@things-factory/auth-base 9.0.0-beta.4 → 9.0.0-beta.8

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (332) hide show
  1. package/config/config.development.js +45 -0
  2. package/config/config.production.js +45 -0
  3. package/dist-client/bootstrap.d.ts +1 -1
  4. package/dist-client/bootstrap.js +4 -4
  5. package/dist-client/bootstrap.js.map +1 -1
  6. package/dist-client/directive/privileged.d.ts +1 -1
  7. package/dist-client/directive/privileged.js +1 -1
  8. package/dist-client/directive/privileged.js.map +1 -1
  9. package/dist-client/index.d.ts +4 -4
  10. package/dist-client/index.js +4 -4
  11. package/dist-client/index.js.map +1 -1
  12. package/dist-client/profiled.js +1 -1
  13. package/dist-client/profiled.js.map +1 -1
  14. package/dist-client/reducers/auth.js +1 -1
  15. package/dist-client/reducers/auth.js.map +1 -1
  16. package/dist-client/tsconfig.tsbuildinfo +1 -1
  17. package/dist-server/controllers/auth.d.ts +5 -5
  18. package/dist-server/controllers/auth.js +5 -5
  19. package/dist-server/controllers/auth.js.map +1 -1
  20. package/dist-server/controllers/change-pwd.js +19 -19
  21. package/dist-server/controllers/change-pwd.js.map +1 -1
  22. package/dist-server/controllers/checkin.js +4 -4
  23. package/dist-server/controllers/checkin.js.map +1 -1
  24. package/dist-server/controllers/delete-user.js +9 -9
  25. package/dist-server/controllers/delete-user.js.map +1 -1
  26. package/dist-server/controllers/invitation.js +19 -19
  27. package/dist-server/controllers/invitation.js.map +1 -1
  28. package/dist-server/controllers/profile.d.ts +5 -5
  29. package/dist-server/controllers/profile.js +10 -10
  30. package/dist-server/controllers/profile.js.map +1 -1
  31. package/dist-server/controllers/reset-password.js +24 -24
  32. package/dist-server/controllers/reset-password.js.map +1 -1
  33. package/dist-server/controllers/signin.d.ts +1 -1
  34. package/dist-server/controllers/signin.js +24 -24
  35. package/dist-server/controllers/signin.js.map +1 -1
  36. package/dist-server/controllers/signup.d.ts +1 -1
  37. package/dist-server/controllers/signup.js +13 -13
  38. package/dist-server/controllers/signup.js.map +1 -1
  39. package/dist-server/controllers/unlock-user.js +17 -17
  40. package/dist-server/controllers/unlock-user.js.map +1 -1
  41. package/dist-server/controllers/utils/password-rule.js +4 -4
  42. package/dist-server/controllers/utils/password-rule.js.map +1 -1
  43. package/dist-server/controllers/utils/save-invitation-token.d.ts +1 -1
  44. package/dist-server/controllers/utils/save-invitation-token.js +2 -2
  45. package/dist-server/controllers/utils/save-invitation-token.js.map +1 -1
  46. package/dist-server/controllers/utils/save-verification-token.d.ts +1 -1
  47. package/dist-server/controllers/utils/save-verification-token.js +3 -3
  48. package/dist-server/controllers/utils/save-verification-token.js.map +1 -1
  49. package/dist-server/controllers/verification.js +23 -23
  50. package/dist-server/controllers/verification.js.map +1 -1
  51. package/dist-server/errors/auth-error.js +1 -1
  52. package/dist-server/errors/auth-error.js.map +1 -1
  53. package/dist-server/errors/index.d.ts +2 -2
  54. package/dist-server/errors/index.js +2 -2
  55. package/dist-server/errors/index.js.map +1 -1
  56. package/dist-server/errors/user-domain-not-match-error.d.ts +1 -1
  57. package/dist-server/errors/user-domain-not-match-error.js +8 -8
  58. package/dist-server/errors/user-domain-not-match-error.js.map +1 -1
  59. package/dist-server/index.d.ts +16 -16
  60. package/dist-server/index.js +18 -18
  61. package/dist-server/index.js.map +1 -1
  62. package/dist-server/middlewares/authenticate-401-middleware.js +11 -11
  63. package/dist-server/middlewares/authenticate-401-middleware.js.map +1 -1
  64. package/dist-server/middlewares/domain-authenticate-middleware.d.ts +1 -1
  65. package/dist-server/middlewares/domain-authenticate-middleware.js +9 -9
  66. package/dist-server/middlewares/domain-authenticate-middleware.js.map +1 -1
  67. package/dist-server/middlewares/graphql-authenticate-middleware.js +4 -4
  68. package/dist-server/middlewares/graphql-authenticate-middleware.js.map +1 -1
  69. package/dist-server/middlewares/index.d.ts +5 -5
  70. package/dist-server/middlewares/index.js +18 -18
  71. package/dist-server/middlewares/index.js.map +1 -1
  72. package/dist-server/middlewares/jwt-authenticate-middleware.js +15 -15
  73. package/dist-server/middlewares/jwt-authenticate-middleware.js.map +1 -1
  74. package/dist-server/middlewares/signin-middleware.js +2 -2
  75. package/dist-server/middlewares/signin-middleware.js.map +1 -1
  76. package/dist-server/middlewares/verify-recaptcha-middleware.d.ts +3 -0
  77. package/dist-server/middlewares/verify-recaptcha-middleware.js +95 -0
  78. package/dist-server/middlewares/verify-recaptcha-middleware.js.map +1 -0
  79. package/dist-server/middlewares/webauthn-middleware.js +7 -7
  80. package/dist-server/middlewares/webauthn-middleware.js.map +1 -1
  81. package/dist-server/migrations/1548206416130-SeedUser.js +6 -6
  82. package/dist-server/migrations/1548206416130-SeedUser.js.map +1 -1
  83. package/dist-server/migrations/1566805283882-SeedPrivilege.js +2 -2
  84. package/dist-server/migrations/1566805283882-SeedPrivilege.js.map +1 -1
  85. package/dist-server/migrations/index.js.map +1 -1
  86. package/dist-server/router/auth-checkin-router.js +10 -10
  87. package/dist-server/router/auth-checkin-router.js.map +1 -1
  88. package/dist-server/router/auth-private-process-router.js +15 -15
  89. package/dist-server/router/auth-private-process-router.js.map +1 -1
  90. package/dist-server/router/auth-public-process-router.js +24 -24
  91. package/dist-server/router/auth-public-process-router.js.map +1 -1
  92. package/dist-server/router/auth-signin-router.js +6 -6
  93. package/dist-server/router/auth-signin-router.js.map +1 -1
  94. package/dist-server/router/auth-signup-router.js +11 -8
  95. package/dist-server/router/auth-signup-router.js.map +1 -1
  96. package/dist-server/router/index.d.ts +9 -9
  97. package/dist-server/router/index.js +9 -9
  98. package/dist-server/router/index.js.map +1 -1
  99. package/dist-server/router/oauth2/index.d.ts +2 -2
  100. package/dist-server/router/oauth2/index.js +2 -2
  101. package/dist-server/router/oauth2/index.js.map +1 -1
  102. package/dist-server/router/oauth2/oauth2-authorize-router.js +6 -6
  103. package/dist-server/router/oauth2/oauth2-authorize-router.js.map +1 -1
  104. package/dist-server/router/oauth2/oauth2-router.d.ts +1 -1
  105. package/dist-server/router/oauth2/oauth2-router.js +21 -21
  106. package/dist-server/router/oauth2/oauth2-router.js.map +1 -1
  107. package/dist-server/router/oauth2/oauth2-server.js +21 -21
  108. package/dist-server/router/oauth2/oauth2-server.js.map +1 -1
  109. package/dist-server/router/site-root-router.js +4 -4
  110. package/dist-server/router/site-root-router.js.map +1 -1
  111. package/dist-server/router/webauthn-router.js +9 -9
  112. package/dist-server/router/webauthn-router.js.map +1 -1
  113. package/dist-server/routes.js +19 -19
  114. package/dist-server/routes.js.map +1 -1
  115. package/dist-server/service/app-binding/app-binding-mutation.js +4 -4
  116. package/dist-server/service/app-binding/app-binding-mutation.js.map +1 -1
  117. package/dist-server/service/app-binding/app-binding-query.d.ts +4 -4
  118. package/dist-server/service/app-binding/app-binding-query.js +22 -22
  119. package/dist-server/service/app-binding/app-binding-query.js.map +1 -1
  120. package/dist-server/service/app-binding/app-binding-types.d.ts +1 -1
  121. package/dist-server/service/app-binding/app-binding-types.js +2 -2
  122. package/dist-server/service/app-binding/app-binding-types.js.map +1 -1
  123. package/dist-server/service/app-binding/app-binding.d.ts +2 -2
  124. package/dist-server/service/app-binding/app-binding.js +4 -4
  125. package/dist-server/service/app-binding/app-binding.js.map +1 -1
  126. package/dist-server/service/app-binding/index.d.ts +2 -2
  127. package/dist-server/service/app-binding/index.js +3 -3
  128. package/dist-server/service/app-binding/index.js.map +1 -1
  129. package/dist-server/service/appliance/appliance-mutation.d.ts +2 -2
  130. package/dist-server/service/appliance/appliance-mutation.js +21 -21
  131. package/dist-server/service/appliance/appliance-mutation.js.map +1 -1
  132. package/dist-server/service/appliance/appliance-query.d.ts +3 -3
  133. package/dist-server/service/appliance/appliance-query.js +17 -17
  134. package/dist-server/service/appliance/appliance-query.js.map +1 -1
  135. package/dist-server/service/appliance/appliance-types.d.ts +1 -1
  136. package/dist-server/service/appliance/appliance-types.js +2 -2
  137. package/dist-server/service/appliance/appliance-types.js.map +1 -1
  138. package/dist-server/service/appliance/appliance.d.ts +1 -1
  139. package/dist-server/service/appliance/appliance.js +8 -8
  140. package/dist-server/service/appliance/appliance.js.map +1 -1
  141. package/dist-server/service/appliance/index.d.ts +3 -3
  142. package/dist-server/service/appliance/index.js +5 -5
  143. package/dist-server/service/appliance/index.js.map +1 -1
  144. package/dist-server/service/application/application-mutation.d.ts +8 -8
  145. package/dist-server/service/application/application-mutation.js +20 -20
  146. package/dist-server/service/application/application-mutation.js.map +1 -1
  147. package/dist-server/service/application/application-query.d.ts +2 -2
  148. package/dist-server/service/application/application-query.js +16 -16
  149. package/dist-server/service/application/application-query.js.map +1 -1
  150. package/dist-server/service/application/application-types.d.ts +1 -1
  151. package/dist-server/service/application/application-types.js +4 -4
  152. package/dist-server/service/application/application-types.js.map +1 -1
  153. package/dist-server/service/application/application.d.ts +1 -1
  154. package/dist-server/service/application/application.js +12 -12
  155. package/dist-server/service/application/application.js.map +1 -1
  156. package/dist-server/service/application/index.d.ts +3 -3
  157. package/dist-server/service/application/index.js +5 -5
  158. package/dist-server/service/application/index.js.map +1 -1
  159. package/dist-server/service/auth-provider/auth-provider-mutation.d.ts +2 -2
  160. package/dist-server/service/auth-provider/auth-provider-mutation.js +20 -20
  161. package/dist-server/service/auth-provider/auth-provider-mutation.js.map +1 -1
  162. package/dist-server/service/auth-provider/auth-provider-query.d.ts +3 -3
  163. package/dist-server/service/auth-provider/auth-provider-query.js +20 -20
  164. package/dist-server/service/auth-provider/auth-provider-query.js.map +1 -1
  165. package/dist-server/service/auth-provider/auth-provider-type.d.ts +1 -1
  166. package/dist-server/service/auth-provider/auth-provider-type.js +2 -2
  167. package/dist-server/service/auth-provider/auth-provider-type.js.map +1 -1
  168. package/dist-server/service/auth-provider/auth-provider.d.ts +3 -3
  169. package/dist-server/service/auth-provider/auth-provider.js +12 -12
  170. package/dist-server/service/auth-provider/auth-provider.js.map +1 -1
  171. package/dist-server/service/auth-provider/index.d.ts +3 -3
  172. package/dist-server/service/auth-provider/index.js +5 -5
  173. package/dist-server/service/auth-provider/index.js.map +1 -1
  174. package/dist-server/service/domain-generator/domain-generator-mutation.d.ts +1 -1
  175. package/dist-server/service/domain-generator/domain-generator-mutation.js +11 -11
  176. package/dist-server/service/domain-generator/domain-generator-mutation.js.map +1 -1
  177. package/dist-server/service/domain-generator/domain-generator-types.d.ts +1 -1
  178. package/dist-server/service/domain-generator/domain-generator-types.js +3 -3
  179. package/dist-server/service/domain-generator/domain-generator-types.js.map +1 -1
  180. package/dist-server/service/domain-generator/index.d.ts +1 -1
  181. package/dist-server/service/domain-generator/index.js +2 -2
  182. package/dist-server/service/domain-generator/index.js.map +1 -1
  183. package/dist-server/service/granted-role/granted-role-mutation.d.ts +3 -3
  184. package/dist-server/service/granted-role/granted-role-mutation.js +17 -17
  185. package/dist-server/service/granted-role/granted-role-mutation.js.map +1 -1
  186. package/dist-server/service/granted-role/granted-role-query.d.ts +2 -2
  187. package/dist-server/service/granted-role/granted-role-query.js +13 -13
  188. package/dist-server/service/granted-role/granted-role-query.js.map +1 -1
  189. package/dist-server/service/granted-role/granted-role.d.ts +1 -1
  190. package/dist-server/service/granted-role/granted-role.js +3 -3
  191. package/dist-server/service/granted-role/granted-role.js.map +1 -1
  192. package/dist-server/service/granted-role/index.d.ts +3 -3
  193. package/dist-server/service/granted-role/index.js +5 -5
  194. package/dist-server/service/granted-role/index.js.map +1 -1
  195. package/dist-server/service/index.d.ts +25 -25
  196. package/dist-server/service/index.js +70 -70
  197. package/dist-server/service/index.js.map +1 -1
  198. package/dist-server/service/invitation/index.d.ts +3 -3
  199. package/dist-server/service/invitation/index.js +5 -5
  200. package/dist-server/service/invitation/index.js.map +1 -1
  201. package/dist-server/service/invitation/invitation-mutation.d.ts +2 -2
  202. package/dist-server/service/invitation/invitation-mutation.js +10 -10
  203. package/dist-server/service/invitation/invitation-mutation.js.map +1 -1
  204. package/dist-server/service/invitation/invitation-query.d.ts +1 -1
  205. package/dist-server/service/invitation/invitation-query.js +7 -7
  206. package/dist-server/service/invitation/invitation-query.js.map +1 -1
  207. package/dist-server/service/invitation/invitation-types.d.ts +1 -1
  208. package/dist-server/service/invitation/invitation-types.js +2 -2
  209. package/dist-server/service/invitation/invitation-types.js.map +1 -1
  210. package/dist-server/service/invitation/invitation.d.ts +1 -1
  211. package/dist-server/service/invitation/invitation.js +5 -5
  212. package/dist-server/service/invitation/invitation.js.map +1 -1
  213. package/dist-server/service/login-history/index.d.ts +2 -2
  214. package/dist-server/service/login-history/index.js +4 -4
  215. package/dist-server/service/login-history/index.js.map +1 -1
  216. package/dist-server/service/login-history/login-history-query.d.ts +3 -3
  217. package/dist-server/service/login-history/login-history-query.js +11 -11
  218. package/dist-server/service/login-history/login-history-query.js.map +1 -1
  219. package/dist-server/service/login-history/login-history-type.d.ts +1 -1
  220. package/dist-server/service/login-history/login-history-type.js +2 -2
  221. package/dist-server/service/login-history/login-history-type.js.map +1 -1
  222. package/dist-server/service/login-history/login-history.d.ts +1 -1
  223. package/dist-server/service/login-history/login-history.js +4 -4
  224. package/dist-server/service/login-history/login-history.js.map +1 -1
  225. package/dist-server/service/partner/index.d.ts +3 -3
  226. package/dist-server/service/partner/index.js +5 -5
  227. package/dist-server/service/partner/index.js.map +1 -1
  228. package/dist-server/service/partner/partner-mutation.js +8 -8
  229. package/dist-server/service/partner/partner-mutation.js.map +1 -1
  230. package/dist-server/service/partner/partner-query.d.ts +3 -3
  231. package/dist-server/service/partner/partner-query.js +17 -17
  232. package/dist-server/service/partner/partner-query.js.map +1 -1
  233. package/dist-server/service/partner/partner-types.d.ts +1 -1
  234. package/dist-server/service/partner/partner-types.js +2 -2
  235. package/dist-server/service/partner/partner-types.js.map +1 -1
  236. package/dist-server/service/partner/partner.d.ts +1 -1
  237. package/dist-server/service/partner/partner.js +5 -5
  238. package/dist-server/service/partner/partner.js.map +1 -1
  239. package/dist-server/service/password-history/index.d.ts +1 -1
  240. package/dist-server/service/password-history/index.js +2 -2
  241. package/dist-server/service/password-history/index.js.map +1 -1
  242. package/dist-server/service/privilege/index.d.ts +3 -3
  243. package/dist-server/service/privilege/index.js +5 -5
  244. package/dist-server/service/privilege/index.js.map +1 -1
  245. package/dist-server/service/privilege/privilege-directive.js +2 -2
  246. package/dist-server/service/privilege/privilege-directive.js.map +1 -1
  247. package/dist-server/service/privilege/privilege-mutation.d.ts +2 -2
  248. package/dist-server/service/privilege/privilege-mutation.js +15 -15
  249. package/dist-server/service/privilege/privilege-mutation.js.map +1 -1
  250. package/dist-server/service/privilege/privilege-query.d.ts +4 -4
  251. package/dist-server/service/privilege/privilege-query.js +20 -20
  252. package/dist-server/service/privilege/privilege-query.js.map +1 -1
  253. package/dist-server/service/privilege/privilege-types.d.ts +1 -1
  254. package/dist-server/service/privilege/privilege-types.js +2 -2
  255. package/dist-server/service/privilege/privilege-types.js.map +1 -1
  256. package/dist-server/service/privilege/privilege.d.ts +2 -2
  257. package/dist-server/service/privilege/privilege.js +10 -10
  258. package/dist-server/service/privilege/privilege.js.map +1 -1
  259. package/dist-server/service/role/index.d.ts +3 -3
  260. package/dist-server/service/role/index.js +5 -5
  261. package/dist-server/service/role/index.js.map +1 -1
  262. package/dist-server/service/role/role-mutation.d.ts +2 -2
  263. package/dist-server/service/role/role-mutation.js +19 -19
  264. package/dist-server/service/role/role-mutation.js.map +1 -1
  265. package/dist-server/service/role/role-query.d.ts +4 -4
  266. package/dist-server/service/role/role-query.js +29 -29
  267. package/dist-server/service/role/role-query.js.map +1 -1
  268. package/dist-server/service/role/role-types.d.ts +1 -1
  269. package/dist-server/service/role/role-types.js +2 -2
  270. package/dist-server/service/role/role-types.js.map +1 -1
  271. package/dist-server/service/role/role.d.ts +2 -2
  272. package/dist-server/service/role/role.js +12 -12
  273. package/dist-server/service/role/role.js.map +1 -1
  274. package/dist-server/service/user/domain-query.d.ts +1 -1
  275. package/dist-server/service/user/domain-query.js +3 -3
  276. package/dist-server/service/user/domain-query.js.map +1 -1
  277. package/dist-server/service/user/index.d.ts +4 -4
  278. package/dist-server/service/user/index.js +6 -6
  279. package/dist-server/service/user/index.js.map +1 -1
  280. package/dist-server/service/user/user-mutation.d.ts +3 -3
  281. package/dist-server/service/user/user-mutation.js +42 -42
  282. package/dist-server/service/user/user-mutation.js.map +1 -1
  283. package/dist-server/service/user/user-query.d.ts +3 -3
  284. package/dist-server/service/user/user-query.js +21 -21
  285. package/dist-server/service/user/user-query.js.map +1 -1
  286. package/dist-server/service/user/user-types.d.ts +1 -1
  287. package/dist-server/service/user/user-types.js +2 -2
  288. package/dist-server/service/user/user-types.js.map +1 -1
  289. package/dist-server/service/user/user.d.ts +3 -3
  290. package/dist-server/service/user/user.js +40 -40
  291. package/dist-server/service/user/user.js.map +1 -1
  292. package/dist-server/service/users-auth-providers/index.d.ts +1 -1
  293. package/dist-server/service/users-auth-providers/index.js +2 -2
  294. package/dist-server/service/users-auth-providers/index.js.map +1 -1
  295. package/dist-server/service/users-auth-providers/users-auth-providers.d.ts +2 -2
  296. package/dist-server/service/users-auth-providers/users-auth-providers.js +8 -8
  297. package/dist-server/service/users-auth-providers/users-auth-providers.js.map +1 -1
  298. package/dist-server/service/verification-token/index.d.ts +1 -1
  299. package/dist-server/service/verification-token/index.js +2 -2
  300. package/dist-server/service/verification-token/index.js.map +1 -1
  301. package/dist-server/service/web-auth-credential/index.d.ts +1 -1
  302. package/dist-server/service/web-auth-credential/index.js +2 -2
  303. package/dist-server/service/web-auth-credential/index.js.map +1 -1
  304. package/dist-server/service/web-auth-credential/web-auth-credential.d.ts +1 -1
  305. package/dist-server/service/web-auth-credential/web-auth-credential.js +10 -10
  306. package/dist-server/service/web-auth-credential/web-auth-credential.js.map +1 -1
  307. package/dist-server/tsconfig.tsbuildinfo +1 -1
  308. package/dist-server/types.d.ts +1 -1
  309. package/dist-server/types.js.map +1 -1
  310. package/dist-server/utils/access-token-cookie.js +2 -2
  311. package/dist-server/utils/access-token-cookie.js.map +1 -1
  312. package/dist-server/utils/check-permission.d.ts +2 -2
  313. package/dist-server/utils/check-permission.js +3 -3
  314. package/dist-server/utils/check-permission.js.map +1 -1
  315. package/dist-server/utils/check-user-belongs-domain.d.ts +1 -1
  316. package/dist-server/utils/check-user-belongs-domain.js +2 -2
  317. package/dist-server/utils/check-user-belongs-domain.js.map +1 -1
  318. package/dist-server/utils/check-user-has-role.d.ts +1 -1
  319. package/dist-server/utils/check-user-has-role.js +2 -2
  320. package/dist-server/utils/check-user-has-role.js.map +1 -1
  321. package/dist-server/utils/get-domain-users.d.ts +1 -1
  322. package/dist-server/utils/get-domain-users.js +2 -2
  323. package/dist-server/utils/get-domain-users.js.map +1 -1
  324. package/dist-server/utils/get-user-domains.d.ts +1 -1
  325. package/dist-server/utils/get-user-domains.js +4 -4
  326. package/dist-server/utils/get-user-domains.js.map +1 -1
  327. package/helps/config/recaptcha.ja.md +49 -0
  328. package/helps/config/recaptcha.ko.md +49 -0
  329. package/helps/config/recaptcha.md +49 -0
  330. package/helps/config/recaptcha.ms.md +49 -0
  331. package/helps/config/recaptcha.zh.md +49 -0
  332. package/package.json +6 -5
@@ -1 +1 @@
1
- {"version":3,"file":"user-domain-not-match-error.js","sourceRoot":"","sources":["../../server/errors/user-domain-not-match-error.ts"],"names":[],"mappings":";;;AAAA,wDAKgC;AAChC,6CAAwC;AAExC,MAAa,WAAY,SAAQ,sBAAS;IACxC,MAAM,KAAK,WAAW;QACpB,OAAO;YACL,kBAAkB,EAAlB,+BAAkB;YAClB,mBAAmB,EAAnB,gCAAmB;YACnB,kBAAkB,EAAlB,+BAAkB;YAClB,0BAA0B,EAA1B,uCAA0B;SAC3B,CAAA;IACH,CAAC;IAID,YAAY,EAAE,SAAS,GAAG,+BAAkB,EAAE,OAAO,EAAE;QACrD,KAAK,CAAC;YACJ,SAAS;SACV,CAAC,CAAA;QAEF,IAAI,CAAC,IAAI,GAAG,uBAAuB,CAAA;QACnC,IAAI,CAAC,OAAO,GAAG,OAAO,CAAA;IACxB,CAAC;CACF;AApBD,kCAoBC","sourcesContent":["import {\n NO_AVAILABLE_DOMAIN,\n NO_SELECTED_DOMAIN,\n REDIRECT_TO_DEFAULT_DOMAIN,\n UNAVAILABLE_DOMAIN\n} from '../constants/error-code'\nimport { AuthError } from './auth-error'\n\nexport class DomainError extends AuthError {\n static get ERROR_CODES(): any {\n return {\n UNAVAILABLE_DOMAIN,\n NO_AVAILABLE_DOMAIN,\n NO_SELECTED_DOMAIN,\n REDIRECT_TO_DEFAULT_DOMAIN\n }\n }\n\n domains: any\n\n constructor({ errorCode = UNAVAILABLE_DOMAIN, domains }) {\n super({\n errorCode\n })\n\n this.name = 'user-domain-not-match'\n this.domains = domains\n }\n}\n"]}
1
+ {"version":3,"file":"user-domain-not-match-error.js","sourceRoot":"","sources":["../../server/errors/user-domain-not-match-error.ts"],"names":[],"mappings":";;;AAAA,8DAKmC;AACnC,mDAA2C;AAE3C,MAAa,WAAY,SAAQ,yBAAS;IACxC,MAAM,KAAK,WAAW;QACpB,OAAO;YACL,kBAAkB,EAAlB,kCAAkB;YAClB,mBAAmB,EAAnB,mCAAmB;YACnB,kBAAkB,EAAlB,kCAAkB;YAClB,0BAA0B,EAA1B,0CAA0B;SAC3B,CAAA;IACH,CAAC;IAID,YAAY,EAAE,SAAS,GAAG,kCAAkB,EAAE,OAAO,EAAE;QACrD,KAAK,CAAC;YACJ,SAAS;SACV,CAAC,CAAA;QAEF,IAAI,CAAC,IAAI,GAAG,uBAAuB,CAAA;QACnC,IAAI,CAAC,OAAO,GAAG,OAAO,CAAA;IACxB,CAAC;CACF;AApBD,kCAoBC","sourcesContent":["import {\n NO_AVAILABLE_DOMAIN,\n NO_SELECTED_DOMAIN,\n REDIRECT_TO_DEFAULT_DOMAIN,\n UNAVAILABLE_DOMAIN\n} from '../constants/error-code.js'\nimport { AuthError } from './auth-error.js'\n\nexport class DomainError extends AuthError {\n static get ERROR_CODES(): any {\n return {\n UNAVAILABLE_DOMAIN,\n NO_AVAILABLE_DOMAIN,\n NO_SELECTED_DOMAIN,\n REDIRECT_TO_DEFAULT_DOMAIN\n }\n }\n\n domains: any\n\n constructor({ errorCode = UNAVAILABLE_DOMAIN, domains }) {\n super({\n errorCode\n })\n\n this.name = 'user-domain-not-match'\n this.domains = domains\n }\n}\n"]}
@@ -1,16 +1,16 @@
1
- import './routes';
2
- export * from './service';
3
- export * from './migrations';
4
- export * from './middlewares';
5
- export * from './routes';
6
- export * from './router';
7
- export * from './utils/get-domain-users';
8
- export * from './utils/get-user-domains';
9
- export * from './utils/get-secret';
10
- export * from './utils/check-user-belongs-domain';
11
- export * from './utils/access-token-cookie';
12
- export * from './utils/encrypt-state';
13
- export * from './utils/check-permission';
14
- export * from './utils/check-user-has-role';
15
- export * from './errors';
16
- export * from './types';
1
+ import './routes.js';
2
+ export * from './service/index.js';
3
+ export * from './migrations/index.js';
4
+ export * from './middlewares/index.js';
5
+ export * from './router/index.js';
6
+ export * from './routes.js';
7
+ export * from './utils/get-domain-users.js';
8
+ export * from './utils/get-user-domains.js';
9
+ export * from './utils/get-secret.js';
10
+ export * from './utils/check-user-belongs-domain.js';
11
+ export * from './utils/access-token-cookie.js';
12
+ export * from './utils/encrypt-state.js';
13
+ export * from './utils/check-permission.js';
14
+ export * from './utils/check-user-has-role.js';
15
+ export * from './errors/index.js';
16
+ export * from './types.js';
@@ -2,26 +2,26 @@
2
2
  Object.defineProperty(exports, "__esModule", { value: true });
3
3
  const tslib_1 = require("tslib");
4
4
  const shell_1 = require("@things-factory/shell");
5
- const privilege_1 = require("./service/privilege/privilege");
6
- require("./routes");
7
- tslib_1.__exportStar(require("./service"), exports);
8
- tslib_1.__exportStar(require("./migrations"), exports);
9
- tslib_1.__exportStar(require("./middlewares"), exports);
10
- tslib_1.__exportStar(require("./routes"), exports);
11
- tslib_1.__exportStar(require("./router"), exports);
12
- tslib_1.__exportStar(require("./utils/get-domain-users"), exports);
13
- tslib_1.__exportStar(require("./utils/get-user-domains"), exports);
14
- tslib_1.__exportStar(require("./utils/get-secret"), exports);
15
- tslib_1.__exportStar(require("./utils/check-user-belongs-domain"), exports);
16
- tslib_1.__exportStar(require("./utils/access-token-cookie"), exports);
17
- tslib_1.__exportStar(require("./utils/encrypt-state"), exports);
18
- tslib_1.__exportStar(require("./utils/check-permission"), exports);
19
- tslib_1.__exportStar(require("./utils/check-user-has-role"), exports);
20
- tslib_1.__exportStar(require("./errors"), exports);
21
- tslib_1.__exportStar(require("./types"), exports);
5
+ const privilege_js_1 = require("./service/privilege/privilege.js");
6
+ require("./routes.js");
7
+ tslib_1.__exportStar(require("./service/index.js"), exports);
8
+ tslib_1.__exportStar(require("./migrations/index.js"), exports);
9
+ tslib_1.__exportStar(require("./middlewares/index.js"), exports);
10
+ tslib_1.__exportStar(require("./router/index.js"), exports);
11
+ tslib_1.__exportStar(require("./routes.js"), exports);
12
+ tslib_1.__exportStar(require("./utils/get-domain-users.js"), exports);
13
+ tslib_1.__exportStar(require("./utils/get-user-domains.js"), exports);
14
+ tslib_1.__exportStar(require("./utils/get-secret.js"), exports);
15
+ tslib_1.__exportStar(require("./utils/check-user-belongs-domain.js"), exports);
16
+ tslib_1.__exportStar(require("./utils/access-token-cookie.js"), exports);
17
+ tslib_1.__exportStar(require("./utils/encrypt-state.js"), exports);
18
+ tslib_1.__exportStar(require("./utils/check-permission.js"), exports);
19
+ tslib_1.__exportStar(require("./utils/check-user-has-role.js"), exports);
20
+ tslib_1.__exportStar(require("./errors/index.js"), exports);
21
+ tslib_1.__exportStar(require("./types.js"), exports);
22
22
  process.on('bootstrap-module-start', async ({ app, config, client }) => {
23
23
  const privileges = process['PRIVILEGES'];
24
- const privilegeRepository = (0, shell_1.getRepository)(privilege_1.Privilege);
24
+ const privilegeRepository = (0, shell_1.getRepository)(privilege_js_1.Privilege);
25
25
  for (const [category, name] of Object.values(privileges)) {
26
26
  if (0 == (await privilegeRepository.count({ where: { category, name } }))) {
27
27
  await privilegeRepository.save({ category, name });
@@ -1 +1 @@
1
- {"version":3,"file":"index.js","sourceRoot":"","sources":["../server/index.ts"],"names":[],"mappings":";;;AAAA,iDAAqD;AACrD,6DAAyD;AAEzD,oBAAiB;AAEjB,oDAAyB;AACzB,uDAA4B;AAE5B,wDAA6B;AAC7B,mDAAwB;AACxB,mDAAwB;AAExB,mEAAwC;AACxC,mEAAwC;AACxC,6DAAkC;AAClC,4EAAiD;AACjD,sEAA2C;AAC3C,gEAAqC;AACrC,mEAAwC;AACxC,sEAA2C;AAE3C,mDAAwB;AAExB,kDAAuB;AAEvB,OAAO,CAAC,EAAE,CAAC,wBAA+B,EAAE,KAAK,EAAE,EAAE,GAAG,EAAE,MAAM,EAAE,MAAM,EAAO,EAAE,EAAE;IACjF,MAAM,UAAU,GAAG,OAAO,CAAC,YAAY,CAAC,CAAA;IACxC,MAAM,mBAAmB,GAAG,IAAA,qBAAa,EAAC,qBAAS,CAAC,CAAA;IAEpD,KAAK,MAAM,CAAC,QAAQ,EAAE,IAAI,CAAC,IAAI,MAAM,CAAC,MAAM,CAAC,UAA8B,CAAC,EAAE,CAAC;QAC7E,IAAI,CAAC,IAAI,CAAC,MAAM,mBAAmB,CAAC,KAAK,CAAC,EAAE,KAAK,EAAE,EAAE,QAAQ,EAAE,IAAI,EAAE,EAAE,CAAC,CAAC,EAAE,CAAC;YAC1E,MAAM,mBAAmB,CAAC,IAAI,CAAC,EAAE,QAAQ,EAAE,IAAI,EAAE,CAAC,CAAA;QACpD,CAAC;IACH,CAAC;IAED,OAAO,CAAC,GAAG,CAAC,2EAA2E,CAAC,CAAA;AAC1F,CAAC,CAAC,CAAA","sourcesContent":["import { getRepository } from '@things-factory/shell'\nimport { Privilege } from './service/privilege/privilege'\n\nimport './routes'\n\nexport * from './service'\nexport * from './migrations'\n\nexport * from './middlewares'\nexport * from './routes'\nexport * from './router'\n\nexport * from './utils/get-domain-users'\nexport * from './utils/get-user-domains'\nexport * from './utils/get-secret'\nexport * from './utils/check-user-belongs-domain'\nexport * from './utils/access-token-cookie'\nexport * from './utils/encrypt-state'\nexport * from './utils/check-permission'\nexport * from './utils/check-user-has-role'\n\nexport * from './errors'\n\nexport * from './types'\n\nprocess.on('bootstrap-module-start' as any, async ({ app, config, client }: any) => {\n const privileges = process['PRIVILEGES']\n const privilegeRepository = getRepository(Privilege)\n\n for (const [category, name] of Object.values(privileges as [string, string])) {\n if (0 == (await privilegeRepository.count({ where: { category, name } }))) {\n await privilegeRepository.save({ category, name })\n }\n }\n\n console.log('[auth-base:bootstrap] Synchronization for privilege master has just done.')\n})\n"]}
1
+ {"version":3,"file":"index.js","sourceRoot":"","sources":["../server/index.ts"],"names":[],"mappings":";;;AAAA,iDAAqD;AACrD,mEAA4D;AAE5D,uBAAoB;AAEpB,6DAAkC;AAClC,gEAAqC;AAErC,iEAAsC;AACtC,4DAAiC;AACjC,sDAA2B;AAE3B,sEAA2C;AAC3C,sEAA2C;AAC3C,gEAAqC;AACrC,+EAAoD;AACpD,yEAA8C;AAC9C,mEAAwC;AACxC,sEAA2C;AAC3C,yEAA8C;AAE9C,4DAAiC;AAEjC,qDAA0B;AAE1B,OAAO,CAAC,EAAE,CAAC,wBAA+B,EAAE,KAAK,EAAE,EAAE,GAAG,EAAE,MAAM,EAAE,MAAM,EAAO,EAAE,EAAE;IACjF,MAAM,UAAU,GAAG,OAAO,CAAC,YAAY,CAAC,CAAA;IACxC,MAAM,mBAAmB,GAAG,IAAA,qBAAa,EAAC,wBAAS,CAAC,CAAA;IAEpD,KAAK,MAAM,CAAC,QAAQ,EAAE,IAAI,CAAC,IAAI,MAAM,CAAC,MAAM,CAAC,UAA8B,CAAC,EAAE,CAAC;QAC7E,IAAI,CAAC,IAAI,CAAC,MAAM,mBAAmB,CAAC,KAAK,CAAC,EAAE,KAAK,EAAE,EAAE,QAAQ,EAAE,IAAI,EAAE,EAAE,CAAC,CAAC,EAAE,CAAC;YAC1E,MAAM,mBAAmB,CAAC,IAAI,CAAC,EAAE,QAAQ,EAAE,IAAI,EAAE,CAAC,CAAA;QACpD,CAAC;IACH,CAAC;IAED,OAAO,CAAC,GAAG,CAAC,2EAA2E,CAAC,CAAA;AAC1F,CAAC,CAAC,CAAA","sourcesContent":["import { getRepository } from '@things-factory/shell'\nimport { Privilege } from './service/privilege/privilege.js'\n\nimport './routes.js'\n\nexport * from './service/index.js'\nexport * from './migrations/index.js'\n\nexport * from './middlewares/index.js'\nexport * from './router/index.js'\nexport * from './routes.js'\n\nexport * from './utils/get-domain-users.js'\nexport * from './utils/get-user-domains.js'\nexport * from './utils/get-secret.js'\nexport * from './utils/check-user-belongs-domain.js'\nexport * from './utils/access-token-cookie.js'\nexport * from './utils/encrypt-state.js'\nexport * from './utils/check-permission.js'\nexport * from './utils/check-user-has-role.js'\n\nexport * from './errors/index.js'\n\nexport * from './types.js'\n\nprocess.on('bootstrap-module-start' as any, async ({ app, config, client }: any) => {\n const privileges = process['PRIVILEGES']\n const privilegeRepository = getRepository(Privilege)\n\n for (const [category, name] of Object.values(privileges as [string, string])) {\n if (0 == (await privilegeRepository.count({ where: { category, name } }))) {\n await privilegeRepository.save({ category, name })\n }\n }\n\n console.log('[auth-base:bootstrap] Synchronization for privilege master has just done.')\n})\n"]}
@@ -2,9 +2,9 @@
2
2
  Object.defineProperty(exports, "__esModule", { value: true });
3
3
  exports.authenticate401Middleware = authenticate401Middleware;
4
4
  const env_1 = require("@things-factory/env");
5
- const error_code_1 = require("../constants/error-code");
6
- const auth_error_1 = require("../errors/auth-error");
7
- const accepts_1 = require("../utils/accepts");
5
+ const error_code_js_1 = require("../constants/error-code.js");
6
+ const auth_error_js_1 = require("../errors/auth-error.js");
7
+ const accepts_js_1 = require("../utils/accepts.js");
8
8
  const disableUserSignupProcess = env_1.config.get('disableUserSignupProcess', false);
9
9
  const disableUserFavoredLanguage = env_1.config.get('i18n/disableUserFavoredLanguage', false);
10
10
  const languages = env_1.config.get('i18n/languages', false);
@@ -14,7 +14,7 @@ async function authenticate401Middleware(context, next) {
14
14
  }
15
15
  catch (err) {
16
16
  var message;
17
- if (err instanceof auth_error_1.AuthError) {
17
+ if (err instanceof auth_error_js_1.AuthError) {
18
18
  message = (context.t && context.t(`error.${err.errorCode}`, err.detail || {})) || err.errorCode;
19
19
  }
20
20
  else {
@@ -32,21 +32,21 @@ async function authenticate401Middleware(context, next) {
32
32
  */
33
33
  const { method, header, path, originalUrl } = context;
34
34
  if (method == 'POST' && path.startsWith('/graphql')) {
35
- if (err.errorCode == error_code_1.SUBDOMAIN_NOTFOUND) {
35
+ if (err.errorCode == error_code_js_1.SUBDOMAIN_NOTFOUND) {
36
36
  context.status = 403;
37
37
  }
38
38
  return;
39
39
  }
40
- if (!(0, accepts_1.accepts)(header.accept, ['text/html', '*/*'])) {
40
+ if (!(0, accepts_js_1.accepts)(header.accept, ['text/html', '*/*'])) {
41
41
  return;
42
42
  }
43
43
  const { redirect_to } = context.query;
44
44
  const { redirectTo = redirect_to || originalUrl } = context.request.body || {};
45
45
  switch (err.errorCode) {
46
- case error_code_1.SUBDOMAIN_NOTFOUND:
46
+ case error_code_js_1.SUBDOMAIN_NOTFOUND:
47
47
  context.redirect(`/auth/checkin?redirect_to=${encodeURIComponent(redirectTo)}`);
48
48
  break;
49
- case error_code_1.USER_LOCKED:
49
+ case error_code_js_1.USER_LOCKED:
50
50
  return await context.render('auth-page', {
51
51
  pageElement: 'auth-activate',
52
52
  elementScript: '/auth/activate.js',
@@ -56,7 +56,7 @@ async function authenticate401Middleware(context, next) {
56
56
  disableUserFavoredLanguage,
57
57
  languages })
58
58
  });
59
- case error_code_1.USER_NOT_ACTIVATED:
59
+ case error_code_js_1.USER_NOT_ACTIVATED:
60
60
  return await context.render('auth-page', {
61
61
  pageElement: 'auth-activate',
62
62
  elementScript: '/auth/activate.js',
@@ -66,7 +66,7 @@ async function authenticate401Middleware(context, next) {
66
66
  disableUserFavoredLanguage,
67
67
  languages })
68
68
  });
69
- case error_code_1.USER_DUPLICATED:
69
+ case error_code_js_1.USER_DUPLICATED:
70
70
  return await context.render('auth-page', {
71
71
  pageElement: 'auth-signup',
72
72
  elementScript: '/auth/signup.js',
@@ -80,7 +80,7 @@ async function authenticate401Middleware(context, next) {
80
80
  return await context.render('auth-page', {
81
81
  pageElement: 'auth-signin',
82
82
  elementScript: '/auth/signin.js',
83
- data: Object.assign(Object.assign({}, err.detail), { message: err instanceof auth_error_1.AuthError ? message : '', redirectTo,
83
+ data: Object.assign(Object.assign({}, err.detail), { message: err instanceof auth_error_js_1.AuthError ? message : '', redirectTo,
84
84
  disableUserSignupProcess,
85
85
  disableUserFavoredLanguage,
86
86
  languages })
@@ -1 +1 @@
1
- {"version":3,"file":"authenticate-401-middleware.js","sourceRoot":"","sources":["../../server/middlewares/authenticate-401-middleware.ts"],"names":[],"mappings":";;AAUA,8DAuGC;AAjHD,6CAA4C;AAE5C,wDAA8G;AAC9G,qDAAgD;AAChD,8CAA0C;AAE1C,MAAM,wBAAwB,GAAG,YAAM,CAAC,GAAG,CAAC,0BAA0B,EAAE,KAAK,CAAC,CAAA;AAC9E,MAAM,0BAA0B,GAAG,YAAM,CAAC,GAAG,CAAC,iCAAiC,EAAE,KAAK,CAAC,CAAA;AACvF,MAAM,SAAS,GAAG,YAAM,CAAC,GAAG,CAAC,gBAAgB,EAAE,KAAK,CAAC,CAAA;AAE9C,KAAK,UAAU,yBAAyB,CAAC,OAAO,EAAE,IAAI;IAC3D,IAAI,CAAC;QACH,MAAM,IAAI,EAAE,CAAA;IACd,CAAC;IAAC,OAAO,GAAG,EAAE,CAAC;QACb,IAAI,OAAO,CAAA;QAEX,IAAI,GAAG,YAAY,sBAAS,EAAE,CAAC;YAC7B,OAAO,GAAG,CAAC,OAAO,CAAC,CAAC,IAAI,OAAO,CAAC,CAAC,CAAC,SAAS,GAAG,CAAC,SAAS,EAAE,EAAE,GAAG,CAAC,MAAM,IAAI,EAAE,CAAC,CAAC,IAAI,GAAG,CAAC,SAAS,CAAA;QACjG,CAAC;aAAM,CAAC;YACN,IAAI,CAAA,GAAG,aAAH,GAAG,uBAAH,GAAG,CAAE,MAAM,MAAK,GAAG,EAAE,CAAC;gBACxB,MAAM,GAAG,CAAA;YACX,CAAC;YAED,OAAO,GAAG,GAAG,CAAC,OAAO,CAAA;QACvB,CAAC;QAED,OAAO,CAAC,MAAM,GAAG,GAAG,CAAA;QACpB,OAAO,CAAC,IAAI,GAAG,OAAO,CAAA;QAEtB;;;;WAIG;QAEH,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,IAAI,EAAE,WAAW,EAAE,GAAG,OAAO,CAAA;QAErD,IAAI,MAAM,IAAI,MAAM,IAAI,IAAI,CAAC,UAAU,CAAC,UAAU,CAAC,EAAE,CAAC;YACpD,IAAI,GAAG,CAAC,SAAS,IAAI,+BAAkB,EAAE,CAAC;gBACxC,OAAO,CAAC,MAAM,GAAG,GAAG,CAAA;YACtB,CAAC;YACD,OAAM;QACR,CAAC;QAED,IAAI,CAAC,IAAA,iBAAO,EAAC,MAAM,CAAC,MAAM,EAAE,CAAC,WAAW,EAAE,KAAK,CAAC,CAAC,EAAE,CAAC;YAClD,OAAM;QACR,CAAC;QAED,MAAM,EAAE,WAAW,EAAE,GAAG,OAAO,CAAC,KAAK,CAAA;QACrC,MAAM,EAAE,UAAU,GAAG,WAAW,IAAI,WAAW,EAAE,GAAG,OAAO,CAAC,OAAO,CAAC,IAAI,IAAI,EAAE,CAAA;QAE9E,QAAQ,GAAG,CAAC,SAAS,EAAE,CAAC;YACtB,KAAK,+BAAkB;gBACrB,OAAO,CAAC,QAAQ,CAAC,6BAA6B,kBAAkB,CAAC,UAAU,CAAC,EAAE,CAAC,CAAA;gBAC/E,MAAK;YAEP,KAAK,wBAAW;gBACd,OAAO,MAAM,OAAO,CAAC,MAAM,CAAC,WAAW,EAAE;oBACvC,WAAW,EAAE,eAAe;oBAC5B,aAAa,EAAE,mBAAmB;oBAClC,IAAI,kCACC,GAAG,CAAC,MAAM,KACb,OAAO;wBACP,UAAU;wBACV,wBAAwB;wBACxB,0BAA0B;wBAC1B,SAAS,GACV;iBACF,CAAC,CAAA;YAEJ,KAAK,+BAAkB;gBACrB,OAAO,MAAM,OAAO,CAAC,MAAM,CAAC,WAAW,EAAE;oBACvC,WAAW,EAAE,eAAe;oBAC5B,aAAa,EAAE,mBAAmB;oBAClC,IAAI,kCACC,GAAG,CAAC,MAAM,KACb,OAAO;wBACP,UAAU;wBACV,wBAAwB;wBACxB,0BAA0B;wBAC1B,SAAS,GACV;iBACF,CAAC,CAAA;YAEJ,KAAK,4BAAe;gBAClB,OAAO,MAAM,OAAO,CAAC,MAAM,CAAC,WAAW,EAAE;oBACvC,WAAW,EAAE,aAAa;oBAC1B,aAAa,EAAE,iBAAiB;oBAChC,IAAI,kCACC,GAAG,CAAC,MAAM,KACb,OAAO;wBACP,UAAU;wBACV,wBAAwB;wBACxB,0BAA0B;wBAC1B,SAAS,GACV;iBACF,CAAC,CAAA;YAEJ;gBACE,OAAO,MAAM,OAAO,CAAC,MAAM,CAAC,WAAW,EAAE;oBACvC,WAAW,EAAE,aAAa;oBAC1B,aAAa,EAAE,iBAAiB;oBAChC,IAAI,kCACC,GAAG,CAAC,MAAM,KACb,OAAO,EAAE,GAAG,YAAY,sBAAS,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,EAAE,EAChD,UAAU;wBACV,wBAAwB;wBACxB,0BAA0B;wBAC1B,SAAS,GACV;iBACF,CAAC,CAAA;QACN,CAAC;IACH,CAAC;AACH,CAAC","sourcesContent":["import { config } from '@things-factory/env'\n\nimport { SUBDOMAIN_NOTFOUND, USER_DUPLICATED, USER_LOCKED, USER_NOT_ACTIVATED } from '../constants/error-code'\nimport { AuthError } from '../errors/auth-error'\nimport { accepts } from '../utils/accepts'\n\nconst disableUserSignupProcess = config.get('disableUserSignupProcess', false)\nconst disableUserFavoredLanguage = config.get('i18n/disableUserFavoredLanguage', false)\nconst languages = config.get('i18n/languages', false)\n\nexport async function authenticate401Middleware(context, next) {\n try {\n await next()\n } catch (err) {\n var message\n\n if (err instanceof AuthError) {\n message = (context.t && context.t(`error.${err.errorCode}`, err.detail || {})) || err.errorCode\n } else {\n if (err?.status !== 401) {\n throw err\n }\n\n message = err.message\n }\n\n context.status = 401\n context.body = message\n\n /*\n * 클라이언트 라우팅을 위한 ApiHistoryFallback의 상황과,\n * 서버라우팅의 상황에서 발생하는 던져지는 401 에러인 경우에는\n * error code에 맞춰서 적절하게 rewriting 되도록 한다.\n */\n\n const { method, header, path, originalUrl } = context\n\n if (method == 'POST' && path.startsWith('/graphql')) {\n if (err.errorCode == SUBDOMAIN_NOTFOUND) {\n context.status = 403\n }\n return\n }\n\n if (!accepts(header.accept, ['text/html', '*/*'])) {\n return\n }\n\n const { redirect_to } = context.query\n const { redirectTo = redirect_to || originalUrl } = context.request.body || {}\n\n switch (err.errorCode) {\n case SUBDOMAIN_NOTFOUND:\n context.redirect(`/auth/checkin?redirect_to=${encodeURIComponent(redirectTo)}`)\n break\n\n case USER_LOCKED:\n return await context.render('auth-page', {\n pageElement: 'auth-activate',\n elementScript: '/auth/activate.js',\n data: {\n ...err.detail,\n message,\n redirectTo,\n disableUserSignupProcess,\n disableUserFavoredLanguage,\n languages\n }\n })\n\n case USER_NOT_ACTIVATED:\n return await context.render('auth-page', {\n pageElement: 'auth-activate',\n elementScript: '/auth/activate.js',\n data: {\n ...err.detail,\n message,\n redirectTo,\n disableUserSignupProcess,\n disableUserFavoredLanguage,\n languages\n }\n })\n\n case USER_DUPLICATED:\n return await context.render('auth-page', {\n pageElement: 'auth-signup',\n elementScript: '/auth/signup.js',\n data: {\n ...err.detail,\n message,\n redirectTo,\n disableUserSignupProcess,\n disableUserFavoredLanguage,\n languages\n }\n })\n\n default:\n return await context.render('auth-page', {\n pageElement: 'auth-signin',\n elementScript: '/auth/signin.js',\n data: {\n ...err.detail,\n message: err instanceof AuthError ? message : '',\n redirectTo,\n disableUserSignupProcess,\n disableUserFavoredLanguage,\n languages\n }\n })\n }\n }\n}\n"]}
1
+ {"version":3,"file":"authenticate-401-middleware.js","sourceRoot":"","sources":["../../server/middlewares/authenticate-401-middleware.ts"],"names":[],"mappings":";;AAUA,8DAuGC;AAjHD,6CAA4C;AAE5C,8DAAiH;AACjH,2DAAmD;AACnD,oDAA6C;AAE7C,MAAM,wBAAwB,GAAG,YAAM,CAAC,GAAG,CAAC,0BAA0B,EAAE,KAAK,CAAC,CAAA;AAC9E,MAAM,0BAA0B,GAAG,YAAM,CAAC,GAAG,CAAC,iCAAiC,EAAE,KAAK,CAAC,CAAA;AACvF,MAAM,SAAS,GAAG,YAAM,CAAC,GAAG,CAAC,gBAAgB,EAAE,KAAK,CAAC,CAAA;AAE9C,KAAK,UAAU,yBAAyB,CAAC,OAAO,EAAE,IAAI;IAC3D,IAAI,CAAC;QACH,MAAM,IAAI,EAAE,CAAA;IACd,CAAC;IAAC,OAAO,GAAG,EAAE,CAAC;QACb,IAAI,OAAO,CAAA;QAEX,IAAI,GAAG,YAAY,yBAAS,EAAE,CAAC;YAC7B,OAAO,GAAG,CAAC,OAAO,CAAC,CAAC,IAAI,OAAO,CAAC,CAAC,CAAC,SAAS,GAAG,CAAC,SAAS,EAAE,EAAE,GAAG,CAAC,MAAM,IAAI,EAAE,CAAC,CAAC,IAAI,GAAG,CAAC,SAAS,CAAA;QACjG,CAAC;aAAM,CAAC;YACN,IAAI,CAAA,GAAG,aAAH,GAAG,uBAAH,GAAG,CAAE,MAAM,MAAK,GAAG,EAAE,CAAC;gBACxB,MAAM,GAAG,CAAA;YACX,CAAC;YAED,OAAO,GAAG,GAAG,CAAC,OAAO,CAAA;QACvB,CAAC;QAED,OAAO,CAAC,MAAM,GAAG,GAAG,CAAA;QACpB,OAAO,CAAC,IAAI,GAAG,OAAO,CAAA;QAEtB;;;;WAIG;QAEH,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,IAAI,EAAE,WAAW,EAAE,GAAG,OAAO,CAAA;QAErD,IAAI,MAAM,IAAI,MAAM,IAAI,IAAI,CAAC,UAAU,CAAC,UAAU,CAAC,EAAE,CAAC;YACpD,IAAI,GAAG,CAAC,SAAS,IAAI,kCAAkB,EAAE,CAAC;gBACxC,OAAO,CAAC,MAAM,GAAG,GAAG,CAAA;YACtB,CAAC;YACD,OAAM;QACR,CAAC;QAED,IAAI,CAAC,IAAA,oBAAO,EAAC,MAAM,CAAC,MAAM,EAAE,CAAC,WAAW,EAAE,KAAK,CAAC,CAAC,EAAE,CAAC;YAClD,OAAM;QACR,CAAC;QAED,MAAM,EAAE,WAAW,EAAE,GAAG,OAAO,CAAC,KAAK,CAAA;QACrC,MAAM,EAAE,UAAU,GAAG,WAAW,IAAI,WAAW,EAAE,GAAG,OAAO,CAAC,OAAO,CAAC,IAAI,IAAI,EAAE,CAAA;QAE9E,QAAQ,GAAG,CAAC,SAAS,EAAE,CAAC;YACtB,KAAK,kCAAkB;gBACrB,OAAO,CAAC,QAAQ,CAAC,6BAA6B,kBAAkB,CAAC,UAAU,CAAC,EAAE,CAAC,CAAA;gBAC/E,MAAK;YAEP,KAAK,2BAAW;gBACd,OAAO,MAAM,OAAO,CAAC,MAAM,CAAC,WAAW,EAAE;oBACvC,WAAW,EAAE,eAAe;oBAC5B,aAAa,EAAE,mBAAmB;oBAClC,IAAI,kCACC,GAAG,CAAC,MAAM,KACb,OAAO;wBACP,UAAU;wBACV,wBAAwB;wBACxB,0BAA0B;wBAC1B,SAAS,GACV;iBACF,CAAC,CAAA;YAEJ,KAAK,kCAAkB;gBACrB,OAAO,MAAM,OAAO,CAAC,MAAM,CAAC,WAAW,EAAE;oBACvC,WAAW,EAAE,eAAe;oBAC5B,aAAa,EAAE,mBAAmB;oBAClC,IAAI,kCACC,GAAG,CAAC,MAAM,KACb,OAAO;wBACP,UAAU;wBACV,wBAAwB;wBACxB,0BAA0B;wBAC1B,SAAS,GACV;iBACF,CAAC,CAAA;YAEJ,KAAK,+BAAe;gBAClB,OAAO,MAAM,OAAO,CAAC,MAAM,CAAC,WAAW,EAAE;oBACvC,WAAW,EAAE,aAAa;oBAC1B,aAAa,EAAE,iBAAiB;oBAChC,IAAI,kCACC,GAAG,CAAC,MAAM,KACb,OAAO;wBACP,UAAU;wBACV,wBAAwB;wBACxB,0BAA0B;wBAC1B,SAAS,GACV;iBACF,CAAC,CAAA;YAEJ;gBACE,OAAO,MAAM,OAAO,CAAC,MAAM,CAAC,WAAW,EAAE;oBACvC,WAAW,EAAE,aAAa;oBAC1B,aAAa,EAAE,iBAAiB;oBAChC,IAAI,kCACC,GAAG,CAAC,MAAM,KACb,OAAO,EAAE,GAAG,YAAY,yBAAS,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,EAAE,EAChD,UAAU;wBACV,wBAAwB;wBACxB,0BAA0B;wBAC1B,SAAS,GACV;iBACF,CAAC,CAAA;QACN,CAAC;IACH,CAAC;AACH,CAAC","sourcesContent":["import { config } from '@things-factory/env'\n\nimport { SUBDOMAIN_NOTFOUND, USER_DUPLICATED, USER_LOCKED, USER_NOT_ACTIVATED } from '../constants/error-code.js'\nimport { AuthError } from '../errors/auth-error.js'\nimport { accepts } from '../utils/accepts.js'\n\nconst disableUserSignupProcess = config.get('disableUserSignupProcess', false)\nconst disableUserFavoredLanguage = config.get('i18n/disableUserFavoredLanguage', false)\nconst languages = config.get('i18n/languages', false)\n\nexport async function authenticate401Middleware(context, next) {\n try {\n await next()\n } catch (err) {\n var message\n\n if (err instanceof AuthError) {\n message = (context.t && context.t(`error.${err.errorCode}`, err.detail || {})) || err.errorCode\n } else {\n if (err?.status !== 401) {\n throw err\n }\n\n message = err.message\n }\n\n context.status = 401\n context.body = message\n\n /*\n * 클라이언트 라우팅을 위한 ApiHistoryFallback의 상황과,\n * 서버라우팅의 상황에서 발생하는 던져지는 401 에러인 경우에는\n * error code에 맞춰서 적절하게 rewriting 되도록 한다.\n */\n\n const { method, header, path, originalUrl } = context\n\n if (method == 'POST' && path.startsWith('/graphql')) {\n if (err.errorCode == SUBDOMAIN_NOTFOUND) {\n context.status = 403\n }\n return\n }\n\n if (!accepts(header.accept, ['text/html', '*/*'])) {\n return\n }\n\n const { redirect_to } = context.query\n const { redirectTo = redirect_to || originalUrl } = context.request.body || {}\n\n switch (err.errorCode) {\n case SUBDOMAIN_NOTFOUND:\n context.redirect(`/auth/checkin?redirect_to=${encodeURIComponent(redirectTo)}`)\n break\n\n case USER_LOCKED:\n return await context.render('auth-page', {\n pageElement: 'auth-activate',\n elementScript: '/auth/activate.js',\n data: {\n ...err.detail,\n message,\n redirectTo,\n disableUserSignupProcess,\n disableUserFavoredLanguage,\n languages\n }\n })\n\n case USER_NOT_ACTIVATED:\n return await context.render('auth-page', {\n pageElement: 'auth-activate',\n elementScript: '/auth/activate.js',\n data: {\n ...err.detail,\n message,\n redirectTo,\n disableUserSignupProcess,\n disableUserFavoredLanguage,\n languages\n }\n })\n\n case USER_DUPLICATED:\n return await context.render('auth-page', {\n pageElement: 'auth-signup',\n elementScript: '/auth/signup.js',\n data: {\n ...err.detail,\n message,\n redirectTo,\n disableUserSignupProcess,\n disableUserFavoredLanguage,\n languages\n }\n })\n\n default:\n return await context.render('auth-page', {\n pageElement: 'auth-signin',\n elementScript: '/auth/signin.js',\n data: {\n ...err.detail,\n message: err instanceof AuthError ? message : '',\n redirectTo,\n disableUserSignupProcess,\n disableUserFavoredLanguage,\n languages\n }\n })\n }\n }\n}\n"]}
@@ -1,5 +1,5 @@
1
1
  import { Domain } from '@things-factory/shell';
2
- import { User } from '../service/user/user';
2
+ import { User } from '../service/user/user.js';
3
3
  declare global {
4
4
  namespace NodeJS {
5
5
  interface Process {
@@ -3,9 +3,9 @@ Object.defineProperty(exports, "__esModule", { value: true });
3
3
  exports.domainAuthenticateMiddleware = domainAuthenticateMiddleware;
4
4
  const env_1 = require("@things-factory/env");
5
5
  const shell_1 = require("@things-factory/shell");
6
- const auth_error_1 = require("../errors/auth-error");
7
- const user_1 = require("../service/user/user");
8
- const get_user_domains_1 = require("../utils/get-user-domains");
6
+ const auth_error_js_1 = require("../errors/auth-error.js");
7
+ const user_js_1 = require("../service/user/user.js");
8
+ const get_user_domains_js_1 = require("../utils/get-user-domains.js");
9
9
  const useVirtualHostBasedDomain = !!env_1.config.get('useVirtualHostBasedDomain');
10
10
  const fixed = env_1.config.get('subdomain');
11
11
  const subdomainOffset = env_1.config.getNumber('subdomainOffset', 2);
@@ -17,7 +17,7 @@ process.superUserGranted = async (domain, user) => {
17
17
  return false;
18
18
  }
19
19
  if (!user.domains.length) {
20
- user = await (0, shell_1.getRepository)(user_1.User).findOne({
20
+ user = await (0, shell_1.getRepository)(user_js_1.User).findOne({
21
21
  where: { id: user.id },
22
22
  relations: ['domains']
23
23
  });
@@ -44,17 +44,17 @@ async function domainAuthenticateMiddleware(context, next) {
44
44
  // 1. 현재 subdomain 이 결정되지 않은 경우.
45
45
  // - checkin로 이동한다.
46
46
  if (!subdomain) {
47
- throw new auth_error_1.AuthError({
48
- errorCode: auth_error_1.AuthError.ERROR_CODES.SUBDOMAIN_NOTFOUND
47
+ throw new auth_error_js_1.AuthError({
48
+ errorCode: auth_error_js_1.AuthError.ERROR_CODES.SUBDOMAIN_NOTFOUND
49
49
  });
50
50
  }
51
51
  // 2. 현재 subdomain 이 결정된 경우.
52
- const userDomains = await (0, get_user_domains_1.getUserDomains)(user);
52
+ const userDomains = await (0, get_user_domains_js_1.getUserDomains)(user);
53
53
  if (userDomains.find(domain => domain.subdomain == subdomain) || (await process.superUserGranted(domain, user))) {
54
54
  return await next();
55
55
  }
56
- throw new auth_error_1.AuthError({
57
- errorCode: auth_error_1.AuthError.ERROR_CODES.SUBDOMAIN_NOTFOUND
56
+ throw new auth_error_js_1.AuthError({
57
+ errorCode: auth_error_js_1.AuthError.ERROR_CODES.SUBDOMAIN_NOTFOUND
58
58
  });
59
59
  }
60
60
  //# sourceMappingURL=domain-authenticate-middleware.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"domain-authenticate-middleware.js","sourceRoot":"","sources":["../../server/middlewares/domain-authenticate-middleware.ts"],"names":[],"mappings":";;AAsDA,oEAuBC;AA7ED,6CAA4C;AAC5C,iDAA6D;AAE7D,qDAAgD;AAChD,+CAA2C;AAC3C,gEAA0D;AAE1D,MAAM,yBAAyB,GAAG,CAAC,CAAC,YAAM,CAAC,GAAG,CAAC,2BAA2B,CAAC,CAAA;AAC3E,MAAM,KAAK,GAAG,YAAM,CAAC,GAAG,CAAC,WAAW,CAAC,CAAA;AACrC,MAAM,eAAe,GAAG,YAAM,CAAC,SAAS,CAAC,iBAAiB,EAAE,CAAC,CAAC,CAAA;AAW9D,OAAO,CAAC,kBAAkB,GAAG,KAAK,EAAE,MAAc,EAAE,IAAU,EAAoB,EAAE;IAClF,OAAO,IAAI,IAAI,MAAM,IAAI,MAAM,CAAC,KAAK,KAAK,IAAI,CAAC,EAAE,CAAA;AACnD,CAAC,CAAA;AAED,OAAO,CAAC,gBAAgB,GAAG,KAAK,EAAE,MAAc,EAAE,IAAU,EAAoB,EAAE;IAChF,IAAI,CAAC,IAAI,EAAE,CAAC;QACV,OAAO,KAAK,CAAA;IACd,CAAC;IAED,IAAI,CAAC,IAAI,CAAC,OAAO,CAAC,MAAM,EAAE,CAAC;QACzB,IAAI,GAAG,MAAM,IAAA,qBAAa,EAAC,WAAI,CAAC,CAAC,OAAO,CAAC;YACvC,KAAK,EAAE,EAAE,EAAE,EAAE,IAAI,CAAC,EAAE,EAAE;YACtB,SAAS,EAAE,CAAC,SAAS,CAAC;SACvB,CAAC,CAAA;IACJ,CAAC;IAED,MAAM,YAAY,GAAW,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC,MAAc,EAAE,EAAE,CAAC,MAAM,CAAC,SAAS,KAAK,QAAQ,CAAC,CAAA;IACjG,IAAI,CAAC,YAAY,EAAE,CAAC;QAClB,OAAO,KAAK,CAAA;IACd,CAAC;IAED,OAAO,YAAY,CAAC,KAAK,KAAK,IAAI,CAAC,EAAE,CAAA;AACvC,CAAC,CAAA;AAED;;;;;;;;GAQG;AAEI,KAAK,UAAU,4BAA4B,CAAC,OAAY,EAAE,IAAS;IACxE,MAAM,EAAE,CAAC,EAAE,GAAG,OAAO,CAAA;IACrB,MAAM,EAAE,MAAM,EAAE,IAAI,EAAE,GAAG,OAAO,CAAC,KAAK,CAAA;IAEtC,MAAM,SAAS,GAAW,MAAM,aAAN,MAAM,uBAAN,MAAM,CAAE,SAAS,CAAA;IAE3C,gCAAgC;IAChC,mBAAmB;IACnB,IAAI,CAAC,SAAS,EAAE,CAAC;QACf,MAAM,IAAI,sBAAS,CAAC;YAClB,SAAS,EAAE,sBAAS,CAAC,WAAW,CAAC,kBAAkB;SACpD,CAAC,CAAA;IACJ,CAAC;IAED,4BAA4B;IAC5B,MAAM,WAAW,GAAsB,MAAM,IAAA,iCAAc,EAAC,IAAI,CAAC,CAAA;IACjE,IAAI,WAAW,CAAC,IAAI,CAAC,MAAM,CAAC,EAAE,CAAC,MAAM,CAAC,SAAS,IAAI,SAAS,CAAC,IAAI,CAAC,MAAM,OAAO,CAAC,gBAAgB,CAAC,MAAM,EAAE,IAAI,CAAC,CAAC,EAAE,CAAC;QAChH,OAAO,MAAM,IAAI,EAAE,CAAA;IACrB,CAAC;IAED,MAAM,IAAI,sBAAS,CAAC;QAClB,SAAS,EAAE,sBAAS,CAAC,WAAW,CAAC,kBAAkB;KACpD,CAAC,CAAA;AACJ,CAAC","sourcesContent":["import { config } from '@things-factory/env'\nimport { Domain, getRepository } from '@things-factory/shell'\n\nimport { AuthError } from '../errors/auth-error'\nimport { User } from '../service/user/user'\nimport { getUserDomains } from '../utils/get-user-domains'\n\nconst useVirtualHostBasedDomain = !!config.get('useVirtualHostBasedDomain')\nconst fixed = config.get('subdomain')\nconst subdomainOffset = config.getNumber('subdomainOffset', 2)\n\ndeclare global {\n namespace NodeJS {\n interface Process {\n domainOwnerGranted: (domain: Domain, user: User) => Promise<boolean>\n superUserGranted: (domain: Domain, user: User) => Promise<boolean>\n }\n }\n}\n\nprocess.domainOwnerGranted = async (domain: Domain, user: User): Promise<boolean> => {\n return user && domain && domain.owner === user.id\n}\n\nprocess.superUserGranted = async (domain: Domain, user: User): Promise<boolean> => {\n if (!user) {\n return false\n }\n\n if (!user.domains.length) {\n user = await getRepository(User).findOne({\n where: { id: user.id },\n relations: ['domains']\n })\n }\n\n const systemDomain: Domain = user.domains.find((domain: Domain) => domain.subdomain === 'system')\n if (!systemDomain) {\n return false\n }\n\n return systemDomain.owner === user.id\n}\n\n/*\n * 현재 subdomain 과 user의 domain list와의 비교를 통해서,\n * 인증 성공 또는 인증 에러를 발생시킬 것인지를 결정한다.\n * 1. 현재 subdomain 이 결정되지 않은 경우.\n * - checkin로 이동한다.\n * 2. superUser 판단\n * 3. 현재 subdomain 이 결정된 경우.\n * - user의 domains 리스트에 해당 subdomain이 없다면, 인증 오류를 발생한다.\n */\n\nexport async function domainAuthenticateMiddleware(context: any, next: any) {\n const { t } = context\n const { domain, user } = context.state\n\n const subdomain: string = domain?.subdomain\n\n // 1. 현재 subdomain 이 결정되지 않은 경우.\n // - checkin로 이동한다.\n if (!subdomain) {\n throw new AuthError({\n errorCode: AuthError.ERROR_CODES.SUBDOMAIN_NOTFOUND\n })\n }\n\n // 2. 현재 subdomain 이 결정된 경우.\n const userDomains: Partial<Domain>[] = await getUserDomains(user)\n if (userDomains.find(domain => domain.subdomain == subdomain) || (await process.superUserGranted(domain, user))) {\n return await next()\n }\n\n throw new AuthError({\n errorCode: AuthError.ERROR_CODES.SUBDOMAIN_NOTFOUND\n })\n}\n"]}
1
+ {"version":3,"file":"domain-authenticate-middleware.js","sourceRoot":"","sources":["../../server/middlewares/domain-authenticate-middleware.ts"],"names":[],"mappings":";;AAsDA,oEAuBC;AA7ED,6CAA4C;AAC5C,iDAA6D;AAE7D,2DAAmD;AACnD,qDAA8C;AAC9C,sEAA6D;AAE7D,MAAM,yBAAyB,GAAG,CAAC,CAAC,YAAM,CAAC,GAAG,CAAC,2BAA2B,CAAC,CAAA;AAC3E,MAAM,KAAK,GAAG,YAAM,CAAC,GAAG,CAAC,WAAW,CAAC,CAAA;AACrC,MAAM,eAAe,GAAG,YAAM,CAAC,SAAS,CAAC,iBAAiB,EAAE,CAAC,CAAC,CAAA;AAW9D,OAAO,CAAC,kBAAkB,GAAG,KAAK,EAAE,MAAc,EAAE,IAAU,EAAoB,EAAE;IAClF,OAAO,IAAI,IAAI,MAAM,IAAI,MAAM,CAAC,KAAK,KAAK,IAAI,CAAC,EAAE,CAAA;AACnD,CAAC,CAAA;AAED,OAAO,CAAC,gBAAgB,GAAG,KAAK,EAAE,MAAc,EAAE,IAAU,EAAoB,EAAE;IAChF,IAAI,CAAC,IAAI,EAAE,CAAC;QACV,OAAO,KAAK,CAAA;IACd,CAAC;IAED,IAAI,CAAC,IAAI,CAAC,OAAO,CAAC,MAAM,EAAE,CAAC;QACzB,IAAI,GAAG,MAAM,IAAA,qBAAa,EAAC,cAAI,CAAC,CAAC,OAAO,CAAC;YACvC,KAAK,EAAE,EAAE,EAAE,EAAE,IAAI,CAAC,EAAE,EAAE;YACtB,SAAS,EAAE,CAAC,SAAS,CAAC;SACvB,CAAC,CAAA;IACJ,CAAC;IAED,MAAM,YAAY,GAAW,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC,MAAc,EAAE,EAAE,CAAC,MAAM,CAAC,SAAS,KAAK,QAAQ,CAAC,CAAA;IACjG,IAAI,CAAC,YAAY,EAAE,CAAC;QAClB,OAAO,KAAK,CAAA;IACd,CAAC;IAED,OAAO,YAAY,CAAC,KAAK,KAAK,IAAI,CAAC,EAAE,CAAA;AACvC,CAAC,CAAA;AAED;;;;;;;;GAQG;AAEI,KAAK,UAAU,4BAA4B,CAAC,OAAY,EAAE,IAAS;IACxE,MAAM,EAAE,CAAC,EAAE,GAAG,OAAO,CAAA;IACrB,MAAM,EAAE,MAAM,EAAE,IAAI,EAAE,GAAG,OAAO,CAAC,KAAK,CAAA;IAEtC,MAAM,SAAS,GAAW,MAAM,aAAN,MAAM,uBAAN,MAAM,CAAE,SAAS,CAAA;IAE3C,gCAAgC;IAChC,mBAAmB;IACnB,IAAI,CAAC,SAAS,EAAE,CAAC;QACf,MAAM,IAAI,yBAAS,CAAC;YAClB,SAAS,EAAE,yBAAS,CAAC,WAAW,CAAC,kBAAkB;SACpD,CAAC,CAAA;IACJ,CAAC;IAED,4BAA4B;IAC5B,MAAM,WAAW,GAAsB,MAAM,IAAA,oCAAc,EAAC,IAAI,CAAC,CAAA;IACjE,IAAI,WAAW,CAAC,IAAI,CAAC,MAAM,CAAC,EAAE,CAAC,MAAM,CAAC,SAAS,IAAI,SAAS,CAAC,IAAI,CAAC,MAAM,OAAO,CAAC,gBAAgB,CAAC,MAAM,EAAE,IAAI,CAAC,CAAC,EAAE,CAAC;QAChH,OAAO,MAAM,IAAI,EAAE,CAAA;IACrB,CAAC;IAED,MAAM,IAAI,yBAAS,CAAC;QAClB,SAAS,EAAE,yBAAS,CAAC,WAAW,CAAC,kBAAkB;KACpD,CAAC,CAAA;AACJ,CAAC","sourcesContent":["import { config } from '@things-factory/env'\nimport { Domain, getRepository } from '@things-factory/shell'\n\nimport { AuthError } from '../errors/auth-error.js'\nimport { User } from '../service/user/user.js'\nimport { getUserDomains } from '../utils/get-user-domains.js'\n\nconst useVirtualHostBasedDomain = !!config.get('useVirtualHostBasedDomain')\nconst fixed = config.get('subdomain')\nconst subdomainOffset = config.getNumber('subdomainOffset', 2)\n\ndeclare global {\n namespace NodeJS {\n interface Process {\n domainOwnerGranted: (domain: Domain, user: User) => Promise<boolean>\n superUserGranted: (domain: Domain, user: User) => Promise<boolean>\n }\n }\n}\n\nprocess.domainOwnerGranted = async (domain: Domain, user: User): Promise<boolean> => {\n return user && domain && domain.owner === user.id\n}\n\nprocess.superUserGranted = async (domain: Domain, user: User): Promise<boolean> => {\n if (!user) {\n return false\n }\n\n if (!user.domains.length) {\n user = await getRepository(User).findOne({\n where: { id: user.id },\n relations: ['domains']\n })\n }\n\n const systemDomain: Domain = user.domains.find((domain: Domain) => domain.subdomain === 'system')\n if (!systemDomain) {\n return false\n }\n\n return systemDomain.owner === user.id\n}\n\n/*\n * 현재 subdomain 과 user의 domain list와의 비교를 통해서,\n * 인증 성공 또는 인증 에러를 발생시킬 것인지를 결정한다.\n * 1. 현재 subdomain 이 결정되지 않은 경우.\n * - checkin로 이동한다.\n * 2. superUser 판단\n * 3. 현재 subdomain 이 결정된 경우.\n * - user의 domains 리스트에 해당 subdomain이 없다면, 인증 오류를 발생한다.\n */\n\nexport async function domainAuthenticateMiddleware(context: any, next: any) {\n const { t } = context\n const { domain, user } = context.state\n\n const subdomain: string = domain?.subdomain\n\n // 1. 현재 subdomain 이 결정되지 않은 경우.\n // - checkin로 이동한다.\n if (!subdomain) {\n throw new AuthError({\n errorCode: AuthError.ERROR_CODES.SUBDOMAIN_NOTFOUND\n })\n }\n\n // 2. 현재 subdomain 이 결정된 경우.\n const userDomains: Partial<Domain>[] = await getUserDomains(user)\n if (userDomains.find(domain => domain.subdomain == subdomain) || (await process.superUserGranted(domain, user))) {\n return await next()\n }\n\n throw new AuthError({\n errorCode: AuthError.ERROR_CODES.SUBDOMAIN_NOTFOUND\n })\n}\n"]}
@@ -1,13 +1,13 @@
1
1
  "use strict";
2
2
  Object.defineProperty(exports, "__esModule", { value: true });
3
3
  exports.graphqlAuthenticateMiddleware = graphqlAuthenticateMiddleware;
4
- const domain_authenticate_middleware_1 = require("./domain-authenticate-middleware");
5
- const jwt_authenticate_middleware_1 = require("./jwt-authenticate-middleware");
4
+ const domain_authenticate_middleware_js_1 = require("./domain-authenticate-middleware.js");
5
+ const jwt_authenticate_middleware_js_1 = require("./jwt-authenticate-middleware.js");
6
6
  async function graphqlAuthenticateMiddleware(context, next) {
7
7
  const { method, path } = context;
8
8
  if (method == 'POST' && path.startsWith('/graphql')) {
9
- await (0, jwt_authenticate_middleware_1.jwtAuthenticateMiddleware)(context, () => { });
10
- await (0, domain_authenticate_middleware_1.domainAuthenticateMiddleware)(context, () => { });
9
+ await (0, jwt_authenticate_middleware_js_1.jwtAuthenticateMiddleware)(context, () => { });
10
+ await (0, domain_authenticate_middleware_js_1.domainAuthenticateMiddleware)(context, () => { });
11
11
  }
12
12
  await next();
13
13
  }
@@ -1 +1 @@
1
- {"version":3,"file":"graphql-authenticate-middleware.js","sourceRoot":"","sources":["../../server/middlewares/graphql-authenticate-middleware.ts"],"names":[],"mappings":";;AAGA,sEASC;AAZD,qFAA+E;AAC/E,+EAAyE;AAElE,KAAK,UAAU,6BAA6B,CAAC,OAAO,EAAE,IAAI;IAC/D,MAAM,EAAE,MAAM,EAAE,IAAI,EAAE,GAAG,OAAO,CAAA;IAEhC,IAAI,MAAM,IAAI,MAAM,IAAI,IAAI,CAAC,UAAU,CAAC,UAAU,CAAC,EAAE,CAAC;QACpD,MAAM,IAAA,uDAAyB,EAAC,OAAO,EAAE,GAAG,EAAE,GAAE,CAAC,CAAC,CAAA;QAClD,MAAM,IAAA,6DAA4B,EAAC,OAAO,EAAE,GAAG,EAAE,GAAE,CAAC,CAAC,CAAA;IACvD,CAAC;IAED,MAAM,IAAI,EAAE,CAAA;AACd,CAAC","sourcesContent":["import { domainAuthenticateMiddleware } from './domain-authenticate-middleware'\nimport { jwtAuthenticateMiddleware } from './jwt-authenticate-middleware'\n\nexport async function graphqlAuthenticateMiddleware(context, next) {\n const { method, path } = context\n\n if (method == 'POST' && path.startsWith('/graphql')) {\n await jwtAuthenticateMiddleware(context, () => {})\n await domainAuthenticateMiddleware(context, () => {})\n }\n\n await next()\n}\n"]}
1
+ {"version":3,"file":"graphql-authenticate-middleware.js","sourceRoot":"","sources":["../../server/middlewares/graphql-authenticate-middleware.ts"],"names":[],"mappings":";;AAGA,sEASC;AAZD,2FAAkF;AAClF,qFAA4E;AAErE,KAAK,UAAU,6BAA6B,CAAC,OAAO,EAAE,IAAI;IAC/D,MAAM,EAAE,MAAM,EAAE,IAAI,EAAE,GAAG,OAAO,CAAA;IAEhC,IAAI,MAAM,IAAI,MAAM,IAAI,IAAI,CAAC,UAAU,CAAC,UAAU,CAAC,EAAE,CAAC;QACpD,MAAM,IAAA,0DAAyB,EAAC,OAAO,EAAE,GAAG,EAAE,GAAE,CAAC,CAAC,CAAA;QAClD,MAAM,IAAA,gEAA4B,EAAC,OAAO,EAAE,GAAG,EAAE,GAAE,CAAC,CAAC,CAAA;IACvD,CAAC;IAED,MAAM,IAAI,EAAE,CAAA;AACd,CAAC","sourcesContent":["import { domainAuthenticateMiddleware } from './domain-authenticate-middleware.js'\nimport { jwtAuthenticateMiddleware } from './jwt-authenticate-middleware.js'\n\nexport async function graphqlAuthenticateMiddleware(context, next) {\n const { method, path } = context\n\n if (method == 'POST' && path.startsWith('/graphql')) {\n await jwtAuthenticateMiddleware(context, () => {})\n await domainAuthenticateMiddleware(context, () => {})\n }\n\n await next()\n}\n"]}
@@ -1,6 +1,6 @@
1
1
  export declare function initMiddlewares(app: any): void;
2
- export * from './jwt-authenticate-middleware';
3
- export * from './domain-authenticate-middleware';
4
- export * from './signin-middleware';
5
- export * from './webauthn-middleware';
6
- export * from './authenticate-401-middleware';
2
+ export * from './jwt-authenticate-middleware.js';
3
+ export * from './domain-authenticate-middleware.js';
4
+ export * from './signin-middleware.js';
5
+ export * from './webauthn-middleware.js';
6
+ export * from './authenticate-401-middleware.js';
@@ -5,20 +5,20 @@ const tslib_1 = require("tslib");
5
5
  const koa_session_1 = tslib_1.__importDefault(require("koa-session"));
6
6
  const koa_passport_1 = tslib_1.__importDefault(require("koa-passport"));
7
7
  const env_1 = require("@things-factory/env");
8
- const get_secret_1 = require("../utils/get-secret");
9
- const authenticate_401_middleware_1 = require("./authenticate-401-middleware");
10
- const domain_authenticate_middleware_1 = require("./domain-authenticate-middleware");
11
- const graphql_authenticate_middleware_1 = require("./graphql-authenticate-middleware");
12
- const jwt_authenticate_middleware_1 = require("./jwt-authenticate-middleware");
13
- const user_1 = require("../service/user/user");
14
- const max_age_1 = require("../constants/max-age");
8
+ const get_secret_js_1 = require("../utils/get-secret.js");
9
+ const authenticate_401_middleware_js_1 = require("./authenticate-401-middleware.js");
10
+ const domain_authenticate_middleware_js_1 = require("./domain-authenticate-middleware.js");
11
+ const graphql_authenticate_middleware_js_1 = require("./graphql-authenticate-middleware.js");
12
+ const jwt_authenticate_middleware_js_1 = require("./jwt-authenticate-middleware.js");
13
+ const user_js_1 = require("../service/user/user.js");
14
+ const max_age_js_1 = require("../constants/max-age.js");
15
15
  const accessTokenCookieKey = env_1.config.get('accessTokenCookieKey', 'access_token');
16
16
  function initMiddlewares(app) {
17
17
  /* oauth2orize-koa 에서 oauth 트랜잭션 관리를 위해서 session을 사용함. */
18
- app.keys = [get_secret_1.SECRET];
18
+ app.keys = [get_secret_js_1.SECRET];
19
19
  app.use((0, koa_session_1.default)({
20
20
  key: 'tfsession',
21
- maxAge: max_age_1.MAX_AGE,
21
+ maxAge: max_age_js_1.MAX_AGE,
22
22
  overwrite: true,
23
23
  httpOnly: true,
24
24
  signed: true,
@@ -29,26 +29,26 @@ function initMiddlewares(app) {
29
29
  done(null, profile);
30
30
  });
31
31
  koa_passport_1.default.deserializeUser(async (profile, done) => {
32
- done(null, await user_1.User.checkAuth(profile));
32
+ done(null, await user_js_1.User.checkAuth(profile));
33
33
  });
34
34
  /* passport initialize */
35
35
  app.use(koa_passport_1.default.initialize());
36
36
  /* passport use session - for oauth transaction */
37
37
  app.use(koa_passport_1.default.session());
38
38
  /* authentication error handling */
39
- app.use(authenticate_401_middleware_1.authenticate401Middleware);
39
+ app.use(authenticate_401_middleware_js_1.authenticate401Middleware);
40
40
  /*
41
41
  * post:graphql 에 대해서는 graphqlAuthenticationMiddleware를 적용한다.
42
42
  * graphql app을 router에 적용하지 못하기 때문임.
43
43
  */
44
- app.use(graphql_authenticate_middleware_1.graphqlAuthenticateMiddleware);
44
+ app.use(graphql_authenticate_middleware_js_1.graphqlAuthenticateMiddleware);
45
45
  }
46
46
  process.on('bootstrap-module-subscription', (app, subscriptionMiddleware) => {
47
- subscriptionMiddleware.push(jwt_authenticate_middleware_1.jwtAuthenticateMiddleware, domain_authenticate_middleware_1.domainAuthenticateMiddleware);
47
+ subscriptionMiddleware.push(jwt_authenticate_middleware_js_1.jwtAuthenticateMiddleware, domain_authenticate_middleware_js_1.domainAuthenticateMiddleware);
48
48
  });
49
- tslib_1.__exportStar(require("./jwt-authenticate-middleware"), exports);
50
- tslib_1.__exportStar(require("./domain-authenticate-middleware"), exports);
51
- tslib_1.__exportStar(require("./signin-middleware"), exports);
52
- tslib_1.__exportStar(require("./webauthn-middleware"), exports);
53
- tslib_1.__exportStar(require("./authenticate-401-middleware"), exports);
49
+ tslib_1.__exportStar(require("./jwt-authenticate-middleware.js"), exports);
50
+ tslib_1.__exportStar(require("./domain-authenticate-middleware.js"), exports);
51
+ tslib_1.__exportStar(require("./signin-middleware.js"), exports);
52
+ tslib_1.__exportStar(require("./webauthn-middleware.js"), exports);
53
+ tslib_1.__exportStar(require("./authenticate-401-middleware.js"), exports);
54
54
  //# sourceMappingURL=index.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"index.js","sourceRoot":"","sources":["../../server/middlewares/index.ts"],"names":[],"mappings":";;AAgBA,0CAwCC;;AAxDD,sEAAiC;AACjC,wEAAmC;AAEnC,6CAA4C;AAC5C,oDAA4C;AAE5C,+EAAyE;AACzE,qFAA+E;AAC/E,uFAAiF;AACjF,+EAAyE;AAEzE,+CAA2C;AAC3C,kDAA8C;AAE9C,MAAM,oBAAoB,GAAG,YAAM,CAAC,GAAG,CAAC,sBAAsB,EAAE,cAAc,CAAC,CAAA;AAE/E,SAAgB,eAAe,CAAC,GAAQ;IACtC,yDAAyD;IACzD,GAAG,CAAC,IAAI,GAAG,CAAC,mBAAM,CAAC,CAAA;IACnB,GAAG,CAAC,GAAG,CACL,IAAA,qBAAO,EACL;QACE,GAAG,EAAE,WAAW;QAChB,MAAM,EAAE,iBAAO;QACf,SAAS,EAAE,IAAI;QACf,QAAQ,EAAE,IAAI;QACd,MAAM,EAAE,IAAI;QACZ,OAAO,EAAE,KAAK;QACd,KAAK,EAAE,KAAK;KACb,EACD,GAAG,CACJ,CACF,CAAA;IAED,sBAAQ,CAAC,aAAa,CAAC,CAAC,OAAO,EAAE,IAAI,EAAE,EAAE;QACvC,IAAI,CAAC,IAAI,EAAE,OAAO,CAAC,CAAA;IACrB,CAAC,CAAC,CAAA;IAEF,sBAAQ,CAAC,eAAe,CAAC,KAAK,EAAE,OAAO,EAAE,IAAI,EAAE,EAAE;QAC/C,IAAI,CAAC,IAAI,EAAE,MAAM,WAAI,CAAC,SAAS,CAAC,OAAO,CAAC,CAAC,CAAA;IAC3C,CAAC,CAAC,CAAA;IAEF,yBAAyB;IACzB,GAAG,CAAC,GAAG,CAAC,sBAAQ,CAAC,UAAU,EAAE,CAAC,CAAA;IAE9B,kDAAkD;IAClD,GAAG,CAAC,GAAG,CAAC,sBAAQ,CAAC,OAAO,EAAE,CAAC,CAAA;IAE3B,mCAAmC;IACnC,GAAG,CAAC,GAAG,CAAC,uDAAyB,CAAC,CAAA;IAElC;;;OAGG;IACH,GAAG,CAAC,GAAG,CAAC,+DAA6B,CAAC,CAAA;AACxC,CAAC;AAED,OAAO,CAAC,EAAE,CAAC,+BAAsC,EAAE,CAAC,GAAG,EAAE,sBAAsB,EAAE,EAAE;IACjF,sBAAsB,CAAC,IAAI,CAAC,uDAAyB,EAAE,6DAA4B,CAAC,CAAA;AACtF,CAAC,CAAC,CAAA;AAEF,wEAA6C;AAC7C,2EAAgD;AAChD,8DAAmC;AACnC,gEAAqC;AACrC,wEAA6C","sourcesContent":["import session from 'koa-session'\nimport passport from 'koa-passport'\n\nimport { config } from '@things-factory/env'\nimport { SECRET } from '../utils/get-secret'\n\nimport { authenticate401Middleware } from './authenticate-401-middleware'\nimport { domainAuthenticateMiddleware } from './domain-authenticate-middleware'\nimport { graphqlAuthenticateMiddleware } from './graphql-authenticate-middleware'\nimport { jwtAuthenticateMiddleware } from './jwt-authenticate-middleware'\n\nimport { User } from '../service/user/user'\nimport { MAX_AGE } from '../constants/max-age'\n\nconst accessTokenCookieKey = config.get('accessTokenCookieKey', 'access_token')\n\nexport function initMiddlewares(app: any) {\n /* oauth2orize-koa 에서 oauth 트랜잭션 관리를 위해서 session을 사용함. */\n app.keys = [SECRET]\n app.use(\n session(\n {\n key: 'tfsession',\n maxAge: MAX_AGE,\n overwrite: true,\n httpOnly: true,\n signed: true,\n rolling: false,\n renew: false\n },\n app\n )\n )\n\n passport.serializeUser((profile, done) => {\n done(null, profile)\n })\n\n passport.deserializeUser(async (profile, done) => {\n done(null, await User.checkAuth(profile))\n })\n\n /* passport initialize */\n app.use(passport.initialize())\n\n /* passport use session - for oauth transaction */\n app.use(passport.session())\n\n /* authentication error handling */\n app.use(authenticate401Middleware)\n\n /*\n * post:graphql 에 대해서는 graphqlAuthenticationMiddleware를 적용한다.\n * graphql app을 router에 적용하지 못하기 때문임.\n */\n app.use(graphqlAuthenticateMiddleware)\n}\n\nprocess.on('bootstrap-module-subscription' as any, (app, subscriptionMiddleware) => {\n subscriptionMiddleware.push(jwtAuthenticateMiddleware, domainAuthenticateMiddleware)\n})\n\nexport * from './jwt-authenticate-middleware'\nexport * from './domain-authenticate-middleware'\nexport * from './signin-middleware'\nexport * from './webauthn-middleware'\nexport * from './authenticate-401-middleware'\n"]}
1
+ {"version":3,"file":"index.js","sourceRoot":"","sources":["../../server/middlewares/index.ts"],"names":[],"mappings":";;AAgBA,0CAwCC;;AAxDD,sEAAiC;AACjC,wEAAmC;AAEnC,6CAA4C;AAC5C,0DAA+C;AAE/C,qFAA4E;AAC5E,2FAAkF;AAClF,6FAAoF;AACpF,qFAA4E;AAE5E,qDAA8C;AAC9C,wDAAiD;AAEjD,MAAM,oBAAoB,GAAG,YAAM,CAAC,GAAG,CAAC,sBAAsB,EAAE,cAAc,CAAC,CAAA;AAE/E,SAAgB,eAAe,CAAC,GAAQ;IACtC,yDAAyD;IACzD,GAAG,CAAC,IAAI,GAAG,CAAC,sBAAM,CAAC,CAAA;IACnB,GAAG,CAAC,GAAG,CACL,IAAA,qBAAO,EACL;QACE,GAAG,EAAE,WAAW;QAChB,MAAM,EAAE,oBAAO;QACf,SAAS,EAAE,IAAI;QACf,QAAQ,EAAE,IAAI;QACd,MAAM,EAAE,IAAI;QACZ,OAAO,EAAE,KAAK;QACd,KAAK,EAAE,KAAK;KACb,EACD,GAAG,CACJ,CACF,CAAA;IAED,sBAAQ,CAAC,aAAa,CAAC,CAAC,OAAO,EAAE,IAAI,EAAE,EAAE;QACvC,IAAI,CAAC,IAAI,EAAE,OAAO,CAAC,CAAA;IACrB,CAAC,CAAC,CAAA;IAEF,sBAAQ,CAAC,eAAe,CAAC,KAAK,EAAE,OAAO,EAAE,IAAI,EAAE,EAAE;QAC/C,IAAI,CAAC,IAAI,EAAE,MAAM,cAAI,CAAC,SAAS,CAAC,OAAO,CAAC,CAAC,CAAA;IAC3C,CAAC,CAAC,CAAA;IAEF,yBAAyB;IACzB,GAAG,CAAC,GAAG,CAAC,sBAAQ,CAAC,UAAU,EAAE,CAAC,CAAA;IAE9B,kDAAkD;IAClD,GAAG,CAAC,GAAG,CAAC,sBAAQ,CAAC,OAAO,EAAE,CAAC,CAAA;IAE3B,mCAAmC;IACnC,GAAG,CAAC,GAAG,CAAC,0DAAyB,CAAC,CAAA;IAElC;;;OAGG;IACH,GAAG,CAAC,GAAG,CAAC,kEAA6B,CAAC,CAAA;AACxC,CAAC;AAED,OAAO,CAAC,EAAE,CAAC,+BAAsC,EAAE,CAAC,GAAG,EAAE,sBAAsB,EAAE,EAAE;IACjF,sBAAsB,CAAC,IAAI,CAAC,0DAAyB,EAAE,gEAA4B,CAAC,CAAA;AACtF,CAAC,CAAC,CAAA;AAEF,2EAAgD;AAChD,8EAAmD;AACnD,iEAAsC;AACtC,mEAAwC;AACxC,2EAAgD","sourcesContent":["import session from 'koa-session'\nimport passport from 'koa-passport'\n\nimport { config } from '@things-factory/env'\nimport { SECRET } from '../utils/get-secret.js'\n\nimport { authenticate401Middleware } from './authenticate-401-middleware.js'\nimport { domainAuthenticateMiddleware } from './domain-authenticate-middleware.js'\nimport { graphqlAuthenticateMiddleware } from './graphql-authenticate-middleware.js'\nimport { jwtAuthenticateMiddleware } from './jwt-authenticate-middleware.js'\n\nimport { User } from '../service/user/user.js'\nimport { MAX_AGE } from '../constants/max-age.js'\n\nconst accessTokenCookieKey = config.get('accessTokenCookieKey', 'access_token')\n\nexport function initMiddlewares(app: any) {\n /* oauth2orize-koa 에서 oauth 트랜잭션 관리를 위해서 session을 사용함. */\n app.keys = [SECRET]\n app.use(\n session(\n {\n key: 'tfsession',\n maxAge: MAX_AGE,\n overwrite: true,\n httpOnly: true,\n signed: true,\n rolling: false,\n renew: false\n },\n app\n )\n )\n\n passport.serializeUser((profile, done) => {\n done(null, profile)\n })\n\n passport.deserializeUser(async (profile, done) => {\n done(null, await User.checkAuth(profile))\n })\n\n /* passport initialize */\n app.use(passport.initialize())\n\n /* passport use session - for oauth transaction */\n app.use(passport.session())\n\n /* authentication error handling */\n app.use(authenticate401Middleware)\n\n /*\n * post:graphql 에 대해서는 graphqlAuthenticationMiddleware를 적용한다.\n * graphql app을 router에 적용하지 못하기 때문임.\n */\n app.use(graphqlAuthenticateMiddleware)\n}\n\nprocess.on('bootstrap-module-subscription' as any, (app, subscriptionMiddleware) => {\n subscriptionMiddleware.push(jwtAuthenticateMiddleware, domainAuthenticateMiddleware)\n})\n\nexport * from './jwt-authenticate-middleware.js'\nexport * from './domain-authenticate-middleware.js'\nexport * from './signin-middleware.js'\nexport * from './webauthn-middleware.js'\nexport * from './authenticate-401-middleware.js'\n"]}
@@ -5,15 +5,15 @@ const tslib_1 = require("tslib");
5
5
  const koa_passport_1 = tslib_1.__importDefault(require("koa-passport"));
6
6
  const passport_jwt_1 = require("passport-jwt");
7
7
  const env_1 = require("@things-factory/env");
8
- const make_verification_token_1 = require("../controllers/utils/make-verification-token");
9
- const save_verification_token_1 = require("../controllers/utils/save-verification-token");
10
- const user_1 = require("../service/user/user");
11
- const verification_token_1 = require("../service/verification-token/verification-token");
12
- const access_token_cookie_1 = require("../utils/access-token-cookie");
13
- const get_secret_1 = require("../utils/get-secret");
8
+ const make_verification_token_js_1 = require("../controllers/utils/make-verification-token.js");
9
+ const save_verification_token_js_1 = require("../controllers/utils/save-verification-token.js");
10
+ const user_js_1 = require("../service/user/user.js");
11
+ const verification_token_js_1 = require("../service/verification-token/verification-token.js");
12
+ const access_token_cookie_js_1 = require("../utils/access-token-cookie.js");
13
+ const get_secret_js_1 = require("../utils/get-secret.js");
14
14
  const sessionExpiryPolicy = env_1.config.get('session/expiryPolicy', 'fixed');
15
15
  koa_passport_1.default.use(new passport_jwt_1.Strategy({
16
- secretOrKey: get_secret_1.SECRET,
16
+ secretOrKey: get_secret_js_1.SECRET,
17
17
  passReqToCallback: true,
18
18
  jwtFromRequest: passport_jwt_1.ExtractJwt.fromExtractors([
19
19
  passport_jwt_1.ExtractJwt.fromAuthHeaderAsBearerToken(),
@@ -23,7 +23,7 @@ koa_passport_1.default.use(new passport_jwt_1.Strategy({
23
23
  passport_jwt_1.ExtractJwt.fromBodyField('access_token'),
24
24
  req => {
25
25
  var token = null;
26
- token = (0, access_token_cookie_1.getAccessTokenCookie)(req === null || req === void 0 ? void 0 : req.ctx);
26
+ token = (0, access_token_cookie_js_1.getAccessTokenCookie)(req === null || req === void 0 ? void 0 : req.ctx);
27
27
  return token;
28
28
  }
29
29
  ])
@@ -44,16 +44,16 @@ async function jwtAuthenticateMiddleware(context, next) {
44
44
  return await koa_passport_1.default.authenticate('jwt', { session: false }, async (err, decoded, info) => {
45
45
  if (err || !decoded) {
46
46
  const e = (context.state.error = err || info);
47
- (0, access_token_cookie_1.clearAccessTokenCookie)(context);
47
+ (0, access_token_cookie_js_1.clearAccessTokenCookie)(context);
48
48
  context.throw(401, e.message);
49
49
  }
50
50
  else {
51
- const userEntity = await user_1.User.checkAuth(decoded);
52
- if (userEntity.status === user_1.UserStatus.PWD_RESET_REQUIRED) {
51
+ const userEntity = await user_js_1.User.checkAuth(decoded);
52
+ if (userEntity.status === user_js_1.UserStatus.PWD_RESET_REQUIRED) {
53
53
  try {
54
- const token = (0, make_verification_token_1.makeVerificationToken)();
55
- await (0, save_verification_token_1.saveVerificationToken)(userEntity.id, token, verification_token_1.VerificationTokenType.PASSWORD_RESET);
56
- (0, access_token_cookie_1.clearAccessTokenCookie)(context);
54
+ const token = (0, make_verification_token_js_1.makeVerificationToken)();
55
+ await (0, save_verification_token_js_1.saveVerificationToken)(userEntity.id, token, verification_token_js_1.VerificationTokenType.PASSWORD_RESET);
56
+ (0, access_token_cookie_js_1.clearAccessTokenCookie)(context);
57
57
  context.redirect(`/auth/reset-password?token=${token}`);
58
58
  }
59
59
  catch (e) {
@@ -66,7 +66,7 @@ async function jwtAuthenticateMiddleware(context, next) {
66
66
  if (sessionExpiryPolicy == 'rolling') {
67
67
  /* To renew the expiry time on each request, a token is issued and the session is updated. */
68
68
  const token = await userEntity.sign();
69
- (0, access_token_cookie_1.setAccessTokenCookie)(context, token);
69
+ (0, access_token_cookie_js_1.setAccessTokenCookie)(context, token);
70
70
  }
71
71
  await next();
72
72
  }
@@ -1 +1 @@
1
- {"version":3,"file":"jwt-authenticate-middleware.js","sourceRoot":"","sources":["../../server/middlewares/jwt-authenticate-middleware.ts"],"names":[],"mappings":";;AA0CA,8DAyCC;;AAnFD,wEAAmC;AACnC,+CAAkE;AAElE,6CAA4C;AAE5C,0FAAoF;AACpF,0FAAoF;AACpF,+CAAuD;AACvD,yFAAwF;AACxF,sEAAiH;AACjH,oDAA4C;AAE5C,MAAM,mBAAmB,GAAG,YAAM,CAAC,GAAG,CAAC,sBAAsB,EAAE,OAAO,CAAC,CAAA;AAEvE,sBAAQ,CAAC,GAAG,CACV,IAAI,uBAAW,CACb;IACE,WAAW,EAAE,mBAAM;IACnB,iBAAiB,EAAE,IAAI;IACvB,cAAc,EAAE,yBAAU,CAAC,cAAc,CAAC;QACxC,yBAAU,CAAC,2BAA2B,EAAE;QACxC,yBAAU,CAAC,UAAU,CAAC,eAAe,CAAC;QACtC,yBAAU,CAAC,UAAU,CAAC,gBAAgB,CAAC;QACvC,yBAAU,CAAC,qBAAqB,CAAC,cAAc,CAAC;QAChD,yBAAU,CAAC,aAAa,CAAC,cAAc,CAAC;QACxC,GAAG,CAAC,EAAE;YACJ,IAAI,KAAK,GAAG,IAAI,CAAA;YAChB,KAAK,GAAG,IAAA,0CAAoB,EAAC,GAAG,aAAH,GAAG,uBAAH,GAAG,CAAE,GAAG,CAAC,CAAA;YACtC,OAAO,KAAK,CAAA;QACd,CAAC;KACF,CAAC;CACH,EACD,KAAK,EAAE,OAAO,EAAE,OAAO,EAAE,IAAI,EAAE,EAAE;IAC/B,IAAI,CAAC;QACH,OAAO,IAAI,CAAC,IAAI,EAAE,OAAO,CAAC,CAAA;IAC5B,CAAC;IAAC,OAAO,KAAK,EAAE,CAAC;QACf,OAAO,IAAI,CAAC,KAAK,CAAC,CAAA;IACpB,CAAC;AACH,CAAC,CACF,CACF,CAAA;AAEM,KAAK,UAAU,yBAAyB,CAAC,OAAO,EAAE,IAAI;IAC3D,MAAM,EAAE,IAAI,EAAE,GAAG,OAAO,CAAA;IACxB,MAAM,EAAE,IAAI,EAAE,GAAG,OAAO,CAAC,KAAK,CAAA;IAC9B,IAAI,IAAI,EAAE,CAAC;QACT,OAAO,MAAM,IAAI,EAAE,CAAA;IACrB,CAAC;IAED,OAAO,MAAM,sBAAQ,CAAC,YAAY,CAAC,KAAK,EAAE,EAAE,OAAO,EAAE,KAAK,EAAE,EAAE,KAAK,EAAE,GAAG,EAAE,OAAO,EAAE,IAAI,EAAE,EAAE;QACzF,IAAI,GAAG,IAAI,CAAC,OAAO,EAAE,CAAC;YACpB,MAAM,CAAC,GAAG,CAAC,OAAO,CAAC,KAAK,CAAC,KAAK,GAAG,GAAG,IAAI,IAAI,CAAC,CAAA;YAE7C,IAAA,4CAAsB,EAAC,OAAO,CAAC,CAAA;YAE/B,OAAO,CAAC,KAAK,CAAC,GAAG,EAAE,CAAC,CAAC,OAAO,CAAC,CAAA;QAC/B,CAAC;aAAM,CAAC;YACN,MAAM,UAAU,GAAG,MAAM,WAAI,CAAC,SAAS,CAAC,OAAO,CAAC,CAAA;YAEhD,IAAI,UAAU,CAAC,MAAM,KAAK,iBAAU,CAAC,kBAAkB,EAAE,CAAC;gBACxD,IAAI,CAAC;oBACH,MAAM,KAAK,GAAG,IAAA,+CAAqB,GAAE,CAAA;oBACrC,MAAM,IAAA,+CAAqB,EAAC,UAAU,CAAC,EAAE,EAAE,KAAK,EAAE,0CAAqB,CAAC,cAAc,CAAC,CAAA;oBACvF,IAAA,4CAAsB,EAAC,OAAO,CAAC,CAAA;oBAC/B,OAAO,CAAC,QAAQ,CAAC,8BAA8B,KAAK,EAAE,CAAC,CAAA;gBACzD,CAAC;gBAAC,OAAO,CAAC,EAAE,CAAC;oBACX,MAAM,GAAG,CAAA;gBACX,CAAC;YACH,CAAC;iBAAM,CAAC;gBACN,OAAO,CAAC,KAAK,CAAC,IAAI,GAAG,UAAU,CAAA;gBAC/B,OAAO,CAAC,KAAK,CAAC,YAAY,GAAG,OAAO,CAAA;gBAEpC,IAAI,mBAAmB,IAAI,SAAS,EAAE,CAAC;oBACrC,6FAA6F;oBAE7F,MAAM,KAAK,GAAG,MAAM,UAAU,CAAC,IAAI,EAAE,CAAA;oBACrC,IAAA,0CAAoB,EAAC,OAAO,EAAE,KAAK,CAAC,CAAA;gBACtC,CAAC;gBAED,MAAM,IAAI,EAAE,CAAA;YACd,CAAC;QACH,CAAC;IACH,CAAC,CAAC,CAAC,OAAO,EAAE,IAAI,CAAC,CAAA;AACnB,CAAC","sourcesContent":["import passport from 'koa-passport'\nimport { ExtractJwt, Strategy as JWTstrategy } from 'passport-jwt'\n\nimport { config } from '@things-factory/env'\n\nimport { makeVerificationToken } from '../controllers/utils/make-verification-token'\nimport { saveVerificationToken } from '../controllers/utils/save-verification-token'\nimport { User, UserStatus } from '../service/user/user'\nimport { VerificationTokenType } from '../service/verification-token/verification-token'\nimport { clearAccessTokenCookie, getAccessTokenCookie, setAccessTokenCookie } from '../utils/access-token-cookie'\nimport { SECRET } from '../utils/get-secret'\n\nconst sessionExpiryPolicy = config.get('session/expiryPolicy', 'fixed')\n\npassport.use(\n new JWTstrategy(\n {\n secretOrKey: SECRET,\n passReqToCallback: true,\n jwtFromRequest: ExtractJwt.fromExtractors([\n ExtractJwt.fromAuthHeaderAsBearerToken(),\n ExtractJwt.fromHeader('authorization'),\n ExtractJwt.fromHeader('x-access-token'),\n ExtractJwt.fromUrlQueryParameter('access_token'),\n ExtractJwt.fromBodyField('access_token'),\n req => {\n var token = null\n token = getAccessTokenCookie(req?.ctx)\n return token\n }\n ])\n },\n async (request, decoded, done) => {\n try {\n return done(null, decoded)\n } catch (error) {\n return done(error)\n }\n }\n )\n)\n\nexport async function jwtAuthenticateMiddleware(context, next) {\n const { path } = context\n const { user } = context.state\n if (user) {\n return await next()\n }\n\n return await passport.authenticate('jwt', { session: false }, async (err, decoded, info) => {\n if (err || !decoded) {\n const e = (context.state.error = err || info)\n\n clearAccessTokenCookie(context)\n\n context.throw(401, e.message)\n } else {\n const userEntity = await User.checkAuth(decoded)\n\n if (userEntity.status === UserStatus.PWD_RESET_REQUIRED) {\n try {\n const token = makeVerificationToken()\n await saveVerificationToken(userEntity.id, token, VerificationTokenType.PASSWORD_RESET)\n clearAccessTokenCookie(context)\n context.redirect(`/auth/reset-password?token=${token}`)\n } catch (e) {\n throw err\n }\n } else {\n context.state.user = userEntity\n context.state.decodedToken = decoded\n\n if (sessionExpiryPolicy == 'rolling') {\n /* To renew the expiry time on each request, a token is issued and the session is updated. */\n\n const token = await userEntity.sign()\n setAccessTokenCookie(context, token)\n }\n\n await next()\n }\n }\n })(context, next)\n}\n"]}
1
+ {"version":3,"file":"jwt-authenticate-middleware.js","sourceRoot":"","sources":["../../server/middlewares/jwt-authenticate-middleware.ts"],"names":[],"mappings":";;AA0CA,8DAyCC;;AAnFD,wEAAmC;AACnC,+CAAkE;AAElE,6CAA4C;AAE5C,gGAAuF;AACvF,gGAAuF;AACvF,qDAA0D;AAC1D,+FAA2F;AAC3F,4EAAoH;AACpH,0DAA+C;AAE/C,MAAM,mBAAmB,GAAG,YAAM,CAAC,GAAG,CAAC,sBAAsB,EAAE,OAAO,CAAC,CAAA;AAEvE,sBAAQ,CAAC,GAAG,CACV,IAAI,uBAAW,CACb;IACE,WAAW,EAAE,sBAAM;IACnB,iBAAiB,EAAE,IAAI;IACvB,cAAc,EAAE,yBAAU,CAAC,cAAc,CAAC;QACxC,yBAAU,CAAC,2BAA2B,EAAE;QACxC,yBAAU,CAAC,UAAU,CAAC,eAAe,CAAC;QACtC,yBAAU,CAAC,UAAU,CAAC,gBAAgB,CAAC;QACvC,yBAAU,CAAC,qBAAqB,CAAC,cAAc,CAAC;QAChD,yBAAU,CAAC,aAAa,CAAC,cAAc,CAAC;QACxC,GAAG,CAAC,EAAE;YACJ,IAAI,KAAK,GAAG,IAAI,CAAA;YAChB,KAAK,GAAG,IAAA,6CAAoB,EAAC,GAAG,aAAH,GAAG,uBAAH,GAAG,CAAE,GAAG,CAAC,CAAA;YACtC,OAAO,KAAK,CAAA;QACd,CAAC;KACF,CAAC;CACH,EACD,KAAK,EAAE,OAAO,EAAE,OAAO,EAAE,IAAI,EAAE,EAAE;IAC/B,IAAI,CAAC;QACH,OAAO,IAAI,CAAC,IAAI,EAAE,OAAO,CAAC,CAAA;IAC5B,CAAC;IAAC,OAAO,KAAK,EAAE,CAAC;QACf,OAAO,IAAI,CAAC,KAAK,CAAC,CAAA;IACpB,CAAC;AACH,CAAC,CACF,CACF,CAAA;AAEM,KAAK,UAAU,yBAAyB,CAAC,OAAO,EAAE,IAAI;IAC3D,MAAM,EAAE,IAAI,EAAE,GAAG,OAAO,CAAA;IACxB,MAAM,EAAE,IAAI,EAAE,GAAG,OAAO,CAAC,KAAK,CAAA;IAC9B,IAAI,IAAI,EAAE,CAAC;QACT,OAAO,MAAM,IAAI,EAAE,CAAA;IACrB,CAAC;IAED,OAAO,MAAM,sBAAQ,CAAC,YAAY,CAAC,KAAK,EAAE,EAAE,OAAO,EAAE,KAAK,EAAE,EAAE,KAAK,EAAE,GAAG,EAAE,OAAO,EAAE,IAAI,EAAE,EAAE;QACzF,IAAI,GAAG,IAAI,CAAC,OAAO,EAAE,CAAC;YACpB,MAAM,CAAC,GAAG,CAAC,OAAO,CAAC,KAAK,CAAC,KAAK,GAAG,GAAG,IAAI,IAAI,CAAC,CAAA;YAE7C,IAAA,+CAAsB,EAAC,OAAO,CAAC,CAAA;YAE/B,OAAO,CAAC,KAAK,CAAC,GAAG,EAAE,CAAC,CAAC,OAAO,CAAC,CAAA;QAC/B,CAAC;aAAM,CAAC;YACN,MAAM,UAAU,GAAG,MAAM,cAAI,CAAC,SAAS,CAAC,OAAO,CAAC,CAAA;YAEhD,IAAI,UAAU,CAAC,MAAM,KAAK,oBAAU,CAAC,kBAAkB,EAAE,CAAC;gBACxD,IAAI,CAAC;oBACH,MAAM,KAAK,GAAG,IAAA,kDAAqB,GAAE,CAAA;oBACrC,MAAM,IAAA,kDAAqB,EAAC,UAAU,CAAC,EAAE,EAAE,KAAK,EAAE,6CAAqB,CAAC,cAAc,CAAC,CAAA;oBACvF,IAAA,+CAAsB,EAAC,OAAO,CAAC,CAAA;oBAC/B,OAAO,CAAC,QAAQ,CAAC,8BAA8B,KAAK,EAAE,CAAC,CAAA;gBACzD,CAAC;gBAAC,OAAO,CAAC,EAAE,CAAC;oBACX,MAAM,GAAG,CAAA;gBACX,CAAC;YACH,CAAC;iBAAM,CAAC;gBACN,OAAO,CAAC,KAAK,CAAC,IAAI,GAAG,UAAU,CAAA;gBAC/B,OAAO,CAAC,KAAK,CAAC,YAAY,GAAG,OAAO,CAAA;gBAEpC,IAAI,mBAAmB,IAAI,SAAS,EAAE,CAAC;oBACrC,6FAA6F;oBAE7F,MAAM,KAAK,GAAG,MAAM,UAAU,CAAC,IAAI,EAAE,CAAA;oBACrC,IAAA,6CAAoB,EAAC,OAAO,EAAE,KAAK,CAAC,CAAA;gBACtC,CAAC;gBAED,MAAM,IAAI,EAAE,CAAA;YACd,CAAC;QACH,CAAC;IACH,CAAC,CAAC,CAAC,OAAO,EAAE,IAAI,CAAC,CAAA;AACnB,CAAC","sourcesContent":["import passport from 'koa-passport'\nimport { ExtractJwt, Strategy as JWTstrategy } from 'passport-jwt'\n\nimport { config } from '@things-factory/env'\n\nimport { makeVerificationToken } from '../controllers/utils/make-verification-token.js'\nimport { saveVerificationToken } from '../controllers/utils/save-verification-token.js'\nimport { User, UserStatus } from '../service/user/user.js'\nimport { VerificationTokenType } from '../service/verification-token/verification-token.js'\nimport { clearAccessTokenCookie, getAccessTokenCookie, setAccessTokenCookie } from '../utils/access-token-cookie.js'\nimport { SECRET } from '../utils/get-secret.js'\n\nconst sessionExpiryPolicy = config.get('session/expiryPolicy', 'fixed')\n\npassport.use(\n new JWTstrategy(\n {\n secretOrKey: SECRET,\n passReqToCallback: true,\n jwtFromRequest: ExtractJwt.fromExtractors([\n ExtractJwt.fromAuthHeaderAsBearerToken(),\n ExtractJwt.fromHeader('authorization'),\n ExtractJwt.fromHeader('x-access-token'),\n ExtractJwt.fromUrlQueryParameter('access_token'),\n ExtractJwt.fromBodyField('access_token'),\n req => {\n var token = null\n token = getAccessTokenCookie(req?.ctx)\n return token\n }\n ])\n },\n async (request, decoded, done) => {\n try {\n return done(null, decoded)\n } catch (error) {\n return done(error)\n }\n }\n )\n)\n\nexport async function jwtAuthenticateMiddleware(context, next) {\n const { path } = context\n const { user } = context.state\n if (user) {\n return await next()\n }\n\n return await passport.authenticate('jwt', { session: false }, async (err, decoded, info) => {\n if (err || !decoded) {\n const e = (context.state.error = err || info)\n\n clearAccessTokenCookie(context)\n\n context.throw(401, e.message)\n } else {\n const userEntity = await User.checkAuth(decoded)\n\n if (userEntity.status === UserStatus.PWD_RESET_REQUIRED) {\n try {\n const token = makeVerificationToken()\n await saveVerificationToken(userEntity.id, token, VerificationTokenType.PASSWORD_RESET)\n clearAccessTokenCookie(context)\n context.redirect(`/auth/reset-password?token=${token}`)\n } catch (e) {\n throw err\n }\n } else {\n context.state.user = userEntity\n context.state.decodedToken = decoded\n\n if (sessionExpiryPolicy == 'rolling') {\n /* To renew the expiry time on each request, a token is issued and the session is updated. */\n\n const token = await userEntity.sign()\n setAccessTokenCookie(context, token)\n }\n\n await next()\n }\n }\n })(context, next)\n}\n"]}
@@ -4,14 +4,14 @@ exports.signinMiddleware = signinMiddleware;
4
4
  const tslib_1 = require("tslib");
5
5
  const koa_passport_1 = tslib_1.__importDefault(require("koa-passport"));
6
6
  const passport_local_1 = require("passport-local");
7
- const signin_1 = require("../controllers/signin");
7
+ const signin_js_1 = require("../controllers/signin.js");
8
8
  koa_passport_1.default.use('signin', new passport_local_1.Strategy({
9
9
  usernameField: 'username',
10
10
  passwordField: 'password',
11
11
  passReqToCallback: true
12
12
  }, async (req, username, password, done) => {
13
13
  try {
14
- const { user: userInfo, token, domains } = await (0, signin_1.signin)({
14
+ const { user: userInfo, token, domains } = await (0, signin_js_1.signin)({
15
15
  username,
16
16
  password
17
17
  });
@@ -1 +1 @@
1
- {"version":3,"file":"signin-middleware.js","sourceRoot":"","sources":["../../server/middlewares/signin-middleware.ts"],"names":[],"mappings":";;AA0CA,4CAaC;;AAvDD,wEAAmC;AACnC,mDAA0D;AAE1D,kDAA8C;AAE9C,sBAAQ,CAAC,GAAG,CACV,QAAQ,EACR,IAAI,yBAAa,CACf;IACE,aAAa,EAAE,UAAU;IACzB,aAAa,EAAE,UAAU;IACzB,iBAAiB,EAAE,IAAI;CACxB,EACD,KAAK,EAAE,GAAG,EAAE,QAAQ,EAAE,QAAQ,EAAE,IAAI,EAAE,EAAE;IACtC,IAAI,CAAC;QACH,MAAM,EACJ,IAAI,EAAE,QAAQ,EACd,KAAK,EACL,OAAO,EACR,GAAG,MAAM,IAAA,eAAM,EAAC;YACf,QAAQ;YACR,QAAQ;SACT,CAAC,CAAA;QAEF,OAAO,IAAI,CACT,IAAI,EACJ;YACE,IAAI,EAAE,QAAQ;YACd,KAAK;YACL,OAAO;SACR,EACD;YACE,OAAO,EAAE,wBAAwB;SAClC,CACF,CAAA;IACH,CAAC;IAAC,OAAO,KAAK,EAAE,CAAC;QACf,OAAO,IAAI,CAAC,KAAK,CAAC,CAAA;IACpB,CAAC;AACH,CAAC,CACF,CACF,CAAA;AAEM,KAAK,UAAU,gBAAgB,CAAC,OAAO,EAAE,IAAI;IAClD,OAAO,sBAAQ,CAAC,YAAY,CAAC,QAAQ,EAAE,EAAE,OAAO,EAAE,KAAK,EAAE,EAAE,KAAK,EAAE,GAAG,EAAE,IAAI,EAAE,IAAI,EAAE,EAAE;QACnF,IAAI,GAAG,IAAI,CAAC,IAAI,EAAE,CAAC;YACjB,MAAM,GAAG,CAAA;QACX,CAAC;aAAM,CAAC;YACN,MAAM,EAAE,IAAI,EAAE,QAAQ,EAAE,KAAK,EAAE,GAAG,IAAI,CAAA;YAEtC,OAAO,CAAC,KAAK,CAAC,IAAI,GAAG,QAAQ,CAAA;YAC7B,OAAO,CAAC,KAAK,CAAC,KAAK,GAAG,KAAK,CAAA;YAE3B,MAAM,IAAI,EAAE,CAAA;QACd,CAAC;IACH,CAAC,CAAC,CAAC,OAAO,EAAE,IAAI,CAAC,CAAA;AACnB,CAAC","sourcesContent":["import passport from 'koa-passport'\nimport { Strategy as localStrategy } from 'passport-local'\n\nimport { signin } from '../controllers/signin'\n\npassport.use(\n 'signin',\n new localStrategy(\n {\n usernameField: 'username',\n passwordField: 'password',\n passReqToCallback: true\n },\n async (req, username, password, done) => {\n try {\n const {\n user: userInfo,\n token,\n domains\n } = await signin({\n username,\n password\n })\n\n return done(\n null,\n {\n user: userInfo,\n token,\n domains\n },\n {\n message: 'Logged in Successfully'\n }\n )\n } catch (error) {\n return done(error)\n }\n }\n )\n)\n\nexport async function signinMiddleware(context, next) {\n return passport.authenticate('signin', { session: false }, async (err, user, info) => {\n if (err || !user) {\n throw err\n } else {\n const { user: userInfo, token } = user\n\n context.state.user = userInfo\n context.state.token = token\n\n await next()\n }\n })(context, next)\n}\n"]}
1
+ {"version":3,"file":"signin-middleware.js","sourceRoot":"","sources":["../../server/middlewares/signin-middleware.ts"],"names":[],"mappings":";;AA0CA,4CAaC;;AAvDD,wEAAmC;AACnC,mDAA0D;AAE1D,wDAAiD;AAEjD,sBAAQ,CAAC,GAAG,CACV,QAAQ,EACR,IAAI,yBAAa,CACf;IACE,aAAa,EAAE,UAAU;IACzB,aAAa,EAAE,UAAU;IACzB,iBAAiB,EAAE,IAAI;CACxB,EACD,KAAK,EAAE,GAAG,EAAE,QAAQ,EAAE,QAAQ,EAAE,IAAI,EAAE,EAAE;IACtC,IAAI,CAAC;QACH,MAAM,EACJ,IAAI,EAAE,QAAQ,EACd,KAAK,EACL,OAAO,EACR,GAAG,MAAM,IAAA,kBAAM,EAAC;YACf,QAAQ;YACR,QAAQ;SACT,CAAC,CAAA;QAEF,OAAO,IAAI,CACT,IAAI,EACJ;YACE,IAAI,EAAE,QAAQ;YACd,KAAK;YACL,OAAO;SACR,EACD;YACE,OAAO,EAAE,wBAAwB;SAClC,CACF,CAAA;IACH,CAAC;IAAC,OAAO,KAAK,EAAE,CAAC;QACf,OAAO,IAAI,CAAC,KAAK,CAAC,CAAA;IACpB,CAAC;AACH,CAAC,CACF,CACF,CAAA;AAEM,KAAK,UAAU,gBAAgB,CAAC,OAAO,EAAE,IAAI;IAClD,OAAO,sBAAQ,CAAC,YAAY,CAAC,QAAQ,EAAE,EAAE,OAAO,EAAE,KAAK,EAAE,EAAE,KAAK,EAAE,GAAG,EAAE,IAAI,EAAE,IAAI,EAAE,EAAE;QACnF,IAAI,GAAG,IAAI,CAAC,IAAI,EAAE,CAAC;YACjB,MAAM,GAAG,CAAA;QACX,CAAC;aAAM,CAAC;YACN,MAAM,EAAE,IAAI,EAAE,QAAQ,EAAE,KAAK,EAAE,GAAG,IAAI,CAAA;YAEtC,OAAO,CAAC,KAAK,CAAC,IAAI,GAAG,QAAQ,CAAA;YAC7B,OAAO,CAAC,KAAK,CAAC,KAAK,GAAG,KAAK,CAAA;YAE3B,MAAM,IAAI,EAAE,CAAA;QACd,CAAC;IACH,CAAC,CAAC,CAAC,OAAO,EAAE,IAAI,CAAC,CAAA;AACnB,CAAC","sourcesContent":["import passport from 'koa-passport'\nimport { Strategy as localStrategy } from 'passport-local'\n\nimport { signin } from '../controllers/signin.js'\n\npassport.use(\n 'signin',\n new localStrategy(\n {\n usernameField: 'username',\n passwordField: 'password',\n passReqToCallback: true\n },\n async (req, username, password, done) => {\n try {\n const {\n user: userInfo,\n token,\n domains\n } = await signin({\n username,\n password\n })\n\n return done(\n null,\n {\n user: userInfo,\n token,\n domains\n },\n {\n message: 'Logged in Successfully'\n }\n )\n } catch (error) {\n return done(error)\n }\n }\n )\n)\n\nexport async function signinMiddleware(context, next) {\n return passport.authenticate('signin', { session: false }, async (err, user, info) => {\n if (err || !user) {\n throw err\n } else {\n const { user: userInfo, token } = user\n\n context.state.user = userInfo\n context.state.token = token\n\n await next()\n }\n })(context, next)\n}\n"]}
@@ -0,0 +1,3 @@
1
+ export declare function verifyRecaptcaMiddleware({ action }: {
2
+ action: string;
3
+ }): (context: any, next: any) => Promise<void>;