aaspai-authx 0.1.1 → 0.1.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -178,10 +178,14 @@ function buildSession(payload) {
178
178
  roles: normalizedRoles,
179
179
  permissions
180
180
  };
181
+ if (payload?.firstName) session.firstName = payload.firstName;
182
+ if (payload?.lastName) session.lastName = payload.lastName;
181
183
  if (payload?.projectId) session.projectId = payload.projectId;
182
184
  if (payload?.orgId) session.orgId = payload.orgId;
183
185
  if (payload?.org_id) session.org_id = payload.org_id;
184
186
  if (payload?.authType) session.authType = payload.authType;
187
+ if (payload?.createdAt) session.createdAt = payload.createdAt;
188
+ if (payload?.metadata) session.metadata = payload.metadata;
185
189
  Object.keys(payload || {}).forEach((key) => {
186
190
  if (![
187
191
  "sub",
@@ -355,10 +359,14 @@ function requireAuth() {
355
359
  const session = buildSession({
356
360
  sub: user.id.toString(),
357
361
  email: user.email,
362
+ firstName: user.firstName,
363
+ lastName: user.lastName,
364
+ metadata: user.metadata || [],
358
365
  roles: user.roles || [],
359
366
  orgId: user.orgId,
360
367
  org_id: user.orgId,
361
- projectId: user.projectId
368
+ projectId: user.projectId,
369
+ createdAt: user.createdAt
362
370
  });
363
371
  session.authType = "api-key";
364
372
  session.projectId = readProjectId(req) || user.projectId || void 0;
@@ -455,7 +463,6 @@ var Invite = import_mongoose3.default.model("Invite", InviteSchema);
455
463
  // src/services/auth-admin.service.ts
456
464
  var import_bcrypt = __toESM(require("bcrypt"), 1);
457
465
  var import_jsonwebtoken2 = __toESM(require("jsonwebtoken"), 1);
458
- var import_uuid2 = require("uuid");
459
466
 
460
467
  // src/models/client.model.ts
461
468
  var import_mongoose4 = __toESM(require("mongoose"), 1);
@@ -525,7 +532,7 @@ var AuthAdminService = class {
525
532
  async createUserInRealm(payload) {
526
533
  const hashedPassword = payload.credentials?.[0]?.value ? await import_bcrypt.default.hash(payload.credentials[0].value, 10) : void 0;
527
534
  const user = await OrgUser.create({
528
- id: (0, import_uuid2.v4)(),
535
+ id: crypto.randomUUID(),
529
536
  email: payload.email,
530
537
  firstName: payload.firstName,
531
538
  lastName: payload.lastName,
@@ -1251,6 +1258,11 @@ function generateTokens(user) {
1251
1258
  orgId: user.orgId || null,
1252
1259
  org_id: user.orgId || null,
1253
1260
  projectId: user.projectId || null,
1261
+ firstName: user.firstName,
1262
+ lastName: user.lastName,
1263
+ emailVerified: user.emailVerified,
1264
+ createdAt: user.createdAt,
1265
+ metadata: user.metadata,
1254
1266
  type: "user"
1255
1267
  };
1256
1268
  const accessToken = import_jsonwebtoken4.default.sign(accessPayload, process.env.JWT_SECRET, {