@orpc/server 0.0.0-next.a2fc015 → 0.0.0-next.a320605
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +8 -8
- package/dist/adapters/aws-lambda/index.d.mts +46 -0
- package/dist/adapters/aws-lambda/index.d.ts +46 -0
- package/dist/adapters/aws-lambda/index.mjs +42 -0
- package/dist/adapters/bun-ws/index.d.mts +36 -0
- package/dist/adapters/bun-ws/index.d.ts +36 -0
- package/dist/adapters/bun-ws/index.mjs +47 -0
- package/dist/adapters/crossws/index.d.mts +33 -0
- package/dist/adapters/crossws/index.d.ts +33 -0
- package/dist/adapters/crossws/index.mjs +45 -0
- package/dist/adapters/fetch/index.d.mts +18 -9
- package/dist/adapters/fetch/index.d.ts +18 -9
- package/dist/adapters/fetch/index.mjs +9 -4
- package/dist/adapters/message-port/index.d.mts +31 -0
- package/dist/adapters/message-port/index.d.ts +31 -0
- package/dist/adapters/message-port/index.mjs +39 -0
- package/dist/adapters/node/index.d.mts +18 -9
- package/dist/adapters/node/index.d.ts +18 -9
- package/dist/adapters/node/index.mjs +10 -4
- package/dist/adapters/standard/index.d.mts +8 -13
- package/dist/adapters/standard/index.d.ts +8 -13
- package/dist/adapters/standard/index.mjs +5 -5
- package/dist/adapters/standard-peer/index.d.mts +18 -0
- package/dist/adapters/standard-peer/index.d.ts +18 -0
- package/dist/adapters/standard-peer/index.mjs +7 -0
- package/dist/adapters/websocket/index.d.mts +54 -0
- package/dist/adapters/websocket/index.d.ts +54 -0
- package/dist/adapters/websocket/index.mjs +67 -0
- package/dist/adapters/ws/index.d.mts +31 -0
- package/dist/adapters/ws/index.d.ts +31 -0
- package/dist/adapters/ws/index.mjs +37 -0
- package/dist/helpers/index.d.mts +134 -0
- package/dist/helpers/index.d.ts +134 -0
- package/dist/helpers/index.mjs +188 -0
- package/dist/hibernation/index.d.mts +44 -0
- package/dist/hibernation/index.d.ts +44 -0
- package/dist/hibernation/index.mjs +65 -0
- package/dist/index.d.mts +21 -47
- package/dist/index.d.ts +21 -47
- package/dist/index.mjs +23 -8
- package/dist/plugins/index.d.mts +28 -15
- package/dist/plugins/index.d.ts +28 -15
- package/dist/plugins/index.mjs +99 -66
- package/dist/shared/server.B7b2w3_i.d.ts +12 -0
- package/dist/shared/server.BEFBl-Cb.d.mts +12 -0
- package/dist/shared/server.BU4WI18A.d.mts +32 -0
- package/dist/shared/{server.DG7Tamti.mjs → server.B_fj3X5m.mjs} +92 -51
- package/dist/shared/{server.YZzrREz9.d.ts → server.Bmh5xd4n.d.ts} +8 -8
- package/dist/shared/{server.DPWk5pjW.d.mts → server.CYNGeoCm.d.mts} +10 -8
- package/dist/shared/{server.DPWk5pjW.d.ts → server.CYNGeoCm.d.ts} +10 -8
- package/dist/shared/{server.BM1HMJGg.mjs → server.CYRYFTxo.mjs} +77 -48
- package/dist/shared/server.D0H-iaY3.d.ts +32 -0
- package/dist/shared/{server.BVwwTHyO.mjs → server.DZ5BIITo.mjs} +1 -1
- package/dist/shared/server.DhJj-1X9.d.mts +42 -0
- package/dist/shared/server.UVMTOWrk.mjs +26 -0
- package/dist/shared/{server.eWLxY3lq.d.mts → server.gqRxT-yN.d.mts} +8 -8
- package/dist/shared/server.jMTkVNIb.d.ts +42 -0
- package/package.json +72 -9
- package/dist/shared/server.BjiJH9Vo.d.ts +0 -10
- package/dist/shared/server.CzSMXd8y.d.mts +0 -18
- package/dist/shared/server.DEgjJVit.d.ts +0 -18
- package/dist/shared/server.QUe9N8P4.d.mts +0 -10
@@ -0,0 +1,134 @@
|
|
1
|
+
import { SerializeOptions, ParseOptions } from 'cookie';
|
2
|
+
|
3
|
+
/**
|
4
|
+
* Encodes a Uint8Array to base64url format
|
5
|
+
* Base64url is URL-safe and doesn't use padding
|
6
|
+
*
|
7
|
+
* @example
|
8
|
+
* ```ts
|
9
|
+
* const text = "Hello World"
|
10
|
+
* const encoded = encodeBase64url(new TextEncoder().encode(text))
|
11
|
+
* const decoded = decodeBase64url(encoded)
|
12
|
+
* expect(new TextDecoder().decode(decoded)).toEqual(text)
|
13
|
+
* ```
|
14
|
+
*/
|
15
|
+
declare function encodeBase64url(data: Uint8Array): string;
|
16
|
+
/**
|
17
|
+
* Decodes a base64url string to Uint8Array
|
18
|
+
* Returns undefined if the input is invalid
|
19
|
+
*
|
20
|
+
* @example
|
21
|
+
* ```ts
|
22
|
+
* const text = "Hello World"
|
23
|
+
* const encoded = encodeBase64url(new TextEncoder().encode(text))
|
24
|
+
* const decoded = decodeBase64url(encoded)
|
25
|
+
* expect(new TextDecoder().decode(decoded)).toEqual(text)
|
26
|
+
* ```
|
27
|
+
*/
|
28
|
+
declare function decodeBase64url(base64url: string | undefined | null): Uint8Array | undefined;
|
29
|
+
|
30
|
+
interface SetCookieOptions extends SerializeOptions {
|
31
|
+
/**
|
32
|
+
* Specifies the value for the [`Path` `Set-Cookie` attribute](https://tools.ietf.org/html/rfc6265#section-5.2.4).
|
33
|
+
*
|
34
|
+
* @default '/'
|
35
|
+
*/
|
36
|
+
path?: string;
|
37
|
+
}
|
38
|
+
/**
|
39
|
+
* Sets a cookie in the response headers,
|
40
|
+
*
|
41
|
+
* Does nothing if `headers` is `undefined`.
|
42
|
+
*
|
43
|
+
* @example
|
44
|
+
* ```ts
|
45
|
+
* const headers = new Headers()
|
46
|
+
*
|
47
|
+
* setCookie(headers, 'sessionId', 'abc123', { httpOnly: true, maxAge: 3600 })
|
48
|
+
*
|
49
|
+
* expect(headers.get('Set-Cookie')).toBe('sessionId=abc123; HttpOnly; Max-Age=3600')
|
50
|
+
* ```
|
51
|
+
*
|
52
|
+
*/
|
53
|
+
declare function setCookie(headers: Headers | undefined, name: string, value: string, options?: SetCookieOptions): void;
|
54
|
+
interface GetCookieOptions extends ParseOptions {
|
55
|
+
}
|
56
|
+
/**
|
57
|
+
* Gets a cookie value from request headers
|
58
|
+
*
|
59
|
+
* Returns `undefined` if the cookie is not found or headers are `undefined`.
|
60
|
+
*
|
61
|
+
* @example
|
62
|
+
* ```ts
|
63
|
+
* const headers = new Headers({ 'Cookie': 'sessionId=abc123; theme=dark' })
|
64
|
+
*
|
65
|
+
* const sessionId = getCookie(headers, 'sessionId')
|
66
|
+
*
|
67
|
+
* expect(sessionId).toEqual('abc123')
|
68
|
+
* ```
|
69
|
+
*/
|
70
|
+
declare function getCookie(headers: Headers | undefined, name: string, options?: GetCookieOptions): string | undefined;
|
71
|
+
/**
|
72
|
+
* Deletes a cookie by marking it expired.
|
73
|
+
*/
|
74
|
+
declare function deleteCookie(headers: Headers | undefined, name: string, options?: Omit<SetCookieOptions, 'maxAge'>): void;
|
75
|
+
|
76
|
+
/**
|
77
|
+
* Encrypts a string using AES-GCM with a secret key.
|
78
|
+
* The output is base64url encoded to be URL-safe.
|
79
|
+
*
|
80
|
+
* @example
|
81
|
+
* ```ts
|
82
|
+
* const encrypted = await encrypt("Hello, World!", "test-secret-key")
|
83
|
+
* const decrypted = await decrypt(encrypted, "test-secret-key")
|
84
|
+
* expect(decrypted).toBe("Hello, World!")
|
85
|
+
* ```
|
86
|
+
*/
|
87
|
+
declare function encrypt(value: string, secret: string): Promise<string>;
|
88
|
+
/**
|
89
|
+
* Decrypts a base64url encoded string using AES-GCM with a secret key.
|
90
|
+
* Returns the original string if decryption is successful, or undefined if it fails.
|
91
|
+
*
|
92
|
+
* @example
|
93
|
+
* ```ts
|
94
|
+
* const encrypted = await encrypt("Hello, World!", "test-secret-key")
|
95
|
+
* const decrypted = await decrypt(encrypted, "test-secret-key")
|
96
|
+
* expect(decrypted).toBe("Hello, World!")
|
97
|
+
* ```
|
98
|
+
*/
|
99
|
+
declare function decrypt(encrypted: string | undefined | null, secret: string): Promise<string | undefined>;
|
100
|
+
|
101
|
+
/**
|
102
|
+
* Signs a string value using HMAC-SHA256 with a secret key.
|
103
|
+
*
|
104
|
+
* This function creates a cryptographic signature that can be used to verify
|
105
|
+
* the integrity and authenticity of the data. The signature is appended to
|
106
|
+
* the original value, separated by a dot, using base64url encoding (no padding).
|
107
|
+
*
|
108
|
+
*
|
109
|
+
* @example
|
110
|
+
* ```ts
|
111
|
+
* const signedValue = await sign("user123", "my-secret-key")
|
112
|
+
* expect(signedValue).toEqual("user123.oneQsU0r5dvwQFHFEjjV1uOI_IR3gZfkYHij3TRauVA")
|
113
|
+
* ```
|
114
|
+
*/
|
115
|
+
declare function sign(value: string, secret: string): Promise<string>;
|
116
|
+
/**
|
117
|
+
* Verifies and extracts the original value from a signed string.
|
118
|
+
*
|
119
|
+
* This function validates the signature of a previously signed value using the same
|
120
|
+
* secret key. If the signature is valid, it returns the original value. If the
|
121
|
+
* signature is invalid or the format is incorrect, it returns undefined.
|
122
|
+
*
|
123
|
+
*
|
124
|
+
* @example
|
125
|
+
* ```ts
|
126
|
+
* const signedValue = "user123.oneQsU0r5dvwQFHFEjjV1uOI_IR3gZfkYHij3TRauVA"
|
127
|
+
* const originalValue = await unsign(signedValue, "my-secret-key")
|
128
|
+
* expect(originalValue).toEqual("user123")
|
129
|
+
* ```
|
130
|
+
*/
|
131
|
+
declare function unsign(signedValue: string | undefined | null, secret: string): Promise<string | undefined>;
|
132
|
+
|
133
|
+
export { decodeBase64url, decrypt, deleteCookie, encodeBase64url, encrypt, getCookie, setCookie, sign, unsign };
|
134
|
+
export type { GetCookieOptions, SetCookieOptions };
|
@@ -0,0 +1,134 @@
|
|
1
|
+
import { SerializeOptions, ParseOptions } from 'cookie';
|
2
|
+
|
3
|
+
/**
|
4
|
+
* Encodes a Uint8Array to base64url format
|
5
|
+
* Base64url is URL-safe and doesn't use padding
|
6
|
+
*
|
7
|
+
* @example
|
8
|
+
* ```ts
|
9
|
+
* const text = "Hello World"
|
10
|
+
* const encoded = encodeBase64url(new TextEncoder().encode(text))
|
11
|
+
* const decoded = decodeBase64url(encoded)
|
12
|
+
* expect(new TextDecoder().decode(decoded)).toEqual(text)
|
13
|
+
* ```
|
14
|
+
*/
|
15
|
+
declare function encodeBase64url(data: Uint8Array): string;
|
16
|
+
/**
|
17
|
+
* Decodes a base64url string to Uint8Array
|
18
|
+
* Returns undefined if the input is invalid
|
19
|
+
*
|
20
|
+
* @example
|
21
|
+
* ```ts
|
22
|
+
* const text = "Hello World"
|
23
|
+
* const encoded = encodeBase64url(new TextEncoder().encode(text))
|
24
|
+
* const decoded = decodeBase64url(encoded)
|
25
|
+
* expect(new TextDecoder().decode(decoded)).toEqual(text)
|
26
|
+
* ```
|
27
|
+
*/
|
28
|
+
declare function decodeBase64url(base64url: string | undefined | null): Uint8Array | undefined;
|
29
|
+
|
30
|
+
interface SetCookieOptions extends SerializeOptions {
|
31
|
+
/**
|
32
|
+
* Specifies the value for the [`Path` `Set-Cookie` attribute](https://tools.ietf.org/html/rfc6265#section-5.2.4).
|
33
|
+
*
|
34
|
+
* @default '/'
|
35
|
+
*/
|
36
|
+
path?: string;
|
37
|
+
}
|
38
|
+
/**
|
39
|
+
* Sets a cookie in the response headers,
|
40
|
+
*
|
41
|
+
* Does nothing if `headers` is `undefined`.
|
42
|
+
*
|
43
|
+
* @example
|
44
|
+
* ```ts
|
45
|
+
* const headers = new Headers()
|
46
|
+
*
|
47
|
+
* setCookie(headers, 'sessionId', 'abc123', { httpOnly: true, maxAge: 3600 })
|
48
|
+
*
|
49
|
+
* expect(headers.get('Set-Cookie')).toBe('sessionId=abc123; HttpOnly; Max-Age=3600')
|
50
|
+
* ```
|
51
|
+
*
|
52
|
+
*/
|
53
|
+
declare function setCookie(headers: Headers | undefined, name: string, value: string, options?: SetCookieOptions): void;
|
54
|
+
interface GetCookieOptions extends ParseOptions {
|
55
|
+
}
|
56
|
+
/**
|
57
|
+
* Gets a cookie value from request headers
|
58
|
+
*
|
59
|
+
* Returns `undefined` if the cookie is not found or headers are `undefined`.
|
60
|
+
*
|
61
|
+
* @example
|
62
|
+
* ```ts
|
63
|
+
* const headers = new Headers({ 'Cookie': 'sessionId=abc123; theme=dark' })
|
64
|
+
*
|
65
|
+
* const sessionId = getCookie(headers, 'sessionId')
|
66
|
+
*
|
67
|
+
* expect(sessionId).toEqual('abc123')
|
68
|
+
* ```
|
69
|
+
*/
|
70
|
+
declare function getCookie(headers: Headers | undefined, name: string, options?: GetCookieOptions): string | undefined;
|
71
|
+
/**
|
72
|
+
* Deletes a cookie by marking it expired.
|
73
|
+
*/
|
74
|
+
declare function deleteCookie(headers: Headers | undefined, name: string, options?: Omit<SetCookieOptions, 'maxAge'>): void;
|
75
|
+
|
76
|
+
/**
|
77
|
+
* Encrypts a string using AES-GCM with a secret key.
|
78
|
+
* The output is base64url encoded to be URL-safe.
|
79
|
+
*
|
80
|
+
* @example
|
81
|
+
* ```ts
|
82
|
+
* const encrypted = await encrypt("Hello, World!", "test-secret-key")
|
83
|
+
* const decrypted = await decrypt(encrypted, "test-secret-key")
|
84
|
+
* expect(decrypted).toBe("Hello, World!")
|
85
|
+
* ```
|
86
|
+
*/
|
87
|
+
declare function encrypt(value: string, secret: string): Promise<string>;
|
88
|
+
/**
|
89
|
+
* Decrypts a base64url encoded string using AES-GCM with a secret key.
|
90
|
+
* Returns the original string if decryption is successful, or undefined if it fails.
|
91
|
+
*
|
92
|
+
* @example
|
93
|
+
* ```ts
|
94
|
+
* const encrypted = await encrypt("Hello, World!", "test-secret-key")
|
95
|
+
* const decrypted = await decrypt(encrypted, "test-secret-key")
|
96
|
+
* expect(decrypted).toBe("Hello, World!")
|
97
|
+
* ```
|
98
|
+
*/
|
99
|
+
declare function decrypt(encrypted: string | undefined | null, secret: string): Promise<string | undefined>;
|
100
|
+
|
101
|
+
/**
|
102
|
+
* Signs a string value using HMAC-SHA256 with a secret key.
|
103
|
+
*
|
104
|
+
* This function creates a cryptographic signature that can be used to verify
|
105
|
+
* the integrity and authenticity of the data. The signature is appended to
|
106
|
+
* the original value, separated by a dot, using base64url encoding (no padding).
|
107
|
+
*
|
108
|
+
*
|
109
|
+
* @example
|
110
|
+
* ```ts
|
111
|
+
* const signedValue = await sign("user123", "my-secret-key")
|
112
|
+
* expect(signedValue).toEqual("user123.oneQsU0r5dvwQFHFEjjV1uOI_IR3gZfkYHij3TRauVA")
|
113
|
+
* ```
|
114
|
+
*/
|
115
|
+
declare function sign(value: string, secret: string): Promise<string>;
|
116
|
+
/**
|
117
|
+
* Verifies and extracts the original value from a signed string.
|
118
|
+
*
|
119
|
+
* This function validates the signature of a previously signed value using the same
|
120
|
+
* secret key. If the signature is valid, it returns the original value. If the
|
121
|
+
* signature is invalid or the format is incorrect, it returns undefined.
|
122
|
+
*
|
123
|
+
*
|
124
|
+
* @example
|
125
|
+
* ```ts
|
126
|
+
* const signedValue = "user123.oneQsU0r5dvwQFHFEjjV1uOI_IR3gZfkYHij3TRauVA"
|
127
|
+
* const originalValue = await unsign(signedValue, "my-secret-key")
|
128
|
+
* expect(originalValue).toEqual("user123")
|
129
|
+
* ```
|
130
|
+
*/
|
131
|
+
declare function unsign(signedValue: string | undefined | null, secret: string): Promise<string | undefined>;
|
132
|
+
|
133
|
+
export { decodeBase64url, decrypt, deleteCookie, encodeBase64url, encrypt, getCookie, setCookie, sign, unsign };
|
134
|
+
export type { GetCookieOptions, SetCookieOptions };
|
@@ -0,0 +1,188 @@
|
|
1
|
+
import { serialize, parse } from 'cookie';
|
2
|
+
|
3
|
+
function encodeBase64url(data) {
|
4
|
+
const chunkSize = 8192;
|
5
|
+
let binaryString = "";
|
6
|
+
for (let i = 0; i < data.length; i += chunkSize) {
|
7
|
+
const chunk = data.subarray(i, i + chunkSize);
|
8
|
+
binaryString += String.fromCharCode(...chunk);
|
9
|
+
}
|
10
|
+
const base64 = btoa(binaryString);
|
11
|
+
return base64.replace(/\+/g, "-").replace(/\//g, "_").replace(/=/g, "");
|
12
|
+
}
|
13
|
+
function decodeBase64url(base64url) {
|
14
|
+
try {
|
15
|
+
if (typeof base64url !== "string") {
|
16
|
+
return void 0;
|
17
|
+
}
|
18
|
+
let base64 = base64url.replace(/-/g, "+").replace(/_/g, "/");
|
19
|
+
while (base64.length % 4) {
|
20
|
+
base64 += "=";
|
21
|
+
}
|
22
|
+
const binaryString = atob(base64);
|
23
|
+
const bytes = new Uint8Array(binaryString.length);
|
24
|
+
for (let i = 0; i < binaryString.length; i++) {
|
25
|
+
bytes[i] = binaryString.charCodeAt(i);
|
26
|
+
}
|
27
|
+
return bytes;
|
28
|
+
} catch {
|
29
|
+
return void 0;
|
30
|
+
}
|
31
|
+
}
|
32
|
+
|
33
|
+
function setCookie(headers, name, value, options = {}) {
|
34
|
+
if (headers === void 0) {
|
35
|
+
return;
|
36
|
+
}
|
37
|
+
const cookieString = serialize(name, value, {
|
38
|
+
path: "/",
|
39
|
+
...options
|
40
|
+
});
|
41
|
+
headers.append("Set-Cookie", cookieString);
|
42
|
+
}
|
43
|
+
function getCookie(headers, name, options = {}) {
|
44
|
+
if (headers === void 0) {
|
45
|
+
return void 0;
|
46
|
+
}
|
47
|
+
const cookieHeader = headers.get("cookie");
|
48
|
+
if (cookieHeader === null) {
|
49
|
+
return void 0;
|
50
|
+
}
|
51
|
+
return parse(cookieHeader, options)[name];
|
52
|
+
}
|
53
|
+
function deleteCookie(headers, name, options = {}) {
|
54
|
+
return setCookie(headers, name, "", {
|
55
|
+
...options,
|
56
|
+
maxAge: 0
|
57
|
+
});
|
58
|
+
}
|
59
|
+
|
60
|
+
const PBKDF2_CONFIG = {
|
61
|
+
name: "PBKDF2",
|
62
|
+
iterations: 6e4,
|
63
|
+
// Recommended minimum iterations per current OWASP guidelines
|
64
|
+
hash: "SHA-256"
|
65
|
+
};
|
66
|
+
const AES_GCM_CONFIG = {
|
67
|
+
name: "AES-GCM",
|
68
|
+
length: 256
|
69
|
+
};
|
70
|
+
const CRYPTO_CONSTANTS = {
|
71
|
+
SALT_LENGTH: 16,
|
72
|
+
IV_LENGTH: 12
|
73
|
+
};
|
74
|
+
async function encrypt(value, secret) {
|
75
|
+
const encoder = new TextEncoder();
|
76
|
+
const data = encoder.encode(value);
|
77
|
+
const salt = crypto.getRandomValues(new Uint8Array(CRYPTO_CONSTANTS.SALT_LENGTH));
|
78
|
+
const keyMaterial = await crypto.subtle.importKey(
|
79
|
+
"raw",
|
80
|
+
encoder.encode(secret),
|
81
|
+
PBKDF2_CONFIG.name,
|
82
|
+
false,
|
83
|
+
["deriveKey"]
|
84
|
+
);
|
85
|
+
const key = await crypto.subtle.deriveKey(
|
86
|
+
{ ...PBKDF2_CONFIG, salt },
|
87
|
+
keyMaterial,
|
88
|
+
AES_GCM_CONFIG,
|
89
|
+
false,
|
90
|
+
["encrypt"]
|
91
|
+
);
|
92
|
+
const iv = crypto.getRandomValues(new Uint8Array(CRYPTO_CONSTANTS.IV_LENGTH));
|
93
|
+
const encrypted = await crypto.subtle.encrypt(
|
94
|
+
{ name: AES_GCM_CONFIG.name, iv },
|
95
|
+
key,
|
96
|
+
data
|
97
|
+
);
|
98
|
+
const result = new Uint8Array(salt.length + iv.length + encrypted.byteLength);
|
99
|
+
result.set(salt, 0);
|
100
|
+
result.set(iv, salt.length);
|
101
|
+
result.set(new Uint8Array(encrypted), salt.length + iv.length);
|
102
|
+
return encodeBase64url(result);
|
103
|
+
}
|
104
|
+
async function decrypt(encrypted, secret) {
|
105
|
+
try {
|
106
|
+
const data = decodeBase64url(encrypted);
|
107
|
+
if (data === void 0) {
|
108
|
+
return void 0;
|
109
|
+
}
|
110
|
+
const encoder = new TextEncoder();
|
111
|
+
const decoder = new TextDecoder();
|
112
|
+
const salt = data.slice(0, CRYPTO_CONSTANTS.SALT_LENGTH);
|
113
|
+
const iv = data.slice(CRYPTO_CONSTANTS.SALT_LENGTH, CRYPTO_CONSTANTS.SALT_LENGTH + CRYPTO_CONSTANTS.IV_LENGTH);
|
114
|
+
const encryptedData = data.slice(CRYPTO_CONSTANTS.SALT_LENGTH + CRYPTO_CONSTANTS.IV_LENGTH);
|
115
|
+
const keyMaterial = await crypto.subtle.importKey(
|
116
|
+
"raw",
|
117
|
+
encoder.encode(secret),
|
118
|
+
PBKDF2_CONFIG.name,
|
119
|
+
false,
|
120
|
+
["deriveKey"]
|
121
|
+
);
|
122
|
+
const key = await crypto.subtle.deriveKey(
|
123
|
+
{ ...PBKDF2_CONFIG, salt },
|
124
|
+
keyMaterial,
|
125
|
+
AES_GCM_CONFIG,
|
126
|
+
false,
|
127
|
+
["decrypt"]
|
128
|
+
);
|
129
|
+
const decrypted = await crypto.subtle.decrypt(
|
130
|
+
{ name: AES_GCM_CONFIG.name, iv },
|
131
|
+
key,
|
132
|
+
encryptedData
|
133
|
+
);
|
134
|
+
return decoder.decode(decrypted);
|
135
|
+
} catch {
|
136
|
+
return void 0;
|
137
|
+
}
|
138
|
+
}
|
139
|
+
|
140
|
+
const ALGORITHM = { name: "HMAC", hash: "SHA-256" };
|
141
|
+
async function sign(value, secret) {
|
142
|
+
const encoder = new TextEncoder();
|
143
|
+
const key = await crypto.subtle.importKey(
|
144
|
+
"raw",
|
145
|
+
encoder.encode(secret),
|
146
|
+
ALGORITHM,
|
147
|
+
false,
|
148
|
+
["sign"]
|
149
|
+
);
|
150
|
+
const signature = await crypto.subtle.sign(
|
151
|
+
ALGORITHM,
|
152
|
+
key,
|
153
|
+
encoder.encode(value)
|
154
|
+
);
|
155
|
+
return `${value}.${encodeBase64url(new Uint8Array(signature))}`;
|
156
|
+
}
|
157
|
+
async function unsign(signedValue, secret) {
|
158
|
+
if (typeof signedValue !== "string") {
|
159
|
+
return void 0;
|
160
|
+
}
|
161
|
+
const lastDotIndex = signedValue.lastIndexOf(".");
|
162
|
+
if (lastDotIndex === -1) {
|
163
|
+
return void 0;
|
164
|
+
}
|
165
|
+
const value = signedValue.slice(0, lastDotIndex);
|
166
|
+
const signatureBase64url = signedValue.slice(lastDotIndex + 1);
|
167
|
+
const signature = decodeBase64url(signatureBase64url);
|
168
|
+
if (signature === void 0) {
|
169
|
+
return void 0;
|
170
|
+
}
|
171
|
+
const encoder = new TextEncoder();
|
172
|
+
const key = await crypto.subtle.importKey(
|
173
|
+
"raw",
|
174
|
+
encoder.encode(secret),
|
175
|
+
ALGORITHM,
|
176
|
+
false,
|
177
|
+
["verify"]
|
178
|
+
);
|
179
|
+
const isValid = await crypto.subtle.verify(
|
180
|
+
ALGORITHM,
|
181
|
+
key,
|
182
|
+
signature,
|
183
|
+
encoder.encode(value)
|
184
|
+
);
|
185
|
+
return isValid ? value : void 0;
|
186
|
+
}
|
187
|
+
|
188
|
+
export { decodeBase64url, decrypt, deleteCookie, encodeBase64url, encrypt, getCookie, setCookie, sign, unsign };
|
@@ -0,0 +1,44 @@
|
|
1
|
+
import { StandardRPCJsonSerializerOptions } from '@orpc/client/standard';
|
2
|
+
import { g as StandardHandlerPlugin, e as StandardHandlerOptions } from '../shared/server.gqRxT-yN.mjs';
|
3
|
+
import { HibernationEventIterator } from '@orpc/standard-server';
|
4
|
+
export { HibernationEventIterator, HibernationEventIteratorCallback } from '@orpc/standard-server';
|
5
|
+
import { C as Context, R as Router } from '../shared/server.CYNGeoCm.mjs';
|
6
|
+
import '@orpc/client';
|
7
|
+
import '@orpc/contract';
|
8
|
+
import '@orpc/shared';
|
9
|
+
|
10
|
+
interface EncodeHibernationRPCEventOptions extends StandardRPCJsonSerializerOptions {
|
11
|
+
/**
|
12
|
+
* The type of event, each type corresponds a different operation
|
13
|
+
*
|
14
|
+
* - 'message' = 'yield'
|
15
|
+
* - 'error' = 'throw'
|
16
|
+
* - 'done' = 'return'
|
17
|
+
*
|
18
|
+
* @default 'message'
|
19
|
+
*/
|
20
|
+
event?: 'message' | 'error' | 'done';
|
21
|
+
}
|
22
|
+
/**
|
23
|
+
* Encodes a Hibernation RPC Event
|
24
|
+
*
|
25
|
+
* @see {@link https://orpc.unnoq.com/docs/plugins/hibernation Hibernation Plugin}
|
26
|
+
*/
|
27
|
+
declare function encodeHibernationRPCEvent(id: string, payload: unknown, options?: EncodeHibernationRPCEventOptions): string;
|
28
|
+
|
29
|
+
interface HibernationPluginContext {
|
30
|
+
iterator?: HibernationEventIterator<any>;
|
31
|
+
}
|
32
|
+
/**
|
33
|
+
* Enable Hibernation APIs
|
34
|
+
*
|
35
|
+
* @see {@link https://orpc.unnoq.com/docs/plugins/hibernation Hibernation Plugin}
|
36
|
+
*/
|
37
|
+
declare class HibernationPlugin<T extends Context> implements StandardHandlerPlugin<T> {
|
38
|
+
readonly CONTEXT_SYMBOL: symbol;
|
39
|
+
order: number;
|
40
|
+
init(options: StandardHandlerOptions<T>, _router: Router<any, T>): void;
|
41
|
+
}
|
42
|
+
|
43
|
+
export { HibernationPlugin, encodeHibernationRPCEvent };
|
44
|
+
export type { EncodeHibernationRPCEventOptions, HibernationPluginContext };
|
@@ -0,0 +1,44 @@
|
|
1
|
+
import { StandardRPCJsonSerializerOptions } from '@orpc/client/standard';
|
2
|
+
import { g as StandardHandlerPlugin, e as StandardHandlerOptions } from '../shared/server.Bmh5xd4n.js';
|
3
|
+
import { HibernationEventIterator } from '@orpc/standard-server';
|
4
|
+
export { HibernationEventIterator, HibernationEventIteratorCallback } from '@orpc/standard-server';
|
5
|
+
import { C as Context, R as Router } from '../shared/server.CYNGeoCm.js';
|
6
|
+
import '@orpc/client';
|
7
|
+
import '@orpc/contract';
|
8
|
+
import '@orpc/shared';
|
9
|
+
|
10
|
+
interface EncodeHibernationRPCEventOptions extends StandardRPCJsonSerializerOptions {
|
11
|
+
/**
|
12
|
+
* The type of event, each type corresponds a different operation
|
13
|
+
*
|
14
|
+
* - 'message' = 'yield'
|
15
|
+
* - 'error' = 'throw'
|
16
|
+
* - 'done' = 'return'
|
17
|
+
*
|
18
|
+
* @default 'message'
|
19
|
+
*/
|
20
|
+
event?: 'message' | 'error' | 'done';
|
21
|
+
}
|
22
|
+
/**
|
23
|
+
* Encodes a Hibernation RPC Event
|
24
|
+
*
|
25
|
+
* @see {@link https://orpc.unnoq.com/docs/plugins/hibernation Hibernation Plugin}
|
26
|
+
*/
|
27
|
+
declare function encodeHibernationRPCEvent(id: string, payload: unknown, options?: EncodeHibernationRPCEventOptions): string;
|
28
|
+
|
29
|
+
interface HibernationPluginContext {
|
30
|
+
iterator?: HibernationEventIterator<any>;
|
31
|
+
}
|
32
|
+
/**
|
33
|
+
* Enable Hibernation APIs
|
34
|
+
*
|
35
|
+
* @see {@link https://orpc.unnoq.com/docs/plugins/hibernation Hibernation Plugin}
|
36
|
+
*/
|
37
|
+
declare class HibernationPlugin<T extends Context> implements StandardHandlerPlugin<T> {
|
38
|
+
readonly CONTEXT_SYMBOL: symbol;
|
39
|
+
order: number;
|
40
|
+
init(options: StandardHandlerOptions<T>, _router: Router<any, T>): void;
|
41
|
+
}
|
42
|
+
|
43
|
+
export { HibernationPlugin, encodeHibernationRPCEvent };
|
44
|
+
export type { EncodeHibernationRPCEventOptions, HibernationPluginContext };
|
@@ -0,0 +1,65 @@
|
|
1
|
+
import { toORPCError } from '@orpc/client';
|
2
|
+
import { StandardRPCJsonSerializer } from '@orpc/client/standard';
|
3
|
+
import { stringifyJSON } from '@orpc/shared';
|
4
|
+
import { getEventMeta, HibernationEventIterator } from '@orpc/standard-server';
|
5
|
+
export { HibernationEventIterator } from '@orpc/standard-server';
|
6
|
+
import { MessageType } from '@orpc/standard-server-peer';
|
7
|
+
|
8
|
+
function encodeHibernationRPCEvent(id, payload, options = {}) {
|
9
|
+
const { event = "message", ...rest } = options;
|
10
|
+
const serializer = new StandardRPCJsonSerializer(rest);
|
11
|
+
const data = event === "error" ? toORPCError(payload).toJSON() : payload;
|
12
|
+
const [json, meta] = serializer.serialize(data);
|
13
|
+
return stringifyJSON({
|
14
|
+
i: id,
|
15
|
+
t: MessageType.EVENT_ITERATOR,
|
16
|
+
p: {
|
17
|
+
e: event,
|
18
|
+
d: { json, meta: meta.length > 0 ? meta : void 0 },
|
19
|
+
m: getEventMeta(payload)
|
20
|
+
}
|
21
|
+
});
|
22
|
+
}
|
23
|
+
|
24
|
+
class HibernationPlugin {
|
25
|
+
CONTEXT_SYMBOL = Symbol("ORPC_HIBERNATION_CONTEXT");
|
26
|
+
order = 2e6;
|
27
|
+
// make sure execute after the batch plugin
|
28
|
+
init(options, _router) {
|
29
|
+
options.interceptors ??= [];
|
30
|
+
options.clientInterceptors ??= [];
|
31
|
+
options.interceptors.unshift(async (options2) => {
|
32
|
+
const hibernationContext = {};
|
33
|
+
const result = await options2.next({
|
34
|
+
...options2,
|
35
|
+
context: {
|
36
|
+
...options2.context,
|
37
|
+
[this.CONTEXT_SYMBOL]: hibernationContext
|
38
|
+
}
|
39
|
+
});
|
40
|
+
if (!result.matched || !hibernationContext.iterator) {
|
41
|
+
return result;
|
42
|
+
}
|
43
|
+
return {
|
44
|
+
...result,
|
45
|
+
response: {
|
46
|
+
...result.response,
|
47
|
+
body: hibernationContext.iterator
|
48
|
+
}
|
49
|
+
};
|
50
|
+
});
|
51
|
+
options.clientInterceptors.unshift(async (options2) => {
|
52
|
+
const hibernationContext = options2.context[this.CONTEXT_SYMBOL];
|
53
|
+
if (!hibernationContext) {
|
54
|
+
throw new TypeError("[HibernationPlugin] Hibernation context has been corrupted or modified by another plugin or interceptor");
|
55
|
+
}
|
56
|
+
const output = await options2.next();
|
57
|
+
if (output instanceof HibernationEventIterator) {
|
58
|
+
hibernationContext.iterator = output;
|
59
|
+
}
|
60
|
+
return output;
|
61
|
+
});
|
62
|
+
}
|
63
|
+
}
|
64
|
+
|
65
|
+
export { HibernationPlugin, encodeHibernationRPCEvent };
|