cca-auth-module 0.1.19 → 0.1.20

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -3,18 +3,25 @@ import { AuthRepository } from "../../infrastructure/repository/AuthRepository";
3
3
  import { JwtAuthService } from "../../infrastructure/auth/JwtAuthService";
4
4
  import { UserDTO } from "../dtos/UserDTO";
5
5
  import { LoginDTO } from "../dtos/LoginDTO";
6
+ interface TokenPair {
7
+ accessToken: string;
8
+ refreshToken: string;
9
+ }
10
+ interface LoginResponse {
11
+ token: TokenPair;
12
+ user: UserDTO;
13
+ }
6
14
  export declare class LoginUseCase implements IBaseService {
7
15
  private readonly repository;
8
16
  private readonly authService;
9
17
  constructor(repository: AuthRepository, authService: JwtAuthService);
10
18
  initialize(): Promise<void>;
11
- execute(loginDTO: LoginDTO, adminPassword?: string): Promise<{
12
- token: {
13
- accessToken: string;
14
- refreshToken: string;
15
- };
16
- user: UserDTO;
17
- }>;
19
+ execute(loginDTO: LoginDTO, adminPassword?: string): Promise<LoginResponse>;
20
+ private validateLogin;
21
+ private handleAuthentication;
18
22
  private generateTokens;
23
+ private updateUserStatus;
19
24
  private updateUserRefreshToken;
25
+ private mapUserToDTO;
20
26
  }
27
+ export {};
@@ -0,0 +1,8 @@
1
+ import { IBaseService } from "cca-core";
2
+ import { AuthRepository } from "../../infrastructure/repository/AuthRepository";
3
+ export declare class LogoutUseCase implements IBaseService {
4
+ private readonly repository;
5
+ constructor(repository: AuthRepository);
6
+ initialize(): Promise<void>;
7
+ execute(authId: string): Promise<void>;
8
+ }
@@ -6,7 +6,7 @@ export declare class RegisterUseCase implements IBaseService {
6
6
  private readonly SALT_ROUNDS;
7
7
  constructor(repository: AuthRepository);
8
8
  initialize(): Promise<void>;
9
- execute(email: string, name: string, password: string, role?: UserRole): Promise<AuthEntity>;
9
+ execute(email: string, name: string, password: string, role?: UserRole, adminPassword?: string): Promise<AuthEntity>;
10
10
  private normalizeAuthDTO;
11
11
  private hashPassword;
12
12
  private createAuthEntity;
package/dist/index.d.mts CHANGED
@@ -16,7 +16,7 @@ declare class RegisterUseCase implements IBaseService {
16
16
  private readonly SALT_ROUNDS;
17
17
  constructor(repository: AuthRepository);
18
18
  initialize(): Promise<void>;
19
- execute(email: string, name: string, password: string, role?: UserRole): Promise<AuthEntity>;
19
+ execute(email: string, name: string, password: string, role?: UserRole, adminPassword?: string): Promise<AuthEntity>;
20
20
  private normalizeAuthDTO;
21
21
  private hashPassword;
22
22
  private createAuthEntity;
@@ -74,20 +74,33 @@ declare class LoginDTO {
74
74
  role: UserRole;
75
75
  }
76
76
 
77
+ interface TokenPair {
78
+ accessToken: string;
79
+ refreshToken: string;
80
+ }
81
+ interface LoginResponse {
82
+ token: TokenPair;
83
+ user: UserDTO;
84
+ }
77
85
  declare class LoginUseCase implements IBaseService {
78
86
  private readonly repository;
79
87
  private readonly authService;
80
88
  constructor(repository: AuthRepository, authService: JwtAuthService);
81
89
  initialize(): Promise<void>;
82
- execute(loginDTO: LoginDTO, adminPassword?: string): Promise<{
83
- token: {
84
- accessToken: string;
85
- refreshToken: string;
86
- };
87
- user: UserDTO;
88
- }>;
90
+ execute(loginDTO: LoginDTO, adminPassword?: string): Promise<LoginResponse>;
91
+ private validateLogin;
92
+ private handleAuthentication;
89
93
  private generateTokens;
94
+ private updateUserStatus;
90
95
  private updateUserRefreshToken;
96
+ private mapUserToDTO;
97
+ }
98
+
99
+ declare class LogoutUseCase implements IBaseService {
100
+ private readonly repository;
101
+ constructor(repository: AuthRepository);
102
+ initialize(): Promise<void>;
103
+ execute(authId: string): Promise<void>;
91
104
  }
92
105
 
93
106
  declare class RefreshTokenUseCase implements IBaseService {
@@ -104,10 +117,12 @@ declare class RefreshTokenUseCase implements IBaseService {
104
117
 
105
118
  declare class AuthController {
106
119
  private loginUseCase;
120
+ private readonly logoutUseCase;
107
121
  private registerUseCase;
108
122
  private refreshTokenUseCase;
109
- constructor(loginUseCase: LoginUseCase, registerUseCase: RegisterUseCase, refreshTokenUseCase: RefreshTokenUseCase);
123
+ constructor(loginUseCase: LoginUseCase, logoutUseCase: LogoutUseCase, registerUseCase: RegisterUseCase, refreshTokenUseCase: RefreshTokenUseCase);
110
124
  login: (req: Request, res: Response, next: NextFunction) => Promise<void>;
125
+ logout: (req: Request, res: Response, next: NextFunction) => Promise<void>;
111
126
  register: (req: Request, res: Response, next: NextFunction) => Promise<void>;
112
127
  refreshToken: (req: Request, res: Response) => Promise<void>;
113
128
  verifyToken: (token: string) => Promise<IDecodedToken>;
package/dist/index.d.ts CHANGED
@@ -16,7 +16,7 @@ declare class RegisterUseCase implements IBaseService {
16
16
  private readonly SALT_ROUNDS;
17
17
  constructor(repository: AuthRepository);
18
18
  initialize(): Promise<void>;
19
- execute(email: string, name: string, password: string, role?: UserRole): Promise<AuthEntity>;
19
+ execute(email: string, name: string, password: string, role?: UserRole, adminPassword?: string): Promise<AuthEntity>;
20
20
  private normalizeAuthDTO;
21
21
  private hashPassword;
22
22
  private createAuthEntity;
@@ -74,20 +74,33 @@ declare class LoginDTO {
74
74
  role: UserRole;
75
75
  }
76
76
 
77
+ interface TokenPair {
78
+ accessToken: string;
79
+ refreshToken: string;
80
+ }
81
+ interface LoginResponse {
82
+ token: TokenPair;
83
+ user: UserDTO;
84
+ }
77
85
  declare class LoginUseCase implements IBaseService {
78
86
  private readonly repository;
79
87
  private readonly authService;
80
88
  constructor(repository: AuthRepository, authService: JwtAuthService);
81
89
  initialize(): Promise<void>;
82
- execute(loginDTO: LoginDTO, adminPassword?: string): Promise<{
83
- token: {
84
- accessToken: string;
85
- refreshToken: string;
86
- };
87
- user: UserDTO;
88
- }>;
90
+ execute(loginDTO: LoginDTO, adminPassword?: string): Promise<LoginResponse>;
91
+ private validateLogin;
92
+ private handleAuthentication;
89
93
  private generateTokens;
94
+ private updateUserStatus;
90
95
  private updateUserRefreshToken;
96
+ private mapUserToDTO;
97
+ }
98
+
99
+ declare class LogoutUseCase implements IBaseService {
100
+ private readonly repository;
101
+ constructor(repository: AuthRepository);
102
+ initialize(): Promise<void>;
103
+ execute(authId: string): Promise<void>;
91
104
  }
92
105
 
93
106
  declare class RefreshTokenUseCase implements IBaseService {
@@ -104,10 +117,12 @@ declare class RefreshTokenUseCase implements IBaseService {
104
117
 
105
118
  declare class AuthController {
106
119
  private loginUseCase;
120
+ private readonly logoutUseCase;
107
121
  private registerUseCase;
108
122
  private refreshTokenUseCase;
109
- constructor(loginUseCase: LoginUseCase, registerUseCase: RegisterUseCase, refreshTokenUseCase: RefreshTokenUseCase);
123
+ constructor(loginUseCase: LoginUseCase, logoutUseCase: LogoutUseCase, registerUseCase: RegisterUseCase, refreshTokenUseCase: RefreshTokenUseCase);
110
124
  login: (req: Request, res: Response, next: NextFunction) => Promise<void>;
125
+ logout: (req: Request, res: Response, next: NextFunction) => Promise<void>;
111
126
  register: (req: Request, res: Response, next: NextFunction) => Promise<void>;
112
127
  refreshToken: (req: Request, res: Response) => Promise<void>;
113
128
  verifyToken: (token: string) => Promise<IDecodedToken>;
package/dist/index.js CHANGED
@@ -45,7 +45,7 @@ __export(index_exports, {
45
45
  module.exports = __toCommonJS(index_exports);
46
46
 
47
47
  // src/infrastructure/container/createAuthContainer.ts
48
- var import_cca_core7 = require("cca-core");
48
+ var import_cca_core8 = require("cca-core");
49
49
  var import_cca_entities5 = require("cca-entities");
50
50
 
51
51
  // src/application/useCase/LoginUseCase.ts
@@ -293,31 +293,70 @@ var _LoginUseCase = class _LoginUseCase {
293
293
  await (0, import_cca_core2.validateRepository)(this.repository, (repo) => repo.getAll());
294
294
  }
295
295
  async execute(loginDTO, adminPassword) {
296
- const { role } = loginDTO;
296
+ const auth = await this.validateLogin(loginDTO, adminPassword);
297
+ const token = await this.handleAuthentication(auth);
298
+ const userDTO = this.mapUserToDTO(auth.user);
299
+ return { token, user: userDTO };
300
+ }
301
+ async validateLogin(loginDTO, adminPassword) {
297
302
  const auth = await validateLoginDTO(loginDTO, this.repository);
298
- if (role === import_cca_entities3.UserRole.ADMIN && adminPassword) {
303
+ if (loginDTO.role === import_cca_entities3.UserRole.ADMIN && adminPassword) {
299
304
  await validateAdminSecret(adminPassword);
300
305
  }
306
+ return auth;
307
+ }
308
+ async handleAuthentication(auth) {
301
309
  const token = this.generateTokens(auth);
302
- const userDTO = mapper.map(auth.user, import_cca_entities3.UserEntity, UserDTO);
303
- return { token, user: userDTO };
310
+ await this.updateUserStatus(auth);
311
+ await this.updateUserRefreshToken(auth, token.refreshToken);
312
+ return token;
304
313
  }
305
314
  generateTokens(auth) {
306
- const accessToken = this.authService.generateAccessToken(auth.user);
307
- const refreshToken = this.authService.generateRefreshToken(auth.user);
308
- this.updateUserRefreshToken(auth, refreshToken);
309
- return { accessToken, refreshToken };
315
+ return {
316
+ accessToken: this.authService.generateAccessToken(auth.user),
317
+ refreshToken: this.authService.generateRefreshToken(auth.user)
318
+ };
319
+ }
320
+ async updateUserStatus(auth) {
321
+ auth.user.lastLoginAt = /* @__PURE__ */ new Date();
322
+ auth.user.isActive = true;
323
+ await this.repository.update(auth.id, auth);
310
324
  }
311
325
  async updateUserRefreshToken(auth, refreshToken) {
312
326
  auth.refreshToken = refreshToken;
313
327
  await this.repository.update(auth.id, { refreshToken });
314
328
  }
329
+ mapUserToDTO(user) {
330
+ return mapper.map(user, import_cca_entities3.UserEntity, UserDTO);
331
+ }
315
332
  };
316
333
  __name(_LoginUseCase, "LoginUseCase");
317
334
  var LoginUseCase = _LoginUseCase;
318
335
 
319
- // src/application/useCase/RegisterUseCase.ts
336
+ // src/application/useCase/LogoutUseCase .ts
320
337
  var import_cca_core3 = require("cca-core");
338
+ var _LogoutUseCase = class _LogoutUseCase {
339
+ constructor(repository) {
340
+ this.repository = repository;
341
+ }
342
+ async initialize() {
343
+ await (0, import_cca_core3.validateRepository)(this.repository, (repo) => repo.getAll());
344
+ }
345
+ async execute(authId) {
346
+ const auth = await this.repository.findById(authId);
347
+ if (!auth) {
348
+ throw new Error("Auth not found");
349
+ }
350
+ auth.refreshToken = null;
351
+ auth.user.isActive = false;
352
+ await this.repository.update(auth.id, auth);
353
+ }
354
+ };
355
+ __name(_LogoutUseCase, "LogoutUseCase");
356
+ var LogoutUseCase = _LogoutUseCase;
357
+
358
+ // src/application/useCase/RegisterUseCase.ts
359
+ var import_cca_core4 = require("cca-core");
321
360
  var bcrypt2 = __toESM(require("bcrypt"));
322
361
  var import_cca_entities4 = require("cca-entities");
323
362
  var _RegisterUseCase = class _RegisterUseCase {
@@ -326,16 +365,20 @@ var _RegisterUseCase = class _RegisterUseCase {
326
365
  this.repository = repository;
327
366
  }
328
367
  async initialize() {
329
- await (0, import_cca_core3.validateRepository)(this.repository, (repo) => repo.getAll());
368
+ await (0, import_cca_core4.validateRepository)(this.repository, (repo) => repo.getAll());
330
369
  }
331
- async execute(email, name, password, role = import_cca_entities4.UserRole.GUEST) {
370
+ async execute(email, name, password, role = import_cca_entities4.UserRole.GUEST, adminPassword) {
332
371
  try {
333
372
  const normalizedDTO = this.normalizeAuthDTO({
334
373
  email,
335
374
  name,
336
375
  password,
337
- role
376
+ role,
377
+ adminPassword
338
378
  });
379
+ if (role === import_cca_entities4.UserRole.ADMIN && adminPassword) {
380
+ await validateAdminSecret(adminPassword);
381
+ }
339
382
  await validateRegisterDTO(normalizedDTO, this.repository);
340
383
  const hashedPassword = await this.hashPassword(normalizedDTO.password);
341
384
  const authEntity = await this.createAuthEntity(
@@ -352,7 +395,8 @@ var _RegisterUseCase = class _RegisterUseCase {
352
395
  name: dto.name.trim(),
353
396
  email: dto.email.trim().toLowerCase(),
354
397
  role: dto.role,
355
- password: dto.password.trim()
398
+ password: dto.password.trim(),
399
+ adminPassword: dto.adminPassword?.trim()
356
400
  };
357
401
  }
358
402
  async hashPassword(password) {
@@ -372,14 +416,14 @@ __name(_RegisterUseCase, "RegisterUseCase");
372
416
  var RegisterUseCase = _RegisterUseCase;
373
417
 
374
418
  // src/application/useCase/RefreshTokenUseCase.ts
375
- var import_cca_core4 = require("cca-core");
419
+ var import_cca_core5 = require("cca-core");
376
420
  var _RefreshTokenUseCase = class _RefreshTokenUseCase {
377
421
  constructor(repository, service) {
378
422
  this.repository = repository;
379
423
  this.service = service;
380
424
  }
381
425
  async initialize() {
382
- await (0, import_cca_core4.validateRepository)(this.repository, (repo) => repo.getAll());
426
+ await (0, import_cca_core5.validateRepository)(this.repository, (repo) => repo.getAll());
383
427
  }
384
428
  async execute(refreshToken) {
385
429
  try {
@@ -407,7 +451,7 @@ var RefreshTokenUseCase = _RefreshTokenUseCase;
407
451
 
408
452
  // src/presentation/controller/AuthController.ts
409
453
  var _AuthController = class _AuthController {
410
- constructor(loginUseCase, registerUseCase, refreshTokenUseCase) {
454
+ constructor(loginUseCase, logoutUseCase, registerUseCase, refreshTokenUseCase) {
411
455
  this.login = /* @__PURE__ */ __name(async (req, res, next) => {
412
456
  try {
413
457
  const { adminPassword, ...loginDTO } = req.body;
@@ -417,10 +461,18 @@ var _AuthController = class _AuthController {
417
461
  next(error);
418
462
  }
419
463
  }, "login");
464
+ this.logout = /* @__PURE__ */ __name(async (req, res, next) => {
465
+ try {
466
+ await this.logoutUseCase.execute(req.params.id);
467
+ res.status(200).json({ message: "Logged out successfully" });
468
+ } catch (error) {
469
+ next(error);
470
+ }
471
+ }, "logout");
420
472
  this.register = /* @__PURE__ */ __name(async (req, res, next) => {
421
473
  try {
422
- const { email, name, password, role } = req.body;
423
- await this.registerUseCase.execute(email, name, password, role);
474
+ const { email, name, password, role, adminPassword } = req.body;
475
+ await this.registerUseCase.execute(email, name, password, role, adminPassword);
424
476
  } catch (error) {
425
477
  next(error);
426
478
  }
@@ -434,6 +486,7 @@ var _AuthController = class _AuthController {
434
486
  return await this.refreshTokenUseCase.verityToken(token);
435
487
  }, "verifyToken");
436
488
  this.loginUseCase = loginUseCase;
489
+ this.logoutUseCase = logoutUseCase;
437
490
  this.registerUseCase = registerUseCase;
438
491
  this.refreshTokenUseCase = refreshTokenUseCase;
439
492
  }
@@ -442,8 +495,8 @@ __name(_AuthController, "AuthController");
442
495
  var AuthController = _AuthController;
443
496
 
444
497
  // src/infrastructure/repository/AuthRepository.ts
445
- var import_cca_core5 = require("cca-core");
446
- var _AuthRepository = class _AuthRepository extends import_cca_core5.BaseRepository {
498
+ var import_cca_core6 = require("cca-core");
499
+ var _AuthRepository = class _AuthRepository extends import_cca_core6.BaseRepository {
447
500
  constructor(repository) {
448
501
  super(repository);
449
502
  }
@@ -461,7 +514,7 @@ var AuthRepository = _AuthRepository;
461
514
  // src/infrastructure/auth/JwtAuthService.ts
462
515
  var jwt = __toESM(require("jsonwebtoken"));
463
516
  var bcrypt3 = __toESM(require("bcrypt"));
464
- var import_cca_core6 = require("cca-core");
517
+ var import_cca_core7 = require("cca-core");
465
518
  var _JwtAuthService = class _JwtAuthService {
466
519
  constructor(repository, config) {
467
520
  this.repository = repository;
@@ -479,7 +532,7 @@ var _JwtAuthService = class _JwtAuthService {
479
532
  this.validateConfiguration();
480
533
  }
481
534
  async initialize() {
482
- await (0, import_cca_core6.validateRepository)(this.repository, (repo) => repo.getAll());
535
+ await (0, import_cca_core7.validateRepository)(this.repository, (repo) => repo.getAll());
483
536
  }
484
537
  validateConfiguration() {
485
538
  if (!this.jwtConfig?.accessTokenSecret || !this.jwtConfig?.refreshTokenSecret) {
@@ -537,7 +590,7 @@ var JwtAuthService = _JwtAuthService;
537
590
 
538
591
  // src/infrastructure/container/createAuthContainer.ts
539
592
  function createAuthContainer(database) {
540
- const container = new import_cca_core7.BaseContainer({ database });
593
+ const container = new import_cca_core8.BaseContainer({ database });
541
594
  const authRepository = new AuthRepository(
542
595
  database.getRepository(import_cca_entities5.AuthEntity)
543
596
  );
@@ -545,6 +598,7 @@ function createAuthContainer(database) {
545
598
  const jwtAuthService = new JwtAuthService(authRepository);
546
599
  container.registerService("JwtAuthService", jwtAuthService);
547
600
  const loginUseCase = new LoginUseCase(authRepository, jwtAuthService);
601
+ const logoutUseCase = new LogoutUseCase(authRepository);
548
602
  const registerUseCase = new RegisterUseCase(authRepository);
549
603
  const refreshTokenUseCase = new RefreshTokenUseCase(
550
604
  authRepository,
@@ -553,8 +607,10 @@ function createAuthContainer(database) {
553
607
  container.registerService("LoginUseCase", loginUseCase);
554
608
  container.registerService("RegisterUseCase", registerUseCase);
555
609
  container.registerService("RefreshTokenUseCase", refreshTokenUseCase);
610
+ container.registerService("LogoutUseCase", logoutUseCase);
556
611
  const authController = new AuthController(
557
612
  loginUseCase,
613
+ logoutUseCase,
558
614
  registerUseCase,
559
615
  refreshTokenUseCase
560
616
  );
package/dist/index.js.map CHANGED
@@ -1 +1 @@
1
- {"version":3,"sources":["../src/index.ts","../src/infrastructure/container/createAuthContainer.ts","../src/application/useCase/LoginUseCase.ts","../src/application/dtos/UserDTO.ts","../src/application/validators/authValidation.ts","../src/utils/Errors.ts","../src/utils/config.ts","../src/application/mappers/utils/mapper.ts","../src/application/mappers/createUserMappings.ts","../src/application/dtos/RegisterDTO.ts","../src/application/useCase/RegisterUseCase.ts","../src/application/useCase/RefreshTokenUseCase.ts","../src/presentation/controller/AuthController.ts","../src/infrastructure/repository/AuthRepository.ts","../src/infrastructure/auth/JwtAuthService.ts"],"sourcesContent":["import { createAuthContainer } from \"./infrastructure/container/createAuthContainer\";\r\nimport { AuthController } from \"./presentation/controller/AuthController\";\r\n\r\nexport { createAuthContainer, AuthController};\r\n","import { BaseContainer, BaseDatabase } from \"cca-core\";\r\nimport { AuthEntity } from \"cca-entities\";\r\n\r\nimport { LoginUseCase } from \"../../application/useCase/LoginUseCase\";\r\nimport { RegisterUseCase } from \"../../application/useCase/RegisterUseCase\";\r\nimport { RefreshTokenUseCase } from \"../../application/useCase/RefreshTokenUseCase\";\r\n\r\nimport { AuthController } from \"../../presentation/controller/AuthController\";\r\n\r\nimport { AuthRepository } from \"../repository/AuthRepository\";\r\nimport { JwtAuthService } from \"../auth/JwtAuthService\";\r\n\r\nfunction createAuthContainer(database: BaseDatabase) {\r\n const container = new BaseContainer({ database });\r\n\r\n const authRepository = new AuthRepository(\r\n database.getRepository(AuthEntity)\r\n );\r\n container.registerRepository<AuthEntity>(\"AuthRepository\", authRepository);\r\n\r\n const jwtAuthService = new JwtAuthService(authRepository);\r\n container.registerService(\"JwtAuthService\", jwtAuthService);\r\n\r\n const loginUseCase = new LoginUseCase(authRepository, jwtAuthService);\r\n const registerUseCase = new RegisterUseCase(authRepository);\r\n const refreshTokenUseCase = new RefreshTokenUseCase(\r\n authRepository,\r\n jwtAuthService\r\n );\r\n container.registerService(\"LoginUseCase\", loginUseCase);\r\n container.registerService(\"RegisterUseCase\", registerUseCase);\r\n container.registerService(\"RefreshTokenUseCase\", refreshTokenUseCase);\r\n\r\n const authController = new AuthController(\r\n loginUseCase,\r\n registerUseCase,\r\n refreshTokenUseCase\r\n );\r\n\r\n return { container, authController };\r\n}\r\n\r\nexport { createAuthContainer };\r\n","import { IBaseService, validateRepository } from \"cca-core\";\r\nimport { AuthEntity, UserEntity, UserRole } from \"cca-entities\";\r\n\r\nimport { AuthRepository } from \"../../infrastructure/repository/AuthRepository\";\r\nimport { JwtAuthService } from \"../../infrastructure/auth/JwtAuthService\";\r\n\r\nimport { UserDTO } from \"../dtos/UserDTO\";\r\nimport { LoginDTO } from \"../dtos/LoginDTO\";\r\nimport {\r\n validateAdminSecret,\r\n validateLoginDTO,\r\n} from \"../validators/authValidation\";\r\nimport { mapper } from \"../mappers/utils/mapper\";\r\n\r\nexport class LoginUseCase implements IBaseService {\r\n private readonly repository: AuthRepository;\r\n private readonly authService: JwtAuthService;\r\n\r\n constructor(repository: AuthRepository, authService: JwtAuthService) {\r\n this.repository = repository;\r\n this.authService = authService;\r\n }\r\n\r\n public async initialize(): Promise<void> {\r\n await validateRepository(this.repository, (repo) => repo.getAll());\r\n }\r\n\r\n async execute(\r\n loginDTO: LoginDTO,\r\n adminPassword?: string\r\n ): Promise<{\r\n token: { accessToken: string; refreshToken: string };\r\n user: UserDTO;\r\n }> {\r\n const { role } = loginDTO;\r\n\r\n const auth = await validateLoginDTO(loginDTO, this.repository);\r\n\r\n if (role === UserRole.ADMIN && adminPassword) {\r\n await validateAdminSecret(adminPassword);\r\n }\r\n\r\n const token = this.generateTokens(auth);\r\n\r\n const userDTO = mapper.map(auth.user, UserEntity, UserDTO);\r\n\r\n return { token, user: userDTO };\r\n }\r\n\r\n private generateTokens(auth: AuthEntity): {\r\n accessToken: string;\r\n refreshToken: string;\r\n } {\r\n const accessToken = this.authService.generateAccessToken(auth.user);\r\n const refreshToken = this.authService.generateRefreshToken(auth.user);\r\n this.updateUserRefreshToken(auth, refreshToken); \r\n return { accessToken, refreshToken };\r\n }\r\n\r\n private async updateUserRefreshToken(\r\n auth: AuthEntity,\r\n refreshToken: string\r\n ): Promise<void> {\r\n auth.refreshToken = refreshToken;\r\n await this.repository.update(auth.id, { refreshToken });\r\n }\r\n}\r\n","import { AutoMap } from \"@automapper/classes\";\r\nimport { UserRole } from \"cca-entities\";\r\n\r\nexport class UserDTO {\r\n @AutoMap()\r\n id!: string;\r\n\r\n @AutoMap()\r\n name!: string;\r\n\r\n @AutoMap()\r\n email!: string;\r\n\r\n @AutoMap()\r\n role!: UserRole;\r\n\r\n adminPassword?: string;\r\n}","import * as yup from \"yup\";\r\nimport { AuthEntity, UserRole } from \"cca-entities\";\r\nimport bcrypt from \"bcrypt\";\r\n\r\nimport {\r\n ForbiddenError,\r\n NotFoundError,\r\n ValidationError,\r\n} from \"../../utils/Errors\";\r\nimport { AuthRepository } from \"../../infrastructure/repository/AuthRepository\";\r\n\r\nimport { RegisterDTO } from \"../dtos/RegisterDTO\";\r\nimport { LoginDTO } from \"../dtos/LoginDTO\";\r\nimport { getConfig } from \"../../utils/config\";\r\n\r\nconst schemas = {\r\n id: yup.string().uuid(\"Invalid user ID format\"),\r\n email: yup\r\n .string()\r\n .email(\"Invalid email format\")\r\n .max(255, \"Email cannot exceed 255 characters\"),\r\n name: yup\r\n .string()\r\n .required(\"Name is required\")\r\n .min(2, \"Name must be at least 2 characters long\")\r\n .max(50, \"Name cannot exceed 50 characters\")\r\n .matches(/^[a-zA-Z\\s]+$/, \"Name must only contain letters and spaces\"),\r\n password: yup\r\n .string()\r\n .required(\"Password required\")\r\n .min(8, \"Password too short\")\r\n .max(100, \"Password too long\")\r\n .matches(\r\n /^(?=.*[a-z])(?=.*[A-Z])(?=.*\\d)(?=.*[@$!%*?&])[A-Za-z\\d@$!%*?&]/,\r\n \"Password must contain uppercase, lowercase, number and special character\"\r\n ),\r\n role: yup\r\n .string()\r\n .required(\"Role is required\")\r\n .oneOf(Object.values(UserRole), \"Invalid role specified\"),\r\n};\r\n\r\nexport const validateEmail = async (\r\n email: string,\r\n repository: AuthRepository\r\n): Promise<AuthEntity> => {\r\n try {\r\n await schemas.email.validate(email?.trim().toLowerCase());\r\n const user = await repository.findByEmail(email);\r\n if (!user) {\r\n throw new NotFoundError(\r\n \"The email address or password is incorrect. Please retry\"\r\n );\r\n }\r\n return user;\r\n } catch (error: any) {\r\n throw new ValidationError(error.message || \"Invalid email format\");\r\n }\r\n};\r\n\r\nexport const validatePassword = async (password?: string): Promise<void> => {\r\n if (password) {\r\n try {\r\n await schemas.password.validate(password);\r\n } catch (error: any) {\r\n throw new ValidationError(error.message || \"Invalid password format\");\r\n }\r\n }\r\n};\r\n\r\nexport const validateEmailUniqueness = async (\r\n repository: AuthRepository,\r\n email: string,\r\n excludeUserId?: string\r\n): Promise<void> => {\r\n try {\r\n await schemas.email.validate(email?.trim().toLowerCase());\r\n\r\n const existingUser = await repository.findByEmail(email);\r\n\r\n if (!existingUser) return;\r\n if (existingUser.id === excludeUserId) return;\r\n\r\n throw new ValidationError(`Email ${email} is already in use.`);\r\n } catch (error: any) {\r\n if (error instanceof ValidationError) {\r\n throw error;\r\n }\r\n throw new ValidationError(\"user email validation failed\");\r\n }\r\n};\r\n\r\nexport const validateRegisterDTO = async (\r\n auth: RegisterDTO,\r\n repository: AuthRepository\r\n): Promise<void> => {\r\n const { name, email, role, password } = auth;\r\n\r\n await Promise.all([\r\n schemas.name.validate(name),\r\n schemas.role.validate(role),\r\n validateEmailUniqueness(repository, email),\r\n validatePassword(password),\r\n ]);\r\n};\r\n\r\nexport const validateLoginDTO = async (\r\n data: LoginDTO,\r\n repository: AuthRepository\r\n): Promise<AuthEntity> => {\r\n const { email, role, password } = data;\r\n\r\n await Promise.all([schemas.role.validate(role), schemas.password.validate(password)]);\r\n\r\n const auth = await validateEmail(email, repository);\r\n if (!auth || !auth.password) {\r\n throw new NotFoundError(\"Invalid credentials\");\r\n }\r\n\r\n const isMatch = await bcrypt.compare(password, auth.password);\r\n if (!isMatch) {\r\n throw new ForbiddenError(\"Invalid credentials\");\r\n }\r\n\r\n return auth;\r\n};\r\n\r\nexport const validateAdminSecret = async (\r\n secretPassword?: string\r\n): Promise<void> => {\r\n if (!secretPassword) {\r\n throw new ValidationError(\"Admin password is required\");\r\n }\r\n\r\n try {\r\n const config = await getConfig();\r\n\r\n if (!config.ADMIN_SECRET_PASSWORD) {\r\n throw new ValidationError(\"ADMIN_SECRET_PASSWORD not found in config\");\r\n }\r\n\r\n if (parseInt(secretPassword) !== config.ADMIN_SECRET_PASSWORD) {\r\n throw new ValidationError(\"Invalid admin password\");\r\n }\r\n } catch (error) {\r\n if (error instanceof ValidationError) {\r\n throw error;\r\n }\r\n throw new ValidationError(\"Error validating admin password\");\r\n }\r\n};\r\n","export class AppError extends Error {\r\n constructor(\r\n public message: string,\r\n public statusCode: number = 500,\r\n public name: string = \"AppError\"\r\n ) {\r\n super(message);\r\n Object.setPrototypeOf(this, new.target.prototype);\r\n Error.captureStackTrace(this);\r\n }\r\n}\r\n\r\nexport class ValidationError extends AppError {\r\n constructor(message: string) {\r\n super(message, 400);\r\n this.name = \"ValidationError\";\r\n }\r\n}\r\n\r\nexport class ConfigNotFoundException extends AppError {\r\n constructor(message: string) {\r\n super(message);\r\n this.name = \"ConfigNotFoundException\";\r\n }\r\n}\r\n\r\nexport class NotFoundError extends AppError {\r\n constructor(message: string) {\r\n super(message, 404, \"UserNotFoundError\");\r\n }\r\n}\r\n\r\nexport class ForbiddenError extends AppError {\r\n constructor(message: string = \"Forbidden access\") {\r\n super(message, 403);\r\n this.name = \"ForbiddenError\";\r\n }\r\n}\r\n\r\nexport class UnauthorizedError extends AppError {\r\n constructor(message: string = \"Unauthorized access\") {\r\n super(message, 401);\r\n this.name = \"UnauthorizedError\";\r\n }\r\n}\r\n\r\nexport class JwtError extends AppError {\r\n constructor(message: string) {\r\n super(message, 401);\r\n this.name = \"JwtError\";\r\n }\r\n}","import { findConfig } from \"cca-core\";\r\n\r\nexport const getConfig = async (): Promise<any> => {\r\n const configPath = await findConfig({\r\n fileName: \"cca.config.json\",\r\n maxDepth: 10,\r\n startPath: process.cwd(),\r\n });\r\n const configContent = await import(\"fs/promises\").then((fs) =>\r\n fs.readFile(configPath, \"utf-8\")\r\n );\r\n\r\n return JSON.parse(configContent);\r\n}","import { createMapper } from '@automapper/core';\r\nimport { classes } from '@automapper/classes';\r\n\r\nimport { createUserMappings } from '../createUserMappings';\r\n\r\nexport const mapper = createMapper({\r\n strategyInitializer: classes(),\r\n});\r\n\r\ncreateUserMappings(mapper);\r\n","import { Mapper, createMap, forMember, mapFrom } from '@automapper/core';\r\nimport { AuthEntity, UserEntity } from 'cca-entities';\r\n\r\nimport { RegisterDTO } from '../dtos/RegisterDTO';\r\nimport { UserDTO } from '../dtos/UserDTO';\r\n\r\nexport function createUserMappings(mapper: Mapper): void {\r\n createMap(\r\n mapper, \r\n RegisterDTO,\r\n AuthEntity,\r\n forMember(dest => dest.email, mapFrom(src => src.email)),\r\n forMember(dest => dest.password, mapFrom(src => src.password)),\r\n forMember(dest => dest.role, mapFrom(src => src.role)));\r\n\r\n createMap(\r\n mapper, \r\n RegisterDTO,\r\n UserEntity,\r\n forMember(dest => dest.name, mapFrom(src => src.name)),\r\n forMember(dest => dest.email, mapFrom(src => src.email)),\r\n forMember(dest => dest.role, mapFrom(src => src.role)));\r\n\r\n createMap(\r\n mapper,\r\n UserEntity,\r\n UserDTO,\r\n forMember(dest => dest.id, mapFrom(src => src.id)),\r\n forMember(dest => dest.name, mapFrom(src => src.name)),\r\n forMember(dest => dest.email, mapFrom(src => src.email)),\r\n forMember(dest => dest.role, mapFrom(src => src.role)));\r\n}","import { UserRole } from \"cca-entities\";\r\n\r\nexport class RegisterDTO {\r\n email!: string;\r\n name!: string;\r\n password!: string;\r\n role!: UserRole;\r\n adminPassword?: string;\r\n}\r\n","import { IBaseService, validateRepository } from \"cca-core\";\r\nimport * as bcrypt from \"bcrypt\";\r\nimport { AuthEntity, UserEntity, UserRole } from \"cca-entities\";\r\n\r\nimport { AuthRepository } from \"../../infrastructure/repository/AuthRepository\";\r\n\r\nimport { mapper } from \"../mappers/utils/mapper\";\r\nimport { RegisterDTO } from \"../dtos/RegisterDTO\";\r\nimport { validateRegisterDTO } from \"../validators/authValidation\";\r\n\r\nexport class RegisterUseCase implements IBaseService {\r\n private readonly repository: AuthRepository;\r\n private readonly SALT_ROUNDS = 10;\r\n\r\n constructor(repository: AuthRepository) {\r\n this.repository = repository;\r\n }\r\n\r\n public async initialize(): Promise<void> {\r\n await validateRepository(this.repository, (repo) => repo.getAll());\r\n }\r\n\r\n public async execute(\r\n email: string,\r\n name: string,\r\n password: string,\r\n role: UserRole = UserRole.GUEST\r\n ): Promise<AuthEntity> {\r\n try {\r\n const normalizedDTO = this.normalizeAuthDTO({\r\n email,\r\n name,\r\n password,\r\n role,\r\n });\r\n\r\n await validateRegisterDTO(normalizedDTO, this.repository);\r\n\r\n const hashedPassword = await this.hashPassword(normalizedDTO.password);\r\n const authEntity = await this.createAuthEntity(\r\n normalizedDTO,\r\n hashedPassword\r\n );\r\n\r\n return await this.repository.create(authEntity);\r\n } catch (error) {\r\n throw error instanceof Error ? error : new Error(\"Registration failed\");\r\n }\r\n }\r\n\r\n private normalizeAuthDTO(dto: RegisterDTO): RegisterDTO {\r\n return {\r\n name: dto.name.trim(),\r\n email: dto.email.trim().toLowerCase(),\r\n role: dto.role,\r\n password: dto.password.trim(),\r\n };\r\n }\r\n\r\n private async hashPassword(password: string): Promise<string> {\r\n return await bcrypt.hash(password, this.SALT_ROUNDS);\r\n }\r\n\r\n private async createAuthEntity(dto: RegisterDTO, hashedPassword: string): Promise<AuthEntity> {\r\n const authEntity = mapper.map(dto, RegisterDTO, AuthEntity);\r\n const userEntity = mapper.map(dto, RegisterDTO, UserEntity);\r\n \r\n authEntity.password = hashedPassword;\r\n authEntity.refreshToken = \"\";\r\n authEntity.user = userEntity;\r\n authEntity.user.updatedAt = null as any;\r\n \r\n return authEntity;\r\n }\r\n}\r\n","import { IBaseService, validateRepository } from \"cca-core\";\r\n\r\nimport { IDecodedToken } from \"../../domain/interfaces/IDecodedToken\";\r\n\r\nimport { JwtAuthService } from \"../../infrastructure/auth/JwtAuthService\";\r\nimport { AuthRepository } from \"../../infrastructure/repository/AuthRepository\";\r\n\r\nexport class RefreshTokenUseCase implements IBaseService {\r\n private readonly repository: AuthRepository;\r\n private readonly service: JwtAuthService;\r\n\r\n constructor(repository: AuthRepository, service: JwtAuthService) {\r\n this.repository = repository;\r\n this.service = service;\r\n }\r\n\r\n public async initialize(): Promise<void> {\r\n await validateRepository(this.repository, (repo) => repo.getAll());\r\n }\r\n\r\n async execute(\r\n refreshToken: string\r\n ): Promise<{ accessToken: string; refreshToken: string } | null> {\r\n try {\r\n const decoded = await this.service.verifyRefreshToken(refreshToken);\r\n\r\n const auth = decoded.userId\r\n ? await this.repository.findById(decoded.userId)\r\n : null;\r\n\r\n if (!auth || auth.refreshToken !== refreshToken) {\r\n return null;\r\n }\r\n\r\n const accessToken = this.service.generateAccessToken(auth.user);\r\n const newRefreshToken = this.service.generateRefreshToken(auth.user);\r\n\r\n await this.repository.update(auth.id, {\r\n refreshToken: newRefreshToken,\r\n });\r\n\r\n return { accessToken, refreshToken: newRefreshToken };\r\n } catch (error) {\r\n return null;\r\n }\r\n }\r\n\r\n async verityToken(token: string): Promise<IDecodedToken> {\r\n return await this.service.verifyAccessToken(token);\r\n }\r\n}\r\n","import { NextFunction, Request, Response } from \"express\";\r\n\r\nimport { LoginDTO } from \"../../application/dtos/LoginDTO\";\r\nimport { RegisterDTO } from \"../../application/dtos/RegisterDTO\";\r\n\r\nimport { RegisterUseCase } from \"../../application/useCase/RegisterUseCase\";\r\nimport { LoginUseCase } from \"../../application/useCase/LoginUseCase\";\r\nimport { RefreshTokenUseCase } from \"../../application/useCase/RefreshTokenUseCase\";\r\n\r\nimport { IRefreshTokenRequest } from \"../../domain/interfaces/IRefreshTokenRequest\";\r\nimport { IDecodedToken } from \"../../domain/interfaces/IDecodedToken\";\r\n\r\n\r\nexport class AuthController {\r\n private loginUseCase: LoginUseCase;\r\n private registerUseCase: RegisterUseCase;\r\n private refreshTokenUseCase: RefreshTokenUseCase;\r\n\r\n constructor(\r\n loginUseCase: LoginUseCase,\r\n registerUseCase: RegisterUseCase,\r\n refreshTokenUseCase: RefreshTokenUseCase\r\n ) {\r\n this.loginUseCase = loginUseCase;\r\n this.registerUseCase = registerUseCase;\r\n this.refreshTokenUseCase = refreshTokenUseCase;\r\n }\r\n\r\n login = async (req: Request, res: Response, next: NextFunction) => {\r\n try {\r\n const { adminPassword, ...loginDTO }: LoginDTO = req.body;\r\n const result = await this.loginUseCase.execute(loginDTO, adminPassword);\r\n res.status(201).json(result);\r\n } catch (error) {\r\n next(error);\r\n }\r\n };\r\n\r\n register = async (\r\n req: Request,\r\n res: Response,\r\n next: NextFunction\r\n ): Promise<void> => {\r\n try {\r\n const { email, name, password, role }: RegisterDTO = req.body;\r\n await this.registerUseCase.execute(email, name, password, role);\r\n } catch (error) {\r\n next(error);\r\n }\r\n };\r\n\r\n refreshToken = async (req: Request, res: Response) => {\r\n const { refreshToken }: IRefreshTokenRequest = req.body;\r\n const result = await this.refreshTokenUseCase.execute(refreshToken);\r\n res.json(result);\r\n };\r\n\r\n verifyToken = async (token: string): Promise<IDecodedToken> => {\r\n return await this.refreshTokenUseCase.verityToken(token);\r\n };\r\n}\r\n","import { BaseRepository, IBaseRepository, IExtendedBaseRepository } from \"cca-core\";\r\nimport { AuthEntity } from \"cca-entities\";\r\nimport { Repository } from \"typeorm\";\r\n\r\nexport class AuthRepository\r\n extends BaseRepository<AuthEntity>\r\n implements IExtendedBaseRepository<AuthEntity> {\r\n constructor(repository: Repository<AuthEntity>) {\r\n super(repository);\r\n }\r\n\r\n async findByEmail(email: string): Promise<AuthEntity | null> {\r\n const query = this.repository.createQueryBuilder('auth')\r\n .leftJoinAndSelect('auth.user', 'user')\r\n .addSelect('auth.password')\r\n .where('auth.email = :email', { email });\r\n\r\n return await query.getOne();\r\n }\r\n\r\n async create(entity: Omit<AuthEntity, \"createdAt\">): Promise<AuthEntity> {\r\n return super.create(entity);\r\n }\r\n}\r\n","import * as jwt from \"jsonwebtoken\";\r\nimport { Secret, SignOptions } from \"jsonwebtoken\";\r\nimport * as bcrypt from \"bcrypt\";\r\nimport { IBaseService, validateRepository } from \"cca-core\";\r\nimport { AuthEntity, UserEntity } from \"cca-entities\";\r\n\r\nimport { IJwtConfig } from \"../../domain/interfaces/IJwtConfig\";\r\nimport { IAuthService } from \"../../domain/interfaces/IAuthService\";\r\nimport { IDecodedToken } from \"../../domain/interfaces/IDecodedToken\";\r\n\r\nimport {\r\n ForbiddenError,\r\n JwtError,\r\n NotFoundError,\r\n UnauthorizedError,\r\n} from \"../../utils/Errors\";\r\n\r\nimport { AuthRepository } from \"../repository/AuthRepository\";\r\nimport { getConfig } from \"../../utils/config\";\r\n\r\nexport class JwtAuthService implements IBaseService, IAuthService {\r\n private jwtConfig: IJwtConfig | undefined;\r\n\r\n constructor(private readonly repository: AuthRepository, config?: IJwtConfig) {\r\n this.loadConfig(config);\r\n }\r\n\r\n private async loadConfig(config?: IJwtConfig) {\r\n const configData = await getConfig();\r\n this.jwtConfig = {\r\n accessTokenSecret: configData.JWT_ACCESS_SECRET || \"default-access-secret\",\r\n refreshTokenSecret: configData.JWT_REFRESH_SECRET || \"default-refresh-secret\",\r\n accessTokenExpiry: configData.ACCESS_TOKEN_EXPIRY || \"15m\",\r\n refreshTokenExpiry: configData.REFRESH_TOKEN_EXPIRY || \"7d\",\r\n ...config\r\n };\r\n this.validateConfiguration();\r\n }\r\n\r\n async initialize(): Promise<void> {\r\n await validateRepository(this.repository, repo => repo.getAll());\r\n }\r\n\r\n private validateConfiguration(): void {\r\n if (!this.jwtConfig?.accessTokenSecret || !this.jwtConfig?.refreshTokenSecret) {\r\n throw new JwtError(\"JWT secrets required in config\");\r\n }\r\n }\r\n\r\n async validateUser(email: string, password: string): Promise<AuthEntity | null> {\r\n const user = await this.repository.findByEmail(email);\r\n if (!user) {\r\n throw new NotFoundError(\"Invalid credentials\");\r\n }\r\n\r\n const validPassword = await bcrypt.compare(password, user.password);\r\n if (!validPassword) {\r\n throw new ForbiddenError(\"Invalid credentials\");\r\n }\r\n\r\n return user;\r\n }\r\n\r\n private verifyJwtConfig() {\r\n if (!this.jwtConfig) throw new JwtError(\"JWT config not loaded\");\r\n }\r\n\r\n generateAccessToken(user: UserEntity): string {\r\n this.verifyJwtConfig();\r\n return jwt.sign(\r\n { userId: user.id, email: user.email, role: user.role },\r\n this.jwtConfig!.accessTokenSecret as Secret,\r\n { expiresIn: this.jwtConfig!.accessTokenExpiry }\r\n );\r\n }\r\n\r\n generateRefreshToken(user: UserEntity): string {\r\n this.verifyJwtConfig();\r\n return jwt.sign(\r\n { userId: user.id },\r\n this.jwtConfig!.refreshTokenSecret as Secret,\r\n { expiresIn: this.jwtConfig!.refreshTokenExpiry }\r\n );\r\n }\r\n\r\n async verifyToken(token: string, secret: string): Promise<IDecodedToken> {\r\n try {\r\n return jwt.verify(token, secret) as IDecodedToken;\r\n } catch {\r\n throw new UnauthorizedError();\r\n }\r\n }\r\n\r\n async verifyAccessToken(token: string): Promise<IDecodedToken> {\r\n this.verifyJwtConfig();\r\n return this.verifyToken(token, this.jwtConfig!.accessTokenSecret);\r\n }\r\n\r\n async verifyRefreshToken(token: string): Promise<IDecodedToken> {\r\n this.verifyJwtConfig();\r\n return this.verifyToken(token, this.jwtConfig!.refreshTokenSecret);\r\n }\r\n}\r\n"],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;;;ACAA,IAAAA,mBAA4C;AAC5C,IAAAC,uBAA2B;;;ACD3B,IAAAC,mBAAiD;AACjD,IAAAC,uBAAiD;;;ACDjD,qBAAwB;AAGjB,IAAM,WAAN,MAAM,SAAQ;AAcrB;AAdqB;AAEnB;AAAA,MADC,wBAAQ;AAAA,GADE,SAEX;AAGA;AAAA,MADC,wBAAQ;AAAA,GAJE,SAKX;AAGA;AAAA,MADC,wBAAQ;AAAA,GAPE,SAQX;AAGA;AAAA,MADC,wBAAQ;AAAA,GAVE,SAWX;AAXK,IAAM,UAAN;;;ACHP,UAAqB;AACrB,0BAAqC;AACrC,oBAAmB;;;ACFZ,IAAM,YAAN,MAAM,kBAAiB,MAAM;AAAA,EAClC,YACS,SACA,aAAqB,KACrB,OAAe,YACtB;AACA,UAAM,OAAO;AAJN;AACA;AACA;AAGP,WAAO,eAAe,MAAM,WAAW,SAAS;AAChD,UAAM,kBAAkB,IAAI;AAAA,EAC9B;AACF;AAVoC;AAA7B,IAAM,WAAN;AAYA,IAAM,mBAAN,MAAM,yBAAwB,SAAS;AAAA,EAC5C,YAAY,SAAiB;AAC3B,UAAM,SAAS,GAAG;AAClB,SAAK,OAAO;AAAA,EACd;AACF;AAL8C;AAAvC,IAAM,kBAAN;AAcA,IAAM,iBAAN,MAAM,uBAAsB,SAAS;AAAA,EAC1C,YAAY,SAAiB;AAC3B,UAAM,SAAS,KAAK,mBAAmB;AAAA,EACzC;AACF;AAJ4C;AAArC,IAAM,gBAAN;AAMA,IAAM,kBAAN,MAAM,wBAAuB,SAAS;AAAA,EAC3C,YAAY,UAAkB,oBAAoB;AAChD,UAAM,SAAS,GAAG;AAClB,SAAK,OAAO;AAAA,EACd;AACF;AAL6C;AAAtC,IAAM,iBAAN;AAOA,IAAM,qBAAN,MAAM,2BAA0B,SAAS;AAAA,EAC9C,YAAY,UAAkB,uBAAuB;AACnD,UAAM,SAAS,GAAG;AAClB,SAAK,OAAO;AAAA,EACd;AACF;AALgD;AAAzC,IAAM,oBAAN;AAOA,IAAM,YAAN,MAAM,kBAAiB,SAAS;AAAA,EACrC,YAAY,SAAiB;AAC3B,UAAM,SAAS,GAAG;AAClB,SAAK,OAAO;AAAA,EACd;AACF;AALuC;AAAhC,IAAM,WAAN;;;AC9CP,sBAA2B;AAEpB,IAAM,YAAY,mCAA0B;AAC/C,QAAM,aAAa,UAAM,4BAAW;AAAA,IAChC,UAAU;AAAA,IACV,UAAU;AAAA,IACV,WAAW,QAAQ,IAAI;AAAA,EAC3B,CAAC;AACD,QAAM,gBAAgB,MAAM,OAAO,aAAa,EAAE;AAAA,IAAK,CAAC,OACpD,GAAG,SAAS,YAAY,OAAO;AAAA,EACnC;AAEA,SAAO,KAAK,MAAM,aAAa;AACnC,GAXyB;;;AFazB,IAAM,UAAU;AAAA,EACd,IAAQ,WAAO,EAAE,KAAK,wBAAwB;AAAA,EAC9C,OACG,WAAO,EACP,MAAM,sBAAsB,EAC5B,IAAI,KAAK,oCAAoC;AAAA,EAChD,MACG,WAAO,EACP,SAAS,kBAAkB,EAC3B,IAAI,GAAG,yCAAyC,EAChD,IAAI,IAAI,kCAAkC,EAC1C,QAAQ,iBAAiB,2CAA2C;AAAA,EACvE,UACG,WAAO,EACP,SAAS,mBAAmB,EAC5B,IAAI,GAAG,oBAAoB,EAC3B,IAAI,KAAK,mBAAmB,EAC5B;AAAA,IACC;AAAA,IACA;AAAA,EACF;AAAA,EACF,MACG,WAAO,EACP,SAAS,kBAAkB,EAC3B,MAAM,OAAO,OAAO,4BAAQ,GAAG,wBAAwB;AAC5D;AAEO,IAAM,gBAAgB,8BAC3B,OACA,eACwB;AACxB,MAAI;AACF,UAAM,QAAQ,MAAM,SAAS,OAAO,KAAK,EAAE,YAAY,CAAC;AACxD,UAAM,OAAO,MAAM,WAAW,YAAY,KAAK;AAC/C,QAAI,CAAC,MAAM;AACT,YAAM,IAAI;AAAA,QACR;AAAA,MACF;AAAA,IACF;AACA,WAAO;AAAA,EACT,SAAS,OAAY;AACnB,UAAM,IAAI,gBAAgB,MAAM,WAAW,sBAAsB;AAAA,EACnE;AACF,GAhB6B;AAkBtB,IAAM,mBAAmB,8BAAO,aAAqC;AAC1E,MAAI,UAAU;AACZ,QAAI;AACF,YAAM,QAAQ,SAAS,SAAS,QAAQ;AAAA,IAC1C,SAAS,OAAY;AACnB,YAAM,IAAI,gBAAgB,MAAM,WAAW,yBAAyB;AAAA,IACtE;AAAA,EACF;AACF,GARgC;AAUzB,IAAM,0BAA0B,8BACrC,YACA,OACA,kBACkB;AAClB,MAAI;AACF,UAAM,QAAQ,MAAM,SAAS,OAAO,KAAK,EAAE,YAAY,CAAC;AAExD,UAAM,eAAe,MAAM,WAAW,YAAY,KAAK;AAEvD,QAAI,CAAC,aAAc;AACnB,QAAI,aAAa,OAAO,cAAe;AAEvC,UAAM,IAAI,gBAAgB,SAAS,KAAK,qBAAqB;AAAA,EAC/D,SAAS,OAAY;AACnB,QAAI,iBAAiB,iBAAiB;AACpC,YAAM;AAAA,IACR;AACA,UAAM,IAAI,gBAAgB,8BAA8B;AAAA,EAC1D;AACF,GApBuC;AAsBhC,IAAM,sBAAsB,8BACjC,MACA,eACkB;AAClB,QAAM,EAAE,MAAM,OAAO,MAAM,SAAS,IAAI;AAExC,QAAM,QAAQ,IAAI;AAAA,IAChB,QAAQ,KAAK,SAAS,IAAI;AAAA,IAC1B,QAAQ,KAAK,SAAS,IAAI;AAAA,IAC1B,wBAAwB,YAAY,KAAK;AAAA,IACzC,iBAAiB,QAAQ;AAAA,EAC3B,CAAC;AACH,GAZmC;AAc5B,IAAM,mBAAmB,8BAC9B,MACA,eACwB;AACxB,QAAM,EAAE,OAAO,MAAM,SAAS,IAAI;AAElC,QAAM,QAAQ,IAAI,CAAC,QAAQ,KAAK,SAAS,IAAI,GAAG,QAAQ,SAAS,SAAS,QAAQ,CAAC,CAAC;AAEpF,QAAM,OAAO,MAAM,cAAc,OAAO,UAAU;AAClD,MAAI,CAAC,QAAQ,CAAC,KAAK,UAAU;AAC3B,UAAM,IAAI,cAAc,qBAAqB;AAAA,EAC/C;AAEA,QAAM,UAAU,MAAM,cAAAC,QAAO,QAAQ,UAAU,KAAK,QAAQ;AAC5D,MAAI,CAAC,SAAS;AACZ,UAAM,IAAI,eAAe,qBAAqB;AAAA,EAChD;AAEA,SAAO;AACT,GAnBgC;AAqBzB,IAAM,sBAAsB,8BACjC,mBACkB;AAClB,MAAI,CAAC,gBAAgB;AACnB,UAAM,IAAI,gBAAgB,4BAA4B;AAAA,EACxD;AAEA,MAAI;AACF,UAAM,SAAS,MAAM,UAAU;AAE/B,QAAI,CAAC,OAAO,uBAAuB;AACjC,YAAM,IAAI,gBAAgB,2CAA2C;AAAA,IACvE;AAEA,QAAI,SAAS,cAAc,MAAM,OAAO,uBAAuB;AAC7D,YAAM,IAAI,gBAAgB,wBAAwB;AAAA,IACpD;AAAA,EACF,SAAS,OAAO;AACd,QAAI,iBAAiB,iBAAiB;AACpC,YAAM;AAAA,IACR;AACA,UAAM,IAAI,gBAAgB,iCAAiC;AAAA,EAC7D;AACF,GAvBmC;;;AG/HnC,IAAAC,eAA6B;AAC7B,IAAAC,kBAAwB;;;ACDxB,kBAAsD;AACtD,IAAAC,uBAAuC;;;ACChC,IAAM,eAAN,MAAM,aAAY;AAMzB;AANyB;AAAlB,IAAM,cAAN;;;ADIA,SAAS,mBAAmBC,SAAsB;AACrD;AAAA,IACIA;AAAA,IACA;AAAA,IACA;AAAA,QACA,uBAAU,UAAQ,KAAK,WAAO,qBAAQ,SAAO,IAAI,KAAK,CAAC;AAAA,QACvD,uBAAU,UAAQ,KAAK,cAAU,qBAAQ,SAAO,IAAI,QAAQ,CAAC;AAAA,QAC7D,uBAAU,UAAQ,KAAK,UAAM,qBAAQ,SAAO,IAAI,IAAI,CAAC;AAAA,EAAC;AAE1D;AAAA,IACIA;AAAA,IACA;AAAA,IACA;AAAA,QACA,uBAAU,UAAQ,KAAK,UAAM,qBAAQ,SAAO,IAAI,IAAI,CAAC;AAAA,QACrD,uBAAU,UAAQ,KAAK,WAAO,qBAAQ,SAAO,IAAI,KAAK,CAAC;AAAA,QACvD,uBAAU,UAAQ,KAAK,UAAM,qBAAQ,SAAO,IAAI,IAAI,CAAC;AAAA,EAAC;AAE1D;AAAA,IACIA;AAAA,IACA;AAAA,IACA;AAAA,QACA,uBAAU,UAAQ,KAAK,QAAI,qBAAQ,SAAO,IAAI,EAAE,CAAC;AAAA,QACjD,uBAAU,UAAQ,KAAK,UAAM,qBAAQ,SAAO,IAAI,IAAI,CAAC;AAAA,QACrD,uBAAU,UAAQ,KAAK,WAAO,qBAAQ,SAAO,IAAI,KAAK,CAAC;AAAA,QACvD,uBAAU,UAAQ,KAAK,UAAM,qBAAQ,SAAO,IAAI,IAAI,CAAC;AAAA,EAAC;AAC9D;AAzBgB;;;ADDT,IAAM,aAAS,2BAAa;AAAA,EACjC,yBAAqB,yBAAQ;AAC/B,CAAC;AAED,mBAAmB,MAAM;;;ALKlB,IAAM,gBAAN,MAAM,cAAqC;AAAA,EAIhD,YAAY,YAA4B,aAA6B;AACnE,SAAK,aAAa;AAClB,SAAK,cAAc;AAAA,EACrB;AAAA,EAEA,MAAa,aAA4B;AACvC,cAAM,qCAAmB,KAAK,YAAY,CAAC,SAAS,KAAK,OAAO,CAAC;AAAA,EACnE;AAAA,EAEA,MAAM,QACJ,UACA,eAIC;AACD,UAAM,EAAE,KAAK,IAAI;AAEjB,UAAM,OAAO,MAAM,iBAAiB,UAAU,KAAK,UAAU;AAE7D,QAAI,SAAS,8BAAS,SAAS,eAAe;AAC5C,YAAM,oBAAoB,aAAa;AAAA,IACzC;AAEA,UAAM,QAAQ,KAAK,eAAe,IAAI;AAEtC,UAAM,UAAU,OAAO,IAAI,KAAK,MAAM,iCAAY,OAAO;AAEzD,WAAO,EAAE,OAAO,MAAM,QAAQ;AAAA,EAChC;AAAA,EAEQ,eAAe,MAGrB;AACA,UAAM,cAAc,KAAK,YAAY,oBAAoB,KAAK,IAAI;AAClE,UAAM,eAAe,KAAK,YAAY,qBAAqB,KAAK,IAAI;AACpE,SAAK,uBAAuB,MAAM,YAAY;AAC9C,WAAO,EAAE,aAAa,aAAa;AAAA,EACrC;AAAA,EAEA,MAAc,uBACZ,MACA,cACe;AACf,SAAK,eAAe;AACpB,UAAM,KAAK,WAAW,OAAO,KAAK,IAAI,EAAE,aAAa,CAAC;AAAA,EACxD;AACF;AApDkD;AAA3C,IAAM,eAAN;;;AQdP,IAAAC,mBAAiD;AACjD,IAAAC,UAAwB;AACxB,IAAAC,uBAAiD;AAQ1C,IAAM,mBAAN,MAAM,iBAAwC;AAAA,EAInD,YAAY,YAA4B;AAFxC,SAAiB,cAAc;AAG7B,SAAK,aAAa;AAAA,EACpB;AAAA,EAEA,MAAa,aAA4B;AACvC,cAAM,qCAAmB,KAAK,YAAY,CAAC,SAAS,KAAK,OAAO,CAAC;AAAA,EACnE;AAAA,EAEA,MAAa,QACX,OACA,MACA,UACA,OAAiB,8BAAS,OACL;AACrB,QAAI;AACF,YAAM,gBAAgB,KAAK,iBAAiB;AAAA,QAC1C;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,MACF,CAAC;AAED,YAAM,oBAAoB,eAAe,KAAK,UAAU;AAExD,YAAM,iBAAiB,MAAM,KAAK,aAAa,cAAc,QAAQ;AACrE,YAAM,aAAa,MAAM,KAAK;AAAA,QAC5B;AAAA,QACA;AAAA,MACF;AAEA,aAAO,MAAM,KAAK,WAAW,OAAO,UAAU;AAAA,IAChD,SAAS,OAAO;AACd,YAAM,iBAAiB,QAAQ,QAAQ,IAAI,MAAM,qBAAqB;AAAA,IACxE;AAAA,EACF;AAAA,EAEQ,iBAAiB,KAA+B;AACtD,WAAO;AAAA,MACL,MAAM,IAAI,KAAK,KAAK;AAAA,MACpB,OAAO,IAAI,MAAM,KAAK,EAAE,YAAY;AAAA,MACpC,MAAM,IAAI;AAAA,MACV,UAAU,IAAI,SAAS,KAAK;AAAA,IAC9B;AAAA,EACF;AAAA,EAEA,MAAc,aAAa,UAAmC;AAC5D,WAAO,MAAa,aAAK,UAAU,KAAK,WAAW;AAAA,EACrD;AAAA,EAEA,MAAc,iBAAiB,KAAkB,gBAA6C;AAC5F,UAAM,aAAa,OAAO,IAAI,KAAK,aAAa,+BAAU;AAC1D,UAAM,aAAa,OAAO,IAAI,KAAK,aAAa,+BAAU;AAE1D,eAAW,WAAW;AACtB,eAAW,eAAe;AAC1B,eAAW,OAAO;AAClB,eAAW,KAAK,YAAY;AAE5B,WAAO;AAAA,EACT;AACF;AAhEqD;AAA9C,IAAM,kBAAN;;;ACVP,IAAAC,mBAAiD;AAO1C,IAAM,uBAAN,MAAM,qBAA4C;AAAA,EAIvD,YAAY,YAA4B,SAAyB;AAC/D,SAAK,aAAa;AAClB,SAAK,UAAU;AAAA,EACjB;AAAA,EAEA,MAAa,aAA4B;AACvC,cAAM,qCAAmB,KAAK,YAAY,CAAC,SAAS,KAAK,OAAO,CAAC;AAAA,EACnE;AAAA,EAEA,MAAM,QACJ,cAC+D;AAC/D,QAAI;AACF,YAAM,UAAU,MAAM,KAAK,QAAQ,mBAAmB,YAAY;AAElE,YAAM,OAAO,QAAQ,SACjB,MAAM,KAAK,WAAW,SAAS,QAAQ,MAAM,IAC7C;AAEJ,UAAI,CAAC,QAAQ,KAAK,iBAAiB,cAAc;AAC/C,eAAO;AAAA,MACT;AAEA,YAAM,cAAc,KAAK,QAAQ,oBAAoB,KAAK,IAAI;AAC9D,YAAM,kBAAkB,KAAK,QAAQ,qBAAqB,KAAK,IAAI;AAEnE,YAAM,KAAK,WAAW,OAAO,KAAK,IAAI;AAAA,QACpC,cAAc;AAAA,MAChB,CAAC;AAED,aAAO,EAAE,aAAa,cAAc,gBAAgB;AAAA,IACtD,SAAS,OAAO;AACd,aAAO;AAAA,IACT;AAAA,EACF;AAAA,EAEA,MAAM,YAAY,OAAuC;AACvD,WAAO,MAAM,KAAK,QAAQ,kBAAkB,KAAK;AAAA,EACnD;AACF;AA3CyD;AAAlD,IAAM,sBAAN;;;ACMA,IAAM,kBAAN,MAAM,gBAAe;AAAA,EAK1B,YACE,cACA,iBACA,qBACA;AAMF,iBAAQ,8BAAO,KAAc,KAAe,SAAuB;AACjE,UAAI;AACF,cAAM,EAAE,eAAe,GAAG,SAAS,IAAc,IAAI;AACrD,cAAM,SAAS,MAAM,KAAK,aAAa,QAAQ,UAAU,aAAa;AACtE,YAAI,OAAO,GAAG,EAAE,KAAK,MAAM;AAAA,MAC7B,SAAS,OAAO;AACd,aAAK,KAAK;AAAA,MACZ;AAAA,IACF,GARQ;AAUR,oBAAW,8BACT,KACA,KACA,SACkB;AAClB,UAAI;AACF,cAAM,EAAE,OAAO,MAAM,UAAU,KAAK,IAAiB,IAAI;AACzD,cAAM,KAAK,gBAAgB,QAAQ,OAAO,MAAM,UAAU,IAAI;AAAA,MAChE,SAAS,OAAO;AACd,aAAK,KAAK;AAAA,MACZ;AAAA,IACF,GAXW;AAaX,wBAAe,8BAAO,KAAc,QAAkB;AACpD,YAAM,EAAE,aAAa,IAA0B,IAAI;AACnD,YAAM,SAAS,MAAM,KAAK,oBAAoB,QAAQ,YAAY;AAClE,UAAI,KAAK,MAAM;AAAA,IACjB,GAJe;AAMf,uBAAc,8BAAO,UAA0C;AAC7D,aAAO,MAAM,KAAK,oBAAoB,YAAY,KAAK;AAAA,IACzD,GAFc;AAlCZ,SAAK,eAAe;AACpB,SAAK,kBAAkB;AACvB,SAAK,sBAAsB;AAAA,EAC7B;AAkCF;AA/C4B;AAArB,IAAM,iBAAN;;;ACbP,IAAAC,mBAAyE;AAIlE,IAAM,kBAAN,MAAM,wBACH,gCACuC;AAAA,EAC/C,YAAY,YAAoC;AAC9C,UAAM,UAAU;AAAA,EAClB;AAAA,EAEA,MAAM,YAAY,OAA2C;AAC3D,UAAM,QAAQ,KAAK,WAAW,mBAAmB,MAAM,EACpD,kBAAkB,aAAa,MAAM,EACrC,UAAU,eAAe,EACzB,MAAM,uBAAuB,EAAE,MAAM,CAAC;AAEzC,WAAO,MAAM,MAAM,OAAO;AAAA,EAC5B;AAAA,EAEA,MAAM,OAAO,QAA4D;AACvE,WAAO,MAAM,OAAO,MAAM;AAAA,EAC5B;AACF;AAjBiD;AAF1C,IAAM,iBAAN;;;ACJP,UAAqB;AAErB,IAAAC,UAAwB;AACxB,IAAAC,mBAAiD;AAiB1C,IAAM,kBAAN,MAAM,gBAAqD;AAAA,EAGhE,YAA6B,YAA4B,QAAqB;AAAjD;AAC3B,SAAK,WAAW,MAAM;AAAA,EACxB;AAAA,EAEA,MAAc,WAAW,QAAqB;AAC5C,UAAM,aAAa,MAAM,UAAU;AACnC,SAAK,YAAY;AAAA,MACf,mBAAmB,WAAW,qBAAqB;AAAA,MACnD,oBAAoB,WAAW,sBAAsB;AAAA,MACrD,mBAAmB,WAAW,uBAAuB;AAAA,MACrD,oBAAoB,WAAW,wBAAwB;AAAA,MACvD,GAAG;AAAA,IACL;AACA,SAAK,sBAAsB;AAAA,EAC7B;AAAA,EAEA,MAAM,aAA4B;AAChC,cAAM,qCAAmB,KAAK,YAAY,UAAQ,KAAK,OAAO,CAAC;AAAA,EACjE;AAAA,EAEQ,wBAA8B;AACpC,QAAI,CAAC,KAAK,WAAW,qBAAqB,CAAC,KAAK,WAAW,oBAAoB;AAC7E,YAAM,IAAI,SAAS,gCAAgC;AAAA,IACrD;AAAA,EACF;AAAA,EAEA,MAAM,aAAa,OAAe,UAA8C;AAC9E,UAAM,OAAO,MAAM,KAAK,WAAW,YAAY,KAAK;AACpD,QAAI,CAAC,MAAM;AACT,YAAM,IAAI,cAAc,qBAAqB;AAAA,IAC/C;AAEA,UAAM,gBAAgB,MAAa,gBAAQ,UAAU,KAAK,QAAQ;AAClE,QAAI,CAAC,eAAe;AAClB,YAAM,IAAI,eAAe,qBAAqB;AAAA,IAChD;AAEA,WAAO;AAAA,EACT;AAAA,EAEQ,kBAAkB;AACxB,QAAI,CAAC,KAAK,UAAW,OAAM,IAAI,SAAS,uBAAuB;AAAA,EACjE;AAAA,EAEA,oBAAoB,MAA0B;AAC5C,SAAK,gBAAgB;AACrB,WAAW;AAAA,MACT,EAAE,QAAQ,KAAK,IAAI,OAAO,KAAK,OAAO,MAAM,KAAK,KAAK;AAAA,MACtD,KAAK,UAAW;AAAA,MAChB,EAAE,WAAW,KAAK,UAAW,kBAAkB;AAAA,IACjD;AAAA,EACF;AAAA,EAEA,qBAAqB,MAA0B;AAC7C,SAAK,gBAAgB;AACrB,WAAW;AAAA,MACT,EAAE,QAAQ,KAAK,GAAG;AAAA,MAClB,KAAK,UAAW;AAAA,MAChB,EAAE,WAAW,KAAK,UAAW,mBAAmB;AAAA,IAClD;AAAA,EACF;AAAA,EAEA,MAAM,YAAY,OAAe,QAAwC;AACvE,QAAI;AACF,aAAW,WAAO,OAAO,MAAM;AAAA,IACjC,QAAQ;AACN,YAAM,IAAI,kBAAkB;AAAA,IAC9B;AAAA,EACF;AAAA,EAEA,MAAM,kBAAkB,OAAuC;AAC7D,SAAK,gBAAgB;AACrB,WAAO,KAAK,YAAY,OAAO,KAAK,UAAW,iBAAiB;AAAA,EAClE;AAAA,EAEA,MAAM,mBAAmB,OAAuC;AAC9D,SAAK,gBAAgB;AACrB,WAAO,KAAK,YAAY,OAAO,KAAK,UAAW,kBAAkB;AAAA,EACnE;AACF;AAlFkE;AAA3D,IAAM,iBAAN;;;AbRP,SAAS,oBAAoB,UAAwB;AACnD,QAAM,YAAY,IAAI,+BAAc,EAAE,SAAS,CAAC;AAEhD,QAAM,iBAAiB,IAAI;AAAA,IACzB,SAAS,cAAc,+BAAU;AAAA,EACnC;AACA,YAAU,mBAA+B,kBAAkB,cAAc;AAEzE,QAAM,iBAAiB,IAAI,eAAe,cAAc;AACxD,YAAU,gBAAgB,kBAAkB,cAAc;AAE1D,QAAM,eAAe,IAAI,aAAa,gBAAgB,cAAc;AACpE,QAAM,kBAAkB,IAAI,gBAAgB,cAAc;AAC1D,QAAM,sBAAsB,IAAI;AAAA,IAC9B;AAAA,IACA;AAAA,EACF;AACA,YAAU,gBAAgB,gBAAgB,YAAY;AACtD,YAAU,gBAAgB,mBAAmB,eAAe;AAC5D,YAAU,gBAAgB,uBAAuB,mBAAmB;AAEpE,QAAM,iBAAiB,IAAI;AAAA,IACzB;AAAA,IACA;AAAA,IACA;AAAA,EACF;AAEA,SAAO,EAAE,WAAW,eAAe;AACrC;AA5BS;","names":["import_cca_core","import_cca_entities","import_cca_core","import_cca_entities","bcrypt","import_core","import_classes","import_cca_entities","mapper","import_cca_core","bcrypt","import_cca_entities","import_cca_core","import_cca_core","bcrypt","import_cca_core"]}
1
+ {"version":3,"sources":["../src/index.ts","../src/infrastructure/container/createAuthContainer.ts","../src/application/useCase/LoginUseCase.ts","../src/application/dtos/UserDTO.ts","../src/application/validators/authValidation.ts","../src/utils/Errors.ts","../src/utils/config.ts","../src/application/mappers/utils/mapper.ts","../src/application/mappers/createUserMappings.ts","../src/application/dtos/RegisterDTO.ts","../src/application/useCase/LogoutUseCase .ts","../src/application/useCase/RegisterUseCase.ts","../src/application/useCase/RefreshTokenUseCase.ts","../src/presentation/controller/AuthController.ts","../src/infrastructure/repository/AuthRepository.ts","../src/infrastructure/auth/JwtAuthService.ts"],"sourcesContent":["import { createAuthContainer } from \"./infrastructure/container/createAuthContainer\";\r\nimport { AuthController } from \"./presentation/controller/AuthController\";\r\n\r\nexport { createAuthContainer, AuthController};\r\n","import { BaseContainer, BaseDatabase } from \"cca-core\";\r\nimport { AuthEntity } from \"cca-entities\";\r\n\r\nimport { LoginUseCase } from \"../../application/useCase/LoginUseCase\";\r\nimport { LogoutUseCase } from \"../../application/useCase/LogoutUseCase \";\r\nimport { RegisterUseCase } from \"../../application/useCase/RegisterUseCase\";\r\nimport { RefreshTokenUseCase } from \"../../application/useCase/RefreshTokenUseCase\";\r\n\r\nimport { AuthController } from \"../../presentation/controller/AuthController\";\r\n\r\nimport { AuthRepository } from \"../repository/AuthRepository\";\r\nimport { JwtAuthService } from \"../auth/JwtAuthService\";\r\n\r\nfunction createAuthContainer(database: BaseDatabase) {\r\n const container = new BaseContainer({ database });\r\n\r\n const authRepository = new AuthRepository(\r\n database.getRepository(AuthEntity)\r\n );\r\n container.registerRepository<AuthEntity>(\"AuthRepository\", authRepository);\r\n\r\n const jwtAuthService = new JwtAuthService(authRepository);\r\n container.registerService(\"JwtAuthService\", jwtAuthService);\r\n\r\n const loginUseCase = new LoginUseCase(authRepository, jwtAuthService);\r\n const logoutUseCase = new LogoutUseCase(authRepository);\r\n const registerUseCase = new RegisterUseCase(authRepository);\r\n const refreshTokenUseCase = new RefreshTokenUseCase(\r\n authRepository,\r\n jwtAuthService\r\n );\r\n container.registerService(\"LoginUseCase\", loginUseCase);\r\n container.registerService(\"RegisterUseCase\", registerUseCase);\r\n container.registerService(\"RefreshTokenUseCase\", refreshTokenUseCase);\r\n container.registerService(\"LogoutUseCase\", logoutUseCase);\r\n\r\n const authController = new AuthController(\r\n loginUseCase,\r\n logoutUseCase,\r\n registerUseCase,\r\n refreshTokenUseCase\r\n );\r\n\r\n return { container, authController };\r\n}\r\n\r\nexport { createAuthContainer };\r\n","import { IBaseService, validateRepository } from \"cca-core\";\r\nimport { AuthEntity, UserEntity, UserRole } from \"cca-entities\";\r\nimport { AuthRepository } from \"../../infrastructure/repository/AuthRepository\";\r\nimport { JwtAuthService } from \"../../infrastructure/auth/JwtAuthService\";\r\nimport { UserDTO } from \"../dtos/UserDTO\";\r\nimport { LoginDTO } from \"../dtos/LoginDTO\";\r\nimport { validateAdminSecret, validateLoginDTO } from \"../validators/authValidation\";\r\nimport { mapper } from \"../mappers/utils/mapper\";\r\n\r\ninterface TokenPair {\r\n accessToken: string;\r\n refreshToken: string;\r\n}\r\n\r\ninterface LoginResponse {\r\n token: TokenPair;\r\n user: UserDTO;\r\n}\r\n\r\nexport class LoginUseCase implements IBaseService {\r\n private readonly repository: AuthRepository;\r\n private readonly authService: JwtAuthService;\r\n\r\n constructor(\r\n repository: AuthRepository,\r\n authService: JwtAuthService\r\n ) {\r\n this.repository = repository;\r\n this.authService = authService\r\n }\r\n\r\n public async initialize(): Promise<void> {\r\n await validateRepository(this.repository, (repo) => repo.getAll());\r\n }\r\n\r\n async execute(loginDTO: LoginDTO, adminPassword?: string): Promise<LoginResponse> {\r\n const auth = await this.validateLogin(loginDTO, adminPassword);\r\n const token = await this.handleAuthentication(auth);\r\n const userDTO = this.mapUserToDTO(auth.user);\r\n\r\n return { token, user: userDTO };\r\n }\r\n\r\n private async validateLogin(\r\n loginDTO: LoginDTO,\r\n adminPassword?: string\r\n ): Promise<AuthEntity> {\r\n const auth = await validateLoginDTO(loginDTO, this.repository);\r\n\r\n if (loginDTO.role === UserRole.ADMIN && adminPassword) {\r\n await validateAdminSecret(adminPassword);\r\n }\r\n\r\n return auth;\r\n }\r\n\r\n private async handleAuthentication(auth: AuthEntity): Promise<TokenPair> {\r\n const token = this.generateTokens(auth);\r\n await this.updateUserStatus(auth);\r\n await this.updateUserRefreshToken(auth, token.refreshToken);\r\n\r\n return token;\r\n }\r\n\r\n private generateTokens(auth: AuthEntity): TokenPair {\r\n return {\r\n accessToken: this.authService.generateAccessToken(auth.user),\r\n refreshToken: this.authService.generateRefreshToken(auth.user)\r\n };\r\n }\r\n\r\n private async updateUserStatus(auth: AuthEntity): Promise<void> {\r\n auth.user.lastLoginAt = new Date();\r\n auth.user.isActive = true;\r\n await this.repository.update(auth.id, auth);\r\n }\r\n\r\n private async updateUserRefreshToken(\r\n auth: AuthEntity,\r\n refreshToken: string\r\n ): Promise<void> {\r\n auth.refreshToken = refreshToken;\r\n await this.repository.update(auth.id, { refreshToken });\r\n }\r\n\r\n private mapUserToDTO(user: UserEntity): UserDTO {\r\n return mapper.map(user, UserEntity, UserDTO);\r\n }\r\n}","import { AutoMap } from \"@automapper/classes\";\r\nimport { UserRole } from \"cca-entities\";\r\n\r\nexport class UserDTO {\r\n @AutoMap()\r\n id!: string;\r\n\r\n @AutoMap()\r\n name!: string;\r\n\r\n @AutoMap()\r\n email!: string;\r\n\r\n @AutoMap()\r\n role!: UserRole;\r\n\r\n adminPassword?: string;\r\n}","import * as yup from \"yup\";\r\nimport { AuthEntity, UserRole } from \"cca-entities\";\r\nimport bcrypt from \"bcrypt\";\r\n\r\nimport {\r\n ForbiddenError,\r\n NotFoundError,\r\n ValidationError,\r\n} from \"../../utils/Errors\";\r\nimport { AuthRepository } from \"../../infrastructure/repository/AuthRepository\";\r\n\r\nimport { RegisterDTO } from \"../dtos/RegisterDTO\";\r\nimport { LoginDTO } from \"../dtos/LoginDTO\";\r\nimport { getConfig } from \"../../utils/config\";\r\n\r\nconst schemas = {\r\n id: yup.string().uuid(\"Invalid user ID format\"),\r\n email: yup\r\n .string()\r\n .email(\"Invalid email format\")\r\n .max(255, \"Email cannot exceed 255 characters\"),\r\n name: yup\r\n .string()\r\n .required(\"Name is required\")\r\n .min(2, \"Name must be at least 2 characters long\")\r\n .max(50, \"Name cannot exceed 50 characters\")\r\n .matches(/^[a-zA-Z\\s]+$/, \"Name must only contain letters and spaces\"),\r\n password: yup\r\n .string()\r\n .required(\"Password required\")\r\n .min(8, \"Password too short\")\r\n .max(100, \"Password too long\")\r\n .matches(\r\n /^(?=.*[a-z])(?=.*[A-Z])(?=.*\\d)(?=.*[@$!%*?&])[A-Za-z\\d@$!%*?&]/,\r\n \"Password must contain uppercase, lowercase, number and special character\"\r\n ),\r\n role: yup\r\n .string()\r\n .required(\"Role is required\")\r\n .oneOf(Object.values(UserRole), \"Invalid role specified\"),\r\n};\r\n\r\nexport const validateEmail = async (\r\n email: string,\r\n repository: AuthRepository\r\n): Promise<AuthEntity> => {\r\n try {\r\n await schemas.email.validate(email?.trim().toLowerCase());\r\n const user = await repository.findByEmail(email);\r\n if (!user) {\r\n throw new NotFoundError(\r\n \"The email address or password is incorrect. Please retry\"\r\n );\r\n }\r\n return user;\r\n } catch (error: any) {\r\n throw new ValidationError(error.message || \"Invalid email format\");\r\n }\r\n};\r\n\r\nexport const validatePassword = async (password?: string): Promise<void> => {\r\n if (password) {\r\n try {\r\n await schemas.password.validate(password);\r\n } catch (error: any) {\r\n throw new ValidationError(error.message || \"Invalid password format\");\r\n }\r\n }\r\n};\r\n\r\nexport const validateEmailUniqueness = async (\r\n repository: AuthRepository,\r\n email: string,\r\n excludeUserId?: string\r\n): Promise<void> => {\r\n try {\r\n await schemas.email.validate(email?.trim().toLowerCase());\r\n\r\n const existingUser = await repository.findByEmail(email);\r\n\r\n if (!existingUser) return;\r\n if (existingUser.id === excludeUserId) return;\r\n\r\n throw new ValidationError(`Email ${email} is already in use.`);\r\n } catch (error: any) {\r\n if (error instanceof ValidationError) {\r\n throw error;\r\n }\r\n throw new ValidationError(\"user email validation failed\");\r\n }\r\n};\r\n\r\nexport const validateRegisterDTO = async (\r\n auth: RegisterDTO,\r\n repository: AuthRepository\r\n): Promise<void> => {\r\n const { name, email, role, password } = auth;\r\n\r\n await Promise.all([\r\n schemas.name.validate(name),\r\n schemas.role.validate(role),\r\n validateEmailUniqueness(repository, email),\r\n validatePassword(password),\r\n ]);\r\n};\r\n\r\nexport const validateLoginDTO = async (\r\n data: LoginDTO,\r\n repository: AuthRepository\r\n): Promise<AuthEntity> => {\r\n const { email, role, password } = data;\r\n\r\n await Promise.all([schemas.role.validate(role), schemas.password.validate(password)]);\r\n\r\n const auth = await validateEmail(email, repository);\r\n if (!auth || !auth.password) {\r\n throw new NotFoundError(\"Invalid credentials\");\r\n }\r\n\r\n const isMatch = await bcrypt.compare(password, auth.password);\r\n if (!isMatch) {\r\n throw new ForbiddenError(\"Invalid credentials\");\r\n }\r\n\r\n return auth;\r\n};\r\n\r\nexport const validateAdminSecret = async (\r\n secretPassword?: string\r\n): Promise<void> => {\r\n if (!secretPassword) {\r\n throw new ValidationError(\"Admin password is required\");\r\n }\r\n\r\n try {\r\n const config = await getConfig();\r\n\r\n if (!config.ADMIN_SECRET_PASSWORD) {\r\n throw new ValidationError(\"ADMIN_SECRET_PASSWORD not found in config\");\r\n }\r\n\r\n if (parseInt(secretPassword) !== config.ADMIN_SECRET_PASSWORD) {\r\n throw new ValidationError(\"Invalid admin password\");\r\n }\r\n } catch (error) {\r\n if (error instanceof ValidationError) {\r\n throw error;\r\n }\r\n throw new ValidationError(\"Error validating admin password\");\r\n }\r\n};\r\n","export class AppError extends Error {\r\n constructor(\r\n public message: string,\r\n public statusCode: number = 500,\r\n public name: string = \"AppError\"\r\n ) {\r\n super(message);\r\n Object.setPrototypeOf(this, new.target.prototype);\r\n Error.captureStackTrace(this);\r\n }\r\n}\r\n\r\nexport class ValidationError extends AppError {\r\n constructor(message: string) {\r\n super(message, 400);\r\n this.name = \"ValidationError\";\r\n }\r\n}\r\n\r\nexport class ConfigNotFoundException extends AppError {\r\n constructor(message: string) {\r\n super(message);\r\n this.name = \"ConfigNotFoundException\";\r\n }\r\n}\r\n\r\nexport class NotFoundError extends AppError {\r\n constructor(message: string) {\r\n super(message, 404, \"UserNotFoundError\");\r\n }\r\n}\r\n\r\nexport class ForbiddenError extends AppError {\r\n constructor(message: string = \"Forbidden access\") {\r\n super(message, 403);\r\n this.name = \"ForbiddenError\";\r\n }\r\n}\r\n\r\nexport class UnauthorizedError extends AppError {\r\n constructor(message: string = \"Unauthorized access\") {\r\n super(message, 401);\r\n this.name = \"UnauthorizedError\";\r\n }\r\n}\r\n\r\nexport class JwtError extends AppError {\r\n constructor(message: string) {\r\n super(message, 401);\r\n this.name = \"JwtError\";\r\n }\r\n}","import { findConfig } from \"cca-core\";\r\n\r\nexport const getConfig = async (): Promise<any> => {\r\n const configPath = await findConfig({\r\n fileName: \"cca.config.json\",\r\n maxDepth: 10,\r\n startPath: process.cwd(),\r\n });\r\n const configContent = await import(\"fs/promises\").then((fs) =>\r\n fs.readFile(configPath, \"utf-8\")\r\n );\r\n\r\n return JSON.parse(configContent);\r\n}","import { createMapper } from '@automapper/core';\r\nimport { classes } from '@automapper/classes';\r\n\r\nimport { createUserMappings } from '../createUserMappings';\r\n\r\nexport const mapper = createMapper({\r\n strategyInitializer: classes(),\r\n});\r\n\r\ncreateUserMappings(mapper);\r\n","import { Mapper, createMap, forMember, mapFrom } from '@automapper/core';\r\nimport { AuthEntity, UserEntity } from 'cca-entities';\r\n\r\nimport { RegisterDTO } from '../dtos/RegisterDTO';\r\nimport { UserDTO } from '../dtos/UserDTO';\r\n\r\nexport function createUserMappings(mapper: Mapper): void {\r\n createMap(\r\n mapper, \r\n RegisterDTO,\r\n AuthEntity,\r\n forMember(dest => dest.email, mapFrom(src => src.email)),\r\n forMember(dest => dest.password, mapFrom(src => src.password)),\r\n forMember(dest => dest.role, mapFrom(src => src.role)));\r\n\r\n createMap(\r\n mapper, \r\n RegisterDTO,\r\n UserEntity,\r\n forMember(dest => dest.name, mapFrom(src => src.name)),\r\n forMember(dest => dest.email, mapFrom(src => src.email)),\r\n forMember(dest => dest.role, mapFrom(src => src.role)));\r\n\r\n createMap(\r\n mapper,\r\n UserEntity,\r\n UserDTO,\r\n forMember(dest => dest.id, mapFrom(src => src.id)),\r\n forMember(dest => dest.name, mapFrom(src => src.name)),\r\n forMember(dest => dest.email, mapFrom(src => src.email)),\r\n forMember(dest => dest.role, mapFrom(src => src.role)));\r\n}","import { UserRole } from \"cca-entities\";\r\n\r\nexport class RegisterDTO {\r\n email!: string;\r\n name!: string;\r\n password!: string;\r\n role!: UserRole;\r\n adminPassword?: string;\r\n}\r\n","import { IBaseService, validateRepository } from \"cca-core\";\r\nimport { AuthRepository } from \"../../infrastructure/repository/AuthRepository\";\r\n\r\n\r\nexport class LogoutUseCase implements IBaseService {\r\n private readonly repository: AuthRepository\r\n\r\n constructor(repository: AuthRepository) {\r\n this.repository = repository;\r\n }\r\n\r\n public async initialize(): Promise<void> {\r\n await validateRepository(this.repository, (repo) => repo.getAll());\r\n }\r\n\r\n async execute(authId: string): Promise<void> {\r\n const auth = await this.repository.findById(authId);\r\n if (!auth) {\r\n throw new Error('Auth not found');\r\n }\r\n\r\n auth.refreshToken = null as any;\r\n auth.user.isActive = false;\r\n\r\n await this.repository.update(auth.id, auth);\r\n }\r\n}","import { IBaseService, validateRepository } from \"cca-core\";\r\nimport * as bcrypt from \"bcrypt\";\r\nimport { AuthEntity, UserEntity, UserRole } from \"cca-entities\";\r\n\r\nimport { AuthRepository } from \"../../infrastructure/repository/AuthRepository\";\r\n\r\nimport { mapper } from \"../mappers/utils/mapper\";\r\nimport { RegisterDTO } from \"../dtos/RegisterDTO\";\r\nimport { validateAdminSecret, validateRegisterDTO } from \"../validators/authValidation\";\r\n\r\nexport class RegisterUseCase implements IBaseService {\r\n private readonly repository: AuthRepository;\r\n private readonly SALT_ROUNDS = 10;\r\n\r\n constructor(repository: AuthRepository) {\r\n this.repository = repository;\r\n }\r\n\r\n public async initialize(): Promise<void> {\r\n await validateRepository(this.repository, (repo) => repo.getAll());\r\n }\r\n\r\n public async execute(\r\n email: string,\r\n name: string,\r\n password: string,\r\n role: UserRole = UserRole.GUEST,\r\n adminPassword?: string\r\n ): Promise<AuthEntity> {\r\n try {\r\n\r\n const normalizedDTO = this.normalizeAuthDTO({\r\n email,\r\n name,\r\n password,\r\n role,\r\n adminPassword\r\n });\r\n \r\n if (role === UserRole.ADMIN && adminPassword) {\r\n await validateAdminSecret(adminPassword);\r\n }\r\n \r\n await validateRegisterDTO(normalizedDTO, this.repository);\r\n\r\n const hashedPassword = await this.hashPassword(normalizedDTO.password);\r\n const authEntity = await this.createAuthEntity(\r\n normalizedDTO,\r\n hashedPassword\r\n );\r\n\r\n return await this.repository.create(authEntity);\r\n } catch (error) {\r\n throw error instanceof Error ? error : new Error(\"Registration failed\");\r\n }\r\n }\r\n\r\n private normalizeAuthDTO(dto: RegisterDTO): RegisterDTO {\r\n return {\r\n name: dto.name.trim(),\r\n email: dto.email.trim().toLowerCase(),\r\n role: dto.role,\r\n password: dto.password.trim(),\r\n adminPassword: dto.adminPassword?.trim() \r\n };\r\n }\r\n\r\n private async hashPassword(password: string): Promise<string> {\r\n return await bcrypt.hash(password, this.SALT_ROUNDS);\r\n }\r\n\r\n private async createAuthEntity(dto: RegisterDTO, hashedPassword: string): Promise<AuthEntity> {\r\n const authEntity = mapper.map(dto, RegisterDTO, AuthEntity);\r\n const userEntity = mapper.map(dto, RegisterDTO, UserEntity);\r\n \r\n authEntity.password = hashedPassword;\r\n authEntity.refreshToken = \"\";\r\n authEntity.user = userEntity;\r\n authEntity.user.updatedAt = null as any;\r\n \r\n return authEntity;\r\n }\r\n}\r\n","import { IBaseService, validateRepository } from \"cca-core\";\r\n\r\nimport { IDecodedToken } from \"../../domain/interfaces/IDecodedToken\";\r\n\r\nimport { JwtAuthService } from \"../../infrastructure/auth/JwtAuthService\";\r\nimport { AuthRepository } from \"../../infrastructure/repository/AuthRepository\";\r\n\r\nexport class RefreshTokenUseCase implements IBaseService {\r\n private readonly repository: AuthRepository;\r\n private readonly service: JwtAuthService;\r\n\r\n constructor(repository: AuthRepository, service: JwtAuthService) {\r\n this.repository = repository;\r\n this.service = service;\r\n }\r\n\r\n public async initialize(): Promise<void> {\r\n await validateRepository(this.repository, (repo) => repo.getAll());\r\n }\r\n\r\n async execute(\r\n refreshToken: string\r\n ): Promise<{ accessToken: string; refreshToken: string } | null> {\r\n try {\r\n const decoded = await this.service.verifyRefreshToken(refreshToken);\r\n\r\n const auth = decoded.userId\r\n ? await this.repository.findById(decoded.userId)\r\n : null;\r\n\r\n if (!auth || auth.refreshToken !== refreshToken) {\r\n return null;\r\n }\r\n\r\n const accessToken = this.service.generateAccessToken(auth.user);\r\n const newRefreshToken = this.service.generateRefreshToken(auth.user);\r\n\r\n await this.repository.update(auth.id, {\r\n refreshToken: newRefreshToken,\r\n });\r\n\r\n return { accessToken, refreshToken: newRefreshToken };\r\n } catch (error) {\r\n return null;\r\n }\r\n }\r\n\r\n async verityToken(token: string): Promise<IDecodedToken> {\r\n return await this.service.verifyAccessToken(token);\r\n }\r\n}\r\n","import { NextFunction, Request, Response } from \"express\";\r\n\r\nimport { LoginDTO } from \"../../application/dtos/LoginDTO\";\r\nimport { RegisterDTO } from \"../../application/dtos/RegisterDTO\";\r\n\r\nimport { RegisterUseCase } from \"../../application/useCase/RegisterUseCase\";\r\nimport { LoginUseCase } from \"../../application/useCase/LoginUseCase\";\r\nimport { LogoutUseCase } from \"../../application/useCase/LogoutUseCase \";\r\nimport { RefreshTokenUseCase } from \"../../application/useCase/RefreshTokenUseCase\";\r\n\r\nimport { IRefreshTokenRequest } from \"../../domain/interfaces/IRefreshTokenRequest\";\r\nimport { IDecodedToken } from \"../../domain/interfaces/IDecodedToken\";\r\n\r\nexport class AuthController {\r\n private loginUseCase: LoginUseCase;\r\n private readonly logoutUseCase: LogoutUseCase;\r\n private registerUseCase: RegisterUseCase;\r\n private refreshTokenUseCase: RefreshTokenUseCase;\r\n\r\n constructor(\r\n loginUseCase: LoginUseCase,\r\n logoutUseCase: LogoutUseCase,\r\n registerUseCase: RegisterUseCase,\r\n refreshTokenUseCase: RefreshTokenUseCase\r\n ) {\r\n this.loginUseCase = loginUseCase;\r\n this.logoutUseCase = logoutUseCase;\r\n this.registerUseCase = registerUseCase;\r\n this.refreshTokenUseCase = refreshTokenUseCase;\r\n }\r\n\r\n login = async (req: Request, res: Response, next: NextFunction) => {\r\n try {\r\n const { adminPassword, ...loginDTO }: LoginDTO = req.body;\r\n const result = await this.loginUseCase.execute(loginDTO, adminPassword);\r\n res.status(201).json(result);\r\n } catch (error) {\r\n next(error);\r\n }\r\n };\r\n\r\n logout = async (\r\n req: Request,\r\n res: Response,\r\n next: NextFunction\r\n ): Promise<void> => {\r\n try {\r\n await this.logoutUseCase.execute(req.params.id);\r\n res.status(200).json({ message: 'Logged out successfully' });\r\n } catch (error) {\r\n next(error);\r\n }\r\n };\r\n\r\n register = async (\r\n req: Request,\r\n res: Response,\r\n next: NextFunction\r\n ): Promise<void> => {\r\n try {\r\n const { email, name, password, role, adminPassword }: RegisterDTO = req.body;\r\n await this.registerUseCase.execute(email, name, password, role, adminPassword);\r\n } catch (error) {\r\n next(error);\r\n }\r\n };\r\n\r\n refreshToken = async (req: Request, res: Response) => {\r\n const { refreshToken }: IRefreshTokenRequest = req.body;\r\n const result = await this.refreshTokenUseCase.execute(refreshToken);\r\n res.json(result);\r\n };\r\n\r\n verifyToken = async (token: string): Promise<IDecodedToken> => {\r\n return await this.refreshTokenUseCase.verityToken(token);\r\n };\r\n}\r\n","import { BaseRepository, IBaseRepository, IExtendedBaseRepository } from \"cca-core\";\r\nimport { AuthEntity } from \"cca-entities\";\r\nimport { Repository } from \"typeorm\";\r\n\r\nexport class AuthRepository\r\n extends BaseRepository<AuthEntity>\r\n implements IExtendedBaseRepository<AuthEntity> {\r\n constructor(repository: Repository<AuthEntity>) {\r\n super(repository);\r\n }\r\n\r\n async findByEmail(email: string): Promise<AuthEntity | null> {\r\n const query = this.repository.createQueryBuilder('auth')\r\n .leftJoinAndSelect('auth.user', 'user')\r\n .addSelect('auth.password')\r\n .where('auth.email = :email', { email });\r\n\r\n return await query.getOne();\r\n }\r\n\r\n async create(entity: Omit<AuthEntity, \"createdAt\">): Promise<AuthEntity> {\r\n return super.create(entity);\r\n }\r\n}\r\n","import * as jwt from \"jsonwebtoken\";\r\nimport { Secret, SignOptions } from \"jsonwebtoken\";\r\nimport * as bcrypt from \"bcrypt\";\r\nimport { IBaseService, validateRepository } from \"cca-core\";\r\nimport { AuthEntity, UserEntity } from \"cca-entities\";\r\n\r\nimport { IJwtConfig } from \"../../domain/interfaces/IJwtConfig\";\r\nimport { IAuthService } from \"../../domain/interfaces/IAuthService\";\r\nimport { IDecodedToken } from \"../../domain/interfaces/IDecodedToken\";\r\n\r\nimport {\r\n ForbiddenError,\r\n JwtError,\r\n NotFoundError,\r\n UnauthorizedError,\r\n} from \"../../utils/Errors\";\r\n\r\nimport { AuthRepository } from \"../repository/AuthRepository\";\r\nimport { getConfig } from \"../../utils/config\";\r\n\r\nexport class JwtAuthService implements IBaseService, IAuthService {\r\n private jwtConfig: IJwtConfig | undefined;\r\n\r\n constructor(private readonly repository: AuthRepository, config?: IJwtConfig) {\r\n this.loadConfig(config);\r\n }\r\n\r\n private async loadConfig(config?: IJwtConfig) {\r\n const configData = await getConfig();\r\n this.jwtConfig = {\r\n accessTokenSecret: configData.JWT_ACCESS_SECRET || \"default-access-secret\",\r\n refreshTokenSecret: configData.JWT_REFRESH_SECRET || \"default-refresh-secret\",\r\n accessTokenExpiry: configData.ACCESS_TOKEN_EXPIRY || \"15m\",\r\n refreshTokenExpiry: configData.REFRESH_TOKEN_EXPIRY || \"7d\",\r\n ...config\r\n };\r\n this.validateConfiguration();\r\n }\r\n\r\n async initialize(): Promise<void> {\r\n await validateRepository(this.repository, repo => repo.getAll());\r\n }\r\n\r\n private validateConfiguration(): void {\r\n if (!this.jwtConfig?.accessTokenSecret || !this.jwtConfig?.refreshTokenSecret) {\r\n throw new JwtError(\"JWT secrets required in config\");\r\n }\r\n }\r\n\r\n async validateUser(email: string, password: string): Promise<AuthEntity | null> {\r\n const user = await this.repository.findByEmail(email);\r\n if (!user) {\r\n throw new NotFoundError(\"Invalid credentials\");\r\n }\r\n\r\n const validPassword = await bcrypt.compare(password, user.password);\r\n if (!validPassword) {\r\n throw new ForbiddenError(\"Invalid credentials\");\r\n }\r\n\r\n return user;\r\n }\r\n\r\n private verifyJwtConfig() {\r\n if (!this.jwtConfig) throw new JwtError(\"JWT config not loaded\");\r\n }\r\n\r\n generateAccessToken(user: UserEntity): string {\r\n this.verifyJwtConfig();\r\n return jwt.sign(\r\n { userId: user.id, email: user.email, role: user.role },\r\n this.jwtConfig!.accessTokenSecret as Secret,\r\n { expiresIn: this.jwtConfig!.accessTokenExpiry }\r\n );\r\n }\r\n\r\n generateRefreshToken(user: UserEntity): string {\r\n this.verifyJwtConfig();\r\n return jwt.sign(\r\n { userId: user.id },\r\n this.jwtConfig!.refreshTokenSecret as Secret,\r\n { expiresIn: this.jwtConfig!.refreshTokenExpiry }\r\n );\r\n }\r\n\r\n async verifyToken(token: string, secret: string): Promise<IDecodedToken> {\r\n try {\r\n return jwt.verify(token, secret) as IDecodedToken;\r\n } catch {\r\n throw new UnauthorizedError();\r\n }\r\n }\r\n\r\n async verifyAccessToken(token: string): Promise<IDecodedToken> {\r\n this.verifyJwtConfig();\r\n return this.verifyToken(token, this.jwtConfig!.accessTokenSecret);\r\n }\r\n\r\n async verifyRefreshToken(token: string): Promise<IDecodedToken> {\r\n this.verifyJwtConfig();\r\n return this.verifyToken(token, this.jwtConfig!.refreshTokenSecret);\r\n }\r\n}\r\n"],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;;;ACAA,IAAAA,mBAA4C;AAC5C,IAAAC,uBAA2B;;;ACD3B,IAAAC,mBAAiD;AACjD,IAAAC,uBAAiD;;;ACDjD,qBAAwB;AAGjB,IAAM,WAAN,MAAM,SAAQ;AAcrB;AAdqB;AAEnB;AAAA,MADC,wBAAQ;AAAA,GADE,SAEX;AAGA;AAAA,MADC,wBAAQ;AAAA,GAJE,SAKX;AAGA;AAAA,MADC,wBAAQ;AAAA,GAPE,SAQX;AAGA;AAAA,MADC,wBAAQ;AAAA,GAVE,SAWX;AAXK,IAAM,UAAN;;;ACHP,UAAqB;AACrB,0BAAqC;AACrC,oBAAmB;;;ACFZ,IAAM,YAAN,MAAM,kBAAiB,MAAM;AAAA,EAClC,YACS,SACA,aAAqB,KACrB,OAAe,YACtB;AACA,UAAM,OAAO;AAJN;AACA;AACA;AAGP,WAAO,eAAe,MAAM,WAAW,SAAS;AAChD,UAAM,kBAAkB,IAAI;AAAA,EAC9B;AACF;AAVoC;AAA7B,IAAM,WAAN;AAYA,IAAM,mBAAN,MAAM,yBAAwB,SAAS;AAAA,EAC5C,YAAY,SAAiB;AAC3B,UAAM,SAAS,GAAG;AAClB,SAAK,OAAO;AAAA,EACd;AACF;AAL8C;AAAvC,IAAM,kBAAN;AAcA,IAAM,iBAAN,MAAM,uBAAsB,SAAS;AAAA,EAC1C,YAAY,SAAiB;AAC3B,UAAM,SAAS,KAAK,mBAAmB;AAAA,EACzC;AACF;AAJ4C;AAArC,IAAM,gBAAN;AAMA,IAAM,kBAAN,MAAM,wBAAuB,SAAS;AAAA,EAC3C,YAAY,UAAkB,oBAAoB;AAChD,UAAM,SAAS,GAAG;AAClB,SAAK,OAAO;AAAA,EACd;AACF;AAL6C;AAAtC,IAAM,iBAAN;AAOA,IAAM,qBAAN,MAAM,2BAA0B,SAAS;AAAA,EAC9C,YAAY,UAAkB,uBAAuB;AACnD,UAAM,SAAS,GAAG;AAClB,SAAK,OAAO;AAAA,EACd;AACF;AALgD;AAAzC,IAAM,oBAAN;AAOA,IAAM,YAAN,MAAM,kBAAiB,SAAS;AAAA,EACrC,YAAY,SAAiB;AAC3B,UAAM,SAAS,GAAG;AAClB,SAAK,OAAO;AAAA,EACd;AACF;AALuC;AAAhC,IAAM,WAAN;;;AC9CP,sBAA2B;AAEpB,IAAM,YAAY,mCAA0B;AAC/C,QAAM,aAAa,UAAM,4BAAW;AAAA,IAChC,UAAU;AAAA,IACV,UAAU;AAAA,IACV,WAAW,QAAQ,IAAI;AAAA,EAC3B,CAAC;AACD,QAAM,gBAAgB,MAAM,OAAO,aAAa,EAAE;AAAA,IAAK,CAAC,OACpD,GAAG,SAAS,YAAY,OAAO;AAAA,EACnC;AAEA,SAAO,KAAK,MAAM,aAAa;AACnC,GAXyB;;;AFazB,IAAM,UAAU;AAAA,EACd,IAAQ,WAAO,EAAE,KAAK,wBAAwB;AAAA,EAC9C,OACG,WAAO,EACP,MAAM,sBAAsB,EAC5B,IAAI,KAAK,oCAAoC;AAAA,EAChD,MACG,WAAO,EACP,SAAS,kBAAkB,EAC3B,IAAI,GAAG,yCAAyC,EAChD,IAAI,IAAI,kCAAkC,EAC1C,QAAQ,iBAAiB,2CAA2C;AAAA,EACvE,UACG,WAAO,EACP,SAAS,mBAAmB,EAC5B,IAAI,GAAG,oBAAoB,EAC3B,IAAI,KAAK,mBAAmB,EAC5B;AAAA,IACC;AAAA,IACA;AAAA,EACF;AAAA,EACF,MACG,WAAO,EACP,SAAS,kBAAkB,EAC3B,MAAM,OAAO,OAAO,4BAAQ,GAAG,wBAAwB;AAC5D;AAEO,IAAM,gBAAgB,8BAC3B,OACA,eACwB;AACxB,MAAI;AACF,UAAM,QAAQ,MAAM,SAAS,OAAO,KAAK,EAAE,YAAY,CAAC;AACxD,UAAM,OAAO,MAAM,WAAW,YAAY,KAAK;AAC/C,QAAI,CAAC,MAAM;AACT,YAAM,IAAI;AAAA,QACR;AAAA,MACF;AAAA,IACF;AACA,WAAO;AAAA,EACT,SAAS,OAAY;AACnB,UAAM,IAAI,gBAAgB,MAAM,WAAW,sBAAsB;AAAA,EACnE;AACF,GAhB6B;AAkBtB,IAAM,mBAAmB,8BAAO,aAAqC;AAC1E,MAAI,UAAU;AACZ,QAAI;AACF,YAAM,QAAQ,SAAS,SAAS,QAAQ;AAAA,IAC1C,SAAS,OAAY;AACnB,YAAM,IAAI,gBAAgB,MAAM,WAAW,yBAAyB;AAAA,IACtE;AAAA,EACF;AACF,GARgC;AAUzB,IAAM,0BAA0B,8BACrC,YACA,OACA,kBACkB;AAClB,MAAI;AACF,UAAM,QAAQ,MAAM,SAAS,OAAO,KAAK,EAAE,YAAY,CAAC;AAExD,UAAM,eAAe,MAAM,WAAW,YAAY,KAAK;AAEvD,QAAI,CAAC,aAAc;AACnB,QAAI,aAAa,OAAO,cAAe;AAEvC,UAAM,IAAI,gBAAgB,SAAS,KAAK,qBAAqB;AAAA,EAC/D,SAAS,OAAY;AACnB,QAAI,iBAAiB,iBAAiB;AACpC,YAAM;AAAA,IACR;AACA,UAAM,IAAI,gBAAgB,8BAA8B;AAAA,EAC1D;AACF,GApBuC;AAsBhC,IAAM,sBAAsB,8BACjC,MACA,eACkB;AAClB,QAAM,EAAE,MAAM,OAAO,MAAM,SAAS,IAAI;AAExC,QAAM,QAAQ,IAAI;AAAA,IAChB,QAAQ,KAAK,SAAS,IAAI;AAAA,IAC1B,QAAQ,KAAK,SAAS,IAAI;AAAA,IAC1B,wBAAwB,YAAY,KAAK;AAAA,IACzC,iBAAiB,QAAQ;AAAA,EAC3B,CAAC;AACH,GAZmC;AAc5B,IAAM,mBAAmB,8BAC9B,MACA,eACwB;AACxB,QAAM,EAAE,OAAO,MAAM,SAAS,IAAI;AAElC,QAAM,QAAQ,IAAI,CAAC,QAAQ,KAAK,SAAS,IAAI,GAAG,QAAQ,SAAS,SAAS,QAAQ,CAAC,CAAC;AAEpF,QAAM,OAAO,MAAM,cAAc,OAAO,UAAU;AAClD,MAAI,CAAC,QAAQ,CAAC,KAAK,UAAU;AAC3B,UAAM,IAAI,cAAc,qBAAqB;AAAA,EAC/C;AAEA,QAAM,UAAU,MAAM,cAAAC,QAAO,QAAQ,UAAU,KAAK,QAAQ;AAC5D,MAAI,CAAC,SAAS;AACZ,UAAM,IAAI,eAAe,qBAAqB;AAAA,EAChD;AAEA,SAAO;AACT,GAnBgC;AAqBzB,IAAM,sBAAsB,8BACjC,mBACkB;AAClB,MAAI,CAAC,gBAAgB;AACnB,UAAM,IAAI,gBAAgB,4BAA4B;AAAA,EACxD;AAEA,MAAI;AACF,UAAM,SAAS,MAAM,UAAU;AAE/B,QAAI,CAAC,OAAO,uBAAuB;AACjC,YAAM,IAAI,gBAAgB,2CAA2C;AAAA,IACvE;AAEA,QAAI,SAAS,cAAc,MAAM,OAAO,uBAAuB;AAC7D,YAAM,IAAI,gBAAgB,wBAAwB;AAAA,IACpD;AAAA,EACF,SAAS,OAAO;AACd,QAAI,iBAAiB,iBAAiB;AACpC,YAAM;AAAA,IACR;AACA,UAAM,IAAI,gBAAgB,iCAAiC;AAAA,EAC7D;AACF,GAvBmC;;;AG/HnC,IAAAC,eAA6B;AAC7B,IAAAC,kBAAwB;;;ACDxB,kBAAsD;AACtD,IAAAC,uBAAuC;;;ACChC,IAAM,eAAN,MAAM,aAAY;AAMzB;AANyB;AAAlB,IAAM,cAAN;;;ADIA,SAAS,mBAAmBC,SAAsB;AACrD;AAAA,IACIA;AAAA,IACA;AAAA,IACA;AAAA,QACA,uBAAU,UAAQ,KAAK,WAAO,qBAAQ,SAAO,IAAI,KAAK,CAAC;AAAA,QACvD,uBAAU,UAAQ,KAAK,cAAU,qBAAQ,SAAO,IAAI,QAAQ,CAAC;AAAA,QAC7D,uBAAU,UAAQ,KAAK,UAAM,qBAAQ,SAAO,IAAI,IAAI,CAAC;AAAA,EAAC;AAE1D;AAAA,IACIA;AAAA,IACA;AAAA,IACA;AAAA,QACA,uBAAU,UAAQ,KAAK,UAAM,qBAAQ,SAAO,IAAI,IAAI,CAAC;AAAA,QACrD,uBAAU,UAAQ,KAAK,WAAO,qBAAQ,SAAO,IAAI,KAAK,CAAC;AAAA,QACvD,uBAAU,UAAQ,KAAK,UAAM,qBAAQ,SAAO,IAAI,IAAI,CAAC;AAAA,EAAC;AAE1D;AAAA,IACIA;AAAA,IACA;AAAA,IACA;AAAA,QACA,uBAAU,UAAQ,KAAK,QAAI,qBAAQ,SAAO,IAAI,EAAE,CAAC;AAAA,QACjD,uBAAU,UAAQ,KAAK,UAAM,qBAAQ,SAAO,IAAI,IAAI,CAAC;AAAA,QACrD,uBAAU,UAAQ,KAAK,WAAO,qBAAQ,SAAO,IAAI,KAAK,CAAC;AAAA,QACvD,uBAAU,UAAQ,KAAK,UAAM,qBAAQ,SAAO,IAAI,IAAI,CAAC;AAAA,EAAC;AAC9D;AAzBgB;;;ADDT,IAAM,aAAS,2BAAa;AAAA,EACjC,yBAAqB,yBAAQ;AAC/B,CAAC;AAED,mBAAmB,MAAM;;;ALUlB,IAAM,gBAAN,MAAM,cAAqC;AAAA,EAIhD,YACE,YACA,aACA;AACA,SAAK,aAAa;AAClB,SAAK,cAAc;AAAA,EACrB;AAAA,EAEA,MAAa,aAA4B;AACvC,cAAM,qCAAmB,KAAK,YAAY,CAAC,SAAS,KAAK,OAAO,CAAC;AAAA,EACnE;AAAA,EAEA,MAAM,QAAQ,UAAoB,eAAgD;AAChF,UAAM,OAAO,MAAM,KAAK,cAAc,UAAU,aAAa;AAC7D,UAAM,QAAQ,MAAM,KAAK,qBAAqB,IAAI;AAClD,UAAM,UAAU,KAAK,aAAa,KAAK,IAAI;AAE3C,WAAO,EAAE,OAAO,MAAM,QAAQ;AAAA,EAChC;AAAA,EAEA,MAAc,cACZ,UACA,eACqB;AACrB,UAAM,OAAO,MAAM,iBAAiB,UAAU,KAAK,UAAU;AAE7D,QAAI,SAAS,SAAS,8BAAS,SAAS,eAAe;AACrD,YAAM,oBAAoB,aAAa;AAAA,IACzC;AAEA,WAAO;AAAA,EACT;AAAA,EAEA,MAAc,qBAAqB,MAAsC;AACvE,UAAM,QAAQ,KAAK,eAAe,IAAI;AACtC,UAAM,KAAK,iBAAiB,IAAI;AAChC,UAAM,KAAK,uBAAuB,MAAM,MAAM,YAAY;AAE1D,WAAO;AAAA,EACT;AAAA,EAEQ,eAAe,MAA6B;AAClD,WAAO;AAAA,MACL,aAAa,KAAK,YAAY,oBAAoB,KAAK,IAAI;AAAA,MAC3D,cAAc,KAAK,YAAY,qBAAqB,KAAK,IAAI;AAAA,IAC/D;AAAA,EACF;AAAA,EAEA,MAAc,iBAAiB,MAAiC;AAC9D,SAAK,KAAK,cAAc,oBAAI,KAAK;AACjC,SAAK,KAAK,WAAW;AACrB,UAAM,KAAK,WAAW,OAAO,KAAK,IAAI,IAAI;AAAA,EAC5C;AAAA,EAEA,MAAc,uBACZ,MACA,cACe;AACf,SAAK,eAAe;AACpB,UAAM,KAAK,WAAW,OAAO,KAAK,IAAI,EAAE,aAAa,CAAC;AAAA,EACxD;AAAA,EAEQ,aAAa,MAA2B;AAC9C,WAAO,OAAO,IAAI,MAAM,iCAAY,OAAO;AAAA,EAC7C;AACF;AArEkD;AAA3C,IAAM,eAAN;;;AQnBP,IAAAC,mBAAiD;AAI1C,IAAM,iBAAN,MAAM,eAAsC;AAAA,EAG/C,YAAY,YAA4B;AACpC,SAAK,aAAa;AAAA,EACtB;AAAA,EAEA,MAAa,aAA4B;AACrC,cAAM,qCAAmB,KAAK,YAAY,CAAC,SAAS,KAAK,OAAO,CAAC;AAAA,EACrE;AAAA,EAEA,MAAM,QAAQ,QAA+B;AACzC,UAAM,OAAO,MAAM,KAAK,WAAW,SAAS,MAAM;AAClD,QAAI,CAAC,MAAM;AACP,YAAM,IAAI,MAAM,gBAAgB;AAAA,IACpC;AAEA,SAAK,eAAe;AACpB,SAAK,KAAK,WAAW;AAErB,UAAM,KAAK,WAAW,OAAO,KAAK,IAAI,IAAI;AAAA,EAC9C;AACJ;AAtBmD;AAA5C,IAAM,gBAAN;;;ACJP,IAAAC,mBAAiD;AACjD,IAAAC,UAAwB;AACxB,IAAAC,uBAAiD;AAQ1C,IAAM,mBAAN,MAAM,iBAAwC;AAAA,EAInD,YAAY,YAA4B;AAFxC,SAAiB,cAAc;AAG7B,SAAK,aAAa;AAAA,EACpB;AAAA,EAEA,MAAa,aAA4B;AACvC,cAAM,qCAAmB,KAAK,YAAY,CAAC,SAAS,KAAK,OAAO,CAAC;AAAA,EACnE;AAAA,EAEA,MAAa,QACX,OACA,MACA,UACA,OAAiB,8BAAS,OAC1B,eACqB;AACrB,QAAI;AAEF,YAAM,gBAAgB,KAAK,iBAAiB;AAAA,QAC1C;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,MACF,CAAC;AAED,UAAI,SAAS,8BAAS,SAAS,eAAe;AAC5C,cAAM,oBAAoB,aAAa;AAAA,MACzC;AAEA,YAAM,oBAAoB,eAAe,KAAK,UAAU;AAExD,YAAM,iBAAiB,MAAM,KAAK,aAAa,cAAc,QAAQ;AACrE,YAAM,aAAa,MAAM,KAAK;AAAA,QAC5B;AAAA,QACA;AAAA,MACF;AAEA,aAAO,MAAM,KAAK,WAAW,OAAO,UAAU;AAAA,IAChD,SAAS,OAAO;AACd,YAAM,iBAAiB,QAAQ,QAAQ,IAAI,MAAM,qBAAqB;AAAA,IACxE;AAAA,EACF;AAAA,EAEQ,iBAAiB,KAA+B;AACtD,WAAO;AAAA,MACL,MAAM,IAAI,KAAK,KAAK;AAAA,MACpB,OAAO,IAAI,MAAM,KAAK,EAAE,YAAY;AAAA,MACpC,MAAM,IAAI;AAAA,MACV,UAAU,IAAI,SAAS,KAAK;AAAA,MAC5B,eAAe,IAAI,eAAe,KAAK;AAAA,IACzC;AAAA,EACF;AAAA,EAEA,MAAc,aAAa,UAAmC;AAC5D,WAAO,MAAa,aAAK,UAAU,KAAK,WAAW;AAAA,EACrD;AAAA,EAEA,MAAc,iBAAiB,KAAkB,gBAA6C;AAC5F,UAAM,aAAa,OAAO,IAAI,KAAK,aAAa,+BAAU;AAC1D,UAAM,aAAa,OAAO,IAAI,KAAK,aAAa,+BAAU;AAE1D,eAAW,WAAW;AACtB,eAAW,eAAe;AAC1B,eAAW,OAAO;AAClB,eAAW,KAAK,YAAY;AAE5B,WAAO;AAAA,EACT;AACF;AAxEqD;AAA9C,IAAM,kBAAN;;;ACVP,IAAAC,mBAAiD;AAO1C,IAAM,uBAAN,MAAM,qBAA4C;AAAA,EAIvD,YAAY,YAA4B,SAAyB;AAC/D,SAAK,aAAa;AAClB,SAAK,UAAU;AAAA,EACjB;AAAA,EAEA,MAAa,aAA4B;AACvC,cAAM,qCAAmB,KAAK,YAAY,CAAC,SAAS,KAAK,OAAO,CAAC;AAAA,EACnE;AAAA,EAEA,MAAM,QACJ,cAC+D;AAC/D,QAAI;AACF,YAAM,UAAU,MAAM,KAAK,QAAQ,mBAAmB,YAAY;AAElE,YAAM,OAAO,QAAQ,SACjB,MAAM,KAAK,WAAW,SAAS,QAAQ,MAAM,IAC7C;AAEJ,UAAI,CAAC,QAAQ,KAAK,iBAAiB,cAAc;AAC/C,eAAO;AAAA,MACT;AAEA,YAAM,cAAc,KAAK,QAAQ,oBAAoB,KAAK,IAAI;AAC9D,YAAM,kBAAkB,KAAK,QAAQ,qBAAqB,KAAK,IAAI;AAEnE,YAAM,KAAK,WAAW,OAAO,KAAK,IAAI;AAAA,QACpC,cAAc;AAAA,MAChB,CAAC;AAED,aAAO,EAAE,aAAa,cAAc,gBAAgB;AAAA,IACtD,SAAS,OAAO;AACd,aAAO;AAAA,IACT;AAAA,EACF;AAAA,EAEA,MAAM,YAAY,OAAuC;AACvD,WAAO,MAAM,KAAK,QAAQ,kBAAkB,KAAK;AAAA,EACnD;AACF;AA3CyD;AAAlD,IAAM,sBAAN;;;ACMA,IAAM,kBAAN,MAAM,gBAAe;AAAA,EAM1B,YACE,cACA,eACA,iBACA,qBACA;AAOF,iBAAQ,8BAAO,KAAc,KAAe,SAAuB;AACjE,UAAI;AACF,cAAM,EAAE,eAAe,GAAG,SAAS,IAAc,IAAI;AACrD,cAAM,SAAS,MAAM,KAAK,aAAa,QAAQ,UAAU,aAAa;AACtE,YAAI,OAAO,GAAG,EAAE,KAAK,MAAM;AAAA,MAC7B,SAAS,OAAO;AACd,aAAK,KAAK;AAAA,MACZ;AAAA,IACF,GARQ;AAUR,kBAAS,8BACP,KACA,KACA,SACkB;AAClB,UAAI;AACF,cAAM,KAAK,cAAc,QAAQ,IAAI,OAAO,EAAE;AAC9C,YAAI,OAAO,GAAG,EAAE,KAAK,EAAE,SAAS,0BAA0B,CAAC;AAAA,MAC7D,SAAS,OAAO;AACd,aAAK,KAAK;AAAA,MACZ;AAAA,IACF,GAXS;AAaT,oBAAW,8BACT,KACA,KACA,SACkB;AAClB,UAAI;AACF,cAAM,EAAE,OAAO,MAAM,UAAU,MAAM,cAAc,IAAiB,IAAI;AACxE,cAAM,KAAK,gBAAgB,QAAQ,OAAO,MAAM,UAAU,MAAM,aAAa;AAAA,MAC/E,SAAS,OAAO;AACd,aAAK,KAAK;AAAA,MACZ;AAAA,IACF,GAXW;AAaX,wBAAe,8BAAO,KAAc,QAAkB;AACpD,YAAM,EAAE,aAAa,IAA0B,IAAI;AACnD,YAAM,SAAS,MAAM,KAAK,oBAAoB,QAAQ,YAAY;AAClE,UAAI,KAAK,MAAM;AAAA,IACjB,GAJe;AAMf,uBAAc,8BAAO,UAA0C;AAC7D,aAAO,MAAM,KAAK,oBAAoB,YAAY,KAAK;AAAA,IACzD,GAFc;AAhDZ,SAAK,eAAe;AACpB,SAAK,gBAAgB;AACrB,SAAK,kBAAkB;AACvB,SAAK,sBAAsB;AAAA,EAC7B;AA+CF;AA/D4B;AAArB,IAAM,iBAAN;;;ACbP,IAAAC,mBAAyE;AAIlE,IAAM,kBAAN,MAAM,wBACH,gCACuC;AAAA,EAC/C,YAAY,YAAoC;AAC9C,UAAM,UAAU;AAAA,EAClB;AAAA,EAEA,MAAM,YAAY,OAA2C;AAC3D,UAAM,QAAQ,KAAK,WAAW,mBAAmB,MAAM,EACpD,kBAAkB,aAAa,MAAM,EACrC,UAAU,eAAe,EACzB,MAAM,uBAAuB,EAAE,MAAM,CAAC;AAEzC,WAAO,MAAM,MAAM,OAAO;AAAA,EAC5B;AAAA,EAEA,MAAM,OAAO,QAA4D;AACvE,WAAO,MAAM,OAAO,MAAM;AAAA,EAC5B;AACF;AAjBiD;AAF1C,IAAM,iBAAN;;;ACJP,UAAqB;AAErB,IAAAC,UAAwB;AACxB,IAAAC,mBAAiD;AAiB1C,IAAM,kBAAN,MAAM,gBAAqD;AAAA,EAGhE,YAA6B,YAA4B,QAAqB;AAAjD;AAC3B,SAAK,WAAW,MAAM;AAAA,EACxB;AAAA,EAEA,MAAc,WAAW,QAAqB;AAC5C,UAAM,aAAa,MAAM,UAAU;AACnC,SAAK,YAAY;AAAA,MACf,mBAAmB,WAAW,qBAAqB;AAAA,MACnD,oBAAoB,WAAW,sBAAsB;AAAA,MACrD,mBAAmB,WAAW,uBAAuB;AAAA,MACrD,oBAAoB,WAAW,wBAAwB;AAAA,MACvD,GAAG;AAAA,IACL;AACA,SAAK,sBAAsB;AAAA,EAC7B;AAAA,EAEA,MAAM,aAA4B;AAChC,cAAM,qCAAmB,KAAK,YAAY,UAAQ,KAAK,OAAO,CAAC;AAAA,EACjE;AAAA,EAEQ,wBAA8B;AACpC,QAAI,CAAC,KAAK,WAAW,qBAAqB,CAAC,KAAK,WAAW,oBAAoB;AAC7E,YAAM,IAAI,SAAS,gCAAgC;AAAA,IACrD;AAAA,EACF;AAAA,EAEA,MAAM,aAAa,OAAe,UAA8C;AAC9E,UAAM,OAAO,MAAM,KAAK,WAAW,YAAY,KAAK;AACpD,QAAI,CAAC,MAAM;AACT,YAAM,IAAI,cAAc,qBAAqB;AAAA,IAC/C;AAEA,UAAM,gBAAgB,MAAa,gBAAQ,UAAU,KAAK,QAAQ;AAClE,QAAI,CAAC,eAAe;AAClB,YAAM,IAAI,eAAe,qBAAqB;AAAA,IAChD;AAEA,WAAO;AAAA,EACT;AAAA,EAEQ,kBAAkB;AACxB,QAAI,CAAC,KAAK,UAAW,OAAM,IAAI,SAAS,uBAAuB;AAAA,EACjE;AAAA,EAEA,oBAAoB,MAA0B;AAC5C,SAAK,gBAAgB;AACrB,WAAW;AAAA,MACT,EAAE,QAAQ,KAAK,IAAI,OAAO,KAAK,OAAO,MAAM,KAAK,KAAK;AAAA,MACtD,KAAK,UAAW;AAAA,MAChB,EAAE,WAAW,KAAK,UAAW,kBAAkB;AAAA,IACjD;AAAA,EACF;AAAA,EAEA,qBAAqB,MAA0B;AAC7C,SAAK,gBAAgB;AACrB,WAAW;AAAA,MACT,EAAE,QAAQ,KAAK,GAAG;AAAA,MAClB,KAAK,UAAW;AAAA,MAChB,EAAE,WAAW,KAAK,UAAW,mBAAmB;AAAA,IAClD;AAAA,EACF;AAAA,EAEA,MAAM,YAAY,OAAe,QAAwC;AACvE,QAAI;AACF,aAAW,WAAO,OAAO,MAAM;AAAA,IACjC,QAAQ;AACN,YAAM,IAAI,kBAAkB;AAAA,IAC9B;AAAA,EACF;AAAA,EAEA,MAAM,kBAAkB,OAAuC;AAC7D,SAAK,gBAAgB;AACrB,WAAO,KAAK,YAAY,OAAO,KAAK,UAAW,iBAAiB;AAAA,EAClE;AAAA,EAEA,MAAM,mBAAmB,OAAuC;AAC9D,SAAK,gBAAgB;AACrB,WAAO,KAAK,YAAY,OAAO,KAAK,UAAW,kBAAkB;AAAA,EACnE;AACF;AAlFkE;AAA3D,IAAM,iBAAN;;;AdPP,SAAS,oBAAoB,UAAwB;AACnD,QAAM,YAAY,IAAI,+BAAc,EAAE,SAAS,CAAC;AAEhD,QAAM,iBAAiB,IAAI;AAAA,IACzB,SAAS,cAAc,+BAAU;AAAA,EACnC;AACA,YAAU,mBAA+B,kBAAkB,cAAc;AAEzE,QAAM,iBAAiB,IAAI,eAAe,cAAc;AACxD,YAAU,gBAAgB,kBAAkB,cAAc;AAE1D,QAAM,eAAe,IAAI,aAAa,gBAAgB,cAAc;AACpE,QAAM,gBAAgB,IAAI,cAAc,cAAc;AACtD,QAAM,kBAAkB,IAAI,gBAAgB,cAAc;AAC1D,QAAM,sBAAsB,IAAI;AAAA,IAC9B;AAAA,IACA;AAAA,EACF;AACA,YAAU,gBAAgB,gBAAgB,YAAY;AACtD,YAAU,gBAAgB,mBAAmB,eAAe;AAC5D,YAAU,gBAAgB,uBAAuB,mBAAmB;AACpE,YAAU,gBAAgB,iBAAiB,aAAa;AAExD,QAAM,iBAAiB,IAAI;AAAA,IACzB;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EACF;AAEA,SAAO,EAAE,WAAW,eAAe;AACrC;AA/BS;","names":["import_cca_core","import_cca_entities","import_cca_core","import_cca_entities","bcrypt","import_core","import_classes","import_cca_entities","mapper","import_cca_core","import_cca_core","bcrypt","import_cca_entities","import_cca_core","import_cca_core","bcrypt","import_cca_core"]}
package/dist/index.mjs CHANGED
@@ -259,31 +259,70 @@ var _LoginUseCase = class _LoginUseCase {
259
259
  await validateRepository(this.repository, (repo) => repo.getAll());
260
260
  }
261
261
  async execute(loginDTO, adminPassword) {
262
- const { role } = loginDTO;
262
+ const auth = await this.validateLogin(loginDTO, adminPassword);
263
+ const token = await this.handleAuthentication(auth);
264
+ const userDTO = this.mapUserToDTO(auth.user);
265
+ return { token, user: userDTO };
266
+ }
267
+ async validateLogin(loginDTO, adminPassword) {
263
268
  const auth = await validateLoginDTO(loginDTO, this.repository);
264
- if (role === UserRole2.ADMIN && adminPassword) {
269
+ if (loginDTO.role === UserRole2.ADMIN && adminPassword) {
265
270
  await validateAdminSecret(adminPassword);
266
271
  }
272
+ return auth;
273
+ }
274
+ async handleAuthentication(auth) {
267
275
  const token = this.generateTokens(auth);
268
- const userDTO = mapper.map(auth.user, UserEntity2, UserDTO);
269
- return { token, user: userDTO };
276
+ await this.updateUserStatus(auth);
277
+ await this.updateUserRefreshToken(auth, token.refreshToken);
278
+ return token;
270
279
  }
271
280
  generateTokens(auth) {
272
- const accessToken = this.authService.generateAccessToken(auth.user);
273
- const refreshToken = this.authService.generateRefreshToken(auth.user);
274
- this.updateUserRefreshToken(auth, refreshToken);
275
- return { accessToken, refreshToken };
281
+ return {
282
+ accessToken: this.authService.generateAccessToken(auth.user),
283
+ refreshToken: this.authService.generateRefreshToken(auth.user)
284
+ };
285
+ }
286
+ async updateUserStatus(auth) {
287
+ auth.user.lastLoginAt = /* @__PURE__ */ new Date();
288
+ auth.user.isActive = true;
289
+ await this.repository.update(auth.id, auth);
276
290
  }
277
291
  async updateUserRefreshToken(auth, refreshToken) {
278
292
  auth.refreshToken = refreshToken;
279
293
  await this.repository.update(auth.id, { refreshToken });
280
294
  }
295
+ mapUserToDTO(user) {
296
+ return mapper.map(user, UserEntity2, UserDTO);
297
+ }
281
298
  };
282
299
  __name(_LoginUseCase, "LoginUseCase");
283
300
  var LoginUseCase = _LoginUseCase;
284
301
 
285
- // src/application/useCase/RegisterUseCase.ts
302
+ // src/application/useCase/LogoutUseCase .ts
286
303
  import { validateRepository as validateRepository2 } from "cca-core";
304
+ var _LogoutUseCase = class _LogoutUseCase {
305
+ constructor(repository) {
306
+ this.repository = repository;
307
+ }
308
+ async initialize() {
309
+ await validateRepository2(this.repository, (repo) => repo.getAll());
310
+ }
311
+ async execute(authId) {
312
+ const auth = await this.repository.findById(authId);
313
+ if (!auth) {
314
+ throw new Error("Auth not found");
315
+ }
316
+ auth.refreshToken = null;
317
+ auth.user.isActive = false;
318
+ await this.repository.update(auth.id, auth);
319
+ }
320
+ };
321
+ __name(_LogoutUseCase, "LogoutUseCase");
322
+ var LogoutUseCase = _LogoutUseCase;
323
+
324
+ // src/application/useCase/RegisterUseCase.ts
325
+ import { validateRepository as validateRepository3 } from "cca-core";
287
326
  import * as bcrypt2 from "bcrypt";
288
327
  import { AuthEntity as AuthEntity4, UserEntity as UserEntity3, UserRole as UserRole3 } from "cca-entities";
289
328
  var _RegisterUseCase = class _RegisterUseCase {
@@ -292,16 +331,20 @@ var _RegisterUseCase = class _RegisterUseCase {
292
331
  this.repository = repository;
293
332
  }
294
333
  async initialize() {
295
- await validateRepository2(this.repository, (repo) => repo.getAll());
334
+ await validateRepository3(this.repository, (repo) => repo.getAll());
296
335
  }
297
- async execute(email, name, password, role = UserRole3.GUEST) {
336
+ async execute(email, name, password, role = UserRole3.GUEST, adminPassword) {
298
337
  try {
299
338
  const normalizedDTO = this.normalizeAuthDTO({
300
339
  email,
301
340
  name,
302
341
  password,
303
- role
342
+ role,
343
+ adminPassword
304
344
  });
345
+ if (role === UserRole3.ADMIN && adminPassword) {
346
+ await validateAdminSecret(adminPassword);
347
+ }
305
348
  await validateRegisterDTO(normalizedDTO, this.repository);
306
349
  const hashedPassword = await this.hashPassword(normalizedDTO.password);
307
350
  const authEntity = await this.createAuthEntity(
@@ -318,7 +361,8 @@ var _RegisterUseCase = class _RegisterUseCase {
318
361
  name: dto.name.trim(),
319
362
  email: dto.email.trim().toLowerCase(),
320
363
  role: dto.role,
321
- password: dto.password.trim()
364
+ password: dto.password.trim(),
365
+ adminPassword: dto.adminPassword?.trim()
322
366
  };
323
367
  }
324
368
  async hashPassword(password) {
@@ -338,14 +382,14 @@ __name(_RegisterUseCase, "RegisterUseCase");
338
382
  var RegisterUseCase = _RegisterUseCase;
339
383
 
340
384
  // src/application/useCase/RefreshTokenUseCase.ts
341
- import { validateRepository as validateRepository3 } from "cca-core";
385
+ import { validateRepository as validateRepository4 } from "cca-core";
342
386
  var _RefreshTokenUseCase = class _RefreshTokenUseCase {
343
387
  constructor(repository, service) {
344
388
  this.repository = repository;
345
389
  this.service = service;
346
390
  }
347
391
  async initialize() {
348
- await validateRepository3(this.repository, (repo) => repo.getAll());
392
+ await validateRepository4(this.repository, (repo) => repo.getAll());
349
393
  }
350
394
  async execute(refreshToken) {
351
395
  try {
@@ -373,7 +417,7 @@ var RefreshTokenUseCase = _RefreshTokenUseCase;
373
417
 
374
418
  // src/presentation/controller/AuthController.ts
375
419
  var _AuthController = class _AuthController {
376
- constructor(loginUseCase, registerUseCase, refreshTokenUseCase) {
420
+ constructor(loginUseCase, logoutUseCase, registerUseCase, refreshTokenUseCase) {
377
421
  this.login = /* @__PURE__ */ __name(async (req, res, next) => {
378
422
  try {
379
423
  const { adminPassword, ...loginDTO } = req.body;
@@ -383,10 +427,18 @@ var _AuthController = class _AuthController {
383
427
  next(error);
384
428
  }
385
429
  }, "login");
430
+ this.logout = /* @__PURE__ */ __name(async (req, res, next) => {
431
+ try {
432
+ await this.logoutUseCase.execute(req.params.id);
433
+ res.status(200).json({ message: "Logged out successfully" });
434
+ } catch (error) {
435
+ next(error);
436
+ }
437
+ }, "logout");
386
438
  this.register = /* @__PURE__ */ __name(async (req, res, next) => {
387
439
  try {
388
- const { email, name, password, role } = req.body;
389
- await this.registerUseCase.execute(email, name, password, role);
440
+ const { email, name, password, role, adminPassword } = req.body;
441
+ await this.registerUseCase.execute(email, name, password, role, adminPassword);
390
442
  } catch (error) {
391
443
  next(error);
392
444
  }
@@ -400,6 +452,7 @@ var _AuthController = class _AuthController {
400
452
  return await this.refreshTokenUseCase.verityToken(token);
401
453
  }, "verifyToken");
402
454
  this.loginUseCase = loginUseCase;
455
+ this.logoutUseCase = logoutUseCase;
403
456
  this.registerUseCase = registerUseCase;
404
457
  this.refreshTokenUseCase = refreshTokenUseCase;
405
458
  }
@@ -427,7 +480,7 @@ var AuthRepository = _AuthRepository;
427
480
  // src/infrastructure/auth/JwtAuthService.ts
428
481
  import * as jwt from "jsonwebtoken";
429
482
  import * as bcrypt3 from "bcrypt";
430
- import { validateRepository as validateRepository4 } from "cca-core";
483
+ import { validateRepository as validateRepository5 } from "cca-core";
431
484
  var _JwtAuthService = class _JwtAuthService {
432
485
  constructor(repository, config) {
433
486
  this.repository = repository;
@@ -445,7 +498,7 @@ var _JwtAuthService = class _JwtAuthService {
445
498
  this.validateConfiguration();
446
499
  }
447
500
  async initialize() {
448
- await validateRepository4(this.repository, (repo) => repo.getAll());
501
+ await validateRepository5(this.repository, (repo) => repo.getAll());
449
502
  }
450
503
  validateConfiguration() {
451
504
  if (!this.jwtConfig?.accessTokenSecret || !this.jwtConfig?.refreshTokenSecret) {
@@ -511,6 +564,7 @@ function createAuthContainer(database) {
511
564
  const jwtAuthService = new JwtAuthService(authRepository);
512
565
  container.registerService("JwtAuthService", jwtAuthService);
513
566
  const loginUseCase = new LoginUseCase(authRepository, jwtAuthService);
567
+ const logoutUseCase = new LogoutUseCase(authRepository);
514
568
  const registerUseCase = new RegisterUseCase(authRepository);
515
569
  const refreshTokenUseCase = new RefreshTokenUseCase(
516
570
  authRepository,
@@ -519,8 +573,10 @@ function createAuthContainer(database) {
519
573
  container.registerService("LoginUseCase", loginUseCase);
520
574
  container.registerService("RegisterUseCase", registerUseCase);
521
575
  container.registerService("RefreshTokenUseCase", refreshTokenUseCase);
576
+ container.registerService("LogoutUseCase", logoutUseCase);
522
577
  const authController = new AuthController(
523
578
  loginUseCase,
579
+ logoutUseCase,
524
580
  registerUseCase,
525
581
  refreshTokenUseCase
526
582
  );
@@ -1 +1 @@
1
- {"version":3,"sources":["../src/infrastructure/container/createAuthContainer.ts","../src/application/useCase/LoginUseCase.ts","../src/application/dtos/UserDTO.ts","../src/application/validators/authValidation.ts","../src/utils/Errors.ts","../src/utils/config.ts","../src/application/mappers/utils/mapper.ts","../src/application/mappers/createUserMappings.ts","../src/application/dtos/RegisterDTO.ts","../src/application/useCase/RegisterUseCase.ts","../src/application/useCase/RefreshTokenUseCase.ts","../src/presentation/controller/AuthController.ts","../src/infrastructure/repository/AuthRepository.ts","../src/infrastructure/auth/JwtAuthService.ts"],"sourcesContent":["import { BaseContainer, BaseDatabase } from \"cca-core\";\r\nimport { AuthEntity } from \"cca-entities\";\r\n\r\nimport { LoginUseCase } from \"../../application/useCase/LoginUseCase\";\r\nimport { RegisterUseCase } from \"../../application/useCase/RegisterUseCase\";\r\nimport { RefreshTokenUseCase } from \"../../application/useCase/RefreshTokenUseCase\";\r\n\r\nimport { AuthController } from \"../../presentation/controller/AuthController\";\r\n\r\nimport { AuthRepository } from \"../repository/AuthRepository\";\r\nimport { JwtAuthService } from \"../auth/JwtAuthService\";\r\n\r\nfunction createAuthContainer(database: BaseDatabase) {\r\n const container = new BaseContainer({ database });\r\n\r\n const authRepository = new AuthRepository(\r\n database.getRepository(AuthEntity)\r\n );\r\n container.registerRepository<AuthEntity>(\"AuthRepository\", authRepository);\r\n\r\n const jwtAuthService = new JwtAuthService(authRepository);\r\n container.registerService(\"JwtAuthService\", jwtAuthService);\r\n\r\n const loginUseCase = new LoginUseCase(authRepository, jwtAuthService);\r\n const registerUseCase = new RegisterUseCase(authRepository);\r\n const refreshTokenUseCase = new RefreshTokenUseCase(\r\n authRepository,\r\n jwtAuthService\r\n );\r\n container.registerService(\"LoginUseCase\", loginUseCase);\r\n container.registerService(\"RegisterUseCase\", registerUseCase);\r\n container.registerService(\"RefreshTokenUseCase\", refreshTokenUseCase);\r\n\r\n const authController = new AuthController(\r\n loginUseCase,\r\n registerUseCase,\r\n refreshTokenUseCase\r\n );\r\n\r\n return { container, authController };\r\n}\r\n\r\nexport { createAuthContainer };\r\n","import { IBaseService, validateRepository } from \"cca-core\";\r\nimport { AuthEntity, UserEntity, UserRole } from \"cca-entities\";\r\n\r\nimport { AuthRepository } from \"../../infrastructure/repository/AuthRepository\";\r\nimport { JwtAuthService } from \"../../infrastructure/auth/JwtAuthService\";\r\n\r\nimport { UserDTO } from \"../dtos/UserDTO\";\r\nimport { LoginDTO } from \"../dtos/LoginDTO\";\r\nimport {\r\n validateAdminSecret,\r\n validateLoginDTO,\r\n} from \"../validators/authValidation\";\r\nimport { mapper } from \"../mappers/utils/mapper\";\r\n\r\nexport class LoginUseCase implements IBaseService {\r\n private readonly repository: AuthRepository;\r\n private readonly authService: JwtAuthService;\r\n\r\n constructor(repository: AuthRepository, authService: JwtAuthService) {\r\n this.repository = repository;\r\n this.authService = authService;\r\n }\r\n\r\n public async initialize(): Promise<void> {\r\n await validateRepository(this.repository, (repo) => repo.getAll());\r\n }\r\n\r\n async execute(\r\n loginDTO: LoginDTO,\r\n adminPassword?: string\r\n ): Promise<{\r\n token: { accessToken: string; refreshToken: string };\r\n user: UserDTO;\r\n }> {\r\n const { role } = loginDTO;\r\n\r\n const auth = await validateLoginDTO(loginDTO, this.repository);\r\n\r\n if (role === UserRole.ADMIN && adminPassword) {\r\n await validateAdminSecret(adminPassword);\r\n }\r\n\r\n const token = this.generateTokens(auth);\r\n\r\n const userDTO = mapper.map(auth.user, UserEntity, UserDTO);\r\n\r\n return { token, user: userDTO };\r\n }\r\n\r\n private generateTokens(auth: AuthEntity): {\r\n accessToken: string;\r\n refreshToken: string;\r\n } {\r\n const accessToken = this.authService.generateAccessToken(auth.user);\r\n const refreshToken = this.authService.generateRefreshToken(auth.user);\r\n this.updateUserRefreshToken(auth, refreshToken); \r\n return { accessToken, refreshToken };\r\n }\r\n\r\n private async updateUserRefreshToken(\r\n auth: AuthEntity,\r\n refreshToken: string\r\n ): Promise<void> {\r\n auth.refreshToken = refreshToken;\r\n await this.repository.update(auth.id, { refreshToken });\r\n }\r\n}\r\n","import { AutoMap } from \"@automapper/classes\";\r\nimport { UserRole } from \"cca-entities\";\r\n\r\nexport class UserDTO {\r\n @AutoMap()\r\n id!: string;\r\n\r\n @AutoMap()\r\n name!: string;\r\n\r\n @AutoMap()\r\n email!: string;\r\n\r\n @AutoMap()\r\n role!: UserRole;\r\n\r\n adminPassword?: string;\r\n}","import * as yup from \"yup\";\r\nimport { AuthEntity, UserRole } from \"cca-entities\";\r\nimport bcrypt from \"bcrypt\";\r\n\r\nimport {\r\n ForbiddenError,\r\n NotFoundError,\r\n ValidationError,\r\n} from \"../../utils/Errors\";\r\nimport { AuthRepository } from \"../../infrastructure/repository/AuthRepository\";\r\n\r\nimport { RegisterDTO } from \"../dtos/RegisterDTO\";\r\nimport { LoginDTO } from \"../dtos/LoginDTO\";\r\nimport { getConfig } from \"../../utils/config\";\r\n\r\nconst schemas = {\r\n id: yup.string().uuid(\"Invalid user ID format\"),\r\n email: yup\r\n .string()\r\n .email(\"Invalid email format\")\r\n .max(255, \"Email cannot exceed 255 characters\"),\r\n name: yup\r\n .string()\r\n .required(\"Name is required\")\r\n .min(2, \"Name must be at least 2 characters long\")\r\n .max(50, \"Name cannot exceed 50 characters\")\r\n .matches(/^[a-zA-Z\\s]+$/, \"Name must only contain letters and spaces\"),\r\n password: yup\r\n .string()\r\n .required(\"Password required\")\r\n .min(8, \"Password too short\")\r\n .max(100, \"Password too long\")\r\n .matches(\r\n /^(?=.*[a-z])(?=.*[A-Z])(?=.*\\d)(?=.*[@$!%*?&])[A-Za-z\\d@$!%*?&]/,\r\n \"Password must contain uppercase, lowercase, number and special character\"\r\n ),\r\n role: yup\r\n .string()\r\n .required(\"Role is required\")\r\n .oneOf(Object.values(UserRole), \"Invalid role specified\"),\r\n};\r\n\r\nexport const validateEmail = async (\r\n email: string,\r\n repository: AuthRepository\r\n): Promise<AuthEntity> => {\r\n try {\r\n await schemas.email.validate(email?.trim().toLowerCase());\r\n const user = await repository.findByEmail(email);\r\n if (!user) {\r\n throw new NotFoundError(\r\n \"The email address or password is incorrect. Please retry\"\r\n );\r\n }\r\n return user;\r\n } catch (error: any) {\r\n throw new ValidationError(error.message || \"Invalid email format\");\r\n }\r\n};\r\n\r\nexport const validatePassword = async (password?: string): Promise<void> => {\r\n if (password) {\r\n try {\r\n await schemas.password.validate(password);\r\n } catch (error: any) {\r\n throw new ValidationError(error.message || \"Invalid password format\");\r\n }\r\n }\r\n};\r\n\r\nexport const validateEmailUniqueness = async (\r\n repository: AuthRepository,\r\n email: string,\r\n excludeUserId?: string\r\n): Promise<void> => {\r\n try {\r\n await schemas.email.validate(email?.trim().toLowerCase());\r\n\r\n const existingUser = await repository.findByEmail(email);\r\n\r\n if (!existingUser) return;\r\n if (existingUser.id === excludeUserId) return;\r\n\r\n throw new ValidationError(`Email ${email} is already in use.`);\r\n } catch (error: any) {\r\n if (error instanceof ValidationError) {\r\n throw error;\r\n }\r\n throw new ValidationError(\"user email validation failed\");\r\n }\r\n};\r\n\r\nexport const validateRegisterDTO = async (\r\n auth: RegisterDTO,\r\n repository: AuthRepository\r\n): Promise<void> => {\r\n const { name, email, role, password } = auth;\r\n\r\n await Promise.all([\r\n schemas.name.validate(name),\r\n schemas.role.validate(role),\r\n validateEmailUniqueness(repository, email),\r\n validatePassword(password),\r\n ]);\r\n};\r\n\r\nexport const validateLoginDTO = async (\r\n data: LoginDTO,\r\n repository: AuthRepository\r\n): Promise<AuthEntity> => {\r\n const { email, role, password } = data;\r\n\r\n await Promise.all([schemas.role.validate(role), schemas.password.validate(password)]);\r\n\r\n const auth = await validateEmail(email, repository);\r\n if (!auth || !auth.password) {\r\n throw new NotFoundError(\"Invalid credentials\");\r\n }\r\n\r\n const isMatch = await bcrypt.compare(password, auth.password);\r\n if (!isMatch) {\r\n throw new ForbiddenError(\"Invalid credentials\");\r\n }\r\n\r\n return auth;\r\n};\r\n\r\nexport const validateAdminSecret = async (\r\n secretPassword?: string\r\n): Promise<void> => {\r\n if (!secretPassword) {\r\n throw new ValidationError(\"Admin password is required\");\r\n }\r\n\r\n try {\r\n const config = await getConfig();\r\n\r\n if (!config.ADMIN_SECRET_PASSWORD) {\r\n throw new ValidationError(\"ADMIN_SECRET_PASSWORD not found in config\");\r\n }\r\n\r\n if (parseInt(secretPassword) !== config.ADMIN_SECRET_PASSWORD) {\r\n throw new ValidationError(\"Invalid admin password\");\r\n }\r\n } catch (error) {\r\n if (error instanceof ValidationError) {\r\n throw error;\r\n }\r\n throw new ValidationError(\"Error validating admin password\");\r\n }\r\n};\r\n","export class AppError extends Error {\r\n constructor(\r\n public message: string,\r\n public statusCode: number = 500,\r\n public name: string = \"AppError\"\r\n ) {\r\n super(message);\r\n Object.setPrototypeOf(this, new.target.prototype);\r\n Error.captureStackTrace(this);\r\n }\r\n}\r\n\r\nexport class ValidationError extends AppError {\r\n constructor(message: string) {\r\n super(message, 400);\r\n this.name = \"ValidationError\";\r\n }\r\n}\r\n\r\nexport class ConfigNotFoundException extends AppError {\r\n constructor(message: string) {\r\n super(message);\r\n this.name = \"ConfigNotFoundException\";\r\n }\r\n}\r\n\r\nexport class NotFoundError extends AppError {\r\n constructor(message: string) {\r\n super(message, 404, \"UserNotFoundError\");\r\n }\r\n}\r\n\r\nexport class ForbiddenError extends AppError {\r\n constructor(message: string = \"Forbidden access\") {\r\n super(message, 403);\r\n this.name = \"ForbiddenError\";\r\n }\r\n}\r\n\r\nexport class UnauthorizedError extends AppError {\r\n constructor(message: string = \"Unauthorized access\") {\r\n super(message, 401);\r\n this.name = \"UnauthorizedError\";\r\n }\r\n}\r\n\r\nexport class JwtError extends AppError {\r\n constructor(message: string) {\r\n super(message, 401);\r\n this.name = \"JwtError\";\r\n }\r\n}","import { findConfig } from \"cca-core\";\r\n\r\nexport const getConfig = async (): Promise<any> => {\r\n const configPath = await findConfig({\r\n fileName: \"cca.config.json\",\r\n maxDepth: 10,\r\n startPath: process.cwd(),\r\n });\r\n const configContent = await import(\"fs/promises\").then((fs) =>\r\n fs.readFile(configPath, \"utf-8\")\r\n );\r\n\r\n return JSON.parse(configContent);\r\n}","import { createMapper } from '@automapper/core';\r\nimport { classes } from '@automapper/classes';\r\n\r\nimport { createUserMappings } from '../createUserMappings';\r\n\r\nexport const mapper = createMapper({\r\n strategyInitializer: classes(),\r\n});\r\n\r\ncreateUserMappings(mapper);\r\n","import { Mapper, createMap, forMember, mapFrom } from '@automapper/core';\r\nimport { AuthEntity, UserEntity } from 'cca-entities';\r\n\r\nimport { RegisterDTO } from '../dtos/RegisterDTO';\r\nimport { UserDTO } from '../dtos/UserDTO';\r\n\r\nexport function createUserMappings(mapper: Mapper): void {\r\n createMap(\r\n mapper, \r\n RegisterDTO,\r\n AuthEntity,\r\n forMember(dest => dest.email, mapFrom(src => src.email)),\r\n forMember(dest => dest.password, mapFrom(src => src.password)),\r\n forMember(dest => dest.role, mapFrom(src => src.role)));\r\n\r\n createMap(\r\n mapper, \r\n RegisterDTO,\r\n UserEntity,\r\n forMember(dest => dest.name, mapFrom(src => src.name)),\r\n forMember(dest => dest.email, mapFrom(src => src.email)),\r\n forMember(dest => dest.role, mapFrom(src => src.role)));\r\n\r\n createMap(\r\n mapper,\r\n UserEntity,\r\n UserDTO,\r\n forMember(dest => dest.id, mapFrom(src => src.id)),\r\n forMember(dest => dest.name, mapFrom(src => src.name)),\r\n forMember(dest => dest.email, mapFrom(src => src.email)),\r\n forMember(dest => dest.role, mapFrom(src => src.role)));\r\n}","import { UserRole } from \"cca-entities\";\r\n\r\nexport class RegisterDTO {\r\n email!: string;\r\n name!: string;\r\n password!: string;\r\n role!: UserRole;\r\n adminPassword?: string;\r\n}\r\n","import { IBaseService, validateRepository } from \"cca-core\";\r\nimport * as bcrypt from \"bcrypt\";\r\nimport { AuthEntity, UserEntity, UserRole } from \"cca-entities\";\r\n\r\nimport { AuthRepository } from \"../../infrastructure/repository/AuthRepository\";\r\n\r\nimport { mapper } from \"../mappers/utils/mapper\";\r\nimport { RegisterDTO } from \"../dtos/RegisterDTO\";\r\nimport { validateRegisterDTO } from \"../validators/authValidation\";\r\n\r\nexport class RegisterUseCase implements IBaseService {\r\n private readonly repository: AuthRepository;\r\n private readonly SALT_ROUNDS = 10;\r\n\r\n constructor(repository: AuthRepository) {\r\n this.repository = repository;\r\n }\r\n\r\n public async initialize(): Promise<void> {\r\n await validateRepository(this.repository, (repo) => repo.getAll());\r\n }\r\n\r\n public async execute(\r\n email: string,\r\n name: string,\r\n password: string,\r\n role: UserRole = UserRole.GUEST\r\n ): Promise<AuthEntity> {\r\n try {\r\n const normalizedDTO = this.normalizeAuthDTO({\r\n email,\r\n name,\r\n password,\r\n role,\r\n });\r\n\r\n await validateRegisterDTO(normalizedDTO, this.repository);\r\n\r\n const hashedPassword = await this.hashPassword(normalizedDTO.password);\r\n const authEntity = await this.createAuthEntity(\r\n normalizedDTO,\r\n hashedPassword\r\n );\r\n\r\n return await this.repository.create(authEntity);\r\n } catch (error) {\r\n throw error instanceof Error ? error : new Error(\"Registration failed\");\r\n }\r\n }\r\n\r\n private normalizeAuthDTO(dto: RegisterDTO): RegisterDTO {\r\n return {\r\n name: dto.name.trim(),\r\n email: dto.email.trim().toLowerCase(),\r\n role: dto.role,\r\n password: dto.password.trim(),\r\n };\r\n }\r\n\r\n private async hashPassword(password: string): Promise<string> {\r\n return await bcrypt.hash(password, this.SALT_ROUNDS);\r\n }\r\n\r\n private async createAuthEntity(dto: RegisterDTO, hashedPassword: string): Promise<AuthEntity> {\r\n const authEntity = mapper.map(dto, RegisterDTO, AuthEntity);\r\n const userEntity = mapper.map(dto, RegisterDTO, UserEntity);\r\n \r\n authEntity.password = hashedPassword;\r\n authEntity.refreshToken = \"\";\r\n authEntity.user = userEntity;\r\n authEntity.user.updatedAt = null as any;\r\n \r\n return authEntity;\r\n }\r\n}\r\n","import { IBaseService, validateRepository } from \"cca-core\";\r\n\r\nimport { IDecodedToken } from \"../../domain/interfaces/IDecodedToken\";\r\n\r\nimport { JwtAuthService } from \"../../infrastructure/auth/JwtAuthService\";\r\nimport { AuthRepository } from \"../../infrastructure/repository/AuthRepository\";\r\n\r\nexport class RefreshTokenUseCase implements IBaseService {\r\n private readonly repository: AuthRepository;\r\n private readonly service: JwtAuthService;\r\n\r\n constructor(repository: AuthRepository, service: JwtAuthService) {\r\n this.repository = repository;\r\n this.service = service;\r\n }\r\n\r\n public async initialize(): Promise<void> {\r\n await validateRepository(this.repository, (repo) => repo.getAll());\r\n }\r\n\r\n async execute(\r\n refreshToken: string\r\n ): Promise<{ accessToken: string; refreshToken: string } | null> {\r\n try {\r\n const decoded = await this.service.verifyRefreshToken(refreshToken);\r\n\r\n const auth = decoded.userId\r\n ? await this.repository.findById(decoded.userId)\r\n : null;\r\n\r\n if (!auth || auth.refreshToken !== refreshToken) {\r\n return null;\r\n }\r\n\r\n const accessToken = this.service.generateAccessToken(auth.user);\r\n const newRefreshToken = this.service.generateRefreshToken(auth.user);\r\n\r\n await this.repository.update(auth.id, {\r\n refreshToken: newRefreshToken,\r\n });\r\n\r\n return { accessToken, refreshToken: newRefreshToken };\r\n } catch (error) {\r\n return null;\r\n }\r\n }\r\n\r\n async verityToken(token: string): Promise<IDecodedToken> {\r\n return await this.service.verifyAccessToken(token);\r\n }\r\n}\r\n","import { NextFunction, Request, Response } from \"express\";\r\n\r\nimport { LoginDTO } from \"../../application/dtos/LoginDTO\";\r\nimport { RegisterDTO } from \"../../application/dtos/RegisterDTO\";\r\n\r\nimport { RegisterUseCase } from \"../../application/useCase/RegisterUseCase\";\r\nimport { LoginUseCase } from \"../../application/useCase/LoginUseCase\";\r\nimport { RefreshTokenUseCase } from \"../../application/useCase/RefreshTokenUseCase\";\r\n\r\nimport { IRefreshTokenRequest } from \"../../domain/interfaces/IRefreshTokenRequest\";\r\nimport { IDecodedToken } from \"../../domain/interfaces/IDecodedToken\";\r\n\r\n\r\nexport class AuthController {\r\n private loginUseCase: LoginUseCase;\r\n private registerUseCase: RegisterUseCase;\r\n private refreshTokenUseCase: RefreshTokenUseCase;\r\n\r\n constructor(\r\n loginUseCase: LoginUseCase,\r\n registerUseCase: RegisterUseCase,\r\n refreshTokenUseCase: RefreshTokenUseCase\r\n ) {\r\n this.loginUseCase = loginUseCase;\r\n this.registerUseCase = registerUseCase;\r\n this.refreshTokenUseCase = refreshTokenUseCase;\r\n }\r\n\r\n login = async (req: Request, res: Response, next: NextFunction) => {\r\n try {\r\n const { adminPassword, ...loginDTO }: LoginDTO = req.body;\r\n const result = await this.loginUseCase.execute(loginDTO, adminPassword);\r\n res.status(201).json(result);\r\n } catch (error) {\r\n next(error);\r\n }\r\n };\r\n\r\n register = async (\r\n req: Request,\r\n res: Response,\r\n next: NextFunction\r\n ): Promise<void> => {\r\n try {\r\n const { email, name, password, role }: RegisterDTO = req.body;\r\n await this.registerUseCase.execute(email, name, password, role);\r\n } catch (error) {\r\n next(error);\r\n }\r\n };\r\n\r\n refreshToken = async (req: Request, res: Response) => {\r\n const { refreshToken }: IRefreshTokenRequest = req.body;\r\n const result = await this.refreshTokenUseCase.execute(refreshToken);\r\n res.json(result);\r\n };\r\n\r\n verifyToken = async (token: string): Promise<IDecodedToken> => {\r\n return await this.refreshTokenUseCase.verityToken(token);\r\n };\r\n}\r\n","import { BaseRepository, IBaseRepository, IExtendedBaseRepository } from \"cca-core\";\r\nimport { AuthEntity } from \"cca-entities\";\r\nimport { Repository } from \"typeorm\";\r\n\r\nexport class AuthRepository\r\n extends BaseRepository<AuthEntity>\r\n implements IExtendedBaseRepository<AuthEntity> {\r\n constructor(repository: Repository<AuthEntity>) {\r\n super(repository);\r\n }\r\n\r\n async findByEmail(email: string): Promise<AuthEntity | null> {\r\n const query = this.repository.createQueryBuilder('auth')\r\n .leftJoinAndSelect('auth.user', 'user')\r\n .addSelect('auth.password')\r\n .where('auth.email = :email', { email });\r\n\r\n return await query.getOne();\r\n }\r\n\r\n async create(entity: Omit<AuthEntity, \"createdAt\">): Promise<AuthEntity> {\r\n return super.create(entity);\r\n }\r\n}\r\n","import * as jwt from \"jsonwebtoken\";\r\nimport { Secret, SignOptions } from \"jsonwebtoken\";\r\nimport * as bcrypt from \"bcrypt\";\r\nimport { IBaseService, validateRepository } from \"cca-core\";\r\nimport { AuthEntity, UserEntity } from \"cca-entities\";\r\n\r\nimport { IJwtConfig } from \"../../domain/interfaces/IJwtConfig\";\r\nimport { IAuthService } from \"../../domain/interfaces/IAuthService\";\r\nimport { IDecodedToken } from \"../../domain/interfaces/IDecodedToken\";\r\n\r\nimport {\r\n ForbiddenError,\r\n JwtError,\r\n NotFoundError,\r\n UnauthorizedError,\r\n} from \"../../utils/Errors\";\r\n\r\nimport { AuthRepository } from \"../repository/AuthRepository\";\r\nimport { getConfig } from \"../../utils/config\";\r\n\r\nexport class JwtAuthService implements IBaseService, IAuthService {\r\n private jwtConfig: IJwtConfig | undefined;\r\n\r\n constructor(private readonly repository: AuthRepository, config?: IJwtConfig) {\r\n this.loadConfig(config);\r\n }\r\n\r\n private async loadConfig(config?: IJwtConfig) {\r\n const configData = await getConfig();\r\n this.jwtConfig = {\r\n accessTokenSecret: configData.JWT_ACCESS_SECRET || \"default-access-secret\",\r\n refreshTokenSecret: configData.JWT_REFRESH_SECRET || \"default-refresh-secret\",\r\n accessTokenExpiry: configData.ACCESS_TOKEN_EXPIRY || \"15m\",\r\n refreshTokenExpiry: configData.REFRESH_TOKEN_EXPIRY || \"7d\",\r\n ...config\r\n };\r\n this.validateConfiguration();\r\n }\r\n\r\n async initialize(): Promise<void> {\r\n await validateRepository(this.repository, repo => repo.getAll());\r\n }\r\n\r\n private validateConfiguration(): void {\r\n if (!this.jwtConfig?.accessTokenSecret || !this.jwtConfig?.refreshTokenSecret) {\r\n throw new JwtError(\"JWT secrets required in config\");\r\n }\r\n }\r\n\r\n async validateUser(email: string, password: string): Promise<AuthEntity | null> {\r\n const user = await this.repository.findByEmail(email);\r\n if (!user) {\r\n throw new NotFoundError(\"Invalid credentials\");\r\n }\r\n\r\n const validPassword = await bcrypt.compare(password, user.password);\r\n if (!validPassword) {\r\n throw new ForbiddenError(\"Invalid credentials\");\r\n }\r\n\r\n return user;\r\n }\r\n\r\n private verifyJwtConfig() {\r\n if (!this.jwtConfig) throw new JwtError(\"JWT config not loaded\");\r\n }\r\n\r\n generateAccessToken(user: UserEntity): string {\r\n this.verifyJwtConfig();\r\n return jwt.sign(\r\n { userId: user.id, email: user.email, role: user.role },\r\n this.jwtConfig!.accessTokenSecret as Secret,\r\n { expiresIn: this.jwtConfig!.accessTokenExpiry }\r\n );\r\n }\r\n\r\n generateRefreshToken(user: UserEntity): string {\r\n this.verifyJwtConfig();\r\n return jwt.sign(\r\n { userId: user.id },\r\n this.jwtConfig!.refreshTokenSecret as Secret,\r\n { expiresIn: this.jwtConfig!.refreshTokenExpiry }\r\n );\r\n }\r\n\r\n async verifyToken(token: string, secret: string): Promise<IDecodedToken> {\r\n try {\r\n return jwt.verify(token, secret) as IDecodedToken;\r\n } catch {\r\n throw new UnauthorizedError();\r\n }\r\n }\r\n\r\n async verifyAccessToken(token: string): Promise<IDecodedToken> {\r\n this.verifyJwtConfig();\r\n return this.verifyToken(token, this.jwtConfig!.accessTokenSecret);\r\n }\r\n\r\n async verifyRefreshToken(token: string): Promise<IDecodedToken> {\r\n this.verifyJwtConfig();\r\n return this.verifyToken(token, this.jwtConfig!.refreshTokenSecret);\r\n }\r\n}\r\n"],"mappings":";;;;;;;;;;;;;AAAA,SAAS,qBAAmC;AAC5C,SAAS,cAAAA,mBAAkB;;;ACD3B,SAAuB,0BAA0B;AACjD,SAAqB,cAAAC,aAAY,YAAAC,iBAAgB;;;ACDjD,SAAS,eAAe;AAGjB,IAAM,WAAN,MAAM,SAAQ;AAcrB;AAdqB;AAEnB;AAAA,EADC,QAAQ;AAAA,GADE,SAEX;AAGA;AAAA,EADC,QAAQ;AAAA,GAJE,SAKX;AAGA;AAAA,EADC,QAAQ;AAAA,GAPE,SAQX;AAGA;AAAA,EADC,QAAQ;AAAA,GAVE,SAWX;AAXK,IAAM,UAAN;;;ACHP,YAAY,SAAS;AACrB,SAAqB,gBAAgB;AACrC,OAAO,YAAY;;;ACFZ,IAAM,YAAN,MAAM,kBAAiB,MAAM;AAAA,EAClC,YACS,SACA,aAAqB,KACrB,OAAe,YACtB;AACA,UAAM,OAAO;AAJN;AACA;AACA;AAGP,WAAO,eAAe,MAAM,WAAW,SAAS;AAChD,UAAM,kBAAkB,IAAI;AAAA,EAC9B;AACF;AAVoC;AAA7B,IAAM,WAAN;AAYA,IAAM,mBAAN,MAAM,yBAAwB,SAAS;AAAA,EAC5C,YAAY,SAAiB;AAC3B,UAAM,SAAS,GAAG;AAClB,SAAK,OAAO;AAAA,EACd;AACF;AAL8C;AAAvC,IAAM,kBAAN;AAcA,IAAM,iBAAN,MAAM,uBAAsB,SAAS;AAAA,EAC1C,YAAY,SAAiB;AAC3B,UAAM,SAAS,KAAK,mBAAmB;AAAA,EACzC;AACF;AAJ4C;AAArC,IAAM,gBAAN;AAMA,IAAM,kBAAN,MAAM,wBAAuB,SAAS;AAAA,EAC3C,YAAY,UAAkB,oBAAoB;AAChD,UAAM,SAAS,GAAG;AAClB,SAAK,OAAO;AAAA,EACd;AACF;AAL6C;AAAtC,IAAM,iBAAN;AAOA,IAAM,qBAAN,MAAM,2BAA0B,SAAS;AAAA,EAC9C,YAAY,UAAkB,uBAAuB;AACnD,UAAM,SAAS,GAAG;AAClB,SAAK,OAAO;AAAA,EACd;AACF;AALgD;AAAzC,IAAM,oBAAN;AAOA,IAAM,YAAN,MAAM,kBAAiB,SAAS;AAAA,EACrC,YAAY,SAAiB;AAC3B,UAAM,SAAS,GAAG;AAClB,SAAK,OAAO;AAAA,EACd;AACF;AALuC;AAAhC,IAAM,WAAN;;;AC9CP,SAAS,kBAAkB;AAEpB,IAAM,YAAY,mCAA0B;AAC/C,QAAM,aAAa,MAAM,WAAW;AAAA,IAChC,UAAU;AAAA,IACV,UAAU;AAAA,IACV,WAAW,QAAQ,IAAI;AAAA,EAC3B,CAAC;AACD,QAAM,gBAAgB,MAAM,OAAO,aAAa,EAAE;AAAA,IAAK,CAAC,OACpD,GAAG,SAAS,YAAY,OAAO;AAAA,EACnC;AAEA,SAAO,KAAK,MAAM,aAAa;AACnC,GAXyB;;;AFazB,IAAM,UAAU;AAAA,EACd,IAAQ,WAAO,EAAE,KAAK,wBAAwB;AAAA,EAC9C,OACG,WAAO,EACP,MAAM,sBAAsB,EAC5B,IAAI,KAAK,oCAAoC;AAAA,EAChD,MACG,WAAO,EACP,SAAS,kBAAkB,EAC3B,IAAI,GAAG,yCAAyC,EAChD,IAAI,IAAI,kCAAkC,EAC1C,QAAQ,iBAAiB,2CAA2C;AAAA,EACvE,UACG,WAAO,EACP,SAAS,mBAAmB,EAC5B,IAAI,GAAG,oBAAoB,EAC3B,IAAI,KAAK,mBAAmB,EAC5B;AAAA,IACC;AAAA,IACA;AAAA,EACF;AAAA,EACF,MACG,WAAO,EACP,SAAS,kBAAkB,EAC3B,MAAM,OAAO,OAAO,QAAQ,GAAG,wBAAwB;AAC5D;AAEO,IAAM,gBAAgB,8BAC3B,OACA,eACwB;AACxB,MAAI;AACF,UAAM,QAAQ,MAAM,SAAS,OAAO,KAAK,EAAE,YAAY,CAAC;AACxD,UAAM,OAAO,MAAM,WAAW,YAAY,KAAK;AAC/C,QAAI,CAAC,MAAM;AACT,YAAM,IAAI;AAAA,QACR;AAAA,MACF;AAAA,IACF;AACA,WAAO;AAAA,EACT,SAAS,OAAY;AACnB,UAAM,IAAI,gBAAgB,MAAM,WAAW,sBAAsB;AAAA,EACnE;AACF,GAhB6B;AAkBtB,IAAM,mBAAmB,8BAAO,aAAqC;AAC1E,MAAI,UAAU;AACZ,QAAI;AACF,YAAM,QAAQ,SAAS,SAAS,QAAQ;AAAA,IAC1C,SAAS,OAAY;AACnB,YAAM,IAAI,gBAAgB,MAAM,WAAW,yBAAyB;AAAA,IACtE;AAAA,EACF;AACF,GARgC;AAUzB,IAAM,0BAA0B,8BACrC,YACA,OACA,kBACkB;AAClB,MAAI;AACF,UAAM,QAAQ,MAAM,SAAS,OAAO,KAAK,EAAE,YAAY,CAAC;AAExD,UAAM,eAAe,MAAM,WAAW,YAAY,KAAK;AAEvD,QAAI,CAAC,aAAc;AACnB,QAAI,aAAa,OAAO,cAAe;AAEvC,UAAM,IAAI,gBAAgB,SAAS,KAAK,qBAAqB;AAAA,EAC/D,SAAS,OAAY;AACnB,QAAI,iBAAiB,iBAAiB;AACpC,YAAM;AAAA,IACR;AACA,UAAM,IAAI,gBAAgB,8BAA8B;AAAA,EAC1D;AACF,GApBuC;AAsBhC,IAAM,sBAAsB,8BACjC,MACA,eACkB;AAClB,QAAM,EAAE,MAAM,OAAO,MAAM,SAAS,IAAI;AAExC,QAAM,QAAQ,IAAI;AAAA,IAChB,QAAQ,KAAK,SAAS,IAAI;AAAA,IAC1B,QAAQ,KAAK,SAAS,IAAI;AAAA,IAC1B,wBAAwB,YAAY,KAAK;AAAA,IACzC,iBAAiB,QAAQ;AAAA,EAC3B,CAAC;AACH,GAZmC;AAc5B,IAAM,mBAAmB,8BAC9B,MACA,eACwB;AACxB,QAAM,EAAE,OAAO,MAAM,SAAS,IAAI;AAElC,QAAM,QAAQ,IAAI,CAAC,QAAQ,KAAK,SAAS,IAAI,GAAG,QAAQ,SAAS,SAAS,QAAQ,CAAC,CAAC;AAEpF,QAAM,OAAO,MAAM,cAAc,OAAO,UAAU;AAClD,MAAI,CAAC,QAAQ,CAAC,KAAK,UAAU;AAC3B,UAAM,IAAI,cAAc,qBAAqB;AAAA,EAC/C;AAEA,QAAM,UAAU,MAAM,OAAO,QAAQ,UAAU,KAAK,QAAQ;AAC5D,MAAI,CAAC,SAAS;AACZ,UAAM,IAAI,eAAe,qBAAqB;AAAA,EAChD;AAEA,SAAO;AACT,GAnBgC;AAqBzB,IAAM,sBAAsB,8BACjC,mBACkB;AAClB,MAAI,CAAC,gBAAgB;AACnB,UAAM,IAAI,gBAAgB,4BAA4B;AAAA,EACxD;AAEA,MAAI;AACF,UAAM,SAAS,MAAM,UAAU;AAE/B,QAAI,CAAC,OAAO,uBAAuB;AACjC,YAAM,IAAI,gBAAgB,2CAA2C;AAAA,IACvE;AAEA,QAAI,SAAS,cAAc,MAAM,OAAO,uBAAuB;AAC7D,YAAM,IAAI,gBAAgB,wBAAwB;AAAA,IACpD;AAAA,EACF,SAAS,OAAO;AACd,QAAI,iBAAiB,iBAAiB;AACpC,YAAM;AAAA,IACR;AACA,UAAM,IAAI,gBAAgB,iCAAiC;AAAA,EAC7D;AACF,GAvBmC;;;AG/HnC,SAAS,oBAAoB;AAC7B,SAAS,eAAe;;;ACDxB,SAAiB,WAAW,WAAW,eAAe;AACtD,SAAS,cAAAC,aAAY,kBAAkB;;;ACChC,IAAM,eAAN,MAAM,aAAY;AAMzB;AANyB;AAAlB,IAAM,cAAN;;;ADIA,SAAS,mBAAmBC,SAAsB;AACrD;AAAA,IACIA;AAAA,IACA;AAAA,IACAC;AAAA,IACA,UAAU,UAAQ,KAAK,OAAO,QAAQ,SAAO,IAAI,KAAK,CAAC;AAAA,IACvD,UAAU,UAAQ,KAAK,UAAU,QAAQ,SAAO,IAAI,QAAQ,CAAC;AAAA,IAC7D,UAAU,UAAQ,KAAK,MAAM,QAAQ,SAAO,IAAI,IAAI,CAAC;AAAA,EAAC;AAE1D;AAAA,IACID;AAAA,IACA;AAAA,IACA;AAAA,IACA,UAAU,UAAQ,KAAK,MAAM,QAAQ,SAAO,IAAI,IAAI,CAAC;AAAA,IACrD,UAAU,UAAQ,KAAK,OAAO,QAAQ,SAAO,IAAI,KAAK,CAAC;AAAA,IACvD,UAAU,UAAQ,KAAK,MAAM,QAAQ,SAAO,IAAI,IAAI,CAAC;AAAA,EAAC;AAE1D;AAAA,IACIA;AAAA,IACA;AAAA,IACA;AAAA,IACA,UAAU,UAAQ,KAAK,IAAI,QAAQ,SAAO,IAAI,EAAE,CAAC;AAAA,IACjD,UAAU,UAAQ,KAAK,MAAM,QAAQ,SAAO,IAAI,IAAI,CAAC;AAAA,IACrD,UAAU,UAAQ,KAAK,OAAO,QAAQ,SAAO,IAAI,KAAK,CAAC;AAAA,IACvD,UAAU,UAAQ,KAAK,MAAM,QAAQ,SAAO,IAAI,IAAI,CAAC;AAAA,EAAC;AAC9D;AAzBgB;;;ADDT,IAAM,SAAS,aAAa;AAAA,EACjC,qBAAqB,QAAQ;AAC/B,CAAC;AAED,mBAAmB,MAAM;;;ALKlB,IAAM,gBAAN,MAAM,cAAqC;AAAA,EAIhD,YAAY,YAA4B,aAA6B;AACnE,SAAK,aAAa;AAClB,SAAK,cAAc;AAAA,EACrB;AAAA,EAEA,MAAa,aAA4B;AACvC,UAAM,mBAAmB,KAAK,YAAY,CAAC,SAAS,KAAK,OAAO,CAAC;AAAA,EACnE;AAAA,EAEA,MAAM,QACJ,UACA,eAIC;AACD,UAAM,EAAE,KAAK,IAAI;AAEjB,UAAM,OAAO,MAAM,iBAAiB,UAAU,KAAK,UAAU;AAE7D,QAAI,SAASE,UAAS,SAAS,eAAe;AAC5C,YAAM,oBAAoB,aAAa;AAAA,IACzC;AAEA,UAAM,QAAQ,KAAK,eAAe,IAAI;AAEtC,UAAM,UAAU,OAAO,IAAI,KAAK,MAAMC,aAAY,OAAO;AAEzD,WAAO,EAAE,OAAO,MAAM,QAAQ;AAAA,EAChC;AAAA,EAEQ,eAAe,MAGrB;AACA,UAAM,cAAc,KAAK,YAAY,oBAAoB,KAAK,IAAI;AAClE,UAAM,eAAe,KAAK,YAAY,qBAAqB,KAAK,IAAI;AACpE,SAAK,uBAAuB,MAAM,YAAY;AAC9C,WAAO,EAAE,aAAa,aAAa;AAAA,EACrC;AAAA,EAEA,MAAc,uBACZ,MACA,cACe;AACf,SAAK,eAAe;AACpB,UAAM,KAAK,WAAW,OAAO,KAAK,IAAI,EAAE,aAAa,CAAC;AAAA,EACxD;AACF;AApDkD;AAA3C,IAAM,eAAN;;;AQdP,SAAuB,sBAAAC,2BAA0B;AACjD,YAAYC,aAAY;AACxB,SAAS,cAAAC,aAAY,cAAAC,aAAY,YAAAC,iBAAgB;AAQ1C,IAAM,mBAAN,MAAM,iBAAwC;AAAA,EAInD,YAAY,YAA4B;AAFxC,SAAiB,cAAc;AAG7B,SAAK,aAAa;AAAA,EACpB;AAAA,EAEA,MAAa,aAA4B;AACvC,UAAMC,oBAAmB,KAAK,YAAY,CAAC,SAAS,KAAK,OAAO,CAAC;AAAA,EACnE;AAAA,EAEA,MAAa,QACX,OACA,MACA,UACA,OAAiBC,UAAS,OACL;AACrB,QAAI;AACF,YAAM,gBAAgB,KAAK,iBAAiB;AAAA,QAC1C;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,MACF,CAAC;AAED,YAAM,oBAAoB,eAAe,KAAK,UAAU;AAExD,YAAM,iBAAiB,MAAM,KAAK,aAAa,cAAc,QAAQ;AACrE,YAAM,aAAa,MAAM,KAAK;AAAA,QAC5B;AAAA,QACA;AAAA,MACF;AAEA,aAAO,MAAM,KAAK,WAAW,OAAO,UAAU;AAAA,IAChD,SAAS,OAAO;AACd,YAAM,iBAAiB,QAAQ,QAAQ,IAAI,MAAM,qBAAqB;AAAA,IACxE;AAAA,EACF;AAAA,EAEQ,iBAAiB,KAA+B;AACtD,WAAO;AAAA,MACL,MAAM,IAAI,KAAK,KAAK;AAAA,MACpB,OAAO,IAAI,MAAM,KAAK,EAAE,YAAY;AAAA,MACpC,MAAM,IAAI;AAAA,MACV,UAAU,IAAI,SAAS,KAAK;AAAA,IAC9B;AAAA,EACF;AAAA,EAEA,MAAc,aAAa,UAAmC;AAC5D,WAAO,MAAa,aAAK,UAAU,KAAK,WAAW;AAAA,EACrD;AAAA,EAEA,MAAc,iBAAiB,KAAkB,gBAA6C;AAC5F,UAAM,aAAa,OAAO,IAAI,KAAK,aAAaC,WAAU;AAC1D,UAAM,aAAa,OAAO,IAAI,KAAK,aAAaC,WAAU;AAE1D,eAAW,WAAW;AACtB,eAAW,eAAe;AAC1B,eAAW,OAAO;AAClB,eAAW,KAAK,YAAY;AAE5B,WAAO;AAAA,EACT;AACF;AAhEqD;AAA9C,IAAM,kBAAN;;;ACVP,SAAuB,sBAAAC,2BAA0B;AAO1C,IAAM,uBAAN,MAAM,qBAA4C;AAAA,EAIvD,YAAY,YAA4B,SAAyB;AAC/D,SAAK,aAAa;AAClB,SAAK,UAAU;AAAA,EACjB;AAAA,EAEA,MAAa,aAA4B;AACvC,UAAMC,oBAAmB,KAAK,YAAY,CAAC,SAAS,KAAK,OAAO,CAAC;AAAA,EACnE;AAAA,EAEA,MAAM,QACJ,cAC+D;AAC/D,QAAI;AACF,YAAM,UAAU,MAAM,KAAK,QAAQ,mBAAmB,YAAY;AAElE,YAAM,OAAO,QAAQ,SACjB,MAAM,KAAK,WAAW,SAAS,QAAQ,MAAM,IAC7C;AAEJ,UAAI,CAAC,QAAQ,KAAK,iBAAiB,cAAc;AAC/C,eAAO;AAAA,MACT;AAEA,YAAM,cAAc,KAAK,QAAQ,oBAAoB,KAAK,IAAI;AAC9D,YAAM,kBAAkB,KAAK,QAAQ,qBAAqB,KAAK,IAAI;AAEnE,YAAM,KAAK,WAAW,OAAO,KAAK,IAAI;AAAA,QACpC,cAAc;AAAA,MAChB,CAAC;AAED,aAAO,EAAE,aAAa,cAAc,gBAAgB;AAAA,IACtD,SAAS,OAAO;AACd,aAAO;AAAA,IACT;AAAA,EACF;AAAA,EAEA,MAAM,YAAY,OAAuC;AACvD,WAAO,MAAM,KAAK,QAAQ,kBAAkB,KAAK;AAAA,EACnD;AACF;AA3CyD;AAAlD,IAAM,sBAAN;;;ACMA,IAAM,kBAAN,MAAM,gBAAe;AAAA,EAK1B,YACE,cACA,iBACA,qBACA;AAMF,iBAAQ,8BAAO,KAAc,KAAe,SAAuB;AACjE,UAAI;AACF,cAAM,EAAE,eAAe,GAAG,SAAS,IAAc,IAAI;AACrD,cAAM,SAAS,MAAM,KAAK,aAAa,QAAQ,UAAU,aAAa;AACtE,YAAI,OAAO,GAAG,EAAE,KAAK,MAAM;AAAA,MAC7B,SAAS,OAAO;AACd,aAAK,KAAK;AAAA,MACZ;AAAA,IACF,GARQ;AAUR,oBAAW,8BACT,KACA,KACA,SACkB;AAClB,UAAI;AACF,cAAM,EAAE,OAAO,MAAM,UAAU,KAAK,IAAiB,IAAI;AACzD,cAAM,KAAK,gBAAgB,QAAQ,OAAO,MAAM,UAAU,IAAI;AAAA,MAChE,SAAS,OAAO;AACd,aAAK,KAAK;AAAA,MACZ;AAAA,IACF,GAXW;AAaX,wBAAe,8BAAO,KAAc,QAAkB;AACpD,YAAM,EAAE,aAAa,IAA0B,IAAI;AACnD,YAAM,SAAS,MAAM,KAAK,oBAAoB,QAAQ,YAAY;AAClE,UAAI,KAAK,MAAM;AAAA,IACjB,GAJe;AAMf,uBAAc,8BAAO,UAA0C;AAC7D,aAAO,MAAM,KAAK,oBAAoB,YAAY,KAAK;AAAA,IACzD,GAFc;AAlCZ,SAAK,eAAe;AACpB,SAAK,kBAAkB;AACvB,SAAK,sBAAsB;AAAA,EAC7B;AAkCF;AA/C4B;AAArB,IAAM,iBAAN;;;ACbP,SAAS,sBAAgE;AAIlE,IAAM,kBAAN,MAAM,wBACH,eACuC;AAAA,EAC/C,YAAY,YAAoC;AAC9C,UAAM,UAAU;AAAA,EAClB;AAAA,EAEA,MAAM,YAAY,OAA2C;AAC3D,UAAM,QAAQ,KAAK,WAAW,mBAAmB,MAAM,EACpD,kBAAkB,aAAa,MAAM,EACrC,UAAU,eAAe,EACzB,MAAM,uBAAuB,EAAE,MAAM,CAAC;AAEzC,WAAO,MAAM,MAAM,OAAO;AAAA,EAC5B;AAAA,EAEA,MAAM,OAAO,QAA4D;AACvE,WAAO,MAAM,OAAO,MAAM;AAAA,EAC5B;AACF;AAjBiD;AAF1C,IAAM,iBAAN;;;ACJP,YAAY,SAAS;AAErB,YAAYC,aAAY;AACxB,SAAuB,sBAAAC,2BAA0B;AAiB1C,IAAM,kBAAN,MAAM,gBAAqD;AAAA,EAGhE,YAA6B,YAA4B,QAAqB;AAAjD;AAC3B,SAAK,WAAW,MAAM;AAAA,EACxB;AAAA,EAEA,MAAc,WAAW,QAAqB;AAC5C,UAAM,aAAa,MAAM,UAAU;AACnC,SAAK,YAAY;AAAA,MACf,mBAAmB,WAAW,qBAAqB;AAAA,MACnD,oBAAoB,WAAW,sBAAsB;AAAA,MACrD,mBAAmB,WAAW,uBAAuB;AAAA,MACrD,oBAAoB,WAAW,wBAAwB;AAAA,MACvD,GAAG;AAAA,IACL;AACA,SAAK,sBAAsB;AAAA,EAC7B;AAAA,EAEA,MAAM,aAA4B;AAChC,UAAMC,oBAAmB,KAAK,YAAY,UAAQ,KAAK,OAAO,CAAC;AAAA,EACjE;AAAA,EAEQ,wBAA8B;AACpC,QAAI,CAAC,KAAK,WAAW,qBAAqB,CAAC,KAAK,WAAW,oBAAoB;AAC7E,YAAM,IAAI,SAAS,gCAAgC;AAAA,IACrD;AAAA,EACF;AAAA,EAEA,MAAM,aAAa,OAAe,UAA8C;AAC9E,UAAM,OAAO,MAAM,KAAK,WAAW,YAAY,KAAK;AACpD,QAAI,CAAC,MAAM;AACT,YAAM,IAAI,cAAc,qBAAqB;AAAA,IAC/C;AAEA,UAAM,gBAAgB,MAAa,gBAAQ,UAAU,KAAK,QAAQ;AAClE,QAAI,CAAC,eAAe;AAClB,YAAM,IAAI,eAAe,qBAAqB;AAAA,IAChD;AAEA,WAAO;AAAA,EACT;AAAA,EAEQ,kBAAkB;AACxB,QAAI,CAAC,KAAK,UAAW,OAAM,IAAI,SAAS,uBAAuB;AAAA,EACjE;AAAA,EAEA,oBAAoB,MAA0B;AAC5C,SAAK,gBAAgB;AACrB,WAAW;AAAA,MACT,EAAE,QAAQ,KAAK,IAAI,OAAO,KAAK,OAAO,MAAM,KAAK,KAAK;AAAA,MACtD,KAAK,UAAW;AAAA,MAChB,EAAE,WAAW,KAAK,UAAW,kBAAkB;AAAA,IACjD;AAAA,EACF;AAAA,EAEA,qBAAqB,MAA0B;AAC7C,SAAK,gBAAgB;AACrB,WAAW;AAAA,MACT,EAAE,QAAQ,KAAK,GAAG;AAAA,MAClB,KAAK,UAAW;AAAA,MAChB,EAAE,WAAW,KAAK,UAAW,mBAAmB;AAAA,IAClD;AAAA,EACF;AAAA,EAEA,MAAM,YAAY,OAAe,QAAwC;AACvE,QAAI;AACF,aAAW,WAAO,OAAO,MAAM;AAAA,IACjC,QAAQ;AACN,YAAM,IAAI,kBAAkB;AAAA,IAC9B;AAAA,EACF;AAAA,EAEA,MAAM,kBAAkB,OAAuC;AAC7D,SAAK,gBAAgB;AACrB,WAAO,KAAK,YAAY,OAAO,KAAK,UAAW,iBAAiB;AAAA,EAClE;AAAA,EAEA,MAAM,mBAAmB,OAAuC;AAC9D,SAAK,gBAAgB;AACrB,WAAO,KAAK,YAAY,OAAO,KAAK,UAAW,kBAAkB;AAAA,EACnE;AACF;AAlFkE;AAA3D,IAAM,iBAAN;;;AbRP,SAAS,oBAAoB,UAAwB;AACnD,QAAM,YAAY,IAAI,cAAc,EAAE,SAAS,CAAC;AAEhD,QAAM,iBAAiB,IAAI;AAAA,IACzB,SAAS,cAAcC,WAAU;AAAA,EACnC;AACA,YAAU,mBAA+B,kBAAkB,cAAc;AAEzE,QAAM,iBAAiB,IAAI,eAAe,cAAc;AACxD,YAAU,gBAAgB,kBAAkB,cAAc;AAE1D,QAAM,eAAe,IAAI,aAAa,gBAAgB,cAAc;AACpE,QAAM,kBAAkB,IAAI,gBAAgB,cAAc;AAC1D,QAAM,sBAAsB,IAAI;AAAA,IAC9B;AAAA,IACA;AAAA,EACF;AACA,YAAU,gBAAgB,gBAAgB,YAAY;AACtD,YAAU,gBAAgB,mBAAmB,eAAe;AAC5D,YAAU,gBAAgB,uBAAuB,mBAAmB;AAEpE,QAAM,iBAAiB,IAAI;AAAA,IACzB;AAAA,IACA;AAAA,IACA;AAAA,EACF;AAEA,SAAO,EAAE,WAAW,eAAe;AACrC;AA5BS;","names":["AuthEntity","UserEntity","UserRole","AuthEntity","mapper","AuthEntity","UserRole","UserEntity","validateRepository","bcrypt","AuthEntity","UserEntity","UserRole","validateRepository","UserRole","AuthEntity","UserEntity","validateRepository","validateRepository","bcrypt","validateRepository","validateRepository","AuthEntity"]}
1
+ {"version":3,"sources":["../src/infrastructure/container/createAuthContainer.ts","../src/application/useCase/LoginUseCase.ts","../src/application/dtos/UserDTO.ts","../src/application/validators/authValidation.ts","../src/utils/Errors.ts","../src/utils/config.ts","../src/application/mappers/utils/mapper.ts","../src/application/mappers/createUserMappings.ts","../src/application/dtos/RegisterDTO.ts","../src/application/useCase/LogoutUseCase .ts","../src/application/useCase/RegisterUseCase.ts","../src/application/useCase/RefreshTokenUseCase.ts","../src/presentation/controller/AuthController.ts","../src/infrastructure/repository/AuthRepository.ts","../src/infrastructure/auth/JwtAuthService.ts"],"sourcesContent":["import { BaseContainer, BaseDatabase } from \"cca-core\";\r\nimport { AuthEntity } from \"cca-entities\";\r\n\r\nimport { LoginUseCase } from \"../../application/useCase/LoginUseCase\";\r\nimport { LogoutUseCase } from \"../../application/useCase/LogoutUseCase \";\r\nimport { RegisterUseCase } from \"../../application/useCase/RegisterUseCase\";\r\nimport { RefreshTokenUseCase } from \"../../application/useCase/RefreshTokenUseCase\";\r\n\r\nimport { AuthController } from \"../../presentation/controller/AuthController\";\r\n\r\nimport { AuthRepository } from \"../repository/AuthRepository\";\r\nimport { JwtAuthService } from \"../auth/JwtAuthService\";\r\n\r\nfunction createAuthContainer(database: BaseDatabase) {\r\n const container = new BaseContainer({ database });\r\n\r\n const authRepository = new AuthRepository(\r\n database.getRepository(AuthEntity)\r\n );\r\n container.registerRepository<AuthEntity>(\"AuthRepository\", authRepository);\r\n\r\n const jwtAuthService = new JwtAuthService(authRepository);\r\n container.registerService(\"JwtAuthService\", jwtAuthService);\r\n\r\n const loginUseCase = new LoginUseCase(authRepository, jwtAuthService);\r\n const logoutUseCase = new LogoutUseCase(authRepository);\r\n const registerUseCase = new RegisterUseCase(authRepository);\r\n const refreshTokenUseCase = new RefreshTokenUseCase(\r\n authRepository,\r\n jwtAuthService\r\n );\r\n container.registerService(\"LoginUseCase\", loginUseCase);\r\n container.registerService(\"RegisterUseCase\", registerUseCase);\r\n container.registerService(\"RefreshTokenUseCase\", refreshTokenUseCase);\r\n container.registerService(\"LogoutUseCase\", logoutUseCase);\r\n\r\n const authController = new AuthController(\r\n loginUseCase,\r\n logoutUseCase,\r\n registerUseCase,\r\n refreshTokenUseCase\r\n );\r\n\r\n return { container, authController };\r\n}\r\n\r\nexport { createAuthContainer };\r\n","import { IBaseService, validateRepository } from \"cca-core\";\r\nimport { AuthEntity, UserEntity, UserRole } from \"cca-entities\";\r\nimport { AuthRepository } from \"../../infrastructure/repository/AuthRepository\";\r\nimport { JwtAuthService } from \"../../infrastructure/auth/JwtAuthService\";\r\nimport { UserDTO } from \"../dtos/UserDTO\";\r\nimport { LoginDTO } from \"../dtos/LoginDTO\";\r\nimport { validateAdminSecret, validateLoginDTO } from \"../validators/authValidation\";\r\nimport { mapper } from \"../mappers/utils/mapper\";\r\n\r\ninterface TokenPair {\r\n accessToken: string;\r\n refreshToken: string;\r\n}\r\n\r\ninterface LoginResponse {\r\n token: TokenPair;\r\n user: UserDTO;\r\n}\r\n\r\nexport class LoginUseCase implements IBaseService {\r\n private readonly repository: AuthRepository;\r\n private readonly authService: JwtAuthService;\r\n\r\n constructor(\r\n repository: AuthRepository,\r\n authService: JwtAuthService\r\n ) {\r\n this.repository = repository;\r\n this.authService = authService\r\n }\r\n\r\n public async initialize(): Promise<void> {\r\n await validateRepository(this.repository, (repo) => repo.getAll());\r\n }\r\n\r\n async execute(loginDTO: LoginDTO, adminPassword?: string): Promise<LoginResponse> {\r\n const auth = await this.validateLogin(loginDTO, adminPassword);\r\n const token = await this.handleAuthentication(auth);\r\n const userDTO = this.mapUserToDTO(auth.user);\r\n\r\n return { token, user: userDTO };\r\n }\r\n\r\n private async validateLogin(\r\n loginDTO: LoginDTO,\r\n adminPassword?: string\r\n ): Promise<AuthEntity> {\r\n const auth = await validateLoginDTO(loginDTO, this.repository);\r\n\r\n if (loginDTO.role === UserRole.ADMIN && adminPassword) {\r\n await validateAdminSecret(adminPassword);\r\n }\r\n\r\n return auth;\r\n }\r\n\r\n private async handleAuthentication(auth: AuthEntity): Promise<TokenPair> {\r\n const token = this.generateTokens(auth);\r\n await this.updateUserStatus(auth);\r\n await this.updateUserRefreshToken(auth, token.refreshToken);\r\n\r\n return token;\r\n }\r\n\r\n private generateTokens(auth: AuthEntity): TokenPair {\r\n return {\r\n accessToken: this.authService.generateAccessToken(auth.user),\r\n refreshToken: this.authService.generateRefreshToken(auth.user)\r\n };\r\n }\r\n\r\n private async updateUserStatus(auth: AuthEntity): Promise<void> {\r\n auth.user.lastLoginAt = new Date();\r\n auth.user.isActive = true;\r\n await this.repository.update(auth.id, auth);\r\n }\r\n\r\n private async updateUserRefreshToken(\r\n auth: AuthEntity,\r\n refreshToken: string\r\n ): Promise<void> {\r\n auth.refreshToken = refreshToken;\r\n await this.repository.update(auth.id, { refreshToken });\r\n }\r\n\r\n private mapUserToDTO(user: UserEntity): UserDTO {\r\n return mapper.map(user, UserEntity, UserDTO);\r\n }\r\n}","import { AutoMap } from \"@automapper/classes\";\r\nimport { UserRole } from \"cca-entities\";\r\n\r\nexport class UserDTO {\r\n @AutoMap()\r\n id!: string;\r\n\r\n @AutoMap()\r\n name!: string;\r\n\r\n @AutoMap()\r\n email!: string;\r\n\r\n @AutoMap()\r\n role!: UserRole;\r\n\r\n adminPassword?: string;\r\n}","import * as yup from \"yup\";\r\nimport { AuthEntity, UserRole } from \"cca-entities\";\r\nimport bcrypt from \"bcrypt\";\r\n\r\nimport {\r\n ForbiddenError,\r\n NotFoundError,\r\n ValidationError,\r\n} from \"../../utils/Errors\";\r\nimport { AuthRepository } from \"../../infrastructure/repository/AuthRepository\";\r\n\r\nimport { RegisterDTO } from \"../dtos/RegisterDTO\";\r\nimport { LoginDTO } from \"../dtos/LoginDTO\";\r\nimport { getConfig } from \"../../utils/config\";\r\n\r\nconst schemas = {\r\n id: yup.string().uuid(\"Invalid user ID format\"),\r\n email: yup\r\n .string()\r\n .email(\"Invalid email format\")\r\n .max(255, \"Email cannot exceed 255 characters\"),\r\n name: yup\r\n .string()\r\n .required(\"Name is required\")\r\n .min(2, \"Name must be at least 2 characters long\")\r\n .max(50, \"Name cannot exceed 50 characters\")\r\n .matches(/^[a-zA-Z\\s]+$/, \"Name must only contain letters and spaces\"),\r\n password: yup\r\n .string()\r\n .required(\"Password required\")\r\n .min(8, \"Password too short\")\r\n .max(100, \"Password too long\")\r\n .matches(\r\n /^(?=.*[a-z])(?=.*[A-Z])(?=.*\\d)(?=.*[@$!%*?&])[A-Za-z\\d@$!%*?&]/,\r\n \"Password must contain uppercase, lowercase, number and special character\"\r\n ),\r\n role: yup\r\n .string()\r\n .required(\"Role is required\")\r\n .oneOf(Object.values(UserRole), \"Invalid role specified\"),\r\n};\r\n\r\nexport const validateEmail = async (\r\n email: string,\r\n repository: AuthRepository\r\n): Promise<AuthEntity> => {\r\n try {\r\n await schemas.email.validate(email?.trim().toLowerCase());\r\n const user = await repository.findByEmail(email);\r\n if (!user) {\r\n throw new NotFoundError(\r\n \"The email address or password is incorrect. Please retry\"\r\n );\r\n }\r\n return user;\r\n } catch (error: any) {\r\n throw new ValidationError(error.message || \"Invalid email format\");\r\n }\r\n};\r\n\r\nexport const validatePassword = async (password?: string): Promise<void> => {\r\n if (password) {\r\n try {\r\n await schemas.password.validate(password);\r\n } catch (error: any) {\r\n throw new ValidationError(error.message || \"Invalid password format\");\r\n }\r\n }\r\n};\r\n\r\nexport const validateEmailUniqueness = async (\r\n repository: AuthRepository,\r\n email: string,\r\n excludeUserId?: string\r\n): Promise<void> => {\r\n try {\r\n await schemas.email.validate(email?.trim().toLowerCase());\r\n\r\n const existingUser = await repository.findByEmail(email);\r\n\r\n if (!existingUser) return;\r\n if (existingUser.id === excludeUserId) return;\r\n\r\n throw new ValidationError(`Email ${email} is already in use.`);\r\n } catch (error: any) {\r\n if (error instanceof ValidationError) {\r\n throw error;\r\n }\r\n throw new ValidationError(\"user email validation failed\");\r\n }\r\n};\r\n\r\nexport const validateRegisterDTO = async (\r\n auth: RegisterDTO,\r\n repository: AuthRepository\r\n): Promise<void> => {\r\n const { name, email, role, password } = auth;\r\n\r\n await Promise.all([\r\n schemas.name.validate(name),\r\n schemas.role.validate(role),\r\n validateEmailUniqueness(repository, email),\r\n validatePassword(password),\r\n ]);\r\n};\r\n\r\nexport const validateLoginDTO = async (\r\n data: LoginDTO,\r\n repository: AuthRepository\r\n): Promise<AuthEntity> => {\r\n const { email, role, password } = data;\r\n\r\n await Promise.all([schemas.role.validate(role), schemas.password.validate(password)]);\r\n\r\n const auth = await validateEmail(email, repository);\r\n if (!auth || !auth.password) {\r\n throw new NotFoundError(\"Invalid credentials\");\r\n }\r\n\r\n const isMatch = await bcrypt.compare(password, auth.password);\r\n if (!isMatch) {\r\n throw new ForbiddenError(\"Invalid credentials\");\r\n }\r\n\r\n return auth;\r\n};\r\n\r\nexport const validateAdminSecret = async (\r\n secretPassword?: string\r\n): Promise<void> => {\r\n if (!secretPassword) {\r\n throw new ValidationError(\"Admin password is required\");\r\n }\r\n\r\n try {\r\n const config = await getConfig();\r\n\r\n if (!config.ADMIN_SECRET_PASSWORD) {\r\n throw new ValidationError(\"ADMIN_SECRET_PASSWORD not found in config\");\r\n }\r\n\r\n if (parseInt(secretPassword) !== config.ADMIN_SECRET_PASSWORD) {\r\n throw new ValidationError(\"Invalid admin password\");\r\n }\r\n } catch (error) {\r\n if (error instanceof ValidationError) {\r\n throw error;\r\n }\r\n throw new ValidationError(\"Error validating admin password\");\r\n }\r\n};\r\n","export class AppError extends Error {\r\n constructor(\r\n public message: string,\r\n public statusCode: number = 500,\r\n public name: string = \"AppError\"\r\n ) {\r\n super(message);\r\n Object.setPrototypeOf(this, new.target.prototype);\r\n Error.captureStackTrace(this);\r\n }\r\n}\r\n\r\nexport class ValidationError extends AppError {\r\n constructor(message: string) {\r\n super(message, 400);\r\n this.name = \"ValidationError\";\r\n }\r\n}\r\n\r\nexport class ConfigNotFoundException extends AppError {\r\n constructor(message: string) {\r\n super(message);\r\n this.name = \"ConfigNotFoundException\";\r\n }\r\n}\r\n\r\nexport class NotFoundError extends AppError {\r\n constructor(message: string) {\r\n super(message, 404, \"UserNotFoundError\");\r\n }\r\n}\r\n\r\nexport class ForbiddenError extends AppError {\r\n constructor(message: string = \"Forbidden access\") {\r\n super(message, 403);\r\n this.name = \"ForbiddenError\";\r\n }\r\n}\r\n\r\nexport class UnauthorizedError extends AppError {\r\n constructor(message: string = \"Unauthorized access\") {\r\n super(message, 401);\r\n this.name = \"UnauthorizedError\";\r\n }\r\n}\r\n\r\nexport class JwtError extends AppError {\r\n constructor(message: string) {\r\n super(message, 401);\r\n this.name = \"JwtError\";\r\n }\r\n}","import { findConfig } from \"cca-core\";\r\n\r\nexport const getConfig = async (): Promise<any> => {\r\n const configPath = await findConfig({\r\n fileName: \"cca.config.json\",\r\n maxDepth: 10,\r\n startPath: process.cwd(),\r\n });\r\n const configContent = await import(\"fs/promises\").then((fs) =>\r\n fs.readFile(configPath, \"utf-8\")\r\n );\r\n\r\n return JSON.parse(configContent);\r\n}","import { createMapper } from '@automapper/core';\r\nimport { classes } from '@automapper/classes';\r\n\r\nimport { createUserMappings } from '../createUserMappings';\r\n\r\nexport const mapper = createMapper({\r\n strategyInitializer: classes(),\r\n});\r\n\r\ncreateUserMappings(mapper);\r\n","import { Mapper, createMap, forMember, mapFrom } from '@automapper/core';\r\nimport { AuthEntity, UserEntity } from 'cca-entities';\r\n\r\nimport { RegisterDTO } from '../dtos/RegisterDTO';\r\nimport { UserDTO } from '../dtos/UserDTO';\r\n\r\nexport function createUserMappings(mapper: Mapper): void {\r\n createMap(\r\n mapper, \r\n RegisterDTO,\r\n AuthEntity,\r\n forMember(dest => dest.email, mapFrom(src => src.email)),\r\n forMember(dest => dest.password, mapFrom(src => src.password)),\r\n forMember(dest => dest.role, mapFrom(src => src.role)));\r\n\r\n createMap(\r\n mapper, \r\n RegisterDTO,\r\n UserEntity,\r\n forMember(dest => dest.name, mapFrom(src => src.name)),\r\n forMember(dest => dest.email, mapFrom(src => src.email)),\r\n forMember(dest => dest.role, mapFrom(src => src.role)));\r\n\r\n createMap(\r\n mapper,\r\n UserEntity,\r\n UserDTO,\r\n forMember(dest => dest.id, mapFrom(src => src.id)),\r\n forMember(dest => dest.name, mapFrom(src => src.name)),\r\n forMember(dest => dest.email, mapFrom(src => src.email)),\r\n forMember(dest => dest.role, mapFrom(src => src.role)));\r\n}","import { UserRole } from \"cca-entities\";\r\n\r\nexport class RegisterDTO {\r\n email!: string;\r\n name!: string;\r\n password!: string;\r\n role!: UserRole;\r\n adminPassword?: string;\r\n}\r\n","import { IBaseService, validateRepository } from \"cca-core\";\r\nimport { AuthRepository } from \"../../infrastructure/repository/AuthRepository\";\r\n\r\n\r\nexport class LogoutUseCase implements IBaseService {\r\n private readonly repository: AuthRepository\r\n\r\n constructor(repository: AuthRepository) {\r\n this.repository = repository;\r\n }\r\n\r\n public async initialize(): Promise<void> {\r\n await validateRepository(this.repository, (repo) => repo.getAll());\r\n }\r\n\r\n async execute(authId: string): Promise<void> {\r\n const auth = await this.repository.findById(authId);\r\n if (!auth) {\r\n throw new Error('Auth not found');\r\n }\r\n\r\n auth.refreshToken = null as any;\r\n auth.user.isActive = false;\r\n\r\n await this.repository.update(auth.id, auth);\r\n }\r\n}","import { IBaseService, validateRepository } from \"cca-core\";\r\nimport * as bcrypt from \"bcrypt\";\r\nimport { AuthEntity, UserEntity, UserRole } from \"cca-entities\";\r\n\r\nimport { AuthRepository } from \"../../infrastructure/repository/AuthRepository\";\r\n\r\nimport { mapper } from \"../mappers/utils/mapper\";\r\nimport { RegisterDTO } from \"../dtos/RegisterDTO\";\r\nimport { validateAdminSecret, validateRegisterDTO } from \"../validators/authValidation\";\r\n\r\nexport class RegisterUseCase implements IBaseService {\r\n private readonly repository: AuthRepository;\r\n private readonly SALT_ROUNDS = 10;\r\n\r\n constructor(repository: AuthRepository) {\r\n this.repository = repository;\r\n }\r\n\r\n public async initialize(): Promise<void> {\r\n await validateRepository(this.repository, (repo) => repo.getAll());\r\n }\r\n\r\n public async execute(\r\n email: string,\r\n name: string,\r\n password: string,\r\n role: UserRole = UserRole.GUEST,\r\n adminPassword?: string\r\n ): Promise<AuthEntity> {\r\n try {\r\n\r\n const normalizedDTO = this.normalizeAuthDTO({\r\n email,\r\n name,\r\n password,\r\n role,\r\n adminPassword\r\n });\r\n \r\n if (role === UserRole.ADMIN && adminPassword) {\r\n await validateAdminSecret(adminPassword);\r\n }\r\n \r\n await validateRegisterDTO(normalizedDTO, this.repository);\r\n\r\n const hashedPassword = await this.hashPassword(normalizedDTO.password);\r\n const authEntity = await this.createAuthEntity(\r\n normalizedDTO,\r\n hashedPassword\r\n );\r\n\r\n return await this.repository.create(authEntity);\r\n } catch (error) {\r\n throw error instanceof Error ? error : new Error(\"Registration failed\");\r\n }\r\n }\r\n\r\n private normalizeAuthDTO(dto: RegisterDTO): RegisterDTO {\r\n return {\r\n name: dto.name.trim(),\r\n email: dto.email.trim().toLowerCase(),\r\n role: dto.role,\r\n password: dto.password.trim(),\r\n adminPassword: dto.adminPassword?.trim() \r\n };\r\n }\r\n\r\n private async hashPassword(password: string): Promise<string> {\r\n return await bcrypt.hash(password, this.SALT_ROUNDS);\r\n }\r\n\r\n private async createAuthEntity(dto: RegisterDTO, hashedPassword: string): Promise<AuthEntity> {\r\n const authEntity = mapper.map(dto, RegisterDTO, AuthEntity);\r\n const userEntity = mapper.map(dto, RegisterDTO, UserEntity);\r\n \r\n authEntity.password = hashedPassword;\r\n authEntity.refreshToken = \"\";\r\n authEntity.user = userEntity;\r\n authEntity.user.updatedAt = null as any;\r\n \r\n return authEntity;\r\n }\r\n}\r\n","import { IBaseService, validateRepository } from \"cca-core\";\r\n\r\nimport { IDecodedToken } from \"../../domain/interfaces/IDecodedToken\";\r\n\r\nimport { JwtAuthService } from \"../../infrastructure/auth/JwtAuthService\";\r\nimport { AuthRepository } from \"../../infrastructure/repository/AuthRepository\";\r\n\r\nexport class RefreshTokenUseCase implements IBaseService {\r\n private readonly repository: AuthRepository;\r\n private readonly service: JwtAuthService;\r\n\r\n constructor(repository: AuthRepository, service: JwtAuthService) {\r\n this.repository = repository;\r\n this.service = service;\r\n }\r\n\r\n public async initialize(): Promise<void> {\r\n await validateRepository(this.repository, (repo) => repo.getAll());\r\n }\r\n\r\n async execute(\r\n refreshToken: string\r\n ): Promise<{ accessToken: string; refreshToken: string } | null> {\r\n try {\r\n const decoded = await this.service.verifyRefreshToken(refreshToken);\r\n\r\n const auth = decoded.userId\r\n ? await this.repository.findById(decoded.userId)\r\n : null;\r\n\r\n if (!auth || auth.refreshToken !== refreshToken) {\r\n return null;\r\n }\r\n\r\n const accessToken = this.service.generateAccessToken(auth.user);\r\n const newRefreshToken = this.service.generateRefreshToken(auth.user);\r\n\r\n await this.repository.update(auth.id, {\r\n refreshToken: newRefreshToken,\r\n });\r\n\r\n return { accessToken, refreshToken: newRefreshToken };\r\n } catch (error) {\r\n return null;\r\n }\r\n }\r\n\r\n async verityToken(token: string): Promise<IDecodedToken> {\r\n return await this.service.verifyAccessToken(token);\r\n }\r\n}\r\n","import { NextFunction, Request, Response } from \"express\";\r\n\r\nimport { LoginDTO } from \"../../application/dtos/LoginDTO\";\r\nimport { RegisterDTO } from \"../../application/dtos/RegisterDTO\";\r\n\r\nimport { RegisterUseCase } from \"../../application/useCase/RegisterUseCase\";\r\nimport { LoginUseCase } from \"../../application/useCase/LoginUseCase\";\r\nimport { LogoutUseCase } from \"../../application/useCase/LogoutUseCase \";\r\nimport { RefreshTokenUseCase } from \"../../application/useCase/RefreshTokenUseCase\";\r\n\r\nimport { IRefreshTokenRequest } from \"../../domain/interfaces/IRefreshTokenRequest\";\r\nimport { IDecodedToken } from \"../../domain/interfaces/IDecodedToken\";\r\n\r\nexport class AuthController {\r\n private loginUseCase: LoginUseCase;\r\n private readonly logoutUseCase: LogoutUseCase;\r\n private registerUseCase: RegisterUseCase;\r\n private refreshTokenUseCase: RefreshTokenUseCase;\r\n\r\n constructor(\r\n loginUseCase: LoginUseCase,\r\n logoutUseCase: LogoutUseCase,\r\n registerUseCase: RegisterUseCase,\r\n refreshTokenUseCase: RefreshTokenUseCase\r\n ) {\r\n this.loginUseCase = loginUseCase;\r\n this.logoutUseCase = logoutUseCase;\r\n this.registerUseCase = registerUseCase;\r\n this.refreshTokenUseCase = refreshTokenUseCase;\r\n }\r\n\r\n login = async (req: Request, res: Response, next: NextFunction) => {\r\n try {\r\n const { adminPassword, ...loginDTO }: LoginDTO = req.body;\r\n const result = await this.loginUseCase.execute(loginDTO, adminPassword);\r\n res.status(201).json(result);\r\n } catch (error) {\r\n next(error);\r\n }\r\n };\r\n\r\n logout = async (\r\n req: Request,\r\n res: Response,\r\n next: NextFunction\r\n ): Promise<void> => {\r\n try {\r\n await this.logoutUseCase.execute(req.params.id);\r\n res.status(200).json({ message: 'Logged out successfully' });\r\n } catch (error) {\r\n next(error);\r\n }\r\n };\r\n\r\n register = async (\r\n req: Request,\r\n res: Response,\r\n next: NextFunction\r\n ): Promise<void> => {\r\n try {\r\n const { email, name, password, role, adminPassword }: RegisterDTO = req.body;\r\n await this.registerUseCase.execute(email, name, password, role, adminPassword);\r\n } catch (error) {\r\n next(error);\r\n }\r\n };\r\n\r\n refreshToken = async (req: Request, res: Response) => {\r\n const { refreshToken }: IRefreshTokenRequest = req.body;\r\n const result = await this.refreshTokenUseCase.execute(refreshToken);\r\n res.json(result);\r\n };\r\n\r\n verifyToken = async (token: string): Promise<IDecodedToken> => {\r\n return await this.refreshTokenUseCase.verityToken(token);\r\n };\r\n}\r\n","import { BaseRepository, IBaseRepository, IExtendedBaseRepository } from \"cca-core\";\r\nimport { AuthEntity } from \"cca-entities\";\r\nimport { Repository } from \"typeorm\";\r\n\r\nexport class AuthRepository\r\n extends BaseRepository<AuthEntity>\r\n implements IExtendedBaseRepository<AuthEntity> {\r\n constructor(repository: Repository<AuthEntity>) {\r\n super(repository);\r\n }\r\n\r\n async findByEmail(email: string): Promise<AuthEntity | null> {\r\n const query = this.repository.createQueryBuilder('auth')\r\n .leftJoinAndSelect('auth.user', 'user')\r\n .addSelect('auth.password')\r\n .where('auth.email = :email', { email });\r\n\r\n return await query.getOne();\r\n }\r\n\r\n async create(entity: Omit<AuthEntity, \"createdAt\">): Promise<AuthEntity> {\r\n return super.create(entity);\r\n }\r\n}\r\n","import * as jwt from \"jsonwebtoken\";\r\nimport { Secret, SignOptions } from \"jsonwebtoken\";\r\nimport * as bcrypt from \"bcrypt\";\r\nimport { IBaseService, validateRepository } from \"cca-core\";\r\nimport { AuthEntity, UserEntity } from \"cca-entities\";\r\n\r\nimport { IJwtConfig } from \"../../domain/interfaces/IJwtConfig\";\r\nimport { IAuthService } from \"../../domain/interfaces/IAuthService\";\r\nimport { IDecodedToken } from \"../../domain/interfaces/IDecodedToken\";\r\n\r\nimport {\r\n ForbiddenError,\r\n JwtError,\r\n NotFoundError,\r\n UnauthorizedError,\r\n} from \"../../utils/Errors\";\r\n\r\nimport { AuthRepository } from \"../repository/AuthRepository\";\r\nimport { getConfig } from \"../../utils/config\";\r\n\r\nexport class JwtAuthService implements IBaseService, IAuthService {\r\n private jwtConfig: IJwtConfig | undefined;\r\n\r\n constructor(private readonly repository: AuthRepository, config?: IJwtConfig) {\r\n this.loadConfig(config);\r\n }\r\n\r\n private async loadConfig(config?: IJwtConfig) {\r\n const configData = await getConfig();\r\n this.jwtConfig = {\r\n accessTokenSecret: configData.JWT_ACCESS_SECRET || \"default-access-secret\",\r\n refreshTokenSecret: configData.JWT_REFRESH_SECRET || \"default-refresh-secret\",\r\n accessTokenExpiry: configData.ACCESS_TOKEN_EXPIRY || \"15m\",\r\n refreshTokenExpiry: configData.REFRESH_TOKEN_EXPIRY || \"7d\",\r\n ...config\r\n };\r\n this.validateConfiguration();\r\n }\r\n\r\n async initialize(): Promise<void> {\r\n await validateRepository(this.repository, repo => repo.getAll());\r\n }\r\n\r\n private validateConfiguration(): void {\r\n if (!this.jwtConfig?.accessTokenSecret || !this.jwtConfig?.refreshTokenSecret) {\r\n throw new JwtError(\"JWT secrets required in config\");\r\n }\r\n }\r\n\r\n async validateUser(email: string, password: string): Promise<AuthEntity | null> {\r\n const user = await this.repository.findByEmail(email);\r\n if (!user) {\r\n throw new NotFoundError(\"Invalid credentials\");\r\n }\r\n\r\n const validPassword = await bcrypt.compare(password, user.password);\r\n if (!validPassword) {\r\n throw new ForbiddenError(\"Invalid credentials\");\r\n }\r\n\r\n return user;\r\n }\r\n\r\n private verifyJwtConfig() {\r\n if (!this.jwtConfig) throw new JwtError(\"JWT config not loaded\");\r\n }\r\n\r\n generateAccessToken(user: UserEntity): string {\r\n this.verifyJwtConfig();\r\n return jwt.sign(\r\n { userId: user.id, email: user.email, role: user.role },\r\n this.jwtConfig!.accessTokenSecret as Secret,\r\n { expiresIn: this.jwtConfig!.accessTokenExpiry }\r\n );\r\n }\r\n\r\n generateRefreshToken(user: UserEntity): string {\r\n this.verifyJwtConfig();\r\n return jwt.sign(\r\n { userId: user.id },\r\n this.jwtConfig!.refreshTokenSecret as Secret,\r\n { expiresIn: this.jwtConfig!.refreshTokenExpiry }\r\n );\r\n }\r\n\r\n async verifyToken(token: string, secret: string): Promise<IDecodedToken> {\r\n try {\r\n return jwt.verify(token, secret) as IDecodedToken;\r\n } catch {\r\n throw new UnauthorizedError();\r\n }\r\n }\r\n\r\n async verifyAccessToken(token: string): Promise<IDecodedToken> {\r\n this.verifyJwtConfig();\r\n return this.verifyToken(token, this.jwtConfig!.accessTokenSecret);\r\n }\r\n\r\n async verifyRefreshToken(token: string): Promise<IDecodedToken> {\r\n this.verifyJwtConfig();\r\n return this.verifyToken(token, this.jwtConfig!.refreshTokenSecret);\r\n }\r\n}\r\n"],"mappings":";;;;;;;;;;;;;AAAA,SAAS,qBAAmC;AAC5C,SAAS,cAAAA,mBAAkB;;;ACD3B,SAAuB,0BAA0B;AACjD,SAAqB,cAAAC,aAAY,YAAAC,iBAAgB;;;ACDjD,SAAS,eAAe;AAGjB,IAAM,WAAN,MAAM,SAAQ;AAcrB;AAdqB;AAEnB;AAAA,EADC,QAAQ;AAAA,GADE,SAEX;AAGA;AAAA,EADC,QAAQ;AAAA,GAJE,SAKX;AAGA;AAAA,EADC,QAAQ;AAAA,GAPE,SAQX;AAGA;AAAA,EADC,QAAQ;AAAA,GAVE,SAWX;AAXK,IAAM,UAAN;;;ACHP,YAAY,SAAS;AACrB,SAAqB,gBAAgB;AACrC,OAAO,YAAY;;;ACFZ,IAAM,YAAN,MAAM,kBAAiB,MAAM;AAAA,EAClC,YACS,SACA,aAAqB,KACrB,OAAe,YACtB;AACA,UAAM,OAAO;AAJN;AACA;AACA;AAGP,WAAO,eAAe,MAAM,WAAW,SAAS;AAChD,UAAM,kBAAkB,IAAI;AAAA,EAC9B;AACF;AAVoC;AAA7B,IAAM,WAAN;AAYA,IAAM,mBAAN,MAAM,yBAAwB,SAAS;AAAA,EAC5C,YAAY,SAAiB;AAC3B,UAAM,SAAS,GAAG;AAClB,SAAK,OAAO;AAAA,EACd;AACF;AAL8C;AAAvC,IAAM,kBAAN;AAcA,IAAM,iBAAN,MAAM,uBAAsB,SAAS;AAAA,EAC1C,YAAY,SAAiB;AAC3B,UAAM,SAAS,KAAK,mBAAmB;AAAA,EACzC;AACF;AAJ4C;AAArC,IAAM,gBAAN;AAMA,IAAM,kBAAN,MAAM,wBAAuB,SAAS;AAAA,EAC3C,YAAY,UAAkB,oBAAoB;AAChD,UAAM,SAAS,GAAG;AAClB,SAAK,OAAO;AAAA,EACd;AACF;AAL6C;AAAtC,IAAM,iBAAN;AAOA,IAAM,qBAAN,MAAM,2BAA0B,SAAS;AAAA,EAC9C,YAAY,UAAkB,uBAAuB;AACnD,UAAM,SAAS,GAAG;AAClB,SAAK,OAAO;AAAA,EACd;AACF;AALgD;AAAzC,IAAM,oBAAN;AAOA,IAAM,YAAN,MAAM,kBAAiB,SAAS;AAAA,EACrC,YAAY,SAAiB;AAC3B,UAAM,SAAS,GAAG;AAClB,SAAK,OAAO;AAAA,EACd;AACF;AALuC;AAAhC,IAAM,WAAN;;;AC9CP,SAAS,kBAAkB;AAEpB,IAAM,YAAY,mCAA0B;AAC/C,QAAM,aAAa,MAAM,WAAW;AAAA,IAChC,UAAU;AAAA,IACV,UAAU;AAAA,IACV,WAAW,QAAQ,IAAI;AAAA,EAC3B,CAAC;AACD,QAAM,gBAAgB,MAAM,OAAO,aAAa,EAAE;AAAA,IAAK,CAAC,OACpD,GAAG,SAAS,YAAY,OAAO;AAAA,EACnC;AAEA,SAAO,KAAK,MAAM,aAAa;AACnC,GAXyB;;;AFazB,IAAM,UAAU;AAAA,EACd,IAAQ,WAAO,EAAE,KAAK,wBAAwB;AAAA,EAC9C,OACG,WAAO,EACP,MAAM,sBAAsB,EAC5B,IAAI,KAAK,oCAAoC;AAAA,EAChD,MACG,WAAO,EACP,SAAS,kBAAkB,EAC3B,IAAI,GAAG,yCAAyC,EAChD,IAAI,IAAI,kCAAkC,EAC1C,QAAQ,iBAAiB,2CAA2C;AAAA,EACvE,UACG,WAAO,EACP,SAAS,mBAAmB,EAC5B,IAAI,GAAG,oBAAoB,EAC3B,IAAI,KAAK,mBAAmB,EAC5B;AAAA,IACC;AAAA,IACA;AAAA,EACF;AAAA,EACF,MACG,WAAO,EACP,SAAS,kBAAkB,EAC3B,MAAM,OAAO,OAAO,QAAQ,GAAG,wBAAwB;AAC5D;AAEO,IAAM,gBAAgB,8BAC3B,OACA,eACwB;AACxB,MAAI;AACF,UAAM,QAAQ,MAAM,SAAS,OAAO,KAAK,EAAE,YAAY,CAAC;AACxD,UAAM,OAAO,MAAM,WAAW,YAAY,KAAK;AAC/C,QAAI,CAAC,MAAM;AACT,YAAM,IAAI;AAAA,QACR;AAAA,MACF;AAAA,IACF;AACA,WAAO;AAAA,EACT,SAAS,OAAY;AACnB,UAAM,IAAI,gBAAgB,MAAM,WAAW,sBAAsB;AAAA,EACnE;AACF,GAhB6B;AAkBtB,IAAM,mBAAmB,8BAAO,aAAqC;AAC1E,MAAI,UAAU;AACZ,QAAI;AACF,YAAM,QAAQ,SAAS,SAAS,QAAQ;AAAA,IAC1C,SAAS,OAAY;AACnB,YAAM,IAAI,gBAAgB,MAAM,WAAW,yBAAyB;AAAA,IACtE;AAAA,EACF;AACF,GARgC;AAUzB,IAAM,0BAA0B,8BACrC,YACA,OACA,kBACkB;AAClB,MAAI;AACF,UAAM,QAAQ,MAAM,SAAS,OAAO,KAAK,EAAE,YAAY,CAAC;AAExD,UAAM,eAAe,MAAM,WAAW,YAAY,KAAK;AAEvD,QAAI,CAAC,aAAc;AACnB,QAAI,aAAa,OAAO,cAAe;AAEvC,UAAM,IAAI,gBAAgB,SAAS,KAAK,qBAAqB;AAAA,EAC/D,SAAS,OAAY;AACnB,QAAI,iBAAiB,iBAAiB;AACpC,YAAM;AAAA,IACR;AACA,UAAM,IAAI,gBAAgB,8BAA8B;AAAA,EAC1D;AACF,GApBuC;AAsBhC,IAAM,sBAAsB,8BACjC,MACA,eACkB;AAClB,QAAM,EAAE,MAAM,OAAO,MAAM,SAAS,IAAI;AAExC,QAAM,QAAQ,IAAI;AAAA,IAChB,QAAQ,KAAK,SAAS,IAAI;AAAA,IAC1B,QAAQ,KAAK,SAAS,IAAI;AAAA,IAC1B,wBAAwB,YAAY,KAAK;AAAA,IACzC,iBAAiB,QAAQ;AAAA,EAC3B,CAAC;AACH,GAZmC;AAc5B,IAAM,mBAAmB,8BAC9B,MACA,eACwB;AACxB,QAAM,EAAE,OAAO,MAAM,SAAS,IAAI;AAElC,QAAM,QAAQ,IAAI,CAAC,QAAQ,KAAK,SAAS,IAAI,GAAG,QAAQ,SAAS,SAAS,QAAQ,CAAC,CAAC;AAEpF,QAAM,OAAO,MAAM,cAAc,OAAO,UAAU;AAClD,MAAI,CAAC,QAAQ,CAAC,KAAK,UAAU;AAC3B,UAAM,IAAI,cAAc,qBAAqB;AAAA,EAC/C;AAEA,QAAM,UAAU,MAAM,OAAO,QAAQ,UAAU,KAAK,QAAQ;AAC5D,MAAI,CAAC,SAAS;AACZ,UAAM,IAAI,eAAe,qBAAqB;AAAA,EAChD;AAEA,SAAO;AACT,GAnBgC;AAqBzB,IAAM,sBAAsB,8BACjC,mBACkB;AAClB,MAAI,CAAC,gBAAgB;AACnB,UAAM,IAAI,gBAAgB,4BAA4B;AAAA,EACxD;AAEA,MAAI;AACF,UAAM,SAAS,MAAM,UAAU;AAE/B,QAAI,CAAC,OAAO,uBAAuB;AACjC,YAAM,IAAI,gBAAgB,2CAA2C;AAAA,IACvE;AAEA,QAAI,SAAS,cAAc,MAAM,OAAO,uBAAuB;AAC7D,YAAM,IAAI,gBAAgB,wBAAwB;AAAA,IACpD;AAAA,EACF,SAAS,OAAO;AACd,QAAI,iBAAiB,iBAAiB;AACpC,YAAM;AAAA,IACR;AACA,UAAM,IAAI,gBAAgB,iCAAiC;AAAA,EAC7D;AACF,GAvBmC;;;AG/HnC,SAAS,oBAAoB;AAC7B,SAAS,eAAe;;;ACDxB,SAAiB,WAAW,WAAW,eAAe;AACtD,SAAS,cAAAC,aAAY,kBAAkB;;;ACChC,IAAM,eAAN,MAAM,aAAY;AAMzB;AANyB;AAAlB,IAAM,cAAN;;;ADIA,SAAS,mBAAmBC,SAAsB;AACrD;AAAA,IACIA;AAAA,IACA;AAAA,IACAC;AAAA,IACA,UAAU,UAAQ,KAAK,OAAO,QAAQ,SAAO,IAAI,KAAK,CAAC;AAAA,IACvD,UAAU,UAAQ,KAAK,UAAU,QAAQ,SAAO,IAAI,QAAQ,CAAC;AAAA,IAC7D,UAAU,UAAQ,KAAK,MAAM,QAAQ,SAAO,IAAI,IAAI,CAAC;AAAA,EAAC;AAE1D;AAAA,IACID;AAAA,IACA;AAAA,IACA;AAAA,IACA,UAAU,UAAQ,KAAK,MAAM,QAAQ,SAAO,IAAI,IAAI,CAAC;AAAA,IACrD,UAAU,UAAQ,KAAK,OAAO,QAAQ,SAAO,IAAI,KAAK,CAAC;AAAA,IACvD,UAAU,UAAQ,KAAK,MAAM,QAAQ,SAAO,IAAI,IAAI,CAAC;AAAA,EAAC;AAE1D;AAAA,IACIA;AAAA,IACA;AAAA,IACA;AAAA,IACA,UAAU,UAAQ,KAAK,IAAI,QAAQ,SAAO,IAAI,EAAE,CAAC;AAAA,IACjD,UAAU,UAAQ,KAAK,MAAM,QAAQ,SAAO,IAAI,IAAI,CAAC;AAAA,IACrD,UAAU,UAAQ,KAAK,OAAO,QAAQ,SAAO,IAAI,KAAK,CAAC;AAAA,IACvD,UAAU,UAAQ,KAAK,MAAM,QAAQ,SAAO,IAAI,IAAI,CAAC;AAAA,EAAC;AAC9D;AAzBgB;;;ADDT,IAAM,SAAS,aAAa;AAAA,EACjC,qBAAqB,QAAQ;AAC/B,CAAC;AAED,mBAAmB,MAAM;;;ALUlB,IAAM,gBAAN,MAAM,cAAqC;AAAA,EAIhD,YACE,YACA,aACA;AACA,SAAK,aAAa;AAClB,SAAK,cAAc;AAAA,EACrB;AAAA,EAEA,MAAa,aAA4B;AACvC,UAAM,mBAAmB,KAAK,YAAY,CAAC,SAAS,KAAK,OAAO,CAAC;AAAA,EACnE;AAAA,EAEA,MAAM,QAAQ,UAAoB,eAAgD;AAChF,UAAM,OAAO,MAAM,KAAK,cAAc,UAAU,aAAa;AAC7D,UAAM,QAAQ,MAAM,KAAK,qBAAqB,IAAI;AAClD,UAAM,UAAU,KAAK,aAAa,KAAK,IAAI;AAE3C,WAAO,EAAE,OAAO,MAAM,QAAQ;AAAA,EAChC;AAAA,EAEA,MAAc,cACZ,UACA,eACqB;AACrB,UAAM,OAAO,MAAM,iBAAiB,UAAU,KAAK,UAAU;AAE7D,QAAI,SAAS,SAASE,UAAS,SAAS,eAAe;AACrD,YAAM,oBAAoB,aAAa;AAAA,IACzC;AAEA,WAAO;AAAA,EACT;AAAA,EAEA,MAAc,qBAAqB,MAAsC;AACvE,UAAM,QAAQ,KAAK,eAAe,IAAI;AACtC,UAAM,KAAK,iBAAiB,IAAI;AAChC,UAAM,KAAK,uBAAuB,MAAM,MAAM,YAAY;AAE1D,WAAO;AAAA,EACT;AAAA,EAEQ,eAAe,MAA6B;AAClD,WAAO;AAAA,MACL,aAAa,KAAK,YAAY,oBAAoB,KAAK,IAAI;AAAA,MAC3D,cAAc,KAAK,YAAY,qBAAqB,KAAK,IAAI;AAAA,IAC/D;AAAA,EACF;AAAA,EAEA,MAAc,iBAAiB,MAAiC;AAC9D,SAAK,KAAK,cAAc,oBAAI,KAAK;AACjC,SAAK,KAAK,WAAW;AACrB,UAAM,KAAK,WAAW,OAAO,KAAK,IAAI,IAAI;AAAA,EAC5C;AAAA,EAEA,MAAc,uBACZ,MACA,cACe;AACf,SAAK,eAAe;AACpB,UAAM,KAAK,WAAW,OAAO,KAAK,IAAI,EAAE,aAAa,CAAC;AAAA,EACxD;AAAA,EAEQ,aAAa,MAA2B;AAC9C,WAAO,OAAO,IAAI,MAAMC,aAAY,OAAO;AAAA,EAC7C;AACF;AArEkD;AAA3C,IAAM,eAAN;;;AQnBP,SAAuB,sBAAAC,2BAA0B;AAI1C,IAAM,iBAAN,MAAM,eAAsC;AAAA,EAG/C,YAAY,YAA4B;AACpC,SAAK,aAAa;AAAA,EACtB;AAAA,EAEA,MAAa,aAA4B;AACrC,UAAMC,oBAAmB,KAAK,YAAY,CAAC,SAAS,KAAK,OAAO,CAAC;AAAA,EACrE;AAAA,EAEA,MAAM,QAAQ,QAA+B;AACzC,UAAM,OAAO,MAAM,KAAK,WAAW,SAAS,MAAM;AAClD,QAAI,CAAC,MAAM;AACP,YAAM,IAAI,MAAM,gBAAgB;AAAA,IACpC;AAEA,SAAK,eAAe;AACpB,SAAK,KAAK,WAAW;AAErB,UAAM,KAAK,WAAW,OAAO,KAAK,IAAI,IAAI;AAAA,EAC9C;AACJ;AAtBmD;AAA5C,IAAM,gBAAN;;;ACJP,SAAuB,sBAAAC,2BAA0B;AACjD,YAAYC,aAAY;AACxB,SAAS,cAAAC,aAAY,cAAAC,aAAY,YAAAC,iBAAgB;AAQ1C,IAAM,mBAAN,MAAM,iBAAwC;AAAA,EAInD,YAAY,YAA4B;AAFxC,SAAiB,cAAc;AAG7B,SAAK,aAAa;AAAA,EACpB;AAAA,EAEA,MAAa,aAA4B;AACvC,UAAMC,oBAAmB,KAAK,YAAY,CAAC,SAAS,KAAK,OAAO,CAAC;AAAA,EACnE;AAAA,EAEA,MAAa,QACX,OACA,MACA,UACA,OAAiBC,UAAS,OAC1B,eACqB;AACrB,QAAI;AAEF,YAAM,gBAAgB,KAAK,iBAAiB;AAAA,QAC1C;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,MACF,CAAC;AAED,UAAI,SAASA,UAAS,SAAS,eAAe;AAC5C,cAAM,oBAAoB,aAAa;AAAA,MACzC;AAEA,YAAM,oBAAoB,eAAe,KAAK,UAAU;AAExD,YAAM,iBAAiB,MAAM,KAAK,aAAa,cAAc,QAAQ;AACrE,YAAM,aAAa,MAAM,KAAK;AAAA,QAC5B;AAAA,QACA;AAAA,MACF;AAEA,aAAO,MAAM,KAAK,WAAW,OAAO,UAAU;AAAA,IAChD,SAAS,OAAO;AACd,YAAM,iBAAiB,QAAQ,QAAQ,IAAI,MAAM,qBAAqB;AAAA,IACxE;AAAA,EACF;AAAA,EAEQ,iBAAiB,KAA+B;AACtD,WAAO;AAAA,MACL,MAAM,IAAI,KAAK,KAAK;AAAA,MACpB,OAAO,IAAI,MAAM,KAAK,EAAE,YAAY;AAAA,MACpC,MAAM,IAAI;AAAA,MACV,UAAU,IAAI,SAAS,KAAK;AAAA,MAC5B,eAAe,IAAI,eAAe,KAAK;AAAA,IACzC;AAAA,EACF;AAAA,EAEA,MAAc,aAAa,UAAmC;AAC5D,WAAO,MAAa,aAAK,UAAU,KAAK,WAAW;AAAA,EACrD;AAAA,EAEA,MAAc,iBAAiB,KAAkB,gBAA6C;AAC5F,UAAM,aAAa,OAAO,IAAI,KAAK,aAAaC,WAAU;AAC1D,UAAM,aAAa,OAAO,IAAI,KAAK,aAAaC,WAAU;AAE1D,eAAW,WAAW;AACtB,eAAW,eAAe;AAC1B,eAAW,OAAO;AAClB,eAAW,KAAK,YAAY;AAE5B,WAAO;AAAA,EACT;AACF;AAxEqD;AAA9C,IAAM,kBAAN;;;ACVP,SAAuB,sBAAAC,2BAA0B;AAO1C,IAAM,uBAAN,MAAM,qBAA4C;AAAA,EAIvD,YAAY,YAA4B,SAAyB;AAC/D,SAAK,aAAa;AAClB,SAAK,UAAU;AAAA,EACjB;AAAA,EAEA,MAAa,aAA4B;AACvC,UAAMC,oBAAmB,KAAK,YAAY,CAAC,SAAS,KAAK,OAAO,CAAC;AAAA,EACnE;AAAA,EAEA,MAAM,QACJ,cAC+D;AAC/D,QAAI;AACF,YAAM,UAAU,MAAM,KAAK,QAAQ,mBAAmB,YAAY;AAElE,YAAM,OAAO,QAAQ,SACjB,MAAM,KAAK,WAAW,SAAS,QAAQ,MAAM,IAC7C;AAEJ,UAAI,CAAC,QAAQ,KAAK,iBAAiB,cAAc;AAC/C,eAAO;AAAA,MACT;AAEA,YAAM,cAAc,KAAK,QAAQ,oBAAoB,KAAK,IAAI;AAC9D,YAAM,kBAAkB,KAAK,QAAQ,qBAAqB,KAAK,IAAI;AAEnE,YAAM,KAAK,WAAW,OAAO,KAAK,IAAI;AAAA,QACpC,cAAc;AAAA,MAChB,CAAC;AAED,aAAO,EAAE,aAAa,cAAc,gBAAgB;AAAA,IACtD,SAAS,OAAO;AACd,aAAO;AAAA,IACT;AAAA,EACF;AAAA,EAEA,MAAM,YAAY,OAAuC;AACvD,WAAO,MAAM,KAAK,QAAQ,kBAAkB,KAAK;AAAA,EACnD;AACF;AA3CyD;AAAlD,IAAM,sBAAN;;;ACMA,IAAM,kBAAN,MAAM,gBAAe;AAAA,EAM1B,YACE,cACA,eACA,iBACA,qBACA;AAOF,iBAAQ,8BAAO,KAAc,KAAe,SAAuB;AACjE,UAAI;AACF,cAAM,EAAE,eAAe,GAAG,SAAS,IAAc,IAAI;AACrD,cAAM,SAAS,MAAM,KAAK,aAAa,QAAQ,UAAU,aAAa;AACtE,YAAI,OAAO,GAAG,EAAE,KAAK,MAAM;AAAA,MAC7B,SAAS,OAAO;AACd,aAAK,KAAK;AAAA,MACZ;AAAA,IACF,GARQ;AAUR,kBAAS,8BACP,KACA,KACA,SACkB;AAClB,UAAI;AACF,cAAM,KAAK,cAAc,QAAQ,IAAI,OAAO,EAAE;AAC9C,YAAI,OAAO,GAAG,EAAE,KAAK,EAAE,SAAS,0BAA0B,CAAC;AAAA,MAC7D,SAAS,OAAO;AACd,aAAK,KAAK;AAAA,MACZ;AAAA,IACF,GAXS;AAaT,oBAAW,8BACT,KACA,KACA,SACkB;AAClB,UAAI;AACF,cAAM,EAAE,OAAO,MAAM,UAAU,MAAM,cAAc,IAAiB,IAAI;AACxE,cAAM,KAAK,gBAAgB,QAAQ,OAAO,MAAM,UAAU,MAAM,aAAa;AAAA,MAC/E,SAAS,OAAO;AACd,aAAK,KAAK;AAAA,MACZ;AAAA,IACF,GAXW;AAaX,wBAAe,8BAAO,KAAc,QAAkB;AACpD,YAAM,EAAE,aAAa,IAA0B,IAAI;AACnD,YAAM,SAAS,MAAM,KAAK,oBAAoB,QAAQ,YAAY;AAClE,UAAI,KAAK,MAAM;AAAA,IACjB,GAJe;AAMf,uBAAc,8BAAO,UAA0C;AAC7D,aAAO,MAAM,KAAK,oBAAoB,YAAY,KAAK;AAAA,IACzD,GAFc;AAhDZ,SAAK,eAAe;AACpB,SAAK,gBAAgB;AACrB,SAAK,kBAAkB;AACvB,SAAK,sBAAsB;AAAA,EAC7B;AA+CF;AA/D4B;AAArB,IAAM,iBAAN;;;ACbP,SAAS,sBAAgE;AAIlE,IAAM,kBAAN,MAAM,wBACH,eACuC;AAAA,EAC/C,YAAY,YAAoC;AAC9C,UAAM,UAAU;AAAA,EAClB;AAAA,EAEA,MAAM,YAAY,OAA2C;AAC3D,UAAM,QAAQ,KAAK,WAAW,mBAAmB,MAAM,EACpD,kBAAkB,aAAa,MAAM,EACrC,UAAU,eAAe,EACzB,MAAM,uBAAuB,EAAE,MAAM,CAAC;AAEzC,WAAO,MAAM,MAAM,OAAO;AAAA,EAC5B;AAAA,EAEA,MAAM,OAAO,QAA4D;AACvE,WAAO,MAAM,OAAO,MAAM;AAAA,EAC5B;AACF;AAjBiD;AAF1C,IAAM,iBAAN;;;ACJP,YAAY,SAAS;AAErB,YAAYC,aAAY;AACxB,SAAuB,sBAAAC,2BAA0B;AAiB1C,IAAM,kBAAN,MAAM,gBAAqD;AAAA,EAGhE,YAA6B,YAA4B,QAAqB;AAAjD;AAC3B,SAAK,WAAW,MAAM;AAAA,EACxB;AAAA,EAEA,MAAc,WAAW,QAAqB;AAC5C,UAAM,aAAa,MAAM,UAAU;AACnC,SAAK,YAAY;AAAA,MACf,mBAAmB,WAAW,qBAAqB;AAAA,MACnD,oBAAoB,WAAW,sBAAsB;AAAA,MACrD,mBAAmB,WAAW,uBAAuB;AAAA,MACrD,oBAAoB,WAAW,wBAAwB;AAAA,MACvD,GAAG;AAAA,IACL;AACA,SAAK,sBAAsB;AAAA,EAC7B;AAAA,EAEA,MAAM,aAA4B;AAChC,UAAMC,oBAAmB,KAAK,YAAY,UAAQ,KAAK,OAAO,CAAC;AAAA,EACjE;AAAA,EAEQ,wBAA8B;AACpC,QAAI,CAAC,KAAK,WAAW,qBAAqB,CAAC,KAAK,WAAW,oBAAoB;AAC7E,YAAM,IAAI,SAAS,gCAAgC;AAAA,IACrD;AAAA,EACF;AAAA,EAEA,MAAM,aAAa,OAAe,UAA8C;AAC9E,UAAM,OAAO,MAAM,KAAK,WAAW,YAAY,KAAK;AACpD,QAAI,CAAC,MAAM;AACT,YAAM,IAAI,cAAc,qBAAqB;AAAA,IAC/C;AAEA,UAAM,gBAAgB,MAAa,gBAAQ,UAAU,KAAK,QAAQ;AAClE,QAAI,CAAC,eAAe;AAClB,YAAM,IAAI,eAAe,qBAAqB;AAAA,IAChD;AAEA,WAAO;AAAA,EACT;AAAA,EAEQ,kBAAkB;AACxB,QAAI,CAAC,KAAK,UAAW,OAAM,IAAI,SAAS,uBAAuB;AAAA,EACjE;AAAA,EAEA,oBAAoB,MAA0B;AAC5C,SAAK,gBAAgB;AACrB,WAAW;AAAA,MACT,EAAE,QAAQ,KAAK,IAAI,OAAO,KAAK,OAAO,MAAM,KAAK,KAAK;AAAA,MACtD,KAAK,UAAW;AAAA,MAChB,EAAE,WAAW,KAAK,UAAW,kBAAkB;AAAA,IACjD;AAAA,EACF;AAAA,EAEA,qBAAqB,MAA0B;AAC7C,SAAK,gBAAgB;AACrB,WAAW;AAAA,MACT,EAAE,QAAQ,KAAK,GAAG;AAAA,MAClB,KAAK,UAAW;AAAA,MAChB,EAAE,WAAW,KAAK,UAAW,mBAAmB;AAAA,IAClD;AAAA,EACF;AAAA,EAEA,MAAM,YAAY,OAAe,QAAwC;AACvE,QAAI;AACF,aAAW,WAAO,OAAO,MAAM;AAAA,IACjC,QAAQ;AACN,YAAM,IAAI,kBAAkB;AAAA,IAC9B;AAAA,EACF;AAAA,EAEA,MAAM,kBAAkB,OAAuC;AAC7D,SAAK,gBAAgB;AACrB,WAAO,KAAK,YAAY,OAAO,KAAK,UAAW,iBAAiB;AAAA,EAClE;AAAA,EAEA,MAAM,mBAAmB,OAAuC;AAC9D,SAAK,gBAAgB;AACrB,WAAO,KAAK,YAAY,OAAO,KAAK,UAAW,kBAAkB;AAAA,EACnE;AACF;AAlFkE;AAA3D,IAAM,iBAAN;;;AdPP,SAAS,oBAAoB,UAAwB;AACnD,QAAM,YAAY,IAAI,cAAc,EAAE,SAAS,CAAC;AAEhD,QAAM,iBAAiB,IAAI;AAAA,IACzB,SAAS,cAAcC,WAAU;AAAA,EACnC;AACA,YAAU,mBAA+B,kBAAkB,cAAc;AAEzE,QAAM,iBAAiB,IAAI,eAAe,cAAc;AACxD,YAAU,gBAAgB,kBAAkB,cAAc;AAE1D,QAAM,eAAe,IAAI,aAAa,gBAAgB,cAAc;AACpE,QAAM,gBAAgB,IAAI,cAAc,cAAc;AACtD,QAAM,kBAAkB,IAAI,gBAAgB,cAAc;AAC1D,QAAM,sBAAsB,IAAI;AAAA,IAC9B;AAAA,IACA;AAAA,EACF;AACA,YAAU,gBAAgB,gBAAgB,YAAY;AACtD,YAAU,gBAAgB,mBAAmB,eAAe;AAC5D,YAAU,gBAAgB,uBAAuB,mBAAmB;AACpE,YAAU,gBAAgB,iBAAiB,aAAa;AAExD,QAAM,iBAAiB,IAAI;AAAA,IACzB;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EACF;AAEA,SAAO,EAAE,WAAW,eAAe;AACrC;AA/BS;","names":["AuthEntity","UserEntity","UserRole","AuthEntity","mapper","AuthEntity","UserRole","UserEntity","validateRepository","validateRepository","validateRepository","bcrypt","AuthEntity","UserEntity","UserRole","validateRepository","UserRole","AuthEntity","UserEntity","validateRepository","validateRepository","bcrypt","validateRepository","validateRepository","AuthEntity"]}
@@ -1 +1 @@
1
- {"inputs":{"src/application/dtos/UserDTO.ts":{"bytes":281,"imports":[{"path":"@automapper/classes","kind":"import-statement","external":true},{"path":"cca-entities","kind":"import-statement","external":true},{"path":"<runtime>","kind":"import-statement","external":true}],"format":"esm"},"src/utils/Errors.ts":{"bytes":1243,"imports":[{"path":"<runtime>","kind":"import-statement","external":true}],"format":"esm"},"src/utils/config.ts":{"bytes":404,"imports":[{"path":"cca-core","kind":"import-statement","external":true},{"path":"fs/promises","kind":"dynamic-import","external":true},{"path":"<runtime>","kind":"import-statement","external":true}],"format":"esm"},"src/application/validators/authValidation.ts":{"bytes":4340,"imports":[{"path":"yup","kind":"import-statement","external":true},{"path":"cca-entities","kind":"import-statement","external":true},{"path":"bcrypt","kind":"import-statement","external":true},{"path":"src/utils/Errors.ts","kind":"import-statement","original":"../../utils/Errors"},{"path":"../../infrastructure/repository/AuthRepository","kind":"import-statement","external":true},{"path":"../dtos/RegisterDTO","kind":"import-statement","external":true},{"path":"../dtos/LoginDTO","kind":"import-statement","external":true},{"path":"src/utils/config.ts","kind":"import-statement","original":"../../utils/config"},{"path":"<runtime>","kind":"import-statement","external":true}],"format":"esm"},"src/application/dtos/RegisterDTO.ts":{"bytes":181,"imports":[{"path":"cca-entities","kind":"import-statement","external":true},{"path":"<runtime>","kind":"import-statement","external":true}],"format":"esm"},"src/application/mappers/createUserMappings.ts":{"bytes":1198,"imports":[{"path":"@automapper/core","kind":"import-statement","external":true},{"path":"cca-entities","kind":"import-statement","external":true},{"path":"src/application/dtos/RegisterDTO.ts","kind":"import-statement","original":"../dtos/RegisterDTO"},{"path":"src/application/dtos/UserDTO.ts","kind":"import-statement","original":"../dtos/UserDTO"},{"path":"<runtime>","kind":"import-statement","external":true}],"format":"esm"},"src/application/mappers/utils/mapper.ts":{"bytes":272,"imports":[{"path":"@automapper/core","kind":"import-statement","external":true},{"path":"@automapper/classes","kind":"import-statement","external":true},{"path":"src/application/mappers/createUserMappings.ts","kind":"import-statement","original":"../createUserMappings"}],"format":"esm"},"src/application/useCase/LoginUseCase.ts":{"bytes":2092,"imports":[{"path":"cca-core","kind":"import-statement","external":true},{"path":"cca-entities","kind":"import-statement","external":true},{"path":"../../infrastructure/repository/AuthRepository","kind":"import-statement","external":true},{"path":"../../infrastructure/auth/JwtAuthService","kind":"import-statement","external":true},{"path":"src/application/dtos/UserDTO.ts","kind":"import-statement","original":"../dtos/UserDTO"},{"path":"../dtos/LoginDTO","kind":"import-statement","external":true},{"path":"src/application/validators/authValidation.ts","kind":"import-statement","original":"../validators/authValidation"},{"path":"src/application/mappers/utils/mapper.ts","kind":"import-statement","original":"../mappers/utils/mapper"},{"path":"<runtime>","kind":"import-statement","external":true}],"format":"esm"},"src/application/useCase/RegisterUseCase.ts":{"bytes":2301,"imports":[{"path":"cca-core","kind":"import-statement","external":true},{"path":"bcrypt","kind":"import-statement","external":true},{"path":"cca-entities","kind":"import-statement","external":true},{"path":"../../infrastructure/repository/AuthRepository","kind":"import-statement","external":true},{"path":"src/application/mappers/utils/mapper.ts","kind":"import-statement","original":"../mappers/utils/mapper"},{"path":"src/application/dtos/RegisterDTO.ts","kind":"import-statement","original":"../dtos/RegisterDTO"},{"path":"src/application/validators/authValidation.ts","kind":"import-statement","original":"../validators/authValidation"},{"path":"<runtime>","kind":"import-statement","external":true}],"format":"esm"},"src/application/useCase/RefreshTokenUseCase.ts":{"bytes":1623,"imports":[{"path":"cca-core","kind":"import-statement","external":true},{"path":"../../domain/interfaces/IDecodedToken","kind":"import-statement","external":true},{"path":"../../infrastructure/auth/JwtAuthService","kind":"import-statement","external":true},{"path":"../../infrastructure/repository/AuthRepository","kind":"import-statement","external":true},{"path":"<runtime>","kind":"import-statement","external":true}],"format":"esm"},"src/presentation/controller/AuthController.ts":{"bytes":2058,"imports":[{"path":"express","kind":"import-statement","external":true},{"path":"../../application/dtos/LoginDTO","kind":"import-statement","external":true},{"path":"../../application/dtos/RegisterDTO","kind":"import-statement","external":true},{"path":"../../application/useCase/RegisterUseCase","kind":"import-statement","external":true},{"path":"../../application/useCase/LoginUseCase","kind":"import-statement","external":true},{"path":"../../application/useCase/RefreshTokenUseCase","kind":"import-statement","external":true},{"path":"../../domain/interfaces/IRefreshTokenRequest","kind":"import-statement","external":true},{"path":"../../domain/interfaces/IDecodedToken","kind":"import-statement","external":true},{"path":"<runtime>","kind":"import-statement","external":true}],"format":"esm"},"src/infrastructure/repository/AuthRepository.ts":{"bytes":796,"imports":[{"path":"cca-core","kind":"import-statement","external":true},{"path":"cca-entities","kind":"import-statement","external":true},{"path":"typeorm","kind":"import-statement","external":true},{"path":"<runtime>","kind":"import-statement","external":true}],"format":"esm"},"src/infrastructure/auth/JwtAuthService.ts":{"bytes":3373,"imports":[{"path":"jsonwebtoken","kind":"import-statement","external":true},{"path":"jsonwebtoken","kind":"import-statement","external":true},{"path":"bcrypt","kind":"import-statement","external":true},{"path":"cca-core","kind":"import-statement","external":true},{"path":"cca-entities","kind":"import-statement","external":true},{"path":"../../domain/interfaces/IJwtConfig","kind":"import-statement","external":true},{"path":"../../domain/interfaces/IAuthService","kind":"import-statement","external":true},{"path":"../../domain/interfaces/IDecodedToken","kind":"import-statement","external":true},{"path":"src/utils/Errors.ts","kind":"import-statement","original":"../../utils/Errors"},{"path":"../repository/AuthRepository","kind":"import-statement","external":true},{"path":"src/utils/config.ts","kind":"import-statement","original":"../../utils/config"},{"path":"<runtime>","kind":"import-statement","external":true}],"format":"esm"},"src/infrastructure/container/createAuthContainer.ts":{"bytes":1602,"imports":[{"path":"cca-core","kind":"import-statement","external":true},{"path":"cca-entities","kind":"import-statement","external":true},{"path":"src/application/useCase/LoginUseCase.ts","kind":"import-statement","original":"../../application/useCase/LoginUseCase"},{"path":"src/application/useCase/RegisterUseCase.ts","kind":"import-statement","original":"../../application/useCase/RegisterUseCase"},{"path":"src/application/useCase/RefreshTokenUseCase.ts","kind":"import-statement","original":"../../application/useCase/RefreshTokenUseCase"},{"path":"src/presentation/controller/AuthController.ts","kind":"import-statement","original":"../../presentation/controller/AuthController"},{"path":"src/infrastructure/repository/AuthRepository.ts","kind":"import-statement","original":"../repository/AuthRepository"},{"path":"src/infrastructure/auth/JwtAuthService.ts","kind":"import-statement","original":"../auth/JwtAuthService"},{"path":"<runtime>","kind":"import-statement","external":true}],"format":"esm"},"src/index.ts":{"bytes":214,"imports":[{"path":"src/infrastructure/container/createAuthContainer.ts","kind":"import-statement","original":"./infrastructure/container/createAuthContainer"},{"path":"src/presentation/controller/AuthController.ts","kind":"import-statement","original":"./presentation/controller/AuthController"}],"format":"esm"}},"outputs":{"dist/index.js.map":{"imports":[],"exports":[],"inputs":{},"bytes":35450},"dist/index.js":{"imports":[{"path":"cca-core","kind":"require-call","external":true},{"path":"cca-entities","kind":"require-call","external":true},{"path":"cca-core","kind":"require-call","external":true},{"path":"cca-entities","kind":"require-call","external":true},{"path":"@automapper/classes","kind":"require-call","external":true},{"path":"yup","kind":"require-call","external":true},{"path":"cca-entities","kind":"require-call","external":true},{"path":"bcrypt","kind":"require-call","external":true},{"path":"cca-core","kind":"require-call","external":true},{"path":"fs/promises","kind":"dynamic-import","external":true},{"path":"@automapper/core","kind":"require-call","external":true},{"path":"@automapper/classes","kind":"require-call","external":true},{"path":"@automapper/core","kind":"require-call","external":true},{"path":"cca-entities","kind":"require-call","external":true},{"path":"cca-core","kind":"require-call","external":true},{"path":"bcrypt","kind":"require-call","external":true},{"path":"cca-entities","kind":"require-call","external":true},{"path":"cca-core","kind":"require-call","external":true},{"path":"cca-core","kind":"require-call","external":true},{"path":"jsonwebtoken","kind":"require-call","external":true},{"path":"bcrypt","kind":"require-call","external":true},{"path":"cca-core","kind":"require-call","external":true}],"exports":[],"entryPoint":"src/index.ts","inputs":{"src/index.ts":{"bytesInOutput":189},"src/infrastructure/container/createAuthContainer.ts":{"bytesInOutput":1146},"src/application/useCase/LoginUseCase.ts":{"bytesInOutput":1318},"src/application/dtos/UserDTO.ts":{"bytesInOutput":480},"src/application/validators/authValidation.ts":{"bytesInOutput":3764},"src/utils/Errors.ts":{"bytesInOutput":1555},"src/utils/config.ts":{"bytesInOutput":404},"src/application/mappers/utils/mapper.ts":{"bytesInOutput":234},"src/application/mappers/createUserMappings.ts":{"bytesInOutput":1479},"src/application/dtos/RegisterDTO.ts":{"bytesInOutput":112},"src/application/useCase/RegisterUseCase.ts":{"bytesInOutput":1796},"src/application/useCase/RefreshTokenUseCase.ts":{"bytesInOutput":1164},"src/presentation/controller/AuthController.ts":{"bytesInOutput":1334},"src/infrastructure/repository/AuthRepository.ts":{"bytesInOutput":565},"src/infrastructure/auth/JwtAuthService.ts":{"bytesInOutput":2461}},"bytes":20889}}}
1
+ {"inputs":{"src/application/dtos/UserDTO.ts":{"bytes":281,"imports":[{"path":"@automapper/classes","kind":"import-statement","external":true},{"path":"cca-entities","kind":"import-statement","external":true},{"path":"<runtime>","kind":"import-statement","external":true}],"format":"esm"},"src/utils/Errors.ts":{"bytes":1243,"imports":[{"path":"<runtime>","kind":"import-statement","external":true}],"format":"esm"},"src/utils/config.ts":{"bytes":404,"imports":[{"path":"cca-core","kind":"import-statement","external":true},{"path":"fs/promises","kind":"dynamic-import","external":true},{"path":"<runtime>","kind":"import-statement","external":true}],"format":"esm"},"src/application/validators/authValidation.ts":{"bytes":4340,"imports":[{"path":"yup","kind":"import-statement","external":true},{"path":"cca-entities","kind":"import-statement","external":true},{"path":"bcrypt","kind":"import-statement","external":true},{"path":"src/utils/Errors.ts","kind":"import-statement","original":"../../utils/Errors"},{"path":"../../infrastructure/repository/AuthRepository","kind":"import-statement","external":true},{"path":"../dtos/RegisterDTO","kind":"import-statement","external":true},{"path":"../dtos/LoginDTO","kind":"import-statement","external":true},{"path":"src/utils/config.ts","kind":"import-statement","original":"../../utils/config"},{"path":"<runtime>","kind":"import-statement","external":true}],"format":"esm"},"src/application/dtos/RegisterDTO.ts":{"bytes":181,"imports":[{"path":"cca-entities","kind":"import-statement","external":true},{"path":"<runtime>","kind":"import-statement","external":true}],"format":"esm"},"src/application/mappers/createUserMappings.ts":{"bytes":1198,"imports":[{"path":"@automapper/core","kind":"import-statement","external":true},{"path":"cca-entities","kind":"import-statement","external":true},{"path":"src/application/dtos/RegisterDTO.ts","kind":"import-statement","original":"../dtos/RegisterDTO"},{"path":"src/application/dtos/UserDTO.ts","kind":"import-statement","original":"../dtos/UserDTO"},{"path":"<runtime>","kind":"import-statement","external":true}],"format":"esm"},"src/application/mappers/utils/mapper.ts":{"bytes":272,"imports":[{"path":"@automapper/core","kind":"import-statement","external":true},{"path":"@automapper/classes","kind":"import-statement","external":true},{"path":"src/application/mappers/createUserMappings.ts","kind":"import-statement","original":"../createUserMappings"}],"format":"esm"},"src/application/useCase/LoginUseCase.ts":{"bytes":2762,"imports":[{"path":"cca-core","kind":"import-statement","external":true},{"path":"cca-entities","kind":"import-statement","external":true},{"path":"../../infrastructure/repository/AuthRepository","kind":"import-statement","external":true},{"path":"../../infrastructure/auth/JwtAuthService","kind":"import-statement","external":true},{"path":"src/application/dtos/UserDTO.ts","kind":"import-statement","original":"../dtos/UserDTO"},{"path":"../dtos/LoginDTO","kind":"import-statement","external":true},{"path":"src/application/validators/authValidation.ts","kind":"import-statement","original":"../validators/authValidation"},{"path":"src/application/mappers/utils/mapper.ts","kind":"import-statement","original":"../mappers/utils/mapper"},{"path":"<runtime>","kind":"import-statement","external":true}],"format":"esm"},"src/application/useCase/LogoutUseCase .ts":{"bytes":822,"imports":[{"path":"cca-core","kind":"import-statement","external":true},{"path":"../../infrastructure/repository/AuthRepository","kind":"import-statement","external":true},{"path":"<runtime>","kind":"import-statement","external":true}],"format":"esm"},"src/application/useCase/RegisterUseCase.ts":{"bytes":2554,"imports":[{"path":"cca-core","kind":"import-statement","external":true},{"path":"bcrypt","kind":"import-statement","external":true},{"path":"cca-entities","kind":"import-statement","external":true},{"path":"../../infrastructure/repository/AuthRepository","kind":"import-statement","external":true},{"path":"src/application/mappers/utils/mapper.ts","kind":"import-statement","original":"../mappers/utils/mapper"},{"path":"src/application/dtos/RegisterDTO.ts","kind":"import-statement","original":"../dtos/RegisterDTO"},{"path":"src/application/validators/authValidation.ts","kind":"import-statement","original":"../validators/authValidation"},{"path":"<runtime>","kind":"import-statement","external":true}],"format":"esm"},"src/application/useCase/RefreshTokenUseCase.ts":{"bytes":1623,"imports":[{"path":"cca-core","kind":"import-statement","external":true},{"path":"../../domain/interfaces/IDecodedToken","kind":"import-statement","external":true},{"path":"../../infrastructure/auth/JwtAuthService","kind":"import-statement","external":true},{"path":"../../infrastructure/repository/AuthRepository","kind":"import-statement","external":true},{"path":"<runtime>","kind":"import-statement","external":true}],"format":"esm"},"src/presentation/controller/AuthController.ts":{"bytes":2589,"imports":[{"path":"express","kind":"import-statement","external":true},{"path":"../../application/dtos/LoginDTO","kind":"import-statement","external":true},{"path":"../../application/dtos/RegisterDTO","kind":"import-statement","external":true},{"path":"../../application/useCase/RegisterUseCase","kind":"import-statement","external":true},{"path":"../../application/useCase/LoginUseCase","kind":"import-statement","external":true},{"path":"../../application/useCase/LogoutUseCase ","kind":"import-statement","external":true},{"path":"../../application/useCase/RefreshTokenUseCase","kind":"import-statement","external":true},{"path":"../../domain/interfaces/IRefreshTokenRequest","kind":"import-statement","external":true},{"path":"../../domain/interfaces/IDecodedToken","kind":"import-statement","external":true},{"path":"<runtime>","kind":"import-statement","external":true}],"format":"esm"},"src/infrastructure/repository/AuthRepository.ts":{"bytes":796,"imports":[{"path":"cca-core","kind":"import-statement","external":true},{"path":"cca-entities","kind":"import-statement","external":true},{"path":"typeorm","kind":"import-statement","external":true},{"path":"<runtime>","kind":"import-statement","external":true}],"format":"esm"},"src/infrastructure/auth/JwtAuthService.ts":{"bytes":3373,"imports":[{"path":"jsonwebtoken","kind":"import-statement","external":true},{"path":"jsonwebtoken","kind":"import-statement","external":true},{"path":"bcrypt","kind":"import-statement","external":true},{"path":"cca-core","kind":"import-statement","external":true},{"path":"cca-entities","kind":"import-statement","external":true},{"path":"../../domain/interfaces/IJwtConfig","kind":"import-statement","external":true},{"path":"../../domain/interfaces/IAuthService","kind":"import-statement","external":true},{"path":"../../domain/interfaces/IDecodedToken","kind":"import-statement","external":true},{"path":"src/utils/Errors.ts","kind":"import-statement","original":"../../utils/Errors"},{"path":"../repository/AuthRepository","kind":"import-statement","external":true},{"path":"src/utils/config.ts","kind":"import-statement","original":"../../utils/config"},{"path":"<runtime>","kind":"import-statement","external":true}],"format":"esm"},"src/infrastructure/container/createAuthContainer.ts":{"bytes":1819,"imports":[{"path":"cca-core","kind":"import-statement","external":true},{"path":"cca-entities","kind":"import-statement","external":true},{"path":"src/application/useCase/LoginUseCase.ts","kind":"import-statement","original":"../../application/useCase/LoginUseCase"},{"path":"src/application/useCase/LogoutUseCase .ts","kind":"import-statement","original":"../../application/useCase/LogoutUseCase "},{"path":"src/application/useCase/RegisterUseCase.ts","kind":"import-statement","original":"../../application/useCase/RegisterUseCase"},{"path":"src/application/useCase/RefreshTokenUseCase.ts","kind":"import-statement","original":"../../application/useCase/RefreshTokenUseCase"},{"path":"src/presentation/controller/AuthController.ts","kind":"import-statement","original":"../../presentation/controller/AuthController"},{"path":"src/infrastructure/repository/AuthRepository.ts","kind":"import-statement","original":"../repository/AuthRepository"},{"path":"src/infrastructure/auth/JwtAuthService.ts","kind":"import-statement","original":"../auth/JwtAuthService"},{"path":"<runtime>","kind":"import-statement","external":true}],"format":"esm"},"src/index.ts":{"bytes":214,"imports":[{"path":"src/infrastructure/container/createAuthContainer.ts","kind":"import-statement","original":"./infrastructure/container/createAuthContainer"},{"path":"src/presentation/controller/AuthController.ts","kind":"import-statement","original":"./presentation/controller/AuthController"}],"format":"esm"}},"outputs":{"dist/index.js.map":{"imports":[],"exports":[],"inputs":{},"bytes":39400},"dist/index.js":{"imports":[{"path":"cca-core","kind":"require-call","external":true},{"path":"cca-entities","kind":"require-call","external":true},{"path":"cca-core","kind":"require-call","external":true},{"path":"cca-entities","kind":"require-call","external":true},{"path":"@automapper/classes","kind":"require-call","external":true},{"path":"yup","kind":"require-call","external":true},{"path":"cca-entities","kind":"require-call","external":true},{"path":"bcrypt","kind":"require-call","external":true},{"path":"cca-core","kind":"require-call","external":true},{"path":"fs/promises","kind":"dynamic-import","external":true},{"path":"@automapper/core","kind":"require-call","external":true},{"path":"@automapper/classes","kind":"require-call","external":true},{"path":"@automapper/core","kind":"require-call","external":true},{"path":"cca-entities","kind":"require-call","external":true},{"path":"cca-core","kind":"require-call","external":true},{"path":"cca-core","kind":"require-call","external":true},{"path":"bcrypt","kind":"require-call","external":true},{"path":"cca-entities","kind":"require-call","external":true},{"path":"cca-core","kind":"require-call","external":true},{"path":"cca-core","kind":"require-call","external":true},{"path":"jsonwebtoken","kind":"require-call","external":true},{"path":"bcrypt","kind":"require-call","external":true},{"path":"cca-core","kind":"require-call","external":true}],"exports":[],"entryPoint":"src/index.ts","inputs":{"src/index.ts":{"bytesInOutput":189},"src/infrastructure/container/createAuthContainer.ts":{"bytesInOutput":1285},"src/application/useCase/LoginUseCase.ts":{"bytesInOutput":1804},"src/application/dtos/UserDTO.ts":{"bytesInOutput":480},"src/application/validators/authValidation.ts":{"bytesInOutput":3764},"src/utils/Errors.ts":{"bytesInOutput":1555},"src/utils/config.ts":{"bytesInOutput":404},"src/application/mappers/utils/mapper.ts":{"bytesInOutput":234},"src/application/mappers/createUserMappings.ts":{"bytesInOutput":1479},"src/application/dtos/RegisterDTO.ts":{"bytesInOutput":112},"src/application/useCase/LogoutUseCase .ts":{"bytesInOutput":617},"src/application/useCase/RegisterUseCase.ts":{"bytesInOutput":2015},"src/application/useCase/RefreshTokenUseCase.ts":{"bytesInOutput":1164},"src/presentation/controller/AuthController.ts":{"bytesInOutput":1698},"src/infrastructure/repository/AuthRepository.ts":{"bytesInOutput":565},"src/infrastructure/auth/JwtAuthService.ts":{"bytesInOutput":2461}},"bytes":22760}}}
@@ -1 +1 @@
1
- {"inputs":{"src/application/dtos/UserDTO.ts":{"bytes":281,"imports":[{"path":"@automapper/classes","kind":"import-statement","external":true},{"path":"cca-entities","kind":"import-statement","external":true},{"path":"<runtime>","kind":"import-statement","external":true}],"format":"esm"},"src/utils/Errors.ts":{"bytes":1243,"imports":[{"path":"<runtime>","kind":"import-statement","external":true}],"format":"esm"},"src/utils/config.ts":{"bytes":404,"imports":[{"path":"cca-core","kind":"import-statement","external":true},{"path":"fs/promises","kind":"dynamic-import","external":true},{"path":"<runtime>","kind":"import-statement","external":true}],"format":"esm"},"src/application/validators/authValidation.ts":{"bytes":4340,"imports":[{"path":"yup","kind":"import-statement","external":true},{"path":"cca-entities","kind":"import-statement","external":true},{"path":"bcrypt","kind":"import-statement","external":true},{"path":"src/utils/Errors.ts","kind":"import-statement","original":"../../utils/Errors"},{"path":"../../infrastructure/repository/AuthRepository","kind":"import-statement","external":true},{"path":"../dtos/RegisterDTO","kind":"import-statement","external":true},{"path":"../dtos/LoginDTO","kind":"import-statement","external":true},{"path":"src/utils/config.ts","kind":"import-statement","original":"../../utils/config"},{"path":"<runtime>","kind":"import-statement","external":true}],"format":"esm"},"src/application/dtos/RegisterDTO.ts":{"bytes":181,"imports":[{"path":"cca-entities","kind":"import-statement","external":true},{"path":"<runtime>","kind":"import-statement","external":true}],"format":"esm"},"src/application/mappers/createUserMappings.ts":{"bytes":1198,"imports":[{"path":"@automapper/core","kind":"import-statement","external":true},{"path":"cca-entities","kind":"import-statement","external":true},{"path":"src/application/dtos/RegisterDTO.ts","kind":"import-statement","original":"../dtos/RegisterDTO"},{"path":"src/application/dtos/UserDTO.ts","kind":"import-statement","original":"../dtos/UserDTO"},{"path":"<runtime>","kind":"import-statement","external":true}],"format":"esm"},"src/application/mappers/utils/mapper.ts":{"bytes":272,"imports":[{"path":"@automapper/core","kind":"import-statement","external":true},{"path":"@automapper/classes","kind":"import-statement","external":true},{"path":"src/application/mappers/createUserMappings.ts","kind":"import-statement","original":"../createUserMappings"}],"format":"esm"},"src/application/useCase/LoginUseCase.ts":{"bytes":2092,"imports":[{"path":"cca-core","kind":"import-statement","external":true},{"path":"cca-entities","kind":"import-statement","external":true},{"path":"../../infrastructure/repository/AuthRepository","kind":"import-statement","external":true},{"path":"../../infrastructure/auth/JwtAuthService","kind":"import-statement","external":true},{"path":"src/application/dtos/UserDTO.ts","kind":"import-statement","original":"../dtos/UserDTO"},{"path":"../dtos/LoginDTO","kind":"import-statement","external":true},{"path":"src/application/validators/authValidation.ts","kind":"import-statement","original":"../validators/authValidation"},{"path":"src/application/mappers/utils/mapper.ts","kind":"import-statement","original":"../mappers/utils/mapper"},{"path":"<runtime>","kind":"import-statement","external":true}],"format":"esm"},"src/application/useCase/RegisterUseCase.ts":{"bytes":2301,"imports":[{"path":"cca-core","kind":"import-statement","external":true},{"path":"bcrypt","kind":"import-statement","external":true},{"path":"cca-entities","kind":"import-statement","external":true},{"path":"../../infrastructure/repository/AuthRepository","kind":"import-statement","external":true},{"path":"src/application/mappers/utils/mapper.ts","kind":"import-statement","original":"../mappers/utils/mapper"},{"path":"src/application/dtos/RegisterDTO.ts","kind":"import-statement","original":"../dtos/RegisterDTO"},{"path":"src/application/validators/authValidation.ts","kind":"import-statement","original":"../validators/authValidation"},{"path":"<runtime>","kind":"import-statement","external":true}],"format":"esm"},"src/application/useCase/RefreshTokenUseCase.ts":{"bytes":1623,"imports":[{"path":"cca-core","kind":"import-statement","external":true},{"path":"../../domain/interfaces/IDecodedToken","kind":"import-statement","external":true},{"path":"../../infrastructure/auth/JwtAuthService","kind":"import-statement","external":true},{"path":"../../infrastructure/repository/AuthRepository","kind":"import-statement","external":true},{"path":"<runtime>","kind":"import-statement","external":true}],"format":"esm"},"src/presentation/controller/AuthController.ts":{"bytes":2058,"imports":[{"path":"express","kind":"import-statement","external":true},{"path":"../../application/dtos/LoginDTO","kind":"import-statement","external":true},{"path":"../../application/dtos/RegisterDTO","kind":"import-statement","external":true},{"path":"../../application/useCase/RegisterUseCase","kind":"import-statement","external":true},{"path":"../../application/useCase/LoginUseCase","kind":"import-statement","external":true},{"path":"../../application/useCase/RefreshTokenUseCase","kind":"import-statement","external":true},{"path":"../../domain/interfaces/IRefreshTokenRequest","kind":"import-statement","external":true},{"path":"../../domain/interfaces/IDecodedToken","kind":"import-statement","external":true},{"path":"<runtime>","kind":"import-statement","external":true}],"format":"esm"},"src/infrastructure/repository/AuthRepository.ts":{"bytes":796,"imports":[{"path":"cca-core","kind":"import-statement","external":true},{"path":"cca-entities","kind":"import-statement","external":true},{"path":"typeorm","kind":"import-statement","external":true},{"path":"<runtime>","kind":"import-statement","external":true}],"format":"esm"},"src/infrastructure/auth/JwtAuthService.ts":{"bytes":3373,"imports":[{"path":"jsonwebtoken","kind":"import-statement","external":true},{"path":"jsonwebtoken","kind":"import-statement","external":true},{"path":"bcrypt","kind":"import-statement","external":true},{"path":"cca-core","kind":"import-statement","external":true},{"path":"cca-entities","kind":"import-statement","external":true},{"path":"../../domain/interfaces/IJwtConfig","kind":"import-statement","external":true},{"path":"../../domain/interfaces/IAuthService","kind":"import-statement","external":true},{"path":"../../domain/interfaces/IDecodedToken","kind":"import-statement","external":true},{"path":"src/utils/Errors.ts","kind":"import-statement","original":"../../utils/Errors"},{"path":"../repository/AuthRepository","kind":"import-statement","external":true},{"path":"src/utils/config.ts","kind":"import-statement","original":"../../utils/config"},{"path":"<runtime>","kind":"import-statement","external":true}],"format":"esm"},"src/infrastructure/container/createAuthContainer.ts":{"bytes":1602,"imports":[{"path":"cca-core","kind":"import-statement","external":true},{"path":"cca-entities","kind":"import-statement","external":true},{"path":"src/application/useCase/LoginUseCase.ts","kind":"import-statement","original":"../../application/useCase/LoginUseCase"},{"path":"src/application/useCase/RegisterUseCase.ts","kind":"import-statement","original":"../../application/useCase/RegisterUseCase"},{"path":"src/application/useCase/RefreshTokenUseCase.ts","kind":"import-statement","original":"../../application/useCase/RefreshTokenUseCase"},{"path":"src/presentation/controller/AuthController.ts","kind":"import-statement","original":"../../presentation/controller/AuthController"},{"path":"src/infrastructure/repository/AuthRepository.ts","kind":"import-statement","original":"../repository/AuthRepository"},{"path":"src/infrastructure/auth/JwtAuthService.ts","kind":"import-statement","original":"../auth/JwtAuthService"},{"path":"<runtime>","kind":"import-statement","external":true}],"format":"esm"},"src/index.ts":{"bytes":214,"imports":[{"path":"src/infrastructure/container/createAuthContainer.ts","kind":"import-statement","original":"./infrastructure/container/createAuthContainer"},{"path":"src/presentation/controller/AuthController.ts","kind":"import-statement","original":"./presentation/controller/AuthController"}],"format":"esm"}},"outputs":{"dist/index.mjs.map":{"imports":[],"exports":[],"inputs":{},"bytes":35294},"dist/index.mjs":{"imports":[{"path":"cca-core","kind":"import-statement","external":true},{"path":"cca-entities","kind":"import-statement","external":true},{"path":"cca-core","kind":"import-statement","external":true},{"path":"cca-entities","kind":"import-statement","external":true},{"path":"@automapper/classes","kind":"import-statement","external":true},{"path":"yup","kind":"import-statement","external":true},{"path":"cca-entities","kind":"import-statement","external":true},{"path":"bcrypt","kind":"import-statement","external":true},{"path":"cca-core","kind":"import-statement","external":true},{"path":"fs/promises","kind":"dynamic-import","external":true},{"path":"@automapper/core","kind":"import-statement","external":true},{"path":"@automapper/classes","kind":"import-statement","external":true},{"path":"@automapper/core","kind":"import-statement","external":true},{"path":"cca-entities","kind":"import-statement","external":true},{"path":"cca-core","kind":"import-statement","external":true},{"path":"bcrypt","kind":"import-statement","external":true},{"path":"cca-entities","kind":"import-statement","external":true},{"path":"cca-core","kind":"import-statement","external":true},{"path":"cca-core","kind":"import-statement","external":true},{"path":"jsonwebtoken","kind":"import-statement","external":true},{"path":"bcrypt","kind":"import-statement","external":true},{"path":"cca-core","kind":"import-statement","external":true}],"exports":["AuthController","createAuthContainer"],"entryPoint":"src/index.ts","inputs":{"src/infrastructure/container/createAuthContainer.ts":{"bytesInOutput":1113},"src/application/useCase/LoginUseCase.ts":{"bytesInOutput":1288},"src/application/dtos/UserDTO.ts":{"bytesInOutput":394},"src/application/validators/authValidation.ts":{"bytesInOutput":3693},"src/utils/Errors.ts":{"bytesInOutput":1555},"src/utils/config.ts":{"bytesInOutput":379},"src/application/mappers/utils/mapper.ts":{"bytesInOutput":189},"src/application/mappers/createUserMappings.ts":{"bytesInOutput":1063},"src/application/dtos/RegisterDTO.ts":{"bytesInOutput":112},"src/application/useCase/RegisterUseCase.ts":{"bytesInOutput":1790},"src/application/useCase/RefreshTokenUseCase.ts":{"bytesInOutput":1169},"src/presentation/controller/AuthController.ts":{"bytesInOutput":1334},"src/infrastructure/repository/AuthRepository.ts":{"bytesInOutput":547},"src/infrastructure/auth/JwtAuthService.ts":{"bytesInOutput":2452},"src/index.ts":{"bytesInOutput":0}},"bytes":18569}}}
1
+ {"inputs":{"src/application/dtos/UserDTO.ts":{"bytes":281,"imports":[{"path":"@automapper/classes","kind":"import-statement","external":true},{"path":"cca-entities","kind":"import-statement","external":true},{"path":"<runtime>","kind":"import-statement","external":true}],"format":"esm"},"src/utils/Errors.ts":{"bytes":1243,"imports":[{"path":"<runtime>","kind":"import-statement","external":true}],"format":"esm"},"src/utils/config.ts":{"bytes":404,"imports":[{"path":"cca-core","kind":"import-statement","external":true},{"path":"fs/promises","kind":"dynamic-import","external":true},{"path":"<runtime>","kind":"import-statement","external":true}],"format":"esm"},"src/application/validators/authValidation.ts":{"bytes":4340,"imports":[{"path":"yup","kind":"import-statement","external":true},{"path":"cca-entities","kind":"import-statement","external":true},{"path":"bcrypt","kind":"import-statement","external":true},{"path":"src/utils/Errors.ts","kind":"import-statement","original":"../../utils/Errors"},{"path":"../../infrastructure/repository/AuthRepository","kind":"import-statement","external":true},{"path":"../dtos/RegisterDTO","kind":"import-statement","external":true},{"path":"../dtos/LoginDTO","kind":"import-statement","external":true},{"path":"src/utils/config.ts","kind":"import-statement","original":"../../utils/config"},{"path":"<runtime>","kind":"import-statement","external":true}],"format":"esm"},"src/application/dtos/RegisterDTO.ts":{"bytes":181,"imports":[{"path":"cca-entities","kind":"import-statement","external":true},{"path":"<runtime>","kind":"import-statement","external":true}],"format":"esm"},"src/application/mappers/createUserMappings.ts":{"bytes":1198,"imports":[{"path":"@automapper/core","kind":"import-statement","external":true},{"path":"cca-entities","kind":"import-statement","external":true},{"path":"src/application/dtos/RegisterDTO.ts","kind":"import-statement","original":"../dtos/RegisterDTO"},{"path":"src/application/dtos/UserDTO.ts","kind":"import-statement","original":"../dtos/UserDTO"},{"path":"<runtime>","kind":"import-statement","external":true}],"format":"esm"},"src/application/mappers/utils/mapper.ts":{"bytes":272,"imports":[{"path":"@automapper/core","kind":"import-statement","external":true},{"path":"@automapper/classes","kind":"import-statement","external":true},{"path":"src/application/mappers/createUserMappings.ts","kind":"import-statement","original":"../createUserMappings"}],"format":"esm"},"src/application/useCase/LoginUseCase.ts":{"bytes":2762,"imports":[{"path":"cca-core","kind":"import-statement","external":true},{"path":"cca-entities","kind":"import-statement","external":true},{"path":"../../infrastructure/repository/AuthRepository","kind":"import-statement","external":true},{"path":"../../infrastructure/auth/JwtAuthService","kind":"import-statement","external":true},{"path":"src/application/dtos/UserDTO.ts","kind":"import-statement","original":"../dtos/UserDTO"},{"path":"../dtos/LoginDTO","kind":"import-statement","external":true},{"path":"src/application/validators/authValidation.ts","kind":"import-statement","original":"../validators/authValidation"},{"path":"src/application/mappers/utils/mapper.ts","kind":"import-statement","original":"../mappers/utils/mapper"},{"path":"<runtime>","kind":"import-statement","external":true}],"format":"esm"},"src/application/useCase/LogoutUseCase .ts":{"bytes":822,"imports":[{"path":"cca-core","kind":"import-statement","external":true},{"path":"../../infrastructure/repository/AuthRepository","kind":"import-statement","external":true},{"path":"<runtime>","kind":"import-statement","external":true}],"format":"esm"},"src/application/useCase/RegisterUseCase.ts":{"bytes":2554,"imports":[{"path":"cca-core","kind":"import-statement","external":true},{"path":"bcrypt","kind":"import-statement","external":true},{"path":"cca-entities","kind":"import-statement","external":true},{"path":"../../infrastructure/repository/AuthRepository","kind":"import-statement","external":true},{"path":"src/application/mappers/utils/mapper.ts","kind":"import-statement","original":"../mappers/utils/mapper"},{"path":"src/application/dtos/RegisterDTO.ts","kind":"import-statement","original":"../dtos/RegisterDTO"},{"path":"src/application/validators/authValidation.ts","kind":"import-statement","original":"../validators/authValidation"},{"path":"<runtime>","kind":"import-statement","external":true}],"format":"esm"},"src/application/useCase/RefreshTokenUseCase.ts":{"bytes":1623,"imports":[{"path":"cca-core","kind":"import-statement","external":true},{"path":"../../domain/interfaces/IDecodedToken","kind":"import-statement","external":true},{"path":"../../infrastructure/auth/JwtAuthService","kind":"import-statement","external":true},{"path":"../../infrastructure/repository/AuthRepository","kind":"import-statement","external":true},{"path":"<runtime>","kind":"import-statement","external":true}],"format":"esm"},"src/presentation/controller/AuthController.ts":{"bytes":2589,"imports":[{"path":"express","kind":"import-statement","external":true},{"path":"../../application/dtos/LoginDTO","kind":"import-statement","external":true},{"path":"../../application/dtos/RegisterDTO","kind":"import-statement","external":true},{"path":"../../application/useCase/RegisterUseCase","kind":"import-statement","external":true},{"path":"../../application/useCase/LoginUseCase","kind":"import-statement","external":true},{"path":"../../application/useCase/LogoutUseCase ","kind":"import-statement","external":true},{"path":"../../application/useCase/RefreshTokenUseCase","kind":"import-statement","external":true},{"path":"../../domain/interfaces/IRefreshTokenRequest","kind":"import-statement","external":true},{"path":"../../domain/interfaces/IDecodedToken","kind":"import-statement","external":true},{"path":"<runtime>","kind":"import-statement","external":true}],"format":"esm"},"src/infrastructure/repository/AuthRepository.ts":{"bytes":796,"imports":[{"path":"cca-core","kind":"import-statement","external":true},{"path":"cca-entities","kind":"import-statement","external":true},{"path":"typeorm","kind":"import-statement","external":true},{"path":"<runtime>","kind":"import-statement","external":true}],"format":"esm"},"src/infrastructure/auth/JwtAuthService.ts":{"bytes":3373,"imports":[{"path":"jsonwebtoken","kind":"import-statement","external":true},{"path":"jsonwebtoken","kind":"import-statement","external":true},{"path":"bcrypt","kind":"import-statement","external":true},{"path":"cca-core","kind":"import-statement","external":true},{"path":"cca-entities","kind":"import-statement","external":true},{"path":"../../domain/interfaces/IJwtConfig","kind":"import-statement","external":true},{"path":"../../domain/interfaces/IAuthService","kind":"import-statement","external":true},{"path":"../../domain/interfaces/IDecodedToken","kind":"import-statement","external":true},{"path":"src/utils/Errors.ts","kind":"import-statement","original":"../../utils/Errors"},{"path":"../repository/AuthRepository","kind":"import-statement","external":true},{"path":"src/utils/config.ts","kind":"import-statement","original":"../../utils/config"},{"path":"<runtime>","kind":"import-statement","external":true}],"format":"esm"},"src/infrastructure/container/createAuthContainer.ts":{"bytes":1819,"imports":[{"path":"cca-core","kind":"import-statement","external":true},{"path":"cca-entities","kind":"import-statement","external":true},{"path":"src/application/useCase/LoginUseCase.ts","kind":"import-statement","original":"../../application/useCase/LoginUseCase"},{"path":"src/application/useCase/LogoutUseCase .ts","kind":"import-statement","original":"../../application/useCase/LogoutUseCase "},{"path":"src/application/useCase/RegisterUseCase.ts","kind":"import-statement","original":"../../application/useCase/RegisterUseCase"},{"path":"src/application/useCase/RefreshTokenUseCase.ts","kind":"import-statement","original":"../../application/useCase/RefreshTokenUseCase"},{"path":"src/presentation/controller/AuthController.ts","kind":"import-statement","original":"../../presentation/controller/AuthController"},{"path":"src/infrastructure/repository/AuthRepository.ts","kind":"import-statement","original":"../repository/AuthRepository"},{"path":"src/infrastructure/auth/JwtAuthService.ts","kind":"import-statement","original":"../auth/JwtAuthService"},{"path":"<runtime>","kind":"import-statement","external":true}],"format":"esm"},"src/index.ts":{"bytes":214,"imports":[{"path":"src/infrastructure/container/createAuthContainer.ts","kind":"import-statement","original":"./infrastructure/container/createAuthContainer"},{"path":"src/presentation/controller/AuthController.ts","kind":"import-statement","original":"./presentation/controller/AuthController"}],"format":"esm"}},"outputs":{"dist/index.mjs.map":{"imports":[],"exports":[],"inputs":{},"bytes":39277},"dist/index.mjs":{"imports":[{"path":"cca-core","kind":"import-statement","external":true},{"path":"cca-entities","kind":"import-statement","external":true},{"path":"cca-core","kind":"import-statement","external":true},{"path":"cca-entities","kind":"import-statement","external":true},{"path":"@automapper/classes","kind":"import-statement","external":true},{"path":"yup","kind":"import-statement","external":true},{"path":"cca-entities","kind":"import-statement","external":true},{"path":"bcrypt","kind":"import-statement","external":true},{"path":"cca-core","kind":"import-statement","external":true},{"path":"fs/promises","kind":"dynamic-import","external":true},{"path":"@automapper/core","kind":"import-statement","external":true},{"path":"@automapper/classes","kind":"import-statement","external":true},{"path":"@automapper/core","kind":"import-statement","external":true},{"path":"cca-entities","kind":"import-statement","external":true},{"path":"cca-core","kind":"import-statement","external":true},{"path":"cca-core","kind":"import-statement","external":true},{"path":"bcrypt","kind":"import-statement","external":true},{"path":"cca-entities","kind":"import-statement","external":true},{"path":"cca-core","kind":"import-statement","external":true},{"path":"cca-core","kind":"import-statement","external":true},{"path":"jsonwebtoken","kind":"import-statement","external":true},{"path":"bcrypt","kind":"import-statement","external":true},{"path":"cca-core","kind":"import-statement","external":true}],"exports":["AuthController","createAuthContainer"],"entryPoint":"src/index.ts","inputs":{"src/infrastructure/container/createAuthContainer.ts":{"bytesInOutput":1252},"src/application/useCase/LoginUseCase.ts":{"bytesInOutput":1774},"src/application/dtos/UserDTO.ts":{"bytesInOutput":394},"src/application/validators/authValidation.ts":{"bytesInOutput":3693},"src/utils/Errors.ts":{"bytesInOutput":1555},"src/utils/config.ts":{"bytesInOutput":379},"src/application/mappers/utils/mapper.ts":{"bytesInOutput":189},"src/application/mappers/createUserMappings.ts":{"bytesInOutput":1063},"src/application/dtos/RegisterDTO.ts":{"bytesInOutput":112},"src/application/useCase/LogoutUseCase .ts":{"bytesInOutput":622},"src/application/useCase/RegisterUseCase.ts":{"bytesInOutput":1989},"src/application/useCase/RefreshTokenUseCase.ts":{"bytesInOutput":1169},"src/presentation/controller/AuthController.ts":{"bytesInOutput":1698},"src/infrastructure/repository/AuthRepository.ts":{"bytesInOutput":547},"src/infrastructure/auth/JwtAuthService.ts":{"bytesInOutput":2452},"src/index.ts":{"bytesInOutput":0}},"bytes":20425}}}
@@ -1,14 +1,17 @@
1
1
  import { NextFunction, Request, Response } from "express";
2
2
  import { RegisterUseCase } from "../../application/useCase/RegisterUseCase";
3
3
  import { LoginUseCase } from "../../application/useCase/LoginUseCase";
4
+ import { LogoutUseCase } from "../../application/useCase/LogoutUseCase ";
4
5
  import { RefreshTokenUseCase } from "../../application/useCase/RefreshTokenUseCase";
5
6
  import { IDecodedToken } from "../../domain/interfaces/IDecodedToken";
6
7
  export declare class AuthController {
7
8
  private loginUseCase;
9
+ private readonly logoutUseCase;
8
10
  private registerUseCase;
9
11
  private refreshTokenUseCase;
10
- constructor(loginUseCase: LoginUseCase, registerUseCase: RegisterUseCase, refreshTokenUseCase: RefreshTokenUseCase);
12
+ constructor(loginUseCase: LoginUseCase, logoutUseCase: LogoutUseCase, registerUseCase: RegisterUseCase, refreshTokenUseCase: RefreshTokenUseCase);
11
13
  login: (req: Request, res: Response, next: NextFunction) => Promise<void>;
14
+ logout: (req: Request, res: Response, next: NextFunction) => Promise<void>;
12
15
  register: (req: Request, res: Response, next: NextFunction) => Promise<void>;
13
16
  refreshToken: (req: Request, res: Response) => Promise<void>;
14
17
  verifyToken: (token: string) => Promise<IDecodedToken>;
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "cca-auth-module",
3
- "version": "0.1.19",
3
+ "version": "0.1.20",
4
4
  "description": "A TypeScript project using pnpm as the package manager.",
5
5
  "main": "dist/index.js",
6
6
  "types": "dist/index.d.ts",