@nitra/cf-security 4.0.1 → 4.0.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/package.json +5 -8
- package/src/index.js +2 -2
- package/src/jwt-c.js +1 -1
- package/src/jwt.js +11 -1
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@nitra/cf-security",
|
|
3
|
-
"version": "4.0.
|
|
3
|
+
"version": "4.0.3",
|
|
4
4
|
"description": "check header in serverless",
|
|
5
5
|
"type": "module",
|
|
6
6
|
"exports": {
|
|
@@ -21,19 +21,16 @@
|
|
|
21
21
|
"url": "https://github.com/nitra/cf-security/issues"
|
|
22
22
|
},
|
|
23
23
|
"homepage": "https://github.com/nitra/cf-security#readme",
|
|
24
|
-
"devDependencies": {
|
|
25
|
-
"test-director": "^7.0.0"
|
|
26
|
-
},
|
|
27
24
|
"dependencies": {
|
|
28
|
-
"@nitra/bunyan": "^
|
|
29
|
-
"@nitra/check-env": "^
|
|
25
|
+
"@nitra/bunyan": "^2.0.1",
|
|
26
|
+
"@nitra/check-env": "^3.0.0",
|
|
30
27
|
"@nitra/isenv": "^2.0.1",
|
|
31
|
-
"@nitra/jwt": "^3.
|
|
28
|
+
"@nitra/jwt": "^3.5.1"
|
|
32
29
|
},
|
|
33
30
|
"files": [
|
|
34
31
|
"src"
|
|
35
32
|
],
|
|
36
33
|
"engines": {
|
|
37
|
-
"node": ">=
|
|
34
|
+
"node": ">=18.0.0"
|
|
38
35
|
}
|
|
39
36
|
}
|
package/src/index.js
CHANGED
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
import checkEnv from '@nitra/check-env'
|
|
1
|
+
import { checkEnv, env } from '@nitra/check-env'
|
|
2
2
|
checkEnv(['X_NITRA_CF_KEY'])
|
|
3
3
|
|
|
4
4
|
/**
|
|
@@ -23,7 +23,7 @@ export default function (req) {
|
|
|
23
23
|
return false
|
|
24
24
|
}
|
|
25
25
|
|
|
26
|
-
if (req.headers['x-nitra-cf-key'] !==
|
|
26
|
+
if (req.headers['x-nitra-cf-key'] !== env.X_NITRA_CF_KEY) {
|
|
27
27
|
req.log.info('Not equal Nitra key')
|
|
28
28
|
return false
|
|
29
29
|
}
|
package/src/jwt-c.js
CHANGED
|
@@ -5,7 +5,7 @@ import { isDev } from '@nitra/isenv'
|
|
|
5
5
|
* Check request for Nitra security з токеном в кукі
|
|
6
6
|
*
|
|
7
7
|
* @param {object} req - Fastify Request for check
|
|
8
|
-
* @return {
|
|
8
|
+
* @return {Promise<Object>} token if check passed
|
|
9
9
|
*/
|
|
10
10
|
export default async (req, allowedRoles) => {
|
|
11
11
|
if (!req.raw.headers?.cookie) {
|
package/src/jwt.js
CHANGED
|
@@ -15,9 +15,19 @@ export default async (req, allowedRoles) => {
|
|
|
15
15
|
if (req.headers?.authorization) {
|
|
16
16
|
// ігноруючи expired
|
|
17
17
|
const token = await verify(req.headers.authorization.split(' ')[1], { ignoreExpiration: true })
|
|
18
|
+
|
|
19
|
+
const intersectRoles = intersection(
|
|
20
|
+
token.body['https://hasura.io/jwt/claims']['x-hasura-allowed-roles'],
|
|
21
|
+
allowedRoles
|
|
22
|
+
)
|
|
23
|
+
|
|
24
|
+
if (intersectRoles.length === 0) {
|
|
25
|
+
throw new Error(`[verification] unallowed roles ${allowedRoles}`)
|
|
26
|
+
}
|
|
27
|
+
|
|
18
28
|
return token.body
|
|
19
29
|
} else {
|
|
20
|
-
return { name: 'dev', 'https://hasura.io/jwt/claims': { 'x-hasura-allowed-roles': allowedRoles } }
|
|
30
|
+
return JSON.stringify({ name: 'dev', 'https://hasura.io/jwt/claims': { 'x-hasura-allowed-roles': allowedRoles } })
|
|
21
31
|
}
|
|
22
32
|
}
|
|
23
33
|
|