@culturefy/shared 1.0.36 → 1.0.37
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/build/cjs/middlewares/token-validation.js +2 -1
- package/build/cjs/middlewares/token-validation.js.map +1 -1
- package/build/esm/middlewares/token-validation.js +2 -1
- package/build/esm/middlewares/token-validation.js.map +1 -1
- package/build/src/middlewares/token-validation.js +2 -1
- package/build/src/middlewares/token-validation.js.map +1 -1
- package/package.json +1 -1
- package/src/middlewares/token-validation.ts +2 -1
|
@@ -19,12 +19,13 @@ async function tokenValidation(request, context) {
|
|
|
19
19
|
headers: request.headers
|
|
20
20
|
});
|
|
21
21
|
const data = await response.json();
|
|
22
|
+
context.log("Data:", JSON.stringify(data));
|
|
22
23
|
return {
|
|
23
24
|
status: true,
|
|
24
25
|
message: "Token validation successful",
|
|
25
26
|
data: {
|
|
26
27
|
cookies: data.cookies,
|
|
27
|
-
user: data.
|
|
28
|
+
user: data.data
|
|
28
29
|
}
|
|
29
30
|
};
|
|
30
31
|
} catch (error) {
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"token-validation.js","names":["_enums","require","_utils","tokenValidation","request","context","url","getAzureVaultSecretByKey","process","env","AZURE_KEY_VAULT_NAME","AzureSecretKeysEnum","AUTH_SERVICE_AUTHENTICATION_URL","status","message","log","response","fetch","method","headers","data","json","cookies","user","error"],"sources":["../../../src/middlewares/token-validation.ts"],"sourcesContent":["\nimport IUser from \"../models/user.model\";\nimport { AzureSecretKeysEnum } from \"../enums\";\nimport { getAzureVaultSecretByKey } from \"../utils\";\nimport { HttpRequest, InvocationContext } from \"@azure/functions\";\n\ninterface TokenValidationResult {\n status: boolean;\n message: string;\n data?: {\n cookies: {\n access_token: string;\n refresh_token: string;\n expires_in?: number;\n refresh_expires_in?: number;\n };\n user: IUser;\n };\n}\n\nexport async function tokenValidation(request: HttpRequest, context: InvocationContext): Promise<TokenValidationResult> {\n try {\n const url = await getAzureVaultSecretByKey(context, process.env.AZURE_KEY_VAULT_NAME || \"\", AzureSecretKeysEnum.AUTH_SERVICE_AUTHENTICATION_URL);\n if(!url) {\n return { status: false, message: \"Auth service authenticaion API url not found\" };\n }\n context.log(`Auth service authentication API url: ${url}`);\n \n const response = await fetch(url, {\n method: \"GET\",\n headers: request.headers\n });\n const data = await response.json();\n return { status: true, message: \"Token validation successful\", data: {\n cookies: data.cookies,\n user: data.
|
|
1
|
+
{"version":3,"file":"token-validation.js","names":["_enums","require","_utils","tokenValidation","request","context","url","getAzureVaultSecretByKey","process","env","AZURE_KEY_VAULT_NAME","AzureSecretKeysEnum","AUTH_SERVICE_AUTHENTICATION_URL","status","message","log","response","fetch","method","headers","data","json","JSON","stringify","cookies","user","error"],"sources":["../../../src/middlewares/token-validation.ts"],"sourcesContent":["\nimport IUser from \"../models/user.model\";\nimport { AzureSecretKeysEnum } from \"../enums\";\nimport { getAzureVaultSecretByKey } from \"../utils\";\nimport { HttpRequest, InvocationContext } from \"@azure/functions\";\n\ninterface TokenValidationResult {\n status: boolean;\n message: string;\n data?: {\n cookies: {\n access_token: string;\n refresh_token: string;\n expires_in?: number;\n refresh_expires_in?: number;\n };\n user: IUser;\n };\n}\n\nexport async function tokenValidation(request: HttpRequest, context: InvocationContext): Promise<TokenValidationResult> {\n try {\n const url = await getAzureVaultSecretByKey(context, process.env.AZURE_KEY_VAULT_NAME || \"\", AzureSecretKeysEnum.AUTH_SERVICE_AUTHENTICATION_URL);\n if(!url) {\n return { status: false, message: \"Auth service authenticaion API url not found\" };\n }\n context.log(`Auth service authentication API url: ${url}`);\n \n const response = await fetch(url, {\n method: \"GET\",\n headers: request.headers\n });\n const data = await response.json();\n context.log(\"Data:\", JSON.stringify(data));\n return { status: true, message: \"Token validation successful\", data: {\n cookies: data.cookies,\n user: data.data\n } };\n\n } catch (error:any) {\n context.error(\"Culturefy token validation error:\", error);\n return { status: false, message: error.message || \"Internal server error during culturefy token validation\" };\n }\n}"],"mappings":";;;;AAEA,IAAAA,MAAA,GAAAC,OAAA;AACA,IAAAC,MAAA,GAAAD,OAAA;AAiBO,eAAeE,eAAeA,CAACC,OAAoB,EAAEC,OAA0B,EAAkC;EACpH,IAAI;IACA,MAAMC,GAAG,GAAG,MAAM,IAAAC,+BAAwB,EAACF,OAAO,EAAEG,OAAO,CAACC,GAAG,CAACC,oBAAoB,IAAI,EAAE,EAAEC,0BAAmB,CAACC,+BAA+B,CAAC;IAChJ,IAAG,CAACN,GAAG,EAAE;MACL,OAAO;QAAEO,MAAM,EAAE,KAAK;QAAEC,OAAO,EAAE;MAA+C,CAAC;IACrF;IACAT,OAAO,CAACU,GAAG,CAAC,wCAAwCT,GAAG,EAAE,CAAC;IAE1D,MAAMU,QAAQ,GAAG,MAAMC,KAAK,CAACX,GAAG,EAAE;MAC9BY,MAAM,EAAE,KAAK;MACbC,OAAO,EAAEf,OAAO,CAACe;IACrB,CAAC,CAAC;IACF,MAAMC,IAAI,GAAG,MAAMJ,QAAQ,CAACK,IAAI,CAAC,CAAC;IAClChB,OAAO,CAACU,GAAG,CAAC,OAAO,EAAEO,IAAI,CAACC,SAAS,CAACH,IAAI,CAAC,CAAC;IAC1C,OAAO;MAAEP,MAAM,EAAE,IAAI;MAAEC,OAAO,EAAE,6BAA6B;MAAEM,IAAI,EAAE;QACjEI,OAAO,EAAEJ,IAAI,CAACI,OAAO;QACrBC,IAAI,EAAEL,IAAI,CAACA;MACf;IAAE,CAAC;EAEP,CAAC,CAAC,OAAOM,KAAS,EAAE;IAChBrB,OAAO,CAACqB,KAAK,CAAC,mCAAmC,EAAEA,KAAK,CAAC;IACzD,OAAO;MAAEb,MAAM,EAAE,KAAK;MAAEC,OAAO,EAAEY,KAAK,CAACZ,OAAO,IAAI;IAA0D,CAAC;EACjH;AACJ","ignoreList":[]}
|
|
@@ -15,12 +15,13 @@ export async function tokenValidation(request, context) {
|
|
|
15
15
|
headers: request.headers
|
|
16
16
|
});
|
|
17
17
|
const data = await response.json();
|
|
18
|
+
context.log("Data:", JSON.stringify(data));
|
|
18
19
|
return {
|
|
19
20
|
status: true,
|
|
20
21
|
message: "Token validation successful",
|
|
21
22
|
data: {
|
|
22
23
|
cookies: data.cookies,
|
|
23
|
-
user: data.
|
|
24
|
+
user: data.data
|
|
24
25
|
}
|
|
25
26
|
};
|
|
26
27
|
} catch (error) {
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"token-validation.js","names":["AzureSecretKeysEnum","getAzureVaultSecretByKey","tokenValidation","request","context","url","process","env","AZURE_KEY_VAULT_NAME","AUTH_SERVICE_AUTHENTICATION_URL","status","message","log","response","fetch","method","headers","data","json","cookies","user","error"],"sources":["../../../src/middlewares/token-validation.ts"],"sourcesContent":["\nimport IUser from \"../models/user.model\";\nimport { AzureSecretKeysEnum } from \"../enums\";\nimport { getAzureVaultSecretByKey } from \"../utils\";\nimport { HttpRequest, InvocationContext } from \"@azure/functions\";\n\ninterface TokenValidationResult {\n status: boolean;\n message: string;\n data?: {\n cookies: {\n access_token: string;\n refresh_token: string;\n expires_in?: number;\n refresh_expires_in?: number;\n };\n user: IUser;\n };\n}\n\nexport async function tokenValidation(request: HttpRequest, context: InvocationContext): Promise<TokenValidationResult> {\n try {\n const url = await getAzureVaultSecretByKey(context, process.env.AZURE_KEY_VAULT_NAME || \"\", AzureSecretKeysEnum.AUTH_SERVICE_AUTHENTICATION_URL);\n if(!url) {\n return { status: false, message: \"Auth service authenticaion API url not found\" };\n }\n context.log(`Auth service authentication API url: ${url}`);\n \n const response = await fetch(url, {\n method: \"GET\",\n headers: request.headers\n });\n const data = await response.json();\n return { status: true, message: \"Token validation successful\", data: {\n cookies: data.cookies,\n user: data.
|
|
1
|
+
{"version":3,"file":"token-validation.js","names":["AzureSecretKeysEnum","getAzureVaultSecretByKey","tokenValidation","request","context","url","process","env","AZURE_KEY_VAULT_NAME","AUTH_SERVICE_AUTHENTICATION_URL","status","message","log","response","fetch","method","headers","data","json","JSON","stringify","cookies","user","error"],"sources":["../../../src/middlewares/token-validation.ts"],"sourcesContent":["\nimport IUser from \"../models/user.model\";\nimport { AzureSecretKeysEnum } from \"../enums\";\nimport { getAzureVaultSecretByKey } from \"../utils\";\nimport { HttpRequest, InvocationContext } from \"@azure/functions\";\n\ninterface TokenValidationResult {\n status: boolean;\n message: string;\n data?: {\n cookies: {\n access_token: string;\n refresh_token: string;\n expires_in?: number;\n refresh_expires_in?: number;\n };\n user: IUser;\n };\n}\n\nexport async function tokenValidation(request: HttpRequest, context: InvocationContext): Promise<TokenValidationResult> {\n try {\n const url = await getAzureVaultSecretByKey(context, process.env.AZURE_KEY_VAULT_NAME || \"\", AzureSecretKeysEnum.AUTH_SERVICE_AUTHENTICATION_URL);\n if(!url) {\n return { status: false, message: \"Auth service authenticaion API url not found\" };\n }\n context.log(`Auth service authentication API url: ${url}`);\n \n const response = await fetch(url, {\n method: \"GET\",\n headers: request.headers\n });\n const data = await response.json();\n context.log(\"Data:\", JSON.stringify(data));\n return { status: true, message: \"Token validation successful\", data: {\n cookies: data.cookies,\n user: data.data\n } };\n\n } catch (error:any) {\n context.error(\"Culturefy token validation error:\", error);\n return { status: false, message: error.message || \"Internal server error during culturefy token validation\" };\n }\n}"],"mappings":"AAEA,SAASA,mBAAmB,QAAQ,UAAU;AAC9C,SAASC,wBAAwB,QAAQ,UAAU;AAiBnD,OAAO,eAAeC,eAAeA,CAACC,OAAoB,EAAEC,OAA0B,EAAkC;EACpH,IAAI;IACA,MAAMC,GAAG,GAAG,MAAMJ,wBAAwB,CAACG,OAAO,EAAEE,OAAO,CAACC,GAAG,CAACC,oBAAoB,IAAI,EAAE,EAAER,mBAAmB,CAACS,+BAA+B,CAAC;IAChJ,IAAG,CAACJ,GAAG,EAAE;MACL,OAAO;QAAEK,MAAM,EAAE,KAAK;QAAEC,OAAO,EAAE;MAA+C,CAAC;IACrF;IACAP,OAAO,CAACQ,GAAG,CAAC,wCAAwCP,GAAG,EAAE,CAAC;IAE1D,MAAMQ,QAAQ,GAAG,MAAMC,KAAK,CAACT,GAAG,EAAE;MAC9BU,MAAM,EAAE,KAAK;MACbC,OAAO,EAAEb,OAAO,CAACa;IACrB,CAAC,CAAC;IACF,MAAMC,IAAI,GAAG,MAAMJ,QAAQ,CAACK,IAAI,CAAC,CAAC;IAClCd,OAAO,CAACQ,GAAG,CAAC,OAAO,EAAEO,IAAI,CAACC,SAAS,CAACH,IAAI,CAAC,CAAC;IAC1C,OAAO;MAAEP,MAAM,EAAE,IAAI;MAAEC,OAAO,EAAE,6BAA6B;MAAEM,IAAI,EAAE;QACjEI,OAAO,EAAEJ,IAAI,CAACI,OAAO;QACrBC,IAAI,EAAEL,IAAI,CAACA;MACf;IAAE,CAAC;EAEP,CAAC,CAAC,OAAOM,KAAS,EAAE;IAChBnB,OAAO,CAACmB,KAAK,CAAC,mCAAmC,EAAEA,KAAK,CAAC;IACzD,OAAO;MAAEb,MAAM,EAAE,KAAK;MAAEC,OAAO,EAAEY,KAAK,CAACZ,OAAO,IAAI;IAA0D,CAAC;EACjH;AACJ","ignoreList":[]}
|
|
@@ -17,9 +17,10 @@ function tokenValidation(request, context) {
|
|
|
17
17
|
headers: request.headers
|
|
18
18
|
});
|
|
19
19
|
const data = yield response.json();
|
|
20
|
+
context.log("Data:", JSON.stringify(data));
|
|
20
21
|
return { status: true, message: "Token validation successful", data: {
|
|
21
22
|
cookies: data.cookies,
|
|
22
|
-
user: data.
|
|
23
|
+
user: data.data
|
|
23
24
|
} };
|
|
24
25
|
}
|
|
25
26
|
catch (error) {
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"token-validation.js","sourceRoot":"","sources":["../../../src/middlewares/token-validation.ts"],"names":[],"mappings":";;AAoBA,
|
|
1
|
+
{"version":3,"file":"token-validation.js","sourceRoot":"","sources":["../../../src/middlewares/token-validation.ts"],"names":[],"mappings":";;AAoBA,0CAuBC;;AAzCD,oCAA+C;AAC/C,oCAAoD;AAiBpD,SAAsB,eAAe,CAAC,OAAoB,EAAE,OAA0B;;QAClF,IAAI,CAAC;YACD,MAAM,GAAG,GAAG,MAAM,IAAA,gCAAwB,EAAC,OAAO,EAAE,OAAO,CAAC,GAAG,CAAC,oBAAoB,IAAI,EAAE,EAAE,2BAAmB,CAAC,+BAA+B,CAAC,CAAC;YACjJ,IAAG,CAAC,GAAG,EAAE,CAAC;gBACN,OAAO,EAAE,MAAM,EAAE,KAAK,EAAE,OAAO,EAAE,8CAA8C,EAAE,CAAC;YACtF,CAAC;YACD,OAAO,CAAC,GAAG,CAAC,wCAAwC,GAAG,EAAE,CAAC,CAAC;YAE3D,MAAM,QAAQ,GAAG,MAAM,KAAK,CAAC,GAAG,EAAE;gBAC9B,MAAM,EAAE,KAAK;gBACb,OAAO,EAAE,OAAO,CAAC,OAAO;aAC3B,CAAC,CAAC;YACH,MAAM,IAAI,GAAG,MAAM,QAAQ,CAAC,IAAI,EAAE,CAAC;YACnC,OAAO,CAAC,GAAG,CAAC,OAAO,EAAE,IAAI,CAAC,SAAS,CAAC,IAAI,CAAC,CAAC,CAAC;YAC3C,OAAO,EAAE,MAAM,EAAE,IAAI,EAAE,OAAO,EAAE,6BAA6B,EAAE,IAAI,EAAE;oBACjE,OAAO,EAAE,IAAI,CAAC,OAAO;oBACrB,IAAI,EAAE,IAAI,CAAC,IAAI;iBAClB,EAAE,CAAC;QAER,CAAC;QAAC,OAAO,KAAS,EAAE,CAAC;YACjB,OAAO,CAAC,KAAK,CAAC,mCAAmC,EAAE,KAAK,CAAC,CAAC;YAC1D,OAAO,EAAE,MAAM,EAAE,KAAK,EAAE,OAAO,EAAE,KAAK,CAAC,OAAO,IAAI,yDAAyD,EAAE,CAAC;QAClH,CAAC;IACL,CAAC;CAAA"}
|
package/package.json
CHANGED
|
@@ -31,9 +31,10 @@ export async function tokenValidation(request: HttpRequest, context: InvocationC
|
|
|
31
31
|
headers: request.headers
|
|
32
32
|
});
|
|
33
33
|
const data = await response.json();
|
|
34
|
+
context.log("Data:", JSON.stringify(data));
|
|
34
35
|
return { status: true, message: "Token validation successful", data: {
|
|
35
36
|
cookies: data.cookies,
|
|
36
|
-
user: data.
|
|
37
|
+
user: data.data
|
|
37
38
|
} };
|
|
38
39
|
|
|
39
40
|
} catch (error:any) {
|