@jmlq/auth 0.0.1-alpha.30 → 0.0.1-alpha.31

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -9,4 +9,4 @@
9
9
  * - Mantén este catálogo pequeño y estable.
10
10
  * - Si agregas un error nuevo, agrega aquí su código.
11
11
  */
12
- export type AuthErrorCode = "TOKEN_INVALID" | "TOKEN_EXPIRED" | "TOKEN_MALFORMED" | "SIGNATURE_INVALID" | "AUTHENTICATION_FAILED" | "JWT_ERROR" | "KEY_MISMATCH" | "KEY_NOT_FOUND" | "KEY_MISMATCH" | "CLAIMS_VALIDATION_ERROR" | "JWT_PAYLOAD_INVALID" | "TOKEN_NOT_YET_VALID" | "ALGORITHM_UNSUPPORTED" | "KEY_MISMATCH" | "KEY_NOT_FOUND" | "INVALID_EMAIL" | "INVALID_HASHED_PASSWORD" | "PASSWORD_POLICY_VIOLATION" | "PASSWORD_MISMATCH" | "USER_NOT_FOUND" | "USER_DISABLED" | "EMAIL_ALREADY_IN_USE" | "INVALID_PERMISSION" | "INVALID_ROLE" | "INVALID_ID" | "LOGOUT_FAILED" | "EMAIL_NOT_VERIFIED" | "PASSWORD_RESET_TOKEN_INVALID" | "PASSWORD_RESET_TOKEN_EXPIRED" | "PASSWORD_RESET_TOKEN_ALREADY_USED";
12
+ export type AuthErrorCode = "TOKEN_INVALID" | "TOKEN_EXPIRED" | "TOKEN_MALFORMED" | "SIGNATURE_INVALID" | "AUTHENTICATION_FAILED" | "JWT_ERROR" | "KEY_MISMATCH" | "KEY_NOT_FOUND" | "KEY_MISMATCH" | "CLAIMS_VALIDATION_ERROR" | "JWT_PAYLOAD_INVALID" | "TOKEN_NOT_YET_VALID" | "JWT_EMPTY" | "JWT_MALFORMED" | "ALGORITHM_UNSUPPORTED" | "KEY_MISMATCH" | "KEY_NOT_FOUND" | "INVALID_EMAIL" | "INVALID_HASHED_PASSWORD" | "PASSWORD_POLICY_VIOLATION" | "PASSWORD_MISMATCH" | "USER_NOT_FOUND" | "USER_DISABLED" | "EMAIL_ALREADY_IN_USE" | "INVALID_PERMISSION" | "INVALID_ROLE" | "INVALID_ID" | "LOGOUT_FAILED" | "EMAIL_NOT_VERIFIED" | "PASSWORD_RESET_TOKEN_INVALID" | "PASSWORD_RESET_TOKEN_EXPIRED" | "PASSWORD_RESET_TOKEN_ALREADY_USED";
@@ -1,5 +1,6 @@
1
1
  export * from "./auth.errors";
2
2
  export * from "./identity.errors";
3
3
  export * from "./password-reset.errors";
4
- export * from "./Invalid-jwt-payload.error";
4
+ export * from "./jwt-payload.error";
5
5
  export * from "./auth-error-code";
6
+ export * from "./jwt.errors";
@@ -17,5 +17,6 @@ Object.defineProperty(exports, "__esModule", { value: true });
17
17
  __exportStar(require("./auth.errors"), exports);
18
18
  __exportStar(require("./identity.errors"), exports);
19
19
  __exportStar(require("./password-reset.errors"), exports);
20
- __exportStar(require("./Invalid-jwt-payload.error"), exports);
20
+ __exportStar(require("./jwt-payload.error"), exports);
21
21
  __exportStar(require("./auth-error-code"), exports);
22
+ __exportStar(require("./jwt.errors"), exports);
@@ -0,0 +1,7 @@
1
+ import { AuthDomainError } from "./auth.errors";
2
+ export declare class InvalidJwtEmptyError extends AuthDomainError {
3
+ constructor(message?: string, details?: unknown);
4
+ }
5
+ export declare class InvalidJwtMalformedError extends AuthDomainError {
6
+ constructor(message?: string, details?: unknown);
7
+ }
@@ -0,0 +1,16 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ exports.InvalidJwtMalformedError = exports.InvalidJwtEmptyError = void 0;
4
+ const auth_errors_1 = require("./auth.errors");
5
+ class InvalidJwtEmptyError extends auth_errors_1.AuthDomainError {
6
+ constructor(message = "Invalid Empty JWT", details) {
7
+ super(message, "JWT_EMPTY", details);
8
+ }
9
+ }
10
+ exports.InvalidJwtEmptyError = InvalidJwtEmptyError;
11
+ class InvalidJwtMalformedError extends auth_errors_1.AuthDomainError {
12
+ constructor(message = "Invalid Malformed JWT", details) {
13
+ super(message, "JWT_MALFORMED", details);
14
+ }
15
+ }
16
+ exports.InvalidJwtMalformedError = InvalidJwtMalformedError;
@@ -0,0 +1 @@
1
+ export declare function assertJwtStructure(token: string): void;
@@ -0,0 +1,13 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ exports.assertJwtStructure = assertJwtStructure;
4
+ const errors_1 = require("../../../domain/errors");
5
+ function assertJwtStructure(token) {
6
+ if (typeof token !== "string" || token.trim().length === 0) {
7
+ throw new errors_1.InvalidJwtEmptyError();
8
+ }
9
+ const parts = token.split(".");
10
+ if (parts.length !== 3) {
11
+ throw new errors_1.InvalidJwtMalformedError();
12
+ }
13
+ }
@@ -4,3 +4,4 @@ export * from "./require-finite-number.helper";
4
4
  export * from "./optional-audience.helper";
5
5
  export * from "./optional-roles.helper";
6
6
  export * from "./optional-record.helper";
7
+ export * from "./assert-jwt-structure.helper";
@@ -20,3 +20,4 @@ __exportStar(require("./require-finite-number.helper"), exports);
20
20
  __exportStar(require("./optional-audience.helper"), exports);
21
21
  __exportStar(require("./optional-roles.helper"), exports);
22
22
  __exportStar(require("./optional-record.helper"), exports);
23
+ __exportStar(require("./assert-jwt-structure.helper"), exports);
package/package.json CHANGED
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "name": "@jmlq/auth",
3
3
  "description": "JWT authentication package with clean architecture",
4
- "version": "0.0.1-alpha.30",
4
+ "version": "0.0.1-alpha.31",
5
5
  "main": "dist/index.js",
6
6
  "types": "dist/index.d.ts",
7
7
  "scripts": {