@culturefy/shared 1.0.37 → 1.0.38

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -6,6 +6,7 @@ var _enums = require("../enums");
6
6
  var _utils = require("../utils");
7
7
  async function tokenValidation(request, context) {
8
8
  try {
9
+ var _data$data;
9
10
  const url = await (0, _utils.getAzureVaultSecretByKey)(context, process.env.AZURE_KEY_VAULT_NAME || "", _enums.AzureSecretKeysEnum.AUTH_SERVICE_AUTHENTICATION_URL);
10
11
  if (!url) {
11
12
  return {
@@ -25,7 +26,7 @@ async function tokenValidation(request, context) {
25
26
  message: "Token validation successful",
26
27
  data: {
27
28
  cookies: data.cookies,
28
- user: data.data
29
+ user: data == null || (_data$data = data.data) == null ? void 0 : _data$data.user
29
30
  }
30
31
  };
31
32
  } catch (error) {
@@ -1 +1 @@
1
- {"version":3,"file":"token-validation.js","names":["_enums","require","_utils","tokenValidation","request","context","url","getAzureVaultSecretByKey","process","env","AZURE_KEY_VAULT_NAME","AzureSecretKeysEnum","AUTH_SERVICE_AUTHENTICATION_URL","status","message","log","response","fetch","method","headers","data","json","JSON","stringify","cookies","user","error"],"sources":["../../../src/middlewares/token-validation.ts"],"sourcesContent":["\nimport IUser from \"../models/user.model\";\nimport { AzureSecretKeysEnum } from \"../enums\";\nimport { getAzureVaultSecretByKey } from \"../utils\";\nimport { HttpRequest, InvocationContext } from \"@azure/functions\";\n\ninterface TokenValidationResult {\n status: boolean;\n message: string;\n data?: {\n cookies: {\n access_token: string;\n refresh_token: string;\n expires_in?: number;\n refresh_expires_in?: number;\n };\n user: IUser;\n };\n}\n\nexport async function tokenValidation(request: HttpRequest, context: InvocationContext): Promise<TokenValidationResult> {\n try {\n const url = await getAzureVaultSecretByKey(context, process.env.AZURE_KEY_VAULT_NAME || \"\", AzureSecretKeysEnum.AUTH_SERVICE_AUTHENTICATION_URL);\n if(!url) {\n return { status: false, message: \"Auth service authenticaion API url not found\" };\n }\n context.log(`Auth service authentication API url: ${url}`);\n \n const response = await fetch(url, {\n method: \"GET\",\n headers: request.headers\n });\n const data = await response.json();\n context.log(\"Data:\", JSON.stringify(data));\n return { status: true, message: \"Token validation successful\", data: {\n cookies: data.cookies,\n user: data.data\n } };\n\n } catch (error:any) {\n context.error(\"Culturefy token validation error:\", error);\n return { status: false, message: error.message || \"Internal server error during culturefy token validation\" };\n }\n}"],"mappings":";;;;AAEA,IAAAA,MAAA,GAAAC,OAAA;AACA,IAAAC,MAAA,GAAAD,OAAA;AAiBO,eAAeE,eAAeA,CAACC,OAAoB,EAAEC,OAA0B,EAAkC;EACpH,IAAI;IACA,MAAMC,GAAG,GAAG,MAAM,IAAAC,+BAAwB,EAACF,OAAO,EAAEG,OAAO,CAACC,GAAG,CAACC,oBAAoB,IAAI,EAAE,EAAEC,0BAAmB,CAACC,+BAA+B,CAAC;IAChJ,IAAG,CAACN,GAAG,EAAE;MACL,OAAO;QAAEO,MAAM,EAAE,KAAK;QAAEC,OAAO,EAAE;MAA+C,CAAC;IACrF;IACAT,OAAO,CAACU,GAAG,CAAC,wCAAwCT,GAAG,EAAE,CAAC;IAE1D,MAAMU,QAAQ,GAAG,MAAMC,KAAK,CAACX,GAAG,EAAE;MAC9BY,MAAM,EAAE,KAAK;MACbC,OAAO,EAAEf,OAAO,CAACe;IACrB,CAAC,CAAC;IACF,MAAMC,IAAI,GAAG,MAAMJ,QAAQ,CAACK,IAAI,CAAC,CAAC;IAClChB,OAAO,CAACU,GAAG,CAAC,OAAO,EAAEO,IAAI,CAACC,SAAS,CAACH,IAAI,CAAC,CAAC;IAC1C,OAAO;MAAEP,MAAM,EAAE,IAAI;MAAEC,OAAO,EAAE,6BAA6B;MAAEM,IAAI,EAAE;QACjEI,OAAO,EAAEJ,IAAI,CAACI,OAAO;QACrBC,IAAI,EAAEL,IAAI,CAACA;MACf;IAAE,CAAC;EAEP,CAAC,CAAC,OAAOM,KAAS,EAAE;IAChBrB,OAAO,CAACqB,KAAK,CAAC,mCAAmC,EAAEA,KAAK,CAAC;IACzD,OAAO;MAAEb,MAAM,EAAE,KAAK;MAAEC,OAAO,EAAEY,KAAK,CAACZ,OAAO,IAAI;IAA0D,CAAC;EACjH;AACJ","ignoreList":[]}
1
+ {"version":3,"file":"token-validation.js","names":["_enums","require","_utils","tokenValidation","request","context","_data$data","url","getAzureVaultSecretByKey","process","env","AZURE_KEY_VAULT_NAME","AzureSecretKeysEnum","AUTH_SERVICE_AUTHENTICATION_URL","status","message","log","response","fetch","method","headers","data","json","JSON","stringify","cookies","user","error"],"sources":["../../../src/middlewares/token-validation.ts"],"sourcesContent":["\nimport IUser from \"../models/user.model\";\nimport { AzureSecretKeysEnum } from \"../enums\";\nimport { getAzureVaultSecretByKey } from \"../utils\";\nimport { HttpRequest, InvocationContext } from \"@azure/functions\";\n\ninterface TokenValidationResult {\n status: boolean;\n message: string;\n data?: {\n cookies: {\n access_token: string;\n refresh_token: string;\n expires_in?: number;\n refresh_expires_in?: number;\n };\n user: IUser;\n };\n}\n\nexport async function tokenValidation(request: HttpRequest, context: InvocationContext): Promise<TokenValidationResult> {\n try {\n const url = await getAzureVaultSecretByKey(context, process.env.AZURE_KEY_VAULT_NAME || \"\", AzureSecretKeysEnum.AUTH_SERVICE_AUTHENTICATION_URL);\n if(!url) {\n return { status: false, message: \"Auth service authenticaion API url not found\" };\n }\n context.log(`Auth service authentication API url: ${url}`);\n \n const response = await fetch(url, {\n method: \"GET\",\n headers: request.headers\n });\n const data = await response.json();\n context.log(\"Data:\", JSON.stringify(data));\n return { status: true, message: \"Token validation successful\", data: {\n cookies: data.cookies,\n user: data?.data?.user\n } };\n\n } catch (error:any) {\n context.error(\"Culturefy token validation error:\", error);\n return { status: false, message: error.message || \"Internal server error during culturefy token validation\" };\n }\n}"],"mappings":";;;;AAEA,IAAAA,MAAA,GAAAC,OAAA;AACA,IAAAC,MAAA,GAAAD,OAAA;AAiBO,eAAeE,eAAeA,CAACC,OAAoB,EAAEC,OAA0B,EAAkC;EACpH,IAAI;IAAA,IAAAC,UAAA;IACA,MAAMC,GAAG,GAAG,MAAM,IAAAC,+BAAwB,EAACH,OAAO,EAAEI,OAAO,CAACC,GAAG,CAACC,oBAAoB,IAAI,EAAE,EAAEC,0BAAmB,CAACC,+BAA+B,CAAC;IAChJ,IAAG,CAACN,GAAG,EAAE;MACL,OAAO;QAAEO,MAAM,EAAE,KAAK;QAAEC,OAAO,EAAE;MAA+C,CAAC;IACrF;IACAV,OAAO,CAACW,GAAG,CAAC,wCAAwCT,GAAG,EAAE,CAAC;IAE1D,MAAMU,QAAQ,GAAG,MAAMC,KAAK,CAACX,GAAG,EAAE;MAC9BY,MAAM,EAAE,KAAK;MACbC,OAAO,EAAEhB,OAAO,CAACgB;IACrB,CAAC,CAAC;IACF,MAAMC,IAAI,GAAG,MAAMJ,QAAQ,CAACK,IAAI,CAAC,CAAC;IAClCjB,OAAO,CAACW,GAAG,CAAC,OAAO,EAAEO,IAAI,CAACC,SAAS,CAACH,IAAI,CAAC,CAAC;IAC1C,OAAO;MAAEP,MAAM,EAAE,IAAI;MAAEC,OAAO,EAAE,6BAA6B;MAAEM,IAAI,EAAE;QACjEI,OAAO,EAAEJ,IAAI,CAACI,OAAO;QACrBC,IAAI,EAAEL,IAAI,aAAAf,UAAA,GAAJe,IAAI,CAAEA,IAAI,qBAAVf,UAAA,CAAYoB;MACtB;IAAE,CAAC;EAEP,CAAC,CAAC,OAAOC,KAAS,EAAE;IAChBtB,OAAO,CAACsB,KAAK,CAAC,mCAAmC,EAAEA,KAAK,CAAC;IACzD,OAAO;MAAEb,MAAM,EAAE,KAAK;MAAEC,OAAO,EAAEY,KAAK,CAACZ,OAAO,IAAI;IAA0D,CAAC;EACjH;AACJ","ignoreList":[]}
@@ -2,6 +2,7 @@ import { AzureSecretKeysEnum } from "../enums";
2
2
  import { getAzureVaultSecretByKey } from "../utils";
3
3
  export async function tokenValidation(request, context) {
4
4
  try {
5
+ var _data$data;
5
6
  const url = await getAzureVaultSecretByKey(context, process.env.AZURE_KEY_VAULT_NAME || "", AzureSecretKeysEnum.AUTH_SERVICE_AUTHENTICATION_URL);
6
7
  if (!url) {
7
8
  return {
@@ -21,7 +22,7 @@ export async function tokenValidation(request, context) {
21
22
  message: "Token validation successful",
22
23
  data: {
23
24
  cookies: data.cookies,
24
- user: data.data
25
+ user: data == null || (_data$data = data.data) == null ? void 0 : _data$data.user
25
26
  }
26
27
  };
27
28
  } catch (error) {
@@ -1 +1 @@
1
- {"version":3,"file":"token-validation.js","names":["AzureSecretKeysEnum","getAzureVaultSecretByKey","tokenValidation","request","context","url","process","env","AZURE_KEY_VAULT_NAME","AUTH_SERVICE_AUTHENTICATION_URL","status","message","log","response","fetch","method","headers","data","json","JSON","stringify","cookies","user","error"],"sources":["../../../src/middlewares/token-validation.ts"],"sourcesContent":["\nimport IUser from \"../models/user.model\";\nimport { AzureSecretKeysEnum } from \"../enums\";\nimport { getAzureVaultSecretByKey } from \"../utils\";\nimport { HttpRequest, InvocationContext } from \"@azure/functions\";\n\ninterface TokenValidationResult {\n status: boolean;\n message: string;\n data?: {\n cookies: {\n access_token: string;\n refresh_token: string;\n expires_in?: number;\n refresh_expires_in?: number;\n };\n user: IUser;\n };\n}\n\nexport async function tokenValidation(request: HttpRequest, context: InvocationContext): Promise<TokenValidationResult> {\n try {\n const url = await getAzureVaultSecretByKey(context, process.env.AZURE_KEY_VAULT_NAME || \"\", AzureSecretKeysEnum.AUTH_SERVICE_AUTHENTICATION_URL);\n if(!url) {\n return { status: false, message: \"Auth service authenticaion API url not found\" };\n }\n context.log(`Auth service authentication API url: ${url}`);\n \n const response = await fetch(url, {\n method: \"GET\",\n headers: request.headers\n });\n const data = await response.json();\n context.log(\"Data:\", JSON.stringify(data));\n return { status: true, message: \"Token validation successful\", data: {\n cookies: data.cookies,\n user: data.data\n } };\n\n } catch (error:any) {\n context.error(\"Culturefy token validation error:\", error);\n return { status: false, message: error.message || \"Internal server error during culturefy token validation\" };\n }\n}"],"mappings":"AAEA,SAASA,mBAAmB,QAAQ,UAAU;AAC9C,SAASC,wBAAwB,QAAQ,UAAU;AAiBnD,OAAO,eAAeC,eAAeA,CAACC,OAAoB,EAAEC,OAA0B,EAAkC;EACpH,IAAI;IACA,MAAMC,GAAG,GAAG,MAAMJ,wBAAwB,CAACG,OAAO,EAAEE,OAAO,CAACC,GAAG,CAACC,oBAAoB,IAAI,EAAE,EAAER,mBAAmB,CAACS,+BAA+B,CAAC;IAChJ,IAAG,CAACJ,GAAG,EAAE;MACL,OAAO;QAAEK,MAAM,EAAE,KAAK;QAAEC,OAAO,EAAE;MAA+C,CAAC;IACrF;IACAP,OAAO,CAACQ,GAAG,CAAC,wCAAwCP,GAAG,EAAE,CAAC;IAE1D,MAAMQ,QAAQ,GAAG,MAAMC,KAAK,CAACT,GAAG,EAAE;MAC9BU,MAAM,EAAE,KAAK;MACbC,OAAO,EAAEb,OAAO,CAACa;IACrB,CAAC,CAAC;IACF,MAAMC,IAAI,GAAG,MAAMJ,QAAQ,CAACK,IAAI,CAAC,CAAC;IAClCd,OAAO,CAACQ,GAAG,CAAC,OAAO,EAAEO,IAAI,CAACC,SAAS,CAACH,IAAI,CAAC,CAAC;IAC1C,OAAO;MAAEP,MAAM,EAAE,IAAI;MAAEC,OAAO,EAAE,6BAA6B;MAAEM,IAAI,EAAE;QACjEI,OAAO,EAAEJ,IAAI,CAACI,OAAO;QACrBC,IAAI,EAAEL,IAAI,CAACA;MACf;IAAE,CAAC;EAEP,CAAC,CAAC,OAAOM,KAAS,EAAE;IAChBnB,OAAO,CAACmB,KAAK,CAAC,mCAAmC,EAAEA,KAAK,CAAC;IACzD,OAAO;MAAEb,MAAM,EAAE,KAAK;MAAEC,OAAO,EAAEY,KAAK,CAACZ,OAAO,IAAI;IAA0D,CAAC;EACjH;AACJ","ignoreList":[]}
1
+ {"version":3,"file":"token-validation.js","names":["AzureSecretKeysEnum","getAzureVaultSecretByKey","tokenValidation","request","context","_data$data","url","process","env","AZURE_KEY_VAULT_NAME","AUTH_SERVICE_AUTHENTICATION_URL","status","message","log","response","fetch","method","headers","data","json","JSON","stringify","cookies","user","error"],"sources":["../../../src/middlewares/token-validation.ts"],"sourcesContent":["\nimport IUser from \"../models/user.model\";\nimport { AzureSecretKeysEnum } from \"../enums\";\nimport { getAzureVaultSecretByKey } from \"../utils\";\nimport { HttpRequest, InvocationContext } from \"@azure/functions\";\n\ninterface TokenValidationResult {\n status: boolean;\n message: string;\n data?: {\n cookies: {\n access_token: string;\n refresh_token: string;\n expires_in?: number;\n refresh_expires_in?: number;\n };\n user: IUser;\n };\n}\n\nexport async function tokenValidation(request: HttpRequest, context: InvocationContext): Promise<TokenValidationResult> {\n try {\n const url = await getAzureVaultSecretByKey(context, process.env.AZURE_KEY_VAULT_NAME || \"\", AzureSecretKeysEnum.AUTH_SERVICE_AUTHENTICATION_URL);\n if(!url) {\n return { status: false, message: \"Auth service authenticaion API url not found\" };\n }\n context.log(`Auth service authentication API url: ${url}`);\n \n const response = await fetch(url, {\n method: \"GET\",\n headers: request.headers\n });\n const data = await response.json();\n context.log(\"Data:\", JSON.stringify(data));\n return { status: true, message: \"Token validation successful\", data: {\n cookies: data.cookies,\n user: data?.data?.user\n } };\n\n } catch (error:any) {\n context.error(\"Culturefy token validation error:\", error);\n return { status: false, message: error.message || \"Internal server error during culturefy token validation\" };\n }\n}"],"mappings":"AAEA,SAASA,mBAAmB,QAAQ,UAAU;AAC9C,SAASC,wBAAwB,QAAQ,UAAU;AAiBnD,OAAO,eAAeC,eAAeA,CAACC,OAAoB,EAAEC,OAA0B,EAAkC;EACpH,IAAI;IAAA,IAAAC,UAAA;IACA,MAAMC,GAAG,GAAG,MAAML,wBAAwB,CAACG,OAAO,EAAEG,OAAO,CAACC,GAAG,CAACC,oBAAoB,IAAI,EAAE,EAAET,mBAAmB,CAACU,+BAA+B,CAAC;IAChJ,IAAG,CAACJ,GAAG,EAAE;MACL,OAAO;QAAEK,MAAM,EAAE,KAAK;QAAEC,OAAO,EAAE;MAA+C,CAAC;IACrF;IACAR,OAAO,CAACS,GAAG,CAAC,wCAAwCP,GAAG,EAAE,CAAC;IAE1D,MAAMQ,QAAQ,GAAG,MAAMC,KAAK,CAACT,GAAG,EAAE;MAC9BU,MAAM,EAAE,KAAK;MACbC,OAAO,EAAEd,OAAO,CAACc;IACrB,CAAC,CAAC;IACF,MAAMC,IAAI,GAAG,MAAMJ,QAAQ,CAACK,IAAI,CAAC,CAAC;IAClCf,OAAO,CAACS,GAAG,CAAC,OAAO,EAAEO,IAAI,CAACC,SAAS,CAACH,IAAI,CAAC,CAAC;IAC1C,OAAO;MAAEP,MAAM,EAAE,IAAI;MAAEC,OAAO,EAAE,6BAA6B;MAAEM,IAAI,EAAE;QACjEI,OAAO,EAAEJ,IAAI,CAACI,OAAO;QACrBC,IAAI,EAAEL,IAAI,aAAAb,UAAA,GAAJa,IAAI,CAAEA,IAAI,qBAAVb,UAAA,CAAYkB;MACtB;IAAE,CAAC;EAEP,CAAC,CAAC,OAAOC,KAAS,EAAE;IAChBpB,OAAO,CAACoB,KAAK,CAAC,mCAAmC,EAAEA,KAAK,CAAC;IACzD,OAAO;MAAEb,MAAM,EAAE,KAAK;MAAEC,OAAO,EAAEY,KAAK,CAACZ,OAAO,IAAI;IAA0D,CAAC;EACjH;AACJ","ignoreList":[]}
@@ -6,6 +6,7 @@ const enums_1 = require("../enums");
6
6
  const utils_1 = require("../utils");
7
7
  function tokenValidation(request, context) {
8
8
  return tslib_1.__awaiter(this, void 0, void 0, function* () {
9
+ var _a;
9
10
  try {
10
11
  const url = yield (0, utils_1.getAzureVaultSecretByKey)(context, process.env.AZURE_KEY_VAULT_NAME || "", enums_1.AzureSecretKeysEnum.AUTH_SERVICE_AUTHENTICATION_URL);
11
12
  if (!url) {
@@ -20,7 +21,7 @@ function tokenValidation(request, context) {
20
21
  context.log("Data:", JSON.stringify(data));
21
22
  return { status: true, message: "Token validation successful", data: {
22
23
  cookies: data.cookies,
23
- user: data.data
24
+ user: (_a = data === null || data === void 0 ? void 0 : data.data) === null || _a === void 0 ? void 0 : _a.user
24
25
  } };
25
26
  }
26
27
  catch (error) {
@@ -1 +1 @@
1
- {"version":3,"file":"token-validation.js","sourceRoot":"","sources":["../../../src/middlewares/token-validation.ts"],"names":[],"mappings":";;AAoBA,0CAuBC;;AAzCD,oCAA+C;AAC/C,oCAAoD;AAiBpD,SAAsB,eAAe,CAAC,OAAoB,EAAE,OAA0B;;QAClF,IAAI,CAAC;YACD,MAAM,GAAG,GAAG,MAAM,IAAA,gCAAwB,EAAC,OAAO,EAAE,OAAO,CAAC,GAAG,CAAC,oBAAoB,IAAI,EAAE,EAAE,2BAAmB,CAAC,+BAA+B,CAAC,CAAC;YACjJ,IAAG,CAAC,GAAG,EAAE,CAAC;gBACN,OAAO,EAAE,MAAM,EAAE,KAAK,EAAE,OAAO,EAAE,8CAA8C,EAAE,CAAC;YACtF,CAAC;YACD,OAAO,CAAC,GAAG,CAAC,wCAAwC,GAAG,EAAE,CAAC,CAAC;YAE3D,MAAM,QAAQ,GAAG,MAAM,KAAK,CAAC,GAAG,EAAE;gBAC9B,MAAM,EAAE,KAAK;gBACb,OAAO,EAAE,OAAO,CAAC,OAAO;aAC3B,CAAC,CAAC;YACH,MAAM,IAAI,GAAG,MAAM,QAAQ,CAAC,IAAI,EAAE,CAAC;YACnC,OAAO,CAAC,GAAG,CAAC,OAAO,EAAE,IAAI,CAAC,SAAS,CAAC,IAAI,CAAC,CAAC,CAAC;YAC3C,OAAO,EAAE,MAAM,EAAE,IAAI,EAAE,OAAO,EAAE,6BAA6B,EAAE,IAAI,EAAE;oBACjE,OAAO,EAAE,IAAI,CAAC,OAAO;oBACrB,IAAI,EAAE,IAAI,CAAC,IAAI;iBAClB,EAAE,CAAC;QAER,CAAC;QAAC,OAAO,KAAS,EAAE,CAAC;YACjB,OAAO,CAAC,KAAK,CAAC,mCAAmC,EAAE,KAAK,CAAC,CAAC;YAC1D,OAAO,EAAE,MAAM,EAAE,KAAK,EAAE,OAAO,EAAE,KAAK,CAAC,OAAO,IAAI,yDAAyD,EAAE,CAAC;QAClH,CAAC;IACL,CAAC;CAAA"}
1
+ {"version":3,"file":"token-validation.js","sourceRoot":"","sources":["../../../src/middlewares/token-validation.ts"],"names":[],"mappings":";;AAoBA,0CAuBC;;AAzCD,oCAA+C;AAC/C,oCAAoD;AAiBpD,SAAsB,eAAe,CAAC,OAAoB,EAAE,OAA0B;;;QAClF,IAAI,CAAC;YACD,MAAM,GAAG,GAAG,MAAM,IAAA,gCAAwB,EAAC,OAAO,EAAE,OAAO,CAAC,GAAG,CAAC,oBAAoB,IAAI,EAAE,EAAE,2BAAmB,CAAC,+BAA+B,CAAC,CAAC;YACjJ,IAAG,CAAC,GAAG,EAAE,CAAC;gBACN,OAAO,EAAE,MAAM,EAAE,KAAK,EAAE,OAAO,EAAE,8CAA8C,EAAE,CAAC;YACtF,CAAC;YACD,OAAO,CAAC,GAAG,CAAC,wCAAwC,GAAG,EAAE,CAAC,CAAC;YAE3D,MAAM,QAAQ,GAAG,MAAM,KAAK,CAAC,GAAG,EAAE;gBAC9B,MAAM,EAAE,KAAK;gBACb,OAAO,EAAE,OAAO,CAAC,OAAO;aAC3B,CAAC,CAAC;YACH,MAAM,IAAI,GAAG,MAAM,QAAQ,CAAC,IAAI,EAAE,CAAC;YACnC,OAAO,CAAC,GAAG,CAAC,OAAO,EAAE,IAAI,CAAC,SAAS,CAAC,IAAI,CAAC,CAAC,CAAC;YAC3C,OAAO,EAAE,MAAM,EAAE,IAAI,EAAE,OAAO,EAAE,6BAA6B,EAAE,IAAI,EAAE;oBACjE,OAAO,EAAE,IAAI,CAAC,OAAO;oBACrB,IAAI,EAAE,MAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,IAAI,0CAAE,IAAI;iBACzB,EAAE,CAAC;QAER,CAAC;QAAC,OAAO,KAAS,EAAE,CAAC;YACjB,OAAO,CAAC,KAAK,CAAC,mCAAmC,EAAE,KAAK,CAAC,CAAC;YAC1D,OAAO,EAAE,MAAM,EAAE,KAAK,EAAE,OAAO,EAAE,KAAK,CAAC,OAAO,IAAI,yDAAyD,EAAE,CAAC;QAClH,CAAC;IACL,CAAC;CAAA"}
package/package.json CHANGED
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "name": "@culturefy/shared",
3
3
  "description": "Shared utilities for culturefy serverless services",
4
- "version": "1.0.37",
4
+ "version": "1.0.38",
5
5
  "main": "build/cjs/index.js",
6
6
  "module": "build/esm/index.js",
7
7
  "types": "build/src/index.d.ts",
@@ -34,7 +34,7 @@ export async function tokenValidation(request: HttpRequest, context: InvocationC
34
34
  context.log("Data:", JSON.stringify(data));
35
35
  return { status: true, message: "Token validation successful", data: {
36
36
  cookies: data.cookies,
37
- user: data.data
37
+ user: data?.data?.user
38
38
  } };
39
39
 
40
40
  } catch (error:any) {