cca-auth-module 0.0.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +0 -0
- package/dist/application/dtos/LoginDTO.d.ts +7 -0
- package/dist/application/dtos/RegisterDTO.d.ts +8 -0
- package/dist/application/dtos/UserDTO.d.ts +8 -0
- package/dist/application/mappers/createUserMappings.d.ts +2 -0
- package/dist/application/mappers/utils/mapper.d.ts +1 -0
- package/dist/application/useCase/LoginUseCase.d.ts +20 -0
- package/dist/application/useCase/RefreshTokenUseCase.d.ts +15 -0
- package/dist/application/useCase/RegisterUseCase.d.ts +13 -0
- package/dist/application/validators/authValidation.d.ts +10 -0
- package/dist/domain/interfaces/IAuthService.d.ts +9 -0
- package/dist/domain/interfaces/IBaseContainerConfig.d.ts +9 -0
- package/dist/domain/interfaces/IConfigFinderOptions.d.ts +5 -0
- package/dist/domain/interfaces/IDecodedToken.d.ts +6 -0
- package/dist/domain/interfaces/IJwtAuth.d.ts +9 -0
- package/dist/domain/interfaces/IJwtConfig.d.ts +6 -0
- package/dist/domain/interfaces/IRefreshTokenRequest.d.ts +3 -0
- package/dist/domain/interfaces/IResponse.d.ts +4 -0
- package/dist/domain/interfaces/ITokenConfig.d.ts +6 -0
- package/dist/index.d.mts +118 -0
- package/dist/index.d.ts +118 -0
- package/dist/index.js +569 -0
- package/dist/index.js.map +1 -0
- package/dist/index.mjs +535 -0
- package/dist/index.mjs.map +1 -0
- package/dist/infrastructure/auth/JwtAuthService.d.ts +19 -0
- package/dist/infrastructure/container/createAuthContainer.d.ts +7 -0
- package/dist/infrastructure/repository/AuthRepository.d.ts +8 -0
- package/dist/metafile-cjs.json +1 -0
- package/dist/metafile-esm.json +1 -0
- package/dist/presentation/controller/AuthController.d.ts +15 -0
- package/dist/utils/ConfigFinder.d.ts +9 -0
- package/dist/utils/Errors.d.ts +21 -0
- package/package.json +38 -0
package/dist/index.js
ADDED
|
@@ -0,0 +1,569 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __create = Object.create;
|
|
3
|
+
var __defProp = Object.defineProperty;
|
|
4
|
+
var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
|
|
5
|
+
var __getOwnPropNames = Object.getOwnPropertyNames;
|
|
6
|
+
var __getProtoOf = Object.getPrototypeOf;
|
|
7
|
+
var __hasOwnProp = Object.prototype.hasOwnProperty;
|
|
8
|
+
var __name = (target, value) => __defProp(target, "name", { value, configurable: true });
|
|
9
|
+
var __export = (target, all) => {
|
|
10
|
+
for (var name in all)
|
|
11
|
+
__defProp(target, name, { get: all[name], enumerable: true });
|
|
12
|
+
};
|
|
13
|
+
var __copyProps = (to, from, except, desc) => {
|
|
14
|
+
if (from && typeof from === "object" || typeof from === "function") {
|
|
15
|
+
for (let key of __getOwnPropNames(from))
|
|
16
|
+
if (!__hasOwnProp.call(to, key) && key !== except)
|
|
17
|
+
__defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });
|
|
18
|
+
}
|
|
19
|
+
return to;
|
|
20
|
+
};
|
|
21
|
+
var __toESM = (mod, isNodeMode, target) => (target = mod != null ? __create(__getProtoOf(mod)) : {}, __copyProps(
|
|
22
|
+
// If the importer is in node compatibility mode or this is not an ESM
|
|
23
|
+
// file that has been converted to a CommonJS file using a Babel-
|
|
24
|
+
// compatible transform (i.e. "__esModule" has not been set), then set
|
|
25
|
+
// "default" to the CommonJS "module.exports" for node compatibility.
|
|
26
|
+
isNodeMode || !mod || !mod.__esModule ? __defProp(target, "default", { value: mod, enumerable: true }) : target,
|
|
27
|
+
mod
|
|
28
|
+
));
|
|
29
|
+
var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
|
|
30
|
+
var __decorateClass = (decorators, target, key, kind) => {
|
|
31
|
+
var result = kind > 1 ? void 0 : kind ? __getOwnPropDesc(target, key) : target;
|
|
32
|
+
for (var i = decorators.length - 1, decorator; i >= 0; i--)
|
|
33
|
+
if (decorator = decorators[i])
|
|
34
|
+
result = (kind ? decorator(target, key, result) : decorator(result)) || result;
|
|
35
|
+
if (kind && result) __defProp(target, key, result);
|
|
36
|
+
return result;
|
|
37
|
+
};
|
|
38
|
+
|
|
39
|
+
// src/index.ts
|
|
40
|
+
var index_exports = {};
|
|
41
|
+
__export(index_exports, {
|
|
42
|
+
createAuthContainer: () => createAuthContainer
|
|
43
|
+
});
|
|
44
|
+
module.exports = __toCommonJS(index_exports);
|
|
45
|
+
|
|
46
|
+
// src/infrastructure/container/createAuthContainer.ts
|
|
47
|
+
var import_cca_core7 = require("cca-core");
|
|
48
|
+
var import_cca_entities5 = require("cca-entities");
|
|
49
|
+
|
|
50
|
+
// src/application/useCase/LoginUseCase.ts
|
|
51
|
+
var import_cca_core2 = require("cca-core");
|
|
52
|
+
var import_cca_entities3 = require("cca-entities");
|
|
53
|
+
|
|
54
|
+
// src/application/dtos/UserDTO.ts
|
|
55
|
+
var import_classes = require("@automapper/classes");
|
|
56
|
+
var _UserDTO = class _UserDTO {
|
|
57
|
+
};
|
|
58
|
+
__name(_UserDTO, "UserDTO");
|
|
59
|
+
__decorateClass([
|
|
60
|
+
(0, import_classes.AutoMap)()
|
|
61
|
+
], _UserDTO.prototype, "id", 2);
|
|
62
|
+
__decorateClass([
|
|
63
|
+
(0, import_classes.AutoMap)()
|
|
64
|
+
], _UserDTO.prototype, "name", 2);
|
|
65
|
+
__decorateClass([
|
|
66
|
+
(0, import_classes.AutoMap)()
|
|
67
|
+
], _UserDTO.prototype, "email", 2);
|
|
68
|
+
__decorateClass([
|
|
69
|
+
(0, import_classes.AutoMap)()
|
|
70
|
+
], _UserDTO.prototype, "role", 2);
|
|
71
|
+
var UserDTO = _UserDTO;
|
|
72
|
+
|
|
73
|
+
// src/application/validators/authValidation.ts
|
|
74
|
+
var yup = __toESM(require("yup"));
|
|
75
|
+
var import_cca_entities = require("cca-entities");
|
|
76
|
+
var import_bcrypt = __toESM(require("bcrypt"));
|
|
77
|
+
|
|
78
|
+
// src/utils/Errors.ts
|
|
79
|
+
var _AppError = class _AppError extends Error {
|
|
80
|
+
constructor(message, statusCode = 500, name = "AppError") {
|
|
81
|
+
super(message);
|
|
82
|
+
this.message = message;
|
|
83
|
+
this.statusCode = statusCode;
|
|
84
|
+
this.name = name;
|
|
85
|
+
Object.setPrototypeOf(this, new.target.prototype);
|
|
86
|
+
Error.captureStackTrace(this);
|
|
87
|
+
}
|
|
88
|
+
};
|
|
89
|
+
__name(_AppError, "AppError");
|
|
90
|
+
var AppError = _AppError;
|
|
91
|
+
var _ValidationError = class _ValidationError extends AppError {
|
|
92
|
+
constructor(message) {
|
|
93
|
+
super(message, 400);
|
|
94
|
+
this.name = "ValidationError";
|
|
95
|
+
}
|
|
96
|
+
};
|
|
97
|
+
__name(_ValidationError, "ValidationError");
|
|
98
|
+
var ValidationError = _ValidationError;
|
|
99
|
+
var _NotFoundError = class _NotFoundError extends AppError {
|
|
100
|
+
constructor(message) {
|
|
101
|
+
super(message, 404, "UserNotFoundError");
|
|
102
|
+
}
|
|
103
|
+
};
|
|
104
|
+
__name(_NotFoundError, "NotFoundError");
|
|
105
|
+
var NotFoundError = _NotFoundError;
|
|
106
|
+
var _ForbiddenError = class _ForbiddenError extends AppError {
|
|
107
|
+
constructor(message = "Forbidden access") {
|
|
108
|
+
super(message, 403);
|
|
109
|
+
this.name = "ForbiddenError";
|
|
110
|
+
}
|
|
111
|
+
};
|
|
112
|
+
__name(_ForbiddenError, "ForbiddenError");
|
|
113
|
+
var ForbiddenError = _ForbiddenError;
|
|
114
|
+
var _UnauthorizedError = class _UnauthorizedError extends AppError {
|
|
115
|
+
constructor(message = "Unauthorized access") {
|
|
116
|
+
super(message, 401);
|
|
117
|
+
this.name = "UnauthorizedError";
|
|
118
|
+
}
|
|
119
|
+
};
|
|
120
|
+
__name(_UnauthorizedError, "UnauthorizedError");
|
|
121
|
+
var UnauthorizedError = _UnauthorizedError;
|
|
122
|
+
|
|
123
|
+
// src/application/validators/authValidation.ts
|
|
124
|
+
var import_cca_core = require("cca-core");
|
|
125
|
+
var schemas = {
|
|
126
|
+
id: yup.string().uuid("Invalid user ID format"),
|
|
127
|
+
email: yup.string().email("Invalid email format").max(255, "Email cannot exceed 255 characters"),
|
|
128
|
+
name: yup.string().required("Name is required").min(2, "Name must be at least 2 characters long").max(50, "Name cannot exceed 50 characters").matches(/^[a-zA-Z\s]+$/, "Name must only contain letters and spaces"),
|
|
129
|
+
password: yup.string().required("Password is required").min(8, "Password must be at least 8 characters long").max(100, "Password cannot exceed 100 characters").matches(
|
|
130
|
+
/^(?=.*[a-z])(?=.*[A-Z])(?=.*\d)(?=.*[@$!%*?&])[A-Za-z\d@$!%*?&]/,
|
|
131
|
+
"Password must contain at least one uppercase letter, one lowercase letter, one number, and one special character"
|
|
132
|
+
),
|
|
133
|
+
role: yup.string().required("Role is required").oneOf(Object.values(import_cca_entities.UserRole), "Invalid role specified")
|
|
134
|
+
};
|
|
135
|
+
var validateEmail = /* @__PURE__ */ __name(async (email, repository) => {
|
|
136
|
+
try {
|
|
137
|
+
await schemas.email.validate(email?.trim().toLowerCase());
|
|
138
|
+
const user = await repository.findByEmail(email);
|
|
139
|
+
if (!user) {
|
|
140
|
+
throw new NotFoundError(
|
|
141
|
+
"The email address or password is incorrect. Please retry"
|
|
142
|
+
);
|
|
143
|
+
}
|
|
144
|
+
return user;
|
|
145
|
+
} catch (error) {
|
|
146
|
+
throw new ValidationError(error.message || "Invalid email format");
|
|
147
|
+
}
|
|
148
|
+
}, "validateEmail");
|
|
149
|
+
var validatePassword = /* @__PURE__ */ __name(async (password) => {
|
|
150
|
+
if (password) {
|
|
151
|
+
try {
|
|
152
|
+
await schemas.password.validate(password);
|
|
153
|
+
} catch (error) {
|
|
154
|
+
throw new ValidationError(error.message || "Invalid password format");
|
|
155
|
+
}
|
|
156
|
+
}
|
|
157
|
+
}, "validatePassword");
|
|
158
|
+
var validateEmailUniqueness = /* @__PURE__ */ __name(async (repository, email, excludeUserId) => {
|
|
159
|
+
try {
|
|
160
|
+
schemas.email.validate(email);
|
|
161
|
+
const existingUser = await repository.findByEmail(email);
|
|
162
|
+
if (!existingUser) return;
|
|
163
|
+
if (existingUser.id !== excludeUserId) {
|
|
164
|
+
throw new ValidationError(
|
|
165
|
+
`Email ${email} is already in use by another user`
|
|
166
|
+
);
|
|
167
|
+
}
|
|
168
|
+
} catch (error) {
|
|
169
|
+
if (error instanceof ValidationError) {
|
|
170
|
+
throw error;
|
|
171
|
+
}
|
|
172
|
+
throw new ValidationError("Error checking email uniqueness");
|
|
173
|
+
}
|
|
174
|
+
}, "validateEmailUniqueness");
|
|
175
|
+
var validateRegisterDTO = /* @__PURE__ */ __name(async (auth, repository) => {
|
|
176
|
+
const { name, email, role, password } = auth;
|
|
177
|
+
await Promise.all([
|
|
178
|
+
schemas.name.validate(name),
|
|
179
|
+
schemas.role.validate(role),
|
|
180
|
+
validateEmailUniqueness(repository, email),
|
|
181
|
+
validatePassword(password)
|
|
182
|
+
]);
|
|
183
|
+
}, "validateRegisterDTO");
|
|
184
|
+
var validateLoginDTO = /* @__PURE__ */ __name(async (data, repository) => {
|
|
185
|
+
const { email, role, password } = data;
|
|
186
|
+
await Promise.all([schemas.role.validate(role), validatePassword(password)]);
|
|
187
|
+
const auth = await validateEmail(email, repository);
|
|
188
|
+
const isValidPassword = await import_bcrypt.default.compare(password, auth.password);
|
|
189
|
+
if (!isValidPassword) {
|
|
190
|
+
throw new ForbiddenError(
|
|
191
|
+
"The email address or password is incorrect. Please retry"
|
|
192
|
+
);
|
|
193
|
+
}
|
|
194
|
+
return auth;
|
|
195
|
+
}, "validateLoginDTO");
|
|
196
|
+
var validateAdminSecret = /* @__PURE__ */ __name(async (secretPassword) => {
|
|
197
|
+
if (!secretPassword) {
|
|
198
|
+
throw new ValidationError("Admin password is required");
|
|
199
|
+
}
|
|
200
|
+
try {
|
|
201
|
+
const configPath = await (0, import_cca_core.findConfig)({
|
|
202
|
+
fileName: "cca.config.json",
|
|
203
|
+
maxDepth: 10,
|
|
204
|
+
startPath: process.cwd()
|
|
205
|
+
});
|
|
206
|
+
const configContent = await import("fs/promises").then(
|
|
207
|
+
(fs) => fs.readFile(configPath, "utf-8")
|
|
208
|
+
);
|
|
209
|
+
const config = JSON.parse(configContent);
|
|
210
|
+
if (!config.ADMIN_SECRET_PASSWORD) {
|
|
211
|
+
throw new ValidationError("ADMIN_SECRET_PASSWORD not found in config");
|
|
212
|
+
}
|
|
213
|
+
if (secretPassword !== config.ADMIN_SECRET_PASSWORD) {
|
|
214
|
+
throw new ValidationError("Invalid admin password");
|
|
215
|
+
}
|
|
216
|
+
} catch (error) {
|
|
217
|
+
if (error instanceof ValidationError) {
|
|
218
|
+
throw error;
|
|
219
|
+
}
|
|
220
|
+
throw new ValidationError("Error validating admin password");
|
|
221
|
+
}
|
|
222
|
+
}, "validateAdminSecret");
|
|
223
|
+
|
|
224
|
+
// src/application/mappers/utils/mapper.ts
|
|
225
|
+
var import_core2 = require("@automapper/core");
|
|
226
|
+
var import_classes2 = require("@automapper/classes");
|
|
227
|
+
|
|
228
|
+
// src/application/mappers/createUserMappings.ts
|
|
229
|
+
var import_core = require("@automapper/core");
|
|
230
|
+
var import_cca_entities2 = require("cca-entities");
|
|
231
|
+
|
|
232
|
+
// src/application/dtos/RegisterDTO.ts
|
|
233
|
+
var _RegisterDTO = class _RegisterDTO {
|
|
234
|
+
};
|
|
235
|
+
__name(_RegisterDTO, "RegisterDTO");
|
|
236
|
+
var RegisterDTO = _RegisterDTO;
|
|
237
|
+
|
|
238
|
+
// src/application/mappers/createUserMappings.ts
|
|
239
|
+
function createUserMappings(mapper2) {
|
|
240
|
+
(0, import_core.createMap)(
|
|
241
|
+
mapper2,
|
|
242
|
+
import_cca_entities2.AuthEntity,
|
|
243
|
+
RegisterDTO,
|
|
244
|
+
(0, import_core.forMember)((dest) => dest.email, (0, import_core.mapFrom)((src) => src.email)),
|
|
245
|
+
(0, import_core.forMember)((dest) => dest.password, (0, import_core.mapFrom)((src) => src.password)),
|
|
246
|
+
(0, import_core.forMember)((dest) => dest.role, (0, import_core.mapFrom)((src) => src.role))
|
|
247
|
+
);
|
|
248
|
+
(0, import_core.createMap)(
|
|
249
|
+
mapper2,
|
|
250
|
+
import_cca_entities2.UserEntity,
|
|
251
|
+
RegisterDTO,
|
|
252
|
+
(0, import_core.forMember)((dest) => dest.name, (0, import_core.mapFrom)((src) => src.name)),
|
|
253
|
+
(0, import_core.forMember)((dest) => dest.email, (0, import_core.mapFrom)((src) => src.email)),
|
|
254
|
+
(0, import_core.forMember)((dest) => dest.role, (0, import_core.mapFrom)((src) => src.role))
|
|
255
|
+
);
|
|
256
|
+
(0, import_core.createMap)(
|
|
257
|
+
mapper2,
|
|
258
|
+
import_cca_entities2.UserEntity,
|
|
259
|
+
UserDTO,
|
|
260
|
+
(0, import_core.forMember)((dest) => dest.id, (0, import_core.mapFrom)((src) => src.id)),
|
|
261
|
+
(0, import_core.forMember)((dest) => dest.name, (0, import_core.mapFrom)((src) => src.name)),
|
|
262
|
+
(0, import_core.forMember)((dest) => dest.email, (0, import_core.mapFrom)((src) => src.email)),
|
|
263
|
+
(0, import_core.forMember)((dest) => dest.role, (0, import_core.mapFrom)((src) => src.role))
|
|
264
|
+
);
|
|
265
|
+
}
|
|
266
|
+
__name(createUserMappings, "createUserMappings");
|
|
267
|
+
|
|
268
|
+
// src/application/mappers/utils/mapper.ts
|
|
269
|
+
var mapper = (0, import_core2.createMapper)({
|
|
270
|
+
strategyInitializer: (0, import_classes2.classes)()
|
|
271
|
+
});
|
|
272
|
+
createUserMappings(mapper);
|
|
273
|
+
|
|
274
|
+
// src/application/useCase/LoginUseCase.ts
|
|
275
|
+
var _LoginUseCase = class _LoginUseCase {
|
|
276
|
+
constructor(repository, authService) {
|
|
277
|
+
this.repository = repository;
|
|
278
|
+
this.authService = authService;
|
|
279
|
+
}
|
|
280
|
+
async initialize() {
|
|
281
|
+
await (0, import_cca_core2.validateRepository)(this.repository, (repo) => repo.getAll());
|
|
282
|
+
}
|
|
283
|
+
async execute(loginDTO, adminPassword) {
|
|
284
|
+
const { role } = loginDTO;
|
|
285
|
+
const auth = await validateLoginDTO(loginDTO, this.repository);
|
|
286
|
+
if (role === import_cca_entities3.UserRole.ADMIN && adminPassword) {
|
|
287
|
+
await validateAdminSecret(adminPassword);
|
|
288
|
+
}
|
|
289
|
+
const token = this.generateTokens(auth);
|
|
290
|
+
const userDTO = mapper.map(auth.user, import_cca_entities3.UserEntity, UserDTO);
|
|
291
|
+
return { token, user: userDTO };
|
|
292
|
+
}
|
|
293
|
+
generateTokens(auth) {
|
|
294
|
+
const accessToken = this.authService.generateAccessToken(auth.user);
|
|
295
|
+
const refreshToken = this.authService.generateRefreshToken(auth.user);
|
|
296
|
+
this.updateUserRefreshToken(auth, refreshToken);
|
|
297
|
+
return { accessToken, refreshToken };
|
|
298
|
+
}
|
|
299
|
+
async updateUserRefreshToken(auth, refreshToken) {
|
|
300
|
+
auth.refreshToken = refreshToken;
|
|
301
|
+
await this.repository.update(auth.id, { refreshToken });
|
|
302
|
+
}
|
|
303
|
+
};
|
|
304
|
+
__name(_LoginUseCase, "LoginUseCase");
|
|
305
|
+
var LoginUseCase = _LoginUseCase;
|
|
306
|
+
|
|
307
|
+
// src/application/useCase/RegisterUseCase.ts
|
|
308
|
+
var import_cca_core3 = require("cca-core");
|
|
309
|
+
var bcrypt2 = __toESM(require("bcrypt"));
|
|
310
|
+
var import_cca_entities4 = require("cca-entities");
|
|
311
|
+
var _RegisterUseCase = class _RegisterUseCase {
|
|
312
|
+
constructor(repository) {
|
|
313
|
+
this.SALT_ROUNDS = 10;
|
|
314
|
+
this.repository = repository;
|
|
315
|
+
}
|
|
316
|
+
async initialize() {
|
|
317
|
+
await (0, import_cca_core3.validateRepository)(this.repository, (repo) => repo.getAll());
|
|
318
|
+
}
|
|
319
|
+
async execute(email, name, password, role = import_cca_entities4.UserRole.GUEST) {
|
|
320
|
+
try {
|
|
321
|
+
const normalizedDTO = this.normalizeAuthDTO({
|
|
322
|
+
email,
|
|
323
|
+
name,
|
|
324
|
+
password,
|
|
325
|
+
role
|
|
326
|
+
});
|
|
327
|
+
await validateRegisterDTO(normalizedDTO, this.repository);
|
|
328
|
+
const hashedPassword = await this.hashPassword(normalizedDTO.password);
|
|
329
|
+
const authEntity = await this.createAuthEntity(
|
|
330
|
+
normalizedDTO,
|
|
331
|
+
hashedPassword
|
|
332
|
+
);
|
|
333
|
+
return await this.repository.create(authEntity);
|
|
334
|
+
} catch (error) {
|
|
335
|
+
throw error instanceof Error ? error : new Error("Registration failed");
|
|
336
|
+
}
|
|
337
|
+
}
|
|
338
|
+
normalizeAuthDTO(dto) {
|
|
339
|
+
return {
|
|
340
|
+
name: dto.name.trim(),
|
|
341
|
+
email: dto.email.trim().toLowerCase(),
|
|
342
|
+
role: dto.role,
|
|
343
|
+
password: dto.password.trim()
|
|
344
|
+
};
|
|
345
|
+
}
|
|
346
|
+
async hashPassword(password) {
|
|
347
|
+
return await bcrypt2.hash(password, this.SALT_ROUNDS);
|
|
348
|
+
}
|
|
349
|
+
async createAuthEntity(dto, hashedPassword) {
|
|
350
|
+
const authEntity = mapper.map(dto, RegisterDTO, import_cca_entities4.AuthEntity);
|
|
351
|
+
authEntity.password = hashedPassword;
|
|
352
|
+
const userEntity = mapper.map(dto, RegisterDTO, import_cca_entities4.UserEntity);
|
|
353
|
+
authEntity.user.createdAt = userEntity.createdAt;
|
|
354
|
+
authEntity.user = userEntity;
|
|
355
|
+
return authEntity;
|
|
356
|
+
}
|
|
357
|
+
};
|
|
358
|
+
__name(_RegisterUseCase, "RegisterUseCase");
|
|
359
|
+
var RegisterUseCase = _RegisterUseCase;
|
|
360
|
+
|
|
361
|
+
// src/application/useCase/RefreshTokenUseCase.ts
|
|
362
|
+
var import_cca_core4 = require("cca-core");
|
|
363
|
+
var _RefreshTokenUseCase = class _RefreshTokenUseCase {
|
|
364
|
+
constructor(repository, service) {
|
|
365
|
+
this.repository = repository;
|
|
366
|
+
this.service = service;
|
|
367
|
+
}
|
|
368
|
+
async initialize() {
|
|
369
|
+
await (0, import_cca_core4.validateRepository)(this.repository, (repo) => repo.getAll());
|
|
370
|
+
}
|
|
371
|
+
async execute(refreshToken) {
|
|
372
|
+
try {
|
|
373
|
+
const decoded = await this.service.verifyRefreshToken(refreshToken);
|
|
374
|
+
const auth = decoded.userId ? await this.repository.findById(decoded.userId) : null;
|
|
375
|
+
if (!auth || auth.refreshToken !== refreshToken) {
|
|
376
|
+
return null;
|
|
377
|
+
}
|
|
378
|
+
const accessToken = this.service.generateAccessToken(auth.user);
|
|
379
|
+
const newRefreshToken = this.service.generateRefreshToken(auth.user);
|
|
380
|
+
await this.repository.update(auth.id, {
|
|
381
|
+
refreshToken: newRefreshToken
|
|
382
|
+
});
|
|
383
|
+
return { accessToken, refreshToken: newRefreshToken };
|
|
384
|
+
} catch (error) {
|
|
385
|
+
return null;
|
|
386
|
+
}
|
|
387
|
+
}
|
|
388
|
+
async verityToken(token) {
|
|
389
|
+
return await this.service.verifyAccessToken(token);
|
|
390
|
+
}
|
|
391
|
+
};
|
|
392
|
+
__name(_RefreshTokenUseCase, "RefreshTokenUseCase");
|
|
393
|
+
var RefreshTokenUseCase = _RefreshTokenUseCase;
|
|
394
|
+
|
|
395
|
+
// src/presentation/controller/AuthController.ts
|
|
396
|
+
var _AuthController = class _AuthController {
|
|
397
|
+
constructor(loginUseCase, registerUseCase, refreshTokenUseCase) {
|
|
398
|
+
this.login = /* @__PURE__ */ __name(async (req, res, next) => {
|
|
399
|
+
try {
|
|
400
|
+
const { adminPassword, ...loginDTO } = req.body;
|
|
401
|
+
const result = await this.loginUseCase.execute(loginDTO, adminPassword);
|
|
402
|
+
res.status(201).json(result);
|
|
403
|
+
} catch (error) {
|
|
404
|
+
next(error);
|
|
405
|
+
}
|
|
406
|
+
}, "login");
|
|
407
|
+
this.register = /* @__PURE__ */ __name(async (req, res, next) => {
|
|
408
|
+
try {
|
|
409
|
+
const { email, name, password, role } = req.body;
|
|
410
|
+
await this.registerUseCase.execute(email, name, password, role);
|
|
411
|
+
} catch (error) {
|
|
412
|
+
next(error);
|
|
413
|
+
}
|
|
414
|
+
}, "register");
|
|
415
|
+
this.refreshToken = /* @__PURE__ */ __name(async (req, res) => {
|
|
416
|
+
const { refreshToken } = req.body;
|
|
417
|
+
const result = await this.refreshTokenUseCase.execute(refreshToken);
|
|
418
|
+
res.json(result);
|
|
419
|
+
}, "refreshToken");
|
|
420
|
+
this.verifyToken = /* @__PURE__ */ __name(async (token) => {
|
|
421
|
+
return await this.refreshTokenUseCase.verityToken(token);
|
|
422
|
+
}, "verifyToken");
|
|
423
|
+
this.loginUseCase = loginUseCase;
|
|
424
|
+
this.registerUseCase = registerUseCase;
|
|
425
|
+
this.refreshTokenUseCase = refreshTokenUseCase;
|
|
426
|
+
}
|
|
427
|
+
};
|
|
428
|
+
__name(_AuthController, "AuthController");
|
|
429
|
+
var AuthController = _AuthController;
|
|
430
|
+
|
|
431
|
+
// src/infrastructure/repository/AuthRepository.ts
|
|
432
|
+
var import_cca_core5 = require("cca-core");
|
|
433
|
+
var _AuthRepository = class _AuthRepository extends import_cca_core5.BaseRepository {
|
|
434
|
+
constructor(repository) {
|
|
435
|
+
super(repository);
|
|
436
|
+
}
|
|
437
|
+
async findByEmail(email) {
|
|
438
|
+
return await this.repository.findOne({
|
|
439
|
+
where: { email },
|
|
440
|
+
relations: ["users"]
|
|
441
|
+
});
|
|
442
|
+
}
|
|
443
|
+
async create(entity) {
|
|
444
|
+
return super.create(entity);
|
|
445
|
+
}
|
|
446
|
+
};
|
|
447
|
+
__name(_AuthRepository, "AuthRepository");
|
|
448
|
+
var AuthRepository = _AuthRepository;
|
|
449
|
+
|
|
450
|
+
// src/infrastructure/auth/JwtAuthService.ts
|
|
451
|
+
var jwt = __toESM(require("jsonwebtoken"));
|
|
452
|
+
var bcrypt3 = __toESM(require("bcrypt"));
|
|
453
|
+
var import_cca_core6 = require("cca-core");
|
|
454
|
+
var _JwtAuthService = class _JwtAuthService {
|
|
455
|
+
constructor(repository, config) {
|
|
456
|
+
this.repository = repository;
|
|
457
|
+
this.jwtConfig = {
|
|
458
|
+
accessTokenSecret: process.env.JWT_ACCESS_SECRET || "default-access-secret",
|
|
459
|
+
refreshTokenSecret: process.env.JWT_REFRESH_SECRET || "default-refresh-secret",
|
|
460
|
+
accessTokenExpiry: "15m",
|
|
461
|
+
refreshTokenExpiry: "7d"
|
|
462
|
+
};
|
|
463
|
+
if (config) {
|
|
464
|
+
this.jwtConfig = {
|
|
465
|
+
...this.jwtConfig,
|
|
466
|
+
...config
|
|
467
|
+
};
|
|
468
|
+
}
|
|
469
|
+
this.validateConfiguration();
|
|
470
|
+
}
|
|
471
|
+
async initialize() {
|
|
472
|
+
await (0, import_cca_core6.validateRepository)(this.repository, (repo) => repo.getAll());
|
|
473
|
+
}
|
|
474
|
+
validateConfiguration() {
|
|
475
|
+
if (!this.jwtConfig.accessTokenSecret || !this.jwtConfig.refreshTokenSecret) {
|
|
476
|
+
throw new Error(
|
|
477
|
+
"JWT secrets must be defined in environment variables or configuration"
|
|
478
|
+
);
|
|
479
|
+
}
|
|
480
|
+
}
|
|
481
|
+
async validateUser(email, password) {
|
|
482
|
+
try {
|
|
483
|
+
const user = await this.repository.findByEmail(email);
|
|
484
|
+
if (!user) {
|
|
485
|
+
throw new NotFoundError(
|
|
486
|
+
"The email address or password is incorrect. Please retry"
|
|
487
|
+
);
|
|
488
|
+
}
|
|
489
|
+
const isValidPassword = await bcrypt3.compare(password, user.password);
|
|
490
|
+
if (!isValidPassword) {
|
|
491
|
+
throw new ForbiddenError(
|
|
492
|
+
"The email address or password is incorrect. Please retry"
|
|
493
|
+
);
|
|
494
|
+
}
|
|
495
|
+
return user;
|
|
496
|
+
} catch (error) {
|
|
497
|
+
if (error instanceof NotFoundError || error instanceof ForbiddenError) {
|
|
498
|
+
throw error;
|
|
499
|
+
}
|
|
500
|
+
throw new Error(`Authentication failed: ${error.message}`);
|
|
501
|
+
}
|
|
502
|
+
}
|
|
503
|
+
generateAccessToken(user) {
|
|
504
|
+
return jwt.sign(
|
|
505
|
+
{
|
|
506
|
+
userId: user.id,
|
|
507
|
+
email: user.email,
|
|
508
|
+
role: user.role
|
|
509
|
+
},
|
|
510
|
+
this.jwtConfig.accessTokenSecret,
|
|
511
|
+
{ expiresIn: this.jwtConfig.accessTokenExpiry }
|
|
512
|
+
);
|
|
513
|
+
}
|
|
514
|
+
generateRefreshToken(user) {
|
|
515
|
+
return jwt.sign({ userId: user.id }, this.jwtConfig.refreshTokenSecret, {
|
|
516
|
+
expiresIn: this.jwtConfig.refreshTokenExpiry
|
|
517
|
+
});
|
|
518
|
+
}
|
|
519
|
+
async verifyAccessToken(token) {
|
|
520
|
+
return this.verifyToken(token, this.jwtConfig.accessTokenSecret);
|
|
521
|
+
}
|
|
522
|
+
async verifyRefreshToken(token) {
|
|
523
|
+
return this.verifyToken(token, this.jwtConfig.refreshTokenSecret);
|
|
524
|
+
}
|
|
525
|
+
async verifyToken(token, secret) {
|
|
526
|
+
try {
|
|
527
|
+
return jwt.verify(token, secret);
|
|
528
|
+
} catch (error) {
|
|
529
|
+
if (error instanceof jwt.TokenExpiredError || error instanceof jwt.JsonWebTokenError) {
|
|
530
|
+
throw new UnauthorizedError();
|
|
531
|
+
}
|
|
532
|
+
throw new UnauthorizedError();
|
|
533
|
+
}
|
|
534
|
+
}
|
|
535
|
+
};
|
|
536
|
+
__name(_JwtAuthService, "JwtAuthService");
|
|
537
|
+
var JwtAuthService = _JwtAuthService;
|
|
538
|
+
|
|
539
|
+
// src/infrastructure/container/createAuthContainer.ts
|
|
540
|
+
function createAuthContainer(database) {
|
|
541
|
+
const container = new import_cca_core7.BaseContainer({ database });
|
|
542
|
+
const authRepository = new AuthRepository(
|
|
543
|
+
database.getRepository(import_cca_entities5.AuthEntity)
|
|
544
|
+
);
|
|
545
|
+
container.registerRepository("AuthRepository", authRepository);
|
|
546
|
+
const jwtAuthService = new JwtAuthService(authRepository);
|
|
547
|
+
container.registerService("JwtAuthService", jwtAuthService);
|
|
548
|
+
const loginUseCase = new LoginUseCase(authRepository, jwtAuthService);
|
|
549
|
+
const registerUseCase = new RegisterUseCase(authRepository);
|
|
550
|
+
const refreshTokenUseCase = new RefreshTokenUseCase(
|
|
551
|
+
authRepository,
|
|
552
|
+
jwtAuthService
|
|
553
|
+
);
|
|
554
|
+
container.registerService("LoginUseCase", loginUseCase);
|
|
555
|
+
container.registerService("RegisterUseCase", registerUseCase);
|
|
556
|
+
container.registerService("RefreshTokenUseCase", refreshTokenUseCase);
|
|
557
|
+
const authController = new AuthController(
|
|
558
|
+
loginUseCase,
|
|
559
|
+
registerUseCase,
|
|
560
|
+
refreshTokenUseCase
|
|
561
|
+
);
|
|
562
|
+
return { container, authController };
|
|
563
|
+
}
|
|
564
|
+
__name(createAuthContainer, "createAuthContainer");
|
|
565
|
+
// Annotate the CommonJS export names for ESM import in node:
|
|
566
|
+
0 && (module.exports = {
|
|
567
|
+
createAuthContainer
|
|
568
|
+
});
|
|
569
|
+
//# sourceMappingURL=index.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../src/index.ts","../src/infrastructure/container/createAuthContainer.ts","../src/application/useCase/LoginUseCase.ts","../src/application/dtos/UserDTO.ts","../src/application/validators/authValidation.ts","../src/utils/Errors.ts","../src/application/mappers/utils/mapper.ts","../src/application/mappers/createUserMappings.ts","../src/application/dtos/RegisterDTO.ts","../src/application/useCase/RegisterUseCase.ts","../src/application/useCase/RefreshTokenUseCase.ts","../src/presentation/controller/AuthController.ts","../src/infrastructure/repository/AuthRepository.ts","../src/infrastructure/auth/JwtAuthService.ts"],"sourcesContent":["import { createAuthContainer } from \"./infrastructure/container/createAuthContainer\";\r\n\r\nexport { createAuthContainer };\r\n","import { BaseContainer, BaseDatabase } from \"cca-core\";\r\nimport { AuthEntity } from \"cca-entities\";\r\n\r\nimport { LoginUseCase } from \"../../application/useCase/LoginUseCase\";\r\nimport { RegisterUseCase } from \"../../application/useCase/RegisterUseCase\";\r\nimport { RefreshTokenUseCase } from \"../../application/useCase/RefreshTokenUseCase\";\r\n\r\nimport { AuthController } from \"../../presentation/controller/AuthController\";\r\n\r\nimport { AuthRepository } from \"../repository/AuthRepository\";\r\nimport { JwtAuthService } from \"../auth/JwtAuthService\";\r\n\r\nfunction createAuthContainer(database: BaseDatabase) {\r\n const container = new BaseContainer({ database });\r\n\r\n const authRepository = new AuthRepository(\r\n database.getRepository(AuthEntity)\r\n );\r\n container.registerRepository<AuthEntity>(\"AuthRepository\", authRepository);\r\n\r\n const jwtAuthService = new JwtAuthService(authRepository);\r\n container.registerService(\"JwtAuthService\", jwtAuthService);\r\n\r\n const loginUseCase = new LoginUseCase(authRepository, jwtAuthService);\r\n const registerUseCase = new RegisterUseCase(authRepository);\r\n const refreshTokenUseCase = new RefreshTokenUseCase(\r\n authRepository,\r\n jwtAuthService\r\n );\r\n container.registerService(\"LoginUseCase\", loginUseCase);\r\n container.registerService(\"RegisterUseCase\", registerUseCase);\r\n container.registerService(\"RefreshTokenUseCase\", refreshTokenUseCase);\r\n\r\n const authController = new AuthController(\r\n loginUseCase,\r\n registerUseCase,\r\n refreshTokenUseCase\r\n );\r\n\r\n return { container, authController };\r\n}\r\n\r\nexport { createAuthContainer };\r\n","import { IBaseService, validateRepository } from \"cca-core\";\r\nimport { AuthEntity, UserEntity, UserRole } from \"cca-entities\";\r\n\r\nimport { AuthRepository } from \"../../infrastructure/repository/AuthRepository\";\r\nimport { JwtAuthService } from \"../../infrastructure/auth/JwtAuthService\";\r\n\r\nimport { UserDTO } from \"../dtos/UserDTO\";\r\nimport { LoginDTO } from \"../dtos/LoginDTO\";\r\nimport {\r\n validateAdminSecret,\r\n validateLoginDTO,\r\n} from \"../validators/authValidation\";\r\nimport { mapper } from \"../mappers/utils/mapper\";\r\n\r\nexport class LoginUseCase implements IBaseService {\r\n private readonly repository: AuthRepository;\r\n private readonly authService: JwtAuthService;\r\n\r\n constructor(repository: AuthRepository, authService: JwtAuthService) {\r\n this.repository = repository;\r\n this.authService = authService;\r\n }\r\n\r\n public async initialize(): Promise<void> {\r\n await validateRepository(this.repository, (repo) => repo.getAll());\r\n }\r\n\r\n async execute(\r\n loginDTO: LoginDTO,\r\n adminPassword?: string\r\n ): Promise<{\r\n token: { accessToken: string; refreshToken: string };\r\n user: UserDTO;\r\n }> {\r\n const { role } = loginDTO;\r\n\r\n const auth = await validateLoginDTO(loginDTO, this.repository);\r\n\r\n if (role === UserRole.ADMIN && adminPassword) {\r\n await validateAdminSecret(adminPassword);\r\n }\r\n\r\n const token = this.generateTokens(auth);\r\n\r\n const userDTO = mapper.map(auth.user, UserEntity, UserDTO);\r\n\r\n return { token, user: userDTO };\r\n }\r\n\r\n private generateTokens(auth: AuthEntity): {\r\n accessToken: string;\r\n refreshToken: string;\r\n } {\r\n const accessToken = this.authService.generateAccessToken(auth.user);\r\n const refreshToken = this.authService.generateRefreshToken(auth.user);\r\n this.updateUserRefreshToken(auth, refreshToken); \r\n return { accessToken, refreshToken };\r\n }\r\n\r\n private async updateUserRefreshToken(\r\n auth: AuthEntity,\r\n refreshToken: string\r\n ): Promise<void> {\r\n auth.refreshToken = refreshToken;\r\n await this.repository.update(auth.id, { refreshToken });\r\n }\r\n}\r\n","import { AutoMap } from \"@automapper/classes\";\r\nimport { UserRole } from \"cca-entities\";\r\n\r\nexport class UserDTO {\r\n @AutoMap()\r\n id!: string;\r\n\r\n @AutoMap()\r\n name!: string;\r\n\r\n @AutoMap()\r\n email!: string;\r\n\r\n @AutoMap()\r\n role!: UserRole;\r\n\r\n adminPassword?: string;\r\n}","import * as yup from \"yup\";\r\nimport { AuthEntity, UserRole } from \"cca-entities\";\r\nimport bcrypt from \"bcrypt\";\r\n\r\nimport {\r\n ForbiddenError,\r\n NotFoundError,\r\n ValidationError,\r\n} from \"../../utils/Errors\";\r\nimport { AuthRepository } from \"../../infrastructure/repository/AuthRepository\";\r\nimport { ConfigFinder } from \"../../utils/ConfigFinder\";\r\n\r\nimport { RegisterDTO } from \"../dtos/RegisterDTO\";\r\nimport { LoginDTO } from \"../dtos/LoginDTO\";\r\nimport { findConfig } from \"cca-core\";\r\n\r\nconst schemas = {\r\n id: yup.string().uuid(\"Invalid user ID format\"),\r\n email: yup\r\n .string()\r\n .email(\"Invalid email format\")\r\n .max(255, \"Email cannot exceed 255 characters\"),\r\n name: yup\r\n .string()\r\n .required(\"Name is required\")\r\n .min(2, \"Name must be at least 2 characters long\")\r\n .max(50, \"Name cannot exceed 50 characters\")\r\n .matches(/^[a-zA-Z\\s]+$/, \"Name must only contain letters and spaces\"),\r\n password: yup\r\n .string()\r\n .required(\"Password is required\")\r\n .min(8, \"Password must be at least 8 characters long\")\r\n .max(100, \"Password cannot exceed 100 characters\")\r\n .matches(\r\n /^(?=.*[a-z])(?=.*[A-Z])(?=.*\\d)(?=.*[@$!%*?&])[A-Za-z\\d@$!%*?&]/,\r\n \"Password must contain at least one uppercase letter, one lowercase letter, one number, and one special character\"\r\n ),\r\n role: yup\r\n .string()\r\n .required(\"Role is required\")\r\n .oneOf(Object.values(UserRole), \"Invalid role specified\"),\r\n};\r\n\r\nexport const validateEmail = async (\r\n email: string,\r\n repository: AuthRepository\r\n): Promise<AuthEntity> => {\r\n try {\r\n await schemas.email.validate(email?.trim().toLowerCase());\r\n const user = await repository.findByEmail(email);\r\n if (!user) {\r\n throw new NotFoundError(\r\n \"The email address or password is incorrect. Please retry\"\r\n );\r\n }\r\n return user;\r\n } catch (error: any) {\r\n throw new ValidationError(error.message || \"Invalid email format\");\r\n }\r\n};\r\n\r\nexport const validatePassword = async (password?: string): Promise<void> => {\r\n if (password) {\r\n try {\r\n await schemas.password.validate(password);\r\n } catch (error: any) {\r\n throw new ValidationError(error.message || \"Invalid password format\");\r\n }\r\n }\r\n};\r\n\r\nexport const validateEmailUniqueness = async (\r\n repository: AuthRepository,\r\n email: string,\r\n excludeUserId?: string\r\n): Promise<void> => {\r\n try {\r\n schemas.email.validate(email);\r\n const existingUser = await repository.findByEmail(email);\r\n if (!existingUser) return;\r\n\r\n if (existingUser.id !== excludeUserId) {\r\n throw new ValidationError(\r\n `Email ${email} is already in use by another user`\r\n );\r\n }\r\n } catch (error) {\r\n if (error instanceof ValidationError) {\r\n throw error;\r\n }\r\n throw new ValidationError(\"Error checking email uniqueness\");\r\n }\r\n};\r\n\r\nexport const validateRegisterDTO = async (\r\n auth: RegisterDTO,\r\n repository: AuthRepository\r\n): Promise<void> => {\r\n const { name, email, role, password } = auth;\r\n\r\n await Promise.all([\r\n schemas.name.validate(name),\r\n schemas.role.validate(role),\r\n validateEmailUniqueness(repository, email),\r\n validatePassword(password),\r\n ]);\r\n};\r\n\r\nexport const validateLoginDTO = async (\r\n data: LoginDTO,\r\n repository: AuthRepository\r\n): Promise<AuthEntity> => {\r\n const { email, role, password } = data;\r\n\r\n await Promise.all([schemas.role.validate(role), validatePassword(password)]);\r\n\r\n const auth = await validateEmail(email, repository);\r\n const isValidPassword = await bcrypt.compare(password, auth.password);\r\n if (!isValidPassword) {\r\n throw new ForbiddenError(\r\n \"The email address or password is incorrect. Please retry\"\r\n );\r\n }\r\n\r\n return auth;\r\n};\r\n\r\nexport const validateAdminSecret = async (\r\n secretPassword?: string\r\n): Promise<void> => {\r\n if (!secretPassword) {\r\n throw new ValidationError(\"Admin password is required\");\r\n }\r\n\r\n try {\r\n const configPath = await findConfig({\r\n fileName: \"cca.config.json\",\r\n maxDepth: 10,\r\n startPath: process.cwd(),\r\n });\r\n const configContent = await import(\"fs/promises\").then((fs) =>\r\n fs.readFile(configPath, \"utf-8\")\r\n );\r\n\r\n const config = JSON.parse(configContent);\r\n\r\n if (!config.ADMIN_SECRET_PASSWORD) {\r\n throw new ValidationError(\"ADMIN_SECRET_PASSWORD not found in config\");\r\n }\r\n\r\n if (secretPassword !== config.ADMIN_SECRET_PASSWORD) {\r\n throw new ValidationError(\"Invalid admin password\");\r\n }\r\n } catch (error) {\r\n if (error instanceof ValidationError) {\r\n throw error;\r\n }\r\n throw new ValidationError(\"Error validating admin password\");\r\n }\r\n};\r\n","export class AppError extends Error {\r\n constructor(\r\n public message: string,\r\n public statusCode: number = 500,\r\n public name: string = \"AppError\"\r\n ) {\r\n super(message);\r\n Object.setPrototypeOf(this, new.target.prototype);\r\n Error.captureStackTrace(this);\r\n }\r\n}\r\n\r\nexport class ValidationError extends AppError {\r\n constructor(message: string) {\r\n super(message, 400);\r\n this.name = \"ValidationError\";\r\n }\r\n}\r\n\r\nexport class ConfigNotFoundException extends AppError {\r\n constructor(message: string) {\r\n super(message);\r\n this.name = \"ConfigNotFoundException\";\r\n }\r\n}\r\n\r\nexport class NotFoundError extends AppError {\r\n constructor(message: string) {\r\n super(message, 404, \"UserNotFoundError\");\r\n }\r\n}\r\n\r\nexport class ForbiddenError extends AppError {\r\n constructor(message: string = \"Forbidden access\") {\r\n super(message, 403);\r\n this.name = \"ForbiddenError\";\r\n }\r\n}\r\n\r\nexport class UnauthorizedError extends AppError {\r\n constructor(message: string = \"Unauthorized access\") {\r\n super(message, 401);\r\n this.name = \"UnauthorizedError\";\r\n }\r\n}\r\n","import { createMapper } from '@automapper/core';\r\nimport { classes } from '@automapper/classes';\r\n\r\nimport { createUserMappings } from '../createUserMappings';\r\n\r\nexport const mapper = createMapper({\r\n strategyInitializer: classes(),\r\n});\r\n\r\ncreateUserMappings(mapper);\r\n","import { Mapper, createMap, forMember, mapFrom } from '@automapper/core';\r\nimport { AuthEntity, UserEntity } from 'cca-entities';\r\n\r\nimport { RegisterDTO } from '../dtos/RegisterDTO';\r\nimport { UserDTO } from '../dtos/UserDTO';\r\n\r\nexport function createUserMappings(mapper: Mapper): void {\r\n createMap(\r\n mapper,\r\n AuthEntity,\r\n RegisterDTO,\r\n forMember(dest => dest.email, mapFrom(src => src.email)),\r\n forMember(dest => dest.password, mapFrom(src => src.password)),\r\n forMember(dest => dest.role, mapFrom(src => src.role)));\r\n\r\n createMap(\r\n mapper,\r\n UserEntity,\r\n RegisterDTO,\r\n forMember(dest => dest.name, mapFrom(src => src.name)),\r\n forMember(dest => dest.email, mapFrom(src => src.email)),\r\n forMember(dest => dest.role, mapFrom(src => src.role)));\r\n\r\n createMap(\r\n mapper,\r\n UserEntity,\r\n UserDTO,\r\n forMember(dest => dest.id, mapFrom(src => src.id)),\r\n forMember(dest => dest.name, mapFrom(src => src.name)),\r\n forMember(dest => dest.email, mapFrom(src => src.email)),\r\n forMember(dest => dest.role, mapFrom(src => src.role)));\r\n}","import { UserRole } from \"cca-entities\";\r\n\r\nexport class RegisterDTO {\r\n email!: string;\r\n name!: string;\r\n password!: string;\r\n role!: UserRole;\r\n adminPassword?: string;\r\n}\r\n","import { IBaseService, validateRepository } from \"cca-core\";\r\nimport * as bcrypt from \"bcrypt\";\r\nimport { AuthEntity, UserEntity, UserRole } from \"cca-entities\";\r\n\r\nimport { AuthRepository } from \"../../infrastructure/repository/AuthRepository\";\r\n\r\nimport { mapper } from \"../mappers/utils/mapper\";\r\nimport { RegisterDTO } from \"../dtos/RegisterDTO\";\r\nimport { validateRegisterDTO } from \"../validators/authValidation\";\r\n\r\nexport class RegisterUseCase implements IBaseService {\r\n private readonly repository: AuthRepository;\r\n private readonly SALT_ROUNDS = 10;\r\n\r\n constructor(repository: AuthRepository) {\r\n this.repository = repository;\r\n }\r\n\r\n public async initialize(): Promise<void> {\r\n await validateRepository(this.repository, (repo) => repo.getAll());\r\n }\r\n\r\n public async execute(\r\n email: string,\r\n name: string,\r\n password: string,\r\n role: UserRole = UserRole.GUEST\r\n ): Promise<AuthEntity> {\r\n try {\r\n const normalizedDTO = this.normalizeAuthDTO({\r\n email,\r\n name,\r\n password,\r\n role,\r\n });\r\n\r\n await validateRegisterDTO(normalizedDTO, this.repository);\r\n\r\n const hashedPassword = await this.hashPassword(normalizedDTO.password);\r\n const authEntity = await this.createAuthEntity(\r\n normalizedDTO,\r\n hashedPassword\r\n );\r\n\r\n return await this.repository.create(authEntity);\r\n } catch (error) {\r\n throw error instanceof Error ? error : new Error(\"Registration failed\");\r\n }\r\n }\r\n\r\n private normalizeAuthDTO(dto: RegisterDTO): RegisterDTO {\r\n return {\r\n name: dto.name.trim(),\r\n email: dto.email.trim().toLowerCase(),\r\n role: dto.role,\r\n password: dto.password.trim(),\r\n };\r\n }\r\n\r\n private async hashPassword(password: string): Promise<string> {\r\n return await bcrypt.hash(password, this.SALT_ROUNDS);\r\n }\r\n\r\n private async createAuthEntity(\r\n dto: RegisterDTO,\r\n hashedPassword: string\r\n ): Promise<AuthEntity> {\r\n const authEntity = mapper.map(dto, RegisterDTO, AuthEntity);\r\n authEntity.password = hashedPassword;\r\n\r\n const userEntity = mapper.map(dto, RegisterDTO, UserEntity);\r\n authEntity.user.createdAt = userEntity.createdAt;\r\n authEntity.user = userEntity;\r\n\r\n return authEntity;\r\n }\r\n}\r\n","import { IBaseService, validateRepository } from \"cca-core\";\r\n\r\nimport { IDecodedToken } from \"../../domain/interfaces/IDecodedToken\";\r\n\r\nimport { JwtAuthService } from \"../../infrastructure/auth/JwtAuthService\";\r\nimport { AuthRepository } from \"../../infrastructure/repository/AuthRepository\";\r\n\r\nexport class RefreshTokenUseCase implements IBaseService {\r\n private readonly repository: AuthRepository;\r\n private readonly service: JwtAuthService;\r\n\r\n constructor(repository: AuthRepository, service: JwtAuthService) {\r\n this.repository = repository;\r\n this.service = service;\r\n }\r\n\r\n public async initialize(): Promise<void> {\r\n await validateRepository(this.repository, (repo) => repo.getAll());\r\n }\r\n\r\n async execute(\r\n refreshToken: string\r\n ): Promise<{ accessToken: string; refreshToken: string } | null> {\r\n try {\r\n const decoded = await this.service.verifyRefreshToken(refreshToken);\r\n\r\n const auth = decoded.userId\r\n ? await this.repository.findById(decoded.userId)\r\n : null;\r\n\r\n if (!auth || auth.refreshToken !== refreshToken) {\r\n return null;\r\n }\r\n\r\n const accessToken = this.service.generateAccessToken(auth.user);\r\n const newRefreshToken = this.service.generateRefreshToken(auth.user);\r\n\r\n await this.repository.update(auth.id, {\r\n refreshToken: newRefreshToken,\r\n });\r\n\r\n return { accessToken, refreshToken: newRefreshToken };\r\n } catch (error) {\r\n return null;\r\n }\r\n }\r\n\r\n async verityToken(token: string): Promise<IDecodedToken> {\r\n return await this.service.verifyAccessToken(token);\r\n }\r\n}\r\n","import { NextFunction, Request, Response } from \"express\";\r\n\r\nimport { LoginDTO } from \"../../application/dtos/LoginDTO\";\r\nimport { RegisterDTO } from \"../../application/dtos/RegisterDTO\";\r\n\r\nimport { RegisterUseCase } from \"../../application/useCase/RegisterUseCase\";\r\nimport { LoginUseCase } from \"../../application/useCase/LoginUseCase\";\r\nimport { RefreshTokenUseCase } from \"../../application/useCase/RefreshTokenUseCase\";\r\n\r\nimport { IRefreshTokenRequest } from \"../../domain/interfaces/IRefreshTokenRequest\";\r\nimport { IDecodedToken } from \"../../domain/interfaces/IDecodedToken\";\r\n\r\n\r\nexport class AuthController {\r\n private loginUseCase: LoginUseCase;\r\n private registerUseCase: RegisterUseCase;\r\n private refreshTokenUseCase: RefreshTokenUseCase;\r\n\r\n constructor(\r\n loginUseCase: LoginUseCase,\r\n registerUseCase: RegisterUseCase,\r\n refreshTokenUseCase: RefreshTokenUseCase\r\n ) {\r\n this.loginUseCase = loginUseCase;\r\n this.registerUseCase = registerUseCase;\r\n this.refreshTokenUseCase = refreshTokenUseCase;\r\n }\r\n\r\n login = async (req: Request, res: Response, next: NextFunction) => {\r\n try {\r\n const { adminPassword, ...loginDTO }: LoginDTO = req.body;\r\n const result = await this.loginUseCase.execute(loginDTO, adminPassword);\r\n res.status(201).json(result);\r\n } catch (error) {\r\n next(error);\r\n }\r\n };\r\n\r\n register = async (\r\n req: Request,\r\n res: Response,\r\n next: NextFunction\r\n ): Promise<void> => {\r\n try {\r\n const { email, name, password, role }: RegisterDTO = req.body;\r\n await this.registerUseCase.execute(email, name, password, role);\r\n } catch (error) {\r\n next(error);\r\n }\r\n };\r\n\r\n refreshToken = async (req: Request, res: Response) => {\r\n const { refreshToken }: IRefreshTokenRequest = req.body;\r\n const result = await this.refreshTokenUseCase.execute(refreshToken);\r\n res.json(result);\r\n };\r\n\r\n verifyToken = async (token: string): Promise<IDecodedToken> => {\r\n return await this.refreshTokenUseCase.verityToken(token);\r\n };\r\n}\r\n","import { BaseRepository, IBaseRepository, IExtendedBaseRepository } from \"cca-core\";\r\nimport { AuthEntity } from \"cca-entities\";\r\nimport { Repository } from \"typeorm\";\r\n\r\nexport class AuthRepository\r\n extends BaseRepository<AuthEntity>\r\n implements IExtendedBaseRepository<AuthEntity>\r\n{\r\n constructor(repository: Repository<AuthEntity>) {\r\n super(repository);\r\n }\r\n\r\n async findByEmail(email: string): Promise<AuthEntity | null> {\r\n return await this.repository.findOne({\r\n where: { email },\r\n relations: [\"users\"],\r\n });\r\n }\r\n\r\n async create(entity: Omit<AuthEntity, \"createdAt\">): Promise<AuthEntity> {\r\n return super.create(entity);\r\n }\r\n}\r\n","import * as jwt from \"jsonwebtoken\";\r\nimport * as bcrypt from \"bcrypt\";\r\nimport { IBaseService, validateRepository } from \"cca-core\";\r\nimport { AuthEntity, UserEntity } from \"cca-entities\";\r\n\r\nimport { IJwtConfig } from \"../../domain/interfaces/IJwtConfig\";\r\nimport { IAuthService } from \"../../domain/interfaces/IAuthService\";\r\nimport { IDecodedToken } from \"../../domain/interfaces/IDecodedToken\";\r\n\r\nimport {\r\n ForbiddenError,\r\n NotFoundError,\r\n UnauthorizedError,\r\n} from \"../../utils/Errors\";\r\n\r\nimport { AuthRepository } from \"../repository/AuthRepository\";\r\n\r\nexport class JwtAuthService implements IBaseService, IAuthService {\r\n private readonly jwtConfig: IJwtConfig;\r\n private readonly repository: AuthRepository;\r\n\r\n constructor(repository: AuthRepository, config?: IJwtConfig) {\r\n this.repository = repository;\r\n this.jwtConfig = {\r\n accessTokenSecret:\r\n process.env.JWT_ACCESS_SECRET || \"default-access-secret\",\r\n refreshTokenSecret:\r\n process.env.JWT_REFRESH_SECRET || \"default-refresh-secret\",\r\n accessTokenExpiry: \"15m\",\r\n refreshTokenExpiry: \"7d\",\r\n };\r\n if (config) {\r\n this.jwtConfig = {\r\n ...this.jwtConfig,\r\n ...config,\r\n };\r\n }\r\n\r\n this.validateConfiguration();\r\n }\r\n \r\n public async initialize(): Promise<void> {\r\n await validateRepository(this.repository, (repo) => repo.getAll());\r\n }\r\n\r\n private validateConfiguration(): void {\r\n if (\r\n !this.jwtConfig.accessTokenSecret ||\r\n !this.jwtConfig.refreshTokenSecret\r\n ) {\r\n throw new Error(\r\n \"JWT secrets must be defined in environment variables or configuration\"\r\n );\r\n }\r\n }\r\n\r\n async validateUser(\r\n email: string,\r\n password: string\r\n ): Promise<AuthEntity | null> {\r\n try {\r\n const user = await this.repository.findByEmail(email);\r\n\r\n if (!user) {\r\n throw new NotFoundError(\r\n \"The email address or password is incorrect. Please retry\"\r\n );\r\n }\r\n\r\n const isValidPassword = await bcrypt.compare(password, user.password);\r\n if (!isValidPassword) {\r\n throw new ForbiddenError(\r\n \"The email address or password is incorrect. Please retry\"\r\n );\r\n }\r\n\r\n return user;\r\n } catch (error: any) {\r\n if (error instanceof NotFoundError || error instanceof ForbiddenError) {\r\n throw error;\r\n }\r\n throw new Error(`Authentication failed: ${error.message}`);\r\n }\r\n }\r\n\r\n generateAccessToken(user: UserEntity): string {\r\n return jwt.sign(\r\n {\r\n userId: user.id,\r\n email: user.email,\r\n role: user.role,\r\n },\r\n this.jwtConfig.accessTokenSecret,\r\n { expiresIn: this.jwtConfig.accessTokenExpiry }\r\n );\r\n }\r\n\r\n generateRefreshToken(user: UserEntity): string {\r\n return jwt.sign({ userId: user.id }, this.jwtConfig.refreshTokenSecret, {\r\n expiresIn: this.jwtConfig.refreshTokenExpiry,\r\n });\r\n }\r\n\r\n async verifyAccessToken(token: string): Promise<IDecodedToken> {\r\n return this.verifyToken(token, this.jwtConfig.accessTokenSecret);\r\n }\r\n\r\n async verifyRefreshToken(token: string): Promise<IDecodedToken> {\r\n return this.verifyToken(token, this.jwtConfig.refreshTokenSecret);\r\n }\r\n\r\n private async verifyToken(\r\n token: string,\r\n secret: string\r\n ): Promise<IDecodedToken> {\r\n try {\r\n return jwt.verify(token, secret) as IDecodedToken;\r\n } catch (error) {\r\n if (\r\n error instanceof jwt.TokenExpiredError ||\r\n error instanceof jwt.JsonWebTokenError\r\n ) {\r\n throw new UnauthorizedError();\r\n }\r\n throw new UnauthorizedError();\r\n }\r\n }\r\n}\r\n"],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA;AAAA;AAAA;AAAA;AAAA;;;ACAA,IAAAA,mBAA4C;AAC5C,IAAAC,uBAA2B;;;ACD3B,IAAAC,mBAAiD;AACjD,IAAAC,uBAAiD;;;ACDjD,qBAAwB;AAGjB,IAAM,WAAN,MAAM,SAAQ;AAcrB;AAdqB;AAEnB;AAAA,MADC,wBAAQ;AAAA,GADE,SAEX;AAGA;AAAA,MADC,wBAAQ;AAAA,GAJE,SAKX;AAGA;AAAA,MADC,wBAAQ;AAAA,GAPE,SAQX;AAGA;AAAA,MADC,wBAAQ;AAAA,GAVE,SAWX;AAXK,IAAM,UAAN;;;ACHP,UAAqB;AACrB,0BAAqC;AACrC,oBAAmB;;;ACFZ,IAAM,YAAN,MAAM,kBAAiB,MAAM;AAAA,EAClC,YACS,SACA,aAAqB,KACrB,OAAe,YACtB;AACA,UAAM,OAAO;AAJN;AACA;AACA;AAGP,WAAO,eAAe,MAAM,WAAW,SAAS;AAChD,UAAM,kBAAkB,IAAI;AAAA,EAC9B;AACF;AAVoC;AAA7B,IAAM,WAAN;AAYA,IAAM,mBAAN,MAAM,yBAAwB,SAAS;AAAA,EAC5C,YAAY,SAAiB;AAC3B,UAAM,SAAS,GAAG;AAClB,SAAK,OAAO;AAAA,EACd;AACF;AAL8C;AAAvC,IAAM,kBAAN;AAcA,IAAM,iBAAN,MAAM,uBAAsB,SAAS;AAAA,EAC1C,YAAY,SAAiB;AAC3B,UAAM,SAAS,KAAK,mBAAmB;AAAA,EACzC;AACF;AAJ4C;AAArC,IAAM,gBAAN;AAMA,IAAM,kBAAN,MAAM,wBAAuB,SAAS;AAAA,EAC3C,YAAY,UAAkB,oBAAoB;AAChD,UAAM,SAAS,GAAG;AAClB,SAAK,OAAO;AAAA,EACd;AACF;AAL6C;AAAtC,IAAM,iBAAN;AAOA,IAAM,qBAAN,MAAM,2BAA0B,SAAS;AAAA,EAC9C,YAAY,UAAkB,uBAAuB;AACnD,UAAM,SAAS,GAAG;AAClB,SAAK,OAAO;AAAA,EACd;AACF;AALgD;AAAzC,IAAM,oBAAN;;;ADzBP,sBAA2B;AAE3B,IAAM,UAAU;AAAA,EACd,IAAQ,WAAO,EAAE,KAAK,wBAAwB;AAAA,EAC9C,OACG,WAAO,EACP,MAAM,sBAAsB,EAC5B,IAAI,KAAK,oCAAoC;AAAA,EAChD,MACG,WAAO,EACP,SAAS,kBAAkB,EAC3B,IAAI,GAAG,yCAAyC,EAChD,IAAI,IAAI,kCAAkC,EAC1C,QAAQ,iBAAiB,2CAA2C;AAAA,EACvE,UACG,WAAO,EACP,SAAS,sBAAsB,EAC/B,IAAI,GAAG,6CAA6C,EACpD,IAAI,KAAK,uCAAuC,EAChD;AAAA,IACC;AAAA,IACA;AAAA,EACF;AAAA,EACF,MACG,WAAO,EACP,SAAS,kBAAkB,EAC3B,MAAM,OAAO,OAAO,4BAAQ,GAAG,wBAAwB;AAC5D;AAEO,IAAM,gBAAgB,8BAC3B,OACA,eACwB;AACxB,MAAI;AACF,UAAM,QAAQ,MAAM,SAAS,OAAO,KAAK,EAAE,YAAY,CAAC;AACxD,UAAM,OAAO,MAAM,WAAW,YAAY,KAAK;AAC/C,QAAI,CAAC,MAAM;AACT,YAAM,IAAI;AAAA,QACR;AAAA,MACF;AAAA,IACF;AACA,WAAO;AAAA,EACT,SAAS,OAAY;AACnB,UAAM,IAAI,gBAAgB,MAAM,WAAW,sBAAsB;AAAA,EACnE;AACF,GAhB6B;AAkBtB,IAAM,mBAAmB,8BAAO,aAAqC;AAC1E,MAAI,UAAU;AACZ,QAAI;AACF,YAAM,QAAQ,SAAS,SAAS,QAAQ;AAAA,IAC1C,SAAS,OAAY;AACnB,YAAM,IAAI,gBAAgB,MAAM,WAAW,yBAAyB;AAAA,IACtE;AAAA,EACF;AACF,GARgC;AAUzB,IAAM,0BAA0B,8BACrC,YACA,OACA,kBACkB;AAClB,MAAI;AACF,YAAQ,MAAM,SAAS,KAAK;AAC5B,UAAM,eAAe,MAAM,WAAW,YAAY,KAAK;AACvD,QAAI,CAAC,aAAc;AAEnB,QAAI,aAAa,OAAO,eAAe;AACrC,YAAM,IAAI;AAAA,QACR,SAAS,KAAK;AAAA,MAChB;AAAA,IACF;AAAA,EACF,SAAS,OAAO;AACd,QAAI,iBAAiB,iBAAiB;AACpC,YAAM;AAAA,IACR;AACA,UAAM,IAAI,gBAAgB,iCAAiC;AAAA,EAC7D;AACF,GArBuC;AAuBhC,IAAM,sBAAsB,8BACjC,MACA,eACkB;AAClB,QAAM,EAAE,MAAM,OAAO,MAAM,SAAS,IAAI;AAExC,QAAM,QAAQ,IAAI;AAAA,IAChB,QAAQ,KAAK,SAAS,IAAI;AAAA,IAC1B,QAAQ,KAAK,SAAS,IAAI;AAAA,IAC1B,wBAAwB,YAAY,KAAK;AAAA,IACzC,iBAAiB,QAAQ;AAAA,EAC3B,CAAC;AACH,GAZmC;AAc5B,IAAM,mBAAmB,8BAC9B,MACA,eACwB;AACxB,QAAM,EAAE,OAAO,MAAM,SAAS,IAAI;AAElC,QAAM,QAAQ,IAAI,CAAC,QAAQ,KAAK,SAAS,IAAI,GAAG,iBAAiB,QAAQ,CAAC,CAAC;AAE3E,QAAM,OAAO,MAAM,cAAc,OAAO,UAAU;AAClD,QAAM,kBAAkB,MAAM,cAAAC,QAAO,QAAQ,UAAU,KAAK,QAAQ;AACpE,MAAI,CAAC,iBAAiB;AACpB,UAAM,IAAI;AAAA,MACR;AAAA,IACF;AAAA,EACF;AAEA,SAAO;AACT,GAjBgC;AAmBzB,IAAM,sBAAsB,8BACjC,mBACkB;AAClB,MAAI,CAAC,gBAAgB;AACnB,UAAM,IAAI,gBAAgB,4BAA4B;AAAA,EACxD;AAEA,MAAI;AACF,UAAM,aAAa,UAAM,4BAAW;AAAA,MAClC,UAAU;AAAA,MACV,UAAU;AAAA,MACV,WAAW,QAAQ,IAAI;AAAA,IACzB,CAAC;AACD,UAAM,gBAAgB,MAAM,OAAO,aAAa,EAAE;AAAA,MAAK,CAAC,OACtD,GAAG,SAAS,YAAY,OAAO;AAAA,IACjC;AAEA,UAAM,SAAS,KAAK,MAAM,aAAa;AAEvC,QAAI,CAAC,OAAO,uBAAuB;AACjC,YAAM,IAAI,gBAAgB,2CAA2C;AAAA,IACvE;AAEA,QAAI,mBAAmB,OAAO,uBAAuB;AACnD,YAAM,IAAI,gBAAgB,wBAAwB;AAAA,IACpD;AAAA,EACF,SAAS,OAAO;AACd,QAAI,iBAAiB,iBAAiB;AACpC,YAAM;AAAA,IACR;AACA,UAAM,IAAI,gBAAgB,iCAAiC;AAAA,EAC7D;AACF,GAhCmC;;;AE/HnC,IAAAC,eAA6B;AAC7B,IAAAC,kBAAwB;;;ACDxB,kBAAsD;AACtD,IAAAC,uBAAuC;;;ACChC,IAAM,eAAN,MAAM,aAAY;AAMzB;AANyB;AAAlB,IAAM,cAAN;;;ADIA,SAAS,mBAAmBC,SAAsB;AACrD;AAAA,IACIA;AAAA,IACA;AAAA,IACA;AAAA,QACA,uBAAU,UAAQ,KAAK,WAAO,qBAAQ,SAAO,IAAI,KAAK,CAAC;AAAA,QACvD,uBAAU,UAAQ,KAAK,cAAU,qBAAQ,SAAO,IAAI,QAAQ,CAAC;AAAA,QAC7D,uBAAU,UAAQ,KAAK,UAAM,qBAAQ,SAAO,IAAI,IAAI,CAAC;AAAA,EAAC;AAE1D;AAAA,IACIA;AAAA,IACA;AAAA,IACA;AAAA,QACA,uBAAU,UAAQ,KAAK,UAAM,qBAAQ,SAAO,IAAI,IAAI,CAAC;AAAA,QACrD,uBAAU,UAAQ,KAAK,WAAO,qBAAQ,SAAO,IAAI,KAAK,CAAC;AAAA,QACvD,uBAAU,UAAQ,KAAK,UAAM,qBAAQ,SAAO,IAAI,IAAI,CAAC;AAAA,EAAC;AAE1D;AAAA,IACIA;AAAA,IACA;AAAA,IACA;AAAA,QACA,uBAAU,UAAQ,KAAK,QAAI,qBAAQ,SAAO,IAAI,EAAE,CAAC;AAAA,QACjD,uBAAU,UAAQ,KAAK,UAAM,qBAAQ,SAAO,IAAI,IAAI,CAAC;AAAA,QACrD,uBAAU,UAAQ,KAAK,WAAO,qBAAQ,SAAO,IAAI,KAAK,CAAC;AAAA,QACvD,uBAAU,UAAQ,KAAK,UAAM,qBAAQ,SAAO,IAAI,IAAI,CAAC;AAAA,EAAC;AAC9D;AAzBgB;;;ADDT,IAAM,aAAS,2BAAa;AAAA,EACjC,yBAAqB,yBAAQ;AAC/B,CAAC;AAED,mBAAmB,MAAM;;;AJKlB,IAAM,gBAAN,MAAM,cAAqC;AAAA,EAIhD,YAAY,YAA4B,aAA6B;AACnE,SAAK,aAAa;AAClB,SAAK,cAAc;AAAA,EACrB;AAAA,EAEA,MAAa,aAA4B;AACvC,cAAM,qCAAmB,KAAK,YAAY,CAAC,SAAS,KAAK,OAAO,CAAC;AAAA,EACnE;AAAA,EAEA,MAAM,QACJ,UACA,eAIC;AACD,UAAM,EAAE,KAAK,IAAI;AAEjB,UAAM,OAAO,MAAM,iBAAiB,UAAU,KAAK,UAAU;AAE7D,QAAI,SAAS,8BAAS,SAAS,eAAe;AAC5C,YAAM,oBAAoB,aAAa;AAAA,IACzC;AAEA,UAAM,QAAQ,KAAK,eAAe,IAAI;AAEtC,UAAM,UAAU,OAAO,IAAI,KAAK,MAAM,iCAAY,OAAO;AAEzD,WAAO,EAAE,OAAO,MAAM,QAAQ;AAAA,EAChC;AAAA,EAEQ,eAAe,MAGrB;AACA,UAAM,cAAc,KAAK,YAAY,oBAAoB,KAAK,IAAI;AAClE,UAAM,eAAe,KAAK,YAAY,qBAAqB,KAAK,IAAI;AACpE,SAAK,uBAAuB,MAAM,YAAY;AAC9C,WAAO,EAAE,aAAa,aAAa;AAAA,EACrC;AAAA,EAEA,MAAc,uBACZ,MACA,cACe;AACf,SAAK,eAAe;AACpB,UAAM,KAAK,WAAW,OAAO,KAAK,IAAI,EAAE,aAAa,CAAC;AAAA,EACxD;AACF;AApDkD;AAA3C,IAAM,eAAN;;;AOdP,IAAAC,mBAAiD;AACjD,IAAAC,UAAwB;AACxB,IAAAC,uBAAiD;AAQ1C,IAAM,mBAAN,MAAM,iBAAwC;AAAA,EAInD,YAAY,YAA4B;AAFxC,SAAiB,cAAc;AAG7B,SAAK,aAAa;AAAA,EACpB;AAAA,EAEA,MAAa,aAA4B;AACvC,cAAM,qCAAmB,KAAK,YAAY,CAAC,SAAS,KAAK,OAAO,CAAC;AAAA,EACnE;AAAA,EAEA,MAAa,QACX,OACA,MACA,UACA,OAAiB,8BAAS,OACL;AACrB,QAAI;AACF,YAAM,gBAAgB,KAAK,iBAAiB;AAAA,QAC1C;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,MACF,CAAC;AAED,YAAM,oBAAoB,eAAe,KAAK,UAAU;AAExD,YAAM,iBAAiB,MAAM,KAAK,aAAa,cAAc,QAAQ;AACrE,YAAM,aAAa,MAAM,KAAK;AAAA,QAC5B;AAAA,QACA;AAAA,MACF;AAEA,aAAO,MAAM,KAAK,WAAW,OAAO,UAAU;AAAA,IAChD,SAAS,OAAO;AACd,YAAM,iBAAiB,QAAQ,QAAQ,IAAI,MAAM,qBAAqB;AAAA,IACxE;AAAA,EACF;AAAA,EAEQ,iBAAiB,KAA+B;AACtD,WAAO;AAAA,MACL,MAAM,IAAI,KAAK,KAAK;AAAA,MACpB,OAAO,IAAI,MAAM,KAAK,EAAE,YAAY;AAAA,MACpC,MAAM,IAAI;AAAA,MACV,UAAU,IAAI,SAAS,KAAK;AAAA,IAC9B;AAAA,EACF;AAAA,EAEA,MAAc,aAAa,UAAmC;AAC5D,WAAO,MAAa,aAAK,UAAU,KAAK,WAAW;AAAA,EACrD;AAAA,EAEA,MAAc,iBACZ,KACA,gBACqB;AACrB,UAAM,aAAa,OAAO,IAAI,KAAK,aAAa,+BAAU;AAC1D,eAAW,WAAW;AAEtB,UAAM,aAAa,OAAO,IAAI,KAAK,aAAa,+BAAU;AAC1D,eAAW,KAAK,YAAY,WAAW;AACvC,eAAW,OAAO;AAElB,WAAO;AAAA,EACT;AACF;AAlEqD;AAA9C,IAAM,kBAAN;;;ACVP,IAAAC,mBAAiD;AAO1C,IAAM,uBAAN,MAAM,qBAA4C;AAAA,EAIvD,YAAY,YAA4B,SAAyB;AAC/D,SAAK,aAAa;AAClB,SAAK,UAAU;AAAA,EACjB;AAAA,EAEA,MAAa,aAA4B;AACvC,cAAM,qCAAmB,KAAK,YAAY,CAAC,SAAS,KAAK,OAAO,CAAC;AAAA,EACnE;AAAA,EAEA,MAAM,QACJ,cAC+D;AAC/D,QAAI;AACF,YAAM,UAAU,MAAM,KAAK,QAAQ,mBAAmB,YAAY;AAElE,YAAM,OAAO,QAAQ,SACjB,MAAM,KAAK,WAAW,SAAS,QAAQ,MAAM,IAC7C;AAEJ,UAAI,CAAC,QAAQ,KAAK,iBAAiB,cAAc;AAC/C,eAAO;AAAA,MACT;AAEA,YAAM,cAAc,KAAK,QAAQ,oBAAoB,KAAK,IAAI;AAC9D,YAAM,kBAAkB,KAAK,QAAQ,qBAAqB,KAAK,IAAI;AAEnE,YAAM,KAAK,WAAW,OAAO,KAAK,IAAI;AAAA,QACpC,cAAc;AAAA,MAChB,CAAC;AAED,aAAO,EAAE,aAAa,cAAc,gBAAgB;AAAA,IACtD,SAAS,OAAO;AACd,aAAO;AAAA,IACT;AAAA,EACF;AAAA,EAEA,MAAM,YAAY,OAAuC;AACvD,WAAO,MAAM,KAAK,QAAQ,kBAAkB,KAAK;AAAA,EACnD;AACF;AA3CyD;AAAlD,IAAM,sBAAN;;;ACMA,IAAM,kBAAN,MAAM,gBAAe;AAAA,EAK1B,YACE,cACA,iBACA,qBACA;AAMF,iBAAQ,8BAAO,KAAc,KAAe,SAAuB;AACjE,UAAI;AACF,cAAM,EAAE,eAAe,GAAG,SAAS,IAAc,IAAI;AACrD,cAAM,SAAS,MAAM,KAAK,aAAa,QAAQ,UAAU,aAAa;AACtE,YAAI,OAAO,GAAG,EAAE,KAAK,MAAM;AAAA,MAC7B,SAAS,OAAO;AACd,aAAK,KAAK;AAAA,MACZ;AAAA,IACF,GARQ;AAUR,oBAAW,8BACT,KACA,KACA,SACkB;AAClB,UAAI;AACF,cAAM,EAAE,OAAO,MAAM,UAAU,KAAK,IAAiB,IAAI;AACzD,cAAM,KAAK,gBAAgB,QAAQ,OAAO,MAAM,UAAU,IAAI;AAAA,MAChE,SAAS,OAAO;AACd,aAAK,KAAK;AAAA,MACZ;AAAA,IACF,GAXW;AAaX,wBAAe,8BAAO,KAAc,QAAkB;AACpD,YAAM,EAAE,aAAa,IAA0B,IAAI;AACnD,YAAM,SAAS,MAAM,KAAK,oBAAoB,QAAQ,YAAY;AAClE,UAAI,KAAK,MAAM;AAAA,IACjB,GAJe;AAMf,uBAAc,8BAAO,UAA0C;AAC7D,aAAO,MAAM,KAAK,oBAAoB,YAAY,KAAK;AAAA,IACzD,GAFc;AAlCZ,SAAK,eAAe;AACpB,SAAK,kBAAkB;AACvB,SAAK,sBAAsB;AAAA,EAC7B;AAkCF;AA/C4B;AAArB,IAAM,iBAAN;;;ACbP,IAAAC,mBAAyE;AAIlE,IAAM,kBAAN,MAAM,wBACH,gCAEV;AAAA,EACE,YAAY,YAAoC;AAC9C,UAAM,UAAU;AAAA,EAClB;AAAA,EAEA,MAAM,YAAY,OAA2C;AAC3D,WAAO,MAAM,KAAK,WAAW,QAAQ;AAAA,MACnC,OAAO,EAAE,MAAM;AAAA,MACf,WAAW,CAAC,OAAO;AAAA,IACrB,CAAC;AAAA,EACH;AAAA,EAEA,MAAM,OAAO,QAA4D;AACvE,WAAO,MAAM,OAAO,MAAM;AAAA,EAC5B;AACF;AAfA;AAHO,IAAM,iBAAN;;;ACJP,UAAqB;AACrB,IAAAC,UAAwB;AACxB,IAAAC,mBAAiD;AAe1C,IAAM,kBAAN,MAAM,gBAAqD;AAAA,EAIhE,YAAY,YAA4B,QAAqB;AAC3D,SAAK,aAAa;AAClB,SAAK,YAAY;AAAA,MACf,mBACE,QAAQ,IAAI,qBAAqB;AAAA,MACnC,oBACE,QAAQ,IAAI,sBAAsB;AAAA,MACpC,mBAAmB;AAAA,MACnB,oBAAoB;AAAA,IACtB;AACA,QAAI,QAAQ;AACV,WAAK,YAAY;AAAA,QACf,GAAG,KAAK;AAAA,QACR,GAAG;AAAA,MACL;AAAA,IACF;AAEA,SAAK,sBAAsB;AAAA,EAC7B;AAAA,EAEA,MAAa,aAA4B;AACvC,cAAM,qCAAmB,KAAK,YAAY,CAAC,SAAS,KAAK,OAAO,CAAC;AAAA,EACnE;AAAA,EAEQ,wBAA8B;AACpC,QACE,CAAC,KAAK,UAAU,qBAChB,CAAC,KAAK,UAAU,oBAChB;AACA,YAAM,IAAI;AAAA,QACR;AAAA,MACF;AAAA,IACF;AAAA,EACF;AAAA,EAEA,MAAM,aACJ,OACA,UAC4B;AAC5B,QAAI;AACF,YAAM,OAAO,MAAM,KAAK,WAAW,YAAY,KAAK;AAEpD,UAAI,CAAC,MAAM;AACT,cAAM,IAAI;AAAA,UACR;AAAA,QACF;AAAA,MACF;AAEA,YAAM,kBAAkB,MAAa,gBAAQ,UAAU,KAAK,QAAQ;AACpE,UAAI,CAAC,iBAAiB;AACpB,cAAM,IAAI;AAAA,UACR;AAAA,QACF;AAAA,MACF;AAEA,aAAO;AAAA,IACT,SAAS,OAAY;AACnB,UAAI,iBAAiB,iBAAiB,iBAAiB,gBAAgB;AACrE,cAAM;AAAA,MACR;AACA,YAAM,IAAI,MAAM,0BAA0B,MAAM,OAAO,EAAE;AAAA,IAC3D;AAAA,EACF;AAAA,EAEA,oBAAoB,MAA0B;AAC5C,WAAW;AAAA,MACT;AAAA,QACE,QAAQ,KAAK;AAAA,QACb,OAAO,KAAK;AAAA,QACZ,MAAM,KAAK;AAAA,MACb;AAAA,MACA,KAAK,UAAU;AAAA,MACf,EAAE,WAAW,KAAK,UAAU,kBAAkB;AAAA,IAChD;AAAA,EACF;AAAA,EAEA,qBAAqB,MAA0B;AAC7C,WAAW,SAAK,EAAE,QAAQ,KAAK,GAAG,GAAG,KAAK,UAAU,oBAAoB;AAAA,MACtE,WAAW,KAAK,UAAU;AAAA,IAC5B,CAAC;AAAA,EACH;AAAA,EAEA,MAAM,kBAAkB,OAAuC;AAC7D,WAAO,KAAK,YAAY,OAAO,KAAK,UAAU,iBAAiB;AAAA,EACjE;AAAA,EAEA,MAAM,mBAAmB,OAAuC;AAC9D,WAAO,KAAK,YAAY,OAAO,KAAK,UAAU,kBAAkB;AAAA,EAClE;AAAA,EAEA,MAAc,YACZ,OACA,QACwB;AACxB,QAAI;AACF,aAAW,WAAO,OAAO,MAAM;AAAA,IACjC,SAAS,OAAO;AACd,UACE,iBAAqB,yBACrB,iBAAqB,uBACrB;AACA,cAAM,IAAI,kBAAkB;AAAA,MAC9B;AACA,YAAM,IAAI,kBAAkB;AAAA,IAC9B;AAAA,EACF;AACF;AA9GkE;AAA3D,IAAM,iBAAN;;;AZLP,SAAS,oBAAoB,UAAwB;AACnD,QAAM,YAAY,IAAI,+BAAc,EAAE,SAAS,CAAC;AAEhD,QAAM,iBAAiB,IAAI;AAAA,IACzB,SAAS,cAAc,+BAAU;AAAA,EACnC;AACA,YAAU,mBAA+B,kBAAkB,cAAc;AAEzE,QAAM,iBAAiB,IAAI,eAAe,cAAc;AACxD,YAAU,gBAAgB,kBAAkB,cAAc;AAE1D,QAAM,eAAe,IAAI,aAAa,gBAAgB,cAAc;AACpE,QAAM,kBAAkB,IAAI,gBAAgB,cAAc;AAC1D,QAAM,sBAAsB,IAAI;AAAA,IAC9B;AAAA,IACA;AAAA,EACF;AACA,YAAU,gBAAgB,gBAAgB,YAAY;AACtD,YAAU,gBAAgB,mBAAmB,eAAe;AAC5D,YAAU,gBAAgB,uBAAuB,mBAAmB;AAEpE,QAAM,iBAAiB,IAAI;AAAA,IACzB;AAAA,IACA;AAAA,IACA;AAAA,EACF;AAEA,SAAO,EAAE,WAAW,eAAe;AACrC;AA5BS;","names":["import_cca_core","import_cca_entities","import_cca_core","import_cca_entities","bcrypt","import_core","import_classes","import_cca_entities","mapper","import_cca_core","bcrypt","import_cca_entities","import_cca_core","import_cca_core","bcrypt","import_cca_core"]}
|