@orpc/server 0.0.0-next.e7b4f63 → 0.0.0-next.e7c0280
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +126 -0
- package/dist/adapters/aws-lambda/index.d.mts +46 -0
- package/dist/adapters/aws-lambda/index.d.ts +46 -0
- package/dist/adapters/aws-lambda/index.mjs +42 -0
- package/dist/adapters/bun-ws/index.d.mts +36 -0
- package/dist/adapters/bun-ws/index.d.ts +36 -0
- package/dist/adapters/bun-ws/index.mjs +47 -0
- package/dist/adapters/crossws/index.d.mts +33 -0
- package/dist/adapters/crossws/index.d.ts +33 -0
- package/dist/adapters/crossws/index.mjs +47 -0
- package/dist/adapters/fetch/index.d.mts +79 -0
- package/dist/adapters/fetch/index.d.ts +79 -0
- package/dist/adapters/fetch/index.mjs +110 -0
- package/dist/adapters/message-port/index.d.mts +31 -0
- package/dist/adapters/message-port/index.d.ts +31 -0
- package/dist/adapters/message-port/index.mjs +41 -0
- package/dist/adapters/node/index.d.mts +78 -0
- package/dist/adapters/node/index.d.ts +78 -0
- package/dist/adapters/node/index.mjs +96 -0
- package/dist/adapters/standard/index.d.mts +21 -0
- package/dist/adapters/standard/index.d.ts +21 -0
- package/dist/adapters/standard/index.mjs +8 -0
- package/dist/adapters/standard-peer/index.d.mts +14 -0
- package/dist/adapters/standard-peer/index.d.ts +14 -0
- package/dist/adapters/standard-peer/index.mjs +7 -0
- package/dist/adapters/websocket/index.d.mts +54 -0
- package/dist/adapters/websocket/index.d.ts +54 -0
- package/dist/adapters/websocket/index.mjs +69 -0
- package/dist/adapters/ws/index.d.mts +31 -0
- package/dist/adapters/ws/index.d.ts +31 -0
- package/dist/adapters/ws/index.mjs +39 -0
- package/dist/helpers/index.d.mts +130 -0
- package/dist/helpers/index.d.ts +130 -0
- package/dist/helpers/index.mjs +182 -0
- package/dist/hibernation/index.d.mts +44 -0
- package/dist/hibernation/index.d.ts +44 -0
- package/dist/hibernation/index.mjs +65 -0
- package/dist/index.d.mts +803 -0
- package/dist/index.d.ts +803 -0
- package/dist/index.mjs +489 -0
- package/dist/plugins/index.d.mts +169 -0
- package/dist/plugins/index.d.ts +169 -0
- package/dist/plugins/index.mjs +276 -0
- package/dist/shared/server.B7b2w3_i.d.ts +12 -0
- package/dist/shared/server.BEFBl-Cb.d.mts +12 -0
- package/dist/shared/server.BU4WI18A.d.mts +32 -0
- package/dist/shared/server.BW-nUGgA.mjs +36 -0
- package/dist/shared/server.Bmh5xd4n.d.ts +74 -0
- package/dist/shared/server.C6Q5sqYw.mjs +20 -0
- package/dist/shared/server.CIL9uKTN.mjs +194 -0
- package/dist/shared/server.CYNGeoCm.d.mts +194 -0
- package/dist/shared/server.CYNGeoCm.d.ts +194 -0
- package/dist/shared/server.D0H-iaY3.d.ts +32 -0
- package/dist/shared/server.DZ5BIITo.mjs +9 -0
- package/dist/shared/server.DhJj-1X9.d.mts +42 -0
- package/dist/shared/server.NeumLVdS.mjs +370 -0
- package/dist/shared/server.gqRxT-yN.d.mts +74 -0
- package/dist/shared/server.jMTkVNIb.d.ts +42 -0
- package/package.json +91 -19
- package/dist/chunk-6A7XHEBH.js +0 -189
- package/dist/chunk-B2EZJB7X.js +0 -303
- package/dist/fetch.js +0 -32
- package/dist/index.js +0 -518
- package/dist/node.js +0 -45
- package/dist/src/adapters/fetch/composite-handler.d.ts +0 -8
- package/dist/src/adapters/fetch/index.d.ts +0 -7
- package/dist/src/adapters/fetch/orpc-handler.d.ts +0 -20
- package/dist/src/adapters/fetch/orpc-payload-codec.d.ts +0 -16
- package/dist/src/adapters/fetch/orpc-procedure-matcher.d.ts +0 -12
- package/dist/src/adapters/fetch/super-json.d.ts +0 -12
- package/dist/src/adapters/fetch/types.d.ts +0 -16
- package/dist/src/adapters/node/composite-handler.d.ts +0 -9
- package/dist/src/adapters/node/index.d.ts +0 -5
- package/dist/src/adapters/node/orpc-handler.d.ts +0 -12
- package/dist/src/adapters/node/types.d.ts +0 -21
- package/dist/src/builder.d.ts +0 -35
- package/dist/src/hidden.d.ts +0 -6
- package/dist/src/implementer-chainable.d.ts +0 -10
- package/dist/src/index.d.ts +0 -23
- package/dist/src/lazy-decorated.d.ts +0 -10
- package/dist/src/lazy-utils.d.ts +0 -4
- package/dist/src/lazy.d.ts +0 -18
- package/dist/src/middleware-decorated.d.ts +0 -8
- package/dist/src/middleware.d.ts +0 -23
- package/dist/src/procedure-builder.d.ts +0 -22
- package/dist/src/procedure-client.d.ts +0 -34
- package/dist/src/procedure-decorated.d.ts +0 -14
- package/dist/src/procedure-implementer.d.ts +0 -18
- package/dist/src/procedure.d.ts +0 -23
- package/dist/src/router-builder.d.ts +0 -29
- package/dist/src/router-client.d.ts +0 -25
- package/dist/src/router-implementer.d.ts +0 -21
- package/dist/src/router.d.ts +0 -16
- package/dist/src/types.d.ts +0 -12
- package/dist/src/utils.d.ts +0 -3
@@ -0,0 +1,54 @@
|
|
1
|
+
import { MaybeOptionalOptions } from '@orpc/shared';
|
2
|
+
import { C as Context, R as Router } from '../../shared/server.CYNGeoCm.js';
|
3
|
+
import { f as StandardHandler } from '../../shared/server.Bmh5xd4n.js';
|
4
|
+
import { HandleStandardServerPeerMessageOptions } from '../standard-peer/index.js';
|
5
|
+
import { S as StandardRPCHandlerOptions } from '../../shared/server.D0H-iaY3.js';
|
6
|
+
import '@orpc/client';
|
7
|
+
import '@orpc/contract';
|
8
|
+
import '@orpc/standard-server';
|
9
|
+
import '@orpc/standard-server-peer';
|
10
|
+
import '../../shared/server.B7b2w3_i.js';
|
11
|
+
import '@orpc/client/standard';
|
12
|
+
import '../../shared/server.jMTkVNIb.js';
|
13
|
+
|
14
|
+
type MinimalWebsocket = Pick<WebSocket, 'addEventListener' | 'send'>;
|
15
|
+
declare class WebsocketHandler<T extends Context> {
|
16
|
+
#private;
|
17
|
+
constructor(standardHandler: StandardHandler<T>);
|
18
|
+
/**
|
19
|
+
* Upgrades a WebSocket to enable handling
|
20
|
+
*
|
21
|
+
* This attaches the necessary 'message' and 'close' listeners to the WebSocket
|
22
|
+
*
|
23
|
+
* @warning Do not use this method if you're using `.message()` or `.close()`
|
24
|
+
*/
|
25
|
+
upgrade(ws: MinimalWebsocket, ...rest: MaybeOptionalOptions<HandleStandardServerPeerMessageOptions<T>>): void;
|
26
|
+
/**
|
27
|
+
* Handles a single message received from a WebSocket.
|
28
|
+
*
|
29
|
+
* @warning Avoid calling this directly if `.upgrade()` is used.
|
30
|
+
*
|
31
|
+
* @param ws The WebSocket instance
|
32
|
+
* @param data The message payload, usually place in `event.data`
|
33
|
+
*/
|
34
|
+
message(ws: MinimalWebsocket, data: string | ArrayBuffer | Blob, ...rest: MaybeOptionalOptions<HandleStandardServerPeerMessageOptions<T>>): Promise<void>;
|
35
|
+
/**
|
36
|
+
* Closes the WebSocket peer and cleans up.
|
37
|
+
*
|
38
|
+
* @warning Avoid calling this directly if `.upgrade()` is used.
|
39
|
+
*/
|
40
|
+
close(ws: MinimalWebsocket): void;
|
41
|
+
}
|
42
|
+
|
43
|
+
/**
|
44
|
+
* RPC Handler for Websocket adapter
|
45
|
+
*
|
46
|
+
* @see {@link https://orpc.unnoq.com/docs/rpc-handler RPC Handler Docs}
|
47
|
+
* @see {@link https://orpc.unnoq.com/docs/adapters/websocket Websocket Adapter Docs}
|
48
|
+
*/
|
49
|
+
declare class RPCHandler<T extends Context> extends WebsocketHandler<T> {
|
50
|
+
constructor(router: Router<any, T>, options?: NoInfer<StandardRPCHandlerOptions<T>>);
|
51
|
+
}
|
52
|
+
|
53
|
+
export { RPCHandler, WebsocketHandler };
|
54
|
+
export type { MinimalWebsocket };
|
@@ -0,0 +1,69 @@
|
|
1
|
+
import { readAsBuffer, resolveMaybeOptionalOptions } from '@orpc/shared';
|
2
|
+
import { ServerPeer } from '@orpc/standard-server-peer';
|
3
|
+
import { h as handleStandardServerPeerMessage } from '../../shared/server.C6Q5sqYw.mjs';
|
4
|
+
import '@orpc/client';
|
5
|
+
import '@orpc/standard-server';
|
6
|
+
import '@orpc/contract';
|
7
|
+
import { b as StandardRPCHandler } from '../../shared/server.CIL9uKTN.mjs';
|
8
|
+
import '@orpc/client/standard';
|
9
|
+
import '../../shared/server.DZ5BIITo.mjs';
|
10
|
+
import '../../shared/server.NeumLVdS.mjs';
|
11
|
+
|
12
|
+
class WebsocketHandler {
|
13
|
+
#peers = /* @__PURE__ */ new WeakMap();
|
14
|
+
#handler;
|
15
|
+
constructor(standardHandler) {
|
16
|
+
this.#handler = standardHandler;
|
17
|
+
}
|
18
|
+
/**
|
19
|
+
* Upgrades a WebSocket to enable handling
|
20
|
+
*
|
21
|
+
* This attaches the necessary 'message' and 'close' listeners to the WebSocket
|
22
|
+
*
|
23
|
+
* @warning Do not use this method if you're using `.message()` or `.close()`
|
24
|
+
*/
|
25
|
+
upgrade(ws, ...rest) {
|
26
|
+
ws.addEventListener("message", (event) => this.message(ws, event.data, ...rest));
|
27
|
+
ws.addEventListener("close", () => this.close(ws));
|
28
|
+
}
|
29
|
+
/**
|
30
|
+
* Handles a single message received from a WebSocket.
|
31
|
+
*
|
32
|
+
* @warning Avoid calling this directly if `.upgrade()` is used.
|
33
|
+
*
|
34
|
+
* @param ws The WebSocket instance
|
35
|
+
* @param data The message payload, usually place in `event.data`
|
36
|
+
*/
|
37
|
+
async message(ws, data, ...rest) {
|
38
|
+
let peer = this.#peers.get(ws);
|
39
|
+
if (!peer) {
|
40
|
+
this.#peers.set(ws, peer = new ServerPeer(ws.send.bind(ws)));
|
41
|
+
}
|
42
|
+
const message = data instanceof Blob ? await readAsBuffer(data) : data;
|
43
|
+
await handleStandardServerPeerMessage(
|
44
|
+
this.#handler,
|
45
|
+
peer,
|
46
|
+
message,
|
47
|
+
resolveMaybeOptionalOptions(rest)
|
48
|
+
);
|
49
|
+
}
|
50
|
+
/**
|
51
|
+
* Closes the WebSocket peer and cleans up.
|
52
|
+
*
|
53
|
+
* @warning Avoid calling this directly if `.upgrade()` is used.
|
54
|
+
*/
|
55
|
+
close(ws) {
|
56
|
+
const peer = this.#peers.get(ws);
|
57
|
+
if (peer) {
|
58
|
+
peer.close();
|
59
|
+
}
|
60
|
+
}
|
61
|
+
}
|
62
|
+
|
63
|
+
class RPCHandler extends WebsocketHandler {
|
64
|
+
constructor(router, options = {}) {
|
65
|
+
super(new StandardRPCHandler(router, options));
|
66
|
+
}
|
67
|
+
}
|
68
|
+
|
69
|
+
export { RPCHandler, WebsocketHandler };
|
@@ -0,0 +1,31 @@
|
|
1
|
+
import { MaybeOptionalOptions } from '@orpc/shared';
|
2
|
+
import { WebSocket } from 'ws';
|
3
|
+
import { C as Context, R as Router } from '../../shared/server.CYNGeoCm.mjs';
|
4
|
+
import { f as StandardHandler } from '../../shared/server.gqRxT-yN.mjs';
|
5
|
+
import { HandleStandardServerPeerMessageOptions } from '../standard-peer/index.mjs';
|
6
|
+
import { S as StandardRPCHandlerOptions } from '../../shared/server.BU4WI18A.mjs';
|
7
|
+
import '@orpc/client';
|
8
|
+
import '@orpc/contract';
|
9
|
+
import '@orpc/standard-server';
|
10
|
+
import '@orpc/standard-server-peer';
|
11
|
+
import '../../shared/server.BEFBl-Cb.mjs';
|
12
|
+
import '@orpc/client/standard';
|
13
|
+
import '../../shared/server.DhJj-1X9.mjs';
|
14
|
+
|
15
|
+
declare class WsHandler<T extends Context> {
|
16
|
+
private readonly standardHandler;
|
17
|
+
constructor(standardHandler: StandardHandler<T>);
|
18
|
+
upgrade(ws: Pick<WebSocket, 'addEventListener' | 'send'>, ...rest: MaybeOptionalOptions<HandleStandardServerPeerMessageOptions<T>>): Promise<void>;
|
19
|
+
}
|
20
|
+
|
21
|
+
/**
|
22
|
+
* RPC Handler for ws (node ws) adapter
|
23
|
+
*
|
24
|
+
* @see {@link https://orpc.unnoq.com/docs/rpc-handler RPC Handler Docs}
|
25
|
+
* @see {@link https://orpc.unnoq.com/docs/adapters/websocket Websocket Adapter Docs}
|
26
|
+
*/
|
27
|
+
declare class RPCHandler<T extends Context> extends WsHandler<T> {
|
28
|
+
constructor(router: Router<any, T>, options?: NoInfer<StandardRPCHandlerOptions<T>>);
|
29
|
+
}
|
30
|
+
|
31
|
+
export { RPCHandler, WsHandler };
|
@@ -0,0 +1,31 @@
|
|
1
|
+
import { MaybeOptionalOptions } from '@orpc/shared';
|
2
|
+
import { WebSocket } from 'ws';
|
3
|
+
import { C as Context, R as Router } from '../../shared/server.CYNGeoCm.js';
|
4
|
+
import { f as StandardHandler } from '../../shared/server.Bmh5xd4n.js';
|
5
|
+
import { HandleStandardServerPeerMessageOptions } from '../standard-peer/index.js';
|
6
|
+
import { S as StandardRPCHandlerOptions } from '../../shared/server.D0H-iaY3.js';
|
7
|
+
import '@orpc/client';
|
8
|
+
import '@orpc/contract';
|
9
|
+
import '@orpc/standard-server';
|
10
|
+
import '@orpc/standard-server-peer';
|
11
|
+
import '../../shared/server.B7b2w3_i.js';
|
12
|
+
import '@orpc/client/standard';
|
13
|
+
import '../../shared/server.jMTkVNIb.js';
|
14
|
+
|
15
|
+
declare class WsHandler<T extends Context> {
|
16
|
+
private readonly standardHandler;
|
17
|
+
constructor(standardHandler: StandardHandler<T>);
|
18
|
+
upgrade(ws: Pick<WebSocket, 'addEventListener' | 'send'>, ...rest: MaybeOptionalOptions<HandleStandardServerPeerMessageOptions<T>>): Promise<void>;
|
19
|
+
}
|
20
|
+
|
21
|
+
/**
|
22
|
+
* RPC Handler for ws (node ws) adapter
|
23
|
+
*
|
24
|
+
* @see {@link https://orpc.unnoq.com/docs/rpc-handler RPC Handler Docs}
|
25
|
+
* @see {@link https://orpc.unnoq.com/docs/adapters/websocket Websocket Adapter Docs}
|
26
|
+
*/
|
27
|
+
declare class RPCHandler<T extends Context> extends WsHandler<T> {
|
28
|
+
constructor(router: Router<any, T>, options?: NoInfer<StandardRPCHandlerOptions<T>>);
|
29
|
+
}
|
30
|
+
|
31
|
+
export { RPCHandler, WsHandler };
|
@@ -0,0 +1,39 @@
|
|
1
|
+
import { readAsBuffer, resolveMaybeOptionalOptions } from '@orpc/shared';
|
2
|
+
import { ServerPeer } from '@orpc/standard-server-peer';
|
3
|
+
import { h as handleStandardServerPeerMessage } from '../../shared/server.C6Q5sqYw.mjs';
|
4
|
+
import '@orpc/client';
|
5
|
+
import '@orpc/standard-server';
|
6
|
+
import '@orpc/contract';
|
7
|
+
import { b as StandardRPCHandler } from '../../shared/server.CIL9uKTN.mjs';
|
8
|
+
import '@orpc/client/standard';
|
9
|
+
import '../../shared/server.DZ5BIITo.mjs';
|
10
|
+
import '../../shared/server.NeumLVdS.mjs';
|
11
|
+
|
12
|
+
class WsHandler {
|
13
|
+
constructor(standardHandler) {
|
14
|
+
this.standardHandler = standardHandler;
|
15
|
+
}
|
16
|
+
async upgrade(ws, ...rest) {
|
17
|
+
const peer = new ServerPeer(ws.send.bind(ws));
|
18
|
+
ws.addEventListener("message", async (event) => {
|
19
|
+
const message = Array.isArray(event.data) ? await readAsBuffer(new Blob(event.data)) : event.data;
|
20
|
+
await handleStandardServerPeerMessage(
|
21
|
+
this.standardHandler,
|
22
|
+
peer,
|
23
|
+
message,
|
24
|
+
resolveMaybeOptionalOptions(rest)
|
25
|
+
);
|
26
|
+
});
|
27
|
+
ws.addEventListener("close", () => {
|
28
|
+
peer.close();
|
29
|
+
});
|
30
|
+
}
|
31
|
+
}
|
32
|
+
|
33
|
+
class RPCHandler extends WsHandler {
|
34
|
+
constructor(router, options = {}) {
|
35
|
+
super(new StandardRPCHandler(router, options));
|
36
|
+
}
|
37
|
+
}
|
38
|
+
|
39
|
+
export { RPCHandler, WsHandler };
|
@@ -0,0 +1,130 @@
|
|
1
|
+
import { SerializeOptions, ParseOptions } from 'cookie';
|
2
|
+
|
3
|
+
/**
|
4
|
+
* Encodes a Uint8Array to base64url format
|
5
|
+
* Base64url is URL-safe and doesn't use padding
|
6
|
+
*
|
7
|
+
* @example
|
8
|
+
* ```ts
|
9
|
+
* const text = "Hello World"
|
10
|
+
* const encoded = encodeBase64url(new TextEncoder().encode(text))
|
11
|
+
* const decoded = decodeBase64url(encoded)
|
12
|
+
* expect(new TextDecoder().decode(decoded)).toEqual(text)
|
13
|
+
* ```
|
14
|
+
*/
|
15
|
+
declare function encodeBase64url(data: Uint8Array): string;
|
16
|
+
/**
|
17
|
+
* Decodes a base64url string to Uint8Array
|
18
|
+
* Returns undefined if the input is invalid
|
19
|
+
*
|
20
|
+
* @example
|
21
|
+
* ```ts
|
22
|
+
* const text = "Hello World"
|
23
|
+
* const encoded = encodeBase64url(new TextEncoder().encode(text))
|
24
|
+
* const decoded = decodeBase64url(encoded)
|
25
|
+
* expect(new TextDecoder().decode(decoded)).toEqual(text)
|
26
|
+
* ```
|
27
|
+
*/
|
28
|
+
declare function decodeBase64url(base64url: string | undefined | null): Uint8Array | undefined;
|
29
|
+
|
30
|
+
interface SetCookieOptions extends SerializeOptions {
|
31
|
+
/**
|
32
|
+
* Specifies the value for the [`Path` `Set-Cookie` attribute](https://tools.ietf.org/html/rfc6265#section-5.2.4).
|
33
|
+
*
|
34
|
+
* @default '/'
|
35
|
+
*/
|
36
|
+
path?: string;
|
37
|
+
}
|
38
|
+
/**
|
39
|
+
* Sets a cookie in the response headers,
|
40
|
+
*
|
41
|
+
* Does nothing if `headers` is `undefined`.
|
42
|
+
*
|
43
|
+
* @example
|
44
|
+
* ```ts
|
45
|
+
* const headers = new Headers()
|
46
|
+
*
|
47
|
+
* setCookie(headers, 'sessionId', 'abc123', { httpOnly: true, maxAge: 3600 })
|
48
|
+
*
|
49
|
+
* expect(headers.get('Set-Cookie')).toBe('sessionId=abc123; HttpOnly; Max-Age=3600')
|
50
|
+
* ```
|
51
|
+
*
|
52
|
+
*/
|
53
|
+
declare function setCookie(headers: Headers | undefined, name: string, value: string, options?: SetCookieOptions): void;
|
54
|
+
interface GetCookieOptions extends ParseOptions {
|
55
|
+
}
|
56
|
+
/**
|
57
|
+
* Gets a cookie value from request headers
|
58
|
+
*
|
59
|
+
* Returns `undefined` if the cookie is not found or headers are `undefined`.
|
60
|
+
*
|
61
|
+
* @example
|
62
|
+
* ```ts
|
63
|
+
* const headers = new Headers({ 'Cookie': 'sessionId=abc123; theme=dark' })
|
64
|
+
*
|
65
|
+
* const sessionId = getCookie(headers, 'sessionId')
|
66
|
+
*
|
67
|
+
* expect(sessionId).toEqual('abc123')
|
68
|
+
* ```
|
69
|
+
*/
|
70
|
+
declare function getCookie(headers: Headers | undefined, name: string, options?: GetCookieOptions): string | undefined;
|
71
|
+
|
72
|
+
/**
|
73
|
+
* Encrypts a string using AES-GCM with a secret key.
|
74
|
+
* The output is base64url encoded to be URL-safe.
|
75
|
+
*
|
76
|
+
* @example
|
77
|
+
* ```ts
|
78
|
+
* const encrypted = await encrypt("Hello, World!", "test-secret-key")
|
79
|
+
* const decrypted = await decrypt(encrypted, "test-secret-key")
|
80
|
+
* expect(decrypted).toBe("Hello, World!")
|
81
|
+
* ```
|
82
|
+
*/
|
83
|
+
declare function encrypt(value: string, secret: string): Promise<string>;
|
84
|
+
/**
|
85
|
+
* Decrypts a base64url encoded string using AES-GCM with a secret key.
|
86
|
+
* Returns the original string if decryption is successful, or undefined if it fails.
|
87
|
+
*
|
88
|
+
* @example
|
89
|
+
* ```ts
|
90
|
+
* const encrypted = await encrypt("Hello, World!", "test-secret-key")
|
91
|
+
* const decrypted = await decrypt(encrypted, "test-secret-key")
|
92
|
+
* expect(decrypted).toBe("Hello, World!")
|
93
|
+
* ```
|
94
|
+
*/
|
95
|
+
declare function decrypt(encrypted: string | undefined | null, secret: string): Promise<string | undefined>;
|
96
|
+
|
97
|
+
/**
|
98
|
+
* Signs a string value using HMAC-SHA256 with a secret key.
|
99
|
+
*
|
100
|
+
* This function creates a cryptographic signature that can be used to verify
|
101
|
+
* the integrity and authenticity of the data. The signature is appended to
|
102
|
+
* the original value, separated by a dot, using base64url encoding (no padding).
|
103
|
+
*
|
104
|
+
*
|
105
|
+
* @example
|
106
|
+
* ```ts
|
107
|
+
* const signedValue = await sign("user123", "my-secret-key")
|
108
|
+
* expect(signedValue).toEqual("user123.oneQsU0r5dvwQFHFEjjV1uOI_IR3gZfkYHij3TRauVA")
|
109
|
+
* ```
|
110
|
+
*/
|
111
|
+
declare function sign(value: string, secret: string): Promise<string>;
|
112
|
+
/**
|
113
|
+
* Verifies and extracts the original value from a signed string.
|
114
|
+
*
|
115
|
+
* This function validates the signature of a previously signed value using the same
|
116
|
+
* secret key. If the signature is valid, it returns the original value. If the
|
117
|
+
* signature is invalid or the format is incorrect, it returns undefined.
|
118
|
+
*
|
119
|
+
*
|
120
|
+
* @example
|
121
|
+
* ```ts
|
122
|
+
* const signedValue = "user123.oneQsU0r5dvwQFHFEjjV1uOI_IR3gZfkYHij3TRauVA"
|
123
|
+
* const originalValue = await unsign(signedValue, "my-secret-key")
|
124
|
+
* expect(originalValue).toEqual("user123")
|
125
|
+
* ```
|
126
|
+
*/
|
127
|
+
declare function unsign(signedValue: string | undefined | null, secret: string): Promise<string | undefined>;
|
128
|
+
|
129
|
+
export { decodeBase64url, decrypt, encodeBase64url, encrypt, getCookie, setCookie, sign, unsign };
|
130
|
+
export type { GetCookieOptions, SetCookieOptions };
|
@@ -0,0 +1,130 @@
|
|
1
|
+
import { SerializeOptions, ParseOptions } from 'cookie';
|
2
|
+
|
3
|
+
/**
|
4
|
+
* Encodes a Uint8Array to base64url format
|
5
|
+
* Base64url is URL-safe and doesn't use padding
|
6
|
+
*
|
7
|
+
* @example
|
8
|
+
* ```ts
|
9
|
+
* const text = "Hello World"
|
10
|
+
* const encoded = encodeBase64url(new TextEncoder().encode(text))
|
11
|
+
* const decoded = decodeBase64url(encoded)
|
12
|
+
* expect(new TextDecoder().decode(decoded)).toEqual(text)
|
13
|
+
* ```
|
14
|
+
*/
|
15
|
+
declare function encodeBase64url(data: Uint8Array): string;
|
16
|
+
/**
|
17
|
+
* Decodes a base64url string to Uint8Array
|
18
|
+
* Returns undefined if the input is invalid
|
19
|
+
*
|
20
|
+
* @example
|
21
|
+
* ```ts
|
22
|
+
* const text = "Hello World"
|
23
|
+
* const encoded = encodeBase64url(new TextEncoder().encode(text))
|
24
|
+
* const decoded = decodeBase64url(encoded)
|
25
|
+
* expect(new TextDecoder().decode(decoded)).toEqual(text)
|
26
|
+
* ```
|
27
|
+
*/
|
28
|
+
declare function decodeBase64url(base64url: string | undefined | null): Uint8Array | undefined;
|
29
|
+
|
30
|
+
interface SetCookieOptions extends SerializeOptions {
|
31
|
+
/**
|
32
|
+
* Specifies the value for the [`Path` `Set-Cookie` attribute](https://tools.ietf.org/html/rfc6265#section-5.2.4).
|
33
|
+
*
|
34
|
+
* @default '/'
|
35
|
+
*/
|
36
|
+
path?: string;
|
37
|
+
}
|
38
|
+
/**
|
39
|
+
* Sets a cookie in the response headers,
|
40
|
+
*
|
41
|
+
* Does nothing if `headers` is `undefined`.
|
42
|
+
*
|
43
|
+
* @example
|
44
|
+
* ```ts
|
45
|
+
* const headers = new Headers()
|
46
|
+
*
|
47
|
+
* setCookie(headers, 'sessionId', 'abc123', { httpOnly: true, maxAge: 3600 })
|
48
|
+
*
|
49
|
+
* expect(headers.get('Set-Cookie')).toBe('sessionId=abc123; HttpOnly; Max-Age=3600')
|
50
|
+
* ```
|
51
|
+
*
|
52
|
+
*/
|
53
|
+
declare function setCookie(headers: Headers | undefined, name: string, value: string, options?: SetCookieOptions): void;
|
54
|
+
interface GetCookieOptions extends ParseOptions {
|
55
|
+
}
|
56
|
+
/**
|
57
|
+
* Gets a cookie value from request headers
|
58
|
+
*
|
59
|
+
* Returns `undefined` if the cookie is not found or headers are `undefined`.
|
60
|
+
*
|
61
|
+
* @example
|
62
|
+
* ```ts
|
63
|
+
* const headers = new Headers({ 'Cookie': 'sessionId=abc123; theme=dark' })
|
64
|
+
*
|
65
|
+
* const sessionId = getCookie(headers, 'sessionId')
|
66
|
+
*
|
67
|
+
* expect(sessionId).toEqual('abc123')
|
68
|
+
* ```
|
69
|
+
*/
|
70
|
+
declare function getCookie(headers: Headers | undefined, name: string, options?: GetCookieOptions): string | undefined;
|
71
|
+
|
72
|
+
/**
|
73
|
+
* Encrypts a string using AES-GCM with a secret key.
|
74
|
+
* The output is base64url encoded to be URL-safe.
|
75
|
+
*
|
76
|
+
* @example
|
77
|
+
* ```ts
|
78
|
+
* const encrypted = await encrypt("Hello, World!", "test-secret-key")
|
79
|
+
* const decrypted = await decrypt(encrypted, "test-secret-key")
|
80
|
+
* expect(decrypted).toBe("Hello, World!")
|
81
|
+
* ```
|
82
|
+
*/
|
83
|
+
declare function encrypt(value: string, secret: string): Promise<string>;
|
84
|
+
/**
|
85
|
+
* Decrypts a base64url encoded string using AES-GCM with a secret key.
|
86
|
+
* Returns the original string if decryption is successful, or undefined if it fails.
|
87
|
+
*
|
88
|
+
* @example
|
89
|
+
* ```ts
|
90
|
+
* const encrypted = await encrypt("Hello, World!", "test-secret-key")
|
91
|
+
* const decrypted = await decrypt(encrypted, "test-secret-key")
|
92
|
+
* expect(decrypted).toBe("Hello, World!")
|
93
|
+
* ```
|
94
|
+
*/
|
95
|
+
declare function decrypt(encrypted: string | undefined | null, secret: string): Promise<string | undefined>;
|
96
|
+
|
97
|
+
/**
|
98
|
+
* Signs a string value using HMAC-SHA256 with a secret key.
|
99
|
+
*
|
100
|
+
* This function creates a cryptographic signature that can be used to verify
|
101
|
+
* the integrity and authenticity of the data. The signature is appended to
|
102
|
+
* the original value, separated by a dot, using base64url encoding (no padding).
|
103
|
+
*
|
104
|
+
*
|
105
|
+
* @example
|
106
|
+
* ```ts
|
107
|
+
* const signedValue = await sign("user123", "my-secret-key")
|
108
|
+
* expect(signedValue).toEqual("user123.oneQsU0r5dvwQFHFEjjV1uOI_IR3gZfkYHij3TRauVA")
|
109
|
+
* ```
|
110
|
+
*/
|
111
|
+
declare function sign(value: string, secret: string): Promise<string>;
|
112
|
+
/**
|
113
|
+
* Verifies and extracts the original value from a signed string.
|
114
|
+
*
|
115
|
+
* This function validates the signature of a previously signed value using the same
|
116
|
+
* secret key. If the signature is valid, it returns the original value. If the
|
117
|
+
* signature is invalid or the format is incorrect, it returns undefined.
|
118
|
+
*
|
119
|
+
*
|
120
|
+
* @example
|
121
|
+
* ```ts
|
122
|
+
* const signedValue = "user123.oneQsU0r5dvwQFHFEjjV1uOI_IR3gZfkYHij3TRauVA"
|
123
|
+
* const originalValue = await unsign(signedValue, "my-secret-key")
|
124
|
+
* expect(originalValue).toEqual("user123")
|
125
|
+
* ```
|
126
|
+
*/
|
127
|
+
declare function unsign(signedValue: string | undefined | null, secret: string): Promise<string | undefined>;
|
128
|
+
|
129
|
+
export { decodeBase64url, decrypt, encodeBase64url, encrypt, getCookie, setCookie, sign, unsign };
|
130
|
+
export type { GetCookieOptions, SetCookieOptions };
|
@@ -0,0 +1,182 @@
|
|
1
|
+
import { serialize, parse } from 'cookie';
|
2
|
+
|
3
|
+
function encodeBase64url(data) {
|
4
|
+
const chunkSize = 8192;
|
5
|
+
let binaryString = "";
|
6
|
+
for (let i = 0; i < data.length; i += chunkSize) {
|
7
|
+
const chunk = data.subarray(i, i + chunkSize);
|
8
|
+
binaryString += String.fromCharCode(...chunk);
|
9
|
+
}
|
10
|
+
const base64 = btoa(binaryString);
|
11
|
+
return base64.replace(/\+/g, "-").replace(/\//g, "_").replace(/=/g, "");
|
12
|
+
}
|
13
|
+
function decodeBase64url(base64url) {
|
14
|
+
try {
|
15
|
+
if (typeof base64url !== "string") {
|
16
|
+
return void 0;
|
17
|
+
}
|
18
|
+
let base64 = base64url.replace(/-/g, "+").replace(/_/g, "/");
|
19
|
+
while (base64.length % 4) {
|
20
|
+
base64 += "=";
|
21
|
+
}
|
22
|
+
const binaryString = atob(base64);
|
23
|
+
const bytes = new Uint8Array(binaryString.length);
|
24
|
+
for (let i = 0; i < binaryString.length; i++) {
|
25
|
+
bytes[i] = binaryString.charCodeAt(i);
|
26
|
+
}
|
27
|
+
return bytes;
|
28
|
+
} catch {
|
29
|
+
return void 0;
|
30
|
+
}
|
31
|
+
}
|
32
|
+
|
33
|
+
function setCookie(headers, name, value, options = {}) {
|
34
|
+
if (headers === void 0) {
|
35
|
+
return;
|
36
|
+
}
|
37
|
+
const cookieString = serialize(name, value, {
|
38
|
+
path: "/",
|
39
|
+
...options
|
40
|
+
});
|
41
|
+
headers.append("Set-Cookie", cookieString);
|
42
|
+
}
|
43
|
+
function getCookie(headers, name, options = {}) {
|
44
|
+
if (headers === void 0) {
|
45
|
+
return void 0;
|
46
|
+
}
|
47
|
+
const cookieHeader = headers.get("cookie");
|
48
|
+
if (cookieHeader === null) {
|
49
|
+
return void 0;
|
50
|
+
}
|
51
|
+
return parse(cookieHeader, options)[name];
|
52
|
+
}
|
53
|
+
|
54
|
+
const PBKDF2_CONFIG = {
|
55
|
+
name: "PBKDF2",
|
56
|
+
iterations: 6e4,
|
57
|
+
// Recommended minimum iterations per current OWASP guidelines
|
58
|
+
hash: "SHA-256"
|
59
|
+
};
|
60
|
+
const AES_GCM_CONFIG = {
|
61
|
+
name: "AES-GCM",
|
62
|
+
length: 256
|
63
|
+
};
|
64
|
+
const CRYPTO_CONSTANTS = {
|
65
|
+
SALT_LENGTH: 16,
|
66
|
+
IV_LENGTH: 12
|
67
|
+
};
|
68
|
+
async function encrypt(value, secret) {
|
69
|
+
const encoder = new TextEncoder();
|
70
|
+
const data = encoder.encode(value);
|
71
|
+
const salt = crypto.getRandomValues(new Uint8Array(CRYPTO_CONSTANTS.SALT_LENGTH));
|
72
|
+
const keyMaterial = await crypto.subtle.importKey(
|
73
|
+
"raw",
|
74
|
+
encoder.encode(secret),
|
75
|
+
PBKDF2_CONFIG.name,
|
76
|
+
false,
|
77
|
+
["deriveKey"]
|
78
|
+
);
|
79
|
+
const key = await crypto.subtle.deriveKey(
|
80
|
+
{ ...PBKDF2_CONFIG, salt },
|
81
|
+
keyMaterial,
|
82
|
+
AES_GCM_CONFIG,
|
83
|
+
false,
|
84
|
+
["encrypt"]
|
85
|
+
);
|
86
|
+
const iv = crypto.getRandomValues(new Uint8Array(CRYPTO_CONSTANTS.IV_LENGTH));
|
87
|
+
const encrypted = await crypto.subtle.encrypt(
|
88
|
+
{ name: AES_GCM_CONFIG.name, iv },
|
89
|
+
key,
|
90
|
+
data
|
91
|
+
);
|
92
|
+
const result = new Uint8Array(salt.length + iv.length + encrypted.byteLength);
|
93
|
+
result.set(salt, 0);
|
94
|
+
result.set(iv, salt.length);
|
95
|
+
result.set(new Uint8Array(encrypted), salt.length + iv.length);
|
96
|
+
return encodeBase64url(result);
|
97
|
+
}
|
98
|
+
async function decrypt(encrypted, secret) {
|
99
|
+
try {
|
100
|
+
const data = decodeBase64url(encrypted);
|
101
|
+
if (data === void 0) {
|
102
|
+
return void 0;
|
103
|
+
}
|
104
|
+
const encoder = new TextEncoder();
|
105
|
+
const decoder = new TextDecoder();
|
106
|
+
const salt = data.slice(0, CRYPTO_CONSTANTS.SALT_LENGTH);
|
107
|
+
const iv = data.slice(CRYPTO_CONSTANTS.SALT_LENGTH, CRYPTO_CONSTANTS.SALT_LENGTH + CRYPTO_CONSTANTS.IV_LENGTH);
|
108
|
+
const encryptedData = data.slice(CRYPTO_CONSTANTS.SALT_LENGTH + CRYPTO_CONSTANTS.IV_LENGTH);
|
109
|
+
const keyMaterial = await crypto.subtle.importKey(
|
110
|
+
"raw",
|
111
|
+
encoder.encode(secret),
|
112
|
+
PBKDF2_CONFIG.name,
|
113
|
+
false,
|
114
|
+
["deriveKey"]
|
115
|
+
);
|
116
|
+
const key = await crypto.subtle.deriveKey(
|
117
|
+
{ ...PBKDF2_CONFIG, salt },
|
118
|
+
keyMaterial,
|
119
|
+
AES_GCM_CONFIG,
|
120
|
+
false,
|
121
|
+
["decrypt"]
|
122
|
+
);
|
123
|
+
const decrypted = await crypto.subtle.decrypt(
|
124
|
+
{ name: AES_GCM_CONFIG.name, iv },
|
125
|
+
key,
|
126
|
+
encryptedData
|
127
|
+
);
|
128
|
+
return decoder.decode(decrypted);
|
129
|
+
} catch {
|
130
|
+
return void 0;
|
131
|
+
}
|
132
|
+
}
|
133
|
+
|
134
|
+
const ALGORITHM = { name: "HMAC", hash: "SHA-256" };
|
135
|
+
async function sign(value, secret) {
|
136
|
+
const encoder = new TextEncoder();
|
137
|
+
const key = await crypto.subtle.importKey(
|
138
|
+
"raw",
|
139
|
+
encoder.encode(secret),
|
140
|
+
ALGORITHM,
|
141
|
+
false,
|
142
|
+
["sign"]
|
143
|
+
);
|
144
|
+
const signature = await crypto.subtle.sign(
|
145
|
+
ALGORITHM,
|
146
|
+
key,
|
147
|
+
encoder.encode(value)
|
148
|
+
);
|
149
|
+
return `${value}.${encodeBase64url(new Uint8Array(signature))}`;
|
150
|
+
}
|
151
|
+
async function unsign(signedValue, secret) {
|
152
|
+
if (typeof signedValue !== "string") {
|
153
|
+
return void 0;
|
154
|
+
}
|
155
|
+
const lastDotIndex = signedValue.lastIndexOf(".");
|
156
|
+
if (lastDotIndex === -1) {
|
157
|
+
return void 0;
|
158
|
+
}
|
159
|
+
const value = signedValue.slice(0, lastDotIndex);
|
160
|
+
const signatureBase64url = signedValue.slice(lastDotIndex + 1);
|
161
|
+
const signature = decodeBase64url(signatureBase64url);
|
162
|
+
if (signature === void 0) {
|
163
|
+
return void 0;
|
164
|
+
}
|
165
|
+
const encoder = new TextEncoder();
|
166
|
+
const key = await crypto.subtle.importKey(
|
167
|
+
"raw",
|
168
|
+
encoder.encode(secret),
|
169
|
+
ALGORITHM,
|
170
|
+
false,
|
171
|
+
["verify"]
|
172
|
+
);
|
173
|
+
const isValid = await crypto.subtle.verify(
|
174
|
+
ALGORITHM,
|
175
|
+
key,
|
176
|
+
signature,
|
177
|
+
encoder.encode(value)
|
178
|
+
);
|
179
|
+
return isValid ? value : void 0;
|
180
|
+
}
|
181
|
+
|
182
|
+
export { decodeBase64url, decrypt, encodeBase64url, encrypt, getCookie, setCookie, sign, unsign };
|