@nitra/cf-security 3.0.0 → 3.1.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/README.md CHANGED
@@ -17,3 +17,17 @@ exports.function = async (req, res) => {
17
17
  return
18
18
  }
19
19
  ```
20
+
21
+ ```HTTP
22
+ ALLOWED_ROLES: role1,role2
23
+ ```
24
+
25
+ ```JavaScript
26
+ import runSecurity from '@nitra/cf-security'
27
+
28
+ exports.function = async (req, res) => {
29
+ if (!runSecurity(req)) {
30
+ res.send(`Nitra security not passed`)
31
+ return
32
+ }
33
+ ```
package/package.json CHANGED
@@ -1,11 +1,14 @@
1
1
  {
2
2
  "name": "@nitra/cf-security",
3
- "version": "3.0.0",
3
+ "version": "3.1.2",
4
4
  "description": "check header in cloud functions",
5
- "main": "src/index.js",
6
5
  "type": "module",
6
+ "exports": {
7
+ ".": "./src/index.js",
8
+ "./jwt": "./src/jwt.js"
9
+ },
7
10
  "scripts": {
8
- "fix": "npx standard --fix && npx prettier --write .",
11
+ "fix": "npx eslint --fix . && npx prettier --write . ",
9
12
  "test": "env $(cat ./test/.env) npx coverage-node test/index.js"
10
13
  },
11
14
  "repository": {
@@ -18,13 +21,28 @@
18
21
  "url": "https://github.com/nitra/cf-security/issues"
19
22
  },
20
23
  "homepage": "https://github.com/nitra/cf-security#readme",
21
- "prettier": "prettier-config-standard",
24
+ "prettier": "@nitra/prettier-config",
25
+ "eslintConfig": {
26
+ "extends": [
27
+ "@nitra/eslint-config/node"
28
+ ],
29
+ "root": true
30
+ },
22
31
  "devDependencies": {
23
- "prettier-config-standard": "^1.0.1",
32
+ "@nitra/eslint-config": "^1.0.9",
33
+ "@nitra/prettier-config": "^1.0.1",
24
34
  "test-director": "^7.0.0"
25
35
  },
26
36
  "dependencies": {
37
+ "@nitra/bunyan": "^1.1.1",
27
38
  "@nitra/check-env": "^2.0.1",
28
- "@nitra/consola": "^1.3.1"
39
+ "@nitra/isenv": "^2.0.1",
40
+ "@nitra/jwt": "^3.1.2"
41
+ },
42
+ "files": [
43
+ "src"
44
+ ],
45
+ "engines": {
46
+ "node": ">=16.0.0"
29
47
  }
30
48
  }
package/src/index.js CHANGED
@@ -1,4 +1,4 @@
1
- import consola from '@nitra/consola'
1
+ import getLogger from '@nitra/bunyan/trace'
2
2
  import checkEnv from '@nitra/check-env'
3
3
  checkEnv(['X_NITRA_CF_KEY'])
4
4
 
@@ -9,23 +9,25 @@ checkEnv(['X_NITRA_CF_KEY'])
9
9
  * @return {boolean} if check passed
10
10
  */
11
11
  export const cfSecurity = req => {
12
+ const log = getLogger(req)
13
+
12
14
  if (typeof req.headers === 'undefined') {
13
- consola.debug('Request without headers')
15
+ log.info('Request without headers')
14
16
  return false
15
17
  }
16
18
 
17
19
  if (typeof req.headers['x-nitra-cf-key'] === 'undefined') {
18
- consola.debug('Nitra key not exist in request')
20
+ log.info('Nitra key not exist in request')
19
21
  return false
20
22
  }
21
23
 
22
24
  if (req.headers['x-nitra-cf-key'] === 0) {
23
- consola.debug('Empty Nitra key in headers request')
25
+ log.info('Empty Nitra key in headers request')
24
26
  return false
25
27
  }
26
28
 
27
29
  if (req.headers['x-nitra-cf-key'] !== process.env.X_NITRA_CF_KEY) {
28
- consola.debug('Not equal Nitra key')
30
+ log.info('Not equal Nitra key')
29
31
  return false
30
32
  }
31
33
 
package/src/jwt.js ADDED
@@ -0,0 +1,52 @@
1
+ import getLogger from '@nitra/bunyan/trace'
2
+ import checkEnv from '@nitra/check-env'
3
+ import verify from '@nitra/jwt/verify'
4
+ import { isDev } from '@nitra/isenv'
5
+
6
+ checkEnv(['ALLOWED_ROLES'])
7
+
8
+ /**
9
+ * Check request for Nitra security rules WI
10
+ *
11
+ * @param {object} req - Fastify Request for check
12
+ * @return {string} token if check passed
13
+ */
14
+ export default async req => {
15
+ if (isDev) {
16
+ return { 'https://hasura.io/jwt/claims': { 'x-hasura-allowed-roles': process.env.ALLOWED_ROLES.split(',') } }
17
+ }
18
+
19
+ const log = getLogger(req)
20
+
21
+ // Перевіряємо токен тільки
22
+ if (!req.headers?.authorization) {
23
+ log.info('[verification] no authorization data')
24
+ return false
25
+ }
26
+
27
+ const authHeaders = req.headers.authorization.split(' ')
28
+ const token = await verify(authHeaders[1])
29
+
30
+ if (!token) {
31
+ log.info('[verification] invalid token')
32
+ return false
33
+ }
34
+
35
+ const roleArray = token.body['https://hasura.io/jwt/claims']['x-hasura-allowed-roles']
36
+
37
+ const allowedRoles = process.env.ALLOWED_ROLES.split(',')
38
+
39
+ const intersectRoles = intersection(roleArray, allowedRoles)
40
+
41
+ if (intersectRoles.length === 0) {
42
+ log.info('[verification] invalid all roles')
43
+ return false
44
+ }
45
+
46
+ return token.body
47
+ }
48
+
49
+ function intersection(a, b) {
50
+ const setA = new Set(a)
51
+ return b.filter(value => setA.has(value))
52
+ }