@eggjs/security 5.0.0-beta.35 → 5.0.0-beta.36

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (71) hide show
  1. package/dist/agent.d.ts +9 -5
  2. package/dist/agent.js +14 -10
  3. package/dist/app/extend/agent.d.ts +8 -4
  4. package/dist/app/extend/agent.js +12 -8
  5. package/dist/app/extend/application.d.ts +11 -7
  6. package/dist/app/extend/application.js +32 -32
  7. package/dist/app/extend/context.d.ts +55 -51
  8. package/dist/app/extend/context.js +185 -240
  9. package/dist/app/extend/helper.d.ts +5 -2
  10. package/dist/app/extend/helper.js +8 -6
  11. package/dist/app/extend/response.d.ts +38 -34
  12. package/dist/app/extend/response.js +69 -82
  13. package/dist/app/middleware/securities.d.ts +5 -2
  14. package/dist/app/middleware/securities.js +38 -52
  15. package/dist/app.d.ts +9 -5
  16. package/dist/app.js +23 -25
  17. package/dist/config/config.default.d.ts +34 -45
  18. package/dist/config/config.default.js +158 -362
  19. package/dist/config/config.local.d.ts +6 -3
  20. package/dist/config/config.local.js +6 -8
  21. package/dist/index.d.ts +20 -16
  22. package/dist/index.js +24 -21
  23. package/dist/lib/extend/safe_curl.d.ts +16 -13
  24. package/dist/lib/extend/safe_curl.js +17 -23
  25. package/dist/lib/helper/cliFilter.d.ts +4 -4
  26. package/dist/lib/helper/cliFilter.js +16 -15
  27. package/dist/lib/helper/escape.d.ts +2 -2
  28. package/dist/lib/helper/escape.js +7 -3
  29. package/dist/lib/helper/escapeShellArg.d.ts +4 -1
  30. package/dist/lib/helper/escapeShellArg.js +6 -4
  31. package/dist/lib/helper/escapeShellCmd.d.ts +4 -1
  32. package/dist/lib/helper/escapeShellCmd.js +14 -13
  33. package/dist/lib/helper/index.d.ts +22 -19
  34. package/dist/lib/helper/index.js +19 -15
  35. package/dist/lib/helper/shtml.d.ts +6 -2
  36. package/dist/lib/helper/shtml.js +52 -68
  37. package/dist/lib/helper/sjs.d.ts +4 -4
  38. package/dist/lib/helper/sjs.js +31 -44
  39. package/dist/lib/helper/sjson.d.ts +4 -1
  40. package/dist/lib/helper/sjson.js +28 -35
  41. package/dist/lib/helper/spath.d.ts +7 -5
  42. package/dist/lib/helper/spath.js +15 -24
  43. package/dist/lib/helper/surl.d.ts +6 -2
  44. package/dist/lib/helper/surl.js +22 -27
  45. package/dist/lib/middlewares/csp.d.ts +6 -3
  46. package/dist/lib/middlewares/csp.js +43 -54
  47. package/dist/lib/middlewares/csrf.d.ts +6 -3
  48. package/dist/lib/middlewares/csrf.js +31 -35
  49. package/dist/lib/middlewares/dta.d.ts +5 -2
  50. package/dist/lib/middlewares/dta.js +11 -10
  51. package/dist/lib/middlewares/hsts.d.ts +6 -3
  52. package/dist/lib/middlewares/hsts.js +17 -19
  53. package/dist/lib/middlewares/index.d.ts +24 -21
  54. package/dist/lib/middlewares/index.js +26 -22
  55. package/dist/lib/middlewares/methodnoallow.d.ts +5 -2
  56. package/dist/lib/middlewares/methodnoallow.js +13 -18
  57. package/dist/lib/middlewares/noopen.d.ts +6 -3
  58. package/dist/lib/middlewares/noopen.js +14 -13
  59. package/dist/lib/middlewares/nosniff.d.ts +6 -3
  60. package/dist/lib/middlewares/nosniff.js +22 -24
  61. package/dist/lib/middlewares/referrerPolicy.d.ts +6 -3
  62. package/dist/lib/middlewares/referrerPolicy.js +27 -30
  63. package/dist/lib/middlewares/xframe.d.ts +6 -3
  64. package/dist/lib/middlewares/xframe.js +16 -15
  65. package/dist/lib/middlewares/xssProtection.d.ts +6 -3
  66. package/dist/lib/middlewares/xssProtection.js +15 -12
  67. package/dist/lib/utils.d.ts +22 -17
  68. package/dist/lib/utils.js +112 -177
  69. package/dist/types.d.ts +38 -36
  70. package/dist/types.js +1 -2
  71. package/package.json +31 -37
@@ -1,371 +1,167 @@
1
- import { Context } from 'egg';
2
- import z from 'zod';
1
+ import { Context } from "egg";
2
+ import z from "zod";
3
+
4
+ //#region src/config/config.default.ts
3
5
  const CSRFSupportRequestItem = z.object({
4
- path: z.instanceof(RegExp),
5
- methods: z.array(z.string()),
6
+ path: z.instanceof(RegExp),
7
+ methods: z.array(z.string())
6
8
  });
7
- export const LookupAddress = z.object({
8
- address: z.string(),
9
- family: z.number(),
9
+ const LookupAddress = z.object({
10
+ address: z.string(),
11
+ family: z.number()
10
12
  });
11
- const LookupAddressAndStringArray = z
12
- .union([z.string(), LookupAddress])
13
- .array();
14
- const SSRFCheckAddressFunction = z
15
- .function()
16
- .args(z.union([z.string(), LookupAddress, LookupAddressAndStringArray]), z.union([z.number(), z.string()]), z.string())
17
- .returns(z.boolean());
18
- export const SecurityMiddlewareName = z.enum(['csrf', 'hsts', 'methodnoallow', 'noopen', 'nosniff', 'csp', 'xssProtection', 'xframe', 'dta']);
13
+ const LookupAddressAndStringArray = z.union([z.string(), LookupAddress]).array();
14
+ const SSRFCheckAddressFunction = z.function().args(z.union([
15
+ z.string(),
16
+ LookupAddress,
17
+ LookupAddressAndStringArray
18
+ ]), z.union([z.number(), z.string()]), z.string()).returns(z.boolean());
19
+ const SecurityMiddlewareName = z.enum([
20
+ "csrf",
21
+ "hsts",
22
+ "methodnoallow",
23
+ "noopen",
24
+ "nosniff",
25
+ "csp",
26
+ "xssProtection",
27
+ "xframe",
28
+ "dta"
29
+ ]);
19
30
  /**
20
- * (ctx) => boolean
21
- */
22
- const IgnoreOrMatchHandler = z
23
- .function()
24
- .args(z.instanceof(Context))
25
- .returns(z.boolean());
31
+ * (ctx) => boolean
32
+ */
33
+ const IgnoreOrMatchHandler = z.function().args(z.instanceof(Context)).returns(z.boolean());
26
34
  const IgnoreOrMatch = z.union([
27
- z.string(),
28
- z.instanceof(RegExp),
29
- IgnoreOrMatchHandler,
35
+ z.string(),
36
+ z.instanceof(RegExp),
37
+ IgnoreOrMatchHandler
30
38
  ]);
31
- const IgnoreOrMatchOption = z
32
- .union([IgnoreOrMatch, IgnoreOrMatch.array()])
33
- .optional();
34
- export const SecurityConfig = z.object({
35
- /**
36
- * domain white list
37
- *
38
- * Default to `[]`
39
- */
40
- domainWhiteList: z.array(z.string()).default([]),
41
- /**
42
- * protocol white list
43
- *
44
- * Default to `[]`
45
- */
46
- protocolWhiteList: z.array(z.string()).default([]),
47
- /**
48
- * default open security middleware
49
- *
50
- * Default to `'csrf,hsts,methodnoallow,noopen,nosniff,csp,xssProtection,xframe,dta'`
51
- */
52
- defaultMiddleware: z.union([z.string(), z.array(SecurityMiddlewareName)]).default(SecurityMiddlewareName.options),
53
- /**
54
- * whether defend csrf attack
55
- */
56
- csrf: z.preprocess((val) => {
57
- // transform old config, `csrf: false` to `csrf: { enable: false }`
58
- if (typeof val === 'boolean') {
59
- return { enable: val };
60
- }
61
- return val;
62
- }, z
63
- .object({
64
- match: IgnoreOrMatchOption,
65
- ignore: IgnoreOrMatchOption,
66
- /**
67
- * Default to `true`
68
- */
69
- enable: z.boolean().default(true),
70
- /**
71
- * csrf token detect source type
72
- *
73
- * Default to `'ctoken'`
74
- */
75
- type: z.enum(['ctoken', 'referer', 'all', 'any']).default('ctoken'),
76
- /**
77
- * ignore json request
78
- *
79
- * Default to `false`
80
- *
81
- * @deprecated is not safe now, don't use it
82
- */
83
- ignoreJSON: z.boolean().default(false),
84
- /**
85
- * csrf token cookie name
86
- *
87
- * Default to `'csrfToken'`
88
- */
89
- cookieName: z.union([z.string(), z.array(z.string())]).default('csrfToken'),
90
- /**
91
- * csrf token session name
92
- *
93
- * Default to `'csrfToken'`
94
- */
95
- sessionName: z.string().default('csrfToken'),
96
- /**
97
- * csrf token request header name
98
- *
99
- * Default to `'x-csrf-token'`
100
- */
101
- headerName: z.string().default('x-csrf-token'),
102
- /**
103
- * csrf token request body field name
104
- *
105
- * Default to `'_csrf'`
106
- */
107
- bodyName: z.union([z.string(), z.array(z.string())]).default('_csrf'),
108
- /**
109
- * csrf token request query field name
110
- *
111
- * Default to `'_csrf'`
112
- */
113
- queryName: z.union([z.string(), z.array(z.string())]).default('_csrf'),
114
- /**
115
- * rotate csrf token when it is invalid
116
- *
117
- * Default to `false`
118
- */
119
- rotateWhenInvalid: z.boolean().default(false),
120
- /**
121
- * These config works when using `'ctoken'` type
122
- *
123
- * Default to `false`
124
- */
125
- useSession: z.boolean().default(false),
126
- /**
127
- * csrf token cookie domain setting,
128
- * can be `(ctx) => string` or `string`
129
- *
130
- * Default to `undefined`, auto set the cookie domain in the safe way
131
- */
132
- cookieDomain: z.union([z.string(), z.function().args(z.instanceof(Context)).returns(z.string())]).optional(),
133
- /**
134
- * csrf token check requests config
135
- */
136
- supportedRequests: z.array(CSRFSupportRequestItem).default([
137
- {
138
- path: /^\//,
139
- methods: ['POST', 'PATCH', 'DELETE', 'PUT', 'CONNECT'],
140
- },
141
- ]),
142
- /**
143
- * referer or origin header white list.
144
- * It only works when using `'referer'` type
145
- *
146
- * Default to `[]`
147
- */
148
- refererWhiteList: z.array(z.string()).default([]),
149
- /**
150
- * csrf token cookie options
151
- *
152
- * Default to `{
153
- * signed: false,
154
- * httpOnly: false,
155
- * overwrite: true,
156
- * }`
157
- */
158
- cookieOptions: z
159
- .object({
160
- signed: z.boolean(),
161
- httpOnly: z.boolean(),
162
- overwrite: z.boolean(),
163
- })
164
- .default({
165
- signed: false,
166
- httpOnly: false,
167
- overwrite: true,
168
- }),
169
- })
170
- .default({})),
171
- /**
172
- * whether enable X-Frame-Options response header
173
- */
174
- xframe: z
175
- .object({
176
- match: IgnoreOrMatchOption,
177
- ignore: IgnoreOrMatchOption,
178
- /**
179
- * Default to `true`
180
- */
181
- enable: z.boolean().default(true),
182
- /**
183
- * X-Frame-Options value, can be `'DENY'`, `'SAMEORIGIN'`, `'ALLOW-FROM https://example.com'`
184
- *
185
- * Default to `'SAMEORIGIN'`
186
- */
187
- value: z.string().default('SAMEORIGIN'),
188
- })
189
- .default({}),
190
- /**
191
- * whether enable Strict-Transport-Security response header
192
- */
193
- hsts: z
194
- .object({
195
- match: IgnoreOrMatchOption,
196
- ignore: IgnoreOrMatchOption,
197
- /**
198
- * Default to `false`
199
- */
200
- enable: z.boolean().default(false),
201
- /**
202
- * Max age of Strict-Transport-Security in seconds
203
- *
204
- * Default to `365 * 24 * 3600`
205
- */
206
- maxAge: z.number().default(365 * 24 * 3600),
207
- /**
208
- * Whether include sub domains
209
- *
210
- * Default to `false`
211
- */
212
- includeSubdomains: z.boolean().default(false),
213
- })
214
- .default({}),
215
- /**
216
- * whether enable Http Method filter
217
- */
218
- methodnoallow: z
219
- .object({
220
- match: IgnoreOrMatchOption,
221
- ignore: IgnoreOrMatchOption,
222
- /**
223
- * Default to `true`
224
- */
225
- enable: z.boolean().default(true),
226
- })
227
- .default({}),
228
- /**
229
- * whether enable IE automatically download open
230
- */
231
- noopen: z
232
- .object({
233
- match: IgnoreOrMatchOption,
234
- ignore: IgnoreOrMatchOption,
235
- /**
236
- * Default to `true`
237
- */
238
- enable: z.boolean().default(true),
239
- })
240
- .default({}),
241
- /**
242
- * whether enable IE8 automatically detect mime
243
- */
244
- nosniff: z
245
- .object({
246
- match: IgnoreOrMatchOption,
247
- ignore: IgnoreOrMatchOption,
248
- /**
249
- * Default to `true`
250
- */
251
- enable: z.boolean().default(true),
252
- })
253
- .default({}),
254
- /**
255
- * whether enable IE8 XSS Filter
256
- */
257
- xssProtection: z
258
- .object({
259
- match: IgnoreOrMatchOption,
260
- ignore: IgnoreOrMatchOption,
261
- /**
262
- * Default to `true`
263
- */
264
- enable: z.boolean().default(true),
265
- /**
266
- * X-XSS-Protection response header value
267
- *
268
- * Default to `'1; mode=block'`
269
- */
270
- value: z.coerce.string().default('1; mode=block'),
271
- })
272
- .default({}),
273
- /**
274
- * content security policy config
275
- */
276
- csp: z
277
- .object({
278
- match: IgnoreOrMatchOption,
279
- ignore: IgnoreOrMatchOption,
280
- /**
281
- * Default to `false`
282
- */
283
- enable: z.boolean().default(false),
284
- // https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP#csp_overview
285
- policy: z.record(z.union([z.string(), z.array(z.string()), z.boolean()])).default({}),
286
- /**
287
- * whether enable report only mode
288
- * Default to `undefined`
289
- */
290
- reportOnly: z.boolean().optional(),
291
- /**
292
- * whether support IE
293
- * Default to `undefined`
294
- */
295
- supportIE: z.boolean().optional(),
296
- })
297
- .default({}),
298
- /**
299
- * whether enable referrer policy
300
- * @see https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Referrer-Policy
301
- */
302
- referrerPolicy: z
303
- .object({
304
- match: IgnoreOrMatchOption,
305
- ignore: IgnoreOrMatchOption,
306
- /**
307
- * Default to `false`
308
- */
309
- enable: z.boolean().default(false),
310
- /**
311
- * referrer policy value
312
- *
313
- * Default to `'no-referrer-when-downgrade'`
314
- */
315
- value: z.string().default('no-referrer-when-downgrade'),
316
- })
317
- .default({}),
318
- /**
319
- * whether enable auto avoid directory traversal attack
320
- */
321
- dta: z
322
- .object({
323
- match: IgnoreOrMatchOption,
324
- ignore: IgnoreOrMatchOption,
325
- /**
326
- * Default to `true`
327
- */
328
- enable: z.boolean().default(true),
329
- })
330
- .default({}),
331
- ssrf: z
332
- .object({
333
- ipBlackList: z.array(z.string()).optional(),
334
- ipExceptionList: z.array(z.string()).optional(),
335
- hostnameExceptionList: z.array(z.string()).optional(),
336
- checkAddress: SSRFCheckAddressFunction.optional(),
337
- })
338
- .default({}),
339
- match: z.union([IgnoreOrMatch, IgnoreOrMatch.array()]).optional(),
340
- ignore: z.union([IgnoreOrMatch, IgnoreOrMatch.array()]).optional(),
341
- __protocolWhiteListSet: z.set(z.string()).optional().readonly(),
342
- });
343
- const SecurityHelperOnTagAttrHandler = z
344
- .function()
345
- .args(z.string(), z.string(), z.string(), z.boolean())
346
- .returns(z.union([z.string(), z.void()]));
347
- export const SecurityHelperConfig = z.object({
348
- shtml: z
349
- .object({
350
- /**
351
- * tag attribute white list
352
- */
353
- whiteList: z.record(z.array(z.string())).optional(),
354
- /**
355
- * domain white list
356
- * @deprecated use `config.security.domainWhiteList` instead
357
- */
358
- domainWhiteList: z.array(z.string()).optional(),
359
- /**
360
- * tag attribute handler
361
- */
362
- onTagAttr: SecurityHelperOnTagAttrHandler.optional(),
363
- })
364
- .default({}),
39
+ const IgnoreOrMatchOption = z.union([IgnoreOrMatch, IgnoreOrMatch.array()]).optional();
40
+ const SecurityConfig = z.object({
41
+ domainWhiteList: z.array(z.string()).default([]),
42
+ protocolWhiteList: z.array(z.string()).default([]),
43
+ defaultMiddleware: z.union([z.string(), z.array(SecurityMiddlewareName)]).default(SecurityMiddlewareName.options),
44
+ csrf: z.preprocess((val) => {
45
+ if (typeof val === "boolean") return { enable: val };
46
+ return val;
47
+ }, z.object({
48
+ match: IgnoreOrMatchOption,
49
+ ignore: IgnoreOrMatchOption,
50
+ enable: z.boolean().default(true),
51
+ type: z.enum([
52
+ "ctoken",
53
+ "referer",
54
+ "all",
55
+ "any"
56
+ ]).default("ctoken"),
57
+ ignoreJSON: z.boolean().default(false),
58
+ cookieName: z.union([z.string(), z.array(z.string())]).default("csrfToken"),
59
+ sessionName: z.string().default("csrfToken"),
60
+ headerName: z.string().default("x-csrf-token"),
61
+ bodyName: z.union([z.string(), z.array(z.string())]).default("_csrf"),
62
+ queryName: z.union([z.string(), z.array(z.string())]).default("_csrf"),
63
+ rotateWhenInvalid: z.boolean().default(false),
64
+ useSession: z.boolean().default(false),
65
+ cookieDomain: z.union([z.string(), z.function().args(z.instanceof(Context)).returns(z.string())]).optional(),
66
+ supportedRequests: z.array(CSRFSupportRequestItem).default([{
67
+ path: /^\//,
68
+ methods: [
69
+ "POST",
70
+ "PATCH",
71
+ "DELETE",
72
+ "PUT",
73
+ "CONNECT"
74
+ ]
75
+ }]),
76
+ refererWhiteList: z.array(z.string()).default([]),
77
+ cookieOptions: z.object({
78
+ signed: z.boolean(),
79
+ httpOnly: z.boolean(),
80
+ overwrite: z.boolean()
81
+ }).default({
82
+ signed: false,
83
+ httpOnly: false,
84
+ overwrite: true
85
+ })
86
+ }).default({})),
87
+ xframe: z.object({
88
+ match: IgnoreOrMatchOption,
89
+ ignore: IgnoreOrMatchOption,
90
+ enable: z.boolean().default(true),
91
+ value: z.string().default("SAMEORIGIN")
92
+ }).default({}),
93
+ hsts: z.object({
94
+ match: IgnoreOrMatchOption,
95
+ ignore: IgnoreOrMatchOption,
96
+ enable: z.boolean().default(false),
97
+ maxAge: z.number().default(365 * 24 * 3600),
98
+ includeSubdomains: z.boolean().default(false)
99
+ }).default({}),
100
+ methodnoallow: z.object({
101
+ match: IgnoreOrMatchOption,
102
+ ignore: IgnoreOrMatchOption,
103
+ enable: z.boolean().default(true)
104
+ }).default({}),
105
+ noopen: z.object({
106
+ match: IgnoreOrMatchOption,
107
+ ignore: IgnoreOrMatchOption,
108
+ enable: z.boolean().default(true)
109
+ }).default({}),
110
+ nosniff: z.object({
111
+ match: IgnoreOrMatchOption,
112
+ ignore: IgnoreOrMatchOption,
113
+ enable: z.boolean().default(true)
114
+ }).default({}),
115
+ xssProtection: z.object({
116
+ match: IgnoreOrMatchOption,
117
+ ignore: IgnoreOrMatchOption,
118
+ enable: z.boolean().default(true),
119
+ value: z.coerce.string().default("1; mode=block")
120
+ }).default({}),
121
+ csp: z.object({
122
+ match: IgnoreOrMatchOption,
123
+ ignore: IgnoreOrMatchOption,
124
+ enable: z.boolean().default(false),
125
+ policy: z.record(z.union([
126
+ z.string(),
127
+ z.array(z.string()),
128
+ z.boolean()
129
+ ])).default({}),
130
+ reportOnly: z.boolean().optional(),
131
+ supportIE: z.boolean().optional()
132
+ }).default({}),
133
+ referrerPolicy: z.object({
134
+ match: IgnoreOrMatchOption,
135
+ ignore: IgnoreOrMatchOption,
136
+ enable: z.boolean().default(false),
137
+ value: z.string().default("no-referrer-when-downgrade")
138
+ }).default({}),
139
+ dta: z.object({
140
+ match: IgnoreOrMatchOption,
141
+ ignore: IgnoreOrMatchOption,
142
+ enable: z.boolean().default(true)
143
+ }).default({}),
144
+ ssrf: z.object({
145
+ ipBlackList: z.array(z.string()).optional(),
146
+ ipExceptionList: z.array(z.string()).optional(),
147
+ hostnameExceptionList: z.array(z.string()).optional(),
148
+ checkAddress: SSRFCheckAddressFunction.optional()
149
+ }).default({}),
150
+ match: z.union([IgnoreOrMatch, IgnoreOrMatch.array()]).optional(),
151
+ ignore: z.union([IgnoreOrMatch, IgnoreOrMatch.array()]).optional(),
152
+ __protocolWhiteListSet: z.set(z.string()).optional().readonly()
365
153
  });
154
+ const SecurityHelperOnTagAttrHandler = z.function().args(z.string(), z.string(), z.string(), z.boolean()).returns(z.union([z.string(), z.void()]));
155
+ const SecurityHelperConfig = z.object({ shtml: z.object({
156
+ whiteList: z.record(z.array(z.string())).optional(),
157
+ domainWhiteList: z.array(z.string()).optional(),
158
+ onTagAttr: SecurityHelperOnTagAttrHandler.optional()
159
+ }).default({}) });
366
160
  const config = {
367
- security: SecurityConfig.parse({}),
368
- helper: SecurityHelperConfig.parse({}),
161
+ security: SecurityConfig.parse({}),
162
+ helper: SecurityHelperConfig.parse({})
369
163
  };
370
- export default config;
371
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"config.default.js","sourceRoot":"","sources":["../../src/config/config.default.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,OAAO,EAAE,MAAM,KAAK,CAAC;AAC9B,OAAO,CAAC,MAAM,KAAK,CAAC;AAEpB,MAAM,sBAAsB,GAGvB,CAAC,CAAC,MAAM,CAAC;IACZ,IAAI,EAAE,CAAC,CAAC,UAAU,CAAC,MAAM,CAAC;IAC1B,OAAO,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC;CAC7B,CAAC,CAAC;AAGH,MAAM,CAAC,MAAM,aAAa,GAAG,CAAC,CAAC,MAAM,CAAC;IACpC,OAAO,EAAE,CAAC,CAAC,MAAM,EAAE;IACnB,MAAM,EAAE,CAAC,CAAC,MAAM,EAAE;CACnB,CAMC,CAAC;AAGH,MAAM,2BAA2B,GAAgE,CAAC;KAC/F,KAAK,CAAC,CAAC,CAAC,CAAC,MAAM,EAAE,EAAE,aAAa,CAAC,CAAC;KAClC,KAAK,EAAE,CAAC;AACX,MAAM,wBAAwB,GAU1B,CAAC;KACF,QAAQ,EAAE;KACV,IAAI,CACH,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,MAAM,EAAE,EAAE,aAAa,EAAE,2BAA2B,CAAC,CAAC,EACjE,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC,MAAM,EAAE,CAAC,CAAC,EACjC,CAAC,CAAC,MAAM,EAAE,CACX;KACA,OAAO,CAAC,CAAC,CAAC,OAAO,EAAE,CAAC,CAAC;AAOxB,MAAM,CAAC,MAAM,sBAAsB,GAE/B,CAAC,CAAC,IAAI,CAAC,CAAC,MAAM,EAAE,MAAM,EAAE,eAAe,EAAE,QAAQ,EAAE,SAAS,EAAE,KAAK,EAAE,eAAe,EAAE,QAAQ,EAAE,KAAK,CAAC,CAAC,CAAC;AAG5G;;GAEG;AACH,MAAM,oBAAoB,GAAgF,CAAC;KACxG,QAAQ,EAAE;KACV,IAAI,CAAC,CAAC,CAAC,UAAU,CAAC,OAAO,CAAC,CAAC;KAC3B,OAAO,CAAC,CAAC,CAAC,OAAO,EAAE,CAAC,CAAC;AAGxB,MAAM,aAAa,GAA8E,CAAC,CAAC,KAAK,CAAC;IACvG,CAAC,CAAC,MAAM,EAAE;IACV,CAAC,CAAC,UAAU,CAAC,MAAM,CAAC;IACpB,oBAAoB;CACrB,CAAC,CAAC;AAGH,MAAM,mBAAmB,GAAwF,CAAC;KAC/G,KAAK,CAAC,CAAC,aAAa,EAAE,aAAa,CAAC,KAAK,EAAE,CAAC,CAAC;KAC7C,QAAQ,EAAE,CAAC;AAGd,MAAM,CAAC,MAAM,cAAc,GAAqB,CAAC,CAAC,MAAM,CAAC;IACvD;;;;OAIG;IACH,eAAe,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,CAAC,OAAO,CAAC,EAAE,CAAC;IAChD;;;;OAIG;IACH,iBAAiB,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,CAAC,OAAO,CAAC,EAAE,CAAC;IAClD;;;;OAIG;IACH,iBAAiB,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC,KAAK,CAAC,sBAAsB,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,CAAC;IACjH;;OAEG;IACH,IAAI,EAAE,CAAC,CAAC,UAAU,CAChB,CAAC,GAAG,EAAE,EAAE;QACN,mEAAmE;QACnE,IAAI,OAAO,GAAG,KAAK,SAAS,EAAE,CAAC;YAC7B,OAAO,EAAE,MAAM,EAAE,GAAG,EAAE,CAAC;QACzB,CAAC;QACD,OAAO,GAAG,CAAC;IACb,CAAC,EACD,CAAC;SACE,MAAM,CAAC;QACN,KAAK,EAAE,mBAAmB;QAC1B,MAAM,EAAE,mBAAmB;QAC3B;;WAEG;QACH,MAAM,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC,OAAO,CAAC,IAAI,CAAC;QACjC;;;;WAIG;QACH,IAAI,EAAE,CAAC,CAAC,IAAI,CAAC,CAAC,QAAQ,EAAE,SAAS,EAAE,KAAK,EAAE,KAAK,CAAC,CAAC,CAAC,OAAO,CAAC,QAAQ,CAAC;QACnE;;;;;;WAMG;QACH,UAAU,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC,OAAO,CAAC,KAAK,CAAC;QACtC;;;;WAIG;QACH,UAAU,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,WAAW,CAAC;QAC3E;;;;WAIG;QACH,WAAW,EAAE,CAAC,CAAC,MAAM,EAAE,CAAC,OAAO,CAAC,WAAW,CAAC;QAC5C;;;;WAIG;QACH,UAAU,EAAE,CAAC,CAAC,MAAM,EAAE,CAAC,OAAO,CAAC,cAAc,CAAC;QAC9C;;;;WAIG;QACH,QAAQ,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,OAAO,CAAC;QACrE;;;;WAIG;QACH,SAAS,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,OAAO,CAAC;QACtE;;;;WAIG;QACH,iBAAiB,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC,OAAO,CAAC,KAAK,CAAC;QAC7C;;;;WAIG;QACH,UAAU,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC,OAAO,CAAC,KAAK,CAAC;QACtC;;;;;WAKG;QACH,YAAY,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC,QAAQ,EAAE,CAAC,IAAI,CAAC,CAAC,CAAC,UAAU,CAAC,OAAO,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,CAAC,CAAC,CAAC,QAAQ,EAAE;QAC5G;;WAEG;QACH,iBAAiB,EAAE,CAAC,CAAC,KAAK,CAAC,sBAAsB,CAAC,CAAC,OAAO,CAAC;YACzD;gBACE,IAAI,EAAE,KAAK;gBACX,OAAO,EAAE,CAAC,MAAM,EAAE,OAAO,EAAE,QAAQ,EAAE,KAAK,EAAE,SAAS,CAAC;aACvD;SACF,CAAC;QACF;;;;;WAKG;QACH,gBAAgB,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,CAAC,OAAO,CAAC,EAAE,CAAC;QACjD;;;;;;;;WAQG;QACH,aAAa,EAAE,CAAC;aACb,MAAM,CAAC;YACN,MAAM,EAAE,CAAC,CAAC,OAAO,EAAE;YACnB,QAAQ,EAAE,CAAC,CAAC,OAAO,EAAE;YACrB,SAAS,EAAE,CAAC,CAAC,OAAO,EAAE;SACvB,CAAC;aACD,OAAO,CAAC;YACP,MAAM,EAAE,KAAK;YACb,QAAQ,EAAE,KAAK;YACf,SAAS,EAAE,IAAI;SAChB,CAAC;KACL,CAAC;SACD,OAAO,CAAC,EAAE,CAAC,CACf;IACD;;OAEG;IACH,MAAM,EAAE,CAAC;SACN,MAAM,CAAC;QACN,KAAK,EAAE,mBAAmB;QAC1B,MAAM,EAAE,mBAAmB;QAC3B;;WAEG;QACH,MAAM,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC,OAAO,CAAC,IAAI,CAAC;QACjC;;;;WAIG;QACH,KAAK,EAAE,CAAC,CAAC,MAAM,EAAE,CAAC,OAAO,CAAC,YAAY,CAAC;KACxC,CAAC;SACD,OAAO,CAAC,EAAE,CAAC;IACd;;OAEG;IACH,IAAI,EAAE,CAAC;SACJ,MAAM,CAAC;QACN,KAAK,EAAE,mBAAmB;QAC1B,MAAM,EAAE,mBAAmB;QAC3B;;WAEG;QACH,MAAM,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC,OAAO,CAAC,KAAK,CAAC;QAClC;;;;WAIG;QACH,MAAM,EAAE,CAAC,CAAC,MAAM,EAAE,CAAC,OAAO,CAAC,GAAG,GAAG,EAAE,GAAG,IAAI,CAAC;QAC3C;;;;WAIG;QACH,iBAAiB,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC,OAAO,CAAC,KAAK,CAAC;KAC9C,CAAC;SACD,OAAO,CAAC,EAAE,CAAC;IACd;;OAEG;IACH,aAAa,EAAE,CAAC;SACb,MAAM,CAAC;QACN,KAAK,EAAE,mBAAmB;QAC1B,MAAM,EAAE,mBAAmB;QAC3B;;WAEG;QACH,MAAM,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC,OAAO,CAAC,IAAI,CAAC;KAClC,CAAC;SACD,OAAO,CAAC,EAAE,CAAC;IACd;;OAEG;IACH,MAAM,EAAE,CAAC;SACN,MAAM,CAAC;QACN,KAAK,EAAE,mBAAmB;QAC1B,MAAM,EAAE,mBAAmB;QAC3B;;WAEG;QACH,MAAM,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC,OAAO,CAAC,IAAI,CAAC;KAClC,CAAC;SACD,OAAO,CAAC,EAAE,CAAC;IACd;;OAEG;IACH,OAAO,EAAE,CAAC;SACP,MAAM,CAAC;QACN,KAAK,EAAE,mBAAmB;QAC1B,MAAM,EAAE,mBAAmB;QAC3B;;WAEG;QACH,MAAM,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC,OAAO,CAAC,IAAI,CAAC;KAClC,CAAC;SACD,OAAO,CAAC,EAAE,CAAC;IACd;;OAEG;IACH,aAAa,EAAE,CAAC;SACb,MAAM,CAAC;QACN,KAAK,EAAE,mBAAmB;QAC1B,MAAM,EAAE,mBAAmB;QAC3B;;WAEG;QACH,MAAM,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC,OAAO,CAAC,IAAI,CAAC;QACjC;;;;WAIG;QACH,KAAK,EAAE,CAAC,CAAC,MAAM,CAAC,MAAM,EAAE,CAAC,OAAO,CAAC,eAAe,CAAC;KAClD,CAAC;SACD,OAAO,CAAC,EAAE,CAAC;IACd;;OAEG;IACH,GAAG,EAAE,CAAC;SACH,MAAM,CAAC;QACN,KAAK,EAAE,mBAAmB;QAC1B,MAAM,EAAE,mBAAmB;QAC3B;;WAEG;QACH,MAAM,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC,OAAO,CAAC,KAAK,CAAC;QAClC,qEAAqE;QACrE,MAAM,EAAE,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,EAAE,CAAC;QACrF;;;WAGG;QACH,UAAU,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC,QAAQ,EAAE;QAClC;;;WAGG;QACH,SAAS,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC,QAAQ,EAAE;KAClC,CAAC;SACD,OAAO,CAAC,EAAE,CAAC;IACd;;;OAGG;IACH,cAAc,EAAE,CAAC;SACd,MAAM,CAAC;QACN,KAAK,EAAE,mBAAmB;QAC1B,MAAM,EAAE,mBAAmB;QAC3B;;WAEG;QACH,MAAM,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC,OAAO,CAAC,KAAK,CAAC;QAClC;;;;WAIG;QACH,KAAK,EAAE,CAAC,CAAC,MAAM,EAAE,CAAC,OAAO,CAAC,4BAA4B,CAAC;KACxD,CAAC;SACD,OAAO,CAAC,EAAE,CAAC;IACd;;OAEG;IACH,GAAG,EAAE,CAAC;SACH,MAAM,CAAC;QACN,KAAK,EAAE,mBAAmB;QAC1B,MAAM,EAAE,mBAAmB;QAC3B;;WAEG;QACH,MAAM,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC,OAAO,CAAC,IAAI,CAAC;KAClC,CAAC;SACD,OAAO,CAAC,EAAE,CAAC;IACd,IAAI,EAAE,CAAC;SACJ,MAAM,CAAC;QACN,WAAW,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,CAAC,QAAQ,EAAE;QAC3C,eAAe,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,CAAC,QAAQ,EAAE;QAC/C,qBAAqB,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,CAAC,QAAQ,EAAE;QACrD,YAAY,EAAE,wBAAwB,CAAC,QAAQ,EAAE;KAClD,CAAC;SACD,OAAO,CAAC,EAAE,CAAC;IACd,KAAK,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,aAAa,EAAE,aAAa,CAAC,KAAK,EAAE,CAAC,CAAC,CAAC,QAAQ,EAAE;IACjE,MAAM,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,aAAa,EAAE,aAAa,CAAC,KAAK,EAAE,CAAC,CAAC,CAAC,QAAQ,EAAE;IAClE,sBAAsB,EAAE,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,CAAC,QAAQ,EAAE,CAAC,QAAQ,EAAE;CAChE,CAAC,CAAC;AAGH,MAAM,8BAA8B,GAGhC,CAAC;KACF,QAAQ,EAAE;KACV,IAAI,CAAC,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC,OAAO,EAAE,CAAC;KACrD,OAAO,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC,IAAI,EAAE,CAAC,CAAC,CAAC,CAAC;AAO5C,MAAM,CAAC,MAAM,oBAAoB,GAAqB,CAAC,CAAC,MAAM,CAAC;IAC7D,KAAK,EAAE,CAAC;SACL,MAAM,CAAC;QACN;;WAEG;QACH,SAAS,EAAE,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,CAAC,CAAC,QAAQ,EAAE;QACnD;;;WAGG;QACH,eAAe,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,CAAC,QAAQ,EAAE;QAC/C;;WAEG;QACH,SAAS,EAAE,8BAA8B,CAAC,QAAQ,EAAE;KACrD,CAAC;SACD,OAAO,CAAC,EAAE,CAAC;CACf,CAAC,CAAC;AAQH,MAAM,MAAM,GAAG;IACb,QAAQ,EAAE,cAAc,CAAC,KAAK,CAAC,EAAE,CAA4C;IAC7E,MAAM,EAAE,oBAAoB,CAAC,KAAK,CAAC,EAAE,CAAwD;CACvD,CAAC;AAEzC,eAAe,MAAM,CAAC"}
164
+ var config_default_default = config;
165
+
166
+ //#endregion
167
+ export { LookupAddress, SecurityConfig, SecurityHelperConfig, SecurityMiddlewareName, config_default_default as default };
@@ -1,3 +1,6 @@
1
- import type { PartialEggConfig } from 'egg';
2
- declare const _default: PartialEggConfig;
3
- export default _default;
1
+ import { PartialEggConfig } from "egg";
2
+
3
+ //#region src/config/config.local.d.ts
4
+ declare const config: PartialEggConfig;
5
+ //#endregion
6
+ export { config as default };
@@ -1,8 +1,6 @@
1
- export default {
2
- security: {
3
- hsts: {
4
- enable: false,
5
- },
6
- },
7
- };
8
- //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiY29uZmlnLmxvY2FsLmpzIiwic291cmNlUm9vdCI6IiIsInNvdXJjZXMiOlsiLi4vLi4vc3JjL2NvbmZpZy9jb25maWcubG9jYWwudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6IkFBRUEsZUFBZTtJQUNiLFFBQVEsRUFBRTtRQUNSLElBQUksRUFBRTtZQUNKLE1BQU0sRUFBRSxLQUFLO1NBQ2Q7S0FDRjtDQUNrQixDQUFDIn0=
1
+ //#region src/config/config.local.ts
2
+ const config = { security: { hsts: { enable: false } } };
3
+ var config_local_default = config;
4
+
5
+ //#endregion
6
+ export { config_local_default as default };
package/dist/index.d.ts CHANGED
@@ -1,18 +1,22 @@
1
- import './types.ts';
2
- import { type EggPluginFactory } from 'egg';
1
+ import "./types.js";
2
+ import { EggPluginFactory } from "egg";
3
+
4
+ //#region src/index.d.ts
5
+
3
6
  /**
4
- * Security plugin
5
- *
6
- * @since 4.1.0
7
- * Usage:
8
- * ```ts
9
- * // config/plugin.ts
10
- * import securityPlugin from '@eggjs/security';
11
- *
12
- * export default {
13
- * ...securityPlugin(),
14
- * };
15
- * ```
16
- */
7
+ * Security plugin
8
+ *
9
+ * @since 4.1.0
10
+ * Usage:
11
+ * ```ts
12
+ * // config/plugin.ts
13
+ * import securityPlugin from '@eggjs/security';
14
+ *
15
+ * export default {
16
+ * ...securityPlugin(),
17
+ * };
18
+ * ```
19
+ */
17
20
  declare const _default: EggPluginFactory;
18
- export default _default;
21
+ //#endregion
22
+ export { _default as default };
package/dist/index.js CHANGED
@@ -1,23 +1,26 @@
1
- import "./types.js";
2
- import { definePluginFactory } from 'egg';
1
+ import { definePluginFactory } from "egg";
2
+
3
+ //#region src/index.ts
3
4
  /**
4
- * Security plugin
5
- *
6
- * @since 4.1.0
7
- * Usage:
8
- * ```ts
9
- * // config/plugin.ts
10
- * import securityPlugin from '@eggjs/security';
11
- *
12
- * export default {
13
- * ...securityPlugin(),
14
- * };
15
- * ```
16
- */
17
- export default definePluginFactory({
18
- name: 'security',
19
- enable: true,
20
- path: import.meta.dirname,
21
- optionalDependencies: ['session'],
5
+ * Security plugin
6
+ *
7
+ * @since 4.1.0
8
+ * Usage:
9
+ * ```ts
10
+ * // config/plugin.ts
11
+ * import securityPlugin from '@eggjs/security';
12
+ *
13
+ * export default {
14
+ * ...securityPlugin(),
15
+ * };
16
+ * ```
17
+ */
18
+ var src_default = definePluginFactory({
19
+ name: "security",
20
+ enable: true,
21
+ path: import.meta.dirname,
22
+ optionalDependencies: ["session"]
22
23
  });
23
- //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi9zcmMvaW5kZXgudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6IkFBQUEsT0FBTyxZQUFZLENBQUM7QUFDcEIsT0FBTyxFQUFFLG1CQUFtQixFQUF5QixNQUFNLEtBQUssQ0FBQztBQUVqRTs7Ozs7Ozs7Ozs7OztHQWFHO0FBQ0gsZUFBZSxtQkFBbUIsQ0FBQztJQUNqQyxJQUFJLEVBQUUsVUFBVTtJQUNoQixNQUFNLEVBQUUsSUFBSTtJQUNaLElBQUksRUFBRSxNQUFNLENBQUMsSUFBSSxDQUFDLE9BQU87SUFDekIsb0JBQW9CLEVBQUUsQ0FBQyxTQUFTLENBQUM7Q0FDbEMsQ0FBcUIsQ0FBQyJ9
24
+
25
+ //#endregion
26
+ export { src_default as default };