@culturefy/shared 1.0.36 → 1.0.38

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -6,6 +6,7 @@ var _enums = require("../enums");
6
6
  var _utils = require("../utils");
7
7
  async function tokenValidation(request, context) {
8
8
  try {
9
+ var _data$data;
9
10
  const url = await (0, _utils.getAzureVaultSecretByKey)(context, process.env.AZURE_KEY_VAULT_NAME || "", _enums.AzureSecretKeysEnum.AUTH_SERVICE_AUTHENTICATION_URL);
10
11
  if (!url) {
11
12
  return {
@@ -19,12 +20,13 @@ async function tokenValidation(request, context) {
19
20
  headers: request.headers
20
21
  });
21
22
  const data = await response.json();
23
+ context.log("Data:", JSON.stringify(data));
22
24
  return {
23
25
  status: true,
24
26
  message: "Token validation successful",
25
27
  data: {
26
28
  cookies: data.cookies,
27
- user: data.user
29
+ user: data == null || (_data$data = data.data) == null ? void 0 : _data$data.user
28
30
  }
29
31
  };
30
32
  } catch (error) {
@@ -1 +1 @@
1
- {"version":3,"file":"token-validation.js","names":["_enums","require","_utils","tokenValidation","request","context","url","getAzureVaultSecretByKey","process","env","AZURE_KEY_VAULT_NAME","AzureSecretKeysEnum","AUTH_SERVICE_AUTHENTICATION_URL","status","message","log","response","fetch","method","headers","data","json","cookies","user","error"],"sources":["../../../src/middlewares/token-validation.ts"],"sourcesContent":["\nimport IUser from \"../models/user.model\";\nimport { AzureSecretKeysEnum } from \"../enums\";\nimport { getAzureVaultSecretByKey } from \"../utils\";\nimport { HttpRequest, InvocationContext } from \"@azure/functions\";\n\ninterface TokenValidationResult {\n status: boolean;\n message: string;\n data?: {\n cookies: {\n access_token: string;\n refresh_token: string;\n expires_in?: number;\n refresh_expires_in?: number;\n };\n user: IUser;\n };\n}\n\nexport async function tokenValidation(request: HttpRequest, context: InvocationContext): Promise<TokenValidationResult> {\n try {\n const url = await getAzureVaultSecretByKey(context, process.env.AZURE_KEY_VAULT_NAME || \"\", AzureSecretKeysEnum.AUTH_SERVICE_AUTHENTICATION_URL);\n if(!url) {\n return { status: false, message: \"Auth service authenticaion API url not found\" };\n }\n context.log(`Auth service authentication API url: ${url}`);\n \n const response = await fetch(url, {\n method: \"GET\",\n headers: request.headers\n });\n const data = await response.json();\n return { status: true, message: \"Token validation successful\", data: {\n cookies: data.cookies,\n user: data.user\n } };\n\n } catch (error:any) {\n context.error(\"Culturefy token validation error:\", error);\n return { status: false, message: error.message || \"Internal server error during culturefy token validation\" };\n }\n}"],"mappings":";;;;AAEA,IAAAA,MAAA,GAAAC,OAAA;AACA,IAAAC,MAAA,GAAAD,OAAA;AAiBO,eAAeE,eAAeA,CAACC,OAAoB,EAAEC,OAA0B,EAAkC;EACpH,IAAI;IACA,MAAMC,GAAG,GAAG,MAAM,IAAAC,+BAAwB,EAACF,OAAO,EAAEG,OAAO,CAACC,GAAG,CAACC,oBAAoB,IAAI,EAAE,EAAEC,0BAAmB,CAACC,+BAA+B,CAAC;IAChJ,IAAG,CAACN,GAAG,EAAE;MACL,OAAO;QAAEO,MAAM,EAAE,KAAK;QAAEC,OAAO,EAAE;MAA+C,CAAC;IACrF;IACAT,OAAO,CAACU,GAAG,CAAC,wCAAwCT,GAAG,EAAE,CAAC;IAE1D,MAAMU,QAAQ,GAAG,MAAMC,KAAK,CAACX,GAAG,EAAE;MAC9BY,MAAM,EAAE,KAAK;MACbC,OAAO,EAAEf,OAAO,CAACe;IACrB,CAAC,CAAC;IACF,MAAMC,IAAI,GAAG,MAAMJ,QAAQ,CAACK,IAAI,CAAC,CAAC;IAClC,OAAO;MAAER,MAAM,EAAE,IAAI;MAAEC,OAAO,EAAE,6BAA6B;MAAEM,IAAI,EAAE;QACjEE,OAAO,EAAEF,IAAI,CAACE,OAAO;QACrBC,IAAI,EAAEH,IAAI,CAACG;MACf;IAAE,CAAC;EAEP,CAAC,CAAC,OAAOC,KAAS,EAAE;IAChBnB,OAAO,CAACmB,KAAK,CAAC,mCAAmC,EAAEA,KAAK,CAAC;IACzD,OAAO;MAAEX,MAAM,EAAE,KAAK;MAAEC,OAAO,EAAEU,KAAK,CAACV,OAAO,IAAI;IAA0D,CAAC;EACjH;AACJ","ignoreList":[]}
1
+ {"version":3,"file":"token-validation.js","names":["_enums","require","_utils","tokenValidation","request","context","_data$data","url","getAzureVaultSecretByKey","process","env","AZURE_KEY_VAULT_NAME","AzureSecretKeysEnum","AUTH_SERVICE_AUTHENTICATION_URL","status","message","log","response","fetch","method","headers","data","json","JSON","stringify","cookies","user","error"],"sources":["../../../src/middlewares/token-validation.ts"],"sourcesContent":["\nimport IUser from \"../models/user.model\";\nimport { AzureSecretKeysEnum } from \"../enums\";\nimport { getAzureVaultSecretByKey } from \"../utils\";\nimport { HttpRequest, InvocationContext } from \"@azure/functions\";\n\ninterface TokenValidationResult {\n status: boolean;\n message: string;\n data?: {\n cookies: {\n access_token: string;\n refresh_token: string;\n expires_in?: number;\n refresh_expires_in?: number;\n };\n user: IUser;\n };\n}\n\nexport async function tokenValidation(request: HttpRequest, context: InvocationContext): Promise<TokenValidationResult> {\n try {\n const url = await getAzureVaultSecretByKey(context, process.env.AZURE_KEY_VAULT_NAME || \"\", AzureSecretKeysEnum.AUTH_SERVICE_AUTHENTICATION_URL);\n if(!url) {\n return { status: false, message: \"Auth service authenticaion API url not found\" };\n }\n context.log(`Auth service authentication API url: ${url}`);\n \n const response = await fetch(url, {\n method: \"GET\",\n headers: request.headers\n });\n const data = await response.json();\n context.log(\"Data:\", JSON.stringify(data));\n return { status: true, message: \"Token validation successful\", data: {\n cookies: data.cookies,\n user: data?.data?.user\n } };\n\n } catch (error:any) {\n context.error(\"Culturefy token validation error:\", error);\n return { status: false, message: error.message || \"Internal server error during culturefy token validation\" };\n }\n}"],"mappings":";;;;AAEA,IAAAA,MAAA,GAAAC,OAAA;AACA,IAAAC,MAAA,GAAAD,OAAA;AAiBO,eAAeE,eAAeA,CAACC,OAAoB,EAAEC,OAA0B,EAAkC;EACpH,IAAI;IAAA,IAAAC,UAAA;IACA,MAAMC,GAAG,GAAG,MAAM,IAAAC,+BAAwB,EAACH,OAAO,EAAEI,OAAO,CAACC,GAAG,CAACC,oBAAoB,IAAI,EAAE,EAAEC,0BAAmB,CAACC,+BAA+B,CAAC;IAChJ,IAAG,CAACN,GAAG,EAAE;MACL,OAAO;QAAEO,MAAM,EAAE,KAAK;QAAEC,OAAO,EAAE;MAA+C,CAAC;IACrF;IACAV,OAAO,CAACW,GAAG,CAAC,wCAAwCT,GAAG,EAAE,CAAC;IAE1D,MAAMU,QAAQ,GAAG,MAAMC,KAAK,CAACX,GAAG,EAAE;MAC9BY,MAAM,EAAE,KAAK;MACbC,OAAO,EAAEhB,OAAO,CAACgB;IACrB,CAAC,CAAC;IACF,MAAMC,IAAI,GAAG,MAAMJ,QAAQ,CAACK,IAAI,CAAC,CAAC;IAClCjB,OAAO,CAACW,GAAG,CAAC,OAAO,EAAEO,IAAI,CAACC,SAAS,CAACH,IAAI,CAAC,CAAC;IAC1C,OAAO;MAAEP,MAAM,EAAE,IAAI;MAAEC,OAAO,EAAE,6BAA6B;MAAEM,IAAI,EAAE;QACjEI,OAAO,EAAEJ,IAAI,CAACI,OAAO;QACrBC,IAAI,EAAEL,IAAI,aAAAf,UAAA,GAAJe,IAAI,CAAEA,IAAI,qBAAVf,UAAA,CAAYoB;MACtB;IAAE,CAAC;EAEP,CAAC,CAAC,OAAOC,KAAS,EAAE;IAChBtB,OAAO,CAACsB,KAAK,CAAC,mCAAmC,EAAEA,KAAK,CAAC;IACzD,OAAO;MAAEb,MAAM,EAAE,KAAK;MAAEC,OAAO,EAAEY,KAAK,CAACZ,OAAO,IAAI;IAA0D,CAAC;EACjH;AACJ","ignoreList":[]}
@@ -2,6 +2,7 @@ import { AzureSecretKeysEnum } from "../enums";
2
2
  import { getAzureVaultSecretByKey } from "../utils";
3
3
  export async function tokenValidation(request, context) {
4
4
  try {
5
+ var _data$data;
5
6
  const url = await getAzureVaultSecretByKey(context, process.env.AZURE_KEY_VAULT_NAME || "", AzureSecretKeysEnum.AUTH_SERVICE_AUTHENTICATION_URL);
6
7
  if (!url) {
7
8
  return {
@@ -15,12 +16,13 @@ export async function tokenValidation(request, context) {
15
16
  headers: request.headers
16
17
  });
17
18
  const data = await response.json();
19
+ context.log("Data:", JSON.stringify(data));
18
20
  return {
19
21
  status: true,
20
22
  message: "Token validation successful",
21
23
  data: {
22
24
  cookies: data.cookies,
23
- user: data.user
25
+ user: data == null || (_data$data = data.data) == null ? void 0 : _data$data.user
24
26
  }
25
27
  };
26
28
  } catch (error) {
@@ -1 +1 @@
1
- {"version":3,"file":"token-validation.js","names":["AzureSecretKeysEnum","getAzureVaultSecretByKey","tokenValidation","request","context","url","process","env","AZURE_KEY_VAULT_NAME","AUTH_SERVICE_AUTHENTICATION_URL","status","message","log","response","fetch","method","headers","data","json","cookies","user","error"],"sources":["../../../src/middlewares/token-validation.ts"],"sourcesContent":["\nimport IUser from \"../models/user.model\";\nimport { AzureSecretKeysEnum } from \"../enums\";\nimport { getAzureVaultSecretByKey } from \"../utils\";\nimport { HttpRequest, InvocationContext } from \"@azure/functions\";\n\ninterface TokenValidationResult {\n status: boolean;\n message: string;\n data?: {\n cookies: {\n access_token: string;\n refresh_token: string;\n expires_in?: number;\n refresh_expires_in?: number;\n };\n user: IUser;\n };\n}\n\nexport async function tokenValidation(request: HttpRequest, context: InvocationContext): Promise<TokenValidationResult> {\n try {\n const url = await getAzureVaultSecretByKey(context, process.env.AZURE_KEY_VAULT_NAME || \"\", AzureSecretKeysEnum.AUTH_SERVICE_AUTHENTICATION_URL);\n if(!url) {\n return { status: false, message: \"Auth service authenticaion API url not found\" };\n }\n context.log(`Auth service authentication API url: ${url}`);\n \n const response = await fetch(url, {\n method: \"GET\",\n headers: request.headers\n });\n const data = await response.json();\n return { status: true, message: \"Token validation successful\", data: {\n cookies: data.cookies,\n user: data.user\n } };\n\n } catch (error:any) {\n context.error(\"Culturefy token validation error:\", error);\n return { status: false, message: error.message || \"Internal server error during culturefy token validation\" };\n }\n}"],"mappings":"AAEA,SAASA,mBAAmB,QAAQ,UAAU;AAC9C,SAASC,wBAAwB,QAAQ,UAAU;AAiBnD,OAAO,eAAeC,eAAeA,CAACC,OAAoB,EAAEC,OAA0B,EAAkC;EACpH,IAAI;IACA,MAAMC,GAAG,GAAG,MAAMJ,wBAAwB,CAACG,OAAO,EAAEE,OAAO,CAACC,GAAG,CAACC,oBAAoB,IAAI,EAAE,EAAER,mBAAmB,CAACS,+BAA+B,CAAC;IAChJ,IAAG,CAACJ,GAAG,EAAE;MACL,OAAO;QAAEK,MAAM,EAAE,KAAK;QAAEC,OAAO,EAAE;MAA+C,CAAC;IACrF;IACAP,OAAO,CAACQ,GAAG,CAAC,wCAAwCP,GAAG,EAAE,CAAC;IAE1D,MAAMQ,QAAQ,GAAG,MAAMC,KAAK,CAACT,GAAG,EAAE;MAC9BU,MAAM,EAAE,KAAK;MACbC,OAAO,EAAEb,OAAO,CAACa;IACrB,CAAC,CAAC;IACF,MAAMC,IAAI,GAAG,MAAMJ,QAAQ,CAACK,IAAI,CAAC,CAAC;IAClC,OAAO;MAAER,MAAM,EAAE,IAAI;MAAEC,OAAO,EAAE,6BAA6B;MAAEM,IAAI,EAAE;QACjEE,OAAO,EAAEF,IAAI,CAACE,OAAO;QACrBC,IAAI,EAAEH,IAAI,CAACG;MACf;IAAE,CAAC;EAEP,CAAC,CAAC,OAAOC,KAAS,EAAE;IAChBjB,OAAO,CAACiB,KAAK,CAAC,mCAAmC,EAAEA,KAAK,CAAC;IACzD,OAAO;MAAEX,MAAM,EAAE,KAAK;MAAEC,OAAO,EAAEU,KAAK,CAACV,OAAO,IAAI;IAA0D,CAAC;EACjH;AACJ","ignoreList":[]}
1
+ {"version":3,"file":"token-validation.js","names":["AzureSecretKeysEnum","getAzureVaultSecretByKey","tokenValidation","request","context","_data$data","url","process","env","AZURE_KEY_VAULT_NAME","AUTH_SERVICE_AUTHENTICATION_URL","status","message","log","response","fetch","method","headers","data","json","JSON","stringify","cookies","user","error"],"sources":["../../../src/middlewares/token-validation.ts"],"sourcesContent":["\nimport IUser from \"../models/user.model\";\nimport { AzureSecretKeysEnum } from \"../enums\";\nimport { getAzureVaultSecretByKey } from \"../utils\";\nimport { HttpRequest, InvocationContext } from \"@azure/functions\";\n\ninterface TokenValidationResult {\n status: boolean;\n message: string;\n data?: {\n cookies: {\n access_token: string;\n refresh_token: string;\n expires_in?: number;\n refresh_expires_in?: number;\n };\n user: IUser;\n };\n}\n\nexport async function tokenValidation(request: HttpRequest, context: InvocationContext): Promise<TokenValidationResult> {\n try {\n const url = await getAzureVaultSecretByKey(context, process.env.AZURE_KEY_VAULT_NAME || \"\", AzureSecretKeysEnum.AUTH_SERVICE_AUTHENTICATION_URL);\n if(!url) {\n return { status: false, message: \"Auth service authenticaion API url not found\" };\n }\n context.log(`Auth service authentication API url: ${url}`);\n \n const response = await fetch(url, {\n method: \"GET\",\n headers: request.headers\n });\n const data = await response.json();\n context.log(\"Data:\", JSON.stringify(data));\n return { status: true, message: \"Token validation successful\", data: {\n cookies: data.cookies,\n user: data?.data?.user\n } };\n\n } catch (error:any) {\n context.error(\"Culturefy token validation error:\", error);\n return { status: false, message: error.message || \"Internal server error during culturefy token validation\" };\n }\n}"],"mappings":"AAEA,SAASA,mBAAmB,QAAQ,UAAU;AAC9C,SAASC,wBAAwB,QAAQ,UAAU;AAiBnD,OAAO,eAAeC,eAAeA,CAACC,OAAoB,EAAEC,OAA0B,EAAkC;EACpH,IAAI;IAAA,IAAAC,UAAA;IACA,MAAMC,GAAG,GAAG,MAAML,wBAAwB,CAACG,OAAO,EAAEG,OAAO,CAACC,GAAG,CAACC,oBAAoB,IAAI,EAAE,EAAET,mBAAmB,CAACU,+BAA+B,CAAC;IAChJ,IAAG,CAACJ,GAAG,EAAE;MACL,OAAO;QAAEK,MAAM,EAAE,KAAK;QAAEC,OAAO,EAAE;MAA+C,CAAC;IACrF;IACAR,OAAO,CAACS,GAAG,CAAC,wCAAwCP,GAAG,EAAE,CAAC;IAE1D,MAAMQ,QAAQ,GAAG,MAAMC,KAAK,CAACT,GAAG,EAAE;MAC9BU,MAAM,EAAE,KAAK;MACbC,OAAO,EAAEd,OAAO,CAACc;IACrB,CAAC,CAAC;IACF,MAAMC,IAAI,GAAG,MAAMJ,QAAQ,CAACK,IAAI,CAAC,CAAC;IAClCf,OAAO,CAACS,GAAG,CAAC,OAAO,EAAEO,IAAI,CAACC,SAAS,CAACH,IAAI,CAAC,CAAC;IAC1C,OAAO;MAAEP,MAAM,EAAE,IAAI;MAAEC,OAAO,EAAE,6BAA6B;MAAEM,IAAI,EAAE;QACjEI,OAAO,EAAEJ,IAAI,CAACI,OAAO;QACrBC,IAAI,EAAEL,IAAI,aAAAb,UAAA,GAAJa,IAAI,CAAEA,IAAI,qBAAVb,UAAA,CAAYkB;MACtB;IAAE,CAAC;EAEP,CAAC,CAAC,OAAOC,KAAS,EAAE;IAChBpB,OAAO,CAACoB,KAAK,CAAC,mCAAmC,EAAEA,KAAK,CAAC;IACzD,OAAO;MAAEb,MAAM,EAAE,KAAK;MAAEC,OAAO,EAAEY,KAAK,CAACZ,OAAO,IAAI;IAA0D,CAAC;EACjH;AACJ","ignoreList":[]}
@@ -6,6 +6,7 @@ const enums_1 = require("../enums");
6
6
  const utils_1 = require("../utils");
7
7
  function tokenValidation(request, context) {
8
8
  return tslib_1.__awaiter(this, void 0, void 0, function* () {
9
+ var _a;
9
10
  try {
10
11
  const url = yield (0, utils_1.getAzureVaultSecretByKey)(context, process.env.AZURE_KEY_VAULT_NAME || "", enums_1.AzureSecretKeysEnum.AUTH_SERVICE_AUTHENTICATION_URL);
11
12
  if (!url) {
@@ -17,9 +18,10 @@ function tokenValidation(request, context) {
17
18
  headers: request.headers
18
19
  });
19
20
  const data = yield response.json();
21
+ context.log("Data:", JSON.stringify(data));
20
22
  return { status: true, message: "Token validation successful", data: {
21
23
  cookies: data.cookies,
22
- user: data.user
24
+ user: (_a = data === null || data === void 0 ? void 0 : data.data) === null || _a === void 0 ? void 0 : _a.user
23
25
  } };
24
26
  }
25
27
  catch (error) {
@@ -1 +1 @@
1
- {"version":3,"file":"token-validation.js","sourceRoot":"","sources":["../../../src/middlewares/token-validation.ts"],"names":[],"mappings":";;AAoBA,0CAsBC;;AAxCD,oCAA+C;AAC/C,oCAAoD;AAiBpD,SAAsB,eAAe,CAAC,OAAoB,EAAE,OAA0B;;QAClF,IAAI,CAAC;YACD,MAAM,GAAG,GAAG,MAAM,IAAA,gCAAwB,EAAC,OAAO,EAAE,OAAO,CAAC,GAAG,CAAC,oBAAoB,IAAI,EAAE,EAAE,2BAAmB,CAAC,+BAA+B,CAAC,CAAC;YACjJ,IAAG,CAAC,GAAG,EAAE,CAAC;gBACN,OAAO,EAAE,MAAM,EAAE,KAAK,EAAE,OAAO,EAAE,8CAA8C,EAAE,CAAC;YACtF,CAAC;YACD,OAAO,CAAC,GAAG,CAAC,wCAAwC,GAAG,EAAE,CAAC,CAAC;YAE3D,MAAM,QAAQ,GAAG,MAAM,KAAK,CAAC,GAAG,EAAE;gBAC9B,MAAM,EAAE,KAAK;gBACb,OAAO,EAAE,OAAO,CAAC,OAAO;aAC3B,CAAC,CAAC;YACH,MAAM,IAAI,GAAG,MAAM,QAAQ,CAAC,IAAI,EAAE,CAAC;YACnC,OAAO,EAAE,MAAM,EAAE,IAAI,EAAE,OAAO,EAAE,6BAA6B,EAAE,IAAI,EAAE;oBACjE,OAAO,EAAE,IAAI,CAAC,OAAO;oBACrB,IAAI,EAAE,IAAI,CAAC,IAAI;iBAClB,EAAE,CAAC;QAER,CAAC;QAAC,OAAO,KAAS,EAAE,CAAC;YACjB,OAAO,CAAC,KAAK,CAAC,mCAAmC,EAAE,KAAK,CAAC,CAAC;YAC1D,OAAO,EAAE,MAAM,EAAE,KAAK,EAAE,OAAO,EAAE,KAAK,CAAC,OAAO,IAAI,yDAAyD,EAAE,CAAC;QAClH,CAAC;IACL,CAAC;CAAA"}
1
+ {"version":3,"file":"token-validation.js","sourceRoot":"","sources":["../../../src/middlewares/token-validation.ts"],"names":[],"mappings":";;AAoBA,0CAuBC;;AAzCD,oCAA+C;AAC/C,oCAAoD;AAiBpD,SAAsB,eAAe,CAAC,OAAoB,EAAE,OAA0B;;;QAClF,IAAI,CAAC;YACD,MAAM,GAAG,GAAG,MAAM,IAAA,gCAAwB,EAAC,OAAO,EAAE,OAAO,CAAC,GAAG,CAAC,oBAAoB,IAAI,EAAE,EAAE,2BAAmB,CAAC,+BAA+B,CAAC,CAAC;YACjJ,IAAG,CAAC,GAAG,EAAE,CAAC;gBACN,OAAO,EAAE,MAAM,EAAE,KAAK,EAAE,OAAO,EAAE,8CAA8C,EAAE,CAAC;YACtF,CAAC;YACD,OAAO,CAAC,GAAG,CAAC,wCAAwC,GAAG,EAAE,CAAC,CAAC;YAE3D,MAAM,QAAQ,GAAG,MAAM,KAAK,CAAC,GAAG,EAAE;gBAC9B,MAAM,EAAE,KAAK;gBACb,OAAO,EAAE,OAAO,CAAC,OAAO;aAC3B,CAAC,CAAC;YACH,MAAM,IAAI,GAAG,MAAM,QAAQ,CAAC,IAAI,EAAE,CAAC;YACnC,OAAO,CAAC,GAAG,CAAC,OAAO,EAAE,IAAI,CAAC,SAAS,CAAC,IAAI,CAAC,CAAC,CAAC;YAC3C,OAAO,EAAE,MAAM,EAAE,IAAI,EAAE,OAAO,EAAE,6BAA6B,EAAE,IAAI,EAAE;oBACjE,OAAO,EAAE,IAAI,CAAC,OAAO;oBACrB,IAAI,EAAE,MAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,IAAI,0CAAE,IAAI;iBACzB,EAAE,CAAC;QAER,CAAC;QAAC,OAAO,KAAS,EAAE,CAAC;YACjB,OAAO,CAAC,KAAK,CAAC,mCAAmC,EAAE,KAAK,CAAC,CAAC;YAC1D,OAAO,EAAE,MAAM,EAAE,KAAK,EAAE,OAAO,EAAE,KAAK,CAAC,OAAO,IAAI,yDAAyD,EAAE,CAAC;QAClH,CAAC;IACL,CAAC;CAAA"}
package/package.json CHANGED
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "name": "@culturefy/shared",
3
3
  "description": "Shared utilities for culturefy serverless services",
4
- "version": "1.0.36",
4
+ "version": "1.0.38",
5
5
  "main": "build/cjs/index.js",
6
6
  "module": "build/esm/index.js",
7
7
  "types": "build/src/index.d.ts",
@@ -31,9 +31,10 @@ export async function tokenValidation(request: HttpRequest, context: InvocationC
31
31
  headers: request.headers
32
32
  });
33
33
  const data = await response.json();
34
+ context.log("Data:", JSON.stringify(data));
34
35
  return { status: true, message: "Token validation successful", data: {
35
36
  cookies: data.cookies,
36
- user: data.user
37
+ user: data?.data?.user
37
38
  } };
38
39
 
39
40
  } catch (error:any) {