aaspai-authx 0.1.1 → 0.1.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -182,10 +182,14 @@ function buildSession(payload) {
182
182
  roles: normalizedRoles,
183
183
  permissions
184
184
  };
185
+ if (payload?.firstName) session.firstName = payload.firstName;
186
+ if (payload?.lastName) session.lastName = payload.lastName;
185
187
  if (payload?.projectId) session.projectId = payload.projectId;
186
188
  if (payload?.orgId) session.orgId = payload.orgId;
187
189
  if (payload?.org_id) session.org_id = payload.org_id;
188
190
  if (payload?.authType) session.authType = payload.authType;
191
+ if (payload?.createdAt) session.createdAt = payload.createdAt;
192
+ if (payload?.metadata) session.metadata = payload.metadata;
189
193
  Object.keys(payload || {}).forEach((key) => {
190
194
  if (![
191
195
  "sub",
@@ -359,10 +363,14 @@ function requireAuth() {
359
363
  const session = buildSession({
360
364
  sub: user.id.toString(),
361
365
  email: user.email,
366
+ firstName: user.firstName,
367
+ lastName: user.lastName,
368
+ metadata: user.metadata || [],
362
369
  roles: user.roles || [],
363
370
  orgId: user.orgId,
364
371
  org_id: user.orgId,
365
- projectId: user.projectId
372
+ projectId: user.projectId,
373
+ createdAt: user.createdAt
366
374
  });
367
375
  session.authType = "api-key";
368
376
  session.projectId = readProjectId(req) || user.projectId || void 0;
@@ -459,7 +467,6 @@ var Invite = import_mongoose3.default.model("Invite", InviteSchema);
459
467
  // src/services/auth-admin.service.ts
460
468
  var import_bcrypt = __toESM(require("bcrypt"), 1);
461
469
  var import_jsonwebtoken2 = __toESM(require("jsonwebtoken"), 1);
462
- var import_uuid2 = require("uuid");
463
470
 
464
471
  // src/models/client.model.ts
465
472
  var import_mongoose4 = __toESM(require("mongoose"), 1);
@@ -529,7 +536,7 @@ var AuthAdminService = class {
529
536
  async createUserInRealm(payload) {
530
537
  const hashedPassword = payload.credentials?.[0]?.value ? await import_bcrypt.default.hash(payload.credentials[0].value, 10) : void 0;
531
538
  const user = await OrgUser.create({
532
- id: (0, import_uuid2.v4)(),
539
+ id: crypto.randomUUID(),
533
540
  email: payload.email,
534
541
  firstName: payload.firstName,
535
542
  lastName: payload.lastName,
@@ -1255,6 +1262,11 @@ function generateTokens(user) {
1255
1262
  orgId: user.orgId || null,
1256
1263
  org_id: user.orgId || null,
1257
1264
  projectId: user.projectId || null,
1265
+ firstName: user.firstName,
1266
+ lastName: user.lastName,
1267
+ emailVerified: user.emailVerified,
1268
+ createdAt: user.createdAt,
1269
+ metadata: user.metadata,
1258
1270
  type: "user"
1259
1271
  };
1260
1272
  const accessToken = import_jsonwebtoken4.default.sign(accessPayload, process.env.JWT_SECRET, {