@nitra/cf-security 4.0.1 → 4.0.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@nitra/cf-security",
3
- "version": "4.0.1",
3
+ "version": "4.0.3",
4
4
  "description": "check header in serverless",
5
5
  "type": "module",
6
6
  "exports": {
@@ -21,19 +21,16 @@
21
21
  "url": "https://github.com/nitra/cf-security/issues"
22
22
  },
23
23
  "homepage": "https://github.com/nitra/cf-security#readme",
24
- "devDependencies": {
25
- "test-director": "^7.0.0"
26
- },
27
24
  "dependencies": {
28
- "@nitra/bunyan": "^1.1.1",
29
- "@nitra/check-env": "^2.0.1",
25
+ "@nitra/bunyan": "^2.0.1",
26
+ "@nitra/check-env": "^3.0.0",
30
27
  "@nitra/isenv": "^2.0.1",
31
- "@nitra/jwt": "^3.3.0"
28
+ "@nitra/jwt": "^3.5.1"
32
29
  },
33
30
  "files": [
34
31
  "src"
35
32
  ],
36
33
  "engines": {
37
- "node": ">=16.0.0"
34
+ "node": ">=18.0.0"
38
35
  }
39
36
  }
package/src/index.js CHANGED
@@ -1,4 +1,4 @@
1
- import checkEnv from '@nitra/check-env'
1
+ import { checkEnv, env } from '@nitra/check-env'
2
2
  checkEnv(['X_NITRA_CF_KEY'])
3
3
 
4
4
  /**
@@ -23,7 +23,7 @@ export default function (req) {
23
23
  return false
24
24
  }
25
25
 
26
- if (req.headers['x-nitra-cf-key'] !== process.env.X_NITRA_CF_KEY) {
26
+ if (req.headers['x-nitra-cf-key'] !== env.X_NITRA_CF_KEY) {
27
27
  req.log.info('Not equal Nitra key')
28
28
  return false
29
29
  }
package/src/jwt-c.js CHANGED
@@ -5,7 +5,7 @@ import { isDev } from '@nitra/isenv'
5
5
  * Check request for Nitra security з токеном в кукі
6
6
  *
7
7
  * @param {object} req - Fastify Request for check
8
- * @return {string} token if check passed
8
+ * @return {Promise<Object>} token if check passed
9
9
  */
10
10
  export default async (req, allowedRoles) => {
11
11
  if (!req.raw.headers?.cookie) {
package/src/jwt.js CHANGED
@@ -15,9 +15,19 @@ export default async (req, allowedRoles) => {
15
15
  if (req.headers?.authorization) {
16
16
  // ігноруючи expired
17
17
  const token = await verify(req.headers.authorization.split(' ')[1], { ignoreExpiration: true })
18
+
19
+ const intersectRoles = intersection(
20
+ token.body['https://hasura.io/jwt/claims']['x-hasura-allowed-roles'],
21
+ allowedRoles
22
+ )
23
+
24
+ if (intersectRoles.length === 0) {
25
+ throw new Error(`[verification] unallowed roles ${allowedRoles}`)
26
+ }
27
+
18
28
  return token.body
19
29
  } else {
20
- return { name: 'dev', 'https://hasura.io/jwt/claims': { 'x-hasura-allowed-roles': allowedRoles } }
30
+ return JSON.stringify({ name: 'dev', 'https://hasura.io/jwt/claims': { 'x-hasura-allowed-roles': allowedRoles } })
21
31
  }
22
32
  }
23
33