alepha 0.12.1 → 0.13.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/api-jobs/index.d.ts +26 -26
- package/dist/api-notifications/index.d.ts +111 -111
- package/dist/api-users/index.d.cts +1221 -1221
- package/dist/api-users/index.d.ts +1239 -1239
- package/dist/api-verifications/index.d.ts +94 -94
- package/dist/redis/index.d.ts +10 -10
- package/dist/security/index.d.cts +32 -32
- package/dist/security/index.d.ts +28 -28
- package/dist/server-auth/index.d.cts +193 -193
- package/dist/server-auth/index.d.ts +193 -193
- package/dist/server-links/index.d.cts +34 -34
- package/dist/server-links/index.d.ts +34 -34
- package/dist/websocket/index.d.cts +7 -7
- package/package.json +1 -1
|
@@ -1,9 +1,9 @@
|
|
|
1
|
-
import * as
|
|
1
|
+
import * as alepha254 from "alepha";
|
|
2
2
|
import { Alepha, Async, Descriptor, KIND, Static, TSchema } from "alepha";
|
|
3
3
|
import * as alepha_server6 from "alepha/server";
|
|
4
4
|
import { ActionDescriptor, ClientRequestEntry, ClientRequestOptions, ClientRequestResponse, FetchOptions, FetchResponse, HttpClient, RequestConfigSchema, ServerHandler, ServerRequest, ServerRequestConfigEntry, ServerResponseBody, ServerRouterProvider, ServerTimingProvider } from "alepha/server";
|
|
5
5
|
import { DateTimeProvider, DurationLike } from "alepha/datetime";
|
|
6
|
-
import * as
|
|
6
|
+
import * as alepha_logger0 from "alepha/logger";
|
|
7
7
|
import { AccessTokenResponse, JwtProvider, RealmDescriptor, SecurityProvider, ServiceAccountDescriptor, UserAccount, UserAccountToken } from "alepha/security";
|
|
8
8
|
import * as alepha_retry0 from "alepha/retry";
|
|
9
9
|
import { Configuration } from "openid-client";
|
|
@@ -18,7 +18,7 @@ declare class CookieParser {
|
|
|
18
18
|
//#region src/server-cookies/providers/ServerCookiesProvider.d.ts
|
|
19
19
|
declare class ServerCookiesProvider {
|
|
20
20
|
protected readonly alepha: Alepha;
|
|
21
|
-
protected readonly log:
|
|
21
|
+
protected readonly log: alepha_logger0.Logger;
|
|
22
22
|
protected readonly cookieParser: CookieParser;
|
|
23
23
|
protected readonly dateTimeProvider: DateTimeProvider;
|
|
24
24
|
protected readonly env: {
|
|
@@ -28,9 +28,9 @@ declare class ServerCookiesProvider {
|
|
|
28
28
|
protected readonly IV_LENGTH = 16;
|
|
29
29
|
protected readonly AUTH_TAG_LENGTH = 16;
|
|
30
30
|
protected readonly SIGNATURE_LENGTH = 32;
|
|
31
|
-
readonly onRequest:
|
|
32
|
-
readonly onAction:
|
|
33
|
-
readonly onSend:
|
|
31
|
+
readonly onRequest: alepha254.HookDescriptor<"server:onRequest">;
|
|
32
|
+
readonly onAction: alepha254.HookDescriptor<"action:onRequest">;
|
|
33
|
+
readonly onSend: alepha254.HookDescriptor<"server:onSend">;
|
|
34
34
|
protected getCookiesFromContext(cookies?: Cookies): Cookies;
|
|
35
35
|
getCookie<T extends TSchema>(name: string, options: CookieDescriptorOptions<T>, contextCookies?: Cookies): Static<T> | undefined;
|
|
36
36
|
setCookie<T extends TSchema>(name: string, options: CookieDescriptorOptions<T>, data: Static<T>, contextCookies?: Cookies): void;
|
|
@@ -176,23 +176,23 @@ declare module "alepha/server" {
|
|
|
176
176
|
*/
|
|
177
177
|
//#endregion
|
|
178
178
|
//#region src/server-links/schemas/apiLinksResponseSchema.d.ts
|
|
179
|
-
declare const apiLinkSchema:
|
|
180
|
-
name:
|
|
181
|
-
group:
|
|
182
|
-
path:
|
|
183
|
-
method:
|
|
184
|
-
requestBodyType:
|
|
185
|
-
service:
|
|
179
|
+
declare const apiLinkSchema: alepha254.TObject<{
|
|
180
|
+
name: alepha254.TString;
|
|
181
|
+
group: alepha254.TOptional<alepha254.TString>;
|
|
182
|
+
path: alepha254.TString;
|
|
183
|
+
method: alepha254.TOptional<alepha254.TString>;
|
|
184
|
+
requestBodyType: alepha254.TOptional<alepha254.TString>;
|
|
185
|
+
service: alepha254.TOptional<alepha254.TString>;
|
|
186
186
|
}>;
|
|
187
|
-
declare const apiLinksResponseSchema:
|
|
188
|
-
prefix:
|
|
189
|
-
links:
|
|
190
|
-
name:
|
|
191
|
-
group:
|
|
192
|
-
path:
|
|
193
|
-
method:
|
|
194
|
-
requestBodyType:
|
|
195
|
-
service:
|
|
187
|
+
declare const apiLinksResponseSchema: alepha254.TObject<{
|
|
188
|
+
prefix: alepha254.TOptional<alepha254.TString>;
|
|
189
|
+
links: alepha254.TArray<alepha254.TObject<{
|
|
190
|
+
name: alepha254.TString;
|
|
191
|
+
group: alepha254.TOptional<alepha254.TString>;
|
|
192
|
+
path: alepha254.TString;
|
|
193
|
+
method: alepha254.TOptional<alepha254.TString>;
|
|
194
|
+
requestBodyType: alepha254.TOptional<alepha254.TString>;
|
|
195
|
+
service: alepha254.TOptional<alepha254.TString>;
|
|
196
196
|
}>>;
|
|
197
197
|
}>;
|
|
198
198
|
type ApiLinksResponse = Static<typeof apiLinksResponseSchema>;
|
|
@@ -207,7 +207,7 @@ declare class LinkProvider {
|
|
|
207
207
|
apiLinks: string;
|
|
208
208
|
apiSchema: string;
|
|
209
209
|
};
|
|
210
|
-
protected readonly log:
|
|
210
|
+
protected readonly log: alepha_logger0.Logger;
|
|
211
211
|
protected readonly alepha: Alepha;
|
|
212
212
|
protected readonly httpClient: HttpClient;
|
|
213
213
|
protected serverLinks: Array<HttpClientLink>;
|
|
@@ -385,10 +385,10 @@ type ProxyDescriptorOptions = {
|
|
|
385
385
|
//#endregion
|
|
386
386
|
//#region src/server-proxy/providers/ServerProxyProvider.d.ts
|
|
387
387
|
declare class ServerProxyProvider {
|
|
388
|
-
protected readonly log:
|
|
388
|
+
protected readonly log: alepha_logger0.Logger;
|
|
389
389
|
protected readonly routerProvider: ServerRouterProvider;
|
|
390
390
|
protected readonly alepha: Alepha;
|
|
391
|
-
protected readonly configure:
|
|
391
|
+
protected readonly configure: alepha254.HookDescriptor<"configure">;
|
|
392
392
|
createProxy(options: ProxyDescriptorOptions): void;
|
|
393
393
|
createProxyHandler(target: string, options: Omit<ProxyDescriptorOptions, "path">): ServerHandler;
|
|
394
394
|
private getRawRequestBody;
|
|
@@ -452,10 +452,10 @@ declare class RemoteDescriptorProvider {
|
|
|
452
452
|
protected readonly proxyProvider: ServerProxyProvider;
|
|
453
453
|
protected readonly linkProvider: LinkProvider;
|
|
454
454
|
protected readonly remotes: Array<ServerRemote>;
|
|
455
|
-
protected readonly log:
|
|
455
|
+
protected readonly log: alepha_logger0.Logger;
|
|
456
456
|
getRemotes(): ServerRemote[];
|
|
457
|
-
readonly configure:
|
|
458
|
-
readonly start:
|
|
457
|
+
readonly configure: alepha254.HookDescriptor<"configure">;
|
|
458
|
+
readonly start: alepha254.HookDescriptor<"start">;
|
|
459
459
|
registerRemote(value: RemoteDescriptor): Promise<void>;
|
|
460
460
|
protected readonly fetchLinks: alepha_retry0.RetryDescriptorFn<(opts: FetchLinksOptions) => Promise<ApiLinksResponse>>;
|
|
461
461
|
}
|
|
@@ -523,22 +523,22 @@ declare class ServerLinksProvider {
|
|
|
523
523
|
protected readonly remoteProvider: RemoteDescriptorProvider;
|
|
524
524
|
protected readonly serverTimingProvider: ServerTimingProvider;
|
|
525
525
|
get prefix(): string;
|
|
526
|
-
readonly onRoute:
|
|
526
|
+
readonly onRoute: alepha254.HookDescriptor<"configure">;
|
|
527
527
|
/**
|
|
528
528
|
* First API - Get all API links for the user.
|
|
529
529
|
*
|
|
530
530
|
* This is based on the user's permissions.
|
|
531
531
|
*/
|
|
532
532
|
readonly links: alepha_server6.RouteDescriptor<{
|
|
533
|
-
response:
|
|
534
|
-
prefix:
|
|
535
|
-
links:
|
|
536
|
-
name:
|
|
537
|
-
group:
|
|
538
|
-
path:
|
|
539
|
-
method:
|
|
540
|
-
requestBodyType:
|
|
541
|
-
service:
|
|
533
|
+
response: alepha254.TObject<{
|
|
534
|
+
prefix: alepha254.TOptional<alepha254.TString>;
|
|
535
|
+
links: alepha254.TArray<alepha254.TObject<{
|
|
536
|
+
name: alepha254.TString;
|
|
537
|
+
group: alepha254.TOptional<alepha254.TString>;
|
|
538
|
+
path: alepha254.TString;
|
|
539
|
+
method: alepha254.TOptional<alepha254.TString>;
|
|
540
|
+
requestBodyType: alepha254.TOptional<alepha254.TString>;
|
|
541
|
+
service: alepha254.TOptional<alepha254.TString>;
|
|
542
542
|
}>>;
|
|
543
543
|
}>;
|
|
544
544
|
}>;
|
|
@@ -549,10 +549,10 @@ declare class ServerLinksProvider {
|
|
|
549
549
|
* I mean for 150+ links, you got 50ms of serialization time.
|
|
550
550
|
*/
|
|
551
551
|
readonly schema: alepha_server6.RouteDescriptor<{
|
|
552
|
-
params:
|
|
553
|
-
name:
|
|
552
|
+
params: alepha254.TObject<{
|
|
553
|
+
name: alepha254.TString;
|
|
554
554
|
}>;
|
|
555
|
-
response:
|
|
555
|
+
response: alepha254.TRecord<string, alepha254.TAny>;
|
|
556
556
|
}>;
|
|
557
557
|
getSchemaByName(name: string, options?: GetApiLinksOptions): Promise<RequestConfigSchema>;
|
|
558
558
|
/**
|
|
@@ -591,61 +591,61 @@ declare module "alepha" {
|
|
|
591
591
|
*/
|
|
592
592
|
//#endregion
|
|
593
593
|
//#region src/server-auth/schemas/authenticationProviderSchema.d.ts
|
|
594
|
-
declare const authenticationProviderSchema:
|
|
595
|
-
name:
|
|
596
|
-
type:
|
|
594
|
+
declare const authenticationProviderSchema: alepha254.TObject<{
|
|
595
|
+
name: alepha254.TString;
|
|
596
|
+
type: alepha254.TUnsafe<"OAUTH2" | "OIDC" | "CREDENTIALS">;
|
|
597
597
|
}>;
|
|
598
598
|
type AuthenticationProvider = Static<typeof authenticationProviderSchema>;
|
|
599
599
|
//#endregion
|
|
600
600
|
//#region src/server-auth/schemas/tokensSchema.d.ts
|
|
601
|
-
declare const tokensSchema:
|
|
602
|
-
provider:
|
|
603
|
-
access_token:
|
|
604
|
-
issued_at:
|
|
605
|
-
expires_in:
|
|
606
|
-
refresh_token:
|
|
607
|
-
refresh_token_expires_in:
|
|
608
|
-
refresh_expires_in:
|
|
609
|
-
id_token:
|
|
610
|
-
scope:
|
|
601
|
+
declare const tokensSchema: alepha254.TObject<{
|
|
602
|
+
provider: alepha254.TString;
|
|
603
|
+
access_token: alepha254.TString;
|
|
604
|
+
issued_at: alepha254.TNumber;
|
|
605
|
+
expires_in: alepha254.TOptional<alepha254.TNumber>;
|
|
606
|
+
refresh_token: alepha254.TOptional<alepha254.TString>;
|
|
607
|
+
refresh_token_expires_in: alepha254.TOptional<alepha254.TNumber>;
|
|
608
|
+
refresh_expires_in: alepha254.TOptional<alepha254.TNumber>;
|
|
609
|
+
id_token: alepha254.TOptional<alepha254.TString>;
|
|
610
|
+
scope: alepha254.TOptional<alepha254.TString>;
|
|
611
611
|
}>;
|
|
612
612
|
type Tokens = Static<typeof tokensSchema>;
|
|
613
613
|
//#endregion
|
|
614
614
|
//#region src/server-auth/providers/ServerAuthProvider.d.ts
|
|
615
615
|
declare class ServerAuthProvider {
|
|
616
|
-
protected readonly log:
|
|
616
|
+
protected readonly log: alepha_logger0.Logger;
|
|
617
617
|
protected readonly alepha: Alepha;
|
|
618
618
|
protected readonly serverCookiesProvider: ServerCookiesProvider;
|
|
619
619
|
protected readonly dateTimeProvider: DateTimeProvider;
|
|
620
620
|
protected readonly serverLinksProvider: ServerLinksProvider;
|
|
621
|
-
protected readonly authorizationCode: AbstractCookieDescriptor<
|
|
622
|
-
provider:
|
|
623
|
-
codeVerifier:
|
|
624
|
-
redirectUri:
|
|
625
|
-
state:
|
|
626
|
-
nonce:
|
|
621
|
+
protected readonly authorizationCode: AbstractCookieDescriptor<alepha254.TObject<{
|
|
622
|
+
provider: alepha254.TString;
|
|
623
|
+
codeVerifier: alepha254.TOptional<alepha254.TString>;
|
|
624
|
+
redirectUri: alepha254.TOptional<alepha254.TString>;
|
|
625
|
+
state: alepha254.TOptional<alepha254.TString>;
|
|
626
|
+
nonce: alepha254.TOptional<alepha254.TString>;
|
|
627
627
|
}>>;
|
|
628
|
-
readonly tokens: AbstractCookieDescriptor<
|
|
629
|
-
provider:
|
|
630
|
-
access_token:
|
|
631
|
-
issued_at:
|
|
632
|
-
expires_in:
|
|
633
|
-
refresh_token:
|
|
634
|
-
refresh_token_expires_in:
|
|
635
|
-
refresh_expires_in:
|
|
636
|
-
id_token:
|
|
637
|
-
scope:
|
|
628
|
+
readonly tokens: AbstractCookieDescriptor<alepha254.TObject<{
|
|
629
|
+
provider: alepha254.TString;
|
|
630
|
+
access_token: alepha254.TString;
|
|
631
|
+
issued_at: alepha254.TNumber;
|
|
632
|
+
expires_in: alepha254.TOptional<alepha254.TNumber>;
|
|
633
|
+
refresh_token: alepha254.TOptional<alepha254.TString>;
|
|
634
|
+
refresh_token_expires_in: alepha254.TOptional<alepha254.TNumber>;
|
|
635
|
+
refresh_expires_in: alepha254.TOptional<alepha254.TNumber>;
|
|
636
|
+
id_token: alepha254.TOptional<alepha254.TString>;
|
|
637
|
+
scope: alepha254.TOptional<alepha254.TString>;
|
|
638
638
|
}>>;
|
|
639
639
|
get identities(): Array<AuthDescriptor>;
|
|
640
640
|
getAuthenticationProviders(filters?: {
|
|
641
641
|
realmName?: string;
|
|
642
642
|
}): AuthenticationProvider[];
|
|
643
|
-
protected readonly configure:
|
|
643
|
+
protected readonly configure: alepha254.HookDescriptor<"configure">;
|
|
644
644
|
protected getAccessTokens(tokens: Tokens): string | undefined;
|
|
645
645
|
/**
|
|
646
646
|
* Fill request headers with access token from cookies or fallback to provider's fallback function.
|
|
647
647
|
*/
|
|
648
|
-
protected readonly onRequest:
|
|
648
|
+
protected readonly onRequest: alepha254.HookDescriptor<"server:onRequest">;
|
|
649
649
|
/**
|
|
650
650
|
* Convert cookies to tokens.
|
|
651
651
|
* If the tokens are expired, try to refresh them using the refresh token.
|
|
@@ -656,26 +656,26 @@ declare class ServerAuthProvider {
|
|
|
656
656
|
* Get user information.
|
|
657
657
|
*/
|
|
658
658
|
readonly userinfo: alepha_server6.RouteDescriptor<{
|
|
659
|
-
response:
|
|
660
|
-
user:
|
|
661
|
-
id:
|
|
662
|
-
name:
|
|
663
|
-
email:
|
|
664
|
-
username:
|
|
665
|
-
picture:
|
|
666
|
-
sessionId:
|
|
667
|
-
organizations:
|
|
668
|
-
roles:
|
|
659
|
+
response: alepha254.TObject<{
|
|
660
|
+
user: alepha254.TOptional<alepha254.TObject<{
|
|
661
|
+
id: alepha254.TString;
|
|
662
|
+
name: alepha254.TOptional<alepha254.TString>;
|
|
663
|
+
email: alepha254.TOptional<alepha254.TString>;
|
|
664
|
+
username: alepha254.TOptional<alepha254.TString>;
|
|
665
|
+
picture: alepha254.TOptional<alepha254.TString>;
|
|
666
|
+
sessionId: alepha254.TOptional<alepha254.TString>;
|
|
667
|
+
organizations: alepha254.TOptional<alepha254.TArray<alepha254.TString>>;
|
|
668
|
+
roles: alepha254.TOptional<alepha254.TArray<alepha254.TString>>;
|
|
669
669
|
}>>;
|
|
670
|
-
api:
|
|
671
|
-
prefix:
|
|
672
|
-
links:
|
|
673
|
-
name:
|
|
674
|
-
group:
|
|
675
|
-
path:
|
|
676
|
-
method:
|
|
677
|
-
requestBodyType:
|
|
678
|
-
service:
|
|
670
|
+
api: alepha254.TObject<{
|
|
671
|
+
prefix: alepha254.TOptional<alepha254.TString>;
|
|
672
|
+
links: alepha254.TArray<alepha254.TObject<{
|
|
673
|
+
name: alepha254.TString;
|
|
674
|
+
group: alepha254.TOptional<alepha254.TString>;
|
|
675
|
+
path: alepha254.TString;
|
|
676
|
+
method: alepha254.TOptional<alepha254.TString>;
|
|
677
|
+
requestBodyType: alepha254.TOptional<alepha254.TString>;
|
|
678
|
+
service: alepha254.TOptional<alepha254.TString>;
|
|
679
679
|
}>>;
|
|
680
680
|
}>;
|
|
681
681
|
}>;
|
|
@@ -684,65 +684,65 @@ declare class ServerAuthProvider {
|
|
|
684
684
|
* Refresh a token for internal providers.
|
|
685
685
|
*/
|
|
686
686
|
readonly refresh: alepha_server6.RouteDescriptor<{
|
|
687
|
-
query:
|
|
688
|
-
provider:
|
|
687
|
+
query: alepha254.TObject<{
|
|
688
|
+
provider: alepha254.TString;
|
|
689
689
|
}>;
|
|
690
|
-
body:
|
|
691
|
-
refresh_token:
|
|
692
|
-
access_token:
|
|
690
|
+
body: alepha254.TObject<{
|
|
691
|
+
refresh_token: alepha254.TString;
|
|
692
|
+
access_token: alepha254.TOptional<alepha254.TString>;
|
|
693
693
|
}>;
|
|
694
|
-
response:
|
|
695
|
-
provider:
|
|
696
|
-
access_token:
|
|
697
|
-
issued_at:
|
|
698
|
-
expires_in:
|
|
699
|
-
refresh_token:
|
|
700
|
-
refresh_token_expires_in:
|
|
701
|
-
refresh_expires_in:
|
|
702
|
-
id_token:
|
|
703
|
-
scope:
|
|
694
|
+
response: alepha254.TObject<{
|
|
695
|
+
provider: alepha254.TString;
|
|
696
|
+
access_token: alepha254.TString;
|
|
697
|
+
issued_at: alepha254.TNumber;
|
|
698
|
+
expires_in: alepha254.TOptional<alepha254.TNumber>;
|
|
699
|
+
refresh_token: alepha254.TOptional<alepha254.TString>;
|
|
700
|
+
refresh_token_expires_in: alepha254.TOptional<alepha254.TNumber>;
|
|
701
|
+
refresh_expires_in: alepha254.TOptional<alepha254.TNumber>;
|
|
702
|
+
id_token: alepha254.TOptional<alepha254.TString>;
|
|
703
|
+
scope: alepha254.TOptional<alepha254.TString>;
|
|
704
704
|
}>;
|
|
705
705
|
}>;
|
|
706
706
|
/**
|
|
707
707
|
* Login for local password-based authentication.
|
|
708
708
|
*/
|
|
709
709
|
readonly token: alepha_server6.RouteDescriptor<{
|
|
710
|
-
query:
|
|
711
|
-
provider:
|
|
710
|
+
query: alepha254.TObject<{
|
|
711
|
+
provider: alepha254.TString;
|
|
712
712
|
}>;
|
|
713
|
-
body:
|
|
714
|
-
username:
|
|
715
|
-
password:
|
|
713
|
+
body: alepha254.TObject<{
|
|
714
|
+
username: alepha254.TString;
|
|
715
|
+
password: alepha254.TString;
|
|
716
716
|
}>;
|
|
717
|
-
response:
|
|
718
|
-
provider:
|
|
719
|
-
access_token:
|
|
720
|
-
issued_at:
|
|
721
|
-
expires_in:
|
|
722
|
-
refresh_token:
|
|
723
|
-
refresh_token_expires_in:
|
|
724
|
-
refresh_expires_in:
|
|
725
|
-
id_token:
|
|
726
|
-
scope:
|
|
727
|
-
user:
|
|
728
|
-
id:
|
|
729
|
-
name:
|
|
730
|
-
email:
|
|
731
|
-
username:
|
|
732
|
-
picture:
|
|
733
|
-
sessionId:
|
|
734
|
-
organizations:
|
|
735
|
-
roles:
|
|
717
|
+
response: alepha254.TObject<{
|
|
718
|
+
provider: alepha254.TString;
|
|
719
|
+
access_token: alepha254.TString;
|
|
720
|
+
issued_at: alepha254.TNumber;
|
|
721
|
+
expires_in: alepha254.TOptional<alepha254.TNumber>;
|
|
722
|
+
refresh_token: alepha254.TOptional<alepha254.TString>;
|
|
723
|
+
refresh_token_expires_in: alepha254.TOptional<alepha254.TNumber>;
|
|
724
|
+
refresh_expires_in: alepha254.TOptional<alepha254.TNumber>;
|
|
725
|
+
id_token: alepha254.TOptional<alepha254.TString>;
|
|
726
|
+
scope: alepha254.TOptional<alepha254.TString>;
|
|
727
|
+
user: alepha254.TObject<{
|
|
728
|
+
id: alepha254.TString;
|
|
729
|
+
name: alepha254.TOptional<alepha254.TString>;
|
|
730
|
+
email: alepha254.TOptional<alepha254.TString>;
|
|
731
|
+
username: alepha254.TOptional<alepha254.TString>;
|
|
732
|
+
picture: alepha254.TOptional<alepha254.TString>;
|
|
733
|
+
sessionId: alepha254.TOptional<alepha254.TString>;
|
|
734
|
+
organizations: alepha254.TOptional<alepha254.TArray<alepha254.TString>>;
|
|
735
|
+
roles: alepha254.TOptional<alepha254.TArray<alepha254.TString>>;
|
|
736
736
|
}>;
|
|
737
|
-
api:
|
|
738
|
-
prefix:
|
|
739
|
-
links:
|
|
740
|
-
name:
|
|
741
|
-
group:
|
|
742
|
-
path:
|
|
743
|
-
method:
|
|
744
|
-
requestBodyType:
|
|
745
|
-
service:
|
|
737
|
+
api: alepha254.TObject<{
|
|
738
|
+
prefix: alepha254.TOptional<alepha254.TString>;
|
|
739
|
+
links: alepha254.TArray<alepha254.TObject<{
|
|
740
|
+
name: alepha254.TString;
|
|
741
|
+
group: alepha254.TOptional<alepha254.TString>;
|
|
742
|
+
path: alepha254.TString;
|
|
743
|
+
method: alepha254.TOptional<alepha254.TString>;
|
|
744
|
+
requestBodyType: alepha254.TOptional<alepha254.TString>;
|
|
745
|
+
service: alepha254.TOptional<alepha254.TString>;
|
|
746
746
|
}>>;
|
|
747
747
|
}>;
|
|
748
748
|
}>;
|
|
@@ -751,9 +751,9 @@ declare class ServerAuthProvider {
|
|
|
751
751
|
* Oauth2/OIDC login route.
|
|
752
752
|
*/
|
|
753
753
|
readonly login: alepha_server6.RouteDescriptor<{
|
|
754
|
-
query:
|
|
755
|
-
provider:
|
|
756
|
-
redirect_uri:
|
|
754
|
+
query: alepha254.TObject<{
|
|
755
|
+
provider: alepha254.TString;
|
|
756
|
+
redirect_uri: alepha254.TOptional<alepha254.TString>;
|
|
757
757
|
}>;
|
|
758
758
|
}>;
|
|
759
759
|
/**
|
|
@@ -765,8 +765,8 @@ declare class ServerAuthProvider {
|
|
|
765
765
|
* Logout route for OAuth2/OIDC providers.
|
|
766
766
|
*/
|
|
767
767
|
readonly logout: alepha_server6.RouteDescriptor<{
|
|
768
|
-
query:
|
|
769
|
-
post_logout_redirect_uri:
|
|
768
|
+
query: alepha254.TObject<{
|
|
769
|
+
post_logout_redirect_uri: alepha254.TOptional<alepha254.TString>;
|
|
770
770
|
}>;
|
|
771
771
|
}>;
|
|
772
772
|
protected provider(opts: string | {
|
|
@@ -1074,61 +1074,61 @@ declare const alephaServerAuthRoutes: {
|
|
|
1074
1074
|
};
|
|
1075
1075
|
//#endregion
|
|
1076
1076
|
//#region src/server-auth/schemas/tokenResponseSchema.d.ts
|
|
1077
|
-
declare const tokenResponseSchema:
|
|
1078
|
-
provider:
|
|
1079
|
-
access_token:
|
|
1080
|
-
issued_at:
|
|
1081
|
-
expires_in:
|
|
1082
|
-
refresh_token:
|
|
1083
|
-
refresh_token_expires_in:
|
|
1084
|
-
refresh_expires_in:
|
|
1085
|
-
id_token:
|
|
1086
|
-
scope:
|
|
1087
|
-
user:
|
|
1088
|
-
id:
|
|
1089
|
-
name:
|
|
1090
|
-
email:
|
|
1091
|
-
username:
|
|
1092
|
-
picture:
|
|
1093
|
-
sessionId:
|
|
1094
|
-
organizations:
|
|
1095
|
-
roles:
|
|
1077
|
+
declare const tokenResponseSchema: alepha254.TObject<{
|
|
1078
|
+
provider: alepha254.TString;
|
|
1079
|
+
access_token: alepha254.TString;
|
|
1080
|
+
issued_at: alepha254.TNumber;
|
|
1081
|
+
expires_in: alepha254.TOptional<alepha254.TNumber>;
|
|
1082
|
+
refresh_token: alepha254.TOptional<alepha254.TString>;
|
|
1083
|
+
refresh_token_expires_in: alepha254.TOptional<alepha254.TNumber>;
|
|
1084
|
+
refresh_expires_in: alepha254.TOptional<alepha254.TNumber>;
|
|
1085
|
+
id_token: alepha254.TOptional<alepha254.TString>;
|
|
1086
|
+
scope: alepha254.TOptional<alepha254.TString>;
|
|
1087
|
+
user: alepha254.TObject<{
|
|
1088
|
+
id: alepha254.TString;
|
|
1089
|
+
name: alepha254.TOptional<alepha254.TString>;
|
|
1090
|
+
email: alepha254.TOptional<alepha254.TString>;
|
|
1091
|
+
username: alepha254.TOptional<alepha254.TString>;
|
|
1092
|
+
picture: alepha254.TOptional<alepha254.TString>;
|
|
1093
|
+
sessionId: alepha254.TOptional<alepha254.TString>;
|
|
1094
|
+
organizations: alepha254.TOptional<alepha254.TArray<alepha254.TString>>;
|
|
1095
|
+
roles: alepha254.TOptional<alepha254.TArray<alepha254.TString>>;
|
|
1096
1096
|
}>;
|
|
1097
|
-
api:
|
|
1098
|
-
prefix:
|
|
1099
|
-
links:
|
|
1100
|
-
name:
|
|
1101
|
-
group:
|
|
1102
|
-
path:
|
|
1103
|
-
method:
|
|
1104
|
-
requestBodyType:
|
|
1105
|
-
service:
|
|
1097
|
+
api: alepha254.TObject<{
|
|
1098
|
+
prefix: alepha254.TOptional<alepha254.TString>;
|
|
1099
|
+
links: alepha254.TArray<alepha254.TObject<{
|
|
1100
|
+
name: alepha254.TString;
|
|
1101
|
+
group: alepha254.TOptional<alepha254.TString>;
|
|
1102
|
+
path: alepha254.TString;
|
|
1103
|
+
method: alepha254.TOptional<alepha254.TString>;
|
|
1104
|
+
requestBodyType: alepha254.TOptional<alepha254.TString>;
|
|
1105
|
+
service: alepha254.TOptional<alepha254.TString>;
|
|
1106
1106
|
}>>;
|
|
1107
1107
|
}>;
|
|
1108
1108
|
}>;
|
|
1109
1109
|
type TokenResponse = Static<typeof tokenResponseSchema>;
|
|
1110
1110
|
//#endregion
|
|
1111
1111
|
//#region src/server-auth/schemas/userinfoResponseSchema.d.ts
|
|
1112
|
-
declare const userinfoResponseSchema:
|
|
1113
|
-
user:
|
|
1114
|
-
id:
|
|
1115
|
-
name:
|
|
1116
|
-
email:
|
|
1117
|
-
username:
|
|
1118
|
-
picture:
|
|
1119
|
-
sessionId:
|
|
1120
|
-
organizations:
|
|
1121
|
-
roles:
|
|
1112
|
+
declare const userinfoResponseSchema: alepha254.TObject<{
|
|
1113
|
+
user: alepha254.TOptional<alepha254.TObject<{
|
|
1114
|
+
id: alepha254.TString;
|
|
1115
|
+
name: alepha254.TOptional<alepha254.TString>;
|
|
1116
|
+
email: alepha254.TOptional<alepha254.TString>;
|
|
1117
|
+
username: alepha254.TOptional<alepha254.TString>;
|
|
1118
|
+
picture: alepha254.TOptional<alepha254.TString>;
|
|
1119
|
+
sessionId: alepha254.TOptional<alepha254.TString>;
|
|
1120
|
+
organizations: alepha254.TOptional<alepha254.TArray<alepha254.TString>>;
|
|
1121
|
+
roles: alepha254.TOptional<alepha254.TArray<alepha254.TString>>;
|
|
1122
1122
|
}>>;
|
|
1123
|
-
api:
|
|
1124
|
-
prefix:
|
|
1125
|
-
links:
|
|
1126
|
-
name:
|
|
1127
|
-
group:
|
|
1128
|
-
path:
|
|
1129
|
-
method:
|
|
1130
|
-
requestBodyType:
|
|
1131
|
-
service:
|
|
1123
|
+
api: alepha254.TObject<{
|
|
1124
|
+
prefix: alepha254.TOptional<alepha254.TString>;
|
|
1125
|
+
links: alepha254.TArray<alepha254.TObject<{
|
|
1126
|
+
name: alepha254.TString;
|
|
1127
|
+
group: alepha254.TOptional<alepha254.TString>;
|
|
1128
|
+
path: alepha254.TString;
|
|
1129
|
+
method: alepha254.TOptional<alepha254.TString>;
|
|
1130
|
+
requestBodyType: alepha254.TOptional<alepha254.TString>;
|
|
1131
|
+
service: alepha254.TOptional<alepha254.TString>;
|
|
1132
1132
|
}>>;
|
|
1133
1133
|
}>;
|
|
1134
1134
|
}>;
|
|
@@ -1158,7 +1158,7 @@ declare module "alepha" {
|
|
|
1158
1158
|
* @see {@link ServerAuthProvider}
|
|
1159
1159
|
* @module alepha.server.auth
|
|
1160
1160
|
*/
|
|
1161
|
-
declare const AlephaServerAuth:
|
|
1161
|
+
declare const AlephaServerAuth: alepha254.Service<alepha254.Module>;
|
|
1162
1162
|
//#endregion
|
|
1163
1163
|
export { $auth, $authCredentials, $authGithub, $authGoogle, AccessToken, AlephaServerAuth, AuthDescriptor, AuthDescriptorOptions, AuthExternal, AuthInternal, AuthenticationProvider, Credentials, CredentialsFn, CredentialsOptions, LinkAccountFn, LinkAccountOptions, OAuth2Options, OAuth2Profile, OidcOptions, ServerAuthProvider, TokenResponse, Tokens, UserinfoResponse, WithLinkFn, WithLoginFn, alephaServerAuthRoutes, authenticationProviderSchema, tokenResponseSchema, tokensSchema, userinfoResponseSchema };
|
|
1164
1164
|
//# sourceMappingURL=index.d.ts.map
|