@things-factory/auth-base 9.0.0-beta.5 → 9.0.0-beta.8

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (329) hide show
  1. package/config/config.development.js +45 -0
  2. package/config/config.production.js +45 -0
  3. package/dist-client/bootstrap.d.ts +1 -1
  4. package/dist-client/bootstrap.js +4 -4
  5. package/dist-client/bootstrap.js.map +1 -1
  6. package/dist-client/directive/privileged.d.ts +1 -1
  7. package/dist-client/directive/privileged.js +1 -1
  8. package/dist-client/directive/privileged.js.map +1 -1
  9. package/dist-client/index.d.ts +4 -4
  10. package/dist-client/index.js +4 -4
  11. package/dist-client/index.js.map +1 -1
  12. package/dist-client/profiled.js +1 -1
  13. package/dist-client/profiled.js.map +1 -1
  14. package/dist-client/reducers/auth.js +1 -1
  15. package/dist-client/reducers/auth.js.map +1 -1
  16. package/dist-client/tsconfig.tsbuildinfo +1 -1
  17. package/dist-server/controllers/auth.d.ts +5 -5
  18. package/dist-server/controllers/auth.js +5 -5
  19. package/dist-server/controllers/auth.js.map +1 -1
  20. package/dist-server/controllers/change-pwd.js +19 -19
  21. package/dist-server/controllers/change-pwd.js.map +1 -1
  22. package/dist-server/controllers/checkin.js +4 -4
  23. package/dist-server/controllers/checkin.js.map +1 -1
  24. package/dist-server/controllers/delete-user.js +9 -9
  25. package/dist-server/controllers/delete-user.js.map +1 -1
  26. package/dist-server/controllers/invitation.js +19 -19
  27. package/dist-server/controllers/invitation.js.map +1 -1
  28. package/dist-server/controllers/profile.d.ts +5 -5
  29. package/dist-server/controllers/profile.js +10 -10
  30. package/dist-server/controllers/profile.js.map +1 -1
  31. package/dist-server/controllers/reset-password.js +24 -24
  32. package/dist-server/controllers/reset-password.js.map +1 -1
  33. package/dist-server/controllers/signin.d.ts +1 -1
  34. package/dist-server/controllers/signin.js +24 -24
  35. package/dist-server/controllers/signin.js.map +1 -1
  36. package/dist-server/controllers/signup.d.ts +1 -1
  37. package/dist-server/controllers/signup.js +13 -13
  38. package/dist-server/controllers/signup.js.map +1 -1
  39. package/dist-server/controllers/unlock-user.js +17 -17
  40. package/dist-server/controllers/unlock-user.js.map +1 -1
  41. package/dist-server/controllers/utils/password-rule.js +4 -4
  42. package/dist-server/controllers/utils/password-rule.js.map +1 -1
  43. package/dist-server/controllers/utils/save-invitation-token.d.ts +1 -1
  44. package/dist-server/controllers/utils/save-invitation-token.js +2 -2
  45. package/dist-server/controllers/utils/save-invitation-token.js.map +1 -1
  46. package/dist-server/controllers/utils/save-verification-token.d.ts +1 -1
  47. package/dist-server/controllers/utils/save-verification-token.js +3 -3
  48. package/dist-server/controllers/utils/save-verification-token.js.map +1 -1
  49. package/dist-server/controllers/verification.js +23 -23
  50. package/dist-server/controllers/verification.js.map +1 -1
  51. package/dist-server/errors/auth-error.js +1 -1
  52. package/dist-server/errors/auth-error.js.map +1 -1
  53. package/dist-server/errors/index.d.ts +2 -2
  54. package/dist-server/errors/index.js +2 -2
  55. package/dist-server/errors/index.js.map +1 -1
  56. package/dist-server/errors/user-domain-not-match-error.d.ts +1 -1
  57. package/dist-server/errors/user-domain-not-match-error.js +8 -8
  58. package/dist-server/errors/user-domain-not-match-error.js.map +1 -1
  59. package/dist-server/index.d.ts +16 -16
  60. package/dist-server/index.js +18 -18
  61. package/dist-server/index.js.map +1 -1
  62. package/dist-server/middlewares/authenticate-401-middleware.js +11 -11
  63. package/dist-server/middlewares/authenticate-401-middleware.js.map +1 -1
  64. package/dist-server/middlewares/domain-authenticate-middleware.d.ts +1 -1
  65. package/dist-server/middlewares/domain-authenticate-middleware.js +9 -9
  66. package/dist-server/middlewares/domain-authenticate-middleware.js.map +1 -1
  67. package/dist-server/middlewares/graphql-authenticate-middleware.js +4 -4
  68. package/dist-server/middlewares/graphql-authenticate-middleware.js.map +1 -1
  69. package/dist-server/middlewares/index.d.ts +5 -5
  70. package/dist-server/middlewares/index.js +18 -18
  71. package/dist-server/middlewares/index.js.map +1 -1
  72. package/dist-server/middlewares/jwt-authenticate-middleware.js +15 -15
  73. package/dist-server/middlewares/jwt-authenticate-middleware.js.map +1 -1
  74. package/dist-server/middlewares/signin-middleware.js +2 -2
  75. package/dist-server/middlewares/signin-middleware.js.map +1 -1
  76. package/dist-server/middlewares/verify-recaptcha-middleware.d.ts +3 -0
  77. package/dist-server/middlewares/verify-recaptcha-middleware.js +95 -0
  78. package/dist-server/middlewares/verify-recaptcha-middleware.js.map +1 -0
  79. package/dist-server/middlewares/webauthn-middleware.js +7 -7
  80. package/dist-server/middlewares/webauthn-middleware.js.map +1 -1
  81. package/dist-server/migrations/1548206416130-SeedUser.js +6 -6
  82. package/dist-server/migrations/1548206416130-SeedUser.js.map +1 -1
  83. package/dist-server/migrations/1566805283882-SeedPrivilege.js +2 -2
  84. package/dist-server/migrations/1566805283882-SeedPrivilege.js.map +1 -1
  85. package/dist-server/migrations/index.js.map +1 -1
  86. package/dist-server/router/auth-checkin-router.js +10 -10
  87. package/dist-server/router/auth-checkin-router.js.map +1 -1
  88. package/dist-server/router/auth-private-process-router.js +15 -15
  89. package/dist-server/router/auth-private-process-router.js.map +1 -1
  90. package/dist-server/router/auth-public-process-router.js +24 -24
  91. package/dist-server/router/auth-public-process-router.js.map +1 -1
  92. package/dist-server/router/auth-signin-router.js +6 -6
  93. package/dist-server/router/auth-signin-router.js.map +1 -1
  94. package/dist-server/router/auth-signup-router.js +11 -8
  95. package/dist-server/router/auth-signup-router.js.map +1 -1
  96. package/dist-server/router/index.d.ts +9 -9
  97. package/dist-server/router/index.js +9 -9
  98. package/dist-server/router/index.js.map +1 -1
  99. package/dist-server/router/oauth2/index.d.ts +2 -2
  100. package/dist-server/router/oauth2/index.js +2 -2
  101. package/dist-server/router/oauth2/index.js.map +1 -1
  102. package/dist-server/router/oauth2/oauth2-authorize-router.js +6 -6
  103. package/dist-server/router/oauth2/oauth2-authorize-router.js.map +1 -1
  104. package/dist-server/router/oauth2/oauth2-router.d.ts +1 -1
  105. package/dist-server/router/oauth2/oauth2-router.js +21 -21
  106. package/dist-server/router/oauth2/oauth2-router.js.map +1 -1
  107. package/dist-server/router/oauth2/oauth2-server.js +21 -21
  108. package/dist-server/router/oauth2/oauth2-server.js.map +1 -1
  109. package/dist-server/router/site-root-router.js +4 -4
  110. package/dist-server/router/site-root-router.js.map +1 -1
  111. package/dist-server/router/webauthn-router.js +9 -9
  112. package/dist-server/router/webauthn-router.js.map +1 -1
  113. package/dist-server/routes.js +19 -19
  114. package/dist-server/routes.js.map +1 -1
  115. package/dist-server/service/app-binding/app-binding-mutation.js +4 -4
  116. package/dist-server/service/app-binding/app-binding-mutation.js.map +1 -1
  117. package/dist-server/service/app-binding/app-binding-query.d.ts +4 -4
  118. package/dist-server/service/app-binding/app-binding-query.js +22 -22
  119. package/dist-server/service/app-binding/app-binding-query.js.map +1 -1
  120. package/dist-server/service/app-binding/app-binding-types.d.ts +1 -1
  121. package/dist-server/service/app-binding/app-binding-types.js +2 -2
  122. package/dist-server/service/app-binding/app-binding-types.js.map +1 -1
  123. package/dist-server/service/app-binding/app-binding.d.ts +2 -2
  124. package/dist-server/service/app-binding/app-binding.js +4 -4
  125. package/dist-server/service/app-binding/app-binding.js.map +1 -1
  126. package/dist-server/service/app-binding/index.d.ts +2 -2
  127. package/dist-server/service/app-binding/index.js +3 -3
  128. package/dist-server/service/app-binding/index.js.map +1 -1
  129. package/dist-server/service/appliance/appliance-mutation.d.ts +2 -2
  130. package/dist-server/service/appliance/appliance-mutation.js +21 -21
  131. package/dist-server/service/appliance/appliance-mutation.js.map +1 -1
  132. package/dist-server/service/appliance/appliance-query.d.ts +3 -3
  133. package/dist-server/service/appliance/appliance-query.js +17 -17
  134. package/dist-server/service/appliance/appliance-query.js.map +1 -1
  135. package/dist-server/service/appliance/appliance-types.d.ts +1 -1
  136. package/dist-server/service/appliance/appliance-types.js +2 -2
  137. package/dist-server/service/appliance/appliance-types.js.map +1 -1
  138. package/dist-server/service/appliance/appliance.d.ts +1 -1
  139. package/dist-server/service/appliance/appliance.js +8 -8
  140. package/dist-server/service/appliance/appliance.js.map +1 -1
  141. package/dist-server/service/appliance/index.d.ts +3 -3
  142. package/dist-server/service/appliance/index.js +5 -5
  143. package/dist-server/service/appliance/index.js.map +1 -1
  144. package/dist-server/service/application/application-mutation.d.ts +8 -8
  145. package/dist-server/service/application/application-mutation.js +20 -20
  146. package/dist-server/service/application/application-mutation.js.map +1 -1
  147. package/dist-server/service/application/application-query.d.ts +2 -2
  148. package/dist-server/service/application/application-query.js +16 -16
  149. package/dist-server/service/application/application-query.js.map +1 -1
  150. package/dist-server/service/application/application-types.d.ts +1 -1
  151. package/dist-server/service/application/application-types.js +4 -4
  152. package/dist-server/service/application/application-types.js.map +1 -1
  153. package/dist-server/service/application/application.d.ts +1 -1
  154. package/dist-server/service/application/application.js +12 -12
  155. package/dist-server/service/application/application.js.map +1 -1
  156. package/dist-server/service/application/index.d.ts +3 -3
  157. package/dist-server/service/application/index.js +5 -5
  158. package/dist-server/service/application/index.js.map +1 -1
  159. package/dist-server/service/auth-provider/auth-provider-mutation.d.ts +2 -2
  160. package/dist-server/service/auth-provider/auth-provider-mutation.js +20 -20
  161. package/dist-server/service/auth-provider/auth-provider-mutation.js.map +1 -1
  162. package/dist-server/service/auth-provider/auth-provider-query.d.ts +3 -3
  163. package/dist-server/service/auth-provider/auth-provider-query.js +20 -20
  164. package/dist-server/service/auth-provider/auth-provider-query.js.map +1 -1
  165. package/dist-server/service/auth-provider/auth-provider-type.d.ts +1 -1
  166. package/dist-server/service/auth-provider/auth-provider-type.js +2 -2
  167. package/dist-server/service/auth-provider/auth-provider-type.js.map +1 -1
  168. package/dist-server/service/auth-provider/auth-provider.d.ts +3 -3
  169. package/dist-server/service/auth-provider/auth-provider.js +12 -12
  170. package/dist-server/service/auth-provider/auth-provider.js.map +1 -1
  171. package/dist-server/service/auth-provider/index.d.ts +3 -3
  172. package/dist-server/service/auth-provider/index.js +5 -5
  173. package/dist-server/service/auth-provider/index.js.map +1 -1
  174. package/dist-server/service/domain-generator/domain-generator-mutation.d.ts +1 -1
  175. package/dist-server/service/domain-generator/domain-generator-mutation.js +11 -11
  176. package/dist-server/service/domain-generator/domain-generator-mutation.js.map +1 -1
  177. package/dist-server/service/domain-generator/domain-generator-types.d.ts +1 -1
  178. package/dist-server/service/domain-generator/domain-generator-types.js +3 -3
  179. package/dist-server/service/domain-generator/domain-generator-types.js.map +1 -1
  180. package/dist-server/service/domain-generator/index.d.ts +1 -1
  181. package/dist-server/service/domain-generator/index.js +2 -2
  182. package/dist-server/service/domain-generator/index.js.map +1 -1
  183. package/dist-server/service/granted-role/granted-role-mutation.d.ts +3 -3
  184. package/dist-server/service/granted-role/granted-role-mutation.js +17 -17
  185. package/dist-server/service/granted-role/granted-role-mutation.js.map +1 -1
  186. package/dist-server/service/granted-role/granted-role-query.d.ts +2 -2
  187. package/dist-server/service/granted-role/granted-role-query.js +13 -13
  188. package/dist-server/service/granted-role/granted-role-query.js.map +1 -1
  189. package/dist-server/service/granted-role/granted-role.d.ts +1 -1
  190. package/dist-server/service/granted-role/granted-role.js +3 -3
  191. package/dist-server/service/granted-role/granted-role.js.map +1 -1
  192. package/dist-server/service/granted-role/index.d.ts +3 -3
  193. package/dist-server/service/granted-role/index.js +5 -5
  194. package/dist-server/service/granted-role/index.js.map +1 -1
  195. package/dist-server/service/index.d.ts +25 -25
  196. package/dist-server/service/index.js +70 -70
  197. package/dist-server/service/index.js.map +1 -1
  198. package/dist-server/service/invitation/index.d.ts +3 -3
  199. package/dist-server/service/invitation/index.js +5 -5
  200. package/dist-server/service/invitation/index.js.map +1 -1
  201. package/dist-server/service/invitation/invitation-mutation.d.ts +2 -2
  202. package/dist-server/service/invitation/invitation-mutation.js +10 -10
  203. package/dist-server/service/invitation/invitation-mutation.js.map +1 -1
  204. package/dist-server/service/invitation/invitation-query.d.ts +1 -1
  205. package/dist-server/service/invitation/invitation-query.js +7 -7
  206. package/dist-server/service/invitation/invitation-query.js.map +1 -1
  207. package/dist-server/service/invitation/invitation-types.d.ts +1 -1
  208. package/dist-server/service/invitation/invitation-types.js +2 -2
  209. package/dist-server/service/invitation/invitation-types.js.map +1 -1
  210. package/dist-server/service/invitation/invitation.d.ts +1 -1
  211. package/dist-server/service/invitation/invitation.js +5 -5
  212. package/dist-server/service/invitation/invitation.js.map +1 -1
  213. package/dist-server/service/login-history/index.d.ts +2 -2
  214. package/dist-server/service/login-history/index.js +4 -4
  215. package/dist-server/service/login-history/index.js.map +1 -1
  216. package/dist-server/service/login-history/login-history-query.d.ts +3 -3
  217. package/dist-server/service/login-history/login-history-query.js +11 -11
  218. package/dist-server/service/login-history/login-history-query.js.map +1 -1
  219. package/dist-server/service/login-history/login-history-type.d.ts +1 -1
  220. package/dist-server/service/login-history/login-history-type.js +2 -2
  221. package/dist-server/service/login-history/login-history-type.js.map +1 -1
  222. package/dist-server/service/login-history/login-history.d.ts +1 -1
  223. package/dist-server/service/login-history/login-history.js +4 -4
  224. package/dist-server/service/login-history/login-history.js.map +1 -1
  225. package/dist-server/service/partner/index.d.ts +3 -3
  226. package/dist-server/service/partner/index.js +5 -5
  227. package/dist-server/service/partner/index.js.map +1 -1
  228. package/dist-server/service/partner/partner-mutation.js +8 -8
  229. package/dist-server/service/partner/partner-mutation.js.map +1 -1
  230. package/dist-server/service/partner/partner-query.d.ts +3 -3
  231. package/dist-server/service/partner/partner-query.js +17 -17
  232. package/dist-server/service/partner/partner-query.js.map +1 -1
  233. package/dist-server/service/partner/partner-types.d.ts +1 -1
  234. package/dist-server/service/partner/partner-types.js +2 -2
  235. package/dist-server/service/partner/partner-types.js.map +1 -1
  236. package/dist-server/service/partner/partner.d.ts +1 -1
  237. package/dist-server/service/partner/partner.js +5 -5
  238. package/dist-server/service/partner/partner.js.map +1 -1
  239. package/dist-server/service/password-history/index.d.ts +1 -1
  240. package/dist-server/service/password-history/index.js +2 -2
  241. package/dist-server/service/password-history/index.js.map +1 -1
  242. package/dist-server/service/privilege/index.d.ts +3 -3
  243. package/dist-server/service/privilege/index.js +5 -5
  244. package/dist-server/service/privilege/index.js.map +1 -1
  245. package/dist-server/service/privilege/privilege-directive.js +2 -2
  246. package/dist-server/service/privilege/privilege-directive.js.map +1 -1
  247. package/dist-server/service/privilege/privilege-mutation.d.ts +2 -2
  248. package/dist-server/service/privilege/privilege-mutation.js +15 -15
  249. package/dist-server/service/privilege/privilege-mutation.js.map +1 -1
  250. package/dist-server/service/privilege/privilege-query.d.ts +4 -4
  251. package/dist-server/service/privilege/privilege-query.js +20 -20
  252. package/dist-server/service/privilege/privilege-query.js.map +1 -1
  253. package/dist-server/service/privilege/privilege-types.d.ts +1 -1
  254. package/dist-server/service/privilege/privilege-types.js +2 -2
  255. package/dist-server/service/privilege/privilege-types.js.map +1 -1
  256. package/dist-server/service/privilege/privilege.d.ts +2 -2
  257. package/dist-server/service/privilege/privilege.js +10 -10
  258. package/dist-server/service/privilege/privilege.js.map +1 -1
  259. package/dist-server/service/role/index.d.ts +3 -3
  260. package/dist-server/service/role/index.js +5 -5
  261. package/dist-server/service/role/index.js.map +1 -1
  262. package/dist-server/service/role/role-mutation.d.ts +2 -2
  263. package/dist-server/service/role/role-mutation.js +19 -19
  264. package/dist-server/service/role/role-mutation.js.map +1 -1
  265. package/dist-server/service/role/role-query.d.ts +4 -4
  266. package/dist-server/service/role/role-query.js +29 -29
  267. package/dist-server/service/role/role-query.js.map +1 -1
  268. package/dist-server/service/role/role-types.d.ts +1 -1
  269. package/dist-server/service/role/role-types.js +2 -2
  270. package/dist-server/service/role/role-types.js.map +1 -1
  271. package/dist-server/service/role/role.d.ts +2 -2
  272. package/dist-server/service/role/role.js +12 -12
  273. package/dist-server/service/role/role.js.map +1 -1
  274. package/dist-server/service/user/domain-query.d.ts +1 -1
  275. package/dist-server/service/user/domain-query.js +3 -3
  276. package/dist-server/service/user/domain-query.js.map +1 -1
  277. package/dist-server/service/user/index.d.ts +4 -4
  278. package/dist-server/service/user/index.js +6 -6
  279. package/dist-server/service/user/index.js.map +1 -1
  280. package/dist-server/service/user/user-mutation.d.ts +3 -3
  281. package/dist-server/service/user/user-mutation.js +42 -42
  282. package/dist-server/service/user/user-mutation.js.map +1 -1
  283. package/dist-server/service/user/user-query.d.ts +3 -3
  284. package/dist-server/service/user/user-query.js +21 -21
  285. package/dist-server/service/user/user-query.js.map +1 -1
  286. package/dist-server/service/user/user-types.d.ts +1 -1
  287. package/dist-server/service/user/user-types.js +2 -2
  288. package/dist-server/service/user/user-types.js.map +1 -1
  289. package/dist-server/service/user/user.d.ts +3 -3
  290. package/dist-server/service/user/user.js +40 -40
  291. package/dist-server/service/user/user.js.map +1 -1
  292. package/dist-server/service/users-auth-providers/index.d.ts +1 -1
  293. package/dist-server/service/users-auth-providers/index.js +2 -2
  294. package/dist-server/service/users-auth-providers/index.js.map +1 -1
  295. package/dist-server/service/users-auth-providers/users-auth-providers.d.ts +2 -2
  296. package/dist-server/service/users-auth-providers/users-auth-providers.js +8 -8
  297. package/dist-server/service/users-auth-providers/users-auth-providers.js.map +1 -1
  298. package/dist-server/service/verification-token/index.d.ts +1 -1
  299. package/dist-server/service/verification-token/index.js +2 -2
  300. package/dist-server/service/verification-token/index.js.map +1 -1
  301. package/dist-server/service/web-auth-credential/index.d.ts +1 -1
  302. package/dist-server/service/web-auth-credential/index.js +2 -2
  303. package/dist-server/service/web-auth-credential/index.js.map +1 -1
  304. package/dist-server/service/web-auth-credential/web-auth-credential.d.ts +1 -1
  305. package/dist-server/service/web-auth-credential/web-auth-credential.js +10 -10
  306. package/dist-server/service/web-auth-credential/web-auth-credential.js.map +1 -1
  307. package/dist-server/tsconfig.tsbuildinfo +1 -1
  308. package/dist-server/types.d.ts +1 -1
  309. package/dist-server/types.js.map +1 -1
  310. package/dist-server/utils/access-token-cookie.js +2 -2
  311. package/dist-server/utils/access-token-cookie.js.map +1 -1
  312. package/dist-server/utils/check-permission.d.ts +2 -2
  313. package/dist-server/utils/check-permission.js +3 -3
  314. package/dist-server/utils/check-permission.js.map +1 -1
  315. package/dist-server/utils/check-user-belongs-domain.d.ts +1 -1
  316. package/dist-server/utils/check-user-belongs-domain.js +2 -2
  317. package/dist-server/utils/check-user-belongs-domain.js.map +1 -1
  318. package/dist-server/utils/get-domain-users.d.ts +1 -1
  319. package/dist-server/utils/get-domain-users.js +2 -2
  320. package/dist-server/utils/get-domain-users.js.map +1 -1
  321. package/dist-server/utils/get-user-domains.d.ts +1 -1
  322. package/dist-server/utils/get-user-domains.js +4 -4
  323. package/dist-server/utils/get-user-domains.js.map +1 -1
  324. package/helps/config/recaptcha.ja.md +49 -0
  325. package/helps/config/recaptcha.ko.md +49 -0
  326. package/helps/config/recaptcha.md +49 -0
  327. package/helps/config/recaptcha.ms.md +49 -0
  328. package/helps/config/recaptcha.zh.md +49 -0
  329. package/package.json +5 -4
@@ -3,13 +3,13 @@ Object.defineProperty(exports, "__esModule", { value: true });
3
3
  exports.signin = signin;
4
4
  const typeorm_1 = require("typeorm");
5
5
  const shell_1 = require("@things-factory/shell");
6
- const unlock_user_1 = require("../controllers/unlock-user");
7
- const auth_error_1 = require("../errors/auth-error");
8
- const user_1 = require("../service/user/user");
6
+ const unlock_user_js_1 = require("../controllers/unlock-user.js");
7
+ const auth_error_js_1 = require("../errors/auth-error.js");
8
+ const user_js_1 = require("../service/user/user.js");
9
9
  async function signin(attrs, context) {
10
10
  const { domain } = (context === null || context === void 0 ? void 0 : context.state) || {};
11
11
  const { username } = attrs;
12
- const repository = (0, shell_1.getRepository)(user_1.User);
12
+ const repository = (0, shell_1.getRepository)(user_js_1.User);
13
13
  var user = await repository.findOne({
14
14
  where: { username },
15
15
  relations: ['domains']
@@ -23,47 +23,47 @@ async function signin(attrs, context) {
23
23
  });
24
24
  }
25
25
  if (!user)
26
- throw new auth_error_1.AuthError({
27
- errorCode: auth_error_1.AuthError.ERROR_CODES.USER_NOT_FOUND
26
+ throw new auth_error_js_1.AuthError({
27
+ errorCode: auth_error_js_1.AuthError.ERROR_CODES.USER_NOT_FOUND
28
28
  });
29
- if (user.status == user_1.UserStatus.DELETED) {
30
- throw new auth_error_1.AuthError({
31
- errorCode: auth_error_1.AuthError.ERROR_CODES.USER_DELETED
29
+ if (user.status == user_js_1.UserStatus.DELETED) {
30
+ throw new auth_error_js_1.AuthError({
31
+ errorCode: auth_error_js_1.AuthError.ERROR_CODES.USER_DELETED
32
32
  });
33
33
  }
34
- if (user.status == user_1.UserStatus.LOCKED) {
35
- (0, unlock_user_1.sendUnlockUserEmail)({
34
+ if (user.status == user_js_1.UserStatus.LOCKED) {
35
+ (0, unlock_user_js_1.sendUnlockUserEmail)({
36
36
  user,
37
37
  context
38
38
  });
39
- throw new auth_error_1.AuthError({
40
- errorCode: auth_error_1.AuthError.ERROR_CODES.USER_LOCKED,
39
+ throw new auth_error_js_1.AuthError({
40
+ errorCode: auth_error_js_1.AuthError.ERROR_CODES.USER_LOCKED,
41
41
  detail: {
42
42
  username: user.username,
43
43
  email: user.email
44
44
  }
45
45
  });
46
46
  }
47
- if (!user_1.User.verify(user.password, attrs.password, user.salt)) {
47
+ if (!user_js_1.User.verify(user.password, attrs.password, user.salt)) {
48
48
  user.failCount++;
49
49
  if (user.failCount >= 5)
50
- user.status = user_1.UserStatus.LOCKED;
50
+ user.status = user_js_1.UserStatus.LOCKED;
51
51
  await repository.save(user);
52
- if (user.status == user_1.UserStatus.LOCKED) {
53
- (0, unlock_user_1.sendUnlockUserEmail)({
52
+ if (user.status == user_js_1.UserStatus.LOCKED) {
53
+ (0, unlock_user_js_1.sendUnlockUserEmail)({
54
54
  user,
55
55
  context
56
56
  });
57
- throw new auth_error_1.AuthError({
58
- errorCode: auth_error_1.AuthError.ERROR_CODES.USER_LOCKED,
57
+ throw new auth_error_js_1.AuthError({
58
+ errorCode: auth_error_js_1.AuthError.ERROR_CODES.USER_LOCKED,
59
59
  detail: {
60
60
  username: user.username,
61
61
  email: user.email
62
62
  }
63
63
  });
64
64
  }
65
- throw new auth_error_1.AuthError({
66
- errorCode: auth_error_1.AuthError.ERROR_CODES.PASSWORD_NOT_MATCHED,
65
+ throw new auth_error_js_1.AuthError({
66
+ errorCode: auth_error_js_1.AuthError.ERROR_CODES.PASSWORD_NOT_MATCHED,
67
67
  detail: {
68
68
  username: user.username,
69
69
  email: user.email,
@@ -75,9 +75,9 @@ async function signin(attrs, context) {
75
75
  user.failCount = 0;
76
76
  await repository.save(user);
77
77
  }
78
- if (user.status == user_1.UserStatus.INACTIVE) {
79
- throw new auth_error_1.AuthError({
80
- errorCode: auth_error_1.AuthError.ERROR_CODES.USER_NOT_ACTIVATED,
78
+ if (user.status == user_js_1.UserStatus.INACTIVE) {
79
+ throw new auth_error_js_1.AuthError({
80
+ errorCode: auth_error_js_1.AuthError.ERROR_CODES.USER_NOT_ACTIVATED,
81
81
  detail: {
82
82
  username: user.username,
83
83
  email: user.email
@@ -1 +1 @@
1
- {"version":3,"file":"signin.js","sourceRoot":"","sources":["../../server/controllers/signin.ts"],"names":[],"mappings":";;AAOA,wBA0FC;AAjGD,qCAA+B;AAC/B,iDAAqD;AAErD,4DAAgE;AAChE,qDAAgD;AAChD,+CAAuD;AAEhD,KAAK,UAAU,MAAM,CAAC,KAA6C,EAAE,OAAQ;IAClF,MAAM,EAAE,MAAM,EAAE,GAAG,CAAA,OAAO,aAAP,OAAO,uBAAP,OAAO,CAAE,KAAK,KAAI,EAAE,CAAA;IACvC,MAAM,EAAE,QAAQ,EAAE,GAAG,KAAK,CAAA;IAE1B,MAAM,UAAU,GAAG,IAAA,qBAAa,EAAC,WAAI,CAAC,CAAA;IAEtC,IAAI,IAAI,GAAG,MAAM,UAAU,CAAC,OAAO,CAAC;QAClC,KAAK,EAAE,EAAE,QAAQ,EAAE;QACnB,SAAS,EAAE,CAAC,SAAS,CAAC;KACvB,CAAC,CAAA;IAEF,IAAI,CAAC,IAAI,IAAI,4BAA4B,CAAC,IAAI,CAAC,QAAQ,CAAC,EAAE,CAAC;QACzD,IAAI,GAAG,MAAM,UAAU,CAAC,OAAO,CAAC;YAC9B,KAAK,EAAE;gBACL,KAAK,EAAE,IAAA,eAAK,EAAC,QAAQ,CAAC;aACvB;YACD,SAAS,EAAE,CAAC,SAAS,CAAC;SACvB,CAAC,CAAA;IACJ,CAAC;IAED,IAAI,CAAC,IAAI;QACP,MAAM,IAAI,sBAAS,CAAC;YAClB,SAAS,EAAE,sBAAS,CAAC,WAAW,CAAC,cAAc;SAChD,CAAC,CAAA;IAEJ,IAAI,IAAI,CAAC,MAAM,IAAI,iBAAU,CAAC,OAAO,EAAE,CAAC;QACtC,MAAM,IAAI,sBAAS,CAAC;YAClB,SAAS,EAAE,sBAAS,CAAC,WAAW,CAAC,YAAY;SAC9C,CAAC,CAAA;IACJ,CAAC;IAED,IAAI,IAAI,CAAC,MAAM,IAAI,iBAAU,CAAC,MAAM,EAAE,CAAC;QACrC,IAAA,iCAAmB,EAAC;YAClB,IAAI;YACJ,OAAO;SACR,CAAC,CAAA;QACF,MAAM,IAAI,sBAAS,CAAC;YAClB,SAAS,EAAE,sBAAS,CAAC,WAAW,CAAC,WAAW;YAC5C,MAAM,EAAE;gBACN,QAAQ,EAAE,IAAI,CAAC,QAAQ;gBACvB,KAAK,EAAE,IAAI,CAAC,KAAK;aAClB;SACF,CAAC,CAAA;IACJ,CAAC;IAED,IAAI,CAAC,WAAI,CAAC,MAAM,CAAC,IAAI,CAAC,QAAQ,EAAE,KAAK,CAAC,QAAQ,EAAE,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC;QAC3D,IAAI,CAAC,SAAS,EAAE,CAAA;QAChB,IAAI,IAAI,CAAC,SAAS,IAAI,CAAC;YAAE,IAAI,CAAC,MAAM,GAAG,iBAAU,CAAC,MAAM,CAAA;QACxD,MAAM,UAAU,CAAC,IAAI,CAAC,IAAI,CAAC,CAAA;QAC3B,IAAI,IAAI,CAAC,MAAM,IAAI,iBAAU,CAAC,MAAM,EAAE,CAAC;YACrC,IAAA,iCAAmB,EAAC;gBAClB,IAAI;gBACJ,OAAO;aACR,CAAC,CAAA;YACF,MAAM,IAAI,sBAAS,CAAC;gBAClB,SAAS,EAAE,sBAAS,CAAC,WAAW,CAAC,WAAW;gBAC5C,MAAM,EAAE;oBACN,QAAQ,EAAE,IAAI,CAAC,QAAQ;oBACvB,KAAK,EAAE,IAAI,CAAC,KAAK;iBAClB;aACF,CAAC,CAAA;QACJ,CAAC;QACD,MAAM,IAAI,sBAAS,CAAC;YAClB,SAAS,EAAE,sBAAS,CAAC,WAAW,CAAC,oBAAoB;YACrD,MAAM,EAAE;gBACN,QAAQ,EAAE,IAAI,CAAC,QAAQ;gBACvB,KAAK,EAAE,IAAI,CAAC,KAAK;gBACjB,SAAS,EAAE,IAAI,CAAC,SAAS;aAC1B;SACF,CAAC,CAAA;IACJ,CAAC;SAAM,CAAC;QACN,IAAI,CAAC,SAAS,GAAG,CAAC,CAAA;QAClB,MAAM,UAAU,CAAC,IAAI,CAAC,IAAI,CAAC,CAAA;IAC7B,CAAC;IAED,IAAI,IAAI,CAAC,MAAM,IAAI,iBAAU,CAAC,QAAQ,EAAE,CAAC;QACvC,MAAM,IAAI,sBAAS,CAAC;YAClB,SAAS,EAAE,sBAAS,CAAC,WAAW,CAAC,kBAAkB;YACnD,MAAM,EAAE;gBACN,QAAQ,EAAE,IAAI,CAAC,QAAQ;gBACvB,KAAK,EAAE,IAAI,CAAC,KAAK;aAClB;SACF,CAAC,CAAA;IACJ,CAAC;IAED,OAAO;QACL,IAAI;QACJ,KAAK,EAAE,MAAM,IAAI,CAAC,IAAI,CAAC,EAAE,SAAS,EAAE,MAAM,aAAN,MAAM,uBAAN,MAAM,CAAE,SAAS,EAAE,CAAC;QACxD,OAAO,EAAE,IAAI,CAAC,OAAO,IAAI,EAAE;KAC5B,CAAA;AACH,CAAC","sourcesContent":["import { ILike } from 'typeorm'\nimport { getRepository } from '@things-factory/shell'\n\nimport { sendUnlockUserEmail } from '../controllers/unlock-user'\nimport { AuthError } from '../errors/auth-error'\nimport { User, UserStatus } from '../service/user/user'\n\nexport async function signin(attrs: { username: string; password: string }, context?) {\n const { domain } = context?.state || {}\n const { username } = attrs\n\n const repository = getRepository(User)\n\n var user = await repository.findOne({\n where: { username },\n relations: ['domains']\n })\n\n if (!user && /^[^\\s@]+@[^\\s@]+\\.[^\\s@]+$/.test(username)) {\n user = await repository.findOne({\n where: {\n email: ILike(username)\n },\n relations: ['domains']\n })\n }\n\n if (!user)\n throw new AuthError({\n errorCode: AuthError.ERROR_CODES.USER_NOT_FOUND\n })\n\n if (user.status == UserStatus.DELETED) {\n throw new AuthError({\n errorCode: AuthError.ERROR_CODES.USER_DELETED\n })\n }\n\n if (user.status == UserStatus.LOCKED) {\n sendUnlockUserEmail({\n user,\n context\n })\n throw new AuthError({\n errorCode: AuthError.ERROR_CODES.USER_LOCKED,\n detail: {\n username: user.username,\n email: user.email\n }\n })\n }\n\n if (!User.verify(user.password, attrs.password, user.salt)) {\n user.failCount++\n if (user.failCount >= 5) user.status = UserStatus.LOCKED\n await repository.save(user)\n if (user.status == UserStatus.LOCKED) {\n sendUnlockUserEmail({\n user,\n context\n })\n throw new AuthError({\n errorCode: AuthError.ERROR_CODES.USER_LOCKED,\n detail: {\n username: user.username,\n email: user.email\n }\n })\n }\n throw new AuthError({\n errorCode: AuthError.ERROR_CODES.PASSWORD_NOT_MATCHED,\n detail: {\n username: user.username,\n email: user.email,\n failCount: user.failCount\n }\n })\n } else {\n user.failCount = 0\n await repository.save(user)\n }\n\n if (user.status == UserStatus.INACTIVE) {\n throw new AuthError({\n errorCode: AuthError.ERROR_CODES.USER_NOT_ACTIVATED,\n detail: {\n username: user.username,\n email: user.email\n }\n })\n }\n\n return {\n user,\n token: await user.sign({ subdomain: domain?.subdomain }),\n domains: user.domains || []\n }\n}\n"]}
1
+ {"version":3,"file":"signin.js","sourceRoot":"","sources":["../../server/controllers/signin.ts"],"names":[],"mappings":";;AAOA,wBA0FC;AAjGD,qCAA+B;AAC/B,iDAAqD;AAErD,kEAAmE;AACnE,2DAAmD;AACnD,qDAA0D;AAEnD,KAAK,UAAU,MAAM,CAAC,KAA6C,EAAE,OAAQ;IAClF,MAAM,EAAE,MAAM,EAAE,GAAG,CAAA,OAAO,aAAP,OAAO,uBAAP,OAAO,CAAE,KAAK,KAAI,EAAE,CAAA;IACvC,MAAM,EAAE,QAAQ,EAAE,GAAG,KAAK,CAAA;IAE1B,MAAM,UAAU,GAAG,IAAA,qBAAa,EAAC,cAAI,CAAC,CAAA;IAEtC,IAAI,IAAI,GAAG,MAAM,UAAU,CAAC,OAAO,CAAC;QAClC,KAAK,EAAE,EAAE,QAAQ,EAAE;QACnB,SAAS,EAAE,CAAC,SAAS,CAAC;KACvB,CAAC,CAAA;IAEF,IAAI,CAAC,IAAI,IAAI,4BAA4B,CAAC,IAAI,CAAC,QAAQ,CAAC,EAAE,CAAC;QACzD,IAAI,GAAG,MAAM,UAAU,CAAC,OAAO,CAAC;YAC9B,KAAK,EAAE;gBACL,KAAK,EAAE,IAAA,eAAK,EAAC,QAAQ,CAAC;aACvB;YACD,SAAS,EAAE,CAAC,SAAS,CAAC;SACvB,CAAC,CAAA;IACJ,CAAC;IAED,IAAI,CAAC,IAAI;QACP,MAAM,IAAI,yBAAS,CAAC;YAClB,SAAS,EAAE,yBAAS,CAAC,WAAW,CAAC,cAAc;SAChD,CAAC,CAAA;IAEJ,IAAI,IAAI,CAAC,MAAM,IAAI,oBAAU,CAAC,OAAO,EAAE,CAAC;QACtC,MAAM,IAAI,yBAAS,CAAC;YAClB,SAAS,EAAE,yBAAS,CAAC,WAAW,CAAC,YAAY;SAC9C,CAAC,CAAA;IACJ,CAAC;IAED,IAAI,IAAI,CAAC,MAAM,IAAI,oBAAU,CAAC,MAAM,EAAE,CAAC;QACrC,IAAA,oCAAmB,EAAC;YAClB,IAAI;YACJ,OAAO;SACR,CAAC,CAAA;QACF,MAAM,IAAI,yBAAS,CAAC;YAClB,SAAS,EAAE,yBAAS,CAAC,WAAW,CAAC,WAAW;YAC5C,MAAM,EAAE;gBACN,QAAQ,EAAE,IAAI,CAAC,QAAQ;gBACvB,KAAK,EAAE,IAAI,CAAC,KAAK;aAClB;SACF,CAAC,CAAA;IACJ,CAAC;IAED,IAAI,CAAC,cAAI,CAAC,MAAM,CAAC,IAAI,CAAC,QAAQ,EAAE,KAAK,CAAC,QAAQ,EAAE,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC;QAC3D,IAAI,CAAC,SAAS,EAAE,CAAA;QAChB,IAAI,IAAI,CAAC,SAAS,IAAI,CAAC;YAAE,IAAI,CAAC,MAAM,GAAG,oBAAU,CAAC,MAAM,CAAA;QACxD,MAAM,UAAU,CAAC,IAAI,CAAC,IAAI,CAAC,CAAA;QAC3B,IAAI,IAAI,CAAC,MAAM,IAAI,oBAAU,CAAC,MAAM,EAAE,CAAC;YACrC,IAAA,oCAAmB,EAAC;gBAClB,IAAI;gBACJ,OAAO;aACR,CAAC,CAAA;YACF,MAAM,IAAI,yBAAS,CAAC;gBAClB,SAAS,EAAE,yBAAS,CAAC,WAAW,CAAC,WAAW;gBAC5C,MAAM,EAAE;oBACN,QAAQ,EAAE,IAAI,CAAC,QAAQ;oBACvB,KAAK,EAAE,IAAI,CAAC,KAAK;iBAClB;aACF,CAAC,CAAA;QACJ,CAAC;QACD,MAAM,IAAI,yBAAS,CAAC;YAClB,SAAS,EAAE,yBAAS,CAAC,WAAW,CAAC,oBAAoB;YACrD,MAAM,EAAE;gBACN,QAAQ,EAAE,IAAI,CAAC,QAAQ;gBACvB,KAAK,EAAE,IAAI,CAAC,KAAK;gBACjB,SAAS,EAAE,IAAI,CAAC,SAAS;aAC1B;SACF,CAAC,CAAA;IACJ,CAAC;SAAM,CAAC;QACN,IAAI,CAAC,SAAS,GAAG,CAAC,CAAA;QAClB,MAAM,UAAU,CAAC,IAAI,CAAC,IAAI,CAAC,CAAA;IAC7B,CAAC;IAED,IAAI,IAAI,CAAC,MAAM,IAAI,oBAAU,CAAC,QAAQ,EAAE,CAAC;QACvC,MAAM,IAAI,yBAAS,CAAC;YAClB,SAAS,EAAE,yBAAS,CAAC,WAAW,CAAC,kBAAkB;YACnD,MAAM,EAAE;gBACN,QAAQ,EAAE,IAAI,CAAC,QAAQ;gBACvB,KAAK,EAAE,IAAI,CAAC,KAAK;aAClB;SACF,CAAC,CAAA;IACJ,CAAC;IAED,OAAO;QACL,IAAI;QACJ,KAAK,EAAE,MAAM,IAAI,CAAC,IAAI,CAAC,EAAE,SAAS,EAAE,MAAM,aAAN,MAAM,uBAAN,MAAM,CAAE,SAAS,EAAE,CAAC;QACxD,OAAO,EAAE,IAAI,CAAC,OAAO,IAAI,EAAE;KAC5B,CAAA;AACH,CAAC","sourcesContent":["import { ILike } from 'typeorm'\nimport { getRepository } from '@things-factory/shell'\n\nimport { sendUnlockUserEmail } from '../controllers/unlock-user.js'\nimport { AuthError } from '../errors/auth-error.js'\nimport { User, UserStatus } from '../service/user/user.js'\n\nexport async function signin(attrs: { username: string; password: string }, context?) {\n const { domain } = context?.state || {}\n const { username } = attrs\n\n const repository = getRepository(User)\n\n var user = await repository.findOne({\n where: { username },\n relations: ['domains']\n })\n\n if (!user && /^[^\\s@]+@[^\\s@]+\\.[^\\s@]+$/.test(username)) {\n user = await repository.findOne({\n where: {\n email: ILike(username)\n },\n relations: ['domains']\n })\n }\n\n if (!user)\n throw new AuthError({\n errorCode: AuthError.ERROR_CODES.USER_NOT_FOUND\n })\n\n if (user.status == UserStatus.DELETED) {\n throw new AuthError({\n errorCode: AuthError.ERROR_CODES.USER_DELETED\n })\n }\n\n if (user.status == UserStatus.LOCKED) {\n sendUnlockUserEmail({\n user,\n context\n })\n throw new AuthError({\n errorCode: AuthError.ERROR_CODES.USER_LOCKED,\n detail: {\n username: user.username,\n email: user.email\n }\n })\n }\n\n if (!User.verify(user.password, attrs.password, user.salt)) {\n user.failCount++\n if (user.failCount >= 5) user.status = UserStatus.LOCKED\n await repository.save(user)\n if (user.status == UserStatus.LOCKED) {\n sendUnlockUserEmail({\n user,\n context\n })\n throw new AuthError({\n errorCode: AuthError.ERROR_CODES.USER_LOCKED,\n detail: {\n username: user.username,\n email: user.email\n }\n })\n }\n throw new AuthError({\n errorCode: AuthError.ERROR_CODES.PASSWORD_NOT_MATCHED,\n detail: {\n username: user.username,\n email: user.email,\n failCount: user.failCount\n }\n })\n } else {\n user.failCount = 0\n await repository.save(user)\n }\n\n if (user.status == UserStatus.INACTIVE) {\n throw new AuthError({\n errorCode: AuthError.ERROR_CODES.USER_NOT_ACTIVATED,\n detail: {\n username: user.username,\n email: user.email\n }\n })\n }\n\n return {\n user,\n token: await user.sign({ subdomain: domain?.subdomain }),\n domains: user.domains || []\n }\n}\n"]}
@@ -1,4 +1,4 @@
1
- import { User } from '../service/user/user';
1
+ import { User } from '../service/user/user.js';
2
2
  export declare function signup(attrs: any, withEmailVerification?: Boolean): Promise<{
3
3
  token: {
4
4
  user: User;
@@ -3,16 +3,16 @@ Object.defineProperty(exports, "__esModule", { value: true });
3
3
  exports.signup = signup;
4
4
  const typeorm_1 = require("typeorm");
5
5
  const shell_1 = require("@things-factory/shell");
6
- const error_code_1 = require("../constants/error-code");
7
- const auth_error_1 = require("../errors/auth-error");
8
- const user_1 = require("../service/user/user");
9
- const signin_1 = require("./signin");
10
- const verification_1 = require("./verification");
6
+ const error_code_js_1 = require("../constants/error-code.js");
7
+ const auth_error_js_1 = require("../errors/auth-error.js");
8
+ const user_js_1 = require("../service/user/user.js");
9
+ const signin_js_1 = require("./signin.js");
10
+ const verification_js_1 = require("./verification.js");
11
11
  async function signup(attrs, withEmailVerification) {
12
12
  const { name, username, password, domain, context } = attrs;
13
13
  /* check if password is following the rule */
14
- user_1.User.validatePasswordByRule(password, context.lng);
15
- const repository = (0, shell_1.getRepository)(user_1.User);
14
+ user_js_1.User.validatePasswordByRule(password, context.lng);
15
+ const repository = (0, shell_1.getRepository)(user_js_1.User);
16
16
  var duplicated = await repository.findOne({
17
17
  where: { username },
18
18
  relations: ['domains']
@@ -24,26 +24,26 @@ async function signup(attrs, withEmailVerification) {
24
24
  });
25
25
  }
26
26
  if (duplicated) {
27
- throw new auth_error_1.AuthError({
28
- errorCode: error_code_1.USER_DUPLICATED,
27
+ throw new auth_error_js_1.AuthError({
28
+ errorCode: error_code_js_1.USER_DUPLICATED,
29
29
  detail: {
30
30
  name,
31
31
  username
32
32
  }
33
33
  });
34
34
  }
35
- const salt = user_1.User.generateSalt();
36
- var user = await repository.save(Object.assign(Object.assign({ userType: 'user' }, attrs), { salt, password: user_1.User.encode(password, salt), passwordUpdatedAt: new Date(), domains: domain ? [domain] : [] }));
35
+ const salt = user_js_1.User.generateSalt();
36
+ var user = await repository.save(Object.assign(Object.assign({ userType: 'user' }, attrs), { salt, password: user_js_1.User.encode(password, salt), passwordUpdatedAt: new Date(), domains: domain ? [domain] : [] }));
37
37
  var succeed = false;
38
38
  if (withEmailVerification) {
39
- succeed = await (0, verification_1.sendVerificationEmail)({
39
+ succeed = await (0, verification_js_1.sendVerificationEmail)({
40
40
  context,
41
41
  user
42
42
  });
43
43
  }
44
44
  try {
45
45
  return {
46
- token: await (0, signin_1.signin)({
46
+ token: await (0, signin_js_1.signin)({
47
47
  username,
48
48
  password
49
49
  }, { domain })
@@ -1 +1 @@
1
- {"version":3,"file":"signup.js","sourceRoot":"","sources":["../../server/controllers/signup.ts"],"names":[],"mappings":";;AASA,wBA8DC;AAvED,qCAA+B;AAC/B,iDAAqD;AAErD,wDAAyD;AACzD,qDAAgD;AAChD,+CAA2C;AAC3C,qCAAiC;AACjC,iDAAsD;AAE/C,KAAK,UAAU,MAAM,CAAC,KAAK,EAAE,qBAA+B;IACjE,MAAM,EAAE,IAAI,EAAE,QAAQ,EAAE,QAAQ,EAAE,MAAM,EAAE,OAAO,EAAE,GAAG,KAAK,CAAA;IAE3D,6CAA6C;IAC7C,WAAI,CAAC,sBAAsB,CAAC,QAAQ,EAAE,OAAO,CAAC,GAAG,CAAC,CAAA;IAElD,MAAM,UAAU,GAAG,IAAA,qBAAa,EAAC,WAAI,CAAC,CAAA;IAEtC,IAAI,UAAU,GAAG,MAAM,UAAU,CAAC,OAAO,CAAC;QACxC,KAAK,EAAE,EAAE,QAAQ,EAAE;QACnB,SAAS,EAAE,CAAC,SAAS,CAAC;KACvB,CAAC,CAAA;IAEF,IAAI,CAAC,UAAU,IAAI,4BAA4B,CAAC,IAAI,CAAC,QAAQ,CAAC,EAAE,CAAC;QAC/D,IAAI,GAAG,MAAM,UAAU,CAAC,OAAO,CAAC;YAC9B,KAAK,EAAE,EAAE,KAAK,EAAE,IAAA,eAAK,EAAC,QAAQ,CAAC,EAAE;YACjC,SAAS,EAAE,CAAC,SAAS,CAAC;SACvB,CAAC,CAAA;IACJ,CAAC;IAED,IAAI,UAAU,EAAE,CAAC;QACf,MAAM,IAAI,sBAAS,CAAC;YAClB,SAAS,EAAE,4BAAe;YAC1B,MAAM,EAAE;gBACN,IAAI;gBACJ,QAAQ;aACT;SACF,CAAC,CAAA;IACJ,CAAC;IAED,MAAM,IAAI,GAAG,WAAI,CAAC,YAAY,EAAE,CAAA;IAEhC,IAAI,IAAI,GAAG,MAAM,UAAU,CAAC,IAAI,+BAC9B,QAAQ,EAAE,MAAM,IACb,KAAK,KACR,IAAI,EACJ,QAAQ,EAAE,WAAI,CAAC,MAAM,CAAC,QAAQ,EAAE,IAAI,CAAC,EACrC,iBAAiB,EAAE,IAAI,IAAI,EAAE,EAC7B,OAAO,EAAE,MAAM,CAAC,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,EAAE,IAC/B,CAAA;IAEF,IAAI,OAAO,GAAG,KAAK,CAAA;IACnB,IAAI,qBAAqB,EAAE,CAAC;QAC1B,OAAO,GAAG,MAAM,IAAA,oCAAqB,EAAC;YACpC,OAAO;YACP,IAAI;SACL,CAAC,CAAA;IACJ,CAAC;IAED,IAAI,CAAC;QACH,OAAO;YACL,KAAK,EAAE,MAAM,IAAA,eAAM,EACjB;gBACE,QAAQ;gBACR,QAAQ;aACT,EACD,EAAE,MAAM,EAAE,CACX;SACF,CAAA;IACH,CAAC;IAAC,OAAO,CAAC,EAAE,CAAC;QACX,OAAO,EAAE,KAAK,EAAE,IAAI,EAAE,CAAA;IACxB,CAAC;AACH,CAAC","sourcesContent":["import { ILike } from 'typeorm'\nimport { getRepository } from '@things-factory/shell'\n\nimport { USER_DUPLICATED } from '../constants/error-code'\nimport { AuthError } from '../errors/auth-error'\nimport { User } from '../service/user/user'\nimport { signin } from './signin'\nimport { sendVerificationEmail } from './verification'\n\nexport async function signup(attrs, withEmailVerification?: Boolean) {\n const { name, username, password, domain, context } = attrs\n\n /* check if password is following the rule */\n User.validatePasswordByRule(password, context.lng)\n\n const repository = getRepository(User)\n\n var duplicated = await repository.findOne({\n where: { username },\n relations: ['domains']\n })\n\n if (!duplicated && /^[^\\s@]+@[^\\s@]+\\.[^\\s@]+$/.test(username)) {\n user = await repository.findOne({\n where: { email: ILike(username) },\n relations: ['domains']\n })\n }\n\n if (duplicated) {\n throw new AuthError({\n errorCode: USER_DUPLICATED,\n detail: {\n name,\n username\n }\n })\n }\n\n const salt = User.generateSalt()\n\n var user = await repository.save({\n userType: 'user',\n ...attrs,\n salt,\n password: User.encode(password, salt),\n passwordUpdatedAt: new Date(),\n domains: domain ? [domain] : []\n })\n\n var succeed = false\n if (withEmailVerification) {\n succeed = await sendVerificationEmail({\n context,\n user\n })\n }\n\n try {\n return {\n token: await signin(\n {\n username,\n password\n },\n { domain }\n )\n }\n } catch (e) {\n return { token: null }\n }\n}\n"]}
1
+ {"version":3,"file":"signup.js","sourceRoot":"","sources":["../../server/controllers/signup.ts"],"names":[],"mappings":";;AASA,wBA8DC;AAvED,qCAA+B;AAC/B,iDAAqD;AAErD,8DAA4D;AAC5D,2DAAmD;AACnD,qDAA8C;AAC9C,2CAAoC;AACpC,uDAAyD;AAElD,KAAK,UAAU,MAAM,CAAC,KAAK,EAAE,qBAA+B;IACjE,MAAM,EAAE,IAAI,EAAE,QAAQ,EAAE,QAAQ,EAAE,MAAM,EAAE,OAAO,EAAE,GAAG,KAAK,CAAA;IAE3D,6CAA6C;IAC7C,cAAI,CAAC,sBAAsB,CAAC,QAAQ,EAAE,OAAO,CAAC,GAAG,CAAC,CAAA;IAElD,MAAM,UAAU,GAAG,IAAA,qBAAa,EAAC,cAAI,CAAC,CAAA;IAEtC,IAAI,UAAU,GAAG,MAAM,UAAU,CAAC,OAAO,CAAC;QACxC,KAAK,EAAE,EAAE,QAAQ,EAAE;QACnB,SAAS,EAAE,CAAC,SAAS,CAAC;KACvB,CAAC,CAAA;IAEF,IAAI,CAAC,UAAU,IAAI,4BAA4B,CAAC,IAAI,CAAC,QAAQ,CAAC,EAAE,CAAC;QAC/D,IAAI,GAAG,MAAM,UAAU,CAAC,OAAO,CAAC;YAC9B,KAAK,EAAE,EAAE,KAAK,EAAE,IAAA,eAAK,EAAC,QAAQ,CAAC,EAAE;YACjC,SAAS,EAAE,CAAC,SAAS,CAAC;SACvB,CAAC,CAAA;IACJ,CAAC;IAED,IAAI,UAAU,EAAE,CAAC;QACf,MAAM,IAAI,yBAAS,CAAC;YAClB,SAAS,EAAE,+BAAe;YAC1B,MAAM,EAAE;gBACN,IAAI;gBACJ,QAAQ;aACT;SACF,CAAC,CAAA;IACJ,CAAC;IAED,MAAM,IAAI,GAAG,cAAI,CAAC,YAAY,EAAE,CAAA;IAEhC,IAAI,IAAI,GAAG,MAAM,UAAU,CAAC,IAAI,+BAC9B,QAAQ,EAAE,MAAM,IACb,KAAK,KACR,IAAI,EACJ,QAAQ,EAAE,cAAI,CAAC,MAAM,CAAC,QAAQ,EAAE,IAAI,CAAC,EACrC,iBAAiB,EAAE,IAAI,IAAI,EAAE,EAC7B,OAAO,EAAE,MAAM,CAAC,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,EAAE,IAC/B,CAAA;IAEF,IAAI,OAAO,GAAG,KAAK,CAAA;IACnB,IAAI,qBAAqB,EAAE,CAAC;QAC1B,OAAO,GAAG,MAAM,IAAA,uCAAqB,EAAC;YACpC,OAAO;YACP,IAAI;SACL,CAAC,CAAA;IACJ,CAAC;IAED,IAAI,CAAC;QACH,OAAO;YACL,KAAK,EAAE,MAAM,IAAA,kBAAM,EACjB;gBACE,QAAQ;gBACR,QAAQ;aACT,EACD,EAAE,MAAM,EAAE,CACX;SACF,CAAA;IACH,CAAC;IAAC,OAAO,CAAC,EAAE,CAAC;QACX,OAAO,EAAE,KAAK,EAAE,IAAI,EAAE,CAAA;IACxB,CAAC;AACH,CAAC","sourcesContent":["import { ILike } from 'typeorm'\nimport { getRepository } from '@things-factory/shell'\n\nimport { USER_DUPLICATED } from '../constants/error-code.js'\nimport { AuthError } from '../errors/auth-error.js'\nimport { User } from '../service/user/user.js'\nimport { signin } from './signin.js'\nimport { sendVerificationEmail } from './verification.js'\n\nexport async function signup(attrs, withEmailVerification?: Boolean) {\n const { name, username, password, domain, context } = attrs\n\n /* check if password is following the rule */\n User.validatePasswordByRule(password, context.lng)\n\n const repository = getRepository(User)\n\n var duplicated = await repository.findOne({\n where: { username },\n relations: ['domains']\n })\n\n if (!duplicated && /^[^\\s@]+@[^\\s@]+\\.[^\\s@]+$/.test(username)) {\n user = await repository.findOne({\n where: { email: ILike(username) },\n relations: ['domains']\n })\n }\n\n if (duplicated) {\n throw new AuthError({\n errorCode: USER_DUPLICATED,\n detail: {\n name,\n username\n }\n })\n }\n\n const salt = User.generateSalt()\n\n var user = await repository.save({\n userType: 'user',\n ...attrs,\n salt,\n password: User.encode(password, salt),\n passwordUpdatedAt: new Date(),\n domains: domain ? [domain] : []\n })\n\n var succeed = false\n if (withEmailVerification) {\n succeed = await sendVerificationEmail({\n context,\n user\n })\n }\n\n try {\n return {\n token: await signin(\n {\n username,\n password\n },\n { domain }\n )\n }\n } catch (e) {\n return { token: null }\n }\n}\n"]}
@@ -5,21 +5,21 @@ exports.unlockUser = unlockUser;
5
5
  const url_1 = require("url");
6
6
  const email_base_1 = require("@things-factory/email-base");
7
7
  const shell_1 = require("@things-factory/shell");
8
- const user_1 = require("../service/user/user");
9
- const verification_token_1 = require("../service/verification-token/verification-token");
10
- const account_unlock_email_1 = require("../templates/account-unlock-email");
11
- const make_verification_token_1 = require("./utils/make-verification-token");
12
- const save_verification_token_1 = require("./utils/save-verification-token");
8
+ const user_js_1 = require("../service/user/user.js");
9
+ const verification_token_js_1 = require("../service/verification-token/verification-token.js");
10
+ const account_unlock_email_js_1 = require("../templates/account-unlock-email.js");
11
+ const make_verification_token_js_1 = require("./utils/make-verification-token.js");
12
+ const save_verification_token_js_1 = require("./utils/save-verification-token.js");
13
13
  async function sendUnlockUserEmail({ user, context }) {
14
14
  try {
15
- var token = (0, make_verification_token_1.makeVerificationToken)();
16
- var verifaction = await (0, save_verification_token_1.saveVerificationToken)(user.id, token, verification_token_1.VerificationTokenType.UNLOCK);
15
+ var token = (0, make_verification_token_js_1.makeVerificationToken)();
16
+ var verifaction = await (0, save_verification_token_js_1.saveVerificationToken)(user.id, token, verification_token_js_1.VerificationTokenType.UNLOCK);
17
17
  if (verifaction) {
18
18
  var serviceUrl = new url_1.URL(`/auth/unlock-user?token=${token}`, context.header.referer);
19
19
  await (0, email_base_1.sendEmail)({
20
20
  receiver: user.email,
21
21
  subject: 'Your account is locked',
22
- content: (0, account_unlock_email_1.getUnlockUserEmailForm)({
22
+ content: (0, account_unlock_email_js_1.getUnlockUserEmailForm)({
23
23
  username: user.username,
24
24
  name: user.name,
25
25
  resetUrl: serviceUrl
@@ -33,27 +33,27 @@ async function sendUnlockUserEmail({ user, context }) {
33
33
  }
34
34
  }
35
35
  async function unlockUser(token, password) {
36
- var { userId } = await (0, shell_1.getRepository)(verification_token_1.VerificationToken).findOne({
36
+ var { userId } = await (0, shell_1.getRepository)(verification_token_js_1.VerificationToken).findOne({
37
37
  where: {
38
38
  token,
39
- type: verification_token_1.VerificationTokenType.UNLOCK
39
+ type: verification_token_js_1.VerificationTokenType.UNLOCK
40
40
  }
41
41
  });
42
42
  if (!userId)
43
43
  return false;
44
- var userInfo = await (0, shell_1.getRepository)(user_1.User).findOneBy({ id: userId });
44
+ var userInfo = await (0, shell_1.getRepository)(user_js_1.User).findOneBy({ id: userId });
45
45
  if (!userInfo)
46
46
  return false;
47
- if (userInfo.status != user_1.UserStatus.LOCKED)
47
+ if (userInfo.status != user_js_1.UserStatus.LOCKED)
48
48
  return false;
49
- userInfo.status = user_1.UserStatus.ACTIVATED;
50
- userInfo.password = user_1.User.encode(password, userInfo.salt);
49
+ userInfo.status = user_js_1.UserStatus.ACTIVATED;
50
+ userInfo.password = user_js_1.User.encode(password, userInfo.salt);
51
51
  userInfo.failCount = 0;
52
- await (0, shell_1.getRepository)(user_1.User).save(userInfo);
53
- await (0, shell_1.getRepository)(verification_token_1.VerificationToken).delete({
52
+ await (0, shell_1.getRepository)(user_js_1.User).save(userInfo);
53
+ await (0, shell_1.getRepository)(verification_token_js_1.VerificationToken).delete({
54
54
  userId,
55
55
  token,
56
- type: verification_token_1.VerificationTokenType.UNLOCK
56
+ type: verification_token_js_1.VerificationTokenType.UNLOCK
57
57
  });
58
58
  return true;
59
59
  }
@@ -1 +1 @@
1
- {"version":3,"file":"unlock-user.js","sourceRoot":"","sources":["../../server/controllers/unlock-user.ts"],"names":[],"mappings":";;AAWA,kDAsBC;AAED,gCA0BC;AA7DD,6BAAyB;AAEzB,2DAAsD;AACtD,iDAAqD;AAErD,+CAAuD;AACvD,yFAA2G;AAC3G,4EAA0E;AAC1E,6EAAuE;AACvE,6EAAuE;AAEhE,KAAK,UAAU,mBAAmB,CAAC,EAAE,IAAI,EAAE,OAAO,EAAE;IACzD,IAAI,CAAC;QACH,IAAI,KAAK,GAAG,IAAA,+CAAqB,GAAE,CAAA;QACnC,IAAI,WAAW,GAAG,MAAM,IAAA,+CAAqB,EAAC,IAAI,CAAC,EAAE,EAAE,KAAK,EAAE,0CAAqB,CAAC,MAAM,CAAC,CAAA;QAE3F,IAAI,WAAW,EAAE,CAAC;YAChB,IAAI,UAAU,GAAG,IAAI,SAAG,CAAC,2BAA2B,KAAK,EAAE,EAAE,OAAO,CAAC,MAAM,CAAC,OAAO,CAAC,CAAA;YACpF,MAAM,IAAA,sBAAS,EAAC;gBACd,QAAQ,EAAE,IAAI,CAAC,KAAK;gBACpB,OAAO,EAAE,wBAAwB;gBACjC,OAAO,EAAE,IAAA,6CAAsB,EAAC;oBAC9B,QAAQ,EAAE,IAAI,CAAC,QAAQ;oBACvB,IAAI,EAAE,IAAI,CAAC,IAAI;oBACf,QAAQ,EAAE,UAAU;iBACrB,CAAC;aACH,CAAC,CAAA;YAEF,OAAO,IAAI,CAAA;QACb,CAAC;IACH,CAAC;IAAC,OAAO,CAAC,EAAE,CAAC;QACX,OAAO,KAAK,CAAA;IACd,CAAC;AACH,CAAC;AAEM,KAAK,UAAU,UAAU,CAAC,KAAK,EAAE,QAAQ;IAC9C,IAAI,EAAE,MAAM,EAAE,GAAG,MAAM,IAAA,qBAAa,EAAC,sCAAiB,CAAC,CAAC,OAAO,CAAC;QAC9D,KAAK,EAAE;YACL,KAAK;YACL,IAAI,EAAE,0CAAqB,CAAC,MAAM;SACnC;KACF,CAAC,CAAA;IAEF,IAAI,CAAC,MAAM;QAAE,OAAO,KAAK,CAAA;IAEzB,IAAI,QAAQ,GAAG,MAAM,IAAA,qBAAa,EAAC,WAAI,CAAC,CAAC,SAAS,CAAC,EAAE,EAAE,EAAE,MAAM,EAAE,CAAC,CAAA;IAClE,IAAI,CAAC,QAAQ;QAAE,OAAO,KAAK,CAAA;IAC3B,IAAI,QAAQ,CAAC,MAAM,IAAI,iBAAU,CAAC,MAAM;QAAE,OAAO,KAAK,CAAA;IAEtD,QAAQ,CAAC,MAAM,GAAG,iBAAU,CAAC,SAAS,CAAA;IACtC,QAAQ,CAAC,QAAQ,GAAG,WAAI,CAAC,MAAM,CAAC,QAAQ,EAAE,QAAQ,CAAC,IAAI,CAAC,CAAA;IACxD,QAAQ,CAAC,SAAS,GAAG,CAAC,CAAA;IAEtB,MAAM,IAAA,qBAAa,EAAC,WAAI,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAA;IACxC,MAAM,IAAA,qBAAa,EAAC,sCAAiB,CAAC,CAAC,MAAM,CAAC;QAC5C,MAAM;QACN,KAAK;QACL,IAAI,EAAE,0CAAqB,CAAC,MAAM;KACnC,CAAC,CAAA;IAEF,OAAO,IAAI,CAAA;AACb,CAAC","sourcesContent":["import { URL } from 'url'\n\nimport { sendEmail } from '@things-factory/email-base'\nimport { getRepository } from '@things-factory/shell'\n\nimport { User, UserStatus } from '../service/user/user'\nimport { VerificationToken, VerificationTokenType } from '../service/verification-token/verification-token'\nimport { getUnlockUserEmailForm } from '../templates/account-unlock-email'\nimport { makeVerificationToken } from './utils/make-verification-token'\nimport { saveVerificationToken } from './utils/save-verification-token'\n\nexport async function sendUnlockUserEmail({ user, context }) {\n try {\n var token = makeVerificationToken()\n var verifaction = await saveVerificationToken(user.id, token, VerificationTokenType.UNLOCK)\n\n if (verifaction) {\n var serviceUrl = new URL(`/auth/unlock-user?token=${token}`, context.header.referer)\n await sendEmail({\n receiver: user.email,\n subject: 'Your account is locked',\n content: getUnlockUserEmailForm({\n username: user.username,\n name: user.name,\n resetUrl: serviceUrl\n })\n })\n\n return true\n }\n } catch (e) {\n return false\n }\n}\n\nexport async function unlockUser(token, password) {\n var { userId } = await getRepository(VerificationToken).findOne({\n where: {\n token,\n type: VerificationTokenType.UNLOCK\n }\n })\n\n if (!userId) return false\n\n var userInfo = await getRepository(User).findOneBy({ id: userId })\n if (!userInfo) return false\n if (userInfo.status != UserStatus.LOCKED) return false\n\n userInfo.status = UserStatus.ACTIVATED\n userInfo.password = User.encode(password, userInfo.salt)\n userInfo.failCount = 0\n\n await getRepository(User).save(userInfo)\n await getRepository(VerificationToken).delete({\n userId,\n token,\n type: VerificationTokenType.UNLOCK\n })\n\n return true\n}\n"]}
1
+ {"version":3,"file":"unlock-user.js","sourceRoot":"","sources":["../../server/controllers/unlock-user.ts"],"names":[],"mappings":";;AAWA,kDAsBC;AAED,gCA0BC;AA7DD,6BAAyB;AAEzB,2DAAsD;AACtD,iDAAqD;AAErD,qDAA0D;AAC1D,+FAA8G;AAC9G,kFAA6E;AAC7E,mFAA0E;AAC1E,mFAA0E;AAEnE,KAAK,UAAU,mBAAmB,CAAC,EAAE,IAAI,EAAE,OAAO,EAAE;IACzD,IAAI,CAAC;QACH,IAAI,KAAK,GAAG,IAAA,kDAAqB,GAAE,CAAA;QACnC,IAAI,WAAW,GAAG,MAAM,IAAA,kDAAqB,EAAC,IAAI,CAAC,EAAE,EAAE,KAAK,EAAE,6CAAqB,CAAC,MAAM,CAAC,CAAA;QAE3F,IAAI,WAAW,EAAE,CAAC;YAChB,IAAI,UAAU,GAAG,IAAI,SAAG,CAAC,2BAA2B,KAAK,EAAE,EAAE,OAAO,CAAC,MAAM,CAAC,OAAO,CAAC,CAAA;YACpF,MAAM,IAAA,sBAAS,EAAC;gBACd,QAAQ,EAAE,IAAI,CAAC,KAAK;gBACpB,OAAO,EAAE,wBAAwB;gBACjC,OAAO,EAAE,IAAA,gDAAsB,EAAC;oBAC9B,QAAQ,EAAE,IAAI,CAAC,QAAQ;oBACvB,IAAI,EAAE,IAAI,CAAC,IAAI;oBACf,QAAQ,EAAE,UAAU;iBACrB,CAAC;aACH,CAAC,CAAA;YAEF,OAAO,IAAI,CAAA;QACb,CAAC;IACH,CAAC;IAAC,OAAO,CAAC,EAAE,CAAC;QACX,OAAO,KAAK,CAAA;IACd,CAAC;AACH,CAAC;AAEM,KAAK,UAAU,UAAU,CAAC,KAAK,EAAE,QAAQ;IAC9C,IAAI,EAAE,MAAM,EAAE,GAAG,MAAM,IAAA,qBAAa,EAAC,yCAAiB,CAAC,CAAC,OAAO,CAAC;QAC9D,KAAK,EAAE;YACL,KAAK;YACL,IAAI,EAAE,6CAAqB,CAAC,MAAM;SACnC;KACF,CAAC,CAAA;IAEF,IAAI,CAAC,MAAM;QAAE,OAAO,KAAK,CAAA;IAEzB,IAAI,QAAQ,GAAG,MAAM,IAAA,qBAAa,EAAC,cAAI,CAAC,CAAC,SAAS,CAAC,EAAE,EAAE,EAAE,MAAM,EAAE,CAAC,CAAA;IAClE,IAAI,CAAC,QAAQ;QAAE,OAAO,KAAK,CAAA;IAC3B,IAAI,QAAQ,CAAC,MAAM,IAAI,oBAAU,CAAC,MAAM;QAAE,OAAO,KAAK,CAAA;IAEtD,QAAQ,CAAC,MAAM,GAAG,oBAAU,CAAC,SAAS,CAAA;IACtC,QAAQ,CAAC,QAAQ,GAAG,cAAI,CAAC,MAAM,CAAC,QAAQ,EAAE,QAAQ,CAAC,IAAI,CAAC,CAAA;IACxD,QAAQ,CAAC,SAAS,GAAG,CAAC,CAAA;IAEtB,MAAM,IAAA,qBAAa,EAAC,cAAI,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAA;IACxC,MAAM,IAAA,qBAAa,EAAC,yCAAiB,CAAC,CAAC,MAAM,CAAC;QAC5C,MAAM;QACN,KAAK;QACL,IAAI,EAAE,6CAAqB,CAAC,MAAM;KACnC,CAAC,CAAA;IAEF,OAAO,IAAI,CAAA;AACb,CAAC","sourcesContent":["import { URL } from 'url'\n\nimport { sendEmail } from '@things-factory/email-base'\nimport { getRepository } from '@things-factory/shell'\n\nimport { User, UserStatus } from '../service/user/user.js'\nimport { VerificationToken, VerificationTokenType } from '../service/verification-token/verification-token.js'\nimport { getUnlockUserEmailForm } from '../templates/account-unlock-email.js'\nimport { makeVerificationToken } from './utils/make-verification-token.js'\nimport { saveVerificationToken } from './utils/save-verification-token.js'\n\nexport async function sendUnlockUserEmail({ user, context }) {\n try {\n var token = makeVerificationToken()\n var verifaction = await saveVerificationToken(user.id, token, VerificationTokenType.UNLOCK)\n\n if (verifaction) {\n var serviceUrl = new URL(`/auth/unlock-user?token=${token}`, context.header.referer)\n await sendEmail({\n receiver: user.email,\n subject: 'Your account is locked',\n content: getUnlockUserEmailForm({\n username: user.username,\n name: user.name,\n resetUrl: serviceUrl\n })\n })\n\n return true\n }\n } catch (e) {\n return false\n }\n}\n\nexport async function unlockUser(token, password) {\n var { userId } = await getRepository(VerificationToken).findOne({\n where: {\n token,\n type: VerificationTokenType.UNLOCK\n }\n })\n\n if (!userId) return false\n\n var userInfo = await getRepository(User).findOneBy({ id: userId })\n if (!userInfo) return false\n if (userInfo.status != UserStatus.LOCKED) return false\n\n userInfo.status = UserStatus.ACTIVATED\n userInfo.password = User.encode(password, userInfo.salt)\n userInfo.failCount = 0\n\n await getRepository(User).save(userInfo)\n await getRepository(VerificationToken).delete({\n userId,\n token,\n type: VerificationTokenType.UNLOCK\n })\n\n return true\n}\n"]}
@@ -7,8 +7,8 @@ exports.validatePasswordByRule = validatePasswordByRule;
7
7
  const tslib_1 = require("tslib");
8
8
  const i18next_1 = tslib_1.__importDefault(require("i18next"));
9
9
  const env_1 = require("@things-factory/env");
10
- const error_code_1 = require("../../constants/error-code");
11
- const auth_error_1 = require("../../errors/auth-error");
10
+ const error_code_js_1 = require("../../constants/error-code.js");
11
+ const auth_error_js_1 = require("../../errors/auth-error.js");
12
12
  const passwordConfig = env_1.config.get('password') || {
13
13
  lowerCase: true,
14
14
  upperCase: true,
@@ -77,8 +77,8 @@ function validatePasswordByRule(password, lng) {
77
77
  return;
78
78
  }
79
79
  const rule = generatePasswordPatternHelp(passwordConfig, lng);
80
- throw new auth_error_1.AuthError({
81
- errorCode: error_code_1.PASSWORD_PATTERN_NOT_MATCHED,
80
+ throw new auth_error_js_1.AuthError({
81
+ errorCode: error_code_js_1.PASSWORD_PATTERN_NOT_MATCHED,
82
82
  detail: {
83
83
  rule
84
84
  }
@@ -1 +1 @@
1
- {"version":3,"file":"password-rule.js","sourceRoot":"","sources":["../../../server/controllers/utils/password-rule.ts"],"names":[],"mappings":";;;AA0DA,kEAsCC;AAGD,oCAEC;AAED,wDAgBC;;AAvHD,8DAA6B;AAE7B,6CAA4C;AAE5C,2DAAyE;AACzE,wDAAmD;AAEnD,MAAM,cAAc,GAAG,YAAM,CAAC,GAAG,CAAC,UAAU,CAAC,IAAI;IAC/C,SAAS,EAAE,IAAI;IACf,SAAS,EAAE,IAAI;IACf,KAAK,EAAE,IAAI;IACX,gBAAgB,EAAE,IAAI;IACtB,WAAW,EAAE,KAAK;IAClB,eAAe,EAAE,IAAI;IACrB,eAAe,EAAE,KAAK;IACtB,oBAAoB,EAAE,CAAC;IACvB,oBAAoB,EAAE,EAAE;CACzB,CAAA;AAED,SAAS,6BAA6B,CAAC,EACrC,SAAS,GAAG,IAAI,EAChB,SAAS,GAAG,IAAI,EAChB,KAAK,GAAG,IAAI,EACZ,gBAAgB,GAAG,IAAI,EACvB,WAAW,GAAG,KAAK,EACnB,eAAe,GAAG,IAAI,EACtB,eAAe,GAAG,KAAK,EACvB,oBAAoB,GAAG,CAAC,EACxB,oBAAoB,GAAG,EAAE,EAC1B,GAAG,EAAE;IACJ,IAAI,cAAc,GAAG,eAAe;QAClC,CAAC,CAAC;YACE,SAAS,CAAC,CAAC,CAAC,aAAa,CAAC,CAAC,CAAC,EAAE,EAAE,wCAAwC;YACxE,SAAS,CAAC,CAAC,CAAC,aAAa,CAAC,CAAC,CAAC,EAAE,EAAE,wCAAwC;YACxE,KAAK,CAAC,CAAC,CAAC,WAAW,CAAC,CAAC,CAAC,EAAE,EAAE,yBAAyB;YACnD,gBAAgB,CAAC,CAAC,CAAC,oBAAoB,CAAC,CAAC,CAAC,EAAE,EAAE,qCAAqC;YACnF,CAAC,WAAW,CAAC,CAAC,CAAC,yBAAyB,CAAC,CAAC,CAAC,EAAE,EAAE,gDAAgD;YAC/F,KAAK,oBAAoB,IAAI,CAAC,6BAA6B;SAC5D;QACH,CAAC,CAAC,EAAE,CAAA;IAEN,IAAI,cAAc,GAAG,eAAe;QAClC,CAAC,CAAC;YACE,KAAK,oBAAoB,IAAI,CAAC,8BAA8B;SAC7D;QACH,CAAC,CAAC,EAAE,CAAA;IAEN,IAAI,SAAS,GAAG;QACd,GAAG,EAAE,aAAa;QAClB,GAAG,cAAc;QACjB,cAAc,CAAC,MAAM,IAAI,cAAc,CAAC,MAAM,CAAC,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE;QACzD,GAAG,cAAc;QACjB,GAAG,CAAC,aAAa;KAClB,CAAA;IAED,OAAO,IAAI,MAAM,CAAC,SAAS,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC,CAAA;AACvC,CAAC;AAED,SAAgB,2BAA2B,CACzC,EACE,SAAS,GAAG,IAAI,EAChB,SAAS,GAAG,IAAI,EAChB,KAAK,GAAG,IAAI,EACZ,gBAAgB,GAAG,IAAI,EACvB,WAAW,GAAG,KAAK,EACnB,eAAe,GAAG,IAAI,EACtB,eAAe,GAAG,KAAK,EACvB,oBAAoB,GAAG,CAAC,EACxB,oBAAoB,GAAG,EAAE,EAC1B,GAAG,EAAE,EACN,GAAG;IAEH,GAAG,GAAG,GAAG,IAAI,OAAO,CAAA;IACpB,IAAI,YAAY,GAAG,EAAE,CAAA;IAErB,MAAM,CAAC,GAAG,iBAAO,CAAC,SAAS,CAAC,GAAG,EAAE,cAAc,CAAC,CAAA;IAEhD,IAAI,eAAe,EAAE,CAAC;QACpB,YAAY,CAAC,IAAI,CAAC,aAAa,oBAAoB,aAAa,CAAC,CAAA;IACnE,CAAC;IAED,IAAI,eAAe,EAAE,CAAC;QACpB,CAAC,eAAe;YACd,YAAY,CAAC,IAAI,CACf,CAAC,CAAC,gCAAgC,EAAE;gBAClC,MAAM,EAAE,oBAAoB;aAC7B,CAAC,CACH,CAAA;QACH,SAAS,IAAI,YAAY,CAAC,IAAI,CAAC,CAAC,CAAC,kCAAkC,CAAC,CAAC,CAAA;QACrE,SAAS,IAAI,YAAY,CAAC,IAAI,CAAC,CAAC,CAAC,kCAAkC,CAAC,CAAC,CAAA;QACrE,KAAK,IAAI,YAAY,CAAC,IAAI,CAAC,CAAC,CAAC,8BAA8B,CAAC,CAAC,CAAA;QAC7D,gBAAgB,IAAI,YAAY,CAAC,IAAI,CAAC,CAAC,CAAC,gCAAgC,CAAC,CAAC,CAAA;QAC1E,CAAC,WAAW,IAAI,YAAY,CAAC,IAAI,CAAC,CAAC,CAAC,0BAA0B,CAAC,CAAC,CAAA;IAClE,CAAC;IAED,OAAO,YAAY,CAAC,IAAI,CAAC,IAAI,CAAC,CAAA;AAChC,CAAC;AAEY,QAAA,eAAe,GAAG,6BAA6B,CAAC,cAAc,CAAC,CAAA;AAC5E,SAAgB,YAAY,CAAC,GAAG;IAC9B,OAAO,2BAA2B,CAAC,cAAc,EAAE,GAAG,CAAC,CAAA;AACzD,CAAC;AAED,SAAgB,sBAAsB,CAAC,QAAQ,EAAE,GAAG;IAClD,IAAI,CAAC,uBAAe,EAAE,CAAC;QACrB,OAAM;IACR,CAAC;IAED,IAAI,uBAAe,CAAC,IAAI,CAAC,QAAQ,CAAC,EAAE,CAAC;QACnC,OAAM;IACR,CAAC;IAED,MAAM,IAAI,GAAG,2BAA2B,CAAC,cAAc,EAAE,GAAG,CAAC,CAAA;IAC7D,MAAM,IAAI,sBAAS,CAAC;QAClB,SAAS,EAAE,yCAA4B;QACvC,MAAM,EAAE;YACN,IAAI;SACL;KACF,CAAC,CAAA;AACJ,CAAC","sourcesContent":["import i18next from 'i18next'\n\nimport { config } from '@things-factory/env'\n\nimport { PASSWORD_PATTERN_NOT_MATCHED } from '../../constants/error-code'\nimport { AuthError } from '../../errors/auth-error'\n\nconst passwordConfig = config.get('password') || {\n lowerCase: true,\n upperCase: true,\n digit: true,\n specialCharacter: true,\n allowRepeat: false,\n useTightPattern: true,\n useLoosePattern: false,\n tightCharacterLength: 8,\n looseCharacterLength: 15\n}\n\nfunction generatePasswordPatternRegExp({\n lowerCase = true,\n upperCase = true,\n digit = true,\n specialCharacter = true,\n allowRepeat = false,\n useTightPattern = true,\n useLoosePattern = false,\n tightCharacterLength = 8,\n looseCharacterLength = 15\n} = {}) {\n var tightChecklist = useTightPattern\n ? [\n lowerCase ? '(?=.*[a-z])' : '', // has at least one lower case character\n upperCase ? '(?=.*[A-Z])' : '', // has at least one upper case character\n digit ? '(?=.*\\\\d)' : '', // has at least one digit\n specialCharacter ? '(?=.*[!@#$%^&*()])' : '', // has at least one special character\n !allowRepeat ? '(?!.*(.)\\\\1(?=\\\\1{1,}))' : '', // has not an repeated character more than twice\n `.{${tightCharacterLength},}` // has a length of 8 and more\n ]\n : []\n\n var looseChecklist = useLoosePattern\n ? [\n `.{${looseCharacterLength},}` // has a length of 15 and more\n ]\n : []\n\n var checkList = [\n '^', // from start\n ...tightChecklist,\n tightChecklist.length && looseChecklist.length ? '|' : '',\n ...looseChecklist,\n '$' //to the end\"\n ]\n\n return new RegExp(checkList.join(''))\n}\n\nexport function generatePasswordPatternHelp(\n {\n lowerCase = true,\n upperCase = true,\n digit = true,\n specialCharacter = true,\n allowRepeat = false,\n useTightPattern = true,\n useLoosePattern = false,\n tightCharacterLength = 8,\n looseCharacterLength = 15\n } = {},\n lng\n) {\n lng = lng || 'en-US'\n var descriptions = []\n\n const t = i18next.getFixedT(lng, 'translations')\n\n if (useLoosePattern) {\n descriptions.push(`more than ${looseCharacterLength} characters`)\n }\n\n if (useTightPattern) {\n !useLoosePattern &&\n descriptions.push(\n t('text.pattern_minimum_charaters', {\n length: tightCharacterLength\n })\n )\n lowerCase && descriptions.push(t('text.pattern_atleast_1_lowercase'))\n upperCase && descriptions.push(t('text.pattern_atleast_1_uppercase'))\n digit && descriptions.push(t('text.pattern_atleast_1_digit'))\n specialCharacter && descriptions.push(t('text.pattern_atleast_1_special'))\n !allowRepeat && descriptions.push(t('text.pattern_not_allowed'))\n }\n\n return descriptions.join(', ')\n}\n\nexport const passwordPattern = generatePasswordPatternRegExp(passwordConfig)\nexport function passwordHelp(lng) {\n return generatePasswordPatternHelp(passwordConfig, lng)\n}\n\nexport function validatePasswordByRule(password, lng) {\n if (!passwordPattern) {\n return\n }\n\n if (passwordPattern.test(password)) {\n return\n }\n\n const rule = generatePasswordPatternHelp(passwordConfig, lng)\n throw new AuthError({\n errorCode: PASSWORD_PATTERN_NOT_MATCHED,\n detail: {\n rule\n }\n })\n}\n"]}
1
+ {"version":3,"file":"password-rule.js","sourceRoot":"","sources":["../../../server/controllers/utils/password-rule.ts"],"names":[],"mappings":";;;AA0DA,kEAsCC;AAGD,oCAEC;AAED,wDAgBC;;AAvHD,8DAA6B;AAE7B,6CAA4C;AAE5C,iEAA4E;AAC5E,8DAAsD;AAEtD,MAAM,cAAc,GAAG,YAAM,CAAC,GAAG,CAAC,UAAU,CAAC,IAAI;IAC/C,SAAS,EAAE,IAAI;IACf,SAAS,EAAE,IAAI;IACf,KAAK,EAAE,IAAI;IACX,gBAAgB,EAAE,IAAI;IACtB,WAAW,EAAE,KAAK;IAClB,eAAe,EAAE,IAAI;IACrB,eAAe,EAAE,KAAK;IACtB,oBAAoB,EAAE,CAAC;IACvB,oBAAoB,EAAE,EAAE;CACzB,CAAA;AAED,SAAS,6BAA6B,CAAC,EACrC,SAAS,GAAG,IAAI,EAChB,SAAS,GAAG,IAAI,EAChB,KAAK,GAAG,IAAI,EACZ,gBAAgB,GAAG,IAAI,EACvB,WAAW,GAAG,KAAK,EACnB,eAAe,GAAG,IAAI,EACtB,eAAe,GAAG,KAAK,EACvB,oBAAoB,GAAG,CAAC,EACxB,oBAAoB,GAAG,EAAE,EAC1B,GAAG,EAAE;IACJ,IAAI,cAAc,GAAG,eAAe;QAClC,CAAC,CAAC;YACE,SAAS,CAAC,CAAC,CAAC,aAAa,CAAC,CAAC,CAAC,EAAE,EAAE,wCAAwC;YACxE,SAAS,CAAC,CAAC,CAAC,aAAa,CAAC,CAAC,CAAC,EAAE,EAAE,wCAAwC;YACxE,KAAK,CAAC,CAAC,CAAC,WAAW,CAAC,CAAC,CAAC,EAAE,EAAE,yBAAyB;YACnD,gBAAgB,CAAC,CAAC,CAAC,oBAAoB,CAAC,CAAC,CAAC,EAAE,EAAE,qCAAqC;YACnF,CAAC,WAAW,CAAC,CAAC,CAAC,yBAAyB,CAAC,CAAC,CAAC,EAAE,EAAE,gDAAgD;YAC/F,KAAK,oBAAoB,IAAI,CAAC,6BAA6B;SAC5D;QACH,CAAC,CAAC,EAAE,CAAA;IAEN,IAAI,cAAc,GAAG,eAAe;QAClC,CAAC,CAAC;YACE,KAAK,oBAAoB,IAAI,CAAC,8BAA8B;SAC7D;QACH,CAAC,CAAC,EAAE,CAAA;IAEN,IAAI,SAAS,GAAG;QACd,GAAG,EAAE,aAAa;QAClB,GAAG,cAAc;QACjB,cAAc,CAAC,MAAM,IAAI,cAAc,CAAC,MAAM,CAAC,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE;QACzD,GAAG,cAAc;QACjB,GAAG,CAAC,aAAa;KAClB,CAAA;IAED,OAAO,IAAI,MAAM,CAAC,SAAS,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC,CAAA;AACvC,CAAC;AAED,SAAgB,2BAA2B,CACzC,EACE,SAAS,GAAG,IAAI,EAChB,SAAS,GAAG,IAAI,EAChB,KAAK,GAAG,IAAI,EACZ,gBAAgB,GAAG,IAAI,EACvB,WAAW,GAAG,KAAK,EACnB,eAAe,GAAG,IAAI,EACtB,eAAe,GAAG,KAAK,EACvB,oBAAoB,GAAG,CAAC,EACxB,oBAAoB,GAAG,EAAE,EAC1B,GAAG,EAAE,EACN,GAAG;IAEH,GAAG,GAAG,GAAG,IAAI,OAAO,CAAA;IACpB,IAAI,YAAY,GAAG,EAAE,CAAA;IAErB,MAAM,CAAC,GAAG,iBAAO,CAAC,SAAS,CAAC,GAAG,EAAE,cAAc,CAAC,CAAA;IAEhD,IAAI,eAAe,EAAE,CAAC;QACpB,YAAY,CAAC,IAAI,CAAC,aAAa,oBAAoB,aAAa,CAAC,CAAA;IACnE,CAAC;IAED,IAAI,eAAe,EAAE,CAAC;QACpB,CAAC,eAAe;YACd,YAAY,CAAC,IAAI,CACf,CAAC,CAAC,gCAAgC,EAAE;gBAClC,MAAM,EAAE,oBAAoB;aAC7B,CAAC,CACH,CAAA;QACH,SAAS,IAAI,YAAY,CAAC,IAAI,CAAC,CAAC,CAAC,kCAAkC,CAAC,CAAC,CAAA;QACrE,SAAS,IAAI,YAAY,CAAC,IAAI,CAAC,CAAC,CAAC,kCAAkC,CAAC,CAAC,CAAA;QACrE,KAAK,IAAI,YAAY,CAAC,IAAI,CAAC,CAAC,CAAC,8BAA8B,CAAC,CAAC,CAAA;QAC7D,gBAAgB,IAAI,YAAY,CAAC,IAAI,CAAC,CAAC,CAAC,gCAAgC,CAAC,CAAC,CAAA;QAC1E,CAAC,WAAW,IAAI,YAAY,CAAC,IAAI,CAAC,CAAC,CAAC,0BAA0B,CAAC,CAAC,CAAA;IAClE,CAAC;IAED,OAAO,YAAY,CAAC,IAAI,CAAC,IAAI,CAAC,CAAA;AAChC,CAAC;AAEY,QAAA,eAAe,GAAG,6BAA6B,CAAC,cAAc,CAAC,CAAA;AAC5E,SAAgB,YAAY,CAAC,GAAG;IAC9B,OAAO,2BAA2B,CAAC,cAAc,EAAE,GAAG,CAAC,CAAA;AACzD,CAAC;AAED,SAAgB,sBAAsB,CAAC,QAAQ,EAAE,GAAG;IAClD,IAAI,CAAC,uBAAe,EAAE,CAAC;QACrB,OAAM;IACR,CAAC;IAED,IAAI,uBAAe,CAAC,IAAI,CAAC,QAAQ,CAAC,EAAE,CAAC;QACnC,OAAM;IACR,CAAC;IAED,MAAM,IAAI,GAAG,2BAA2B,CAAC,cAAc,EAAE,GAAG,CAAC,CAAA;IAC7D,MAAM,IAAI,yBAAS,CAAC;QAClB,SAAS,EAAE,4CAA4B;QACvC,MAAM,EAAE;YACN,IAAI;SACL;KACF,CAAC,CAAA;AACJ,CAAC","sourcesContent":["import i18next from 'i18next'\n\nimport { config } from '@things-factory/env'\n\nimport { PASSWORD_PATTERN_NOT_MATCHED } from '../../constants/error-code.js'\nimport { AuthError } from '../../errors/auth-error.js'\n\nconst passwordConfig = config.get('password') || {\n lowerCase: true,\n upperCase: true,\n digit: true,\n specialCharacter: true,\n allowRepeat: false,\n useTightPattern: true,\n useLoosePattern: false,\n tightCharacterLength: 8,\n looseCharacterLength: 15\n}\n\nfunction generatePasswordPatternRegExp({\n lowerCase = true,\n upperCase = true,\n digit = true,\n specialCharacter = true,\n allowRepeat = false,\n useTightPattern = true,\n useLoosePattern = false,\n tightCharacterLength = 8,\n looseCharacterLength = 15\n} = {}) {\n var tightChecklist = useTightPattern\n ? [\n lowerCase ? '(?=.*[a-z])' : '', // has at least one lower case character\n upperCase ? '(?=.*[A-Z])' : '', // has at least one upper case character\n digit ? '(?=.*\\\\d)' : '', // has at least one digit\n specialCharacter ? '(?=.*[!@#$%^&*()])' : '', // has at least one special character\n !allowRepeat ? '(?!.*(.)\\\\1(?=\\\\1{1,}))' : '', // has not an repeated character more than twice\n `.{${tightCharacterLength},}` // has a length of 8 and more\n ]\n : []\n\n var looseChecklist = useLoosePattern\n ? [\n `.{${looseCharacterLength},}` // has a length of 15 and more\n ]\n : []\n\n var checkList = [\n '^', // from start\n ...tightChecklist,\n tightChecklist.length && looseChecklist.length ? '|' : '',\n ...looseChecklist,\n '$' //to the end\"\n ]\n\n return new RegExp(checkList.join(''))\n}\n\nexport function generatePasswordPatternHelp(\n {\n lowerCase = true,\n upperCase = true,\n digit = true,\n specialCharacter = true,\n allowRepeat = false,\n useTightPattern = true,\n useLoosePattern = false,\n tightCharacterLength = 8,\n looseCharacterLength = 15\n } = {},\n lng\n) {\n lng = lng || 'en-US'\n var descriptions = []\n\n const t = i18next.getFixedT(lng, 'translations')\n\n if (useLoosePattern) {\n descriptions.push(`more than ${looseCharacterLength} characters`)\n }\n\n if (useTightPattern) {\n !useLoosePattern &&\n descriptions.push(\n t('text.pattern_minimum_charaters', {\n length: tightCharacterLength\n })\n )\n lowerCase && descriptions.push(t('text.pattern_atleast_1_lowercase'))\n upperCase && descriptions.push(t('text.pattern_atleast_1_uppercase'))\n digit && descriptions.push(t('text.pattern_atleast_1_digit'))\n specialCharacter && descriptions.push(t('text.pattern_atleast_1_special'))\n !allowRepeat && descriptions.push(t('text.pattern_not_allowed'))\n }\n\n return descriptions.join(', ')\n}\n\nexport const passwordPattern = generatePasswordPatternRegExp(passwordConfig)\nexport function passwordHelp(lng) {\n return generatePasswordPatternHelp(passwordConfig, lng)\n}\n\nexport function validatePasswordByRule(password, lng) {\n if (!passwordPattern) {\n return\n }\n\n if (passwordPattern.test(password)) {\n return\n }\n\n const rule = generatePasswordPatternHelp(passwordConfig, lng)\n throw new AuthError({\n errorCode: PASSWORD_PATTERN_NOT_MATCHED,\n detail: {\n rule\n }\n })\n}\n"]}
@@ -1,4 +1,4 @@
1
- import { Invitation } from '../../service/invitation/invitation';
1
+ import { Invitation } from '../../service/invitation/invitation.js';
2
2
  export declare function saveInvitationToken(id: any, token: any): Promise<{
3
3
  id: any;
4
4
  token: any;
@@ -2,9 +2,9 @@
2
2
  Object.defineProperty(exports, "__esModule", { value: true });
3
3
  exports.saveInvitationToken = saveInvitationToken;
4
4
  const shell_1 = require("@things-factory/shell");
5
- const invitation_1 = require("../../service/invitation/invitation");
5
+ const invitation_js_1 = require("../../service/invitation/invitation.js");
6
6
  async function saveInvitationToken(id, token) {
7
- return await (0, shell_1.getRepository)(invitation_1.Invitation).save({
7
+ return await (0, shell_1.getRepository)(invitation_js_1.Invitation).save({
8
8
  id,
9
9
  token
10
10
  });
@@ -1 +1 @@
1
- {"version":3,"file":"save-invitation-token.js","sourceRoot":"","sources":["../../../server/controllers/utils/save-invitation-token.ts"],"names":[],"mappings":";;AAIA,kDAKC;AATD,iDAAqD;AAErD,oEAAgE;AAEzD,KAAK,UAAU,mBAAmB,CAAC,EAAE,EAAE,KAAK;IACjD,OAAO,MAAM,IAAA,qBAAa,EAAC,uBAAU,CAAC,CAAC,IAAI,CAAC;QAC1C,EAAE;QACF,KAAK;KACN,CAAC,CAAA;AACJ,CAAC","sourcesContent":["import { getRepository } from '@things-factory/shell'\n\nimport { Invitation } from '../../service/invitation/invitation'\n\nexport async function saveInvitationToken(id, token) {\n return await getRepository(Invitation).save({\n id,\n token\n })\n}\n"]}
1
+ {"version":3,"file":"save-invitation-token.js","sourceRoot":"","sources":["../../../server/controllers/utils/save-invitation-token.ts"],"names":[],"mappings":";;AAIA,kDAKC;AATD,iDAAqD;AAErD,0EAAmE;AAE5D,KAAK,UAAU,mBAAmB,CAAC,EAAE,EAAE,KAAK;IACjD,OAAO,MAAM,IAAA,qBAAa,EAAC,0BAAU,CAAC,CAAC,IAAI,CAAC;QAC1C,EAAE;QACF,KAAK;KACN,CAAC,CAAA;AACJ,CAAC","sourcesContent":["import { getRepository } from '@things-factory/shell'\n\nimport { Invitation } from '../../service/invitation/invitation.js'\n\nexport async function saveInvitationToken(id, token) {\n return await getRepository(Invitation).save({\n id,\n token\n })\n}\n"]}
@@ -1,4 +1,4 @@
1
- import { VerificationToken, VerificationTokenType } from '../../service/verification-token/verification-token';
1
+ import { VerificationToken, VerificationTokenType } from '../../service/verification-token/verification-token.js';
2
2
  export declare function saveVerificationToken(id: any, token: any, type?: VerificationTokenType): Promise<{
3
3
  userId: any;
4
4
  token: any;
@@ -2,9 +2,9 @@
2
2
  Object.defineProperty(exports, "__esModule", { value: true });
3
3
  exports.saveVerificationToken = saveVerificationToken;
4
4
  const shell_1 = require("@things-factory/shell");
5
- const verification_token_1 = require("../../service/verification-token/verification-token");
6
- async function saveVerificationToken(id, token, type = verification_token_1.VerificationTokenType.ACTIVATION) {
7
- const verificationRepo = (0, shell_1.getRepository)(verification_token_1.VerificationToken);
5
+ const verification_token_js_1 = require("../../service/verification-token/verification-token.js");
6
+ async function saveVerificationToken(id, token, type = verification_token_js_1.VerificationTokenType.ACTIVATION) {
7
+ const verificationRepo = (0, shell_1.getRepository)(verification_token_js_1.VerificationToken);
8
8
  return await verificationRepo.save({
9
9
  userId: id,
10
10
  token,
@@ -1 +1 @@
1
- {"version":3,"file":"save-verification-token.js","sourceRoot":"","sources":["../../../server/controllers/utils/save-verification-token.ts"],"names":[],"mappings":";;AAIA,sDAOC;AAXD,iDAAqD;AAErD,4FAA8G;AAEvG,KAAK,UAAU,qBAAqB,CAAC,EAAE,EAAE,KAAK,EAAE,IAAI,GAAG,0CAAqB,CAAC,UAAU;IAC5F,MAAM,gBAAgB,GAAG,IAAA,qBAAa,EAAC,sCAAiB,CAAC,CAAA;IACzD,OAAO,MAAM,gBAAgB,CAAC,IAAI,CAAC;QACjC,MAAM,EAAE,EAAE;QACV,KAAK;QACL,IAAI;KACL,CAAC,CAAA;AACJ,CAAC","sourcesContent":["import { getRepository } from '@things-factory/shell'\n\nimport { VerificationToken, VerificationTokenType } from '../../service/verification-token/verification-token'\n\nexport async function saveVerificationToken(id, token, type = VerificationTokenType.ACTIVATION) {\n const verificationRepo = getRepository(VerificationToken)\n return await verificationRepo.save({\n userId: id,\n token,\n type\n })\n}\n"]}
1
+ {"version":3,"file":"save-verification-token.js","sourceRoot":"","sources":["../../../server/controllers/utils/save-verification-token.ts"],"names":[],"mappings":";;AAIA,sDAOC;AAXD,iDAAqD;AAErD,kGAAiH;AAE1G,KAAK,UAAU,qBAAqB,CAAC,EAAE,EAAE,KAAK,EAAE,IAAI,GAAG,6CAAqB,CAAC,UAAU;IAC5F,MAAM,gBAAgB,GAAG,IAAA,qBAAa,EAAC,yCAAiB,CAAC,CAAA;IACzD,OAAO,MAAM,gBAAgB,CAAC,IAAI,CAAC;QACjC,MAAM,EAAE,EAAE;QACV,KAAK;QACL,IAAI;KACL,CAAC,CAAA;AACJ,CAAC","sourcesContent":["import { getRepository } from '@things-factory/shell'\n\nimport { VerificationToken, VerificationTokenType } from '../../service/verification-token/verification-token.js'\n\nexport async function saveVerificationToken(id, token, type = VerificationTokenType.ACTIVATION) {\n const verificationRepo = getRepository(VerificationToken)\n return await verificationRepo.save({\n userId: id,\n token,\n type\n })\n}\n"]}
@@ -6,22 +6,22 @@ exports.resendVerificationEmail = resendVerificationEmail;
6
6
  const url_1 = require("url");
7
7
  const email_base_1 = require("@things-factory/email-base");
8
8
  const shell_1 = require("@things-factory/shell");
9
- const auth_error_1 = require("../errors/auth-error");
10
- const user_1 = require("../service/user/user");
11
- const verification_token_1 = require("../service/verification-token/verification-token");
12
- const verification_email_1 = require("../templates/verification-email");
13
- const make_verification_token_1 = require("./utils/make-verification-token");
14
- const save_verification_token_1 = require("./utils/save-verification-token");
9
+ const auth_error_js_1 = require("../errors/auth-error.js");
10
+ const user_js_1 = require("../service/user/user.js");
11
+ const verification_token_js_1 = require("../service/verification-token/verification-token.js");
12
+ const verification_email_js_1 = require("../templates/verification-email.js");
13
+ const make_verification_token_js_1 = require("./utils/make-verification-token.js");
14
+ const save_verification_token_js_1 = require("./utils/save-verification-token.js");
15
15
  async function sendVerificationEmail({ user, context }) {
16
16
  try {
17
- var token = (0, make_verification_token_1.makeVerificationToken)();
18
- var verifaction = await (0, save_verification_token_1.saveVerificationToken)(user.id, token);
17
+ var token = (0, make_verification_token_js_1.makeVerificationToken)();
18
+ var verifaction = await (0, save_verification_token_js_1.saveVerificationToken)(user.id, token);
19
19
  if (verifaction) {
20
20
  var serviceUrl = new url_1.URL(`/auth/verify/${token}`, context.header.referer);
21
21
  await (0, email_base_1.sendEmail)({
22
22
  receiver: user.email,
23
23
  subject: 'Verify your email',
24
- content: (0, verification_email_1.getVerificationEmailForm)({
24
+ content: (0, verification_email_js_1.getVerificationEmailForm)({
25
25
  username: user.username,
26
26
  name: user.name,
27
27
  verifyUrl: serviceUrl
@@ -35,41 +35,41 @@ async function sendVerificationEmail({ user, context }) {
35
35
  }
36
36
  }
37
37
  async function verify(token) {
38
- var verification = await (0, shell_1.getRepository)(verification_token_1.VerificationToken).findOne({
38
+ var verification = await (0, shell_1.getRepository)(verification_token_js_1.VerificationToken).findOne({
39
39
  where: {
40
40
  token
41
41
  }
42
42
  });
43
43
  if (!verification) {
44
- throw new auth_error_1.AuthError({
45
- errorCode: auth_error_1.AuthError.ERROR_CODES.VERIFICATION_ERROR
44
+ throw new auth_error_js_1.AuthError({
45
+ errorCode: auth_error_js_1.AuthError.ERROR_CODES.VERIFICATION_ERROR
46
46
  });
47
47
  }
48
- var userInfo = await (0, shell_1.getRepository)(user_1.User).findOneBy({ id: verification.userId });
48
+ var userInfo = await (0, shell_1.getRepository)(user_js_1.User).findOneBy({ id: verification.userId });
49
49
  if (!userInfo) {
50
- throw new auth_error_1.AuthError({
51
- errorCode: auth_error_1.AuthError.ERROR_CODES.VERIFICATION_ERROR
50
+ throw new auth_error_js_1.AuthError({
51
+ errorCode: auth_error_js_1.AuthError.ERROR_CODES.VERIFICATION_ERROR
52
52
  });
53
53
  }
54
- if (!(userInfo.status == user_1.UserStatus.INACTIVE || userInfo.status == user_1.UserStatus.LOCKED)) {
55
- throw new auth_error_1.AuthError({
56
- errorCode: auth_error_1.AuthError.ERROR_CODES.VERIFICATION_ERROR
54
+ if (!(userInfo.status == user_js_1.UserStatus.INACTIVE || userInfo.status == user_js_1.UserStatus.LOCKED)) {
55
+ throw new auth_error_js_1.AuthError({
56
+ errorCode: auth_error_js_1.AuthError.ERROR_CODES.VERIFICATION_ERROR
57
57
  });
58
58
  }
59
- userInfo.status = user_1.UserStatus.ACTIVATED;
59
+ userInfo.status = user_js_1.UserStatus.ACTIVATED;
60
60
  userInfo.failCount = 0;
61
- await (0, shell_1.getRepository)(user_1.User).save(userInfo);
62
- await (0, shell_1.getRepository)(verification_token_1.VerificationToken).delete(verification);
61
+ await (0, shell_1.getRepository)(user_js_1.User).save(userInfo);
62
+ await (0, shell_1.getRepository)(verification_token_js_1.VerificationToken).delete(verification);
63
63
  }
64
64
  async function resendVerificationEmail(email, context) {
65
- var user = await (0, shell_1.getRepository)(user_1.User).findOne({
65
+ var user = await (0, shell_1.getRepository)(user_js_1.User).findOne({
66
66
  where: {
67
67
  email
68
68
  }
69
69
  });
70
70
  if (!user)
71
71
  return false;
72
- if (user.status == user_1.UserStatus.ACTIVATED)
72
+ if (user.status == user_js_1.UserStatus.ACTIVATED)
73
73
  return false;
74
74
  return await sendVerificationEmail({
75
75
  user,
@@ -1 +1 @@
1
- {"version":3,"file":"verification.js","sourceRoot":"","sources":["../../server/controllers/verification.ts"],"names":[],"mappings":";;AAYA,sDAsBC;AAED,wBA+BC;AAED,0DAcC;AAnFD,6BAAyB;AAEzB,2DAAsD;AACtD,iDAAqD;AAErD,qDAAgD;AAChD,+CAAuD;AACvD,yFAAoF;AACpF,wEAA0E;AAC1E,6EAAuE;AACvE,6EAAuE;AAEhE,KAAK,UAAU,qBAAqB,CAAC,EAAE,IAAI,EAAE,OAAO,EAAE;IAC3D,IAAI,CAAC;QACH,IAAI,KAAK,GAAG,IAAA,+CAAqB,GAAE,CAAA;QACnC,IAAI,WAAW,GAAG,MAAM,IAAA,+CAAqB,EAAC,IAAI,CAAC,EAAE,EAAE,KAAK,CAAC,CAAA;QAE7D,IAAI,WAAW,EAAE,CAAC;YAChB,IAAI,UAAU,GAAG,IAAI,SAAG,CAAC,gBAAgB,KAAK,EAAE,EAAE,OAAO,CAAC,MAAM,CAAC,OAAO,CAAC,CAAA;YACzE,MAAM,IAAA,sBAAS,EAAC;gBACd,QAAQ,EAAE,IAAI,CAAC,KAAK;gBACpB,OAAO,EAAE,mBAAmB;gBAC5B,OAAO,EAAE,IAAA,6CAAwB,EAAC;oBAChC,QAAQ,EAAE,IAAI,CAAC,QAAQ;oBACvB,IAAI,EAAE,IAAI,CAAC,IAAI;oBACf,SAAS,EAAE,UAAU;iBACtB,CAAC;aACH,CAAC,CAAA;YAEF,OAAO,IAAI,CAAA;QACb,CAAC;IACH,CAAC;IAAC,OAAO,CAAC,EAAE,CAAC;QACX,OAAO,KAAK,CAAA;IACd,CAAC;AACH,CAAC;AAEM,KAAK,UAAU,MAAM,CAAC,KAAK;IAChC,IAAI,YAAY,GAAG,MAAM,IAAA,qBAAa,EAAC,sCAAiB,CAAC,CAAC,OAAO,CAAC;QAChE,KAAK,EAAE;YACL,KAAK;SACN;KACF,CAAC,CAAA;IAEF,IAAI,CAAC,YAAY,EAAE,CAAC;QAClB,MAAM,IAAI,sBAAS,CAAC;YAClB,SAAS,EAAE,sBAAS,CAAC,WAAW,CAAC,kBAAkB;SACpD,CAAC,CAAA;IACJ,CAAC;IAED,IAAI,QAAQ,GAAG,MAAM,IAAA,qBAAa,EAAC,WAAI,CAAC,CAAC,SAAS,CAAC,EAAE,EAAE,EAAE,YAAY,CAAC,MAAM,EAAE,CAAC,CAAA;IAC/E,IAAI,CAAC,QAAQ,EAAE,CAAC;QACd,MAAM,IAAI,sBAAS,CAAC;YAClB,SAAS,EAAE,sBAAS,CAAC,WAAW,CAAC,kBAAkB;SACpD,CAAC,CAAA;IACJ,CAAC;IAED,IAAI,CAAC,CAAC,QAAQ,CAAC,MAAM,IAAI,iBAAU,CAAC,QAAQ,IAAI,QAAQ,CAAC,MAAM,IAAI,iBAAU,CAAC,MAAM,CAAC,EAAE,CAAC;QACtF,MAAM,IAAI,sBAAS,CAAC;YAClB,SAAS,EAAE,sBAAS,CAAC,WAAW,CAAC,kBAAkB;SACpD,CAAC,CAAA;IACJ,CAAC;IAED,QAAQ,CAAC,MAAM,GAAG,iBAAU,CAAC,SAAS,CAAA;IACtC,QAAQ,CAAC,SAAS,GAAG,CAAC,CAAA;IAEtB,MAAM,IAAA,qBAAa,EAAC,WAAI,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAA;IACxC,MAAM,IAAA,qBAAa,EAAC,sCAAiB,CAAC,CAAC,MAAM,CAAC,YAAY,CAAC,CAAA;AAC7D,CAAC;AAEM,KAAK,UAAU,uBAAuB,CAAC,KAAK,EAAE,OAAO;IAC1D,IAAI,IAAI,GAAG,MAAM,IAAA,qBAAa,EAAC,WAAI,CAAC,CAAC,OAAO,CAAC;QAC3C,KAAK,EAAE;YACL,KAAK;SACN;KACF,CAAC,CAAA;IAEF,IAAI,CAAC,IAAI;QAAE,OAAO,KAAK,CAAA;IACvB,IAAI,IAAI,CAAC,MAAM,IAAI,iBAAU,CAAC,SAAS;QAAE,OAAO,KAAK,CAAA;IAErD,OAAO,MAAM,qBAAqB,CAAC;QACjC,IAAI;QACJ,OAAO;KACR,CAAC,CAAA;AACJ,CAAC","sourcesContent":["import { URL } from 'url'\n\nimport { sendEmail } from '@things-factory/email-base'\nimport { getRepository } from '@things-factory/shell'\n\nimport { AuthError } from '../errors/auth-error'\nimport { User, UserStatus } from '../service/user/user'\nimport { VerificationToken } from '../service/verification-token/verification-token'\nimport { getVerificationEmailForm } from '../templates/verification-email'\nimport { makeVerificationToken } from './utils/make-verification-token'\nimport { saveVerificationToken } from './utils/save-verification-token'\n\nexport async function sendVerificationEmail({ user, context }) {\n try {\n var token = makeVerificationToken()\n var verifaction = await saveVerificationToken(user.id, token)\n\n if (verifaction) {\n var serviceUrl = new URL(`/auth/verify/${token}`, context.header.referer)\n await sendEmail({\n receiver: user.email,\n subject: 'Verify your email',\n content: getVerificationEmailForm({\n username: user.username,\n name: user.name,\n verifyUrl: serviceUrl\n })\n })\n\n return true\n }\n } catch (e) {\n return false\n }\n}\n\nexport async function verify(token) {\n var verification = await getRepository(VerificationToken).findOne({\n where: {\n token\n }\n })\n\n if (!verification) {\n throw new AuthError({\n errorCode: AuthError.ERROR_CODES.VERIFICATION_ERROR\n })\n }\n\n var userInfo = await getRepository(User).findOneBy({ id: verification.userId })\n if (!userInfo) {\n throw new AuthError({\n errorCode: AuthError.ERROR_CODES.VERIFICATION_ERROR\n })\n }\n\n if (!(userInfo.status == UserStatus.INACTIVE || userInfo.status == UserStatus.LOCKED)) {\n throw new AuthError({\n errorCode: AuthError.ERROR_CODES.VERIFICATION_ERROR\n })\n }\n\n userInfo.status = UserStatus.ACTIVATED\n userInfo.failCount = 0\n\n await getRepository(User).save(userInfo)\n await getRepository(VerificationToken).delete(verification)\n}\n\nexport async function resendVerificationEmail(email, context) {\n var user = await getRepository(User).findOne({\n where: {\n email\n }\n })\n\n if (!user) return false\n if (user.status == UserStatus.ACTIVATED) return false\n\n return await sendVerificationEmail({\n user,\n context\n })\n}\n"]}
1
+ {"version":3,"file":"verification.js","sourceRoot":"","sources":["../../server/controllers/verification.ts"],"names":[],"mappings":";;AAYA,sDAsBC;AAED,wBA+BC;AAED,0DAcC;AAnFD,6BAAyB;AAEzB,2DAAsD;AACtD,iDAAqD;AAErD,2DAAmD;AACnD,qDAA0D;AAC1D,+FAAuF;AACvF,8EAA6E;AAC7E,mFAA0E;AAC1E,mFAA0E;AAEnE,KAAK,UAAU,qBAAqB,CAAC,EAAE,IAAI,EAAE,OAAO,EAAE;IAC3D,IAAI,CAAC;QACH,IAAI,KAAK,GAAG,IAAA,kDAAqB,GAAE,CAAA;QACnC,IAAI,WAAW,GAAG,MAAM,IAAA,kDAAqB,EAAC,IAAI,CAAC,EAAE,EAAE,KAAK,CAAC,CAAA;QAE7D,IAAI,WAAW,EAAE,CAAC;YAChB,IAAI,UAAU,GAAG,IAAI,SAAG,CAAC,gBAAgB,KAAK,EAAE,EAAE,OAAO,CAAC,MAAM,CAAC,OAAO,CAAC,CAAA;YACzE,MAAM,IAAA,sBAAS,EAAC;gBACd,QAAQ,EAAE,IAAI,CAAC,KAAK;gBACpB,OAAO,EAAE,mBAAmB;gBAC5B,OAAO,EAAE,IAAA,gDAAwB,EAAC;oBAChC,QAAQ,EAAE,IAAI,CAAC,QAAQ;oBACvB,IAAI,EAAE,IAAI,CAAC,IAAI;oBACf,SAAS,EAAE,UAAU;iBACtB,CAAC;aACH,CAAC,CAAA;YAEF,OAAO,IAAI,CAAA;QACb,CAAC;IACH,CAAC;IAAC,OAAO,CAAC,EAAE,CAAC;QACX,OAAO,KAAK,CAAA;IACd,CAAC;AACH,CAAC;AAEM,KAAK,UAAU,MAAM,CAAC,KAAK;IAChC,IAAI,YAAY,GAAG,MAAM,IAAA,qBAAa,EAAC,yCAAiB,CAAC,CAAC,OAAO,CAAC;QAChE,KAAK,EAAE;YACL,KAAK;SACN;KACF,CAAC,CAAA;IAEF,IAAI,CAAC,YAAY,EAAE,CAAC;QAClB,MAAM,IAAI,yBAAS,CAAC;YAClB,SAAS,EAAE,yBAAS,CAAC,WAAW,CAAC,kBAAkB;SACpD,CAAC,CAAA;IACJ,CAAC;IAED,IAAI,QAAQ,GAAG,MAAM,IAAA,qBAAa,EAAC,cAAI,CAAC,CAAC,SAAS,CAAC,EAAE,EAAE,EAAE,YAAY,CAAC,MAAM,EAAE,CAAC,CAAA;IAC/E,IAAI,CAAC,QAAQ,EAAE,CAAC;QACd,MAAM,IAAI,yBAAS,CAAC;YAClB,SAAS,EAAE,yBAAS,CAAC,WAAW,CAAC,kBAAkB;SACpD,CAAC,CAAA;IACJ,CAAC;IAED,IAAI,CAAC,CAAC,QAAQ,CAAC,MAAM,IAAI,oBAAU,CAAC,QAAQ,IAAI,QAAQ,CAAC,MAAM,IAAI,oBAAU,CAAC,MAAM,CAAC,EAAE,CAAC;QACtF,MAAM,IAAI,yBAAS,CAAC;YAClB,SAAS,EAAE,yBAAS,CAAC,WAAW,CAAC,kBAAkB;SACpD,CAAC,CAAA;IACJ,CAAC;IAED,QAAQ,CAAC,MAAM,GAAG,oBAAU,CAAC,SAAS,CAAA;IACtC,QAAQ,CAAC,SAAS,GAAG,CAAC,CAAA;IAEtB,MAAM,IAAA,qBAAa,EAAC,cAAI,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAA;IACxC,MAAM,IAAA,qBAAa,EAAC,yCAAiB,CAAC,CAAC,MAAM,CAAC,YAAY,CAAC,CAAA;AAC7D,CAAC;AAEM,KAAK,UAAU,uBAAuB,CAAC,KAAK,EAAE,OAAO;IAC1D,IAAI,IAAI,GAAG,MAAM,IAAA,qBAAa,EAAC,cAAI,CAAC,CAAC,OAAO,CAAC;QAC3C,KAAK,EAAE;YACL,KAAK;SACN;KACF,CAAC,CAAA;IAEF,IAAI,CAAC,IAAI;QAAE,OAAO,KAAK,CAAA;IACvB,IAAI,IAAI,CAAC,MAAM,IAAI,oBAAU,CAAC,SAAS;QAAE,OAAO,KAAK,CAAA;IAErD,OAAO,MAAM,qBAAqB,CAAC;QACjC,IAAI;QACJ,OAAO;KACR,CAAC,CAAA;AACJ,CAAC","sourcesContent":["import { URL } from 'url'\n\nimport { sendEmail } from '@things-factory/email-base'\nimport { getRepository } from '@things-factory/shell'\n\nimport { AuthError } from '../errors/auth-error.js'\nimport { User, UserStatus } from '../service/user/user.js'\nimport { VerificationToken } from '../service/verification-token/verification-token.js'\nimport { getVerificationEmailForm } from '../templates/verification-email.js'\nimport { makeVerificationToken } from './utils/make-verification-token.js'\nimport { saveVerificationToken } from './utils/save-verification-token.js'\n\nexport async function sendVerificationEmail({ user, context }) {\n try {\n var token = makeVerificationToken()\n var verifaction = await saveVerificationToken(user.id, token)\n\n if (verifaction) {\n var serviceUrl = new URL(`/auth/verify/${token}`, context.header.referer)\n await sendEmail({\n receiver: user.email,\n subject: 'Verify your email',\n content: getVerificationEmailForm({\n username: user.username,\n name: user.name,\n verifyUrl: serviceUrl\n })\n })\n\n return true\n }\n } catch (e) {\n return false\n }\n}\n\nexport async function verify(token) {\n var verification = await getRepository(VerificationToken).findOne({\n where: {\n token\n }\n })\n\n if (!verification) {\n throw new AuthError({\n errorCode: AuthError.ERROR_CODES.VERIFICATION_ERROR\n })\n }\n\n var userInfo = await getRepository(User).findOneBy({ id: verification.userId })\n if (!userInfo) {\n throw new AuthError({\n errorCode: AuthError.ERROR_CODES.VERIFICATION_ERROR\n })\n }\n\n if (!(userInfo.status == UserStatus.INACTIVE || userInfo.status == UserStatus.LOCKED)) {\n throw new AuthError({\n errorCode: AuthError.ERROR_CODES.VERIFICATION_ERROR\n })\n }\n\n userInfo.status = UserStatus.ACTIVATED\n userInfo.failCount = 0\n\n await getRepository(User).save(userInfo)\n await getRepository(VerificationToken).delete(verification)\n}\n\nexport async function resendVerificationEmail(email, context) {\n var user = await getRepository(User).findOne({\n where: {\n email\n }\n })\n\n if (!user) return false\n if (user.status == UserStatus.ACTIVATED) return false\n\n return await sendVerificationEmail({\n user,\n context\n })\n}\n"]}
@@ -2,7 +2,7 @@
2
2
  Object.defineProperty(exports, "__esModule", { value: true });
3
3
  exports.AuthError = void 0;
4
4
  const tslib_1 = require("tslib");
5
- const ERROR_CODES = tslib_1.__importStar(require("../constants/error-code"));
5
+ const ERROR_CODES = tslib_1.__importStar(require("../constants/error-code.js"));
6
6
  class AuthError extends Error {
7
7
  static get ERROR_CODES() {
8
8
  return Object.assign({}, ERROR_CODES);
@@ -1 +1 @@
1
- {"version":3,"file":"auth-error.js","sourceRoot":"","sources":["../../server/errors/auth-error.ts"],"names":[],"mappings":";;;;AAAA,6EAAsD;AAMtD,MAAa,SAAU,SAAQ,KAAK;IAClC,MAAM,KAAK,WAAW;QACpB,yBACK,WAAW,EACf;IACH,CAAC;IAKD,YAAY,EAAE,SAAS,EAAE,MAAM,EAAqB;QAClD,KAAK,CAAC,SAAS,CAAC,CAAA;QAEhB,IAAI,CAAC,IAAI,GAAG,YAAY,CAAA;QACxB,IAAI,CAAC,SAAS,GAAG,SAAS,CAAA;QAC1B,IAAI,CAAC,MAAM,GAAG,MAAM,CAAA;IACtB,CAAC;CACF;AAjBD,8BAiBC","sourcesContent":["import * as ERROR_CODES from '../constants/error-code'\n\ntype AuthErrorArgument = {\n errorCode: string\n detail?: Object\n}\nexport class AuthError extends Error {\n static get ERROR_CODES(): any {\n return {\n ...ERROR_CODES\n }\n }\n\n errorCode: any\n detail: Object\n\n constructor({ errorCode, detail }: AuthErrorArgument) {\n super(errorCode)\n\n this.name = 'auth-error'\n this.errorCode = errorCode\n this.detail = detail\n }\n}\n"]}
1
+ {"version":3,"file":"auth-error.js","sourceRoot":"","sources":["../../server/errors/auth-error.ts"],"names":[],"mappings":";;;;AAAA,gFAAyD;AAMzD,MAAa,SAAU,SAAQ,KAAK;IAClC,MAAM,KAAK,WAAW;QACpB,yBACK,WAAW,EACf;IACH,CAAC;IAKD,YAAY,EAAE,SAAS,EAAE,MAAM,EAAqB;QAClD,KAAK,CAAC,SAAS,CAAC,CAAA;QAEhB,IAAI,CAAC,IAAI,GAAG,YAAY,CAAA;QACxB,IAAI,CAAC,SAAS,GAAG,SAAS,CAAA;QAC1B,IAAI,CAAC,MAAM,GAAG,MAAM,CAAA;IACtB,CAAC;CACF;AAjBD,8BAiBC","sourcesContent":["import * as ERROR_CODES from '../constants/error-code.js'\n\ntype AuthErrorArgument = {\n errorCode: string\n detail?: Object\n}\nexport class AuthError extends Error {\n static get ERROR_CODES(): any {\n return {\n ...ERROR_CODES\n }\n }\n\n errorCode: any\n detail: Object\n\n constructor({ errorCode, detail }: AuthErrorArgument) {\n super(errorCode)\n\n this.name = 'auth-error'\n this.errorCode = errorCode\n this.detail = detail\n }\n}\n"]}
@@ -1,2 +1,2 @@
1
- export * from './auth-error';
2
- export * from './user-domain-not-match-error';
1
+ export * from './auth-error.js';
2
+ export * from './user-domain-not-match-error.js';
@@ -1,6 +1,6 @@
1
1
  "use strict";
2
2
  Object.defineProperty(exports, "__esModule", { value: true });
3
3
  const tslib_1 = require("tslib");
4
- tslib_1.__exportStar(require("./auth-error"), exports);
5
- tslib_1.__exportStar(require("./user-domain-not-match-error"), exports);
4
+ tslib_1.__exportStar(require("./auth-error.js"), exports);
5
+ tslib_1.__exportStar(require("./user-domain-not-match-error.js"), exports);
6
6
  //# sourceMappingURL=index.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"index.js","sourceRoot":"","sources":["../../server/errors/index.ts"],"names":[],"mappings":";;;AAAA,uDAA4B;AAC5B,wEAA6C","sourcesContent":["export * from './auth-error'\nexport * from './user-domain-not-match-error'\n"]}
1
+ {"version":3,"file":"index.js","sourceRoot":"","sources":["../../server/errors/index.ts"],"names":[],"mappings":";;;AAAA,0DAA+B;AAC/B,2EAAgD","sourcesContent":["export * from './auth-error.js'\nexport * from './user-domain-not-match-error.js'\n"]}
@@ -1,4 +1,4 @@
1
- import { AuthError } from './auth-error';
1
+ import { AuthError } from './auth-error.js';
2
2
  export declare class DomainError extends AuthError {
3
3
  static get ERROR_CODES(): any;
4
4
  domains: any;
@@ -1,18 +1,18 @@
1
1
  "use strict";
2
2
  Object.defineProperty(exports, "__esModule", { value: true });
3
3
  exports.DomainError = void 0;
4
- const error_code_1 = require("../constants/error-code");
5
- const auth_error_1 = require("./auth-error");
6
- class DomainError extends auth_error_1.AuthError {
4
+ const error_code_js_1 = require("../constants/error-code.js");
5
+ const auth_error_js_1 = require("./auth-error.js");
6
+ class DomainError extends auth_error_js_1.AuthError {
7
7
  static get ERROR_CODES() {
8
8
  return {
9
- UNAVAILABLE_DOMAIN: error_code_1.UNAVAILABLE_DOMAIN,
10
- NO_AVAILABLE_DOMAIN: error_code_1.NO_AVAILABLE_DOMAIN,
11
- NO_SELECTED_DOMAIN: error_code_1.NO_SELECTED_DOMAIN,
12
- REDIRECT_TO_DEFAULT_DOMAIN: error_code_1.REDIRECT_TO_DEFAULT_DOMAIN
9
+ UNAVAILABLE_DOMAIN: error_code_js_1.UNAVAILABLE_DOMAIN,
10
+ NO_AVAILABLE_DOMAIN: error_code_js_1.NO_AVAILABLE_DOMAIN,
11
+ NO_SELECTED_DOMAIN: error_code_js_1.NO_SELECTED_DOMAIN,
12
+ REDIRECT_TO_DEFAULT_DOMAIN: error_code_js_1.REDIRECT_TO_DEFAULT_DOMAIN
13
13
  };
14
14
  }
15
- constructor({ errorCode = error_code_1.UNAVAILABLE_DOMAIN, domains }) {
15
+ constructor({ errorCode = error_code_js_1.UNAVAILABLE_DOMAIN, domains }) {
16
16
  super({
17
17
  errorCode
18
18
  });