dn-react-router-toolkit 0.2.0 → 0.2.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/auth/auth_repository.d.mts +7 -5
- package/dist/auth/auth_repository.d.ts +7 -5
- package/dist/auth/auth_service.d.mts +1 -1
- package/dist/auth/auth_service.d.ts +1 -1
- package/dist/auth/auth_service.js +1 -1
- package/dist/auth/auth_service.mjs +1 -1
- package/dist/auth/client/provider.d.mts +3 -0
- package/dist/auth/client/provider.d.ts +3 -0
- package/dist/auth/client/provider.js +17 -2
- package/dist/auth/client/provider.mjs +17 -2
- package/dist/auth/handlers/login.js +1 -1
- package/dist/auth/handlers/login.mjs +1 -1
- package/dist/auth/handlers/request_password_reset.d.mts +10 -0
- package/dist/auth/handlers/request_password_reset.d.ts +10 -0
- package/dist/auth/handlers/request_password_reset.js +87 -0
- package/dist/auth/handlers/request_password_reset.mjs +60 -0
- package/dist/auth/handlers/reset_password.d.mts +10 -0
- package/dist/auth/handlers/reset_password.d.ts +10 -0
- package/dist/auth/handlers/reset_password.js +88 -0
- package/dist/auth/handlers/reset_password.mjs +61 -0
- package/dist/auth/handlers/signup.js +17 -5
- package/dist/auth/handlers/signup.mjs +17 -5
- package/dist/auth/password_recovery.d.mts +34 -0
- package/dist/auth/password_recovery.d.ts +34 -0
- package/dist/auth/password_recovery.js +169 -0
- package/dist/auth/password_recovery.mjs +134 -0
- package/dist/auth/with_auth.js +10 -3
- package/dist/auth/with_auth.mjs +10 -3
- package/dist/route/api.d.mts +3 -1
- package/dist/route/api.d.ts +3 -1
- package/dist/route/api.js +48 -6
- package/dist/route/api.mjs +48 -6
- package/package.json +3 -1
|
@@ -0,0 +1,34 @@
|
|
|
1
|
+
import { AuthRepository } from './auth_repository.mjs';
|
|
2
|
+
import { JWTManager } from './jwt_manager.mjs';
|
|
3
|
+
import 'jose';
|
|
4
|
+
|
|
5
|
+
declare class PasswordRecoveryService {
|
|
6
|
+
siteOrigin: string;
|
|
7
|
+
siteName: string;
|
|
8
|
+
jwtManager: JWTManager;
|
|
9
|
+
authRepository: AuthRepository;
|
|
10
|
+
emailCredentials: {
|
|
11
|
+
service: string;
|
|
12
|
+
user: string;
|
|
13
|
+
pass: string;
|
|
14
|
+
};
|
|
15
|
+
resetPasswordTokenSecret: string;
|
|
16
|
+
resetPasswordTokenExpiresIn: string;
|
|
17
|
+
constructor({ siteOrigin, siteName, jwtManager, authRepository, emailCredentials, resetPasswordTokenSecret, resetPasswordTokenExpiresIn, }: {
|
|
18
|
+
siteOrigin: string;
|
|
19
|
+
siteName: string;
|
|
20
|
+
jwtManager: JWTManager;
|
|
21
|
+
authRepository: AuthRepository;
|
|
22
|
+
emailCredentials: {
|
|
23
|
+
service: string;
|
|
24
|
+
user: string;
|
|
25
|
+
pass: string;
|
|
26
|
+
};
|
|
27
|
+
resetPasswordTokenSecret: string;
|
|
28
|
+
resetPasswordTokenExpiresIn?: string;
|
|
29
|
+
});
|
|
30
|
+
requestPasswordReset(email: string): Promise<void>;
|
|
31
|
+
resetPassword(token: string, password: string, passwordConfirm: string): Promise<void>;
|
|
32
|
+
}
|
|
33
|
+
|
|
34
|
+
export { PasswordRecoveryService };
|
|
@@ -0,0 +1,34 @@
|
|
|
1
|
+
import { AuthRepository } from './auth_repository.js';
|
|
2
|
+
import { JWTManager } from './jwt_manager.js';
|
|
3
|
+
import 'jose';
|
|
4
|
+
|
|
5
|
+
declare class PasswordRecoveryService {
|
|
6
|
+
siteOrigin: string;
|
|
7
|
+
siteName: string;
|
|
8
|
+
jwtManager: JWTManager;
|
|
9
|
+
authRepository: AuthRepository;
|
|
10
|
+
emailCredentials: {
|
|
11
|
+
service: string;
|
|
12
|
+
user: string;
|
|
13
|
+
pass: string;
|
|
14
|
+
};
|
|
15
|
+
resetPasswordTokenSecret: string;
|
|
16
|
+
resetPasswordTokenExpiresIn: string;
|
|
17
|
+
constructor({ siteOrigin, siteName, jwtManager, authRepository, emailCredentials, resetPasswordTokenSecret, resetPasswordTokenExpiresIn, }: {
|
|
18
|
+
siteOrigin: string;
|
|
19
|
+
siteName: string;
|
|
20
|
+
jwtManager: JWTManager;
|
|
21
|
+
authRepository: AuthRepository;
|
|
22
|
+
emailCredentials: {
|
|
23
|
+
service: string;
|
|
24
|
+
user: string;
|
|
25
|
+
pass: string;
|
|
26
|
+
};
|
|
27
|
+
resetPasswordTokenSecret: string;
|
|
28
|
+
resetPasswordTokenExpiresIn?: string;
|
|
29
|
+
});
|
|
30
|
+
requestPasswordReset(email: string): Promise<void>;
|
|
31
|
+
resetPassword(token: string, password: string, passwordConfirm: string): Promise<void>;
|
|
32
|
+
}
|
|
33
|
+
|
|
34
|
+
export { PasswordRecoveryService };
|
|
@@ -0,0 +1,169 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __create = Object.create;
|
|
3
|
+
var __defProp = Object.defineProperty;
|
|
4
|
+
var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
|
|
5
|
+
var __getOwnPropNames = Object.getOwnPropertyNames;
|
|
6
|
+
var __getProtoOf = Object.getPrototypeOf;
|
|
7
|
+
var __hasOwnProp = Object.prototype.hasOwnProperty;
|
|
8
|
+
var __export = (target, all) => {
|
|
9
|
+
for (var name in all)
|
|
10
|
+
__defProp(target, name, { get: all[name], enumerable: true });
|
|
11
|
+
};
|
|
12
|
+
var __copyProps = (to, from, except, desc) => {
|
|
13
|
+
if (from && typeof from === "object" || typeof from === "function") {
|
|
14
|
+
for (let key of __getOwnPropNames(from))
|
|
15
|
+
if (!__hasOwnProp.call(to, key) && key !== except)
|
|
16
|
+
__defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });
|
|
17
|
+
}
|
|
18
|
+
return to;
|
|
19
|
+
};
|
|
20
|
+
var __toESM = (mod, isNodeMode, target) => (target = mod != null ? __create(__getProtoOf(mod)) : {}, __copyProps(
|
|
21
|
+
// If the importer is in node compatibility mode or this is not an ESM
|
|
22
|
+
// file that has been converted to a CommonJS file using a Babel-
|
|
23
|
+
// compatible transform (i.e. "__esModule" has not been set), then set
|
|
24
|
+
// "default" to the CommonJS "module.exports" for node compatibility.
|
|
25
|
+
isNodeMode || !mod || !mod.__esModule ? __defProp(target, "default", { value: mod, enumerable: true }) : target,
|
|
26
|
+
mod
|
|
27
|
+
));
|
|
28
|
+
var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
|
|
29
|
+
|
|
30
|
+
// src/auth/password_recovery.ts
|
|
31
|
+
var password_recovery_exports = {};
|
|
32
|
+
__export(password_recovery_exports, {
|
|
33
|
+
PasswordRecoveryService: () => PasswordRecoveryService
|
|
34
|
+
});
|
|
35
|
+
module.exports = __toCommonJS(password_recovery_exports);
|
|
36
|
+
var import_nodemailer = __toESM(require("nodemailer"));
|
|
37
|
+
|
|
38
|
+
// src/http/response.ts
|
|
39
|
+
var createJsonResponse = (status) => {
|
|
40
|
+
return (data = {}, init) => {
|
|
41
|
+
return Response.json(data, { status, ...init });
|
|
42
|
+
};
|
|
43
|
+
};
|
|
44
|
+
var OK = createJsonResponse(200);
|
|
45
|
+
var CREATED = createJsonResponse(201);
|
|
46
|
+
var ACCEPTED = createJsonResponse(202);
|
|
47
|
+
var createException = (status, defaultMessage = "\uC624\uB958\uAC00 \uBC1C\uC0DD\uD588\uC2B5\uB2C8\uB2E4.") => {
|
|
48
|
+
return (message = defaultMessage, init) => {
|
|
49
|
+
return createJsonResponse(status)({ message }, init);
|
|
50
|
+
};
|
|
51
|
+
};
|
|
52
|
+
var BAD_REQUEST = createException(400, "\uC694\uCCAD\uC774 \uC62C\uBC14\uB974\uC9C0 \uC54A\uC2B5\uB2C8\uB2E4.");
|
|
53
|
+
var UNAUTHORIZED = createException(401, "\uC778\uC99D\uC774 \uD544\uC694\uD569\uB2C8\uB2E4.");
|
|
54
|
+
var FORBIDDEN = createException(403, "\uAD8C\uD55C\uC774 \uC5C6\uC2B5\uB2C8\uB2E4.");
|
|
55
|
+
var NOT_FOUND = createException(
|
|
56
|
+
404,
|
|
57
|
+
"\uC694\uCCAD\uD55C \uB9AC\uC18C\uC2A4\uB97C \uCC3E\uC744 \uC218 \uC5C6\uC2B5\uB2C8\uB2E4."
|
|
58
|
+
);
|
|
59
|
+
var METHOD_NOT_ALLOWED = createException(
|
|
60
|
+
405,
|
|
61
|
+
"\uBA54\uC11C\uB4DC\uB97C \uC0AC\uC6A9\uD560 \uC218 \uC5C6\uC2B5\uB2C8\uB2E4."
|
|
62
|
+
);
|
|
63
|
+
var NOT_ACCEPTABLE = createException(
|
|
64
|
+
406,
|
|
65
|
+
"\uC694\uCCAD\uD55C \uD615\uC2DD\uC744 \uC0AC\uC6A9\uD560 \uC218 \uC5C6\uC2B5\uB2C8\uB2E4."
|
|
66
|
+
);
|
|
67
|
+
var REQUEST_TIMEOUT = createException(
|
|
68
|
+
408,
|
|
69
|
+
"\uC694\uCCAD \uC2DC\uAC04\uC774 \uCD08\uACFC\uB418\uC5C8\uC2B5\uB2C8\uB2E4."
|
|
70
|
+
);
|
|
71
|
+
var CONFLICT = createException(409, "\uC694\uCCAD\uC774 \uCDA9\uB3CC\uD588\uC2B5\uB2C8\uB2E4.");
|
|
72
|
+
var UNPROCESSABLE_ENTITY = createException(
|
|
73
|
+
422,
|
|
74
|
+
"\uCC98\uB9AC\uD560 \uC218 \uC5C6\uB294 \uC5D4\uD2F0\uD2F0\uC785\uB2C8\uB2E4."
|
|
75
|
+
);
|
|
76
|
+
var TOO_MANY_REQUESTS = createException(429, "\uC694\uCCAD\uC774 \uB108\uBB34 \uB9CE\uC2B5\uB2C8\uB2E4.");
|
|
77
|
+
var INTERNAL_SERVER_ERROR = createException(
|
|
78
|
+
500,
|
|
79
|
+
"\uC608\uAE30\uCE58 \uBABB\uD55C \uC624\uB958\uAC00 \uBC1C\uC0DD\uD588\uC2B5\uB2C8\uB2E4."
|
|
80
|
+
);
|
|
81
|
+
|
|
82
|
+
// src/auth/password_recovery.ts
|
|
83
|
+
var import_bcryptjs = __toESM(require("bcryptjs"));
|
|
84
|
+
var PasswordRecoveryService = class {
|
|
85
|
+
siteOrigin;
|
|
86
|
+
siteName;
|
|
87
|
+
jwtManager;
|
|
88
|
+
authRepository;
|
|
89
|
+
emailCredentials;
|
|
90
|
+
resetPasswordTokenSecret;
|
|
91
|
+
resetPasswordTokenExpiresIn;
|
|
92
|
+
constructor({
|
|
93
|
+
siteOrigin,
|
|
94
|
+
siteName,
|
|
95
|
+
jwtManager,
|
|
96
|
+
authRepository,
|
|
97
|
+
emailCredentials,
|
|
98
|
+
resetPasswordTokenSecret,
|
|
99
|
+
resetPasswordTokenExpiresIn = "1h"
|
|
100
|
+
}) {
|
|
101
|
+
this.siteOrigin = siteOrigin;
|
|
102
|
+
this.siteName = siteName;
|
|
103
|
+
this.jwtManager = jwtManager;
|
|
104
|
+
this.authRepository = authRepository;
|
|
105
|
+
this.emailCredentials = emailCredentials;
|
|
106
|
+
this.resetPasswordTokenSecret = resetPasswordTokenSecret;
|
|
107
|
+
this.resetPasswordTokenExpiresIn = resetPasswordTokenExpiresIn;
|
|
108
|
+
}
|
|
109
|
+
async requestPasswordReset(email) {
|
|
110
|
+
const credential = await this.authRepository.findCredentialById(email);
|
|
111
|
+
if (!credential) {
|
|
112
|
+
throw NOT_FOUND("\uAC00\uC785\uB418\uC9C0 \uC54A\uC740 \uC774\uBA54\uC77C\uC785\uB2C8\uB2E4.");
|
|
113
|
+
}
|
|
114
|
+
const transporter = import_nodemailer.default.createTransport({
|
|
115
|
+
service: this.emailCredentials.service,
|
|
116
|
+
auth: {
|
|
117
|
+
user: this.emailCredentials.user,
|
|
118
|
+
pass: this.emailCredentials.pass
|
|
119
|
+
}
|
|
120
|
+
});
|
|
121
|
+
const token = await this.jwtManager.sign(
|
|
122
|
+
{
|
|
123
|
+
id: credential.id
|
|
124
|
+
},
|
|
125
|
+
this.resetPasswordTokenSecret,
|
|
126
|
+
{
|
|
127
|
+
expiresIn: this.resetPasswordTokenExpiresIn
|
|
128
|
+
}
|
|
129
|
+
);
|
|
130
|
+
const link = `${this.siteOrigin}/reset-password?token=${token}`;
|
|
131
|
+
const mailOptions = {
|
|
132
|
+
from: process.env.EMAIL_USER,
|
|
133
|
+
to: email,
|
|
134
|
+
subject: `${this.siteName} \uBE44\uBC00\uBC88\uD638 \uC7AC\uC124\uC815`,
|
|
135
|
+
html: `<main>
|
|
136
|
+
<p>\uBE44\uBC00\uBC88\uD638 \uC7AC\uC124\uC815\uC744 \uC704\uD574 \uC544\uB798 \uB9C1\uD06C\uB97C \uD074\uB9AD\uD574 \uC8FC\uC138\uC694. \uB9C1\uD06C\uB294 \uD55C \uC2DC\uAC04 \uB3D9\uC548 \uC720\uD6A8\uD569\uB2C8\uB2E4. \uB2E4\uB978 \uC0AC\uB78C\uC5D0\uAC8C \uACF5\uC720\uD558\uC9C0 \uB9C8\uC138\uC694.</p>
|
|
137
|
+
<a href="${link}" target="_blank">${link}</a>
|
|
138
|
+
</main>`
|
|
139
|
+
};
|
|
140
|
+
await transporter.sendMail(mailOptions);
|
|
141
|
+
}
|
|
142
|
+
async resetPassword(token, password, passwordConfirm) {
|
|
143
|
+
const payload = await this.jwtManager.verify(
|
|
144
|
+
token,
|
|
145
|
+
this.resetPasswordTokenSecret
|
|
146
|
+
);
|
|
147
|
+
if (!payload) {
|
|
148
|
+
throw UNAUTHORIZED("\uC720\uD6A8\uD558\uC9C0 \uC54A\uC740 \uD1A0\uD070\uC785\uB2C8\uB2E4.");
|
|
149
|
+
}
|
|
150
|
+
if (typeof payload.id !== "string") {
|
|
151
|
+
throw UNAUTHORIZED("\uD1A0\uD070\uC774 \uC704\uC870\uB418\uC5C8\uC2B5\uB2C8\uB2E4.");
|
|
152
|
+
}
|
|
153
|
+
const credential = await this.authRepository.findCredentialById(payload.id);
|
|
154
|
+
if (!credential) {
|
|
155
|
+
throw NOT_FOUND("\uC874\uC7AC\uD558\uC9C0 \uC54A\uB294 \uACC4\uC815\uC785\uB2C8\uB2E4.");
|
|
156
|
+
}
|
|
157
|
+
if (typeof password !== "string" || !password.trim()) {
|
|
158
|
+
throw BAD_REQUEST("\uC720\uD6A8\uD558\uC9C0 \uC54A\uC740 \uBE44\uBC00\uBC88\uD638\uC785\uB2C8\uB2E4.");
|
|
159
|
+
}
|
|
160
|
+
if (password !== passwordConfirm) {
|
|
161
|
+
throw BAD_REQUEST("\uBE44\uBC00\uBC88\uD638\uAC00 \uC77C\uCE58\uD558\uC9C0 \uC54A\uC2B5\uB2C8\uB2E4.");
|
|
162
|
+
}
|
|
163
|
+
await this.authRepository.updatePassword(credential.id, import_bcryptjs.default.hashSync(password, 10));
|
|
164
|
+
}
|
|
165
|
+
};
|
|
166
|
+
// Annotate the CommonJS export names for ESM import in node:
|
|
167
|
+
0 && (module.exports = {
|
|
168
|
+
PasswordRecoveryService
|
|
169
|
+
});
|
|
@@ -0,0 +1,134 @@
|
|
|
1
|
+
// src/auth/password_recovery.ts
|
|
2
|
+
import nodemailer from "nodemailer";
|
|
3
|
+
|
|
4
|
+
// src/http/response.ts
|
|
5
|
+
var createJsonResponse = (status) => {
|
|
6
|
+
return (data = {}, init) => {
|
|
7
|
+
return Response.json(data, { status, ...init });
|
|
8
|
+
};
|
|
9
|
+
};
|
|
10
|
+
var OK = createJsonResponse(200);
|
|
11
|
+
var CREATED = createJsonResponse(201);
|
|
12
|
+
var ACCEPTED = createJsonResponse(202);
|
|
13
|
+
var createException = (status, defaultMessage = "\uC624\uB958\uAC00 \uBC1C\uC0DD\uD588\uC2B5\uB2C8\uB2E4.") => {
|
|
14
|
+
return (message = defaultMessage, init) => {
|
|
15
|
+
return createJsonResponse(status)({ message }, init);
|
|
16
|
+
};
|
|
17
|
+
};
|
|
18
|
+
var BAD_REQUEST = createException(400, "\uC694\uCCAD\uC774 \uC62C\uBC14\uB974\uC9C0 \uC54A\uC2B5\uB2C8\uB2E4.");
|
|
19
|
+
var UNAUTHORIZED = createException(401, "\uC778\uC99D\uC774 \uD544\uC694\uD569\uB2C8\uB2E4.");
|
|
20
|
+
var FORBIDDEN = createException(403, "\uAD8C\uD55C\uC774 \uC5C6\uC2B5\uB2C8\uB2E4.");
|
|
21
|
+
var NOT_FOUND = createException(
|
|
22
|
+
404,
|
|
23
|
+
"\uC694\uCCAD\uD55C \uB9AC\uC18C\uC2A4\uB97C \uCC3E\uC744 \uC218 \uC5C6\uC2B5\uB2C8\uB2E4."
|
|
24
|
+
);
|
|
25
|
+
var METHOD_NOT_ALLOWED = createException(
|
|
26
|
+
405,
|
|
27
|
+
"\uBA54\uC11C\uB4DC\uB97C \uC0AC\uC6A9\uD560 \uC218 \uC5C6\uC2B5\uB2C8\uB2E4."
|
|
28
|
+
);
|
|
29
|
+
var NOT_ACCEPTABLE = createException(
|
|
30
|
+
406,
|
|
31
|
+
"\uC694\uCCAD\uD55C \uD615\uC2DD\uC744 \uC0AC\uC6A9\uD560 \uC218 \uC5C6\uC2B5\uB2C8\uB2E4."
|
|
32
|
+
);
|
|
33
|
+
var REQUEST_TIMEOUT = createException(
|
|
34
|
+
408,
|
|
35
|
+
"\uC694\uCCAD \uC2DC\uAC04\uC774 \uCD08\uACFC\uB418\uC5C8\uC2B5\uB2C8\uB2E4."
|
|
36
|
+
);
|
|
37
|
+
var CONFLICT = createException(409, "\uC694\uCCAD\uC774 \uCDA9\uB3CC\uD588\uC2B5\uB2C8\uB2E4.");
|
|
38
|
+
var UNPROCESSABLE_ENTITY = createException(
|
|
39
|
+
422,
|
|
40
|
+
"\uCC98\uB9AC\uD560 \uC218 \uC5C6\uB294 \uC5D4\uD2F0\uD2F0\uC785\uB2C8\uB2E4."
|
|
41
|
+
);
|
|
42
|
+
var TOO_MANY_REQUESTS = createException(429, "\uC694\uCCAD\uC774 \uB108\uBB34 \uB9CE\uC2B5\uB2C8\uB2E4.");
|
|
43
|
+
var INTERNAL_SERVER_ERROR = createException(
|
|
44
|
+
500,
|
|
45
|
+
"\uC608\uAE30\uCE58 \uBABB\uD55C \uC624\uB958\uAC00 \uBC1C\uC0DD\uD588\uC2B5\uB2C8\uB2E4."
|
|
46
|
+
);
|
|
47
|
+
|
|
48
|
+
// src/auth/password_recovery.ts
|
|
49
|
+
import bcrypt from "bcryptjs";
|
|
50
|
+
var PasswordRecoveryService = class {
|
|
51
|
+
siteOrigin;
|
|
52
|
+
siteName;
|
|
53
|
+
jwtManager;
|
|
54
|
+
authRepository;
|
|
55
|
+
emailCredentials;
|
|
56
|
+
resetPasswordTokenSecret;
|
|
57
|
+
resetPasswordTokenExpiresIn;
|
|
58
|
+
constructor({
|
|
59
|
+
siteOrigin,
|
|
60
|
+
siteName,
|
|
61
|
+
jwtManager,
|
|
62
|
+
authRepository,
|
|
63
|
+
emailCredentials,
|
|
64
|
+
resetPasswordTokenSecret,
|
|
65
|
+
resetPasswordTokenExpiresIn = "1h"
|
|
66
|
+
}) {
|
|
67
|
+
this.siteOrigin = siteOrigin;
|
|
68
|
+
this.siteName = siteName;
|
|
69
|
+
this.jwtManager = jwtManager;
|
|
70
|
+
this.authRepository = authRepository;
|
|
71
|
+
this.emailCredentials = emailCredentials;
|
|
72
|
+
this.resetPasswordTokenSecret = resetPasswordTokenSecret;
|
|
73
|
+
this.resetPasswordTokenExpiresIn = resetPasswordTokenExpiresIn;
|
|
74
|
+
}
|
|
75
|
+
async requestPasswordReset(email) {
|
|
76
|
+
const credential = await this.authRepository.findCredentialById(email);
|
|
77
|
+
if (!credential) {
|
|
78
|
+
throw NOT_FOUND("\uAC00\uC785\uB418\uC9C0 \uC54A\uC740 \uC774\uBA54\uC77C\uC785\uB2C8\uB2E4.");
|
|
79
|
+
}
|
|
80
|
+
const transporter = nodemailer.createTransport({
|
|
81
|
+
service: this.emailCredentials.service,
|
|
82
|
+
auth: {
|
|
83
|
+
user: this.emailCredentials.user,
|
|
84
|
+
pass: this.emailCredentials.pass
|
|
85
|
+
}
|
|
86
|
+
});
|
|
87
|
+
const token = await this.jwtManager.sign(
|
|
88
|
+
{
|
|
89
|
+
id: credential.id
|
|
90
|
+
},
|
|
91
|
+
this.resetPasswordTokenSecret,
|
|
92
|
+
{
|
|
93
|
+
expiresIn: this.resetPasswordTokenExpiresIn
|
|
94
|
+
}
|
|
95
|
+
);
|
|
96
|
+
const link = `${this.siteOrigin}/reset-password?token=${token}`;
|
|
97
|
+
const mailOptions = {
|
|
98
|
+
from: process.env.EMAIL_USER,
|
|
99
|
+
to: email,
|
|
100
|
+
subject: `${this.siteName} \uBE44\uBC00\uBC88\uD638 \uC7AC\uC124\uC815`,
|
|
101
|
+
html: `<main>
|
|
102
|
+
<p>\uBE44\uBC00\uBC88\uD638 \uC7AC\uC124\uC815\uC744 \uC704\uD574 \uC544\uB798 \uB9C1\uD06C\uB97C \uD074\uB9AD\uD574 \uC8FC\uC138\uC694. \uB9C1\uD06C\uB294 \uD55C \uC2DC\uAC04 \uB3D9\uC548 \uC720\uD6A8\uD569\uB2C8\uB2E4. \uB2E4\uB978 \uC0AC\uB78C\uC5D0\uAC8C \uACF5\uC720\uD558\uC9C0 \uB9C8\uC138\uC694.</p>
|
|
103
|
+
<a href="${link}" target="_blank">${link}</a>
|
|
104
|
+
</main>`
|
|
105
|
+
};
|
|
106
|
+
await transporter.sendMail(mailOptions);
|
|
107
|
+
}
|
|
108
|
+
async resetPassword(token, password, passwordConfirm) {
|
|
109
|
+
const payload = await this.jwtManager.verify(
|
|
110
|
+
token,
|
|
111
|
+
this.resetPasswordTokenSecret
|
|
112
|
+
);
|
|
113
|
+
if (!payload) {
|
|
114
|
+
throw UNAUTHORIZED("\uC720\uD6A8\uD558\uC9C0 \uC54A\uC740 \uD1A0\uD070\uC785\uB2C8\uB2E4.");
|
|
115
|
+
}
|
|
116
|
+
if (typeof payload.id !== "string") {
|
|
117
|
+
throw UNAUTHORIZED("\uD1A0\uD070\uC774 \uC704\uC870\uB418\uC5C8\uC2B5\uB2C8\uB2E4.");
|
|
118
|
+
}
|
|
119
|
+
const credential = await this.authRepository.findCredentialById(payload.id);
|
|
120
|
+
if (!credential) {
|
|
121
|
+
throw NOT_FOUND("\uC874\uC7AC\uD558\uC9C0 \uC54A\uB294 \uACC4\uC815\uC785\uB2C8\uB2E4.");
|
|
122
|
+
}
|
|
123
|
+
if (typeof password !== "string" || !password.trim()) {
|
|
124
|
+
throw BAD_REQUEST("\uC720\uD6A8\uD558\uC9C0 \uC54A\uC740 \uBE44\uBC00\uBC88\uD638\uC785\uB2C8\uB2E4.");
|
|
125
|
+
}
|
|
126
|
+
if (password !== passwordConfirm) {
|
|
127
|
+
throw BAD_REQUEST("\uBE44\uBC00\uBC88\uD638\uAC00 \uC77C\uCE58\uD558\uC9C0 \uC54A\uC2B5\uB2C8\uB2E4.");
|
|
128
|
+
}
|
|
129
|
+
await this.authRepository.updatePassword(credential.id, bcrypt.hashSync(password, 10));
|
|
130
|
+
}
|
|
131
|
+
};
|
|
132
|
+
export {
|
|
133
|
+
PasswordRecoveryService
|
|
134
|
+
};
|
package/dist/auth/with_auth.js
CHANGED
|
@@ -30,10 +30,17 @@ function createWithAuthHandler({ authService }) {
|
|
|
30
30
|
const res = await fn(auth)(arg);
|
|
31
31
|
if (typeof res === "object" && res !== null && !Array.isArray(res)) {
|
|
32
32
|
if (res instanceof Response) {
|
|
33
|
-
if (res.status < 300 && res.
|
|
34
|
-
|
|
35
|
-
return
|
|
33
|
+
if (res.status < 300 && res.headers.get("Content-Type")?.includes("application/json")) {
|
|
34
|
+
const data = await res.json();
|
|
35
|
+
return new Response(JSON.stringify({
|
|
36
|
+
AUTH: auth,
|
|
37
|
+
...data
|
|
38
|
+
}), {
|
|
39
|
+
status: res.status,
|
|
40
|
+
headers: res.headers
|
|
41
|
+
});
|
|
36
42
|
}
|
|
43
|
+
return res;
|
|
37
44
|
}
|
|
38
45
|
return {
|
|
39
46
|
AUTH: auth,
|
package/dist/auth/with_auth.mjs
CHANGED
|
@@ -6,10 +6,17 @@ function createWithAuthHandler({ authService }) {
|
|
|
6
6
|
const res = await fn(auth)(arg);
|
|
7
7
|
if (typeof res === "object" && res !== null && !Array.isArray(res)) {
|
|
8
8
|
if (res instanceof Response) {
|
|
9
|
-
if (res.status < 300 && res.
|
|
10
|
-
|
|
11
|
-
return
|
|
9
|
+
if (res.status < 300 && res.headers.get("Content-Type")?.includes("application/json")) {
|
|
10
|
+
const data = await res.json();
|
|
11
|
+
return new Response(JSON.stringify({
|
|
12
|
+
AUTH: auth,
|
|
13
|
+
...data
|
|
14
|
+
}), {
|
|
15
|
+
status: res.status,
|
|
16
|
+
headers: res.headers
|
|
17
|
+
});
|
|
12
18
|
}
|
|
19
|
+
return res;
|
|
13
20
|
}
|
|
14
21
|
return {
|
|
15
22
|
AUTH: auth,
|
package/dist/route/api.d.mts
CHANGED
|
@@ -2,6 +2,7 @@ import { AuthService } from '../auth/auth_service.mjs';
|
|
|
2
2
|
import { FileService } from '../file/file_service.mjs';
|
|
3
3
|
import { ThirdpartyAuth } from '../auth/thirdparty_auth.mjs';
|
|
4
4
|
import { LoaderFunctionArgs, ActionFunctionArgs } from 'react-router';
|
|
5
|
+
import { PasswordRecoveryService } from '../auth/password_recovery.mjs';
|
|
5
6
|
import 'jose';
|
|
6
7
|
import '../auth/jwt_manager.mjs';
|
|
7
8
|
import '../file/object_storage.mjs';
|
|
@@ -9,9 +10,10 @@ import '@aws-sdk/client-s3';
|
|
|
9
10
|
import '../auth/auth_repository.mjs';
|
|
10
11
|
import '../file/file_repository.mjs';
|
|
11
12
|
|
|
12
|
-
declare const createAPIHandler: <TFile>({ authService, fileService, getThirdPartyAuth, signupTokenSecret, }: {
|
|
13
|
+
declare const createAPIHandler: <TFile>({ authService, fileService, passwordRecoveryService, getThirdPartyAuth, signupTokenSecret, }: {
|
|
13
14
|
authService: AuthService<TFile>;
|
|
14
15
|
fileService: FileService<TFile>;
|
|
16
|
+
passwordRecoveryService: PasswordRecoveryService;
|
|
15
17
|
getThirdPartyAuth: (provider: string) => ThirdpartyAuth;
|
|
16
18
|
signupTokenSecret: string;
|
|
17
19
|
}) => ({ request, params }: LoaderFunctionArgs | ActionFunctionArgs) => Promise<Response>;
|
package/dist/route/api.d.ts
CHANGED
|
@@ -2,6 +2,7 @@ import { AuthService } from '../auth/auth_service.js';
|
|
|
2
2
|
import { FileService } from '../file/file_service.js';
|
|
3
3
|
import { ThirdpartyAuth } from '../auth/thirdparty_auth.js';
|
|
4
4
|
import { LoaderFunctionArgs, ActionFunctionArgs } from 'react-router';
|
|
5
|
+
import { PasswordRecoveryService } from '../auth/password_recovery.js';
|
|
5
6
|
import 'jose';
|
|
6
7
|
import '../auth/jwt_manager.js';
|
|
7
8
|
import '../file/object_storage.js';
|
|
@@ -9,9 +10,10 @@ import '@aws-sdk/client-s3';
|
|
|
9
10
|
import '../auth/auth_repository.js';
|
|
10
11
|
import '../file/file_repository.js';
|
|
11
12
|
|
|
12
|
-
declare const createAPIHandler: <TFile>({ authService, fileService, getThirdPartyAuth, signupTokenSecret, }: {
|
|
13
|
+
declare const createAPIHandler: <TFile>({ authService, fileService, passwordRecoveryService, getThirdPartyAuth, signupTokenSecret, }: {
|
|
13
14
|
authService: AuthService<TFile>;
|
|
14
15
|
fileService: FileService<TFile>;
|
|
16
|
+
passwordRecoveryService: PasswordRecoveryService;
|
|
15
17
|
getThirdPartyAuth: (provider: string) => ThirdpartyAuth;
|
|
16
18
|
signupTokenSecret: string;
|
|
17
19
|
}) => ({ request, params }: LoaderFunctionArgs | ActionFunctionArgs) => Promise<Response>;
|
package/dist/route/api.js
CHANGED
|
@@ -233,7 +233,7 @@ var loginHandler = async (request, {
|
|
|
233
233
|
}) => {
|
|
234
234
|
const { id, password } = await request.json();
|
|
235
235
|
try {
|
|
236
|
-
const { accessToken, refreshToken } = await authService.
|
|
236
|
+
const { accessToken, refreshToken } = await authService.login({
|
|
237
237
|
id,
|
|
238
238
|
password
|
|
239
239
|
});
|
|
@@ -327,12 +327,9 @@ var signupHandler = async (request, {
|
|
|
327
327
|
if (!passwordConfirm) {
|
|
328
328
|
return BAD_REQUEST("\uBE44\uBC00\uBC88\uD638 \uD655\uC778\uC744 \uC785\uB825\uD574\uC8FC\uC138\uC694.");
|
|
329
329
|
}
|
|
330
|
-
if (!name) {
|
|
331
|
-
return BAD_REQUEST("\uC774\uB984\uC744 \uC785\uB825\uD574\uC8FC\uC138\uC694.");
|
|
332
|
-
}
|
|
333
330
|
const existing = await authService.authRepository.findCredentialById(email);
|
|
334
331
|
if (existing) {
|
|
335
|
-
return CONFLICT("\uC774\
|
|
332
|
+
return CONFLICT("\uC774\uBBF8 \uAC00\uC785\uD55C \uC774\uBA54\uC77C\uC785\uB2C8\uB2E4.");
|
|
336
333
|
}
|
|
337
334
|
if (password !== passwordConfirm) {
|
|
338
335
|
return BAD_REQUEST("\uBE44\uBC00\uBC88\uD638\uAC00 \uC77C\uCE58\uD558\uC9C0 \uC54A\uC2B5\uB2C8\uB2E4.");
|
|
@@ -352,7 +349,22 @@ var signupHandler = async (request, {
|
|
|
352
349
|
password: bcrypt.hashSync(password, 10)
|
|
353
350
|
});
|
|
354
351
|
const { accessToken, refreshToken } = await authService.issueTokenPair(user);
|
|
355
|
-
|
|
352
|
+
const searchParams = new URL(request.url).searchParams;
|
|
353
|
+
const type = searchParams.get("type");
|
|
354
|
+
if (type === "json") {
|
|
355
|
+
return CREATED({ accessToken, refreshToken });
|
|
356
|
+
}
|
|
357
|
+
const [accessTokenSetCookie, refreshTokenSetCookie] = await Promise.all([
|
|
358
|
+
authService.getAccessTokenSetCookie(accessToken),
|
|
359
|
+
authService.getRefreshTokenSetCookie(refreshToken)
|
|
360
|
+
]);
|
|
361
|
+
const payload = authService.jwtManager.decode(accessToken);
|
|
362
|
+
const headers = new Headers();
|
|
363
|
+
headers.append("Set-Cookie", accessTokenSetCookie);
|
|
364
|
+
headers.append("Set-Cookie", refreshTokenSetCookie);
|
|
365
|
+
return CREATED(payload, {
|
|
366
|
+
headers
|
|
367
|
+
});
|
|
356
368
|
};
|
|
357
369
|
|
|
358
370
|
// src/auth/handlers/signup_with_thirdparty.ts
|
|
@@ -405,10 +417,34 @@ var signUpWithThirdpartyHandler = async (request, {
|
|
|
405
417
|
return CREATED({ accessToken, refreshToken });
|
|
406
418
|
};
|
|
407
419
|
|
|
420
|
+
// src/auth/handlers/request_password_reset.ts
|
|
421
|
+
var requestPasswordResetHandler = async (request, {
|
|
422
|
+
passwordRecoveryService
|
|
423
|
+
}) => {
|
|
424
|
+
const { email } = await request.json();
|
|
425
|
+
try {
|
|
426
|
+
await passwordRecoveryService.requestPasswordReset(email);
|
|
427
|
+
return CREATED({ message: "\uBE44\uBC00\uBC88\uD638 \uC7AC\uC124\uC815 \uC774\uBA54\uC77C\uC744 \uC804\uC1A1\uD588\uC2B5\uB2C8\uB2E4." });
|
|
428
|
+
} catch (error) {
|
|
429
|
+
console.error(error);
|
|
430
|
+
return INTERNAL_SERVER_ERROR("\uC774\uBA54\uC77C \uC804\uC1A1\uC5D0 \uC2E4\uD328\uD588\uC2B5\uB2C8\uB2E4.");
|
|
431
|
+
}
|
|
432
|
+
};
|
|
433
|
+
|
|
434
|
+
// src/auth/handlers/reset_password.ts
|
|
435
|
+
var resetPasswordHandler = async (request, {
|
|
436
|
+
passwordRecoveryService
|
|
437
|
+
}) => {
|
|
438
|
+
const { token, password, passwordConfirm } = await request.json();
|
|
439
|
+
await passwordRecoveryService.resetPassword(token, password, passwordConfirm);
|
|
440
|
+
return NO_CONTENT();
|
|
441
|
+
};
|
|
442
|
+
|
|
408
443
|
// src/route/api.ts
|
|
409
444
|
var createAPIHandler = ({
|
|
410
445
|
authService,
|
|
411
446
|
fileService,
|
|
447
|
+
passwordRecoveryService,
|
|
412
448
|
getThirdPartyAuth,
|
|
413
449
|
signupTokenSecret
|
|
414
450
|
}) => {
|
|
@@ -504,6 +540,12 @@ var createAPIHandler = ({
|
|
|
504
540
|
}
|
|
505
541
|
}
|
|
506
542
|
}
|
|
543
|
+
case "request-password-reset": {
|
|
544
|
+
return requestPasswordResetHandler(request, { passwordRecoveryService });
|
|
545
|
+
}
|
|
546
|
+
case "reset-password": {
|
|
547
|
+
return resetPasswordHandler(request, { passwordRecoveryService });
|
|
548
|
+
}
|
|
507
549
|
}
|
|
508
550
|
}
|
|
509
551
|
case "files": {
|
package/dist/route/api.mjs
CHANGED
|
@@ -197,7 +197,7 @@ var loginHandler = async (request, {
|
|
|
197
197
|
}) => {
|
|
198
198
|
const { id, password } = await request.json();
|
|
199
199
|
try {
|
|
200
|
-
const { accessToken, refreshToken } = await authService.
|
|
200
|
+
const { accessToken, refreshToken } = await authService.login({
|
|
201
201
|
id,
|
|
202
202
|
password
|
|
203
203
|
});
|
|
@@ -291,12 +291,9 @@ var signupHandler = async (request, {
|
|
|
291
291
|
if (!passwordConfirm) {
|
|
292
292
|
return BAD_REQUEST("\uBE44\uBC00\uBC88\uD638 \uD655\uC778\uC744 \uC785\uB825\uD574\uC8FC\uC138\uC694.");
|
|
293
293
|
}
|
|
294
|
-
if (!name) {
|
|
295
|
-
return BAD_REQUEST("\uC774\uB984\uC744 \uC785\uB825\uD574\uC8FC\uC138\uC694.");
|
|
296
|
-
}
|
|
297
294
|
const existing = await authService.authRepository.findCredentialById(email);
|
|
298
295
|
if (existing) {
|
|
299
|
-
return CONFLICT("\uC774\
|
|
296
|
+
return CONFLICT("\uC774\uBBF8 \uAC00\uC785\uD55C \uC774\uBA54\uC77C\uC785\uB2C8\uB2E4.");
|
|
300
297
|
}
|
|
301
298
|
if (password !== passwordConfirm) {
|
|
302
299
|
return BAD_REQUEST("\uBE44\uBC00\uBC88\uD638\uAC00 \uC77C\uCE58\uD558\uC9C0 \uC54A\uC2B5\uB2C8\uB2E4.");
|
|
@@ -316,7 +313,22 @@ var signupHandler = async (request, {
|
|
|
316
313
|
password: bcrypt.hashSync(password, 10)
|
|
317
314
|
});
|
|
318
315
|
const { accessToken, refreshToken } = await authService.issueTokenPair(user);
|
|
319
|
-
|
|
316
|
+
const searchParams = new URL(request.url).searchParams;
|
|
317
|
+
const type = searchParams.get("type");
|
|
318
|
+
if (type === "json") {
|
|
319
|
+
return CREATED({ accessToken, refreshToken });
|
|
320
|
+
}
|
|
321
|
+
const [accessTokenSetCookie, refreshTokenSetCookie] = await Promise.all([
|
|
322
|
+
authService.getAccessTokenSetCookie(accessToken),
|
|
323
|
+
authService.getRefreshTokenSetCookie(refreshToken)
|
|
324
|
+
]);
|
|
325
|
+
const payload = authService.jwtManager.decode(accessToken);
|
|
326
|
+
const headers = new Headers();
|
|
327
|
+
headers.append("Set-Cookie", accessTokenSetCookie);
|
|
328
|
+
headers.append("Set-Cookie", refreshTokenSetCookie);
|
|
329
|
+
return CREATED(payload, {
|
|
330
|
+
headers
|
|
331
|
+
});
|
|
320
332
|
};
|
|
321
333
|
|
|
322
334
|
// src/auth/handlers/signup_with_thirdparty.ts
|
|
@@ -369,10 +381,34 @@ var signUpWithThirdpartyHandler = async (request, {
|
|
|
369
381
|
return CREATED({ accessToken, refreshToken });
|
|
370
382
|
};
|
|
371
383
|
|
|
384
|
+
// src/auth/handlers/request_password_reset.ts
|
|
385
|
+
var requestPasswordResetHandler = async (request, {
|
|
386
|
+
passwordRecoveryService
|
|
387
|
+
}) => {
|
|
388
|
+
const { email } = await request.json();
|
|
389
|
+
try {
|
|
390
|
+
await passwordRecoveryService.requestPasswordReset(email);
|
|
391
|
+
return CREATED({ message: "\uBE44\uBC00\uBC88\uD638 \uC7AC\uC124\uC815 \uC774\uBA54\uC77C\uC744 \uC804\uC1A1\uD588\uC2B5\uB2C8\uB2E4." });
|
|
392
|
+
} catch (error) {
|
|
393
|
+
console.error(error);
|
|
394
|
+
return INTERNAL_SERVER_ERROR("\uC774\uBA54\uC77C \uC804\uC1A1\uC5D0 \uC2E4\uD328\uD588\uC2B5\uB2C8\uB2E4.");
|
|
395
|
+
}
|
|
396
|
+
};
|
|
397
|
+
|
|
398
|
+
// src/auth/handlers/reset_password.ts
|
|
399
|
+
var resetPasswordHandler = async (request, {
|
|
400
|
+
passwordRecoveryService
|
|
401
|
+
}) => {
|
|
402
|
+
const { token, password, passwordConfirm } = await request.json();
|
|
403
|
+
await passwordRecoveryService.resetPassword(token, password, passwordConfirm);
|
|
404
|
+
return NO_CONTENT();
|
|
405
|
+
};
|
|
406
|
+
|
|
372
407
|
// src/route/api.ts
|
|
373
408
|
var createAPIHandler = ({
|
|
374
409
|
authService,
|
|
375
410
|
fileService,
|
|
411
|
+
passwordRecoveryService,
|
|
376
412
|
getThirdPartyAuth,
|
|
377
413
|
signupTokenSecret
|
|
378
414
|
}) => {
|
|
@@ -468,6 +504,12 @@ var createAPIHandler = ({
|
|
|
468
504
|
}
|
|
469
505
|
}
|
|
470
506
|
}
|
|
507
|
+
case "request-password-reset": {
|
|
508
|
+
return requestPasswordResetHandler(request, { passwordRecoveryService });
|
|
509
|
+
}
|
|
510
|
+
case "reset-password": {
|
|
511
|
+
return resetPasswordHandler(request, { passwordRecoveryService });
|
|
512
|
+
}
|
|
471
513
|
}
|
|
472
514
|
}
|
|
473
515
|
case "files": {
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "dn-react-router-toolkit",
|
|
3
|
-
"version": "0.2.
|
|
3
|
+
"version": "0.2.2",
|
|
4
4
|
"types": "./dist/index.d.ts",
|
|
5
5
|
"main": "./dist/index.mjs",
|
|
6
6
|
"module": "./dist/index.js",
|
|
@@ -58,6 +58,7 @@
|
|
|
58
58
|
"description": "",
|
|
59
59
|
"devDependencies": {
|
|
60
60
|
"@types/node": "^24.10.1",
|
|
61
|
+
"@types/nodemailer": "^7.0.4",
|
|
61
62
|
"@types/react": "^19",
|
|
62
63
|
"@types/react-dom": "^19",
|
|
63
64
|
"rimraf": "^6.0.1",
|
|
@@ -71,6 +72,7 @@
|
|
|
71
72
|
"bcryptjs": "^3.0.3",
|
|
72
73
|
"jose": "^6.1.2",
|
|
73
74
|
"moment-timezone": "^0.6.0",
|
|
75
|
+
"nodemailer": "^7.0.11",
|
|
74
76
|
"react-icons": "^5.5.0",
|
|
75
77
|
"uuid": "^13.0.0"
|
|
76
78
|
},
|