@culturefy/shared 1.0.36 → 1.0.38
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/build/cjs/middlewares/token-validation.js +3 -1
- package/build/cjs/middlewares/token-validation.js.map +1 -1
- package/build/esm/middlewares/token-validation.js +3 -1
- package/build/esm/middlewares/token-validation.js.map +1 -1
- package/build/src/middlewares/token-validation.js +3 -1
- package/build/src/middlewares/token-validation.js.map +1 -1
- package/package.json +1 -1
- package/src/middlewares/token-validation.ts +2 -1
|
@@ -6,6 +6,7 @@ var _enums = require("../enums");
|
|
|
6
6
|
var _utils = require("../utils");
|
|
7
7
|
async function tokenValidation(request, context) {
|
|
8
8
|
try {
|
|
9
|
+
var _data$data;
|
|
9
10
|
const url = await (0, _utils.getAzureVaultSecretByKey)(context, process.env.AZURE_KEY_VAULT_NAME || "", _enums.AzureSecretKeysEnum.AUTH_SERVICE_AUTHENTICATION_URL);
|
|
10
11
|
if (!url) {
|
|
11
12
|
return {
|
|
@@ -19,12 +20,13 @@ async function tokenValidation(request, context) {
|
|
|
19
20
|
headers: request.headers
|
|
20
21
|
});
|
|
21
22
|
const data = await response.json();
|
|
23
|
+
context.log("Data:", JSON.stringify(data));
|
|
22
24
|
return {
|
|
23
25
|
status: true,
|
|
24
26
|
message: "Token validation successful",
|
|
25
27
|
data: {
|
|
26
28
|
cookies: data.cookies,
|
|
27
|
-
user: data.user
|
|
29
|
+
user: data == null || (_data$data = data.data) == null ? void 0 : _data$data.user
|
|
28
30
|
}
|
|
29
31
|
};
|
|
30
32
|
} catch (error) {
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"token-validation.js","names":["_enums","require","_utils","tokenValidation","request","context","url","getAzureVaultSecretByKey","process","env","AZURE_KEY_VAULT_NAME","AzureSecretKeysEnum","AUTH_SERVICE_AUTHENTICATION_URL","status","message","log","response","fetch","method","headers","data","json","cookies","user","error"],"sources":["../../../src/middlewares/token-validation.ts"],"sourcesContent":["\nimport IUser from \"../models/user.model\";\nimport { AzureSecretKeysEnum } from \"../enums\";\nimport { getAzureVaultSecretByKey } from \"../utils\";\nimport { HttpRequest, InvocationContext } from \"@azure/functions\";\n\ninterface TokenValidationResult {\n status: boolean;\n message: string;\n data?: {\n cookies: {\n access_token: string;\n refresh_token: string;\n expires_in?: number;\n refresh_expires_in?: number;\n };\n user: IUser;\n };\n}\n\nexport async function tokenValidation(request: HttpRequest, context: InvocationContext): Promise<TokenValidationResult> {\n try {\n const url = await getAzureVaultSecretByKey(context, process.env.AZURE_KEY_VAULT_NAME || \"\", AzureSecretKeysEnum.AUTH_SERVICE_AUTHENTICATION_URL);\n if(!url) {\n return { status: false, message: \"Auth service authenticaion API url not found\" };\n }\n context.log(`Auth service authentication API url: ${url}`);\n \n const response = await fetch(url, {\n method: \"GET\",\n headers: request.headers\n });\n const data = await response.json();\n return { status: true, message: \"Token validation successful\", data: {\n cookies: data.cookies,\n user: data
|
|
1
|
+
{"version":3,"file":"token-validation.js","names":["_enums","require","_utils","tokenValidation","request","context","_data$data","url","getAzureVaultSecretByKey","process","env","AZURE_KEY_VAULT_NAME","AzureSecretKeysEnum","AUTH_SERVICE_AUTHENTICATION_URL","status","message","log","response","fetch","method","headers","data","json","JSON","stringify","cookies","user","error"],"sources":["../../../src/middlewares/token-validation.ts"],"sourcesContent":["\nimport IUser from \"../models/user.model\";\nimport { AzureSecretKeysEnum } from \"../enums\";\nimport { getAzureVaultSecretByKey } from \"../utils\";\nimport { HttpRequest, InvocationContext } from \"@azure/functions\";\n\ninterface TokenValidationResult {\n status: boolean;\n message: string;\n data?: {\n cookies: {\n access_token: string;\n refresh_token: string;\n expires_in?: number;\n refresh_expires_in?: number;\n };\n user: IUser;\n };\n}\n\nexport async function tokenValidation(request: HttpRequest, context: InvocationContext): Promise<TokenValidationResult> {\n try {\n const url = await getAzureVaultSecretByKey(context, process.env.AZURE_KEY_VAULT_NAME || \"\", AzureSecretKeysEnum.AUTH_SERVICE_AUTHENTICATION_URL);\n if(!url) {\n return { status: false, message: \"Auth service authenticaion API url not found\" };\n }\n context.log(`Auth service authentication API url: ${url}`);\n \n const response = await fetch(url, {\n method: \"GET\",\n headers: request.headers\n });\n const data = await response.json();\n context.log(\"Data:\", JSON.stringify(data));\n return { status: true, message: \"Token validation successful\", data: {\n cookies: data.cookies,\n user: data?.data?.user\n } };\n\n } catch (error:any) {\n context.error(\"Culturefy token validation error:\", error);\n return { status: false, message: error.message || \"Internal server error during culturefy token validation\" };\n }\n}"],"mappings":";;;;AAEA,IAAAA,MAAA,GAAAC,OAAA;AACA,IAAAC,MAAA,GAAAD,OAAA;AAiBO,eAAeE,eAAeA,CAACC,OAAoB,EAAEC,OAA0B,EAAkC;EACpH,IAAI;IAAA,IAAAC,UAAA;IACA,MAAMC,GAAG,GAAG,MAAM,IAAAC,+BAAwB,EAACH,OAAO,EAAEI,OAAO,CAACC,GAAG,CAACC,oBAAoB,IAAI,EAAE,EAAEC,0BAAmB,CAACC,+BAA+B,CAAC;IAChJ,IAAG,CAACN,GAAG,EAAE;MACL,OAAO;QAAEO,MAAM,EAAE,KAAK;QAAEC,OAAO,EAAE;MAA+C,CAAC;IACrF;IACAV,OAAO,CAACW,GAAG,CAAC,wCAAwCT,GAAG,EAAE,CAAC;IAE1D,MAAMU,QAAQ,GAAG,MAAMC,KAAK,CAACX,GAAG,EAAE;MAC9BY,MAAM,EAAE,KAAK;MACbC,OAAO,EAAEhB,OAAO,CAACgB;IACrB,CAAC,CAAC;IACF,MAAMC,IAAI,GAAG,MAAMJ,QAAQ,CAACK,IAAI,CAAC,CAAC;IAClCjB,OAAO,CAACW,GAAG,CAAC,OAAO,EAAEO,IAAI,CAACC,SAAS,CAACH,IAAI,CAAC,CAAC;IAC1C,OAAO;MAAEP,MAAM,EAAE,IAAI;MAAEC,OAAO,EAAE,6BAA6B;MAAEM,IAAI,EAAE;QACjEI,OAAO,EAAEJ,IAAI,CAACI,OAAO;QACrBC,IAAI,EAAEL,IAAI,aAAAf,UAAA,GAAJe,IAAI,CAAEA,IAAI,qBAAVf,UAAA,CAAYoB;MACtB;IAAE,CAAC;EAEP,CAAC,CAAC,OAAOC,KAAS,EAAE;IAChBtB,OAAO,CAACsB,KAAK,CAAC,mCAAmC,EAAEA,KAAK,CAAC;IACzD,OAAO;MAAEb,MAAM,EAAE,KAAK;MAAEC,OAAO,EAAEY,KAAK,CAACZ,OAAO,IAAI;IAA0D,CAAC;EACjH;AACJ","ignoreList":[]}
|
|
@@ -2,6 +2,7 @@ import { AzureSecretKeysEnum } from "../enums";
|
|
|
2
2
|
import { getAzureVaultSecretByKey } from "../utils";
|
|
3
3
|
export async function tokenValidation(request, context) {
|
|
4
4
|
try {
|
|
5
|
+
var _data$data;
|
|
5
6
|
const url = await getAzureVaultSecretByKey(context, process.env.AZURE_KEY_VAULT_NAME || "", AzureSecretKeysEnum.AUTH_SERVICE_AUTHENTICATION_URL);
|
|
6
7
|
if (!url) {
|
|
7
8
|
return {
|
|
@@ -15,12 +16,13 @@ export async function tokenValidation(request, context) {
|
|
|
15
16
|
headers: request.headers
|
|
16
17
|
});
|
|
17
18
|
const data = await response.json();
|
|
19
|
+
context.log("Data:", JSON.stringify(data));
|
|
18
20
|
return {
|
|
19
21
|
status: true,
|
|
20
22
|
message: "Token validation successful",
|
|
21
23
|
data: {
|
|
22
24
|
cookies: data.cookies,
|
|
23
|
-
user: data.user
|
|
25
|
+
user: data == null || (_data$data = data.data) == null ? void 0 : _data$data.user
|
|
24
26
|
}
|
|
25
27
|
};
|
|
26
28
|
} catch (error) {
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"token-validation.js","names":["AzureSecretKeysEnum","getAzureVaultSecretByKey","tokenValidation","request","context","url","process","env","AZURE_KEY_VAULT_NAME","AUTH_SERVICE_AUTHENTICATION_URL","status","message","log","response","fetch","method","headers","data","json","cookies","user","error"],"sources":["../../../src/middlewares/token-validation.ts"],"sourcesContent":["\nimport IUser from \"../models/user.model\";\nimport { AzureSecretKeysEnum } from \"../enums\";\nimport { getAzureVaultSecretByKey } from \"../utils\";\nimport { HttpRequest, InvocationContext } from \"@azure/functions\";\n\ninterface TokenValidationResult {\n status: boolean;\n message: string;\n data?: {\n cookies: {\n access_token: string;\n refresh_token: string;\n expires_in?: number;\n refresh_expires_in?: number;\n };\n user: IUser;\n };\n}\n\nexport async function tokenValidation(request: HttpRequest, context: InvocationContext): Promise<TokenValidationResult> {\n try {\n const url = await getAzureVaultSecretByKey(context, process.env.AZURE_KEY_VAULT_NAME || \"\", AzureSecretKeysEnum.AUTH_SERVICE_AUTHENTICATION_URL);\n if(!url) {\n return { status: false, message: \"Auth service authenticaion API url not found\" };\n }\n context.log(`Auth service authentication API url: ${url}`);\n \n const response = await fetch(url, {\n method: \"GET\",\n headers: request.headers\n });\n const data = await response.json();\n return { status: true, message: \"Token validation successful\", data: {\n cookies: data.cookies,\n user: data
|
|
1
|
+
{"version":3,"file":"token-validation.js","names":["AzureSecretKeysEnum","getAzureVaultSecretByKey","tokenValidation","request","context","_data$data","url","process","env","AZURE_KEY_VAULT_NAME","AUTH_SERVICE_AUTHENTICATION_URL","status","message","log","response","fetch","method","headers","data","json","JSON","stringify","cookies","user","error"],"sources":["../../../src/middlewares/token-validation.ts"],"sourcesContent":["\nimport IUser from \"../models/user.model\";\nimport { AzureSecretKeysEnum } from \"../enums\";\nimport { getAzureVaultSecretByKey } from \"../utils\";\nimport { HttpRequest, InvocationContext } from \"@azure/functions\";\n\ninterface TokenValidationResult {\n status: boolean;\n message: string;\n data?: {\n cookies: {\n access_token: string;\n refresh_token: string;\n expires_in?: number;\n refresh_expires_in?: number;\n };\n user: IUser;\n };\n}\n\nexport async function tokenValidation(request: HttpRequest, context: InvocationContext): Promise<TokenValidationResult> {\n try {\n const url = await getAzureVaultSecretByKey(context, process.env.AZURE_KEY_VAULT_NAME || \"\", AzureSecretKeysEnum.AUTH_SERVICE_AUTHENTICATION_URL);\n if(!url) {\n return { status: false, message: \"Auth service authenticaion API url not found\" };\n }\n context.log(`Auth service authentication API url: ${url}`);\n \n const response = await fetch(url, {\n method: \"GET\",\n headers: request.headers\n });\n const data = await response.json();\n context.log(\"Data:\", JSON.stringify(data));\n return { status: true, message: \"Token validation successful\", data: {\n cookies: data.cookies,\n user: data?.data?.user\n } };\n\n } catch (error:any) {\n context.error(\"Culturefy token validation error:\", error);\n return { status: false, message: error.message || \"Internal server error during culturefy token validation\" };\n }\n}"],"mappings":"AAEA,SAASA,mBAAmB,QAAQ,UAAU;AAC9C,SAASC,wBAAwB,QAAQ,UAAU;AAiBnD,OAAO,eAAeC,eAAeA,CAACC,OAAoB,EAAEC,OAA0B,EAAkC;EACpH,IAAI;IAAA,IAAAC,UAAA;IACA,MAAMC,GAAG,GAAG,MAAML,wBAAwB,CAACG,OAAO,EAAEG,OAAO,CAACC,GAAG,CAACC,oBAAoB,IAAI,EAAE,EAAET,mBAAmB,CAACU,+BAA+B,CAAC;IAChJ,IAAG,CAACJ,GAAG,EAAE;MACL,OAAO;QAAEK,MAAM,EAAE,KAAK;QAAEC,OAAO,EAAE;MAA+C,CAAC;IACrF;IACAR,OAAO,CAACS,GAAG,CAAC,wCAAwCP,GAAG,EAAE,CAAC;IAE1D,MAAMQ,QAAQ,GAAG,MAAMC,KAAK,CAACT,GAAG,EAAE;MAC9BU,MAAM,EAAE,KAAK;MACbC,OAAO,EAAEd,OAAO,CAACc;IACrB,CAAC,CAAC;IACF,MAAMC,IAAI,GAAG,MAAMJ,QAAQ,CAACK,IAAI,CAAC,CAAC;IAClCf,OAAO,CAACS,GAAG,CAAC,OAAO,EAAEO,IAAI,CAACC,SAAS,CAACH,IAAI,CAAC,CAAC;IAC1C,OAAO;MAAEP,MAAM,EAAE,IAAI;MAAEC,OAAO,EAAE,6BAA6B;MAAEM,IAAI,EAAE;QACjEI,OAAO,EAAEJ,IAAI,CAACI,OAAO;QACrBC,IAAI,EAAEL,IAAI,aAAAb,UAAA,GAAJa,IAAI,CAAEA,IAAI,qBAAVb,UAAA,CAAYkB;MACtB;IAAE,CAAC;EAEP,CAAC,CAAC,OAAOC,KAAS,EAAE;IAChBpB,OAAO,CAACoB,KAAK,CAAC,mCAAmC,EAAEA,KAAK,CAAC;IACzD,OAAO;MAAEb,MAAM,EAAE,KAAK;MAAEC,OAAO,EAAEY,KAAK,CAACZ,OAAO,IAAI;IAA0D,CAAC;EACjH;AACJ","ignoreList":[]}
|
|
@@ -6,6 +6,7 @@ const enums_1 = require("../enums");
|
|
|
6
6
|
const utils_1 = require("../utils");
|
|
7
7
|
function tokenValidation(request, context) {
|
|
8
8
|
return tslib_1.__awaiter(this, void 0, void 0, function* () {
|
|
9
|
+
var _a;
|
|
9
10
|
try {
|
|
10
11
|
const url = yield (0, utils_1.getAzureVaultSecretByKey)(context, process.env.AZURE_KEY_VAULT_NAME || "", enums_1.AzureSecretKeysEnum.AUTH_SERVICE_AUTHENTICATION_URL);
|
|
11
12
|
if (!url) {
|
|
@@ -17,9 +18,10 @@ function tokenValidation(request, context) {
|
|
|
17
18
|
headers: request.headers
|
|
18
19
|
});
|
|
19
20
|
const data = yield response.json();
|
|
21
|
+
context.log("Data:", JSON.stringify(data));
|
|
20
22
|
return { status: true, message: "Token validation successful", data: {
|
|
21
23
|
cookies: data.cookies,
|
|
22
|
-
user: data.user
|
|
24
|
+
user: (_a = data === null || data === void 0 ? void 0 : data.data) === null || _a === void 0 ? void 0 : _a.user
|
|
23
25
|
} };
|
|
24
26
|
}
|
|
25
27
|
catch (error) {
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"token-validation.js","sourceRoot":"","sources":["../../../src/middlewares/token-validation.ts"],"names":[],"mappings":";;AAoBA,
|
|
1
|
+
{"version":3,"file":"token-validation.js","sourceRoot":"","sources":["../../../src/middlewares/token-validation.ts"],"names":[],"mappings":";;AAoBA,0CAuBC;;AAzCD,oCAA+C;AAC/C,oCAAoD;AAiBpD,SAAsB,eAAe,CAAC,OAAoB,EAAE,OAA0B;;;QAClF,IAAI,CAAC;YACD,MAAM,GAAG,GAAG,MAAM,IAAA,gCAAwB,EAAC,OAAO,EAAE,OAAO,CAAC,GAAG,CAAC,oBAAoB,IAAI,EAAE,EAAE,2BAAmB,CAAC,+BAA+B,CAAC,CAAC;YACjJ,IAAG,CAAC,GAAG,EAAE,CAAC;gBACN,OAAO,EAAE,MAAM,EAAE,KAAK,EAAE,OAAO,EAAE,8CAA8C,EAAE,CAAC;YACtF,CAAC;YACD,OAAO,CAAC,GAAG,CAAC,wCAAwC,GAAG,EAAE,CAAC,CAAC;YAE3D,MAAM,QAAQ,GAAG,MAAM,KAAK,CAAC,GAAG,EAAE;gBAC9B,MAAM,EAAE,KAAK;gBACb,OAAO,EAAE,OAAO,CAAC,OAAO;aAC3B,CAAC,CAAC;YACH,MAAM,IAAI,GAAG,MAAM,QAAQ,CAAC,IAAI,EAAE,CAAC;YACnC,OAAO,CAAC,GAAG,CAAC,OAAO,EAAE,IAAI,CAAC,SAAS,CAAC,IAAI,CAAC,CAAC,CAAC;YAC3C,OAAO,EAAE,MAAM,EAAE,IAAI,EAAE,OAAO,EAAE,6BAA6B,EAAE,IAAI,EAAE;oBACjE,OAAO,EAAE,IAAI,CAAC,OAAO;oBACrB,IAAI,EAAE,MAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,IAAI,0CAAE,IAAI;iBACzB,EAAE,CAAC;QAER,CAAC;QAAC,OAAO,KAAS,EAAE,CAAC;YACjB,OAAO,CAAC,KAAK,CAAC,mCAAmC,EAAE,KAAK,CAAC,CAAC;YAC1D,OAAO,EAAE,MAAM,EAAE,KAAK,EAAE,OAAO,EAAE,KAAK,CAAC,OAAO,IAAI,yDAAyD,EAAE,CAAC;QAClH,CAAC;IACL,CAAC;CAAA"}
|
package/package.json
CHANGED
|
@@ -31,9 +31,10 @@ export async function tokenValidation(request: HttpRequest, context: InvocationC
|
|
|
31
31
|
headers: request.headers
|
|
32
32
|
});
|
|
33
33
|
const data = await response.json();
|
|
34
|
+
context.log("Data:", JSON.stringify(data));
|
|
34
35
|
return { status: true, message: "Token validation successful", data: {
|
|
35
36
|
cookies: data.cookies,
|
|
36
|
-
user: data
|
|
37
|
+
user: data?.data?.user
|
|
37
38
|
} };
|
|
38
39
|
|
|
39
40
|
} catch (error:any) {
|