,MAAM,CAAC,SAAA,CAAA,CAAWC,OAAO,CAAC,OAAA,CAAA,CAASC,MAAM;QACpF,MAAM,EAAEC,OAAO,EAAE,GAAGN,KAAAA;QAEpB,MAAMO,eAAAA,GAAkBN,MAAAA,CAAOO,QAAQ,CAACV,uBAAAA,CAAAA;AAExC,QAAA,MAAMW,gBAAgBP,uBAAAA,CAAwBK,eAAAA,CAAAA;QAE9C,OAAO;YACLG,IAAAA,EAAM,mCAAA;YAENC,IAAAA,EAAM;AACJC,gBAAAA,EAAAA,EAAIN,OAAAA,CAAQ,IAAA,CAAA;AACZO,gBAAAA,IAAAA,EAAMP,OAAAA,CAAQG,aAAAA;AACpB,aAAA;YAEIK,WAAAA,EAAa,yBAAA;AAEb,YAAA,MAAMC,OAAAA,CAAAA,CAAQC,MAAM,EAAEL,IAAI,EAAEM,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;AAEvBC,gBAAAA,UAAAA,CAAWC,MAAM,GAAG;AAAEC,oBAAAA,IAAAA,EAAMT,KAAKC;AAAE,iBAAA;AACnCM,gBAAAA,UAAAA,CAAWG,OAAO,CAACC,IAAI,GAAGX,KAAKE,IAAI;AACnCK,gBAAAA,UAAAA,CAAWG,OAAO,CAACC,IAAI,CAACF,IAAI,GAAGT,KAAKC,EAAE;gBAEtC,MAAMX,MAAAA,CAAOE,MAAM,CAAC,mBAAA,CAAA,CAAqBoB,UAAU,CAAC,MAAA,CAAA,CAAQxB,UAAU,CAACmB,UAAAA,CAAAA;gBAEvE,OAAO;oBAAEM,EAAAA,EAAI;;AACnB,YAAA;AACA,SAAA;AACA,IAAA,CAAA;;;;;;"}
1
+ {"version":3,"file":"update-role.js","sources":["../../../../../../server/graphql/mutations/crud/role/update-role.js"],"sourcesContent":["'use strict';\n\nconst usersPermissionsRoleUID = 'plugin::users-permissions.role';\n\nmodule.exports = ({ nexus, strapi }) => {\n const { getContentTypeInputName } = strapi.plugin('graphql').service('utils').naming;\n const { nonNull } = nexus;\n\n const roleContentType = strapi.getModel(usersPermissionsRoleUID);\n\n const roleInputName = getContentTypeInputName(roleContentType);\n\n return {\n type: 'UsersPermissionsUpdateRolePayload',\n\n args: {\n id: nonNull('ID'),\n data: nonNull(roleInputName),\n },\n\n description: 'Update an existing role',\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.params = { role: args.id };\n koaContext.request.body = args.data;\n koaContext.request.body.role = args.id;\n\n await strapi.plugin('users-permissions').controller('role').updateRole(koaContext);\n\n return { ok: true };\n },\n };\n};\n"],"names":["usersPermissionsRoleUID","updateRole","nexus","strapi","getContentTypeInputName","plugin","service","naming","nonNull","roleContentType","getModel","roleInputName","type","args","id","data","description","resolve","parent","context","koaContext","params","role","request","body","controller","ok"],"mappings":";;;;;;;AAEA,IAAA,MAAMA,uBAAAA,GAA0B,gCAAA;AAEhCC,IAAAA,UAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,uBAAuB,EAAE,GAAGD,MAAAA,CAAOE,MAAM,CAAC,SAAA,CAAA,CAAWC,OAAO,CAAC,OAAA,CAAA,CAASC,MAAM;QACpF,MAAM,EAAEC,OAAO,EAAE,GAAGN,KAAAA;QAEpB,MAAMO,eAAAA,GAAkBN,MAAAA,CAAOO,QAAQ,CAACV,uBAAAA,CAAAA;AAExC,QAAA,MAAMW,gBAAgBP,uBAAAA,CAAwBK,eAAAA,CAAAA;QAE9C,OAAO;YACLG,IAAAA,EAAM,mCAAA;YAENC,IAAAA,EAAM;AACJC,gBAAAA,EAAAA,EAAIN,OAAAA,CAAQ,IAAA,CAAA;AACZO,gBAAAA,IAAAA,EAAMP,OAAAA,CAAQG,aAAAA;AACpB,aAAA;YAEIK,WAAAA,EAAa,yBAAA;AAEb,YAAA,MAAMC,OAAAA,CAAAA,CAAQC,MAAM,EAAEL,IAAI,EAAEM,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;AAEvBC,gBAAAA,UAAAA,CAAWC,MAAM,GAAG;AAAEC,oBAAAA,IAAAA,EAAMT,KAAKC;AAAE,iBAAA;AACnCM,gBAAAA,UAAAA,CAAWG,OAAO,CAACC,IAAI,GAAGX,KAAKE,IAAI;AACnCK,gBAAAA,UAAAA,CAAWG,OAAO,CAACC,IAAI,CAACF,IAAI,GAAGT,KAAKC,EAAE;gBAEtC,MAAMX,MAAAA,CAAOE,MAAM,CAAC,mBAAA,CAAA,CAAqBoB,UAAU,CAAC,MAAA,CAAA,CAAQxB,UAAU,CAACmB,UAAAA,CAAAA;gBAEvE,OAAO;oBAAEM,EAAAA,EAAI;AAAI,iBAAA;AACvB,YAAA;AACA,SAAA;AACA,IAAA,CAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"update-role.mjs","sources":["../../../../../../server/graphql/mutations/crud/role/update-role.js"],"sourcesContent":["'use strict';\n\nconst usersPermissionsRoleUID = 'plugin::users-permissions.role';\n\nmodule.exports = ({ nexus, strapi }) => {\n const { getContentTypeInputName } = strapi.plugin('graphql').service('utils').naming;\n const { nonNull } = nexus;\n\n const roleContentType = strapi.getModel(usersPermissionsRoleUID);\n\n const roleInputName = getContentTypeInputName(roleContentType);\n\n return {\n type: 'UsersPermissionsUpdateRolePayload',\n\n args: {\n id: nonNull('ID'),\n data: nonNull(roleInputName),\n },\n\n description: 'Update an existing role',\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.params = { role: args.id };\n koaContext.request.body = args.data;\n koaContext.request.body.role = args.id;\n\n await strapi.plugin('users-permissions').controller('role').updateRole(koaContext);\n\n return { ok: true };\n },\n };\n};\n"],"names":["usersPermissionsRoleUID","updateRole","nexus","strapi","getContentTypeInputName","plugin","service","naming","nonNull","roleContentType","getModel","roleInputName","type","args","id","data","description","resolve","parent","context","koaContext","params","role","request","body","controller","ok"],"mappings":";;;;;AAEA,IAAA,MAAMA,uBAAAA,GAA0B,gCAAA;AAEhCC,IAAAA,UAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,uBAAuB,EAAE,GAAGD,MAAAA,CAAOE,MAAM,CAAC,SAAA,CAAA,CAAWC,OAAO,CAAC,OAAA,CAAA,CAASC,MAAM;QACpF,MAAM,EAAEC,OAAO,EAAE,GAAGN,KAAAA;QAEpB,MAAMO,eAAAA,GAAkBN,MAAAA,CAAOO,QAAQ,CAACV,uBAAAA,CAAAA;AAExC,QAAA,MAAMW,gBAAgBP,uBAAAA,CAAwBK,eAAAA,CAAAA;QAE9C,OAAO;YACLG,IAAAA,EAAM,mCAAA;YAENC,IAAAA,EAAM;AACJC,gBAAAA,EAAAA,EAAIN,OAAAA,CAAQ,IAAA,CAAA;AACZO,gBAAAA,IAAAA,EAAMP,OAAAA,CAAQG,aAAAA;AACpB,aAAA;YAEIK,WAAAA,EAAa,yBAAA;AAEb,YAAA,MAAMC,OAAAA,CAAAA,CAAQC,MAAM,EAAEL,IAAI,EAAEM,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;AAEvBC,gBAAAA,UAAAA,CAAWC,MAAM,GAAG;AAAEC,oBAAAA,IAAAA,EAAMT,KAAKC;AAAE,iBAAA;AACnCM,gBAAAA,UAAAA,CAAWG,OAAO,CAACC,IAAI,GAAGX,KAAKE,IAAI;AACnCK,gBAAAA,UAAAA,CAAWG,OAAO,CAACC,IAAI,CAACF,IAAI,GAAGT,KAAKC,EAAE;gBAEtC,MAAMX,MAAAA,CAAOE,MAAM,CAAC,mBAAA,CAAA,CAAqBoB,UAAU,CAAC,MAAA,CAAA,CAAQxB,UAAU,CAACmB,UAAAA,CAAAA;gBAEvE,OAAO;oBAAEM,EAAAA,EAAI;;AACnB,YAAA;AACA,SAAA;AACA,IAAA,CAAA;;;;;;"}
1
+ {"version":3,"file":"update-role.mjs","sources":["../../../../../../server/graphql/mutations/crud/role/update-role.js"],"sourcesContent":["'use strict';\n\nconst usersPermissionsRoleUID = 'plugin::users-permissions.role';\n\nmodule.exports = ({ nexus, strapi }) => {\n const { getContentTypeInputName } = strapi.plugin('graphql').service('utils').naming;\n const { nonNull } = nexus;\n\n const roleContentType = strapi.getModel(usersPermissionsRoleUID);\n\n const roleInputName = getContentTypeInputName(roleContentType);\n\n return {\n type: 'UsersPermissionsUpdateRolePayload',\n\n args: {\n id: nonNull('ID'),\n data: nonNull(roleInputName),\n },\n\n description: 'Update an existing role',\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.params = { role: args.id };\n koaContext.request.body = args.data;\n koaContext.request.body.role = args.id;\n\n await strapi.plugin('users-permissions').controller('role').updateRole(koaContext);\n\n return { ok: true };\n },\n };\n};\n"],"names":["usersPermissionsRoleUID","updateRole","nexus","strapi","getContentTypeInputName","plugin","service","naming","nonNull","roleContentType","getModel","roleInputName","type","args","id","data","description","resolve","parent","context","koaContext","params","role","request","body","controller","ok"],"mappings":";;;;;AAEA,IAAA,MAAMA,uBAAAA,GAA0B,gCAAA;AAEhCC,IAAAA,UAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,uBAAuB,EAAE,GAAGD,MAAAA,CAAOE,MAAM,CAAC,SAAA,CAAA,CAAWC,OAAO,CAAC,OAAA,CAAA,CAASC,MAAM;QACpF,MAAM,EAAEC,OAAO,EAAE,GAAGN,KAAAA;QAEpB,MAAMO,eAAAA,GAAkBN,MAAAA,CAAOO,QAAQ,CAACV,uBAAAA,CAAAA;AAExC,QAAA,MAAMW,gBAAgBP,uBAAAA,CAAwBK,eAAAA,CAAAA;QAE9C,OAAO;YACLG,IAAAA,EAAM,mCAAA;YAENC,IAAAA,EAAM;AACJC,gBAAAA,EAAAA,EAAIN,OAAAA,CAAQ,IAAA,CAAA;AACZO,gBAAAA,IAAAA,EAAMP,OAAAA,CAAQG,aAAAA;AACpB,aAAA;YAEIK,WAAAA,EAAa,yBAAA;AAEb,YAAA,MAAMC,OAAAA,CAAAA,CAAQC,MAAM,EAAEL,IAAI,EAAEM,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;AAEvBC,gBAAAA,UAAAA,CAAWC,MAAM,GAAG;AAAEC,oBAAAA,IAAAA,EAAMT,KAAKC;AAAE,iBAAA;AACnCM,gBAAAA,UAAAA,CAAWG,OAAO,CAACC,IAAI,GAAGX,KAAKE,IAAI;AACnCK,gBAAAA,UAAAA,CAAWG,OAAO,CAACC,IAAI,CAACF,IAAI,GAAGT,KAAKC,EAAE;gBAEtC,MAAMX,MAAAA,CAAOE,MAAM,CAAC,mBAAA,CAAA,CAAqBoB,UAAU,CAAC,MAAA,CAAA,CAAQxB,UAAU,CAACmB,UAAAA,CAAAA;gBAEvE,OAAO;oBAAEM,EAAAA,EAAI;AAAI,iBAAA;AACvB,YAAA;AACA,SAAA;AACA,IAAA,CAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"create-user.js","sources":["../../../../../../server/graphql/mutations/crud/user/create-user.js"],"sourcesContent":["'use strict';\n\nconst { toPlainObject } = require('lodash/fp');\n\nconst { checkBadRequest } = require('../../../utils');\n\nconst usersPermissionsUserUID = 'plugin::users-permissions.user';\n\nmodule.exports = ({ nexus, strapi }) => {\n const { nonNull } = nexus;\n const { getContentTypeInputName, getEntityResponseName } = strapi\n .plugin('graphql')\n .service('utils').naming;\n\n const userContentType = strapi.getModel(usersPermissionsUserUID);\n\n const userInputName = getContentTypeInputName(userContentType);\n const responseName = getEntityResponseName(userContentType);\n\n return {\n type: nonNull(responseName),\n\n args: {\n data: nonNull(userInputName),\n },\n\n description: 'Create a new user',\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.params = {};\n koaContext.request.body = toPlainObject(args.data);\n\n await strapi.plugin('users-permissions').controller('user').create(koaContext);\n\n checkBadRequest(koaContext.body);\n\n return {\n value: koaContext.body,\n info: { args, resourceUID: 'plugin::users-permissions.user' },\n };\n },\n };\n};\n"],"names":["toPlainObject","require$$0","checkBadRequest","require$$1","usersPermissionsUserUID","createUser","nexus","strapi","nonNull","getContentTypeInputName","getEntityResponseName","plugin","service","naming","userContentType","getModel","userInputName","responseName","type","args","data","description","resolve","parent","context","koaContext","params","request","body","controller","create","value","info","resourceUID"],"mappings":";;;;;;;;;;IAEA,MAAM,EAAEA,aAAa,EAAE,GAAGC,UAAAA;IAE1B,MAAM,EAAEC,eAAe,EAAE,GAAGC,eAAAA,EAAAA;AAE5B,IAAA,MAAMC,uBAAAA,GAA0B,gCAAA;AAEhCC,IAAAA,UAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,OAAO,EAAE,GAAGF,KAAAA;AACpB,QAAA,MAAM,EAAEG,uBAAuB,EAAEC,qBAAqB,EAAE,GAAGH,MAAAA,CACxDI,MAAM,CAAC,SAAA,CAAA,CACPC,OAAO,CAAC,SAASC,MAAM;QAE1B,MAAMC,eAAAA,GAAkBP,MAAAA,CAAOQ,QAAQ,CAACX,uBAAAA,CAAAA;AAExC,QAAA,MAAMY,gBAAgBP,uBAAAA,CAAwBK,eAAAA,CAAAA;AAC9C,QAAA,MAAMG,eAAeP,qBAAAA,CAAsBI,eAAAA,CAAAA;QAE3C,OAAO;AACLI,YAAAA,IAAAA,EAAMV,OAAAA,CAAQS,YAAAA,CAAAA;YAEdE,IAAAA,EAAM;AACJC,gBAAAA,IAAAA,EAAMZ,OAAAA,CAAQQ,aAAAA;AACpB,aAAA;YAEIK,WAAAA,EAAa,mBAAA;AAEb,YAAA,MAAMC,OAAAA,CAAAA,CAAQC,MAAM,EAAEJ,IAAI,EAAEK,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;gBAEvBC,UAAAA,CAAWC,MAAM,GAAG;AACpBD,gBAAAA,UAAAA,CAAWE,OAAO,CAACC,IAAI,GAAG5B,aAAAA,CAAcmB,KAAKC,IAAI,CAAA;gBAEjD,MAAMb,MAAAA,CAAOI,MAAM,CAAC,mBAAA,CAAA,CAAqBkB,UAAU,CAAC,MAAA,CAAA,CAAQC,MAAM,CAACL,UAAAA,CAAAA;AAEnEvB,gBAAAA,eAAAA,CAAgBuB,WAAWG,IAAI,CAAA;gBAE/B,OAAO;AACLG,oBAAAA,KAAAA,EAAON,WAAWG,IAAI;oBACtBI,IAAAA,EAAM;AAAEb,wBAAAA,IAAAA;wBAAMc,WAAAA,EAAa;AAAgC;AACnE,iBAAA;AACA,YAAA;AACA,SAAA;AACA,IAAA,CAAA;;;;;;"}
1
+ {"version":3,"file":"create-user.js","sources":["../../../../../../server/graphql/mutations/crud/user/create-user.js"],"sourcesContent":["'use strict';\n\nconst { toPlainObject } = require('lodash/fp');\n\nconst { checkBadRequest } = require('../../../utils');\n\nconst usersPermissionsUserUID = 'plugin::users-permissions.user';\n\nmodule.exports = ({ nexus, strapi }) => {\n const { nonNull } = nexus;\n const { getContentTypeInputName, getEntityResponseName } = strapi\n .plugin('graphql')\n .service('utils').naming;\n\n const userContentType = strapi.getModel(usersPermissionsUserUID);\n\n const userInputName = getContentTypeInputName(userContentType);\n const responseName = getEntityResponseName(userContentType);\n\n return {\n type: nonNull(responseName),\n\n args: {\n data: nonNull(userInputName),\n },\n\n description: 'Create a new user',\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.params = {};\n koaContext.request.body = toPlainObject(args.data);\n\n await strapi.plugin('users-permissions').controller('user').create(koaContext);\n\n checkBadRequest(koaContext.body);\n\n return {\n value: koaContext.body,\n info: { args, resourceUID: 'plugin::users-permissions.user' },\n };\n },\n };\n};\n"],"names":["toPlainObject","require$$0","checkBadRequest","require$$1","usersPermissionsUserUID","createUser","nexus","strapi","nonNull","getContentTypeInputName","getEntityResponseName","plugin","service","naming","userContentType","getModel","userInputName","responseName","type","args","data","description","resolve","parent","context","koaContext","params","request","body","controller","create","value","info","resourceUID"],"mappings":";;;;;;;;;;IAEA,MAAM,EAAEA,aAAa,EAAE,GAAGC,UAAAA;IAE1B,MAAM,EAAEC,eAAe,EAAE,GAAGC,eAAAA,EAAAA;AAE5B,IAAA,MAAMC,uBAAAA,GAA0B,gCAAA;AAEhCC,IAAAA,UAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,OAAO,EAAE,GAAGF,KAAAA;AACpB,QAAA,MAAM,EAAEG,uBAAuB,EAAEC,qBAAqB,EAAE,GAAGH,MAAAA,CACxDI,MAAM,CAAC,SAAA,CAAA,CACPC,OAAO,CAAC,SAASC,MAAM;QAE1B,MAAMC,eAAAA,GAAkBP,MAAAA,CAAOQ,QAAQ,CAACX,uBAAAA,CAAAA;AAExC,QAAA,MAAMY,gBAAgBP,uBAAAA,CAAwBK,eAAAA,CAAAA;AAC9C,QAAA,MAAMG,eAAeP,qBAAAA,CAAsBI,eAAAA,CAAAA;QAE3C,OAAO;AACLI,YAAAA,IAAAA,EAAMV,OAAAA,CAAQS,YAAAA,CAAAA;YAEdE,IAAAA,EAAM;AACJC,gBAAAA,IAAAA,EAAMZ,OAAAA,CAAQQ,aAAAA;AACpB,aAAA;YAEIK,WAAAA,EAAa,mBAAA;AAEb,YAAA,MAAMC,OAAAA,CAAAA,CAAQC,MAAM,EAAEJ,IAAI,EAAEK,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;gBAEvBC,UAAAA,CAAWC,MAAM,GAAG,EAAA;AACpBD,gBAAAA,UAAAA,CAAWE,OAAO,CAACC,IAAI,GAAG5B,aAAAA,CAAcmB,KAAKC,IAAI,CAAA;gBAEjD,MAAMb,MAAAA,CAAOI,MAAM,CAAC,mBAAA,CAAA,CAAqBkB,UAAU,CAAC,MAAA,CAAA,CAAQC,MAAM,CAACL,UAAAA,CAAAA;AAEnEvB,gBAAAA,eAAAA,CAAgBuB,WAAWG,IAAI,CAAA;gBAE/B,OAAO;AACLG,oBAAAA,KAAAA,EAAON,WAAWG,IAAI;oBACtBI,IAAAA,EAAM;AAAEb,wBAAAA,IAAAA;wBAAMc,WAAAA,EAAa;AAAgC;AACnE,iBAAA;AACA,YAAA;AACA,SAAA;AACA,IAAA,CAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"create-user.mjs","sources":["../../../../../../server/graphql/mutations/crud/user/create-user.js"],"sourcesContent":["'use strict';\n\nconst { toPlainObject } = require('lodash/fp');\n\nconst { checkBadRequest } = require('../../../utils');\n\nconst usersPermissionsUserUID = 'plugin::users-permissions.user';\n\nmodule.exports = ({ nexus, strapi }) => {\n const { nonNull } = nexus;\n const { getContentTypeInputName, getEntityResponseName } = strapi\n .plugin('graphql')\n .service('utils').naming;\n\n const userContentType = strapi.getModel(usersPermissionsUserUID);\n\n const userInputName = getContentTypeInputName(userContentType);\n const responseName = getEntityResponseName(userContentType);\n\n return {\n type: nonNull(responseName),\n\n args: {\n data: nonNull(userInputName),\n },\n\n description: 'Create a new user',\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.params = {};\n koaContext.request.body = toPlainObject(args.data);\n\n await strapi.plugin('users-permissions').controller('user').create(koaContext);\n\n checkBadRequest(koaContext.body);\n\n return {\n value: koaContext.body,\n info: { args, resourceUID: 'plugin::users-permissions.user' },\n };\n },\n };\n};\n"],"names":["toPlainObject","require$$0","checkBadRequest","require$$1","usersPermissionsUserUID","createUser","nexus","strapi","nonNull","getContentTypeInputName","getEntityResponseName","plugin","service","naming","userContentType","getModel","userInputName","responseName","type","args","data","description","resolve","parent","context","koaContext","params","request","body","controller","create","value","info","resourceUID"],"mappings":";;;;;;;;IAEA,MAAM,EAAEA,aAAa,EAAE,GAAGC,UAAAA;IAE1B,MAAM,EAAEC,eAAe,EAAE,GAAGC,YAAAA,EAAAA;AAE5B,IAAA,MAAMC,uBAAAA,GAA0B,gCAAA;AAEhCC,IAAAA,UAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,OAAO,EAAE,GAAGF,KAAAA;AACpB,QAAA,MAAM,EAAEG,uBAAuB,EAAEC,qBAAqB,EAAE,GAAGH,MAAAA,CACxDI,MAAM,CAAC,SAAA,CAAA,CACPC,OAAO,CAAC,SAASC,MAAM;QAE1B,MAAMC,eAAAA,GAAkBP,MAAAA,CAAOQ,QAAQ,CAACX,uBAAAA,CAAAA;AAExC,QAAA,MAAMY,gBAAgBP,uBAAAA,CAAwBK,eAAAA,CAAAA;AAC9C,QAAA,MAAMG,eAAeP,qBAAAA,CAAsBI,eAAAA,CAAAA;QAE3C,OAAO;AACLI,YAAAA,IAAAA,EAAMV,OAAAA,CAAQS,YAAAA,CAAAA;YAEdE,IAAAA,EAAM;AACJC,gBAAAA,IAAAA,EAAMZ,OAAAA,CAAQQ,aAAAA;AACpB,aAAA;YAEIK,WAAAA,EAAa,mBAAA;AAEb,YAAA,MAAMC,OAAAA,CAAAA,CAAQC,MAAM,EAAEJ,IAAI,EAAEK,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;gBAEvBC,UAAAA,CAAWC,MAAM,GAAG;AACpBD,gBAAAA,UAAAA,CAAWE,OAAO,CAACC,IAAI,GAAG5B,aAAAA,CAAcmB,KAAKC,IAAI,CAAA;gBAEjD,MAAMb,MAAAA,CAAOI,MAAM,CAAC,mBAAA,CAAA,CAAqBkB,UAAU,CAAC,MAAA,CAAA,CAAQC,MAAM,CAACL,UAAAA,CAAAA;AAEnEvB,gBAAAA,eAAAA,CAAgBuB,WAAWG,IAAI,CAAA;gBAE/B,OAAO;AACLG,oBAAAA,KAAAA,EAAON,WAAWG,IAAI;oBACtBI,IAAAA,EAAM;AAAEb,wBAAAA,IAAAA;wBAAMc,WAAAA,EAAa;AAAgC;AACnE,iBAAA;AACA,YAAA;AACA,SAAA;AACA,IAAA,CAAA;;;;;;"}
1
+ {"version":3,"file":"create-user.mjs","sources":["../../../../../../server/graphql/mutations/crud/user/create-user.js"],"sourcesContent":["'use strict';\n\nconst { toPlainObject } = require('lodash/fp');\n\nconst { checkBadRequest } = require('../../../utils');\n\nconst usersPermissionsUserUID = 'plugin::users-permissions.user';\n\nmodule.exports = ({ nexus, strapi }) => {\n const { nonNull } = nexus;\n const { getContentTypeInputName, getEntityResponseName } = strapi\n .plugin('graphql')\n .service('utils').naming;\n\n const userContentType = strapi.getModel(usersPermissionsUserUID);\n\n const userInputName = getContentTypeInputName(userContentType);\n const responseName = getEntityResponseName(userContentType);\n\n return {\n type: nonNull(responseName),\n\n args: {\n data: nonNull(userInputName),\n },\n\n description: 'Create a new user',\n\n async resolve(parent, args, context) {\n const { koaContext } = context;\n\n koaContext.params = {};\n koaContext.request.body = toPlainObject(args.data);\n\n await strapi.plugin('users-permissions').controller('user').create(koaContext);\n\n checkBadRequest(koaContext.body);\n\n return {\n value: koaContext.body,\n info: { args, resourceUID: 'plugin::users-permissions.user' },\n };\n },\n };\n};\n"],"names":["toPlainObject","require$$0","checkBadRequest","require$$1","usersPermissionsUserUID","createUser","nexus","strapi","nonNull","getContentTypeInputName","getEntityResponseName","plugin","service","naming","userContentType","getModel","userInputName","responseName","type","args","data","description","resolve","parent","context","koaContext","params","request","body","controller","create","value","info","resourceUID"],"mappings":";;;;;;;;IAEA,MAAM,EAAEA,aAAa,EAAE,GAAGC,UAAAA;IAE1B,MAAM,EAAEC,eAAe,EAAE,GAAGC,YAAAA,EAAAA;AAE5B,IAAA,MAAMC,uBAAAA,GAA0B,gCAAA;AAEhCC,IAAAA,UAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAEC,MAAM,EAAE,GAAA;QACjC,MAAM,EAAEC,OAAO,EAAE,GAAGF,KAAAA;AACpB,QAAA,MAAM,EAAEG,uBAAuB,EAAEC,qBAAqB,EAAE,GAAGH,MAAAA,CACxDI,MAAM,CAAC,SAAA,CAAA,CACPC,OAAO,CAAC,SAASC,MAAM;QAE1B,MAAMC,eAAAA,GAAkBP,MAAAA,CAAOQ,QAAQ,CAACX,uBAAAA,CAAAA;AAExC,QAAA,MAAMY,gBAAgBP,uBAAAA,CAAwBK,eAAAA,CAAAA;AAC9C,QAAA,MAAMG,eAAeP,qBAAAA,CAAsBI,eAAAA,CAAAA;QAE3C,OAAO;AACLI,YAAAA,IAAAA,EAAMV,OAAAA,CAAQS,YAAAA,CAAAA;YAEdE,IAAAA,EAAM;AACJC,gBAAAA,IAAAA,EAAMZ,OAAAA,CAAQQ,aAAAA;AACpB,aAAA;YAEIK,WAAAA,EAAa,mBAAA;AAEb,YAAA,MAAMC,OAAAA,CAAAA,CAAQC,MAAM,EAAEJ,IAAI,EAAEK,OAAO,EAAA;gBACjC,MAAM,EAAEC,UAAU,EAAE,GAAGD,OAAAA;gBAEvBC,UAAAA,CAAWC,MAAM,GAAG,EAAA;AACpBD,gBAAAA,UAAAA,CAAWE,OAAO,CAACC,IAAI,GAAG5B,aAAAA,CAAcmB,KAAKC,IAAI,CAAA;gBAEjD,MAAMb,MAAAA,CAAOI,MAAM,CAAC,mBAAA,CAAA,CAAqBkB,UAAU,CAAC,MAAA,CAAA,CAAQC,MAAM,CAACL,UAAAA,CAAAA;AAEnEvB,gBAAAA,eAAAA,CAAgBuB,WAAWG,IAAI,CAAA;gBAE/B,OAAO;AACLG,oBAAAA,KAAAA,EAAON,WAAWG,IAAI;oBACtBI,IAAAA,EAAM;AAAEb,wBAAAA,IAAAA;wBAAMc,WAAAA,EAAa;AAAgC;AACnE,iBAAA;AACA,YAAA;AACA,SAAA;AACA,IAAA,CAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"login-input.js","sources":["../../../../server/graphql/types/login-input.js"],"sourcesContent":["'use strict';\n\nmodule.exports = ({ nexus }) => {\n return nexus.inputObjectType({\n name: 'UsersPermissionsLoginInput',\n\n definition(t) {\n t.nonNull.string('identifier');\n t.nonNull.string('password');\n t.nonNull.string('provider', { default: 'local' });\n },\n });\n};\n"],"names":["loginInput","nexus","inputObjectType","name","definition","t","nonNull","string","default"],"mappings":";;;;;;;IAEAA,UAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAE,GAAA;QACzB,OAAOA,KAAAA,CAAMC,eAAe,CAAC;YAC3BC,IAAAA,EAAM,4BAAA;AAENC,YAAAA,UAAAA,CAAAA,CAAWC,CAAC,EAAA;gBACVA,CAAAA,CAAEC,OAAO,CAACC,MAAM,CAAC,YAAA,CAAA;gBACjBF,CAAAA,CAAEC,OAAO,CAACC,MAAM,CAAC,UAAA,CAAA;AACjBF,gBAAAA,CAAAA,CAAEC,OAAO,CAACC,MAAM,CAAC,UAAA,EAAY;oBAAEC,OAAAA,EAAS;AAAO,iBAAA,CAAA;AACrD,YAAA;AACA,SAAA,CAAA;AACA,IAAA,CAAA;;;;;;"}
1
+ {"version":3,"file":"login-input.js","sources":["../../../../server/graphql/types/login-input.js"],"sourcesContent":["'use strict';\n\nmodule.exports = ({ nexus }) => {\n return nexus.inputObjectType({\n name: 'UsersPermissionsLoginInput',\n\n definition(t) {\n t.nonNull.string('identifier');\n t.nonNull.string('password');\n t.nonNull.string('provider', { default: 'local' });\n },\n });\n};\n"],"names":["loginInput","nexus","inputObjectType","name","definition","t","nonNull","string","default"],"mappings":";;;;;;;IAEAA,UAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAE,GAAA;QACzB,OAAOA,KAAAA,CAAMC,eAAe,CAAC;YAC3BC,IAAAA,EAAM,4BAAA;AAENC,YAAAA,UAAAA,CAAAA,CAAWC,CAAC,EAAA;gBACVA,CAAAA,CAAEC,OAAO,CAACC,MAAM,CAAC,YAAA,CAAA;gBACjBF,CAAAA,CAAEC,OAAO,CAACC,MAAM,CAAC,UAAA,CAAA;AACjBF,gBAAAA,CAAAA,CAAEC,OAAO,CAACC,MAAM,CAAC,UAAA,EAAY;oBAAEC,OAAAA,EAAS;;AAC9C,YAAA;AACA,SAAA,CAAA;AACA,IAAA,CAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"login-input.mjs","sources":["../../../../server/graphql/types/login-input.js"],"sourcesContent":["'use strict';\n\nmodule.exports = ({ nexus }) => {\n return nexus.inputObjectType({\n name: 'UsersPermissionsLoginInput',\n\n definition(t) {\n t.nonNull.string('identifier');\n t.nonNull.string('password');\n t.nonNull.string('provider', { default: 'local' });\n },\n });\n};\n"],"names":["loginInput","nexus","inputObjectType","name","definition","t","nonNull","string","default"],"mappings":";;;;;IAEAA,UAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAE,GAAA;QACzB,OAAOA,KAAAA,CAAMC,eAAe,CAAC;YAC3BC,IAAAA,EAAM,4BAAA;AAENC,YAAAA,UAAAA,CAAAA,CAAWC,CAAC,EAAA;gBACVA,CAAAA,CAAEC,OAAO,CAACC,MAAM,CAAC,YAAA,CAAA;gBACjBF,CAAAA,CAAEC,OAAO,CAACC,MAAM,CAAC,UAAA,CAAA;AACjBF,gBAAAA,CAAAA,CAAEC,OAAO,CAACC,MAAM,CAAC,UAAA,EAAY;oBAAEC,OAAAA,EAAS;AAAO,iBAAA,CAAA;AACrD,YAAA;AACA,SAAA,CAAA;AACA,IAAA,CAAA;;;;;;"}
1
+ {"version":3,"file":"login-input.mjs","sources":["../../../../server/graphql/types/login-input.js"],"sourcesContent":["'use strict';\n\nmodule.exports = ({ nexus }) => {\n return nexus.inputObjectType({\n name: 'UsersPermissionsLoginInput',\n\n definition(t) {\n t.nonNull.string('identifier');\n t.nonNull.string('password');\n t.nonNull.string('provider', { default: 'local' });\n },\n });\n};\n"],"names":["loginInput","nexus","inputObjectType","name","definition","t","nonNull","string","default"],"mappings":";;;;;IAEAA,UAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAE,GAAA;QACzB,OAAOA,KAAAA,CAAMC,eAAe,CAAC;YAC3BC,IAAAA,EAAM,4BAAA;AAENC,YAAAA,UAAAA,CAAAA,CAAWC,CAAC,EAAA;gBACVA,CAAAA,CAAEC,OAAO,CAACC,MAAM,CAAC,YAAA,CAAA;gBACjBF,CAAAA,CAAEC,OAAO,CAACC,MAAM,CAAC,UAAA,CAAA;AACjBF,gBAAAA,CAAAA,CAAEC,OAAO,CAACC,MAAM,CAAC,UAAA,EAAY;oBAAEC,OAAAA,EAAS;;AAC9C,YAAA;AACA,SAAA,CAAA;AACA,IAAA,CAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"login-payload.js","sources":["../../../../server/graphql/types/login-payload.js"],"sourcesContent":["'use strict';\n\nmodule.exports = ({ nexus }) => {\n return nexus.objectType({\n name: 'UsersPermissionsLoginPayload',\n\n definition(t) {\n t.string('jwt');\n t.nonNull.field('user', { type: 'UsersPermissionsMe' });\n },\n });\n};\n"],"names":["loginPayload","nexus","objectType","name","definition","t","string","nonNull","field","type"],"mappings":";;;;;;;IAEAA,YAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAE,GAAA;QACzB,OAAOA,KAAAA,CAAMC,UAAU,CAAC;YACtBC,IAAAA,EAAM,8BAAA;AAENC,YAAAA,UAAAA,CAAAA,CAAWC,CAAC,EAAA;AACVA,gBAAAA,CAAAA,CAAEC,MAAM,CAAC,KAAA,CAAA;AACTD,gBAAAA,CAAAA,CAAEE,OAAO,CAACC,KAAK,CAAC,MAAA,EAAQ;oBAAEC,IAAAA,EAAM;AAAoB,iBAAA,CAAA;AAC1D,YAAA;AACA,SAAA,CAAA;AACA,IAAA,CAAA;;;;;;"}
1
+ {"version":3,"file":"login-payload.js","sources":["../../../../server/graphql/types/login-payload.js"],"sourcesContent":["'use strict';\n\nmodule.exports = ({ nexus }) => {\n return nexus.objectType({\n name: 'UsersPermissionsLoginPayload',\n\n definition(t) {\n t.string('jwt');\n t.nonNull.field('user', { type: 'UsersPermissionsMe' });\n },\n });\n};\n"],"names":["loginPayload","nexus","objectType","name","definition","t","string","nonNull","field","type"],"mappings":";;;;;;;IAEAA,YAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAE,GAAA;QACzB,OAAOA,KAAAA,CAAMC,UAAU,CAAC;YACtBC,IAAAA,EAAM,8BAAA;AAENC,YAAAA,UAAAA,CAAAA,CAAWC,CAAC,EAAA;AACVA,gBAAAA,CAAAA,CAAEC,MAAM,CAAC,KAAA,CAAA;AACTD,gBAAAA,CAAAA,CAAEE,OAAO,CAACC,KAAK,CAAC,MAAA,EAAQ;oBAAEC,IAAAA,EAAM;;AACtC,YAAA;AACA,SAAA,CAAA;AACA,IAAA,CAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"login-payload.mjs","sources":["../../../../server/graphql/types/login-payload.js"],"sourcesContent":["'use strict';\n\nmodule.exports = ({ nexus }) => {\n return nexus.objectType({\n name: 'UsersPermissionsLoginPayload',\n\n definition(t) {\n t.string('jwt');\n t.nonNull.field('user', { type: 'UsersPermissionsMe' });\n },\n });\n};\n"],"names":["loginPayload","nexus","objectType","name","definition","t","string","nonNull","field","type"],"mappings":";;;;;IAEAA,YAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAE,GAAA;QACzB,OAAOA,KAAAA,CAAMC,UAAU,CAAC;YACtBC,IAAAA,EAAM,8BAAA;AAENC,YAAAA,UAAAA,CAAAA,CAAWC,CAAC,EAAA;AACVA,gBAAAA,CAAAA,CAAEC,MAAM,CAAC,KAAA,CAAA;AACTD,gBAAAA,CAAAA,CAAEE,OAAO,CAACC,KAAK,CAAC,MAAA,EAAQ;oBAAEC,IAAAA,EAAM;AAAoB,iBAAA,CAAA;AAC1D,YAAA;AACA,SAAA,CAAA;AACA,IAAA,CAAA;;;;;;"}
1
+ {"version":3,"file":"login-payload.mjs","sources":["../../../../server/graphql/types/login-payload.js"],"sourcesContent":["'use strict';\n\nmodule.exports = ({ nexus }) => {\n return nexus.objectType({\n name: 'UsersPermissionsLoginPayload',\n\n definition(t) {\n t.string('jwt');\n t.nonNull.field('user', { type: 'UsersPermissionsMe' });\n },\n });\n};\n"],"names":["loginPayload","nexus","objectType","name","definition","t","string","nonNull","field","type"],"mappings":";;;;;IAEAA,YAAAA,GAAiB,CAAC,EAAEC,KAAK,EAAE,GAAA;QACzB,OAAOA,KAAAA,CAAMC,UAAU,CAAC;YACtBC,IAAAA,EAAM,8BAAA;AAENC,YAAAA,UAAAA,CAAAA,CAAWC,CAAC,EAAA;AACVA,gBAAAA,CAAAA,CAAEC,MAAM,CAAC,KAAA,CAAA;AACTD,gBAAAA,CAAAA,CAAEE,OAAO,CAACC,KAAK,CAAC,MAAA,EAAQ;oBAAEC,IAAAA,EAAM;;AACtC,YAAA;AACA,SAAA,CAAA;AACA,IAAA,CAAA;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"register.js","sources":["../../server/register.js"],"sourcesContent":["'use strict';\n\nconst fs = require('fs');\nconst path = require('path');\n\nconst authStrategy = require('./strategies/users-permissions');\nconst sanitizers = require('./utils/sanitize/sanitizers');\n\nmodule.exports = ({ strapi }) => {\n strapi.get('auth').register('content-api', authStrategy);\n strapi.sanitizers.add('content-api.output', sanitizers.defaultSanitizeOutput);\n\n if (strapi.plugin('graphql')) {\n require('./graphql')({ strapi });\n }\n\n if (strapi.plugin('documentation')) {\n const specPath = path.join(__dirname, '../../documentation/content-api.yaml');\n const spec = fs.readFileSync(specPath, 'utf8');\n\n strapi\n .plugin('documentation')\n .service('override')\n .registerOverride(spec, {\n pluginOrigin: 'users-permissions',\n excludeFromGeneration: ['users-permissions'],\n });\n }\n};\n"],"names":["fs","require$$0","path","require$$1","authStrategy","require$$2","sanitizers","require$$3","register","strapi","get","add","defaultSanitizeOutput","plugin","require$$4","specPath","join","__dirname","spec","readFileSync","service","registerOverride","pluginOrigin","excludeFromGeneration"],"mappings":";;;;;;;;;;;;;AAEA,IAAA,MAAMA,EAAAA,GAAKC,UAAAA;AACX,IAAA,MAAMC,IAAAA,GAAOC,UAAAA;AAEb,IAAA,MAAMC,YAAAA,GAAeC,0BAAAA,EAAAA;AACrB,IAAA,MAAMC,YAAAA,GAAaC,oBAAAA,EAAAA;IAEnBC,QAAAA,GAAiB,CAAC,EAAEC,MAAM,EAAE,GAAA;AAC1BA,QAAAA,MAAAA,CAAOC,GAAG,CAAC,MAAA,CAAA,CAAQF,QAAQ,CAAC,aAAA,EAAeJ,YAAAA,CAAAA;AAC3CK,QAAAA,MAAAA,CAAOH,UAAU,CAACK,GAAG,CAAC,oBAAA,EAAsBL,aAAWM,qBAAqB,CAAA;QAE5E,IAAIH,MAAAA,CAAOI,MAAM,CAAC,SAAA,CAAA,EAAY;YAC5BC,eAAAA,EAAAA,CAAqB;AAAEL,gBAAAA;AAAM,aAAA,CAAA;AACjC,QAAA;QAEE,IAAIA,MAAAA,CAAOI,MAAM,CAAC,eAAA,CAAA,EAAkB;AAClC,YAAA,MAAME,QAAAA,GAAWb,IAAAA,CAAKc,IAAI,CAACC,SAAAA,EAAW,sCAAA,CAAA;AACtC,YAAA,MAAMC,IAAAA,GAAOlB,EAAAA,CAAGmB,YAAY,CAACJ,QAAAA,EAAU,MAAA,CAAA;YAEvCN,MAAAA,CACGI,MAAM,CAAC,eAAA,CAAA,CACPO,OAAO,CAAC,UAAA,CAAA,CACRC,gBAAgB,CAACH,IAAAA,EAAM;gBACtBI,YAAAA,EAAc,mBAAA;gBACdC,qBAAAA,EAAuB;AAAC,oBAAA;AAAoB;AACpD,aAAA,CAAA;AACA,QAAA;AACA,IAAA,CAAA;;;;;;"}
1
+ {"version":3,"file":"register.js","sources":["../../server/register.js"],"sourcesContent":["'use strict';\n\nconst fs = require('fs');\nconst path = require('path');\n\nconst authStrategy = require('./strategies/users-permissions');\nconst sanitizers = require('./utils/sanitize/sanitizers');\n\nmodule.exports = ({ strapi }) => {\n strapi.get('auth').register('content-api', authStrategy);\n strapi.sanitizers.add('content-api.output', sanitizers.defaultSanitizeOutput);\n\n if (strapi.plugin('graphql')) {\n require('./graphql')({ strapi });\n }\n\n if (strapi.plugin('documentation')) {\n const specPath = path.join(__dirname, '../../documentation/content-api.yaml');\n const spec = fs.readFileSync(specPath, 'utf8');\n\n strapi\n .plugin('documentation')\n .service('override')\n .registerOverride(spec, {\n pluginOrigin: 'users-permissions',\n excludeFromGeneration: ['users-permissions'],\n });\n }\n};\n"],"names":["fs","require$$0","path","require$$1","authStrategy","require$$2","sanitizers","require$$3","register","strapi","get","add","defaultSanitizeOutput","plugin","require$$4","specPath","join","__dirname","spec","readFileSync","service","registerOverride","pluginOrigin","excludeFromGeneration"],"mappings":";;;;;;;;;;;;;AAEA,IAAA,MAAMA,EAAAA,GAAKC,UAAAA;AACX,IAAA,MAAMC,IAAAA,GAAOC,UAAAA;AAEb,IAAA,MAAMC,YAAAA,GAAeC,0BAAAA,EAAAA;AACrB,IAAA,MAAMC,YAAAA,GAAaC,oBAAAA,EAAAA;IAEnBC,QAAAA,GAAiB,CAAC,EAAEC,MAAM,EAAE,GAAA;AAC1BA,QAAAA,MAAAA,CAAOC,GAAG,CAAC,MAAA,CAAA,CAAQF,QAAQ,CAAC,aAAA,EAAeJ,YAAAA,CAAAA;AAC3CK,QAAAA,MAAAA,CAAOH,UAAU,CAACK,GAAG,CAAC,oBAAA,EAAsBL,aAAWM,qBAAqB,CAAA;QAE5E,IAAIH,MAAAA,CAAOI,MAAM,CAAC,SAAA,CAAA,EAAY;YAC5BC,eAAAA,EAAAA,CAAqB;AAAEL,gBAAAA;;AAC3B,QAAA;QAEE,IAAIA,MAAAA,CAAOI,MAAM,CAAC,eAAA,CAAA,EAAkB;AAClC,YAAA,MAAME,QAAAA,GAAWb,IAAAA,CAAKc,IAAI,CAACC,SAAAA,EAAW,sCAAA,CAAA;AACtC,YAAA,MAAMC,IAAAA,GAAOlB,EAAAA,CAAGmB,YAAY,CAACJ,QAAAA,EAAU,MAAA,CAAA;YAEvCN,MAAAA,CACGI,MAAM,CAAC,eAAA,CAAA,CACPO,OAAO,CAAC,UAAA,CAAA,CACRC,gBAAgB,CAACH,IAAAA,EAAM;gBACtBI,YAAAA,EAAc,mBAAA;gBACdC,qBAAAA,EAAuB;AAAC,oBAAA;AAAoB;AACpD,aAAA,CAAA;AACA,QAAA;AACA,IAAA,CAAA;;;;;;"}