@warlock.js/auth 4.0.88 → 4.0.92

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (83) hide show
  1. package/package.json +5 -5
  2. package/cjs/commands/auth-cleanup-command.d.ts +0 -10
  3. package/cjs/commands/auth-cleanup-command.d.ts.map +0 -1
  4. package/cjs/commands/auth-cleanup-command.js +0 -29
  5. package/cjs/commands/auth-cleanup-command.js.map +0 -1
  6. package/cjs/commands/jwt-secret-generator-command.d.ts +0 -2
  7. package/cjs/commands/jwt-secret-generator-command.d.ts.map +0 -1
  8. package/cjs/commands/jwt-secret-generator-command.js +0 -7
  9. package/cjs/commands/jwt-secret-generator-command.js.map +0 -1
  10. package/cjs/contracts/auth-contract.d.ts +0 -23
  11. package/cjs/contracts/auth-contract.d.ts.map +0 -1
  12. package/cjs/contracts/index.d.ts +0 -3
  13. package/cjs/contracts/index.d.ts.map +0 -1
  14. package/cjs/contracts/types.d.ts +0 -157
  15. package/cjs/contracts/types.d.ts.map +0 -1
  16. package/cjs/contracts/types.js +0 -20
  17. package/cjs/contracts/types.js.map +0 -1
  18. package/cjs/index.d.ts +0 -8
  19. package/cjs/index.d.ts.map +0 -1
  20. package/cjs/index.js +0 -1
  21. package/cjs/index.js.map +0 -1
  22. package/cjs/middleware/auth.middleware.d.ts +0 -2
  23. package/cjs/middleware/auth.middleware.d.ts.map +0 -1
  24. package/cjs/middleware/auth.middleware.js +0 -72
  25. package/cjs/middleware/auth.middleware.js.map +0 -1
  26. package/cjs/middleware/index.d.ts +0 -2
  27. package/cjs/middleware/index.d.ts.map +0 -1
  28. package/cjs/models/access-token/access-token.d.ts +0 -9
  29. package/cjs/models/access-token/access-token.d.ts.map +0 -1
  30. package/cjs/models/access-token/access-token.js +0 -18
  31. package/cjs/models/access-token/access-token.js.map +0 -1
  32. package/cjs/models/access-token/index.d.ts +0 -3
  33. package/cjs/models/access-token/index.d.ts.map +0 -1
  34. package/cjs/models/access-token/migration.d.ts +0 -3
  35. package/cjs/models/access-token/migration.d.ts.map +0 -1
  36. package/cjs/models/access-token/migration.js +0 -10
  37. package/cjs/models/access-token/migration.js.map +0 -1
  38. package/cjs/models/auth.d.ts +0 -54
  39. package/cjs/models/auth.d.ts.map +0 -1
  40. package/cjs/models/auth.js +0 -56
  41. package/cjs/models/auth.js.map +0 -1
  42. package/cjs/models/casts/cast-password.d.ts +0 -7
  43. package/cjs/models/casts/cast-password.d.ts.map +0 -1
  44. package/cjs/models/casts/index.d.ts +0 -2
  45. package/cjs/models/casts/index.d.ts.map +0 -1
  46. package/cjs/models/index.d.ts +0 -4
  47. package/cjs/models/index.d.ts.map +0 -1
  48. package/cjs/models/refresh-token/index.d.ts +0 -2
  49. package/cjs/models/refresh-token/index.d.ts.map +0 -1
  50. package/cjs/models/refresh-token/migration.d.ts +0 -3
  51. package/cjs/models/refresh-token/migration.d.ts.map +0 -1
  52. package/cjs/models/refresh-token/refresh-token.d.ts +0 -32
  53. package/cjs/models/refresh-token/refresh-token.d.ts.map +0 -1
  54. package/cjs/models/refresh-token/refresh-token.js +0 -53
  55. package/cjs/models/refresh-token/refresh-token.js.map +0 -1
  56. package/cjs/services/auth-events.d.ts +0 -85
  57. package/cjs/services/auth-events.d.ts.map +0 -1
  58. package/cjs/services/auth-events.js +0 -65
  59. package/cjs/services/auth-events.js.map +0 -1
  60. package/cjs/services/auth.service.d.ts +0 -91
  61. package/cjs/services/auth.service.d.ts.map +0 -1
  62. package/cjs/services/auth.service.js +0 -303
  63. package/cjs/services/auth.service.js.map +0 -1
  64. package/cjs/services/generate-jwt-secret.d.ts +0 -2
  65. package/cjs/services/generate-jwt-secret.d.ts.map +0 -1
  66. package/cjs/services/generate-jwt-secret.js +0 -47
  67. package/cjs/services/generate-jwt-secret.js.map +0 -1
  68. package/cjs/services/index.d.ts +0 -5
  69. package/cjs/services/index.d.ts.map +0 -1
  70. package/cjs/services/jwt.d.ts +0 -23
  71. package/cjs/services/jwt.d.ts.map +0 -1
  72. package/cjs/services/jwt.js +0 -39
  73. package/cjs/services/jwt.js.map +0 -1
  74. package/cjs/utils/auth-error-codes.d.ts +0 -18
  75. package/cjs/utils/auth-error-codes.d.ts.map +0 -1
  76. package/cjs/utils/auth-error-codes.js +0 -18
  77. package/cjs/utils/auth-error-codes.js.map +0 -1
  78. package/cjs/utils/duration.d.ts +0 -45
  79. package/cjs/utils/duration.d.ts.map +0 -1
  80. package/cjs/utils/duration.js +0 -93
  81. package/cjs/utils/duration.js.map +0 -1
  82. package/cjs/utils/index.d.ts +0 -3
  83. package/cjs/utils/index.d.ts.map +0 -1
@@ -1,303 +0,0 @@
1
- 'use strict';var password=require('@mongez/password'),reinforcements=require('@mongez/reinforcements'),core=require('@warlock.js/core'),accessToken=require('../models/access-token/access-token.js');require('../models/access-token/migration.js');var refreshToken=require('../models/refresh-token/refresh-token.js'),duration=require('../utils/duration.js'),authEvents=require('./auth-events.js'),jwt=require('./jwt.js');class AuthService {
2
- /**
3
- * Build access token payload from user
4
- */
5
- buildAccessTokenPayload(user) {
6
- return {
7
- id: user.id,
8
- _id: user.get("_id"),
9
- userType: user.userType,
10
- createdAt: Date.now(),
11
- };
12
- }
13
- /**
14
- * Generate access token for user
15
- */
16
- async generateAccessToken(user, payload) {
17
- const data = payload || this.buildAccessTokenPayload(user);
18
- const expiresInConfig = core.config.key("auth.jwt.expiresIn");
19
- const expiresIn = duration.toJwtExpiresIn(expiresInConfig, 3600000); // default 1 hour
20
- // If expiresIn is undefined, token never expires
21
- const token = expiresIn ? await jwt.jwt.generate(data, { expiresIn }) : await jwt.jwt.generate(data);
22
- // Store in database
23
- await accessToken.AccessToken.create({
24
- token,
25
- user: data,
26
- });
27
- return token;
28
- }
29
- /**
30
- * Create refresh token for user
31
- */
32
- async createRefreshToken(user, deviceInfo) {
33
- const familyId = deviceInfo?.familyId || reinforcements.Random.string(32);
34
- const expiresInConfig = core.config.key("auth.jwt.refresh.expiresIn");
35
- const expiresInMs = duration.parseExpirationToMs(expiresInConfig, 7 * 24 * 60 * 60 * 1000); // default 7 days
36
- const payload = {
37
- userId: user.id,
38
- userType: user.userType,
39
- familyId,
40
- };
41
- const token = await jwt.jwt.generateRefreshToken(payload);
42
- // Enforce max tokens per user
43
- await this.enforceMaxRefreshTokens(user);
44
- // Calculate expiration date (undefined means never expires, but we still set a far future date)
45
- const expiresAt = expiresInMs
46
- ? new Date(Date.now() + expiresInMs)
47
- : new Date(Date.now() + 100 * 365 * 24 * 60 * 60 * 1000);
48
- // Store in database
49
- return refreshToken.RefreshToken.create({
50
- token,
51
- userId: user.id,
52
- userType: user.userType,
53
- familyId,
54
- expiresAt,
55
- deviceInfo: deviceInfo
56
- ? {
57
- userAgent: deviceInfo.userAgent,
58
- ip: deviceInfo.ip,
59
- deviceId: deviceInfo.deviceId,
60
- }
61
- : undefined,
62
- });
63
- }
64
- /**
65
- * Create both access and refresh tokens
66
- */
67
- async createTokenPair(user, deviceInfo) {
68
- const accessToken = await this.generateAccessToken(user, deviceInfo?.payload);
69
- const refreshToken = await this.createRefreshToken(user, deviceInfo);
70
- const tokenPair = {
71
- accessToken,
72
- refreshToken: refreshToken.get("token"),
73
- expiresIn: core.config.key("auth.jwt.expiresIn", "1h"),
74
- };
75
- // Emit events
76
- authEvents.authEvents.emit("token.created", user, tokenPair);
77
- authEvents.authEvents.emit("session.created", user, refreshToken, deviceInfo);
78
- return tokenPair;
79
- }
80
- /**
81
- * Refresh tokens using a refresh token
82
- */
83
- async refreshTokens(refreshTokenString, deviceInfo) {
84
- try {
85
- // 1. Verify JWT signature
86
- const decoded = await jwt.jwt.verifyRefreshToken(refreshTokenString);
87
- if (!decoded)
88
- return null;
89
- // 2. Find token in database
90
- const refreshToken$1 = await refreshToken.RefreshToken.first({ token: refreshTokenString });
91
- if (!refreshToken$1?.isValid) {
92
- // If token was already used (rotation detection), revoke entire family
93
- if (refreshToken$1) {
94
- await this.revokeTokenFamily(refreshToken$1.get("familyId"));
95
- }
96
- return null;
97
- }
98
- // 3. Get user model and find user
99
- const UserModel = core.config.key(`auth.userType.${decoded.userType}`);
100
- if (!UserModel)
101
- return null;
102
- const user = (await UserModel.find(decoded.userId));
103
- if (!user)
104
- return null;
105
- // 4. Rotate token if enabled (revoke old token)
106
- const rotationEnabled = core.config.key("auth.jwt.refresh.rotation", true);
107
- if (rotationEnabled) {
108
- await refreshToken$1.revoke();
109
- }
110
- else {
111
- await refreshToken$1.markAsUsed();
112
- }
113
- // 5. Generate new token pair (keep same family)
114
- const newTokenPair = await this.createTokenPair(user, {
115
- ...deviceInfo,
116
- familyId: refreshToken$1.get("familyId"),
117
- });
118
- // Emit token refreshed event
119
- authEvents.authEvents.emit("token.refreshed", user, newTokenPair, refreshToken$1);
120
- return newTokenPair;
121
- }
122
- catch {
123
- return null;
124
- }
125
- }
126
- /**
127
- * Verify password
128
- */
129
- verifyPassword(hashedPassword, plainPassword) {
130
- return password.verify(String(hashedPassword), String(plainPassword));
131
- }
132
- /**
133
- * Hash password
134
- */
135
- hashPassword(password$1) {
136
- return password.hash(String(password$1), core.config.key("auth.password.salt", 12));
137
- }
138
- /**
139
- * Attempt to login user with given credentials
140
- */
141
- async attemptLogin(Model, data) {
142
- const { password, ...otherData } = data;
143
- // Emit login attempt event
144
- authEvents.authEvents.emit("login.attempt", otherData);
145
- const user = (await Model.first(otherData));
146
- if (!user) {
147
- authEvents.authEvents.emit("login.failed", otherData, "User not found");
148
- return null;
149
- }
150
- if (!this.verifyPassword(user.string("password"), password)) {
151
- authEvents.authEvents.emit("login.failed", otherData, "Invalid password");
152
- return null;
153
- }
154
- return user;
155
- }
156
- /**
157
- * Full login flow: validate credentials, create tokens, emit events
158
- * Returns token pair on success, null on failure
159
- */
160
- async login(Model, credentials, deviceInfo) {
161
- const user = await this.attemptLogin(Model, credentials);
162
- if (!user) {
163
- return null;
164
- }
165
- // if no refresh token in config, then return user and access token only
166
- if (!core.config.key("auth.jwt.refresh.enabled", true)) {
167
- const accessToken = await this.generateAccessToken(user, deviceInfo?.payload);
168
- return { user, accessToken };
169
- }
170
- const tokens = await this.createTokenPair(user, deviceInfo);
171
- // Emit login success event
172
- authEvents.authEvents.emit("login.success", user, tokens, deviceInfo);
173
- return { user, tokens };
174
- }
175
- /**
176
- * Logout user
177
- * @param user - The authenticated user
178
- * @param accessToken - Optional access token string to revoke
179
- * @param refreshToken - Optional refresh token string to revoke
180
- * If refresh token is not provided, behavior is determined by config:
181
- * - "revoke-all" (default): Revoke ALL refresh tokens for security
182
- * - "error": Throw error requiring refresh token
183
- */
184
- async logout(user, accessToken, refreshToken$1) {
185
- // Remove access token if provided
186
- if (accessToken) {
187
- await this.removeAccessToken(user, accessToken);
188
- }
189
- if (refreshToken$1) {
190
- // Revoke specific refresh token
191
- const token = await refreshToken.RefreshToken.first({
192
- token: refreshToken$1,
193
- userId: user.id, // Security: ensure token belongs to this user
194
- });
195
- if (token) {
196
- await token.revoke();
197
- authEvents.authEvents.emit("session.destroyed", user, token);
198
- }
199
- }
200
- else {
201
- // No refresh token provided - check configured behavior
202
- const behavior = core.config.key("auth.jwt.refresh.logoutWithoutToken", "revoke-all");
203
- if (behavior === "error") {
204
- throw new Error("Refresh token required for logout");
205
- }
206
- // Default: revoke-all (fail-safe)
207
- await this.revokeAllTokens(user);
208
- authEvents.authEvents.emit("logout.failsafe", user);
209
- }
210
- // Emit logout event
211
- authEvents.authEvents.emit("logout", user);
212
- }
213
- /**
214
- * Remove specific access token
215
- */
216
- async removeAccessToken(user, token) {
217
- accessToken.AccessToken.delete({
218
- token,
219
- "user.id": user.id,
220
- });
221
- }
222
- /**
223
- * Revoke all tokens for a user
224
- */
225
- async revokeAllTokens(user) {
226
- // Revoke all refresh tokens
227
- const refreshTokens = await refreshToken.RefreshToken.query()
228
- .where("userId", user.id)
229
- .where("userType", user.userType)
230
- .where("revokedAt", null)
231
- .get();
232
- for (const token of refreshTokens) {
233
- await token.revoke();
234
- authEvents.authEvents.emit("token.revoked", user, token);
235
- }
236
- // Delete all access tokens
237
- await accessToken.AccessToken.delete({
238
- "user.id": user.id,
239
- "user.userType": user.userType,
240
- });
241
- // Emit logout all event
242
- authEvents.authEvents.emit("logout.all", user);
243
- }
244
- /**
245
- * Revoke entire token family (for rotation breach detection)
246
- */
247
- async revokeTokenFamily(familyId) {
248
- const tokens = await refreshToken.RefreshToken.query()
249
- .where("familyId", familyId)
250
- .where("revokedAt", null)
251
- .get();
252
- for (const token of tokens) {
253
- await token.revoke();
254
- }
255
- // Emit family revoked event
256
- authEvents.authEvents.emit("token.familyRevoked", familyId, tokens);
257
- }
258
- /**
259
- * Cleanup expired tokens
260
- */
261
- async cleanupExpiredTokens() {
262
- const expiredTokens = await refreshToken.RefreshToken.query().where("expiresAt", "<", new Date()).get();
263
- for (const token of expiredTokens) {
264
- authEvents.authEvents.emit("token.expired", token);
265
- await token.destroy();
266
- }
267
- // Emit cleanup completed event
268
- authEvents.authEvents.emit("cleanup.completed", expiredTokens.length);
269
- return expiredTokens.length;
270
- }
271
- /**
272
- * Enforce max refresh tokens per user
273
- */
274
- async enforceMaxRefreshTokens(user) {
275
- const maxPerUser = core.config.key("auth.jwt.refresh.maxPerUser", 5);
276
- const activeTokens = await refreshToken.RefreshToken.query()
277
- .where("userId", user.id)
278
- .where("userType", user.userType)
279
- .where("revokedAt", null)
280
- .orderBy("createdAt", "asc")
281
- .get();
282
- // Revoke oldest tokens if exceeding limit
283
- if (activeTokens.length >= maxPerUser) {
284
- const tokensToRevoke = activeTokens.slice(0, activeTokens.length - maxPerUser + 1);
285
- for (const token of tokensToRevoke) {
286
- await token.revoke();
287
- }
288
- }
289
- }
290
- /**
291
- * Get active sessions for user
292
- */
293
- async getActiveSessions(user) {
294
- return refreshToken.RefreshToken.query()
295
- .where("userId", user.id)
296
- .where("userType", user.userType)
297
- .where("revokedAt", null)
298
- .where("expiresAt", ">", new Date())
299
- .orderBy("createdAt", "desc")
300
- .get();
301
- }
302
- }
303
- const authService = new AuthService();exports.authService=authService;//# sourceMappingURL=auth.service.js.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"auth.service.js","sources":["../../src/services/auth.service.ts"],"sourcesContent":[null],"names":["config","toJwtExpiresIn","jwt","AccessToken","Random","parseExpirationToMs","RefreshToken","authEvents","refreshToken","verify","password","hash"],"mappings":"kaAYA,MAAM,WAAW,CAAA;AACf;;AAEG;AACI,IAAA,uBAAuB,CAAC,IAAU,EAAA;QACvC,OAAO;YACL,EAAE,EAAE,IAAI,CAAC,EAAE;AACX,YAAA,GAAG,EAAE,IAAI,CAAC,GAAG,CAAC,KAAK,CAAC;YACpB,QAAQ,EAAE,IAAI,CAAC,QAAQ;AACvB,YAAA,SAAS,EAAE,IAAI,CAAC,GAAG,EAAE;SACtB,CAAC;KACH;AAED;;AAEG;AACI,IAAA,MAAM,mBAAmB,CAAC,IAAU,EAAE,OAAa,EAAA;QACxD,MAAM,IAAI,GAAG,OAAO,IAAI,IAAI,CAAC,uBAAuB,CAAC,IAAI,CAAC,CAAC;QAC3D,MAAM,eAAe,GAAGA,WAAM,CAAC,GAAG,CAAC,oBAAoB,CAAC,CAAC;QACzD,MAAM,SAAS,GAAGC,uBAAc,CAAC,eAAe,EAAE,OAAO,CAAC,CAAC;;QAG3D,MAAM,KAAK,GAAG,SAAS,GAAG,MAAMC,OAAG,CAAC,QAAQ,CAAC,IAAI,EAAE,EAAE,SAAS,EAAE,CAAC,GAAG,MAAMA,OAAG,CAAC,QAAQ,CAAC,IAAI,CAAC,CAAC;;QAG7F,MAAMC,uBAAW,CAAC,MAAM,CAAC;YACvB,KAAK;AACL,YAAA,IAAI,EAAE,IAAI;AACX,SAAA,CAAC,CAAC;AAEH,QAAA,OAAO,KAAK,CAAC;KACd;AAED;;AAEG;AACI,IAAA,MAAM,kBAAkB,CAAC,IAAU,EAAE,UAAuB,EAAA;AACjE,QAAA,MAAM,QAAQ,GAAG,UAAU,EAAE,QAAQ,IAAIC,qBAAM,CAAC,MAAM,CAAC,EAAE,CAAC,CAAC;QAC3D,MAAM,eAAe,GAAGJ,WAAM,CAAC,GAAG,CAAC,4BAA4B,CAAC,CAAC;AACjE,QAAA,MAAM,WAAW,GAAGK,4BAAmB,CAAC,eAAe,EAAE,CAAC,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI,CAAC,CAAC;AAElF,QAAA,MAAM,OAAO,GAAG;YACd,MAAM,EAAE,IAAI,CAAC,EAAE;YACf,QAAQ,EAAE,IAAI,CAAC,QAAQ;YACvB,QAAQ;SACT,CAAC;QAEF,MAAM,KAAK,GAAG,MAAMH,OAAG,CAAC,oBAAoB,CAAC,OAAO,CAAC,CAAC;;AAGtD,QAAA,MAAM,IAAI,CAAC,uBAAuB,CAAC,IAAI,CAAC,CAAC;;QAGzC,MAAM,SAAS,GAAG,WAAW;cACzB,IAAI,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE,GAAG,WAAW,CAAC;cAClC,IAAI,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE,GAAG,GAAG,GAAG,GAAG,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI,CAAC,CAAC;;QAG3D,OAAOI,yBAAY,CAAC,MAAM,CAAC;YACzB,KAAK;YACL,MAAM,EAAE,IAAI,CAAC,EAAE;YACf,QAAQ,EAAE,IAAI,CAAC,QAAQ;YACvB,QAAQ;YACR,SAAS;AACT,YAAA,UAAU,EAAE,UAAU;AACpB,kBAAE;oBACE,SAAS,EAAE,UAAU,CAAC,SAAS;oBAC/B,EAAE,EAAE,UAAU,CAAC,EAAE;oBACjB,QAAQ,EAAE,UAAU,CAAC,QAAQ;AAC9B,iBAAA;AACH,kBAAE,SAAS;AACd,SAAA,CAAC,CAAC;KACJ;AAED;;AAEG;AACI,IAAA,MAAM,eAAe,CAAC,IAAU,EAAE,UAAuB,EAAA;AAC9D,QAAA,MAAM,WAAW,GAAG,MAAM,IAAI,CAAC,mBAAmB,CAAC,IAAI,EAAE,UAAU,EAAE,OAAO,CAAC,CAAC;QAC9E,MAAM,YAAY,GAAG,MAAM,IAAI,CAAC,kBAAkB,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;AAErE,QAAA,MAAM,SAAS,GAAc;YAC3B,WAAW;AACX,YAAA,YAAY,EAAE,YAAY,CAAC,GAAG,CAAC,OAAO,CAAC;YACvC,SAAS,EAAEN,WAAM,CAAC,GAAG,CAAC,oBAAoB,EAAE,IAAI,CAAC;SAClD,CAAC;;QAGFO,qBAAU,CAAC,IAAI,CAAC,eAAe,EAAE,IAAI,EAAE,SAAS,CAAC,CAAC;QAClDA,qBAAU,CAAC,IAAI,CAAC,iBAAiB,EAAE,IAAI,EAAE,YAAY,EAAE,UAAU,CAAC,CAAC;AAEnE,QAAA,OAAO,SAAS,CAAC;KAClB;AAED;;AAEG;AACI,IAAA,MAAM,aAAa,CACxB,kBAA0B,EAC1B,UAAuB,EAAA;QAEvB,IAAI;;YAEF,MAAM,OAAO,GAAG,MAAML,OAAG,CAAC,kBAAkB,CAIzC,kBAAkB,CAAC,CAAC;AAEvB,YAAA,IAAI,CAAC,OAAO;AAAE,gBAAA,OAAO,IAAI,CAAC;;AAG1B,YAAA,MAAMM,cAAY,GAAG,MAAMF,yBAAY,CAAC,KAAK,CAAC,EAAE,KAAK,EAAE,kBAAkB,EAAE,CAAC,CAAC;AAE7E,YAAA,IAAI,CAACE,cAAY,EAAE,OAAO,EAAE;;AAE1B,gBAAA,IAAIA,cAAY,EAAE;oBAChB,MAAM,IAAI,CAAC,iBAAiB,CAACA,cAAY,CAAC,GAAG,CAAC,UAAU,CAAC,CAAC,CAAC;AAC5D,iBAAA;AACD,gBAAA,OAAO,IAAI,CAAC;AACb,aAAA;;AAGD,YAAA,MAAM,SAAS,GAAGR,WAAM,CAAC,GAAG,CAAC,CAAiB,cAAA,EAAA,OAAO,CAAC,QAAQ,CAAE,CAAA,CAAC,CAAC;AAClE,YAAA,IAAI,CAAC,SAAS;AAAE,gBAAA,OAAO,IAAI,CAAC;AAE5B,YAAA,MAAM,IAAI,IAAI,MAAM,SAAS,CAAC,IAAI,CAAC,OAAO,CAAC,MAAM,CAAC,CAAgB,CAAC;AACnE,YAAA,IAAI,CAAC,IAAI;AAAE,gBAAA,OAAO,IAAI,CAAC;;YAGvB,MAAM,eAAe,GAAGA,WAAM,CAAC,GAAG,CAAC,2BAA2B,EAAE,IAAI,CAAC,CAAC;AACtE,YAAA,IAAI,eAAe,EAAE;AACnB,gBAAA,MAAMQ,cAAY,CAAC,MAAM,EAAE,CAAC;AAC7B,aAAA;AAAM,iBAAA;AACL,gBAAA,MAAMA,cAAY,CAAC,UAAU,EAAE,CAAC;AACjC,aAAA;;YAGD,MAAM,YAAY,GAAG,MAAM,IAAI,CAAC,eAAe,CAAC,IAAI,EAAE;AACpD,gBAAA,GAAG,UAAU;AACb,gBAAA,QAAQ,EAAEA,cAAY,CAAC,GAAG,CAAC,UAAU,CAAC;AACvC,aAAA,CAAC,CAAC;;YAGHD,qBAAU,CAAC,IAAI,CAAC,iBAAiB,EAAE,IAAI,EAAE,YAAY,EAAEC,cAAY,CAAC,CAAC;AAErE,YAAA,OAAO,YAAY,CAAC;AACrB,SAAA;QAAC,MAAM;AACN,YAAA,OAAO,IAAI,CAAC;AACb,SAAA;KACF;AAED;;AAEG;IACI,cAAc,CAAC,cAAsB,EAAE,aAAqB,EAAA;AACjE,QAAA,OAAOC,eAAM,CAAC,MAAM,CAAC,cAAc,CAAC,EAAE,MAAM,CAAC,aAAa,CAAC,CAAC,CAAC;KAC9D;AAED;;AAEG;AACI,IAAA,YAAY,CAACC,UAAgB,EAAA;AAClC,QAAA,OAAOC,aAAI,CAAC,MAAM,CAACD,UAAQ,CAAC,EAAEV,WAAM,CAAC,GAAG,CAAC,oBAAoB,EAAE,EAAE,CAAC,CAAC,CAAC;KACrE;AAED;;AAEG;AACI,IAAA,MAAM,YAAY,CAAC,KAAuB,EAAE,IAAS,EAAA;QAC1D,MAAM,EAAE,QAAQ,EAAE,GAAG,SAAS,EAAE,GAAG,IAAI,CAAC;;AAGxC,QAAAO,qBAAU,CAAC,IAAI,CAAC,eAAe,EAAE,SAAS,CAAC,CAAC;QAE5C,MAAM,IAAI,IAAI,MAAM,KAAK,CAAC,KAAK,CAAC,SAAS,CAAC,CAAgB,CAAC;QAE3D,IAAI,CAAC,IAAI,EAAE;YACTA,qBAAU,CAAC,IAAI,CAAC,cAAc,EAAE,SAAS,EAAE,gBAAgB,CAAC,CAAC;AAC7D,YAAA,OAAO,IAAI,CAAC;AACb,SAAA;AAED,QAAA,IAAI,CAAC,IAAI,CAAC,cAAc,CAAC,IAAI,CAAC,MAAM,CAAC,UAAU,CAAE,EAAE,QAAQ,CAAC,EAAE;YAC5DA,qBAAU,CAAC,IAAI,CAAC,cAAc,EAAE,SAAS,EAAE,kBAAkB,CAAC,CAAC;AAC/D,YAAA,OAAO,IAAI,CAAC;AACb,SAAA;AAED,QAAA,OAAO,IAAI,CAAC;KACb;AAED;;;AAGG;AACI,IAAA,MAAM,KAAK,CAChB,KAAuB,EACvB,WAAgB,EAChB,UAAuB,EAAA;QAEvB,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,YAAY,CAAC,KAAK,EAAE,WAAW,CAAC,CAAC;QAEzD,IAAI,CAAC,IAAI,EAAE;AACT,YAAA,OAAO,IAAI,CAAC;AACb,SAAA;;QAGD,IAAI,CAACP,WAAM,CAAC,GAAG,CAAC,0BAA0B,EAAE,IAAI,CAAC,EAAE;AACjD,YAAA,MAAM,WAAW,GAAG,MAAM,IAAI,CAAC,mBAAmB,CAAC,IAAI,EAAE,UAAU,EAAE,OAAO,CAAC,CAAC;AAC9E,YAAA,OAAO,EAAE,IAAI,EAAE,WAAW,EAAE,CAAC;AAC9B,SAAA;QAED,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,eAAe,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;;QAG5DO,qBAAU,CAAC,IAAI,CAAC,eAAe,EAAE,IAAI,EAAE,MAAM,EAAE,UAAU,CAAC,CAAC;AAE3D,QAAA,OAAO,EAAE,IAAI,EAAE,MAAM,EAAE,CAAC;KACzB;AAED;;;;;;;;AAQG;AACI,IAAA,MAAM,MAAM,CAAC,IAAU,EAAE,WAAoB,EAAEC,cAAqB,EAAA;;AAEzE,QAAA,IAAI,WAAW,EAAE;YACf,MAAM,IAAI,CAAC,iBAAiB,CAAC,IAAI,EAAE,WAAW,CAAC,CAAC;AACjD,SAAA;AAED,QAAA,IAAIA,cAAY,EAAE;;AAEhB,YAAA,MAAM,KAAK,GAAG,MAAMF,yBAAY,CAAC,KAAK,CAAC;AACrC,gBAAA,KAAK,EAAEE,cAAY;AACnB,gBAAA,MAAM,EAAE,IAAI,CAAC,EAAE;AAChB,aAAA,CAAC,CAAC;AAEH,YAAA,IAAI,KAAK,EAAE;AACT,gBAAA,MAAM,KAAK,CAAC,MAAM,EAAE,CAAC;gBACrBD,qBAAU,CAAC,IAAI,CAAC,mBAAmB,EAAE,IAAI,EAAE,KAAK,CAAC,CAAC;AACnD,aAAA;AACF,SAAA;AAAM,aAAA;;YAEL,MAAM,QAAQ,GAAGP,WAAM,CAAC,GAAG,CAAC,qCAAqC,EAAE,YAAY,CAEpE,CAAC;YAEZ,IAAI,QAAQ,KAAK,OAAO,EAAE;AACxB,gBAAA,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;AACtD,aAAA;;AAGD,YAAA,MAAM,IAAI,CAAC,eAAe,CAAC,IAAI,CAAC,CAAC;AACjC,YAAAO,qBAAU,CAAC,IAAI,CAAC,iBAAiB,EAAE,IAAI,CAAC,CAAC;AAC1C,SAAA;;AAGD,QAAAA,qBAAU,CAAC,IAAI,CAAC,QAAQ,EAAE,IAAI,CAAC,CAAC;KACjC;AAED;;AAEG;AACI,IAAA,MAAM,iBAAiB,CAAC,IAAU,EAAE,KAAa,EAAA;QACtDJ,uBAAW,CAAC,MAAM,CAAC;YACjB,KAAK;YACL,SAAS,EAAE,IAAI,CAAC,EAAE;AACnB,SAAA,CAAC,CAAC;KACJ;AAED;;AAEG;IACI,MAAM,eAAe,CAAC,IAAU,EAAA;;AAErC,QAAA,MAAM,aAAa,GAAG,MAAMG,yBAAY,CAAC,KAAK,EAAE;AAC7C,aAAA,KAAK,CAAC,QAAQ,EAAE,IAAI,CAAC,EAAE,CAAC;AACxB,aAAA,KAAK,CAAC,UAAU,EAAE,IAAI,CAAC,QAAQ,CAAC;AAChC,aAAA,KAAK,CAAC,WAAW,EAAE,IAAI,CAAC;AACxB,aAAA,GAAG,EAAE,CAAC;AAET,QAAA,KAAK,MAAM,KAAK,IAAI,aAAa,EAAE;AACjC,YAAA,MAAM,KAAK,CAAC,MAAM,EAAE,CAAC;YACrBC,qBAAU,CAAC,IAAI,CAAC,eAAe,EAAE,IAAI,EAAE,KAAK,CAAC,CAAC;AAC/C,SAAA;;QAGD,MAAMJ,uBAAW,CAAC,MAAM,CAAC;YACvB,SAAS,EAAE,IAAI,CAAC,EAAE;YAClB,eAAe,EAAE,IAAI,CAAC,QAAQ;AAC/B,SAAA,CAAC,CAAC;;AAGH,QAAAI,qBAAU,CAAC,IAAI,CAAC,YAAY,EAAE,IAAI,CAAC,CAAC;KACrC;AAED;;AAEG;IACI,MAAM,iBAAiB,CAAC,QAAgB,EAAA;AAC7C,QAAA,MAAM,MAAM,GAAG,MAAMD,yBAAY,CAAC,KAAK,EAAE;AACtC,aAAA,KAAK,CAAC,UAAU,EAAE,QAAQ,CAAC;AAC3B,aAAA,KAAK,CAAC,WAAW,EAAE,IAAI,CAAC;AACxB,aAAA,GAAG,EAAE,CAAC;AAET,QAAA,KAAK,MAAM,KAAK,IAAI,MAAM,EAAE;AAC1B,YAAA,MAAM,KAAK,CAAC,MAAM,EAAE,CAAC;AACtB,SAAA;;QAGDC,qBAAU,CAAC,IAAI,CAAC,qBAAqB,EAAE,QAAQ,EAAE,MAAM,CAAC,CAAC;KAC1D;AAED;;AAEG;AACI,IAAA,MAAM,oBAAoB,GAAA;QAC/B,MAAM,aAAa,GAAG,MAAMD,yBAAY,CAAC,KAAK,EAAE,CAAC,KAAK,CAAC,WAAW,EAAE,GAAG,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC,GAAG,EAAE,CAAC;AAE3F,QAAA,KAAK,MAAM,KAAK,IAAI,aAAa,EAAE;AACjC,YAAAC,qBAAU,CAAC,IAAI,CAAC,eAAe,EAAE,KAAK,CAAC,CAAC;AACxC,YAAA,MAAM,KAAK,CAAC,OAAO,EAAE,CAAC;AACvB,SAAA;;QAGDA,qBAAU,CAAC,IAAI,CAAC,mBAAmB,EAAE,aAAa,CAAC,MAAM,CAAC,CAAC;QAE3D,OAAO,aAAa,CAAC,MAAM,CAAC;KAC7B;AAED;;AAEG;IACK,MAAM,uBAAuB,CAAC,IAAU,EAAA;QAC9C,MAAM,UAAU,GAAGP,WAAM,CAAC,GAAG,CAAC,6BAA6B,EAAE,CAAC,CAAC,CAAC;AAEhE,QAAA,MAAM,YAAY,GAAG,MAAMM,yBAAY,CAAC,KAAK,EAAE;AAC5C,aAAA,KAAK,CAAC,QAAQ,EAAE,IAAI,CAAC,EAAE,CAAC;AACxB,aAAA,KAAK,CAAC,UAAU,EAAE,IAAI,CAAC,QAAQ,CAAC;AAChC,aAAA,KAAK,CAAC,WAAW,EAAE,IAAI,CAAC;AACxB,aAAA,OAAO,CAAC,WAAW,EAAE,KAAK,CAAC;AAC3B,aAAA,GAAG,EAAE,CAAC;;AAGT,QAAA,IAAI,YAAY,CAAC,MAAM,IAAI,UAAU,EAAE;AACrC,YAAA,MAAM,cAAc,GAAG,YAAY,CAAC,KAAK,CAAC,CAAC,EAAE,YAAY,CAAC,MAAM,GAAG,UAAU,GAAG,CAAC,CAAC,CAAC;AACnF,YAAA,KAAK,MAAM,KAAK,IAAI,cAAc,EAAE;AAClC,gBAAA,MAAM,KAAK,CAAC,MAAM,EAAE,CAAC;AACtB,aAAA;AACF,SAAA;KACF;AAED;;AAEG;IACI,MAAM,iBAAiB,CAAC,IAAU,EAAA;QACvC,OAAOA,yBAAY,CAAC,KAAK,EAAE;AACxB,aAAA,KAAK,CAAC,QAAQ,EAAE,IAAI,CAAC,EAAE,CAAC;AACxB,aAAA,KAAK,CAAC,UAAU,EAAE,IAAI,CAAC,QAAQ,CAAC;AAChC,aAAA,KAAK,CAAC,WAAW,EAAE,IAAI,CAAC;aACxB,KAAK,CAAC,WAAW,EAAE,GAAG,EAAE,IAAI,IAAI,EAAE,CAAC;AACnC,aAAA,OAAO,CAAC,WAAW,EAAE,MAAM,CAAC;AAC5B,aAAA,GAAG,EAAE,CAAC;KACV;AACF,CAAA;AAEY,MAAA,WAAW,GAAG,IAAI,WAAW"}
@@ -1,2 +0,0 @@
1
- export declare function generateJWTSecret(): Promise<void>;
2
- //# sourceMappingURL=generate-jwt-secret.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"generate-jwt-secret.d.ts","sourceRoot":"","sources":["../../src/services/generate-jwt-secret.ts"],"names":[],"mappings":"AAKA,wBAAsB,iBAAiB,kBAuDtC"}
@@ -1,47 +0,0 @@
1
- 'use strict';var fs=require('@mongez/fs'),reinforcements=require('@mongez/reinforcements'),core=require('@warlock.js/core'),logger=require('@warlock.js/logger');async function generateJWTSecret() {
2
- let envFile = core.rootPath(".env");
3
- logger.log.info("jwt", "generating", "Generating JWT secrets");
4
- const environmentMode = core.environment();
5
- if (!(await fs.fileExistsAsync(envFile))) {
6
- const envFileType = environmentMode === "production" ? ".env.production" : ".env.development";
7
- envFile = core.rootPath(envFileType);
8
- }
9
- if (!(await fs.fileExistsAsync(envFile))) {
10
- logger.log.error("jwt", "error", ".env file not found");
11
- return;
12
- }
13
- let contents = await fs.getFileAsync(envFile);
14
- const hasJwtSecret = contents.includes("JWT_SECRET");
15
- const hasJwtRefreshSecret = contents.includes("JWT_REFRESH_SECRET");
16
- if (hasJwtSecret && hasJwtRefreshSecret) {
17
- logger.log.warn("jwt", "exists", "JWT secrets already exist in the .env file.");
18
- return;
19
- }
20
- let secretsToAdd = "";
21
- if (!hasJwtSecret) {
22
- const jwtSecret = reinforcements.Random.string(32);
23
- secretsToAdd += `
24
- # JWT Secret
25
- JWT_SECRET=${jwtSecret}
26
- `;
27
- logger.log.success("jwt", "generated", "JWT_SECRET generated and added to the .env file.");
28
- }
29
- else {
30
- logger.log.info("jwt", "exists", "JWT_SECRET already exists in the .env file.");
31
- }
32
- if (!hasJwtRefreshSecret) {
33
- const jwtRefreshSecret = reinforcements.Random.string(32);
34
- secretsToAdd += `
35
- # JWT Refresh Secret
36
- JWT_REFRESH_SECRET=${jwtRefreshSecret}
37
- `;
38
- logger.log.success("jwt", "generated", "JWT_REFRESH_SECRET generated and added to the .env file.");
39
- }
40
- else {
41
- logger.log.info("jwt", "exists", "JWT_REFRESH_SECRET already exists in the .env file.");
42
- }
43
- if (secretsToAdd) {
44
- contents += secretsToAdd;
45
- await fs.putFileAsync(envFile, contents);
46
- }
47
- }exports.generateJWTSecret=generateJWTSecret;//# sourceMappingURL=generate-jwt-secret.js.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"generate-jwt-secret.js","sources":["../../src/services/generate-jwt-secret.ts"],"sourcesContent":[null],"names":["rootPath","log","environment","fileExistsAsync","getFileAsync","Random","putFileAsync"],"mappings":"iKAKO,eAAe,iBAAiB,GAAA;AACrC,IAAA,IAAI,OAAO,GAAGA,aAAQ,CAAC,MAAM,CAAC,CAAC;IAE/BC,UAAG,CAAC,IAAI,CAAC,KAAK,EAAE,YAAY,EAAE,wBAAwB,CAAC,CAAC;AAExD,IAAA,MAAM,eAAe,GAAGC,gBAAW,EAAE,CAAC;IAEtC,IAAI,EAAE,MAAMC,kBAAe,CAAC,OAAO,CAAC,CAAC,EAAE;AACrC,QAAA,MAAM,WAAW,GAAG,eAAe,KAAK,YAAY,GAAG,iBAAiB,GAAG,kBAAkB,CAAC;AAC9F,QAAA,OAAO,GAAGH,aAAQ,CAAC,WAAW,CAAC,CAAC;AACjC,KAAA;IAED,IAAI,EAAE,MAAMG,kBAAe,CAAC,OAAO,CAAC,CAAC,EAAE;QACrCF,UAAG,CAAC,KAAK,CAAC,KAAK,EAAE,OAAO,EAAE,qBAAqB,CAAC,CAAC;QACjD,OAAO;AACR,KAAA;AAED,IAAA,IAAI,QAAQ,GAAG,MAAMG,eAAY,CAAC,OAAO,CAAC,CAAC;IAE3C,MAAM,YAAY,GAAG,QAAQ,CAAC,QAAQ,CAAC,YAAY,CAAC,CAAC;IACrD,MAAM,mBAAmB,GAAG,QAAQ,CAAC,QAAQ,CAAC,oBAAoB,CAAC,CAAC;IAEpE,IAAI,YAAY,IAAI,mBAAmB,EAAE;QACvCH,UAAG,CAAC,IAAI,CAAC,KAAK,EAAE,QAAQ,EAAE,6CAA6C,CAAC,CAAC;QACzE,OAAO;AACR,KAAA;IAED,IAAI,YAAY,GAAG,EAAE,CAAC;IAEtB,IAAI,CAAC,YAAY,EAAE;QACjB,MAAM,SAAS,GAAGI,qBAAM,CAAC,MAAM,CAAC,EAAE,CAAC,CAAC;AACpC,QAAA,YAAY,IAAI,CAAA;;aAEP,SAAS,CAAA;CACrB,CAAC;QACEJ,UAAG,CAAC,OAAO,CAAC,KAAK,EAAE,WAAW,EAAE,kDAAkD,CAAC,CAAC;AACrF,KAAA;AAAM,SAAA;QACLA,UAAG,CAAC,IAAI,CAAC,KAAK,EAAE,QAAQ,EAAE,6CAA6C,CAAC,CAAC;AAC1E,KAAA;IAED,IAAI,CAAC,mBAAmB,EAAE;QACxB,MAAM,gBAAgB,GAAGI,qBAAM,CAAC,MAAM,CAAC,EAAE,CAAC,CAAC;AAC3C,QAAA,YAAY,IAAI,CAAA;;qBAEC,gBAAgB,CAAA;CACpC,CAAC;QACEJ,UAAG,CAAC,OAAO,CAAC,KAAK,EAAE,WAAW,EAAE,0DAA0D,CAAC,CAAC;AAC7F,KAAA;AAAM,SAAA;QACLA,UAAG,CAAC,IAAI,CAAC,KAAK,EAAE,QAAQ,EAAE,qDAAqD,CAAC,CAAC;AAClF,KAAA;AAED,IAAA,IAAI,YAAY,EAAE;QAChB,QAAQ,IAAI,YAAY,CAAC;AACzB,QAAA,MAAMK,eAAY,CAAC,OAAO,EAAE,QAAQ,CAAC,CAAC;AACvC,KAAA;AACH"}
@@ -1,5 +0,0 @@
1
- export * from "./auth-events";
2
- export * from "./auth.service";
3
- export * from "./generate-jwt-secret";
4
- export * from "./jwt";
5
- //# sourceMappingURL=index.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/services/index.ts"],"names":[],"mappings":"AAAA,cAAc,eAAe,CAAC;AAC9B,cAAc,gBAAgB,CAAC;AAC/B,cAAc,uBAAuB,CAAC;AACtC,cAAc,OAAO,CAAC"}
@@ -1,23 +0,0 @@
1
- import { type SignerOptions, type VerifierOptions } from "fast-jwt";
2
- export declare const jwt: {
3
- /**
4
- * Generate a new JWT token for the user.
5
- * @param payload The payload to encode in the JWT token.
6
- */
7
- generate(payload: any, { key, algorithm, ...options }?: any): Promise<string>;
8
- /**
9
- * Verify the given token.
10
- * @param token The JWT token to verify.
11
- * @returns The decoded token payload if verification is successful.
12
- */
13
- verify<T = any>(token: string, { key, algorithms, ...options }?: any): Promise<T>;
14
- /**
15
- * Generate a new refresh token for the user.
16
- */
17
- generateRefreshToken(payload: any, { key, expiresIn, algorithm, ...options }?: any): Promise<string>;
18
- /**
19
- * Verify the given refresh token.
20
- */
21
- verifyRefreshToken<T_1 = any>(token: string, { key, algorithms, ...options }?: any): Promise<T_1>;
22
- };
23
- //# sourceMappingURL=jwt.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"jwt.d.ts","sourceRoot":"","sources":["../../src/services/jwt.ts"],"names":[],"mappings":"AACA,OAAO,EAIL,KAAK,aAAa,EAClB,KAAK,eAAe,EACrB,MAAM,UAAU,CAAC;AASlB,eAAO,MAAM,GAAG;IACd;;;OAGG;sBAEQ,GAAG,yCAMX,QAAQ,MAAM,CAAC;IAOlB;;;;OAIG;2BAEM,MAAM;IAYf;;OAEG;kCAEQ,GAAG,oDAOX,QAAQ,MAAM,CAAC;IAKlB;;OAEG;yCAEM,MAAM;CAUhB,CAAC"}
@@ -1,39 +0,0 @@
1
- 'use strict';var core=require('@warlock.js/core'),fastJwt=require('fast-jwt');const getSecretKey = () => core.config.key("auth.jwt.secret");
2
- const getAlgorithm = () => core.config.key("auth.jwt.algorithm");
3
- const getRefreshSecretKey = () => core.config.key("auth.jwt.refresh.secret");
4
- // Assuming there's a separate config for refresh token validity, for example, '7d' for 7 days
5
- const getRefreshTokenValidity = () => core.config.key("auth.jwt.refresh.expiresIn");
6
- const jwt = {
7
- /**
8
- * Generate a new JWT token for the user.
9
- * @param payload The payload to encode in the JWT token.
10
- */
11
- async generate(payload, { key = getSecretKey(), algorithm = getAlgorithm(), ...options } = {}) {
12
- // Create a signer function with predefined options
13
- const sign = fastJwt.createSigner({ key, ...options, algorithm });
14
- return sign({ ...payload });
15
- },
16
- /**
17
- * Verify the given token.
18
- * @param token The JWT token to verify.
19
- * @returns The decoded token payload if verification is successful.
20
- */
21
- async verify(token, { key = getSecretKey(), algorithms = getAlgorithm() ? [getAlgorithm()] : undefined, ...options } = {}) {
22
- const verify = fastJwt.createVerifier({ key, ...options, algorithms });
23
- return await verify(token);
24
- },
25
- /**
26
- * Generate a new refresh token for the user.
27
- */
28
- async generateRefreshToken(payload, { key = getRefreshSecretKey(), expiresIn = getRefreshTokenValidity(), algorithm = getAlgorithm(), ...options } = {}) {
29
- const sign = fastJwt.createSigner({ key, expiresIn, algorithm, ...options });
30
- return sign({ ...payload });
31
- },
32
- /**
33
- * Verify the given refresh token.
34
- */
35
- async verifyRefreshToken(token, { key = getRefreshSecretKey(), algorithms = [getAlgorithm()], ...options } = {}) {
36
- const verify = fastJwt.createVerifier({ key, algorithms, ...options });
37
- return await verify(token);
38
- },
39
- };exports.jwt=jwt;//# sourceMappingURL=jwt.js.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"jwt.js","sources":["../../src/services/jwt.ts"],"sourcesContent":[null],"names":["config","createSigner","createVerifier"],"mappings":"8EASA,MAAM,YAAY,GAAG,MAAMA,WAAM,CAAC,GAAG,CAAC,iBAAiB,CAAW,CAAC;AACnE,MAAM,YAAY,GAAG,MAAMA,WAAM,CAAC,GAAG,CAAC,oBAAoB,CAAc,CAAC;AAEzE,MAAM,mBAAmB,GAAG,MAAMA,WAAM,CAAC,GAAG,CAAC,yBAAyB,CAAW,CAAC;AAClF;AACA,MAAM,uBAAuB,GAAG,MAAMA,WAAM,CAAC,GAAG,CAAC,4BAA4B,CAAoB,CAAC;AAErF,MAAA,GAAG,GAAG;AACjB;;;AAGG;AACH,IAAA,MAAM,QAAQ,CACZ,OAAY,EACZ,EACE,GAAG,GAAG,YAAY,EAAE,EACpB,SAAS,GAAG,YAAY,EAAE,EAC1B,GAAG,OAAO,KAC0B,EAAE,EAAA;;AAGxC,QAAA,MAAM,IAAI,GAAGC,oBAAY,CAAC,EAAE,GAAG,EAAE,GAAG,OAAO,EAAE,SAAS,EAAE,CAAC,CAAC;AAE1D,QAAA,OAAO,IAAI,CAAC,EAAE,GAAG,OAAO,EAAE,CAAC,CAAC;KAC7B;AAED;;;;AAIG;AACH,IAAA,MAAM,MAAM,CACV,KAAa,EACb,EACE,GAAG,GAAG,YAAY,EAAE,EACpB,UAAU,GAAG,YAAY,EAAE,GAAG,CAAC,YAAY,EAAE,CAAC,GAAG,SAAS,EAC1D,GAAG,OAAO,KAC4B,EAAE,EAAA;AAE1C,QAAA,MAAM,MAAM,GAAGC,sBAAc,CAAC,EAAE,GAAG,EAAE,GAAG,OAAO,EAAE,UAAU,EAAE,CAAC,CAAC;AAE/D,QAAA,OAAO,MAAM,MAAM,CAAC,KAAe,CAAC,CAAC;KACtC;AAED;;AAEG;IACH,MAAM,oBAAoB,CACxB,OAAY,EACZ,EACE,GAAG,GAAG,mBAAmB,EAAE,EAC3B,SAAS,GAAG,uBAAuB,EAAE,EACrC,SAAS,GAAG,YAAY,EAAE,EAC1B,GAAG,OAAO,EAAA,GAC0B,EAAE,EAAA;AAExC,QAAA,MAAM,IAAI,GAAGD,oBAAY,CAAC,EAAE,GAAG,EAAE,SAAS,EAAE,SAAS,EAAE,GAAG,OAAO,EAAE,CAAC,CAAC;AACrE,QAAA,OAAO,IAAI,CAAC,EAAE,GAAG,OAAO,EAAE,CAAC,CAAC;KAC7B;AAED;;AAEG;IACH,MAAM,kBAAkB,CACtB,KAAa,EACb,EACE,GAAG,GAAG,mBAAmB,EAAE,EAC3B,UAAU,GAAG,CAAC,YAAY,EAAE,CAAC,EAC7B,GAAG,OAAO,EAAA,GAC4B,EAAE,EAAA;AAE1C,QAAA,MAAM,MAAM,GAAGC,sBAAc,CAAC,EAAE,GAAG,EAAE,UAAU,EAAE,GAAG,OAAO,EAAE,CAAC,CAAC;AAC/D,QAAA,OAAO,MAAM,MAAM,CAAC,KAAK,CAAC,CAAC;KAC5B;"}
@@ -1,18 +0,0 @@
1
- export declare enum AuthErrorCodes {
2
- /**
3
- * Missing Access Token Error Code EC001
4
- * EC001 = Missing Access Token
5
- */
6
- MissingAccessToken = "EC001",
7
- /**
8
- * Invalid Access Token Error Code EC002
9
- * EC002 = Invalid Access Token
10
- */
11
- InvalidAccessToken = "EC002",
12
- /**
13
- * Unauthorized Error Code EC003
14
- * EC003 = Unauthorized
15
- */
16
- Unauthorized = "EC003"
17
- }
18
- //# sourceMappingURL=auth-error-codes.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"auth-error-codes.d.ts","sourceRoot":"","sources":["../../src/utils/auth-error-codes.ts"],"names":[],"mappings":"AAAA,oBAAY,cAAc;IACxB;;;OAGG;IACH,kBAAkB,UAAU;IAC5B;;;OAGG;IACH,kBAAkB,UAAU;IAC5B;;;OAGG;IACH,YAAY,UAAU;CACvB"}
@@ -1,18 +0,0 @@
1
- 'use strict';exports.AuthErrorCodes=void 0;
2
- (function (AuthErrorCodes) {
3
- /**
4
- * Missing Access Token Error Code EC001
5
- * EC001 = Missing Access Token
6
- */
7
- AuthErrorCodes["MissingAccessToken"] = "EC001";
8
- /**
9
- * Invalid Access Token Error Code EC002
10
- * EC002 = Invalid Access Token
11
- */
12
- AuthErrorCodes["InvalidAccessToken"] = "EC002";
13
- /**
14
- * Unauthorized Error Code EC003
15
- * EC003 = Unauthorized
16
- */
17
- AuthErrorCodes["Unauthorized"] = "EC003";
18
- })(exports.AuthErrorCodes || (exports.AuthErrorCodes = {}));//# sourceMappingURL=auth-error-codes.js.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"auth-error-codes.js","sources":["../../src/utils/auth-error-codes.ts"],"sourcesContent":[null],"names":["AuthErrorCodes"],"mappings":"aAAYA,8BAgBX;AAhBD,CAAA,UAAY,cAAc,EAAA;AACxB;;;AAGG;AACH,IAAA,cAAA,CAAA,oBAAA,CAAA,GAAA,OAA4B,CAAA;AAC5B;;;AAGG;AACH,IAAA,cAAA,CAAA,oBAAA,CAAA,GAAA,OAA4B,CAAA;AAC5B;;;AAGG;AACH,IAAA,cAAA,CAAA,cAAA,CAAA,GAAA,OAAsB,CAAA;AACxB,CAAC,EAhBWA,sBAAc,KAAdA,sBAAc,GAgBzB,EAAA,CAAA,CAAA"}
@@ -1,45 +0,0 @@
1
- import { NO_EXPIRATION } from "../contracts/types";
2
- /**
3
- * Duration object for specifying time periods
4
- * All units are additive (e.g., { days: 1, hours: 6 } = 30 hours)
5
- *
6
- * @example
7
- * ```typescript
8
- * { hours: 1 } // 1 hour
9
- * { days: 7, hours: 12 } // 7.5 days
10
- * { minutes: 30 } // 30 minutes
11
- * ```
12
- */
13
- export type Duration = {
14
- milliseconds?: number;
15
- seconds?: number;
16
- minutes?: number;
17
- hours?: number;
18
- days?: number;
19
- weeks?: number;
20
- };
21
- /**
22
- * Expiration value type - can be a Duration object, string format, or NO_EXPIRATION
23
- */
24
- export type ExpiresIn = Duration | typeof NO_EXPIRATION | string | number;
25
- /**
26
- * Parse duration to milliseconds
27
- * Supports Duration object, string format ("1d 2h 30m"), or number (raw ms)
28
- *
29
- * @example
30
- * ```typescript
31
- * parseExpirationToMs({ hours: 1 }) // 3600000
32
- * parseExpirationToMs({ days: 1 }) // 86400000
33
- * parseExpirationToMs("1h") // 3600000
34
- * parseExpirationToMs("1d 2h 30m") // 95400000
35
- * parseExpirationToMs(3600000) // 3600000
36
- * parseExpirationToMs(NO_EXPIRATION) // undefined
37
- * ```
38
- */
39
- export declare function parseExpirationToMs(expiration: ExpiresIn | undefined, defaultMs?: number): number | undefined;
40
- /**
41
- * Convert ExpiresIn to a value suitable for jwt.generate (string or number)
42
- * Returns undefined if NO_EXPIRATION
43
- */
44
- export declare function toJwtExpiresIn(expiration: ExpiresIn | undefined, defaultMs?: number): string | undefined;
45
- //# sourceMappingURL=duration.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"duration.d.ts","sourceRoot":"","sources":["../../src/utils/duration.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,aAAa,EAAE,MAAM,oBAAoB,CAAC;AAEnD;;;;;;;;;;GAUG;AACH,MAAM,MAAM,QAAQ,GAAG;IACrB,YAAY,CAAC,EAAE,MAAM,CAAC;IACtB,OAAO,CAAC,EAAE,MAAM,CAAC;IACjB,OAAO,CAAC,EAAE,MAAM,CAAC;IACjB,KAAK,CAAC,EAAE,MAAM,CAAC;IACf,IAAI,CAAC,EAAE,MAAM,CAAC;IACd,KAAK,CAAC,EAAE,MAAM,CAAC;CAChB,CAAC;AAEF;;GAEG;AACH,MAAM,MAAM,SAAS,GAAG,QAAQ,GAAG,OAAO,aAAa,GAAG,MAAM,GAAG,MAAM,CAAC;AAE1E;;;;;;;;;;;;;GAaG;AACH,wBAAgB,mBAAmB,CACjC,UAAU,EAAE,SAAS,GAAG,SAAS,EACjC,SAAS,GAAE,MAAgB,GAC1B,MAAM,GAAG,SAAS,CAmBpB;AAuDD;;;GAGG;AACH,wBAAgB,cAAc,CAC5B,UAAU,EAAE,SAAS,GAAG,SAAS,EACjC,SAAS,GAAE,MAAgB,GAC1B,MAAM,GAAG,SAAS,CAMpB"}
@@ -1,93 +0,0 @@
1
- 'use strict';var types=require('../contracts/types.js');/**
2
- * Parse duration to milliseconds
3
- * Supports Duration object, string format ("1d 2h 30m"), or number (raw ms)
4
- *
5
- * @example
6
- * ```typescript
7
- * parseExpirationToMs({ hours: 1 }) // 3600000
8
- * parseExpirationToMs({ days: 1 }) // 86400000
9
- * parseExpirationToMs("1h") // 3600000
10
- * parseExpirationToMs("1d 2h 30m") // 95400000
11
- * parseExpirationToMs(3600000) // 3600000
12
- * parseExpirationToMs(NO_EXPIRATION) // undefined
13
- * ```
14
- */
15
- function parseExpirationToMs(expiration, defaultMs = 3600000) {
16
- if (expiration === undefined) {
17
- return defaultMs;
18
- }
19
- if (expiration === types.NO_EXPIRATION) {
20
- return undefined;
21
- }
22
- if (typeof expiration === "number") {
23
- return expiration;
24
- }
25
- if (typeof expiration === "string") {
26
- return parseStringDuration(expiration);
27
- }
28
- // It's a Duration object
29
- return parseDurationObject(expiration);
30
- }
31
- /**
32
- * Parse a Duration object to milliseconds
33
- */
34
- function parseDurationObject(duration) {
35
- let ms = 0;
36
- if (duration.milliseconds)
37
- ms += duration.milliseconds;
38
- if (duration.seconds)
39
- ms += duration.seconds * 1000;
40
- if (duration.minutes)
41
- ms += duration.minutes * 60 * 1000;
42
- if (duration.hours)
43
- ms += duration.hours * 60 * 60 * 1000;
44
- if (duration.days)
45
- ms += duration.days * 24 * 60 * 60 * 1000;
46
- if (duration.weeks)
47
- ms += duration.weeks * 7 * 24 * 60 * 60 * 1000;
48
- return ms;
49
- }
50
- /**
51
- * Parse a string duration to milliseconds
52
- * Supports formats: "1h", "7d", "30m", "90s", "1d 2h 30m"
53
- */
54
- function parseStringDuration(str) {
55
- let totalMs = 0;
56
- const parts = str.trim().split(/\s+/);
57
- for (const part of parts) {
58
- const match = part.match(/^(\d+(?:\.\d+)?)([smhdw])$/i);
59
- if (!match)
60
- continue;
61
- const value = parseFloat(match[1]);
62
- const unit = match[2].toLowerCase();
63
- switch (unit) {
64
- case "s":
65
- totalMs += value * 1000;
66
- break;
67
- case "m":
68
- totalMs += value * 60 * 1000;
69
- break;
70
- case "h":
71
- totalMs += value * 60 * 60 * 1000;
72
- break;
73
- case "d":
74
- totalMs += value * 24 * 60 * 60 * 1000;
75
- break;
76
- case "w":
77
- totalMs += value * 7 * 24 * 60 * 60 * 1000;
78
- break;
79
- }
80
- }
81
- return totalMs || 3600000; // Default to 1 hour if nothing parsed
82
- }
83
- /**
84
- * Convert ExpiresIn to a value suitable for jwt.generate (string or number)
85
- * Returns undefined if NO_EXPIRATION
86
- */
87
- function toJwtExpiresIn(expiration, defaultMs = 3600000) {
88
- const ms = parseExpirationToMs(expiration, defaultMs);
89
- if (ms === undefined)
90
- return undefined;
91
- // Convert ms to seconds for JWT (more common format)
92
- return Math.floor(ms / 1000) + "s";
93
- }exports.parseExpirationToMs=parseExpirationToMs;exports.toJwtExpiresIn=toJwtExpiresIn;//# sourceMappingURL=duration.js.map