@digipair/skill-keycloak 0.48.3 → 0.49.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/index.cjs.js CHANGED
@@ -5629,8 +5629,10 @@ let KeycloakService = class KeycloakService {
5629
5629
  });
5630
5630
  return pinsSettings;
5631
5631
  }
5632
- async decodedToken(url, realm, token) {
5633
- const response = await fetch(`${url}/realms/${realm}/protocol/openid-connect/certs`);
5632
+ async decodedToken(url, realm, token, signal) {
5633
+ const response = await fetch(`${url}/realms/${realm}/protocol/openid-connect/certs`, {
5634
+ signal
5635
+ });
5634
5636
  const infos = await response.json();
5635
5637
  const publicKey = `-----BEGIN CERTIFICATE-----\n${infos.keys.find(({ alg })=>alg === 'RS256').x5c[0]}\n-----END CERTIFICATE-----`;
5636
5638
  const decodedtoken = jsonwebtoken.verify(token, publicKey, {
@@ -5689,9 +5691,10 @@ let KeycloakService = class KeycloakService {
5689
5691
  const pinsSettingsList = ((_pinsSettings_properties = pinsSettings.properties) == null ? void 0 : _pinsSettings_properties['execute']) || [];
5690
5692
  const token = /^Bearer /g.test(context.request.headers.authorization) && ((_context_request_headers_authorization = context.request.headers.authorization) == null ? void 0 : _context_request_headers_authorization.replace(/^Bearer /g, ''));
5691
5693
  if (token) {
5694
+ var _context_protected;
5692
5695
  context.keycloak = {
5693
5696
  isLogged: true,
5694
- decodedToken: await this.decodedToken(url, realm, context.request.headers.authorization.replace(/^Bearer /, ''))
5697
+ decodedToken: await this.decodedToken(url, realm, context.request.headers.authorization.replace(/^Bearer /, ''), (_context_protected = context.protected) == null ? void 0 : _context_protected.signal)
5695
5698
  };
5696
5699
  } else {
5697
5700
  context.keycloak = {
@@ -5810,9 +5813,10 @@ let KeycloakService = class KeycloakService {
5810
5813
  const { execute, secured = true, url = context.privates.KEYCLOAK_URL, realm = context.privates.KEYCLOAK_REALM } = params;
5811
5814
  const token = /^Bearer /g.test(context.request.headers.authorization) && ((_context_request_headers_authorization = context.request.headers.authorization) == null ? void 0 : _context_request_headers_authorization.replace(/^Bearer /g, ''));
5812
5815
  if (token) {
5816
+ var _context_protected;
5813
5817
  context.keycloak = {
5814
5818
  isLogged: true,
5815
- decodedToken: await this.decodedToken(url, realm, context.request.headers.authorization.replace(/^Bearer /, ''))
5819
+ decodedToken: await this.decodedToken(url, realm, context.request.headers.authorization.replace(/^Bearer /, ''), (_context_protected = context.protected) == null ? void 0 : _context_protected.signal)
5816
5820
  };
5817
5821
  } else {
5818
5822
  context.keycloak = {
@@ -5834,9 +5838,10 @@ let KeycloakService = class KeycloakService {
5834
5838
  const { steps, secured = true, url = context.privates.KEYCLOAK_URL, realm = context.privates.KEYCLOAK_REALM } = params;
5835
5839
  const token = /^Bearer /g.test(context.request.headers.authorization) && ((_context_request_headers_authorization = context.request.headers.authorization) == null ? void 0 : _context_request_headers_authorization.replace(/^Bearer /g, ''));
5836
5840
  if (token) {
5841
+ var _context_protected;
5837
5842
  context.keycloak = {
5838
5843
  isLogged: true,
5839
- decodedToken: await this.decodedToken(url, realm, context.request.headers.authorization.replace(/^Bearer /, ''))
5844
+ decodedToken: await this.decodedToken(url, realm, context.request.headers.authorization.replace(/^Bearer /, ''), (_context_protected = context.protected) == null ? void 0 : _context_protected.signal)
5840
5845
  };
5841
5846
  } else {
5842
5847
  context.keycloak = {
package/index.esm.js CHANGED
@@ -23905,14 +23905,14 @@ function indent(str, spaces) {
23905
23905
  var match = parseIdentifier(input, i1, namePart) || namePart && parseAdditionalSymbol(input, i1) || maybeSpace && parseSpaces(input, i1);
23906
23906
  // match is required
23907
23907
  if (!match) {
23908
- return i = i1, nextMatch = nextMatch1, tokens = tokens1, {
23908
+ return i = i1, tokens = tokens1, nextMatch = nextMatch1, {
23909
23909
  v: nextMatch1
23910
23910
  };
23911
23911
  }
23912
23912
  var token = match.token, offset = match.offset;
23913
23913
  i1 += offset;
23914
23914
  if (token === " ") {
23915
- return i = i1, nextMatch = nextMatch1, tokens = tokens1, "continue";
23915
+ return i = i1, tokens = tokens1, nextMatch = nextMatch1, "continue";
23916
23916
  }
23917
23917
  tokens1 = _to_consumable_array$3(tokens1).concat([
23918
23918
  token
@@ -23931,7 +23931,7 @@ function indent(str, spaces) {
23931
23931
  if (contextKeys.some(function(el) {
23932
23932
  return el.startsWith(name);
23933
23933
  })) {
23934
- return i = i1, nextMatch = nextMatch1, tokens = tokens1, "continue";
23934
+ return i = i1, tokens = tokens1, nextMatch = nextMatch1, "continue";
23935
23935
  }
23936
23936
  if (dateTimeIdentifiers.some(function(el) {
23937
23937
  return el === name;
@@ -23950,9 +23950,9 @@ function indent(str, spaces) {
23950
23950
  if (dateTimeIdentifiers.some(function(el) {
23951
23951
  return el.startsWith(name);
23952
23952
  })) {
23953
- return i = i1, nextMatch = nextMatch1, tokens = tokens1, "continue";
23953
+ return i = i1, tokens = tokens1, nextMatch = nextMatch1, "continue";
23954
23954
  }
23955
- return i = i1, nextMatch = nextMatch1, tokens = tokens1, {
23955
+ return i = i1, tokens = tokens1, nextMatch = nextMatch1, {
23956
23956
  v: nextMatch1
23957
23957
  };
23958
23958
  };
@@ -33629,8 +33629,10 @@ let KeycloakService = class KeycloakService {
33629
33629
  });
33630
33630
  return pinsSettings;
33631
33631
  }
33632
- async decodedToken(url, realm, token) {
33633
- const response = await fetch(`${url}/realms/${realm}/protocol/openid-connect/certs`);
33632
+ async decodedToken(url, realm, token, signal) {
33633
+ const response = await fetch(`${url}/realms/${realm}/protocol/openid-connect/certs`, {
33634
+ signal
33635
+ });
33634
33636
  const infos = await response.json();
33635
33637
  const publicKey = `-----BEGIN CERTIFICATE-----\n${infos.keys.find(({ alg })=>alg === 'RS256').x5c[0]}\n-----END CERTIFICATE-----`;
33636
33638
  const decodedtoken = jsonwebtoken.verify(token, publicKey, {
@@ -33689,9 +33691,10 @@ let KeycloakService = class KeycloakService {
33689
33691
  const pinsSettingsList = ((_pinsSettings_properties = pinsSettings.properties) == null ? void 0 : _pinsSettings_properties['execute']) || [];
33690
33692
  const token = /^Bearer /g.test(context.request.headers.authorization) && ((_context_request_headers_authorization = context.request.headers.authorization) == null ? void 0 : _context_request_headers_authorization.replace(/^Bearer /g, ''));
33691
33693
  if (token) {
33694
+ var _context_protected;
33692
33695
  context.keycloak = {
33693
33696
  isLogged: true,
33694
- decodedToken: await this.decodedToken(url, realm, context.request.headers.authorization.replace(/^Bearer /, ''))
33697
+ decodedToken: await this.decodedToken(url, realm, context.request.headers.authorization.replace(/^Bearer /, ''), (_context_protected = context.protected) == null ? void 0 : _context_protected.signal)
33695
33698
  };
33696
33699
  } else {
33697
33700
  context.keycloak = {
@@ -33810,9 +33813,10 @@ let KeycloakService = class KeycloakService {
33810
33813
  const { execute, secured = true, url = context.privates.KEYCLOAK_URL, realm = context.privates.KEYCLOAK_REALM } = params;
33811
33814
  const token = /^Bearer /g.test(context.request.headers.authorization) && ((_context_request_headers_authorization = context.request.headers.authorization) == null ? void 0 : _context_request_headers_authorization.replace(/^Bearer /g, ''));
33812
33815
  if (token) {
33816
+ var _context_protected;
33813
33817
  context.keycloak = {
33814
33818
  isLogged: true,
33815
- decodedToken: await this.decodedToken(url, realm, context.request.headers.authorization.replace(/^Bearer /, ''))
33819
+ decodedToken: await this.decodedToken(url, realm, context.request.headers.authorization.replace(/^Bearer /, ''), (_context_protected = context.protected) == null ? void 0 : _context_protected.signal)
33816
33820
  };
33817
33821
  } else {
33818
33822
  context.keycloak = {
@@ -33834,9 +33838,10 @@ let KeycloakService = class KeycloakService {
33834
33838
  const { steps, secured = true, url = context.privates.KEYCLOAK_URL, realm = context.privates.KEYCLOAK_REALM } = params;
33835
33839
  const token = /^Bearer /g.test(context.request.headers.authorization) && ((_context_request_headers_authorization = context.request.headers.authorization) == null ? void 0 : _context_request_headers_authorization.replace(/^Bearer /g, ''));
33836
33840
  if (token) {
33841
+ var _context_protected;
33837
33842
  context.keycloak = {
33838
33843
  isLogged: true,
33839
- decodedToken: await this.decodedToken(url, realm, context.request.headers.authorization.replace(/^Bearer /, ''))
33844
+ decodedToken: await this.decodedToken(url, realm, context.request.headers.authorization.replace(/^Bearer /, ''), (_context_protected = context.protected) == null ? void 0 : _context_protected.signal)
33840
33845
  };
33841
33846
  } else {
33842
33847
  context.keycloak = {
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@digipair/skill-keycloak",
3
- "version": "0.48.3",
3
+ "version": "0.49.1",
4
4
  "dependencies": {},
5
5
  "main": "./index.cjs.js",
6
6
  "module": "./index.esm.js"