@culturefy/shared 1.0.41 → 1.0.42
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/build/cjs/enums/secretKeys.enum.js +4 -1
- package/build/cjs/enums/secretKeys.enum.js.map +1 -1
- package/build/cjs/middlewares/sample middleware.js +37 -0
- package/build/cjs/middlewares/sample middleware.js.map +1 -1
- package/build/esm/enums/secretKeys.enum.js +5 -0
- package/build/esm/enums/secretKeys.enum.js.map +1 -1
- package/build/esm/middlewares/sample middleware.js +36 -0
- package/build/esm/middlewares/sample middleware.js.map +1 -1
- package/build/src/enums/secretKeys.enum.d.ts +1 -0
- package/build/src/enums/secretKeys.enum.js +4 -0
- package/build/src/enums/secretKeys.enum.js.map +1 -1
- package/build/src/middlewares/sample middleware.js +27 -0
- package/build/src/middlewares/sample middleware.js.map +1 -1
- package/package.json +1 -1
- package/src/enums/secretKeys.enum.ts +5 -0
- package/src/middlewares/sample middleware.ts +42 -0
|
@@ -23,6 +23,7 @@ let AzureSecretKeysEnum = exports.AzureSecretKeysEnum = /*#__PURE__*/function (A
|
|
|
23
23
|
AzureSecretKeysEnum["DB_CONNECTING_STRING_BILLING"] = "DB-CONNECTION-STRING-BILLING";
|
|
24
24
|
AzureSecretKeysEnum["DB_CONNECTING_STRING_STAGING"] = "DB-CONNECTION-STRING-STAGING";
|
|
25
25
|
AzureSecretKeysEnum["DB_CONNECTING_STRING_BNT_DEV"] = "DB-CONNECTION-STRING-BNT-DEV";
|
|
26
|
+
AzureSecretKeysEnum["DB_CONNECTION_STRING_TENANT_BRIDGE"] = "DB-CONNECTION-STRING-TENANT-BRIDGE";
|
|
26
27
|
AzureSecretKeysEnum["SERVICE_BUS_CONNECTION_STRING"] = "servicebus-connection-string";
|
|
27
28
|
AzureSecretKeysEnum["STRIPE_CUSTOMER_SYNC_WEBHOOK_SECRET"] = "stripe-customer-sync-webhook-secret-key";
|
|
28
29
|
AzureSecretKeysEnum["STRIPE_INVOICE_SYNC_WEBHOOK_SECRET"] = "stripe-invoice-sync-webhook-secret-key";
|
|
@@ -36,5 +37,7 @@ let AzureSecretKeysEnum = exports.AzureSecretKeysEnum = /*#__PURE__*/function (A
|
|
|
36
37
|
AzureSecretKeysEnum["BASE_DB_CLUSTER_CONNECTING_STRING_CHAT"] = "BASE-DB-CLUSTER-CONNECTING-STRING-CHAT";
|
|
37
38
|
AzureSecretKeysEnum["AUTH_SERVICE_AUTHENTICATION_URL"] = "AUTH-SERVICE-AUTHENTICATION-URL";
|
|
38
39
|
return AzureSecretKeysEnum;
|
|
39
|
-
}({});
|
|
40
|
+
}({}); // AUTH-SERVICE-AUTHENTICATION-URL
|
|
41
|
+
// https://culturefy-auth-staging.azurewebsites.net/api/verify
|
|
42
|
+
// REFRESH-SESSION-URL
|
|
40
43
|
//# sourceMappingURL=secretKeys.enum.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"secretKeys.enum.js","names":["AzureSecretKeysEnum","exports"],"sources":["../../../src/enums/secretKeys.enum.ts"],"sourcesContent":["// Enum for secret keys\nexport enum AzureSecretKeysEnum {\n KEYCLOAK_ADMIN_CLIENT_SECRET = \"KEYCLOAK-ADMIN-CLIENT-SECRET\",\n KEYCLOAK_ADMIN_CLIENT_ID = \"KEYCLOAK-ADMIN-CLIENT-ID\",\n KEYCLOAK_BASE_URL = \"KEYCLOAK-BASE-URL\",\n STRIPE_PAYMENT_WEBHOOK_SECRET_KEY = \"Stripe-payment-webhook-secret-key\", // in-use\n STRIPE_PRODUCT_WEBHOOK_SECRET = \"Stripe-product-webhook-secret-key\", // in-use\n STRIPE_PRICE_WEBHOOK_SECRET = \"Stripe-price-webhook-secret-key\", // in-use\n EMAIL_SERVICE_URL = \"Email-Service-Url\", // in-use,\n DB_CONNECTING_STRING_AUTH = \"DB-CONNECTION-STRING-AUTH\",\n DB_CONNECTING_STRING_USER = \"DB-CONNECTION-STRING-USER\",\n DB_CONNECTING_STRING_TENANT_BRIDGE = \"DB-Connecting-String-Tenant-Bridge\",\n DB_CONNECTING_STRING_PAYMENT = \"DB-CONNECTION-STRING-PAYMENT\",\n DB_CONNECTING_STRING_CORE = \"DB-CONNECTION-STRING-CORE\",\n DB_CONNECTING_STRING_BILLING = \"DB-CONNECTION-STRING-BILLING\",\n DB_CONNECTING_STRING_STAGING = \"DB-CONNECTION-STRING-STAGING\",\n DB_CONNECTING_STRING_BNT_DEV = \"DB-CONNECTION-STRING-BNT-DEV\",\n SERVICE_BUS_CONNECTION_STRING = \"servicebus-connection-string\",\n STRIPE_CUSTOMER_SYNC_WEBHOOK_SECRET = \"stripe-customer-sync-webhook-secret-key\",\n STRIPE_INVOICE_SYNC_WEBHOOK_SECRET = \"stripe-invoice-sync-webhook-secret-key\",\n STRIPE_PRODUCT_SYNC_WEBHOOK_SECRET = \"stripe-product-sync-webhook-secret-key\",\n STRIPE_SECRET_KEY = \"Stripe-secret-key\",\n STRIPE_WEBHOOK_CUSTOMER_CREATED_SECRET_KEY = \"Stripe-Webhook-Customer-Created-Secret-Key\",\n STRIPE_SUBSCRIPTION_SYNC_WEBHOOK_SECRET = \"stripe-subscription-sync-webhook-secret-key\",\n FIREBASE_SERVICE_ACCOUNTS_VARIABLE = \"firebase_service_accounts_variable\",\n HMS_ACCESS_KEY=\"MEETING-HMS-ACCESS-KEY-APP-SECRET\",\n MEETING_ROOM_APP_SECRET=\"MEETING-ROOM-APP-SECRET\",\n BASE_DB_CLUSTER_CONNECTING_STRING_CHAT = \"BASE-DB-CLUSTER-CONNECTING-STRING-CHAT\",\n AUTH_SERVICE_AUTHENTICATION_URL = \"AUTH-SERVICE-AUTHENTICATION-URL\",\n}\n"],"mappings":";;;;AAAA;AAAA,IACYA,mBAAmB,GAAAC,OAAA,CAAAD,mBAAA,0BAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAI4C;EAJ/DA,mBAAmB;EAKwC;EAL3DA,mBAAmB;EAMoC;EANvDA,mBAAmB;EAOY;EAP/BA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAA,OAAnBA,mBAAmB;AAAA","ignoreList":[]}
|
|
1
|
+
{"version":3,"file":"secretKeys.enum.js","names":["AzureSecretKeysEnum","exports"],"sources":["../../../src/enums/secretKeys.enum.ts"],"sourcesContent":["// Enum for secret keys\nexport enum AzureSecretKeysEnum {\n KEYCLOAK_ADMIN_CLIENT_SECRET = \"KEYCLOAK-ADMIN-CLIENT-SECRET\",\n KEYCLOAK_ADMIN_CLIENT_ID = \"KEYCLOAK-ADMIN-CLIENT-ID\",\n KEYCLOAK_BASE_URL = \"KEYCLOAK-BASE-URL\",\n STRIPE_PAYMENT_WEBHOOK_SECRET_KEY = \"Stripe-payment-webhook-secret-key\", // in-use\n STRIPE_PRODUCT_WEBHOOK_SECRET = \"Stripe-product-webhook-secret-key\", // in-use\n STRIPE_PRICE_WEBHOOK_SECRET = \"Stripe-price-webhook-secret-key\", // in-use\n EMAIL_SERVICE_URL = \"Email-Service-Url\", // in-use,\n DB_CONNECTING_STRING_AUTH = \"DB-CONNECTION-STRING-AUTH\",\n DB_CONNECTING_STRING_USER = \"DB-CONNECTION-STRING-USER\",\n DB_CONNECTING_STRING_TENANT_BRIDGE = \"DB-Connecting-String-Tenant-Bridge\",\n DB_CONNECTING_STRING_PAYMENT = \"DB-CONNECTION-STRING-PAYMENT\",\n DB_CONNECTING_STRING_CORE = \"DB-CONNECTION-STRING-CORE\",\n DB_CONNECTING_STRING_BILLING = \"DB-CONNECTION-STRING-BILLING\",\n DB_CONNECTING_STRING_STAGING = \"DB-CONNECTION-STRING-STAGING\",\n DB_CONNECTING_STRING_BNT_DEV = \"DB-CONNECTION-STRING-BNT-DEV\",\n DB_CONNECTION_STRING_TENANT_BRIDGE = \"DB-CONNECTION-STRING-TENANT-BRIDGE\",\n SERVICE_BUS_CONNECTION_STRING = \"servicebus-connection-string\",\n STRIPE_CUSTOMER_SYNC_WEBHOOK_SECRET = \"stripe-customer-sync-webhook-secret-key\",\n STRIPE_INVOICE_SYNC_WEBHOOK_SECRET = \"stripe-invoice-sync-webhook-secret-key\",\n STRIPE_PRODUCT_SYNC_WEBHOOK_SECRET = \"stripe-product-sync-webhook-secret-key\",\n STRIPE_SECRET_KEY = \"Stripe-secret-key\",\n STRIPE_WEBHOOK_CUSTOMER_CREATED_SECRET_KEY = \"Stripe-Webhook-Customer-Created-Secret-Key\",\n STRIPE_SUBSCRIPTION_SYNC_WEBHOOK_SECRET = \"stripe-subscription-sync-webhook-secret-key\",\n FIREBASE_SERVICE_ACCOUNTS_VARIABLE = \"firebase_service_accounts_variable\",\n HMS_ACCESS_KEY=\"MEETING-HMS-ACCESS-KEY-APP-SECRET\",\n MEETING_ROOM_APP_SECRET=\"MEETING-ROOM-APP-SECRET\",\n BASE_DB_CLUSTER_CONNECTING_STRING_CHAT = \"BASE-DB-CLUSTER-CONNECTING-STRING-CHAT\",\n AUTH_SERVICE_AUTHENTICATION_URL = \"AUTH-SERVICE-AUTHENTICATION-URL\",\n}\n// AUTH-SERVICE-AUTHENTICATION-URL\n// https://culturefy-auth-staging.azurewebsites.net/api/verify\n\n// REFRESH-SESSION-URL"],"mappings":";;;;AAAA;AAAA,IACYA,mBAAmB,GAAAC,OAAA,CAAAD,mBAAA,0BAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAI4C;EAJ/DA,mBAAmB;EAKwC;EAL3DA,mBAAmB;EAMoC;EANvDA,mBAAmB;EAOY;EAP/BA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAA,OAAnBA,mBAAmB;AAAA,OA8B/B;AACA;AAEA","ignoreList":[]}
|
|
@@ -1,2 +1,39 @@
|
|
|
1
|
+
|
|
2
|
+
// export const loggerMw: IMiddleware = async (
|
|
3
|
+
// req: HttpRequest,
|
|
4
|
+
// ctx: InvocationContext,
|
|
5
|
+
// next: () => Promise<HttpResponseInit>
|
|
6
|
+
// ): Promise<HttpResponseInit> => {
|
|
7
|
+
// // ctx.info?.(`loggerMw → ${req.method} ${req.url}`);
|
|
8
|
+
|
|
9
|
+
// ctx.state ??= {};
|
|
10
|
+
// ctx.state.userId = 5
|
|
11
|
+
|
|
12
|
+
// setCookieKV(ctx, "__Secure-yahoo", "none");
|
|
13
|
+
// setCookieKV(ctx, "__Secure-bro", "ne");
|
|
14
|
+
|
|
15
|
+
// const res = await next();
|
|
16
|
+
// // ctx.info?.(`loggerMw ← ${res.status ?? 200}`);
|
|
17
|
+
// return res;
|
|
18
|
+
// };
|
|
19
|
+
|
|
20
|
+
// export const loggerMw2: IMiddleware = async (
|
|
21
|
+
// req: HttpRequest,
|
|
22
|
+
// ctx: InvocationContext,
|
|
23
|
+
// next: () => Promise<HttpResponseInit>
|
|
24
|
+
// ): Promise<HttpResponseInit> => {
|
|
25
|
+
|
|
26
|
+
// ctx.info('666666666666666666666666666666666666')
|
|
27
|
+
|
|
28
|
+
// ctx.info(ctx.state.userId, "yahoooooooooooooooooooooooooooooooo")
|
|
29
|
+
|
|
30
|
+
// setCookieKV(ctx, "__Secure-bro", "ne");
|
|
31
|
+
|
|
32
|
+
// setCookieKV(ctx, "__Secure-userId", "5");
|
|
33
|
+
|
|
34
|
+
// const res = await next();
|
|
35
|
+
// ctx.info?.(`loggerMw2 ← ${res.status ?? 200}`);
|
|
36
|
+
// return res;
|
|
37
|
+
// };
|
|
1
38
|
"use strict";
|
|
2
39
|
//# sourceMappingURL=sample middleware.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"sample middleware.js","names":[],"sources":["../../../src/middlewares/sample middleware.ts"],"sourcesContent":[""],"mappings":"","ignoreList":[]}
|
|
1
|
+
{"version":3,"file":"sample middleware.js","names":[],"sources":["../../../src/middlewares/sample middleware.ts"],"sourcesContent":["\n// export const loggerMw: IMiddleware = async (\n// req: HttpRequest,\n// ctx: InvocationContext,\n// next: () => Promise<HttpResponseInit>\n// ): Promise<HttpResponseInit> => {\n// // ctx.info?.(`loggerMw → ${req.method} ${req.url}`);\n\n// ctx.state ??= {};\n// ctx.state.userId = 5\n\n// setCookieKV(ctx, \"__Secure-yahoo\", \"none\");\n// setCookieKV(ctx, \"__Secure-bro\", \"ne\");\n\n// const res = await next();\n// // ctx.info?.(`loggerMw ← ${res.status ?? 200}`);\n// return res;\n// };\n\n\n\n// export const loggerMw2: IMiddleware = async (\n// req: HttpRequest,\n// ctx: InvocationContext,\n// next: () => Promise<HttpResponseInit>\n// ): Promise<HttpResponseInit> => {\n\n// ctx.info('666666666666666666666666666666666666')\n\n// ctx.info(ctx.state.userId, \"yahoooooooooooooooooooooooooooooooo\")\n\n// setCookieKV(ctx, \"__Secure-bro\", \"ne\");\n\n\n// setCookieKV(ctx, \"__Secure-userId\", \"5\");\n\n\n\n// const res = await next();\n// ctx.info?.(`loggerMw2 ← ${res.status ?? 200}`);\n// return res;\n// };\n"],"mappings":";AACA;AACA;AACA;AACA;AACA;AACA;;AAEA;AACA;;AAEA;AACA;;AAEA;AACA;AACA;AACA;;AAIA;AACA;AACA;AACA;AACA;;AAEA;;AAEA;;AAEA;;AAGA;;AAIA;AACA;AACA;AACA;AAAA","ignoreList":[]}
|
|
@@ -19,6 +19,7 @@ export let AzureSecretKeysEnum = /*#__PURE__*/function (AzureSecretKeysEnum) {
|
|
|
19
19
|
AzureSecretKeysEnum["DB_CONNECTING_STRING_BILLING"] = "DB-CONNECTION-STRING-BILLING";
|
|
20
20
|
AzureSecretKeysEnum["DB_CONNECTING_STRING_STAGING"] = "DB-CONNECTION-STRING-STAGING";
|
|
21
21
|
AzureSecretKeysEnum["DB_CONNECTING_STRING_BNT_DEV"] = "DB-CONNECTION-STRING-BNT-DEV";
|
|
22
|
+
AzureSecretKeysEnum["DB_CONNECTION_STRING_TENANT_BRIDGE"] = "DB-CONNECTION-STRING-TENANT-BRIDGE";
|
|
22
23
|
AzureSecretKeysEnum["SERVICE_BUS_CONNECTION_STRING"] = "servicebus-connection-string";
|
|
23
24
|
AzureSecretKeysEnum["STRIPE_CUSTOMER_SYNC_WEBHOOK_SECRET"] = "stripe-customer-sync-webhook-secret-key";
|
|
24
25
|
AzureSecretKeysEnum["STRIPE_INVOICE_SYNC_WEBHOOK_SECRET"] = "stripe-invoice-sync-webhook-secret-key";
|
|
@@ -33,4 +34,8 @@ export let AzureSecretKeysEnum = /*#__PURE__*/function (AzureSecretKeysEnum) {
|
|
|
33
34
|
AzureSecretKeysEnum["AUTH_SERVICE_AUTHENTICATION_URL"] = "AUTH-SERVICE-AUTHENTICATION-URL";
|
|
34
35
|
return AzureSecretKeysEnum;
|
|
35
36
|
}({});
|
|
37
|
+
// AUTH-SERVICE-AUTHENTICATION-URL
|
|
38
|
+
// https://culturefy-auth-staging.azurewebsites.net/api/verify
|
|
39
|
+
|
|
40
|
+
// REFRESH-SESSION-URL
|
|
36
41
|
//# sourceMappingURL=secretKeys.enum.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"secretKeys.enum.js","names":["AzureSecretKeysEnum"],"sources":["../../../src/enums/secretKeys.enum.ts"],"sourcesContent":["// Enum for secret keys\nexport enum AzureSecretKeysEnum {\n KEYCLOAK_ADMIN_CLIENT_SECRET = \"KEYCLOAK-ADMIN-CLIENT-SECRET\",\n KEYCLOAK_ADMIN_CLIENT_ID = \"KEYCLOAK-ADMIN-CLIENT-ID\",\n KEYCLOAK_BASE_URL = \"KEYCLOAK-BASE-URL\",\n STRIPE_PAYMENT_WEBHOOK_SECRET_KEY = \"Stripe-payment-webhook-secret-key\", // in-use\n STRIPE_PRODUCT_WEBHOOK_SECRET = \"Stripe-product-webhook-secret-key\", // in-use\n STRIPE_PRICE_WEBHOOK_SECRET = \"Stripe-price-webhook-secret-key\", // in-use\n EMAIL_SERVICE_URL = \"Email-Service-Url\", // in-use,\n DB_CONNECTING_STRING_AUTH = \"DB-CONNECTION-STRING-AUTH\",\n DB_CONNECTING_STRING_USER = \"DB-CONNECTION-STRING-USER\",\n DB_CONNECTING_STRING_TENANT_BRIDGE = \"DB-Connecting-String-Tenant-Bridge\",\n DB_CONNECTING_STRING_PAYMENT = \"DB-CONNECTION-STRING-PAYMENT\",\n DB_CONNECTING_STRING_CORE = \"DB-CONNECTION-STRING-CORE\",\n DB_CONNECTING_STRING_BILLING = \"DB-CONNECTION-STRING-BILLING\",\n DB_CONNECTING_STRING_STAGING = \"DB-CONNECTION-STRING-STAGING\",\n DB_CONNECTING_STRING_BNT_DEV = \"DB-CONNECTION-STRING-BNT-DEV\",\n SERVICE_BUS_CONNECTION_STRING = \"servicebus-connection-string\",\n STRIPE_CUSTOMER_SYNC_WEBHOOK_SECRET = \"stripe-customer-sync-webhook-secret-key\",\n STRIPE_INVOICE_SYNC_WEBHOOK_SECRET = \"stripe-invoice-sync-webhook-secret-key\",\n STRIPE_PRODUCT_SYNC_WEBHOOK_SECRET = \"stripe-product-sync-webhook-secret-key\",\n STRIPE_SECRET_KEY = \"Stripe-secret-key\",\n STRIPE_WEBHOOK_CUSTOMER_CREATED_SECRET_KEY = \"Stripe-Webhook-Customer-Created-Secret-Key\",\n STRIPE_SUBSCRIPTION_SYNC_WEBHOOK_SECRET = \"stripe-subscription-sync-webhook-secret-key\",\n FIREBASE_SERVICE_ACCOUNTS_VARIABLE = \"firebase_service_accounts_variable\",\n HMS_ACCESS_KEY=\"MEETING-HMS-ACCESS-KEY-APP-SECRET\",\n MEETING_ROOM_APP_SECRET=\"MEETING-ROOM-APP-SECRET\",\n BASE_DB_CLUSTER_CONNECTING_STRING_CHAT = \"BASE-DB-CLUSTER-CONNECTING-STRING-CHAT\",\n AUTH_SERVICE_AUTHENTICATION_URL = \"AUTH-SERVICE-AUTHENTICATION-URL\",\n}\n"],"mappings":"AAAA;AACA,WAAYA,mBAAmB,0BAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAI4C;EAJ/DA,mBAAmB;EAKwC;EAL3DA,mBAAmB;EAMoC;EANvDA,mBAAmB;EAOY;EAP/BA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAA,OAAnBA,mBAAmB;AAAA","ignoreList":[]}
|
|
1
|
+
{"version":3,"file":"secretKeys.enum.js","names":["AzureSecretKeysEnum"],"sources":["../../../src/enums/secretKeys.enum.ts"],"sourcesContent":["// Enum for secret keys\nexport enum AzureSecretKeysEnum {\n KEYCLOAK_ADMIN_CLIENT_SECRET = \"KEYCLOAK-ADMIN-CLIENT-SECRET\",\n KEYCLOAK_ADMIN_CLIENT_ID = \"KEYCLOAK-ADMIN-CLIENT-ID\",\n KEYCLOAK_BASE_URL = \"KEYCLOAK-BASE-URL\",\n STRIPE_PAYMENT_WEBHOOK_SECRET_KEY = \"Stripe-payment-webhook-secret-key\", // in-use\n STRIPE_PRODUCT_WEBHOOK_SECRET = \"Stripe-product-webhook-secret-key\", // in-use\n STRIPE_PRICE_WEBHOOK_SECRET = \"Stripe-price-webhook-secret-key\", // in-use\n EMAIL_SERVICE_URL = \"Email-Service-Url\", // in-use,\n DB_CONNECTING_STRING_AUTH = \"DB-CONNECTION-STRING-AUTH\",\n DB_CONNECTING_STRING_USER = \"DB-CONNECTION-STRING-USER\",\n DB_CONNECTING_STRING_TENANT_BRIDGE = \"DB-Connecting-String-Tenant-Bridge\",\n DB_CONNECTING_STRING_PAYMENT = \"DB-CONNECTION-STRING-PAYMENT\",\n DB_CONNECTING_STRING_CORE = \"DB-CONNECTION-STRING-CORE\",\n DB_CONNECTING_STRING_BILLING = \"DB-CONNECTION-STRING-BILLING\",\n DB_CONNECTING_STRING_STAGING = \"DB-CONNECTION-STRING-STAGING\",\n DB_CONNECTING_STRING_BNT_DEV = \"DB-CONNECTION-STRING-BNT-DEV\",\n DB_CONNECTION_STRING_TENANT_BRIDGE = \"DB-CONNECTION-STRING-TENANT-BRIDGE\",\n SERVICE_BUS_CONNECTION_STRING = \"servicebus-connection-string\",\n STRIPE_CUSTOMER_SYNC_WEBHOOK_SECRET = \"stripe-customer-sync-webhook-secret-key\",\n STRIPE_INVOICE_SYNC_WEBHOOK_SECRET = \"stripe-invoice-sync-webhook-secret-key\",\n STRIPE_PRODUCT_SYNC_WEBHOOK_SECRET = \"stripe-product-sync-webhook-secret-key\",\n STRIPE_SECRET_KEY = \"Stripe-secret-key\",\n STRIPE_WEBHOOK_CUSTOMER_CREATED_SECRET_KEY = \"Stripe-Webhook-Customer-Created-Secret-Key\",\n STRIPE_SUBSCRIPTION_SYNC_WEBHOOK_SECRET = \"stripe-subscription-sync-webhook-secret-key\",\n FIREBASE_SERVICE_ACCOUNTS_VARIABLE = \"firebase_service_accounts_variable\",\n HMS_ACCESS_KEY=\"MEETING-HMS-ACCESS-KEY-APP-SECRET\",\n MEETING_ROOM_APP_SECRET=\"MEETING-ROOM-APP-SECRET\",\n BASE_DB_CLUSTER_CONNECTING_STRING_CHAT = \"BASE-DB-CLUSTER-CONNECTING-STRING-CHAT\",\n AUTH_SERVICE_AUTHENTICATION_URL = \"AUTH-SERVICE-AUTHENTICATION-URL\",\n}\n// AUTH-SERVICE-AUTHENTICATION-URL\n// https://culturefy-auth-staging.azurewebsites.net/api/verify\n\n// REFRESH-SESSION-URL"],"mappings":"AAAA;AACA,WAAYA,mBAAmB,0BAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAI4C;EAJ/DA,mBAAmB;EAKwC;EAL3DA,mBAAmB;EAMoC;EANvDA,mBAAmB;EAOY;EAP/BA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAnBA,mBAAmB;EAAA,OAAnBA,mBAAmB;AAAA;AA8B/B;AACA;;AAEA","ignoreList":[]}
|
|
@@ -1,2 +1,38 @@
|
|
|
1
1
|
|
|
2
|
+
// export const loggerMw: IMiddleware = async (
|
|
3
|
+
// req: HttpRequest,
|
|
4
|
+
// ctx: InvocationContext,
|
|
5
|
+
// next: () => Promise<HttpResponseInit>
|
|
6
|
+
// ): Promise<HttpResponseInit> => {
|
|
7
|
+
// // ctx.info?.(`loggerMw → ${req.method} ${req.url}`);
|
|
8
|
+
|
|
9
|
+
// ctx.state ??= {};
|
|
10
|
+
// ctx.state.userId = 5
|
|
11
|
+
|
|
12
|
+
// setCookieKV(ctx, "__Secure-yahoo", "none");
|
|
13
|
+
// setCookieKV(ctx, "__Secure-bro", "ne");
|
|
14
|
+
|
|
15
|
+
// const res = await next();
|
|
16
|
+
// // ctx.info?.(`loggerMw ← ${res.status ?? 200}`);
|
|
17
|
+
// return res;
|
|
18
|
+
// };
|
|
19
|
+
|
|
20
|
+
// export const loggerMw2: IMiddleware = async (
|
|
21
|
+
// req: HttpRequest,
|
|
22
|
+
// ctx: InvocationContext,
|
|
23
|
+
// next: () => Promise<HttpResponseInit>
|
|
24
|
+
// ): Promise<HttpResponseInit> => {
|
|
25
|
+
|
|
26
|
+
// ctx.info('666666666666666666666666666666666666')
|
|
27
|
+
|
|
28
|
+
// ctx.info(ctx.state.userId, "yahoooooooooooooooooooooooooooooooo")
|
|
29
|
+
|
|
30
|
+
// setCookieKV(ctx, "__Secure-bro", "ne");
|
|
31
|
+
|
|
32
|
+
// setCookieKV(ctx, "__Secure-userId", "5");
|
|
33
|
+
|
|
34
|
+
// const res = await next();
|
|
35
|
+
// ctx.info?.(`loggerMw2 ← ${res.status ?? 200}`);
|
|
36
|
+
// return res;
|
|
37
|
+
// };
|
|
2
38
|
//# sourceMappingURL=sample middleware.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"sample middleware.js","names":[],"sources":["../../../src/middlewares/sample middleware.ts"],"sourcesContent":[""],"mappings":"","ignoreList":[]}
|
|
1
|
+
{"version":3,"file":"sample middleware.js","names":[],"sources":["../../../src/middlewares/sample middleware.ts"],"sourcesContent":["\n// export const loggerMw: IMiddleware = async (\n// req: HttpRequest,\n// ctx: InvocationContext,\n// next: () => Promise<HttpResponseInit>\n// ): Promise<HttpResponseInit> => {\n// // ctx.info?.(`loggerMw → ${req.method} ${req.url}`);\n\n// ctx.state ??= {};\n// ctx.state.userId = 5\n\n// setCookieKV(ctx, \"__Secure-yahoo\", \"none\");\n// setCookieKV(ctx, \"__Secure-bro\", \"ne\");\n\n// const res = await next();\n// // ctx.info?.(`loggerMw ← ${res.status ?? 200}`);\n// return res;\n// };\n\n\n\n// export const loggerMw2: IMiddleware = async (\n// req: HttpRequest,\n// ctx: InvocationContext,\n// next: () => Promise<HttpResponseInit>\n// ): Promise<HttpResponseInit> => {\n\n// ctx.info('666666666666666666666666666666666666')\n\n// ctx.info(ctx.state.userId, \"yahoooooooooooooooooooooooooooooooo\")\n\n// setCookieKV(ctx, \"__Secure-bro\", \"ne\");\n\n\n// setCookieKV(ctx, \"__Secure-userId\", \"5\");\n\n\n\n// const res = await next();\n// ctx.info?.(`loggerMw2 ← ${res.status ?? 200}`);\n// return res;\n// };\n"],"mappings":";AACA;AACA;AACA;AACA;AACA;AACA;;AAEA;AACA;;AAEA;AACA;;AAEA;AACA;AACA;AACA;;AAIA;AACA;AACA;AACA;AACA;;AAEA;;AAEA;;AAEA;;AAGA;;AAIA;AACA;AACA;AACA","ignoreList":[]}
|
|
@@ -14,6 +14,7 @@ export declare enum AzureSecretKeysEnum {
|
|
|
14
14
|
DB_CONNECTING_STRING_BILLING = "DB-CONNECTION-STRING-BILLING",
|
|
15
15
|
DB_CONNECTING_STRING_STAGING = "DB-CONNECTION-STRING-STAGING",
|
|
16
16
|
DB_CONNECTING_STRING_BNT_DEV = "DB-CONNECTION-STRING-BNT-DEV",
|
|
17
|
+
DB_CONNECTION_STRING_TENANT_BRIDGE = "DB-CONNECTION-STRING-TENANT-BRIDGE",
|
|
17
18
|
SERVICE_BUS_CONNECTION_STRING = "servicebus-connection-string",
|
|
18
19
|
STRIPE_CUSTOMER_SYNC_WEBHOOK_SECRET = "stripe-customer-sync-webhook-secret-key",
|
|
19
20
|
STRIPE_INVOICE_SYNC_WEBHOOK_SECRET = "stripe-invoice-sync-webhook-secret-key",
|
|
@@ -19,6 +19,7 @@ var AzureSecretKeysEnum;
|
|
|
19
19
|
AzureSecretKeysEnum["DB_CONNECTING_STRING_BILLING"] = "DB-CONNECTION-STRING-BILLING";
|
|
20
20
|
AzureSecretKeysEnum["DB_CONNECTING_STRING_STAGING"] = "DB-CONNECTION-STRING-STAGING";
|
|
21
21
|
AzureSecretKeysEnum["DB_CONNECTING_STRING_BNT_DEV"] = "DB-CONNECTION-STRING-BNT-DEV";
|
|
22
|
+
AzureSecretKeysEnum["DB_CONNECTION_STRING_TENANT_BRIDGE"] = "DB-CONNECTION-STRING-TENANT-BRIDGE";
|
|
22
23
|
AzureSecretKeysEnum["SERVICE_BUS_CONNECTION_STRING"] = "servicebus-connection-string";
|
|
23
24
|
AzureSecretKeysEnum["STRIPE_CUSTOMER_SYNC_WEBHOOK_SECRET"] = "stripe-customer-sync-webhook-secret-key";
|
|
24
25
|
AzureSecretKeysEnum["STRIPE_INVOICE_SYNC_WEBHOOK_SECRET"] = "stripe-invoice-sync-webhook-secret-key";
|
|
@@ -32,4 +33,7 @@ var AzureSecretKeysEnum;
|
|
|
32
33
|
AzureSecretKeysEnum["BASE_DB_CLUSTER_CONNECTING_STRING_CHAT"] = "BASE-DB-CLUSTER-CONNECTING-STRING-CHAT";
|
|
33
34
|
AzureSecretKeysEnum["AUTH_SERVICE_AUTHENTICATION_URL"] = "AUTH-SERVICE-AUTHENTICATION-URL";
|
|
34
35
|
})(AzureSecretKeysEnum || (exports.AzureSecretKeysEnum = AzureSecretKeysEnum = {}));
|
|
36
|
+
// AUTH-SERVICE-AUTHENTICATION-URL
|
|
37
|
+
// https://culturefy-auth-staging.azurewebsites.net/api/verify
|
|
38
|
+
// REFRESH-SESSION-URL
|
|
35
39
|
//# sourceMappingURL=secretKeys.enum.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"secretKeys.enum.js","sourceRoot":"","sources":["../../../src/enums/secretKeys.enum.ts"],"names":[],"mappings":";;;AAAA,uBAAuB;AACvB,IAAY,
|
|
1
|
+
{"version":3,"file":"secretKeys.enum.js","sourceRoot":"","sources":["../../../src/enums/secretKeys.enum.ts"],"names":[],"mappings":";;;AAAA,uBAAuB;AACvB,IAAY,mBA6BX;AA7BD,WAAY,mBAAmB;IAC7B,oFAA6D,CAAA;IAC7D,4EAAqD,CAAA;IACrD,8DAAuC,CAAA;IACvC,8FAAuE,CAAA;IACvE,0FAAmE,CAAA;IACnE,sFAA+D,CAAA;IAC/D,8DAAuC,CAAA;IACvC,8EAAuD,CAAA;IACvD,8EAAuD,CAAA;IACvD,gGAAyE,CAAA;IACzE,oFAA6D,CAAA;IAC7D,8EAAuD,CAAA;IACvD,oFAA6D,CAAA;IAC7D,oFAA8D,CAAA;IAC9D,oFAA6D,CAAA;IAC7D,gGAAyE,CAAA;IACzE,qFAA8D,CAAA;IAC9D,sGAA+E,CAAA;IAC/E,oGAA6E,CAAA;IAC7E,oGAA6E,CAAA;IAC7E,8DAAuC,CAAA;IACvC,gHAAyF,CAAA;IACzF,8GAAuF,CAAA;IACvF,gGAAyE,CAAA;IACzE,2EAAkD,CAAA;IAClD,0EAAiD,CAAA;IACjD,wGAAiF,CAAA;IACjF,0FAAmE,CAAA;AACrE,CAAC,EA7BW,mBAAmB,mCAAnB,mBAAmB,QA6B9B;AACD,kCAAkC;AAClC,8DAA8D;AAE9D,sBAAsB"}
|
|
@@ -1,2 +1,29 @@
|
|
|
1
1
|
"use strict";
|
|
2
|
+
// export const loggerMw: IMiddleware = async (
|
|
3
|
+
// req: HttpRequest,
|
|
4
|
+
// ctx: InvocationContext,
|
|
5
|
+
// next: () => Promise<HttpResponseInit>
|
|
6
|
+
// ): Promise<HttpResponseInit> => {
|
|
7
|
+
// // ctx.info?.(`loggerMw → ${req.method} ${req.url}`);
|
|
8
|
+
// ctx.state ??= {};
|
|
9
|
+
// ctx.state.userId = 5
|
|
10
|
+
// setCookieKV(ctx, "__Secure-yahoo", "none");
|
|
11
|
+
// setCookieKV(ctx, "__Secure-bro", "ne");
|
|
12
|
+
// const res = await next();
|
|
13
|
+
// // ctx.info?.(`loggerMw ← ${res.status ?? 200}`);
|
|
14
|
+
// return res;
|
|
15
|
+
// };
|
|
16
|
+
// export const loggerMw2: IMiddleware = async (
|
|
17
|
+
// req: HttpRequest,
|
|
18
|
+
// ctx: InvocationContext,
|
|
19
|
+
// next: () => Promise<HttpResponseInit>
|
|
20
|
+
// ): Promise<HttpResponseInit> => {
|
|
21
|
+
// ctx.info('666666666666666666666666666666666666')
|
|
22
|
+
// ctx.info(ctx.state.userId, "yahoooooooooooooooooooooooooooooooo")
|
|
23
|
+
// setCookieKV(ctx, "__Secure-bro", "ne");
|
|
24
|
+
// setCookieKV(ctx, "__Secure-userId", "5");
|
|
25
|
+
// const res = await next();
|
|
26
|
+
// ctx.info?.(`loggerMw2 ← ${res.status ?? 200}`);
|
|
27
|
+
// return res;
|
|
28
|
+
// };
|
|
2
29
|
//# sourceMappingURL=sample%20middleware.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"sample middleware.js","sourceRoot":"","sources":["../../../src/middlewares/sample middleware.ts"],"names":[],"mappings":""}
|
|
1
|
+
{"version":3,"file":"sample middleware.js","sourceRoot":"","sources":["../../../src/middlewares/sample middleware.ts"],"names":[],"mappings":";AACA,+CAA+C;AAC/C,sBAAsB;AACtB,4BAA4B;AAC5B,0CAA0C;AAC1C,oCAAoC;AACpC,4DAA4D;AAE5D,sBAAsB;AACtB,yBAAyB;AAEzB,gDAAgD;AAChD,4CAA4C;AAE5C,8BAA8B;AAC9B,wDAAwD;AACxD,gBAAgB;AAChB,KAAK;AAIL,gDAAgD;AAChD,sBAAsB;AACtB,4BAA4B;AAC5B,0CAA0C;AAC1C,oCAAoC;AAEpC,qDAAqD;AAErD,sEAAsE;AAEtE,4CAA4C;AAG5C,8CAA8C;AAI9C,8BAA8B;AAC9B,oDAAoD;AACpD,gBAAgB;AAChB,KAAK"}
|
package/package.json
CHANGED
|
@@ -15,6 +15,7 @@ export enum AzureSecretKeysEnum {
|
|
|
15
15
|
DB_CONNECTING_STRING_BILLING = "DB-CONNECTION-STRING-BILLING",
|
|
16
16
|
DB_CONNECTING_STRING_STAGING = "DB-CONNECTION-STRING-STAGING",
|
|
17
17
|
DB_CONNECTING_STRING_BNT_DEV = "DB-CONNECTION-STRING-BNT-DEV",
|
|
18
|
+
DB_CONNECTION_STRING_TENANT_BRIDGE = "DB-CONNECTION-STRING-TENANT-BRIDGE",
|
|
18
19
|
SERVICE_BUS_CONNECTION_STRING = "servicebus-connection-string",
|
|
19
20
|
STRIPE_CUSTOMER_SYNC_WEBHOOK_SECRET = "stripe-customer-sync-webhook-secret-key",
|
|
20
21
|
STRIPE_INVOICE_SYNC_WEBHOOK_SECRET = "stripe-invoice-sync-webhook-secret-key",
|
|
@@ -28,3 +29,7 @@ export enum AzureSecretKeysEnum {
|
|
|
28
29
|
BASE_DB_CLUSTER_CONNECTING_STRING_CHAT = "BASE-DB-CLUSTER-CONNECTING-STRING-CHAT",
|
|
29
30
|
AUTH_SERVICE_AUTHENTICATION_URL = "AUTH-SERVICE-AUTHENTICATION-URL",
|
|
30
31
|
}
|
|
32
|
+
// AUTH-SERVICE-AUTHENTICATION-URL
|
|
33
|
+
// https://culturefy-auth-staging.azurewebsites.net/api/verify
|
|
34
|
+
|
|
35
|
+
// REFRESH-SESSION-URL
|
|
@@ -0,0 +1,42 @@
|
|
|
1
|
+
|
|
2
|
+
// export const loggerMw: IMiddleware = async (
|
|
3
|
+
// req: HttpRequest,
|
|
4
|
+
// ctx: InvocationContext,
|
|
5
|
+
// next: () => Promise<HttpResponseInit>
|
|
6
|
+
// ): Promise<HttpResponseInit> => {
|
|
7
|
+
// // ctx.info?.(`loggerMw → ${req.method} ${req.url}`);
|
|
8
|
+
|
|
9
|
+
// ctx.state ??= {};
|
|
10
|
+
// ctx.state.userId = 5
|
|
11
|
+
|
|
12
|
+
// setCookieKV(ctx, "__Secure-yahoo", "none");
|
|
13
|
+
// setCookieKV(ctx, "__Secure-bro", "ne");
|
|
14
|
+
|
|
15
|
+
// const res = await next();
|
|
16
|
+
// // ctx.info?.(`loggerMw ← ${res.status ?? 200}`);
|
|
17
|
+
// return res;
|
|
18
|
+
// };
|
|
19
|
+
|
|
20
|
+
|
|
21
|
+
|
|
22
|
+
// export const loggerMw2: IMiddleware = async (
|
|
23
|
+
// req: HttpRequest,
|
|
24
|
+
// ctx: InvocationContext,
|
|
25
|
+
// next: () => Promise<HttpResponseInit>
|
|
26
|
+
// ): Promise<HttpResponseInit> => {
|
|
27
|
+
|
|
28
|
+
// ctx.info('666666666666666666666666666666666666')
|
|
29
|
+
|
|
30
|
+
// ctx.info(ctx.state.userId, "yahoooooooooooooooooooooooooooooooo")
|
|
31
|
+
|
|
32
|
+
// setCookieKV(ctx, "__Secure-bro", "ne");
|
|
33
|
+
|
|
34
|
+
|
|
35
|
+
// setCookieKV(ctx, "__Secure-userId", "5");
|
|
36
|
+
|
|
37
|
+
|
|
38
|
+
|
|
39
|
+
// const res = await next();
|
|
40
|
+
// ctx.info?.(`loggerMw2 ← ${res.status ?? 200}`);
|
|
41
|
+
// return res;
|
|
42
|
+
// };
|