@navservice/core 1.128.0 → 1.129.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -552,7 +552,7 @@ const _token = new class {
552
552
  results: [],
553
553
  fn: _token_fn
554
554
  });
555
- const secret = new TextEncoder().encode(await helpers_secret.estract_secret(c.env.JSON_WEB_TOKEN_AUTH_USER));
555
+ const secret = new TextEncoder().encode(await helpers_secret.estract_secret(c?.env?.JSON_WEB_TOKEN_AUTH_USER));
556
556
  const { payload } = await jwtVerify(token, secret);
557
557
  if (!payload._id || !payload.email) return _set_response.c.INVALID_TOKEN({
558
558
  message: 'Token inválido!!!!',
@@ -584,7 +584,7 @@ const _token = new class {
584
584
  }
585
585
  }
586
586
  async criar_token_login_usuario(props) {
587
- if (await helpers_secret.estract_secret(props?.c.env.JSON_WEB_TOKEN_AUTH_USER)) _set_response.error.WARNING({
587
+ if (await helpers_secret.estract_secret(props?.c?.env?.JSON_WEB_TOKEN_AUTH_USER)) _set_response.error.WARNING({
588
588
  message: "Erro ao gerar token auth!!",
589
589
  results: [],
590
590
  fn: _token_fn
@@ -601,7 +601,7 @@ const _token = new class {
601
601
  plano_status: props?.plano_status
602
602
  }).setProtectedHeader({
603
603
  alg: "HS256"
604
- }).setIssuedAt().setExpirationTime("1h").sign(new TextEncoder().encode(await helpers_secret.estract_secret(props?.c.env.JSON_WEB_TOKEN_AUTH_USER))).catch((error)=>_set_response.error.TOKEN_AUTH_USER({
604
+ }).setIssuedAt().setExpirationTime("1h").sign(new TextEncoder().encode(await helpers_secret.estract_secret(props?.c?.env?.JSON_WEB_TOKEN_AUTH_USER))).catch((error)=>_set_response.error.TOKEN_AUTH_USER({
605
605
  message: "Erro ao gerar token auth user!",
606
606
  results: error?.message,
607
607
  fn: _token_fn
@@ -624,7 +624,7 @@ const _token = new class {
624
624
  results: [],
625
625
  fn: _token_fn
626
626
  });
627
- const secret = new TextEncoder().encode(await helpers_secret.estract_secret(c.env.JSON_WEB_TOKEN_AUTH_MICRO_SERVICO));
627
+ const secret = new TextEncoder().encode(await helpers_secret.estract_secret(c?.env?.JSON_WEB_TOKEN_AUTH_MICRO_SERVICO));
628
628
  const { payload } = await jwtVerify(token, secret);
629
629
  if (!payload._id || !payload.email) return _set_response.c.INVALID_TOKEN({
630
630
  message: 'Token inválido para o serviço!',
@@ -655,7 +655,7 @@ const _token = new class {
655
655
  }
656
656
  }
657
657
  async criar_token_micro_servico({ c }) {
658
- if (!await helpers_secret.estract_secret(c.env.JSON_WEB_TOKEN_AUTH_MICRO_SERVICO)) _set_response.error.WARNING({
658
+ if (!await helpers_secret.estract_secret(c?.env?.JSON_WEB_TOKEN_AUTH_MICRO_SERVICO)) _set_response.error.WARNING({
659
659
  message: "Erro ao gerar token!!",
660
660
  results: [],
661
661
  fn: _token_fn
@@ -673,7 +673,7 @@ const _token = new class {
673
673
  plano_status: usuario_auth?.plano_status
674
674
  }).setProtectedHeader({
675
675
  alg: "HS256"
676
- }).setIssuedAt().setExpirationTime("30s").sign(new TextEncoder().encode(await helpers_secret.estract_secret(c.env.JSON_WEB_TOKEN_AUTH_MICRO_SERVICO))).catch((error)=>_set_response.error.TOKEN_AUTH_USER({
676
+ }).setIssuedAt().setExpirationTime("30s").sign(new TextEncoder().encode(await helpers_secret.estract_secret(c?.env?.JSON_WEB_TOKEN_AUTH_MICRO_SERVICO))).catch((error)=>_set_response.error.TOKEN_AUTH_USER({
677
677
  message: "Erro ao gerar token micro serviço!",
678
678
  results: error?.message,
679
679
  fn: _token_fn
@@ -681,7 +681,7 @@ const _token = new class {
681
681
  return token;
682
682
  }
683
683
  async criar_refresh_token({ env, usuario_id }) {
684
- if (!await helpers_secret.estract_secret(env.JSON_WEB_REFRESH_TOKEN_AUTH_USER)) _set_response.error.TOKEN_AUTH_USER({
684
+ if (!await helpers_secret.estract_secret(env?.JSON_WEB_REFRESH_TOKEN_AUTH_USER)) _set_response.error.TOKEN_AUTH_USER({
685
685
  message: "Erro ao gerar refresh token!!",
686
686
  results: [],
687
687
  fn: _token_fn
@@ -690,7 +690,7 @@ const _token = new class {
690
690
  usuario_id: usuario_id
691
691
  }).setProtectedHeader({
692
692
  alg: "HS256"
693
- }).setIssuedAt().setExpirationTime("2h").sign(new TextEncoder().encode(await helpers_secret.estract_secret(env.JSON_WEB_REFRESH_TOKEN_AUTH_USER))).catch((error)=>_set_response.error.TOKEN_AUTH_USER({
693
+ }).setIssuedAt().setExpirationTime("2h").sign(new TextEncoder().encode(await helpers_secret.estract_secret(env?.JSON_WEB_REFRESH_TOKEN_AUTH_USER))).catch((error)=>_set_response.error.TOKEN_AUTH_USER({
694
694
  message: "Erro ao gerar refresh token!",
695
695
  fn: _token_fn
696
696
  }));
@@ -698,7 +698,7 @@ const _token = new class {
698
698
  }
699
699
  async verificar_refresh_token({ env, refresh_token }) {
700
700
  try {
701
- const secret_verify = new TextEncoder().encode(await helpers_secret.estract_secret(env.JSON_WEB_REFRESH_TOKEN_AUTH_USER));
701
+ const secret_verify = new TextEncoder().encode(await helpers_secret.estract_secret(env?.JSON_WEB_REFRESH_TOKEN_AUTH_USER));
702
702
  const { payload } = await jwtVerify(refresh_token, secret_verify);
703
703
  return payload;
704
704
  } catch (error) {
@@ -637,7 +637,7 @@ const _token = new class _token {
637
637
  results: [],
638
638
  fn: _token_fn
639
639
  });
640
- const secret = new TextEncoder().encode(await helpers_secret.estract_secret(c.env.JSON_WEB_TOKEN_AUTH_USER));
640
+ const secret = new TextEncoder().encode(await helpers_secret.estract_secret(c?.env?.JSON_WEB_TOKEN_AUTH_USER));
641
641
  const { payload } = await external_jose_namespaceObject.jwtVerify(token, secret);
642
642
  if (!payload._id || !payload.email) {
643
643
  return _set_response.c.INVALID_TOKEN({
@@ -671,7 +671,7 @@ const _token = new class _token {
671
671
  }
672
672
  }
673
673
  async criar_token_login_usuario(props) {
674
- if (await helpers_secret.estract_secret(props?.c.env.JSON_WEB_TOKEN_AUTH_USER)) {
674
+ if (await helpers_secret.estract_secret(props?.c?.env?.JSON_WEB_TOKEN_AUTH_USER)) {
675
675
  _set_response.error.WARNING({
676
676
  message: "Erro ao gerar token auth!!",
677
677
  results: [],
@@ -690,7 +690,7 @@ const _token = new class _token {
690
690
  plano_status: props?.plano_status
691
691
  }).setProtectedHeader({
692
692
  alg: "HS256"
693
- }).setIssuedAt().setExpirationTime("1h").sign(new TextEncoder().encode(await helpers_secret.estract_secret(props?.c.env.JSON_WEB_TOKEN_AUTH_USER))).catch((error)=>{
693
+ }).setIssuedAt().setExpirationTime("1h").sign(new TextEncoder().encode(await helpers_secret.estract_secret(props?.c?.env?.JSON_WEB_TOKEN_AUTH_USER))).catch((error)=>{
694
694
  return _set_response.error.TOKEN_AUTH_USER({
695
695
  message: "Erro ao gerar token auth user!",
696
696
  results: error?.message,
@@ -715,7 +715,7 @@ const _token = new class _token {
715
715
  results: [],
716
716
  fn: _token_fn
717
717
  });
718
- const secret = new TextEncoder().encode(await helpers_secret.estract_secret(c.env.JSON_WEB_TOKEN_AUTH_MICRO_SERVICO));
718
+ const secret = new TextEncoder().encode(await helpers_secret.estract_secret(c?.env?.JSON_WEB_TOKEN_AUTH_MICRO_SERVICO));
719
719
  const { payload } = await external_jose_namespaceObject.jwtVerify(token, secret);
720
720
  if (!payload._id || !payload.email) {
721
721
  return _set_response.c.INVALID_TOKEN({
@@ -748,7 +748,7 @@ const _token = new class _token {
748
748
  }
749
749
  }
750
750
  async criar_token_micro_servico({ c }) {
751
- if (!await helpers_secret.estract_secret(c.env.JSON_WEB_TOKEN_AUTH_MICRO_SERVICO)) {
751
+ if (!await helpers_secret.estract_secret(c?.env?.JSON_WEB_TOKEN_AUTH_MICRO_SERVICO)) {
752
752
  _set_response.error.WARNING({
753
753
  message: "Erro ao gerar token!!",
754
754
  results: [],
@@ -768,7 +768,7 @@ const _token = new class _token {
768
768
  plano_status: usuario_auth?.plano_status
769
769
  }).setProtectedHeader({
770
770
  alg: "HS256"
771
- }).setIssuedAt().setExpirationTime("30s").sign(new TextEncoder().encode(await helpers_secret.estract_secret(c.env.JSON_WEB_TOKEN_AUTH_MICRO_SERVICO))).catch((error)=>{
771
+ }).setIssuedAt().setExpirationTime("30s").sign(new TextEncoder().encode(await helpers_secret.estract_secret(c?.env?.JSON_WEB_TOKEN_AUTH_MICRO_SERVICO))).catch((error)=>{
772
772
  return _set_response.error.TOKEN_AUTH_USER({
773
773
  message: "Erro ao gerar token micro serviço!",
774
774
  results: error?.message,
@@ -778,7 +778,7 @@ const _token = new class _token {
778
778
  return token;
779
779
  }
780
780
  async criar_refresh_token({ env, usuario_id }) {
781
- if (!await helpers_secret.estract_secret(env.JSON_WEB_REFRESH_TOKEN_AUTH_USER)) {
781
+ if (!await helpers_secret.estract_secret(env?.JSON_WEB_REFRESH_TOKEN_AUTH_USER)) {
782
782
  _set_response.error.TOKEN_AUTH_USER({
783
783
  message: "Erro ao gerar refresh token!!",
784
784
  results: [],
@@ -789,7 +789,7 @@ const _token = new class _token {
789
789
  usuario_id: usuario_id
790
790
  }).setProtectedHeader({
791
791
  alg: "HS256"
792
- }).setIssuedAt().setExpirationTime("2h").sign(new TextEncoder().encode(await helpers_secret.estract_secret(env.JSON_WEB_REFRESH_TOKEN_AUTH_USER))).catch((error)=>{
792
+ }).setIssuedAt().setExpirationTime("2h").sign(new TextEncoder().encode(await helpers_secret.estract_secret(env?.JSON_WEB_REFRESH_TOKEN_AUTH_USER))).catch((error)=>{
793
793
  return _set_response.error.TOKEN_AUTH_USER({
794
794
  message: "Erro ao gerar refresh token!",
795
795
  fn: _token_fn
@@ -800,7 +800,7 @@ const _token = new class _token {
800
800
  async verificar_refresh_token({ env, refresh_token }) {
801
801
  try {
802
802
  if (!refresh_token) false;
803
- const secret_verify = new TextEncoder().encode(await helpers_secret.estract_secret(env.JSON_WEB_REFRESH_TOKEN_AUTH_USER));
803
+ const secret_verify = new TextEncoder().encode(await helpers_secret.estract_secret(env?.JSON_WEB_REFRESH_TOKEN_AUTH_USER));
804
804
  const { payload } = await external_jose_namespaceObject.jwtVerify(refresh_token, secret_verify);
805
805
  return payload;
806
806
  } catch (error) {
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@navservice/core",
3
- "version": "1.128.0",
3
+ "version": "1.129.0",
4
4
  "description": "Service core de todos os micro serviços",
5
5
  "type": "module",
6
6
  "exports": {