@eggjs/security 4.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (183) hide show
  1. package/LICENSE +21 -0
  2. package/README.md +569 -0
  3. package/README.zh-CN.md +441 -0
  4. package/dist/commonjs/agent.d.ts +6 -0
  5. package/dist/commonjs/agent.js +14 -0
  6. package/dist/commonjs/app/extend/agent.d.ts +5 -0
  7. package/dist/commonjs/app/extend/agent.js +11 -0
  8. package/dist/commonjs/app/extend/application.d.ts +16 -0
  9. package/dist/commonjs/app/extend/application.js +35 -0
  10. package/dist/commonjs/app/extend/context.d.ts +68 -0
  11. package/dist/commonjs/app/extend/context.js +283 -0
  12. package/dist/commonjs/app/extend/helper.d.ts +12 -0
  13. package/dist/commonjs/app/extend/helper.js +10 -0
  14. package/dist/commonjs/app/extend/response.d.ts +41 -0
  15. package/dist/commonjs/app/extend/response.js +85 -0
  16. package/dist/commonjs/app/middleware/securities.d.ts +4 -0
  17. package/dist/commonjs/app/middleware/securities.js +55 -0
  18. package/dist/commonjs/app.d.ts +6 -0
  19. package/dist/commonjs/app.js +29 -0
  20. package/dist/commonjs/config/config.default.d.ts +871 -0
  21. package/dist/commonjs/config/config.default.js +357 -0
  22. package/dist/commonjs/config/config.local.d.ts +5 -0
  23. package/dist/commonjs/config/config.local.js +10 -0
  24. package/dist/commonjs/index.d.ts +1 -0
  25. package/dist/commonjs/index.js +14 -0
  26. package/dist/commonjs/lib/extend/safe_curl.d.ts +16 -0
  27. package/dist/commonjs/lib/extend/safe_curl.js +28 -0
  28. package/dist/commonjs/lib/helper/cliFilter.d.ts +4 -0
  29. package/dist/commonjs/lib/helper/cliFilter.js +20 -0
  30. package/dist/commonjs/lib/helper/escape.d.ts +2 -0
  31. package/dist/commonjs/lib/helper/escape.js +8 -0
  32. package/dist/commonjs/lib/helper/escapeShellArg.d.ts +1 -0
  33. package/dist/commonjs/lib/helper/escapeShellArg.js +8 -0
  34. package/dist/commonjs/lib/helper/escapeShellCmd.d.ts +1 -0
  35. package/dist/commonjs/lib/helper/escapeShellCmd.js +17 -0
  36. package/dist/commonjs/lib/helper/index.d.ts +21 -0
  37. package/dist/commonjs/lib/helper/index.js +26 -0
  38. package/dist/commonjs/lib/helper/shtml.d.ts +2 -0
  39. package/dist/commonjs/lib/helper/shtml.js +76 -0
  40. package/dist/commonjs/lib/helper/sjs.d.ts +4 -0
  41. package/dist/commonjs/lib/helper/sjs.js +52 -0
  42. package/dist/commonjs/lib/helper/sjson.d.ts +1 -0
  43. package/dist/commonjs/lib/helper/sjson.js +45 -0
  44. package/dist/commonjs/lib/helper/spath.d.ts +5 -0
  45. package/dist/commonjs/lib/helper/spath.js +28 -0
  46. package/dist/commonjs/lib/helper/surl.d.ts +2 -0
  47. package/dist/commonjs/lib/helper/surl.js +33 -0
  48. package/dist/commonjs/lib/middlewares/csp.d.ts +4 -0
  49. package/dist/commonjs/lib/middlewares/csp.js +68 -0
  50. package/dist/commonjs/lib/middlewares/csrf.d.ts +4 -0
  51. package/dist/commonjs/lib/middlewares/csrf.js +42 -0
  52. package/dist/commonjs/lib/middlewares/dta.d.ts +3 -0
  53. package/dist/commonjs/lib/middlewares/dta.js +14 -0
  54. package/dist/commonjs/lib/middlewares/hsts.d.ts +4 -0
  55. package/dist/commonjs/lib/middlewares/hsts.js +23 -0
  56. package/dist/commonjs/lib/middlewares/index.d.ts +13 -0
  57. package/dist/commonjs/lib/middlewares/index.js +28 -0
  58. package/dist/commonjs/lib/middlewares/methodnoallow.d.ts +3 -0
  59. package/dist/commonjs/lib/middlewares/methodnoallow.js +22 -0
  60. package/dist/commonjs/lib/middlewares/noopen.d.ts +4 -0
  61. package/dist/commonjs/lib/middlewares/noopen.js +17 -0
  62. package/dist/commonjs/lib/middlewares/nosniff.d.ts +4 -0
  63. package/dist/commonjs/lib/middlewares/nosniff.js +30 -0
  64. package/dist/commonjs/lib/middlewares/referrerPolicy.d.ts +4 -0
  65. package/dist/commonjs/lib/middlewares/referrerPolicy.js +36 -0
  66. package/dist/commonjs/lib/middlewares/xframe.d.ts +4 -0
  67. package/dist/commonjs/lib/middlewares/xframe.js +19 -0
  68. package/dist/commonjs/lib/middlewares/xssProtection.d.ts +4 -0
  69. package/dist/commonjs/lib/middlewares/xssProtection.js +16 -0
  70. package/dist/commonjs/lib/utils.d.ts +19 -0
  71. package/dist/commonjs/lib/utils.js +206 -0
  72. package/dist/commonjs/package.json +3 -0
  73. package/dist/commonjs/types.d.ts +10 -0
  74. package/dist/commonjs/types.js +5 -0
  75. package/dist/esm/agent.d.ts +6 -0
  76. package/dist/esm/agent.js +11 -0
  77. package/dist/esm/app/extend/agent.d.ts +5 -0
  78. package/dist/esm/app/extend/agent.js +8 -0
  79. package/dist/esm/app/extend/application.d.ts +16 -0
  80. package/dist/esm/app/extend/application.js +32 -0
  81. package/dist/esm/app/extend/context.d.ts +68 -0
  82. package/dist/esm/app/extend/context.js +244 -0
  83. package/dist/esm/app/extend/helper.d.ts +12 -0
  84. package/dist/esm/app/extend/helper.js +5 -0
  85. package/dist/esm/app/extend/response.d.ts +41 -0
  86. package/dist/esm/app/extend/response.js +82 -0
  87. package/dist/esm/app/middleware/securities.d.ts +4 -0
  88. package/dist/esm/app/middleware/securities.js +50 -0
  89. package/dist/esm/app.d.ts +6 -0
  90. package/dist/esm/app.js +26 -0
  91. package/dist/esm/config/config.default.d.ts +871 -0
  92. package/dist/esm/config/config.default.js +351 -0
  93. package/dist/esm/config/config.local.d.ts +5 -0
  94. package/dist/esm/config/config.local.js +8 -0
  95. package/dist/esm/index.d.ts +1 -0
  96. package/dist/esm/index.js +12 -0
  97. package/dist/esm/lib/extend/safe_curl.d.ts +16 -0
  98. package/dist/esm/lib/extend/safe_curl.js +25 -0
  99. package/dist/esm/lib/helper/cliFilter.d.ts +4 -0
  100. package/dist/esm/lib/helper/cliFilter.js +17 -0
  101. package/dist/esm/lib/helper/escape.d.ts +2 -0
  102. package/dist/esm/lib/helper/escape.js +3 -0
  103. package/dist/esm/lib/helper/escapeShellArg.d.ts +1 -0
  104. package/dist/esm/lib/helper/escapeShellArg.js +5 -0
  105. package/dist/esm/lib/helper/escapeShellCmd.d.ts +1 -0
  106. package/dist/esm/lib/helper/escapeShellCmd.js +14 -0
  107. package/dist/esm/lib/helper/index.d.ts +21 -0
  108. package/dist/esm/lib/helper/index.js +21 -0
  109. package/dist/esm/lib/helper/shtml.d.ts +2 -0
  110. package/dist/esm/lib/helper/shtml.js +70 -0
  111. package/dist/esm/lib/helper/sjs.d.ts +4 -0
  112. package/dist/esm/lib/helper/sjs.js +49 -0
  113. package/dist/esm/lib/helper/sjson.d.ts +1 -0
  114. package/dist/esm/lib/helper/sjson.js +39 -0
  115. package/dist/esm/lib/helper/spath.d.ts +5 -0
  116. package/dist/esm/lib/helper/spath.js +25 -0
  117. package/dist/esm/lib/helper/surl.d.ts +2 -0
  118. package/dist/esm/lib/helper/surl.js +30 -0
  119. package/dist/esm/lib/middlewares/csp.d.ts +4 -0
  120. package/dist/esm/lib/middlewares/csp.js +63 -0
  121. package/dist/esm/lib/middlewares/csrf.d.ts +4 -0
  122. package/dist/esm/lib/middlewares/csrf.js +37 -0
  123. package/dist/esm/lib/middlewares/dta.d.ts +3 -0
  124. package/dist/esm/lib/middlewares/dta.js +12 -0
  125. package/dist/esm/lib/middlewares/hsts.d.ts +4 -0
  126. package/dist/esm/lib/middlewares/hsts.js +21 -0
  127. package/dist/esm/lib/middlewares/index.d.ts +13 -0
  128. package/dist/esm/lib/middlewares/index.js +23 -0
  129. package/dist/esm/lib/middlewares/methodnoallow.d.ts +3 -0
  130. package/dist/esm/lib/middlewares/methodnoallow.js +20 -0
  131. package/dist/esm/lib/middlewares/noopen.d.ts +4 -0
  132. package/dist/esm/lib/middlewares/noopen.js +15 -0
  133. package/dist/esm/lib/middlewares/nosniff.d.ts +4 -0
  134. package/dist/esm/lib/middlewares/nosniff.js +28 -0
  135. package/dist/esm/lib/middlewares/referrerPolicy.d.ts +4 -0
  136. package/dist/esm/lib/middlewares/referrerPolicy.js +34 -0
  137. package/dist/esm/lib/middlewares/xframe.d.ts +4 -0
  138. package/dist/esm/lib/middlewares/xframe.js +17 -0
  139. package/dist/esm/lib/middlewares/xssProtection.d.ts +4 -0
  140. package/dist/esm/lib/middlewares/xssProtection.js +14 -0
  141. package/dist/esm/lib/utils.d.ts +19 -0
  142. package/dist/esm/lib/utils.js +194 -0
  143. package/dist/esm/package.json +3 -0
  144. package/dist/esm/types.d.ts +10 -0
  145. package/dist/esm/types.js +3 -0
  146. package/dist/package.json +4 -0
  147. package/package.json +116 -0
  148. package/src/agent.ts +14 -0
  149. package/src/app/extend/agent.ts +14 -0
  150. package/src/app/extend/application.ts +51 -0
  151. package/src/app/extend/context.ts +282 -0
  152. package/src/app/extend/helper.ts +5 -0
  153. package/src/app/extend/response.ts +95 -0
  154. package/src/app/middleware/securities.ts +63 -0
  155. package/src/app.ts +31 -0
  156. package/src/config/config.default.ts +379 -0
  157. package/src/config/config.local.ts +9 -0
  158. package/src/index.ts +12 -0
  159. package/src/lib/extend/safe_curl.ts +35 -0
  160. package/src/lib/helper/cliFilter.ts +20 -0
  161. package/src/lib/helper/escape.ts +3 -0
  162. package/src/lib/helper/escapeShellArg.ts +4 -0
  163. package/src/lib/helper/escapeShellCmd.ts +16 -0
  164. package/src/lib/helper/index.ts +21 -0
  165. package/src/lib/helper/shtml.ts +77 -0
  166. package/src/lib/helper/sjs.ts +57 -0
  167. package/src/lib/helper/sjson.ts +35 -0
  168. package/src/lib/helper/spath.ts +27 -0
  169. package/src/lib/helper/surl.ts +35 -0
  170. package/src/lib/middlewares/csp.ts +70 -0
  171. package/src/lib/middlewares/csrf.ts +44 -0
  172. package/src/lib/middlewares/dta.ts +13 -0
  173. package/src/lib/middlewares/hsts.ts +24 -0
  174. package/src/lib/middlewares/index.ts +23 -0
  175. package/src/lib/middlewares/methodnoallow.ts +23 -0
  176. package/src/lib/middlewares/noopen.ts +18 -0
  177. package/src/lib/middlewares/nosniff.ts +32 -0
  178. package/src/lib/middlewares/referrerPolicy.ts +39 -0
  179. package/src/lib/middlewares/xframe.ts +20 -0
  180. package/src/lib/middlewares/xssProtection.ts +17 -0
  181. package/src/lib/utils.ts +208 -0
  182. package/src/types.ts +16 -0
  183. package/src/typings/index.d.ts +4 -0
@@ -0,0 +1,351 @@
1
+ import z from 'zod';
2
+ import { Context } from '@eggjs/core';
3
+ const CSRFSupportRequestItem = z.object({
4
+ path: z.instanceof(RegExp),
5
+ methods: z.array(z.string()),
6
+ });
7
+ export const LookupAddress = z.object({
8
+ address: z.string(),
9
+ family: z.number(),
10
+ });
11
+ const LookupAddressAndStringArray = z.union([z.string(), LookupAddress]).array();
12
+ const SSRFCheckAddressFunction = z.function()
13
+ .args(z.union([z.string(), LookupAddress, LookupAddressAndStringArray]), z.union([z.number(), z.string()]), z.string())
14
+ .returns(z.boolean());
15
+ export const SecurityMiddlewareName = z.enum([
16
+ 'csrf',
17
+ 'hsts',
18
+ 'methodnoallow',
19
+ 'noopen',
20
+ 'nosniff',
21
+ 'csp',
22
+ 'xssProtection',
23
+ 'xframe',
24
+ 'dta',
25
+ ]);
26
+ /**
27
+ * (ctx) => boolean
28
+ */
29
+ const IgnoreOrMatchHandler = z.function().args(z.instanceof(Context)).returns(z.boolean());
30
+ const IgnoreOrMatch = z.union([
31
+ z.string(), z.instanceof(RegExp), IgnoreOrMatchHandler,
32
+ ]);
33
+ const IgnoreOrMatchOption = z.union([IgnoreOrMatch, IgnoreOrMatch.array()]).optional();
34
+ /**
35
+ * security options
36
+ * @member Config#security
37
+ */
38
+ export const SecurityConfig = z.object({
39
+ /**
40
+ * domain white list
41
+ *
42
+ * Default to `[]`
43
+ */
44
+ domainWhiteList: z.array(z.string()).default([]),
45
+ /**
46
+ * protocol white list
47
+ *
48
+ * Default to `[]`
49
+ */
50
+ protocolWhiteList: z.array(z.string()).default([]),
51
+ /**
52
+ * default open security middleware
53
+ *
54
+ * Default to `'csrf,hsts,methodnoallow,noopen,nosniff,csp,xssProtection,xframe,dta'`
55
+ */
56
+ defaultMiddleware: z.union([z.string(), z.array(SecurityMiddlewareName)])
57
+ .default(SecurityMiddlewareName.options),
58
+ /**
59
+ * whether defend csrf attack
60
+ */
61
+ csrf: z.preprocess(val => {
62
+ // transform old config, `csrf: false` to `csrf: { enable: false }`
63
+ if (typeof val === 'boolean') {
64
+ return { enable: val };
65
+ }
66
+ return val;
67
+ }, z.object({
68
+ match: IgnoreOrMatchOption,
69
+ ignore: IgnoreOrMatchOption,
70
+ /**
71
+ * Default to `true`
72
+ */
73
+ enable: z.boolean().default(true),
74
+ /**
75
+ * csrf token detect source type
76
+ *
77
+ * Default to `'ctoken'`
78
+ */
79
+ type: z.enum(['ctoken', 'referer', 'all', 'any']).default('ctoken'),
80
+ /**
81
+ * ignore json request
82
+ *
83
+ * Default to `false`
84
+ *
85
+ * @deprecated is not safe now, don't use it
86
+ */
87
+ ignoreJSON: z.boolean().default(false),
88
+ /**
89
+ * csrf token cookie name
90
+ *
91
+ * Default to `'csrfToken'`
92
+ */
93
+ cookieName: z.union([z.string(), z.array(z.string())]).default('csrfToken'),
94
+ /**
95
+ * csrf token session name
96
+ *
97
+ * Default to `'csrfToken'`
98
+ */
99
+ sessionName: z.string().default('csrfToken'),
100
+ /**
101
+ * csrf token request header name
102
+ *
103
+ * Default to `'x-csrf-token'`
104
+ */
105
+ headerName: z.string().default('x-csrf-token'),
106
+ /**
107
+ * csrf token request body field name
108
+ *
109
+ * Default to `'_csrf'`
110
+ */
111
+ bodyName: z.union([z.string(), z.array(z.string())]).default('_csrf'),
112
+ /**
113
+ * csrf token request query field name
114
+ *
115
+ * Default to `'_csrf'`
116
+ */
117
+ queryName: z.union([z.string(), z.array(z.string())]).default('_csrf'),
118
+ /**
119
+ * rotate csrf token when it is invalid
120
+ *
121
+ * Default to `false`
122
+ */
123
+ rotateWhenInvalid: z.boolean().default(false),
124
+ /**
125
+ * These config works when using `'ctoken'` type
126
+ *
127
+ * Default to `false`
128
+ */
129
+ useSession: z.boolean().default(false),
130
+ /**
131
+ * csrf token cookie domain setting,
132
+ * can be `(ctx) => string` or `string`
133
+ *
134
+ * Default to `undefined`, auto set the cookie domain in the safe way
135
+ */
136
+ cookieDomain: z.union([
137
+ z.string(),
138
+ z.function()
139
+ .args(z.instanceof(Context))
140
+ .returns(z.string()),
141
+ ]).optional(),
142
+ /**
143
+ * csrf token check requests config
144
+ */
145
+ supportedRequests: z.array(CSRFSupportRequestItem)
146
+ .default([
147
+ { path: /^\//, methods: ['POST', 'PATCH', 'DELETE', 'PUT', 'CONNECT'] },
148
+ ]),
149
+ /**
150
+ * referer or origin header white list.
151
+ * It only works when using `'referer'` type
152
+ *
153
+ * Default to `[]`
154
+ */
155
+ refererWhiteList: z.array(z.string()).default([]),
156
+ /**
157
+ * csrf token cookie options
158
+ *
159
+ * Default to `{
160
+ * signed: false,
161
+ * httpOnly: false,
162
+ * overwrite: true,
163
+ * }`
164
+ */
165
+ cookieOptions: z.object({
166
+ signed: z.boolean(),
167
+ httpOnly: z.boolean(),
168
+ overwrite: z.boolean(),
169
+ }).default({
170
+ signed: false,
171
+ httpOnly: false,
172
+ overwrite: true,
173
+ }),
174
+ }).default({})),
175
+ /**
176
+ * whether enable X-Frame-Options response header
177
+ */
178
+ xframe: z.object({
179
+ match: IgnoreOrMatchOption,
180
+ ignore: IgnoreOrMatchOption,
181
+ /**
182
+ * Default to `true`
183
+ */
184
+ enable: z.boolean().default(true),
185
+ /**
186
+ * X-Frame-Options value, can be `'DENY'`, `'SAMEORIGIN'`, `'ALLOW-FROM https://example.com'`
187
+ *
188
+ * Default to `'SAMEORIGIN'`
189
+ */
190
+ value: z.string().default('SAMEORIGIN'),
191
+ }).default({}),
192
+ /**
193
+ * whether enable Strict-Transport-Security response header
194
+ */
195
+ hsts: z.object({
196
+ match: IgnoreOrMatchOption,
197
+ ignore: IgnoreOrMatchOption,
198
+ /**
199
+ * Default to `false`
200
+ */
201
+ enable: z.boolean().default(false),
202
+ /**
203
+ * Max age of Strict-Transport-Security in seconds
204
+ *
205
+ * Default to `365 * 24 * 3600`
206
+ */
207
+ maxAge: z.number().default(365 * 24 * 3600),
208
+ /**
209
+ * Whether include sub domains
210
+ *
211
+ * Default to `false`
212
+ */
213
+ includeSubdomains: z.boolean().default(false),
214
+ }).default({}),
215
+ /**
216
+ * whether enable Http Method filter
217
+ */
218
+ methodnoallow: z.object({
219
+ match: IgnoreOrMatchOption,
220
+ ignore: IgnoreOrMatchOption,
221
+ /**
222
+ * Default to `true`
223
+ */
224
+ enable: z.boolean().default(true),
225
+ }).default({}),
226
+ /**
227
+ * whether enable IE automatically download open
228
+ */
229
+ noopen: z.object({
230
+ match: IgnoreOrMatchOption,
231
+ ignore: IgnoreOrMatchOption,
232
+ /**
233
+ * Default to `true`
234
+ */
235
+ enable: z.boolean().default(true),
236
+ }).default({}),
237
+ /**
238
+ * whether enable IE8 automatically detect mime
239
+ */
240
+ nosniff: z.object({
241
+ match: IgnoreOrMatchOption,
242
+ ignore: IgnoreOrMatchOption,
243
+ /**
244
+ * Default to `true`
245
+ */
246
+ enable: z.boolean().default(true),
247
+ }).default({}),
248
+ /**
249
+ * whether enable IE8 XSS Filter
250
+ */
251
+ xssProtection: z.object({
252
+ match: IgnoreOrMatchOption,
253
+ ignore: IgnoreOrMatchOption,
254
+ /**
255
+ * Default to `true`
256
+ */
257
+ enable: z.boolean().default(true),
258
+ /**
259
+ * X-XSS-Protection response header value
260
+ *
261
+ * Default to `'1; mode=block'`
262
+ */
263
+ value: z.coerce.string().default('1; mode=block'),
264
+ }).default({}),
265
+ /**
266
+ * content security policy config
267
+ */
268
+ csp: z.object({
269
+ match: IgnoreOrMatchOption,
270
+ ignore: IgnoreOrMatchOption,
271
+ /**
272
+ * Default to `false`
273
+ */
274
+ enable: z.boolean().default(false),
275
+ // https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP#csp_overview
276
+ policy: z.record(z.union([z.string(), z.array(z.string()), z.boolean()])).default({}),
277
+ /**
278
+ * whether enable report only mode
279
+ * Default to `undefined`
280
+ */
281
+ reportOnly: z.boolean().optional(),
282
+ /**
283
+ * whether support IE
284
+ * Default to `undefined`
285
+ */
286
+ supportIE: z.boolean().optional(),
287
+ }).default({}),
288
+ /**
289
+ * whether enable referrer policy
290
+ * @see https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Referrer-Policy
291
+ */
292
+ referrerPolicy: z.object({
293
+ match: IgnoreOrMatchOption,
294
+ ignore: IgnoreOrMatchOption,
295
+ /**
296
+ * Default to `false`
297
+ */
298
+ enable: z.boolean().default(false),
299
+ /**
300
+ * referrer policy value
301
+ *
302
+ * Default to `'no-referrer-when-downgrade'`
303
+ */
304
+ value: z.string().default('no-referrer-when-downgrade'),
305
+ }).default({}),
306
+ /**
307
+ * whether enable auto avoid directory traversal attack
308
+ */
309
+ dta: z.object({
310
+ match: IgnoreOrMatchOption,
311
+ ignore: IgnoreOrMatchOption,
312
+ /**
313
+ * Default to `true`
314
+ */
315
+ enable: z.boolean().default(true),
316
+ }).default({}),
317
+ ssrf: z.object({
318
+ ipBlackList: z.array(z.string()).optional(),
319
+ ipExceptionList: z.array(z.string()).optional(),
320
+ hostnameExceptionList: z.array(z.string()).optional(),
321
+ checkAddress: SSRFCheckAddressFunction.optional(),
322
+ }).default({}),
323
+ match: z.union([IgnoreOrMatch, IgnoreOrMatch.array()]).optional(),
324
+ ignore: z.union([IgnoreOrMatch, IgnoreOrMatch.array()]).optional(),
325
+ __protocolWhiteListSet: z.set(z.string()).optional().readonly(),
326
+ });
327
+ const SecurityHelperOnTagAttrHandler = z.function()
328
+ .args(z.string(), z.string(), z.string(), z.boolean())
329
+ .returns(z.union([z.string(), z.void()]));
330
+ export const SecurityHelperConfig = z.object({
331
+ shtml: z.object({
332
+ /**
333
+ * tag attribute white list
334
+ */
335
+ whiteList: z.record(z.array(z.string())).optional(),
336
+ /**
337
+ * domain white list
338
+ * @deprecated use `config.security.domainWhiteList` instead
339
+ */
340
+ domainWhiteList: z.array(z.string()).optional(),
341
+ /**
342
+ * tag attribute handler
343
+ */
344
+ onTagAttr: SecurityHelperOnTagAttrHandler.optional(),
345
+ }).default({}),
346
+ });
347
+ export default {
348
+ security: SecurityConfig.parse({}),
349
+ helper: SecurityHelperConfig.parse({}),
350
+ };
351
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"config.default.js","sourceRoot":"","sources":["../../../src/config/config.default.ts"],"names":[],"mappings":"AAAA,OAAO,CAAC,MAAM,KAAK,CAAC;AACpB,OAAO,EAAE,OAAO,EAAE,MAAM,aAAa,CAAC;AAEtC,MAAM,sBAAsB,GAAG,CAAC,CAAC,MAAM,CAAC;IACtC,IAAI,EAAE,CAAC,CAAC,UAAU,CAAC,MAAM,CAAC;IAC1B,OAAO,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC;CAC7B,CAAC,CAAC;AAGH,MAAM,CAAC,MAAM,aAAa,GAAG,CAAC,CAAC,MAAM,CAAC;IACpC,OAAO,EAAE,CAAC,CAAC,MAAM,EAAE;IACnB,MAAM,EAAE,CAAC,CAAC,MAAM,EAAE;CACnB,CAAC,CAAC;AAGH,MAAM,2BAA2B,GAAG,CAAC,CAAC,KAAK,CAAC,CAAE,CAAC,CAAC,MAAM,EAAE,EAAE,aAAa,CAAE,CAAC,CAAC,KAAK,EAAE,CAAC;AACnF,MAAM,wBAAwB,GAAG,CAAC,CAAC,QAAQ,EAAE;KAC1C,IAAI,CAAC,CAAC,CAAC,KAAK,CAAC,CAAE,CAAC,CAAC,MAAM,EAAE,EAAE,aAAa,EAAE,2BAA2B,CAAE,CAAC,EAAE,CAAC,CAAC,KAAK,CAAC,CAAE,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC,MAAM,EAAE,CAAE,CAAC,EAAE,CAAC,CAAC,MAAM,EAAE,CAAC;KAC1H,OAAO,CAAC,CAAC,CAAC,OAAO,EAAE,CAAC,CAAC;AAOxB,MAAM,CAAC,MAAM,sBAAsB,GAAG,CAAC,CAAC,IAAI,CAAC;IAC3C,MAAM;IACN,MAAM;IACN,eAAe;IACf,QAAQ;IACR,SAAS;IACT,KAAK;IACL,eAAe;IACf,QAAQ;IACR,KAAK;CACN,CAAC,CAAC;AAGH;;GAEG;AACH,MAAM,oBAAoB,GAAG,CAAC,CAAC,QAAQ,EAAE,CAAC,IAAI,CAAC,CAAC,CAAC,UAAU,CAAC,OAAO,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,OAAO,EAAE,CAAC,CAAC;AAG3F,MAAM,aAAa,GAAG,CAAC,CAAC,KAAK,CAAC;IAC5B,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC,UAAU,CAAC,MAAM,CAAC,EAAE,oBAAoB;CACvD,CAAC,CAAC;AAGH,MAAM,mBAAmB,GAAG,CAAC,CAAC,KAAK,CAAC,CAAE,aAAa,EAAE,aAAa,CAAC,KAAK,EAAE,CAAE,CAAC,CAAC,QAAQ,EAAE,CAAC;AAGzF;;;GAGG;AACH,MAAM,CAAC,MAAM,cAAc,GAAG,CAAC,CAAC,MAAM,CAAC;IACrC;;;;OAIG;IACH,eAAe,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,CAAC,OAAO,CAAC,EAAE,CAAC;IAChD;;;;OAIG;IACH,iBAAiB,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,CAAC,OAAO,CAAC,EAAE,CAAC;IAClD;;;;OAIG;IACH,iBAAiB,EAAE,CAAC,CAAC,KAAK,CAAC,CAAE,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC,KAAK,CAAC,sBAAsB,CAAC,CAAE,CAAC;SACxE,OAAO,CAAC,sBAAsB,CAAC,OAAO,CAAC;IAC1C;;OAEG;IACH,IAAI,EAAE,CAAC,CAAC,UAAU,CAAC,GAAG,CAAC,EAAE;QACvB,mEAAmE;QACnE,IAAI,OAAO,GAAG,KAAK,SAAS,EAAE,CAAC;YAC7B,OAAO,EAAE,MAAM,EAAE,GAAG,EAAE,CAAC;QACzB,CAAC;QACD,OAAO,GAAG,CAAC;IACb,CAAC,EAAE,CAAC,CAAC,MAAM,CAAC;QACV,KAAK,EAAE,mBAAmB;QAC1B,MAAM,EAAE,mBAAmB;QAC3B;;WAEG;QACH,MAAM,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC,OAAO,CAAC,IAAI,CAAC;QACjC;;;;WAIG;QACH,IAAI,EAAE,CAAC,CAAC,IAAI,CAAC,CAAE,QAAQ,EAAE,SAAS,EAAE,KAAK,EAAE,KAAK,CAAE,CAAC,CAAC,OAAO,CAAC,QAAQ,CAAC;QACrE;;;;;;WAMG;QACH,UAAU,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC,OAAO,CAAC,KAAK,CAAC;QACtC;;;;WAIG;QACH,UAAU,EAAE,CAAC,CAAC,KAAK,CAAC,CAAE,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,CAAE,CAAC,CAAC,OAAO,CAAC,WAAW,CAAC;QAC7E;;;;WAIG;QACH,WAAW,EAAE,CAAC,CAAC,MAAM,EAAE,CAAC,OAAO,CAAC,WAAW,CAAC;QAC5C;;;;WAIG;QACH,UAAU,EAAE,CAAC,CAAC,MAAM,EAAE,CAAC,OAAO,CAAC,cAAc,CAAC;QAC9C;;;;WAIG;QACH,QAAQ,EAAE,CAAC,CAAC,KAAK,CAAC,CAAE,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,CAAE,CAAC,CAAC,OAAO,CAAC,OAAO,CAAC;QACvE;;;;WAIG;QACH,SAAS,EAAE,CAAC,CAAC,KAAK,CAAC,CAAE,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,CAAE,CAAC,CAAC,OAAO,CAAC,OAAO,CAAC;QACxE;;;;WAIG;QACH,iBAAiB,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC,OAAO,CAAC,KAAK,CAAC;QAC7C;;;;WAIG;QACH,UAAU,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC,OAAO,CAAC,KAAK,CAAC;QACtC;;;;;WAKG;QACH,YAAY,EAAE,CAAC,CAAC,KAAK,CAAC;YACpB,CAAC,CAAC,MAAM,EAAE;YACV,CAAC,CAAC,QAAQ,EAAE;iBACT,IAAI,CAAC,CAAC,CAAC,UAAU,CAAC,OAAO,CAAC,CAAC;iBAC3B,OAAO,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC;SACvB,CAAC,CAAC,QAAQ,EAAE;QACb;;WAEG;QACH,iBAAiB,EAAE,CAAC,CAAC,KAAK,CAAC,sBAAsB,CAAC;aAC/C,OAAO,CAAC;YACP,EAAE,IAAI,EAAE,KAAK,EAAE,OAAO,EAAE,CAAE,MAAM,EAAE,OAAO,EAAE,QAAQ,EAAE,KAAK,EAAE,SAAS,CAAE,EAAE;SAC1E,CAAC;QACJ;;;;;WAKG;QACH,gBAAgB,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,CAAC,OAAO,CAAC,EAAE,CAAC;QACjD;;;;;;;;WAQG;QACH,aAAa,EAAE,CAAC,CAAC,MAAM,CAAC;YACtB,MAAM,EAAE,CAAC,CAAC,OAAO,EAAE;YACnB,QAAQ,EAAE,CAAC,CAAC,OAAO,EAAE;YACrB,SAAS,EAAE,CAAC,CAAC,OAAO,EAAE;SACvB,CAAC,CAAC,OAAO,CAAC;YACT,MAAM,EAAE,KAAK;YACb,QAAQ,EAAE,KAAK;YACf,SAAS,EAAE,IAAI;SAChB,CAAC;KACH,CAAC,CAAC,OAAO,CAAC,EAAE,CAAC,CAAC;IACf;;OAEG;IACH,MAAM,EAAE,CAAC,CAAC,MAAM,CAAC;QACf,KAAK,EAAE,mBAAmB;QAC1B,MAAM,EAAE,mBAAmB;QAC3B;;WAEG;QACH,MAAM,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC,OAAO,CAAC,IAAI,CAAC;QACjC;;;;WAIG;QACH,KAAK,EAAE,CAAC,CAAC,MAAM,EAAE,CAAC,OAAO,CAAC,YAAY,CAAC;KACxC,CAAC,CAAC,OAAO,CAAC,EAAE,CAAC;IACd;;OAEG;IACH,IAAI,EAAE,CAAC,CAAC,MAAM,CAAC;QACb,KAAK,EAAE,mBAAmB;QAC1B,MAAM,EAAE,mBAAmB;QAC3B;;WAEG;QACH,MAAM,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC,OAAO,CAAC,KAAK,CAAC;QAClC;;;;WAIG;QACH,MAAM,EAAE,CAAC,CAAC,MAAM,EAAE,CAAC,OAAO,CAAC,GAAG,GAAG,EAAE,GAAG,IAAI,CAAC;QAC3C;;;;WAIG;QACH,iBAAiB,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC,OAAO,CAAC,KAAK,CAAC;KAC9C,CAAC,CAAC,OAAO,CAAC,EAAE,CAAC;IACd;;OAEG;IACH,aAAa,EAAE,CAAC,CAAC,MAAM,CAAC;QACtB,KAAK,EAAE,mBAAmB;QAC1B,MAAM,EAAE,mBAAmB;QAC3B;;WAEG;QACH,MAAM,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC,OAAO,CAAC,IAAI,CAAC;KAClC,CAAC,CAAC,OAAO,CAAC,EAAE,CAAC;IACd;;OAEG;IACH,MAAM,EAAE,CAAC,CAAC,MAAM,CAAC;QACf,KAAK,EAAE,mBAAmB;QAC1B,MAAM,EAAE,mBAAmB;QAC3B;;WAEG;QACH,MAAM,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC,OAAO,CAAC,IAAI,CAAC;KAClC,CAAC,CAAC,OAAO,CAAC,EAAE,CAAC;IACd;;OAEG;IACH,OAAO,EAAE,CAAC,CAAC,MAAM,CAAC;QAChB,KAAK,EAAE,mBAAmB;QAC1B,MAAM,EAAE,mBAAmB;QAC3B;;WAEG;QACH,MAAM,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC,OAAO,CAAC,IAAI,CAAC;KAClC,CAAC,CAAC,OAAO,CAAC,EAAE,CAAC;IACd;;OAEG;IACH,aAAa,EAAE,CAAC,CAAC,MAAM,CAAC;QACtB,KAAK,EAAE,mBAAmB;QAC1B,MAAM,EAAE,mBAAmB;QAC3B;;WAEG;QACH,MAAM,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC,OAAO,CAAC,IAAI,CAAC;QACjC;;;;WAIG;QACH,KAAK,EAAE,CAAC,CAAC,MAAM,CAAC,MAAM,EAAE,CAAC,OAAO,CAAC,eAAe,CAAC;KAClD,CAAC,CAAC,OAAO,CAAC,EAAE,CAAC;IACd;;OAEG;IACH,GAAG,EAAE,CAAC,CAAC,MAAM,CAAC;QACZ,KAAK,EAAE,mBAAmB;QAC1B,MAAM,EAAE,mBAAmB;QAC3B;;WAEG;QACH,MAAM,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC,OAAO,CAAC,KAAK,CAAC;QAClC,qEAAqE;QACrE,MAAM,EAAE,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,KAAK,CAAC,CAAE,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,EAAE,CAAC,CAAC,OAAO,EAAE,CAAE,CAAC,CAAC,CAAC,OAAO,CAAC,EAAE,CAAC;QACvF;;;WAGG;QACH,UAAU,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC,QAAQ,EAAE;QAClC;;;WAGG;QACH,SAAS,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC,QAAQ,EAAE;KAClC,CAAC,CAAC,OAAO,CAAC,EAAE,CAAC;IACd;;;OAGG;IACH,cAAc,EAAE,CAAC,CAAC,MAAM,CAAC;QACvB,KAAK,EAAE,mBAAmB;QAC1B,MAAM,EAAE,mBAAmB;QAC3B;;WAEG;QACH,MAAM,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC,OAAO,CAAC,KAAK,CAAC;QAClC;;;;WAIG;QACH,KAAK,EAAE,CAAC,CAAC,MAAM,EAAE,CAAC,OAAO,CAAC,4BAA4B,CAAC;KACxD,CAAC,CAAC,OAAO,CAAC,EAAE,CAAC;IACd;;OAEG;IACH,GAAG,EAAE,CAAC,CAAC,MAAM,CAAC;QACZ,KAAK,EAAE,mBAAmB;QAC1B,MAAM,EAAE,mBAAmB;QAC3B;;WAEG;QACH,MAAM,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC,OAAO,CAAC,IAAI,CAAC;KAClC,CAAC,CAAC,OAAO,CAAC,EAAE,CAAC;IACd,IAAI,EAAE,CAAC,CAAC,MAAM,CAAC;QACb,WAAW,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,CAAC,QAAQ,EAAE;QAC3C,eAAe,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,CAAC,QAAQ,EAAE;QAC/C,qBAAqB,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,CAAC,QAAQ,EAAE;QACrD,YAAY,EAAE,wBAAwB,CAAC,QAAQ,EAAE;KAClD,CAAC,CAAC,OAAO,CAAC,EAAE,CAAC;IACd,KAAK,EAAE,CAAC,CAAC,KAAK,CAAC,CAAE,aAAa,EAAE,aAAa,CAAC,KAAK,EAAE,CAAE,CAAC,CAAC,QAAQ,EAAE;IACnE,MAAM,EAAE,CAAC,CAAC,KAAK,CAAC,CAAE,aAAa,EAAE,aAAa,CAAC,KAAK,EAAE,CAAE,CAAC,CAAC,QAAQ,EAAE;IACpE,sBAAsB,EAAE,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,CAAC,QAAQ,EAAE,CAAC,QAAQ,EAAE;CAChE,CAAC,CAAC;AAGH,MAAM,8BAA8B,GAAG,CAAC,CAAC,QAAQ,EAAE;KAChD,IAAI,CAAC,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC;KACrD,OAAO,CAAC,CAAC,CAAC,KAAK,CAAC,CAAE,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC,IAAI,EAAE,CAAE,CAAC,CAAC,CAAC;AAO9C,MAAM,CAAC,MAAM,oBAAoB,GAAG,CAAC,CAAC,MAAM,CAAC;IAC3C,KAAK,EAAE,CAAC,CAAC,MAAM,CAAC;QACd;;WAEG;QACH,SAAS,EAAE,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,CAAC,CAAC,QAAQ,EAAE;QACnD;;;WAGG;QACH,eAAe,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,CAAC,QAAQ,EAAE;QAC/C;;WAEG;QACH,SAAS,EAAE,8BAA8B,CAAC,QAAQ,EAAE;KACrD,CAAC,CAAC,OAAO,CAAC,EAAE,CAAC;CACf,CAAC,CAAC;AAGH,eAAe;IACb,QAAQ,EAAE,cAAc,CAAC,KAAK,CAAC,EAAE,CAAC;IAClC,MAAM,EAAE,oBAAoB,CAAC,KAAK,CAAC,EAAE,CAAC;CACvC,CAAC"}
@@ -0,0 +1,5 @@
1
+ import { SecurityConfig } from '../types.js';
2
+ declare const _default: {
3
+ security: SecurityConfig;
4
+ };
5
+ export default _default;
@@ -0,0 +1,8 @@
1
+ export default {
2
+ security: {
3
+ hsts: {
4
+ enable: false,
5
+ },
6
+ },
7
+ };
8
+ //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiY29uZmlnLmxvY2FsLmpzIiwic291cmNlUm9vdCI6IiIsInNvdXJjZXMiOlsiLi4vLi4vLi4vc3JjL2NvbmZpZy9jb25maWcubG9jYWwudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6IkFBRUEsZUFBZTtJQUNiLFFBQVEsRUFBRTtRQUNSLElBQUksRUFBRTtZQUNKLE1BQU0sRUFBRSxLQUFLO1NBQ2Q7S0FDZ0I7Q0FDcEIsQ0FBQyJ9
@@ -0,0 +1 @@
1
+ import './types.js';
@@ -0,0 +1,12 @@
1
+ import './types.js';
2
+ // module.exports = require('./app/middleware/securities');
3
+ // module.exports.csp = require('./lib/middlewares/csp');
4
+ // module.exports.csrf = require('./lib/middlewares/csrf');
5
+ // module.exports.methodNoAllow = require('./lib/middlewares/methodnoallow');
6
+ // module.exports.noopen = require('./lib/middlewares/noopen');
7
+ // module.exports.nosniff = require('./lib/middlewares/nosniff');
8
+ // module.exports.xssProtection = require('./lib/middlewares/xssProtection');
9
+ // module.exports.xframe = require('./lib/middlewares/xframe');
10
+ // module.exports.safeRedirect = require('./lib/safe_redirect');
11
+ // module.exports.utils = require('./lib/utils');
12
+ //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi9zcmMvaW5kZXgudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6IkFBQUEsT0FBTyxZQUFZLENBQUM7QUFFcEIsMkRBQTJEO0FBQzNELHlEQUF5RDtBQUN6RCwyREFBMkQ7QUFDM0QsNkVBQTZFO0FBQzdFLCtEQUErRDtBQUMvRCxpRUFBaUU7QUFDakUsNkVBQTZFO0FBQzdFLCtEQUErRDtBQUMvRCxnRUFBZ0U7QUFDaEUsaURBQWlEIn0=
@@ -0,0 +1,16 @@
1
+ import { EggCore } from '@eggjs/core';
2
+ import type { SSRFCheckAddressFunction } from '../../types.js';
3
+ type HttpClient = EggCore['HttpClient'];
4
+ type HttpClientParameters = Parameters<HttpClient['prototype']['request']>;
5
+ export type HttpClientRequestURL = HttpClientParameters[0];
6
+ export type HttpClientOptions = HttpClientParameters[1] & {
7
+ checkAddress?: SSRFCheckAddressFunction;
8
+ };
9
+ export type HttpClientResponse<T = any> = Awaited<ReturnType<HttpClient['prototype']['request']>> & {
10
+ data: T;
11
+ };
12
+ /**
13
+ * safe curl with ssrf protection
14
+ */
15
+ export declare function safeCurlForApplication<T = any>(app: EggCore, url: HttpClientRequestURL, options?: HttpClientOptions): Promise<import("urllib").HttpClientResponse<T>>;
16
+ export {};
@@ -0,0 +1,25 @@
1
+ const SSRF_HTTPCLIENT = Symbol('SSRF_HTTPCLIENT');
2
+ /**
3
+ * safe curl with ssrf protection
4
+ */
5
+ export async function safeCurlForApplication(app, url, options = {}) {
6
+ const ssrfConfig = app.config.security.ssrf;
7
+ if (ssrfConfig?.checkAddress) {
8
+ options.checkAddress = ssrfConfig.checkAddress;
9
+ }
10
+ else {
11
+ app.logger.warn('[@eggjs/security] please configure `config.security.ssrf` first');
12
+ }
13
+ if (ssrfConfig?.checkAddress) {
14
+ let httpClient = app[SSRF_HTTPCLIENT];
15
+ // use the new httpClient init with checkAddress
16
+ if (!httpClient) {
17
+ httpClient = app[SSRF_HTTPCLIENT] = app.createHttpClient({
18
+ checkAddress: ssrfConfig.checkAddress,
19
+ });
20
+ }
21
+ return await httpClient.request(url, options);
22
+ }
23
+ return await app.curl(url, options);
24
+ }
25
+ //# sourceMappingURL=data:application/json;base64,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
@@ -0,0 +1,4 @@
1
+ /**
2
+ * remote command execution
3
+ */
4
+ export default function cliFilter(text: string): string;
@@ -0,0 +1,17 @@
1
+ /**
2
+ * remote command execution
3
+ */
4
+ const BASIC_ALPHABETS = new Set('abcdefghijklmnopqrstuvwxyz1234567890ABCDEFGHIJKLMNOPQRSTUVWXYZ.-_'.split(''));
5
+ export default function cliFilter(text) {
6
+ const str = '' + text;
7
+ let res = '';
8
+ let ascii;
9
+ for (let index = 0; index < str.length; index++) {
10
+ ascii = str[index];
11
+ if (BASIC_ALPHABETS.has(ascii)) {
12
+ res += ascii;
13
+ }
14
+ }
15
+ return res;
16
+ }
17
+ //# sourceMappingURL=data:application/json;base64,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
@@ -0,0 +1,2 @@
1
+ import escapeHTML from 'escape-html';
2
+ export default escapeHTML;
@@ -0,0 +1,3 @@
1
+ import escapeHTML from 'escape-html';
2
+ export default escapeHTML;
3
+ //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiZXNjYXBlLmpzIiwic291cmNlUm9vdCI6IiIsInNvdXJjZXMiOlsiLi4vLi4vLi4vLi4vc3JjL2xpYi9oZWxwZXIvZXNjYXBlLnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiJBQUFBLE9BQU8sVUFBVSxNQUFNLGFBQWEsQ0FBQztBQUVyQyxlQUFlLFVBQVUsQ0FBQyJ9
@@ -0,0 +1 @@
1
+ export default function escapeShellArg(text: string): string;
@@ -0,0 +1,5 @@
1
+ export default function escapeShellArg(text) {
2
+ const str = '' + text;
3
+ return '\'' + str.replace(/\\/g, '\\\\').replace(/\'/g, '\\\'') + '\'';
4
+ }
5
+ //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiZXNjYXBlU2hlbGxBcmcuanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi8uLi8uLi9zcmMvbGliL2hlbHBlci9lc2NhcGVTaGVsbEFyZy50cyJdLCJuYW1lcyI6W10sIm1hcHBpbmdzIjoiQUFBQSxNQUFNLENBQUMsT0FBTyxVQUFVLGNBQWMsQ0FBQyxJQUFZO0lBQ2pELE1BQU0sR0FBRyxHQUFHLEVBQUUsR0FBRyxJQUFJLENBQUM7SUFDdEIsT0FBTyxJQUFJLEdBQUcsR0FBRyxDQUFDLE9BQU8sQ0FBQyxLQUFLLEVBQUUsTUFBTSxDQUFDLENBQUMsT0FBTyxDQUFDLEtBQUssRUFBRSxNQUFNLENBQUMsR0FBRyxJQUFJLENBQUM7QUFDekUsQ0FBQyJ9
@@ -0,0 +1 @@
1
+ export default function escapeShellCmd(text: string): string;
@@ -0,0 +1,14 @@
1
+ const BASIC_ALPHABETS = new Set('#&;`|*?~<>^()[]{}$;\'",\x0A\xFF'.split(''));
2
+ export default function escapeShellCmd(text) {
3
+ const str = '' + text;
4
+ let res = '';
5
+ let ascii;
6
+ for (let index = 0; index < str.length; index++) {
7
+ ascii = str[index];
8
+ if (!BASIC_ALPHABETS.has(ascii)) {
9
+ res += ascii;
10
+ }
11
+ }
12
+ return res;
13
+ }
14
+ //# sourceMappingURL=data:application/json;base64,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
@@ -0,0 +1,21 @@
1
+ import cliFilter from './cliFilter.js';
2
+ import escape from './escape.js';
3
+ import escapeShellArg from './escapeShellArg.js';
4
+ import escapeShellCmd from './escapeShellCmd.js';
5
+ import shtml from './shtml.js';
6
+ import sjs from './sjs.js';
7
+ import sjson from './sjson.js';
8
+ import spath from './spath.js';
9
+ import surl from './surl.js';
10
+ declare const _default: {
11
+ cliFilter: typeof cliFilter;
12
+ escape: typeof escape;
13
+ escapeShellArg: typeof escapeShellArg;
14
+ escapeShellCmd: typeof escapeShellCmd;
15
+ shtml: typeof shtml;
16
+ sjs: typeof sjs;
17
+ sjson: typeof sjson;
18
+ spath: typeof spath;
19
+ surl: typeof surl;
20
+ };
21
+ export default _default;
@@ -0,0 +1,21 @@
1
+ import cliFilter from './cliFilter.js';
2
+ import escape from './escape.js';
3
+ import escapeShellArg from './escapeShellArg.js';
4
+ import escapeShellCmd from './escapeShellCmd.js';
5
+ import shtml from './shtml.js';
6
+ import sjs from './sjs.js';
7
+ import sjson from './sjson.js';
8
+ import spath from './spath.js';
9
+ import surl from './surl.js';
10
+ export default {
11
+ cliFilter,
12
+ escape,
13
+ escapeShellArg,
14
+ escapeShellCmd,
15
+ shtml,
16
+ sjs,
17
+ sjson,
18
+ spath,
19
+ surl,
20
+ };
21
+ //# sourceMappingURL=data:application/json;base64,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
@@ -0,0 +1,2 @@
1
+ import type { BaseContextClass } from '@eggjs/core';
2
+ export default function shtml(this: BaseContextClass, val: string): string;
@@ -0,0 +1,70 @@
1
+ import xss from 'xss';
2
+ import { isSafeDomain, getFromUrl } from '../utils.js';
3
+ const BUILD_IN_ON_TAG_ATTR = Symbol('buildInOnTagAttr');
4
+ // default rule: https://github.com/leizongmin/js-xss/blob/master/lib/default.js
5
+ // add domain filter based on xss module
6
+ // custom options http://jsxss.com/zh/options.html
7
+ // eg: support a tag,filter attributes except for title : whiteList: {a: ['title']}
8
+ export default function shtml(val) {
9
+ if (typeof val !== 'string') {
10
+ return val;
11
+ }
12
+ const securityOptions = this.ctx.securityOptions;
13
+ let buildInOnTagAttrHandler;
14
+ const shtmlConfig = {
15
+ ...this.app.config.helper.shtml,
16
+ ...securityOptions.shtml,
17
+ [BUILD_IN_ON_TAG_ATTR]: buildInOnTagAttrHandler,
18
+ };
19
+ const domainWhiteList = this.app.config.security.domainWhiteList;
20
+ const app = this.app;
21
+ // filter href and src attribute if not in domain white list
22
+ if (!shtmlConfig[BUILD_IN_ON_TAG_ATTR]) {
23
+ shtmlConfig[BUILD_IN_ON_TAG_ATTR] = (_tag, name, value, isWhiteAttr) => {
24
+ if (isWhiteAttr && (name === 'href' || name === 'src')) {
25
+ if (!value) {
26
+ return;
27
+ }
28
+ value = String(value);
29
+ if (value[0] === '/' || value[0] === '#') {
30
+ return;
31
+ }
32
+ const hostname = getFromUrl(value, 'hostname');
33
+ if (!hostname) {
34
+ return;
35
+ }
36
+ // If we don't have our hostname in the app.security.domainWhiteList,
37
+ // Just check for `shtmlConfig.domainWhiteList` and `ctx.whiteList`.
38
+ if (!isSafeDomain(hostname, domainWhiteList)) {
39
+ // Check for `shtmlConfig.domainWhiteList` first (duplicated now)
40
+ if (shtmlConfig.domainWhiteList && shtmlConfig.domainWhiteList.length > 0) {
41
+ app.deprecate('[@eggjs/security/lib/helper/shtml] `config.helper.shtml.domainWhiteList` has been deprecate. Please use `config.security.domainWhiteList` instead.');
42
+ if (!isSafeDomain(hostname, shtmlConfig.domainWhiteList)) {
43
+ return '';
44
+ }
45
+ }
46
+ else {
47
+ return '';
48
+ }
49
+ }
50
+ }
51
+ };
52
+ // avoid overriding user configuration 'onTagAttr'
53
+ if (shtmlConfig.onTagAttr) {
54
+ const customOnTagAttrHandler = shtmlConfig.onTagAttr;
55
+ shtmlConfig.onTagAttr = function (tag, name, value, isWhiteAttr) {
56
+ const result = customOnTagAttrHandler.apply(this, [tag, name, value, isWhiteAttr]);
57
+ if (result !== undefined) {
58
+ return result;
59
+ }
60
+ // fallback to build-in handler
61
+ return shtmlConfig[BUILD_IN_ON_TAG_ATTR].apply(this, [tag, name, value, isWhiteAttr]);
62
+ };
63
+ }
64
+ else {
65
+ shtmlConfig.onTagAttr = shtmlConfig[BUILD_IN_ON_TAG_ATTR];
66
+ }
67
+ }
68
+ return xss(val, shtmlConfig);
69
+ }
70
+ //# sourceMappingURL=data:application/json;base64,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
@@ -0,0 +1,4 @@
1
+ /**
2
+ * Escape JavaScript to \xHH format
3
+ */
4
+ export default function escapeJavaScript(text: string): string;