workos 0.11.1 → 0.12.0-beta.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +163 -6
- package/dist/bin.js +22 -2
- package/dist/bin.js.map +1 -1
- package/dist/check-coverage.ts +237 -0
- package/dist/commands/dev.d.ts +23 -0
- package/dist/commands/dev.js +139 -0
- package/dist/commands/dev.js.map +1 -0
- package/dist/commands/emulate.d.ts +6 -0
- package/dist/commands/emulate.js +64 -0
- package/dist/commands/emulate.js.map +1 -0
- package/dist/commands/seed.d.ts +2 -0
- package/dist/commands/seed.js +60 -1
- package/dist/commands/seed.js.map +1 -1
- package/dist/emulate/core/id.d.ts +33 -0
- package/dist/emulate/core/id.js +58 -0
- package/dist/emulate/core/id.js.map +1 -0
- package/dist/emulate/core/index.d.ts +8 -0
- package/dist/emulate/core/index.js +8 -0
- package/dist/emulate/core/index.js.map +1 -0
- package/dist/emulate/core/jwt.d.ts +28 -0
- package/dist/emulate/core/jwt.js +78 -0
- package/dist/emulate/core/jwt.js.map +1 -0
- package/dist/emulate/core/middleware/auth.d.ts +18 -0
- package/dist/emulate/core/middleware/auth.js +28 -0
- package/dist/emulate/core/middleware/auth.js.map +1 -0
- package/dist/emulate/core/middleware/error-handler.d.ts +22 -0
- package/dist/emulate/core/middleware/error-handler.js +72 -0
- package/dist/emulate/core/middleware/error-handler.js.map +1 -0
- package/dist/emulate/core/pagination.d.ts +21 -0
- package/dist/emulate/core/pagination.js +35 -0
- package/dist/emulate/core/pagination.js.map +1 -0
- package/dist/emulate/core/plugin.d.ts +15 -0
- package/dist/emulate/core/plugin.js +2 -0
- package/dist/emulate/core/plugin.js.map +1 -0
- package/dist/emulate/core/server.d.ts +17 -0
- package/dist/emulate/core/server.js +116 -0
- package/dist/emulate/core/server.js.map +1 -0
- package/dist/emulate/core/store.d.ts +42 -0
- package/dist/emulate/core/store.js +148 -0
- package/dist/emulate/core/store.js.map +1 -0
- package/dist/emulate/index.d.ts +25 -0
- package/dist/emulate/index.js +47 -0
- package/dist/emulate/index.js.map +1 -0
- package/dist/emulate/workos/entities.d.ts +360 -0
- package/dist/emulate/workos/entities.js +2 -0
- package/dist/emulate/workos/entities.js.map +1 -0
- package/dist/emulate/workos/event-bus.d.ts +12 -0
- package/dist/emulate/workos/event-bus.js +45 -0
- package/dist/emulate/workos/event-bus.js.map +1 -0
- package/dist/emulate/workos/helpers.d.ts +63 -0
- package/dist/emulate/workos/helpers.js +518 -0
- package/dist/emulate/workos/helpers.js.map +1 -0
- package/dist/emulate/workos/index.d.ts +91 -0
- package/dist/emulate/workos/index.js +319 -0
- package/dist/emulate/workos/index.js.map +1 -0
- package/dist/emulate/workos/routes/api-keys.d.ts +2 -0
- package/dist/emulate/workos/routes/api-keys.js +35 -0
- package/dist/emulate/workos/routes/api-keys.js.map +1 -0
- package/dist/emulate/workos/routes/audit-logs.d.ts +2 -0
- package/dist/emulate/workos/routes/audit-logs.js +107 -0
- package/dist/emulate/workos/routes/audit-logs.js.map +1 -0
- package/dist/emulate/workos/routes/auth-challenges.d.ts +2 -0
- package/dist/emulate/workos/routes/auth-challenges.js +51 -0
- package/dist/emulate/workos/routes/auth-challenges.js.map +1 -0
- package/dist/emulate/workos/routes/auth-factors.d.ts +2 -0
- package/dist/emulate/workos/routes/auth-factors.js +51 -0
- package/dist/emulate/workos/routes/auth-factors.js.map +1 -0
- package/dist/emulate/workos/routes/auth.d.ts +2 -0
- package/dist/emulate/workos/routes/auth.js +349 -0
- package/dist/emulate/workos/routes/auth.js.map +1 -0
- package/dist/emulate/workos/routes/authorization-checks.d.ts +10 -0
- package/dist/emulate/workos/routes/authorization-checks.js +135 -0
- package/dist/emulate/workos/routes/authorization-checks.js.map +1 -0
- package/dist/emulate/workos/routes/authorization-org-roles.d.ts +2 -0
- package/dist/emulate/workos/routes/authorization-org-roles.js +206 -0
- package/dist/emulate/workos/routes/authorization-org-roles.js.map +1 -0
- package/dist/emulate/workos/routes/authorization-permissions.d.ts +2 -0
- package/dist/emulate/workos/routes/authorization-permissions.js +78 -0
- package/dist/emulate/workos/routes/authorization-permissions.js.map +1 -0
- package/dist/emulate/workos/routes/authorization-resources.d.ts +2 -0
- package/dist/emulate/workos/routes/authorization-resources.js +128 -0
- package/dist/emulate/workos/routes/authorization-resources.js.map +1 -0
- package/dist/emulate/workos/routes/authorization-roles.d.ts +2 -0
- package/dist/emulate/workos/routes/authorization-roles.js +136 -0
- package/dist/emulate/workos/routes/authorization-roles.js.map +1 -0
- package/dist/emulate/workos/routes/config.d.ts +2 -0
- package/dist/emulate/workos/routes/config.js +56 -0
- package/dist/emulate/workos/routes/config.js.map +1 -0
- package/dist/emulate/workos/routes/connect.d.ts +2 -0
- package/dist/emulate/workos/routes/connect.js +69 -0
- package/dist/emulate/workos/routes/connect.js.map +1 -0
- package/dist/emulate/workos/routes/connections.d.ts +2 -0
- package/dist/emulate/workos/routes/connections.js +77 -0
- package/dist/emulate/workos/routes/connections.js.map +1 -0
- package/dist/emulate/workos/routes/data-integrations.d.ts +2 -0
- package/dist/emulate/workos/routes/data-integrations.js +55 -0
- package/dist/emulate/workos/routes/data-integrations.js.map +1 -0
- package/dist/emulate/workos/routes/directories.d.ts +2 -0
- package/dist/emulate/workos/routes/directories.js +106 -0
- package/dist/emulate/workos/routes/directories.js.map +1 -0
- package/dist/emulate/workos/routes/email-verification.d.ts +2 -0
- package/dist/emulate/workos/routes/email-verification.js +49 -0
- package/dist/emulate/workos/routes/email-verification.js.map +1 -0
- package/dist/emulate/workos/routes/events.d.ts +2 -0
- package/dist/emulate/workos/routes/events.js +21 -0
- package/dist/emulate/workos/routes/events.js.map +1 -0
- package/dist/emulate/workos/routes/feature-flags.d.ts +2 -0
- package/dist/emulate/workos/routes/feature-flags.js +131 -0
- package/dist/emulate/workos/routes/feature-flags.js.map +1 -0
- package/dist/emulate/workos/routes/invitations.d.ts +2 -0
- package/dist/emulate/workos/routes/invitations.js +125 -0
- package/dist/emulate/workos/routes/invitations.js.map +1 -0
- package/dist/emulate/workos/routes/legacy-mfa.d.ts +2 -0
- package/dist/emulate/workos/routes/legacy-mfa.js +75 -0
- package/dist/emulate/workos/routes/legacy-mfa.js.map +1 -0
- package/dist/emulate/workos/routes/magic-auth.d.ts +2 -0
- package/dist/emulate/workos/routes/magic-auth.js +32 -0
- package/dist/emulate/workos/routes/magic-auth.js.map +1 -0
- package/dist/emulate/workos/routes/memberships.d.ts +2 -0
- package/dist/emulate/workos/routes/memberships.js +118 -0
- package/dist/emulate/workos/routes/memberships.js.map +1 -0
- package/dist/emulate/workos/routes/organization-domains.d.ts +2 -0
- package/dist/emulate/workos/routes/organization-domains.js +58 -0
- package/dist/emulate/workos/routes/organization-domains.js.map +1 -0
- package/dist/emulate/workos/routes/organizations.d.ts +2 -0
- package/dist/emulate/workos/routes/organizations.js +133 -0
- package/dist/emulate/workos/routes/organizations.js.map +1 -0
- package/dist/emulate/workos/routes/password-reset.d.ts +2 -0
- package/dist/emulate/workos/routes/password-reset.js +61 -0
- package/dist/emulate/workos/routes/password-reset.js.map +1 -0
- package/dist/emulate/workos/routes/pipes.d.ts +2 -0
- package/dist/emulate/workos/routes/pipes.js +86 -0
- package/dist/emulate/workos/routes/pipes.js.map +1 -0
- package/dist/emulate/workos/routes/portal.d.ts +2 -0
- package/dist/emulate/workos/routes/portal.js +18 -0
- package/dist/emulate/workos/routes/portal.js.map +1 -0
- package/dist/emulate/workos/routes/radar.d.ts +2 -0
- package/dist/emulate/workos/routes/radar.js +45 -0
- package/dist/emulate/workos/routes/radar.js.map +1 -0
- package/dist/emulate/workos/routes/sessions.d.ts +2 -0
- package/dist/emulate/workos/routes/sessions.js +51 -0
- package/dist/emulate/workos/routes/sessions.js.map +1 -0
- package/dist/emulate/workos/routes/sso.d.ts +2 -0
- package/dist/emulate/workos/routes/sso.js +160 -0
- package/dist/emulate/workos/routes/sso.js.map +1 -0
- package/dist/emulate/workos/routes/user-features.d.ts +2 -0
- package/dist/emulate/workos/routes/user-features.js +50 -0
- package/dist/emulate/workos/routes/user-features.js.map +1 -0
- package/dist/emulate/workos/routes/users.d.ts +2 -0
- package/dist/emulate/workos/routes/users.js +133 -0
- package/dist/emulate/workos/routes/users.js.map +1 -0
- package/dist/emulate/workos/routes/webhook-endpoints.d.ts +2 -0
- package/dist/emulate/workos/routes/webhook-endpoints.js +70 -0
- package/dist/emulate/workos/routes/webhook-endpoints.js.map +1 -0
- package/dist/emulate/workos/routes/widgets.d.ts +2 -0
- package/dist/emulate/workos/routes/widgets.js +27 -0
- package/dist/emulate/workos/routes/widgets.js.map +1 -0
- package/dist/emulate/workos/store.d.ts +48 -0
- package/dist/emulate/workos/store.js +93 -0
- package/dist/emulate/workos/store.js.map +1 -0
- package/dist/emulate/workos/webhook-signer.d.ts +1 -0
- package/dist/emulate/workos/webhook-signer.js +8 -0
- package/dist/emulate/workos/webhook-signer.js.map +1 -0
- package/dist/gen-routes-lib.spec.ts +659 -0
- package/dist/gen-routes-lib.ts +647 -0
- package/dist/gen-routes.ts +96 -0
- package/dist/lib/dev-command.d.ts +26 -0
- package/dist/lib/dev-command.js +122 -0
- package/dist/lib/dev-command.js.map +1 -0
- package/dist/utils/help-json.js +31 -0
- package/dist/utils/help-json.js.map +1 -1
- package/package.json +20 -7
|
@@ -0,0 +1,319 @@
|
|
|
1
|
+
import { randomBytes } from 'node:crypto';
|
|
2
|
+
import { generateId } from '../core/index.js';
|
|
3
|
+
import { getWorkOSStore } from './store.js';
|
|
4
|
+
import { organizationRoutes } from './routes/organizations.js';
|
|
5
|
+
import { organizationDomainRoutes } from './routes/organization-domains.js';
|
|
6
|
+
import { membershipRoutes } from './routes/memberships.js';
|
|
7
|
+
import { userRoutes } from './routes/users.js';
|
|
8
|
+
import { emailVerificationRoutes } from './routes/email-verification.js';
|
|
9
|
+
import { passwordResetRoutes } from './routes/password-reset.js';
|
|
10
|
+
import { magicAuthRoutes } from './routes/magic-auth.js';
|
|
11
|
+
import { authFactorRoutes } from './routes/auth-factors.js';
|
|
12
|
+
import { sessionRoutes } from './routes/sessions.js';
|
|
13
|
+
import { authRoutes } from './routes/auth.js';
|
|
14
|
+
import { connectionRoutes } from './routes/connections.js';
|
|
15
|
+
import { ssoRoutes } from './routes/sso.js';
|
|
16
|
+
import { pipeRoutes } from './routes/pipes.js';
|
|
17
|
+
import { authChallengeRoutes } from './routes/auth-challenges.js';
|
|
18
|
+
import { invitationRoutes } from './routes/invitations.js';
|
|
19
|
+
import { configRoutes } from './routes/config.js';
|
|
20
|
+
import { userFeatureRoutes } from './routes/user-features.js';
|
|
21
|
+
import { widgetRoutes } from './routes/widgets.js';
|
|
22
|
+
import { authorizationRoleRoutes } from './routes/authorization-roles.js';
|
|
23
|
+
import { authorizationPermissionRoutes } from './routes/authorization-permissions.js';
|
|
24
|
+
import { authorizationOrgRoleRoutes } from './routes/authorization-org-roles.js';
|
|
25
|
+
import { authorizationResourceRoutes } from './routes/authorization-resources.js';
|
|
26
|
+
import { authorizationCheckRoutes } from './routes/authorization-checks.js';
|
|
27
|
+
import { portalRoutes } from './routes/portal.js';
|
|
28
|
+
import { legacyMfaRoutes } from './routes/legacy-mfa.js';
|
|
29
|
+
import { apiKeyRoutes } from './routes/api-keys.js';
|
|
30
|
+
import { radarRoutes } from './routes/radar.js';
|
|
31
|
+
import { connectRoutes } from './routes/connect.js';
|
|
32
|
+
import { directoryRoutes } from './routes/directories.js';
|
|
33
|
+
import { auditLogRoutes } from './routes/audit-logs.js';
|
|
34
|
+
import { featureFlagRoutes } from './routes/feature-flags.js';
|
|
35
|
+
import { dataIntegrationRoutes } from './routes/data-integrations.js';
|
|
36
|
+
import { webhookEndpointRoutes } from './routes/webhook-endpoints.js';
|
|
37
|
+
import { eventRoutes } from './routes/events.js';
|
|
38
|
+
import { EventBus } from './event-bus.js';
|
|
39
|
+
import { generateVerificationToken, hashPassword, expiresIn, formatUser, formatOrganization, formatMembership, formatConnection, formatSession, formatInvitation, formatRole, formatPermission, formatDirectory, formatDirectoryUser, formatDirectoryGroup, formatDomain, } from './helpers.js';
|
|
40
|
+
export { getWorkOSStore } from './store.js';
|
|
41
|
+
export * from './entities.js';
|
|
42
|
+
function seedDefaults(_store, _baseUrl) {
|
|
43
|
+
// No default seed data — users provide their own via config
|
|
44
|
+
}
|
|
45
|
+
export function seedFromConfig(store, _baseUrl, config) {
|
|
46
|
+
const ws = getWorkOSStore(store);
|
|
47
|
+
if (config.users) {
|
|
48
|
+
for (const userConfig of config.users) {
|
|
49
|
+
ws.users.insert({
|
|
50
|
+
object: 'user',
|
|
51
|
+
email: userConfig.email,
|
|
52
|
+
first_name: userConfig.first_name ?? null,
|
|
53
|
+
last_name: userConfig.last_name ?? null,
|
|
54
|
+
email_verified: userConfig.email_verified ?? false,
|
|
55
|
+
profile_picture_url: null,
|
|
56
|
+
last_sign_in_at: null,
|
|
57
|
+
external_id: userConfig.external_id ?? null,
|
|
58
|
+
metadata: userConfig.metadata ?? {},
|
|
59
|
+
locale: null,
|
|
60
|
+
password_hash: userConfig.password ? hashPassword(userConfig.password) : null,
|
|
61
|
+
impersonator: userConfig.impersonator ?? null,
|
|
62
|
+
});
|
|
63
|
+
}
|
|
64
|
+
}
|
|
65
|
+
if (config.organizations) {
|
|
66
|
+
for (const orgConfig of config.organizations) {
|
|
67
|
+
const org = ws.organizations.insert({
|
|
68
|
+
object: 'organization',
|
|
69
|
+
name: orgConfig.name,
|
|
70
|
+
external_id: orgConfig.external_id ?? null,
|
|
71
|
+
metadata: orgConfig.metadata ?? {},
|
|
72
|
+
stripe_customer_id: null,
|
|
73
|
+
});
|
|
74
|
+
if (orgConfig.domains) {
|
|
75
|
+
for (const dd of orgConfig.domains) {
|
|
76
|
+
ws.organizationDomains.insert({
|
|
77
|
+
object: 'organization_domain',
|
|
78
|
+
organization_id: org.id,
|
|
79
|
+
domain: dd.domain,
|
|
80
|
+
state: dd.state ?? 'pending',
|
|
81
|
+
verification_strategy: 'manual',
|
|
82
|
+
verification_token: generateVerificationToken(),
|
|
83
|
+
verification_prefix: 'workos-verify',
|
|
84
|
+
});
|
|
85
|
+
}
|
|
86
|
+
}
|
|
87
|
+
if (orgConfig.memberships) {
|
|
88
|
+
for (const mm of orgConfig.memberships) {
|
|
89
|
+
ws.organizationMemberships.insert({
|
|
90
|
+
object: 'organization_membership',
|
|
91
|
+
organization_id: org.id,
|
|
92
|
+
user_id: mm.user_id,
|
|
93
|
+
role: { slug: mm.role ?? 'member' },
|
|
94
|
+
status: mm.status ?? 'active',
|
|
95
|
+
external_id: null,
|
|
96
|
+
metadata: {},
|
|
97
|
+
});
|
|
98
|
+
}
|
|
99
|
+
}
|
|
100
|
+
}
|
|
101
|
+
}
|
|
102
|
+
if (config.connections) {
|
|
103
|
+
for (const connConfig of config.connections) {
|
|
104
|
+
const org = ws.organizations.findOneBy('name', connConfig.organization);
|
|
105
|
+
if (!org)
|
|
106
|
+
continue;
|
|
107
|
+
const domains = (connConfig.domains ?? []).map((d) => ({
|
|
108
|
+
object: 'connection_domain',
|
|
109
|
+
id: generateId('conn_domain'),
|
|
110
|
+
domain: d,
|
|
111
|
+
}));
|
|
112
|
+
const conn = ws.connections.insert({
|
|
113
|
+
object: 'connection',
|
|
114
|
+
organization_id: org.id,
|
|
115
|
+
connection_type: connConfig.connection_type ?? 'GenericSAML',
|
|
116
|
+
name: connConfig.name,
|
|
117
|
+
state: connConfig.state ?? 'active',
|
|
118
|
+
domains,
|
|
119
|
+
});
|
|
120
|
+
if (connConfig.profiles) {
|
|
121
|
+
for (const p of connConfig.profiles) {
|
|
122
|
+
ws.ssoProfiles.insert({
|
|
123
|
+
object: 'profile',
|
|
124
|
+
connection_id: conn.id,
|
|
125
|
+
connection_type: conn.connection_type,
|
|
126
|
+
organization_id: org.id,
|
|
127
|
+
idp_id: p.idp_id ?? `idp_${generateId('usr')}`,
|
|
128
|
+
email: p.email,
|
|
129
|
+
first_name: p.first_name ?? null,
|
|
130
|
+
last_name: p.last_name ?? null,
|
|
131
|
+
groups: p.groups ?? [],
|
|
132
|
+
raw_attributes: { email: p.email },
|
|
133
|
+
});
|
|
134
|
+
}
|
|
135
|
+
}
|
|
136
|
+
}
|
|
137
|
+
}
|
|
138
|
+
if (config.pipeConnections) {
|
|
139
|
+
for (const pc of config.pipeConnections) {
|
|
140
|
+
ws.pipeConnections.insert({
|
|
141
|
+
object: 'pipe_connection',
|
|
142
|
+
user_id: pc.user_id,
|
|
143
|
+
provider: pc.provider,
|
|
144
|
+
scopes: pc.scopes,
|
|
145
|
+
status: pc.status ?? 'connected',
|
|
146
|
+
external_account_id: pc.external_account_id ?? null,
|
|
147
|
+
});
|
|
148
|
+
}
|
|
149
|
+
}
|
|
150
|
+
if (config.permissions) {
|
|
151
|
+
for (const permConfig of config.permissions) {
|
|
152
|
+
ws.permissions.insert({
|
|
153
|
+
object: 'permission',
|
|
154
|
+
slug: permConfig.slug,
|
|
155
|
+
name: permConfig.name,
|
|
156
|
+
description: permConfig.description ?? null,
|
|
157
|
+
});
|
|
158
|
+
}
|
|
159
|
+
}
|
|
160
|
+
if (config.roles) {
|
|
161
|
+
for (const roleConfig of config.roles) {
|
|
162
|
+
const role = ws.roles.insert({
|
|
163
|
+
object: 'role',
|
|
164
|
+
slug: roleConfig.slug,
|
|
165
|
+
name: roleConfig.name,
|
|
166
|
+
description: roleConfig.description ?? null,
|
|
167
|
+
type: roleConfig.type ?? 'EnvironmentRole',
|
|
168
|
+
organization_id: roleConfig.organization_id ?? null,
|
|
169
|
+
is_default_role: roleConfig.is_default_role ?? false,
|
|
170
|
+
priority: roleConfig.priority ?? 0,
|
|
171
|
+
});
|
|
172
|
+
if (roleConfig.permissions) {
|
|
173
|
+
for (const permSlug of roleConfig.permissions) {
|
|
174
|
+
const perm = ws.permissions.findOneBy('slug', permSlug);
|
|
175
|
+
if (perm) {
|
|
176
|
+
ws.rolePermissions.insert({ role_id: role.id, permission_id: perm.id });
|
|
177
|
+
}
|
|
178
|
+
}
|
|
179
|
+
}
|
|
180
|
+
}
|
|
181
|
+
}
|
|
182
|
+
if (config.invitations) {
|
|
183
|
+
for (const invConfig of config.invitations) {
|
|
184
|
+
const token = generateVerificationToken();
|
|
185
|
+
ws.invitations.insert({
|
|
186
|
+
object: 'invitation',
|
|
187
|
+
email: invConfig.email,
|
|
188
|
+
state: 'pending',
|
|
189
|
+
token,
|
|
190
|
+
accept_invitation_url: `${_baseUrl}/user_management/invitations/accept?token=${token}`,
|
|
191
|
+
organization_id: invConfig.organization_id ?? null,
|
|
192
|
+
inviter_user_id: invConfig.inviter_user_id ?? null,
|
|
193
|
+
role_slug: invConfig.role_slug ?? null,
|
|
194
|
+
expires_at: expiresIn(72 * 60),
|
|
195
|
+
});
|
|
196
|
+
}
|
|
197
|
+
}
|
|
198
|
+
if (config.webhookEndpoints) {
|
|
199
|
+
for (const whConfig of config.webhookEndpoints) {
|
|
200
|
+
ws.webhookEndpoints.insert({
|
|
201
|
+
object: 'webhook_endpoint',
|
|
202
|
+
url: whConfig.url,
|
|
203
|
+
secret: randomBytes(32).toString('hex'),
|
|
204
|
+
enabled: whConfig.enabled !== false,
|
|
205
|
+
events: whConfig.events ?? [],
|
|
206
|
+
description: null,
|
|
207
|
+
});
|
|
208
|
+
}
|
|
209
|
+
}
|
|
210
|
+
}
|
|
211
|
+
export const workosPlugin = {
|
|
212
|
+
name: 'workos',
|
|
213
|
+
register(ctx) {
|
|
214
|
+
organizationRoutes(ctx);
|
|
215
|
+
organizationDomainRoutes(ctx);
|
|
216
|
+
membershipRoutes(ctx);
|
|
217
|
+
userRoutes(ctx);
|
|
218
|
+
emailVerificationRoutes(ctx);
|
|
219
|
+
passwordResetRoutes(ctx);
|
|
220
|
+
magicAuthRoutes(ctx);
|
|
221
|
+
authFactorRoutes(ctx);
|
|
222
|
+
authChallengeRoutes(ctx);
|
|
223
|
+
sessionRoutes(ctx);
|
|
224
|
+
authRoutes(ctx);
|
|
225
|
+
connectionRoutes(ctx);
|
|
226
|
+
ssoRoutes(ctx);
|
|
227
|
+
pipeRoutes(ctx);
|
|
228
|
+
invitationRoutes(ctx);
|
|
229
|
+
configRoutes(ctx);
|
|
230
|
+
userFeatureRoutes(ctx);
|
|
231
|
+
widgetRoutes(ctx);
|
|
232
|
+
authorizationRoleRoutes(ctx);
|
|
233
|
+
authorizationPermissionRoutes(ctx);
|
|
234
|
+
authorizationOrgRoleRoutes(ctx);
|
|
235
|
+
authorizationResourceRoutes(ctx);
|
|
236
|
+
authorizationCheckRoutes(ctx);
|
|
237
|
+
portalRoutes(ctx);
|
|
238
|
+
legacyMfaRoutes(ctx);
|
|
239
|
+
apiKeyRoutes(ctx);
|
|
240
|
+
radarRoutes(ctx);
|
|
241
|
+
connectRoutes(ctx);
|
|
242
|
+
directoryRoutes(ctx);
|
|
243
|
+
auditLogRoutes(ctx);
|
|
244
|
+
featureFlagRoutes(ctx);
|
|
245
|
+
dataIntegrationRoutes(ctx);
|
|
246
|
+
webhookEndpointRoutes(ctx);
|
|
247
|
+
eventRoutes(ctx);
|
|
248
|
+
// Set up event bus with collection hooks (Option A from spec)
|
|
249
|
+
// Store on ctx.store for route-level access (hybrid Option A+B for action events)
|
|
250
|
+
const eventBus = new EventBus(ctx.store);
|
|
251
|
+
ctx.store.setData('eventBus', eventBus);
|
|
252
|
+
const ws = getWorkOSStore(ctx.store);
|
|
253
|
+
ws.users.setHooks({
|
|
254
|
+
onInsert: (u) => eventBus.emit({ event: 'user.created', data: formatUser(u) }),
|
|
255
|
+
onUpdate: (u) => eventBus.emit({ event: 'user.updated', data: formatUser(u) }),
|
|
256
|
+
onDelete: (u) => eventBus.emit({ event: 'user.deleted', data: formatUser(u) }),
|
|
257
|
+
});
|
|
258
|
+
ws.organizations.setHooks({
|
|
259
|
+
onInsert: (o) => eventBus.emit({ event: 'organization.created', data: formatOrganization(o, ws) }),
|
|
260
|
+
onUpdate: (o) => eventBus.emit({ event: 'organization.updated', data: formatOrganization(o, ws) }),
|
|
261
|
+
onDelete: (o) => eventBus.emit({ event: 'organization.deleted', data: formatOrganization(o, ws) }),
|
|
262
|
+
});
|
|
263
|
+
ws.organizationDomains.setHooks({
|
|
264
|
+
onInsert: (d) => eventBus.emit({ event: 'organization_domain.created', data: formatDomain(d) }),
|
|
265
|
+
onUpdate: (d) => eventBus.emit({
|
|
266
|
+
event: d.state === 'verified' ? 'organization_domain.verified' : 'organization_domain.updated',
|
|
267
|
+
data: formatDomain(d),
|
|
268
|
+
}),
|
|
269
|
+
onDelete: (d) => eventBus.emit({ event: 'organization_domain.deleted', data: formatDomain(d) }),
|
|
270
|
+
});
|
|
271
|
+
ws.organizationMemberships.setHooks({
|
|
272
|
+
onInsert: (m) => eventBus.emit({ event: 'organization_membership.created', data: formatMembership(m) }),
|
|
273
|
+
onUpdate: (m) => eventBus.emit({ event: 'organization_membership.updated', data: formatMembership(m) }),
|
|
274
|
+
onDelete: (m) => eventBus.emit({ event: 'organization_membership.deleted', data: formatMembership(m) }),
|
|
275
|
+
});
|
|
276
|
+
ws.connections.setHooks({
|
|
277
|
+
onInsert: (c) => eventBus.emit({ event: 'connection.created', data: formatConnection(c) }),
|
|
278
|
+
onUpdate: (c) => eventBus.emit({ event: 'connection.updated', data: formatConnection(c) }),
|
|
279
|
+
onDelete: (c) => eventBus.emit({ event: 'connection.deleted', data: formatConnection(c) }),
|
|
280
|
+
});
|
|
281
|
+
ws.sessions.setHooks({
|
|
282
|
+
onInsert: (s) => eventBus.emit({ event: 'session.created', data: formatSession(s) }),
|
|
283
|
+
onDelete: (s) => eventBus.emit({ event: 'session.revoked', data: formatSession(s) }),
|
|
284
|
+
});
|
|
285
|
+
ws.invitations.setHooks({
|
|
286
|
+
onInsert: (i) => eventBus.emit({ event: 'invitation.created', data: formatInvitation(i) }),
|
|
287
|
+
});
|
|
288
|
+
ws.roles.setHooks({
|
|
289
|
+
onInsert: (r) => eventBus.emit({ event: 'role.created', data: formatRole(r) }),
|
|
290
|
+
onUpdate: (r) => eventBus.emit({ event: 'role.updated', data: formatRole(r) }),
|
|
291
|
+
onDelete: (r) => eventBus.emit({ event: 'role.deleted', data: formatRole(r) }),
|
|
292
|
+
});
|
|
293
|
+
ws.permissions.setHooks({
|
|
294
|
+
onInsert: (p) => eventBus.emit({ event: 'permission.created', data: formatPermission(p) }),
|
|
295
|
+
onUpdate: (p) => eventBus.emit({ event: 'permission.updated', data: formatPermission(p) }),
|
|
296
|
+
onDelete: (p) => eventBus.emit({ event: 'permission.deleted', data: formatPermission(p) }),
|
|
297
|
+
});
|
|
298
|
+
ws.directories.setHooks({
|
|
299
|
+
onInsert: (d) => eventBus.emit({ event: 'directory.created', data: formatDirectory(d) }),
|
|
300
|
+
onUpdate: (d) => eventBus.emit({ event: 'directory.updated', data: formatDirectory(d) }),
|
|
301
|
+
onDelete: (d) => eventBus.emit({ event: 'directory.deleted', data: formatDirectory(d) }),
|
|
302
|
+
});
|
|
303
|
+
ws.directoryUsers.setHooks({
|
|
304
|
+
onInsert: (u) => eventBus.emit({ event: 'directory_user.created', data: formatDirectoryUser(u) }),
|
|
305
|
+
onUpdate: (u) => eventBus.emit({ event: 'directory_user.updated', data: formatDirectoryUser(u) }),
|
|
306
|
+
onDelete: (u) => eventBus.emit({ event: 'directory_user.deleted', data: formatDirectoryUser(u) }),
|
|
307
|
+
});
|
|
308
|
+
ws.directoryGroups.setHooks({
|
|
309
|
+
onInsert: (g) => eventBus.emit({ event: 'directory_group.created', data: formatDirectoryGroup(g) }),
|
|
310
|
+
onUpdate: (g) => eventBus.emit({ event: 'directory_group.updated', data: formatDirectoryGroup(g) }),
|
|
311
|
+
onDelete: (g) => eventBus.emit({ event: 'directory_group.deleted', data: formatDirectoryGroup(g) }),
|
|
312
|
+
});
|
|
313
|
+
},
|
|
314
|
+
seed(store, baseUrl) {
|
|
315
|
+
seedDefaults(store, baseUrl);
|
|
316
|
+
},
|
|
317
|
+
};
|
|
318
|
+
export default workosPlugin;
|
|
319
|
+
//# sourceMappingURL=index.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../../src/emulate/workos/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,WAAW,EAAE,MAAM,aAAa,CAAC;AAE1C,OAAO,EAAE,UAAU,EAAE,MAAM,kBAAkB,CAAC;AAC9C,OAAO,EAAE,cAAc,EAAoB,MAAM,YAAY,CAAC;AAC9D,OAAO,EAAE,kBAAkB,EAAE,MAAM,2BAA2B,CAAC;AAC/D,OAAO,EAAE,wBAAwB,EAAE,MAAM,kCAAkC,CAAC;AAC5E,OAAO,EAAE,gBAAgB,EAAE,MAAM,yBAAyB,CAAC;AAC3D,OAAO,EAAE,UAAU,EAAE,MAAM,mBAAmB,CAAC;AAC/C,OAAO,EAAE,uBAAuB,EAAE,MAAM,gCAAgC,CAAC;AACzE,OAAO,EAAE,mBAAmB,EAAE,MAAM,4BAA4B,CAAC;AACjE,OAAO,EAAE,eAAe,EAAE,MAAM,wBAAwB,CAAC;AACzD,OAAO,EAAE,gBAAgB,EAAE,MAAM,0BAA0B,CAAC;AAC5D,OAAO,EAAE,aAAa,EAAE,MAAM,sBAAsB,CAAC;AACrD,OAAO,EAAE,UAAU,EAAE,MAAM,kBAAkB,CAAC;AAC9C,OAAO,EAAE,gBAAgB,EAAE,MAAM,yBAAyB,CAAC;AAC3D,OAAO,EAAE,SAAS,EAAE,MAAM,iBAAiB,CAAC;AAC5C,OAAO,EAAE,UAAU,EAAE,MAAM,mBAAmB,CAAC;AAC/C,OAAO,EAAE,mBAAmB,EAAE,MAAM,6BAA6B,CAAC;AAClE,OAAO,EAAE,gBAAgB,EAAE,MAAM,yBAAyB,CAAC;AAC3D,OAAO,EAAE,YAAY,EAAE,MAAM,oBAAoB,CAAC;AAClD,OAAO,EAAE,iBAAiB,EAAE,MAAM,2BAA2B,CAAC;AAC9D,OAAO,EAAE,YAAY,EAAE,MAAM,qBAAqB,CAAC;AACnD,OAAO,EAAE,uBAAuB,EAAE,MAAM,iCAAiC,CAAC;AAC1E,OAAO,EAAE,6BAA6B,EAAE,MAAM,uCAAuC,CAAC;AACtF,OAAO,EAAE,0BAA0B,EAAE,MAAM,qCAAqC,CAAC;AACjF,OAAO,EAAE,2BAA2B,EAAE,MAAM,qCAAqC,CAAC;AAClF,OAAO,EAAE,wBAAwB,EAAE,MAAM,kCAAkC,CAAC;AAC5E,OAAO,EAAE,YAAY,EAAE,MAAM,oBAAoB,CAAC;AAClD,OAAO,EAAE,eAAe,EAAE,MAAM,wBAAwB,CAAC;AACzD,OAAO,EAAE,YAAY,EAAE,MAAM,sBAAsB,CAAC;AACpD,OAAO,EAAE,WAAW,EAAE,MAAM,mBAAmB,CAAC;AAChD,OAAO,EAAE,aAAa,EAAE,MAAM,qBAAqB,CAAC;AACpD,OAAO,EAAE,eAAe,EAAE,MAAM,yBAAyB,CAAC;AAC1D,OAAO,EAAE,cAAc,EAAE,MAAM,wBAAwB,CAAC;AACxD,OAAO,EAAE,iBAAiB,EAAE,MAAM,2BAA2B,CAAC;AAC9D,OAAO,EAAE,qBAAqB,EAAE,MAAM,+BAA+B,CAAC;AACtE,OAAO,EAAE,qBAAqB,EAAE,MAAM,+BAA+B,CAAC;AACtE,OAAO,EAAE,WAAW,EAAE,MAAM,oBAAoB,CAAC;AACjD,OAAO,EAAE,QAAQ,EAAE,MAAM,gBAAgB,CAAC;AAC1C,OAAO,EACL,yBAAyB,EACzB,YAAY,EACZ,SAAS,EACT,UAAU,EACV,kBAAkB,EAClB,gBAAgB,EAChB,gBAAgB,EAChB,aAAa,EACb,gBAAgB,EAChB,UAAU,EACV,gBAAgB,EAChB,eAAe,EACf,mBAAmB,EACnB,oBAAoB,EACpB,YAAY,GACb,MAAM,cAAc,CAAC;AAGtB,OAAO,EAAE,cAAc,EAAoB,MAAM,YAAY,CAAC;AAC9D,cAAc,eAAe,CAAC;AAyF9B,SAAS,YAAY,CAAC,MAAa,EAAE,QAAgB;IACnD,4DAA4D;AAC9D,CAAC;AAED,MAAM,UAAU,cAAc,CAAC,KAAY,EAAE,QAAgB,EAAE,MAAwB;IACrF,MAAM,EAAE,GAAG,cAAc,CAAC,KAAK,CAAC,CAAC;IAEjC,IAAI,MAAM,CAAC,KAAK,EAAE,CAAC;QACjB,KAAK,MAAM,UAAU,IAAI,MAAM,CAAC,KAAK,EAAE,CAAC;YACtC,EAAE,CAAC,KAAK,CAAC,MAAM,CAAC;gBACd,MAAM,EAAE,MAAM;gBACd,KAAK,EAAE,UAAU,CAAC,KAAK;gBACvB,UAAU,EAAE,UAAU,CAAC,UAAU,IAAI,IAAI;gBACzC,SAAS,EAAE,UAAU,CAAC,SAAS,IAAI,IAAI;gBACvC,cAAc,EAAE,UAAU,CAAC,cAAc,IAAI,KAAK;gBAClD,mBAAmB,EAAE,IAAI;gBACzB,eAAe,EAAE,IAAI;gBACrB,WAAW,EAAE,UAAU,CAAC,WAAW,IAAI,IAAI;gBAC3C,QAAQ,EAAE,UAAU,CAAC,QAAQ,IAAI,EAAE;gBACnC,MAAM,EAAE,IAAI;gBACZ,aAAa,EAAE,UAAU,CAAC,QAAQ,CAAC,CAAC,CAAC,YAAY,CAAC,UAAU,CAAC,QAAQ,CAAC,CAAC,CAAC,CAAC,IAAI;gBAC7E,YAAY,EAAE,UAAU,CAAC,YAAY,IAAI,IAAI;aAC9C,CAAC,CAAC;QACL,CAAC;IACH,CAAC;IAED,IAAI,MAAM,CAAC,aAAa,EAAE,CAAC;QACzB,KAAK,MAAM,SAAS,IAAI,MAAM,CAAC,aAAa,EAAE,CAAC;YAC7C,MAAM,GAAG,GAAG,EAAE,CAAC,aAAa,CAAC,MAAM,CAAC;gBAClC,MAAM,EAAE,cAAc;gBACtB,IAAI,EAAE,SAAS,CAAC,IAAI;gBACpB,WAAW,EAAE,SAAS,CAAC,WAAW,IAAI,IAAI;gBAC1C,QAAQ,EAAE,SAAS,CAAC,QAAQ,IAAI,EAAE;gBAClC,kBAAkB,EAAE,IAAI;aACzB,CAAC,CAAC;YAEH,IAAI,SAAS,CAAC,OAAO,EAAE,CAAC;gBACtB,KAAK,MAAM,EAAE,IAAI,SAAS,CAAC,OAAO,EAAE,CAAC;oBACnC,EAAE,CAAC,mBAAmB,CAAC,MAAM,CAAC;wBAC5B,MAAM,EAAE,qBAAqB;wBAC7B,eAAe,EAAE,GAAG,CAAC,EAAE;wBACvB,MAAM,EAAE,EAAE,CAAC,MAAM;wBACjB,KAAK,EAAE,EAAE,CAAC,KAAK,IAAI,SAAS;wBAC5B,qBAAqB,EAAE,QAAQ;wBAC/B,kBAAkB,EAAE,yBAAyB,EAAE;wBAC/C,mBAAmB,EAAE,eAAe;qBACrC,CAAC,CAAC;gBACL,CAAC;YACH,CAAC;YAED,IAAI,SAAS,CAAC,WAAW,EAAE,CAAC;gBAC1B,KAAK,MAAM,EAAE,IAAI,SAAS,CAAC,WAAW,EAAE,CAAC;oBACvC,EAAE,CAAC,uBAAuB,CAAC,MAAM,CAAC;wBAChC,MAAM,EAAE,yBAAyB;wBACjC,eAAe,EAAE,GAAG,CAAC,EAAE;wBACvB,OAAO,EAAE,EAAE,CAAC,OAAO;wBACnB,IAAI,EAAE,EAAE,IAAI,EAAE,EAAE,CAAC,IAAI,IAAI,QAAQ,EAAE;wBACnC,MAAM,EAAE,EAAE,CAAC,MAAM,IAAI,QAAQ;wBAC7B,WAAW,EAAE,IAAI;wBACjB,QAAQ,EAAE,EAAE;qBACb,CAAC,CAAC;gBACL,CAAC;YACH,CAAC;QACH,CAAC;IACH,CAAC;IAED,IAAI,MAAM,CAAC,WAAW,EAAE,CAAC;QACvB,KAAK,MAAM,UAAU,IAAI,MAAM,CAAC,WAAW,EAAE,CAAC;YAC5C,MAAM,GAAG,GAAG,EAAE,CAAC,aAAa,CAAC,SAAS,CAAC,MAAM,EAAE,UAAU,CAAC,YAAY,CAAC,CAAC;YACxE,IAAI,CAAC,GAAG;gBAAE,SAAS;YAEnB,MAAM,OAAO,GAAG,CAAC,UAAU,CAAC,OAAO,IAAI,EAAE,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC;gBACrD,MAAM,EAAE,mBAA4B;gBACpC,EAAE,EAAE,UAAU,CAAC,aAAa,CAAC;gBAC7B,MAAM,EAAE,CAAC;aACV,CAAC,CAAC,CAAC;YAEJ,MAAM,IAAI,GAAG,EAAE,CAAC,WAAW,CAAC,MAAM,CAAC;gBACjC,MAAM,EAAE,YAAY;gBACpB,eAAe,EAAE,GAAG,CAAC,EAAE;gBACvB,eAAe,EAAE,UAAU,CAAC,eAAe,IAAI,aAAa;gBAC5D,IAAI,EAAE,UAAU,CAAC,IAAI;gBACrB,KAAK,EAAE,UAAU,CAAC,KAAK,IAAI,QAAQ;gBACnC,OAAO;aACR,CAAC,CAAC;YAEH,IAAI,UAAU,CAAC,QAAQ,EAAE,CAAC;gBACxB,KAAK,MAAM,CAAC,IAAI,UAAU,CAAC,QAAQ,EAAE,CAAC;oBACpC,EAAE,CAAC,WAAW,CAAC,MAAM,CAAC;wBACpB,MAAM,EAAE,SAAS;wBACjB,aAAa,EAAE,IAAI,CAAC,EAAE;wBACtB,eAAe,EAAE,IAAI,CAAC,eAAe;wBACrC,eAAe,EAAE,GAAG,CAAC,EAAE;wBACvB,MAAM,EAAE,CAAC,CAAC,MAAM,IAAI,OAAO,UAAU,CAAC,KAAK,CAAC,EAAE;wBAC9C,KAAK,EAAE,CAAC,CAAC,KAAK;wBACd,UAAU,EAAE,CAAC,CAAC,UAAU,IAAI,IAAI;wBAChC,SAAS,EAAE,CAAC,CAAC,SAAS,IAAI,IAAI;wBAC9B,MAAM,EAAE,CAAC,CAAC,MAAM,IAAI,EAAE;wBACtB,cAAc,EAAE,EAAE,KAAK,EAAE,CAAC,CAAC,KAAK,EAAE;qBACnC,CAAC,CAAC;gBACL,CAAC;YACH,CAAC;QACH,CAAC;IACH,CAAC;IAED,IAAI,MAAM,CAAC,eAAe,EAAE,CAAC;QAC3B,KAAK,MAAM,EAAE,IAAI,MAAM,CAAC,eAAe,EAAE,CAAC;YACxC,EAAE,CAAC,eAAe,CAAC,MAAM,CAAC;gBACxB,MAAM,EAAE,iBAAiB;gBACzB,OAAO,EAAE,EAAE,CAAC,OAAO;gBACnB,QAAQ,EAAE,EAAE,CAAC,QAAQ;gBACrB,MAAM,EAAE,EAAE,CAAC,MAAM;gBACjB,MAAM,EAAE,EAAE,CAAC,MAAM,IAAI,WAAW;gBAChC,mBAAmB,EAAE,EAAE,CAAC,mBAAmB,IAAI,IAAI;aACpD,CAAC,CAAC;QACL,CAAC;IACH,CAAC;IAED,IAAI,MAAM,CAAC,WAAW,EAAE,CAAC;QACvB,KAAK,MAAM,UAAU,IAAI,MAAM,CAAC,WAAW,EAAE,CAAC;YAC5C,EAAE,CAAC,WAAW,CAAC,MAAM,CAAC;gBACpB,MAAM,EAAE,YAAY;gBACpB,IAAI,EAAE,UAAU,CAAC,IAAI;gBACrB,IAAI,EAAE,UAAU,CAAC,IAAI;gBACrB,WAAW,EAAE,UAAU,CAAC,WAAW,IAAI,IAAI;aAC5C,CAAC,CAAC;QACL,CAAC;IACH,CAAC;IAED,IAAI,MAAM,CAAC,KAAK,EAAE,CAAC;QACjB,KAAK,MAAM,UAAU,IAAI,MAAM,CAAC,KAAK,EAAE,CAAC;YACtC,MAAM,IAAI,GAAG,EAAE,CAAC,KAAK,CAAC,MAAM,CAAC;gBAC3B,MAAM,EAAE,MAAM;gBACd,IAAI,EAAE,UAAU,CAAC,IAAI;gBACrB,IAAI,EAAE,UAAU,CAAC,IAAI;gBACrB,WAAW,EAAE,UAAU,CAAC,WAAW,IAAI,IAAI;gBAC3C,IAAI,EAAE,UAAU,CAAC,IAAI,IAAI,iBAAiB;gBAC1C,eAAe,EAAE,UAAU,CAAC,eAAe,IAAI,IAAI;gBACnD,eAAe,EAAE,UAAU,CAAC,eAAe,IAAI,KAAK;gBACpD,QAAQ,EAAE,UAAU,CAAC,QAAQ,IAAI,CAAC;aACnC,CAAC,CAAC;YAEH,IAAI,UAAU,CAAC,WAAW,EAAE,CAAC;gBAC3B,KAAK,MAAM,QAAQ,IAAI,UAAU,CAAC,WAAW,EAAE,CAAC;oBAC9C,MAAM,IAAI,GAAG,EAAE,CAAC,WAAW,CAAC,SAAS,CAAC,MAAM,EAAE,QAAQ,CAAC,CAAC;oBACxD,IAAI,IAAI,EAAE,CAAC;wBACT,EAAE,CAAC,eAAe,CAAC,MAAM,CAAC,EAAE,OAAO,EAAE,IAAI,CAAC,EAAE,EAAE,aAAa,EAAE,IAAI,CAAC,EAAE,EAAE,CAAC,CAAC;oBAC1E,CAAC;gBACH,CAAC;YACH,CAAC;QACH,CAAC;IACH,CAAC;IAED,IAAI,MAAM,CAAC,WAAW,EAAE,CAAC;QACvB,KAAK,MAAM,SAAS,IAAI,MAAM,CAAC,WAAW,EAAE,CAAC;YAC3C,MAAM,KAAK,GAAG,yBAAyB,EAAE,CAAC;YAC1C,EAAE,CAAC,WAAW,CAAC,MAAM,CAAC;gBACpB,MAAM,EAAE,YAAY;gBACpB,KAAK,EAAE,SAAS,CAAC,KAAK;gBACtB,KAAK,EAAE,SAAS;gBAChB,KAAK;gBACL,qBAAqB,EAAE,GAAG,QAAQ,6CAA6C,KAAK,EAAE;gBACtF,eAAe,EAAE,SAAS,CAAC,eAAe,IAAI,IAAI;gBAClD,eAAe,EAAE,SAAS,CAAC,eAAe,IAAI,IAAI;gBAClD,SAAS,EAAE,SAAS,CAAC,SAAS,IAAI,IAAI;gBACtC,UAAU,EAAE,SAAS,CAAC,EAAE,GAAG,EAAE,CAAC;aAC/B,CAAC,CAAC;QACL,CAAC;IACH,CAAC;IAED,IAAI,MAAM,CAAC,gBAAgB,EAAE,CAAC;QAC5B,KAAK,MAAM,QAAQ,IAAI,MAAM,CAAC,gBAAgB,EAAE,CAAC;YAC/C,EAAE,CAAC,gBAAgB,CAAC,MAAM,CAAC;gBACzB,MAAM,EAAE,kBAAkB;gBAC1B,GAAG,EAAE,QAAQ,CAAC,GAAG;gBACjB,MAAM,EAAE,WAAW,CAAC,EAAE,CAAC,CAAC,QAAQ,CAAC,KAAK,CAAC;gBACvC,OAAO,EAAE,QAAQ,CAAC,OAAO,KAAK,KAAK;gBACnC,MAAM,EAAE,QAAQ,CAAC,MAAM,IAAI,EAAE;gBAC7B,WAAW,EAAE,IAAI;aAClB,CAAC,CAAC;QACL,CAAC;IACH,CAAC;AACH,CAAC;AAED,MAAM,CAAC,MAAM,YAAY,GAAkB;IACzC,IAAI,EAAE,QAAQ;IACd,QAAQ,CAAC,GAAiB;QACxB,kBAAkB,CAAC,GAAG,CAAC,CAAC;QACxB,wBAAwB,CAAC,GAAG,CAAC,CAAC;QAC9B,gBAAgB,CAAC,GAAG,CAAC,CAAC;QACtB,UAAU,CAAC,GAAG,CAAC,CAAC;QAChB,uBAAuB,CAAC,GAAG,CAAC,CAAC;QAC7B,mBAAmB,CAAC,GAAG,CAAC,CAAC;QACzB,eAAe,CAAC,GAAG,CAAC,CAAC;QACrB,gBAAgB,CAAC,GAAG,CAAC,CAAC;QACtB,mBAAmB,CAAC,GAAG,CAAC,CAAC;QACzB,aAAa,CAAC,GAAG,CAAC,CAAC;QACnB,UAAU,CAAC,GAAG,CAAC,CAAC;QAChB,gBAAgB,CAAC,GAAG,CAAC,CAAC;QACtB,SAAS,CAAC,GAAG,CAAC,CAAC;QACf,UAAU,CAAC,GAAG,CAAC,CAAC;QAChB,gBAAgB,CAAC,GAAG,CAAC,CAAC;QACtB,YAAY,CAAC,GAAG,CAAC,CAAC;QAClB,iBAAiB,CAAC,GAAG,CAAC,CAAC;QACvB,YAAY,CAAC,GAAG,CAAC,CAAC;QAClB,uBAAuB,CAAC,GAAG,CAAC,CAAC;QAC7B,6BAA6B,CAAC,GAAG,CAAC,CAAC;QACnC,0BAA0B,CAAC,GAAG,CAAC,CAAC;QAChC,2BAA2B,CAAC,GAAG,CAAC,CAAC;QACjC,wBAAwB,CAAC,GAAG,CAAC,CAAC;QAC9B,YAAY,CAAC,GAAG,CAAC,CAAC;QAClB,eAAe,CAAC,GAAG,CAAC,CAAC;QACrB,YAAY,CAAC,GAAG,CAAC,CAAC;QAClB,WAAW,CAAC,GAAG,CAAC,CAAC;QACjB,aAAa,CAAC,GAAG,CAAC,CAAC;QACnB,eAAe,CAAC,GAAG,CAAC,CAAC;QACrB,cAAc,CAAC,GAAG,CAAC,CAAC;QACpB,iBAAiB,CAAC,GAAG,CAAC,CAAC;QACvB,qBAAqB,CAAC,GAAG,CAAC,CAAC;QAC3B,qBAAqB,CAAC,GAAG,CAAC,CAAC;QAC3B,WAAW,CAAC,GAAG,CAAC,CAAC;QAEjB,8DAA8D;QAC9D,kFAAkF;QAClF,MAAM,QAAQ,GAAG,IAAI,QAAQ,CAAC,GAAG,CAAC,KAAK,CAAC,CAAC;QACzC,GAAG,CAAC,KAAK,CAAC,OAAO,CAAC,UAAU,EAAE,QAAQ,CAAC,CAAC;QACxC,MAAM,EAAE,GAAG,cAAc,CAAC,GAAG,CAAC,KAAK,CAAC,CAAC;QAErC,EAAE,CAAC,KAAK,CAAC,QAAQ,CAAC;YAChB,QAAQ,EAAE,CAAC,CAAC,EAAE,EAAE,CAAC,QAAQ,CAAC,IAAI,CAAC,EAAE,KAAK,EAAE,cAAc,EAAE,IAAI,EAAE,UAAU,CAAC,CAAC,CAAC,EAAE,CAAC;YAC9E,QAAQ,EAAE,CAAC,CAAC,EAAE,EAAE,CAAC,QAAQ,CAAC,IAAI,CAAC,EAAE,KAAK,EAAE,cAAc,EAAE,IAAI,EAAE,UAAU,CAAC,CAAC,CAAC,EAAE,CAAC;YAC9E,QAAQ,EAAE,CAAC,CAAC,EAAE,EAAE,CAAC,QAAQ,CAAC,IAAI,CAAC,EAAE,KAAK,EAAE,cAAc,EAAE,IAAI,EAAE,UAAU,CAAC,CAAC,CAAC,EAAE,CAAC;SAC/E,CAAC,CAAC;QACH,EAAE,CAAC,aAAa,CAAC,QAAQ,CAAC;YACxB,QAAQ,EAAE,CAAC,CAAC,EAAE,EAAE,CAAC,QAAQ,CAAC,IAAI,CAAC,EAAE,KAAK,EAAE,sBAAsB,EAAE,IAAI,EAAE,kBAAkB,CAAC,CAAC,EAAE,EAAE,CAAC,EAAE,CAAC;YAClG,QAAQ,EAAE,CAAC,CAAC,EAAE,EAAE,CAAC,QAAQ,CAAC,IAAI,CAAC,EAAE,KAAK,EAAE,sBAAsB,EAAE,IAAI,EAAE,kBAAkB,CAAC,CAAC,EAAE,EAAE,CAAC,EAAE,CAAC;YAClG,QAAQ,EAAE,CAAC,CAAC,EAAE,EAAE,CAAC,QAAQ,CAAC,IAAI,CAAC,EAAE,KAAK,EAAE,sBAAsB,EAAE,IAAI,EAAE,kBAAkB,CAAC,CAAC,EAAE,EAAE,CAAC,EAAE,CAAC;SACnG,CAAC,CAAC;QACH,EAAE,CAAC,mBAAmB,CAAC,QAAQ,CAAC;YAC9B,QAAQ,EAAE,CAAC,CAAC,EAAE,EAAE,CAAC,QAAQ,CAAC,IAAI,CAAC,EAAE,KAAK,EAAE,6BAA6B,EAAE,IAAI,EAAE,YAAY,CAAC,CAAC,CAAC,EAAE,CAAC;YAC/F,QAAQ,EAAE,CAAC,CAAC,EAAE,EAAE,CACd,QAAQ,CAAC,IAAI,CAAC;gBACZ,KAAK,EAAE,CAAC,CAAC,KAAK,KAAK,UAAU,CAAC,CAAC,CAAC,8BAA8B,CAAC,CAAC,CAAC,6BAA6B;gBAC9F,IAAI,EAAE,YAAY,CAAC,CAAC,CAAC;aACtB,CAAC;YACJ,QAAQ,EAAE,CAAC,CAAC,EAAE,EAAE,CAAC,QAAQ,CAAC,IAAI,CAAC,EAAE,KAAK,EAAE,6BAA6B,EAAE,IAAI,EAAE,YAAY,CAAC,CAAC,CAAC,EAAE,CAAC;SAChG,CAAC,CAAC;QACH,EAAE,CAAC,uBAAuB,CAAC,QAAQ,CAAC;YAClC,QAAQ,EAAE,CAAC,CAAC,EAAE,EAAE,CAAC,QAAQ,CAAC,IAAI,CAAC,EAAE,KAAK,EAAE,iCAAiC,EAAE,IAAI,EAAE,gBAAgB,CAAC,CAAC,CAAC,EAAE,CAAC;YACvG,QAAQ,EAAE,CAAC,CAAC,EAAE,EAAE,CAAC,QAAQ,CAAC,IAAI,CAAC,EAAE,KAAK,EAAE,iCAAiC,EAAE,IAAI,EAAE,gBAAgB,CAAC,CAAC,CAAC,EAAE,CAAC;YACvG,QAAQ,EAAE,CAAC,CAAC,EAAE,EAAE,CAAC,QAAQ,CAAC,IAAI,CAAC,EAAE,KAAK,EAAE,iCAAiC,EAAE,IAAI,EAAE,gBAAgB,CAAC,CAAC,CAAC,EAAE,CAAC;SACxG,CAAC,CAAC;QACH,EAAE,CAAC,WAAW,CAAC,QAAQ,CAAC;YACtB,QAAQ,EAAE,CAAC,CAAC,EAAE,EAAE,CAAC,QAAQ,CAAC,IAAI,CAAC,EAAE,KAAK,EAAE,oBAAoB,EAAE,IAAI,EAAE,gBAAgB,CAAC,CAAC,CAAC,EAAE,CAAC;YAC1F,QAAQ,EAAE,CAAC,CAAC,EAAE,EAAE,CAAC,QAAQ,CAAC,IAAI,CAAC,EAAE,KAAK,EAAE,oBAAoB,EAAE,IAAI,EAAE,gBAAgB,CAAC,CAAC,CAAC,EAAE,CAAC;YAC1F,QAAQ,EAAE,CAAC,CAAC,EAAE,EAAE,CAAC,QAAQ,CAAC,IAAI,CAAC,EAAE,KAAK,EAAE,oBAAoB,EAAE,IAAI,EAAE,gBAAgB,CAAC,CAAC,CAAC,EAAE,CAAC;SAC3F,CAAC,CAAC;QACH,EAAE,CAAC,QAAQ,CAAC,QAAQ,CAAC;YACnB,QAAQ,EAAE,CAAC,CAAC,EAAE,EAAE,CAAC,QAAQ,CAAC,IAAI,CAAC,EAAE,KAAK,EAAE,iBAAiB,EAAE,IAAI,EAAE,aAAa,CAAC,CAAC,CAAC,EAAE,CAAC;YACpF,QAAQ,EAAE,CAAC,CAAC,EAAE,EAAE,CAAC,QAAQ,CAAC,IAAI,CAAC,EAAE,KAAK,EAAE,iBAAiB,EAAE,IAAI,EAAE,aAAa,CAAC,CAAC,CAAC,EAAE,CAAC;SACrF,CAAC,CAAC;QACH,EAAE,CAAC,WAAW,CAAC,QAAQ,CAAC;YACtB,QAAQ,EAAE,CAAC,CAAC,EAAE,EAAE,CAAC,QAAQ,CAAC,IAAI,CAAC,EAAE,KAAK,EAAE,oBAAoB,EAAE,IAAI,EAAE,gBAAgB,CAAC,CAAC,CAAC,EAAE,CAAC;SAC3F,CAAC,CAAC;QACH,EAAE,CAAC,KAAK,CAAC,QAAQ,CAAC;YAChB,QAAQ,EAAE,CAAC,CAAC,EAAE,EAAE,CAAC,QAAQ,CAAC,IAAI,CAAC,EAAE,KAAK,EAAE,cAAc,EAAE,IAAI,EAAE,UAAU,CAAC,CAAC,CAAC,EAAE,CAAC;YAC9E,QAAQ,EAAE,CAAC,CAAC,EAAE,EAAE,CAAC,QAAQ,CAAC,IAAI,CAAC,EAAE,KAAK,EAAE,cAAc,EAAE,IAAI,EAAE,UAAU,CAAC,CAAC,CAAC,EAAE,CAAC;YAC9E,QAAQ,EAAE,CAAC,CAAC,EAAE,EAAE,CAAC,QAAQ,CAAC,IAAI,CAAC,EAAE,KAAK,EAAE,cAAc,EAAE,IAAI,EAAE,UAAU,CAAC,CAAC,CAAC,EAAE,CAAC;SAC/E,CAAC,CAAC;QACH,EAAE,CAAC,WAAW,CAAC,QAAQ,CAAC;YACtB,QAAQ,EAAE,CAAC,CAAC,EAAE,EAAE,CAAC,QAAQ,CAAC,IAAI,CAAC,EAAE,KAAK,EAAE,oBAAoB,EAAE,IAAI,EAAE,gBAAgB,CAAC,CAAC,CAAC,EAAE,CAAC;YAC1F,QAAQ,EAAE,CAAC,CAAC,EAAE,EAAE,CAAC,QAAQ,CAAC,IAAI,CAAC,EAAE,KAAK,EAAE,oBAAoB,EAAE,IAAI,EAAE,gBAAgB,CAAC,CAAC,CAAC,EAAE,CAAC;YAC1F,QAAQ,EAAE,CAAC,CAAC,EAAE,EAAE,CAAC,QAAQ,CAAC,IAAI,CAAC,EAAE,KAAK,EAAE,oBAAoB,EAAE,IAAI,EAAE,gBAAgB,CAAC,CAAC,CAAC,EAAE,CAAC;SAC3F,CAAC,CAAC;QACH,EAAE,CAAC,WAAW,CAAC,QAAQ,CAAC;YACtB,QAAQ,EAAE,CAAC,CAAC,EAAE,EAAE,CAAC,QAAQ,CAAC,IAAI,CAAC,EAAE,KAAK,EAAE,mBAAmB,EAAE,IAAI,EAAE,eAAe,CAAC,CAAC,CAAC,EAAE,CAAC;YACxF,QAAQ,EAAE,CAAC,CAAC,EAAE,EAAE,CAAC,QAAQ,CAAC,IAAI,CAAC,EAAE,KAAK,EAAE,mBAAmB,EAAE,IAAI,EAAE,eAAe,CAAC,CAAC,CAAC,EAAE,CAAC;YACxF,QAAQ,EAAE,CAAC,CAAC,EAAE,EAAE,CAAC,QAAQ,CAAC,IAAI,CAAC,EAAE,KAAK,EAAE,mBAAmB,EAAE,IAAI,EAAE,eAAe,CAAC,CAAC,CAAC,EAAE,CAAC;SACzF,CAAC,CAAC;QACH,EAAE,CAAC,cAAc,CAAC,QAAQ,CAAC;YACzB,QAAQ,EAAE,CAAC,CAAC,EAAE,EAAE,CAAC,QAAQ,CAAC,IAAI,CAAC,EAAE,KAAK,EAAE,wBAAwB,EAAE,IAAI,EAAE,mBAAmB,CAAC,CAAC,CAAC,EAAE,CAAC;YACjG,QAAQ,EAAE,CAAC,CAAC,EAAE,EAAE,CAAC,QAAQ,CAAC,IAAI,CAAC,EAAE,KAAK,EAAE,wBAAwB,EAAE,IAAI,EAAE,mBAAmB,CAAC,CAAC,CAAC,EAAE,CAAC;YACjG,QAAQ,EAAE,CAAC,CAAC,EAAE,EAAE,CAAC,QAAQ,CAAC,IAAI,CAAC,EAAE,KAAK,EAAE,wBAAwB,EAAE,IAAI,EAAE,mBAAmB,CAAC,CAAC,CAAC,EAAE,CAAC;SAClG,CAAC,CAAC;QACH,EAAE,CAAC,eAAe,CAAC,QAAQ,CAAC;YAC1B,QAAQ,EAAE,CAAC,CAAC,EAAE,EAAE,CAAC,QAAQ,CAAC,IAAI,CAAC,EAAE,KAAK,EAAE,yBAAyB,EAAE,IAAI,EAAE,oBAAoB,CAAC,CAAC,CAAC,EAAE,CAAC;YACnG,QAAQ,EAAE,CAAC,CAAC,EAAE,EAAE,CAAC,QAAQ,CAAC,IAAI,CAAC,EAAE,KAAK,EAAE,yBAAyB,EAAE,IAAI,EAAE,oBAAoB,CAAC,CAAC,CAAC,EAAE,CAAC;YACnG,QAAQ,EAAE,CAAC,CAAC,EAAE,EAAE,CAAC,QAAQ,CAAC,IAAI,CAAC,EAAE,KAAK,EAAE,yBAAyB,EAAE,IAAI,EAAE,oBAAoB,CAAC,CAAC,CAAC,EAAE,CAAC;SACpG,CAAC,CAAC;IACL,CAAC;IACD,IAAI,CAAC,KAAY,EAAE,OAAe;QAChC,YAAY,CAAC,KAAK,EAAE,OAAO,CAAC,CAAC;IAC/B,CAAC;CACF,CAAC;AAEF,eAAe,YAAY,CAAC","sourcesContent":["import { randomBytes } from 'node:crypto';\nimport type { ServicePlugin, Store, RouteContext } from '../core/index.js';\nimport { generateId } from '../core/index.js';\nimport { getWorkOSStore, type WorkOSStore } from './store.js';\nimport { organizationRoutes } from './routes/organizations.js';\nimport { organizationDomainRoutes } from './routes/organization-domains.js';\nimport { membershipRoutes } from './routes/memberships.js';\nimport { userRoutes } from './routes/users.js';\nimport { emailVerificationRoutes } from './routes/email-verification.js';\nimport { passwordResetRoutes } from './routes/password-reset.js';\nimport { magicAuthRoutes } from './routes/magic-auth.js';\nimport { authFactorRoutes } from './routes/auth-factors.js';\nimport { sessionRoutes } from './routes/sessions.js';\nimport { authRoutes } from './routes/auth.js';\nimport { connectionRoutes } from './routes/connections.js';\nimport { ssoRoutes } from './routes/sso.js';\nimport { pipeRoutes } from './routes/pipes.js';\nimport { authChallengeRoutes } from './routes/auth-challenges.js';\nimport { invitationRoutes } from './routes/invitations.js';\nimport { configRoutes } from './routes/config.js';\nimport { userFeatureRoutes } from './routes/user-features.js';\nimport { widgetRoutes } from './routes/widgets.js';\nimport { authorizationRoleRoutes } from './routes/authorization-roles.js';\nimport { authorizationPermissionRoutes } from './routes/authorization-permissions.js';\nimport { authorizationOrgRoleRoutes } from './routes/authorization-org-roles.js';\nimport { authorizationResourceRoutes } from './routes/authorization-resources.js';\nimport { authorizationCheckRoutes } from './routes/authorization-checks.js';\nimport { portalRoutes } from './routes/portal.js';\nimport { legacyMfaRoutes } from './routes/legacy-mfa.js';\nimport { apiKeyRoutes } from './routes/api-keys.js';\nimport { radarRoutes } from './routes/radar.js';\nimport { connectRoutes } from './routes/connect.js';\nimport { directoryRoutes } from './routes/directories.js';\nimport { auditLogRoutes } from './routes/audit-logs.js';\nimport { featureFlagRoutes } from './routes/feature-flags.js';\nimport { dataIntegrationRoutes } from './routes/data-integrations.js';\nimport { webhookEndpointRoutes } from './routes/webhook-endpoints.js';\nimport { eventRoutes } from './routes/events.js';\nimport { EventBus } from './event-bus.js';\nimport {\n generateVerificationToken,\n hashPassword,\n expiresIn,\n formatUser,\n formatOrganization,\n formatMembership,\n formatConnection,\n formatSession,\n formatInvitation,\n formatRole,\n formatPermission,\n formatDirectory,\n formatDirectoryUser,\n formatDirectoryGroup,\n formatDomain,\n} from './helpers.js';\nimport type { WorkOSConnectionType, PipeProvider, PipeConnectionStatus } from './entities.js';\n\nexport { getWorkOSStore, type WorkOSStore } from './store.js';\nexport * from './entities.js';\n\nexport interface WorkOSSeedOrganization {\n name: string;\n external_id?: string;\n metadata?: Record<string, string>;\n domains?: Array<{ domain: string; state?: 'verified' | 'pending' }>;\n memberships?: Array<{\n user_id: string;\n role?: string;\n status?: 'active' | 'inactive' | 'pending';\n }>;\n}\n\nexport interface WorkOSSeedUser {\n email: string;\n first_name?: string;\n last_name?: string;\n password?: string;\n email_verified?: boolean;\n external_id?: string;\n metadata?: Record<string, string>;\n impersonator?: { email: string; reason: string };\n}\n\nexport interface WorkOSSeedConnection {\n name: string;\n connection_type?: WorkOSConnectionType;\n organization: string;\n state?: 'active' | 'inactive' | 'validating';\n domains?: string[];\n profiles?: Array<{\n email: string;\n first_name?: string;\n last_name?: string;\n idp_id?: string;\n groups?: string[];\n }>;\n}\n\nexport interface WorkOSSeedPipeConnection {\n user_id: string;\n provider: PipeProvider;\n scopes: string[];\n status?: PipeConnectionStatus;\n external_account_id?: string;\n}\n\nexport interface WorkOSSeedInvitation {\n email: string;\n organization_id?: string;\n inviter_user_id?: string;\n role_slug?: string;\n}\n\nexport interface WorkOSSeedRole {\n slug: string;\n name: string;\n description?: string;\n type?: 'EnvironmentRole' | 'OrganizationRole';\n organization_id?: string;\n is_default_role?: boolean;\n priority?: number;\n permissions?: string[];\n}\n\nexport interface WorkOSSeedPermission {\n slug: string;\n name: string;\n description?: string;\n}\n\nexport interface WorkOSSeedWebhookEndpoint {\n url: string;\n events?: string[];\n enabled?: boolean;\n}\n\nexport interface WorkOSSeedConfig {\n organizations?: WorkOSSeedOrganization[];\n users?: WorkOSSeedUser[];\n connections?: WorkOSSeedConnection[];\n pipeConnections?: WorkOSSeedPipeConnection[];\n invitations?: WorkOSSeedInvitation[];\n roles?: WorkOSSeedRole[];\n permissions?: WorkOSSeedPermission[];\n webhookEndpoints?: WorkOSSeedWebhookEndpoint[];\n}\n\nfunction seedDefaults(_store: Store, _baseUrl: string): void {\n // No default seed data — users provide their own via config\n}\n\nexport function seedFromConfig(store: Store, _baseUrl: string, config: WorkOSSeedConfig): void {\n const ws = getWorkOSStore(store);\n\n if (config.users) {\n for (const userConfig of config.users) {\n ws.users.insert({\n object: 'user',\n email: userConfig.email,\n first_name: userConfig.first_name ?? null,\n last_name: userConfig.last_name ?? null,\n email_verified: userConfig.email_verified ?? false,\n profile_picture_url: null,\n last_sign_in_at: null,\n external_id: userConfig.external_id ?? null,\n metadata: userConfig.metadata ?? {},\n locale: null,\n password_hash: userConfig.password ? hashPassword(userConfig.password) : null,\n impersonator: userConfig.impersonator ?? null,\n });\n }\n }\n\n if (config.organizations) {\n for (const orgConfig of config.organizations) {\n const org = ws.organizations.insert({\n object: 'organization',\n name: orgConfig.name,\n external_id: orgConfig.external_id ?? null,\n metadata: orgConfig.metadata ?? {},\n stripe_customer_id: null,\n });\n\n if (orgConfig.domains) {\n for (const dd of orgConfig.domains) {\n ws.organizationDomains.insert({\n object: 'organization_domain',\n organization_id: org.id,\n domain: dd.domain,\n state: dd.state ?? 'pending',\n verification_strategy: 'manual',\n verification_token: generateVerificationToken(),\n verification_prefix: 'workos-verify',\n });\n }\n }\n\n if (orgConfig.memberships) {\n for (const mm of orgConfig.memberships) {\n ws.organizationMemberships.insert({\n object: 'organization_membership',\n organization_id: org.id,\n user_id: mm.user_id,\n role: { slug: mm.role ?? 'member' },\n status: mm.status ?? 'active',\n external_id: null,\n metadata: {},\n });\n }\n }\n }\n }\n\n if (config.connections) {\n for (const connConfig of config.connections) {\n const org = ws.organizations.findOneBy('name', connConfig.organization);\n if (!org) continue;\n\n const domains = (connConfig.domains ?? []).map((d) => ({\n object: 'connection_domain' as const,\n id: generateId('conn_domain'),\n domain: d,\n }));\n\n const conn = ws.connections.insert({\n object: 'connection',\n organization_id: org.id,\n connection_type: connConfig.connection_type ?? 'GenericSAML',\n name: connConfig.name,\n state: connConfig.state ?? 'active',\n domains,\n });\n\n if (connConfig.profiles) {\n for (const p of connConfig.profiles) {\n ws.ssoProfiles.insert({\n object: 'profile',\n connection_id: conn.id,\n connection_type: conn.connection_type,\n organization_id: org.id,\n idp_id: p.idp_id ?? `idp_${generateId('usr')}`,\n email: p.email,\n first_name: p.first_name ?? null,\n last_name: p.last_name ?? null,\n groups: p.groups ?? [],\n raw_attributes: { email: p.email },\n });\n }\n }\n }\n }\n\n if (config.pipeConnections) {\n for (const pc of config.pipeConnections) {\n ws.pipeConnections.insert({\n object: 'pipe_connection',\n user_id: pc.user_id,\n provider: pc.provider,\n scopes: pc.scopes,\n status: pc.status ?? 'connected',\n external_account_id: pc.external_account_id ?? null,\n });\n }\n }\n\n if (config.permissions) {\n for (const permConfig of config.permissions) {\n ws.permissions.insert({\n object: 'permission',\n slug: permConfig.slug,\n name: permConfig.name,\n description: permConfig.description ?? null,\n });\n }\n }\n\n if (config.roles) {\n for (const roleConfig of config.roles) {\n const role = ws.roles.insert({\n object: 'role',\n slug: roleConfig.slug,\n name: roleConfig.name,\n description: roleConfig.description ?? null,\n type: roleConfig.type ?? 'EnvironmentRole',\n organization_id: roleConfig.organization_id ?? null,\n is_default_role: roleConfig.is_default_role ?? false,\n priority: roleConfig.priority ?? 0,\n });\n\n if (roleConfig.permissions) {\n for (const permSlug of roleConfig.permissions) {\n const perm = ws.permissions.findOneBy('slug', permSlug);\n if (perm) {\n ws.rolePermissions.insert({ role_id: role.id, permission_id: perm.id });\n }\n }\n }\n }\n }\n\n if (config.invitations) {\n for (const invConfig of config.invitations) {\n const token = generateVerificationToken();\n ws.invitations.insert({\n object: 'invitation',\n email: invConfig.email,\n state: 'pending',\n token,\n accept_invitation_url: `${_baseUrl}/user_management/invitations/accept?token=${token}`,\n organization_id: invConfig.organization_id ?? null,\n inviter_user_id: invConfig.inviter_user_id ?? null,\n role_slug: invConfig.role_slug ?? null,\n expires_at: expiresIn(72 * 60),\n });\n }\n }\n\n if (config.webhookEndpoints) {\n for (const whConfig of config.webhookEndpoints) {\n ws.webhookEndpoints.insert({\n object: 'webhook_endpoint',\n url: whConfig.url,\n secret: randomBytes(32).toString('hex'),\n enabled: whConfig.enabled !== false,\n events: whConfig.events ?? [],\n description: null,\n });\n }\n }\n}\n\nexport const workosPlugin: ServicePlugin = {\n name: 'workos',\n register(ctx: RouteContext): void {\n organizationRoutes(ctx);\n organizationDomainRoutes(ctx);\n membershipRoutes(ctx);\n userRoutes(ctx);\n emailVerificationRoutes(ctx);\n passwordResetRoutes(ctx);\n magicAuthRoutes(ctx);\n authFactorRoutes(ctx);\n authChallengeRoutes(ctx);\n sessionRoutes(ctx);\n authRoutes(ctx);\n connectionRoutes(ctx);\n ssoRoutes(ctx);\n pipeRoutes(ctx);\n invitationRoutes(ctx);\n configRoutes(ctx);\n userFeatureRoutes(ctx);\n widgetRoutes(ctx);\n authorizationRoleRoutes(ctx);\n authorizationPermissionRoutes(ctx);\n authorizationOrgRoleRoutes(ctx);\n authorizationResourceRoutes(ctx);\n authorizationCheckRoutes(ctx);\n portalRoutes(ctx);\n legacyMfaRoutes(ctx);\n apiKeyRoutes(ctx);\n radarRoutes(ctx);\n connectRoutes(ctx);\n directoryRoutes(ctx);\n auditLogRoutes(ctx);\n featureFlagRoutes(ctx);\n dataIntegrationRoutes(ctx);\n webhookEndpointRoutes(ctx);\n eventRoutes(ctx);\n\n // Set up event bus with collection hooks (Option A from spec)\n // Store on ctx.store for route-level access (hybrid Option A+B for action events)\n const eventBus = new EventBus(ctx.store);\n ctx.store.setData('eventBus', eventBus);\n const ws = getWorkOSStore(ctx.store);\n\n ws.users.setHooks({\n onInsert: (u) => eventBus.emit({ event: 'user.created', data: formatUser(u) }),\n onUpdate: (u) => eventBus.emit({ event: 'user.updated', data: formatUser(u) }),\n onDelete: (u) => eventBus.emit({ event: 'user.deleted', data: formatUser(u) }),\n });\n ws.organizations.setHooks({\n onInsert: (o) => eventBus.emit({ event: 'organization.created', data: formatOrganization(o, ws) }),\n onUpdate: (o) => eventBus.emit({ event: 'organization.updated', data: formatOrganization(o, ws) }),\n onDelete: (o) => eventBus.emit({ event: 'organization.deleted', data: formatOrganization(o, ws) }),\n });\n ws.organizationDomains.setHooks({\n onInsert: (d) => eventBus.emit({ event: 'organization_domain.created', data: formatDomain(d) }),\n onUpdate: (d) =>\n eventBus.emit({\n event: d.state === 'verified' ? 'organization_domain.verified' : 'organization_domain.updated',\n data: formatDomain(d),\n }),\n onDelete: (d) => eventBus.emit({ event: 'organization_domain.deleted', data: formatDomain(d) }),\n });\n ws.organizationMemberships.setHooks({\n onInsert: (m) => eventBus.emit({ event: 'organization_membership.created', data: formatMembership(m) }),\n onUpdate: (m) => eventBus.emit({ event: 'organization_membership.updated', data: formatMembership(m) }),\n onDelete: (m) => eventBus.emit({ event: 'organization_membership.deleted', data: formatMembership(m) }),\n });\n ws.connections.setHooks({\n onInsert: (c) => eventBus.emit({ event: 'connection.created', data: formatConnection(c) }),\n onUpdate: (c) => eventBus.emit({ event: 'connection.updated', data: formatConnection(c) }),\n onDelete: (c) => eventBus.emit({ event: 'connection.deleted', data: formatConnection(c) }),\n });\n ws.sessions.setHooks({\n onInsert: (s) => eventBus.emit({ event: 'session.created', data: formatSession(s) }),\n onDelete: (s) => eventBus.emit({ event: 'session.revoked', data: formatSession(s) }),\n });\n ws.invitations.setHooks({\n onInsert: (i) => eventBus.emit({ event: 'invitation.created', data: formatInvitation(i) }),\n });\n ws.roles.setHooks({\n onInsert: (r) => eventBus.emit({ event: 'role.created', data: formatRole(r) }),\n onUpdate: (r) => eventBus.emit({ event: 'role.updated', data: formatRole(r) }),\n onDelete: (r) => eventBus.emit({ event: 'role.deleted', data: formatRole(r) }),\n });\n ws.permissions.setHooks({\n onInsert: (p) => eventBus.emit({ event: 'permission.created', data: formatPermission(p) }),\n onUpdate: (p) => eventBus.emit({ event: 'permission.updated', data: formatPermission(p) }),\n onDelete: (p) => eventBus.emit({ event: 'permission.deleted', data: formatPermission(p) }),\n });\n ws.directories.setHooks({\n onInsert: (d) => eventBus.emit({ event: 'directory.created', data: formatDirectory(d) }),\n onUpdate: (d) => eventBus.emit({ event: 'directory.updated', data: formatDirectory(d) }),\n onDelete: (d) => eventBus.emit({ event: 'directory.deleted', data: formatDirectory(d) }),\n });\n ws.directoryUsers.setHooks({\n onInsert: (u) => eventBus.emit({ event: 'directory_user.created', data: formatDirectoryUser(u) }),\n onUpdate: (u) => eventBus.emit({ event: 'directory_user.updated', data: formatDirectoryUser(u) }),\n onDelete: (u) => eventBus.emit({ event: 'directory_user.deleted', data: formatDirectoryUser(u) }),\n });\n ws.directoryGroups.setHooks({\n onInsert: (g) => eventBus.emit({ event: 'directory_group.created', data: formatDirectoryGroup(g) }),\n onUpdate: (g) => eventBus.emit({ event: 'directory_group.updated', data: formatDirectoryGroup(g) }),\n onDelete: (g) => eventBus.emit({ event: 'directory_group.deleted', data: formatDirectoryGroup(g) }),\n });\n },\n seed(store: Store, baseUrl: string): void {\n seedDefaults(store, baseUrl);\n },\n};\n\nexport default workosPlugin;\n"]}
|
|
@@ -0,0 +1,35 @@
|
|
|
1
|
+
import { notFound, parseJsonBody } from '../../core/index.js';
|
|
2
|
+
import { getWorkOSStore } from '../store.js';
|
|
3
|
+
import { formatApiKeyRecord, parseListParams } from '../helpers.js';
|
|
4
|
+
export function apiKeyRoutes(ctx) {
|
|
5
|
+
const { app, store } = ctx;
|
|
6
|
+
const ws = getWorkOSStore(store);
|
|
7
|
+
// Validate an API key
|
|
8
|
+
app.post('/api_keys/validations', async (c) => {
|
|
9
|
+
const body = await parseJsonBody(c);
|
|
10
|
+
const key = body.key;
|
|
11
|
+
const apiKeyMap = store.getData('apiKeyMap') ?? {};
|
|
12
|
+
const valid = !!key && key in apiKeyMap;
|
|
13
|
+
return c.json({ valid });
|
|
14
|
+
});
|
|
15
|
+
// Delete an API key record
|
|
16
|
+
app.delete('/api_keys/:id', (c) => {
|
|
17
|
+
const record = ws.apiKeyRecords.get(c.req.param('id'));
|
|
18
|
+
if (!record)
|
|
19
|
+
throw notFound('ApiKey');
|
|
20
|
+
ws.apiKeyRecords.delete(record.id);
|
|
21
|
+
return c.body(null, 204);
|
|
22
|
+
});
|
|
23
|
+
// List API keys for an organization
|
|
24
|
+
app.get('/organizations/:orgId/api_keys', (c) => {
|
|
25
|
+
const url = new URL(c.req.url);
|
|
26
|
+
const params = parseListParams(url);
|
|
27
|
+
const result = ws.apiKeyRecords.list({ ...params });
|
|
28
|
+
return c.json({
|
|
29
|
+
object: 'list',
|
|
30
|
+
data: result.data.map(formatApiKeyRecord),
|
|
31
|
+
list_metadata: result.list_metadata,
|
|
32
|
+
});
|
|
33
|
+
});
|
|
34
|
+
}
|
|
35
|
+
//# sourceMappingURL=api-keys.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"api-keys.js","sourceRoot":"","sources":["../../../../src/emulate/workos/routes/api-keys.ts"],"names":[],"mappings":"AAAA,OAAO,EAAqB,QAAQ,EAAE,aAAa,EAAE,MAAM,qBAAqB,CAAC;AACjF,OAAO,EAAE,cAAc,EAAE,MAAM,aAAa,CAAC;AAC7C,OAAO,EAAE,kBAAkB,EAAE,eAAe,EAAE,MAAM,eAAe,CAAC;AAGpE,MAAM,UAAU,YAAY,CAAC,GAAiB;IAC5C,MAAM,EAAE,GAAG,EAAE,KAAK,EAAE,GAAG,GAAG,CAAC;IAC3B,MAAM,EAAE,GAAG,cAAc,CAAC,KAAK,CAAC,CAAC;IAEjC,sBAAsB;IACtB,GAAG,CAAC,IAAI,CAAC,uBAAuB,EAAE,KAAK,EAAE,CAAC,EAAE,EAAE;QAC5C,MAAM,IAAI,GAAG,MAAM,aAAa,CAAC,CAAC,CAAC,CAAC;QACpC,MAAM,GAAG,GAAG,IAAI,CAAC,GAAyB,CAAC;QAC3C,MAAM,SAAS,GAAG,KAAK,CAAC,OAAO,CAAY,WAAW,CAAC,IAAI,EAAE,CAAC;QAC9D,MAAM,KAAK,GAAG,CAAC,CAAC,GAAG,IAAI,GAAG,IAAI,SAAS,CAAC;QACxC,OAAO,CAAC,CAAC,IAAI,CAAC,EAAE,KAAK,EAAE,CAAC,CAAC;IAC3B,CAAC,CAAC,CAAC;IAEH,2BAA2B;IAC3B,GAAG,CAAC,MAAM,CAAC,eAAe,EAAE,CAAC,CAAC,EAAE,EAAE;QAChC,MAAM,MAAM,GAAG,EAAE,CAAC,aAAa,CAAC,GAAG,CAAC,CAAC,CAAC,GAAG,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC;QACvD,IAAI,CAAC,MAAM;YAAE,MAAM,QAAQ,CAAC,QAAQ,CAAC,CAAC;QACtC,EAAE,CAAC,aAAa,CAAC,MAAM,CAAC,MAAM,CAAC,EAAE,CAAC,CAAC;QACnC,OAAO,CAAC,CAAC,IAAI,CAAC,IAAI,EAAE,GAAG,CAAC,CAAC;IAC3B,CAAC,CAAC,CAAC;IAEH,oCAAoC;IACpC,GAAG,CAAC,GAAG,CAAC,gCAAgC,EAAE,CAAC,CAAC,EAAE,EAAE;QAC9C,MAAM,GAAG,GAAG,IAAI,GAAG,CAAC,CAAC,CAAC,GAAG,CAAC,GAAG,CAAC,CAAC;QAC/B,MAAM,MAAM,GAAG,eAAe,CAAC,GAAG,CAAC,CAAC;QACpC,MAAM,MAAM,GAAG,EAAE,CAAC,aAAa,CAAC,IAAI,CAAC,EAAE,GAAG,MAAM,EAAE,CAAC,CAAC;QACpD,OAAO,CAAC,CAAC,IAAI,CAAC;YACZ,MAAM,EAAE,MAAM;YACd,IAAI,EAAE,MAAM,CAAC,IAAI,CAAC,GAAG,CAAC,kBAAkB,CAAC;YACzC,aAAa,EAAE,MAAM,CAAC,aAAa;SACpC,CAAC,CAAC;IACL,CAAC,CAAC,CAAC;AACL,CAAC","sourcesContent":["import { type RouteContext, notFound, parseJsonBody } from '../../core/index.js';\nimport { getWorkOSStore } from '../store.js';\nimport { formatApiKeyRecord, parseListParams } from '../helpers.js';\nimport type { ApiKeyMap } from '../../core/index.js';\n\nexport function apiKeyRoutes(ctx: RouteContext): void {\n const { app, store } = ctx;\n const ws = getWorkOSStore(store);\n\n // Validate an API key\n app.post('/api_keys/validations', async (c) => {\n const body = await parseJsonBody(c);\n const key = body.key as string | undefined;\n const apiKeyMap = store.getData<ApiKeyMap>('apiKeyMap') ?? {};\n const valid = !!key && key in apiKeyMap;\n return c.json({ valid });\n });\n\n // Delete an API key record\n app.delete('/api_keys/:id', (c) => {\n const record = ws.apiKeyRecords.get(c.req.param('id'));\n if (!record) throw notFound('ApiKey');\n ws.apiKeyRecords.delete(record.id);\n return c.body(null, 204);\n });\n\n // List API keys for an organization\n app.get('/organizations/:orgId/api_keys', (c) => {\n const url = new URL(c.req.url);\n const params = parseListParams(url);\n const result = ws.apiKeyRecords.list({ ...params });\n return c.json({\n object: 'list',\n data: result.data.map(formatApiKeyRecord),\n list_metadata: result.list_metadata,\n });\n });\n}\n"]}
|
|
@@ -0,0 +1,107 @@
|
|
|
1
|
+
import { notFound, parseJsonBody, validationError } from '../../core/index.js';
|
|
2
|
+
import { getWorkOSStore } from '../store.js';
|
|
3
|
+
import { formatAuditLogAction, formatAuditLogEvent, formatAuditLogExport, parseListParams } from '../helpers.js';
|
|
4
|
+
export function auditLogRoutes(ctx) {
|
|
5
|
+
const { app, store } = ctx;
|
|
6
|
+
const ws = getWorkOSStore(store);
|
|
7
|
+
// List actions
|
|
8
|
+
app.get('/audit_logs/actions', (c) => {
|
|
9
|
+
const url = new URL(c.req.url);
|
|
10
|
+
const params = parseListParams(url);
|
|
11
|
+
const result = ws.auditLogActions.list({ ...params });
|
|
12
|
+
return c.json({
|
|
13
|
+
object: 'list',
|
|
14
|
+
data: result.data.map(formatAuditLogAction),
|
|
15
|
+
list_metadata: result.list_metadata,
|
|
16
|
+
});
|
|
17
|
+
});
|
|
18
|
+
// Create/update action schema
|
|
19
|
+
app.post('/audit_logs/actions/:actionName/schemas', async (c) => {
|
|
20
|
+
const actionName = c.req.param('actionName');
|
|
21
|
+
const body = await parseJsonBody(c);
|
|
22
|
+
// Upsert: find existing action or create new one
|
|
23
|
+
let action = ws.auditLogActions.findOneBy('name', actionName);
|
|
24
|
+
if (action) {
|
|
25
|
+
// Store schema in store data keyed by action name
|
|
26
|
+
store.setData(`audit_schema_${actionName}`, body);
|
|
27
|
+
return c.json(formatAuditLogAction(action));
|
|
28
|
+
}
|
|
29
|
+
action = ws.auditLogActions.insert({
|
|
30
|
+
object: 'audit_log_action',
|
|
31
|
+
name: actionName,
|
|
32
|
+
description: null,
|
|
33
|
+
condition: null,
|
|
34
|
+
});
|
|
35
|
+
store.setData(`audit_schema_${actionName}`, body);
|
|
36
|
+
return c.json(formatAuditLogAction(action), 201);
|
|
37
|
+
});
|
|
38
|
+
// Create audit log event
|
|
39
|
+
app.post('/audit_logs/events', async (c) => {
|
|
40
|
+
const body = await parseJsonBody(c);
|
|
41
|
+
const organizationId = body.organization_id;
|
|
42
|
+
if (!organizationId) {
|
|
43
|
+
throw validationError('organization_id is required', [{ field: 'organization_id', code: 'required' }]);
|
|
44
|
+
}
|
|
45
|
+
const actionBody = body.action;
|
|
46
|
+
if (!actionBody?.name) {
|
|
47
|
+
throw validationError('action.name is required', [{ field: 'action.name', code: 'required' }]);
|
|
48
|
+
}
|
|
49
|
+
const event = ws.auditLogEvents.insert({
|
|
50
|
+
object: 'audit_log_event',
|
|
51
|
+
organization_id: organizationId,
|
|
52
|
+
action: {
|
|
53
|
+
name: actionBody.name,
|
|
54
|
+
type: actionBody.type ?? 'C',
|
|
55
|
+
id: actionBody.id ?? actionBody.name,
|
|
56
|
+
},
|
|
57
|
+
actor: body.actor ?? {},
|
|
58
|
+
targets: body.targets ?? [],
|
|
59
|
+
metadata: body.metadata ?? null,
|
|
60
|
+
occurred_at: body.occurred_at ?? new Date().toISOString(),
|
|
61
|
+
});
|
|
62
|
+
return c.json(formatAuditLogEvent(event), 201);
|
|
63
|
+
});
|
|
64
|
+
// Create export (auto-transition to ready)
|
|
65
|
+
app.post('/audit_logs/exports', async (c) => {
|
|
66
|
+
const body = await parseJsonBody(c);
|
|
67
|
+
const organizationId = body.organization_id;
|
|
68
|
+
if (!organizationId) {
|
|
69
|
+
throw validationError('organization_id is required', [{ field: 'organization_id', code: 'required' }]);
|
|
70
|
+
}
|
|
71
|
+
const exp = ws.auditLogExports.insert({
|
|
72
|
+
object: 'audit_log_export',
|
|
73
|
+
organization_id: organizationId,
|
|
74
|
+
state: 'ready',
|
|
75
|
+
url: `https://emulator.workos.test/exports/audit_log_export_mock.csv`,
|
|
76
|
+
filters: body.filters ?? {},
|
|
77
|
+
});
|
|
78
|
+
return c.json(formatAuditLogExport(exp), 201);
|
|
79
|
+
});
|
|
80
|
+
// Get export
|
|
81
|
+
app.get('/audit_logs/exports/:id', (c) => {
|
|
82
|
+
const exp = ws.auditLogExports.get(c.req.param('id'));
|
|
83
|
+
if (!exp)
|
|
84
|
+
throw notFound('AuditLogExport');
|
|
85
|
+
return c.json(formatAuditLogExport(exp));
|
|
86
|
+
});
|
|
87
|
+
// Get org audit log configuration
|
|
88
|
+
app.get('/organizations/:id/audit_log_configuration', (c) => {
|
|
89
|
+
const orgId = c.req.param('id');
|
|
90
|
+
return c.json({
|
|
91
|
+
object: 'audit_log_configuration',
|
|
92
|
+
organization_id: orgId,
|
|
93
|
+
enabled: true,
|
|
94
|
+
retention_days: 365,
|
|
95
|
+
});
|
|
96
|
+
});
|
|
97
|
+
// Get org audit logs retention
|
|
98
|
+
app.get('/organizations/:id/audit_logs_retention', (c) => {
|
|
99
|
+
const orgId = c.req.param('id');
|
|
100
|
+
return c.json({
|
|
101
|
+
object: 'audit_logs_retention',
|
|
102
|
+
organization_id: orgId,
|
|
103
|
+
retention_days: 365,
|
|
104
|
+
});
|
|
105
|
+
});
|
|
106
|
+
}
|
|
107
|
+
//# sourceMappingURL=audit-logs.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"audit-logs.js","sourceRoot":"","sources":["../../../../src/emulate/workos/routes/audit-logs.ts"],"names":[],"mappings":"AAAA,OAAO,EAAqB,QAAQ,EAAE,aAAa,EAAE,eAAe,EAAE,MAAM,qBAAqB,CAAC;AAClG,OAAO,EAAE,cAAc,EAAE,MAAM,aAAa,CAAC;AAC7C,OAAO,EAAE,oBAAoB,EAAE,mBAAmB,EAAE,oBAAoB,EAAE,eAAe,EAAE,MAAM,eAAe,CAAC;AAEjH,MAAM,UAAU,cAAc,CAAC,GAAiB;IAC9C,MAAM,EAAE,GAAG,EAAE,KAAK,EAAE,GAAG,GAAG,CAAC;IAC3B,MAAM,EAAE,GAAG,cAAc,CAAC,KAAK,CAAC,CAAC;IAEjC,eAAe;IACf,GAAG,CAAC,GAAG,CAAC,qBAAqB,EAAE,CAAC,CAAC,EAAE,EAAE;QACnC,MAAM,GAAG,GAAG,IAAI,GAAG,CAAC,CAAC,CAAC,GAAG,CAAC,GAAG,CAAC,CAAC;QAC/B,MAAM,MAAM,GAAG,eAAe,CAAC,GAAG,CAAC,CAAC;QACpC,MAAM,MAAM,GAAG,EAAE,CAAC,eAAe,CAAC,IAAI,CAAC,EAAE,GAAG,MAAM,EAAE,CAAC,CAAC;QACtD,OAAO,CAAC,CAAC,IAAI,CAAC;YACZ,MAAM,EAAE,MAAM;YACd,IAAI,EAAE,MAAM,CAAC,IAAI,CAAC,GAAG,CAAC,oBAAoB,CAAC;YAC3C,aAAa,EAAE,MAAM,CAAC,aAAa;SACpC,CAAC,CAAC;IACL,CAAC,CAAC,CAAC;IAEH,8BAA8B;IAC9B,GAAG,CAAC,IAAI,CAAC,yCAAyC,EAAE,KAAK,EAAE,CAAC,EAAE,EAAE;QAC9D,MAAM,UAAU,GAAG,CAAC,CAAC,GAAG,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC;QAC7C,MAAM,IAAI,GAAG,MAAM,aAAa,CAAC,CAAC,CAAC,CAAC;QAEpC,iDAAiD;QACjD,IAAI,MAAM,GAAG,EAAE,CAAC,eAAe,CAAC,SAAS,CAAC,MAAM,EAAE,UAAU,CAAC,CAAC;QAC9D,IAAI,MAAM,EAAE,CAAC;YACX,kDAAkD;YAClD,KAAK,CAAC,OAAO,CAAC,gBAAgB,UAAU,EAAE,EAAE,IAAI,CAAC,CAAC;YAClD,OAAO,CAAC,CAAC,IAAI,CAAC,oBAAoB,CAAC,MAAM,CAAC,CAAC,CAAC;QAC9C,CAAC;QAED,MAAM,GAAG,EAAE,CAAC,eAAe,CAAC,MAAM,CAAC;YACjC,MAAM,EAAE,kBAAkB;YAC1B,IAAI,EAAE,UAAU;YAChB,WAAW,EAAE,IAAI;YACjB,SAAS,EAAE,IAAI;SAChB,CAAC,CAAC;QACH,KAAK,CAAC,OAAO,CAAC,gBAAgB,UAAU,EAAE,EAAE,IAAI,CAAC,CAAC;QAClD,OAAO,CAAC,CAAC,IAAI,CAAC,oBAAoB,CAAC,MAAM,CAAC,EAAE,GAAG,CAAC,CAAC;IACnD,CAAC,CAAC,CAAC;IAEH,yBAAyB;IACzB,GAAG,CAAC,IAAI,CAAC,oBAAoB,EAAE,KAAK,EAAE,CAAC,EAAE,EAAE;QACzC,MAAM,IAAI,GAAG,MAAM,aAAa,CAAC,CAAC,CAAC,CAAC;QACpC,MAAM,cAAc,GAAG,IAAI,CAAC,eAAqC,CAAC;QAClE,IAAI,CAAC,cAAc,EAAE,CAAC;YACpB,MAAM,eAAe,CAAC,6BAA6B,EAAE,CAAC,EAAE,KAAK,EAAE,iBAAiB,EAAE,IAAI,EAAE,UAAU,EAAE,CAAC,CAAC,CAAC;QACzG,CAAC;QAED,MAAM,UAAU,GAAG,IAAI,CAAC,MAA4C,CAAC;QACrE,IAAI,CAAC,UAAU,EAAE,IAAI,EAAE,CAAC;YACtB,MAAM,eAAe,CAAC,yBAAyB,EAAE,CAAC,EAAE,KAAK,EAAE,aAAa,EAAE,IAAI,EAAE,UAAU,EAAE,CAAC,CAAC,CAAC;QACjG,CAAC;QAED,MAAM,KAAK,GAAG,EAAE,CAAC,cAAc,CAAC,MAAM,CAAC;YACrC,MAAM,EAAE,iBAAiB;YACzB,eAAe,EAAE,cAAc;YAC/B,MAAM,EAAE;gBACN,IAAI,EAAE,UAAU,CAAC,IAAI;gBACrB,IAAI,EAAE,UAAU,CAAC,IAAI,IAAI,GAAG;gBAC5B,EAAE,EAAE,UAAU,CAAC,EAAE,IAAI,UAAU,CAAC,IAAI;aACrC;YACD,KAAK,EAAG,IAAI,CAAC,KAAiC,IAAI,EAAE;YACpD,OAAO,EAAG,IAAI,CAAC,OAA0C,IAAI,EAAE;YAC/D,QAAQ,EAAG,IAAI,CAAC,QAAoC,IAAI,IAAI;YAC5D,WAAW,EAAG,IAAI,CAAC,WAAsB,IAAI,IAAI,IAAI,EAAE,CAAC,WAAW,EAAE;SACtE,CAAC,CAAC;QAEH,OAAO,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,KAAK,CAAC,EAAE,GAAG,CAAC,CAAC;IACjD,CAAC,CAAC,CAAC;IAEH,2CAA2C;IAC3C,GAAG,CAAC,IAAI,CAAC,qBAAqB,EAAE,KAAK,EAAE,CAAC,EAAE,EAAE;QAC1C,MAAM,IAAI,GAAG,MAAM,aAAa,CAAC,CAAC,CAAC,CAAC;QACpC,MAAM,cAAc,GAAG,IAAI,CAAC,eAAqC,CAAC;QAClE,IAAI,CAAC,cAAc,EAAE,CAAC;YACpB,MAAM,eAAe,CAAC,6BAA6B,EAAE,CAAC,EAAE,KAAK,EAAE,iBAAiB,EAAE,IAAI,EAAE,UAAU,EAAE,CAAC,CAAC,CAAC;QACzG,CAAC;QAED,MAAM,GAAG,GAAG,EAAE,CAAC,eAAe,CAAC,MAAM,CAAC;YACpC,MAAM,EAAE,kBAAkB;YAC1B,eAAe,EAAE,cAAc;YAC/B,KAAK,EAAE,OAAO;YACd,GAAG,EAAE,gEAAgE;YACrE,OAAO,EAAG,IAAI,CAAC,OAAmC,IAAI,EAAE;SACzD,CAAC,CAAC;QAEH,OAAO,CAAC,CAAC,IAAI,CAAC,oBAAoB,CAAC,GAAG,CAAC,EAAE,GAAG,CAAC,CAAC;IAChD,CAAC,CAAC,CAAC;IAEH,aAAa;IACb,GAAG,CAAC,GAAG,CAAC,yBAAyB,EAAE,CAAC,CAAC,EAAE,EAAE;QACvC,MAAM,GAAG,GAAG,EAAE,CAAC,eAAe,CAAC,GAAG,CAAC,CAAC,CAAC,GAAG,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC;QACtD,IAAI,CAAC,GAAG;YAAE,MAAM,QAAQ,CAAC,gBAAgB,CAAC,CAAC;QAC3C,OAAO,CAAC,CAAC,IAAI,CAAC,oBAAoB,CAAC,GAAG,CAAC,CAAC,CAAC;IAC3C,CAAC,CAAC,CAAC;IAEH,kCAAkC;IAClC,GAAG,CAAC,GAAG,CAAC,4CAA4C,EAAE,CAAC,CAAC,EAAE,EAAE;QAC1D,MAAM,KAAK,GAAG,CAAC,CAAC,GAAG,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC;QAChC,OAAO,CAAC,CAAC,IAAI,CAAC;YACZ,MAAM,EAAE,yBAAyB;YACjC,eAAe,EAAE,KAAK;YACtB,OAAO,EAAE,IAAI;YACb,cAAc,EAAE,GAAG;SACpB,CAAC,CAAC;IACL,CAAC,CAAC,CAAC;IAEH,+BAA+B;IAC/B,GAAG,CAAC,GAAG,CAAC,yCAAyC,EAAE,CAAC,CAAC,EAAE,EAAE;QACvD,MAAM,KAAK,GAAG,CAAC,CAAC,GAAG,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC;QAChC,OAAO,CAAC,CAAC,IAAI,CAAC;YACZ,MAAM,EAAE,sBAAsB;YAC9B,eAAe,EAAE,KAAK;YACtB,cAAc,EAAE,GAAG;SACpB,CAAC,CAAC;IACL,CAAC,CAAC,CAAC;AACL,CAAC","sourcesContent":["import { type RouteContext, notFound, parseJsonBody, validationError } from '../../core/index.js';\nimport { getWorkOSStore } from '../store.js';\nimport { formatAuditLogAction, formatAuditLogEvent, formatAuditLogExport, parseListParams } from '../helpers.js';\n\nexport function auditLogRoutes(ctx: RouteContext): void {\n const { app, store } = ctx;\n const ws = getWorkOSStore(store);\n\n // List actions\n app.get('/audit_logs/actions', (c) => {\n const url = new URL(c.req.url);\n const params = parseListParams(url);\n const result = ws.auditLogActions.list({ ...params });\n return c.json({\n object: 'list',\n data: result.data.map(formatAuditLogAction),\n list_metadata: result.list_metadata,\n });\n });\n\n // Create/update action schema\n app.post('/audit_logs/actions/:actionName/schemas', async (c) => {\n const actionName = c.req.param('actionName');\n const body = await parseJsonBody(c);\n\n // Upsert: find existing action or create new one\n let action = ws.auditLogActions.findOneBy('name', actionName);\n if (action) {\n // Store schema in store data keyed by action name\n store.setData(`audit_schema_${actionName}`, body);\n return c.json(formatAuditLogAction(action));\n }\n\n action = ws.auditLogActions.insert({\n object: 'audit_log_action',\n name: actionName,\n description: null,\n condition: null,\n });\n store.setData(`audit_schema_${actionName}`, body);\n return c.json(formatAuditLogAction(action), 201);\n });\n\n // Create audit log event\n app.post('/audit_logs/events', async (c) => {\n const body = await parseJsonBody(c);\n const organizationId = body.organization_id as string | undefined;\n if (!organizationId) {\n throw validationError('organization_id is required', [{ field: 'organization_id', code: 'required' }]);\n }\n\n const actionBody = body.action as Record<string, string> | undefined;\n if (!actionBody?.name) {\n throw validationError('action.name is required', [{ field: 'action.name', code: 'required' }]);\n }\n\n const event = ws.auditLogEvents.insert({\n object: 'audit_log_event',\n organization_id: organizationId,\n action: {\n name: actionBody.name,\n type: actionBody.type ?? 'C',\n id: actionBody.id ?? actionBody.name,\n },\n actor: (body.actor as Record<string, unknown>) ?? {},\n targets: (body.targets as Array<Record<string, unknown>>) ?? [],\n metadata: (body.metadata as Record<string, unknown>) ?? null,\n occurred_at: (body.occurred_at as string) ?? new Date().toISOString(),\n });\n\n return c.json(formatAuditLogEvent(event), 201);\n });\n\n // Create export (auto-transition to ready)\n app.post('/audit_logs/exports', async (c) => {\n const body = await parseJsonBody(c);\n const organizationId = body.organization_id as string | undefined;\n if (!organizationId) {\n throw validationError('organization_id is required', [{ field: 'organization_id', code: 'required' }]);\n }\n\n const exp = ws.auditLogExports.insert({\n object: 'audit_log_export',\n organization_id: organizationId,\n state: 'ready',\n url: `https://emulator.workos.test/exports/audit_log_export_mock.csv`,\n filters: (body.filters as Record<string, unknown>) ?? {},\n });\n\n return c.json(formatAuditLogExport(exp), 201);\n });\n\n // Get export\n app.get('/audit_logs/exports/:id', (c) => {\n const exp = ws.auditLogExports.get(c.req.param('id'));\n if (!exp) throw notFound('AuditLogExport');\n return c.json(formatAuditLogExport(exp));\n });\n\n // Get org audit log configuration\n app.get('/organizations/:id/audit_log_configuration', (c) => {\n const orgId = c.req.param('id');\n return c.json({\n object: 'audit_log_configuration',\n organization_id: orgId,\n enabled: true,\n retention_days: 365,\n });\n });\n\n // Get org audit logs retention\n app.get('/organizations/:id/audit_logs_retention', (c) => {\n const orgId = c.req.param('id');\n return c.json({\n object: 'audit_logs_retention',\n organization_id: orgId,\n retention_days: 365,\n });\n });\n}\n"]}
|
|
@@ -0,0 +1,51 @@
|
|
|
1
|
+
import { notFound, parseJsonBody, WorkOSApiError } from '../../core/index.js';
|
|
2
|
+
import { getWorkOSStore } from '../store.js';
|
|
3
|
+
import { formatAuthChallenge, expiresIn, isExpired, generateCode } from '../helpers.js';
|
|
4
|
+
export function authChallengeRoutes(ctx) {
|
|
5
|
+
const { app, store } = ctx;
|
|
6
|
+
const ws = getWorkOSStore(store);
|
|
7
|
+
app.post('/user_management/auth_factors/:id/challenges', async (c) => {
|
|
8
|
+
const factorId = c.req.param('id');
|
|
9
|
+
const factor = ws.authFactors.get(factorId);
|
|
10
|
+
if (!factor)
|
|
11
|
+
throw notFound('AuthenticationFactor');
|
|
12
|
+
const user = ws.users.get(factor.user_id);
|
|
13
|
+
if (!user)
|
|
14
|
+
throw notFound('User');
|
|
15
|
+
// Emulator generates a code and stores it for verification
|
|
16
|
+
const code = generateCode();
|
|
17
|
+
const challenge = ws.authChallenges.insert({
|
|
18
|
+
object: 'authentication_challenge',
|
|
19
|
+
user_id: user.id,
|
|
20
|
+
factor_id: factor.id,
|
|
21
|
+
expires_at: expiresIn(10),
|
|
22
|
+
code,
|
|
23
|
+
});
|
|
24
|
+
return c.json(formatAuthChallenge(challenge), 201);
|
|
25
|
+
});
|
|
26
|
+
app.post('/user_management/auth_challenges/:id/verify', async (c) => {
|
|
27
|
+
const challengeId = c.req.param('id');
|
|
28
|
+
const challenge = ws.authChallenges.get(challengeId);
|
|
29
|
+
if (!challenge)
|
|
30
|
+
throw notFound('AuthenticationChallenge');
|
|
31
|
+
if (isExpired(challenge.expires_at)) {
|
|
32
|
+
ws.authChallenges.delete(challenge.id);
|
|
33
|
+
throw new WorkOSApiError(400, 'Challenge has expired', 'expired_challenge');
|
|
34
|
+
}
|
|
35
|
+
const body = await parseJsonBody(c);
|
|
36
|
+
const code = body.code;
|
|
37
|
+
if (!code) {
|
|
38
|
+
throw new WorkOSApiError(400, 'code is required', 'invalid_request');
|
|
39
|
+
}
|
|
40
|
+
// In the emulator, accept the stored code or any 6-digit code for convenience
|
|
41
|
+
if (challenge.code && code !== challenge.code) {
|
|
42
|
+
throw new WorkOSApiError(400, 'Invalid one-time code', 'invalid_one_time_code');
|
|
43
|
+
}
|
|
44
|
+
ws.authChallenges.delete(challenge.id);
|
|
45
|
+
return c.json({
|
|
46
|
+
challenge: formatAuthChallenge(challenge),
|
|
47
|
+
valid: true,
|
|
48
|
+
});
|
|
49
|
+
});
|
|
50
|
+
}
|
|
51
|
+
//# sourceMappingURL=auth-challenges.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"auth-challenges.js","sourceRoot":"","sources":["../../../../src/emulate/workos/routes/auth-challenges.ts"],"names":[],"mappings":"AAAA,OAAO,EAAqB,QAAQ,EAAE,aAAa,EAAE,cAAc,EAAE,MAAM,qBAAqB,CAAC;AACjG,OAAO,EAAE,cAAc,EAAE,MAAM,aAAa,CAAC;AAC7C,OAAO,EAAE,mBAAmB,EAAE,SAAS,EAAE,SAAS,EAAE,YAAY,EAAE,MAAM,eAAe,CAAC;AAExF,MAAM,UAAU,mBAAmB,CAAC,GAAiB;IACnD,MAAM,EAAE,GAAG,EAAE,KAAK,EAAE,GAAG,GAAG,CAAC;IAC3B,MAAM,EAAE,GAAG,cAAc,CAAC,KAAK,CAAC,CAAC;IAEjC,GAAG,CAAC,IAAI,CAAC,8CAA8C,EAAE,KAAK,EAAE,CAAC,EAAE,EAAE;QACnE,MAAM,QAAQ,GAAG,CAAC,CAAC,GAAG,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC;QACnC,MAAM,MAAM,GAAG,EAAE,CAAC,WAAW,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;QAC5C,IAAI,CAAC,MAAM;YAAE,MAAM,QAAQ,CAAC,sBAAsB,CAAC,CAAC;QAEpD,MAAM,IAAI,GAAG,EAAE,CAAC,KAAK,CAAC,GAAG,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC;QAC1C,IAAI,CAAC,IAAI;YAAE,MAAM,QAAQ,CAAC,MAAM,CAAC,CAAC;QAElC,2DAA2D;QAC3D,MAAM,IAAI,GAAG,YAAY,EAAE,CAAC;QAE5B,MAAM,SAAS,GAAG,EAAE,CAAC,cAAc,CAAC,MAAM,CAAC;YACzC,MAAM,EAAE,0BAA0B;YAClC,OAAO,EAAE,IAAI,CAAC,EAAE;YAChB,SAAS,EAAE,MAAM,CAAC,EAAE;YACpB,UAAU,EAAE,SAAS,CAAC,EAAE,CAAC;YACzB,IAAI;SACL,CAAC,CAAC;QAEH,OAAO,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,SAAS,CAAC,EAAE,GAAG,CAAC,CAAC;IACrD,CAAC,CAAC,CAAC;IAEH,GAAG,CAAC,IAAI,CAAC,6CAA6C,EAAE,KAAK,EAAE,CAAC,EAAE,EAAE;QAClE,MAAM,WAAW,GAAG,CAAC,CAAC,GAAG,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC;QACtC,MAAM,SAAS,GAAG,EAAE,CAAC,cAAc,CAAC,GAAG,CAAC,WAAW,CAAC,CAAC;QACrD,IAAI,CAAC,SAAS;YAAE,MAAM,QAAQ,CAAC,yBAAyB,CAAC,CAAC;QAE1D,IAAI,SAAS,CAAC,SAAS,CAAC,UAAU,CAAC,EAAE,CAAC;YACpC,EAAE,CAAC,cAAc,CAAC,MAAM,CAAC,SAAS,CAAC,EAAE,CAAC,CAAC;YACvC,MAAM,IAAI,cAAc,CAAC,GAAG,EAAE,uBAAuB,EAAE,mBAAmB,CAAC,CAAC;QAC9E,CAAC;QAED,MAAM,IAAI,GAAG,MAAM,aAAa,CAAC,CAAC,CAAC,CAAC;QACpC,MAAM,IAAI,GAAG,IAAI,CAAC,IAAc,CAAC;QACjC,IAAI,CAAC,IAAI,EAAE,CAAC;YACV,MAAM,IAAI,cAAc,CAAC,GAAG,EAAE,kBAAkB,EAAE,iBAAiB,CAAC,CAAC;QACvE,CAAC;QAED,8EAA8E;QAC9E,IAAI,SAAS,CAAC,IAAI,IAAI,IAAI,KAAK,SAAS,CAAC,IAAI,EAAE,CAAC;YAC9C,MAAM,IAAI,cAAc,CAAC,GAAG,EAAE,uBAAuB,EAAE,uBAAuB,CAAC,CAAC;QAClF,CAAC;QAED,EAAE,CAAC,cAAc,CAAC,MAAM,CAAC,SAAS,CAAC,EAAE,CAAC,CAAC;QAEvC,OAAO,CAAC,CAAC,IAAI,CAAC;YACZ,SAAS,EAAE,mBAAmB,CAAC,SAAS,CAAC;YACzC,KAAK,EAAE,IAAI;SACZ,CAAC,CAAC;IACL,CAAC,CAAC,CAAC;AACL,CAAC","sourcesContent":["import { type RouteContext, notFound, parseJsonBody, WorkOSApiError } from '../../core/index.js';\nimport { getWorkOSStore } from '../store.js';\nimport { formatAuthChallenge, expiresIn, isExpired, generateCode } from '../helpers.js';\n\nexport function authChallengeRoutes(ctx: RouteContext): void {\n const { app, store } = ctx;\n const ws = getWorkOSStore(store);\n\n app.post('/user_management/auth_factors/:id/challenges', async (c) => {\n const factorId = c.req.param('id');\n const factor = ws.authFactors.get(factorId);\n if (!factor) throw notFound('AuthenticationFactor');\n\n const user = ws.users.get(factor.user_id);\n if (!user) throw notFound('User');\n\n // Emulator generates a code and stores it for verification\n const code = generateCode();\n\n const challenge = ws.authChallenges.insert({\n object: 'authentication_challenge',\n user_id: user.id,\n factor_id: factor.id,\n expires_at: expiresIn(10),\n code,\n });\n\n return c.json(formatAuthChallenge(challenge), 201);\n });\n\n app.post('/user_management/auth_challenges/:id/verify', async (c) => {\n const challengeId = c.req.param('id');\n const challenge = ws.authChallenges.get(challengeId);\n if (!challenge) throw notFound('AuthenticationChallenge');\n\n if (isExpired(challenge.expires_at)) {\n ws.authChallenges.delete(challenge.id);\n throw new WorkOSApiError(400, 'Challenge has expired', 'expired_challenge');\n }\n\n const body = await parseJsonBody(c);\n const code = body.code as string;\n if (!code) {\n throw new WorkOSApiError(400, 'code is required', 'invalid_request');\n }\n\n // In the emulator, accept the stored code or any 6-digit code for convenience\n if (challenge.code && code !== challenge.code) {\n throw new WorkOSApiError(400, 'Invalid one-time code', 'invalid_one_time_code');\n }\n\n ws.authChallenges.delete(challenge.id);\n\n return c.json({\n challenge: formatAuthChallenge(challenge),\n valid: true,\n });\n });\n}\n"]}
|