@nivinjoseph/n-sec 4.0.6 → 5.0.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.eslintignore +2 -0
- package/.eslintrc +335 -0
- package/dist/api-security/alg-type.js +2 -0
- package/dist/api-security/alg-type.js.map +1 -1
- package/dist/api-security/claim.d.ts +2 -3
- package/dist/api-security/claim.js +3 -2
- package/dist/api-security/claim.js.map +1 -1
- package/dist/api-security/claims-identity.js +2 -1
- package/dist/api-security/claims-identity.js.map +1 -1
- package/dist/api-security/expired-token-exception.d.ts +0 -1
- package/dist/api-security/expired-token-exception.js +2 -2
- package/dist/api-security/expired-token-exception.js.map +1 -1
- package/dist/api-security/invalid-token-exception.d.ts +0 -1
- package/dist/api-security/invalid-token-exception.js +3 -3
- package/dist/api-security/invalid-token-exception.js.map +1 -1
- package/dist/api-security/json-web-token.d.ts +4 -5
- package/dist/api-security/json-web-token.js +88 -81
- package/dist/api-security/json-web-token.js.map +1 -1
- package/dist/api-security/security-token.js +2 -2
- package/dist/api-security/security-token.js.map +1 -1
- package/dist/crypto/asymmetric-encryption.js +49 -0
- package/dist/crypto/asymmetric-encryption.js.map +1 -1
- package/dist/crypto/crypto-exception.js +1 -0
- package/dist/crypto/crypto-exception.js.map +1 -1
- package/dist/crypto/digital-signature.js +51 -0
- package/dist/crypto/digital-signature.js.map +1 -1
- package/dist/crypto/hash.d.ts +2 -3
- package/dist/crypto/hash.js +5 -5
- package/dist/crypto/hash.js.map +1 -1
- package/dist/crypto/hmac.d.ts +1 -2
- package/dist/crypto/hmac.js +4 -4
- package/dist/crypto/hmac.js.map +1 -1
- package/dist/crypto/symmetric-encryption.d.ts +1 -2
- package/dist/crypto/symmetric-encryption.js +15 -20
- package/dist/crypto/symmetric-encryption.js.map +1 -1
- package/dist/index.js +2 -0
- package/dist/index.js.map +1 -1
- package/package.json +12 -11
- package/src/api-security/claim.ts +5 -5
- package/src/api-security/claims-identity.ts +1 -1
- package/src/api-security/expired-token-exception.ts +1 -2
- package/src/api-security/invalid-token-exception.ts +2 -3
- package/src/api-security/json-web-token.ts +80 -79
- package/src/crypto/hash.ts +7 -9
- package/src/crypto/hmac.ts +4 -5
- package/src/crypto/symmetric-encryption.ts +17 -27
- package/test/hash.test.ts +42 -41
- package/test/hmac.test.ts +24 -23
- package/test/json-web-token.test.ts +66 -61
- package/test/other.test.ts +3 -3
- package/test/symmetric-encryption.test.ts +12 -10
- package/tsconfig.json +9 -11
- package/dist/crypto/uuid.js.map +0 -1
- package/tslint.json +0 -64
|
@@ -1,32 +1,24 @@
|
|
|
1
1
|
"use strict";
|
|
2
|
-
var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {
|
|
3
|
-
function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); }
|
|
4
|
-
return new (P || (P = Promise))(function (resolve, reject) {
|
|
5
|
-
function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }
|
|
6
|
-
function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } }
|
|
7
|
-
function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); }
|
|
8
|
-
step((generator = generator.apply(thisArg, _arguments || [])).next());
|
|
9
|
-
});
|
|
10
|
-
};
|
|
11
2
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
12
3
|
exports.JsonWebToken = void 0;
|
|
13
4
|
const claim_1 = require("./claim");
|
|
14
5
|
const n_exception_1 = require("@nivinjoseph/n-exception");
|
|
15
6
|
const n_defensive_1 = require("@nivinjoseph/n-defensive");
|
|
16
|
-
require("@nivinjoseph/n-ext");
|
|
17
7
|
const invalid_token_exception_1 = require("./invalid-token-exception");
|
|
8
|
+
const alg_type_1 = require("./alg-type");
|
|
18
9
|
const hmac_1 = require("./../crypto/hmac");
|
|
10
|
+
// import { DigitalSignature } from "./../crypto/digital-signature";
|
|
19
11
|
const expired_token_exception_1 = require("./expired-token-exception");
|
|
12
|
+
// public
|
|
20
13
|
class JsonWebToken {
|
|
21
14
|
constructor(issuer, algType, key, isFullKey, expiry, claims) {
|
|
22
|
-
n_defensive_1.given(issuer, "issuer").ensureHasValue().
|
|
23
|
-
n_defensive_1.given(algType, "algType").ensureHasValue().
|
|
24
|
-
n_defensive_1.given(key, "key").ensureHasValue().
|
|
25
|
-
n_defensive_1.given(isFullKey, "isFullKey").ensureHasValue();
|
|
26
|
-
n_defensive_1.given(expiry, "expiry").ensureHasValue();
|
|
27
|
-
n_defensive_1.given(claims, "claims")
|
|
28
|
-
.
|
|
29
|
-
.ensure(t => t.length > 0);
|
|
15
|
+
(0, n_defensive_1.given)(issuer, "issuer").ensureHasValue().ensureIsString();
|
|
16
|
+
(0, n_defensive_1.given)(algType, "algType").ensureHasValue().ensureIsEnum(alg_type_1.AlgType);
|
|
17
|
+
(0, n_defensive_1.given)(key, "key").ensureHasValue().ensureIsString();
|
|
18
|
+
(0, n_defensive_1.given)(isFullKey, "isFullKey").ensureHasValue().ensureIsBoolean();
|
|
19
|
+
(0, n_defensive_1.given)(expiry, "expiry").ensureHasValue().ensureIsNumber();
|
|
20
|
+
(0, n_defensive_1.given)(claims, "claims").ensureHasValue().ensureIsArray()
|
|
21
|
+
.ensure(t => t.isNotEmpty, "cannot be empty");
|
|
30
22
|
this._issuer = issuer.trim();
|
|
31
23
|
this._algType = algType;
|
|
32
24
|
this._key = key.trim();
|
|
@@ -41,76 +33,91 @@ class JsonWebToken {
|
|
|
41
33
|
get expiry() { return this._expiry; }
|
|
42
34
|
get isExpired() { return this._expiry <= Date.now(); }
|
|
43
35
|
get claims() { return this._claims; }
|
|
44
|
-
generateToken() {
|
|
45
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
46
|
-
if (!this._isfullKey)
|
|
47
|
-
throw new n_exception_1.InvalidOperationException("generating token using an instance created from token");
|
|
48
|
-
let header = {
|
|
49
|
-
iss: this._issuer,
|
|
50
|
-
alg: this._algType,
|
|
51
|
-
exp: this._expiry
|
|
52
|
-
};
|
|
53
|
-
let body = {};
|
|
54
|
-
this._claims.forEach(t => body[t.type] = t.value);
|
|
55
|
-
let headerAndBody = this.toHex(header) + "." + this.toHex(body);
|
|
56
|
-
let signature = yield hmac_1.Hmac.create(this._key, headerAndBody);
|
|
57
|
-
let token = headerAndBody + "." + signature;
|
|
58
|
-
return token;
|
|
59
|
-
});
|
|
60
|
-
}
|
|
61
36
|
static fromClaims(issuer, algType, key, expiry, claims) {
|
|
62
37
|
return new JsonWebToken(issuer, algType, key, true, expiry, claims);
|
|
63
38
|
}
|
|
64
39
|
static fromToken(issuer, algType, key, token) {
|
|
65
|
-
|
|
66
|
-
|
|
67
|
-
|
|
68
|
-
|
|
69
|
-
|
|
70
|
-
|
|
71
|
-
|
|
72
|
-
|
|
73
|
-
|
|
74
|
-
|
|
75
|
-
|
|
76
|
-
|
|
77
|
-
|
|
78
|
-
|
|
79
|
-
|
|
80
|
-
|
|
81
|
-
|
|
82
|
-
|
|
83
|
-
|
|
84
|
-
|
|
85
|
-
|
|
86
|
-
|
|
87
|
-
|
|
88
|
-
|
|
89
|
-
|
|
90
|
-
|
|
91
|
-
|
|
92
|
-
|
|
93
|
-
|
|
94
|
-
|
|
95
|
-
|
|
96
|
-
|
|
97
|
-
|
|
98
|
-
|
|
99
|
-
|
|
100
|
-
|
|
101
|
-
|
|
102
|
-
|
|
103
|
-
|
|
104
|
-
|
|
105
|
-
|
|
106
|
-
let
|
|
107
|
-
|
|
40
|
+
(0, n_defensive_1.given)(issuer, "issuer").ensureHasValue();
|
|
41
|
+
(0, n_defensive_1.given)(algType, "algType").ensureHasValue().ensureIsEnum(alg_type_1.AlgType);
|
|
42
|
+
(0, n_defensive_1.given)(key, "key").ensureHasValue();
|
|
43
|
+
(0, n_defensive_1.given)(token, "token").ensureHasValue();
|
|
44
|
+
issuer = issuer.trim();
|
|
45
|
+
key = key.trim();
|
|
46
|
+
token = token.trim();
|
|
47
|
+
const tokenSplitted = token.split(".");
|
|
48
|
+
if (tokenSplitted.length !== 3)
|
|
49
|
+
throw new invalid_token_exception_1.InvalidTokenException(token, "format is incorrect");
|
|
50
|
+
const headerString = tokenSplitted[0];
|
|
51
|
+
const bodyString = tokenSplitted[1];
|
|
52
|
+
const signature = tokenSplitted[2];
|
|
53
|
+
const header = JsonWebToken._toObject(headerString);
|
|
54
|
+
const body = JsonWebToken._toObject(bodyString);
|
|
55
|
+
// eslint-disable-next-line @typescript-eslint/no-unnecessary-condition
|
|
56
|
+
if (header.iss === undefined || header.iss === null)
|
|
57
|
+
throw new invalid_token_exception_1.InvalidTokenException(token, "iss was not present");
|
|
58
|
+
if (header.iss !== issuer)
|
|
59
|
+
throw new invalid_token_exception_1.InvalidTokenException(token, `iss was expected to be '${issuer}' but instead was '${header.iss}'`);
|
|
60
|
+
// eslint-disable-next-line @typescript-eslint/no-unnecessary-condition
|
|
61
|
+
if (header.alg === undefined || header.alg === null)
|
|
62
|
+
throw new invalid_token_exception_1.InvalidTokenException(token, "alg was not present");
|
|
63
|
+
// eslint-disable-next-line @typescript-eslint/no-unnecessary-condition
|
|
64
|
+
if (header.alg !== algType)
|
|
65
|
+
throw new invalid_token_exception_1.InvalidTokenException(token, `alg was expected to be '${algType}' but instead was '${header.alg}'`);
|
|
66
|
+
// eslint-disable-next-line @typescript-eslint/no-unnecessary-condition
|
|
67
|
+
if (header.exp === undefined || header.exp === null)
|
|
68
|
+
throw new invalid_token_exception_1.InvalidTokenException(token, "exp was not present");
|
|
69
|
+
if (typeof header.exp !== "number")
|
|
70
|
+
throw new invalid_token_exception_1.InvalidTokenException(token, `exp value '${header.exp}' is invalid`);
|
|
71
|
+
if (header.exp <= Date.now())
|
|
72
|
+
throw new expired_token_exception_1.ExpiredTokenException(token);
|
|
73
|
+
// if (algType === AlgType.hmac)
|
|
74
|
+
// {
|
|
75
|
+
// let computedSignature = await Hmac.create(key, headerString + "." + bodyString);
|
|
76
|
+
// if (computedSignature !== signature)
|
|
77
|
+
// throw new InvalidTokenException(token, "signature could not be verified");
|
|
78
|
+
// }
|
|
79
|
+
// else
|
|
80
|
+
// {
|
|
81
|
+
// let verification = await DigitalSignature.verify(key, headerString + "." + bodyString, signature);
|
|
82
|
+
// if (!verification)
|
|
83
|
+
// throw new InvalidTokenException(token, "signature could not be verified");
|
|
84
|
+
// }
|
|
85
|
+
const computedSignature = hmac_1.Hmac.create(key, headerString + "." + bodyString);
|
|
86
|
+
if (computedSignature !== signature)
|
|
87
|
+
throw new invalid_token_exception_1.InvalidTokenException(token, "signature could not be verified");
|
|
88
|
+
const claims = new Array();
|
|
89
|
+
for (const item in body)
|
|
90
|
+
claims.push(new claim_1.Claim(item, body[item]));
|
|
91
|
+
return new JsonWebToken(issuer, algType, key, false, header.exp, claims);
|
|
108
92
|
}
|
|
109
|
-
static
|
|
110
|
-
|
|
111
|
-
|
|
93
|
+
static _toObject(hex) {
|
|
94
|
+
const json = Buffer.from(hex.toLowerCase(), "hex").toString("utf8");
|
|
95
|
+
const obj = JSON.parse(json);
|
|
112
96
|
return obj;
|
|
113
97
|
}
|
|
98
|
+
generateToken() {
|
|
99
|
+
if (!this._isfullKey)
|
|
100
|
+
throw new n_exception_1.InvalidOperationException("generating token using an instance created from token");
|
|
101
|
+
const header = {
|
|
102
|
+
iss: this._issuer,
|
|
103
|
+
alg: this._algType,
|
|
104
|
+
exp: this._expiry
|
|
105
|
+
};
|
|
106
|
+
const body = {};
|
|
107
|
+
this._claims.forEach(t => body[t.type] = t.value);
|
|
108
|
+
const headerAndBody = this._toHex(header) + "." + this._toHex(body);
|
|
109
|
+
// let signature = this._algType === AlgType.hmac
|
|
110
|
+
// ? await Hmac.create(this._key, headerAndBody)
|
|
111
|
+
// : await DigitalSignature.sign(this._key, headerAndBody);
|
|
112
|
+
const signature = hmac_1.Hmac.create(this._key, headerAndBody);
|
|
113
|
+
const token = headerAndBody + "." + signature;
|
|
114
|
+
return token;
|
|
115
|
+
}
|
|
116
|
+
_toHex(obj) {
|
|
117
|
+
const json = JSON.stringify(obj);
|
|
118
|
+
const hex = Buffer.from(json, "utf8").toString("hex");
|
|
119
|
+
return hex.toUpperCase();
|
|
120
|
+
}
|
|
114
121
|
}
|
|
115
122
|
exports.JsonWebToken = JsonWebToken;
|
|
116
123
|
//# sourceMappingURL=json-web-token.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"json-web-token.js","sourceRoot":"","sources":["../../src/api-security/json-web-token.ts"],"names":[],"mappings":"
|
|
1
|
+
{"version":3,"file":"json-web-token.js","sourceRoot":"","sources":["../../src/api-security/json-web-token.ts"],"names":[],"mappings":";;;AAAA,mCAAgC;AAChC,0DAAqE;AACrE,0DAAiD;AACjD,uEAAkE;AAClE,yCAAqC;AACrC,2CAAwC;AACxC,oEAAoE;AACpE,uEAAkE;AAGlE,SAAS;AACT,MAAa,YAAY;IAmBrB,YAAoB,MAAc,EAAE,OAAgB,EAAE,GAAW,EAAE,SAAkB,EAAE,MAAc,EACjG,MAAoB;QAEpB,IAAA,mBAAK,EAAC,MAAM,EAAE,QAAQ,CAAC,CAAC,cAAc,EAAE,CAAC,cAAc,EAAE,CAAC;QAC1D,IAAA,mBAAK,EAAC,OAAO,EAAE,SAAS,CAAC,CAAC,cAAc,EAAE,CAAC,YAAY,CAAC,kBAAO,CAAC,CAAC;QACjE,IAAA,mBAAK,EAAC,GAAG,EAAE,KAAK,CAAC,CAAC,cAAc,EAAE,CAAC,cAAc,EAAE,CAAC;QACpD,IAAA,mBAAK,EAAC,SAAS,EAAE,WAAW,CAAC,CAAC,cAAc,EAAE,CAAC,eAAe,EAAE,CAAC;QACjE,IAAA,mBAAK,EAAC,MAAM,EAAE,QAAQ,CAAC,CAAC,cAAc,EAAE,CAAC,cAAc,EAAE,CAAC;QAC1D,IAAA,mBAAK,EAAC,MAAM,EAAE,QAAQ,CAAC,CAAC,cAAc,EAAE,CAAC,aAAa,EAAE;aACnD,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,UAAU,EAAE,iBAAiB,CAAC,CAAC;QAElD,IAAI,CAAC,OAAO,GAAG,MAAM,CAAC,IAAI,EAAE,CAAC;QAC7B,IAAI,CAAC,QAAQ,GAAG,OAAO,CAAC;QACxB,IAAI,CAAC,IAAI,GAAG,GAAG,CAAC,IAAI,EAAE,CAAC;QACvB,IAAI,CAAC,UAAU,GAAG,SAAS,CAAC;QAC5B,IAAI,CAAC,OAAO,GAAG,MAAM,CAAC;QACtB,IAAI,CAAC,OAAO,GAAG,CAAC,GAAG,MAAM,CAAC,CAAC;IAC/B,CAAC;IA1BD,IAAW,MAAM,KAAa,OAAO,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC;IACpD,IAAW,OAAO,KAAc,OAAO,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC;IACvD,IAAW,GAAG,KAAa,OAAO,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC;IAC9C,IAAW,gBAAgB,KAAc,OAAO,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC;IAClE,IAAW,MAAM,KAAa,OAAO,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC;IACpD,IAAW,SAAS,KAAc,OAAO,IAAI,CAAC,OAAO,IAAI,IAAI,CAAC,GAAG,EAAE,CAAC,CAAC,CAAC;IACtE,IAAW,MAAM,KAA2B,OAAO,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC;IAsB3D,MAAM,CAAC,UAAU,CAAC,MAAc,EAAE,OAAgB,EAAE,GAAW,EAAE,MAAc,EAClF,MAAoB;QAEpB,OAAO,IAAI,YAAY,CAAC,MAAM,EAAE,OAAO,EAAE,GAAG,EAAE,IAAI,EAAE,MAAM,EAAE,MAAM,CAAC,CAAC;IACxE,CAAC;IAEM,MAAM,CAAC,SAAS,CAAC,MAAc,EAAE,OAAgB,EAAE,GAAW,EAAE,KAAa;QAEhF,IAAA,mBAAK,EAAC,MAAM,EAAE,QAAQ,CAAC,CAAC,cAAc,EAAE,CAAC;QACzC,IAAA,mBAAK,EAAC,OAAO,EAAE,SAAS,CAAC,CAAC,cAAc,EAAE,CAAC,YAAY,CAAC,kBAAO,CAAC,CAAC;QACjE,IAAA,mBAAK,EAAC,GAAG,EAAE,KAAK,CAAC,CAAC,cAAc,EAAE,CAAC;QACnC,IAAA,mBAAK,EAAC,KAAK,EAAE,OAAO,CAAC,CAAC,cAAc,EAAE,CAAC;QAEvC,MAAM,GAAG,MAAM,CAAC,IAAI,EAAE,CAAC;QACvB,GAAG,GAAG,GAAG,CAAC,IAAI,EAAE,CAAC;QACjB,KAAK,GAAG,KAAK,CAAC,IAAI,EAAE,CAAC;QAErB,MAAM,aAAa,GAAG,KAAK,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;QACvC,IAAI,aAAa,CAAC,MAAM,KAAK,CAAC;YAC1B,MAAM,IAAI,+CAAqB,CAAC,KAAK,EAAE,qBAAqB,CAAC,CAAC;QAElE,MAAM,YAAY,GAAG,aAAa,CAAC,CAAC,CAAC,CAAC;QACtC,MAAM,UAAU,GAAG,aAAa,CAAC,CAAC,CAAC,CAAC;QACpC,MAAM,SAAS,GAAG,aAAa,CAAC,CAAC,CAAC,CAAC;QAEnC,MAAM,MAAM,GAAW,YAAY,CAAC,SAAS,CAAC,YAAY,CAAW,CAAC;QACtE,MAAM,IAAI,GAAQ,YAAY,CAAC,SAAS,CAAC,UAAU,CAAC,CAAC;QAErD,uEAAuE;QACvE,IAAI,MAAM,CAAC,GAAG,KAAK,SAAS,IAAI,MAAM,CAAC,GAAG,KAAK,IAAI;YAC/C,MAAM,IAAI,+CAAqB,CAAC,KAAK,EAAE,qBAAqB,CAAC,CAAC;QAElE,IAAI,MAAM,CAAC,GAAG,KAAK,MAAM;YACrB,MAAM,IAAI,+CAAqB,CAAC,KAAK,EACjC,2BAA2B,MAAM,sBAAsB,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC;QAE9E,uEAAuE;QACvE,IAAI,MAAM,CAAC,GAAG,KAAK,SAAS,IAAI,MAAM,CAAC,GAAG,KAAK,IAAI;YAC/C,MAAM,IAAI,+CAAqB,CAAC,KAAK,EAAE,qBAAqB,CAAC,CAAC;QAElE,uEAAuE;QACvE,IAAI,MAAM,CAAC,GAAG,KAAK,OAAO;YACtB,MAAM,IAAI,+CAAqB,CAAC,KAAK,EACjC,2BAA2B,OAAO,sBAAsB,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC;QAE/E,uEAAuE;QACvE,IAAI,MAAM,CAAC,GAAG,KAAK,SAAS,IAAI,MAAM,CAAC,GAAG,KAAK,IAAI;YAC/C,MAAM,IAAI,+CAAqB,CAAC,KAAK,EAAE,qBAAqB,CAAC,CAAC;QAElE,IAAI,OAAO,MAAM,CAAC,GAAG,KAAK,QAAQ;YAC9B,MAAM,IAAI,+CAAqB,CAAC,KAAK,EAAE,cAAc,MAAM,CAAC,GAAG,cAAc,CAAC,CAAC;QAEnF,IAAI,MAAM,CAAC,GAAG,IAAI,IAAI,CAAC,GAAG,EAAE;YACxB,MAAM,IAAI,+CAAqB,CAAC,KAAK,CAAC,CAAC;QAE3C,gCAAgC;QAChC,IAAI;QACJ,uFAAuF;QACvF,2CAA2C;QAC3C,yFAAyF;QACzF,OAAO;QACP,OAAO;QACP,IAAI;QACJ,yGAAyG;QACzG,yBAAyB;QACzB,uFAAuF;QACvF,QAAQ;QAER,MAAM,iBAAiB,GAAG,WAAI,CAAC,MAAM,CAAC,GAAG,EAAE,YAAY,GAAG,GAAG,GAAG,UAAU,CAAC,CAAC;QAC5E,IAAI,iBAAiB,KAAK,SAAS;YAC/B,MAAM,IAAI,+CAAqB,CAAC,KAAK,EAAE,iCAAiC,CAAC,CAAC;QAE9E,MAAM,MAAM,GAAG,IAAI,KAAK,EAAS,CAAC;QAClC,KAAK,MAAM,IAAI,IAAI,IAAI;YACnB,MAAM,CAAC,IAAI,CAAC,IAAI,aAAK,CAAC,IAAI,EAAE,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;QAE7C,OAAO,IAAI,YAAY,CAAC,MAAM,EAAE,OAAO,EAAE,GAAG,EAAE,KAAK,EAAE,MAAM,CAAC,GAAG,EAAE,MAAM,CAAC,CAAC;IAC7E,CAAC;IAEO,MAAM,CAAC,SAAS,CAAC,GAAW;QAEhC,MAAM,IAAI,GAAG,MAAM,CAAC,IAAI,CAAC,GAAG,CAAC,WAAW,EAAE,EAAE,KAAK,CAAC,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;QACpE,MAAM,GAAG,GAAG,IAAI,CAAC,KAAK,CAAC,IAAI,CAAW,CAAC;QACvC,OAAO,GAAG,CAAC;IACf,CAAC;IAEM,aAAa;QAEhB,IAAI,CAAC,IAAI,CAAC,UAAU;YAChB,MAAM,IAAI,uCAAyB,CAAC,uDAAuD,CAAC,CAAC;QAEjG,MAAM,MAAM,GAAW;YACnB,GAAG,EAAE,IAAI,CAAC,OAAO;YACjB,GAAG,EAAE,IAAI,CAAC,QAAQ;YAClB,GAAG,EAAE,IAAI,CAAC,OAAO;SACpB,CAAC;QAEF,MAAM,IAAI,GAAQ,EAAE,CAAC;QACrB,IAAI,CAAC,OAAO,CAAC,OAAO,CAAC,CAAC,CAAC,EAAE,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,KAAK,CAAC,CAAC;QAElD,MAAM,aAAa,GAAG,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,GAAG,GAAG,GAAG,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC;QAEpE,iDAAiD;QACjD,oDAAoD;QACpD,+DAA+D;QAE/D,MAAM,SAAS,GAAG,WAAI,CAAC,MAAM,CAAC,IAAI,CAAC,IAAI,EAAE,aAAa,CAAC,CAAC;QAExD,MAAM,KAAK,GAAG,aAAa,GAAG,GAAG,GAAG,SAAS,CAAC;QAC9C,OAAO,KAAK,CAAC;IACjB,CAAC;IAEO,MAAM,CAAC,GAAW;QAEtB,MAAM,IAAI,GAAG,IAAI,CAAC,SAAS,CAAC,GAAG,CAAC,CAAC;QACjC,MAAM,GAAG,GAAG,MAAM,CAAC,IAAI,CAAC,IAAI,EAAE,MAAM,CAAC,CAAC,QAAQ,CAAC,KAAK,CAAC,CAAC;QACtD,OAAO,GAAG,CAAC,WAAW,EAAE,CAAC;IAC7B,CAAC;CACJ;AA5JD,oCA4JC"}
|
|
@@ -4,10 +4,10 @@ exports.SecurityToken = void 0;
|
|
|
4
4
|
const n_defensive_1 = require("@nivinjoseph/n-defensive");
|
|
5
5
|
class SecurityToken {
|
|
6
6
|
constructor(scheme, token) {
|
|
7
|
-
n_defensive_1.given(scheme, "scheme").ensureHasValue().ensureIsString()
|
|
7
|
+
(0, n_defensive_1.given)(scheme, "scheme").ensureHasValue().ensureIsString()
|
|
8
8
|
.ensure(t => !t.contains(" "), "cannot contain space");
|
|
9
9
|
this._scheme = scheme;
|
|
10
|
-
n_defensive_1.given(token, "token").ensureHasValue().ensureIsString()
|
|
10
|
+
(0, n_defensive_1.given)(token, "token").ensureHasValue().ensureIsString()
|
|
11
11
|
.ensure(t => !t.contains(" "), "cannot contain space");
|
|
12
12
|
this._token = token;
|
|
13
13
|
}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"security-token.js","sourceRoot":"","sources":["../../src/api-security/security-token.ts"],"names":[],"mappings":";;;AAAA,0DAAiD;AAEjD,MAAa,aAAa;IAUtB,YAAmB,MAAc,EAAE,KAAa;QAE5C,mBAAK,
|
|
1
|
+
{"version":3,"file":"security-token.js","sourceRoot":"","sources":["../../src/api-security/security-token.ts"],"names":[],"mappings":";;;AAAA,0DAAiD;AAEjD,MAAa,aAAa;IAUtB,YAAmB,MAAc,EAAE,KAAa;QAE5C,IAAA,mBAAK,EAAC,MAAM,EAAE,QAAQ,CAAC,CAAC,cAAc,EAAE,CAAC,cAAc,EAAE;aACpD,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE,sBAAsB,CAAC,CAAC;QAC3D,IAAI,CAAC,OAAO,GAAG,MAAM,CAAC;QAEtB,IAAA,mBAAK,EAAC,KAAK,EAAE,OAAO,CAAC,CAAC,cAAc,EAAE,CAAC,cAAc,EAAE;aAClD,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE,sBAAsB,CAAC,CAAC;QAC3D,IAAI,CAAC,MAAM,GAAG,KAAK,CAAC;IACxB,CAAC;IAbD,IAAW,MAAM,KAAa,OAAO,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC;IACpD,IAAW,KAAK,KAAa,OAAO,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC;IAe3C,QAAQ;QAEX,OAAO,GAAG,IAAI,CAAC,OAAO,IAAI,IAAI,CAAC,MAAM,EAAE,CAAC;IAC5C,CAAC;CACJ;AA1BD,sCA0BC"}
|
|
@@ -1,2 +1,51 @@
|
|
|
1
1
|
"use strict";
|
|
2
|
+
// const ursa = require("ursa");
|
|
3
|
+
// import { given } from "@nivinjoseph/n-defensive";
|
|
4
|
+
// import "@nivinjoseph/n-ext";
|
|
5
|
+
// // public
|
|
6
|
+
// export class AsymmetricEncryption
|
|
7
|
+
// {
|
|
8
|
+
// private constructor() { }
|
|
9
|
+
// public static generateKeyPair(): Promise<string>
|
|
10
|
+
// {
|
|
11
|
+
// const key = ursa.generatePrivateKey();
|
|
12
|
+
// return Promise.resolve(key.toPrivatePem().toString("hex").toUpperCase());
|
|
13
|
+
// }
|
|
14
|
+
// public static getPublicKey(keyPair: string): Promise<string>
|
|
15
|
+
// {
|
|
16
|
+
// given(keyPair, "keyPair").ensureHasValue().ensureIsString().ensure(t => !t.isEmptyOrWhiteSpace());
|
|
17
|
+
// keyPair = keyPair.trim();
|
|
18
|
+
// const key = ursa.createPrivateKey(Buffer.from(keyPair, "hex"));
|
|
19
|
+
// return Promise.resolve(key.toPublicPem().toString("hex").toUpperCase());
|
|
20
|
+
// }
|
|
21
|
+
// public static encrypt(keyPairOrPublicKey: string, value: string): Promise<string>
|
|
22
|
+
// {
|
|
23
|
+
// given(keyPairOrPublicKey, "keyPairOrPublicKey").ensureHasValue().ensureIsString().ensure(t => !t.isEmptyOrWhiteSpace());
|
|
24
|
+
// given(value, "value").ensureHasValue().ensureIsString().ensure(t => !t.isEmptyOrWhiteSpace());
|
|
25
|
+
// keyPairOrPublicKey = keyPairOrPublicKey.trim();
|
|
26
|
+
// value = value.trim();
|
|
27
|
+
// const buf = Buffer.from(keyPairOrPublicKey, "hex");
|
|
28
|
+
// let key;
|
|
29
|
+
// try
|
|
30
|
+
// {
|
|
31
|
+
// key = ursa.createPublicKey(buf);
|
|
32
|
+
// }
|
|
33
|
+
// catch (error)
|
|
34
|
+
// {
|
|
35
|
+
// key = ursa.createPrivateKey(buf);
|
|
36
|
+
// }
|
|
37
|
+
// const encrypted = key.encrypt(Buffer.from(value, "utf8"), "utf8", "hex", ursa.RSA_PKCS1_PADDING);
|
|
38
|
+
// return Promise.resolve(encrypted.toUpperCase());
|
|
39
|
+
// }
|
|
40
|
+
// public static decrypt(keyPair: string, value: string): Promise<string>
|
|
41
|
+
// {
|
|
42
|
+
// given(keyPair, "keyPair").ensureHasValue().ensureIsString().ensure(t => !t.isEmptyOrWhiteSpace());
|
|
43
|
+
// given(value, "value").ensureHasValue().ensureIsString().ensure(t => !t.isEmptyOrWhiteSpace());
|
|
44
|
+
// keyPair = keyPair.trim();
|
|
45
|
+
// value = value.trim();
|
|
46
|
+
// const key = ursa.createPrivateKey(Buffer.from(keyPair, "hex"));
|
|
47
|
+
// const decrypted = key.decrypt(Buffer.from(value, "hex"), "hex", "utf8", ursa.RSA_PKCS1_PADDING);
|
|
48
|
+
// return Promise.resolve(decrypted);
|
|
49
|
+
// }
|
|
50
|
+
// }
|
|
2
51
|
//# sourceMappingURL=asymmetric-encryption.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"asymmetric-encryption.js","sourceRoot":"","sources":["../../src/crypto/asymmetric-encryption.ts"],"names":[],"mappings":""}
|
|
1
|
+
{"version":3,"file":"asymmetric-encryption.js","sourceRoot":"","sources":["../../src/crypto/asymmetric-encryption.ts"],"names":[],"mappings":";AAAA,gCAAgC;AAChC,oDAAoD;AACpD,+BAA+B;AAG/B,YAAY;AACZ,oCAAoC;AACpC,IAAI;AACJ,gCAAgC;AAGhC,uDAAuD;AACvD,QAAQ;AACR,iDAAiD;AACjD,oFAAoF;AACpF,QAAQ;AAER,mEAAmE;AACnE,QAAQ;AACR,6GAA6G;AAE7G,oCAAoC;AAEpC,0EAA0E;AAC1E,mFAAmF;AACnF,QAAQ;AAER,wFAAwF;AACxF,QAAQ;AACR,mIAAmI;AACnI,yGAAyG;AAEzG,0DAA0D;AAC1D,gCAAgC;AAEhC,kEAAkE;AAClE,mBAAmB;AACnB,eAAe;AACf,YAAY;AACZ,+CAA+C;AAC/C,YAAY;AACZ,wBAAwB;AACxB,YAAY;AACZ,gDAAgD;AAChD,YAAY;AACZ,4GAA4G;AAC5G,2DAA2D;AAC3D,QAAQ;AAER,6EAA6E;AAC7E,QAAQ;AACR,6GAA6G;AAC7G,yGAAyG;AAEzG,oCAAoC;AACpC,gCAAgC;AAEhC,0EAA0E;AAC1E,4GAA4G;AAC5G,6CAA6C;AAC7C,QAAQ;AACR,IAAI"}
|
|
@@ -2,6 +2,7 @@
|
|
|
2
2
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
3
|
exports.CryptoException = void 0;
|
|
4
4
|
const n_exception_1 = require("@nivinjoseph/n-exception");
|
|
5
|
+
// public
|
|
5
6
|
class CryptoException extends n_exception_1.Exception {
|
|
6
7
|
}
|
|
7
8
|
exports.CryptoException = CryptoException;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"crypto-exception.js","sourceRoot":"","sources":["../../src/crypto/crypto-exception.ts"],"names":[],"mappings":";;;AAAA,0DAAqD;
|
|
1
|
+
{"version":3,"file":"crypto-exception.js","sourceRoot":"","sources":["../../src/crypto/crypto-exception.ts"],"names":[],"mappings":";;;AAAA,0DAAqD;AAGrD,SAAS;AACT,MAAa,eAAgB,SAAQ,uBAAS;CAC3C;AADH,0CACG"}
|
|
@@ -1,2 +1,53 @@
|
|
|
1
1
|
"use strict";
|
|
2
|
+
// const ursa = require("ursa");
|
|
3
|
+
// import { given } from "@nivinjoseph/n-defensive";
|
|
4
|
+
// import "@nivinjoseph/n-ext";
|
|
5
|
+
// import * as Crypto from "crypto";
|
|
6
|
+
// // public
|
|
7
|
+
// export class DigitalSignature
|
|
8
|
+
// {
|
|
9
|
+
// private constructor() { }
|
|
10
|
+
// public static sign(keyPair: string, value: string): Promise<string>
|
|
11
|
+
// {
|
|
12
|
+
// given(keyPair, "keyPair").ensureHasValue().ensureIsString().ensure(t => !t.isEmptyOrWhiteSpace());
|
|
13
|
+
// given(value, "value").ensureHasValue().ensureIsString().ensure(t => !t.isEmptyOrWhiteSpace());
|
|
14
|
+
// keyPair = keyPair.trim();
|
|
15
|
+
// value = value.trim();
|
|
16
|
+
// const hash = Crypto.createHash("sha512");
|
|
17
|
+
// hash.update(value, "utf8");
|
|
18
|
+
// const key = ursa.createPrivateKey(Buffer.from(keyPair, "hex"));
|
|
19
|
+
// const signature = key.sign("sha512", hash.digest(), null, "hex");
|
|
20
|
+
// return Promise.resolve(signature.toUpperCase());
|
|
21
|
+
// }
|
|
22
|
+
// public static async verify(keyPairOrPublicKey: string, value: string, signature: string): Promise<boolean>
|
|
23
|
+
// {
|
|
24
|
+
// given(keyPairOrPublicKey, "keyPairOrPublicKey").ensureHasValue().ensureIsString().ensure(t => !t.isEmptyOrWhiteSpace());
|
|
25
|
+
// given(value, "value").ensureHasValue().ensureIsString().ensure(t => !t.isEmptyOrWhiteSpace());
|
|
26
|
+
// given(signature, "signature").ensureHasValue().ensureIsString().ensure(t => !t.isEmptyOrWhiteSpace());
|
|
27
|
+
// keyPairOrPublicKey = keyPairOrPublicKey.trim();
|
|
28
|
+
// value = value.trim();
|
|
29
|
+
// signature = signature.trim();
|
|
30
|
+
// const hash = Crypto.createHash("sha512");
|
|
31
|
+
// hash.update(value, "utf8");
|
|
32
|
+
// try
|
|
33
|
+
// {
|
|
34
|
+
// const buf = Buffer.from(keyPairOrPublicKey, "hex");
|
|
35
|
+
// let key;
|
|
36
|
+
// try
|
|
37
|
+
// {
|
|
38
|
+
// key = ursa.createPublicKey(buf);
|
|
39
|
+
// }
|
|
40
|
+
// catch (error)
|
|
41
|
+
// {
|
|
42
|
+
// key = ursa.createPrivateKey(buf);
|
|
43
|
+
// }
|
|
44
|
+
// const result = key.verify("sha512", hash.digest(), Buffer.from(signature, "hex"));
|
|
45
|
+
// return Promise.resolve(result);
|
|
46
|
+
// }
|
|
47
|
+
// catch (error)
|
|
48
|
+
// {
|
|
49
|
+
// return Promise.resolve(false);
|
|
50
|
+
// }
|
|
51
|
+
// }
|
|
52
|
+
// }
|
|
2
53
|
//# sourceMappingURL=digital-signature.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"digital-signature.js","sourceRoot":"","sources":["../../src/crypto/digital-signature.ts"],"names":[],"mappings":""}
|
|
1
|
+
{"version":3,"file":"digital-signature.js","sourceRoot":"","sources":["../../src/crypto/digital-signature.ts"],"names":[],"mappings":";AAAA,gCAAgC;AAChC,oDAAoD;AACpD,+BAA+B;AAC/B,oCAAoC;AAGpC,YAAY;AACZ,gCAAgC;AAChC,IAAI;AACJ,gCAAgC;AAGhC,0EAA0E;AAC1E,QAAQ;AACR,6GAA6G;AAC7G,yGAAyG;AAEzG,oCAAoC;AACpC,gCAAgC;AAEhC,oDAAoD;AACpD,sCAAsC;AAEtC,0EAA0E;AAC1E,4EAA4E;AAC5E,2DAA2D;AAC3D,QAAQ;AAER,iHAAiH;AACjH,QAAQ;AACR,mIAAmI;AACnI,yGAAyG;AACzG,iHAAiH;AAEjH,0DAA0D;AAC1D,gCAAgC;AAChC,wCAAwC;AAExC,oDAAoD;AACpD,sCAAsC;AAEtC,eAAe;AACf,YAAY;AACZ,kEAAkE;AAClE,uBAAuB;AACvB,mBAAmB;AACnB,gBAAgB;AAChB,mDAAmD;AACnD,gBAAgB;AAChB,4BAA4B;AAC5B,gBAAgB;AAChB,oDAAoD;AACpD,gBAAgB;AAEhB,iGAAiG;AACjG,8CAA8C;AAC9C,YAAY;AACZ,wBAAwB;AACxB,YAAY;AACZ,6CAA6C;AAC7C,YAAY;AACZ,QAAQ;AACR,IAAI"}
|
package/dist/crypto/hash.d.ts
CHANGED
|
@@ -1,6 +1,5 @@
|
|
|
1
|
-
import "@nivinjoseph/n-ext";
|
|
2
1
|
export declare class Hash {
|
|
3
2
|
private constructor();
|
|
4
|
-
static create(value: string):
|
|
5
|
-
static createUsingSalt(value: string, salt: string):
|
|
3
|
+
static create(value: string): string;
|
|
4
|
+
static createUsingSalt(value: string, salt: string): string;
|
|
6
5
|
}
|
package/dist/crypto/hash.js
CHANGED
|
@@ -2,20 +2,20 @@
|
|
|
2
2
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
3
|
exports.Hash = void 0;
|
|
4
4
|
const n_defensive_1 = require("@nivinjoseph/n-defensive");
|
|
5
|
-
require("@nivinjoseph/n-ext");
|
|
6
5
|
const Crypto = require("crypto");
|
|
6
|
+
// public
|
|
7
7
|
class Hash {
|
|
8
8
|
constructor() { }
|
|
9
9
|
static create(value) {
|
|
10
|
-
n_defensive_1.given(value, "value").ensureHasValue().ensureIsString()
|
|
10
|
+
(0, n_defensive_1.given)(value, "value").ensureHasValue().ensureIsString();
|
|
11
11
|
value = value.trim();
|
|
12
12
|
const hash = Crypto.createHash("sha512");
|
|
13
13
|
hash.update(value, "utf8");
|
|
14
|
-
return
|
|
14
|
+
return hash.digest("hex").toUpperCase();
|
|
15
15
|
}
|
|
16
16
|
static createUsingSalt(value, salt) {
|
|
17
|
-
n_defensive_1.given(value, "value").ensureHasValue().ensureIsString()
|
|
18
|
-
n_defensive_1.given(salt, "salt").ensureHasValue().ensureIsString()
|
|
17
|
+
(0, n_defensive_1.given)(value, "value").ensureHasValue().ensureIsString();
|
|
18
|
+
(0, n_defensive_1.given)(salt, "salt").ensureHasValue().ensureIsString();
|
|
19
19
|
value = value.trim();
|
|
20
20
|
salt = salt.trim();
|
|
21
21
|
const reverse = (val) => {
|
package/dist/crypto/hash.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"hash.js","sourceRoot":"","sources":["../../src/crypto/hash.ts"],"names":[],"mappings":";;;AAAA,0DAAiD;AACjD,
|
|
1
|
+
{"version":3,"file":"hash.js","sourceRoot":"","sources":["../../src/crypto/hash.ts"],"names":[],"mappings":";;;AAAA,0DAAiD;AACjD,iCAAiC;AAGjC,SAAS;AACT,MAAa,IAAI;IAEb,gBAAwB,CAAC;IAGlB,MAAM,CAAC,MAAM,CAAC,KAAa;QAE9B,IAAA,mBAAK,EAAC,KAAK,EAAE,OAAO,CAAC,CAAC,cAAc,EAAE,CAAC,cAAc,EAAE,CAAC;QACxD,KAAK,GAAG,KAAK,CAAC,IAAI,EAAE,CAAC;QAErB,MAAM,IAAI,GAAG,MAAM,CAAC,UAAU,CAAC,QAAQ,CAAC,CAAC;QACzC,IAAI,CAAC,MAAM,CAAC,KAAK,EAAE,MAAM,CAAC,CAAC;QAC3B,OAAO,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC,WAAW,EAAE,CAAC;IAC5C,CAAC;IAEM,MAAM,CAAC,eAAe,CAAC,KAAa,EAAE,IAAY;QAErD,IAAA,mBAAK,EAAC,KAAK,EAAE,OAAO,CAAC,CAAC,cAAc,EAAE,CAAC,cAAc,EAAE,CAAC;QACxD,IAAA,mBAAK,EAAC,IAAI,EAAE,MAAM,CAAC,CAAC,cAAc,EAAE,CAAC,cAAc,EAAE,CAAC;QAEtD,KAAK,GAAG,KAAK,CAAC,IAAI,EAAE,CAAC;QACrB,IAAI,GAAG,IAAI,CAAC,IAAI,EAAE,CAAC;QAEnB,MAAM,OAAO,GAAG,CAAC,GAAW,EAAU,EAAE;YAEpC,IAAI,GAAG,GAAG,EAAE,CAAC;YACb,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,GAAG,CAAC,MAAM,EAAE,CAAC,EAAE;gBAC/B,GAAG,GAAG,GAAG,CAAC,CAAC,CAAC,GAAG,GAAG,CAAC;YACvB,OAAO,GAAG,CAAC;QACf,CAAC,CAAC;QAEF,MAAM,YAAY,GAAG,OAAO,CAAC,KAAK,CAAC,CAAC;QACpC,MAAM,WAAW,GAAG,OAAO,CAAC,IAAI,CAAC,CAAC;QAElC,MAAM,WAAW,GAAG,uBAAuB,CAAC,MAAM,CAAC,KAAK,EAAE,IAAI,EAAE,YAAY,EAAE,WAAW,CAAC,CAAC;QAE3F,OAAO,IAAI,CAAC,MAAM,CAAC,WAAW,CAAC,CAAC;IACpC,CAAC;CACJ;AAtCD,oBAsCC"}
|
package/dist/crypto/hmac.d.ts
CHANGED
package/dist/crypto/hmac.js
CHANGED
|
@@ -2,18 +2,18 @@
|
|
|
2
2
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
3
|
exports.Hmac = void 0;
|
|
4
4
|
const n_defensive_1 = require("@nivinjoseph/n-defensive");
|
|
5
|
-
require("@nivinjoseph/n-ext");
|
|
6
5
|
const Crypto = require("crypto");
|
|
6
|
+
// public
|
|
7
7
|
class Hmac {
|
|
8
8
|
constructor() { }
|
|
9
9
|
static create(key, value) {
|
|
10
|
-
n_defensive_1.given(key, "key").ensureHasValue().ensureIsString()
|
|
11
|
-
n_defensive_1.given(value, "value").ensureHasValue().ensureIsString()
|
|
10
|
+
(0, n_defensive_1.given)(key, "key").ensureHasValue().ensureIsString();
|
|
11
|
+
(0, n_defensive_1.given)(value, "value").ensureHasValue().ensureIsString();
|
|
12
12
|
key = key.trim();
|
|
13
13
|
value = value.trim();
|
|
14
14
|
const hmac = Crypto.createHmac("sha256", Buffer.from(key, "hex"));
|
|
15
15
|
hmac.update(value, "utf8");
|
|
16
|
-
return
|
|
16
|
+
return hmac.digest("hex").toUpperCase();
|
|
17
17
|
}
|
|
18
18
|
}
|
|
19
19
|
exports.Hmac = Hmac;
|
package/dist/crypto/hmac.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"hmac.js","sourceRoot":"","sources":["../../src/crypto/hmac.ts"],"names":[],"mappings":";;;AAAA,0DAAiD;AACjD,
|
|
1
|
+
{"version":3,"file":"hmac.js","sourceRoot":"","sources":["../../src/crypto/hmac.ts"],"names":[],"mappings":";;;AAAA,0DAAiD;AACjD,iCAAiC;AAGjC,SAAS;AACT,MAAa,IAAI;IAEb,gBAAwB,CAAC;IAGlB,MAAM,CAAC,MAAM,CAAC,GAAW,EAAE,KAAa;QAE3C,IAAA,mBAAK,EAAC,GAAG,EAAE,KAAK,CAAC,CAAC,cAAc,EAAE,CAAC,cAAc,EAAE,CAAC;QACpD,IAAA,mBAAK,EAAC,KAAK,EAAE,OAAO,CAAC,CAAC,cAAc,EAAE,CAAC,cAAc,EAAE,CAAC;QAExD,GAAG,GAAG,GAAG,CAAC,IAAI,EAAE,CAAC;QACjB,KAAK,GAAG,KAAK,CAAC,IAAI,EAAE,CAAC;QAErB,MAAM,IAAI,GAAG,MAAM,CAAC,UAAU,CAAC,QAAQ,EAAE,MAAM,CAAC,IAAI,CAAC,GAAG,EAAE,KAAK,CAAC,CAAC,CAAC;QAElE,IAAI,CAAC,MAAM,CAAC,KAAK,EAAE,MAAM,CAAC,CAAC;QAC3B,OAAO,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC,WAAW,EAAE,CAAC;IAC5C,CAAC;CACJ;AAlBD,oBAkBC"}
|
|
@@ -1,7 +1,6 @@
|
|
|
1
|
-
import "@nivinjoseph/n-ext";
|
|
2
1
|
export declare class SymmetricEncryption {
|
|
3
2
|
private constructor();
|
|
4
3
|
static generateKey(): Promise<string>;
|
|
5
4
|
static encrypt(key: string, value: string): Promise<string>;
|
|
6
|
-
static decrypt(key: string, value: string):
|
|
5
|
+
static decrypt(key: string, value: string): string;
|
|
7
6
|
}
|
|
@@ -4,7 +4,7 @@ exports.SymmetricEncryption = void 0;
|
|
|
4
4
|
const Crypto = require("crypto");
|
|
5
5
|
const crypto_exception_1 = require("./crypto-exception");
|
|
6
6
|
const n_defensive_1 = require("@nivinjoseph/n-defensive");
|
|
7
|
-
|
|
7
|
+
// public
|
|
8
8
|
class SymmetricEncryption {
|
|
9
9
|
constructor() { }
|
|
10
10
|
static generateKey() {
|
|
@@ -19,11 +19,11 @@ class SymmetricEncryption {
|
|
|
19
19
|
});
|
|
20
20
|
}
|
|
21
21
|
static encrypt(key, value) {
|
|
22
|
-
n_defensive_1.given(key, "key").ensureHasValue().ensureIsString().ensure(t => !t.isEmptyOrWhiteSpace());
|
|
23
|
-
n_defensive_1.given(value, "value").ensureHasValue().ensureIsString().ensure(t => !t.isEmptyOrWhiteSpace());
|
|
24
|
-
key = key.trim();
|
|
25
|
-
value = value.trim();
|
|
26
22
|
return new Promise((resolve, reject) => {
|
|
23
|
+
(0, n_defensive_1.given)(key, "key").ensureHasValue().ensureIsString();
|
|
24
|
+
(0, n_defensive_1.given)(value, "value").ensureHasValue().ensureIsString();
|
|
25
|
+
key = key.trim();
|
|
26
|
+
value = value.trim();
|
|
27
27
|
Crypto.randomBytes(16, (err, buf) => {
|
|
28
28
|
if (err) {
|
|
29
29
|
reject(err);
|
|
@@ -44,23 +44,18 @@ class SymmetricEncryption {
|
|
|
44
44
|
});
|
|
45
45
|
}
|
|
46
46
|
static decrypt(key, value) {
|
|
47
|
-
n_defensive_1.given(key, "key").ensureHasValue().ensureIsString()
|
|
48
|
-
n_defensive_1.given(value, "value").ensureHasValue().ensureIsString()
|
|
47
|
+
(0, n_defensive_1.given)(key, "key").ensureHasValue().ensureIsString();
|
|
48
|
+
(0, n_defensive_1.given)(value, "value").ensureHasValue().ensureIsString();
|
|
49
49
|
key = key.trim();
|
|
50
50
|
value = value.trim();
|
|
51
|
-
|
|
52
|
-
|
|
53
|
-
|
|
54
|
-
|
|
55
|
-
|
|
56
|
-
|
|
57
|
-
|
|
58
|
-
|
|
59
|
-
return Promise.resolve(decrypted);
|
|
60
|
-
}
|
|
61
|
-
catch (error) {
|
|
62
|
-
return Promise.reject(error);
|
|
63
|
-
}
|
|
51
|
+
const splitted = value.split(".");
|
|
52
|
+
if (splitted.length !== 2)
|
|
53
|
+
throw new crypto_exception_1.CryptoException("Invalid value.");
|
|
54
|
+
const iv = Buffer.from(splitted[1], "hex");
|
|
55
|
+
const deCipher = Crypto.createDecipheriv("AES-256-CBC", Buffer.from(key, "hex"), iv);
|
|
56
|
+
let decrypted = deCipher.update(splitted[0], "hex", "utf8");
|
|
57
|
+
decrypted += deCipher.final("utf8");
|
|
58
|
+
return decrypted;
|
|
64
59
|
}
|
|
65
60
|
}
|
|
66
61
|
exports.SymmetricEncryption = SymmetricEncryption;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"symmetric-encryption.js","sourceRoot":"","sources":["../../src/crypto/symmetric-encryption.ts"],"names":[],"mappings":";;;AAAA,iCAAiC;AACjC,yDAAqD;AACrD,0DAAiD;
|
|
1
|
+
{"version":3,"file":"symmetric-encryption.js","sourceRoot":"","sources":["../../src/crypto/symmetric-encryption.ts"],"names":[],"mappings":";;;AAAA,iCAAiC;AACjC,yDAAqD;AACrD,0DAAiD;AAGjD,SAAS;AACT,MAAa,mBAAmB;IAE5B,gBAAwB,CAAC;IAGlB,MAAM,CAAC,WAAW;QAErB,OAAO,IAAI,OAAO,CAAS,CAAC,OAAO,EAAE,MAAM,EAAE,EAAE;YAE3C,MAAM,CAAC,WAAW,CAAC,EAAE,EAAE,CAAC,GAAG,EAAE,GAAG,EAAE,EAAE;gBAEhC,IAAI,GAAG,EACP;oBACI,MAAM,CAAC,GAAG,CAAC,CAAC;oBACZ,OAAO;iBACV;gBAED,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,KAAK,CAAC,CAAC,WAAW,EAAE,CAAC,CAAC;YAC/C,CAAC,CAAC,CAAC;QACP,CAAC,CAAC,CAAC;IACP,CAAC;IAEM,MAAM,CAAC,OAAO,CAAC,GAAW,EAAE,KAAa;QAE5C,OAAO,IAAI,OAAO,CAAS,CAAC,OAAO,EAAE,MAAM,EAAE,EAAE;YAE3C,IAAA,mBAAK,EAAC,GAAG,EAAE,KAAK,CAAC,CAAC,cAAc,EAAE,CAAC,cAAc,EAAE,CAAC;YACpD,IAAA,mBAAK,EAAC,KAAK,EAAE,OAAO,CAAC,CAAC,cAAc,EAAE,CAAC,cAAc,EAAE,CAAC;YAExD,GAAG,GAAG,GAAG,CAAC,IAAI,EAAE,CAAC;YACjB,KAAK,GAAG,KAAK,CAAC,IAAI,EAAE,CAAC;YAErB,MAAM,CAAC,WAAW,CAAC,EAAE,EAAE,CAAC,GAAG,EAAE,GAAG,EAAE,EAAE;gBAEhC,IAAI,GAAG,EACP;oBACI,MAAM,CAAC,GAAG,CAAC,CAAC;oBACZ,OAAO;iBACV;gBAED,IACA;oBACI,MAAM,EAAE,GAAG,GAAG,CAAC;oBACf,MAAM,MAAM,GAAG,MAAM,CAAC,cAAc,CAAC,aAAa,EAAE,MAAM,CAAC,IAAI,CAAC,GAAG,EAAE,KAAK,CAAC,EAAE,EAAE,CAAC,CAAC;oBACjF,IAAI,SAAS,GAAG,MAAM,CAAC,MAAM,CAAC,KAAK,EAAE,MAAM,EAAE,KAAK,CAAC,CAAC;oBACpD,SAAS,IAAI,MAAM,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC;oBACjC,MAAM,UAAU,GAAG,GAAG,SAAS,IAAI,EAAE,CAAC,QAAQ,CAAC,KAAK,CAAC,EAAE,CAAC;oBACxD,OAAO,CAAC,UAAU,CAAC,WAAW,EAAE,CAAC,CAAC;iBACrC;gBACD,OAAO,KAAK,EACZ;oBACI,MAAM,CAAC,KAAK,CAAC,CAAC;iBACjB;YACL,CAAC,CAAC,CAAC;QACP,CAAC,CAAC,CAAC;IACP,CAAC;IAEM,MAAM,CAAC,OAAO,CAAC,GAAW,EAAE,KAAa;QAE5C,IAAA,mBAAK,EAAC,GAAG,EAAE,KAAK,CAAC,CAAC,cAAc,EAAE,CAAC,cAAc,EAAE,CAAC;QACpD,IAAA,mBAAK,EAAC,KAAK,EAAE,OAAO,CAAC,CAAC,cAAc,EAAE,CAAC,cAAc,EAAE,CAAC;QAExD,GAAG,GAAG,GAAG,CAAC,IAAI,EAAE,CAAC;QACjB,KAAK,GAAG,KAAK,CAAC,IAAI,EAAE,CAAC;QAErB,MAAM,QAAQ,GAAG,KAAK,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;QAClC,IAAI,QAAQ,CAAC,MAAM,KAAK,CAAC;YACrB,MAAM,IAAI,kCAAe,CAAC,gBAAgB,CAAC,CAAC;QAEhD,MAAM,EAAE,GAAG,MAAM,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,EAAE,KAAK,CAAC,CAAC;QAC3C,MAAM,QAAQ,GAAG,MAAM,CAAC,gBAAgB,CAAC,aAAa,EAAE,MAAM,CAAC,IAAI,CAAC,GAAG,EAAE,KAAK,CAAC,EAAE,EAAE,CAAC,CAAC;QACrF,IAAI,SAAS,GAAG,QAAQ,CAAC,MAAM,CAAC,QAAQ,CAAC,CAAC,CAAC,EAAE,KAAK,EAAE,MAAM,CAAC,CAAC;QAC5D,SAAS,IAAI,QAAQ,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC;QACpC,OAAO,SAAS,CAAC;IACrB,CAAC;CACJ;AA3ED,kDA2EC"}
|
package/dist/index.js
CHANGED
|
@@ -7,6 +7,8 @@ const hmac_1 = require("./crypto/hmac");
|
|
|
7
7
|
Object.defineProperty(exports, "Hmac", { enumerable: true, get: function () { return hmac_1.Hmac; } });
|
|
8
8
|
const hash_1 = require("./crypto/hash");
|
|
9
9
|
Object.defineProperty(exports, "Hash", { enumerable: true, get: function () { return hash_1.Hash; } });
|
|
10
|
+
// import { DigitalSignature } from "./crypto/digital-signature";
|
|
11
|
+
// import { AsymmetricEncryption } from "./crypto/asymmetric-encryption";
|
|
10
12
|
const crypto_exception_1 = require("./crypto/crypto-exception");
|
|
11
13
|
Object.defineProperty(exports, "CryptoException", { enumerable: true, get: function () { return crypto_exception_1.CryptoException; } });
|
|
12
14
|
const alg_type_1 = require("./api-security/alg-type");
|
package/dist/index.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.js","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":";;;AAAA,wEAAoE;AAkBhE,oGAlBK,0CAAmB,OAkBL;AAjBvB,wCAAqC;AAiBZ,qFAjBhB,WAAI,OAiBgB;AAhB7B,wCAAqC;AAgBN,qFAhBtB,WAAI,OAgBsB;
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":";;;AAAA,wEAAoE;AAkBhE,oGAlBK,0CAAmB,OAkBL;AAjBvB,wCAAqC;AAiBZ,qFAjBhB,WAAI,OAiBgB;AAhB7B,wCAAqC;AAgBN,qFAhBtB,WAAI,OAgBsB;AAfnC,iEAAiE;AACjE,yEAAyE;AACzE,gEAA4D;AAexD,gGAfK,kCAAe,OAeL;AAbnB,sDAAkD;AAe9C,wFAfK,kBAAO,OAeL;AAdX,gDAA6C;AAchC,sFAdJ,aAAK,OAcI;AAblB,oEAAgE;AAa5C,+FAbX,gCAAc,OAaW;AAZlC,oFAA+E;AAY3C,sGAZ3B,+CAAqB,OAY2B;AAXzD,oFAA+E;AAWpB,sGAXlD,+CAAqB,OAWkD;AAVhF,kEAA6D;AAUqB,6FAVzE,6BAAY,OAUyE;AAT9F,kEAA8D;AASkC,8FATvF,8BAAa,OASuF"}
|