dn-react-router-toolkit 0.2.0 → 0.2.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (33) hide show
  1. package/dist/auth/auth_repository.d.mts +7 -5
  2. package/dist/auth/auth_repository.d.ts +7 -5
  3. package/dist/auth/auth_service.d.mts +1 -1
  4. package/dist/auth/auth_service.d.ts +1 -1
  5. package/dist/auth/auth_service.js +1 -1
  6. package/dist/auth/auth_service.mjs +1 -1
  7. package/dist/auth/client/provider.d.mts +3 -0
  8. package/dist/auth/client/provider.d.ts +3 -0
  9. package/dist/auth/client/provider.js +17 -2
  10. package/dist/auth/client/provider.mjs +17 -2
  11. package/dist/auth/handlers/login.js +1 -1
  12. package/dist/auth/handlers/login.mjs +1 -1
  13. package/dist/auth/handlers/request_password_reset.d.mts +10 -0
  14. package/dist/auth/handlers/request_password_reset.d.ts +10 -0
  15. package/dist/auth/handlers/request_password_reset.js +87 -0
  16. package/dist/auth/handlers/request_password_reset.mjs +60 -0
  17. package/dist/auth/handlers/reset_password.d.mts +10 -0
  18. package/dist/auth/handlers/reset_password.d.ts +10 -0
  19. package/dist/auth/handlers/reset_password.js +88 -0
  20. package/dist/auth/handlers/reset_password.mjs +61 -0
  21. package/dist/auth/handlers/signup.js +17 -5
  22. package/dist/auth/handlers/signup.mjs +17 -5
  23. package/dist/auth/password_recovery.d.mts +34 -0
  24. package/dist/auth/password_recovery.d.ts +34 -0
  25. package/dist/auth/password_recovery.js +169 -0
  26. package/dist/auth/password_recovery.mjs +134 -0
  27. package/dist/auth/with_auth.js +10 -3
  28. package/dist/auth/with_auth.mjs +10 -3
  29. package/dist/route/api.d.mts +3 -1
  30. package/dist/route/api.d.ts +3 -1
  31. package/dist/route/api.js +48 -6
  32. package/dist/route/api.mjs +48 -6
  33. package/package.json +3 -1
@@ -0,0 +1,34 @@
1
+ import { AuthRepository } from './auth_repository.mjs';
2
+ import { JWTManager } from './jwt_manager.mjs';
3
+ import 'jose';
4
+
5
+ declare class PasswordRecoveryService {
6
+ siteOrigin: string;
7
+ siteName: string;
8
+ jwtManager: JWTManager;
9
+ authRepository: AuthRepository;
10
+ emailCredentials: {
11
+ service: string;
12
+ user: string;
13
+ pass: string;
14
+ };
15
+ resetPasswordTokenSecret: string;
16
+ resetPasswordTokenExpiresIn: string;
17
+ constructor({ siteOrigin, siteName, jwtManager, authRepository, emailCredentials, resetPasswordTokenSecret, resetPasswordTokenExpiresIn, }: {
18
+ siteOrigin: string;
19
+ siteName: string;
20
+ jwtManager: JWTManager;
21
+ authRepository: AuthRepository;
22
+ emailCredentials: {
23
+ service: string;
24
+ user: string;
25
+ pass: string;
26
+ };
27
+ resetPasswordTokenSecret: string;
28
+ resetPasswordTokenExpiresIn?: string;
29
+ });
30
+ requestPasswordReset(email: string): Promise<void>;
31
+ resetPassword(token: string, password: string, passwordConfirm: string): Promise<void>;
32
+ }
33
+
34
+ export { PasswordRecoveryService };
@@ -0,0 +1,34 @@
1
+ import { AuthRepository } from './auth_repository.js';
2
+ import { JWTManager } from './jwt_manager.js';
3
+ import 'jose';
4
+
5
+ declare class PasswordRecoveryService {
6
+ siteOrigin: string;
7
+ siteName: string;
8
+ jwtManager: JWTManager;
9
+ authRepository: AuthRepository;
10
+ emailCredentials: {
11
+ service: string;
12
+ user: string;
13
+ pass: string;
14
+ };
15
+ resetPasswordTokenSecret: string;
16
+ resetPasswordTokenExpiresIn: string;
17
+ constructor({ siteOrigin, siteName, jwtManager, authRepository, emailCredentials, resetPasswordTokenSecret, resetPasswordTokenExpiresIn, }: {
18
+ siteOrigin: string;
19
+ siteName: string;
20
+ jwtManager: JWTManager;
21
+ authRepository: AuthRepository;
22
+ emailCredentials: {
23
+ service: string;
24
+ user: string;
25
+ pass: string;
26
+ };
27
+ resetPasswordTokenSecret: string;
28
+ resetPasswordTokenExpiresIn?: string;
29
+ });
30
+ requestPasswordReset(email: string): Promise<void>;
31
+ resetPassword(token: string, password: string, passwordConfirm: string): Promise<void>;
32
+ }
33
+
34
+ export { PasswordRecoveryService };
@@ -0,0 +1,169 @@
1
+ "use strict";
2
+ var __create = Object.create;
3
+ var __defProp = Object.defineProperty;
4
+ var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
5
+ var __getOwnPropNames = Object.getOwnPropertyNames;
6
+ var __getProtoOf = Object.getPrototypeOf;
7
+ var __hasOwnProp = Object.prototype.hasOwnProperty;
8
+ var __export = (target, all) => {
9
+ for (var name in all)
10
+ __defProp(target, name, { get: all[name], enumerable: true });
11
+ };
12
+ var __copyProps = (to, from, except, desc) => {
13
+ if (from && typeof from === "object" || typeof from === "function") {
14
+ for (let key of __getOwnPropNames(from))
15
+ if (!__hasOwnProp.call(to, key) && key !== except)
16
+ __defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });
17
+ }
18
+ return to;
19
+ };
20
+ var __toESM = (mod, isNodeMode, target) => (target = mod != null ? __create(__getProtoOf(mod)) : {}, __copyProps(
21
+ // If the importer is in node compatibility mode or this is not an ESM
22
+ // file that has been converted to a CommonJS file using a Babel-
23
+ // compatible transform (i.e. "__esModule" has not been set), then set
24
+ // "default" to the CommonJS "module.exports" for node compatibility.
25
+ isNodeMode || !mod || !mod.__esModule ? __defProp(target, "default", { value: mod, enumerable: true }) : target,
26
+ mod
27
+ ));
28
+ var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
29
+
30
+ // src/auth/password_recovery.ts
31
+ var password_recovery_exports = {};
32
+ __export(password_recovery_exports, {
33
+ PasswordRecoveryService: () => PasswordRecoveryService
34
+ });
35
+ module.exports = __toCommonJS(password_recovery_exports);
36
+ var import_nodemailer = __toESM(require("nodemailer"));
37
+
38
+ // src/http/response.ts
39
+ var createJsonResponse = (status) => {
40
+ return (data = {}, init) => {
41
+ return Response.json(data, { status, ...init });
42
+ };
43
+ };
44
+ var OK = createJsonResponse(200);
45
+ var CREATED = createJsonResponse(201);
46
+ var ACCEPTED = createJsonResponse(202);
47
+ var createException = (status, defaultMessage = "\uC624\uB958\uAC00 \uBC1C\uC0DD\uD588\uC2B5\uB2C8\uB2E4.") => {
48
+ return (message = defaultMessage, init) => {
49
+ return createJsonResponse(status)({ message }, init);
50
+ };
51
+ };
52
+ var BAD_REQUEST = createException(400, "\uC694\uCCAD\uC774 \uC62C\uBC14\uB974\uC9C0 \uC54A\uC2B5\uB2C8\uB2E4.");
53
+ var UNAUTHORIZED = createException(401, "\uC778\uC99D\uC774 \uD544\uC694\uD569\uB2C8\uB2E4.");
54
+ var FORBIDDEN = createException(403, "\uAD8C\uD55C\uC774 \uC5C6\uC2B5\uB2C8\uB2E4.");
55
+ var NOT_FOUND = createException(
56
+ 404,
57
+ "\uC694\uCCAD\uD55C \uB9AC\uC18C\uC2A4\uB97C \uCC3E\uC744 \uC218 \uC5C6\uC2B5\uB2C8\uB2E4."
58
+ );
59
+ var METHOD_NOT_ALLOWED = createException(
60
+ 405,
61
+ "\uBA54\uC11C\uB4DC\uB97C \uC0AC\uC6A9\uD560 \uC218 \uC5C6\uC2B5\uB2C8\uB2E4."
62
+ );
63
+ var NOT_ACCEPTABLE = createException(
64
+ 406,
65
+ "\uC694\uCCAD\uD55C \uD615\uC2DD\uC744 \uC0AC\uC6A9\uD560 \uC218 \uC5C6\uC2B5\uB2C8\uB2E4."
66
+ );
67
+ var REQUEST_TIMEOUT = createException(
68
+ 408,
69
+ "\uC694\uCCAD \uC2DC\uAC04\uC774 \uCD08\uACFC\uB418\uC5C8\uC2B5\uB2C8\uB2E4."
70
+ );
71
+ var CONFLICT = createException(409, "\uC694\uCCAD\uC774 \uCDA9\uB3CC\uD588\uC2B5\uB2C8\uB2E4.");
72
+ var UNPROCESSABLE_ENTITY = createException(
73
+ 422,
74
+ "\uCC98\uB9AC\uD560 \uC218 \uC5C6\uB294 \uC5D4\uD2F0\uD2F0\uC785\uB2C8\uB2E4."
75
+ );
76
+ var TOO_MANY_REQUESTS = createException(429, "\uC694\uCCAD\uC774 \uB108\uBB34 \uB9CE\uC2B5\uB2C8\uB2E4.");
77
+ var INTERNAL_SERVER_ERROR = createException(
78
+ 500,
79
+ "\uC608\uAE30\uCE58 \uBABB\uD55C \uC624\uB958\uAC00 \uBC1C\uC0DD\uD588\uC2B5\uB2C8\uB2E4."
80
+ );
81
+
82
+ // src/auth/password_recovery.ts
83
+ var import_bcryptjs = __toESM(require("bcryptjs"));
84
+ var PasswordRecoveryService = class {
85
+ siteOrigin;
86
+ siteName;
87
+ jwtManager;
88
+ authRepository;
89
+ emailCredentials;
90
+ resetPasswordTokenSecret;
91
+ resetPasswordTokenExpiresIn;
92
+ constructor({
93
+ siteOrigin,
94
+ siteName,
95
+ jwtManager,
96
+ authRepository,
97
+ emailCredentials,
98
+ resetPasswordTokenSecret,
99
+ resetPasswordTokenExpiresIn = "1h"
100
+ }) {
101
+ this.siteOrigin = siteOrigin;
102
+ this.siteName = siteName;
103
+ this.jwtManager = jwtManager;
104
+ this.authRepository = authRepository;
105
+ this.emailCredentials = emailCredentials;
106
+ this.resetPasswordTokenSecret = resetPasswordTokenSecret;
107
+ this.resetPasswordTokenExpiresIn = resetPasswordTokenExpiresIn;
108
+ }
109
+ async requestPasswordReset(email) {
110
+ const credential = await this.authRepository.findCredentialById(email);
111
+ if (!credential) {
112
+ throw NOT_FOUND("\uAC00\uC785\uB418\uC9C0 \uC54A\uC740 \uC774\uBA54\uC77C\uC785\uB2C8\uB2E4.");
113
+ }
114
+ const transporter = import_nodemailer.default.createTransport({
115
+ service: this.emailCredentials.service,
116
+ auth: {
117
+ user: this.emailCredentials.user,
118
+ pass: this.emailCredentials.pass
119
+ }
120
+ });
121
+ const token = await this.jwtManager.sign(
122
+ {
123
+ id: credential.id
124
+ },
125
+ this.resetPasswordTokenSecret,
126
+ {
127
+ expiresIn: this.resetPasswordTokenExpiresIn
128
+ }
129
+ );
130
+ const link = `${this.siteOrigin}/reset-password?token=${token}`;
131
+ const mailOptions = {
132
+ from: process.env.EMAIL_USER,
133
+ to: email,
134
+ subject: `${this.siteName} \uBE44\uBC00\uBC88\uD638 \uC7AC\uC124\uC815`,
135
+ html: `<main>
136
+ <p>\uBE44\uBC00\uBC88\uD638 \uC7AC\uC124\uC815\uC744 \uC704\uD574 \uC544\uB798 \uB9C1\uD06C\uB97C \uD074\uB9AD\uD574 \uC8FC\uC138\uC694. \uB9C1\uD06C\uB294 \uD55C \uC2DC\uAC04 \uB3D9\uC548 \uC720\uD6A8\uD569\uB2C8\uB2E4. \uB2E4\uB978 \uC0AC\uB78C\uC5D0\uAC8C \uACF5\uC720\uD558\uC9C0 \uB9C8\uC138\uC694.</p>
137
+ <a href="${link}" target="_blank">${link}</a>
138
+ </main>`
139
+ };
140
+ await transporter.sendMail(mailOptions);
141
+ }
142
+ async resetPassword(token, password, passwordConfirm) {
143
+ const payload = await this.jwtManager.verify(
144
+ token,
145
+ this.resetPasswordTokenSecret
146
+ );
147
+ if (!payload) {
148
+ throw UNAUTHORIZED("\uC720\uD6A8\uD558\uC9C0 \uC54A\uC740 \uD1A0\uD070\uC785\uB2C8\uB2E4.");
149
+ }
150
+ if (typeof payload.id !== "string") {
151
+ throw UNAUTHORIZED("\uD1A0\uD070\uC774 \uC704\uC870\uB418\uC5C8\uC2B5\uB2C8\uB2E4.");
152
+ }
153
+ const credential = await this.authRepository.findCredentialById(payload.id);
154
+ if (!credential) {
155
+ throw NOT_FOUND("\uC874\uC7AC\uD558\uC9C0 \uC54A\uB294 \uACC4\uC815\uC785\uB2C8\uB2E4.");
156
+ }
157
+ if (typeof password !== "string" || !password.trim()) {
158
+ throw BAD_REQUEST("\uC720\uD6A8\uD558\uC9C0 \uC54A\uC740 \uBE44\uBC00\uBC88\uD638\uC785\uB2C8\uB2E4.");
159
+ }
160
+ if (password !== passwordConfirm) {
161
+ throw BAD_REQUEST("\uBE44\uBC00\uBC88\uD638\uAC00 \uC77C\uCE58\uD558\uC9C0 \uC54A\uC2B5\uB2C8\uB2E4.");
162
+ }
163
+ await this.authRepository.updatePassword(credential.id, import_bcryptjs.default.hashSync(password, 10));
164
+ }
165
+ };
166
+ // Annotate the CommonJS export names for ESM import in node:
167
+ 0 && (module.exports = {
168
+ PasswordRecoveryService
169
+ });
@@ -0,0 +1,134 @@
1
+ // src/auth/password_recovery.ts
2
+ import nodemailer from "nodemailer";
3
+
4
+ // src/http/response.ts
5
+ var createJsonResponse = (status) => {
6
+ return (data = {}, init) => {
7
+ return Response.json(data, { status, ...init });
8
+ };
9
+ };
10
+ var OK = createJsonResponse(200);
11
+ var CREATED = createJsonResponse(201);
12
+ var ACCEPTED = createJsonResponse(202);
13
+ var createException = (status, defaultMessage = "\uC624\uB958\uAC00 \uBC1C\uC0DD\uD588\uC2B5\uB2C8\uB2E4.") => {
14
+ return (message = defaultMessage, init) => {
15
+ return createJsonResponse(status)({ message }, init);
16
+ };
17
+ };
18
+ var BAD_REQUEST = createException(400, "\uC694\uCCAD\uC774 \uC62C\uBC14\uB974\uC9C0 \uC54A\uC2B5\uB2C8\uB2E4.");
19
+ var UNAUTHORIZED = createException(401, "\uC778\uC99D\uC774 \uD544\uC694\uD569\uB2C8\uB2E4.");
20
+ var FORBIDDEN = createException(403, "\uAD8C\uD55C\uC774 \uC5C6\uC2B5\uB2C8\uB2E4.");
21
+ var NOT_FOUND = createException(
22
+ 404,
23
+ "\uC694\uCCAD\uD55C \uB9AC\uC18C\uC2A4\uB97C \uCC3E\uC744 \uC218 \uC5C6\uC2B5\uB2C8\uB2E4."
24
+ );
25
+ var METHOD_NOT_ALLOWED = createException(
26
+ 405,
27
+ "\uBA54\uC11C\uB4DC\uB97C \uC0AC\uC6A9\uD560 \uC218 \uC5C6\uC2B5\uB2C8\uB2E4."
28
+ );
29
+ var NOT_ACCEPTABLE = createException(
30
+ 406,
31
+ "\uC694\uCCAD\uD55C \uD615\uC2DD\uC744 \uC0AC\uC6A9\uD560 \uC218 \uC5C6\uC2B5\uB2C8\uB2E4."
32
+ );
33
+ var REQUEST_TIMEOUT = createException(
34
+ 408,
35
+ "\uC694\uCCAD \uC2DC\uAC04\uC774 \uCD08\uACFC\uB418\uC5C8\uC2B5\uB2C8\uB2E4."
36
+ );
37
+ var CONFLICT = createException(409, "\uC694\uCCAD\uC774 \uCDA9\uB3CC\uD588\uC2B5\uB2C8\uB2E4.");
38
+ var UNPROCESSABLE_ENTITY = createException(
39
+ 422,
40
+ "\uCC98\uB9AC\uD560 \uC218 \uC5C6\uB294 \uC5D4\uD2F0\uD2F0\uC785\uB2C8\uB2E4."
41
+ );
42
+ var TOO_MANY_REQUESTS = createException(429, "\uC694\uCCAD\uC774 \uB108\uBB34 \uB9CE\uC2B5\uB2C8\uB2E4.");
43
+ var INTERNAL_SERVER_ERROR = createException(
44
+ 500,
45
+ "\uC608\uAE30\uCE58 \uBABB\uD55C \uC624\uB958\uAC00 \uBC1C\uC0DD\uD588\uC2B5\uB2C8\uB2E4."
46
+ );
47
+
48
+ // src/auth/password_recovery.ts
49
+ import bcrypt from "bcryptjs";
50
+ var PasswordRecoveryService = class {
51
+ siteOrigin;
52
+ siteName;
53
+ jwtManager;
54
+ authRepository;
55
+ emailCredentials;
56
+ resetPasswordTokenSecret;
57
+ resetPasswordTokenExpiresIn;
58
+ constructor({
59
+ siteOrigin,
60
+ siteName,
61
+ jwtManager,
62
+ authRepository,
63
+ emailCredentials,
64
+ resetPasswordTokenSecret,
65
+ resetPasswordTokenExpiresIn = "1h"
66
+ }) {
67
+ this.siteOrigin = siteOrigin;
68
+ this.siteName = siteName;
69
+ this.jwtManager = jwtManager;
70
+ this.authRepository = authRepository;
71
+ this.emailCredentials = emailCredentials;
72
+ this.resetPasswordTokenSecret = resetPasswordTokenSecret;
73
+ this.resetPasswordTokenExpiresIn = resetPasswordTokenExpiresIn;
74
+ }
75
+ async requestPasswordReset(email) {
76
+ const credential = await this.authRepository.findCredentialById(email);
77
+ if (!credential) {
78
+ throw NOT_FOUND("\uAC00\uC785\uB418\uC9C0 \uC54A\uC740 \uC774\uBA54\uC77C\uC785\uB2C8\uB2E4.");
79
+ }
80
+ const transporter = nodemailer.createTransport({
81
+ service: this.emailCredentials.service,
82
+ auth: {
83
+ user: this.emailCredentials.user,
84
+ pass: this.emailCredentials.pass
85
+ }
86
+ });
87
+ const token = await this.jwtManager.sign(
88
+ {
89
+ id: credential.id
90
+ },
91
+ this.resetPasswordTokenSecret,
92
+ {
93
+ expiresIn: this.resetPasswordTokenExpiresIn
94
+ }
95
+ );
96
+ const link = `${this.siteOrigin}/reset-password?token=${token}`;
97
+ const mailOptions = {
98
+ from: process.env.EMAIL_USER,
99
+ to: email,
100
+ subject: `${this.siteName} \uBE44\uBC00\uBC88\uD638 \uC7AC\uC124\uC815`,
101
+ html: `<main>
102
+ <p>\uBE44\uBC00\uBC88\uD638 \uC7AC\uC124\uC815\uC744 \uC704\uD574 \uC544\uB798 \uB9C1\uD06C\uB97C \uD074\uB9AD\uD574 \uC8FC\uC138\uC694. \uB9C1\uD06C\uB294 \uD55C \uC2DC\uAC04 \uB3D9\uC548 \uC720\uD6A8\uD569\uB2C8\uB2E4. \uB2E4\uB978 \uC0AC\uB78C\uC5D0\uAC8C \uACF5\uC720\uD558\uC9C0 \uB9C8\uC138\uC694.</p>
103
+ <a href="${link}" target="_blank">${link}</a>
104
+ </main>`
105
+ };
106
+ await transporter.sendMail(mailOptions);
107
+ }
108
+ async resetPassword(token, password, passwordConfirm) {
109
+ const payload = await this.jwtManager.verify(
110
+ token,
111
+ this.resetPasswordTokenSecret
112
+ );
113
+ if (!payload) {
114
+ throw UNAUTHORIZED("\uC720\uD6A8\uD558\uC9C0 \uC54A\uC740 \uD1A0\uD070\uC785\uB2C8\uB2E4.");
115
+ }
116
+ if (typeof payload.id !== "string") {
117
+ throw UNAUTHORIZED("\uD1A0\uD070\uC774 \uC704\uC870\uB418\uC5C8\uC2B5\uB2C8\uB2E4.");
118
+ }
119
+ const credential = await this.authRepository.findCredentialById(payload.id);
120
+ if (!credential) {
121
+ throw NOT_FOUND("\uC874\uC7AC\uD558\uC9C0 \uC54A\uB294 \uACC4\uC815\uC785\uB2C8\uB2E4.");
122
+ }
123
+ if (typeof password !== "string" || !password.trim()) {
124
+ throw BAD_REQUEST("\uC720\uD6A8\uD558\uC9C0 \uC54A\uC740 \uBE44\uBC00\uBC88\uD638\uC785\uB2C8\uB2E4.");
125
+ }
126
+ if (password !== passwordConfirm) {
127
+ throw BAD_REQUEST("\uBE44\uBC00\uBC88\uD638\uAC00 \uC77C\uCE58\uD558\uC9C0 \uC54A\uC2B5\uB2C8\uB2E4.");
128
+ }
129
+ await this.authRepository.updatePassword(credential.id, bcrypt.hashSync(password, 10));
130
+ }
131
+ };
132
+ export {
133
+ PasswordRecoveryService
134
+ };
@@ -30,10 +30,17 @@ function createWithAuthHandler({ authService }) {
30
30
  const res = await fn(auth)(arg);
31
31
  if (typeof res === "object" && res !== null && !Array.isArray(res)) {
32
32
  if (res instanceof Response) {
33
- if (res.status < 300 && res.body) {
34
- console.log(res.body);
35
- return res;
33
+ if (res.status < 300 && res.headers.get("Content-Type")?.includes("application/json")) {
34
+ const data = await res.json();
35
+ return new Response(JSON.stringify({
36
+ AUTH: auth,
37
+ ...data
38
+ }), {
39
+ status: res.status,
40
+ headers: res.headers
41
+ });
36
42
  }
43
+ return res;
37
44
  }
38
45
  return {
39
46
  AUTH: auth,
@@ -6,10 +6,17 @@ function createWithAuthHandler({ authService }) {
6
6
  const res = await fn(auth)(arg);
7
7
  if (typeof res === "object" && res !== null && !Array.isArray(res)) {
8
8
  if (res instanceof Response) {
9
- if (res.status < 300 && res.body) {
10
- console.log(res.body);
11
- return res;
9
+ if (res.status < 300 && res.headers.get("Content-Type")?.includes("application/json")) {
10
+ const data = await res.json();
11
+ return new Response(JSON.stringify({
12
+ AUTH: auth,
13
+ ...data
14
+ }), {
15
+ status: res.status,
16
+ headers: res.headers
17
+ });
12
18
  }
19
+ return res;
13
20
  }
14
21
  return {
15
22
  AUTH: auth,
@@ -2,6 +2,7 @@ import { AuthService } from '../auth/auth_service.mjs';
2
2
  import { FileService } from '../file/file_service.mjs';
3
3
  import { ThirdpartyAuth } from '../auth/thirdparty_auth.mjs';
4
4
  import { LoaderFunctionArgs, ActionFunctionArgs } from 'react-router';
5
+ import { PasswordRecoveryService } from '../auth/password_recovery.mjs';
5
6
  import 'jose';
6
7
  import '../auth/jwt_manager.mjs';
7
8
  import '../file/object_storage.mjs';
@@ -9,9 +10,10 @@ import '@aws-sdk/client-s3';
9
10
  import '../auth/auth_repository.mjs';
10
11
  import '../file/file_repository.mjs';
11
12
 
12
- declare const createAPIHandler: <TFile>({ authService, fileService, getThirdPartyAuth, signupTokenSecret, }: {
13
+ declare const createAPIHandler: <TFile>({ authService, fileService, passwordRecoveryService, getThirdPartyAuth, signupTokenSecret, }: {
13
14
  authService: AuthService<TFile>;
14
15
  fileService: FileService<TFile>;
16
+ passwordRecoveryService: PasswordRecoveryService;
15
17
  getThirdPartyAuth: (provider: string) => ThirdpartyAuth;
16
18
  signupTokenSecret: string;
17
19
  }) => ({ request, params }: LoaderFunctionArgs | ActionFunctionArgs) => Promise<Response>;
@@ -2,6 +2,7 @@ import { AuthService } from '../auth/auth_service.js';
2
2
  import { FileService } from '../file/file_service.js';
3
3
  import { ThirdpartyAuth } from '../auth/thirdparty_auth.js';
4
4
  import { LoaderFunctionArgs, ActionFunctionArgs } from 'react-router';
5
+ import { PasswordRecoveryService } from '../auth/password_recovery.js';
5
6
  import 'jose';
6
7
  import '../auth/jwt_manager.js';
7
8
  import '../file/object_storage.js';
@@ -9,9 +10,10 @@ import '@aws-sdk/client-s3';
9
10
  import '../auth/auth_repository.js';
10
11
  import '../file/file_repository.js';
11
12
 
12
- declare const createAPIHandler: <TFile>({ authService, fileService, getThirdPartyAuth, signupTokenSecret, }: {
13
+ declare const createAPIHandler: <TFile>({ authService, fileService, passwordRecoveryService, getThirdPartyAuth, signupTokenSecret, }: {
13
14
  authService: AuthService<TFile>;
14
15
  fileService: FileService<TFile>;
16
+ passwordRecoveryService: PasswordRecoveryService;
15
17
  getThirdPartyAuth: (provider: string) => ThirdpartyAuth;
16
18
  signupTokenSecret: string;
17
19
  }) => ({ request, params }: LoaderFunctionArgs | ActionFunctionArgs) => Promise<Response>;
package/dist/route/api.js CHANGED
@@ -233,7 +233,7 @@ var loginHandler = async (request, {
233
233
  }) => {
234
234
  const { id, password } = await request.json();
235
235
  try {
236
- const { accessToken, refreshToken } = await authService.signIn({
236
+ const { accessToken, refreshToken } = await authService.login({
237
237
  id,
238
238
  password
239
239
  });
@@ -327,12 +327,9 @@ var signupHandler = async (request, {
327
327
  if (!passwordConfirm) {
328
328
  return BAD_REQUEST("\uBE44\uBC00\uBC88\uD638 \uD655\uC778\uC744 \uC785\uB825\uD574\uC8FC\uC138\uC694.");
329
329
  }
330
- if (!name) {
331
- return BAD_REQUEST("\uC774\uB984\uC744 \uC785\uB825\uD574\uC8FC\uC138\uC694.");
332
- }
333
330
  const existing = await authService.authRepository.findCredentialById(email);
334
331
  if (existing) {
335
- return CONFLICT("\uC774\uBA54\uC77C\uC774 \uC774\uBBF8 \uC874\uC7AC\uD569\uB2C8\uB2E4.");
332
+ return CONFLICT("\uC774\uBBF8 \uAC00\uC785\uD55C \uC774\uBA54\uC77C\uC785\uB2C8\uB2E4.");
336
333
  }
337
334
  if (password !== passwordConfirm) {
338
335
  return BAD_REQUEST("\uBE44\uBC00\uBC88\uD638\uAC00 \uC77C\uCE58\uD558\uC9C0 \uC54A\uC2B5\uB2C8\uB2E4.");
@@ -352,7 +349,22 @@ var signupHandler = async (request, {
352
349
  password: bcrypt.hashSync(password, 10)
353
350
  });
354
351
  const { accessToken, refreshToken } = await authService.issueTokenPair(user);
355
- return CREATED({ accessToken, refreshToken });
352
+ const searchParams = new URL(request.url).searchParams;
353
+ const type = searchParams.get("type");
354
+ if (type === "json") {
355
+ return CREATED({ accessToken, refreshToken });
356
+ }
357
+ const [accessTokenSetCookie, refreshTokenSetCookie] = await Promise.all([
358
+ authService.getAccessTokenSetCookie(accessToken),
359
+ authService.getRefreshTokenSetCookie(refreshToken)
360
+ ]);
361
+ const payload = authService.jwtManager.decode(accessToken);
362
+ const headers = new Headers();
363
+ headers.append("Set-Cookie", accessTokenSetCookie);
364
+ headers.append("Set-Cookie", refreshTokenSetCookie);
365
+ return CREATED(payload, {
366
+ headers
367
+ });
356
368
  };
357
369
 
358
370
  // src/auth/handlers/signup_with_thirdparty.ts
@@ -405,10 +417,34 @@ var signUpWithThirdpartyHandler = async (request, {
405
417
  return CREATED({ accessToken, refreshToken });
406
418
  };
407
419
 
420
+ // src/auth/handlers/request_password_reset.ts
421
+ var requestPasswordResetHandler = async (request, {
422
+ passwordRecoveryService
423
+ }) => {
424
+ const { email } = await request.json();
425
+ try {
426
+ await passwordRecoveryService.requestPasswordReset(email);
427
+ return CREATED({ message: "\uBE44\uBC00\uBC88\uD638 \uC7AC\uC124\uC815 \uC774\uBA54\uC77C\uC744 \uC804\uC1A1\uD588\uC2B5\uB2C8\uB2E4." });
428
+ } catch (error) {
429
+ console.error(error);
430
+ return INTERNAL_SERVER_ERROR("\uC774\uBA54\uC77C \uC804\uC1A1\uC5D0 \uC2E4\uD328\uD588\uC2B5\uB2C8\uB2E4.");
431
+ }
432
+ };
433
+
434
+ // src/auth/handlers/reset_password.ts
435
+ var resetPasswordHandler = async (request, {
436
+ passwordRecoveryService
437
+ }) => {
438
+ const { token, password, passwordConfirm } = await request.json();
439
+ await passwordRecoveryService.resetPassword(token, password, passwordConfirm);
440
+ return NO_CONTENT();
441
+ };
442
+
408
443
  // src/route/api.ts
409
444
  var createAPIHandler = ({
410
445
  authService,
411
446
  fileService,
447
+ passwordRecoveryService,
412
448
  getThirdPartyAuth,
413
449
  signupTokenSecret
414
450
  }) => {
@@ -504,6 +540,12 @@ var createAPIHandler = ({
504
540
  }
505
541
  }
506
542
  }
543
+ case "request-password-reset": {
544
+ return requestPasswordResetHandler(request, { passwordRecoveryService });
545
+ }
546
+ case "reset-password": {
547
+ return resetPasswordHandler(request, { passwordRecoveryService });
548
+ }
507
549
  }
508
550
  }
509
551
  case "files": {
@@ -197,7 +197,7 @@ var loginHandler = async (request, {
197
197
  }) => {
198
198
  const { id, password } = await request.json();
199
199
  try {
200
- const { accessToken, refreshToken } = await authService.signIn({
200
+ const { accessToken, refreshToken } = await authService.login({
201
201
  id,
202
202
  password
203
203
  });
@@ -291,12 +291,9 @@ var signupHandler = async (request, {
291
291
  if (!passwordConfirm) {
292
292
  return BAD_REQUEST("\uBE44\uBC00\uBC88\uD638 \uD655\uC778\uC744 \uC785\uB825\uD574\uC8FC\uC138\uC694.");
293
293
  }
294
- if (!name) {
295
- return BAD_REQUEST("\uC774\uB984\uC744 \uC785\uB825\uD574\uC8FC\uC138\uC694.");
296
- }
297
294
  const existing = await authService.authRepository.findCredentialById(email);
298
295
  if (existing) {
299
- return CONFLICT("\uC774\uBA54\uC77C\uC774 \uC774\uBBF8 \uC874\uC7AC\uD569\uB2C8\uB2E4.");
296
+ return CONFLICT("\uC774\uBBF8 \uAC00\uC785\uD55C \uC774\uBA54\uC77C\uC785\uB2C8\uB2E4.");
300
297
  }
301
298
  if (password !== passwordConfirm) {
302
299
  return BAD_REQUEST("\uBE44\uBC00\uBC88\uD638\uAC00 \uC77C\uCE58\uD558\uC9C0 \uC54A\uC2B5\uB2C8\uB2E4.");
@@ -316,7 +313,22 @@ var signupHandler = async (request, {
316
313
  password: bcrypt.hashSync(password, 10)
317
314
  });
318
315
  const { accessToken, refreshToken } = await authService.issueTokenPair(user);
319
- return CREATED({ accessToken, refreshToken });
316
+ const searchParams = new URL(request.url).searchParams;
317
+ const type = searchParams.get("type");
318
+ if (type === "json") {
319
+ return CREATED({ accessToken, refreshToken });
320
+ }
321
+ const [accessTokenSetCookie, refreshTokenSetCookie] = await Promise.all([
322
+ authService.getAccessTokenSetCookie(accessToken),
323
+ authService.getRefreshTokenSetCookie(refreshToken)
324
+ ]);
325
+ const payload = authService.jwtManager.decode(accessToken);
326
+ const headers = new Headers();
327
+ headers.append("Set-Cookie", accessTokenSetCookie);
328
+ headers.append("Set-Cookie", refreshTokenSetCookie);
329
+ return CREATED(payload, {
330
+ headers
331
+ });
320
332
  };
321
333
 
322
334
  // src/auth/handlers/signup_with_thirdparty.ts
@@ -369,10 +381,34 @@ var signUpWithThirdpartyHandler = async (request, {
369
381
  return CREATED({ accessToken, refreshToken });
370
382
  };
371
383
 
384
+ // src/auth/handlers/request_password_reset.ts
385
+ var requestPasswordResetHandler = async (request, {
386
+ passwordRecoveryService
387
+ }) => {
388
+ const { email } = await request.json();
389
+ try {
390
+ await passwordRecoveryService.requestPasswordReset(email);
391
+ return CREATED({ message: "\uBE44\uBC00\uBC88\uD638 \uC7AC\uC124\uC815 \uC774\uBA54\uC77C\uC744 \uC804\uC1A1\uD588\uC2B5\uB2C8\uB2E4." });
392
+ } catch (error) {
393
+ console.error(error);
394
+ return INTERNAL_SERVER_ERROR("\uC774\uBA54\uC77C \uC804\uC1A1\uC5D0 \uC2E4\uD328\uD588\uC2B5\uB2C8\uB2E4.");
395
+ }
396
+ };
397
+
398
+ // src/auth/handlers/reset_password.ts
399
+ var resetPasswordHandler = async (request, {
400
+ passwordRecoveryService
401
+ }) => {
402
+ const { token, password, passwordConfirm } = await request.json();
403
+ await passwordRecoveryService.resetPassword(token, password, passwordConfirm);
404
+ return NO_CONTENT();
405
+ };
406
+
372
407
  // src/route/api.ts
373
408
  var createAPIHandler = ({
374
409
  authService,
375
410
  fileService,
411
+ passwordRecoveryService,
376
412
  getThirdPartyAuth,
377
413
  signupTokenSecret
378
414
  }) => {
@@ -468,6 +504,12 @@ var createAPIHandler = ({
468
504
  }
469
505
  }
470
506
  }
507
+ case "request-password-reset": {
508
+ return requestPasswordResetHandler(request, { passwordRecoveryService });
509
+ }
510
+ case "reset-password": {
511
+ return resetPasswordHandler(request, { passwordRecoveryService });
512
+ }
471
513
  }
472
514
  }
473
515
  case "files": {
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "dn-react-router-toolkit",
3
- "version": "0.2.0",
3
+ "version": "0.2.2",
4
4
  "types": "./dist/index.d.ts",
5
5
  "main": "./dist/index.mjs",
6
6
  "module": "./dist/index.js",
@@ -58,6 +58,7 @@
58
58
  "description": "",
59
59
  "devDependencies": {
60
60
  "@types/node": "^24.10.1",
61
+ "@types/nodemailer": "^7.0.4",
61
62
  "@types/react": "^19",
62
63
  "@types/react-dom": "^19",
63
64
  "rimraf": "^6.0.1",
@@ -71,6 +72,7 @@
71
72
  "bcryptjs": "^3.0.3",
72
73
  "jose": "^6.1.2",
73
74
  "moment-timezone": "^0.6.0",
75
+ "nodemailer": "^7.0.11",
74
76
  "react-icons": "^5.5.0",
75
77
  "uuid": "^13.0.0"
76
78
  },