Initial commit - Event Planner application

This commit is contained in:
mberlin
2026-03-18 14:55:56 -03:00
commit 86d779eb4d
7548 changed files with 1006324 additions and 0 deletions

View File

@@ -0,0 +1,65 @@
/**
* Options to be passed during transformation.
*
* @see https://github.com/typestack/class-transformer
*
* @publicApi
*/
export interface ClassTransformOptions {
/**
* Exclusion strategy. By default exposeAll is used, which means that it will expose all properties that
* are transformed by default.
*/
strategy?: 'excludeAll' | 'exposeAll';
/**
* Only properties with given groups will be transformed.
*/
groups?: string[];
/**
* Only properties with "since" > version < "until" will be transformed.
*/
version?: number;
/**
* Excludes properties with the given prefixes. For example, if you mark your private properties with "_" and "__"
* you can set this option's value to ["_", "__"] and all private properties will be skipped.
* This works only for "exposeAll" strategy.
*/
excludePrefixes?: string[];
/**
* If set to true then class transformer will ignore all @Expose and @Exclude decorators and what's inside them.
* This option is useful if you want to "clone" your object but not apply decorators affects.
*/
ignoreDecorators?: boolean;
/**
* Target maps allows to set a Types of the transforming object without using @Type decorator.
* This is useful when you are transforming external classes, or if you already have type metadata for
* objects and you don't want to set it up again.
*/
targetMaps?: any[];
/**
* If set to true then class transformer will perform a circular check. (Circular check is turned off by default)
* This option is useful when you know for sure that your types might have a circular dependency.
*/
enableCircularCheck?: boolean;
/**
* If set to true class-transformer will attempt conversion based on TS reflected type
*/
enableImplicitConversion?: boolean;
/**
* If set to true class-transformer will exclude properties which are not part of the original class
* and exposing all class properties (with undefined, if nothing else is given)
*/
excludeExtraneousValues?: boolean;
/**
* If set to true then class transformer will take default values for unprovided fields.
* This is useful when you convert a plain object to a class and have an optional field with a default value.
*/
exposeDefaultValues?: boolean;
/**
* When set to true, fields with `undefined` as value will be included in class to plain transformation. Otherwise
* those fields will be omitted from the result.
*
* DEFAULT: `true`
*/
exposeUnsetFields?: boolean;
}

View File

@@ -0,0 +1,2 @@
"use strict";
Object.defineProperty(exports, "__esModule", { value: true });

View File

@@ -0,0 +1,58 @@
type StaticOrigin = boolean | string | RegExp | (string | RegExp)[];
/**
* Set origin to a function implementing some custom logic. The function takes the
* request origin as the first parameter and a callback (which expects the signature
* err [object], allow [bool]) as the second.
*
* @see https://github.com/expressjs/cors
*
* @publicApi
*/
export type CustomOrigin = (requestOrigin: string | undefined, callback: (err: Error | null, origin?: StaticOrigin) => void) => void;
/**
* Interface describing CORS options that can be set.
*
* @see https://github.com/expressjs/cors
* @publicApi
*/
export interface CorsOptions {
/**
* Configures the `Access-Control-Allow-Origins` CORS header. See [here for more detail.](https://github.com/expressjs/cors#configuration-options)
*/
origin?: StaticOrigin | CustomOrigin;
/**
* Configures the Access-Control-Allow-Methods CORS header.
*/
methods?: string | string[];
/**
* Configures the Access-Control-Allow-Headers CORS header.
*/
allowedHeaders?: string | string[];
/**
* Configures the Access-Control-Expose-Headers CORS header.
*/
exposedHeaders?: string | string[];
/**
* Configures the Access-Control-Allow-Credentials CORS header.
*/
credentials?: boolean;
/**
* Configures the Access-Control-Max-Age CORS header.
*/
maxAge?: number;
/**
* Whether to pass the CORS preflight response to the next handler.
*/
preflightContinue?: boolean;
/**
* Provides a status code to use for successful OPTIONS requests.
*/
optionsSuccessStatus?: number;
}
export interface CorsOptionsCallback {
(error: Error | null, options: CorsOptions): void;
}
export interface CorsOptionsDelegate<T> {
(req: T, cb: CorsOptionsCallback): void;
}
export {};

View File

@@ -0,0 +1,2 @@
"use strict";
Object.defineProperty(exports, "__esModule", { value: true });

View File

@@ -0,0 +1,105 @@
/**
* Interface describing Https Options that can be set.
*
* @see https://nodejs.org/api/tls.html
*
* @publicApi
*/
export interface HttpsOptions {
/**
* PFX or PKCS12 encoded private key and certificate chain. pfx is an alternative
* to providing key and cert individually. PFX is usually encrypted, if it is,
* passphrase will be used to decrypt it. Multiple PFX can be provided either
* as an array of unencrypted PFX buffers, or an array of objects in the form
* {buf: <string|buffer>[, passphrase: <string>]}. The object form can only
* occur in an array. object.passphrase is optional. Encrypted PFX will be decrypted
* with object.passphrase if provided, or options.passphrase if it is not.
*/
pfx?: any;
/**
* Private keys in PEM format. PEM allows the option of private keys being encrypted.
* Encrypted keys will be decrypted with options.passphrase. Multiple keys using
* different algorithms can be provided either as an array of unencrypted key
* strings or buffers, or an array of objects in the form {pem: <string|buffer>[, passphrase: <string>]}.
* The object form can only occur in an array. object.passphrase is optional.
* Encrypted keys will be decrypted with object.passphrase if provided, or options.passphrase
* if it is not
*/
key?: any;
/**
* Shared passphrase used for a single private key and/or a PFX.
*/
passphrase?: string;
/**
* Cert chains in PEM format. One cert chain should be provided per private key.
* Each cert chain should consist of the PEM formatted certificate for a provided
* private key, followed by the PEM formatted intermediate certificates (if any),
* in order, and not including the root CA (the root CA must be pre-known to the
* peer, see ca). When providing multiple cert chains, they do not have to be
* in the same order as their private keys in key. If the intermediate certificates
* are not provided, the peer will not be able to validate the certificate, and
* the handshake will fail.
*/
cert?: any;
/**
* Optionally override the trusted CA certificates. Default is to trust the well-known
* CAs curated by Mozilla. Mozilla's CAs are completely replaced when CAs are
* explicitly specified using this option. The value can be a string or Buffer,
* or an Array of strings and/or Buffers. Any string or Buffer can contain multiple
* PEM CAs concatenated together. The peer's certificate must be chainable to
* a CA trusted by the server for the connection to be authenticated. When using
* certificates that are not chainable to a well-known CA, the certificate's CA
* must be explicitly specified as a trusted or the connection will fail to authenticate.
* If the peer uses a certificate that doesn't match or chain to one of the default
* CAs, use the ca option to provide a CA certificate that the peer's certificate
* can match or chain to. For self-signed certificates, the certificate is its
* own CA, and must be provided. For PEM encoded certificates, supported types
* are "TRUSTED CERTIFICATE", "X509 CERTIFICATE", and "CERTIFICATE". See also tls.rootCertificates.
*/
ca?: any;
/**
* PEM formatted CRLs (Certificate Revocation Lists).
*/
crl?: any;
/**
* Cipher suite specification, replacing the default. For more information, see
* modifying the default cipher suite. Permitted ciphers can be obtained via tls.getCiphers().
* Cipher names must be uppercased in order for OpenSSL to accept them.
*/
ciphers?: string;
/**
* Attempt to use the server's cipher suite preferences instead of the client's.
* When true, causes SSL_OP_CIPHER_SERVER_PREFERENCE to be set in secureOptions,
* see OpenSSL Options for more information.
*/
honorCipherOrder?: boolean;
/**
* If true the server will request a certificate from clients that connect and
* attempt to verify that certificate. Default: false.
*/
requestCert?: boolean;
/**
* If not false the server will reject any connection which is not authorized
* with the list of supplied CAs. This option only has an effect if requestCert is true. Default: true
*/
rejectUnauthorized?: boolean;
/**
* An array or Buffer of possible NPN protocols. (Protocols should be ordered
* by their priority).
*/
NPNProtocols?: any;
/**
* A function that will be called if the client supports SNI TLS extension. Two
* arguments will be passed when called: servername and cb. SNICallback should
* invoke cb(null, ctx), where ctx is a SecureContext instance. (tls.createSecureContext(...)
* can be used to get a proper SecureContext.) If SNICallback wasn't provided
* the default callback with high-level API will be used.
*/
SNICallback?: (servername: string, cb: (err: Error, ctx: any) => any) => any;
/**
* Optionally affect the OpenSSL protocol behavior, which is not usually necessary.
* This should be used carefully if at all! Value is a numeric bitmask of the SSL_OP_* options
* from OpenSSL Options.
*/
secureOptions?: number;
}

View File

@@ -0,0 +1,2 @@
"use strict";
Object.defineProperty(exports, "__esModule", { value: true });

View File

@@ -0,0 +1,6 @@
import { Type } from '../type.interface';
import { ClassTransformOptions } from './class-transform-options.interface';
export interface TransformerPackage {
plainToInstance<T>(cls: Type<T>, plain: unknown, options?: ClassTransformOptions): T | T[];
classToPlain(object: unknown, options?: ClassTransformOptions): Record<string, any> | Record<string, any>[];
}

View File

@@ -0,0 +1,2 @@
"use strict";
Object.defineProperty(exports, "__esModule", { value: true });

View File

@@ -0,0 +1,42 @@
/**
* Validation error description.
* @see https://github.com/typestack/class-validator
*
* class-validator@0.13.0
*
* @publicApi
*/
export interface ValidationError {
/**
* Object that was validated.
*
* OPTIONAL - configurable via the ValidatorOptions.validationError.target option
*/
target?: Record<string, any>;
/**
* Object's property that hasn't passed validation.
*/
property: string;
/**
* Value that haven't pass a validation.
*
* OPTIONAL - configurable via the ValidatorOptions.validationError.value option
*/
value?: any;
/**
* Constraints that failed validation with error messages.
*/
constraints?: {
[type: string]: string;
};
/**
* Contains all nested validation errors of the property.
*/
children?: ValidationError[];
/**
* A transient set of data passed through to the validation result for response mapping
*/
contexts?: {
[type: string]: any;
};
}

View File

@@ -0,0 +1,2 @@
"use strict";
Object.defineProperty(exports, "__esModule", { value: true });

View File

@@ -0,0 +1,76 @@
/**
* Options passed to validator during validation.
* @see https://github.com/typestack/class-validator
*
* class-validator@0.13.0
*
* @publicApi
*/
export interface ValidatorOptions {
/**
* If set to true then class-validator will print extra warning messages to the console when something is not right.
*/
enableDebugMessages?: boolean;
/**
* If set to true then validator will skip validation of all properties that are undefined in the validating object.
*/
skipUndefinedProperties?: boolean;
/**
* If set to true then validator will skip validation of all properties that are null in the validating object.
*/
skipNullProperties?: boolean;
/**
* If set to true then validator will skip validation of all properties that are null or undefined in the validating object.
*/
skipMissingProperties?: boolean;
/**
* If set to true validator will strip validated object of any properties that do not have any decorators.
*
* Tip: if no other decorator is suitable for your property use @Allow decorator.
*/
whitelist?: boolean;
/**
* If set to true, instead of stripping non-whitelisted properties validator will throw an error
*/
forbidNonWhitelisted?: boolean;
/**
* Groups to be used during validation of the object.
*/
groups?: string[];
/**
* Set default for `always` option of decorators. Default can be overridden in decorator options.
*/
always?: boolean;
/**
* If [groups]{@link ValidatorOptions#groups} is not given or is empty,
* ignore decorators with at least one group.
*/
strictGroups?: boolean;
/**
* If set to true, the validation will not use default messages.
* Error message always will be undefined if its not explicitly set.
*/
dismissDefaultMessages?: boolean;
/**
* ValidationError special options.
*/
validationError?: {
/**
* Indicates if target should be exposed in ValidationError.
*/
target?: boolean;
/**
* Indicates if validated value should be exposed in ValidationError.
*/
value?: boolean;
};
/**
* Settings true will cause fail validation of unknown objects.
*/
forbidUnknownValues?: boolean;
/**
* When set to true, validation of the given property will stop after encountering the first error.
* This is enabled by default.
*/
stopAtFirstError?: boolean;
}

View File

@@ -0,0 +1,2 @@
"use strict";
Object.defineProperty(exports, "__esModule", { value: true });

View File

@@ -0,0 +1,5 @@
import { ValidationError } from './validation-error.interface';
import { ValidatorOptions } from './validator-options.interface';
export interface ValidatorPackage {
validate(object: unknown, validatorOptions?: ValidatorOptions): ValidationError[] | Promise<ValidationError[]>;
}

View File

@@ -0,0 +1,2 @@
"use strict";
Object.defineProperty(exports, "__esModule", { value: true });