saas-backend-kit 1.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +31 -0
- package/PUBLISHING.md +133 -0
- package/README.md +459 -0
- package/copy-dts.js +255 -0
- package/dist/auth/index.d.ts +58 -0
- package/dist/auth/index.js +584 -0
- package/dist/auth/index.js.map +1 -0
- package/dist/auth/index.mjs +569 -0
- package/dist/auth/index.mjs.map +1 -0
- package/dist/config/index.d.ts +22 -0
- package/dist/config/index.js +106 -0
- package/dist/config/index.js.map +1 -0
- package/dist/config/index.mjs +100 -0
- package/dist/config/index.mjs.map +1 -0
- package/dist/index.d.ts +25 -0
- package/dist/index.js +1303 -0
- package/dist/index.js.map +1 -0
- package/dist/index.mjs +1281 -0
- package/dist/index.mjs.map +1 -0
- package/dist/logger/index.d.ts +18 -0
- package/dist/logger/index.js +188 -0
- package/dist/logger/index.js.map +1 -0
- package/dist/logger/index.mjs +178 -0
- package/dist/logger/index.mjs.map +1 -0
- package/dist/notifications/index.d.ts +35 -0
- package/dist/notifications/index.js +339 -0
- package/dist/notifications/index.js.map +1 -0
- package/dist/notifications/index.mjs +328 -0
- package/dist/notifications/index.mjs.map +1 -0
- package/dist/queue/index.d.ts +33 -0
- package/dist/queue/index.js +306 -0
- package/dist/queue/index.js.map +1 -0
- package/dist/queue/index.mjs +293 -0
- package/dist/queue/index.mjs.map +1 -0
- package/dist/rate-limit/index.d.ts +11 -0
- package/dist/rate-limit/index.js +290 -0
- package/dist/rate-limit/index.js.map +1 -0
- package/dist/rate-limit/index.mjs +286 -0
- package/dist/rate-limit/index.mjs.map +1 -0
- package/dist/response/index.d.ts +29 -0
- package/dist/response/index.js +120 -0
- package/dist/response/index.js.map +1 -0
- package/dist/response/index.mjs +114 -0
- package/dist/response/index.mjs.map +1 -0
- package/examples/express/.env.example +41 -0
- package/examples/express/app.ts +203 -0
- package/package.json +109 -0
- package/src/auth/express.ts +250 -0
- package/src/auth/fastify.ts +65 -0
- package/src/auth/index.ts +6 -0
- package/src/auth/jwt.ts +47 -0
- package/src/auth/oauth.ts +117 -0
- package/src/auth/rbac.ts +82 -0
- package/src/auth/types.ts +69 -0
- package/src/config/index.ts +120 -0
- package/src/index.ts +16 -0
- package/src/logger/index.ts +110 -0
- package/src/notifications/index.ts +262 -0
- package/src/plugin.ts +192 -0
- package/src/queue/index.ts +208 -0
- package/src/rate-limit/express.ts +144 -0
- package/src/rate-limit/fastify.ts +47 -0
- package/src/rate-limit/index.ts +2 -0
- package/src/response/index.ts +197 -0
- package/src/utils/index.ts +180 -0
- package/tsconfig.json +30 -0
- package/tsup.config.ts +24 -0
|
@@ -0,0 +1,584 @@
|
|
|
1
|
+
'use strict';
|
|
2
|
+
|
|
3
|
+
var jwt = require('jsonwebtoken');
|
|
4
|
+
var zod = require('zod');
|
|
5
|
+
var bcrypt = require('bcryptjs');
|
|
6
|
+
|
|
7
|
+
function _interopDefault (e) { return e && e.__esModule ? e : { default: e }; }
|
|
8
|
+
|
|
9
|
+
var jwt__default = /*#__PURE__*/_interopDefault(jwt);
|
|
10
|
+
var bcrypt__default = /*#__PURE__*/_interopDefault(bcrypt);
|
|
11
|
+
|
|
12
|
+
var __defProp = Object.defineProperty;
|
|
13
|
+
var __getOwnPropNames = Object.getOwnPropertyNames;
|
|
14
|
+
var __esm = (fn, res) => function __init() {
|
|
15
|
+
return fn && (res = (0, fn[__getOwnPropNames(fn)[0]])(fn = 0)), res;
|
|
16
|
+
};
|
|
17
|
+
var __export = (target, all) => {
|
|
18
|
+
for (var name in all)
|
|
19
|
+
__defProp(target, name, { get: all[name], enumerable: true });
|
|
20
|
+
};
|
|
21
|
+
|
|
22
|
+
// src/auth/types.ts
|
|
23
|
+
exports.DEFAULT_PERMISSIONS = void 0;
|
|
24
|
+
var init_types = __esm({
|
|
25
|
+
"src/auth/types.ts"() {
|
|
26
|
+
exports.DEFAULT_PERMISSIONS = {
|
|
27
|
+
admin: ["*"],
|
|
28
|
+
user: ["read", "write:own"],
|
|
29
|
+
guest: ["read:public"]
|
|
30
|
+
};
|
|
31
|
+
}
|
|
32
|
+
});
|
|
33
|
+
|
|
34
|
+
// src/auth/rbac.ts
|
|
35
|
+
var rbac_exports = {};
|
|
36
|
+
__export(rbac_exports, {
|
|
37
|
+
RBACService: () => exports.RBACService,
|
|
38
|
+
rbacService: () => exports.rbacService
|
|
39
|
+
});
|
|
40
|
+
exports.RBACService = void 0; exports.rbacService = void 0;
|
|
41
|
+
var init_rbac = __esm({
|
|
42
|
+
"src/auth/rbac.ts"() {
|
|
43
|
+
init_types();
|
|
44
|
+
exports.RBACService = class {
|
|
45
|
+
permissions;
|
|
46
|
+
constructor(permissions = exports.DEFAULT_PERMISSIONS) {
|
|
47
|
+
this.permissions = permissions;
|
|
48
|
+
}
|
|
49
|
+
setPermissions(permissions) {
|
|
50
|
+
this.permissions = permissions;
|
|
51
|
+
}
|
|
52
|
+
addPermission(role, permission) {
|
|
53
|
+
if (!this.permissions[role]) {
|
|
54
|
+
this.permissions[role] = [];
|
|
55
|
+
}
|
|
56
|
+
if (!this.permissions[role].includes(permission)) {
|
|
57
|
+
this.permissions[role].push(permission);
|
|
58
|
+
}
|
|
59
|
+
}
|
|
60
|
+
removePermission(role, permission) {
|
|
61
|
+
if (this.permissions[role]) {
|
|
62
|
+
this.permissions[role] = this.permissions[role].filter((p) => p !== permission);
|
|
63
|
+
}
|
|
64
|
+
}
|
|
65
|
+
getPermissions(role) {
|
|
66
|
+
return this.permissions[role] || [];
|
|
67
|
+
}
|
|
68
|
+
hasPermission(role, requiredPermission) {
|
|
69
|
+
const rolePermissions = this.getPermissions(role);
|
|
70
|
+
if (rolePermissions.includes("*")) {
|
|
71
|
+
return true;
|
|
72
|
+
}
|
|
73
|
+
if (rolePermissions.includes(requiredPermission)) {
|
|
74
|
+
return true;
|
|
75
|
+
}
|
|
76
|
+
const [requiredAction, requiredScope] = requiredPermission.split(":");
|
|
77
|
+
for (const perm of rolePermissions) {
|
|
78
|
+
const [action, scope] = perm.split(":");
|
|
79
|
+
if (action === "*" && (scope === "*" || scope === requiredScope)) {
|
|
80
|
+
return true;
|
|
81
|
+
}
|
|
82
|
+
if (action === requiredAction && (scope === "*" || scope === requiredScope)) {
|
|
83
|
+
return true;
|
|
84
|
+
}
|
|
85
|
+
}
|
|
86
|
+
return false;
|
|
87
|
+
}
|
|
88
|
+
hasRole(userRole, requiredRole) {
|
|
89
|
+
const hierarchy = ["guest", "user", "admin"];
|
|
90
|
+
const userIndex = hierarchy.indexOf(userRole);
|
|
91
|
+
const requiredIndex = hierarchy.indexOf(requiredRole);
|
|
92
|
+
if (userIndex === -1 || requiredIndex === -1) {
|
|
93
|
+
return userRole === requiredRole;
|
|
94
|
+
}
|
|
95
|
+
return userIndex >= requiredIndex;
|
|
96
|
+
}
|
|
97
|
+
authorize(permission) {
|
|
98
|
+
return (role) => this.hasPermission(role, permission);
|
|
99
|
+
}
|
|
100
|
+
authorizeRole(requiredRole) {
|
|
101
|
+
return (role) => this.hasRole(role, requiredRole);
|
|
102
|
+
}
|
|
103
|
+
};
|
|
104
|
+
exports.rbacService = new exports.RBACService();
|
|
105
|
+
}
|
|
106
|
+
});
|
|
107
|
+
|
|
108
|
+
// src/auth/index.ts
|
|
109
|
+
init_types();
|
|
110
|
+
var envSchema = zod.z.object({
|
|
111
|
+
NODE_ENV: zod.z.enum(["development", "production", "test"]).default("development"),
|
|
112
|
+
PORT: zod.z.string().default("3000"),
|
|
113
|
+
DATABASE_URL: zod.z.string().optional(),
|
|
114
|
+
REDIS_URL: zod.z.string().default("redis://localhost:6379"),
|
|
115
|
+
JWT_SECRET: zod.z.string().min(32).optional(),
|
|
116
|
+
JWT_EXPIRES_IN: zod.z.string().default("7d"),
|
|
117
|
+
JWT_REFRESH_SECRET: zod.z.string().min(32).optional(),
|
|
118
|
+
JWT_REFRESH_EXPIRES_IN: zod.z.string().default("30d"),
|
|
119
|
+
GOOGLE_CLIENT_ID: zod.z.string().optional(),
|
|
120
|
+
GOOGLE_CLIENT_SECRET: zod.z.string().optional(),
|
|
121
|
+
GOOGLE_REDIRECT_URI: zod.z.string().optional(),
|
|
122
|
+
SMTP_HOST: zod.z.string().optional(),
|
|
123
|
+
SMTP_PORT: zod.z.string().default("587"),
|
|
124
|
+
SMTP_USER: zod.z.string().optional(),
|
|
125
|
+
SMTP_PASS: zod.z.string().optional(),
|
|
126
|
+
SMTP_FROM: zod.z.string().optional(),
|
|
127
|
+
TWILIO_ACCOUNT_SID: zod.z.string().optional(),
|
|
128
|
+
TWILIO_AUTH_TOKEN: zod.z.string().optional(),
|
|
129
|
+
TWILIO_PHONE_NUMBER: zod.z.string().optional(),
|
|
130
|
+
SLACK_WEBHOOK_URL: zod.z.string().optional(),
|
|
131
|
+
RATE_LIMIT_WINDOW: zod.z.string().default("1m"),
|
|
132
|
+
RATE_LIMIT_LIMIT: zod.z.string().default("100"),
|
|
133
|
+
LOG_LEVEL: zod.z.enum(["fatal", "error", "warn", "info", "debug", "trace"]).default("info")
|
|
134
|
+
});
|
|
135
|
+
var ConfigManager = class {
|
|
136
|
+
config = null;
|
|
137
|
+
schema;
|
|
138
|
+
validate;
|
|
139
|
+
constructor(options = {}) {
|
|
140
|
+
this.schema = options.schema || envSchema;
|
|
141
|
+
this.validate = options.validate ?? true;
|
|
142
|
+
}
|
|
143
|
+
load() {
|
|
144
|
+
if (this.config) return this.config;
|
|
145
|
+
const env = {};
|
|
146
|
+
for (const key of Object.keys(this.schema.shape)) {
|
|
147
|
+
env[key] = process.env[key];
|
|
148
|
+
}
|
|
149
|
+
if (this.validate) {
|
|
150
|
+
const result = this.schema.safeParse(env);
|
|
151
|
+
if (!result.success) {
|
|
152
|
+
const errors = result.error.errors.map((e) => `${e.path.join(".")}: ${e.message}`).join(", ");
|
|
153
|
+
throw new Error(`Config validation failed: ${errors}`);
|
|
154
|
+
}
|
|
155
|
+
this.config = result.data;
|
|
156
|
+
} else {
|
|
157
|
+
this.config = env;
|
|
158
|
+
}
|
|
159
|
+
return this.config;
|
|
160
|
+
}
|
|
161
|
+
get(key) {
|
|
162
|
+
if (!this.config) this.load();
|
|
163
|
+
return this.config[key];
|
|
164
|
+
}
|
|
165
|
+
int(key) {
|
|
166
|
+
const value = this.get(key);
|
|
167
|
+
if (typeof value === "string") return parseInt(value, 10);
|
|
168
|
+
return Number(value);
|
|
169
|
+
}
|
|
170
|
+
bool(key) {
|
|
171
|
+
const value = this.get(key);
|
|
172
|
+
if (typeof value === "boolean") return value;
|
|
173
|
+
if (typeof value === "string") return value.toLowerCase() === "true";
|
|
174
|
+
return Boolean(value);
|
|
175
|
+
}
|
|
176
|
+
isProduction() {
|
|
177
|
+
return this.get("NODE_ENV") === "production";
|
|
178
|
+
}
|
|
179
|
+
isDevelopment() {
|
|
180
|
+
return this.get("NODE_ENV") === "development";
|
|
181
|
+
}
|
|
182
|
+
isTest() {
|
|
183
|
+
return this.get("NODE_ENV") === "test";
|
|
184
|
+
}
|
|
185
|
+
getAll() {
|
|
186
|
+
if (!this.config) this.load();
|
|
187
|
+
return this.config;
|
|
188
|
+
}
|
|
189
|
+
};
|
|
190
|
+
var globalConfig = new ConfigManager();
|
|
191
|
+
var config = {
|
|
192
|
+
load: () => globalConfig.load(),
|
|
193
|
+
get: (key) => globalConfig.get(key),
|
|
194
|
+
int: (key) => globalConfig.int(key),
|
|
195
|
+
bool: (key) => globalConfig.bool(key),
|
|
196
|
+
isProduction: () => globalConfig.isProduction(),
|
|
197
|
+
isDevelopment: () => globalConfig.isDevelopment(),
|
|
198
|
+
isTest: () => globalConfig.isTest(),
|
|
199
|
+
getAll: () => globalConfig.getAll(),
|
|
200
|
+
create: (options) => new ConfigManager(options)
|
|
201
|
+
};
|
|
202
|
+
|
|
203
|
+
// src/auth/jwt.ts
|
|
204
|
+
var JWTService = class {
|
|
205
|
+
secret;
|
|
206
|
+
expiresIn;
|
|
207
|
+
refreshSecret;
|
|
208
|
+
refreshExpiresIn;
|
|
209
|
+
constructor(options = {}) {
|
|
210
|
+
this.secret = options.jwtSecret || config.get("JWT_SECRET") || "default-secret-change-in-production";
|
|
211
|
+
this.expiresIn = options.jwtExpiresIn || config.get("JWT_EXPIRES_IN") || "7d";
|
|
212
|
+
this.refreshSecret = options.refreshSecret || config.get("JWT_REFRESH_SECRET") || this.secret;
|
|
213
|
+
this.refreshExpiresIn = options.refreshExpiresIn || config.get("JWT_REFRESH_EXPIRES_IN") || "30d";
|
|
214
|
+
}
|
|
215
|
+
generateToken(payload) {
|
|
216
|
+
return jwt__default.default.sign(payload, this.secret, { expiresIn: this.expiresIn });
|
|
217
|
+
}
|
|
218
|
+
generateRefreshToken(payload) {
|
|
219
|
+
return jwt__default.default.sign(payload, this.refreshSecret, { expiresIn: this.refreshExpiresIn });
|
|
220
|
+
}
|
|
221
|
+
generateTokenPair(payload) {
|
|
222
|
+
return {
|
|
223
|
+
accessToken: this.generateToken(payload),
|
|
224
|
+
refreshToken: this.generateRefreshToken(payload)
|
|
225
|
+
};
|
|
226
|
+
}
|
|
227
|
+
verifyToken(token) {
|
|
228
|
+
return jwt__default.default.verify(token, this.secret);
|
|
229
|
+
}
|
|
230
|
+
verifyRefreshToken(token) {
|
|
231
|
+
return jwt__default.default.verify(token, this.refreshSecret);
|
|
232
|
+
}
|
|
233
|
+
refreshTokens(refreshToken) {
|
|
234
|
+
const payload = this.verifyRefreshToken(refreshToken);
|
|
235
|
+
return this.generateTokenPair(payload);
|
|
236
|
+
}
|
|
237
|
+
};
|
|
238
|
+
var jwtService = new JWTService();
|
|
239
|
+
|
|
240
|
+
// src/auth/index.ts
|
|
241
|
+
init_rbac();
|
|
242
|
+
|
|
243
|
+
// src/auth/oauth.ts
|
|
244
|
+
var OAuthService = class {
|
|
245
|
+
providers = /* @__PURE__ */ new Map();
|
|
246
|
+
constructor() {
|
|
247
|
+
const googleClientId = config.get("GOOGLE_CLIENT_ID");
|
|
248
|
+
const googleClientSecret = config.get("GOOGLE_CLIENT_SECRET");
|
|
249
|
+
const googleRedirectUri = config.get("GOOGLE_REDIRECT_URI");
|
|
250
|
+
if (googleClientId && googleClientSecret && googleRedirectUri) {
|
|
251
|
+
this.registerProvider("google", {
|
|
252
|
+
name: "google",
|
|
253
|
+
clientId: googleClientId,
|
|
254
|
+
clientSecret: googleClientSecret,
|
|
255
|
+
redirectUri: googleRedirectUri,
|
|
256
|
+
authorizationUrl: "https://accounts.google.com/o/oauth2/v2/auth",
|
|
257
|
+
tokenUrl: "https://oauth2.googleapis.com/token",
|
|
258
|
+
userInfoUrl: "https://www.googleapis.com/oauth2/v2/userinfo"
|
|
259
|
+
});
|
|
260
|
+
}
|
|
261
|
+
}
|
|
262
|
+
registerProvider(name, provider) {
|
|
263
|
+
this.providers.set(name, provider);
|
|
264
|
+
}
|
|
265
|
+
getProvider(name) {
|
|
266
|
+
return this.providers.get(name);
|
|
267
|
+
}
|
|
268
|
+
getAuthorizationUrl(providerName, state) {
|
|
269
|
+
const provider = this.getProvider(providerName);
|
|
270
|
+
if (!provider) {
|
|
271
|
+
throw new Error(`OAuth provider ${providerName} not registered`);
|
|
272
|
+
}
|
|
273
|
+
const params = new URLSearchParams({
|
|
274
|
+
client_id: provider.clientId,
|
|
275
|
+
redirect_uri: provider.redirectUri,
|
|
276
|
+
response_type: "code",
|
|
277
|
+
scope: "openid email profile",
|
|
278
|
+
state: state || ""
|
|
279
|
+
});
|
|
280
|
+
return `${provider.authorizationUrl}?${params.toString()}`;
|
|
281
|
+
}
|
|
282
|
+
async exchangeCode(providerName, code) {
|
|
283
|
+
const provider = this.getProvider(providerName);
|
|
284
|
+
if (!provider) {
|
|
285
|
+
throw new Error(`OAuth provider ${providerName} not registered`);
|
|
286
|
+
}
|
|
287
|
+
const response = await fetch(provider.tokenUrl, {
|
|
288
|
+
method: "POST",
|
|
289
|
+
headers: {
|
|
290
|
+
"Content-Type": "application/x-www-form-urlencoded"
|
|
291
|
+
},
|
|
292
|
+
body: new URLSearchParams({
|
|
293
|
+
client_id: provider.clientId,
|
|
294
|
+
client_secret: provider.clientSecret,
|
|
295
|
+
code,
|
|
296
|
+
grant_type: "authorization_code",
|
|
297
|
+
redirect_uri: provider.redirectUri
|
|
298
|
+
})
|
|
299
|
+
});
|
|
300
|
+
if (!response.ok) {
|
|
301
|
+
const error = await response.text();
|
|
302
|
+
throw new Error(`OAuth token exchange failed: ${error}`);
|
|
303
|
+
}
|
|
304
|
+
const data = await response.json();
|
|
305
|
+
return {
|
|
306
|
+
accessToken: data.access_token,
|
|
307
|
+
refreshToken: data.refresh_token
|
|
308
|
+
};
|
|
309
|
+
}
|
|
310
|
+
async getUserInfo(providerName, accessToken) {
|
|
311
|
+
const provider = this.getProvider(providerName);
|
|
312
|
+
if (!provider) {
|
|
313
|
+
throw new Error(`OAuth provider ${providerName} not registered`);
|
|
314
|
+
}
|
|
315
|
+
const response = await fetch(provider.userInfoUrl, {
|
|
316
|
+
headers: {
|
|
317
|
+
Authorization: `Bearer ${accessToken}`
|
|
318
|
+
}
|
|
319
|
+
});
|
|
320
|
+
if (!response.ok) {
|
|
321
|
+
const error = await response.text();
|
|
322
|
+
throw new Error(`OAuth user info fetch failed: ${error}`);
|
|
323
|
+
}
|
|
324
|
+
const data = await response.json();
|
|
325
|
+
return {
|
|
326
|
+
id: data.id,
|
|
327
|
+
email: data.email,
|
|
328
|
+
name: data.name,
|
|
329
|
+
picture: data.picture
|
|
330
|
+
};
|
|
331
|
+
}
|
|
332
|
+
};
|
|
333
|
+
var oauthService = new OAuthService();
|
|
334
|
+
init_rbac();
|
|
335
|
+
var InMemoryUserStore = class {
|
|
336
|
+
users = /* @__PURE__ */ new Map();
|
|
337
|
+
async findByEmail(email) {
|
|
338
|
+
for (const user of this.users.values()) {
|
|
339
|
+
if (user.email === email) return user;
|
|
340
|
+
}
|
|
341
|
+
return null;
|
|
342
|
+
}
|
|
343
|
+
async findById(id) {
|
|
344
|
+
return this.users.get(id) || null;
|
|
345
|
+
}
|
|
346
|
+
async create(data) {
|
|
347
|
+
const id = Math.random().toString(36).substr(2, 9);
|
|
348
|
+
const hashedPassword = await bcrypt__default.default.hash(data.password, 10);
|
|
349
|
+
const user = {
|
|
350
|
+
id,
|
|
351
|
+
email: data.email,
|
|
352
|
+
password: hashedPassword,
|
|
353
|
+
role: data.role || "user",
|
|
354
|
+
name: data.name
|
|
355
|
+
};
|
|
356
|
+
this.users.set(id, user);
|
|
357
|
+
return user;
|
|
358
|
+
}
|
|
359
|
+
async update(id, data) {
|
|
360
|
+
const user = this.users.get(id);
|
|
361
|
+
if (!user) throw new Error("User not found");
|
|
362
|
+
const updated = { ...user, ...data };
|
|
363
|
+
this.users.set(id, updated);
|
|
364
|
+
return updated;
|
|
365
|
+
}
|
|
366
|
+
};
|
|
367
|
+
var AuthService = class {
|
|
368
|
+
userStore;
|
|
369
|
+
options;
|
|
370
|
+
initialized = false;
|
|
371
|
+
constructor(options = {}, userStore) {
|
|
372
|
+
this.options = {
|
|
373
|
+
jwtSecret: options.jwtSecret || process.env.JWT_SECRET || "default-secret-change-in-production",
|
|
374
|
+
jwtExpiresIn: options.jwtExpiresIn || "7d",
|
|
375
|
+
refreshSecret: options.refreshSecret || process.env.JWT_REFRESH_SECRET || "default-secret-change-in-production",
|
|
376
|
+
refreshExpiresIn: options.refreshExpiresIn || "30d",
|
|
377
|
+
googleClientId: options.googleClientId || process.env.GOOGLE_CLIENT_ID || "",
|
|
378
|
+
googleClientSecret: options.googleClientSecret || process.env.GOOGLE_CLIENT_SECRET || "",
|
|
379
|
+
googleRedirectUri: options.googleRedirectUri || process.env.GOOGLE_REDIRECT_URI || ""
|
|
380
|
+
};
|
|
381
|
+
this.userStore = userStore || new InMemoryUserStore();
|
|
382
|
+
}
|
|
383
|
+
async initialize() {
|
|
384
|
+
if (this.options.googleClientId && this.options.googleClientSecret && this.options.googleRedirectUri) {
|
|
385
|
+
oauthService.registerProvider("google", {
|
|
386
|
+
name: "google",
|
|
387
|
+
clientId: this.options.googleClientId,
|
|
388
|
+
clientSecret: this.options.googleClientSecret,
|
|
389
|
+
redirectUri: this.options.googleRedirectUri,
|
|
390
|
+
authorizationUrl: "https://accounts.google.com/o/oauth2/v2/auth",
|
|
391
|
+
tokenUrl: "https://oauth2.googleapis.com/token",
|
|
392
|
+
userInfoUrl: "https://www.googleapis.com/oauth2/v2/userinfo"
|
|
393
|
+
});
|
|
394
|
+
}
|
|
395
|
+
this.initialized = true;
|
|
396
|
+
}
|
|
397
|
+
async register(data) {
|
|
398
|
+
const existing = await this.userStore.findByEmail(data.email);
|
|
399
|
+
if (existing) {
|
|
400
|
+
throw new Error("User already exists");
|
|
401
|
+
}
|
|
402
|
+
const user = await this.userStore.create(data);
|
|
403
|
+
const tokens = jwtService.generateTokenPair({
|
|
404
|
+
userId: user.id,
|
|
405
|
+
email: user.email,
|
|
406
|
+
role: user.role
|
|
407
|
+
});
|
|
408
|
+
return { user, tokens };
|
|
409
|
+
}
|
|
410
|
+
async login(credentials) {
|
|
411
|
+
const user = await this.userStore.findByEmail(credentials.email);
|
|
412
|
+
if (!user || !user.password) {
|
|
413
|
+
throw new Error("Invalid credentials");
|
|
414
|
+
}
|
|
415
|
+
const isValid = await bcrypt__default.default.compare(credentials.password, user.password);
|
|
416
|
+
if (!isValid) {
|
|
417
|
+
throw new Error("Invalid credentials");
|
|
418
|
+
}
|
|
419
|
+
const tokens = jwtService.generateTokenPair({
|
|
420
|
+
userId: user.id,
|
|
421
|
+
email: user.email,
|
|
422
|
+
role: user.role
|
|
423
|
+
});
|
|
424
|
+
return { user, tokens };
|
|
425
|
+
}
|
|
426
|
+
async refresh(refreshToken) {
|
|
427
|
+
return jwtService.refreshTokens(refreshToken);
|
|
428
|
+
}
|
|
429
|
+
async getGoogleAuthUrl(state) {
|
|
430
|
+
return oauthService.getAuthorizationUrl("google", state);
|
|
431
|
+
}
|
|
432
|
+
async handleGoogleCallback(code) {
|
|
433
|
+
const { accessToken } = await oauthService.exchangeCode("google", code);
|
|
434
|
+
const userInfo = await oauthService.getUserInfo("google", accessToken);
|
|
435
|
+
let user = await this.userStore.findByEmail(userInfo.email);
|
|
436
|
+
if (!user) {
|
|
437
|
+
user = await this.userStore.create({
|
|
438
|
+
email: userInfo.email,
|
|
439
|
+
password: Math.random().toString(36).substr(2, 20),
|
|
440
|
+
name: userInfo.name,
|
|
441
|
+
role: "user"
|
|
442
|
+
});
|
|
443
|
+
}
|
|
444
|
+
const tokens = jwtService.generateTokenPair({
|
|
445
|
+
userId: user.id,
|
|
446
|
+
email: user.email,
|
|
447
|
+
role: user.role
|
|
448
|
+
});
|
|
449
|
+
return { user, tokens };
|
|
450
|
+
}
|
|
451
|
+
getMiddleware() {
|
|
452
|
+
return (req, res, next) => {
|
|
453
|
+
const authHeader = req.headers.authorization;
|
|
454
|
+
if (!authHeader || !authHeader.startsWith("Bearer ")) {
|
|
455
|
+
return res.status(401).json({ error: "No token provided" });
|
|
456
|
+
}
|
|
457
|
+
const token = authHeader.substring(7);
|
|
458
|
+
try {
|
|
459
|
+
const payload = jwtService.verifyToken(token);
|
|
460
|
+
req.user = {
|
|
461
|
+
...payload,
|
|
462
|
+
id: payload.userId
|
|
463
|
+
};
|
|
464
|
+
next();
|
|
465
|
+
} catch (error) {
|
|
466
|
+
return res.status(401).json({ error: "Invalid token" });
|
|
467
|
+
}
|
|
468
|
+
};
|
|
469
|
+
}
|
|
470
|
+
requireUser() {
|
|
471
|
+
return (req, res, next) => {
|
|
472
|
+
if (!req.user) {
|
|
473
|
+
return res.status(401).json({ error: "Authentication required" });
|
|
474
|
+
}
|
|
475
|
+
next();
|
|
476
|
+
};
|
|
477
|
+
}
|
|
478
|
+
requireRole(role) {
|
|
479
|
+
return (req, res, next) => {
|
|
480
|
+
if (!req.user) {
|
|
481
|
+
return res.status(401).json({ error: "Authentication required" });
|
|
482
|
+
}
|
|
483
|
+
if (!exports.rbacService.hasRole(req.user.role, role)) {
|
|
484
|
+
return res.status(403).json({ error: "Insufficient permissions" });
|
|
485
|
+
}
|
|
486
|
+
next();
|
|
487
|
+
};
|
|
488
|
+
}
|
|
489
|
+
requirePermission(permission) {
|
|
490
|
+
return (req, res, next) => {
|
|
491
|
+
if (!req.user) {
|
|
492
|
+
return res.status(401).json({ error: "Authentication required" });
|
|
493
|
+
}
|
|
494
|
+
if (!exports.rbacService.hasPermission(req.user.role, permission)) {
|
|
495
|
+
return res.status(403).json({ error: "Insufficient permissions" });
|
|
496
|
+
}
|
|
497
|
+
next();
|
|
498
|
+
};
|
|
499
|
+
}
|
|
500
|
+
};
|
|
501
|
+
var authServiceInstance = null;
|
|
502
|
+
function createAuth(options, userStore) {
|
|
503
|
+
authServiceInstance = new AuthService(options, userStore);
|
|
504
|
+
return authServiceInstance;
|
|
505
|
+
}
|
|
506
|
+
function auth() {
|
|
507
|
+
if (!authServiceInstance) {
|
|
508
|
+
authServiceInstance = new AuthService();
|
|
509
|
+
}
|
|
510
|
+
return authServiceInstance;
|
|
511
|
+
}
|
|
512
|
+
var Auth = {
|
|
513
|
+
initialize: (options) => {
|
|
514
|
+
const service = createAuth(options);
|
|
515
|
+
return {
|
|
516
|
+
service,
|
|
517
|
+
getMiddleware: () => service.getMiddleware(),
|
|
518
|
+
requireUser: () => service.requireUser(),
|
|
519
|
+
requireRole: (role) => service.requireRole(role),
|
|
520
|
+
requirePermission: (permission) => service.requirePermission(permission)
|
|
521
|
+
};
|
|
522
|
+
}
|
|
523
|
+
};
|
|
524
|
+
|
|
525
|
+
// src/auth/fastify.ts
|
|
526
|
+
function registerAuthPlugin(fastify, options, done) {
|
|
527
|
+
const { authService } = options;
|
|
528
|
+
fastify.decorate("authenticate", async (request, reply) => {
|
|
529
|
+
const authHeader = request.headers.authorization;
|
|
530
|
+
if (!authHeader || !authHeader.startsWith("Bearer ")) {
|
|
531
|
+
return reply.status(401).send({ error: "No token provided" });
|
|
532
|
+
}
|
|
533
|
+
const token = authHeader.substring(7);
|
|
534
|
+
try {
|
|
535
|
+
const payload = authService["jwtService"].verifyToken(token);
|
|
536
|
+
request.user = {
|
|
537
|
+
...payload,
|
|
538
|
+
id: payload.userId
|
|
539
|
+
};
|
|
540
|
+
} catch (error) {
|
|
541
|
+
return reply.status(401).send({ error: "Invalid token" });
|
|
542
|
+
}
|
|
543
|
+
});
|
|
544
|
+
fastify.decorate("requireUser", async (request, reply) => {
|
|
545
|
+
if (!request.user) {
|
|
546
|
+
return reply.status(401).send({ error: "Authentication required" });
|
|
547
|
+
}
|
|
548
|
+
});
|
|
549
|
+
fastify.decorate("requireRole", (role) => {
|
|
550
|
+
return async (request, reply) => {
|
|
551
|
+
if (!request.user) {
|
|
552
|
+
return reply.status(401).send({ error: "Authentication required" });
|
|
553
|
+
}
|
|
554
|
+
const { rbacService: rbacService2 } = await Promise.resolve().then(() => (init_rbac(), rbac_exports));
|
|
555
|
+
if (!rbacService2.hasRole(request.user.role, role)) {
|
|
556
|
+
return reply.status(403).send({ error: "Insufficient permissions" });
|
|
557
|
+
}
|
|
558
|
+
};
|
|
559
|
+
});
|
|
560
|
+
fastify.decorate("requirePermission", (permission) => {
|
|
561
|
+
return async (request, reply) => {
|
|
562
|
+
if (!request.user) {
|
|
563
|
+
return reply.status(401).send({ error: "Authentication required" });
|
|
564
|
+
}
|
|
565
|
+
const { rbacService: rbacService2 } = await Promise.resolve().then(() => (init_rbac(), rbac_exports));
|
|
566
|
+
if (!rbacService2.hasPermission(request.user.role, permission)) {
|
|
567
|
+
return reply.status(403).send({ error: "Insufficient permissions" });
|
|
568
|
+
}
|
|
569
|
+
};
|
|
570
|
+
});
|
|
571
|
+
done();
|
|
572
|
+
}
|
|
573
|
+
|
|
574
|
+
exports.Auth = Auth;
|
|
575
|
+
exports.AuthService = AuthService;
|
|
576
|
+
exports.JWTService = JWTService;
|
|
577
|
+
exports.OAuthService = OAuthService;
|
|
578
|
+
exports.auth = auth;
|
|
579
|
+
exports.createAuth = createAuth;
|
|
580
|
+
exports.jwtService = jwtService;
|
|
581
|
+
exports.oauthService = oauthService;
|
|
582
|
+
exports.registerAuthPlugin = registerAuthPlugin;
|
|
583
|
+
//# sourceMappingURL=index.js.map
|
|
584
|
+
//# sourceMappingURL=index.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../../src/auth/types.ts","../../src/auth/rbac.ts","../../src/auth/index.ts","../../src/config/index.ts","../../src/auth/jwt.ts","../../src/auth/oauth.ts","../../src/auth/express.ts","../../src/auth/fastify.ts"],"names":["DEFAULT_PERMISSIONS","RBACService","rbacService","z","jwt","bcrypt"],"mappings":";;;;;;;;;;;;;;;;;;;;;;AA4CaA;AA5Cb,IAAA,UAAA,GAAA,KAAA,CAAA;AAAA,EAAA,mBAAA,GAAA;AA4CO,IAAMA,2BAAA,GAAuC;AAAA,MAClD,KAAA,EAAO,CAAC,GAAG,CAAA;AAAA,MACX,IAAA,EAAM,CAAC,MAAA,EAAQ,WAAW,CAAA;AAAA,MAC1B,KAAA,EAAO,CAAC,aAAa;AAAA,KACvB;AAAA,EAAA;AAAA,CAAA,CAAA;;;AChDA,IAAA,YAAA,GAAA,EAAA;AAAA,QAAA,CAAA,YAAA,EAAA;AAAA,EAAA,WAAA,EAAA,MAAAC,mBAAA;AAAA,EAAA,WAAA,EAAA,MAAAC;AAAA,CAAA,CAAA;AAEaD,4BAAA,CAAA,CA+EAC;AAjFb,IAAA,SAAA,GAAA,KAAA,CAAA;AAAA,EAAA,kBAAA,GAAA;AAAA,IAAA,UAAA,EAAA;AAEO,IAAMD,sBAAN,MAAkB;AAAA,MACf,WAAA;AAAA,MAER,WAAA,CAAY,cAA+BD,2BAAA,EAAqB;AAC9D,QAAA,IAAA,CAAK,WAAA,GAAc,WAAA;AAAA,MACrB;AAAA,MAEA,eAAe,WAAA,EAAoC;AACjD,QAAA,IAAA,CAAK,WAAA,GAAc,WAAA;AAAA,MACrB;AAAA,MAEA,aAAA,CAAc,MAAY,UAAA,EAA8B;AACtD,QAAA,IAAI,CAAC,IAAA,CAAK,WAAA,CAAY,IAAI,CAAA,EAAG;AAC3B,UAAA,IAAA,CAAK,WAAA,CAAY,IAAI,CAAA,GAAI,EAAC;AAAA,QAC5B;AACA,QAAA,IAAI,CAAC,IAAA,CAAK,WAAA,CAAY,IAAI,CAAA,CAAE,QAAA,CAAS,UAAU,CAAA,EAAG;AAChD,UAAA,IAAA,CAAK,WAAA,CAAY,IAAI,CAAA,CAAE,IAAA,CAAK,UAAU,CAAA;AAAA,QACxC;AAAA,MACF;AAAA,MAEA,gBAAA,CAAiB,MAAY,UAAA,EAA8B;AACzD,QAAA,IAAI,IAAA,CAAK,WAAA,CAAY,IAAI,CAAA,EAAG;AAC1B,UAAA,IAAA,CAAK,WAAA,CAAY,IAAI,CAAA,GAAI,IAAA,CAAK,WAAA,CAAY,IAAI,CAAA,CAAE,MAAA,CAAO,CAAA,CAAA,KAAK,CAAA,KAAM,UAAU,CAAA;AAAA,QAC9E;AAAA,MACF;AAAA,MAEA,eAAe,IAAA,EAA0B;AACvC,QAAA,OAAO,IAAA,CAAK,WAAA,CAAY,IAAI,CAAA,IAAK,EAAC;AAAA,MACpC;AAAA,MAEA,aAAA,CAAc,MAAY,kBAAA,EAAyC;AACjE,QAAA,MAAM,eAAA,GAAkB,IAAA,CAAK,cAAA,CAAe,IAAI,CAAA;AAEhD,QAAA,IAAI,eAAA,CAAgB,QAAA,CAAS,GAAG,CAAA,EAAG;AACjC,UAAA,OAAO,IAAA;AAAA,QACT;AAEA,QAAA,IAAI,eAAA,CAAgB,QAAA,CAAS,kBAAkB,CAAA,EAAG;AAChD,UAAA,OAAO,IAAA;AAAA,QACT;AAEA,QAAA,MAAM,CAAC,cAAA,EAAgB,aAAa,CAAA,GAAI,kBAAA,CAAmB,MAAM,GAAG,CAAA;AAEpE,QAAA,KAAA,MAAW,QAAQ,eAAA,EAAiB;AAClC,UAAA,MAAM,CAAC,MAAA,EAAQ,KAAK,CAAA,GAAI,IAAA,CAAK,MAAM,GAAG,CAAA;AAEtC,UAAA,IAAI,MAAA,KAAW,GAAA,KAAQ,KAAA,KAAU,GAAA,IAAO,UAAU,aAAA,CAAA,EAAgB;AAChE,YAAA,OAAO,IAAA;AAAA,UACT;AAEA,UAAA,IAAI,MAAA,KAAW,cAAA,KAAmB,KAAA,KAAU,GAAA,IAAO,UAAU,aAAA,CAAA,EAAgB;AAC3E,YAAA,OAAO,IAAA;AAAA,UACT;AAAA,QACF;AAEA,QAAA,OAAO,KAAA;AAAA,MACT;AAAA,MAEA,OAAA,CAAQ,UAAgB,YAAA,EAA6B;AACnD,QAAA,MAAM,SAAA,GAAoB,CAAC,OAAA,EAAS,MAAA,EAAQ,OAAO,CAAA;AACnD,QAAA,MAAM,SAAA,GAAY,SAAA,CAAU,OAAA,CAAQ,QAAe,CAAA;AACnD,QAAA,MAAM,aAAA,GAAgB,SAAA,CAAU,OAAA,CAAQ,YAAmB,CAAA;AAE3D,QAAA,IAAI,SAAA,KAAc,EAAA,IAAM,aAAA,KAAkB,EAAA,EAAI;AAC5C,UAAA,OAAO,QAAA,KAAa,YAAA;AAAA,QACtB;AAEA,QAAA,OAAO,SAAA,IAAa,aAAA;AAAA,MACtB;AAAA,MAEA,UAAU,UAAA,EAAwB;AAChC,QAAA,OAAO,CAAC,IAAA,KAAwB,IAAA,CAAK,aAAA,CAAc,MAAM,UAAU,CAAA;AAAA,MACrE;AAAA,MAEA,cAAc,YAAA,EAAoB;AAChC,QAAA,OAAO,CAAC,IAAA,KAAwB,IAAA,CAAK,OAAA,CAAQ,MAAM,YAAY,CAAA;AAAA,MACjE;AAAA,KACF;AAEO,IAAME,mBAAA,GAAc,IAAID,mBAAA,EAAY;AAAA,EAAA;AAAA,CAAA,CAAA;;;ACjF3C,UAAA,EAAA;ACEO,IAAM,SAAA,GAAYE,MAAE,MAAA,CAAO;AAAA,EAChC,QAAA,EAAUA,KAAA,CAAE,IAAA,CAAK,CAAC,aAAA,EAAe,cAAc,MAAM,CAAC,CAAA,CAAE,OAAA,CAAQ,aAAa,CAAA;AAAA,EAC7E,IAAA,EAAMA,KAAA,CAAE,MAAA,EAAO,CAAE,QAAQ,MAAM,CAAA;AAAA,EAC/B,YAAA,EAAcA,KAAA,CAAE,MAAA,EAAO,CAAE,QAAA,EAAS;AAAA,EAClC,SAAA,EAAWA,KAAA,CAAE,MAAA,EAAO,CAAE,QAAQ,wBAAwB,CAAA;AAAA,EACtD,YAAYA,KAAA,CAAE,MAAA,GAAS,GAAA,CAAI,EAAE,EAAE,QAAA,EAAS;AAAA,EACxC,cAAA,EAAgBA,KAAA,CAAE,MAAA,EAAO,CAAE,QAAQ,IAAI,CAAA;AAAA,EACvC,oBAAoBA,KAAA,CAAE,MAAA,GAAS,GAAA,CAAI,EAAE,EAAE,QAAA,EAAS;AAAA,EAChD,sBAAA,EAAwBA,KAAA,CAAE,MAAA,EAAO,CAAE,QAAQ,KAAK,CAAA;AAAA,EAChD,gBAAA,EAAkBA,KAAA,CAAE,MAAA,EAAO,CAAE,QAAA,EAAS;AAAA,EACtC,oBAAA,EAAsBA,KAAA,CAAE,MAAA,EAAO,CAAE,QAAA,EAAS;AAAA,EAC1C,mBAAA,EAAqBA,KAAA,CAAE,MAAA,EAAO,CAAE,QAAA,EAAS;AAAA,EACzC,SAAA,EAAWA,KAAA,CAAE,MAAA,EAAO,CAAE,QAAA,EAAS;AAAA,EAC/B,SAAA,EAAWA,KAAA,CAAE,MAAA,EAAO,CAAE,QAAQ,KAAK,CAAA;AAAA,EACnC,SAAA,EAAWA,KAAA,CAAE,MAAA,EAAO,CAAE,QAAA,EAAS;AAAA,EAC/B,SAAA,EAAWA,KAAA,CAAE,MAAA,EAAO,CAAE,QAAA,EAAS;AAAA,EAC/B,SAAA,EAAWA,KAAA,CAAE,MAAA,EAAO,CAAE,QAAA,EAAS;AAAA,EAC/B,kBAAA,EAAoBA,KAAA,CAAE,MAAA,EAAO,CAAE,QAAA,EAAS;AAAA,EACxC,iBAAA,EAAmBA,KAAA,CAAE,MAAA,EAAO,CAAE,QAAA,EAAS;AAAA,EACvC,mBAAA,EAAqBA,KAAA,CAAE,MAAA,EAAO,CAAE,QAAA,EAAS;AAAA,EACzC,iBAAA,EAAmBA,KAAA,CAAE,MAAA,EAAO,CAAE,QAAA,EAAS;AAAA,EACvC,iBAAA,EAAmBA,KAAA,CAAE,MAAA,EAAO,CAAE,QAAQ,IAAI,CAAA;AAAA,EAC1C,gBAAA,EAAkBA,KAAA,CAAE,MAAA,EAAO,CAAE,QAAQ,KAAK,CAAA;AAAA,EAC1C,SAAA,EAAWA,KAAA,CAAE,IAAA,CAAK,CAAC,OAAA,EAAS,OAAA,EAAS,MAAA,EAAQ,MAAA,EAAQ,OAAA,EAAS,OAAO,CAAC,CAAA,CAAE,QAAQ,MAAM;AACxF,CAAC,CAAA;AAUD,IAAM,gBAAN,MAAoB;AAAA,EACV,MAAA,GAA2B,IAAA;AAAA,EAC3B,MAAA;AAAA,EACA,QAAA;AAAA,EAER,WAAA,CAAY,OAAA,GAAyB,EAAC,EAAG;AACvC,IAAA,IAAA,CAAK,MAAA,GAAS,QAAQ,MAAA,IAAU,SAAA;AAChC,IAAA,IAAA,CAAK,QAAA,GAAW,QAAQ,QAAA,IAAY,IAAA;AAAA,EACtC;AAAA,EAEA,IAAA,GAAkB;AAChB,IAAA,IAAI,IAAA,CAAK,MAAA,EAAQ,OAAO,IAAA,CAAK,MAAA;AAE7B,IAAA,MAAM,MAA0C,EAAC;AAEjD,IAAA,KAAA,MAAW,OAAO,MAAA,CAAO,IAAA,CAAK,IAAA,CAAK,MAAA,CAAO,KAAK,CAAA,EAAG;AAChD,MAAA,GAAA,CAAI,GAAG,CAAA,GAAI,OAAA,CAAQ,GAAA,CAAI,GAAG,CAAA;AAAA,IAC5B;AAEA,IAAA,IAAI,KAAK,QAAA,EAAU;AACjB,MAAA,MAAM,MAAA,GAAS,IAAA,CAAK,MAAA,CAAO,SAAA,CAAU,GAAG,CAAA;AACxC,MAAA,IAAI,CAAC,OAAO,OAAA,EAAS;AACnB,QAAA,MAAM,SAAS,MAAA,CAAO,KAAA,CAAM,OAAO,GAAA,CAAI,CAAA,CAAA,KAAK,GAAG,CAAA,CAAE,IAAA,CAAK,IAAA,CAAK,GAAG,CAAC,CAAA,EAAA,EAAK,CAAA,CAAE,OAAO,CAAA,CAAE,CAAA,CAAE,KAAK,IAAI,CAAA;AAC1F,QAAA,MAAM,IAAI,KAAA,CAAM,CAAA,0BAAA,EAA6B,MAAM,CAAA,CAAE,CAAA;AAAA,MACvD;AACA,MAAA,IAAA,CAAK,SAAS,MAAA,CAAO,IAAA;AAAA,IACvB,CAAA,MAAO;AACL,MAAA,IAAA,CAAK,MAAA,GAAS,GAAA;AAAA,IAChB;AAEA,IAAA,OAAO,IAAA,CAAK,MAAA;AAAA,EACd;AAAA,EAEA,IAA+B,GAAA,EAAsB;AACnD,IAAA,IAAI,CAAC,IAAA,CAAK,MAAA,EAAQ,IAAA,CAAK,IAAA,EAAK;AAC5B,IAAA,OAAO,IAAA,CAAK,OAAQ,GAAG,CAAA;AAAA,EACzB;AAAA,EAEA,IAAI,GAAA,EAA8B;AAChC,IAAA,MAAM,KAAA,GAAQ,IAAA,CAAK,GAAA,CAAI,GAAG,CAAA;AAC1B,IAAA,IAAI,OAAO,KAAA,KAAU,QAAA,EAAU,OAAO,QAAA,CAAS,OAAO,EAAE,CAAA;AACxD,IAAA,OAAO,OAAO,KAAK,CAAA;AAAA,EACrB;AAAA,EAEA,KAAK,GAAA,EAA+B;AAClC,IAAA,MAAM,KAAA,GAAQ,IAAA,CAAK,GAAA,CAAI,GAAG,CAAA;AAC1B,IAAA,IAAI,OAAO,KAAA,KAAU,SAAA,EAAW,OAAO,KAAA;AACvC,IAAA,IAAI,OAAO,KAAA,KAAU,QAAA,EAAU,OAAO,KAAA,CAAM,aAAY,KAAM,MAAA;AAC9D,IAAA,OAAO,QAAQ,KAAK,CAAA;AAAA,EACtB;AAAA,EAEA,YAAA,GAAwB;AACtB,IAAA,OAAO,IAAA,CAAK,GAAA,CAAI,UAAU,CAAA,KAAM,YAAA;AAAA,EAClC;AAAA,EAEA,aAAA,GAAyB;AACvB,IAAA,OAAO,IAAA,CAAK,GAAA,CAAI,UAAU,CAAA,KAAM,aAAA;AAAA,EAClC;AAAA,EAEA,MAAA,GAAkB;AAChB,IAAA,OAAO,IAAA,CAAK,GAAA,CAAI,UAAU,CAAA,KAAM,MAAA;AAAA,EAClC;AAAA,EAEA,MAAA,GAAoB;AAClB,IAAA,IAAI,CAAC,IAAA,CAAK,MAAA,EAAQ,IAAA,CAAK,IAAA,EAAK;AAC5B,IAAA,OAAO,IAAA,CAAK,MAAA;AAAA,EACd;AACF,CAAA;AAEA,IAAM,YAAA,GAAe,IAAI,aAAA,EAAc;AAEhC,IAAM,MAAA,GAAS;AAAA,EACpB,IAAA,EAAM,MAAM,YAAA,CAAa,IAAA,EAAK;AAAA,EAC9B,GAAA,EAAK,CAA4B,GAAA,KAAW,YAAA,CAAa,IAAI,GAAG,CAAA;AAAA,EAChE,GAAA,EAAK,CAAC,GAAA,KAAyB,YAAA,CAAa,IAAI,GAAG,CAAA;AAAA,EACnD,IAAA,EAAM,CAAC,GAAA,KAAyB,YAAA,CAAa,KAAK,GAAG,CAAA;AAAA,EACrD,YAAA,EAAc,MAAM,YAAA,CAAa,YAAA,EAAa;AAAA,EAC9C,aAAA,EAAe,MAAM,YAAA,CAAa,aAAA,EAAc;AAAA,EAChD,MAAA,EAAQ,MAAM,YAAA,CAAa,MAAA,EAAO;AAAA,EAClC,MAAA,EAAQ,MAAM,YAAA,CAAa,MAAA,EAAO;AAAA,EAClC,MAAA,EAAQ,CAAC,OAAA,KAA4B,IAAI,cAAc,OAAO;AAChE,CAAA;;;ACjHO,IAAM,aAAN,MAAiB;AAAA,EACd,MAAA;AAAA,EACA,SAAA;AAAA,EACA,aAAA;AAAA,EACA,gBAAA;AAAA,EAER,WAAA,CAAY,OAAA,GAA4G,EAAC,EAAG;AAC1H,IAAA,IAAA,CAAK,SAAS,OAAA,CAAQ,SAAA,IAAa,MAAA,CAAO,GAAA,CAAI,YAAY,CAAA,IAAK,qCAAA;AAC/D,IAAA,IAAA,CAAK,YAAY,OAAA,CAAQ,YAAA,IAAgB,MAAA,CAAO,GAAA,CAAI,gBAAgB,CAAA,IAAK,IAAA;AACzE,IAAA,IAAA,CAAK,gBAAgB,OAAA,CAAQ,aAAA,IAAiB,OAAO,GAAA,CAAI,oBAAoB,KAAK,IAAA,CAAK,MAAA;AACvF,IAAA,IAAA,CAAK,mBAAmB,OAAA,CAAQ,gBAAA,IAAoB,MAAA,CAAO,GAAA,CAAI,wBAAwB,CAAA,IAAK,KAAA;AAAA,EAC9F;AAAA,EAEA,cAAc,OAAA,EAA6B;AACzC,IAAA,OAAOC,oBAAA,CAAI,KAAK,OAAA,EAAS,IAAA,CAAK,QAAQ,EAAE,SAAA,EAAW,IAAA,CAAK,SAAA,EAAW,CAAA;AAAA,EACrE;AAAA,EAEA,qBAAqB,OAAA,EAA6B;AAChD,IAAA,OAAOA,oBAAA,CAAI,KAAK,OAAA,EAAS,IAAA,CAAK,eAAe,EAAE,SAAA,EAAW,IAAA,CAAK,gBAAA,EAAkB,CAAA;AAAA,EACnF;AAAA,EAEA,kBAAkB,OAAA,EAAgC;AAChD,IAAA,OAAO;AAAA,MACL,WAAA,EAAa,IAAA,CAAK,aAAA,CAAc,OAAO,CAAA;AAAA,MACvC,YAAA,EAAc,IAAA,CAAK,oBAAA,CAAqB,OAAO;AAAA,KACjD;AAAA,EACF;AAAA,EAEA,YAAY,KAAA,EAA2B;AACrC,IAAA,OAAOA,oBAAA,CAAI,MAAA,CAAO,KAAA,EAAO,IAAA,CAAK,MAAM,CAAA;AAAA,EACtC;AAAA,EAEA,mBAAmB,KAAA,EAA2B;AAC5C,IAAA,OAAOA,oBAAA,CAAI,MAAA,CAAO,KAAA,EAAO,IAAA,CAAK,aAAa,CAAA;AAAA,EAC7C;AAAA,EAEA,cAAc,YAAA,EAAiC;AAC7C,IAAA,MAAM,OAAA,GAAU,IAAA,CAAK,kBAAA,CAAmB,YAAY,CAAA;AACpD,IAAA,OAAO,IAAA,CAAK,kBAAkB,OAAO,CAAA;AAAA,EACvC;AACF;AAEO,IAAM,UAAA,GAAa,IAAI,UAAA;;;AF5C9B,SAAA,EAAA;;;AGQO,IAAM,eAAN,MAAmB;AAAA,EAChB,SAAA,uBAA4C,GAAA,EAAI;AAAA,EAExD,WAAA,GAAc;AACZ,IAAA,MAAM,cAAA,GAAiB,MAAA,CAAO,GAAA,CAAI,kBAAkB,CAAA;AACpD,IAAA,MAAM,kBAAA,GAAqB,MAAA,CAAO,GAAA,CAAI,sBAAsB,CAAA;AAC5D,IAAA,MAAM,iBAAA,GAAoB,MAAA,CAAO,GAAA,CAAI,qBAAqB,CAAA;AAE1D,IAAA,IAAI,cAAA,IAAkB,sBAAsB,iBAAA,EAAmB;AAC7D,MAAA,IAAA,CAAK,iBAAiB,QAAA,EAAU;AAAA,QAC9B,IAAA,EAAM,QAAA;AAAA,QACN,QAAA,EAAU,cAAA;AAAA,QACV,YAAA,EAAc,kBAAA;AAAA,QACd,WAAA,EAAa,iBAAA;AAAA,QACb,gBAAA,EAAkB,8CAAA;AAAA,QAClB,QAAA,EAAU,qCAAA;AAAA,QACV,WAAA,EAAa;AAAA,OACd,CAAA;AAAA,IACH;AAAA,EACF;AAAA,EAEA,gBAAA,CAAiB,MAAc,QAAA,EAA+B;AAC5D,IAAA,IAAA,CAAK,SAAA,CAAU,GAAA,CAAI,IAAA,EAAM,QAAQ,CAAA;AAAA,EACnC;AAAA,EAEA,YAAY,IAAA,EAAyC;AACnD,IAAA,OAAO,IAAA,CAAK,SAAA,CAAU,GAAA,CAAI,IAAI,CAAA;AAAA,EAChC;AAAA,EAEA,mBAAA,CAAoB,cAAsB,KAAA,EAAwB;AAChE,IAAA,MAAM,QAAA,GAAW,IAAA,CAAK,WAAA,CAAY,YAAY,CAAA;AAC9C,IAAA,IAAI,CAAC,QAAA,EAAU;AACb,MAAA,MAAM,IAAI,KAAA,CAAM,CAAA,eAAA,EAAkB,YAAY,CAAA,eAAA,CAAiB,CAAA;AAAA,IACjE;AAEA,IAAA,MAAM,MAAA,GAAS,IAAI,eAAA,CAAgB;AAAA,MACjC,WAAW,QAAA,CAAS,QAAA;AAAA,MACpB,cAAc,QAAA,CAAS,WAAA;AAAA,MACvB,aAAA,EAAe,MAAA;AAAA,MACf,KAAA,EAAO,sBAAA;AAAA,MACP,OAAO,KAAA,IAAS;AAAA,KACjB,CAAA;AAED,IAAA,OAAO,GAAG,QAAA,CAAS,gBAAgB,CAAA,CAAA,EAAI,MAAA,CAAO,UAAU,CAAA,CAAA;AAAA,EAC1D;AAAA,EAEA,MAAM,YAAA,CAAa,YAAA,EAAsB,IAAA,EAAuE;AAC9G,IAAA,MAAM,QAAA,GAAW,IAAA,CAAK,WAAA,CAAY,YAAY,CAAA;AAC9C,IAAA,IAAI,CAAC,QAAA,EAAU;AACb,MAAA,MAAM,IAAI,KAAA,CAAM,CAAA,eAAA,EAAkB,YAAY,CAAA,eAAA,CAAiB,CAAA;AAAA,IACjE;AAEA,IAAA,MAAM,QAAA,GAAW,MAAM,KAAA,CAAM,QAAA,CAAS,QAAA,EAAU;AAAA,MAC9C,MAAA,EAAQ,MAAA;AAAA,MACR,OAAA,EAAS;AAAA,QACP,cAAA,EAAgB;AAAA,OAClB;AAAA,MACA,IAAA,EAAM,IAAI,eAAA,CAAgB;AAAA,QACxB,WAAW,QAAA,CAAS,QAAA;AAAA,QACpB,eAAe,QAAA,CAAS,YAAA;AAAA,QACxB,IAAA;AAAA,QACA,UAAA,EAAY,oBAAA;AAAA,QACZ,cAAc,QAAA,CAAS;AAAA,OACxB;AAAA,KACF,CAAA;AAED,IAAA,IAAI,CAAC,SAAS,EAAA,EAAI;AAChB,MAAA,MAAM,KAAA,GAAQ,MAAM,QAAA,CAAS,IAAA,EAAK;AAClC,MAAA,MAAM,IAAI,KAAA,CAAM,CAAA,6BAAA,EAAgC,KAAK,CAAA,CAAE,CAAA;AAAA,IACzD;AAEA,IAAA,MAAM,IAAA,GAAO,MAAM,QAAA,CAAS,IAAA,EAAK;AACjC,IAAA,OAAO;AAAA,MACL,aAAa,IAAA,CAAK,YAAA;AAAA,MAClB,cAAc,IAAA,CAAK;AAAA,KACrB;AAAA,EACF;AAAA,EAEA,MAAM,WAAA,CAAY,YAAA,EAAsB,WAAA,EAA6C;AACnF,IAAA,MAAM,QAAA,GAAW,IAAA,CAAK,WAAA,CAAY,YAAY,CAAA;AAC9C,IAAA,IAAI,CAAC,QAAA,EAAU;AACb,MAAA,MAAM,IAAI,KAAA,CAAM,CAAA,eAAA,EAAkB,YAAY,CAAA,eAAA,CAAiB,CAAA;AAAA,IACjE;AAEA,IAAA,MAAM,QAAA,GAAW,MAAM,KAAA,CAAM,QAAA,CAAS,WAAA,EAAa;AAAA,MACjD,OAAA,EAAS;AAAA,QACP,aAAA,EAAe,UAAU,WAAW,CAAA;AAAA;AACtC,KACD,CAAA;AAED,IAAA,IAAI,CAAC,SAAS,EAAA,EAAI;AAChB,MAAA,MAAM,KAAA,GAAQ,MAAM,QAAA,CAAS,IAAA,EAAK;AAClC,MAAA,MAAM,IAAI,KAAA,CAAM,CAAA,8BAAA,EAAiC,KAAK,CAAA,CAAE,CAAA;AAAA,IAC1D;AAEA,IAAA,MAAM,IAAA,GAAO,MAAM,QAAA,CAAS,IAAA,EAAK;AAEjC,IAAA,OAAO;AAAA,MACL,IAAI,IAAA,CAAK,EAAA;AAAA,MACT,OAAO,IAAA,CAAK,KAAA;AAAA,MACZ,MAAM,IAAA,CAAK,IAAA;AAAA,MACX,SAAS,IAAA,CAAK;AAAA,KAChB;AAAA,EACF;AACF;AAEO,IAAM,YAAA,GAAe,IAAI,YAAA;AChHhC,SAAA,EAAA;AAwBA,IAAM,oBAAN,MAA6C;AAAA,EACnC,KAAA,uBAA+B,GAAA,EAAI;AAAA,EAE3C,MAAM,YAAY,KAAA,EAAqC;AACrD,IAAA,KAAA,MAAW,IAAA,IAAQ,IAAA,CAAK,KAAA,CAAM,MAAA,EAAO,EAAG;AACtC,MAAA,IAAI,IAAA,CAAK,KAAA,KAAU,KAAA,EAAO,OAAO,IAAA;AAAA,IACnC;AACA,IAAA,OAAO,IAAA;AAAA,EACT;AAAA,EAEA,MAAM,SAAS,EAAA,EAAkC;AAC/C,IAAA,OAAO,IAAA,CAAK,KAAA,CAAM,GAAA,CAAI,EAAE,CAAA,IAAK,IAAA;AAAA,EAC/B;AAAA,EAEA,MAAM,OAAO,IAAA,EAAmC;AAC9C,IAAA,MAAM,EAAA,GAAK,KAAK,MAAA,EAAO,CAAE,SAAS,EAAE,CAAA,CAAE,MAAA,CAAO,CAAA,EAAG,CAAC,CAAA;AACjD,IAAA,MAAM,iBAAiB,MAAMC,uBAAA,CAAO,IAAA,CAAK,IAAA,CAAK,UAAU,EAAE,CAAA;AAC1D,IAAA,MAAM,IAAA,GAAa;AAAA,MACjB,EAAA;AAAA,MACA,OAAO,IAAA,CAAK,KAAA;AAAA,MACZ,QAAA,EAAU,cAAA;AAAA,MACV,IAAA,EAAM,KAAK,IAAA,IAAQ,MAAA;AAAA,MACnB,MAAM,IAAA,CAAK;AAAA,KACb;AACA,IAAA,IAAA,CAAK,KAAA,CAAM,GAAA,CAAI,EAAA,EAAI,IAAI,CAAA;AACvB,IAAA,OAAO,IAAA;AAAA,EACT;AAAA,EAEA,MAAM,MAAA,CAAO,EAAA,EAAY,IAAA,EAAoC;AAC3D,IAAA,MAAM,IAAA,GAAO,IAAA,CAAK,KAAA,CAAM,GAAA,CAAI,EAAE,CAAA;AAC9B,IAAA,IAAI,CAAC,IAAA,EAAM,MAAM,IAAI,MAAM,gBAAgB,CAAA;AAC3C,IAAA,MAAM,OAAA,GAAU,EAAE,GAAG,IAAA,EAAM,GAAG,IAAA,EAAK;AACnC,IAAA,IAAA,CAAK,KAAA,CAAM,GAAA,CAAI,EAAA,EAAI,OAAO,CAAA;AAC1B,IAAA,OAAO,OAAA;AAAA,EACT;AACF,CAAA;AAEO,IAAM,cAAN,MAAkB;AAAA,EACf,SAAA;AAAA,EACA,OAAA;AAAA,EACA,WAAA,GAAuB,KAAA;AAAA,EAE/B,WAAA,CAAY,OAAA,GAAuB,EAAC,EAAG,SAAA,EAAuB;AAC5D,IAAA,IAAA,CAAK,OAAA,GAAU;AAAA,MACb,SAAA,EAAW,OAAA,CAAQ,SAAA,IAAa,OAAA,CAAQ,IAAI,UAAA,IAAc,qCAAA;AAAA,MAC1D,YAAA,EAAc,QAAQ,YAAA,IAAgB,IAAA;AAAA,MACtC,aAAA,EAAe,OAAA,CAAQ,aAAA,IAAiB,OAAA,CAAQ,IAAI,kBAAA,IAAsB,qCAAA;AAAA,MAC1E,gBAAA,EAAkB,QAAQ,gBAAA,IAAoB,KAAA;AAAA,MAC9C,cAAA,EAAgB,OAAA,CAAQ,cAAA,IAAkB,OAAA,CAAQ,IAAI,gBAAA,IAAoB,EAAA;AAAA,MAC1E,kBAAA,EAAoB,OAAA,CAAQ,kBAAA,IAAsB,OAAA,CAAQ,IAAI,oBAAA,IAAwB,EAAA;AAAA,MACtF,iBAAA,EAAmB,OAAA,CAAQ,iBAAA,IAAqB,OAAA,CAAQ,IAAI,mBAAA,IAAuB;AAAA,KACrF;AAEA,IAAA,IAAA,CAAK,SAAA,GAAY,SAAA,IAAa,IAAI,iBAAA,EAAkB;AAAA,EACtD;AAAA,EAEA,MAAM,UAAA,GAA4B;AAChC,IAAA,IAAI,IAAA,CAAK,QAAQ,cAAA,IAAkB,IAAA,CAAK,QAAQ,kBAAA,IAAsB,IAAA,CAAK,QAAQ,iBAAA,EAAmB;AACpG,MAAA,YAAA,CAAa,iBAAiB,QAAA,EAAU;AAAA,QACtC,IAAA,EAAM,QAAA;AAAA,QACN,QAAA,EAAU,KAAK,OAAA,CAAQ,cAAA;AAAA,QACvB,YAAA,EAAc,KAAK,OAAA,CAAQ,kBAAA;AAAA,QAC3B,WAAA,EAAa,KAAK,OAAA,CAAQ,iBAAA;AAAA,QAC1B,gBAAA,EAAkB,8CAAA;AAAA,QAClB,QAAA,EAAU,qCAAA;AAAA,QACV,WAAA,EAAa;AAAA,OACd,CAAA;AAAA,IACH;AACA,IAAA,IAAA,CAAK,WAAA,GAAc,IAAA;AAAA,EACrB;AAAA,EAEA,MAAM,SAAS,IAAA,EAAoG;AACjH,IAAA,MAAM,WAAW,MAAM,IAAA,CAAK,SAAA,CAAU,WAAA,CAAY,KAAK,KAAK,CAAA;AAC5D,IAAA,IAAI,QAAA,EAAU;AACZ,MAAA,MAAM,IAAI,MAAM,qBAAqB,CAAA;AAAA,IACvC;AAEA,IAAA,MAAM,IAAA,GAAO,MAAM,IAAA,CAAK,SAAA,CAAU,OAAO,IAAI,CAAA;AAC7C,IAAA,MAAM,MAAA,GAAS,WAAW,iBAAA,CAAkB;AAAA,MAC1C,QAAQ,IAAA,CAAK,EAAA;AAAA,MACb,OAAO,IAAA,CAAK,KAAA;AAAA,MACZ,MAAM,IAAA,CAAK;AAAA,KACZ,CAAA;AAED,IAAA,OAAO,EAAE,MAAM,MAAA,EAAO;AAAA,EACxB;AAAA,EAEA,MAAM,MAAM,WAAA,EAA+G;AACzH,IAAA,MAAM,OAAO,MAAM,IAAA,CAAK,SAAA,CAAU,WAAA,CAAY,YAAY,KAAK,CAAA;AAC/D,IAAA,IAAI,CAAC,IAAA,IAAQ,CAAC,IAAA,CAAK,QAAA,EAAU;AAC3B,MAAA,MAAM,IAAI,MAAM,qBAAqB,CAAA;AAAA,IACvC;AAEA,IAAA,MAAM,UAAU,MAAMA,uBAAA,CAAO,QAAQ,WAAA,CAAY,QAAA,EAAU,KAAK,QAAQ,CAAA;AACxE,IAAA,IAAI,CAAC,OAAA,EAAS;AACZ,MAAA,MAAM,IAAI,MAAM,qBAAqB,CAAA;AAAA,IACvC;AAEA,IAAA,MAAM,MAAA,GAAS,WAAW,iBAAA,CAAkB;AAAA,MAC1C,QAAQ,IAAA,CAAK,EAAA;AAAA,MACb,OAAO,IAAA,CAAK,KAAA;AAAA,MACZ,MAAM,IAAA,CAAK;AAAA,KACZ,CAAA;AAED,IAAA,OAAO,EAAE,MAAM,MAAA,EAAO;AAAA,EACxB;AAAA,EAEA,MAAM,QAAQ,YAAA,EAA8E;AAC1F,IAAA,OAAO,UAAA,CAAW,cAAc,YAAY,CAAA;AAAA,EAC9C;AAAA,EAEA,MAAM,iBAAiB,KAAA,EAAiC;AACtD,IAAA,OAAO,YAAA,CAAa,mBAAA,CAAoB,QAAA,EAAU,KAAK,CAAA;AAAA,EACzD;AAAA,EAEA,MAAM,qBAAqB,IAAA,EAA8F;AACvH,IAAA,MAAM,EAAE,WAAA,EAAY,GAAI,MAAM,YAAA,CAAa,YAAA,CAAa,UAAU,IAAI,CAAA;AACtE,IAAA,MAAM,QAAA,GAAW,MAAM,YAAA,CAAa,WAAA,CAAY,UAAU,WAAW,CAAA;AAErE,IAAA,IAAI,OAAO,MAAM,IAAA,CAAK,SAAA,CAAU,WAAA,CAAY,SAAS,KAAK,CAAA;AAE1D,IAAA,IAAI,CAAC,IAAA,EAAM;AACT,MAAA,IAAA,GAAO,MAAM,IAAA,CAAK,SAAA,CAAU,MAAA,CAAO;AAAA,QACjC,OAAO,QAAA,CAAS,KAAA;AAAA,QAChB,QAAA,EAAU,KAAK,MAAA,EAAO,CAAE,SAAS,EAAE,CAAA,CAAE,MAAA,CAAO,CAAA,EAAG,EAAE,CAAA;AAAA,QACjD,MAAM,QAAA,CAAS,IAAA;AAAA,QACf,IAAA,EAAM;AAAA,OACP,CAAA;AAAA,IACH;AAEA,IAAA,MAAM,MAAA,GAAS,WAAW,iBAAA,CAAkB;AAAA,MAC1C,QAAQ,IAAA,CAAK,EAAA;AAAA,MACb,OAAO,IAAA,CAAK,KAAA;AAAA,MACZ,MAAM,IAAA,CAAK;AAAA,KACZ,CAAA;AAED,IAAA,OAAO,EAAE,MAAM,MAAA,EAAO;AAAA,EACxB;AAAA,EAEA,aAAA,GAAgC;AAC9B,IAAA,OAAO,CAAC,GAAA,EAAc,GAAA,EAAe,IAAA,KAAuB;AAC1D,MAAA,MAAM,UAAA,GAAa,IAAI,OAAA,CAAQ,aAAA;AAE/B,MAAA,IAAI,CAAC,UAAA,IAAc,CAAC,UAAA,CAAW,UAAA,CAAW,SAAS,CAAA,EAAG;AACpD,QAAA,OAAO,GAAA,CAAI,OAAO,GAAG,CAAA,CAAE,KAAK,EAAE,KAAA,EAAO,qBAAqB,CAAA;AAAA,MAC5D;AAEA,MAAA,MAAM,KAAA,GAAQ,UAAA,CAAW,SAAA,CAAU,CAAC,CAAA;AAEpC,MAAA,IAAI;AACF,QAAA,MAAM,OAAA,GAAU,UAAA,CAAW,WAAA,CAAY,KAAK,CAAA;AAC5C,QAAA,GAAA,CAAI,IAAA,GAAO;AAAA,UACT,GAAG,OAAA;AAAA,UACH,IAAI,OAAA,CAAQ;AAAA,SACd;AACA,QAAA,IAAA,EAAK;AAAA,MACP,SAAS,KAAA,EAAO;AACd,QAAA,OAAO,GAAA,CAAI,OAAO,GAAG,CAAA,CAAE,KAAK,EAAE,KAAA,EAAO,iBAAiB,CAAA;AAAA,MACxD;AAAA,IACF,CAAA;AAAA,EACF;AAAA,EAEA,WAAA,GAA8B;AAC5B,IAAA,OAAO,CAAC,GAAA,EAAc,GAAA,EAAe,IAAA,KAAuB;AAC1D,MAAA,IAAI,CAAC,IAAI,IAAA,EAAM;AACb,QAAA,OAAO,GAAA,CAAI,OAAO,GAAG,CAAA,CAAE,KAAK,EAAE,KAAA,EAAO,2BAA2B,CAAA;AAAA,MAClE;AACA,MAAA,IAAA,EAAK;AAAA,IACP,CAAA;AAAA,EACF;AAAA,EAEA,YAAY,IAAA,EAA8B;AACxC,IAAA,OAAO,CAAC,GAAA,EAAc,GAAA,EAAe,IAAA,KAAuB;AAC1D,MAAA,IAAI,CAAC,IAAI,IAAA,EAAM;AACb,QAAA,OAAO,GAAA,CAAI,OAAO,GAAG,CAAA,CAAE,KAAK,EAAE,KAAA,EAAO,2BAA2B,CAAA;AAAA,MAClE;AACA,MAAA,IAAI,CAACH,mBAAA,CAAY,OAAA,CAAQ,IAAI,IAAA,CAAK,IAAA,EAAM,IAAI,CAAA,EAAG;AAC7C,QAAA,OAAO,GAAA,CAAI,OAAO,GAAG,CAAA,CAAE,KAAK,EAAE,KAAA,EAAO,4BAA4B,CAAA;AAAA,MACnE;AACA,MAAA,IAAA,EAAK;AAAA,IACP,CAAA;AAAA,EACF;AAAA,EAEA,kBAAkB,UAAA,EAAoC;AACpD,IAAA,OAAO,CAAC,GAAA,EAAc,GAAA,EAAe,IAAA,KAAuB;AAC1D,MAAA,IAAI,CAAC,IAAI,IAAA,EAAM;AACb,QAAA,OAAO,GAAA,CAAI,OAAO,GAAG,CAAA,CAAE,KAAK,EAAE,KAAA,EAAO,2BAA2B,CAAA;AAAA,MAClE;AACA,MAAA,IAAI,CAACA,mBAAA,CAAY,aAAA,CAAc,IAAI,IAAA,CAAK,IAAA,EAAM,UAAU,CAAA,EAAG;AACzD,QAAA,OAAO,GAAA,CAAI,OAAO,GAAG,CAAA,CAAE,KAAK,EAAE,KAAA,EAAO,4BAA4B,CAAA;AAAA,MACnE;AACA,MAAA,IAAA,EAAK;AAAA,IACP,CAAA;AAAA,EACF;AACF;AAEA,IAAI,mBAAA,GAA0C,IAAA;AAEvC,SAAS,UAAA,CAAW,SAAuB,SAAA,EAAoC;AACpF,EAAA,mBAAA,GAAsB,IAAI,WAAA,CAAY,OAAA,EAAS,SAAS,CAAA;AACxD,EAAA,OAAO,mBAAA;AACT;AAEO,SAAS,IAAA,GAAoB;AAClC,EAAA,IAAI,CAAC,mBAAA,EAAqB;AACxB,IAAA,mBAAA,GAAsB,IAAI,WAAA,EAAY;AAAA,EACxC;AACA,EAAA,OAAO,mBAAA;AACT;AAEO,IAAM,IAAA,GAAO;AAAA,EAClB,UAAA,EAAY,CAAC,OAAA,KAA0B;AACrC,IAAA,MAAM,OAAA,GAAU,WAAW,OAAO,CAAA;AAClC,IAAA,OAAO;AAAA,MACL,OAAA;AAAA,MACA,aAAA,EAAe,MAAM,OAAA,CAAQ,aAAA,EAAc;AAAA,MAC3C,WAAA,EAAa,MAAM,OAAA,CAAQ,WAAA,EAAY;AAAA,MACvC,WAAA,EAAa,CAAC,IAAA,KAAiB,OAAA,CAAQ,YAAY,IAAI,CAAA;AAAA,MACvD,iBAAA,EAAmB,CAAC,UAAA,KAAuB,OAAA,CAAQ,kBAAkB,UAAU;AAAA,KACjF;AAAA,EACF;AACF;;;AC/OO,SAAS,kBAAA,CAAmB,OAAA,EAA0B,OAAA,EAAuC,IAAA,EAA+B;AACjI,EAAA,MAAM,EAAE,aAAY,GAAI,OAAA;AAExB,EAAA,OAAA,CAAQ,QAAA,CAAS,cAAA,EAAgB,OAAO,OAAA,EAAyB,KAAA,KAAwB;AACvF,IAAA,MAAM,UAAA,GAAa,QAAQ,OAAA,CAAQ,aAAA;AAEnC,IAAA,IAAI,CAAC,UAAA,IAAc,CAAC,UAAA,CAAW,UAAA,CAAW,SAAS,CAAA,EAAG;AACpD,MAAA,OAAO,KAAA,CAAM,OAAO,GAAG,CAAA,CAAE,KAAK,EAAE,KAAA,EAAO,qBAAqB,CAAA;AAAA,IAC9D;AAEA,IAAA,MAAM,KAAA,GAAQ,UAAA,CAAW,SAAA,CAAU,CAAC,CAAA;AAEpC,IAAA,IAAI;AACF,MAAA,MAAM,OAAA,GAAU,WAAA,CAAY,YAAY,CAAA,CAAE,YAAY,KAAK,CAAA;AAC3D,MAAA,OAAA,CAAQ,IAAA,GAAO;AAAA,QACb,GAAG,OAAA;AAAA,QACH,IAAI,OAAA,CAAQ;AAAA,OACd;AAAA,IACF,SAAS,KAAA,EAAO;AACd,MAAA,OAAO,KAAA,CAAM,OAAO,GAAG,CAAA,CAAE,KAAK,EAAE,KAAA,EAAO,iBAAiB,CAAA;AAAA,IAC1D;AAAA,EACF,CAAC,CAAA;AAED,EAAA,OAAA,CAAQ,QAAA,CAAS,aAAA,EAAe,OAAO,OAAA,EAAyB,KAAA,KAAwB;AACtF,IAAA,IAAI,CAAC,QAAQ,IAAA,EAAM;AACjB,MAAA,OAAO,KAAA,CAAM,OAAO,GAAG,CAAA,CAAE,KAAK,EAAE,KAAA,EAAO,2BAA2B,CAAA;AAAA,IACpE;AAAA,EACF,CAAC,CAAA;AAED,EAAA,OAAA,CAAQ,QAAA,CAAS,aAAA,EAAe,CAAC,IAAA,KAAiB;AAChD,IAAA,OAAO,OAAO,SAAyB,KAAA,KAAwB;AAC7D,MAAA,IAAI,CAAC,QAAQ,IAAA,EAAM;AACjB,QAAA,OAAO,KAAA,CAAM,OAAO,GAAG,CAAA,CAAE,KAAK,EAAE,KAAA,EAAO,2BAA2B,CAAA;AAAA,MACpE;AACA,MAAA,MAAM,EAAE,WAAA,EAAAA,YAAAA,EAAY,GAAI,MAAM,OAAA,CAAA,OAAA,EAAA,CAAA,IAAA,CAAA,OAAA,SAAA,EAAA,EAAA,YAAA,CAAA,CAAA;AAC9B,MAAA,IAAI,CAACA,YAAAA,CAAY,OAAA,CAAQ,QAAQ,IAAA,CAAK,IAAA,EAAM,IAAI,CAAA,EAAG;AACjD,QAAA,OAAO,KAAA,CAAM,OAAO,GAAG,CAAA,CAAE,KAAK,EAAE,KAAA,EAAO,4BAA4B,CAAA;AAAA,MACrE;AAAA,IACF,CAAA;AAAA,EACF,CAAC,CAAA;AAED,EAAA,OAAA,CAAQ,QAAA,CAAS,mBAAA,EAAqB,CAAC,UAAA,KAAuB;AAC5D,IAAA,OAAO,OAAO,SAAyB,KAAA,KAAwB;AAC7D,MAAA,IAAI,CAAC,QAAQ,IAAA,EAAM;AACjB,QAAA,OAAO,KAAA,CAAM,OAAO,GAAG,CAAA,CAAE,KAAK,EAAE,KAAA,EAAO,2BAA2B,CAAA;AAAA,MACpE;AACA,MAAA,MAAM,EAAE,WAAA,EAAAA,YAAAA,EAAY,GAAI,MAAM,OAAA,CAAA,OAAA,EAAA,CAAA,IAAA,CAAA,OAAA,SAAA,EAAA,EAAA,YAAA,CAAA,CAAA;AAC9B,MAAA,IAAI,CAACA,YAAAA,CAAY,aAAA,CAAc,QAAQ,IAAA,CAAK,IAAA,EAAM,UAAU,CAAA,EAAG;AAC7D,QAAA,OAAO,KAAA,CAAM,OAAO,GAAG,CAAA,CAAE,KAAK,EAAE,KAAA,EAAO,4BAA4B,CAAA;AAAA,MACrE;AAAA,IACF,CAAA;AAAA,EACF,CAAC,CAAA;AAED,EAAA,IAAA,EAAK;AACP","file":"index.js","sourcesContent":["export type Role = 'admin' | 'user' | 'guest' | string;\n\nexport interface User {\n id: string;\n email: string;\n password?: string;\n role: Role;\n name?: string;\n picture?: string;\n createdAt?: Date;\n updatedAt?: Date;\n}\n\nexport interface JWTPayload {\n userId: string;\n email: string;\n role: Role;\n}\n\nexport interface TokenPair {\n accessToken: string;\n refreshToken: string;\n}\n\nexport interface AuthOptions {\n jwtSecret?: string;\n jwtExpiresIn?: string;\n refreshSecret?: string;\n refreshExpiresIn?: string;\n googleClientId?: string;\n googleClientSecret?: string;\n googleRedirectUri?: string;\n}\n\nexport interface AuthUserRequest extends Request {\n user?: JWTPayload;\n}\n\nexport type Permission = string;\n\nexport interface RolePermissions {\n [role: string]: Permission[];\n}\n\nexport const DEFAULT_PERMISSIONS: RolePermissions = {\n admin: ['*'],\n user: ['read', 'write:own'],\n guest: ['read:public'],\n};\n\nexport interface LoginCredentials {\n email: string;\n password: string;\n}\n\nexport interface RegisterData extends LoginCredentials {\n name?: string;\n role?: Role;\n}\n\nexport interface OAuthProvider {\n name: string;\n clientId: string;\n clientSecret: string;\n redirectUri: string;\n authorizationUrl: string;\n tokenUrl: string;\n userInfoUrl: string;\n}\n","import { Role, Permission, RolePermissions, DEFAULT_PERMISSIONS } from './types';\n\nexport class RBACService {\n private permissions: RolePermissions;\n\n constructor(permissions: RolePermissions = DEFAULT_PERMISSIONS) {\n this.permissions = permissions;\n }\n\n setPermissions(permissions: RolePermissions): void {\n this.permissions = permissions;\n }\n\n addPermission(role: Role, permission: Permission): void {\n if (!this.permissions[role]) {\n this.permissions[role] = [];\n }\n if (!this.permissions[role].includes(permission)) {\n this.permissions[role].push(permission);\n }\n }\n\n removePermission(role: Role, permission: Permission): void {\n if (this.permissions[role]) {\n this.permissions[role] = this.permissions[role].filter(p => p !== permission);\n }\n }\n\n getPermissions(role: Role): Permission[] {\n return this.permissions[role] || [];\n }\n\n hasPermission(role: Role, requiredPermission: Permission): boolean {\n const rolePermissions = this.getPermissions(role);\n \n if (rolePermissions.includes('*')) {\n return true;\n }\n\n if (rolePermissions.includes(requiredPermission)) {\n return true;\n }\n\n const [requiredAction, requiredScope] = requiredPermission.split(':');\n \n for (const perm of rolePermissions) {\n const [action, scope] = perm.split(':');\n \n if (action === '*' && (scope === '*' || scope === requiredScope)) {\n return true;\n }\n \n if (action === requiredAction && (scope === '*' || scope === requiredScope)) {\n return true;\n }\n }\n\n return false;\n }\n\n hasRole(userRole: Role, requiredRole: Role): boolean {\n const hierarchy: Role[] = ['guest', 'user', 'admin'];\n const userIndex = hierarchy.indexOf(userRole as any);\n const requiredIndex = hierarchy.indexOf(requiredRole as any);\n \n if (userIndex === -1 || requiredIndex === -1) {\n return userRole === requiredRole;\n }\n \n return userIndex >= requiredIndex;\n }\n\n authorize(permission: Permission) {\n return (role: Role): boolean => this.hasPermission(role, permission);\n }\n\n authorizeRole(requiredRole: Role) {\n return (role: Role): boolean => this.hasRole(role, requiredRole);\n }\n}\n\nexport const rbacService = new RBACService();\n","export * from './types';\nexport * from './jwt';\nexport * from './rbac';\nexport * from './oauth';\nexport * from './express';\nexport * from './fastify';\n","import { z } from 'zod';\n\nexport const envSchema = z.object({\n NODE_ENV: z.enum(['development', 'production', 'test']).default('development'),\n PORT: z.string().default('3000'),\n DATABASE_URL: z.string().optional(),\n REDIS_URL: z.string().default('redis://localhost:6379'),\n JWT_SECRET: z.string().min(32).optional(),\n JWT_EXPIRES_IN: z.string().default('7d'),\n JWT_REFRESH_SECRET: z.string().min(32).optional(),\n JWT_REFRESH_EXPIRES_IN: z.string().default('30d'),\n GOOGLE_CLIENT_ID: z.string().optional(),\n GOOGLE_CLIENT_SECRET: z.string().optional(),\n GOOGLE_REDIRECT_URI: z.string().optional(),\n SMTP_HOST: z.string().optional(),\n SMTP_PORT: z.string().default('587'),\n SMTP_USER: z.string().optional(),\n SMTP_PASS: z.string().optional(),\n SMTP_FROM: z.string().optional(),\n TWILIO_ACCOUNT_SID: z.string().optional(),\n TWILIO_AUTH_TOKEN: z.string().optional(),\n TWILIO_PHONE_NUMBER: z.string().optional(),\n SLACK_WEBHOOK_URL: z.string().optional(),\n RATE_LIMIT_WINDOW: z.string().default('1m'),\n RATE_LIMIT_LIMIT: z.string().default('100'),\n LOG_LEVEL: z.enum(['fatal', 'error', 'warn', 'info', 'debug', 'trace']).default('info'),\n});\n\nexport type EnvConfig = z.infer<typeof envSchema>;\n\nexport interface ConfigOptions {\n schema?: z.ZodSchema;\n envPath?: string;\n validate?: boolean;\n}\n\nclass ConfigManager {\n private config: EnvConfig | null = null;\n private schema: z.ZodSchema;\n private validate: boolean;\n\n constructor(options: ConfigOptions = {}) {\n this.schema = options.schema || envSchema;\n this.validate = options.validate ?? true;\n }\n\n load(): EnvConfig {\n if (this.config) return this.config;\n\n const env: Record<string, string | undefined> = {};\n \n for (const key of Object.keys(this.schema.shape)) {\n env[key] = process.env[key];\n }\n\n if (this.validate) {\n const result = this.schema.safeParse(env);\n if (!result.success) {\n const errors = result.error.errors.map(e => `${e.path.join('.')}: ${e.message}`).join(', ');\n throw new Error(`Config validation failed: ${errors}`);\n }\n this.config = result.data;\n } else {\n this.config = env as EnvConfig;\n }\n\n return this.config;\n }\n\n get<K extends keyof EnvConfig>(key: K): EnvConfig[K] {\n if (!this.config) this.load();\n return this.config![key];\n }\n\n int(key: keyof EnvConfig): number {\n const value = this.get(key);\n if (typeof value === 'string') return parseInt(value, 10);\n return Number(value);\n }\n\n bool(key: keyof EnvConfig): boolean {\n const value = this.get(key);\n if (typeof value === 'boolean') return value;\n if (typeof value === 'string') return value.toLowerCase() === 'true';\n return Boolean(value);\n }\n\n isProduction(): boolean {\n return this.get('NODE_ENV') === 'production';\n }\n\n isDevelopment(): boolean {\n return this.get('NODE_ENV') === 'development';\n }\n\n isTest(): boolean {\n return this.get('NODE_ENV') === 'test';\n }\n\n getAll(): EnvConfig {\n if (!this.config) this.load();\n return this.config!;\n }\n}\n\nconst globalConfig = new ConfigManager();\n\nexport const config = {\n load: () => globalConfig.load(),\n get: <K extends keyof EnvConfig>(key: K) => globalConfig.get(key),\n int: (key: keyof EnvConfig) => globalConfig.int(key),\n bool: (key: keyof EnvConfig) => globalConfig.bool(key),\n isProduction: () => globalConfig.isProduction(),\n isDevelopment: () => globalConfig.isDevelopment(),\n isTest: () => globalConfig.isTest(),\n getAll: () => globalConfig.getAll(),\n create: (options?: ConfigOptions) => new ConfigManager(options),\n};\n\nexport default config;\n","import jwt from 'jsonwebtoken';\nimport { JWTPayload, TokenPair } from './types';\nimport { config } from '../config';\n\nexport class JWTService {\n private secret: string;\n private expiresIn: string;\n private refreshSecret: string;\n private refreshExpiresIn: string;\n\n constructor(options: { jwtSecret?: string; jwtExpiresIn?: string; refreshSecret?: string; refreshExpiresIn?: string } = {}) {\n this.secret = options.jwtSecret || config.get('JWT_SECRET') || 'default-secret-change-in-production';\n this.expiresIn = options.jwtExpiresIn || config.get('JWT_EXPIRES_IN') || '7d';\n this.refreshSecret = options.refreshSecret || config.get('JWT_REFRESH_SECRET') || this.secret;\n this.refreshExpiresIn = options.refreshExpiresIn || config.get('JWT_REFRESH_EXPIRES_IN') || '30d';\n }\n\n generateToken(payload: JWTPayload): string {\n return jwt.sign(payload, this.secret, { expiresIn: this.expiresIn });\n }\n\n generateRefreshToken(payload: JWTPayload): string {\n return jwt.sign(payload, this.refreshSecret, { expiresIn: this.refreshExpiresIn });\n }\n\n generateTokenPair(payload: JWTPayload): TokenPair {\n return {\n accessToken: this.generateToken(payload),\n refreshToken: this.generateRefreshToken(payload),\n };\n }\n\n verifyToken(token: string): JWTPayload {\n return jwt.verify(token, this.secret) as JWTPayload;\n }\n\n verifyRefreshToken(token: string): JWTPayload {\n return jwt.verify(token, this.refreshSecret) as JWTPayload;\n }\n\n refreshTokens(refreshToken: string): TokenPair {\n const payload = this.verifyRefreshToken(refreshToken);\n return this.generateTokenPair(payload);\n }\n}\n\nexport const jwtService = new JWTService();\n","import { OAuthProvider } from './types';\nimport { config } from '../config';\n\nexport interface OAuthUserInfo {\n id: string;\n email: string;\n name?: string;\n picture?: string;\n}\n\nexport class OAuthService {\n private providers: Map<string, OAuthProvider> = new Map();\n\n constructor() {\n const googleClientId = config.get('GOOGLE_CLIENT_ID');\n const googleClientSecret = config.get('GOOGLE_CLIENT_SECRET');\n const googleRedirectUri = config.get('GOOGLE_REDIRECT_URI');\n\n if (googleClientId && googleClientSecret && googleRedirectUri) {\n this.registerProvider('google', {\n name: 'google',\n clientId: googleClientId,\n clientSecret: googleClientSecret,\n redirectUri: googleRedirectUri,\n authorizationUrl: 'https://accounts.google.com/o/oauth2/v2/auth',\n tokenUrl: 'https://oauth2.googleapis.com/token',\n userInfoUrl: 'https://www.googleapis.com/oauth2/v2/userinfo',\n });\n }\n }\n\n registerProvider(name: string, provider: OAuthProvider): void {\n this.providers.set(name, provider);\n }\n\n getProvider(name: string): OAuthProvider | undefined {\n return this.providers.get(name);\n }\n\n getAuthorizationUrl(providerName: string, state?: string): string {\n const provider = this.getProvider(providerName);\n if (!provider) {\n throw new Error(`OAuth provider ${providerName} not registered`);\n }\n\n const params = new URLSearchParams({\n client_id: provider.clientId,\n redirect_uri: provider.redirectUri,\n response_type: 'code',\n scope: 'openid email profile',\n state: state || '',\n });\n\n return `${provider.authorizationUrl}?${params.toString()}`;\n }\n\n async exchangeCode(providerName: string, code: string): Promise<{ accessToken: string; refreshToken?: string }> {\n const provider = this.getProvider(providerName);\n if (!provider) {\n throw new Error(`OAuth provider ${providerName} not registered`);\n }\n\n const response = await fetch(provider.tokenUrl, {\n method: 'POST',\n headers: {\n 'Content-Type': 'application/x-www-form-urlencoded',\n },\n body: new URLSearchParams({\n client_id: provider.clientId,\n client_secret: provider.clientSecret,\n code,\n grant_type: 'authorization_code',\n redirect_uri: provider.redirectUri,\n }),\n });\n\n if (!response.ok) {\n const error = await response.text();\n throw new Error(`OAuth token exchange failed: ${error}`);\n }\n\n const data = await response.json();\n return {\n accessToken: data.access_token,\n refreshToken: data.refresh_token,\n };\n }\n\n async getUserInfo(providerName: string, accessToken: string): Promise<OAuthUserInfo> {\n const provider = this.getProvider(providerName);\n if (!provider) {\n throw new Error(`OAuth provider ${providerName} not registered`);\n }\n\n const response = await fetch(provider.userInfoUrl, {\n headers: {\n Authorization: `Bearer ${accessToken}`,\n },\n });\n\n if (!response.ok) {\n const error = await response.text();\n throw new Error(`OAuth user info fetch failed: ${error}`);\n }\n\n const data = await response.json();\n\n return {\n id: data.id,\n email: data.email,\n name: data.name,\n picture: data.picture,\n };\n }\n}\n\nexport const oauthService = new OAuthService();\n","import bcrypt from 'bcryptjs';\nimport { Request, Response, NextFunction, RequestHandler } from 'express';\nimport { JWTPayload, LoginCredentials, RegisterData, User, AuthOptions } from './types';\nimport { jwtService } from './jwt';\nimport { rbacService } from './rbac';\nimport { oauthService } from './oauth';\n\nexport interface AuthUser extends JWTPayload {\n id: string;\n email: string;\n role: string;\n}\n\ndeclare global {\n namespace Express {\n interface Request {\n user?: AuthUser;\n }\n }\n}\n\nexport interface UserStore {\n findByEmail(email: string): Promise<User | null>;\n findById(id: string): Promise<User | null>;\n create(data: RegisterData): Promise<User>;\n update(id: string, data: Partial<User>): Promise<User>;\n}\n\nclass InMemoryUserStore implements UserStore {\n private users: Map<string, User> = new Map();\n\n async findByEmail(email: string): Promise<User | null> {\n for (const user of this.users.values()) {\n if (user.email === email) return user;\n }\n return null;\n }\n\n async findById(id: string): Promise<User | null> {\n return this.users.get(id) || null;\n }\n\n async create(data: RegisterData): Promise<User> {\n const id = Math.random().toString(36).substr(2, 9);\n const hashedPassword = await bcrypt.hash(data.password, 10);\n const user: User = {\n id,\n email: data.email,\n password: hashedPassword,\n role: data.role || 'user',\n name: data.name,\n };\n this.users.set(id, user);\n return user;\n }\n\n async update(id: string, data: Partial<User>): Promise<User> {\n const user = this.users.get(id);\n if (!user) throw new Error('User not found');\n const updated = { ...user, ...data };\n this.users.set(id, updated);\n return updated;\n }\n}\n\nexport class AuthService {\n private userStore: UserStore;\n private options: Required<AuthOptions>;\n private initialized: boolean = false;\n\n constructor(options: AuthOptions = {}, userStore?: UserStore) {\n this.options = {\n jwtSecret: options.jwtSecret || process.env.JWT_SECRET || 'default-secret-change-in-production',\n jwtExpiresIn: options.jwtExpiresIn || '7d',\n refreshSecret: options.refreshSecret || process.env.JWT_REFRESH_SECRET || 'default-secret-change-in-production',\n refreshExpiresIn: options.refreshExpiresIn || '30d',\n googleClientId: options.googleClientId || process.env.GOOGLE_CLIENT_ID || '',\n googleClientSecret: options.googleClientSecret || process.env.GOOGLE_CLIENT_SECRET || '',\n googleRedirectUri: options.googleRedirectUri || process.env.GOOGLE_REDIRECT_URI || '',\n };\n\n this.userStore = userStore || new InMemoryUserStore();\n }\n\n async initialize(): Promise<void> {\n if (this.options.googleClientId && this.options.googleClientSecret && this.options.googleRedirectUri) {\n oauthService.registerProvider('google', {\n name: 'google',\n clientId: this.options.googleClientId,\n clientSecret: this.options.googleClientSecret,\n redirectUri: this.options.googleRedirectUri,\n authorizationUrl: 'https://accounts.google.com/o/oauth2/v2/auth',\n tokenUrl: 'https://oauth2.googleapis.com/token',\n userInfoUrl: 'https://www.googleapis.com/oauth2/v2/userinfo',\n });\n }\n this.initialized = true;\n }\n\n async register(data: RegisterData): Promise<{ user: User; tokens: { accessToken: string; refreshToken: string } }> {\n const existing = await this.userStore.findByEmail(data.email);\n if (existing) {\n throw new Error('User already exists');\n }\n\n const user = await this.userStore.create(data);\n const tokens = jwtService.generateTokenPair({\n userId: user.id,\n email: user.email,\n role: user.role,\n });\n\n return { user, tokens };\n }\n\n async login(credentials: LoginCredentials): Promise<{ user: User; tokens: { accessToken: string; refreshToken: string } }> {\n const user = await this.userStore.findByEmail(credentials.email);\n if (!user || !user.password) {\n throw new Error('Invalid credentials');\n }\n\n const isValid = await bcrypt.compare(credentials.password, user.password);\n if (!isValid) {\n throw new Error('Invalid credentials');\n }\n\n const tokens = jwtService.generateTokenPair({\n userId: user.id,\n email: user.email,\n role: user.role,\n });\n\n return { user, tokens };\n }\n\n async refresh(refreshToken: string): Promise<{ accessToken: string; refreshToken: string }> {\n return jwtService.refreshTokens(refreshToken);\n }\n\n async getGoogleAuthUrl(state?: string): Promise<string> {\n return oauthService.getAuthorizationUrl('google', state);\n }\n\n async handleGoogleCallback(code: string): Promise<{ user: User; tokens: { accessToken: string; refreshToken: string } }> {\n const { accessToken } = await oauthService.exchangeCode('google', code);\n const userInfo = await oauthService.getUserInfo('google', accessToken);\n\n let user = await this.userStore.findByEmail(userInfo.email);\n \n if (!user) {\n user = await this.userStore.create({\n email: userInfo.email,\n password: Math.random().toString(36).substr(2, 20),\n name: userInfo.name,\n role: 'user',\n });\n }\n\n const tokens = jwtService.generateTokenPair({\n userId: user.id,\n email: user.email,\n role: user.role,\n });\n\n return { user, tokens };\n }\n\n getMiddleware(): RequestHandler {\n return (req: Request, res: Response, next: NextFunction) => {\n const authHeader = req.headers.authorization;\n \n if (!authHeader || !authHeader.startsWith('Bearer ')) {\n return res.status(401).json({ error: 'No token provided' });\n }\n\n const token = authHeader.substring(7);\n \n try {\n const payload = jwtService.verifyToken(token);\n req.user = {\n ...payload,\n id: payload.userId,\n };\n next();\n } catch (error) {\n return res.status(401).json({ error: 'Invalid token' });\n }\n };\n }\n\n requireUser(): RequestHandler {\n return (req: Request, res: Response, next: NextFunction) => {\n if (!req.user) {\n return res.status(401).json({ error: 'Authentication required' });\n }\n next();\n };\n }\n\n requireRole(role: string): RequestHandler {\n return (req: Request, res: Response, next: NextFunction) => {\n if (!req.user) {\n return res.status(401).json({ error: 'Authentication required' });\n }\n if (!rbacService.hasRole(req.user.role, role)) {\n return res.status(403).json({ error: 'Insufficient permissions' });\n }\n next();\n };\n }\n\n requirePermission(permission: string): RequestHandler {\n return (req: Request, res: Response, next: NextFunction) => {\n if (!req.user) {\n return res.status(401).json({ error: 'Authentication required' });\n }\n if (!rbacService.hasPermission(req.user.role, permission)) {\n return res.status(403).json({ error: 'Insufficient permissions' });\n }\n next();\n };\n }\n}\n\nlet authServiceInstance: AuthService | null = null;\n\nexport function createAuth(options?: AuthOptions, userStore?: UserStore): AuthService {\n authServiceInstance = new AuthService(options, userStore);\n return authServiceInstance;\n}\n\nexport function auth(): AuthService {\n if (!authServiceInstance) {\n authServiceInstance = new AuthService();\n }\n return authServiceInstance;\n}\n\nexport const Auth = {\n initialize: (options?: AuthOptions) => {\n const service = createAuth(options);\n return {\n service,\n getMiddleware: () => service.getMiddleware(),\n requireUser: () => service.requireUser(),\n requireRole: (role: string) => service.requireRole(role),\n requirePermission: (permission: string) => service.requirePermission(permission),\n };\n },\n};\n","import { FastifyInstance, FastifyRequest, FastifyReply, HookHandlerDoneFunction } from 'fastify';\nimport { AuthService } from './express';\nimport { JWTPayload } from './types';\n\ndeclare module 'fastify' {\n interface FastifyRequest {\n user?: JWTPayload & { id: string };\n }\n}\n\nexport function registerAuthPlugin(fastify: FastifyInstance, options: { authService: AuthService }, done: HookHandlerDoneFunction) {\n const { authService } = options;\n\n fastify.decorate('authenticate', async (request: FastifyRequest, reply: FastifyReply) => {\n const authHeader = request.headers.authorization;\n \n if (!authHeader || !authHeader.startsWith('Bearer ')) {\n return reply.status(401).send({ error: 'No token provided' });\n }\n\n const token = authHeader.substring(7);\n \n try {\n const payload = authService['jwtService'].verifyToken(token);\n request.user = {\n ...payload,\n id: payload.userId,\n };\n } catch (error) {\n return reply.status(401).send({ error: 'Invalid token' });\n }\n });\n\n fastify.decorate('requireUser', async (request: FastifyRequest, reply: FastifyReply) => {\n if (!request.user) {\n return reply.status(401).send({ error: 'Authentication required' });\n }\n });\n\n fastify.decorate('requireRole', (role: string) => {\n return async (request: FastifyRequest, reply: FastifyReply) => {\n if (!request.user) {\n return reply.status(401).send({ error: 'Authentication required' });\n }\n const { rbacService } = await import('./rbac');\n if (!rbacService.hasRole(request.user.role, role)) {\n return reply.status(403).send({ error: 'Insufficient permissions' });\n }\n };\n });\n\n fastify.decorate('requirePermission', (permission: string) => {\n return async (request: FastifyRequest, reply: FastifyReply) => {\n if (!request.user) {\n return reply.status(401).send({ error: 'Authentication required' });\n }\n const { rbacService } = await import('./rbac');\n if (!rbacService.hasPermission(request.user.role, permission)) {\n return reply.status(403).send({ error: 'Insufficient permissions' });\n }\n };\n });\n\n done();\n}\n"]}
|