dn-react-router-toolkit 0.2.0 → 0.2.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (33) hide show
  1. package/dist/auth/auth_repository.d.mts +7 -5
  2. package/dist/auth/auth_repository.d.ts +7 -5
  3. package/dist/auth/auth_service.d.mts +1 -1
  4. package/dist/auth/auth_service.d.ts +1 -1
  5. package/dist/auth/auth_service.js +1 -1
  6. package/dist/auth/auth_service.mjs +1 -1
  7. package/dist/auth/client/provider.d.mts +3 -0
  8. package/dist/auth/client/provider.d.ts +3 -0
  9. package/dist/auth/client/provider.js +17 -2
  10. package/dist/auth/client/provider.mjs +17 -2
  11. package/dist/auth/handlers/login.js +1 -1
  12. package/dist/auth/handlers/login.mjs +1 -1
  13. package/dist/auth/handlers/request_password_reset.d.mts +10 -0
  14. package/dist/auth/handlers/request_password_reset.d.ts +10 -0
  15. package/dist/auth/handlers/request_password_reset.js +87 -0
  16. package/dist/auth/handlers/request_password_reset.mjs +60 -0
  17. package/dist/auth/handlers/reset_password.d.mts +10 -0
  18. package/dist/auth/handlers/reset_password.d.ts +10 -0
  19. package/dist/auth/handlers/reset_password.js +88 -0
  20. package/dist/auth/handlers/reset_password.mjs +61 -0
  21. package/dist/auth/handlers/signup.js +17 -5
  22. package/dist/auth/handlers/signup.mjs +17 -5
  23. package/dist/auth/password_recovery.d.mts +34 -0
  24. package/dist/auth/password_recovery.d.ts +34 -0
  25. package/dist/auth/password_recovery.js +169 -0
  26. package/dist/auth/password_recovery.mjs +134 -0
  27. package/dist/auth/with_auth.js +10 -3
  28. package/dist/auth/with_auth.mjs +10 -3
  29. package/dist/route/api.d.mts +3 -1
  30. package/dist/route/api.d.ts +3 -1
  31. package/dist/route/api.js +48 -6
  32. package/dist/route/api.mjs +48 -6
  33. package/package.json +3 -1
@@ -1,8 +1,15 @@
1
1
  interface AuthRepository<TFile = unknown> {
2
2
  findCredentialById(id: string): Promise<{
3
+ id: string;
3
4
  password: string;
4
5
  userId: string;
5
6
  } | undefined>;
7
+ createCredential(params: {
8
+ id: string;
9
+ password: string;
10
+ userId: string;
11
+ }): Promise<void>;
12
+ updatePassword(id: string, hashedPassword: string): Promise<void>;
6
13
  findUserById(userId: string): Promise<{
7
14
  id: string;
8
15
  role: string;
@@ -29,11 +36,6 @@ interface AuthRepository<TFile = unknown> {
29
36
  provider: string;
30
37
  userId: string;
31
38
  }): Promise<void>;
32
- createCredential(params: {
33
- id: string;
34
- password: string;
35
- userId: string;
36
- }): Promise<void>;
37
39
  }
38
40
 
39
41
  export type { AuthRepository };
@@ -1,8 +1,15 @@
1
1
  interface AuthRepository<TFile = unknown> {
2
2
  findCredentialById(id: string): Promise<{
3
+ id: string;
3
4
  password: string;
4
5
  userId: string;
5
6
  } | undefined>;
7
+ createCredential(params: {
8
+ id: string;
9
+ password: string;
10
+ userId: string;
11
+ }): Promise<void>;
12
+ updatePassword(id: string, hashedPassword: string): Promise<void>;
6
13
  findUserById(userId: string): Promise<{
7
14
  id: string;
8
15
  role: string;
@@ -29,11 +36,6 @@ interface AuthRepository<TFile = unknown> {
29
36
  provider: string;
30
37
  userId: string;
31
38
  }): Promise<void>;
32
- createCredential(params: {
33
- id: string;
34
- password: string;
35
- userId: string;
36
- }): Promise<void>;
37
39
  }
38
40
 
39
41
  export type { AuthRepository };
@@ -24,7 +24,7 @@ declare class AuthService<TFile = unknown> {
24
24
  getAccessTokenFromCookies(request: Request): Promise<any>;
25
25
  getRefreshTokenFromCookies(request: Request): Promise<any>;
26
26
  refresh(request: Request): Promise<jose.JWTPayload | undefined>;
27
- signIn({ id, password }: {
27
+ login({ id, password }: {
28
28
  id: string;
29
29
  password: string;
30
30
  }): Promise<{
@@ -24,7 +24,7 @@ declare class AuthService<TFile = unknown> {
24
24
  getAccessTokenFromCookies(request: Request): Promise<any>;
25
25
  getRefreshTokenFromCookies(request: Request): Promise<any>;
26
26
  refresh(request: Request): Promise<jose.JWTPayload | undefined>;
27
- signIn({ id, password }: {
27
+ login({ id, password }: {
28
28
  id: string;
29
29
  password: string;
30
30
  }): Promise<{
@@ -117,7 +117,7 @@ var AuthService = class {
117
117
  }
118
118
  }
119
119
  }
120
- async signIn({ id, password }) {
120
+ async login({ id, password }) {
121
121
  const credential = await this.authRepository.findCredentialById(id);
122
122
  if (!credential) {
123
123
  throw Error("\uC544\uC774\uB514 \uB610\uB294 \uBE44\uBC00\uBC88\uD638\uAC00 \uD2C0\uB838\uC2B5\uB2C8\uB2E4.");
@@ -79,7 +79,7 @@ var AuthService = class {
79
79
  }
80
80
  }
81
81
  }
82
- async signIn({ id, password }) {
82
+ async login({ id, password }) {
83
83
  const credential = await this.authRepository.findCredentialById(id);
84
84
  if (!credential) {
85
85
  throw Error("\uC544\uC774\uB514 \uB610\uB294 \uBE44\uBC00\uBC88\uD638\uAC00 \uD2C0\uB838\uC2B5\uB2C8\uB2E4.");
@@ -7,6 +7,9 @@ type AuthContextValue = {
7
7
  login: (id: string, password: string) => Promise<void>;
8
8
  loginWithGoogle: (redirectUrl?: string) => Promise<void>;
9
9
  logout: () => Promise<void>;
10
+ signup: (email: string, password: string, passwordConfirm: string) => Promise<{
11
+ userId: string;
12
+ }>;
10
13
  requestResetPassword: (email: string) => Promise<boolean>;
11
14
  resetPassword: (token: string, password: string, passwordConfirm: string) => Promise<boolean>;
12
15
  };
@@ -7,6 +7,9 @@ type AuthContextValue = {
7
7
  login: (id: string, password: string) => Promise<void>;
8
8
  loginWithGoogle: (redirectUrl?: string) => Promise<void>;
9
9
  logout: () => Promise<void>;
10
+ signup: (email: string, password: string, passwordConfirm: string) => Promise<{
11
+ userId: string;
12
+ }>;
10
13
  requestResetPassword: (email: string) => Promise<boolean>;
11
14
  resetPassword: (token: string, password: string, passwordConfirm: string) => Promise<boolean>;
12
15
  };
@@ -90,8 +90,22 @@ function AuthProvider({ children, googleAuth }) {
90
90
  alert(message);
91
91
  }
92
92
  };
93
+ const signup = async (email, password, passwordConfirm) => {
94
+ const response = await fetch("/api/auth/signup", {
95
+ method: "POST",
96
+ headers: {
97
+ "Content-Type": "application/json"
98
+ },
99
+ body: JSON.stringify({ email, password, passwordConfirm })
100
+ });
101
+ if (!response.ok) {
102
+ const { message } = await response.json();
103
+ throw new Error(message);
104
+ }
105
+ return response.json();
106
+ };
93
107
  const requestResetPassword = async (email) => {
94
- const response = await fetch("/api/find-password", {
108
+ const response = await fetch("/api/auth/request-password-reset", {
95
109
  method: "POST",
96
110
  headers: {
97
111
  "Content-Type": "application/json"
@@ -106,7 +120,7 @@ function AuthProvider({ children, googleAuth }) {
106
120
  return true;
107
121
  };
108
122
  const resetPassword = async (token, password, passwordConfirm) => {
109
- const response = await fetch("/api/reset-password", {
123
+ const response = await fetch("/api/auth/reset-password", {
110
124
  method: "POST",
111
125
  headers: {
112
126
  "Content-Type": "application/json"
@@ -125,6 +139,7 @@ function AuthProvider({ children, googleAuth }) {
125
139
  login,
126
140
  logout,
127
141
  loginWithGoogle,
142
+ signup,
128
143
  requestResetPassword,
129
144
  resetPassword
130
145
  };
@@ -54,8 +54,22 @@ function AuthProvider({ children, googleAuth }) {
54
54
  alert(message);
55
55
  }
56
56
  };
57
+ const signup = async (email, password, passwordConfirm) => {
58
+ const response = await fetch("/api/auth/signup", {
59
+ method: "POST",
60
+ headers: {
61
+ "Content-Type": "application/json"
62
+ },
63
+ body: JSON.stringify({ email, password, passwordConfirm })
64
+ });
65
+ if (!response.ok) {
66
+ const { message } = await response.json();
67
+ throw new Error(message);
68
+ }
69
+ return response.json();
70
+ };
57
71
  const requestResetPassword = async (email) => {
58
- const response = await fetch("/api/find-password", {
72
+ const response = await fetch("/api/auth/request-password-reset", {
59
73
  method: "POST",
60
74
  headers: {
61
75
  "Content-Type": "application/json"
@@ -70,7 +84,7 @@ function AuthProvider({ children, googleAuth }) {
70
84
  return true;
71
85
  };
72
86
  const resetPassword = async (token, password, passwordConfirm) => {
73
- const response = await fetch("/api/reset-password", {
87
+ const response = await fetch("/api/auth/reset-password", {
74
88
  method: "POST",
75
89
  headers: {
76
90
  "Content-Type": "application/json"
@@ -89,6 +103,7 @@ function AuthProvider({ children, googleAuth }) {
89
103
  login,
90
104
  logout,
91
105
  loginWithGoogle,
106
+ signup,
92
107
  requestResetPassword,
93
108
  resetPassword
94
109
  };
@@ -74,7 +74,7 @@ var loginHandler = async (request, {
74
74
  }) => {
75
75
  const { id, password } = await request.json();
76
76
  try {
77
- const { accessToken, refreshToken } = await authService.signIn({
77
+ const { accessToken, refreshToken } = await authService.login({
78
78
  id,
79
79
  password
80
80
  });
@@ -48,7 +48,7 @@ var loginHandler = async (request, {
48
48
  }) => {
49
49
  const { id, password } = await request.json();
50
50
  try {
51
- const { accessToken, refreshToken } = await authService.signIn({
51
+ const { accessToken, refreshToken } = await authService.login({
52
52
  id,
53
53
  password
54
54
  });
@@ -0,0 +1,10 @@
1
+ import { PasswordRecoveryService } from '../password_recovery.mjs';
2
+ import '../auth_repository.mjs';
3
+ import '../jwt_manager.mjs';
4
+ import 'jose';
5
+
6
+ declare const requestPasswordResetHandler: (request: Request, { passwordRecoveryService, }: {
7
+ passwordRecoveryService: PasswordRecoveryService;
8
+ }) => Promise<Response>;
9
+
10
+ export { requestPasswordResetHandler };
@@ -0,0 +1,10 @@
1
+ import { PasswordRecoveryService } from '../password_recovery.js';
2
+ import '../auth_repository.js';
3
+ import '../jwt_manager.js';
4
+ import 'jose';
5
+
6
+ declare const requestPasswordResetHandler: (request: Request, { passwordRecoveryService, }: {
7
+ passwordRecoveryService: PasswordRecoveryService;
8
+ }) => Promise<Response>;
9
+
10
+ export { requestPasswordResetHandler };
@@ -0,0 +1,87 @@
1
+ "use strict";
2
+ var __defProp = Object.defineProperty;
3
+ var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
4
+ var __getOwnPropNames = Object.getOwnPropertyNames;
5
+ var __hasOwnProp = Object.prototype.hasOwnProperty;
6
+ var __export = (target, all) => {
7
+ for (var name in all)
8
+ __defProp(target, name, { get: all[name], enumerable: true });
9
+ };
10
+ var __copyProps = (to, from, except, desc) => {
11
+ if (from && typeof from === "object" || typeof from === "function") {
12
+ for (let key of __getOwnPropNames(from))
13
+ if (!__hasOwnProp.call(to, key) && key !== except)
14
+ __defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });
15
+ }
16
+ return to;
17
+ };
18
+ var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
19
+
20
+ // src/auth/handlers/request_password_reset.ts
21
+ var request_password_reset_exports = {};
22
+ __export(request_password_reset_exports, {
23
+ requestPasswordResetHandler: () => requestPasswordResetHandler
24
+ });
25
+ module.exports = __toCommonJS(request_password_reset_exports);
26
+
27
+ // src/http/response.ts
28
+ var createJsonResponse = (status) => {
29
+ return (data = {}, init) => {
30
+ return Response.json(data, { status, ...init });
31
+ };
32
+ };
33
+ var OK = createJsonResponse(200);
34
+ var CREATED = createJsonResponse(201);
35
+ var ACCEPTED = createJsonResponse(202);
36
+ var createException = (status, defaultMessage = "\uC624\uB958\uAC00 \uBC1C\uC0DD\uD588\uC2B5\uB2C8\uB2E4.") => {
37
+ return (message = defaultMessage, init) => {
38
+ return createJsonResponse(status)({ message }, init);
39
+ };
40
+ };
41
+ var BAD_REQUEST = createException(400, "\uC694\uCCAD\uC774 \uC62C\uBC14\uB974\uC9C0 \uC54A\uC2B5\uB2C8\uB2E4.");
42
+ var UNAUTHORIZED = createException(401, "\uC778\uC99D\uC774 \uD544\uC694\uD569\uB2C8\uB2E4.");
43
+ var FORBIDDEN = createException(403, "\uAD8C\uD55C\uC774 \uC5C6\uC2B5\uB2C8\uB2E4.");
44
+ var NOT_FOUND = createException(
45
+ 404,
46
+ "\uC694\uCCAD\uD55C \uB9AC\uC18C\uC2A4\uB97C \uCC3E\uC744 \uC218 \uC5C6\uC2B5\uB2C8\uB2E4."
47
+ );
48
+ var METHOD_NOT_ALLOWED = createException(
49
+ 405,
50
+ "\uBA54\uC11C\uB4DC\uB97C \uC0AC\uC6A9\uD560 \uC218 \uC5C6\uC2B5\uB2C8\uB2E4."
51
+ );
52
+ var NOT_ACCEPTABLE = createException(
53
+ 406,
54
+ "\uC694\uCCAD\uD55C \uD615\uC2DD\uC744 \uC0AC\uC6A9\uD560 \uC218 \uC5C6\uC2B5\uB2C8\uB2E4."
55
+ );
56
+ var REQUEST_TIMEOUT = createException(
57
+ 408,
58
+ "\uC694\uCCAD \uC2DC\uAC04\uC774 \uCD08\uACFC\uB418\uC5C8\uC2B5\uB2C8\uB2E4."
59
+ );
60
+ var CONFLICT = createException(409, "\uC694\uCCAD\uC774 \uCDA9\uB3CC\uD588\uC2B5\uB2C8\uB2E4.");
61
+ var UNPROCESSABLE_ENTITY = createException(
62
+ 422,
63
+ "\uCC98\uB9AC\uD560 \uC218 \uC5C6\uB294 \uC5D4\uD2F0\uD2F0\uC785\uB2C8\uB2E4."
64
+ );
65
+ var TOO_MANY_REQUESTS = createException(429, "\uC694\uCCAD\uC774 \uB108\uBB34 \uB9CE\uC2B5\uB2C8\uB2E4.");
66
+ var INTERNAL_SERVER_ERROR = createException(
67
+ 500,
68
+ "\uC608\uAE30\uCE58 \uBABB\uD55C \uC624\uB958\uAC00 \uBC1C\uC0DD\uD588\uC2B5\uB2C8\uB2E4."
69
+ );
70
+
71
+ // src/auth/handlers/request_password_reset.ts
72
+ var requestPasswordResetHandler = async (request, {
73
+ passwordRecoveryService
74
+ }) => {
75
+ const { email } = await request.json();
76
+ try {
77
+ await passwordRecoveryService.requestPasswordReset(email);
78
+ return CREATED({ message: "\uBE44\uBC00\uBC88\uD638 \uC7AC\uC124\uC815 \uC774\uBA54\uC77C\uC744 \uC804\uC1A1\uD588\uC2B5\uB2C8\uB2E4." });
79
+ } catch (error) {
80
+ console.error(error);
81
+ return INTERNAL_SERVER_ERROR("\uC774\uBA54\uC77C \uC804\uC1A1\uC5D0 \uC2E4\uD328\uD588\uC2B5\uB2C8\uB2E4.");
82
+ }
83
+ };
84
+ // Annotate the CommonJS export names for ESM import in node:
85
+ 0 && (module.exports = {
86
+ requestPasswordResetHandler
87
+ });
@@ -0,0 +1,60 @@
1
+ // src/http/response.ts
2
+ var createJsonResponse = (status) => {
3
+ return (data = {}, init) => {
4
+ return Response.json(data, { status, ...init });
5
+ };
6
+ };
7
+ var OK = createJsonResponse(200);
8
+ var CREATED = createJsonResponse(201);
9
+ var ACCEPTED = createJsonResponse(202);
10
+ var createException = (status, defaultMessage = "\uC624\uB958\uAC00 \uBC1C\uC0DD\uD588\uC2B5\uB2C8\uB2E4.") => {
11
+ return (message = defaultMessage, init) => {
12
+ return createJsonResponse(status)({ message }, init);
13
+ };
14
+ };
15
+ var BAD_REQUEST = createException(400, "\uC694\uCCAD\uC774 \uC62C\uBC14\uB974\uC9C0 \uC54A\uC2B5\uB2C8\uB2E4.");
16
+ var UNAUTHORIZED = createException(401, "\uC778\uC99D\uC774 \uD544\uC694\uD569\uB2C8\uB2E4.");
17
+ var FORBIDDEN = createException(403, "\uAD8C\uD55C\uC774 \uC5C6\uC2B5\uB2C8\uB2E4.");
18
+ var NOT_FOUND = createException(
19
+ 404,
20
+ "\uC694\uCCAD\uD55C \uB9AC\uC18C\uC2A4\uB97C \uCC3E\uC744 \uC218 \uC5C6\uC2B5\uB2C8\uB2E4."
21
+ );
22
+ var METHOD_NOT_ALLOWED = createException(
23
+ 405,
24
+ "\uBA54\uC11C\uB4DC\uB97C \uC0AC\uC6A9\uD560 \uC218 \uC5C6\uC2B5\uB2C8\uB2E4."
25
+ );
26
+ var NOT_ACCEPTABLE = createException(
27
+ 406,
28
+ "\uC694\uCCAD\uD55C \uD615\uC2DD\uC744 \uC0AC\uC6A9\uD560 \uC218 \uC5C6\uC2B5\uB2C8\uB2E4."
29
+ );
30
+ var REQUEST_TIMEOUT = createException(
31
+ 408,
32
+ "\uC694\uCCAD \uC2DC\uAC04\uC774 \uCD08\uACFC\uB418\uC5C8\uC2B5\uB2C8\uB2E4."
33
+ );
34
+ var CONFLICT = createException(409, "\uC694\uCCAD\uC774 \uCDA9\uB3CC\uD588\uC2B5\uB2C8\uB2E4.");
35
+ var UNPROCESSABLE_ENTITY = createException(
36
+ 422,
37
+ "\uCC98\uB9AC\uD560 \uC218 \uC5C6\uB294 \uC5D4\uD2F0\uD2F0\uC785\uB2C8\uB2E4."
38
+ );
39
+ var TOO_MANY_REQUESTS = createException(429, "\uC694\uCCAD\uC774 \uB108\uBB34 \uB9CE\uC2B5\uB2C8\uB2E4.");
40
+ var INTERNAL_SERVER_ERROR = createException(
41
+ 500,
42
+ "\uC608\uAE30\uCE58 \uBABB\uD55C \uC624\uB958\uAC00 \uBC1C\uC0DD\uD588\uC2B5\uB2C8\uB2E4."
43
+ );
44
+
45
+ // src/auth/handlers/request_password_reset.ts
46
+ var requestPasswordResetHandler = async (request, {
47
+ passwordRecoveryService
48
+ }) => {
49
+ const { email } = await request.json();
50
+ try {
51
+ await passwordRecoveryService.requestPasswordReset(email);
52
+ return CREATED({ message: "\uBE44\uBC00\uBC88\uD638 \uC7AC\uC124\uC815 \uC774\uBA54\uC77C\uC744 \uC804\uC1A1\uD588\uC2B5\uB2C8\uB2E4." });
53
+ } catch (error) {
54
+ console.error(error);
55
+ return INTERNAL_SERVER_ERROR("\uC774\uBA54\uC77C \uC804\uC1A1\uC5D0 \uC2E4\uD328\uD588\uC2B5\uB2C8\uB2E4.");
56
+ }
57
+ };
58
+ export {
59
+ requestPasswordResetHandler
60
+ };
@@ -0,0 +1,10 @@
1
+ import { PasswordRecoveryService } from '../password_recovery.mjs';
2
+ import '../auth_repository.mjs';
3
+ import '../jwt_manager.mjs';
4
+ import 'jose';
5
+
6
+ declare const resetPasswordHandler: (request: Request, { passwordRecoveryService, }: {
7
+ passwordRecoveryService: PasswordRecoveryService;
8
+ }) => Promise<Response>;
9
+
10
+ export { resetPasswordHandler };
@@ -0,0 +1,10 @@
1
+ import { PasswordRecoveryService } from '../password_recovery.js';
2
+ import '../auth_repository.js';
3
+ import '../jwt_manager.js';
4
+ import 'jose';
5
+
6
+ declare const resetPasswordHandler: (request: Request, { passwordRecoveryService, }: {
7
+ passwordRecoveryService: PasswordRecoveryService;
8
+ }) => Promise<Response>;
9
+
10
+ export { resetPasswordHandler };
@@ -0,0 +1,88 @@
1
+ "use strict";
2
+ var __defProp = Object.defineProperty;
3
+ var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
4
+ var __getOwnPropNames = Object.getOwnPropertyNames;
5
+ var __hasOwnProp = Object.prototype.hasOwnProperty;
6
+ var __export = (target, all) => {
7
+ for (var name in all)
8
+ __defProp(target, name, { get: all[name], enumerable: true });
9
+ };
10
+ var __copyProps = (to, from, except, desc) => {
11
+ if (from && typeof from === "object" || typeof from === "function") {
12
+ for (let key of __getOwnPropNames(from))
13
+ if (!__hasOwnProp.call(to, key) && key !== except)
14
+ __defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });
15
+ }
16
+ return to;
17
+ };
18
+ var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
19
+
20
+ // src/auth/handlers/reset_password.ts
21
+ var reset_password_exports = {};
22
+ __export(reset_password_exports, {
23
+ resetPasswordHandler: () => resetPasswordHandler
24
+ });
25
+ module.exports = __toCommonJS(reset_password_exports);
26
+
27
+ // src/http/response.ts
28
+ var createJsonResponse = (status) => {
29
+ return (data = {}, init) => {
30
+ return Response.json(data, { status, ...init });
31
+ };
32
+ };
33
+ var OK = createJsonResponse(200);
34
+ var CREATED = createJsonResponse(201);
35
+ var ACCEPTED = createJsonResponse(202);
36
+ var NO_CONTENT = (init) => {
37
+ return new Response(null, {
38
+ ...init,
39
+ status: 204
40
+ });
41
+ };
42
+ var createException = (status, defaultMessage = "\uC624\uB958\uAC00 \uBC1C\uC0DD\uD588\uC2B5\uB2C8\uB2E4.") => {
43
+ return (message = defaultMessage, init) => {
44
+ return createJsonResponse(status)({ message }, init);
45
+ };
46
+ };
47
+ var BAD_REQUEST = createException(400, "\uC694\uCCAD\uC774 \uC62C\uBC14\uB974\uC9C0 \uC54A\uC2B5\uB2C8\uB2E4.");
48
+ var UNAUTHORIZED = createException(401, "\uC778\uC99D\uC774 \uD544\uC694\uD569\uB2C8\uB2E4.");
49
+ var FORBIDDEN = createException(403, "\uAD8C\uD55C\uC774 \uC5C6\uC2B5\uB2C8\uB2E4.");
50
+ var NOT_FOUND = createException(
51
+ 404,
52
+ "\uC694\uCCAD\uD55C \uB9AC\uC18C\uC2A4\uB97C \uCC3E\uC744 \uC218 \uC5C6\uC2B5\uB2C8\uB2E4."
53
+ );
54
+ var METHOD_NOT_ALLOWED = createException(
55
+ 405,
56
+ "\uBA54\uC11C\uB4DC\uB97C \uC0AC\uC6A9\uD560 \uC218 \uC5C6\uC2B5\uB2C8\uB2E4."
57
+ );
58
+ var NOT_ACCEPTABLE = createException(
59
+ 406,
60
+ "\uC694\uCCAD\uD55C \uD615\uC2DD\uC744 \uC0AC\uC6A9\uD560 \uC218 \uC5C6\uC2B5\uB2C8\uB2E4."
61
+ );
62
+ var REQUEST_TIMEOUT = createException(
63
+ 408,
64
+ "\uC694\uCCAD \uC2DC\uAC04\uC774 \uCD08\uACFC\uB418\uC5C8\uC2B5\uB2C8\uB2E4."
65
+ );
66
+ var CONFLICT = createException(409, "\uC694\uCCAD\uC774 \uCDA9\uB3CC\uD588\uC2B5\uB2C8\uB2E4.");
67
+ var UNPROCESSABLE_ENTITY = createException(
68
+ 422,
69
+ "\uCC98\uB9AC\uD560 \uC218 \uC5C6\uB294 \uC5D4\uD2F0\uD2F0\uC785\uB2C8\uB2E4."
70
+ );
71
+ var TOO_MANY_REQUESTS = createException(429, "\uC694\uCCAD\uC774 \uB108\uBB34 \uB9CE\uC2B5\uB2C8\uB2E4.");
72
+ var INTERNAL_SERVER_ERROR = createException(
73
+ 500,
74
+ "\uC608\uAE30\uCE58 \uBABB\uD55C \uC624\uB958\uAC00 \uBC1C\uC0DD\uD588\uC2B5\uB2C8\uB2E4."
75
+ );
76
+
77
+ // src/auth/handlers/reset_password.ts
78
+ var resetPasswordHandler = async (request, {
79
+ passwordRecoveryService
80
+ }) => {
81
+ const { token, password, passwordConfirm } = await request.json();
82
+ await passwordRecoveryService.resetPassword(token, password, passwordConfirm);
83
+ return NO_CONTENT();
84
+ };
85
+ // Annotate the CommonJS export names for ESM import in node:
86
+ 0 && (module.exports = {
87
+ resetPasswordHandler
88
+ });
@@ -0,0 +1,61 @@
1
+ // src/http/response.ts
2
+ var createJsonResponse = (status) => {
3
+ return (data = {}, init) => {
4
+ return Response.json(data, { status, ...init });
5
+ };
6
+ };
7
+ var OK = createJsonResponse(200);
8
+ var CREATED = createJsonResponse(201);
9
+ var ACCEPTED = createJsonResponse(202);
10
+ var NO_CONTENT = (init) => {
11
+ return new Response(null, {
12
+ ...init,
13
+ status: 204
14
+ });
15
+ };
16
+ var createException = (status, defaultMessage = "\uC624\uB958\uAC00 \uBC1C\uC0DD\uD588\uC2B5\uB2C8\uB2E4.") => {
17
+ return (message = defaultMessage, init) => {
18
+ return createJsonResponse(status)({ message }, init);
19
+ };
20
+ };
21
+ var BAD_REQUEST = createException(400, "\uC694\uCCAD\uC774 \uC62C\uBC14\uB974\uC9C0 \uC54A\uC2B5\uB2C8\uB2E4.");
22
+ var UNAUTHORIZED = createException(401, "\uC778\uC99D\uC774 \uD544\uC694\uD569\uB2C8\uB2E4.");
23
+ var FORBIDDEN = createException(403, "\uAD8C\uD55C\uC774 \uC5C6\uC2B5\uB2C8\uB2E4.");
24
+ var NOT_FOUND = createException(
25
+ 404,
26
+ "\uC694\uCCAD\uD55C \uB9AC\uC18C\uC2A4\uB97C \uCC3E\uC744 \uC218 \uC5C6\uC2B5\uB2C8\uB2E4."
27
+ );
28
+ var METHOD_NOT_ALLOWED = createException(
29
+ 405,
30
+ "\uBA54\uC11C\uB4DC\uB97C \uC0AC\uC6A9\uD560 \uC218 \uC5C6\uC2B5\uB2C8\uB2E4."
31
+ );
32
+ var NOT_ACCEPTABLE = createException(
33
+ 406,
34
+ "\uC694\uCCAD\uD55C \uD615\uC2DD\uC744 \uC0AC\uC6A9\uD560 \uC218 \uC5C6\uC2B5\uB2C8\uB2E4."
35
+ );
36
+ var REQUEST_TIMEOUT = createException(
37
+ 408,
38
+ "\uC694\uCCAD \uC2DC\uAC04\uC774 \uCD08\uACFC\uB418\uC5C8\uC2B5\uB2C8\uB2E4."
39
+ );
40
+ var CONFLICT = createException(409, "\uC694\uCCAD\uC774 \uCDA9\uB3CC\uD588\uC2B5\uB2C8\uB2E4.");
41
+ var UNPROCESSABLE_ENTITY = createException(
42
+ 422,
43
+ "\uCC98\uB9AC\uD560 \uC218 \uC5C6\uB294 \uC5D4\uD2F0\uD2F0\uC785\uB2C8\uB2E4."
44
+ );
45
+ var TOO_MANY_REQUESTS = createException(429, "\uC694\uCCAD\uC774 \uB108\uBB34 \uB9CE\uC2B5\uB2C8\uB2E4.");
46
+ var INTERNAL_SERVER_ERROR = createException(
47
+ 500,
48
+ "\uC608\uAE30\uCE58 \uBABB\uD55C \uC624\uB958\uAC00 \uBC1C\uC0DD\uD588\uC2B5\uB2C8\uB2E4."
49
+ );
50
+
51
+ // src/auth/handlers/reset_password.ts
52
+ var resetPasswordHandler = async (request, {
53
+ passwordRecoveryService
54
+ }) => {
55
+ const { token, password, passwordConfirm } = await request.json();
56
+ await passwordRecoveryService.resetPassword(token, password, passwordConfirm);
57
+ return NO_CONTENT();
58
+ };
59
+ export {
60
+ resetPasswordHandler
61
+ };
@@ -102,12 +102,9 @@ var signupHandler = async (request, {
102
102
  if (!passwordConfirm) {
103
103
  return BAD_REQUEST("\uBE44\uBC00\uBC88\uD638 \uD655\uC778\uC744 \uC785\uB825\uD574\uC8FC\uC138\uC694.");
104
104
  }
105
- if (!name) {
106
- return BAD_REQUEST("\uC774\uB984\uC744 \uC785\uB825\uD574\uC8FC\uC138\uC694.");
107
- }
108
105
  const existing = await authService.authRepository.findCredentialById(email);
109
106
  if (existing) {
110
- return CONFLICT("\uC774\uBA54\uC77C\uC774 \uC774\uBBF8 \uC874\uC7AC\uD569\uB2C8\uB2E4.");
107
+ return CONFLICT("\uC774\uBBF8 \uAC00\uC785\uD55C \uC774\uBA54\uC77C\uC785\uB2C8\uB2E4.");
111
108
  }
112
109
  if (password !== passwordConfirm) {
113
110
  return BAD_REQUEST("\uBE44\uBC00\uBC88\uD638\uAC00 \uC77C\uCE58\uD558\uC9C0 \uC54A\uC2B5\uB2C8\uB2E4.");
@@ -127,7 +124,22 @@ var signupHandler = async (request, {
127
124
  password: bcrypt.hashSync(password, 10)
128
125
  });
129
126
  const { accessToken, refreshToken } = await authService.issueTokenPair(user);
130
- return CREATED({ accessToken, refreshToken });
127
+ const searchParams = new URL(request.url).searchParams;
128
+ const type = searchParams.get("type");
129
+ if (type === "json") {
130
+ return CREATED({ accessToken, refreshToken });
131
+ }
132
+ const [accessTokenSetCookie, refreshTokenSetCookie] = await Promise.all([
133
+ authService.getAccessTokenSetCookie(accessToken),
134
+ authService.getRefreshTokenSetCookie(refreshToken)
135
+ ]);
136
+ const payload = authService.jwtManager.decode(accessToken);
137
+ const headers = new Headers();
138
+ headers.append("Set-Cookie", accessTokenSetCookie);
139
+ headers.append("Set-Cookie", refreshTokenSetCookie);
140
+ return CREATED(payload, {
141
+ headers
142
+ });
131
143
  };
132
144
  // Annotate the CommonJS export names for ESM import in node:
133
145
  0 && (module.exports = {
@@ -68,12 +68,9 @@ var signupHandler = async (request, {
68
68
  if (!passwordConfirm) {
69
69
  return BAD_REQUEST("\uBE44\uBC00\uBC88\uD638 \uD655\uC778\uC744 \uC785\uB825\uD574\uC8FC\uC138\uC694.");
70
70
  }
71
- if (!name) {
72
- return BAD_REQUEST("\uC774\uB984\uC744 \uC785\uB825\uD574\uC8FC\uC138\uC694.");
73
- }
74
71
  const existing = await authService.authRepository.findCredentialById(email);
75
72
  if (existing) {
76
- return CONFLICT("\uC774\uBA54\uC77C\uC774 \uC774\uBBF8 \uC874\uC7AC\uD569\uB2C8\uB2E4.");
73
+ return CONFLICT("\uC774\uBBF8 \uAC00\uC785\uD55C \uC774\uBA54\uC77C\uC785\uB2C8\uB2E4.");
77
74
  }
78
75
  if (password !== passwordConfirm) {
79
76
  return BAD_REQUEST("\uBE44\uBC00\uBC88\uD638\uAC00 \uC77C\uCE58\uD558\uC9C0 \uC54A\uC2B5\uB2C8\uB2E4.");
@@ -93,7 +90,22 @@ var signupHandler = async (request, {
93
90
  password: bcrypt.hashSync(password, 10)
94
91
  });
95
92
  const { accessToken, refreshToken } = await authService.issueTokenPair(user);
96
- return CREATED({ accessToken, refreshToken });
93
+ const searchParams = new URL(request.url).searchParams;
94
+ const type = searchParams.get("type");
95
+ if (type === "json") {
96
+ return CREATED({ accessToken, refreshToken });
97
+ }
98
+ const [accessTokenSetCookie, refreshTokenSetCookie] = await Promise.all([
99
+ authService.getAccessTokenSetCookie(accessToken),
100
+ authService.getRefreshTokenSetCookie(refreshToken)
101
+ ]);
102
+ const payload = authService.jwtManager.decode(accessToken);
103
+ const headers = new Headers();
104
+ headers.append("Set-Cookie", accessTokenSetCookie);
105
+ headers.append("Set-Cookie", refreshTokenSetCookie);
106
+ return CREATED(payload, {
107
+ headers
108
+ });
97
109
  };
98
110
  export {
99
111
  signupHandler