@webbio/strapi-plugin-page-builder 0.10.10-platform → 0.11.11-platform

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (80) hide show
  1. package/README.md +38 -0
  2. package/admin/src/components/EditView/CollectionTypeSearch/index.tsx +1 -1
  3. package/dist/package.json +7 -1
  4. package/dist/server/bootstrap.js +31 -1
  5. package/dist/server/content-types/category/schema.json +18 -0
  6. package/dist/server/content-types/index.js +9 -1
  7. package/dist/server/controllers/index.js +5 -1
  8. package/dist/server/controllers/private-content.js +18 -0
  9. package/dist/server/controllers/sitemap.js +29 -0
  10. package/dist/server/graphql/page-by-path.js +22 -2
  11. package/dist/server/policies/index.js +7 -1
  12. package/dist/server/policies/isAuthorizedPage.js +11 -0
  13. package/dist/server/register.js +2 -0
  14. package/dist/server/routes/index.js +28 -0
  15. package/dist/server/schema/page-end.json +8 -0
  16. package/dist/server/schema/platform-start.json +5 -0
  17. package/dist/server/services/builder.js +86 -0
  18. package/dist/server/services/email.js +132 -0
  19. package/dist/server/services/index.js +7 -1
  20. package/dist/server/services/private-content/components/admin-email.json +22 -0
  21. package/dist/server/services/private-content/components/email.json +22 -0
  22. package/dist/server/services/private-content/components/platform-email.json +30 -0
  23. package/dist/server/services/private-content/constants/index.js +16 -0
  24. package/dist/server/services/private-content/graphql/index.js +77 -0
  25. package/dist/server/services/private-content/graphql/resolvers/findOnePage.js +40 -0
  26. package/dist/server/services/private-content/graphql/resolvers/findPage.js +44 -0
  27. package/dist/server/services/private-content/graphql/resolvers/forgot-password.js +31 -0
  28. package/dist/server/services/private-content/graphql/resolvers/login.js +49 -0
  29. package/dist/server/services/private-content/graphql/resolvers/register.js +68 -0
  30. package/dist/server/services/private-content/graphql/resolvers/reset-password.js +41 -0
  31. package/dist/server/services/private-content/graphql/types/index.js +89 -0
  32. package/dist/server/services/private-content/index.js +92 -0
  33. package/dist/server/services/private-content/mail-template/txtMail.email.template.text.js +12 -0
  34. package/dist/server/services/private-content/mail-template/txtMail.interface.js +2 -0
  35. package/dist/server/services/private-content/page.js +17 -0
  36. package/dist/server/services/private-content/platform.js +17 -0
  37. package/dist/server/services/private-content/schemas/index.js +30 -0
  38. package/dist/server/services/private-content/user.js +159 -0
  39. package/dist/server/services/sitemap.js +50 -0
  40. package/dist/server/utils/strapi.js +9 -1
  41. package/dist/shared/utils/constants.js +3 -1
  42. package/dist/tsconfig.server.tsbuildinfo +1 -1
  43. package/package.json +7 -1
  44. package/server/bootstrap.ts +39 -1
  45. package/server/content-types/category/schema.json +18 -0
  46. package/server/content-types/index.ts +7 -1
  47. package/server/controllers/index.ts +5 -1
  48. package/server/controllers/private-content.ts +17 -0
  49. package/server/controllers/sitemap.ts +32 -0
  50. package/server/graphql/page-by-path.ts +28 -2
  51. package/server/policies/index.ts +5 -1
  52. package/server/policies/isAuthorizedPage.ts +11 -0
  53. package/server/register.ts +2 -0
  54. package/server/routes/index.ts +28 -0
  55. package/server/schema/page-end.json +8 -0
  56. package/server/schema/platform-start.json +5 -0
  57. package/server/services/builder.ts +83 -1
  58. package/server/services/email.ts +127 -0
  59. package/server/services/index.ts +7 -1
  60. package/server/services/private-content/components/admin-email.json +22 -0
  61. package/server/services/private-content/components/email.json +22 -0
  62. package/server/services/private-content/components/platform-email.json +30 -0
  63. package/server/services/private-content/constants/index.ts +13 -0
  64. package/server/services/private-content/graphql/index.ts +88 -0
  65. package/server/services/private-content/graphql/resolvers/findOnePage.ts +40 -0
  66. package/server/services/private-content/graphql/resolvers/findPage.ts +45 -0
  67. package/server/services/private-content/graphql/resolvers/forgot-password.ts +34 -0
  68. package/server/services/private-content/graphql/resolvers/login.ts +56 -0
  69. package/server/services/private-content/graphql/resolvers/register.ts +78 -0
  70. package/server/services/private-content/graphql/resolvers/reset-password.ts +44 -0
  71. package/server/services/private-content/graphql/types/index.ts +96 -0
  72. package/server/services/private-content/index.ts +93 -0
  73. package/server/services/private-content/mail-template/txtMail.email.template.text.ts +6 -0
  74. package/server/services/private-content/page.ts +14 -0
  75. package/server/services/private-content/platform.ts +14 -0
  76. package/server/services/private-content/schemas/index.ts +28 -0
  77. package/server/services/private-content/user.ts +187 -0
  78. package/server/services/sitemap.ts +53 -0
  79. package/server/utils/strapi.ts +5 -0
  80. package/shared/utils/constants.ts +2 -0
@@ -0,0 +1,88 @@
1
+ import {
2
+ ForgotPasswordInput,
3
+ ForgotPasswordResponse,
4
+ LoginInput,
5
+ LoginResponse,
6
+ Mutations,
7
+ Queries,
8
+ RegisterInput,
9
+ RegisterResponse,
10
+ ResetPasswordInput,
11
+ ResetPasswordResponse,
12
+ User
13
+ } from './types';
14
+ import { platformRegister } from './resolvers/register';
15
+ import { platformLogin } from './resolvers/login';
16
+ import { platformForgotPassword } from './resolvers/forgot-password';
17
+ import { platformResetPassword } from './resolvers/reset-password';
18
+ import { page } from './resolvers/findOnePage';
19
+ import { pages } from './resolvers/findPage';
20
+
21
+ export const extendGraphQL = () => {
22
+ const extensionService = strapi.plugin('graphql').service('extension');
23
+
24
+ const extension = () => ({
25
+ typeDefs: `
26
+ ${RegisterInput}
27
+
28
+ ${LoginInput}
29
+
30
+ ${RegisterResponse}
31
+
32
+ ${LoginResponse}
33
+
34
+ ${User}
35
+
36
+ ${Mutations}
37
+
38
+ ${ForgotPasswordInput}
39
+
40
+ ${ForgotPasswordResponse}
41
+
42
+ ${ResetPasswordInput}
43
+
44
+ ${ResetPasswordResponse}
45
+
46
+ ${ResetPasswordInput}
47
+
48
+ ${ResetPasswordResponse}
49
+
50
+ ${Queries}
51
+
52
+ `,
53
+ resolvers: {
54
+ Query: {
55
+ page,
56
+ pages
57
+ },
58
+ Mutation: {
59
+ platformLogin,
60
+ platformRegister,
61
+ platformForgotPassword,
62
+ platformResetPassword
63
+ }
64
+ },
65
+ resolversConfig: {
66
+ 'Mutation.platformLogin': {
67
+ auth: false
68
+ },
69
+ 'Mutation.platformRegister': {
70
+ auth: false
71
+ },
72
+ 'Mutation.platformForgotPassword': {
73
+ auth: false
74
+ },
75
+ 'Mutation.platformResetPassword': {
76
+ auth: false
77
+ },
78
+ 'Query.page': {
79
+ auth: false
80
+ },
81
+ 'Query.pages': {
82
+ auth: false
83
+ }
84
+ }
85
+ });
86
+
87
+ extensionService.use(extension);
88
+ };
@@ -0,0 +1,40 @@
1
+ import { omit } from 'lodash/fp';
2
+ import { sanitize } from '@strapi/utils';
3
+ import { PAGE_UID } from '../../../../../shared/utils/constants';
4
+ import { ForbiddenError as ApolloForbiddenError } from 'apollo-server-koa';
5
+
6
+ export const page = {
7
+ async resolve(parent, args, ctx) {
8
+ const uid = PAGE_UID;
9
+ const { toEntityResponse } = strapi.plugin('graphql').service('format').returnTypes;
10
+ const { transformArgs } = strapi.plugin('graphql').service('builders').utils;
11
+ const populatedArgs = { ...args, populate: { platform: true } };
12
+ const transformedArgs = transformArgs(populatedArgs, strapi.contentType(PAGE_UID));
13
+ const sanitizedQuery = await sanitize.contentAPI.query(populatedArgs, strapi.contentType(PAGE_UID));
14
+ const value = await strapi.entityService!.findOne(uid, args.id, omit('id', sanitizedQuery));
15
+ // @ts-ignore Strapi types are the best
16
+ if (!value?.platform?.isPrivate && !value?.isPrivate) {
17
+ return toEntityResponse(value, { args: transformedArgs, resourceUID: uid });
18
+ }
19
+
20
+ if (
21
+ // @ts-ignore Strapi types are the best
22
+ (value?.platform?.isPrivate === true && ctx.koaContext.req.headers.authorization) ||
23
+ (value?.isPrivate === true && ctx.koaContext.req.headers.authorization)
24
+ ) {
25
+ const auth = ctx.koaContext.req.headers.authorization;
26
+ const token = auth.split(' ');
27
+
28
+ const jwtService = strapi.plugin('users-permissions').service('jwt');
29
+ const decodedToken = await jwtService.verify(token[1]);
30
+ if (decodedToken) {
31
+ const user = ctx.state.user;
32
+ // @ts-ignore Strapi types are the best
33
+ if (user?.platform?.id === value?.platform?.id) {
34
+ return toEntityResponse(value, { args: transformedArgs, resourceUID: uid });
35
+ }
36
+ }
37
+ }
38
+ return new ApolloForbiddenError('Forbidden access');
39
+ }
40
+ };
@@ -0,0 +1,45 @@
1
+ import { sanitize } from '@strapi/utils';
2
+ import { PAGE_UID } from '../../../../../shared/utils/constants';
3
+
4
+ export const pages = {
5
+ async resolve(parent, args, ctx) {
6
+ const uid = PAGE_UID;
7
+ const { toEntityResponseCollection } = strapi.plugin('graphql').service('format').returnTypes;
8
+ const { transformArgs } = strapi.plugin('graphql').service('builders').utils;
9
+ const populatedArgs = { ...args, populate: { platform: true } };
10
+ const transformedArgs = transformArgs(populatedArgs, strapi.contentType(PAGE_UID));
11
+ const sanitizedQuery = await sanitize.contentAPI.query(populatedArgs, strapi.contentType(PAGE_UID));
12
+ const value = await strapi.entityService!.findMany(uid, sanitizedQuery);
13
+
14
+ const user = ctx.state.user;
15
+
16
+ if (user && ctx.koaContext.req.headers.authorization) {
17
+ const auth = ctx.koaContext.req.headers.authorization;
18
+ const token = auth.split(' ');
19
+ const jwtService = strapi.plugin('users-permissions').service('jwt');
20
+ const decodedToken = await jwtService.verify(token[1]);
21
+ if (decodedToken) {
22
+ // @ts-ignore
23
+ const filteredItems = value.filter((item) => {
24
+ // @ts-ignore
25
+ if (item.platform?.isPrivate === true && user.platform.id === item.platform.id) {
26
+ return item;
27
+ }
28
+ if (item?.isPrivate === true && user.platform.id === item.platform.id) {
29
+ return item;
30
+ }
31
+ // @ts-ignore
32
+ if (item.platform?.isPrivate !== true && item?.isPrivate !== true) {
33
+ return item;
34
+ }
35
+ });
36
+ return toEntityResponseCollection(filteredItems, { args: transformedArgs, resourceUID: uid });
37
+ }
38
+ }
39
+
40
+ // @ts-ignore
41
+ const filteredItems = value.filter((item) => item.platform?.isPrivate !== true && item?.isPrivate !== true);
42
+
43
+ return toEntityResponseCollection(filteredItems, { args: transformedArgs, resourceUID: uid });
44
+ }
45
+ };
@@ -0,0 +1,34 @@
1
+ import { errors } from '@strapi/utils';
2
+ import { USER_MODEL } from '../../constants';
3
+ import { validateForgotPasswordSchema } from '../../schemas';
4
+ const { UnauthorizedError } = errors;
5
+
6
+ export const platformForgotPassword = {
7
+ async resolve(parent, args, context) {
8
+ await validateForgotPasswordSchema(args.input);
9
+
10
+ const { email, domain } = args.input;
11
+
12
+ const user = await strapi.query(USER_MODEL).findOne({
13
+ populate: { platform: { populate: { platformEmails: { populate: true } } } },
14
+ where: {
15
+ email: email.toLowerCase(),
16
+ platform: {
17
+ domain: domain.toLowerCase()
18
+ }
19
+ }
20
+ });
21
+
22
+ if (!user) {
23
+ {
24
+ message: 'Email has been sent';
25
+ }
26
+ }
27
+
28
+ await strapi.service('plugin::page-builder.email').sendForgotPasswordMail(user);
29
+
30
+ return {
31
+ message: 'Email has been sent'
32
+ };
33
+ }
34
+ };
@@ -0,0 +1,56 @@
1
+ import { errors, sanitize } from '@strapi/utils';
2
+ import { USER_MODEL } from '../../constants';
3
+ import { validateLoginSchema } from '../../schemas';
4
+ const { UnauthorizedError } = errors;
5
+
6
+ export const platformLogin = {
7
+ async resolve(parent, args, context) {
8
+ await validateLoginSchema(args.input);
9
+
10
+ const { email, password, domain } = args.input;
11
+
12
+ const user = await strapi.query(USER_MODEL).findOne({
13
+ where: {
14
+ email: email.toLowerCase(),
15
+ platform: {
16
+ domain: domain.toLowerCase()
17
+ }
18
+ },
19
+ populate: {
20
+ platform: true
21
+ }
22
+ });
23
+
24
+ if (user == null) {
25
+ throw new UnauthorizedError('Invalid email or password');
26
+ }
27
+
28
+ const isPasswordValid = await strapi
29
+ .service('plugin::users-permissions.user')
30
+ .validatePassword(password, user.password);
31
+
32
+ if (isPasswordValid === false) {
33
+ throw new UnauthorizedError('Invalid email or password');
34
+ }
35
+
36
+ if (user.confirmed === false) {
37
+ throw new UnauthorizedError('Email is not confirmed');
38
+ }
39
+
40
+ if (user.activateUser === false) {
41
+ throw new UnauthorizedError('Account is not activated');
42
+ }
43
+
44
+ const sanitizedUser = sanitize.contentAPI.output(user, strapi.getModel(USER_MODEL), {
45
+ auth: false
46
+ });
47
+ const jwt = await strapi
48
+ .service('plugin::users-permissions.jwt')
49
+ .issue({ id: user.id, platformId: user.platform.id });
50
+
51
+ return {
52
+ user: sanitizedUser,
53
+ jwt
54
+ };
55
+ }
56
+ };
@@ -0,0 +1,78 @@
1
+ import { sanitize } from '@strapi/utils';
2
+ import { errors } from '@strapi/utils';
3
+ import { USER_MODEL } from '../../constants';
4
+ import { validateRegisterSchema } from '../../schemas';
5
+ const { ApplicationError, NotFoundError } = errors;
6
+
7
+ export const platformRegister = {
8
+ async resolve(parent, args, context) {
9
+ const pluginStore = await strapi.store({ type: 'plugin', name: 'users-permissions' });
10
+ const settings: any = await pluginStore.get({ key: 'advanced' });
11
+
12
+ await validateRegisterSchema(args.input);
13
+
14
+ const { email, domain } = args.input;
15
+
16
+ const platform = await strapi.query('api::platform.platform').findOne({
17
+ where: {
18
+ domain: domain.toLowerCase()
19
+ }
20
+ });
21
+
22
+ if (!platform) {
23
+ throw new NotFoundError('Platform not found');
24
+ }
25
+
26
+ const role = await strapi
27
+ .query('plugin::users-permissions.role')
28
+ .findOne({ where: { type: settings.default_role } });
29
+
30
+ if (!role) {
31
+ throw new ApplicationError('Impossible to find the default role');
32
+ }
33
+ const conflictingUserCount = await strapi.query(USER_MODEL).count({
34
+ where: {
35
+ $and: [
36
+ {
37
+ email: email.toLowerCase()
38
+ },
39
+ {
40
+ platform: {
41
+ id: platform.id
42
+ }
43
+ }
44
+ ]
45
+ }
46
+ });
47
+
48
+ if (conflictingUserCount > 0) {
49
+ throw new ApplicationError('Email is already taken');
50
+ }
51
+
52
+ const userData = {
53
+ ...args.input,
54
+ role: role.id,
55
+ categories: args.input.categories,
56
+ platform: platform.id,
57
+ email: email.toLowerCase(),
58
+ provider: 'local',
59
+ confirmed: false,
60
+ activateUser: false
61
+ };
62
+
63
+ const createdUser = await strapi.entityService.create(USER_MODEL, {
64
+ data: userData
65
+ });
66
+
67
+ const userModel = strapi.getModel(USER_MODEL);
68
+ const sanitizedUser = sanitize.contentAPI.output(createdUser, userModel, {
69
+ auth: false
70
+ });
71
+
72
+ await strapi.service('plugin::page-builder.email').sendConfirmationEmail(createdUser);
73
+
74
+ return {
75
+ user: sanitizedUser
76
+ };
77
+ }
78
+ };
@@ -0,0 +1,44 @@
1
+ import { sanitize } from '@strapi/utils';
2
+ import { USER_MODEL } from '../../constants';
3
+ import { validateResetPasswordSchema } from '../../schemas';
4
+
5
+ export const platformResetPassword = {
6
+ async resolve(parent, args, context) {
7
+ await validateResetPasswordSchema(args.input);
8
+
9
+ const { password, resetPasswordToken } = args.input;
10
+
11
+ const jwtService = strapi.plugin('users-permissions').service('jwt');
12
+ const decodedToken = await jwtService.verify(resetPasswordToken);
13
+
14
+ if (decodedToken) {
15
+ const user = await strapi.query(USER_MODEL).findOne({
16
+ where: {
17
+ id: decodedToken.userId,
18
+ resetPasswordToken: resetPasswordToken
19
+ }
20
+ });
21
+ if (user && user.resetPasswordToken && user.resetPasswordToken === resetPasswordToken) {
22
+ if (password) {
23
+ await strapi.entityService.update(USER_MODEL, user.id, {
24
+ data: {
25
+ // @ts-ignore
26
+ password: password,
27
+ resetPasswordToken: null
28
+ }
29
+ });
30
+ }
31
+
32
+ const userModel = strapi.getModel(USER_MODEL);
33
+ const sanitizedUser = sanitize.contentAPI.output(user, userModel, {
34
+ auth: false
35
+ });
36
+ return {
37
+ user: sanitizedUser
38
+ };
39
+ }
40
+ }
41
+
42
+ throw new Error('Time of token has expired request a new password change');
43
+ }
44
+ };
@@ -0,0 +1,96 @@
1
+ export const LoginInput = `
2
+ input LoginInput {
3
+ email: String!
4
+ password: String!
5
+ domain: String!
6
+ }
7
+ `;
8
+
9
+ export const ForgotPasswordInput = `
10
+ input ForgotPasswordInput {
11
+ email: String!
12
+ domain: String!
13
+ }`;
14
+
15
+ export const RegisterInput = `
16
+ input RegisterInput {
17
+ email: String!
18
+ password: String!
19
+ firstName: String
20
+ lastName: String
21
+ company: String
22
+ jobTitle: String
23
+ address: String
24
+ postalCode: String
25
+ city: String
26
+ country: String
27
+ phone: String
28
+ subscribeToNewsletter: Boolean
29
+ categories: [ID]
30
+ domain: String!
31
+ }
32
+ `;
33
+
34
+ export const LoginResponse = `
35
+ type LoginResponse {
36
+ jwt: String
37
+ user: User
38
+ }
39
+ `;
40
+
41
+ export const RegisterResponse = `
42
+ type RegisterResponse {
43
+ user: User
44
+ }
45
+ `;
46
+
47
+ export const ForgotPasswordResponse = `
48
+ type ForgotPasswordResponse {
49
+ message: String
50
+ }
51
+ `;
52
+
53
+ export const User = `
54
+ type User {
55
+ id: ID!
56
+ email: String!
57
+ confirmed: Boolean
58
+ blocked: Boolean
59
+ activated: Boolean
60
+ }
61
+ `;
62
+
63
+ export const ResetPassword = `
64
+ type ResetPassword {
65
+ jwt: String
66
+ email: String
67
+ }
68
+ `;
69
+ export const ResetPasswordInput = `
70
+ input ResetPasswordInput {
71
+ password: String!
72
+ resetPasswordToken: String!
73
+ }
74
+ `;
75
+
76
+ export const ResetPasswordResponse = `
77
+ type ResetPasswordResponse {
78
+ user: User
79
+ }
80
+ `;
81
+
82
+ export const Mutations = `
83
+ type Mutation {
84
+ platformLogin(input: LoginInput!): LoginResponse
85
+ platformRegister(input: RegisterInput!): RegisterResponse
86
+ platformForgotPassword(input: ForgotPasswordInput!): ForgotPasswordResponse
87
+ platformResetPassword(input: ResetPasswordInput!): ResetPasswordResponse
88
+ }
89
+ `;
90
+
91
+ export const Queries = `
92
+ type Query {
93
+ page(id: ID, locale: I18NLocaleCode): PageEntityResponse
94
+ pages(filters: PageFiltersInput pagination: PaginationArg = {} sort: [String] = [] publicationState: PublicationState = LIVE locale: I18NLocaleCode): PageEntityResponseCollection
95
+ }
96
+ `;
@@ -0,0 +1,93 @@
1
+ import { getConfig } from '../../utils/strapi';
2
+ import { extendControllers, extendUser } from './user';
3
+ import { extendGraphQL } from './graphql';
4
+ import { extendPlatform } from './platform';
5
+ import { extendPage } from './page';
6
+
7
+ export default {
8
+ async enablePrivateContent() {
9
+ if (this.isPrivateContentEnabled) {
10
+ await strapi.services?.['plugin::page-builder.builder']?.buildComponents();
11
+ extendUser();
12
+ extendControllers();
13
+ extendGraphQL();
14
+ extendPlatform();
15
+ extendPage();
16
+ }
17
+ },
18
+ isPrivateContentEnabled(): boolean {
19
+ const pageBuilderConfig = getConfig();
20
+ return pageBuilderConfig?.privateContent === true;
21
+ },
22
+ async activateUser(token: string): Promise<void> {
23
+ try {
24
+ const jwtService = strapi.plugin('users-permissions').service('jwt');
25
+ const decodedToken = await jwtService.verify(token);
26
+
27
+ if (decodedToken) {
28
+ const user = await strapi.query('plugin::users-permissions.user').findOne({
29
+ where: {
30
+ id: decodedToken.userId,
31
+ platform: {
32
+ id: decodedToken.platformId
33
+ }
34
+ },
35
+ populate: {
36
+ platform: true
37
+ }
38
+ });
39
+
40
+ if (user?.confirmed === false && user?.confirmationToken != null && user?.confirmationToken === token) {
41
+ await strapi.entityService.update('plugin::users-permissions.user', user.id, {
42
+ // @ts-ignore
43
+ data: { confirmed: true, confirmationToken: null }
44
+ });
45
+ await strapi.service('plugin::page-builder.email').sendAdminMail(user);
46
+ return user;
47
+ } else {
48
+ throw new Error("Error activating user. User doesn't exist or is already activated.");
49
+ }
50
+ }
51
+ } catch (error) {
52
+ console.error(error);
53
+ throw error;
54
+ }
55
+ },
56
+ async removeInactiveUsers() {
57
+ const oneDayAgo = new Date();
58
+ oneDayAgo.setHours(oneDayAgo.getHours() - 24);
59
+
60
+ const usersToDelete = await (
61
+ await strapi.query('plugin::users-permissions.user').findMany({
62
+ where: {
63
+ $and: [
64
+ {
65
+ confirmed: {
66
+ $eq: false
67
+ }
68
+ },
69
+ {
70
+ createdAt: {
71
+ $lt: oneDayAgo
72
+ }
73
+ }
74
+ ]
75
+ }
76
+ })
77
+ ).map((user) => {
78
+ return user.id;
79
+ });
80
+
81
+ try {
82
+ await strapi.query('plugin::users-permissions.user').deleteMany({
83
+ where: {
84
+ id: {
85
+ $in: usersToDelete
86
+ }
87
+ }
88
+ });
89
+ } catch (error) {
90
+ console.log(error);
91
+ }
92
+ }
93
+ };
@@ -0,0 +1,6 @@
1
+ import Handlebars from 'handlebars';
2
+
3
+ export const txtEmail = (text: string, variables?: Record<string, string>) => {
4
+ const template = Handlebars.compile(text);
5
+ return template(variables);
6
+ };
@@ -0,0 +1,14 @@
1
+ import { PAGE_UID } from '../../../shared/utils/constants';
2
+
3
+ export const extendPage = () => {
4
+ const pageContentType = strapi.contentType(PAGE_UID);
5
+ pageContentType.attributes = {
6
+ ...pageContentType.attributes,
7
+ isPrivate: {
8
+ type: 'boolean',
9
+ required: false,
10
+ default: false
11
+ }
12
+ };
13
+ delete pageContentType.attributes.username;
14
+ };
@@ -0,0 +1,14 @@
1
+ import { PLATFORM_UID } from '../../../shared/utils/constants';
2
+
3
+ export const extendPlatform = () => {
4
+ const platformContentType = strapi.contentType(PLATFORM_UID);
5
+ platformContentType.attributes = {
6
+ ...platformContentType.attributes,
7
+ isPrivate: {
8
+ type: 'boolean',
9
+ required: false,
10
+ default: false
11
+ }
12
+ };
13
+ delete platformContentType.attributes.username;
14
+ };
@@ -0,0 +1,28 @@
1
+ import { validateYupSchema, yup } from '@strapi/utils';
2
+
3
+ const registerSchema = yup.object({
4
+ email: yup.string().email().required(),
5
+ password: yup.string().required(),
6
+ domain: yup.string().required()
7
+ });
8
+
9
+ export const loginSchema = yup.object({
10
+ email: yup.string().email().required(),
11
+ password: yup.string().required(),
12
+ domain: yup.string().required()
13
+ });
14
+
15
+ export const forgotPasswordSchema = yup.object({
16
+ email: yup.string().email().required(),
17
+ domain: yup.string().required()
18
+ });
19
+
20
+ export const resetPasswordSchema = yup.object({
21
+ password: yup.string().required(),
22
+ resetPasswordToken: yup.string().required()
23
+ });
24
+
25
+ export const validateRegisterSchema = async (input: any) => validateYupSchema(input, registerSchema);
26
+ export const validateLoginSchema = async (input: any) => validateYupSchema(input, loginSchema);
27
+ export const validateForgotPasswordSchema = async (input: any) => validateYupSchema(input, forgotPasswordSchema);
28
+ export const validateResetPasswordSchema = async (input: any) => validateYupSchema(input, resetPasswordSchema);