aaspai-authx 0.1.1 → 0.1.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -144,10 +144,14 @@ function buildSession(payload) {
144
144
  roles: normalizedRoles,
145
145
  permissions
146
146
  };
147
+ if (payload?.firstName) session.firstName = payload.firstName;
148
+ if (payload?.lastName) session.lastName = payload.lastName;
147
149
  if (payload?.projectId) session.projectId = payload.projectId;
148
150
  if (payload?.orgId) session.orgId = payload.orgId;
149
151
  if (payload?.org_id) session.org_id = payload.org_id;
150
152
  if (payload?.authType) session.authType = payload.authType;
153
+ if (payload?.createdAt) session.createdAt = payload.createdAt;
154
+ if (payload?.metadata) session.metadata = payload.metadata;
151
155
  Object.keys(payload || {}).forEach((key) => {
152
156
  if (![
153
157
  "sub",
@@ -321,10 +325,14 @@ function requireAuth() {
321
325
  const session = buildSession({
322
326
  sub: user.id.toString(),
323
327
  email: user.email,
328
+ firstName: user.firstName,
329
+ lastName: user.lastName,
330
+ metadata: user.metadata || [],
324
331
  roles: user.roles || [],
325
332
  orgId: user.orgId,
326
333
  org_id: user.orgId,
327
- projectId: user.projectId
334
+ projectId: user.projectId,
335
+ createdAt: user.createdAt
328
336
  });
329
337
  session.authType = "api-key";
330
338
  session.projectId = readProjectId(req) || user.projectId || void 0;
@@ -421,7 +429,6 @@ var Invite = mongoose3.model("Invite", InviteSchema);
421
429
  // src/services/auth-admin.service.ts
422
430
  import bcrypt from "bcrypt";
423
431
  import jwt2 from "jsonwebtoken";
424
- import { v4 as uuid2 } from "uuid";
425
432
 
426
433
  // src/models/client.model.ts
427
434
  import mongoose4, { Schema as Schema2 } from "mongoose";
@@ -491,7 +498,7 @@ var AuthAdminService = class {
491
498
  async createUserInRealm(payload) {
492
499
  const hashedPassword = payload.credentials?.[0]?.value ? await bcrypt.hash(payload.credentials[0].value, 10) : void 0;
493
500
  const user = await OrgUser.create({
494
- id: uuid2(),
501
+ id: crypto.randomUUID(),
495
502
  email: payload.email,
496
503
  firstName: payload.firstName,
497
504
  lastName: payload.lastName,
@@ -1217,6 +1224,11 @@ function generateTokens(user) {
1217
1224
  orgId: user.orgId || null,
1218
1225
  org_id: user.orgId || null,
1219
1226
  projectId: user.projectId || null,
1227
+ firstName: user.firstName,
1228
+ lastName: user.lastName,
1229
+ emailVerified: user.emailVerified,
1230
+ createdAt: user.createdAt,
1231
+ metadata: user.metadata,
1220
1232
  type: "user"
1221
1233
  };
1222
1234
  const accessToken = jwt4.sign(accessPayload, process.env.JWT_SECRET, {