@eggjs/security 4.0.1 → 5.0.0-beta.15

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (252) hide show
  1. package/README.md +46 -66
  2. package/README.zh-CN.md +56 -68
  3. package/dist/agent.d.ts +10 -0
  4. package/dist/agent.js +15 -0
  5. package/dist/app/extend/agent.d.ts +14 -0
  6. package/dist/app/extend/agent.js +12 -0
  7. package/dist/app/extend/application.d.ts +20 -0
  8. package/dist/app/extend/application.js +32 -0
  9. package/dist/app/extend/context.d.ts +74 -0
  10. package/dist/app/extend/context.js +191 -0
  11. package/dist/app/extend/helper.d.ts +24 -0
  12. package/dist/app/extend/helper.js +7 -0
  13. package/dist/app/extend/response.d.ts +45 -0
  14. package/dist/app/extend/response.js +70 -0
  15. package/dist/app/middleware/securities.d.ts +8 -0
  16. package/dist/app/middleware/securities.js +39 -0
  17. package/dist/app.d.ts +10 -0
  18. package/dist/app.js +24 -0
  19. package/dist/config/config.default.d.ts +874 -0
  20. package/dist/config/config.default.js +170 -0
  21. package/dist/config/config.local.d.ts +6 -0
  22. package/dist/config/config.local.js +5 -0
  23. package/dist/index.d.ts +1 -0
  24. package/dist/index.js +3 -0
  25. package/dist/lib/extend/safe_curl.d.ts +20 -0
  26. package/dist/lib/extend/safe_curl.js +19 -0
  27. package/dist/lib/helper/cliFilter.d.ts +7 -0
  28. package/dist/lib/helper/cliFilter.js +18 -0
  29. package/dist/lib/helper/escape.d.ts +2 -0
  30. package/dist/lib/helper/escape.js +7 -0
  31. package/dist/lib/helper/escapeShellArg.d.ts +4 -0
  32. package/dist/lib/helper/escapeShellArg.js +7 -0
  33. package/dist/lib/helper/escapeShellCmd.d.ts +4 -0
  34. package/dist/lib/helper/escapeShellCmd.js +15 -0
  35. package/dist/lib/helper/index.d.ts +24 -0
  36. package/dist/lib/helper/index.js +25 -0
  37. package/dist/lib/helper/shtml.d.ts +6 -0
  38. package/dist/lib/helper/shtml.js +53 -0
  39. package/dist/lib/helper/sjs.d.ts +7 -0
  40. package/dist/lib/helper/sjs.js +36 -0
  41. package/dist/lib/helper/sjson.d.ts +4 -0
  42. package/dist/lib/helper/sjson.js +32 -0
  43. package/dist/lib/helper/spath.d.ts +7 -0
  44. package/dist/lib/helper/spath.js +16 -0
  45. package/dist/lib/helper/surl.d.ts +6 -0
  46. package/dist/lib/helper/surl.js +25 -0
  47. package/dist/lib/middlewares/csp.d.ts +7 -0
  48. package/dist/lib/middlewares/csp.js +46 -0
  49. package/dist/lib/middlewares/csrf.d.ts +7 -0
  50. package/dist/lib/middlewares/csrf.js +33 -0
  51. package/dist/lib/middlewares/dta.d.ts +6 -0
  52. package/dist/lib/middlewares/dta.js +13 -0
  53. package/dist/lib/middlewares/hsts.d.ts +7 -0
  54. package/dist/lib/middlewares/hsts.js +19 -0
  55. package/dist/lib/middlewares/index.d.ts +18 -0
  56. package/dist/lib/middlewares/index.js +27 -0
  57. package/dist/lib/middlewares/methodnoallow.d.ts +6 -0
  58. package/dist/lib/middlewares/methodnoallow.js +15 -0
  59. package/dist/lib/middlewares/noopen.d.ts +7 -0
  60. package/dist/lib/middlewares/noopen.js +17 -0
  61. package/dist/lib/middlewares/nosniff.d.ts +7 -0
  62. package/dist/lib/middlewares/nosniff.js +27 -0
  63. package/dist/lib/middlewares/referrerPolicy.d.ts +7 -0
  64. package/dist/lib/middlewares/referrerPolicy.js +31 -0
  65. package/dist/lib/middlewares/xframe.d.ts +7 -0
  66. package/dist/lib/middlewares/xframe.js +18 -0
  67. package/dist/lib/middlewares/xssProtection.d.ts +7 -0
  68. package/dist/lib/middlewares/xssProtection.js +17 -0
  69. package/dist/lib/utils.d.ts +24 -0
  70. package/dist/lib/utils.js +127 -0
  71. package/dist/types.d.ts +12 -0
  72. package/dist/types.js +5 -0
  73. package/package.json +74 -70
  74. package/dist/commonjs/agent.d.ts +0 -6
  75. package/dist/commonjs/agent.js +0 -14
  76. package/dist/commonjs/app/extend/agent.d.ts +0 -5
  77. package/dist/commonjs/app/extend/agent.js +0 -11
  78. package/dist/commonjs/app/extend/application.d.ts +0 -16
  79. package/dist/commonjs/app/extend/application.js +0 -35
  80. package/dist/commonjs/app/extend/context.d.ts +0 -68
  81. package/dist/commonjs/app/extend/context.js +0 -283
  82. package/dist/commonjs/app/extend/helper.d.ts +0 -12
  83. package/dist/commonjs/app/extend/helper.js +0 -10
  84. package/dist/commonjs/app/extend/response.d.ts +0 -41
  85. package/dist/commonjs/app/extend/response.js +0 -85
  86. package/dist/commonjs/app/middleware/securities.d.ts +0 -4
  87. package/dist/commonjs/app/middleware/securities.js +0 -55
  88. package/dist/commonjs/app.d.ts +0 -6
  89. package/dist/commonjs/app.js +0 -29
  90. package/dist/commonjs/config/config.default.d.ts +0 -871
  91. package/dist/commonjs/config/config.default.js +0 -357
  92. package/dist/commonjs/config/config.local.d.ts +0 -5
  93. package/dist/commonjs/config/config.local.js +0 -10
  94. package/dist/commonjs/index.d.ts +0 -1
  95. package/dist/commonjs/index.js +0 -4
  96. package/dist/commonjs/lib/extend/safe_curl.d.ts +0 -16
  97. package/dist/commonjs/lib/extend/safe_curl.js +0 -28
  98. package/dist/commonjs/lib/helper/cliFilter.d.ts +0 -4
  99. package/dist/commonjs/lib/helper/cliFilter.js +0 -20
  100. package/dist/commonjs/lib/helper/escape.d.ts +0 -2
  101. package/dist/commonjs/lib/helper/escape.js +0 -8
  102. package/dist/commonjs/lib/helper/escapeShellArg.d.ts +0 -1
  103. package/dist/commonjs/lib/helper/escapeShellArg.js +0 -8
  104. package/dist/commonjs/lib/helper/escapeShellCmd.d.ts +0 -1
  105. package/dist/commonjs/lib/helper/escapeShellCmd.js +0 -17
  106. package/dist/commonjs/lib/helper/index.d.ts +0 -21
  107. package/dist/commonjs/lib/helper/index.js +0 -26
  108. package/dist/commonjs/lib/helper/shtml.d.ts +0 -2
  109. package/dist/commonjs/lib/helper/shtml.js +0 -76
  110. package/dist/commonjs/lib/helper/sjs.d.ts +0 -4
  111. package/dist/commonjs/lib/helper/sjs.js +0 -52
  112. package/dist/commonjs/lib/helper/sjson.d.ts +0 -1
  113. package/dist/commonjs/lib/helper/sjson.js +0 -45
  114. package/dist/commonjs/lib/helper/spath.d.ts +0 -5
  115. package/dist/commonjs/lib/helper/spath.js +0 -28
  116. package/dist/commonjs/lib/helper/surl.d.ts +0 -2
  117. package/dist/commonjs/lib/helper/surl.js +0 -33
  118. package/dist/commonjs/lib/middlewares/csp.d.ts +0 -4
  119. package/dist/commonjs/lib/middlewares/csp.js +0 -68
  120. package/dist/commonjs/lib/middlewares/csrf.d.ts +0 -4
  121. package/dist/commonjs/lib/middlewares/csrf.js +0 -42
  122. package/dist/commonjs/lib/middlewares/dta.d.ts +0 -3
  123. package/dist/commonjs/lib/middlewares/dta.js +0 -14
  124. package/dist/commonjs/lib/middlewares/hsts.d.ts +0 -4
  125. package/dist/commonjs/lib/middlewares/hsts.js +0 -23
  126. package/dist/commonjs/lib/middlewares/index.d.ts +0 -13
  127. package/dist/commonjs/lib/middlewares/index.js +0 -28
  128. package/dist/commonjs/lib/middlewares/methodnoallow.d.ts +0 -3
  129. package/dist/commonjs/lib/middlewares/methodnoallow.js +0 -22
  130. package/dist/commonjs/lib/middlewares/noopen.d.ts +0 -4
  131. package/dist/commonjs/lib/middlewares/noopen.js +0 -17
  132. package/dist/commonjs/lib/middlewares/nosniff.d.ts +0 -4
  133. package/dist/commonjs/lib/middlewares/nosniff.js +0 -30
  134. package/dist/commonjs/lib/middlewares/referrerPolicy.d.ts +0 -4
  135. package/dist/commonjs/lib/middlewares/referrerPolicy.js +0 -36
  136. package/dist/commonjs/lib/middlewares/xframe.d.ts +0 -4
  137. package/dist/commonjs/lib/middlewares/xframe.js +0 -19
  138. package/dist/commonjs/lib/middlewares/xssProtection.d.ts +0 -4
  139. package/dist/commonjs/lib/middlewares/xssProtection.js +0 -16
  140. package/dist/commonjs/lib/utils.d.ts +0 -19
  141. package/dist/commonjs/lib/utils.js +0 -206
  142. package/dist/commonjs/package.json +0 -3
  143. package/dist/commonjs/types.d.ts +0 -10
  144. package/dist/commonjs/types.js +0 -5
  145. package/dist/esm/agent.d.ts +0 -6
  146. package/dist/esm/agent.js +0 -11
  147. package/dist/esm/app/extend/agent.d.ts +0 -5
  148. package/dist/esm/app/extend/agent.js +0 -8
  149. package/dist/esm/app/extend/application.d.ts +0 -16
  150. package/dist/esm/app/extend/application.js +0 -32
  151. package/dist/esm/app/extend/context.d.ts +0 -68
  152. package/dist/esm/app/extend/context.js +0 -244
  153. package/dist/esm/app/extend/helper.d.ts +0 -12
  154. package/dist/esm/app/extend/helper.js +0 -5
  155. package/dist/esm/app/extend/response.d.ts +0 -41
  156. package/dist/esm/app/extend/response.js +0 -82
  157. package/dist/esm/app/middleware/securities.d.ts +0 -4
  158. package/dist/esm/app/middleware/securities.js +0 -50
  159. package/dist/esm/app.d.ts +0 -6
  160. package/dist/esm/app.js +0 -26
  161. package/dist/esm/config/config.default.d.ts +0 -871
  162. package/dist/esm/config/config.default.js +0 -351
  163. package/dist/esm/config/config.local.d.ts +0 -5
  164. package/dist/esm/config/config.local.js +0 -8
  165. package/dist/esm/index.d.ts +0 -1
  166. package/dist/esm/index.js +0 -2
  167. package/dist/esm/lib/extend/safe_curl.d.ts +0 -16
  168. package/dist/esm/lib/extend/safe_curl.js +0 -25
  169. package/dist/esm/lib/helper/cliFilter.d.ts +0 -4
  170. package/dist/esm/lib/helper/cliFilter.js +0 -17
  171. package/dist/esm/lib/helper/escape.d.ts +0 -2
  172. package/dist/esm/lib/helper/escape.js +0 -3
  173. package/dist/esm/lib/helper/escapeShellArg.d.ts +0 -1
  174. package/dist/esm/lib/helper/escapeShellArg.js +0 -5
  175. package/dist/esm/lib/helper/escapeShellCmd.d.ts +0 -1
  176. package/dist/esm/lib/helper/escapeShellCmd.js +0 -14
  177. package/dist/esm/lib/helper/index.d.ts +0 -21
  178. package/dist/esm/lib/helper/index.js +0 -21
  179. package/dist/esm/lib/helper/shtml.d.ts +0 -2
  180. package/dist/esm/lib/helper/shtml.js +0 -70
  181. package/dist/esm/lib/helper/sjs.d.ts +0 -4
  182. package/dist/esm/lib/helper/sjs.js +0 -49
  183. package/dist/esm/lib/helper/sjson.d.ts +0 -1
  184. package/dist/esm/lib/helper/sjson.js +0 -39
  185. package/dist/esm/lib/helper/spath.d.ts +0 -5
  186. package/dist/esm/lib/helper/spath.js +0 -25
  187. package/dist/esm/lib/helper/surl.d.ts +0 -2
  188. package/dist/esm/lib/helper/surl.js +0 -30
  189. package/dist/esm/lib/middlewares/csp.d.ts +0 -4
  190. package/dist/esm/lib/middlewares/csp.js +0 -63
  191. package/dist/esm/lib/middlewares/csrf.d.ts +0 -4
  192. package/dist/esm/lib/middlewares/csrf.js +0 -37
  193. package/dist/esm/lib/middlewares/dta.d.ts +0 -3
  194. package/dist/esm/lib/middlewares/dta.js +0 -12
  195. package/dist/esm/lib/middlewares/hsts.d.ts +0 -4
  196. package/dist/esm/lib/middlewares/hsts.js +0 -21
  197. package/dist/esm/lib/middlewares/index.d.ts +0 -13
  198. package/dist/esm/lib/middlewares/index.js +0 -23
  199. package/dist/esm/lib/middlewares/methodnoallow.d.ts +0 -3
  200. package/dist/esm/lib/middlewares/methodnoallow.js +0 -20
  201. package/dist/esm/lib/middlewares/noopen.d.ts +0 -4
  202. package/dist/esm/lib/middlewares/noopen.js +0 -15
  203. package/dist/esm/lib/middlewares/nosniff.d.ts +0 -4
  204. package/dist/esm/lib/middlewares/nosniff.js +0 -28
  205. package/dist/esm/lib/middlewares/referrerPolicy.d.ts +0 -4
  206. package/dist/esm/lib/middlewares/referrerPolicy.js +0 -34
  207. package/dist/esm/lib/middlewares/xframe.d.ts +0 -4
  208. package/dist/esm/lib/middlewares/xframe.js +0 -17
  209. package/dist/esm/lib/middlewares/xssProtection.d.ts +0 -4
  210. package/dist/esm/lib/middlewares/xssProtection.js +0 -14
  211. package/dist/esm/lib/utils.d.ts +0 -19
  212. package/dist/esm/lib/utils.js +0 -194
  213. package/dist/esm/package.json +0 -3
  214. package/dist/esm/types.d.ts +0 -10
  215. package/dist/esm/types.js +0 -3
  216. package/dist/package.json +0 -4
  217. package/src/agent.ts +0 -14
  218. package/src/app/extend/agent.ts +0 -14
  219. package/src/app/extend/application.ts +0 -51
  220. package/src/app/extend/context.ts +0 -285
  221. package/src/app/extend/helper.ts +0 -5
  222. package/src/app/extend/response.ts +0 -95
  223. package/src/app/middleware/securities.ts +0 -63
  224. package/src/app.ts +0 -31
  225. package/src/config/config.default.ts +0 -379
  226. package/src/config/config.local.ts +0 -9
  227. package/src/index.ts +0 -1
  228. package/src/lib/extend/safe_curl.ts +0 -35
  229. package/src/lib/helper/cliFilter.ts +0 -20
  230. package/src/lib/helper/escape.ts +0 -3
  231. package/src/lib/helper/escapeShellArg.ts +0 -4
  232. package/src/lib/helper/escapeShellCmd.ts +0 -16
  233. package/src/lib/helper/index.ts +0 -21
  234. package/src/lib/helper/shtml.ts +0 -77
  235. package/src/lib/helper/sjs.ts +0 -57
  236. package/src/lib/helper/sjson.ts +0 -35
  237. package/src/lib/helper/spath.ts +0 -27
  238. package/src/lib/helper/surl.ts +0 -35
  239. package/src/lib/middlewares/csp.ts +0 -70
  240. package/src/lib/middlewares/csrf.ts +0 -44
  241. package/src/lib/middlewares/dta.ts +0 -13
  242. package/src/lib/middlewares/hsts.ts +0 -24
  243. package/src/lib/middlewares/index.ts +0 -23
  244. package/src/lib/middlewares/methodnoallow.ts +0 -23
  245. package/src/lib/middlewares/noopen.ts +0 -18
  246. package/src/lib/middlewares/nosniff.ts +0 -32
  247. package/src/lib/middlewares/referrerPolicy.ts +0 -39
  248. package/src/lib/middlewares/xframe.ts +0 -20
  249. package/src/lib/middlewares/xssProtection.ts +0 -17
  250. package/src/lib/utils.ts +0 -208
  251. package/src/types.ts +0 -16
  252. package/src/typings/index.d.ts +0 -4
@@ -1,244 +0,0 @@
1
- import { debuglog } from 'node:util';
2
- import { nanoid } from 'nanoid/non-secure';
3
- import Tokens from 'csrf';
4
- import { Context } from '@eggjs/core';
5
- import * as utils from '../../lib/utils.js';
6
- const debug = debuglog('@eggjs/security/app/extend/context');
7
- const tokens = new Tokens();
8
- const CSRF_SECRET = Symbol('egg-security#CSRF_SECRET');
9
- const _CSRF_SECRET = Symbol('egg-security#_CSRF_SECRET');
10
- const NEW_CSRF_SECRET = Symbol('egg-security#NEW_CSRF_SECRET');
11
- const LOG_CSRF_NOTICE = Symbol('egg-security#LOG_CSRF_NOTICE');
12
- const INPUT_TOKEN = Symbol('egg-security#INPUT_TOKEN');
13
- const NONCE_CACHE = Symbol('egg-security#NONCE_CACHE');
14
- const SECURITY_OPTIONS = Symbol('egg-security#SECURITY_OPTIONS');
15
- const CSRF_REFERER_CHECK = Symbol('egg-security#CSRF_REFERER_CHECK');
16
- const CSRF_CTOKEN_CHECK = Symbol('egg-security#CSRF_CTOKEN_CHECK');
17
- function findToken(obj, keys) {
18
- if (!obj)
19
- return;
20
- if (!keys || !keys.length)
21
- return;
22
- if (typeof keys === 'string')
23
- return obj[keys];
24
- for (const key of keys) {
25
- if (obj[key])
26
- return obj[key];
27
- }
28
- }
29
- export default class SecurityContext extends Context {
30
- get securityOptions() {
31
- if (!this[SECURITY_OPTIONS]) {
32
- this[SECURITY_OPTIONS] = {};
33
- }
34
- return this[SECURITY_OPTIONS];
35
- }
36
- /**
37
- * Check whether the specific `domain` is in / matches the whiteList or not.
38
- * @param {string} domain The assigned domain.
39
- * @param {Array<string>} [customWhiteList] The custom white list for domain.
40
- * @return {boolean} If the domain is in / matches the whiteList, return true;
41
- * otherwise false.
42
- */
43
- isSafeDomain(domain, customWhiteList) {
44
- const domainWhiteList = customWhiteList && customWhiteList.length > 0 ? customWhiteList : this.app.config.security.domainWhiteList;
45
- return utils.isSafeDomain(domain, domainWhiteList);
46
- }
47
- // Add nonce, random characters will be OK.
48
- // https://w3c.github.io/webappsec/specs/content-security-policy/#nonce_source
49
- get nonce() {
50
- if (!this[NONCE_CACHE]) {
51
- this[NONCE_CACHE] = nanoid(16);
52
- }
53
- return this[NONCE_CACHE];
54
- }
55
- /**
56
- * get csrf token, general use in template
57
- * @return {String} csrf token
58
- * @public
59
- */
60
- get csrf() {
61
- // csrfSecret can be rotate, use NEW_CSRF_SECRET first
62
- const secret = this[NEW_CSRF_SECRET] || this[CSRF_SECRET];
63
- debug('get csrf token, NEW_CSRF_SECRET: %s, _CSRF_SECRET: %s', this[NEW_CSRF_SECRET], this[CSRF_SECRET]);
64
- // In order to protect against BREACH attacks,
65
- // the token is not simply the secret;
66
- // a random salt is prepended to the secret and used to scramble it.
67
- // http://breachattack.com/
68
- return secret ? tokens.create(secret) : '';
69
- }
70
- /**
71
- * get csrf secret from session or cookie
72
- * @return {String} csrf secret
73
- * @private
74
- */
75
- get [CSRF_SECRET]() {
76
- if (this[_CSRF_SECRET]) {
77
- return this[_CSRF_SECRET];
78
- }
79
- let { useSession, sessionName, cookieName: cookieNames, cookieOptions, } = this.app.config.security.csrf;
80
- // get secret from session or cookie
81
- if (useSession) {
82
- this[_CSRF_SECRET] = this.session[sessionName] || '';
83
- }
84
- else {
85
- // cookieName support array. so we can change csrf cookie name smoothly
86
- if (!Array.isArray(cookieNames)) {
87
- cookieNames = [cookieNames];
88
- }
89
- for (const cookieName of cookieNames) {
90
- this[_CSRF_SECRET] = this.cookies.get(cookieName, { signed: cookieOptions.signed }) || '';
91
- if (this[_CSRF_SECRET]) {
92
- break;
93
- }
94
- }
95
- }
96
- return this[_CSRF_SECRET];
97
- }
98
- /**
99
- * ensure csrf secret exists in session or cookie.
100
- * @param {Boolean} [rotate] reset secret even if the secret exists
101
- * @public
102
- */
103
- ensureCsrfSecret(rotate) {
104
- if (this[CSRF_SECRET] && !rotate)
105
- return;
106
- debug('ensure csrf secret, exists: %s, rotate; %s', this[CSRF_SECRET], rotate);
107
- const secret = tokens.secretSync();
108
- this[NEW_CSRF_SECRET] = secret;
109
- let { useSession, sessionName, cookieDomain, cookieName: cookieNames, cookieOptions, } = this.app.config.security.csrf;
110
- if (useSession) {
111
- // TODO(fengmk2): need to refactor egg-session plugin to support ctx.session type define
112
- this.session[sessionName] = secret;
113
- }
114
- else {
115
- if (typeof cookieDomain === 'function') {
116
- cookieDomain = cookieDomain(this);
117
- }
118
- const cookieOpts = {
119
- domain: cookieDomain,
120
- ...cookieOptions,
121
- };
122
- // cookieName support array. so we can change csrf cookie name smoothly
123
- if (!Array.isArray(cookieNames)) {
124
- cookieNames = [cookieNames];
125
- }
126
- for (const cookieName of cookieNames) {
127
- this.cookies.set(cookieName, secret, cookieOpts);
128
- }
129
- }
130
- }
131
- get [INPUT_TOKEN]() {
132
- const { headerName, bodyName, queryName } = this.app.config.security.csrf;
133
- // try order: query, body, header
134
- const token = findToken(this.request.query, queryName)
135
- || findToken(this.request.body, bodyName)
136
- || (headerName && this.request.get(headerName));
137
- debug('get token: %j, secret: %j', token, this[CSRF_SECRET]);
138
- return token;
139
- }
140
- /**
141
- * rotate csrf secret exists in session or cookie.
142
- * must rotate the secret when user login
143
- * @public
144
- */
145
- rotateCsrfSecret() {
146
- if (!this[NEW_CSRF_SECRET] && this[CSRF_SECRET]) {
147
- this.ensureCsrfSecret(true);
148
- }
149
- }
150
- /**
151
- * assert csrf token/referer is present
152
- * @public
153
- */
154
- assertCsrf() {
155
- if (utils.checkIfIgnore(this.app.config.security.csrf, this)) {
156
- debug('%s, ignore by csrf options', this.path);
157
- return;
158
- }
159
- const { type } = this.app.config.security.csrf;
160
- let message;
161
- const messages = [];
162
- switch (type) {
163
- case 'ctoken':
164
- message = this[CSRF_CTOKEN_CHECK]();
165
- if (message)
166
- this.throw(403, message);
167
- break;
168
- case 'referer':
169
- message = this[CSRF_REFERER_CHECK]();
170
- if (message)
171
- this.throw(403, message);
172
- break;
173
- case 'all':
174
- message = this[CSRF_CTOKEN_CHECK]();
175
- if (message)
176
- this.throw(403, message);
177
- message = this[CSRF_REFERER_CHECK]();
178
- if (message)
179
- this.throw(403, message);
180
- break;
181
- case 'any':
182
- message = this[CSRF_CTOKEN_CHECK]();
183
- if (!message)
184
- return;
185
- messages.push(message);
186
- message = this[CSRF_REFERER_CHECK]();
187
- if (!message)
188
- return;
189
- messages.push(message);
190
- this.throw(403, `both ctoken and referer check error: ${messages.join(', ')}`);
191
- break;
192
- default:
193
- this.throw(`invalid type ${type}`);
194
- }
195
- }
196
- [CSRF_CTOKEN_CHECK]() {
197
- if (!this[CSRF_SECRET]) {
198
- debug('missing csrf token');
199
- this[LOG_CSRF_NOTICE]('missing csrf token');
200
- return 'missing csrf token';
201
- }
202
- const token = this[INPUT_TOKEN];
203
- // AJAX requests get csrf token from cookie, in this situation token will equal to secret
204
- // synchronize form requests' token always changing to protect against BREACH attacks
205
- if (token !== this[CSRF_SECRET] && !tokens.verify(this[CSRF_SECRET], token)) {
206
- debug('verify secret and token error');
207
- this[LOG_CSRF_NOTICE]('invalid csrf token');
208
- const { rotateWhenInvalid } = this.app.config.security.csrf;
209
- if (rotateWhenInvalid) {
210
- this.rotateCsrfSecret();
211
- }
212
- return 'invalid csrf token';
213
- }
214
- }
215
- [CSRF_REFERER_CHECK]() {
216
- const { refererWhiteList } = this.app.config.security.csrf;
217
- // check Origin/Referer headers
218
- const referer = (this.headers.referer || this.headers.origin || '').toLowerCase();
219
- if (!referer) {
220
- debug('missing csrf referer or origin');
221
- this[LOG_CSRF_NOTICE]('missing csrf referer or origin');
222
- return 'missing csrf referer or origin';
223
- }
224
- const host = utils.getFromUrl(referer, 'host');
225
- const domainList = refererWhiteList.concat(this.host);
226
- if (!host || !utils.isSafeDomain(host, domainList)) {
227
- debug('verify referer or origin error');
228
- this[LOG_CSRF_NOTICE]('invalid csrf referer or origin');
229
- return 'invalid csrf referer or origin';
230
- }
231
- }
232
- [LOG_CSRF_NOTICE](msg) {
233
- if (this.app.config.env === 'local') {
234
- this.logger.warn(`${msg}. See https://eggjs.org/zh-cn/core/security.html#安全威胁csrf的防范`);
235
- }
236
- }
237
- async safeCurl(url, options) {
238
- return await this.app.safeCurl(url, options);
239
- }
240
- unsafeRedirect(url, alt) {
241
- this.response.unsafeRedirect(url, alt);
242
- }
243
- }
244
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"context.js","sourceRoot":"","sources":["../../../../src/app/extend/context.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,QAAQ,EAAE,MAAM,WAAW,CAAC;AACrC,OAAO,EAAE,MAAM,EAAE,MAAM,mBAAmB,CAAC;AAC3C,OAAO,MAAM,MAAM,MAAM,CAAC;AAC1B,OAAO,EAAE,OAAO,EAAE,MAAM,aAAa,CAAC;AACtC,OAAO,KAAK,KAAK,MAAM,oBAAoB,CAAC;AAQ5C,MAAM,KAAK,GAAG,QAAQ,CAAC,oCAAoC,CAAC,CAAC;AAE7D,MAAM,MAAM,GAAG,IAAI,MAAM,EAAE,CAAC;AAE5B,MAAM,WAAW,GAAG,MAAM,CAAC,0BAA0B,CAAC,CAAC;AACvD,MAAM,YAAY,GAAG,MAAM,CAAC,2BAA2B,CAAC,CAAC;AACzD,MAAM,eAAe,GAAG,MAAM,CAAC,8BAA8B,CAAC,CAAC;AAC/D,MAAM,eAAe,GAAG,MAAM,CAAC,8BAA8B,CAAC,CAAC;AAC/D,MAAM,WAAW,GAAG,MAAM,CAAC,0BAA0B,CAAC,CAAC;AACvD,MAAM,WAAW,GAAG,MAAM,CAAC,0BAA0B,CAAC,CAAC;AACvD,MAAM,gBAAgB,GAAG,MAAM,CAAC,+BAA+B,CAAC,CAAC;AACjE,MAAM,kBAAkB,GAAG,MAAM,CAAC,iCAAiC,CAAC,CAAC;AACrE,MAAM,iBAAiB,GAAG,MAAM,CAAC,gCAAgC,CAAC,CAAC;AAEnE,SAAS,SAAS,CAAC,GAA2B,EAAE,IAAuB;IACrE,IAAI,CAAC,GAAG;QAAE,OAAO;IACjB,IAAI,CAAC,IAAI,IAAI,CAAC,IAAI,CAAC,MAAM;QAAE,OAAO;IAClC,IAAI,OAAO,IAAI,KAAK,QAAQ;QAAE,OAAO,GAAG,CAAC,IAAI,CAAC,CAAC;IAC/C,KAAK,MAAM,GAAG,IAAI,IAAI,EAAE,CAAC;QACvB,IAAI,GAAG,CAAC,GAAG,CAAC;YAAE,OAAO,GAAG,CAAC,GAAG,CAAC,CAAC;IAChC,CAAC;AACH,CAAC;AAED,MAAM,CAAC,OAAO,OAAO,eAAgB,SAAQ,OAAO;IAClD,IAAI,eAAe;QACjB,IAAI,CAAC,IAAI,CAAC,gBAAgB,CAAC,EAAE,CAAC;YAC5B,IAAI,CAAC,gBAAgB,CAAC,GAAG,EAAE,CAAC;QAC9B,CAAC;QACD,OAAO,IAAI,CAAC,gBAAgB,CAA4B,CAAC;IAC3D,CAAC;IAED;;;;;;OAMG;IACH,YAAY,CAAC,MAAc,EAAE,eAA0B;QACrD,MAAM,eAAe,GACnB,eAAe,IAAI,eAAe,CAAC,MAAM,GAAG,CAAC,CAAC,CAAC,CAAC,eAAe,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,MAAM,CAAC,QAAQ,CAAC,eAAe,CAAC;QAC7G,OAAO,KAAK,CAAC,YAAY,CAAC,MAAM,EAAE,eAAe,CAAC,CAAC;IACrD,CAAC;IAED,2CAA2C;IAC3C,8EAA8E;IAC9E,IAAI,KAAK;QACP,IAAI,CAAC,IAAI,CAAC,WAAW,CAAC,EAAE,CAAC;YACvB,IAAI,CAAC,WAAW,CAAC,GAAG,MAAM,CAAC,EAAE,CAAC,CAAC;QACjC,CAAC;QACD,OAAO,IAAI,CAAC,WAAW,CAAW,CAAC;IACrC,CAAC;IAED;;;;OAIG;IACH,IAAI,IAAI;QACN,sDAAsD;QACtD,MAAM,MAAM,GAAG,IAAI,CAAC,eAAe,CAAC,IAAI,IAAI,CAAC,WAAW,CAAC,CAAC;QAC1D,KAAK,CAAC,uDAAuD,EAAE,IAAI,CAAC,eAAe,CAAC,EAAE,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC;QACzG,+CAA+C;QAC/C,uCAAuC;QACvC,qEAAqE;QACrE,4BAA4B;QAC5B,OAAO,MAAM,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,MAAgB,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC;IACvD,CAAC;IAED;;;;OAIG;IACH,IAAI,CAAC,WAAW,CAAC;QACf,IAAI,IAAI,CAAC,YAAY,CAAC,EAAE,CAAC;YACvB,OAAO,IAAI,CAAC,YAAY,CAAW,CAAC;QACtC,CAAC;QACD,IAAI,EACF,UAAU,EAAE,WAAW,EACvB,UAAU,EAAE,WAAW,EACvB,aAAa,GACd,GAAG,IAAI,CAAC,GAAG,CAAC,MAAM,CAAC,QAAQ,CAAC,IAAI,CAAC;QAClC,oCAAoC;QACpC,IAAI,UAAU,EAAE,CAAC;YACf,IAAI,CAAC,YAAY,CAAC,GAAI,IAAI,CAAC,OAAe,CAAC,WAAW,CAAC,IAAI,EAAE,CAAC;QAChE,CAAC;aAAM,CAAC;YACN,uEAAuE;YACvE,IAAI,CAAC,KAAK,CAAC,OAAO,CAAC,WAAW,CAAC,EAAE,CAAC;gBAChC,WAAW,GAAG,CAAE,WAAW,CAAE,CAAC;YAChC,CAAC;YACD,KAAK,MAAM,UAAU,IAAI,WAAW,EAAE,CAAC;gBACrC,IAAI,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,OAAO,CAAC,GAAG,CAAC,UAAU,EAAE,EAAE,MAAM,EAAE,aAAa,CAAC,MAAM,EAAE,CAAC,IAAI,EAAE,CAAC;gBAC1F,IAAI,IAAI,CAAC,YAAY,CAAC,EAAE,CAAC;oBACvB,MAAM;gBACR,CAAC;YACH,CAAC;QACH,CAAC;QACD,OAAO,IAAI,CAAC,YAAY,CAAW,CAAC;IACtC,CAAC;IAED;;;;OAIG;IACH,gBAAgB,CAAC,MAAgB;QAC/B,IAAI,IAAI,CAAC,WAAW,CAAC,IAAI,CAAC,MAAM;YAAE,OAAO;QACzC,KAAK,CAAC,4CAA4C,EAAE,IAAI,CAAC,WAAW,CAAC,EAAE,MAAM,CAAC,CAAC;QAC/E,MAAM,MAAM,GAAG,MAAM,CAAC,UAAU,EAAE,CAAC;QACnC,IAAI,CAAC,eAAe,CAAC,GAAG,MAAM,CAAC;QAC/B,IAAI,EACF,UAAU,EAAE,WAAW,EACvB,YAAY,EACZ,UAAU,EAAE,WAAW,EACvB,aAAa,GACd,GAAG,IAAI,CAAC,GAAG,CAAC,MAAM,CAAC,QAAQ,CAAC,IAAI,CAAC;QAElC,IAAI,UAAU,EAAE,CAAC;YACf,wFAAwF;YACvF,IAAI,CAAC,OAAe,CAAC,WAAW,CAAC,GAAG,MAAM,CAAC;QAC9C,CAAC;aAAM,CAAC;YACN,IAAI,OAAO,YAAY,KAAK,UAAU,EAAE,CAAC;gBACvC,YAAY,GAAG,YAAY,CAAC,IAAI,CAAC,CAAC;YACpC,CAAC;YACD,MAAM,UAAU,GAAG;gBACjB,MAAM,EAAE,YAAY;gBACpB,GAAG,aAAa;aACjB,CAAC;YACF,uEAAuE;YACvE,IAAI,CAAC,KAAK,CAAC,OAAO,CAAC,WAAW,CAAC,EAAE,CAAC;gBAChC,WAAW,GAAG,CAAE,WAAW,CAAE,CAAC;YAChC,CAAC;YACD,KAAK,MAAM,UAAU,IAAI,WAAW,EAAE,CAAC;gBACrC,IAAI,CAAC,OAAO,CAAC,GAAG,CAAC,UAAU,EAAE,MAAM,EAAE,UAAU,CAAC,CAAC;YACnD,CAAC;QACH,CAAC;IACH,CAAC;IAED,IAAI,CAAC,WAAW,CAAC;QACf,MAAM,EAAE,UAAU,EAAE,QAAQ,EAAE,SAAS,EAAE,GAAG,IAAI,CAAC,GAAG,CAAC,MAAM,CAAC,QAAQ,CAAC,IAAI,CAAC;QAC1E,iCAAiC;QACjC,MAAM,KAAK,GAAG,SAAS,CAAC,IAAI,CAAC,OAAO,CAAC,KAAK,EAAE,SAAS,CAAC;eACjD,SAAS,CAAC,IAAI,CAAC,OAAO,CAAC,IAAI,EAAE,QAAQ,CAAC;eACtC,CAAC,UAAU,IAAI,IAAI,CAAC,OAAO,CAAC,GAAG,CAAS,UAAU,CAAC,CAAC,CAAC;QAC1D,KAAK,CAAC,2BAA2B,EAAE,KAAK,EAAE,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC;QAC7D,OAAO,KAAK,CAAC;IACf,CAAC;IAED;;;;OAIG;IACH,gBAAgB;QACd,IAAI,CAAC,IAAI,CAAC,eAAe,CAAC,IAAI,IAAI,CAAC,WAAW,CAAC,EAAE,CAAC;YAChD,IAAI,CAAC,gBAAgB,CAAC,IAAI,CAAC,CAAC;QAC9B,CAAC;IACH,CAAC;IAED;;;OAGG;IACH,UAAU;QACR,IAAI,KAAK,CAAC,aAAa,CAAC,IAAI,CAAC,GAAG,CAAC,MAAM,CAAC,QAAQ,CAAC,IAAI,EAAE,IAAI,CAAC,EAAE,CAAC;YAC7D,KAAK,CAAC,4BAA4B,EAAE,IAAI,CAAC,IAAI,CAAC,CAAC;YAC/C,OAAO;QACT,CAAC;QAED,MAAM,EAAE,IAAI,EAAE,GAAG,IAAI,CAAC,GAAG,CAAC,MAAM,CAAC,QAAQ,CAAC,IAAI,CAAC;QAC/C,IAAI,OAAO,CAAC;QACZ,MAAM,QAAQ,GAAG,EAAE,CAAC;QACpB,QAAQ,IAAI,EAAE,CAAC;YACb,KAAK,QAAQ;gBACX,OAAO,GAAG,IAAI,CAAC,iBAAiB,CAAC,EAAE,CAAC;gBACpC,IAAI,OAAO;oBAAE,IAAI,CAAC,KAAK,CAAC,GAAG,EAAE,OAAO,CAAC,CAAC;gBACtC,MAAM;YACR,KAAK,SAAS;gBACZ,OAAO,GAAG,IAAI,CAAC,kBAAkB,CAAC,EAAE,CAAC;gBACrC,IAAI,OAAO;oBAAE,IAAI,CAAC,KAAK,CAAC,GAAG,EAAE,OAAO,CAAC,CAAC;gBACtC,MAAM;YACR,KAAK,KAAK;gBACR,OAAO,GAAG,IAAI,CAAC,iBAAiB,CAAC,EAAE,CAAC;gBACpC,IAAI,OAAO;oBAAE,IAAI,CAAC,KAAK,CAAC,GAAG,EAAE,OAAO,CAAC,CAAC;gBACtC,OAAO,GAAG,IAAI,CAAC,kBAAkB,CAAC,EAAE,CAAC;gBACrC,IAAI,OAAO;oBAAE,IAAI,CAAC,KAAK,CAAC,GAAG,EAAE,OAAO,CAAC,CAAC;gBACtC,MAAM;YACR,KAAK,KAAK;gBACR,OAAO,GAAG,IAAI,CAAC,iBAAiB,CAAC,EAAE,CAAC;gBACpC,IAAI,CAAC,OAAO;oBAAE,OAAO;gBACrB,QAAQ,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC;gBACvB,OAAO,GAAG,IAAI,CAAC,kBAAkB,CAAC,EAAE,CAAC;gBACrC,IAAI,CAAC,OAAO;oBAAE,OAAO;gBACrB,QAAQ,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC;gBACvB,IAAI,CAAC,KAAK,CAAC,GAAG,EAAE,wCAAwC,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;gBAC/E,MAAM;YACR;gBACE,IAAI,CAAC,KAAK,CAAC,gBAAgB,IAAI,EAAE,CAAC,CAAC;QACvC,CAAC;IACH,CAAC;IAED,CAAC,iBAAiB,CAAC;QACjB,IAAI,CAAC,IAAI,CAAC,WAAW,CAAC,EAAE,CAAC;YACvB,KAAK,CAAC,oBAAoB,CAAC,CAAC;YAC5B,IAAI,CAAC,eAAe,CAAC,CAAC,oBAAoB,CAAC,CAAC;YAC5C,OAAO,oBAAoB,CAAC;QAC9B,CAAC;QACD,MAAM,KAAK,GAAG,IAAI,CAAC,WAAW,CAAC,CAAC;QAChC,yFAAyF;QACzF,qFAAqF;QACrF,IAAI,KAAK,KAAK,IAAI,CAAC,WAAW,CAAC,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,WAAW,CAAC,EAAE,KAAK,CAAC,EAAE,CAAC;YAC5E,KAAK,CAAC,+BAA+B,CAAC,CAAC;YACvC,IAAI,CAAC,eAAe,CAAC,CAAC,oBAAoB,CAAC,CAAC;YAC5C,MAAM,EAAE,iBAAiB,EAAE,GAAG,IAAI,CAAC,GAAG,CAAC,MAAM,CAAC,QAAQ,CAAC,IAAI,CAAC;YAC5D,IAAI,iBAAiB,EAAE,CAAC;gBACtB,IAAI,CAAC,gBAAgB,EAAE,CAAC;YAC1B,CAAC;YACD,OAAO,oBAAoB,CAAC;QAC9B,CAAC;IACH,CAAC;IAED,CAAC,kBAAkB,CAAC;QAClB,MAAM,EAAE,gBAAgB,EAAE,GAAG,IAAI,CAAC,GAAG,CAAC,MAAM,CAAC,QAAQ,CAAC,IAAI,CAAC;QAC3D,+BAA+B;QAC/B,MAAM,OAAO,GAAG,CAAC,IAAI,CAAC,OAAO,CAAC,OAAO,IAAI,IAAI,CAAC,OAAO,CAAC,MAAM,IAAI,EAAE,CAAC,CAAC,WAAW,EAAE,CAAC;QAElF,IAAI,CAAC,OAAO,EAAE,CAAC;YACb,KAAK,CAAC,gCAAgC,CAAC,CAAC;YACxC,IAAI,CAAC,eAAe,CAAC,CAAC,gCAAgC,CAAC,CAAC;YACxD,OAAO,gCAAgC,CAAC;QAC1C,CAAC;QAED,MAAM,IAAI,GAAG,KAAK,CAAC,UAAU,CAAC,OAAO,EAAE,MAAM,CAAC,CAAC;QAC/C,MAAM,UAAU,GAAG,gBAAgB,CAAC,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;QACtD,IAAI,CAAC,IAAI,IAAI,CAAC,KAAK,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,EAAE,CAAC;YACnD,KAAK,CAAC,gCAAgC,CAAC,CAAC;YACxC,IAAI,CAAC,eAAe,CAAC,CAAC,gCAAgC,CAAC,CAAC;YACxD,OAAO,gCAAgC,CAAC;QAC1C,CAAC;IACH,CAAC;IAED,CAAC,eAAe,CAAC,CAAC,GAAW;QAC3B,IAAI,IAAI,CAAC,GAAG,CAAC,MAAM,CAAC,GAAG,KAAK,OAAO,EAAE,CAAC;YACpC,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,GAAG,GAAG,8DAA8D,CAAC,CAAC;QACzF,CAAC;IACH,CAAC;IAED,KAAK,CAAC,QAAQ,CACZ,GAAyB,EAAE,OAA2B;QACtD,OAAO,MAAM,IAAI,CAAC,GAAG,CAAC,QAAQ,CAAI,GAAG,EAAE,OAAO,CAAC,CAAC;IAClD,CAAC;IAED,cAAc,CAAC,GAAW,EAAE,GAAY;QACtC,IAAI,CAAC,QAAQ,CAAC,cAAc,CAAC,GAAG,EAAE,GAAG,CAAC,CAAC;IACzC,CAAC;CACF"}
@@ -1,12 +0,0 @@
1
- declare const _default: {
2
- cliFilter: typeof import("../../lib/helper/cliFilter.js").default;
3
- escape: typeof import("escape-html");
4
- escapeShellArg: typeof import("../../lib/helper/escapeShellArg.js").default;
5
- escapeShellCmd: typeof import("../../lib/helper/escapeShellCmd.js").default;
6
- shtml: typeof import("../../lib/helper/shtml.js").default;
7
- sjs: typeof import("../../lib/helper/sjs.js").default;
8
- sjson: typeof import("../../lib/helper/sjson.js").default;
9
- spath: typeof import("../../lib/helper/spath.js").default;
10
- surl: typeof import("../../lib/helper/surl.js").default;
11
- };
12
- export default _default;
@@ -1,5 +0,0 @@
1
- import helpers from '../../lib/helper/index.js';
2
- export default {
3
- ...helpers,
4
- };
5
- //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaGVscGVyLmpzIiwic291cmNlUm9vdCI6IiIsInNvdXJjZXMiOlsiLi4vLi4vLi4vLi4vc3JjL2FwcC9leHRlbmQvaGVscGVyLnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiJBQUFBLE9BQU8sT0FBTyxNQUFNLDJCQUEyQixDQUFDO0FBRWhELGVBQWU7SUFDYixHQUFHLE9BQU87Q0FDWCxDQUFDIn0=
@@ -1,41 +0,0 @@
1
- import { Response as KoaResponse } from '@eggjs/core';
2
- import SecurityContext from './context.js';
3
- export default class SecurityResponse extends KoaResponse {
4
- ctx: SecurityContext;
5
- /**
6
- * This is an unsafe redirection, and we WON'T check if the
7
- * destination url is safe or not.
8
- * Please DO NOT use this method unless in some very special cases,
9
- * otherwise there may be security vulnerabilities.
10
- *
11
- * @function Response#unsafeRedirect
12
- * @param {String} url URL to forward
13
- * @example
14
- * ```js
15
- * ctx.response.unsafeRedirect('http://www.domain.com');
16
- * ctx.unsafeRedirect('http://www.domain.com');
17
- * ```
18
- */
19
- unsafeRedirect(url: string, alt?: string): void;
20
- /**
21
- * A safe redirection, and we'll check if the URL is in
22
- * a safe domain or not.
23
- * We've overridden the default Koa's implementation by adding a
24
- * white list as the filter for that.
25
- *
26
- * @function Response#redirect
27
- * @param {String} url URL to forward
28
- * @example
29
- * ```js
30
- * ctx.response.redirect('/login');
31
- * ctx.redirect('/login');
32
- * ```
33
- */
34
- redirect(url: string, alt?: string): void;
35
- }
36
- declare module '@eggjs/core' {
37
- interface Response {
38
- unsafeRedirect(url: string, alt?: string): void;
39
- redirect(url: string, alt?: string): void;
40
- }
41
- }
@@ -1,82 +0,0 @@
1
- import { Response as KoaResponse } from '@eggjs/core';
2
- const unsafeRedirect = KoaResponse.prototype.redirect;
3
- export default class SecurityResponse extends KoaResponse {
4
- /**
5
- * This is an unsafe redirection, and we WON'T check if the
6
- * destination url is safe or not.
7
- * Please DO NOT use this method unless in some very special cases,
8
- * otherwise there may be security vulnerabilities.
9
- *
10
- * @function Response#unsafeRedirect
11
- * @param {String} url URL to forward
12
- * @example
13
- * ```js
14
- * ctx.response.unsafeRedirect('http://www.domain.com');
15
- * ctx.unsafeRedirect('http://www.domain.com');
16
- * ```
17
- */
18
- unsafeRedirect(url, alt) {
19
- unsafeRedirect.call(this, url, alt);
20
- }
21
- // app.response.unsafeRedirect = app.response.redirect;
22
- // delegate(app.context, 'response').method('unsafeRedirect');
23
- /**
24
- * A safe redirection, and we'll check if the URL is in
25
- * a safe domain or not.
26
- * We've overridden the default Koa's implementation by adding a
27
- * white list as the filter for that.
28
- *
29
- * @function Response#redirect
30
- * @param {String} url URL to forward
31
- * @example
32
- * ```js
33
- * ctx.response.redirect('/login');
34
- * ctx.redirect('/login');
35
- * ```
36
- */
37
- redirect(url, alt) {
38
- url = (url || '/').trim();
39
- // Process with `//`
40
- if (url[0] === '/' && url[1] === '/') {
41
- url = '/';
42
- }
43
- // if begin with '/', it means an internal jump
44
- if (url[0] === '/' && url[1] !== '\\') {
45
- this.unsafeRedirect(url, alt);
46
- return;
47
- }
48
- let urlObject;
49
- try {
50
- urlObject = new URL(url);
51
- }
52
- catch {
53
- url = '/';
54
- this.unsafeRedirect(url);
55
- return;
56
- }
57
- const domainWhiteList = this.app.config.security.domainWhiteList;
58
- if (urlObject.protocol !== 'http:' && urlObject.protocol !== 'https:') {
59
- url = '/';
60
- }
61
- else if (!urlObject.hostname) {
62
- url = '/';
63
- }
64
- else {
65
- if (domainWhiteList && domainWhiteList.length !== 0) {
66
- if (!this.ctx.isSafeDomain(urlObject.hostname)) {
67
- const message = `a security problem has been detected for url "${url}", redirection is prohibited.`;
68
- if (process.env.NODE_ENV === 'production') {
69
- this.app.coreLogger.warn('[@eggjs/security/response/redirect] %s', message);
70
- url = '/';
71
- }
72
- else {
73
- // Exception will be thrown out in a non-PROD env.
74
- return this.ctx.throw(500, message);
75
- }
76
- }
77
- }
78
- }
79
- this.unsafeRedirect(url);
80
- }
81
- }
82
- //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoicmVzcG9uc2UuanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi8uLi8uLi9zcmMvYXBwL2V4dGVuZC9yZXNwb25zZS50cyJdLCJuYW1lcyI6W10sIm1hcHBpbmdzIjoiQUFBQSxPQUFPLEVBQUUsUUFBUSxJQUFJLFdBQVcsRUFBRSxNQUFNLGFBQWEsQ0FBQztBQUd0RCxNQUFNLGNBQWMsR0FBRyxXQUFXLENBQUMsU0FBUyxDQUFDLFFBQVEsQ0FBQztBQUV0RCxNQUFNLENBQUMsT0FBTyxPQUFPLGdCQUFpQixTQUFRLFdBQVc7SUFHdkQ7Ozs7Ozs7Ozs7Ozs7T0FhRztJQUNILGNBQWMsQ0FBQyxHQUFXLEVBQUUsR0FBWTtRQUN0QyxjQUFjLENBQUMsSUFBSSxDQUFDLElBQUksRUFBRSxHQUFHLEVBQUUsR0FBRyxDQUFDLENBQUM7SUFDdEMsQ0FBQztJQUVELHVEQUF1RDtJQUN2RCw4REFBOEQ7SUFDOUQ7Ozs7Ozs7Ozs7Ozs7T0FhRztJQUNILFFBQVEsQ0FBQyxHQUFXLEVBQUUsR0FBWTtRQUNoQyxHQUFHLEdBQUcsQ0FBQyxHQUFHLElBQUksR0FBRyxDQUFDLENBQUMsSUFBSSxFQUFFLENBQUM7UUFFMUIsb0JBQW9CO1FBQ3BCLElBQUksR0FBRyxDQUFDLENBQUMsQ0FBQyxLQUFLLEdBQUcsSUFBSSxHQUFHLENBQUMsQ0FBQyxDQUFDLEtBQUssR0FBRyxFQUFFLENBQUM7WUFDckMsR0FBRyxHQUFHLEdBQUcsQ0FBQztRQUNaLENBQUM7UUFFRCwrQ0FBK0M7UUFDL0MsSUFBSSxHQUFHLENBQUMsQ0FBQyxDQUFDLEtBQUssR0FBRyxJQUFJLEdBQUcsQ0FBQyxDQUFDLENBQUMsS0FBSyxJQUFJLEVBQUUsQ0FBQztZQUN0QyxJQUFJLENBQUMsY0FBYyxDQUFDLEdBQUcsRUFBRSxHQUFHLENBQUMsQ0FBQztZQUM5QixPQUFPO1FBQ1QsQ0FBQztRQUVELElBQUksU0FBYyxDQUFDO1FBQ25CLElBQUksQ0FBQztZQUNILFNBQVMsR0FBRyxJQUFJLEdBQUcsQ0FBQyxHQUFHLENBQUMsQ0FBQztRQUMzQixDQUFDO1FBQUMsTUFBTSxDQUFDO1lBQ1AsR0FBRyxHQUFHLEdBQUcsQ0FBQztZQUNWLElBQUksQ0FBQyxjQUFjLENBQUMsR0FBRyxDQUFDLENBQUM7WUFDekIsT0FBTztRQUNULENBQUM7UUFFRCxNQUFNLGVBQWUsR0FBRyxJQUFJLENBQUMsR0FBRyxDQUFDLE1BQU0sQ0FBQyxRQUFRLENBQUMsZUFBZSxDQUFDO1FBQ2pFLElBQUksU0FBUyxDQUFDLFFBQVEsS0FBSyxPQUFPLElBQUksU0FBUyxDQUFDLFFBQVEsS0FBSyxRQUFRLEVBQUUsQ0FBQztZQUN0RSxHQUFHLEdBQUcsR0FBRyxDQUFDO1FBQ1osQ0FBQzthQUFNLElBQUksQ0FBQyxTQUFTLENBQUMsUUFBUSxFQUFFLENBQUM7WUFDL0IsR0FBRyxHQUFHLEdBQUcsQ0FBQztRQUNaLENBQUM7YUFBTSxDQUFDO1lBQ04sSUFBSSxlQUFlLElBQUksZUFBZSxDQUFDLE1BQU0sS0FBSyxDQUFDLEVBQUUsQ0FBQztnQkFDcEQsSUFBSSxDQUFDLElBQUksQ0FBQyxHQUFHLENBQUMsWUFBWSxDQUFDLFNBQVMsQ0FBQyxRQUFRLENBQUMsRUFBRSxDQUFDO29CQUMvQyxNQUFNLE9BQU8sR0FBRyxpREFBaUQsR0FBRywrQkFBK0IsQ0FBQztvQkFDcEcsSUFBSSxPQUFPLENBQUMsR0FBRyxDQUFDLFFBQVEsS0FBSyxZQUFZLEVBQUUsQ0FBQzt3QkFDMUMsSUFBSSxDQUFDLEdBQUcsQ0FBQyxVQUFVLENBQUMsSUFBSSxDQUFDLHdDQUF3QyxFQUFFLE9BQU8sQ0FBQyxDQUFDO3dCQUM1RSxHQUFHLEdBQUcsR0FBRyxDQUFDO29CQUNaLENBQUM7eUJBQU0sQ0FBQzt3QkFDTixrREFBa0Q7d0JBQ2xELE9BQU8sSUFBSSxDQUFDLEdBQUcsQ0FBQyxLQUFLLENBQUMsR0FBRyxFQUFFLE9BQU8sQ0FBQyxDQUFDO29CQUN0QyxDQUFDO2dCQUNILENBQUM7WUFDSCxDQUFDO1FBQ0gsQ0FBQztRQUNELElBQUksQ0FBQyxjQUFjLENBQUMsR0FBRyxDQUFDLENBQUM7SUFDM0IsQ0FBQztDQUNGIn0=
@@ -1,4 +0,0 @@
1
- import compose from 'koa-compose';
2
- import { EggCore } from '@eggjs/core';
3
- declare const _default: (_: unknown, app: EggCore) => compose.ComposedMiddleware<import("@eggjs/core").Context>;
4
- export default _default;
@@ -1,50 +0,0 @@
1
- import assert from 'node:assert';
2
- import compose from 'koa-compose';
3
- import { pathMatching } from 'egg-path-matching';
4
- import securityMiddlewares from '../../lib/middlewares/index.js';
5
- export default (_, app) => {
6
- const options = app.config.security;
7
- const middlewares = [];
8
- const defaultMiddlewares = typeof options.defaultMiddleware === 'string'
9
- ? options.defaultMiddleware.split(',').map(m => m.trim()).filter(m => !!m)
10
- : options.defaultMiddleware;
11
- if (options.match || options.ignore) {
12
- app.coreLogger.warn('[@eggjs/security/middleware/securities] Please set `match` or `ignore` on sub config');
13
- }
14
- // format csrf.cookieDomain
15
- const originalCookieDomain = options.csrf.cookieDomain;
16
- if (originalCookieDomain && typeof originalCookieDomain !== 'function') {
17
- options.csrf.cookieDomain = () => originalCookieDomain;
18
- }
19
- defaultMiddlewares.forEach(middlewareName => {
20
- const opt = Reflect.get(options, middlewareName);
21
- if (opt === false) {
22
- app.coreLogger.warn('[egg-security] Please use `config.security.%s = { enable: false }` instead of `config.security.%s = false`', middlewareName, middlewareName);
23
- }
24
- assert(opt === false || typeof opt === 'object', `config.security.${middlewareName} must be an object, or false(if you turn it off)`);
25
- if (opt === false || opt && opt.enable === false) {
26
- return;
27
- }
28
- if (middlewareName === 'csrf' && opt.useSession && !app.plugins.session) {
29
- throw new Error('csrf.useSession enabled, but session plugin is disabled');
30
- }
31
- // use opt.match first (compatibility)
32
- if (opt.match && opt.ignore) {
33
- app.coreLogger.warn('[@eggjs/security/middleware/securities] `options.match` and `options.ignore` are both set, using `options.match`');
34
- opt.ignore = undefined;
35
- }
36
- if (!opt.ignore && opt.blackUrls) {
37
- app.deprecate('[@eggjs/security/middleware/securities] Please use `config.security.xframe.ignore` instead, `config.security.xframe.blackUrls` will be removed very soon');
38
- opt.ignore = opt.blackUrls;
39
- }
40
- // set matching function to security middleware options
41
- opt.matching = pathMatching(opt);
42
- const createMiddleware = securityMiddlewares[middlewareName];
43
- const fn = createMiddleware(opt);
44
- middlewares.push(fn);
45
- app.coreLogger.info('[@eggjs/security/middleware/securities] use %s middleware', middlewareName);
46
- });
47
- app.coreLogger.info('[@eggjs/security/middleware/securities] compose %d middlewares into one security middleware', middlewares.length);
48
- return compose(middlewares);
49
- };
50
- //# sourceMappingURL=data:application/json;base64,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
package/dist/esm/app.d.ts DELETED
@@ -1,6 +0,0 @@
1
- import type { ILifecycleBoot, EggCore } from '@eggjs/core';
2
- export default class AppBoot implements ILifecycleBoot {
3
- private readonly app;
4
- constructor(app: EggCore);
5
- configWillLoad(): void;
6
- }
package/dist/esm/app.js DELETED
@@ -1,26 +0,0 @@
1
- import { preprocessConfig } from './lib/utils.js';
2
- import { SecurityConfig } from './config/config.default.js';
3
- export default class AppBoot {
4
- app;
5
- constructor(app) {
6
- this.app = app;
7
- }
8
- configWillLoad() {
9
- const app = this.app;
10
- app.config.coreMiddleware.push('securities');
11
- // parse config and check if config is legal
12
- const parsed = SecurityConfig.parse(app.config.security);
13
- if (typeof app.config.security.csrf === 'boolean') {
14
- // support old config: `config.security.csrf = false`
15
- app.config.security.csrf = parsed.csrf;
16
- }
17
- if (app.config.security.csrf.enable) {
18
- const { ignoreJSON } = app.config.security.csrf;
19
- if (ignoreJSON) {
20
- app.deprecate('[@eggjs/security/app] `config.security.csrf.ignoreJSON` is not safe now, please disable it.');
21
- }
22
- }
23
- preprocessConfig(app.config.security);
24
- }
25
- }
26
- //# sourceMappingURL=data:application/json;base64,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