@hmcts/opal-frontend-common-node 0.0.11 → 0.0.13

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (84) hide show
  1. package/helmet/index.d.ts.map +1 -1
  2. package/helmet/index.js +3 -2
  3. package/helmet/index.js.map +1 -1
  4. package/interfaces/index.d.ts +1 -2
  5. package/interfaces/index.d.ts.map +1 -1
  6. package/interfaces/index.js +1 -2
  7. package/interfaces/index.js.map +1 -1
  8. package/interfaces/routes-config.d.ts +5 -0
  9. package/interfaces/routes-config.d.ts.map +1 -1
  10. package/interfaces/routes-config.js +5 -0
  11. package/interfaces/routes-config.js.map +1 -1
  12. package/interfaces/securityToken.d.ts +1 -2
  13. package/interfaces/securityToken.d.ts.map +1 -1
  14. package/interfaces/securityToken.js.map +1 -1
  15. package/interfaces/session-config.d.ts +0 -1
  16. package/interfaces/session-config.d.ts.map +1 -1
  17. package/interfaces/session-config.js +0 -1
  18. package/interfaces/session-config.js.map +1 -1
  19. package/package.json +4 -3
  20. package/routes/index.d.ts +1 -0
  21. package/routes/index.d.ts.map +1 -1
  22. package/routes/index.js +38 -23
  23. package/routes/index.js.map +1 -1
  24. package/session/index.d.ts +1 -2
  25. package/session/index.d.ts.map +1 -1
  26. package/session/index.js +1 -2
  27. package/session/index.js.map +1 -1
  28. package/session.d.ts +2 -2
  29. package/sso/index.d.ts +2 -2
  30. package/sso/index.d.ts.map +1 -1
  31. package/sso/index.js +2 -2
  32. package/sso/index.js.map +1 -1
  33. package/sso/sso-authenticated.d.ts +10 -0
  34. package/sso/sso-authenticated.d.ts.map +1 -1
  35. package/sso/sso-authenticated.js +17 -5
  36. package/sso/sso-authenticated.js.map +1 -1
  37. package/sso/sso-configuration.d.ts +12 -0
  38. package/sso/sso-configuration.d.ts.map +1 -0
  39. package/sso/sso-configuration.js +44 -0
  40. package/sso/sso-configuration.js.map +1 -0
  41. package/sso/sso-login-callback.d.ts +21 -3
  42. package/sso/sso-login-callback.d.ts.map +1 -1
  43. package/sso/sso-login-callback.js +72 -19
  44. package/sso/sso-login-callback.js.map +1 -1
  45. package/sso/sso-login.d.ts +17 -2
  46. package/sso/sso-login.d.ts.map +1 -1
  47. package/sso/sso-login.js +24 -17
  48. package/sso/sso-login.js.map +1 -1
  49. package/sso/sso-logout-callback.d.ts +10 -0
  50. package/sso/sso-logout-callback.d.ts.map +1 -1
  51. package/sso/sso-logout-callback.js +10 -0
  52. package/sso/sso-logout-callback.js.map +1 -1
  53. package/sso/sso-logout.d.ts +14 -3
  54. package/sso/sso-logout.d.ts.map +1 -1
  55. package/sso/sso-logout.js +19 -25
  56. package/sso/sso-logout.js.map +1 -1
  57. package/stubs/sso/sso-authenticated.stub.d.ts +11 -0
  58. package/stubs/sso/sso-authenticated.stub.d.ts.map +1 -1
  59. package/stubs/sso/sso-authenticated.stub.js +14 -6
  60. package/stubs/sso/sso-authenticated.stub.js.map +1 -1
  61. package/stubs/sso/sso-login-callback.stub.d.ts +17 -0
  62. package/stubs/sso/sso-login-callback.stub.d.ts.map +1 -1
  63. package/stubs/sso/sso-login-callback.stub.js +38 -6
  64. package/stubs/sso/sso-login-callback.stub.js.map +1 -1
  65. package/stubs/sso/sso-login.stub.d.ts +11 -0
  66. package/stubs/sso/sso-login.stub.d.ts.map +1 -1
  67. package/stubs/sso/sso-login.stub.js +17 -8
  68. package/stubs/sso/sso-login.stub.js.map +1 -1
  69. package/stubs/sso/sso-logout-callback.stub.d.ts +12 -0
  70. package/stubs/sso/sso-logout-callback.stub.d.ts.map +1 -1
  71. package/stubs/sso/sso-logout-callback.stub.js +12 -0
  72. package/stubs/sso/sso-logout-callback.stub.js.map +1 -1
  73. package/stubs/sso/sso-logout.stub.d.ts +14 -2
  74. package/stubs/sso/sso-logout.stub.d.ts.map +1 -1
  75. package/stubs/sso/sso-logout.stub.js +21 -3
  76. package/stubs/sso/sso-logout.stub.js.map +1 -1
  77. package/interfaces/userState.d.ts +0 -16
  78. package/interfaces/userState.d.ts.map +0 -1
  79. package/interfaces/userState.js +0 -16
  80. package/interfaces/userState.js.map +0 -1
  81. package/session/session-user-state/index.d.ts +0 -4
  82. package/session/session-user-state/index.d.ts.map +0 -1
  83. package/session/session-user-state/index.js +0 -20
  84. package/session/session-user-state/index.js.map +0 -1
@@ -1,4 +1,16 @@
1
- import { Request, Response, NextFunction } from 'express';
2
- declare const _default: (req: Request, res: Response, next: NextFunction) => Promise<void>;
1
+ import { Request, Response } from 'express';
2
+ /**
3
+ * Handles the SSO logout stub endpoint.
4
+ *
5
+ * - Prevents caching of the endpoint by setting appropriate headers.
6
+ * - Checks for the presence and validity of the access token in the session.
7
+ * - Responds with HTTP 401 and `false` if the access token is missing or expired.
8
+ * - Responds with HTTP 200 and `true` if the access token is present and valid.
9
+ *
10
+ * @param req - The Express request object.
11
+ * @param res - The Express response object.
12
+ * @returns Sends a boolean response indicating the validity of the access token.
13
+ */
14
+ declare const _default: (req: Request, res: Response) => Response<any, Record<string, any>>;
3
15
  export default _default;
4
16
  //# sourceMappingURL=sso-logout.stub.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"sso-logout.stub.d.ts","sourceRoot":"","sources":["../../../src/stubs/sso/sso-logout.stub.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,OAAO,EAAE,QAAQ,EAAE,YAAY,EAAE,MAAM,SAAS,CAAC;yBAGpC,KAAK,OAAO,EAAE,KAAK,QAAQ,EAAE,MAAM,YAAY;AAArE,wBAEE"}
1
+ {"version":3,"file":"sso-logout.stub.d.ts","sourceRoot":"","sources":["../../../src/stubs/sso/sso-logout.stub.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,OAAO,EAAE,QAAQ,EAAE,MAAM,SAAS,CAAC;AAG5C;;;;;;;;;;;GAWG;yBACa,KAAK,OAAO,EAAE,KAAK,QAAQ;AAA3C,wBAWE"}
@@ -1,5 +1,23 @@
1
- // eslint-disable-next-line @typescript-eslint/no-unused-vars
2
- export default async (req, res, next) => {
3
- res.redirect('/sso/logout-callback');
1
+ import { Jwt } from '../../utils';
2
+ /**
3
+ * Handles the SSO logout stub endpoint.
4
+ *
5
+ * - Prevents caching of the endpoint by setting appropriate headers.
6
+ * - Checks for the presence and validity of the access token in the session.
7
+ * - Responds with HTTP 401 and `false` if the access token is missing or expired.
8
+ * - Responds with HTTP 200 and `true` if the access token is present and valid.
9
+ *
10
+ * @param req - The Express request object.
11
+ * @param res - The Express response object.
12
+ * @returns Sends a boolean response indicating the validity of the access token.
13
+ */
14
+ export default (req, res) => {
15
+ // Don't allow caching of this endpoint
16
+ res.header('Cache-Control', 'no-store, must-revalidate');
17
+ const accessToken = req.session.securityToken?.access_token;
18
+ if (!accessToken || Jwt.isJwtExpired(accessToken)) {
19
+ return res.status(401).send(false);
20
+ }
21
+ return res.status(200).send(true);
4
22
  };
5
23
  //# sourceMappingURL=sso-logout.stub.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"sso-logout.stub.js","sourceRoot":"","sources":["../../../src/stubs/sso/sso-logout.stub.ts"],"names":[],"mappings":"AAEA,6DAA6D;AAC7D,eAAe,KAAK,EAAE,GAAY,EAAE,GAAa,EAAE,IAAkB,EAAE,EAAE;IACvE,GAAG,CAAC,QAAQ,CAAC,sBAAsB,CAAC,CAAC;AACvC,CAAC,CAAC"}
1
+ {"version":3,"file":"sso-logout.stub.js","sourceRoot":"","sources":["../../../src/stubs/sso/sso-logout.stub.ts"],"names":[],"mappings":"AACA,OAAO,EAAE,GAAG,EAAE,MAAM,aAAa,CAAC;AAElC;;;;;;;;;;;GAWG;AACH,eAAe,CAAC,GAAY,EAAE,GAAa,EAAE,EAAE;IAC7C,uCAAuC;IACvC,GAAG,CAAC,MAAM,CAAC,eAAe,EAAE,2BAA2B,CAAC,CAAC;IAEzD,MAAM,WAAW,GAAG,GAAG,CAAC,OAAO,CAAC,aAAa,EAAE,YAAY,CAAC;IAE5D,IAAI,CAAC,WAAW,IAAI,GAAG,CAAC,YAAY,CAAC,WAAW,CAAC,EAAE,CAAC;QAClD,OAAO,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;IACrC,CAAC;IAED,OAAO,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;AACpC,CAAC,CAAC"}
@@ -1,16 +0,0 @@
1
- declare class UserState {
2
- user_id: string;
3
- user_name: string;
4
- business_unit_user?: BusinessUnitUser[];
5
- }
6
- declare class BusinessUnitUser {
7
- business_user_id: string;
8
- business_unit: string;
9
- permissions?: Permissions[];
10
- }
11
- declare class Permissions {
12
- permission_id: number;
13
- permission_name: string;
14
- }
15
- export default UserState;
16
- //# sourceMappingURL=userState.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"userState.d.ts","sourceRoot":"","sources":["../../src/interfaces/userState.ts"],"names":[],"mappings":"AAAA,cAAM,SAAS;IACb,OAAO,EAAG,MAAM,CAAC;IACjB,SAAS,EAAG,MAAM,CAAC;IACnB,kBAAkB,CAAC,EAAE,gBAAgB,EAAE,CAAC;CACzC;AAED,cAAM,gBAAgB;IACpB,gBAAgB,EAAG,MAAM,CAAC;IAC1B,aAAa,EAAG,MAAM,CAAC;IACvB,WAAW,CAAC,EAAE,WAAW,EAAE,CAAC;CAC7B;AAED,cAAM,WAAW;IACf,aAAa,EAAG,MAAM,CAAC;IACvB,eAAe,EAAG,MAAM,CAAC;CAC1B;AAED,eAAe,SAAS,CAAC"}
@@ -1,16 +0,0 @@
1
- class UserState {
2
- user_id;
3
- user_name;
4
- business_unit_user;
5
- }
6
- class BusinessUnitUser {
7
- business_user_id;
8
- business_unit;
9
- permissions;
10
- }
11
- class Permissions {
12
- permission_id;
13
- permission_name;
14
- }
15
- export default UserState;
16
- //# sourceMappingURL=userState.js.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"userState.js","sourceRoot":"","sources":["../../src/interfaces/userState.ts"],"names":[],"mappings":"AAAA,MAAM,SAAS;IACb,OAAO,CAAU;IACjB,SAAS,CAAU;IACnB,kBAAkB,CAAsB;CACzC;AAED,MAAM,gBAAgB;IACpB,gBAAgB,CAAU;IAC1B,aAAa,CAAU;IACvB,WAAW,CAAiB;CAC7B;AAED,MAAM,WAAW;IACf,aAAa,CAAU;IACvB,eAAe,CAAU;CAC1B;AAED,eAAe,SAAS,CAAC"}
@@ -1,4 +0,0 @@
1
- import { Request, Response } from 'express';
2
- declare const sessionUserState: (req: Request, res: Response) => void;
3
- export default sessionUserState;
4
- //# sourceMappingURL=index.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../src/session/session-user-state/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,OAAO,EAAE,QAAQ,EAAE,MAAM,SAAS,CAAC;AAI5C,QAAA,MAAM,gBAAgB,GAAI,KAAK,OAAO,EAAE,KAAK,QAAQ,SAiBpD,CAAC;AAEF,eAAe,gBAAgB,CAAC"}
@@ -1,20 +0,0 @@
1
- import { Jwt } from '../../utils';
2
- const sessionUserState = (req, res) => {
3
- const userState = req.session.securityToken?.user_state;
4
- const accessToken = req.session.securityToken?.access_token;
5
- const name = accessToken && userState ? Jwt.parseJwt(accessToken).name : '';
6
- // Don't allow caching of this endpoint
7
- res.set({
8
- 'Cache-Control': 'no-store, no-cache, must-revalidate, max-age=0',
9
- Pragma: 'no-cache',
10
- Expires: '0',
11
- });
12
- if (!userState) {
13
- res.send({});
14
- }
15
- else {
16
- res.send({ ...userState, name });
17
- }
18
- };
19
- export default sessionUserState;
20
- //# sourceMappingURL=index.js.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"index.js","sourceRoot":"","sources":["../../../src/session/session-user-state/index.ts"],"names":[],"mappings":"AAEA,OAAO,EAAE,GAAG,EAAE,MAAM,aAAa,CAAC;AAElC,MAAM,gBAAgB,GAAG,CAAC,GAAY,EAAE,GAAa,EAAE,EAAE;IACvD,MAAM,SAAS,GAA0B,GAAG,CAAC,OAAO,CAAC,aAAa,EAAE,UAAU,CAAC;IAC/E,MAAM,WAAW,GAAG,GAAG,CAAC,OAAO,CAAC,aAAa,EAAE,YAAY,CAAC;IAC5D,MAAM,IAAI,GAAG,WAAW,IAAI,SAAS,CAAC,CAAC,CAAC,GAAG,CAAC,QAAQ,CAAC,WAAW,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC;IAE5E,uCAAuC;IACvC,GAAG,CAAC,GAAG,CAAC;QACN,eAAe,EAAE,gDAAgD;QACjE,MAAM,EAAE,UAAU;QAClB,OAAO,EAAE,GAAG;KACb,CAAC,CAAC;IAEH,IAAI,CAAC,SAAS,EAAE,CAAC;QACf,GAAG,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;IACf,CAAC;SAAM,CAAC;QACN,GAAG,CAAC,IAAI,CAAC,EAAE,GAAG,SAAS,EAAE,IAAI,EAAE,CAAC,CAAC;IACnC,CAAC;AACH,CAAC,CAAC;AAEF,eAAe,gBAAgB,CAAC"}