@rudderstack/integrations-lib 0.2.59 → 0.2.60
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/build/utils/index.d.ts
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/utils/index.ts"],"names":[],"mappings":"AAAA,cAAc,oBAAoB,CAAC;AACnC,cAAc,yBAAyB,CAAC;AACxC,cAAc,QAAQ,CAAC;AACvB,cAAc,WAAW,CAAC;AAC1B,cAAc,SAAS,CAAC;AACxB,cAAc,OAAO,CAAC"}
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/utils/index.ts"],"names":[],"mappings":"AAAA,cAAc,oBAAoB,CAAC;AACnC,cAAc,yBAAyB,CAAC;AACxC,cAAc,QAAQ,CAAC;AACvB,cAAc,WAAW,CAAC;AAC1B,cAAc,aAAa,CAAC;AAC5B,cAAc,SAAS,CAAC;AACxB,cAAc,OAAO,CAAC"}
|
package/build/utils/index.js
CHANGED
|
@@ -18,6 +18,7 @@ __exportStar(require("./batch-processing"), exports);
|
|
|
18
18
|
__exportStar(require("./json-schema-generator"), exports);
|
|
19
19
|
__exportStar(require("./misc"), exports);
|
|
20
20
|
__exportStar(require("./request"), exports);
|
|
21
|
+
__exportStar(require("./sanitizer"), exports);
|
|
21
22
|
__exportStar(require("./tests"), exports);
|
|
22
23
|
__exportStar(require("./zod"), exports);
|
|
23
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
24
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -0,0 +1,152 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Response Sanitization Utility
|
|
3
|
+
*
|
|
4
|
+
* Provides comprehensive sanitization for API responses to prevent XSS attacks
|
|
5
|
+
* and other security vulnerabilities.
|
|
6
|
+
*
|
|
7
|
+
* Key Features:
|
|
8
|
+
* - HTML entity escaping (always enabled, uses validator library)
|
|
9
|
+
* - Control character removal (configurable)
|
|
10
|
+
* - String length truncation (configurable)
|
|
11
|
+
* - Deep object traversal (configurable depth)
|
|
12
|
+
* - Type preservation (numbers, booleans, null remain unchanged)
|
|
13
|
+
* - Non-destructive (returns new objects without mutating originals)
|
|
14
|
+
*
|
|
15
|
+
* @packageDocumentation
|
|
16
|
+
*/
|
|
17
|
+
/**
|
|
18
|
+
* Regular expression to match dangerous control characters
|
|
19
|
+
*
|
|
20
|
+
* Matches ASCII control characters (0x00-0x1F and 0x7F) EXCEPT:
|
|
21
|
+
* - \x09 (tab)
|
|
22
|
+
* - \x0A (newline)
|
|
23
|
+
* - \x0D (carriage return)
|
|
24
|
+
*
|
|
25
|
+
* Range breakdown:
|
|
26
|
+
* - \x00-\x08: NULL to BACKSPACE
|
|
27
|
+
* - \x0B: Vertical Tab (skips \x09 tab and \x0A newline)
|
|
28
|
+
* - \x0C: Form Feed (skips \x0D carriage return)
|
|
29
|
+
* - \x0E-\x1F: Shift Out to Unit Separator
|
|
30
|
+
* - \x7F: DELETE
|
|
31
|
+
*
|
|
32
|
+
* These characters can cause issues in logs, APIs, and downstream systems.
|
|
33
|
+
*/
|
|
34
|
+
export declare const CONTROL_CHARS_REGEX: RegExp;
|
|
35
|
+
/**
|
|
36
|
+
* Configuration for response sanitization
|
|
37
|
+
*
|
|
38
|
+
* This configuration controls how the sanitization utility processes data:
|
|
39
|
+
* - HTML escaping is ALWAYS enabled (cannot be disabled for security)
|
|
40
|
+
* - Control character removal is configurable
|
|
41
|
+
* - String length limits are configurable
|
|
42
|
+
* - Object depth limits are configurable
|
|
43
|
+
*/
|
|
44
|
+
export interface SanitizationConfig {
|
|
45
|
+
/**
|
|
46
|
+
* Remove dangerous control characters (0x00-0x1F, 0x7F)
|
|
47
|
+
* Preserves safe formatting characters: \n (newline), \r (carriage return), \t (tab)
|
|
48
|
+
* @default true
|
|
49
|
+
*/
|
|
50
|
+
removeControlChars: boolean;
|
|
51
|
+
/**
|
|
52
|
+
* Maximum string length before truncation (in characters)
|
|
53
|
+
* Prevents DOS attacks by limiting string size
|
|
54
|
+
* Set to 0 to disable truncation
|
|
55
|
+
* @default 10240
|
|
56
|
+
*/
|
|
57
|
+
maxStringLength: number;
|
|
58
|
+
/**
|
|
59
|
+
* Maximum object depth to traverse
|
|
60
|
+
* Prevents stack overflow from deeply nested objects
|
|
61
|
+
* Objects deeper than this will be replaced with '[Max depth exceeded]'
|
|
62
|
+
* @default 50
|
|
63
|
+
*/
|
|
64
|
+
maxDepth: number;
|
|
65
|
+
}
|
|
66
|
+
/**
|
|
67
|
+
* Default sanitization configuration
|
|
68
|
+
* Suitable for general-purpose API responses
|
|
69
|
+
*
|
|
70
|
+
* For specific use cases, create custom configs:
|
|
71
|
+
* - Processor responses: { maxStringLength: 50000, maxDepth: 50, removeControlChars: true }
|
|
72
|
+
* - Delivery responses: { maxStringLength: 20000, maxDepth: 30, removeControlChars: true }
|
|
73
|
+
*/
|
|
74
|
+
export declare const DEFAULT_SANITIZATION_CONFIG: SanitizationConfig;
|
|
75
|
+
/**
|
|
76
|
+
* Deep sanitize an object, array, or primitive value
|
|
77
|
+
*
|
|
78
|
+
* This function recursively processes data structures:
|
|
79
|
+
* - Arrays: Sanitizes each element
|
|
80
|
+
* - Objects: Sanitizes both keys and values
|
|
81
|
+
* - Strings: Applies HTML escaping and other string sanitization
|
|
82
|
+
* - Primitives: Returns as-is (numbers, booleans, null, undefined)
|
|
83
|
+
*
|
|
84
|
+
* @param data - The data to sanitize (any type)
|
|
85
|
+
* @param config - Sanitization configuration (defaults to DEFAULT_SANITIZATION_CONFIG)
|
|
86
|
+
* @param depth - Current recursion depth (internal use, starts at 0)
|
|
87
|
+
* @returns Sanitized copy of the data
|
|
88
|
+
*
|
|
89
|
+
* @example Sanitize an object
|
|
90
|
+
* ```typescript
|
|
91
|
+
* const data = {
|
|
92
|
+
* user: '<script>xss</script>',
|
|
93
|
+
* count: 42,
|
|
94
|
+
* active: true
|
|
95
|
+
* };
|
|
96
|
+
* const clean = sanitize(data);
|
|
97
|
+
* // Returns: { user: '<script>xss</script>', count: 42, active: true }
|
|
98
|
+
* ```
|
|
99
|
+
*
|
|
100
|
+
* @example Sanitize an array
|
|
101
|
+
* ```typescript
|
|
102
|
+
* const data = ['<b>item1</b>', '<i>item2</i>'];
|
|
103
|
+
* const clean = sanitize(data);
|
|
104
|
+
* // Returns: ['<b>item1</b>', '<i>item2</i>']
|
|
105
|
+
* ```
|
|
106
|
+
*/
|
|
107
|
+
export declare function sanitize<T>(data: T, config?: SanitizationConfig, depth?: number): T;
|
|
108
|
+
/**
|
|
109
|
+
* Sanitize any response data to prevent XSS attacks and security vulnerabilities
|
|
110
|
+
*
|
|
111
|
+
* This is a convenience function that merges custom config with defaults.
|
|
112
|
+
* For direct control, use the `sanitize` function directly.
|
|
113
|
+
*
|
|
114
|
+
* This function:
|
|
115
|
+
* - Escapes HTML entities in all strings (ALWAYS, cannot be disabled)
|
|
116
|
+
* - Removes dangerous control characters (configurable)
|
|
117
|
+
* - Truncates overly long strings (configurable)
|
|
118
|
+
* - Handles nested objects/arrays recursively
|
|
119
|
+
* - Preserves data types (numbers, booleans, null)
|
|
120
|
+
*
|
|
121
|
+
* @param data - The data to sanitize (objects, arrays, primitives)
|
|
122
|
+
* @param config - Optional partial configuration (merged with defaults)
|
|
123
|
+
* @returns Sanitized copy of the data with same type
|
|
124
|
+
*
|
|
125
|
+
* @example Basic usage with defaults
|
|
126
|
+
* ```typescript
|
|
127
|
+
* const unsafe = { message: '<script>alert("xss")</script>' };
|
|
128
|
+
* const safe = sanitizeResponse(unsafe);
|
|
129
|
+
* // Result: { message: '<script>alert("xss")</script>' }
|
|
130
|
+
* ```
|
|
131
|
+
*
|
|
132
|
+
* @example Custom configuration for large payloads
|
|
133
|
+
* ```typescript
|
|
134
|
+
* const response = sanitizeResponse(processorData, {
|
|
135
|
+
* maxStringLength: 50000,
|
|
136
|
+
* maxDepth: 50,
|
|
137
|
+
* removeControlChars: true
|
|
138
|
+
* });
|
|
139
|
+
* ```
|
|
140
|
+
*
|
|
141
|
+
* @example In a Koa controller
|
|
142
|
+
* ```typescript
|
|
143
|
+
* export class Controller {
|
|
144
|
+
* async transform(ctx: Context) {
|
|
145
|
+
* const result = await transformData(ctx.request.body);
|
|
146
|
+
* ctx.body = sanitizeResponse(result);
|
|
147
|
+
* }
|
|
148
|
+
* }
|
|
149
|
+
* ```
|
|
150
|
+
*/
|
|
151
|
+
export declare function sanitizeResponse<T>(data: T, config?: Partial<SanitizationConfig>): T;
|
|
152
|
+
//# sourceMappingURL=sanitizer.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"sanitizer.d.ts","sourceRoot":"","sources":["../../src/utils/sanitizer.ts"],"names":[],"mappings":"AAEA;;;;;;;;;;;;;;;GAeG;AAEH;;;;;;;;;;;;;;;;GAgBG;AAEH,eAAO,MAAM,mBAAmB,QAAsC,CAAC;AAEvE;;;;;;;;GAQG;AACH,MAAM,WAAW,kBAAkB;IACjC;;;;OAIG;IACH,kBAAkB,EAAE,OAAO,CAAC;IAE5B;;;;;OAKG;IACH,eAAe,EAAE,MAAM,CAAC;IAExB;;;;;OAKG;IACH,QAAQ,EAAE,MAAM,CAAC;CAClB;AAED;;;;;;;GAOG;AACH,eAAO,MAAM,2BAA2B,EAAE,kBAIzC,CAAC;AA2CF;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA+BG;AACH,wBAAgB,QAAQ,CAAC,CAAC,EACxB,IAAI,EAAE,CAAC,EACP,MAAM,GAAE,kBAAgD,EACxD,KAAK,GAAE,MAAU,GAChB,CAAC,CAyCH;AAED;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA0CG;AACH,wBAAgB,gBAAgB,CAAC,CAAC,EAAE,IAAI,EAAE,CAAC,EAAE,MAAM,CAAC,EAAE,OAAO,CAAC,kBAAkB,CAAC,GAAG,CAAC,CAKpF"}
|
|
@@ -0,0 +1,208 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
3
|
+
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
4
|
+
};
|
|
5
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
6
|
+
exports.DEFAULT_SANITIZATION_CONFIG = exports.CONTROL_CHARS_REGEX = void 0;
|
|
7
|
+
exports.sanitize = sanitize;
|
|
8
|
+
exports.sanitizeResponse = sanitizeResponse;
|
|
9
|
+
const validator_1 = __importDefault(require("validator"));
|
|
10
|
+
/**
|
|
11
|
+
* Response Sanitization Utility
|
|
12
|
+
*
|
|
13
|
+
* Provides comprehensive sanitization for API responses to prevent XSS attacks
|
|
14
|
+
* and other security vulnerabilities.
|
|
15
|
+
*
|
|
16
|
+
* Key Features:
|
|
17
|
+
* - HTML entity escaping (always enabled, uses validator library)
|
|
18
|
+
* - Control character removal (configurable)
|
|
19
|
+
* - String length truncation (configurable)
|
|
20
|
+
* - Deep object traversal (configurable depth)
|
|
21
|
+
* - Type preservation (numbers, booleans, null remain unchanged)
|
|
22
|
+
* - Non-destructive (returns new objects without mutating originals)
|
|
23
|
+
*
|
|
24
|
+
* @packageDocumentation
|
|
25
|
+
*/
|
|
26
|
+
/**
|
|
27
|
+
* Regular expression to match dangerous control characters
|
|
28
|
+
*
|
|
29
|
+
* Matches ASCII control characters (0x00-0x1F and 0x7F) EXCEPT:
|
|
30
|
+
* - \x09 (tab)
|
|
31
|
+
* - \x0A (newline)
|
|
32
|
+
* - \x0D (carriage return)
|
|
33
|
+
*
|
|
34
|
+
* Range breakdown:
|
|
35
|
+
* - \x00-\x08: NULL to BACKSPACE
|
|
36
|
+
* - \x0B: Vertical Tab (skips \x09 tab and \x0A newline)
|
|
37
|
+
* - \x0C: Form Feed (skips \x0D carriage return)
|
|
38
|
+
* - \x0E-\x1F: Shift Out to Unit Separator
|
|
39
|
+
* - \x7F: DELETE
|
|
40
|
+
*
|
|
41
|
+
* These characters can cause issues in logs, APIs, and downstream systems.
|
|
42
|
+
*/
|
|
43
|
+
// eslint-disable-next-line no-control-regex
|
|
44
|
+
exports.CONTROL_CHARS_REGEX = /[\x00-\x08\x0B\x0C\x0E-\x1F\x7F]/g;
|
|
45
|
+
/**
|
|
46
|
+
* Default sanitization configuration
|
|
47
|
+
* Suitable for general-purpose API responses
|
|
48
|
+
*
|
|
49
|
+
* For specific use cases, create custom configs:
|
|
50
|
+
* - Processor responses: { maxStringLength: 50000, maxDepth: 50, removeControlChars: true }
|
|
51
|
+
* - Delivery responses: { maxStringLength: 20000, maxDepth: 30, removeControlChars: true }
|
|
52
|
+
*/
|
|
53
|
+
exports.DEFAULT_SANITIZATION_CONFIG = {
|
|
54
|
+
removeControlChars: true,
|
|
55
|
+
maxStringLength: 10240, // 10KB per string
|
|
56
|
+
maxDepth: 50,
|
|
57
|
+
};
|
|
58
|
+
/**
|
|
59
|
+
* Sanitize a single string value
|
|
60
|
+
*
|
|
61
|
+
* Processing order:
|
|
62
|
+
* 1. Remove control characters (if enabled)
|
|
63
|
+
* 2. Escape HTML entities (always applied)
|
|
64
|
+
* 3. Truncate if exceeds max length (if enabled)
|
|
65
|
+
*
|
|
66
|
+
* @param value - The string to sanitize
|
|
67
|
+
* @param config - Sanitization configuration
|
|
68
|
+
* @returns Sanitized string with HTML entities escaped
|
|
69
|
+
* @private
|
|
70
|
+
*/
|
|
71
|
+
function sanitizeString(value, config) {
|
|
72
|
+
if (typeof value !== 'string') {
|
|
73
|
+
return value;
|
|
74
|
+
}
|
|
75
|
+
let sanitized = value;
|
|
76
|
+
// Step 1: Remove control characters (except newline \n, carriage return \r, and tab \t)
|
|
77
|
+
// Control characters (0x00-0x1F, 0x7F) can break logs and cause security issues
|
|
78
|
+
// We preserve \n (0x0A), \r (0x0D), \t (0x09) for legitimate formatting
|
|
79
|
+
if (config.removeControlChars) {
|
|
80
|
+
sanitized = sanitized.replace(exports.CONTROL_CHARS_REGEX, '');
|
|
81
|
+
}
|
|
82
|
+
// Step 2: Escape HTML entities to prevent XSS attacks
|
|
83
|
+
// This is ALWAYS applied regardless of config
|
|
84
|
+
// Uses validator.escape() which converts: < > " ' & / to HTML entities
|
|
85
|
+
sanitized = validator_1.default.escape(sanitized);
|
|
86
|
+
// Step 3: Truncate long strings to prevent DOS attacks
|
|
87
|
+
// Adds '... [truncated]' suffix to indicate truncation
|
|
88
|
+
if (config.maxStringLength > 0 && sanitized.length > config.maxStringLength) {
|
|
89
|
+
sanitized = `${sanitized.substring(0, config.maxStringLength)}... [truncated]`;
|
|
90
|
+
}
|
|
91
|
+
return sanitized;
|
|
92
|
+
}
|
|
93
|
+
/**
|
|
94
|
+
* Deep sanitize an object, array, or primitive value
|
|
95
|
+
*
|
|
96
|
+
* This function recursively processes data structures:
|
|
97
|
+
* - Arrays: Sanitizes each element
|
|
98
|
+
* - Objects: Sanitizes both keys and values
|
|
99
|
+
* - Strings: Applies HTML escaping and other string sanitization
|
|
100
|
+
* - Primitives: Returns as-is (numbers, booleans, null, undefined)
|
|
101
|
+
*
|
|
102
|
+
* @param data - The data to sanitize (any type)
|
|
103
|
+
* @param config - Sanitization configuration (defaults to DEFAULT_SANITIZATION_CONFIG)
|
|
104
|
+
* @param depth - Current recursion depth (internal use, starts at 0)
|
|
105
|
+
* @returns Sanitized copy of the data
|
|
106
|
+
*
|
|
107
|
+
* @example Sanitize an object
|
|
108
|
+
* ```typescript
|
|
109
|
+
* const data = {
|
|
110
|
+
* user: '<script>xss</script>',
|
|
111
|
+
* count: 42,
|
|
112
|
+
* active: true
|
|
113
|
+
* };
|
|
114
|
+
* const clean = sanitize(data);
|
|
115
|
+
* // Returns: { user: '<script>xss</script>', count: 42, active: true }
|
|
116
|
+
* ```
|
|
117
|
+
*
|
|
118
|
+
* @example Sanitize an array
|
|
119
|
+
* ```typescript
|
|
120
|
+
* const data = ['<b>item1</b>', '<i>item2</i>'];
|
|
121
|
+
* const clean = sanitize(data);
|
|
122
|
+
* // Returns: ['<b>item1</b>', '<i>item2</i>']
|
|
123
|
+
* ```
|
|
124
|
+
*/
|
|
125
|
+
function sanitize(data, config = exports.DEFAULT_SANITIZATION_CONFIG, depth = 0) {
|
|
126
|
+
// Handle null and undefined - return as-is
|
|
127
|
+
if (data === null || data === undefined) {
|
|
128
|
+
return data;
|
|
129
|
+
}
|
|
130
|
+
// Prevent infinite recursion by checking depth limit
|
|
131
|
+
// Replaces deeply nested data with a warning string
|
|
132
|
+
if (depth > config.maxDepth) {
|
|
133
|
+
return '[Max depth exceeded]';
|
|
134
|
+
}
|
|
135
|
+
// Handle arrays - recursively sanitize each element
|
|
136
|
+
if (Array.isArray(data)) {
|
|
137
|
+
return data.map((item) => sanitize(item, config, depth + 1));
|
|
138
|
+
}
|
|
139
|
+
// Handle strings - apply string-level sanitization
|
|
140
|
+
if (typeof data === 'string') {
|
|
141
|
+
return sanitizeString(data, config);
|
|
142
|
+
}
|
|
143
|
+
// Handle objects - sanitize both keys and values
|
|
144
|
+
if (typeof data === 'object') {
|
|
145
|
+
const sanitized = {};
|
|
146
|
+
// eslint-disable-next-line no-restricted-syntax
|
|
147
|
+
for (const [key, value] of Object.entries(data)) {
|
|
148
|
+
// Sanitize the key itself to prevent malicious property names
|
|
149
|
+
const sanitizedKey = sanitizeString(key, config);
|
|
150
|
+
// Recursively sanitize the value, incrementing depth
|
|
151
|
+
sanitized[sanitizedKey] = sanitize(value, config, depth + 1);
|
|
152
|
+
}
|
|
153
|
+
return sanitized;
|
|
154
|
+
}
|
|
155
|
+
// Return primitives as-is (numbers, booleans, bigints, symbols)
|
|
156
|
+
// These types don't need sanitization
|
|
157
|
+
return data;
|
|
158
|
+
}
|
|
159
|
+
/**
|
|
160
|
+
* Sanitize any response data to prevent XSS attacks and security vulnerabilities
|
|
161
|
+
*
|
|
162
|
+
* This is a convenience function that merges custom config with defaults.
|
|
163
|
+
* For direct control, use the `sanitize` function directly.
|
|
164
|
+
*
|
|
165
|
+
* This function:
|
|
166
|
+
* - Escapes HTML entities in all strings (ALWAYS, cannot be disabled)
|
|
167
|
+
* - Removes dangerous control characters (configurable)
|
|
168
|
+
* - Truncates overly long strings (configurable)
|
|
169
|
+
* - Handles nested objects/arrays recursively
|
|
170
|
+
* - Preserves data types (numbers, booleans, null)
|
|
171
|
+
*
|
|
172
|
+
* @param data - The data to sanitize (objects, arrays, primitives)
|
|
173
|
+
* @param config - Optional partial configuration (merged with defaults)
|
|
174
|
+
* @returns Sanitized copy of the data with same type
|
|
175
|
+
*
|
|
176
|
+
* @example Basic usage with defaults
|
|
177
|
+
* ```typescript
|
|
178
|
+
* const unsafe = { message: '<script>alert("xss")</script>' };
|
|
179
|
+
* const safe = sanitizeResponse(unsafe);
|
|
180
|
+
* // Result: { message: '<script>alert("xss")</script>' }
|
|
181
|
+
* ```
|
|
182
|
+
*
|
|
183
|
+
* @example Custom configuration for large payloads
|
|
184
|
+
* ```typescript
|
|
185
|
+
* const response = sanitizeResponse(processorData, {
|
|
186
|
+
* maxStringLength: 50000,
|
|
187
|
+
* maxDepth: 50,
|
|
188
|
+
* removeControlChars: true
|
|
189
|
+
* });
|
|
190
|
+
* ```
|
|
191
|
+
*
|
|
192
|
+
* @example In a Koa controller
|
|
193
|
+
* ```typescript
|
|
194
|
+
* export class Controller {
|
|
195
|
+
* async transform(ctx: Context) {
|
|
196
|
+
* const result = await transformData(ctx.request.body);
|
|
197
|
+
* ctx.body = sanitizeResponse(result);
|
|
198
|
+
* }
|
|
199
|
+
* }
|
|
200
|
+
* ```
|
|
201
|
+
*/
|
|
202
|
+
function sanitizeResponse(data, config) {
|
|
203
|
+
return sanitize(data, {
|
|
204
|
+
...exports.DEFAULT_SANITIZATION_CONFIG,
|
|
205
|
+
...config,
|
|
206
|
+
});
|
|
207
|
+
}
|
|
208
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"sanitizer.js","sourceRoot":"","sources":["../../src/utils/sanitizer.ts"],"names":[],"mappings":";;;;;;AAgKA,4BA6CC;AA6CD,4CAKC;AA/PD,0DAAkC;AAElC;;;;;;;;;;;;;;;GAeG;AAEH;;;;;;;;;;;;;;;;GAgBG;AACH,4CAA4C;AAC/B,QAAA,mBAAmB,GAAG,mCAAmC,CAAC;AAoCvE;;;;;;;GAOG;AACU,QAAA,2BAA2B,GAAuB;IAC7D,kBAAkB,EAAE,IAAI;IACxB,eAAe,EAAE,KAAK,EAAE,kBAAkB;IAC1C,QAAQ,EAAE,EAAE;CACb,CAAC;AAEF;;;;;;;;;;;;GAYG;AACH,SAAS,cAAc,CAAC,KAAa,EAAE,MAA0B;IAC/D,IAAI,OAAO,KAAK,KAAK,QAAQ,EAAE,CAAC;QAC9B,OAAO,KAAK,CAAC;IACf,CAAC;IAED,IAAI,SAAS,GAAG,KAAK,CAAC;IAEtB,wFAAwF;IACxF,gFAAgF;IAChF,wEAAwE;IACxE,IAAI,MAAM,CAAC,kBAAkB,EAAE,CAAC;QAC9B,SAAS,GAAG,SAAS,CAAC,OAAO,CAAC,2BAAmB,EAAE,EAAE,CAAC,CAAC;IACzD,CAAC;IAED,sDAAsD;IACtD,8CAA8C;IAC9C,uEAAuE;IACvE,SAAS,GAAG,mBAAS,CAAC,MAAM,CAAC,SAAS,CAAC,CAAC;IAExC,uDAAuD;IACvD,uDAAuD;IACvD,IAAI,MAAM,CAAC,eAAe,GAAG,CAAC,IAAI,SAAS,CAAC,MAAM,GAAG,MAAM,CAAC,eAAe,EAAE,CAAC;QAC5E,SAAS,GAAG,GAAG,SAAS,CAAC,SAAS,CAAC,CAAC,EAAE,MAAM,CAAC,eAAe,CAAC,iBAAiB,CAAC;IACjF,CAAC;IAED,OAAO,SAAS,CAAC;AACnB,CAAC;AAED;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA+BG;AACH,SAAgB,QAAQ,CACtB,IAAO,EACP,SAA6B,mCAA2B,EACxD,QAAgB,CAAC;IAEjB,2CAA2C;IAC3C,IAAI,IAAI,KAAK,IAAI,IAAI,IAAI,KAAK,SAAS,EAAE,CAAC;QACxC,OAAO,IAAI,CAAC;IACd,CAAC;IAED,qDAAqD;IACrD,oDAAoD;IACpD,IAAI,KAAK,GAAG,MAAM,CAAC,QAAQ,EAAE,CAAC;QAC5B,OAAO,sBAA2B,CAAC;IACrC,CAAC;IAED,oDAAoD;IACpD,IAAI,KAAK,CAAC,OAAO,CAAC,IAAI,CAAC,EAAE,CAAC;QACxB,OAAO,IAAI,CAAC,GAAG,CAAC,CAAC,IAAI,EAAE,EAAE,CAAC,QAAQ,CAAC,IAAI,EAAE,MAAM,EAAE,KAAK,GAAG,CAAC,CAAC,CAAM,CAAC;IACpE,CAAC;IAED,mDAAmD;IACnD,IAAI,OAAO,IAAI,KAAK,QAAQ,EAAE,CAAC;QAC7B,OAAO,cAAc,CAAC,IAAI,EAAE,MAAM,CAAM,CAAC;IAC3C,CAAC;IAED,iDAAiD;IACjD,IAAI,OAAO,IAAI,KAAK,QAAQ,EAAE,CAAC;QAC7B,MAAM,SAAS,GAA4B,EAAE,CAAC;QAE9C,gDAAgD;QAChD,KAAK,MAAM,CAAC,GAAG,EAAE,KAAK,CAAC,IAAI,MAAM,CAAC,OAAO,CAAC,IAAI,CAAC,EAAE,CAAC;YAChD,8DAA8D;YAC9D,MAAM,YAAY,GAAG,cAAc,CAAC,GAAG,EAAE,MAAM,CAAC,CAAC;YAEjD,qDAAqD;YACrD,SAAS,CAAC,YAAY,CAAC,GAAG,QAAQ,CAAC,KAAK,EAAE,MAAM,EAAE,KAAK,GAAG,CAAC,CAAC,CAAC;QAC/D,CAAC;QAED,OAAO,SAAc,CAAC;IACxB,CAAC;IAED,gEAAgE;IAChE,sCAAsC;IACtC,OAAO,IAAI,CAAC;AACd,CAAC;AAED;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA0CG;AACH,SAAgB,gBAAgB,CAAI,IAAO,EAAE,MAAoC;IAC/E,OAAO,QAAQ,CAAC,IAAI,EAAE;QACpB,GAAG,mCAA2B;QAC9B,GAAG,MAAM;KACV,CAAC,CAAC;AACL,CAAC","sourcesContent":["import validator from 'validator';\n\n/**\n * Response Sanitization Utility\n *\n * Provides comprehensive sanitization for API responses to prevent XSS attacks\n * and other security vulnerabilities.\n *\n * Key Features:\n * - HTML entity escaping (always enabled, uses validator library)\n * - Control character removal (configurable)\n * - String length truncation (configurable)\n * - Deep object traversal (configurable depth)\n * - Type preservation (numbers, booleans, null remain unchanged)\n * - Non-destructive (returns new objects without mutating originals)\n *\n * @packageDocumentation\n */\n\n/**\n * Regular expression to match dangerous control characters\n *\n * Matches ASCII control characters (0x00-0x1F and 0x7F) EXCEPT:\n * - \\x09 (tab)\n * - \\x0A (newline)\n * - \\x0D (carriage return)\n *\n * Range breakdown:\n * - \\x00-\\x08: NULL to BACKSPACE\n * - \\x0B: Vertical Tab (skips \\x09 tab and \\x0A newline)\n * - \\x0C: Form Feed (skips \\x0D carriage return)\n * - \\x0E-\\x1F: Shift Out to Unit Separator\n * - \\x7F: DELETE\n *\n * These characters can cause issues in logs, APIs, and downstream systems.\n */\n// eslint-disable-next-line no-control-regex\nexport const CONTROL_CHARS_REGEX = /[\\x00-\\x08\\x0B\\x0C\\x0E-\\x1F\\x7F]/g;\n\n/**\n * Configuration for response sanitization\n *\n * This configuration controls how the sanitization utility processes data:\n * - HTML escaping is ALWAYS enabled (cannot be disabled for security)\n * - Control character removal is configurable\n * - String length limits are configurable\n * - Object depth limits are configurable\n */\nexport interface SanitizationConfig {\n  /**\n   * Remove dangerous control characters (0x00-0x1F, 0x7F)\n   * Preserves safe formatting characters: \\n (newline), \\r (carriage return), \\t (tab)\n   * @default true\n   */\n  removeControlChars: boolean;\n\n  /**\n   * Maximum string length before truncation (in characters)\n   * Prevents DOS attacks by limiting string size\n   * Set to 0 to disable truncation\n   * @default 10240\n   */\n  maxStringLength: number;\n\n  /**\n   * Maximum object depth to traverse\n   * Prevents stack overflow from deeply nested objects\n   * Objects deeper than this will be replaced with '[Max depth exceeded]'\n   * @default 50\n   */\n  maxDepth: number;\n}\n\n/**\n * Default sanitization configuration\n * Suitable for general-purpose API responses\n *\n * For specific use cases, create custom configs:\n * - Processor responses: { maxStringLength: 50000, maxDepth: 50, removeControlChars: true }\n * - Delivery responses: { maxStringLength: 20000, maxDepth: 30, removeControlChars: true }\n */\nexport const DEFAULT_SANITIZATION_CONFIG: SanitizationConfig = {\n  removeControlChars: true,\n  maxStringLength: 10240, // 10KB per string\n  maxDepth: 50,\n};\n\n/**\n * Sanitize a single string value\n *\n * Processing order:\n * 1. Remove control characters (if enabled)\n * 2. Escape HTML entities (always applied)\n * 3. Truncate if exceeds max length (if enabled)\n *\n * @param value - The string to sanitize\n * @param config - Sanitization configuration\n * @returns Sanitized string with HTML entities escaped\n * @private\n */\nfunction sanitizeString(value: string, config: SanitizationConfig): string {\n  if (typeof value !== 'string') {\n    return value;\n  }\n\n  let sanitized = value;\n\n  // Step 1: Remove control characters (except newline \\n, carriage return \\r, and tab \\t)\n  // Control characters (0x00-0x1F, 0x7F) can break logs and cause security issues\n  // We preserve \\n (0x0A), \\r (0x0D), \\t (0x09) for legitimate formatting\n  if (config.removeControlChars) {\n    sanitized = sanitized.replace(CONTROL_CHARS_REGEX, '');\n  }\n\n  // Step 2: Escape HTML entities to prevent XSS attacks\n  // This is ALWAYS applied regardless of config\n  // Uses validator.escape() which converts: < > \" ' & / to HTML entities\n  sanitized = validator.escape(sanitized);\n\n  // Step 3: Truncate long strings to prevent DOS attacks\n  // Adds '... [truncated]' suffix to indicate truncation\n  if (config.maxStringLength > 0 && sanitized.length > config.maxStringLength) {\n    sanitized = `${sanitized.substring(0, config.maxStringLength)}... [truncated]`;\n  }\n\n  return sanitized;\n}\n\n/**\n * Deep sanitize an object, array, or primitive value\n *\n * This function recursively processes data structures:\n * - Arrays: Sanitizes each element\n * - Objects: Sanitizes both keys and values\n * - Strings: Applies HTML escaping and other string sanitization\n * - Primitives: Returns as-is (numbers, booleans, null, undefined)\n *\n * @param data - The data to sanitize (any type)\n * @param config - Sanitization configuration (defaults to DEFAULT_SANITIZATION_CONFIG)\n * @param depth - Current recursion depth (internal use, starts at 0)\n * @returns Sanitized copy of the data\n *\n * @example Sanitize an object\n * ```typescript\n * const data = {\n *   user: '<script>xss</script>',\n *   count: 42,\n *   active: true\n * };\n * const clean = sanitize(data);\n * // Returns: { user: '&lt;script&gt;xss&lt;&#x2F;script&gt;', count: 42, active: true }\n * ```\n *\n * @example Sanitize an array\n * ```typescript\n * const data = ['<b>item1</b>', '<i>item2</i>'];\n * const clean = sanitize(data);\n * // Returns: ['&lt;b&gt;item1&lt;&#x2F;b&gt;', '&lt;i&gt;item2&lt;&#x2F;i&gt;']\n * ```\n */\nexport function sanitize<T>(\n  data: T,\n  config: SanitizationConfig = DEFAULT_SANITIZATION_CONFIG,\n  depth: number = 0,\n): T {\n  // Handle null and undefined - return as-is\n  if (data === null || data === undefined) {\n    return data;\n  }\n\n  // Prevent infinite recursion by checking depth limit\n  // Replaces deeply nested data with a warning string\n  if (depth > config.maxDepth) {\n    return '[Max depth exceeded]' as T;\n  }\n\n  // Handle arrays - recursively sanitize each element\n  if (Array.isArray(data)) {\n    return data.map((item) => sanitize(item, config, depth + 1)) as T;\n  }\n\n  // Handle strings - apply string-level sanitization\n  if (typeof data === 'string') {\n    return sanitizeString(data, config) as T;\n  }\n\n  // Handle objects - sanitize both keys and values\n  if (typeof data === 'object') {\n    const sanitized: Record<string, unknown> = {};\n\n    // eslint-disable-next-line no-restricted-syntax\n    for (const [key, value] of Object.entries(data)) {\n      // Sanitize the key itself to prevent malicious property names\n      const sanitizedKey = sanitizeString(key, config);\n\n      // Recursively sanitize the value, incrementing depth\n      sanitized[sanitizedKey] = sanitize(value, config, depth + 1);\n    }\n\n    return sanitized as T;\n  }\n\n  // Return primitives as-is (numbers, booleans, bigints, symbols)\n  // These types don't need sanitization\n  return data;\n}\n\n/**\n * Sanitize any response data to prevent XSS attacks and security vulnerabilities\n *\n * This is a convenience function that merges custom config with defaults.\n * For direct control, use the `sanitize` function directly.\n *\n * This function:\n * - Escapes HTML entities in all strings (ALWAYS, cannot be disabled)\n * - Removes dangerous control characters (configurable)\n * - Truncates overly long strings (configurable)\n * - Handles nested objects/arrays recursively\n * - Preserves data types (numbers, booleans, null)\n *\n * @param data - The data to sanitize (objects, arrays, primitives)\n * @param config - Optional partial configuration (merged with defaults)\n * @returns Sanitized copy of the data with same type\n *\n * @example Basic usage with defaults\n * ```typescript\n * const unsafe = { message: '<script>alert(\"xss\")</script>' };\n * const safe = sanitizeResponse(unsafe);\n * // Result: { message: '&lt;script&gt;alert(&quot;xss&quot;)&lt;&#x2F;script&gt;' }\n * ```\n *\n * @example Custom configuration for large payloads\n * ```typescript\n * const response = sanitizeResponse(processorData, {\n *   maxStringLength: 50000,\n *   maxDepth: 50,\n *   removeControlChars: true\n * });\n * ```\n *\n * @example In a Koa controller\n * ```typescript\n * export class Controller {\n *   async transform(ctx: Context) {\n *     const result = await transformData(ctx.request.body);\n *     ctx.body = sanitizeResponse(result);\n *   }\n * }\n * ```\n */\nexport function sanitizeResponse<T>(data: T, config?: Partial<SanitizationConfig>): T {\n  return sanitize(data, {\n    ...DEFAULT_SANITIZATION_CONFIG,\n    ...config,\n  });\n}\n"]}
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@rudderstack/integrations-lib",
|
|
3
|
-
"version": "0.2.
|
|
3
|
+
"version": "0.2.60",
|
|
4
4
|
"description": "",
|
|
5
5
|
"main": "build/index.js",
|
|
6
6
|
"module": "build/index.js",
|
|
@@ -55,11 +55,13 @@
|
|
|
55
55
|
"sqlstring": "^2.3.3",
|
|
56
56
|
"tslib": "^2.4.0",
|
|
57
57
|
"uuid": "^11.0.5",
|
|
58
|
+
"validator": "^13.15.26",
|
|
58
59
|
"winston": "^3.11.0",
|
|
59
60
|
"zod": "^3.24.2"
|
|
60
61
|
},
|
|
61
62
|
"devDependencies": {
|
|
62
63
|
"@commitlint/config-conventional": "^18.5.0",
|
|
64
|
+
"@linear/sdk": "^68.0.0",
|
|
63
65
|
"@types/get-value": "^3.0.3",
|
|
64
66
|
"@types/jest": "^29.5.4",
|
|
65
67
|
"@types/lodash": "^4.14.195",
|
|
@@ -67,6 +69,7 @@
|
|
|
67
69
|
"@types/set-value": "^4.0.1",
|
|
68
70
|
"@types/sha256": "^0.2.0",
|
|
69
71
|
"@types/sqlstring": "^2.3.2",
|
|
72
|
+
"@types/validator": "^13.15.10",
|
|
70
73
|
"@typescript-eslint/eslint-plugin": "^6.20.0",
|
|
71
74
|
"@typescript-eslint/parser": "^6.20.0",
|
|
72
75
|
"axios-mock-adapter": "^2.1.0",
|