@navservice/core 1.128.0 → 1.129.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/build/es/helpers.js +9 -9
- package/build/lib/helpers.cjs +9 -9
- package/package.json +1 -1
package/build/es/helpers.js
CHANGED
|
@@ -552,7 +552,7 @@ const _token = new class {
|
|
|
552
552
|
results: [],
|
|
553
553
|
fn: _token_fn
|
|
554
554
|
});
|
|
555
|
-
const secret = new TextEncoder().encode(await helpers_secret.estract_secret(c
|
|
555
|
+
const secret = new TextEncoder().encode(await helpers_secret.estract_secret(c?.env?.JSON_WEB_TOKEN_AUTH_USER));
|
|
556
556
|
const { payload } = await jwtVerify(token, secret);
|
|
557
557
|
if (!payload._id || !payload.email) return _set_response.c.INVALID_TOKEN({
|
|
558
558
|
message: 'Token inválido!!!!',
|
|
@@ -584,7 +584,7 @@ const _token = new class {
|
|
|
584
584
|
}
|
|
585
585
|
}
|
|
586
586
|
async criar_token_login_usuario(props) {
|
|
587
|
-
if (await helpers_secret.estract_secret(props?.c
|
|
587
|
+
if (await helpers_secret.estract_secret(props?.c?.env?.JSON_WEB_TOKEN_AUTH_USER)) _set_response.error.WARNING({
|
|
588
588
|
message: "Erro ao gerar token auth!!",
|
|
589
589
|
results: [],
|
|
590
590
|
fn: _token_fn
|
|
@@ -601,7 +601,7 @@ const _token = new class {
|
|
|
601
601
|
plano_status: props?.plano_status
|
|
602
602
|
}).setProtectedHeader({
|
|
603
603
|
alg: "HS256"
|
|
604
|
-
}).setIssuedAt().setExpirationTime("1h").sign(new TextEncoder().encode(await helpers_secret.estract_secret(props?.c
|
|
604
|
+
}).setIssuedAt().setExpirationTime("1h").sign(new TextEncoder().encode(await helpers_secret.estract_secret(props?.c?.env?.JSON_WEB_TOKEN_AUTH_USER))).catch((error)=>_set_response.error.TOKEN_AUTH_USER({
|
|
605
605
|
message: "Erro ao gerar token auth user!",
|
|
606
606
|
results: error?.message,
|
|
607
607
|
fn: _token_fn
|
|
@@ -624,7 +624,7 @@ const _token = new class {
|
|
|
624
624
|
results: [],
|
|
625
625
|
fn: _token_fn
|
|
626
626
|
});
|
|
627
|
-
const secret = new TextEncoder().encode(await helpers_secret.estract_secret(c
|
|
627
|
+
const secret = new TextEncoder().encode(await helpers_secret.estract_secret(c?.env?.JSON_WEB_TOKEN_AUTH_MICRO_SERVICO));
|
|
628
628
|
const { payload } = await jwtVerify(token, secret);
|
|
629
629
|
if (!payload._id || !payload.email) return _set_response.c.INVALID_TOKEN({
|
|
630
630
|
message: 'Token inválido para o serviço!',
|
|
@@ -655,7 +655,7 @@ const _token = new class {
|
|
|
655
655
|
}
|
|
656
656
|
}
|
|
657
657
|
async criar_token_micro_servico({ c }) {
|
|
658
|
-
if (!await helpers_secret.estract_secret(c
|
|
658
|
+
if (!await helpers_secret.estract_secret(c?.env?.JSON_WEB_TOKEN_AUTH_MICRO_SERVICO)) _set_response.error.WARNING({
|
|
659
659
|
message: "Erro ao gerar token!!",
|
|
660
660
|
results: [],
|
|
661
661
|
fn: _token_fn
|
|
@@ -673,7 +673,7 @@ const _token = new class {
|
|
|
673
673
|
plano_status: usuario_auth?.plano_status
|
|
674
674
|
}).setProtectedHeader({
|
|
675
675
|
alg: "HS256"
|
|
676
|
-
}).setIssuedAt().setExpirationTime("30s").sign(new TextEncoder().encode(await helpers_secret.estract_secret(c
|
|
676
|
+
}).setIssuedAt().setExpirationTime("30s").sign(new TextEncoder().encode(await helpers_secret.estract_secret(c?.env?.JSON_WEB_TOKEN_AUTH_MICRO_SERVICO))).catch((error)=>_set_response.error.TOKEN_AUTH_USER({
|
|
677
677
|
message: "Erro ao gerar token micro serviço!",
|
|
678
678
|
results: error?.message,
|
|
679
679
|
fn: _token_fn
|
|
@@ -681,7 +681,7 @@ const _token = new class {
|
|
|
681
681
|
return token;
|
|
682
682
|
}
|
|
683
683
|
async criar_refresh_token({ env, usuario_id }) {
|
|
684
|
-
if (!await helpers_secret.estract_secret(env
|
|
684
|
+
if (!await helpers_secret.estract_secret(env?.JSON_WEB_REFRESH_TOKEN_AUTH_USER)) _set_response.error.TOKEN_AUTH_USER({
|
|
685
685
|
message: "Erro ao gerar refresh token!!",
|
|
686
686
|
results: [],
|
|
687
687
|
fn: _token_fn
|
|
@@ -690,7 +690,7 @@ const _token = new class {
|
|
|
690
690
|
usuario_id: usuario_id
|
|
691
691
|
}).setProtectedHeader({
|
|
692
692
|
alg: "HS256"
|
|
693
|
-
}).setIssuedAt().setExpirationTime("2h").sign(new TextEncoder().encode(await helpers_secret.estract_secret(env
|
|
693
|
+
}).setIssuedAt().setExpirationTime("2h").sign(new TextEncoder().encode(await helpers_secret.estract_secret(env?.JSON_WEB_REFRESH_TOKEN_AUTH_USER))).catch((error)=>_set_response.error.TOKEN_AUTH_USER({
|
|
694
694
|
message: "Erro ao gerar refresh token!",
|
|
695
695
|
fn: _token_fn
|
|
696
696
|
}));
|
|
@@ -698,7 +698,7 @@ const _token = new class {
|
|
|
698
698
|
}
|
|
699
699
|
async verificar_refresh_token({ env, refresh_token }) {
|
|
700
700
|
try {
|
|
701
|
-
const secret_verify = new TextEncoder().encode(await helpers_secret.estract_secret(env
|
|
701
|
+
const secret_verify = new TextEncoder().encode(await helpers_secret.estract_secret(env?.JSON_WEB_REFRESH_TOKEN_AUTH_USER));
|
|
702
702
|
const { payload } = await jwtVerify(refresh_token, secret_verify);
|
|
703
703
|
return payload;
|
|
704
704
|
} catch (error) {
|
package/build/lib/helpers.cjs
CHANGED
|
@@ -637,7 +637,7 @@ const _token = new class _token {
|
|
|
637
637
|
results: [],
|
|
638
638
|
fn: _token_fn
|
|
639
639
|
});
|
|
640
|
-
const secret = new TextEncoder().encode(await helpers_secret.estract_secret(c
|
|
640
|
+
const secret = new TextEncoder().encode(await helpers_secret.estract_secret(c?.env?.JSON_WEB_TOKEN_AUTH_USER));
|
|
641
641
|
const { payload } = await external_jose_namespaceObject.jwtVerify(token, secret);
|
|
642
642
|
if (!payload._id || !payload.email) {
|
|
643
643
|
return _set_response.c.INVALID_TOKEN({
|
|
@@ -671,7 +671,7 @@ const _token = new class _token {
|
|
|
671
671
|
}
|
|
672
672
|
}
|
|
673
673
|
async criar_token_login_usuario(props) {
|
|
674
|
-
if (await helpers_secret.estract_secret(props?.c
|
|
674
|
+
if (await helpers_secret.estract_secret(props?.c?.env?.JSON_WEB_TOKEN_AUTH_USER)) {
|
|
675
675
|
_set_response.error.WARNING({
|
|
676
676
|
message: "Erro ao gerar token auth!!",
|
|
677
677
|
results: [],
|
|
@@ -690,7 +690,7 @@ const _token = new class _token {
|
|
|
690
690
|
plano_status: props?.plano_status
|
|
691
691
|
}).setProtectedHeader({
|
|
692
692
|
alg: "HS256"
|
|
693
|
-
}).setIssuedAt().setExpirationTime("1h").sign(new TextEncoder().encode(await helpers_secret.estract_secret(props?.c
|
|
693
|
+
}).setIssuedAt().setExpirationTime("1h").sign(new TextEncoder().encode(await helpers_secret.estract_secret(props?.c?.env?.JSON_WEB_TOKEN_AUTH_USER))).catch((error)=>{
|
|
694
694
|
return _set_response.error.TOKEN_AUTH_USER({
|
|
695
695
|
message: "Erro ao gerar token auth user!",
|
|
696
696
|
results: error?.message,
|
|
@@ -715,7 +715,7 @@ const _token = new class _token {
|
|
|
715
715
|
results: [],
|
|
716
716
|
fn: _token_fn
|
|
717
717
|
});
|
|
718
|
-
const secret = new TextEncoder().encode(await helpers_secret.estract_secret(c
|
|
718
|
+
const secret = new TextEncoder().encode(await helpers_secret.estract_secret(c?.env?.JSON_WEB_TOKEN_AUTH_MICRO_SERVICO));
|
|
719
719
|
const { payload } = await external_jose_namespaceObject.jwtVerify(token, secret);
|
|
720
720
|
if (!payload._id || !payload.email) {
|
|
721
721
|
return _set_response.c.INVALID_TOKEN({
|
|
@@ -748,7 +748,7 @@ const _token = new class _token {
|
|
|
748
748
|
}
|
|
749
749
|
}
|
|
750
750
|
async criar_token_micro_servico({ c }) {
|
|
751
|
-
if (!await helpers_secret.estract_secret(c
|
|
751
|
+
if (!await helpers_secret.estract_secret(c?.env?.JSON_WEB_TOKEN_AUTH_MICRO_SERVICO)) {
|
|
752
752
|
_set_response.error.WARNING({
|
|
753
753
|
message: "Erro ao gerar token!!",
|
|
754
754
|
results: [],
|
|
@@ -768,7 +768,7 @@ const _token = new class _token {
|
|
|
768
768
|
plano_status: usuario_auth?.plano_status
|
|
769
769
|
}).setProtectedHeader({
|
|
770
770
|
alg: "HS256"
|
|
771
|
-
}).setIssuedAt().setExpirationTime("30s").sign(new TextEncoder().encode(await helpers_secret.estract_secret(c
|
|
771
|
+
}).setIssuedAt().setExpirationTime("30s").sign(new TextEncoder().encode(await helpers_secret.estract_secret(c?.env?.JSON_WEB_TOKEN_AUTH_MICRO_SERVICO))).catch((error)=>{
|
|
772
772
|
return _set_response.error.TOKEN_AUTH_USER({
|
|
773
773
|
message: "Erro ao gerar token micro serviço!",
|
|
774
774
|
results: error?.message,
|
|
@@ -778,7 +778,7 @@ const _token = new class _token {
|
|
|
778
778
|
return token;
|
|
779
779
|
}
|
|
780
780
|
async criar_refresh_token({ env, usuario_id }) {
|
|
781
|
-
if (!await helpers_secret.estract_secret(env
|
|
781
|
+
if (!await helpers_secret.estract_secret(env?.JSON_WEB_REFRESH_TOKEN_AUTH_USER)) {
|
|
782
782
|
_set_response.error.TOKEN_AUTH_USER({
|
|
783
783
|
message: "Erro ao gerar refresh token!!",
|
|
784
784
|
results: [],
|
|
@@ -789,7 +789,7 @@ const _token = new class _token {
|
|
|
789
789
|
usuario_id: usuario_id
|
|
790
790
|
}).setProtectedHeader({
|
|
791
791
|
alg: "HS256"
|
|
792
|
-
}).setIssuedAt().setExpirationTime("2h").sign(new TextEncoder().encode(await helpers_secret.estract_secret(env
|
|
792
|
+
}).setIssuedAt().setExpirationTime("2h").sign(new TextEncoder().encode(await helpers_secret.estract_secret(env?.JSON_WEB_REFRESH_TOKEN_AUTH_USER))).catch((error)=>{
|
|
793
793
|
return _set_response.error.TOKEN_AUTH_USER({
|
|
794
794
|
message: "Erro ao gerar refresh token!",
|
|
795
795
|
fn: _token_fn
|
|
@@ -800,7 +800,7 @@ const _token = new class _token {
|
|
|
800
800
|
async verificar_refresh_token({ env, refresh_token }) {
|
|
801
801
|
try {
|
|
802
802
|
if (!refresh_token) false;
|
|
803
|
-
const secret_verify = new TextEncoder().encode(await helpers_secret.estract_secret(env
|
|
803
|
+
const secret_verify = new TextEncoder().encode(await helpers_secret.estract_secret(env?.JSON_WEB_REFRESH_TOKEN_AUTH_USER));
|
|
804
804
|
const { payload } = await external_jose_namespaceObject.jwtVerify(refresh_token, secret_verify);
|
|
805
805
|
return payload;
|
|
806
806
|
} catch (error) {
|