@eggjs/security 5.0.0-beta.19 → 5.0.0-beta.21
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/agent.d.ts +5 -9
- package/dist/agent.js +10 -14
- package/dist/app/extend/agent.d.ts +4 -8
- package/dist/app/extend/agent.js +8 -12
- package/dist/app/extend/application.d.ts +7 -11
- package/dist/app/extend/application.js +32 -32
- package/dist/app/extend/context.d.ts +52 -55
- package/dist/app/extend/context.js +241 -188
- package/dist/app/extend/helper.d.ts +10 -22
- package/dist/app/extend/helper.js +5 -7
- package/dist/app/extend/response.d.ts +34 -38
- package/dist/app/extend/response.js +82 -69
- package/dist/app/middleware/securities.d.ts +4 -8
- package/dist/app/middleware/securities.js +52 -38
- package/dist/app.d.ts +5 -9
- package/dist/app.js +24 -22
- package/dist/config/config.default.d.ts +784 -787
- package/dist/config/config.default.js +356 -156
- package/dist/config/config.local.d.ts +2 -5
- package/dist/config/config.local.js +8 -5
- package/dist/index.d.ts +4 -1
- package/dist/index.js +2 -2
- package/dist/lib/extend/safe_curl.d.ts +9 -13
- package/dist/lib/extend/safe_curl.js +23 -17
- package/dist/lib/helper/cliFilter.d.ts +1 -4
- package/dist/lib/helper/cliFilter.js +15 -16
- package/dist/lib/helper/escape.d.ts +2 -2
- package/dist/lib/helper/escape.js +3 -7
- package/dist/lib/helper/escapeShellArg.d.ts +1 -4
- package/dist/lib/helper/escapeShellArg.js +4 -6
- package/dist/lib/helper/escapeShellCmd.d.ts +1 -4
- package/dist/lib/helper/escapeShellCmd.js +13 -14
- package/dist/lib/helper/index.d.ts +19 -22
- package/dist/lib/helper/index.js +15 -19
- package/dist/lib/helper/shtml.d.ts +2 -6
- package/dist/lib/helper/shtml.js +68 -52
- package/dist/lib/helper/sjs.d.ts +1 -4
- package/dist/lib/helper/sjs.js +44 -31
- package/dist/lib/helper/sjson.d.ts +1 -4
- package/dist/lib/helper/sjson.js +35 -28
- package/dist/lib/helper/spath.d.ts +5 -7
- package/dist/lib/helper/spath.js +24 -15
- package/dist/lib/helper/surl.d.ts +2 -6
- package/dist/lib/helper/surl.js +27 -22
- package/dist/lib/middlewares/csp.d.ts +3 -6
- package/dist/lib/middlewares/csp.js +54 -43
- package/dist/lib/middlewares/csrf.d.ts +3 -6
- package/dist/lib/middlewares/csrf.js +35 -31
- package/dist/lib/middlewares/dta.d.ts +2 -5
- package/dist/lib/middlewares/dta.js +10 -11
- package/dist/lib/middlewares/hsts.d.ts +3 -6
- package/dist/lib/middlewares/hsts.js +19 -17
- package/dist/lib/middlewares/index.d.ts +11 -16
- package/dist/lib/middlewares/index.js +22 -26
- package/dist/lib/middlewares/methodnoallow.d.ts +2 -5
- package/dist/lib/middlewares/methodnoallow.js +18 -13
- package/dist/lib/middlewares/noopen.d.ts +3 -6
- package/dist/lib/middlewares/noopen.js +13 -15
- package/dist/lib/middlewares/nosniff.d.ts +3 -6
- package/dist/lib/middlewares/nosniff.js +24 -23
- package/dist/lib/middlewares/referrerPolicy.d.ts +3 -6
- package/dist/lib/middlewares/referrerPolicy.js +31 -27
- package/dist/lib/middlewares/xframe.d.ts +3 -6
- package/dist/lib/middlewares/xframe.js +15 -16
- package/dist/lib/middlewares/xssProtection.d.ts +3 -6
- package/dist/lib/middlewares/xssProtection.js +12 -15
- package/dist/lib/utils.d.ts +12 -17
- package/dist/lib/utils.js +177 -112
- package/dist/types.d.ts +35 -37
- package/dist/types.js +2 -1
- package/package.json +6 -6
|
@@ -1,166 +1,366 @@
|
|
|
1
|
-
import z from
|
|
2
|
-
import { Context } from
|
|
3
|
-
|
|
4
|
-
//#region src/config/config.default.ts
|
|
1
|
+
import z from 'zod';
|
|
2
|
+
import { Context } from 'egg';
|
|
5
3
|
const CSRFSupportRequestItem = z.object({
|
|
6
|
-
|
|
7
|
-
|
|
4
|
+
path: z.instanceof(RegExp),
|
|
5
|
+
methods: z.array(z.string()),
|
|
8
6
|
});
|
|
9
|
-
const LookupAddress = z.object({
|
|
10
|
-
|
|
11
|
-
|
|
7
|
+
export const LookupAddress = z.object({
|
|
8
|
+
address: z.string(),
|
|
9
|
+
family: z.number(),
|
|
12
10
|
});
|
|
13
11
|
const LookupAddressAndStringArray = z.union([z.string(), LookupAddress]).array();
|
|
14
|
-
const SSRFCheckAddressFunction = z
|
|
15
|
-
|
|
16
|
-
|
|
17
|
-
|
|
18
|
-
|
|
19
|
-
|
|
20
|
-
|
|
21
|
-
|
|
22
|
-
|
|
23
|
-
|
|
24
|
-
|
|
25
|
-
|
|
26
|
-
|
|
27
|
-
|
|
28
|
-
"dta"
|
|
12
|
+
const SSRFCheckAddressFunction = z
|
|
13
|
+
.function()
|
|
14
|
+
.args(z.union([z.string(), LookupAddress, LookupAddressAndStringArray]), z.union([z.number(), z.string()]), z.string())
|
|
15
|
+
.returns(z.boolean());
|
|
16
|
+
export const SecurityMiddlewareName = z.enum([
|
|
17
|
+
'csrf',
|
|
18
|
+
'hsts',
|
|
19
|
+
'methodnoallow',
|
|
20
|
+
'noopen',
|
|
21
|
+
'nosniff',
|
|
22
|
+
'csp',
|
|
23
|
+
'xssProtection',
|
|
24
|
+
'xframe',
|
|
25
|
+
'dta',
|
|
29
26
|
]);
|
|
30
27
|
/**
|
|
31
|
-
* (ctx) => boolean
|
|
32
|
-
*/
|
|
28
|
+
* (ctx) => boolean
|
|
29
|
+
*/
|
|
33
30
|
const IgnoreOrMatchHandler = z.function().args(z.instanceof(Context)).returns(z.boolean());
|
|
34
|
-
const IgnoreOrMatch = z.union([
|
|
35
|
-
z.string(),
|
|
36
|
-
z.instanceof(RegExp),
|
|
37
|
-
IgnoreOrMatchHandler
|
|
38
|
-
]);
|
|
31
|
+
const IgnoreOrMatch = z.union([z.string(), z.instanceof(RegExp), IgnoreOrMatchHandler]);
|
|
39
32
|
const IgnoreOrMatchOption = z.union([IgnoreOrMatch, IgnoreOrMatch.array()]).optional();
|
|
40
|
-
const SecurityConfig = z.object({
|
|
41
|
-
|
|
42
|
-
|
|
43
|
-
|
|
44
|
-
|
|
45
|
-
|
|
46
|
-
|
|
47
|
-
|
|
48
|
-
|
|
49
|
-
|
|
50
|
-
|
|
51
|
-
|
|
52
|
-
|
|
53
|
-
|
|
54
|
-
|
|
55
|
-
|
|
56
|
-
|
|
57
|
-
|
|
58
|
-
|
|
59
|
-
|
|
60
|
-
|
|
61
|
-
|
|
62
|
-
|
|
63
|
-
|
|
64
|
-
|
|
65
|
-
|
|
66
|
-
|
|
67
|
-
|
|
68
|
-
|
|
69
|
-
|
|
70
|
-
|
|
71
|
-
|
|
72
|
-
|
|
73
|
-
|
|
74
|
-
|
|
75
|
-
|
|
76
|
-
|
|
77
|
-
|
|
78
|
-
|
|
79
|
-
|
|
80
|
-
|
|
81
|
-
|
|
82
|
-
|
|
83
|
-
|
|
84
|
-
|
|
85
|
-
|
|
86
|
-
|
|
87
|
-
|
|
88
|
-
|
|
89
|
-
|
|
90
|
-
|
|
91
|
-
|
|
92
|
-
|
|
93
|
-
|
|
94
|
-
|
|
95
|
-
|
|
96
|
-
|
|
97
|
-
|
|
98
|
-
|
|
99
|
-
|
|
100
|
-
|
|
101
|
-
|
|
102
|
-
|
|
103
|
-
|
|
104
|
-
|
|
105
|
-
|
|
106
|
-
|
|
107
|
-
|
|
108
|
-
|
|
109
|
-
|
|
110
|
-
|
|
111
|
-
|
|
112
|
-
|
|
113
|
-
|
|
114
|
-
|
|
115
|
-
|
|
116
|
-
|
|
117
|
-
|
|
118
|
-
|
|
119
|
-
|
|
120
|
-
|
|
121
|
-
|
|
122
|
-
|
|
123
|
-
|
|
124
|
-
|
|
125
|
-
|
|
126
|
-
|
|
127
|
-
|
|
128
|
-
|
|
129
|
-
|
|
130
|
-
|
|
131
|
-
|
|
132
|
-
|
|
133
|
-
|
|
134
|
-
|
|
135
|
-
|
|
136
|
-
|
|
137
|
-
|
|
138
|
-
|
|
139
|
-
|
|
140
|
-
|
|
141
|
-
|
|
142
|
-
|
|
143
|
-
|
|
144
|
-
|
|
145
|
-
|
|
146
|
-
|
|
147
|
-
|
|
148
|
-
|
|
149
|
-
|
|
150
|
-
|
|
151
|
-
|
|
152
|
-
|
|
33
|
+
export const SecurityConfig = z.object({
|
|
34
|
+
/**
|
|
35
|
+
* domain white list
|
|
36
|
+
*
|
|
37
|
+
* Default to `[]`
|
|
38
|
+
*/
|
|
39
|
+
domainWhiteList: z.array(z.string()).default([]),
|
|
40
|
+
/**
|
|
41
|
+
* protocol white list
|
|
42
|
+
*
|
|
43
|
+
* Default to `[]`
|
|
44
|
+
*/
|
|
45
|
+
protocolWhiteList: z.array(z.string()).default([]),
|
|
46
|
+
/**
|
|
47
|
+
* default open security middleware
|
|
48
|
+
*
|
|
49
|
+
* Default to `'csrf,hsts,methodnoallow,noopen,nosniff,csp,xssProtection,xframe,dta'`
|
|
50
|
+
*/
|
|
51
|
+
defaultMiddleware: z.union([z.string(), z.array(SecurityMiddlewareName)]).default(SecurityMiddlewareName.options),
|
|
52
|
+
/**
|
|
53
|
+
* whether defend csrf attack
|
|
54
|
+
*/
|
|
55
|
+
csrf: z.preprocess(val => {
|
|
56
|
+
// transform old config, `csrf: false` to `csrf: { enable: false }`
|
|
57
|
+
if (typeof val === 'boolean') {
|
|
58
|
+
return { enable: val };
|
|
59
|
+
}
|
|
60
|
+
return val;
|
|
61
|
+
}, z
|
|
62
|
+
.object({
|
|
63
|
+
match: IgnoreOrMatchOption,
|
|
64
|
+
ignore: IgnoreOrMatchOption,
|
|
65
|
+
/**
|
|
66
|
+
* Default to `true`
|
|
67
|
+
*/
|
|
68
|
+
enable: z.boolean().default(true),
|
|
69
|
+
/**
|
|
70
|
+
* csrf token detect source type
|
|
71
|
+
*
|
|
72
|
+
* Default to `'ctoken'`
|
|
73
|
+
*/
|
|
74
|
+
type: z.enum(['ctoken', 'referer', 'all', 'any']).default('ctoken'),
|
|
75
|
+
/**
|
|
76
|
+
* ignore json request
|
|
77
|
+
*
|
|
78
|
+
* Default to `false`
|
|
79
|
+
*
|
|
80
|
+
* @deprecated is not safe now, don't use it
|
|
81
|
+
*/
|
|
82
|
+
ignoreJSON: z.boolean().default(false),
|
|
83
|
+
/**
|
|
84
|
+
* csrf token cookie name
|
|
85
|
+
*
|
|
86
|
+
* Default to `'csrfToken'`
|
|
87
|
+
*/
|
|
88
|
+
cookieName: z.union([z.string(), z.array(z.string())]).default('csrfToken'),
|
|
89
|
+
/**
|
|
90
|
+
* csrf token session name
|
|
91
|
+
*
|
|
92
|
+
* Default to `'csrfToken'`
|
|
93
|
+
*/
|
|
94
|
+
sessionName: z.string().default('csrfToken'),
|
|
95
|
+
/**
|
|
96
|
+
* csrf token request header name
|
|
97
|
+
*
|
|
98
|
+
* Default to `'x-csrf-token'`
|
|
99
|
+
*/
|
|
100
|
+
headerName: z.string().default('x-csrf-token'),
|
|
101
|
+
/**
|
|
102
|
+
* csrf token request body field name
|
|
103
|
+
*
|
|
104
|
+
* Default to `'_csrf'`
|
|
105
|
+
*/
|
|
106
|
+
bodyName: z.union([z.string(), z.array(z.string())]).default('_csrf'),
|
|
107
|
+
/**
|
|
108
|
+
* csrf token request query field name
|
|
109
|
+
*
|
|
110
|
+
* Default to `'_csrf'`
|
|
111
|
+
*/
|
|
112
|
+
queryName: z.union([z.string(), z.array(z.string())]).default('_csrf'),
|
|
113
|
+
/**
|
|
114
|
+
* rotate csrf token when it is invalid
|
|
115
|
+
*
|
|
116
|
+
* Default to `false`
|
|
117
|
+
*/
|
|
118
|
+
rotateWhenInvalid: z.boolean().default(false),
|
|
119
|
+
/**
|
|
120
|
+
* These config works when using `'ctoken'` type
|
|
121
|
+
*
|
|
122
|
+
* Default to `false`
|
|
123
|
+
*/
|
|
124
|
+
useSession: z.boolean().default(false),
|
|
125
|
+
/**
|
|
126
|
+
* csrf token cookie domain setting,
|
|
127
|
+
* can be `(ctx) => string` or `string`
|
|
128
|
+
*
|
|
129
|
+
* Default to `undefined`, auto set the cookie domain in the safe way
|
|
130
|
+
*/
|
|
131
|
+
cookieDomain: z.union([z.string(), z.function().args(z.instanceof(Context)).returns(z.string())]).optional(),
|
|
132
|
+
/**
|
|
133
|
+
* csrf token check requests config
|
|
134
|
+
*/
|
|
135
|
+
supportedRequests: z
|
|
136
|
+
.array(CSRFSupportRequestItem)
|
|
137
|
+
.default([{ path: /^\//, methods: ['POST', 'PATCH', 'DELETE', 'PUT', 'CONNECT'] }]),
|
|
138
|
+
/**
|
|
139
|
+
* referer or origin header white list.
|
|
140
|
+
* It only works when using `'referer'` type
|
|
141
|
+
*
|
|
142
|
+
* Default to `[]`
|
|
143
|
+
*/
|
|
144
|
+
refererWhiteList: z.array(z.string()).default([]),
|
|
145
|
+
/**
|
|
146
|
+
* csrf token cookie options
|
|
147
|
+
*
|
|
148
|
+
* Default to `{
|
|
149
|
+
* signed: false,
|
|
150
|
+
* httpOnly: false,
|
|
151
|
+
* overwrite: true,
|
|
152
|
+
* }`
|
|
153
|
+
*/
|
|
154
|
+
cookieOptions: z
|
|
155
|
+
.object({
|
|
156
|
+
signed: z.boolean(),
|
|
157
|
+
httpOnly: z.boolean(),
|
|
158
|
+
overwrite: z.boolean(),
|
|
159
|
+
})
|
|
160
|
+
.default({
|
|
161
|
+
signed: false,
|
|
162
|
+
httpOnly: false,
|
|
163
|
+
overwrite: true,
|
|
164
|
+
}),
|
|
165
|
+
})
|
|
166
|
+
.default({})),
|
|
167
|
+
/**
|
|
168
|
+
* whether enable X-Frame-Options response header
|
|
169
|
+
*/
|
|
170
|
+
xframe: z
|
|
171
|
+
.object({
|
|
172
|
+
match: IgnoreOrMatchOption,
|
|
173
|
+
ignore: IgnoreOrMatchOption,
|
|
174
|
+
/**
|
|
175
|
+
* Default to `true`
|
|
176
|
+
*/
|
|
177
|
+
enable: z.boolean().default(true),
|
|
178
|
+
/**
|
|
179
|
+
* X-Frame-Options value, can be `'DENY'`, `'SAMEORIGIN'`, `'ALLOW-FROM https://example.com'`
|
|
180
|
+
*
|
|
181
|
+
* Default to `'SAMEORIGIN'`
|
|
182
|
+
*/
|
|
183
|
+
value: z.string().default('SAMEORIGIN'),
|
|
184
|
+
})
|
|
185
|
+
.default({}),
|
|
186
|
+
/**
|
|
187
|
+
* whether enable Strict-Transport-Security response header
|
|
188
|
+
*/
|
|
189
|
+
hsts: z
|
|
190
|
+
.object({
|
|
191
|
+
match: IgnoreOrMatchOption,
|
|
192
|
+
ignore: IgnoreOrMatchOption,
|
|
193
|
+
/**
|
|
194
|
+
* Default to `false`
|
|
195
|
+
*/
|
|
196
|
+
enable: z.boolean().default(false),
|
|
197
|
+
/**
|
|
198
|
+
* Max age of Strict-Transport-Security in seconds
|
|
199
|
+
*
|
|
200
|
+
* Default to `365 * 24 * 3600`
|
|
201
|
+
*/
|
|
202
|
+
maxAge: z.number().default(365 * 24 * 3600),
|
|
203
|
+
/**
|
|
204
|
+
* Whether include sub domains
|
|
205
|
+
*
|
|
206
|
+
* Default to `false`
|
|
207
|
+
*/
|
|
208
|
+
includeSubdomains: z.boolean().default(false),
|
|
209
|
+
})
|
|
210
|
+
.default({}),
|
|
211
|
+
/**
|
|
212
|
+
* whether enable Http Method filter
|
|
213
|
+
*/
|
|
214
|
+
methodnoallow: z
|
|
215
|
+
.object({
|
|
216
|
+
match: IgnoreOrMatchOption,
|
|
217
|
+
ignore: IgnoreOrMatchOption,
|
|
218
|
+
/**
|
|
219
|
+
* Default to `true`
|
|
220
|
+
*/
|
|
221
|
+
enable: z.boolean().default(true),
|
|
222
|
+
})
|
|
223
|
+
.default({}),
|
|
224
|
+
/**
|
|
225
|
+
* whether enable IE automatically download open
|
|
226
|
+
*/
|
|
227
|
+
noopen: z
|
|
228
|
+
.object({
|
|
229
|
+
match: IgnoreOrMatchOption,
|
|
230
|
+
ignore: IgnoreOrMatchOption,
|
|
231
|
+
/**
|
|
232
|
+
* Default to `true`
|
|
233
|
+
*/
|
|
234
|
+
enable: z.boolean().default(true),
|
|
235
|
+
})
|
|
236
|
+
.default({}),
|
|
237
|
+
/**
|
|
238
|
+
* whether enable IE8 automatically detect mime
|
|
239
|
+
*/
|
|
240
|
+
nosniff: z
|
|
241
|
+
.object({
|
|
242
|
+
match: IgnoreOrMatchOption,
|
|
243
|
+
ignore: IgnoreOrMatchOption,
|
|
244
|
+
/**
|
|
245
|
+
* Default to `true`
|
|
246
|
+
*/
|
|
247
|
+
enable: z.boolean().default(true),
|
|
248
|
+
})
|
|
249
|
+
.default({}),
|
|
250
|
+
/**
|
|
251
|
+
* whether enable IE8 XSS Filter
|
|
252
|
+
*/
|
|
253
|
+
xssProtection: z
|
|
254
|
+
.object({
|
|
255
|
+
match: IgnoreOrMatchOption,
|
|
256
|
+
ignore: IgnoreOrMatchOption,
|
|
257
|
+
/**
|
|
258
|
+
* Default to `true`
|
|
259
|
+
*/
|
|
260
|
+
enable: z.boolean().default(true),
|
|
261
|
+
/**
|
|
262
|
+
* X-XSS-Protection response header value
|
|
263
|
+
*
|
|
264
|
+
* Default to `'1; mode=block'`
|
|
265
|
+
*/
|
|
266
|
+
value: z.coerce.string().default('1; mode=block'),
|
|
267
|
+
})
|
|
268
|
+
.default({}),
|
|
269
|
+
/**
|
|
270
|
+
* content security policy config
|
|
271
|
+
*/
|
|
272
|
+
csp: z
|
|
273
|
+
.object({
|
|
274
|
+
match: IgnoreOrMatchOption,
|
|
275
|
+
ignore: IgnoreOrMatchOption,
|
|
276
|
+
/**
|
|
277
|
+
* Default to `false`
|
|
278
|
+
*/
|
|
279
|
+
enable: z.boolean().default(false),
|
|
280
|
+
// https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP#csp_overview
|
|
281
|
+
policy: z.record(z.union([z.string(), z.array(z.string()), z.boolean()])).default({}),
|
|
282
|
+
/**
|
|
283
|
+
* whether enable report only mode
|
|
284
|
+
* Default to `undefined`
|
|
285
|
+
*/
|
|
286
|
+
reportOnly: z.boolean().optional(),
|
|
287
|
+
/**
|
|
288
|
+
* whether support IE
|
|
289
|
+
* Default to `undefined`
|
|
290
|
+
*/
|
|
291
|
+
supportIE: z.boolean().optional(),
|
|
292
|
+
})
|
|
293
|
+
.default({}),
|
|
294
|
+
/**
|
|
295
|
+
* whether enable referrer policy
|
|
296
|
+
* @see https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Referrer-Policy
|
|
297
|
+
*/
|
|
298
|
+
referrerPolicy: z
|
|
299
|
+
.object({
|
|
300
|
+
match: IgnoreOrMatchOption,
|
|
301
|
+
ignore: IgnoreOrMatchOption,
|
|
302
|
+
/**
|
|
303
|
+
* Default to `false`
|
|
304
|
+
*/
|
|
305
|
+
enable: z.boolean().default(false),
|
|
306
|
+
/**
|
|
307
|
+
* referrer policy value
|
|
308
|
+
*
|
|
309
|
+
* Default to `'no-referrer-when-downgrade'`
|
|
310
|
+
*/
|
|
311
|
+
value: z.string().default('no-referrer-when-downgrade'),
|
|
312
|
+
})
|
|
313
|
+
.default({}),
|
|
314
|
+
/**
|
|
315
|
+
* whether enable auto avoid directory traversal attack
|
|
316
|
+
*/
|
|
317
|
+
dta: z
|
|
318
|
+
.object({
|
|
319
|
+
match: IgnoreOrMatchOption,
|
|
320
|
+
ignore: IgnoreOrMatchOption,
|
|
321
|
+
/**
|
|
322
|
+
* Default to `true`
|
|
323
|
+
*/
|
|
324
|
+
enable: z.boolean().default(true),
|
|
325
|
+
})
|
|
326
|
+
.default({}),
|
|
327
|
+
ssrf: z
|
|
328
|
+
.object({
|
|
329
|
+
ipBlackList: z.array(z.string()).optional(),
|
|
330
|
+
ipExceptionList: z.array(z.string()).optional(),
|
|
331
|
+
hostnameExceptionList: z.array(z.string()).optional(),
|
|
332
|
+
checkAddress: SSRFCheckAddressFunction.optional(),
|
|
333
|
+
})
|
|
334
|
+
.default({}),
|
|
335
|
+
match: z.union([IgnoreOrMatch, IgnoreOrMatch.array()]).optional(),
|
|
336
|
+
ignore: z.union([IgnoreOrMatch, IgnoreOrMatch.array()]).optional(),
|
|
337
|
+
__protocolWhiteListSet: z.set(z.string()).optional().readonly(),
|
|
338
|
+
});
|
|
339
|
+
const SecurityHelperOnTagAttrHandler = z
|
|
340
|
+
.function()
|
|
341
|
+
.args(z.string(), z.string(), z.string(), z.boolean())
|
|
342
|
+
.returns(z.union([z.string(), z.void()]));
|
|
343
|
+
export const SecurityHelperConfig = z.object({
|
|
344
|
+
shtml: z
|
|
345
|
+
.object({
|
|
346
|
+
/**
|
|
347
|
+
* tag attribute white list
|
|
348
|
+
*/
|
|
349
|
+
whiteList: z.record(z.array(z.string())).optional(),
|
|
350
|
+
/**
|
|
351
|
+
* domain white list
|
|
352
|
+
* @deprecated use `config.security.domainWhiteList` instead
|
|
353
|
+
*/
|
|
354
|
+
domainWhiteList: z.array(z.string()).optional(),
|
|
355
|
+
/**
|
|
356
|
+
* tag attribute handler
|
|
357
|
+
*/
|
|
358
|
+
onTagAttr: SecurityHelperOnTagAttrHandler.optional(),
|
|
359
|
+
})
|
|
360
|
+
.default({}),
|
|
153
361
|
});
|
|
154
|
-
|
|
155
|
-
|
|
156
|
-
|
|
157
|
-
domainWhiteList: z.array(z.string()).optional(),
|
|
158
|
-
onTagAttr: SecurityHelperOnTagAttrHandler.optional()
|
|
159
|
-
}).default({}) });
|
|
160
|
-
var config_default_default = {
|
|
161
|
-
security: SecurityConfig.parse({}),
|
|
162
|
-
helper: SecurityHelperConfig.parse({})
|
|
362
|
+
export default {
|
|
363
|
+
security: SecurityConfig.parse({}),
|
|
364
|
+
helper: SecurityHelperConfig.parse({}),
|
|
163
365
|
};
|
|
164
|
-
|
|
165
|
-
//#endregion
|
|
166
|
-
export { LookupAddress, SecurityConfig, SecurityHelperConfig, SecurityMiddlewareName, config_default_default as default };
|
|
366
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"config.default.js","sourceRoot":"","sources":["../../src/config/config.default.ts"],"names":[],"mappings":"AAAA,OAAO,CAAC,MAAM,KAAK,CAAC;AACpB,OAAO,EAAE,OAAO,EAAE,MAAM,KAAK,CAAC;AAE9B,MAAM,sBAAsB,GAAG,CAAC,CAAC,MAAM,CAAC;IACtC,IAAI,EAAE,CAAC,CAAC,UAAU,CAAC,MAAM,CAAC;IAC1B,OAAO,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC;CAC7B,CAAC,CAAC;AAGH,MAAM,CAAC,MAAM,aAAa,GAAG,CAAC,CAAC,MAAM,CAAC;IACpC,OAAO,EAAE,CAAC,CAAC,MAAM,EAAE;IACnB,MAAM,EAAE,CAAC,CAAC,MAAM,EAAE;CACnB,CAAC,CAAC;AAGH,MAAM,2BAA2B,GAAG,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,MAAM,EAAE,EAAE,aAAa,CAAC,CAAC,CAAC,KAAK,EAAE,CAAC;AACjF,MAAM,wBAAwB,GAAG,CAAC;KAC/B,QAAQ,EAAE;KACV,IAAI,CACH,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,MAAM,EAAE,EAAE,aAAa,EAAE,2BAA2B,CAAC,CAAC,EACjE,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC,MAAM,EAAE,CAAC,CAAC,EACjC,CAAC,CAAC,MAAM,EAAE,CACX;KACA,OAAO,CAAC,CAAC,CAAC,OAAO,EAAE,CAAC,CAAC;AAOxB,MAAM,CAAC,MAAM,sBAAsB,GAAG,CAAC,CAAC,IAAI,CAAC;IAC3C,MAAM;IACN,MAAM;IACN,eAAe;IACf,QAAQ;IACR,SAAS;IACT,KAAK;IACL,eAAe;IACf,QAAQ;IACR,KAAK;CACN,CAAC,CAAC;AAGH;;GAEG;AACH,MAAM,oBAAoB,GAAG,CAAC,CAAC,QAAQ,EAAE,CAAC,IAAI,CAAC,CAAC,CAAC,UAAU,CAAC,OAAO,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,OAAO,EAAE,CAAC,CAAC;AAG3F,MAAM,aAAa,GAAG,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC,UAAU,CAAC,MAAM,CAAC,EAAE,oBAAoB,CAAC,CAAC,CAAC;AAGxF,MAAM,mBAAmB,GAAG,CAAC,CAAC,KAAK,CAAC,CAAC,aAAa,EAAE,aAAa,CAAC,KAAK,EAAE,CAAC,CAAC,CAAC,QAAQ,EAAE,CAAC;AAGvF,MAAM,CAAC,MAAM,cAAc,GAAG,CAAC,CAAC,MAAM,CAAC;IACrC;;;;OAIG;IACH,eAAe,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,CAAC,OAAO,CAAC,EAAE,CAAC;IAChD;;;;OAIG;IACH,iBAAiB,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,CAAC,OAAO,CAAC,EAAE,CAAC;IAClD;;;;OAIG;IACH,iBAAiB,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC,KAAK,CAAC,sBAAsB,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,CAAC;IACjH;;OAEG;IACH,IAAI,EAAE,CAAC,CAAC,UAAU,CAChB,GAAG,CAAC,EAAE;QACJ,mEAAmE;QACnE,IAAI,OAAO,GAAG,KAAK,SAAS,EAAE,CAAC;YAC7B,OAAO,EAAE,MAAM,EAAE,GAAG,EAAE,CAAC;QACzB,CAAC;QACD,OAAO,GAAG,CAAC;IACb,CAAC,EACD,CAAC;SACE,MAAM,CAAC;QACN,KAAK,EAAE,mBAAmB;QAC1B,MAAM,EAAE,mBAAmB;QAC3B;;WAEG;QACH,MAAM,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC,OAAO,CAAC,IAAI,CAAC;QACjC;;;;WAIG;QACH,IAAI,EAAE,CAAC,CAAC,IAAI,CAAC,CAAC,QAAQ,EAAE,SAAS,EAAE,KAAK,EAAE,KAAK,CAAC,CAAC,CAAC,OAAO,CAAC,QAAQ,CAAC;QACnE;;;;;;WAMG;QACH,UAAU,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC,OAAO,CAAC,KAAK,CAAC;QACtC;;;;WAIG;QACH,UAAU,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,WAAW,CAAC;QAC3E;;;;WAIG;QACH,WAAW,EAAE,CAAC,CAAC,MAAM,EAAE,CAAC,OAAO,CAAC,WAAW,CAAC;QAC5C;;;;WAIG;QACH,UAAU,EAAE,CAAC,CAAC,MAAM,EAAE,CAAC,OAAO,CAAC,cAAc,CAAC;QAC9C;;;;WAIG;QACH,QAAQ,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,OAAO,CAAC;QACrE;;;;WAIG;QACH,SAAS,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,OAAO,CAAC;QACtE;;;;WAIG;QACH,iBAAiB,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC,OAAO,CAAC,KAAK,CAAC;QAC7C;;;;WAIG;QACH,UAAU,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC,OAAO,CAAC,KAAK,CAAC;QACtC;;;;;WAKG;QACH,YAAY,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC,QAAQ,EAAE,CAAC,IAAI,CAAC,CAAC,CAAC,UAAU,CAAC,OAAO,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,CAAC,CAAC,CAAC,QAAQ,EAAE;QAC5G;;WAEG;QACH,iBAAiB,EAAE,CAAC;aACjB,KAAK,CAAC,sBAAsB,CAAC;aAC7B,OAAO,CAAC,CAAC,EAAE,IAAI,EAAE,KAAK,EAAE,OAAO,EAAE,CAAC,MAAM,EAAE,OAAO,EAAE,QAAQ,EAAE,KAAK,EAAE,SAAS,CAAC,EAAE,CAAC,CAAC;QACrF;;;;;WAKG;QACH,gBAAgB,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,CAAC,OAAO,CAAC,EAAE,CAAC;QACjD;;;;;;;;WAQG;QACH,aAAa,EAAE,CAAC;aACb,MAAM,CAAC;YACN,MAAM,EAAE,CAAC,CAAC,OAAO,EAAE;YACnB,QAAQ,EAAE,CAAC,CAAC,OAAO,EAAE;YACrB,SAAS,EAAE,CAAC,CAAC,OAAO,EAAE;SACvB,CAAC;aACD,OAAO,CAAC;YACP,MAAM,EAAE,KAAK;YACb,QAAQ,EAAE,KAAK;YACf,SAAS,EAAE,IAAI;SAChB,CAAC;KACL,CAAC;SACD,OAAO,CAAC,EAAE,CAAC,CACf;IACD;;OAEG;IACH,MAAM,EAAE,CAAC;SACN,MAAM,CAAC;QACN,KAAK,EAAE,mBAAmB;QAC1B,MAAM,EAAE,mBAAmB;QAC3B;;WAEG;QACH,MAAM,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC,OAAO,CAAC,IAAI,CAAC;QACjC;;;;WAIG;QACH,KAAK,EAAE,CAAC,CAAC,MAAM,EAAE,CAAC,OAAO,CAAC,YAAY,CAAC;KACxC,CAAC;SACD,OAAO,CAAC,EAAE,CAAC;IACd;;OAEG;IACH,IAAI,EAAE,CAAC;SACJ,MAAM,CAAC;QACN,KAAK,EAAE,mBAAmB;QAC1B,MAAM,EAAE,mBAAmB;QAC3B;;WAEG;QACH,MAAM,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC,OAAO,CAAC,KAAK,CAAC;QAClC;;;;WAIG;QACH,MAAM,EAAE,CAAC,CAAC,MAAM,EAAE,CAAC,OAAO,CAAC,GAAG,GAAG,EAAE,GAAG,IAAI,CAAC;QAC3C;;;;WAIG;QACH,iBAAiB,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC,OAAO,CAAC,KAAK,CAAC;KAC9C,CAAC;SACD,OAAO,CAAC,EAAE,CAAC;IACd;;OAEG;IACH,aAAa,EAAE,CAAC;SACb,MAAM,CAAC;QACN,KAAK,EAAE,mBAAmB;QAC1B,MAAM,EAAE,mBAAmB;QAC3B;;WAEG;QACH,MAAM,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC,OAAO,CAAC,IAAI,CAAC;KAClC,CAAC;SACD,OAAO,CAAC,EAAE,CAAC;IACd;;OAEG;IACH,MAAM,EAAE,CAAC;SACN,MAAM,CAAC;QACN,KAAK,EAAE,mBAAmB;QAC1B,MAAM,EAAE,mBAAmB;QAC3B;;WAEG;QACH,MAAM,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC,OAAO,CAAC,IAAI,CAAC;KAClC,CAAC;SACD,OAAO,CAAC,EAAE,CAAC;IACd;;OAEG;IACH,OAAO,EAAE,CAAC;SACP,MAAM,CAAC;QACN,KAAK,EAAE,mBAAmB;QAC1B,MAAM,EAAE,mBAAmB;QAC3B;;WAEG;QACH,MAAM,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC,OAAO,CAAC,IAAI,CAAC;KAClC,CAAC;SACD,OAAO,CAAC,EAAE,CAAC;IACd;;OAEG;IACH,aAAa,EAAE,CAAC;SACb,MAAM,CAAC;QACN,KAAK,EAAE,mBAAmB;QAC1B,MAAM,EAAE,mBAAmB;QAC3B;;WAEG;QACH,MAAM,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC,OAAO,CAAC,IAAI,CAAC;QACjC;;;;WAIG;QACH,KAAK,EAAE,CAAC,CAAC,MAAM,CAAC,MAAM,EAAE,CAAC,OAAO,CAAC,eAAe,CAAC;KAClD,CAAC;SACD,OAAO,CAAC,EAAE,CAAC;IACd;;OAEG;IACH,GAAG,EAAE,CAAC;SACH,MAAM,CAAC;QACN,KAAK,EAAE,mBAAmB;QAC1B,MAAM,EAAE,mBAAmB;QAC3B;;WAEG;QACH,MAAM,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC,OAAO,CAAC,KAAK,CAAC;QAClC,qEAAqE;QACrE,MAAM,EAAE,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,EAAE,CAAC;QACrF;;;WAGG;QACH,UAAU,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC,QAAQ,EAAE;QAClC;;;WAGG;QACH,SAAS,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC,QAAQ,EAAE;KAClC,CAAC;SACD,OAAO,CAAC,EAAE,CAAC;IACd;;;OAGG;IACH,cAAc,EAAE,CAAC;SACd,MAAM,CAAC;QACN,KAAK,EAAE,mBAAmB;QAC1B,MAAM,EAAE,mBAAmB;QAC3B;;WAEG;QACH,MAAM,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC,OAAO,CAAC,KAAK,CAAC;QAClC;;;;WAIG;QACH,KAAK,EAAE,CAAC,CAAC,MAAM,EAAE,CAAC,OAAO,CAAC,4BAA4B,CAAC;KACxD,CAAC;SACD,OAAO,CAAC,EAAE,CAAC;IACd;;OAEG;IACH,GAAG,EAAE,CAAC;SACH,MAAM,CAAC;QACN,KAAK,EAAE,mBAAmB;QAC1B,MAAM,EAAE,mBAAmB;QAC3B;;WAEG;QACH,MAAM,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC,OAAO,CAAC,IAAI,CAAC;KAClC,CAAC;SACD,OAAO,CAAC,EAAE,CAAC;IACd,IAAI,EAAE,CAAC;SACJ,MAAM,CAAC;QACN,WAAW,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,CAAC,QAAQ,EAAE;QAC3C,eAAe,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,CAAC,QAAQ,EAAE;QAC/C,qBAAqB,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,CAAC,QAAQ,EAAE;QACrD,YAAY,EAAE,wBAAwB,CAAC,QAAQ,EAAE;KAClD,CAAC;SACD,OAAO,CAAC,EAAE,CAAC;IACd,KAAK,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,aAAa,EAAE,aAAa,CAAC,KAAK,EAAE,CAAC,CAAC,CAAC,QAAQ,EAAE;IACjE,MAAM,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,aAAa,EAAE,aAAa,CAAC,KAAK,EAAE,CAAC,CAAC,CAAC,QAAQ,EAAE;IAClE,sBAAsB,EAAE,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,CAAC,QAAQ,EAAE,CAAC,QAAQ,EAAE;CAChE,CAAC,CAAC;AAGH,MAAM,8BAA8B,GAAG,CAAC;KACrC,QAAQ,EAAE;KACV,IAAI,CAAC,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC;KACrD,OAAO,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC,IAAI,EAAE,CAAC,CAAC,CAAC,CAAC;AAO5C,MAAM,CAAC,MAAM,oBAAoB,GAAG,CAAC,CAAC,MAAM,CAAC;IAC3C,KAAK,EAAE,CAAC;SACL,MAAM,CAAC;QACN;;WAEG;QACH,SAAS,EAAE,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,CAAC,CAAC,QAAQ,EAAE;QACnD;;;WAGG;QACH,eAAe,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,CAAC,QAAQ,EAAE;QAC/C;;WAEG;QACH,SAAS,EAAE,8BAA8B,CAAC,QAAQ,EAAE;KACrD,CAAC;SACD,OAAO,CAAC,EAAE,CAAC;CACf,CAAC,CAAC;AAGH,eAAe;IACb,QAAQ,EAAE,cAAc,CAAC,KAAK,CAAC,EAAE,CAAC;IAClC,MAAM,EAAE,oBAAoB,CAAC,KAAK,CAAC,EAAE,CAAC;CACvC,CAAC"}
|
|
@@ -1,5 +1,8 @@
|
|
|
1
|
-
|
|
2
|
-
|
|
3
|
-
|
|
4
|
-
|
|
5
|
-
|
|
1
|
+
export default {
|
|
2
|
+
security: {
|
|
3
|
+
hsts: {
|
|
4
|
+
enable: false,
|
|
5
|
+
},
|
|
6
|
+
},
|
|
7
|
+
};
|
|
8
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiY29uZmlnLmxvY2FsLmpzIiwic291cmNlUm9vdCI6IiIsInNvdXJjZXMiOlsiLi4vLi4vc3JjL2NvbmZpZy9jb25maWcubG9jYWwudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6IkFBRUEsZUFBZTtJQUNiLFFBQVEsRUFBRTtRQUNSLElBQUksRUFBRTtZQUNKLE1BQU0sRUFBRSxLQUFLO1NBQ2Q7S0FDRjtDQUNrQixDQUFDIn0=
|
package/dist/index.d.ts
CHANGED
package/dist/index.js
CHANGED
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
import "./app/extend/application.js";
|
|
2
2
|
import "./app/extend/context.js";
|
|
3
3
|
import "./app/extend/response.js";
|
|
4
|
-
|
|
5
|
-
|
|
4
|
+
import "./types.js";
|
|
5
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi9zcmMvaW5kZXgudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6IkFBQUEsT0FBTyw2QkFBNkIsQ0FBQztBQUNyQyxPQUFPLHlCQUF5QixDQUFDO0FBQ2pDLE9BQU8sMEJBQTBCLENBQUM7QUFDbEMsT0FBTyxZQUFZLENBQUMifQ==
|
|
@@ -1,20 +1,16 @@
|
|
|
1
|
-
import {
|
|
2
|
-
import
|
|
3
|
-
import { EggApplicationCore } from "egg";
|
|
4
|
-
|
|
5
|
-
//#region src/lib/extend/safe_curl.d.ts
|
|
1
|
+
import type { EggApplicationCore } from 'egg';
|
|
2
|
+
import type { SSRFCheckAddressFunction } from '../../config/config.default.ts';
|
|
6
3
|
type HttpClient = EggApplicationCore['HttpClient'];
|
|
7
4
|
type HttpClientParameters = Parameters<HttpClient['prototype']['request']>;
|
|
8
|
-
type HttpClientRequestURL = HttpClientParameters[0];
|
|
9
|
-
type HttpClientOptions = HttpClientParameters[1] & {
|
|
10
|
-
|
|
5
|
+
export type HttpClientRequestURL = HttpClientParameters[0];
|
|
6
|
+
export type HttpClientOptions = HttpClientParameters[1] & {
|
|
7
|
+
checkAddress?: SSRFCheckAddressFunction;
|
|
11
8
|
};
|
|
12
|
-
type HttpClientResponse<T = any> = Awaited<ReturnType<HttpClient['prototype']['request']>> & {
|
|
13
|
-
|
|
9
|
+
export type HttpClientResponse<T = any> = Awaited<ReturnType<HttpClient['prototype']['request']>> & {
|
|
10
|
+
data: T;
|
|
14
11
|
};
|
|
15
12
|
/**
|
|
16
13
|
* safe curl with ssrf protection
|
|
17
14
|
*/
|
|
18
|
-
declare function safeCurlForApplication<T = any>(app: EggApplicationCore, url: HttpClientRequestURL, options?: HttpClientOptions): Promise<
|
|
19
|
-
|
|
20
|
-
export { HttpClientOptions, HttpClientRequestURL, HttpClientResponse, safeCurlForApplication };
|
|
15
|
+
export declare function safeCurlForApplication<T = any>(app: EggApplicationCore, url: HttpClientRequestURL, options?: HttpClientOptions): Promise<import("egg").HttpClientResponse<T>>;
|
|
16
|
+
export {};
|
|
@@ -1,19 +1,25 @@
|
|
|
1
|
-
|
|
2
|
-
const SSRF_HTTPCLIENT = Symbol("SSRF_HTTPCLIENT");
|
|
1
|
+
const SSRF_HTTPCLIENT = Symbol('SSRF_HTTPCLIENT');
|
|
3
2
|
/**
|
|
4
|
-
* safe curl with ssrf protection
|
|
5
|
-
*/
|
|
6
|
-
async function safeCurlForApplication(app, url, options = {}) {
|
|
7
|
-
|
|
8
|
-
|
|
9
|
-
|
|
10
|
-
|
|
11
|
-
|
|
12
|
-
|
|
13
|
-
|
|
14
|
-
|
|
15
|
-
|
|
3
|
+
* safe curl with ssrf protection
|
|
4
|
+
*/
|
|
5
|
+
export async function safeCurlForApplication(app, url, options = {}) {
|
|
6
|
+
const ssrfConfig = app.config.security.ssrf;
|
|
7
|
+
if (ssrfConfig?.checkAddress) {
|
|
8
|
+
options.checkAddress = ssrfConfig.checkAddress;
|
|
9
|
+
}
|
|
10
|
+
else {
|
|
11
|
+
app.logger.warn('[@eggjs/security] please configure `config.security.ssrf` first');
|
|
12
|
+
}
|
|
13
|
+
if (ssrfConfig?.checkAddress) {
|
|
14
|
+
let httpClient = app[SSRF_HTTPCLIENT];
|
|
15
|
+
// use the new httpClient init with checkAddress
|
|
16
|
+
if (!httpClient) {
|
|
17
|
+
httpClient = app[SSRF_HTTPCLIENT] = app.createHttpClient({
|
|
18
|
+
checkAddress: ssrfConfig.checkAddress,
|
|
19
|
+
});
|
|
20
|
+
}
|
|
21
|
+
return await httpClient.request(url, options);
|
|
22
|
+
}
|
|
23
|
+
return await app.curl(url, options);
|
|
16
24
|
}
|
|
17
|
-
|
|
18
|
-
//#endregion
|
|
19
|
-
export { safeCurlForApplication };
|
|
25
|
+
//# sourceMappingURL=data:application/json;base64,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
|