@eggjs/security 5.0.0-beta.34 → 5.0.0-beta.36

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (71) hide show
  1. package/dist/agent.d.ts +9 -5
  2. package/dist/agent.js +14 -10
  3. package/dist/app/extend/agent.d.ts +8 -4
  4. package/dist/app/extend/agent.js +12 -8
  5. package/dist/app/extend/application.d.ts +11 -7
  6. package/dist/app/extend/application.js +32 -32
  7. package/dist/app/extend/context.d.ts +55 -51
  8. package/dist/app/extend/context.js +185 -240
  9. package/dist/app/extend/helper.d.ts +5 -2
  10. package/dist/app/extend/helper.js +8 -6
  11. package/dist/app/extend/response.d.ts +38 -34
  12. package/dist/app/extend/response.js +69 -82
  13. package/dist/app/middleware/securities.d.ts +5 -2
  14. package/dist/app/middleware/securities.js +38 -52
  15. package/dist/app.d.ts +9 -5
  16. package/dist/app.js +22 -24
  17. package/dist/config/config.default.d.ts +34 -45
  18. package/dist/config/config.default.js +158 -362
  19. package/dist/config/config.local.d.ts +6 -3
  20. package/dist/config/config.local.js +6 -8
  21. package/dist/index.d.ts +20 -16
  22. package/dist/index.js +24 -21
  23. package/dist/lib/extend/safe_curl.d.ts +16 -13
  24. package/dist/lib/extend/safe_curl.js +17 -23
  25. package/dist/lib/helper/cliFilter.d.ts +4 -4
  26. package/dist/lib/helper/cliFilter.js +16 -15
  27. package/dist/lib/helper/escape.d.ts +2 -2
  28. package/dist/lib/helper/escape.js +7 -3
  29. package/dist/lib/helper/escapeShellArg.d.ts +4 -1
  30. package/dist/lib/helper/escapeShellArg.js +6 -4
  31. package/dist/lib/helper/escapeShellCmd.d.ts +4 -1
  32. package/dist/lib/helper/escapeShellCmd.js +14 -13
  33. package/dist/lib/helper/index.d.ts +22 -19
  34. package/dist/lib/helper/index.js +19 -15
  35. package/dist/lib/helper/shtml.d.ts +6 -2
  36. package/dist/lib/helper/shtml.js +52 -68
  37. package/dist/lib/helper/sjs.d.ts +4 -4
  38. package/dist/lib/helper/sjs.js +31 -44
  39. package/dist/lib/helper/sjson.d.ts +4 -1
  40. package/dist/lib/helper/sjson.js +28 -35
  41. package/dist/lib/helper/spath.d.ts +7 -5
  42. package/dist/lib/helper/spath.js +15 -24
  43. package/dist/lib/helper/surl.d.ts +6 -2
  44. package/dist/lib/helper/surl.js +22 -27
  45. package/dist/lib/middlewares/csp.d.ts +6 -3
  46. package/dist/lib/middlewares/csp.js +43 -54
  47. package/dist/lib/middlewares/csrf.d.ts +6 -3
  48. package/dist/lib/middlewares/csrf.js +31 -35
  49. package/dist/lib/middlewares/dta.d.ts +5 -2
  50. package/dist/lib/middlewares/dta.js +11 -10
  51. package/dist/lib/middlewares/hsts.d.ts +6 -3
  52. package/dist/lib/middlewares/hsts.js +17 -19
  53. package/dist/lib/middlewares/index.d.ts +24 -21
  54. package/dist/lib/middlewares/index.js +26 -22
  55. package/dist/lib/middlewares/methodnoallow.d.ts +5 -2
  56. package/dist/lib/middlewares/methodnoallow.js +13 -18
  57. package/dist/lib/middlewares/noopen.d.ts +6 -3
  58. package/dist/lib/middlewares/noopen.js +14 -13
  59. package/dist/lib/middlewares/nosniff.d.ts +6 -3
  60. package/dist/lib/middlewares/nosniff.js +22 -24
  61. package/dist/lib/middlewares/referrerPolicy.d.ts +6 -3
  62. package/dist/lib/middlewares/referrerPolicy.js +27 -30
  63. package/dist/lib/middlewares/xframe.d.ts +6 -3
  64. package/dist/lib/middlewares/xframe.js +16 -15
  65. package/dist/lib/middlewares/xssProtection.d.ts +6 -3
  66. package/dist/lib/middlewares/xssProtection.js +15 -12
  67. package/dist/lib/utils.d.ts +22 -17
  68. package/dist/lib/utils.js +112 -177
  69. package/dist/types.d.ts +38 -36
  70. package/dist/types.js +1 -2
  71. package/package.json +31 -37
@@ -1,243 +1,188 @@
1
- import { debuglog } from 'node:util';
2
- import { nanoid } from 'nanoid/non-secure';
3
- import Tokens from 'csrf';
4
- import { Context } from 'egg';
5
- import * as utils from "../../lib/utils.js";
6
- const debug = debuglog('egg/security/app/extend/context');
1
+ import { checkIfIgnore, getFromUrl, isSafeDomain } from "../../lib/utils.js";
2
+ import { Context } from "egg";
3
+ import { debuglog } from "node:util";
4
+ import Tokens from "csrf";
5
+ import { nanoid } from "nanoid/non-secure";
6
+
7
+ //#region src/app/extend/context.ts
8
+ const debug = debuglog("egg/security/app/extend/context");
7
9
  const tokens = new Tokens();
8
- const _CSRF_SECRET = Symbol('egg-security#_CSRF_SECRET');
9
- const NEW_CSRF_SECRET = Symbol('egg-security#NEW_CSRF_SECRET');
10
- const NONCE_CACHE = Symbol('egg-security#NONCE_CACHE');
11
- const SECURITY_OPTIONS = Symbol('egg-security#SECURITY_OPTIONS');
10
+ const _CSRF_SECRET = Symbol("egg-security#_CSRF_SECRET");
11
+ const NEW_CSRF_SECRET = Symbol("egg-security#NEW_CSRF_SECRET");
12
+ const NONCE_CACHE = Symbol("egg-security#NONCE_CACHE");
13
+ const SECURITY_OPTIONS = Symbol("egg-security#SECURITY_OPTIONS");
12
14
  function findToken(obj, keys) {
13
- if (!obj)
14
- return;
15
- if (!keys || !keys.length)
16
- return;
17
- if (typeof keys === 'string')
18
- return obj[keys];
19
- for (const key of keys) {
20
- if (obj[key])
21
- return obj[key];
22
- }
15
+ if (!obj) return;
16
+ if (!keys || !keys.length) return;
17
+ if (typeof keys === "string") return obj[keys];
18
+ for (const key of keys) if (obj[key]) return obj[key];
23
19
  }
24
- export default class SecurityContext extends Context {
25
- get securityOptions() {
26
- if (!this[SECURITY_OPTIONS]) {
27
- this[SECURITY_OPTIONS] = {};
28
- }
29
- return this[SECURITY_OPTIONS];
30
- }
31
- /**
32
- * Check whether the specific `domain` is in / matches the whiteList or not.
33
- * @param {string} domain The assigned domain.
34
- * @param {Array<string>} [customWhiteList] The custom white list for domain.
35
- * @return {boolean} If the domain is in / matches the whiteList, return true;
36
- * otherwise false.
37
- */
38
- isSafeDomain(domain, customWhiteList) {
39
- const domainWhiteList = customWhiteList && customWhiteList.length > 0 ? customWhiteList : this.app.config.security.domainWhiteList;
40
- return utils.isSafeDomain(domain, domainWhiteList);
41
- }
42
- // Add nonce, random characters will be OK.
43
- // https://w3c.github.io/webappsec/specs/content-security-policy/#nonce_source
44
- get nonce() {
45
- if (!this[NONCE_CACHE]) {
46
- this[NONCE_CACHE] = nanoid(16);
47
- }
48
- return this[NONCE_CACHE];
49
- }
50
- /**
51
- * get csrf token, general use in template
52
- * @return {String} csrf token
53
- * @public
54
- */
55
- get csrf() {
56
- // csrfSecret can be rotate, use NEW_CSRF_SECRET first
57
- const secret = this[NEW_CSRF_SECRET] || this.getCsrfSecret();
58
- debug('get csrf token, NEW_CSRF_SECRET: %s, _CSRF_SECRET: %s', this[NEW_CSRF_SECRET], this.getCsrfSecret());
59
- // In order to protect against BREACH attacks,
60
- // the token is not simply the secret;
61
- // a random salt is prepended to the secret and used to scramble it.
62
- // http://breachattack.com/
63
- return secret ? tokens.create(secret) : '';
64
- }
65
- /**
66
- * get csrf secret from session or cookie
67
- * @return {String} csrf secret
68
- * @private
69
- */
70
- getCsrfSecret() {
71
- if (this[_CSRF_SECRET]) {
72
- return this[_CSRF_SECRET];
73
- }
74
- let { useSession, sessionName, cookieName: cookieNames, cookieOptions } = this.app.config.security.csrf;
75
- // get secret from session or cookie
76
- if (useSession) {
77
- this[_CSRF_SECRET] = this.session[sessionName] || '';
78
- }
79
- else {
80
- // cookieName support array. so we can change csrf cookie name smoothly
81
- if (!Array.isArray(cookieNames)) {
82
- cookieNames = [cookieNames];
83
- }
84
- for (const cookieName of cookieNames) {
85
- this[_CSRF_SECRET] = this.cookies.get(cookieName, { signed: cookieOptions.signed }) || '';
86
- if (this[_CSRF_SECRET]) {
87
- break;
88
- }
89
- }
90
- }
91
- return this[_CSRF_SECRET];
92
- }
93
- /**
94
- * ensure csrf secret exists in session or cookie.
95
- * @param {Boolean} [rotate] reset secret even if the secret exists
96
- * @public
97
- */
98
- ensureCsrfSecret(rotate) {
99
- const csrfSecret = this.getCsrfSecret();
100
- if (csrfSecret && !rotate) {
101
- return;
102
- }
103
- debug('ensure csrf secret, exists: %s, rotate; %s', csrfSecret, rotate);
104
- const secret = tokens.secretSync();
105
- this[NEW_CSRF_SECRET] = secret;
106
- let { useSession, sessionName, cookieDomain, cookieName: cookieNames, cookieOptions, } = this.app.config.security.csrf;
107
- if (useSession) {
108
- // TODO(fengmk2): need to refactor egg-session plugin to support ctx.session type define
109
- this.session[sessionName] = secret;
110
- }
111
- else {
112
- if (typeof cookieDomain === 'function') {
113
- cookieDomain = cookieDomain(this);
114
- }
115
- const cookieOpts = {
116
- domain: cookieDomain,
117
- ...cookieOptions,
118
- };
119
- // cookieName support array. so we can change csrf cookie name smoothly
120
- if (!Array.isArray(cookieNames)) {
121
- cookieNames = [cookieNames];
122
- }
123
- for (const cookieName of cookieNames) {
124
- this.cookies.set(cookieName, secret, cookieOpts);
125
- }
126
- }
127
- }
128
- getInputToken() {
129
- const { headerName, bodyName, queryName } = this.app.config.security.csrf;
130
- // try order: query, body, header
131
- const token = findToken(this.request.query, queryName) ||
132
- findToken(this.request.body, bodyName) ||
133
- (headerName && this.request.get(headerName));
134
- debug('get token: %j, secret: %j', token, this.getCsrfSecret());
135
- return token;
136
- }
137
- /**
138
- * rotate csrf secret exists in session or cookie.
139
- * must rotate the secret when user login
140
- * @public
141
- */
142
- rotateCsrfSecret() {
143
- if (!this[NEW_CSRF_SECRET] && this.getCsrfSecret()) {
144
- this.ensureCsrfSecret(true);
145
- }
146
- }
147
- /**
148
- * assert csrf token/referer is present
149
- * @public
150
- */
151
- assertCsrf() {
152
- if (utils.checkIfIgnore(this.app.config.security.csrf, this)) {
153
- debug('%s, ignore by csrf options', this.path);
154
- return;
155
- }
156
- const { type } = this.app.config.security.csrf;
157
- let message;
158
- const messages = [];
159
- switch (type) {
160
- case 'ctoken':
161
- message = this.csrfCtokenCheck();
162
- if (message)
163
- this.throw(403, message);
164
- break;
165
- case 'referer':
166
- message = this.csrfRefererCheck();
167
- if (message)
168
- this.throw(403, message);
169
- break;
170
- case 'all':
171
- message = this.csrfCtokenCheck();
172
- if (message)
173
- this.throw(403, message);
174
- message = this.csrfRefererCheck();
175
- if (message)
176
- this.throw(403, message);
177
- break;
178
- case 'any':
179
- message = this.csrfCtokenCheck();
180
- if (!message)
181
- return;
182
- messages.push(message);
183
- message = this.csrfRefererCheck();
184
- if (!message)
185
- return;
186
- messages.push(message);
187
- this.throw(403, `both ctoken and referer check error: ${messages.join(', ')}`);
188
- break;
189
- default:
190
- // @oxlint-disable-next-line Invalid type "never" of template literal expression
191
- this.throw(`invalid type ${type}`);
192
- }
193
- }
194
- csrfCtokenCheck() {
195
- const csrfSecret = this.getCsrfSecret();
196
- if (!csrfSecret) {
197
- debug('missing csrf token');
198
- this.logCsrfNotice('missing csrf token');
199
- return 'missing csrf token';
200
- }
201
- const token = this.getInputToken();
202
- // AJAX requests get csrf token from cookie, in this situation token will equal to secret
203
- // synchronize form requests' token always changing to protect against BREACH attacks
204
- if (token !== csrfSecret && !tokens.verify(csrfSecret, token)) {
205
- debug('verify secret and token error');
206
- this.logCsrfNotice('invalid csrf token');
207
- const { rotateWhenInvalid } = this.app.config.security.csrf;
208
- if (rotateWhenInvalid) {
209
- this.rotateCsrfSecret();
210
- }
211
- return 'invalid csrf token';
212
- }
213
- }
214
- csrfRefererCheck() {
215
- const { refererWhiteList } = this.app.config.security.csrf;
216
- // check Origin/Referer headers
217
- const referer = (this.headers.referer ?? this.headers.origin ?? '').toLowerCase();
218
- if (!referer) {
219
- debug('missing csrf referer or origin');
220
- this.logCsrfNotice('missing csrf referer or origin');
221
- return 'missing csrf referer or origin';
222
- }
223
- const host = utils.getFromUrl(referer, 'host');
224
- const domainList = refererWhiteList.concat(this.host);
225
- if (!host || !utils.isSafeDomain(host, domainList)) {
226
- debug('verify referer or origin error');
227
- this.logCsrfNotice('invalid csrf referer or origin');
228
- return 'invalid csrf referer or origin';
229
- }
230
- }
231
- logCsrfNotice(msg) {
232
- if (this.app.config.env === 'local') {
233
- this.logger.warn(`${msg}. See https://eggjs.org/zh-CN/core/security/#%E5%AE%89%E5%85%A8%E5%A8%81%E8%83%81-csrf-%E7%9A%84%E9%98%B2%E8%8C%83`);
234
- }
235
- }
236
- async safeCurl(url, options) {
237
- return await this.app.safeCurl(url, options);
238
- }
239
- unsafeRedirect(url, alt) {
240
- this.response.unsafeRedirect(url, alt);
241
- }
242
- }
243
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"context.js","sourceRoot":"","sources":["../../../src/app/extend/context.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,QAAQ,EAAE,MAAM,WAAW,CAAC;AAErC,OAAO,EAAE,MAAM,EAAE,MAAM,mBAAmB,CAAC;AAC3C,OAAO,MAAM,MAAM,MAAM,CAAC;AAC1B,OAAO,EAAE,OAAO,EAAE,MAAM,KAAK,CAAC;AAE9B,OAAO,KAAK,KAAK,MAAM,oBAAoB,CAAC;AAK5C,MAAM,KAAK,GAAG,QAAQ,CAAC,iCAAiC,CAAC,CAAC;AAE1D,MAAM,MAAM,GAAG,IAAI,MAAM,EAAE,CAAC;AAE5B,MAAM,YAAY,GAAG,MAAM,CAAC,2BAA2B,CAAC,CAAC;AACzD,MAAM,eAAe,GAAG,MAAM,CAAC,8BAA8B,CAAC,CAAC;AAC/D,MAAM,WAAW,GAAG,MAAM,CAAC,0BAA0B,CAAC,CAAC;AACvD,MAAM,gBAAgB,GAAG,MAAM,CAAC,+BAA+B,CAAC,CAAC;AAEjE,SAAS,SAAS,CAAC,GAA2B,EAAE,IAAuB;IACrE,IAAI,CAAC,GAAG;QAAE,OAAO;IACjB,IAAI,CAAC,IAAI,IAAI,CAAC,IAAI,CAAC,MAAM;QAAE,OAAO;IAClC,IAAI,OAAO,IAAI,KAAK,QAAQ;QAAE,OAAO,GAAG,CAAC,IAAI,CAAC,CAAC;IAC/C,KAAK,MAAM,GAAG,IAAI,IAAI,EAAE,CAAC;QACvB,IAAI,GAAG,CAAC,GAAG,CAAC;YAAE,OAAO,GAAG,CAAC,GAAG,CAAC,CAAC;IAChC,CAAC;AACH,CAAC;AAED,MAAM,CAAC,OAAO,OAAO,eAAgB,SAAQ,OAAO;IAGlD,IAAI,eAAe;QACjB,IAAI,CAAC,IAAI,CAAC,gBAAgB,CAAC,EAAE,CAAC;YAC5B,IAAI,CAAC,gBAAgB,CAAC,GAAG,EAAE,CAAC;QAC9B,CAAC;QACD,OAAO,IAAI,CAAC,gBAAgB,CAA4B,CAAC;IAC3D,CAAC;IAED;;;;;;OAMG;IACH,YAAY,CAAC,MAAc,EAAE,eAA0B;QACrD,MAAM,eAAe,GACnB,eAAe,IAAI,eAAe,CAAC,MAAM,GAAG,CAAC,CAAC,CAAC,CAAC,eAAe,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,MAAM,CAAC,QAAQ,CAAC,eAAe,CAAC;QAC7G,OAAO,KAAK,CAAC,YAAY,CAAC,MAAM,EAAE,eAAe,CAAC,CAAC;IACrD,CAAC;IAED,2CAA2C;IAC3C,8EAA8E;IAC9E,IAAI,KAAK;QACP,IAAI,CAAC,IAAI,CAAC,WAAW,CAAC,EAAE,CAAC;YACvB,IAAI,CAAC,WAAW,CAAC,GAAG,MAAM,CAAC,EAAE,CAAC,CAAC;QACjC,CAAC;QACD,OAAO,IAAI,CAAC,WAAW,CAAW,CAAC;IACrC,CAAC;IAED;;;;OAIG;IACH,IAAI,IAAI;QACN,sDAAsD;QACtD,MAAM,MAAM,GAAG,IAAI,CAAC,eAAe,CAAC,IAAI,IAAI,CAAC,aAAa,EAAE,CAAC;QAC7D,KAAK,CAAC,uDAAuD,EAAE,IAAI,CAAC,eAAe,CAAC,EAAE,IAAI,CAAC,aAAa,EAAE,CAAC,CAAC;QAC5G,+CAA+C;QAC/C,uCAAuC;QACvC,qEAAqE;QACrE,4BAA4B;QAC5B,OAAO,MAAM,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,MAAgB,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC;IACvD,CAAC;IAED;;;;OAIG;IACK,aAAa;QACnB,IAAI,IAAI,CAAC,YAAY,CAAC,EAAE,CAAC;YACvB,OAAO,IAAI,CAAC,YAAY,CAAW,CAAC;QACtC,CAAC;QACD,IAAI,EAAE,UAAU,EAAE,WAAW,EAAE,UAAU,EAAE,WAAW,EAAE,aAAa,EAAE,GAAG,IAAI,CAAC,GAAG,CAAC,MAAM,CAAC,QAAQ,CAAC,IAAI,CAAC;QACxG,oCAAoC;QACpC,IAAI,UAAU,EAAE,CAAC;YACf,IAAI,CAAC,YAAY,CAAC,GAAI,IAAI,CAAC,OAAe,CAAC,WAAW,CAAC,IAAI,EAAE,CAAC;QAChE,CAAC;aAAM,CAAC;YACN,uEAAuE;YACvE,IAAI,CAAC,KAAK,CAAC,OAAO,CAAC,WAAW,CAAC,EAAE,CAAC;gBAChC,WAAW,GAAG,CAAC,WAAW,CAAC,CAAC;YAC9B,CAAC;YACD,KAAK,MAAM,UAAU,IAAI,WAAW,EAAE,CAAC;gBACrC,IAAI,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,OAAO,CAAC,GAAG,CAAC,UAAU,EAAE,EAAE,MAAM,EAAE,aAAa,CAAC,MAAM,EAAE,CAAC,IAAI,EAAE,CAAC;gBAC1F,IAAI,IAAI,CAAC,YAAY,CAAC,EAAE,CAAC;oBACvB,MAAM;gBACR,CAAC;YACH,CAAC;QACH,CAAC;QACD,OAAO,IAAI,CAAC,YAAY,CAAW,CAAC;IACtC,CAAC;IAED;;;;OAIG;IACH,gBAAgB,CAAC,MAAgB;QAC/B,MAAM,UAAU,GAAG,IAAI,CAAC,aAAa,EAAE,CAAC;QACxC,IAAI,UAAU,IAAI,CAAC,MAAM,EAAE,CAAC;YAC1B,OAAO;QACT,CAAC;QACD,KAAK,CAAC,4CAA4C,EAAE,UAAU,EAAE,MAAM,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,MAAM,CAAC,UAAU,EAAE,CAAC;QACnC,IAAI,CAAC,eAAe,CAAC,GAAG,MAAM,CAAC;QAC/B,IAAI,EACF,UAAU,EACV,WAAW,EACX,YAAY,EACZ,UAAU,EAAE,WAAW,EACvB,aAAa,GACd,GAAG,IAAI,CAAC,GAAG,CAAC,MAAM,CAAC,QAAQ,CAAC,IAAI,CAAC;QAElC,IAAI,UAAU,EAAE,CAAC;YACf,wFAAwF;YACvF,IAAI,CAAC,OAAe,CAAC,WAAW,CAAC,GAAG,MAAM,CAAC;QAC9C,CAAC;aAAM,CAAC;YACN,IAAI,OAAO,YAAY,KAAK,UAAU,EAAE,CAAC;gBACvC,YAAY,GAAG,YAAY,CAAC,IAAI,CAAC,CAAC;YACpC,CAAC;YACD,MAAM,UAAU,GAAG;gBACjB,MAAM,EAAE,YAAY;gBACpB,GAAG,aAAa;aACjB,CAAC;YACF,uEAAuE;YACvE,IAAI,CAAC,KAAK,CAAC,OAAO,CAAC,WAAW,CAAC,EAAE,CAAC;gBAChC,WAAW,GAAG,CAAC,WAAW,CAAC,CAAC;YAC9B,CAAC;YACD,KAAK,MAAM,UAAU,IAAI,WAAW,EAAE,CAAC;gBACrC,IAAI,CAAC,OAAO,CAAC,GAAG,CAAC,UAAU,EAAE,MAAM,EAAE,UAAU,CAAC,CAAC;YACnD,CAAC;QACH,CAAC;IACH,CAAC;IAEO,aAAa;QACnB,MAAM,EAAE,UAAU,EAAE,QAAQ,EAAE,SAAS,EAAE,GAAG,IAAI,CAAC,GAAG,CAAC,MAAM,CAAC,QAAQ,CAAC,IAAI,CAAC;QAC1E,iCAAiC;QACjC,MAAM,KAAK,GACT,SAAS,CAAC,IAAI,CAAC,OAAO,CAAC,KAAK,EAAE,SAAS,CAAC;YACxC,SAAS,CAAC,IAAI,CAAC,OAAO,CAAC,IAAI,EAAE,QAAQ,CAAC;YACtC,CAAC,UAAU,IAAI,IAAI,CAAC,OAAO,CAAC,GAAG,CAAS,UAAU,CAAC,CAAC,CAAC;QACvD,KAAK,CAAC,2BAA2B,EAAE,KAAK,EAAE,IAAI,CAAC,aAAa,EAAE,CAAC,CAAC;QAChE,OAAO,KAAK,CAAC;IACf,CAAC;IAED;;;;OAIG;IACH,gBAAgB;QACd,IAAI,CAAC,IAAI,CAAC,eAAe,CAAC,IAAI,IAAI,CAAC,aAAa,EAAE,EAAE,CAAC;YACnD,IAAI,CAAC,gBAAgB,CAAC,IAAI,CAAC,CAAC;QAC9B,CAAC;IACH,CAAC;IAED;;;OAGG;IACH,UAAU;QACR,IAAI,KAAK,CAAC,aAAa,CAAC,IAAI,CAAC,GAAG,CAAC,MAAM,CAAC,QAAQ,CAAC,IAAI,EAAE,IAAI,CAAC,EAAE,CAAC;YAC7D,KAAK,CAAC,4BAA4B,EAAE,IAAI,CAAC,IAAI,CAAC,CAAC;YAC/C,OAAO;QACT,CAAC;QAED,MAAM,EAAE,IAAI,EAAE,GAAG,IAAI,CAAC,GAAG,CAAC,MAAM,CAAC,QAAQ,CAAC,IAAI,CAAC;QAC/C,IAAI,OAAO,CAAC;QACZ,MAAM,QAAQ,GAAG,EAAE,CAAC;QACpB,QAAQ,IAAI,EAAE,CAAC;YACb,KAAK,QAAQ;gBACX,OAAO,GAAG,IAAI,CAAC,eAAe,EAAE,CAAC;gBACjC,IAAI,OAAO;oBAAE,IAAI,CAAC,KAAK,CAAC,GAAG,EAAE,OAAO,CAAC,CAAC;gBACtC,MAAM;YACR,KAAK,SAAS;gBACZ,OAAO,GAAG,IAAI,CAAC,gBAAgB,EAAE,CAAC;gBAClC,IAAI,OAAO;oBAAE,IAAI,CAAC,KAAK,CAAC,GAAG,EAAE,OAAO,CAAC,CAAC;gBACtC,MAAM;YACR,KAAK,KAAK;gBACR,OAAO,GAAG,IAAI,CAAC,eAAe,EAAE,CAAC;gBACjC,IAAI,OAAO;oBAAE,IAAI,CAAC,KAAK,CAAC,GAAG,EAAE,OAAO,CAAC,CAAC;gBACtC,OAAO,GAAG,IAAI,CAAC,gBAAgB,EAAE,CAAC;gBAClC,IAAI,OAAO;oBAAE,IAAI,CAAC,KAAK,CAAC,GAAG,EAAE,OAAO,CAAC,CAAC;gBACtC,MAAM;YACR,KAAK,KAAK;gBACR,OAAO,GAAG,IAAI,CAAC,eAAe,EAAE,CAAC;gBACjC,IAAI,CAAC,OAAO;oBAAE,OAAO;gBACrB,QAAQ,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC;gBACvB,OAAO,GAAG,IAAI,CAAC,gBAAgB,EAAE,CAAC;gBAClC,IAAI,CAAC,OAAO;oBAAE,OAAO;gBACrB,QAAQ,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC;gBACvB,IAAI,CAAC,KAAK,CAAC,GAAG,EAAE,wCAAwC,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;gBAC/E,MAAM;YACR;gBACE,gFAAgF;gBAChF,IAAI,CAAC,KAAK,CAAC,gBAAgB,IAAI,EAAE,CAAC,CAAC;QACvC,CAAC;IACH,CAAC;IAEO,eAAe;QACrB,MAAM,UAAU,GAAG,IAAI,CAAC,aAAa,EAAE,CAAC;QACxC,IAAI,CAAC,UAAU,EAAE,CAAC;YAChB,KAAK,CAAC,oBAAoB,CAAC,CAAC;YAC5B,IAAI,CAAC,aAAa,CAAC,oBAAoB,CAAC,CAAC;YACzC,OAAO,oBAAoB,CAAC;QAC9B,CAAC;QACD,MAAM,KAAK,GAAG,IAAI,CAAC,aAAa,EAAE,CAAC;QACnC,yFAAyF;QACzF,qFAAqF;QACrF,IAAI,KAAK,KAAK,UAAU,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,UAAU,EAAE,KAAe,CAAC,EAAE,CAAC;YACxE,KAAK,CAAC,+BAA+B,CAAC,CAAC;YACvC,IAAI,CAAC,aAAa,CAAC,oBAAoB,CAAC,CAAC;YACzC,MAAM,EAAE,iBAAiB,EAAE,GAAG,IAAI,CAAC,GAAG,CAAC,MAAM,CAAC,QAAQ,CAAC,IAAI,CAAC;YAC5D,IAAI,iBAAiB,EAAE,CAAC;gBACtB,IAAI,CAAC,gBAAgB,EAAE,CAAC;YAC1B,CAAC;YACD,OAAO,oBAAoB,CAAC;QAC9B,CAAC;IACH,CAAC;IAEO,gBAAgB;QACtB,MAAM,EAAE,gBAAgB,EAAE,GAAG,IAAI,CAAC,GAAG,CAAC,MAAM,CAAC,QAAQ,CAAC,IAAI,CAAC;QAC3D,+BAA+B;QAC/B,MAAM,OAAO,GAAG,CAAC,IAAI,CAAC,OAAO,CAAC,OAAO,IAAI,IAAI,CAAC,OAAO,CAAC,MAAM,IAAI,EAAE,CAAC,CAAC,WAAW,EAAE,CAAC;QAElF,IAAI,CAAC,OAAO,EAAE,CAAC;YACb,KAAK,CAAC,gCAAgC,CAAC,CAAC;YACxC,IAAI,CAAC,aAAa,CAAC,gCAAgC,CAAC,CAAC;YACrD,OAAO,gCAAgC,CAAC;QAC1C,CAAC;QAED,MAAM,IAAI,GAAG,KAAK,CAAC,UAAU,CAAC,OAAO,EAAE,MAAM,CAAC,CAAC;QAC/C,MAAM,UAAU,GAAG,gBAAgB,CAAC,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;QACtD,IAAI,CAAC,IAAI,IAAI,CAAC,KAAK,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,EAAE,CAAC;YACnD,KAAK,CAAC,gCAAgC,CAAC,CAAC;YACxC,IAAI,CAAC,aAAa,CAAC,gCAAgC,CAAC,CAAC;YACrD,OAAO,gCAAgC,CAAC;QAC1C,CAAC;IACH,CAAC;IAEO,aAAa,CAAC,GAAW;QAC/B,IAAI,IAAI,CAAC,GAAG,CAAC,MAAM,CAAC,GAAG,KAAK,OAAO,EAAE,CAAC;YACpC,IAAI,CAAC,MAAM,CAAC,IAAI,CACd,GAAG,GAAG,oHAAoH,CAC3H,CAAC;QACJ,CAAC;IACH,CAAC;IAED,KAAK,CAAC,QAAQ,CAAU,GAAyB,EAAE,OAA2B;QAC5E,OAAO,MAAM,IAAI,CAAC,GAAG,CAAC,QAAQ,CAAI,GAAG,EAAE,OAAO,CAAC,CAAC;IAClD,CAAC;IAED,cAAc,CAAC,GAAW,EAAE,GAAY;QACtC,IAAI,CAAC,QAAQ,CAAC,cAAc,CAAC,GAAG,EAAE,GAAG,CAAC,CAAC;IACzC,CAAC;CACF"}
20
+ var SecurityContext = class extends Context {
21
+ get securityOptions() {
22
+ if (!this[SECURITY_OPTIONS]) this[SECURITY_OPTIONS] = {};
23
+ return this[SECURITY_OPTIONS];
24
+ }
25
+ /**
26
+ * Check whether the specific `domain` is in / matches the whiteList or not.
27
+ * @param {string} domain The assigned domain.
28
+ * @param {Array<string>} [customWhiteList] The custom white list for domain.
29
+ * @return {boolean} If the domain is in / matches the whiteList, return true;
30
+ * otherwise false.
31
+ */
32
+ isSafeDomain(domain, customWhiteList) {
33
+ const domainWhiteList = customWhiteList && customWhiteList.length > 0 ? customWhiteList : this.app.config.security.domainWhiteList;
34
+ return isSafeDomain(domain, domainWhiteList);
35
+ }
36
+ get nonce() {
37
+ if (!this[NONCE_CACHE]) this[NONCE_CACHE] = nanoid(16);
38
+ return this[NONCE_CACHE];
39
+ }
40
+ /**
41
+ * get csrf token, general use in template
42
+ * @return {String} csrf token
43
+ * @public
44
+ */
45
+ get csrf() {
46
+ const secret = this[NEW_CSRF_SECRET] || this.getCsrfSecret();
47
+ debug("get csrf token, NEW_CSRF_SECRET: %s, _CSRF_SECRET: %s", this[NEW_CSRF_SECRET], this.getCsrfSecret());
48
+ return secret ? tokens.create(secret) : "";
49
+ }
50
+ /**
51
+ * get csrf secret from session or cookie
52
+ * @return {String} csrf secret
53
+ * @private
54
+ */
55
+ getCsrfSecret() {
56
+ if (this[_CSRF_SECRET]) return this[_CSRF_SECRET];
57
+ let { useSession, sessionName, cookieName: cookieNames, cookieOptions } = this.app.config.security.csrf;
58
+ if (useSession) this[_CSRF_SECRET] = this.session[sessionName] || "";
59
+ else {
60
+ if (!Array.isArray(cookieNames)) cookieNames = [cookieNames];
61
+ for (const cookieName of cookieNames) {
62
+ this[_CSRF_SECRET] = this.cookies.get(cookieName, { signed: cookieOptions.signed }) || "";
63
+ if (this[_CSRF_SECRET]) break;
64
+ }
65
+ }
66
+ return this[_CSRF_SECRET];
67
+ }
68
+ /**
69
+ * ensure csrf secret exists in session or cookie.
70
+ * @param {Boolean} [rotate] reset secret even if the secret exists
71
+ * @public
72
+ */
73
+ ensureCsrfSecret(rotate) {
74
+ const csrfSecret = this.getCsrfSecret();
75
+ if (csrfSecret && !rotate) return;
76
+ debug("ensure csrf secret, exists: %s, rotate; %s", csrfSecret, rotate);
77
+ const secret = tokens.secretSync();
78
+ this[NEW_CSRF_SECRET] = secret;
79
+ let { useSession, sessionName, cookieDomain, cookieName: cookieNames, cookieOptions } = this.app.config.security.csrf;
80
+ if (useSession) this.session[sessionName] = secret;
81
+ else {
82
+ if (typeof cookieDomain === "function") cookieDomain = cookieDomain(this);
83
+ const cookieOpts = {
84
+ domain: cookieDomain,
85
+ ...cookieOptions
86
+ };
87
+ if (!Array.isArray(cookieNames)) cookieNames = [cookieNames];
88
+ for (const cookieName of cookieNames) this.cookies.set(cookieName, secret, cookieOpts);
89
+ }
90
+ }
91
+ getInputToken() {
92
+ const { headerName, bodyName, queryName } = this.app.config.security.csrf;
93
+ const token = findToken(this.request.query, queryName) || findToken(this.request.body, bodyName) || headerName && this.request.get(headerName);
94
+ debug("get token: %j, secret: %j", token, this.getCsrfSecret());
95
+ return token;
96
+ }
97
+ /**
98
+ * rotate csrf secret exists in session or cookie.
99
+ * must rotate the secret when user login
100
+ * @public
101
+ */
102
+ rotateCsrfSecret() {
103
+ if (!this[NEW_CSRF_SECRET] && this.getCsrfSecret()) this.ensureCsrfSecret(true);
104
+ }
105
+ /**
106
+ * assert csrf token/referer is present
107
+ * @public
108
+ */
109
+ assertCsrf() {
110
+ if (checkIfIgnore(this.app.config.security.csrf, this)) {
111
+ debug("%s, ignore by csrf options", this.path);
112
+ return;
113
+ }
114
+ const { type } = this.app.config.security.csrf;
115
+ let message;
116
+ const messages = [];
117
+ switch (type) {
118
+ case "ctoken":
119
+ message = this.csrfCtokenCheck();
120
+ if (message) this.throw(403, message);
121
+ break;
122
+ case "referer":
123
+ message = this.csrfRefererCheck();
124
+ if (message) this.throw(403, message);
125
+ break;
126
+ case "all":
127
+ message = this.csrfCtokenCheck();
128
+ if (message) this.throw(403, message);
129
+ message = this.csrfRefererCheck();
130
+ if (message) this.throw(403, message);
131
+ break;
132
+ case "any":
133
+ message = this.csrfCtokenCheck();
134
+ if (!message) return;
135
+ messages.push(message);
136
+ message = this.csrfRefererCheck();
137
+ if (!message) return;
138
+ messages.push(message);
139
+ this.throw(403, `both ctoken and referer check error: ${messages.join(", ")}`);
140
+ break;
141
+ default: this.throw(`invalid type ${type}`);
142
+ }
143
+ }
144
+ csrfCtokenCheck() {
145
+ const csrfSecret = this.getCsrfSecret();
146
+ if (!csrfSecret) {
147
+ debug("missing csrf token");
148
+ this.logCsrfNotice("missing csrf token");
149
+ return "missing csrf token";
150
+ }
151
+ const token = this.getInputToken();
152
+ if (token !== csrfSecret && !tokens.verify(csrfSecret, token)) {
153
+ debug("verify secret and token error");
154
+ this.logCsrfNotice("invalid csrf token");
155
+ const { rotateWhenInvalid } = this.app.config.security.csrf;
156
+ if (rotateWhenInvalid) this.rotateCsrfSecret();
157
+ return "invalid csrf token";
158
+ }
159
+ }
160
+ csrfRefererCheck() {
161
+ const { refererWhiteList } = this.app.config.security.csrf;
162
+ const referer = (this.headers.referer ?? this.headers.origin ?? "").toLowerCase();
163
+ if (!referer) {
164
+ debug("missing csrf referer or origin");
165
+ this.logCsrfNotice("missing csrf referer or origin");
166
+ return "missing csrf referer or origin";
167
+ }
168
+ const host = getFromUrl(referer, "host");
169
+ const domainList = refererWhiteList.concat(this.host);
170
+ if (!host || !isSafeDomain(host, domainList)) {
171
+ debug("verify referer or origin error");
172
+ this.logCsrfNotice("invalid csrf referer or origin");
173
+ return "invalid csrf referer or origin";
174
+ }
175
+ }
176
+ logCsrfNotice(msg) {
177
+ if (this.app.config.env === "local") this.logger.warn(`${msg}. See https://eggjs.org/zh-CN/core/security/#%E5%AE%89%E5%85%A8%E5%A8%81%E8%83%81-csrf-%E7%9A%84%E9%98%B2%E8%8C%83`);
178
+ }
179
+ async safeCurl(url, options) {
180
+ return await this.app.safeCurl(url, options);
181
+ }
182
+ unsafeRedirect(url, alt) {
183
+ this.response.unsafeRedirect(url, alt);
184
+ }
185
+ };
186
+
187
+ //#endregion
188
+ export { SecurityContext as default };
@@ -1,3 +1,6 @@
1
- import helpers from '../../lib/helper/index.ts';
1
+ import helpers from "../../lib/helper/index.js";
2
+
3
+ //#region src/app/extend/helper.d.ts
2
4
  declare const securityHelpers: typeof helpers;
3
- export default securityHelpers;
5
+ //#endregion
6
+ export { securityHelpers as default };
@@ -1,6 +1,8 @@
1
- import helpers from "../../lib/helper/index.js";
2
- const securityHelpers = {
3
- ...helpers,
4
- };
5
- export default securityHelpers;
6
- //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaGVscGVyLmpzIiwic291cmNlUm9vdCI6IiIsInNvdXJjZXMiOlsiLi4vLi4vLi4vc3JjL2FwcC9leHRlbmQvaGVscGVyLnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiJBQUFBLE9BQU8sT0FBTyxNQUFNLDJCQUEyQixDQUFDO0FBRWhELE1BQU0sZUFBZSxHQUFtQjtJQUN0QyxHQUFHLE9BQU87Q0FDWCxDQUFDO0FBRUYsZUFBZSxlQUFlLENBQUMifQ==
1
+ import helper_default$1 from "../../lib/helper/index.js";
2
+
3
+ //#region src/app/extend/helper.ts
4
+ const securityHelpers = { ...helper_default$1 };
5
+ var helper_default = securityHelpers;
6
+
7
+ //#endregion
8
+ export { helper_default as default };
@@ -1,35 +1,39 @@
1
- import { Response } from 'egg';
2
- import SecurityContext from './context.ts';
3
- export default class SecurityResponse extends Response {
4
- ctx: SecurityContext;
5
- /**
6
- * This is an unsafe redirection, and we WON'T check if the
7
- * destination url is safe or not.
8
- * Please DO NOT use this method unless in some very special cases,
9
- * otherwise there may be security vulnerabilities.
10
- *
11
- * @function Response#unsafeRedirect
12
- * @param {String} url URL to forward
13
- * @example
14
- * ```js
15
- * ctx.response.unsafeRedirect('http://www.domain.com');
16
- * ctx.unsafeRedirect('http://www.domain.com');
17
- * ```
18
- */
19
- unsafeRedirect(url: string, alt?: string): void;
20
- /**
21
- * A safe redirection, and we'll check if the URL is in
22
- * a safe domain or not.
23
- * We've overridden the default Koa's implementation by adding a
24
- * white list as the filter for that.
25
- *
26
- * @function Response#redirect
27
- * @param {String} url URL to forward
28
- * @example
29
- * ```js
30
- * ctx.response.redirect('/login');
31
- * ctx.redirect('/login');
32
- * ```
33
- */
34
- redirect(url: string, alt?: string): void;
1
+ import SecurityContext from "./context.js";
2
+ import { Response } from "egg";
3
+
4
+ //#region src/app/extend/response.d.ts
5
+ declare class SecurityResponse extends Response {
6
+ ctx: SecurityContext;
7
+ /**
8
+ * This is an unsafe redirection, and we WON'T check if the
9
+ * destination url is safe or not.
10
+ * Please DO NOT use this method unless in some very special cases,
11
+ * otherwise there may be security vulnerabilities.
12
+ *
13
+ * @function Response#unsafeRedirect
14
+ * @param {String} url URL to forward
15
+ * @example
16
+ * ```js
17
+ * ctx.response.unsafeRedirect('http://www.domain.com');
18
+ * ctx.unsafeRedirect('http://www.domain.com');
19
+ * ```
20
+ */
21
+ unsafeRedirect(url: string, alt?: string): void;
22
+ /**
23
+ * A safe redirection, and we'll check if the URL is in
24
+ * a safe domain or not.
25
+ * We've overridden the default Koa's implementation by adding a
26
+ * white list as the filter for that.
27
+ *
28
+ * @function Response#redirect
29
+ * @param {String} url URL to forward
30
+ * @example
31
+ * ```js
32
+ * ctx.response.redirect('/login');
33
+ * ctx.redirect('/login');
34
+ * ```
35
+ */
36
+ redirect(url: string, alt?: string): void;
35
37
  }
38
+ //#endregion
39
+ export { SecurityResponse as default };