@zintrust/core 0.1.48 → 0.1.49
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +1 -1
- package/app/Controllers/AuthController.d.ts.map +1 -1
- package/app/Controllers/AuthController.js +26 -4
- package/app/Middleware/index.d.ts.map +1 -1
- package/app/Middleware/index.js +3 -3
- package/app/Types/controller.d.ts +2 -0
- package/app/Types/controller.d.ts.map +1 -1
- package/app/Types/controller.js +1 -1
- package/package.json +1 -1
- package/routes/api.js +13 -6
- package/src/cli/CLI.d.ts.map +1 -1
- package/src/cli/CLI.js +2 -0
- package/src/cli/commands/AddCommand.js +2 -2
- package/src/cli/commands/BulletproofKeyGenerateCommand.d.ts +10 -0
- package/src/cli/commands/BulletproofKeyGenerateCommand.d.ts.map +1 -0
- package/src/cli/commands/BulletproofKeyGenerateCommand.js +139 -0
- package/src/cli/commands/JwtDevCommand.d.ts.map +1 -1
- package/src/cli/commands/JwtDevCommand.js +51 -32
- package/src/cli/scaffolding/ControllerGenerator.d.ts +1 -1
- package/src/cli/scaffolding/ControllerGenerator.d.ts.map +1 -1
- package/src/cli/scaffolding/ControllerGenerator.js +8 -79
- package/src/config/SecretsManager.d.ts +0 -1
- package/src/config/SecretsManager.d.ts.map +1 -1
- package/src/config/SecretsManager.js +0 -1
- package/src/config/middleware.d.ts +1 -0
- package/src/config/middleware.d.ts.map +1 -1
- package/src/config/middleware.js +3 -0
- package/src/http/error-pages/ErrorPageRenderer.js +7 -1
- package/src/index.d.ts +1 -0
- package/src/index.d.ts.map +1 -1
- package/src/index.js +4 -3
- package/src/middleware/BulletproofAuthMiddleware.d.ts +92 -0
- package/src/middleware/BulletproofAuthMiddleware.d.ts.map +1 -0
- package/src/middleware/BulletproofAuthMiddleware.js +421 -0
- package/src/middleware/CsrfMiddleware.d.ts +0 -1
- package/src/middleware/CsrfMiddleware.d.ts.map +1 -1
- package/src/middleware/CsrfMiddleware.js +8 -1
- package/src/middleware/JwtAuthMiddleware.d.ts.map +1 -1
- package/src/middleware/JwtAuthMiddleware.js +11 -5
- package/src/orm/Database.d.ts.map +1 -1
- package/src/orm/Database.js +48 -39
- package/src/orm/adapters/MySQLProxyAdapter.d.ts.map +1 -1
- package/src/orm/adapters/MySQLProxyAdapter.js +54 -35
- package/src/orm/adapters/PostgreSQLProxyAdapter.d.ts.map +1 -1
- package/src/orm/adapters/PostgreSQLProxyAdapter.js +126 -103
- package/src/orm/adapters/SqlProxyHttpAdapterShared.d.ts +30 -0
- package/src/orm/adapters/SqlProxyHttpAdapterShared.d.ts.map +1 -0
- package/src/orm/adapters/SqlProxyHttpAdapterShared.js +64 -0
- package/src/orm/adapters/SqlServerProxyAdapter.d.ts.map +1 -1
- package/src/orm/adapters/SqlServerProxyAdapter.js +54 -37
- package/src/orm/migrations/MigrationStore.d.ts.map +1 -1
- package/src/orm/migrations/MigrationStore.js +22 -1
- package/src/routes/doc.js +1 -1
- package/src/routes/errorPages.d.ts.map +1 -1
- package/src/routes/errorPages.js +9 -2
- package/src/security/CsrfTokenManager.d.ts.map +1 -1
- package/src/security/CsrfTokenManager.js +57 -23
- package/src/security/JwtManager.d.ts +4 -1
- package/src/security/JwtManager.d.ts.map +1 -1
- package/src/security/JwtManager.js +24 -10
- package/src/security/JwtSessions.d.ts +12 -0
- package/src/security/JwtSessions.d.ts.map +1 -0
- package/src/security/JwtSessions.js +556 -0
- package/src/security/NonceReplay.d.ts +24 -0
- package/src/security/NonceReplay.d.ts.map +1 -0
- package/src/security/NonceReplay.js +42 -0
- package/src/security/TokenRevocation.d.ts.map +1 -1
- package/src/security/TokenRevocation.js +1 -0
- package/src/tools/http/Http.d.ts +5 -0
- package/src/tools/http/Http.d.ts.map +1 -1
- package/src/tools/http/Http.js +25 -9
- package/src/tools/queue/QueueReliabilityOrchestrator.d.ts.map +1 -1
- package/src/tools/queue/QueueReliabilityOrchestrator.js +18 -6
- package/src/validation/Validator.d.ts.map +1 -1
- package/src/validation/Validator.js +4 -2
|
@@ -0,0 +1,421 @@
|
|
|
1
|
+
import { Env } from '../config/env.js';
|
|
2
|
+
import { Logger } from '../config/logger.js';
|
|
3
|
+
import { securityConfig } from '../config/security.js';
|
|
4
|
+
import { isMaxLength, isMinLength, isNonEmptyString } from '../helper/index.js';
|
|
5
|
+
import { RequestContext } from '../http/RequestContext.js';
|
|
6
|
+
import { JwtManager } from '../security/JwtManager.js';
|
|
7
|
+
import { JwtSessions } from '../security/JwtSessions.js';
|
|
8
|
+
import { NonceReplay } from '../security/NonceReplay.js';
|
|
9
|
+
import { SignedRequest } from '../security/SignedRequest.js';
|
|
10
|
+
const getHeaderString = (req, name) => {
|
|
11
|
+
const header = req.getHeader(name);
|
|
12
|
+
if (Array.isArray(header))
|
|
13
|
+
return typeof header[0] === 'string' ? header[0] : '';
|
|
14
|
+
return typeof header === 'string' ? header : '';
|
|
15
|
+
};
|
|
16
|
+
const getBearerToken = (authorizationHeader) => {
|
|
17
|
+
const trimmed = authorizationHeader.trim();
|
|
18
|
+
if (trimmed === '')
|
|
19
|
+
return null;
|
|
20
|
+
const [scheme, ...rest] = trimmed.split(/\s+/);
|
|
21
|
+
if (typeof scheme !== 'string' || scheme.toLowerCase() !== 'bearer')
|
|
22
|
+
return null;
|
|
23
|
+
const token = rest.join(' ').trim();
|
|
24
|
+
return token === '' ? null : token;
|
|
25
|
+
};
|
|
26
|
+
const pickOptionalStringClaim = (payload, keys) => {
|
|
27
|
+
const record = payload;
|
|
28
|
+
for (const key of keys) {
|
|
29
|
+
const value = record[key];
|
|
30
|
+
if (typeof value === 'string' && value.trim() !== '')
|
|
31
|
+
return value.trim();
|
|
32
|
+
}
|
|
33
|
+
return undefined;
|
|
34
|
+
};
|
|
35
|
+
const toBodyForSigning = (req) => {
|
|
36
|
+
const rawText = req.context?.['rawBodyText'];
|
|
37
|
+
if (typeof rawText === 'string')
|
|
38
|
+
return rawText;
|
|
39
|
+
const rawBytes = req.context?.['rawBodyBytes'];
|
|
40
|
+
if (rawBytes instanceof Uint8Array)
|
|
41
|
+
return rawBytes;
|
|
42
|
+
if (rawBytes instanceof ArrayBuffer)
|
|
43
|
+
return new Uint8Array(rawBytes);
|
|
44
|
+
return '';
|
|
45
|
+
};
|
|
46
|
+
const toUrlForSigning = (req) => {
|
|
47
|
+
const raw = req.getRaw?.();
|
|
48
|
+
const rawUrl = typeof raw?.url === 'string' ? raw.url : undefined;
|
|
49
|
+
const path = rawUrl ?? req.getPath?.() ?? '/';
|
|
50
|
+
try {
|
|
51
|
+
return new URL(path);
|
|
52
|
+
}
|
|
53
|
+
catch {
|
|
54
|
+
return new URL(path.startsWith('/') ? path : `/${path}`, 'http://localhost');
|
|
55
|
+
}
|
|
56
|
+
};
|
|
57
|
+
const markAuthContext = (req, ctx) => {
|
|
58
|
+
req.context ??= {};
|
|
59
|
+
req.context['auth'] = ctx;
|
|
60
|
+
req.context['authStrategy'] = 'bulletproof';
|
|
61
|
+
};
|
|
62
|
+
const respond401 = (res, message) => {
|
|
63
|
+
res.setStatus(401).json({ error: message });
|
|
64
|
+
};
|
|
65
|
+
const parseBulletproofHeaders = (params) => {
|
|
66
|
+
const deviceId = getHeaderString(params.req, params.deviceIdHeader).trim();
|
|
67
|
+
if (params.requireDeviceId) {
|
|
68
|
+
const ok = isNonEmptyString(deviceId) && isMaxLength(deviceId, 128);
|
|
69
|
+
if (!ok)
|
|
70
|
+
return { ok: false, message: 'Missing or invalid device id' };
|
|
71
|
+
}
|
|
72
|
+
const timezone = getHeaderString(params.req, params.timezoneHeader).trim();
|
|
73
|
+
if (params.requireTimezone) {
|
|
74
|
+
const ok = isNonEmptyString(timezone) && isMaxLength(timezone, 64);
|
|
75
|
+
if (!ok)
|
|
76
|
+
return { ok: false, message: 'Missing or invalid timezone' };
|
|
77
|
+
}
|
|
78
|
+
const signingHeaders = {
|
|
79
|
+
'x-zt-key-id': getHeaderString(params.req, 'x-zt-key-id').trim() || undefined,
|
|
80
|
+
'x-zt-timestamp': getHeaderString(params.req, 'x-zt-timestamp').trim() || undefined,
|
|
81
|
+
'x-zt-nonce': getHeaderString(params.req, 'x-zt-nonce').trim() || undefined,
|
|
82
|
+
'x-zt-body-sha256': getHeaderString(params.req, 'x-zt-body-sha256').trim() || undefined,
|
|
83
|
+
'x-zt-signature': getHeaderString(params.req, 'x-zt-signature').trim() || undefined,
|
|
84
|
+
};
|
|
85
|
+
return { ok: true, deviceId, timezone, signingHeaders };
|
|
86
|
+
};
|
|
87
|
+
const verifySignedRequest = async (params) => {
|
|
88
|
+
const baseParams = {
|
|
89
|
+
method: params.req.getMethod?.() ?? 'GET',
|
|
90
|
+
url: toUrlForSigning(params.req),
|
|
91
|
+
body: toBodyForSigning(params.req),
|
|
92
|
+
headers: params.signingHeaders,
|
|
93
|
+
nowMs: Date.now(),
|
|
94
|
+
windowMs: params.windowMs,
|
|
95
|
+
verifyNonce: async (keyId, nonce, ttlMs) => {
|
|
96
|
+
const ok = isNonEmptyString(nonce) && isMinLength(nonce, 8) && isMaxLength(nonce, 128);
|
|
97
|
+
if (!ok)
|
|
98
|
+
return false;
|
|
99
|
+
return params.verifyNonce(keyId, nonce, ttlMs);
|
|
100
|
+
},
|
|
101
|
+
};
|
|
102
|
+
const staticSecrets = params.staticSecrets
|
|
103
|
+
?.map((s) => (typeof s === 'string' ? s.trim() : ''))
|
|
104
|
+
.filter((s) => s !== '');
|
|
105
|
+
const signed = staticSecrets !== undefined && staticSecrets.length > 0
|
|
106
|
+
? await (async () => {
|
|
107
|
+
const attempts = await Promise.all(staticSecrets.map(async (secret) => SignedRequest.verify({
|
|
108
|
+
...baseParams,
|
|
109
|
+
getSecretForKeyId: () => secret,
|
|
110
|
+
})));
|
|
111
|
+
// Preserve preference order based on provided secret list.
|
|
112
|
+
for (const attempt of attempts) {
|
|
113
|
+
if (attempt.ok === true)
|
|
114
|
+
return attempt;
|
|
115
|
+
}
|
|
116
|
+
// If any attempt failed for a reason other than signature mismatch, return that.
|
|
117
|
+
for (const attempt of attempts) {
|
|
118
|
+
if (attempt.ok === false && attempt.code !== 'INVALID_SIGNATURE')
|
|
119
|
+
return attempt;
|
|
120
|
+
}
|
|
121
|
+
return { ok: false, code: 'INVALID_SIGNATURE', message: 'Invalid signature' };
|
|
122
|
+
})()
|
|
123
|
+
: await SignedRequest.verify({
|
|
124
|
+
...baseParams,
|
|
125
|
+
getSecretForKeyId: async (keyId) => {
|
|
126
|
+
const secretForKey = await params.getSecretForKeyId(keyId, params.req);
|
|
127
|
+
const normalized = typeof secretForKey === 'string' ? secretForKey.trim() : '';
|
|
128
|
+
return normalized === '' ? undefined : normalized;
|
|
129
|
+
},
|
|
130
|
+
});
|
|
131
|
+
if (!signed.ok) {
|
|
132
|
+
Logger.debug('Bulletproof auth signed-request verification failed', {
|
|
133
|
+
code: signed.code,
|
|
134
|
+
message: signed.message,
|
|
135
|
+
});
|
|
136
|
+
return { ok: false, message: 'Unauthorized' };
|
|
137
|
+
}
|
|
138
|
+
return {
|
|
139
|
+
ok: true,
|
|
140
|
+
keyId: signed.keyId,
|
|
141
|
+
timestampMs: signed.timestampMs,
|
|
142
|
+
nonce: signed.nonce,
|
|
143
|
+
};
|
|
144
|
+
};
|
|
145
|
+
const verifyJwtPayload = (params) => {
|
|
146
|
+
try {
|
|
147
|
+
return { ok: true, payload: params.jwt.verify(params.token, params.algorithm) };
|
|
148
|
+
}
|
|
149
|
+
catch (error) {
|
|
150
|
+
Logger.debug('Bulletproof auth JWT verification failed', {
|
|
151
|
+
algorithm: params.algorithm,
|
|
152
|
+
error: error instanceof Error ? error.message : String(error),
|
|
153
|
+
});
|
|
154
|
+
return { ok: false };
|
|
155
|
+
}
|
|
156
|
+
};
|
|
157
|
+
const enforceDeviceBindings = (params) => {
|
|
158
|
+
if (params.requireDeviceId && params.deviceId !== '' && params.deviceId !== params.keyId) {
|
|
159
|
+
return { ok: false, message: 'Device mismatch' };
|
|
160
|
+
}
|
|
161
|
+
if (params.requireDeviceClaimMatch) {
|
|
162
|
+
const claimedDevice = pickOptionalStringClaim(params.payload, params.deviceClaimKeys);
|
|
163
|
+
const mismatch = claimedDevice === undefined || (params.deviceId !== '' && claimedDevice !== params.deviceId);
|
|
164
|
+
if (mismatch)
|
|
165
|
+
return { ok: false, message: 'Device mismatch' };
|
|
166
|
+
}
|
|
167
|
+
return { ok: true };
|
|
168
|
+
};
|
|
169
|
+
const enforceTimezoneBindings = (params) => {
|
|
170
|
+
if (!params.requireTimezoneClaimMatch || params.timezone === '') {
|
|
171
|
+
return { ok: true };
|
|
172
|
+
}
|
|
173
|
+
const claimedTimezone = pickOptionalStringClaim(params.payload, params.timezoneClaimKeys);
|
|
174
|
+
if (claimedTimezone !== undefined && claimedTimezone !== params.timezone) {
|
|
175
|
+
return { ok: false, message: 'Timezone mismatch' };
|
|
176
|
+
}
|
|
177
|
+
return { ok: true };
|
|
178
|
+
};
|
|
179
|
+
const enforceUserAgentBindings = async (params) => {
|
|
180
|
+
if (!params.requireUserAgentHashMatch)
|
|
181
|
+
return { ok: true };
|
|
182
|
+
const claimedUaHash = pickOptionalStringClaim(params.payload, params.userAgentHashClaimKeys);
|
|
183
|
+
if (claimedUaHash === undefined)
|
|
184
|
+
return { ok: true };
|
|
185
|
+
const userAgent = getHeaderString(params.req, 'user-agent').trim();
|
|
186
|
+
const uaHash = await SignedRequest.sha256Hex(userAgent);
|
|
187
|
+
if (uaHash !== claimedUaHash) {
|
|
188
|
+
return { ok: false, message: 'User agent mismatch' };
|
|
189
|
+
}
|
|
190
|
+
return { ok: true };
|
|
191
|
+
};
|
|
192
|
+
const enforceJwtBindings = async (params) => {
|
|
193
|
+
const device = enforceDeviceBindings({
|
|
194
|
+
payload: params.payload,
|
|
195
|
+
deviceId: params.deviceId,
|
|
196
|
+
keyId: params.keyId,
|
|
197
|
+
requireDeviceId: params.requireDeviceId,
|
|
198
|
+
requireDeviceClaimMatch: params.requireDeviceClaimMatch,
|
|
199
|
+
deviceClaimKeys: params.deviceClaimKeys,
|
|
200
|
+
});
|
|
201
|
+
if (!device.ok)
|
|
202
|
+
return device;
|
|
203
|
+
const tz = enforceTimezoneBindings({
|
|
204
|
+
payload: params.payload,
|
|
205
|
+
timezone: params.timezone,
|
|
206
|
+
requireTimezoneClaimMatch: params.requireTimezoneClaimMatch,
|
|
207
|
+
timezoneClaimKeys: params.timezoneClaimKeys,
|
|
208
|
+
});
|
|
209
|
+
if (!tz.ok)
|
|
210
|
+
return tz;
|
|
211
|
+
return enforceUserAgentBindings({
|
|
212
|
+
req: params.req,
|
|
213
|
+
payload: params.payload,
|
|
214
|
+
requireUserAgentHashMatch: params.requireUserAgentHashMatch,
|
|
215
|
+
userAgentHashClaimKeys: params.userAgentHashClaimKeys,
|
|
216
|
+
});
|
|
217
|
+
};
|
|
218
|
+
const resolveJwtVerifier = (options) => {
|
|
219
|
+
const algorithm = options.algorithm ?? securityConfig.jwt.algorithm;
|
|
220
|
+
const secret = options.secret ?? securityConfig.jwt.secret;
|
|
221
|
+
const windowMs = options.windowMs ?? 60_000;
|
|
222
|
+
const jwt = JwtManager.create();
|
|
223
|
+
if (algorithm === 'HS256' || algorithm === 'HS512') {
|
|
224
|
+
jwt.setHmacSecret(secret);
|
|
225
|
+
}
|
|
226
|
+
return { algorithm, jwt, windowMs };
|
|
227
|
+
};
|
|
228
|
+
const resolveHeaderConfig = (options) => {
|
|
229
|
+
return {
|
|
230
|
+
deviceIdHeader: (options.deviceIdHeader ?? 'x-zt-device-id').toLowerCase(),
|
|
231
|
+
timezoneHeader: (options.timezoneHeader ?? 'x-zt-timezone').toLowerCase(),
|
|
232
|
+
requireDeviceId: options.requireDeviceId ?? true,
|
|
233
|
+
requireTimezone: options.requireTimezone ?? false,
|
|
234
|
+
};
|
|
235
|
+
};
|
|
236
|
+
const resolveClaimConfig = (options) => {
|
|
237
|
+
return {
|
|
238
|
+
requireDeviceClaimMatch: options.requireDeviceClaimMatch ?? true,
|
|
239
|
+
deviceClaimKeys: options.deviceClaimKeys ?? ['deviceId', 'device_id', 'did'],
|
|
240
|
+
requireTimezoneClaimMatch: options.requireTimezoneClaimMatch ?? true,
|
|
241
|
+
timezoneClaimKeys: options.timezoneClaimKeys ?? ['tz', 'timezone', 'timeZone'],
|
|
242
|
+
requireUserAgentHashMatch: options.requireUserAgentHashMatch ?? true,
|
|
243
|
+
userAgentHashClaimKeys: options.userAgentHashClaimKeys ?? ['uaHash', 'uah', 'userAgentHash'],
|
|
244
|
+
};
|
|
245
|
+
};
|
|
246
|
+
const parseBackupSecrets = (raw) => {
|
|
247
|
+
const value = raw.trim();
|
|
248
|
+
if (value === '')
|
|
249
|
+
return [];
|
|
250
|
+
// JSON array support: ["a","b"]
|
|
251
|
+
if (value.startsWith('[')) {
|
|
252
|
+
try {
|
|
253
|
+
const parsed = JSON.parse(value);
|
|
254
|
+
if (!Array.isArray(parsed))
|
|
255
|
+
return [];
|
|
256
|
+
return parsed
|
|
257
|
+
.filter((v) => typeof v === 'string')
|
|
258
|
+
.map((s) => s.trim())
|
|
259
|
+
.filter((s) => s !== '');
|
|
260
|
+
}
|
|
261
|
+
catch {
|
|
262
|
+
return [];
|
|
263
|
+
}
|
|
264
|
+
}
|
|
265
|
+
// Comma-separated support: a,b,c
|
|
266
|
+
return value
|
|
267
|
+
.split(',')
|
|
268
|
+
.map((s) => s.trim())
|
|
269
|
+
.filter((s) => s !== '');
|
|
270
|
+
};
|
|
271
|
+
const dedupeSecrets = (secrets) => {
|
|
272
|
+
const out = [];
|
|
273
|
+
const seen = new Set();
|
|
274
|
+
for (const secret of secrets) {
|
|
275
|
+
const trimmed = typeof secret === 'string' ? secret.trim() : '';
|
|
276
|
+
if (trimmed === '')
|
|
277
|
+
continue;
|
|
278
|
+
if (seen.has(trimmed))
|
|
279
|
+
continue;
|
|
280
|
+
seen.add(trimmed);
|
|
281
|
+
out.push(trimmed);
|
|
282
|
+
}
|
|
283
|
+
return out;
|
|
284
|
+
};
|
|
285
|
+
const resolveSigningConfig = (options) => {
|
|
286
|
+
const appKeyFallback = (Env.get('AUTH_KEY', '') || Env.get('APP_KEY', '')).trim();
|
|
287
|
+
const signingSecretFromEnv = Env.get('BULLETPROOF_SIGNING_SECRET', appKeyFallback).trim();
|
|
288
|
+
const signingSecret = (options.signingSecret ?? signingSecretFromEnv).trim();
|
|
289
|
+
const backupSecrets = parseBackupSecrets(Env.get('BULLETPROOF_SIGNING_SECRET_BK', ''));
|
|
290
|
+
const hasCustomResolver = typeof options.getSecretForKeyId === 'function';
|
|
291
|
+
const getSecretForKeyId = hasCustomResolver
|
|
292
|
+
? options.getSecretForKeyId
|
|
293
|
+
: (_keyId) => (signingSecret === '' ? undefined : signingSecret);
|
|
294
|
+
const verifyNonce = options.verifyNonce ?? NonceReplay.createMemoryVerifier();
|
|
295
|
+
const staticSigningSecrets = hasCustomResolver
|
|
296
|
+
? undefined
|
|
297
|
+
: dedupeSecrets([signingSecret, ...backupSecrets]);
|
|
298
|
+
return { getSecretForKeyId, verifyNonce, staticSigningSecrets };
|
|
299
|
+
};
|
|
300
|
+
const resolveBulletproof = (options) => {
|
|
301
|
+
return {
|
|
302
|
+
...resolveJwtVerifier(options),
|
|
303
|
+
...resolveHeaderConfig(options),
|
|
304
|
+
...resolveClaimConfig(options),
|
|
305
|
+
...resolveSigningConfig(options),
|
|
306
|
+
};
|
|
307
|
+
};
|
|
308
|
+
const getTokenOrFail = (req) => {
|
|
309
|
+
const authorizationHeader = getHeaderString(req, 'authorization');
|
|
310
|
+
if (authorizationHeader === '')
|
|
311
|
+
return { ok: false, message: 'Missing authorization header' };
|
|
312
|
+
const token = getBearerToken(authorizationHeader);
|
|
313
|
+
if (token === null)
|
|
314
|
+
return { ok: false, message: 'Invalid authorization header format' };
|
|
315
|
+
return { ok: true, token };
|
|
316
|
+
};
|
|
317
|
+
const authenticate = async (params) => {
|
|
318
|
+
const tokenResult = getTokenOrFail(params.req);
|
|
319
|
+
if (!tokenResult.ok)
|
|
320
|
+
return tokenResult;
|
|
321
|
+
const parsed = parseBulletproofHeaders({
|
|
322
|
+
req: params.req,
|
|
323
|
+
deviceIdHeader: params.resolved.deviceIdHeader,
|
|
324
|
+
timezoneHeader: params.resolved.timezoneHeader,
|
|
325
|
+
requireDeviceId: params.resolved.requireDeviceId,
|
|
326
|
+
requireTimezone: params.resolved.requireTimezone,
|
|
327
|
+
});
|
|
328
|
+
if (!parsed.ok)
|
|
329
|
+
return { ok: false, message: parsed.message };
|
|
330
|
+
const signed = await verifySignedRequest({
|
|
331
|
+
req: params.req,
|
|
332
|
+
signingHeaders: parsed.signingHeaders,
|
|
333
|
+
windowMs: params.resolved.windowMs,
|
|
334
|
+
verifyNonce: params.resolved.verifyNonce,
|
|
335
|
+
getSecretForKeyId: params.resolved.getSecretForKeyId,
|
|
336
|
+
staticSecrets: params.resolved.staticSigningSecrets,
|
|
337
|
+
});
|
|
338
|
+
if (!signed.ok)
|
|
339
|
+
return { ok: false, message: signed.message };
|
|
340
|
+
const jwtResult = verifyJwtPayload({
|
|
341
|
+
jwt: params.resolved.jwt,
|
|
342
|
+
token: tokenResult.token,
|
|
343
|
+
algorithm: params.resolved.algorithm,
|
|
344
|
+
});
|
|
345
|
+
if (!jwtResult.ok)
|
|
346
|
+
return { ok: false, message: 'Invalid or expired token' };
|
|
347
|
+
// Session allowlist: token must exist in the sessions store to be accepted.
|
|
348
|
+
if (!(await JwtSessions.isActive(tokenResult.token))) {
|
|
349
|
+
return { ok: false, message: 'Invalid or expired token' };
|
|
350
|
+
}
|
|
351
|
+
const binding = await enforceJwtBindings({
|
|
352
|
+
req: params.req,
|
|
353
|
+
payload: jwtResult.payload,
|
|
354
|
+
deviceId: parsed.deviceId,
|
|
355
|
+
timezone: parsed.timezone,
|
|
356
|
+
keyId: signed.keyId,
|
|
357
|
+
requireDeviceId: params.resolved.requireDeviceId,
|
|
358
|
+
requireDeviceClaimMatch: params.resolved.requireDeviceClaimMatch,
|
|
359
|
+
deviceClaimKeys: params.resolved.deviceClaimKeys,
|
|
360
|
+
requireTimezoneClaimMatch: params.resolved.requireTimezoneClaimMatch,
|
|
361
|
+
timezoneClaimKeys: params.resolved.timezoneClaimKeys,
|
|
362
|
+
requireUserAgentHashMatch: params.resolved.requireUserAgentHashMatch,
|
|
363
|
+
userAgentHashClaimKeys: params.resolved.userAgentHashClaimKeys,
|
|
364
|
+
});
|
|
365
|
+
if (!binding.ok)
|
|
366
|
+
return { ok: false, message: binding.message };
|
|
367
|
+
return {
|
|
368
|
+
ok: true,
|
|
369
|
+
token: tokenResult.token,
|
|
370
|
+
payload: jwtResult.payload,
|
|
371
|
+
parsed,
|
|
372
|
+
signed,
|
|
373
|
+
};
|
|
374
|
+
};
|
|
375
|
+
const attachAuth = (req, result) => {
|
|
376
|
+
req.user = result.payload;
|
|
377
|
+
if (typeof result.payload.sub === 'string' && result.payload.sub.trim() !== '') {
|
|
378
|
+
RequestContext.setUserId(req, result.payload.sub);
|
|
379
|
+
}
|
|
380
|
+
const anyPayload = result.payload;
|
|
381
|
+
const tenantId = anyPayload['tenantId'] ?? anyPayload['tenant_id'];
|
|
382
|
+
if ((typeof tenantId === 'string' && tenantId.trim() !== '') ||
|
|
383
|
+
(typeof tenantId === 'number' && Number.isFinite(tenantId))) {
|
|
384
|
+
RequestContext.setTenantId(req, String(tenantId));
|
|
385
|
+
}
|
|
386
|
+
markAuthContext(req, {
|
|
387
|
+
strategy: 'bulletproof',
|
|
388
|
+
deviceId: result.parsed.deviceId === '' ? result.signed.keyId : result.parsed.deviceId,
|
|
389
|
+
keyId: result.signed.keyId,
|
|
390
|
+
signedRequest: {
|
|
391
|
+
timestampMs: result.signed.timestampMs,
|
|
392
|
+
nonce: result.signed.nonce,
|
|
393
|
+
},
|
|
394
|
+
});
|
|
395
|
+
if (result.parsed.timezone !== '') {
|
|
396
|
+
req.context ??= {};
|
|
397
|
+
req.context['timezone'] = result.parsed.timezone;
|
|
398
|
+
}
|
|
399
|
+
};
|
|
400
|
+
const createHandler = (resolved) => {
|
|
401
|
+
return async (req, res, next) => {
|
|
402
|
+
if (req.context?.['authStrategy'] === 'bulletproof' && req.user !== undefined) {
|
|
403
|
+
await next();
|
|
404
|
+
return;
|
|
405
|
+
}
|
|
406
|
+
const result = await authenticate({ req, resolved });
|
|
407
|
+
if (!result.ok) {
|
|
408
|
+
respond401(res, result.message);
|
|
409
|
+
return;
|
|
410
|
+
}
|
|
411
|
+
attachAuth(req, result);
|
|
412
|
+
await next();
|
|
413
|
+
};
|
|
414
|
+
};
|
|
415
|
+
export const BulletproofAuthMiddleware = Object.freeze({
|
|
416
|
+
create(options = {}) {
|
|
417
|
+
const resolved = resolveBulletproof(options);
|
|
418
|
+
return createHandler(resolved);
|
|
419
|
+
},
|
|
420
|
+
});
|
|
421
|
+
export default BulletproofAuthMiddleware;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"CsrfMiddleware.d.ts","sourceRoot":"","sources":["../../../src/middleware/CsrfMiddleware.ts"],"names":[],"mappings":"AAAA;;;;GAIG;AAKH,OAAO,KAAK,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AAK9D,MAAM,WAAW,WAAW;IAC1B,UAAU,CAAC,EAAE,MAAM,CAAC;IACpB,UAAU,CAAC,EAAE,MAAM,CAAC;IACpB,OAAO,CAAC,EAAE,MAAM,CAAC;IACjB,aAAa,CAAC,EAAE,MAAM,EAAE,CAAC;IACzB
|
|
1
|
+
{"version":3,"file":"CsrfMiddleware.d.ts","sourceRoot":"","sources":["../../../src/middleware/CsrfMiddleware.ts"],"names":[],"mappings":"AAAA;;;;GAIG;AAKH,OAAO,KAAK,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AAK9D,MAAM,WAAW,WAAW;IAC1B,UAAU,CAAC,EAAE,MAAM,CAAC;IACpB,UAAU,CAAC,EAAE,MAAM,CAAC;IACpB,OAAO,CAAC,EAAE,MAAM,CAAC;IACjB,aAAa,CAAC,EAAE,MAAM,EAAE,CAAC;IACzB;;;;;;;OAOG;IACH,SAAS,CAAC,EAAE,MAAM,EAAE,CAAC;CACtB;AAkDD,eAAO,MAAM,cAAc;IACzB;;OAEG;qBACa,WAAW,GAAQ,UAAU;EA6D7C,CAAC"}
|
|
@@ -18,6 +18,13 @@ const DEFAULT_OPTIONS = {
|
|
|
18
18
|
const canUseWeakRef = typeof WeakRef === 'function';
|
|
19
19
|
const managerRegistry = new Set();
|
|
20
20
|
let globalCleanupTimer = null;
|
|
21
|
+
let sharedSessionManager = null;
|
|
22
|
+
const getSharedSessionManager = () => {
|
|
23
|
+
if (sharedSessionManager !== null)
|
|
24
|
+
return sharedSessionManager;
|
|
25
|
+
sharedSessionManager = SessionManager.create();
|
|
26
|
+
return sharedSessionManager;
|
|
27
|
+
};
|
|
21
28
|
const ensureCleanupTimer = () => {
|
|
22
29
|
if (globalCleanupTimer !== null)
|
|
23
30
|
return;
|
|
@@ -52,7 +59,7 @@ export const CsrfMiddleware = Object.freeze({
|
|
|
52
59
|
create(options = {}) {
|
|
53
60
|
const config = { ...DEFAULT_OPTIONS, ...options };
|
|
54
61
|
const manager = CsrfTokenManager.create();
|
|
55
|
-
const sessions =
|
|
62
|
+
const sessions = getSharedSessionManager();
|
|
56
63
|
ensureCleanupTimer();
|
|
57
64
|
// Register for global cleanup instead of creating a local timer
|
|
58
65
|
if (canUseWeakRef) {
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"JwtAuthMiddleware.d.ts","sourceRoot":"","sources":["../../../src/middleware/JwtAuthMiddleware.ts"],"names":[],"mappings":"AAKA,OAAO,KAAK,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AAC9D,OAAO,KAAK,EAAe,YAAY,EAAE,MAAM,sBAAsB,CAAC;AAItE,MAAM,WAAW,cAAc;IAC7B,SAAS,CAAC,EAAE,YAAY,CAAC;IACzB,MAAM,CAAC,EAAE,MAAM,CAAC;CACjB;AA4BD,eAAO,MAAM,iBAAiB;qBACZ,cAAc,GAAQ,UAAU;
|
|
1
|
+
{"version":3,"file":"JwtAuthMiddleware.d.ts","sourceRoot":"","sources":["../../../src/middleware/JwtAuthMiddleware.ts"],"names":[],"mappings":"AAKA,OAAO,KAAK,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AAC9D,OAAO,KAAK,EAAe,YAAY,EAAE,MAAM,sBAAsB,CAAC;AAItE,MAAM,WAAW,cAAc;IAC7B,SAAS,CAAC,EAAE,YAAY,CAAC;IACzB,MAAM,CAAC,EAAE,MAAM,CAAC;CACjB;AA4BD,eAAO,MAAM,iBAAiB;qBACZ,cAAc,GAAQ,UAAU;EAoEhD,CAAC;AAEH,eAAe,iBAAiB,CAAC"}
|
|
@@ -2,7 +2,7 @@ import { Logger } from '../config/logger.js';
|
|
|
2
2
|
import { securityConfig } from '../config/security.js';
|
|
3
3
|
import { RequestContext } from '../http/RequestContext.js';
|
|
4
4
|
import { JwtManager } from '../security/JwtManager.js';
|
|
5
|
-
import {
|
|
5
|
+
import { JwtSessions } from '../security/JwtSessions.js';
|
|
6
6
|
const getHeaderValue = (value) => {
|
|
7
7
|
if (Array.isArray(value))
|
|
8
8
|
return typeof value[0] === 'string' ? value[0] : '';
|
|
@@ -37,6 +37,11 @@ export const JwtAuthMiddleware = Object.freeze({
|
|
|
37
37
|
jwt.setHmacSecret(secret);
|
|
38
38
|
}
|
|
39
39
|
return async (req, res, next) => {
|
|
40
|
+
// If a stronger auth strategy already authenticated this request, do not re-verify.
|
|
41
|
+
if (req.context?.['authStrategy'] === 'bulletproof' && req.user !== undefined) {
|
|
42
|
+
await next();
|
|
43
|
+
return;
|
|
44
|
+
}
|
|
40
45
|
const authorizationHeader = getHeaderValue(req.getHeader('authorization'));
|
|
41
46
|
if (authorizationHeader === '') {
|
|
42
47
|
res.setStatus(401).json({ error: 'Missing authorization header' });
|
|
@@ -47,12 +52,13 @@ export const JwtAuthMiddleware = Object.freeze({
|
|
|
47
52
|
res.setStatus(401).json({ error: 'Invalid authorization header format' });
|
|
48
53
|
return;
|
|
49
54
|
}
|
|
50
|
-
if (await TokenRevocation.isRevoked(token)) {
|
|
51
|
-
res.setStatus(401).json({ error: 'Invalid or expired token' });
|
|
52
|
-
return;
|
|
53
|
-
}
|
|
54
55
|
try {
|
|
55
56
|
const payload = jwt.verify(token, algorithm);
|
|
57
|
+
// Session allowlist: token must exist in the session store to be accepted.
|
|
58
|
+
if (!(await JwtSessions.isActive(token))) {
|
|
59
|
+
res.setStatus(401).json({ error: 'Invalid or expired token' });
|
|
60
|
+
return;
|
|
61
|
+
}
|
|
56
62
|
req.user = payload;
|
|
57
63
|
// Standardize request-scoped context fields.
|
|
58
64
|
if (typeof payload.sub === 'string' && payload.sub.trim() !== '') {
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"Database.d.ts","sourceRoot":"","sources":["../../../src/orm/Database.ts"],"names":[],"mappings":"AAAA;;;GAGG;AAOH,OAAO,KAAK,EAAE,eAAe,EAAE,MAAM,kBAAkB,CAAC;AAWxD,OAAO,KAAK,EAAE,cAAc,EAAE,gBAAgB,EAAE,WAAW,EAAE,MAAM,sBAAsB,CAAC;AAE1F,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,mBAAmB,CAAC;AAGvD,MAAM,MAAM,QAAQ,GAAG;IAAE,KAAK,EAAE,MAAM,CAAA;CAAE,CAAC;AAEzC,MAAM,WAAW,SAAS;IACxB,OAAO,IAAI,OAAO,CAAC,IAAI,CAAC,CAAC;IACzB,UAAU,IAAI,OAAO,CAAC,IAAI,CAAC,CAAC;IAC5B,WAAW,IAAI,OAAO,CAAC;IACvB,KAAK,CAAC,GAAG,EAAE,MAAM,EAAE,UAAU,CAAC,EAAE,OAAO,EAAE,EAAE,MAAM,CAAC,EAAE,OAAO,GAAG,OAAO,CAAC,OAAO,EAAE,CAAC,CAAC;IACjF,QAAQ,CAAC,GAAG,EAAE,MAAM,EAAE,UAAU,CAAC,EAAE,OAAO,EAAE,EAAE,MAAM,CAAC,EAAE,OAAO,GAAG,OAAO,CAAC,OAAO,CAAC,CAAC;IAClF,OAAO,CAAC,GAAG,EAAE,MAAM,EAAE,UAAU,CAAC,EAAE,OAAO,EAAE,EAAE,MAAM,CAAC,EAAE,OAAO,GAAG,OAAO,CAAC,WAAW,CAAC,CAAC;IACrF,GAAG,CAAC,KAAK,EAAE,MAAM,GAAG,QAAQ,CAAC;IAC7B,WAAW,CAAC,CAAC,EAAE,QAAQ,EAAE,CAAC,EAAE,EAAE,SAAS,KAAK,OAAO,CAAC,CAAC,CAAC,GAAG,OAAO,CAAC,CAAC,CAAC,CAAC;IACpE,KAAK,CAAC,IAAI,EAAE,MAAM,GAAG,aAAa,CAAC;IACnC,aAAa,CAAC,OAAO,EAAE,CAAC,KAAK,EAAE,MAAM,EAAE,MAAM,EAAE,OAAO,EAAE,KAAK,IAAI,GAAG,IAAI,CAAC;IACzE,YAAY,CAAC,OAAO,EAAE,CAAC,KAAK,EAAE,MAAM,EAAE,MAAM,EAAE,OAAO,EAAE,EAAE,QAAQ,EAAE,MAAM,KAAK,IAAI,GAAG,IAAI,CAAC;IAC1F,cAAc,CAAC,OAAO,EAAE,CAAC,KAAK,EAAE,MAAM,EAAE,MAAM,EAAE,OAAO,EAAE,KAAK,IAAI,GAAG,IAAI,CAAC;IAC1E,aAAa,CAAC,OAAO,EAAE,CAAC,KAAK,EAAE,MAAM,EAAE,MAAM,EAAE,OAAO,EAAE,EAAE,QAAQ,EAAE,MAAM,KAAK,IAAI,GAAG,IAAI,CAAC;IAC3F,kBAAkB,CAAC,MAAM,CAAC,EAAE,OAAO,GAAG,gBAAgB,CAAC;IACvD,OAAO,IAAI,eAAe,CAAC;IAC3B,SAAS,IAAI,cAAc,CAAC;IAC5B,OAAO,IAAI,IAAI,CAAC;CACjB;
|
|
1
|
+
{"version":3,"file":"Database.d.ts","sourceRoot":"","sources":["../../../src/orm/Database.ts"],"names":[],"mappings":"AAAA;;;GAGG;AAOH,OAAO,KAAK,EAAE,eAAe,EAAE,MAAM,kBAAkB,CAAC;AAWxD,OAAO,KAAK,EAAE,cAAc,EAAE,gBAAgB,EAAE,WAAW,EAAE,MAAM,sBAAsB,CAAC;AAE1F,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,mBAAmB,CAAC;AAGvD,MAAM,MAAM,QAAQ,GAAG;IAAE,KAAK,EAAE,MAAM,CAAA;CAAE,CAAC;AAEzC,MAAM,WAAW,SAAS;IACxB,OAAO,IAAI,OAAO,CAAC,IAAI,CAAC,CAAC;IACzB,UAAU,IAAI,OAAO,CAAC,IAAI,CAAC,CAAC;IAC5B,WAAW,IAAI,OAAO,CAAC;IACvB,KAAK,CAAC,GAAG,EAAE,MAAM,EAAE,UAAU,CAAC,EAAE,OAAO,EAAE,EAAE,MAAM,CAAC,EAAE,OAAO,GAAG,OAAO,CAAC,OAAO,EAAE,CAAC,CAAC;IACjF,QAAQ,CAAC,GAAG,EAAE,MAAM,EAAE,UAAU,CAAC,EAAE,OAAO,EAAE,EAAE,MAAM,CAAC,EAAE,OAAO,GAAG,OAAO,CAAC,OAAO,CAAC,CAAC;IAClF,OAAO,CAAC,GAAG,EAAE,MAAM,EAAE,UAAU,CAAC,EAAE,OAAO,EAAE,EAAE,MAAM,CAAC,EAAE,OAAO,GAAG,OAAO,CAAC,WAAW,CAAC,CAAC;IACrF,GAAG,CAAC,KAAK,EAAE,MAAM,GAAG,QAAQ,CAAC;IAC7B,WAAW,CAAC,CAAC,EAAE,QAAQ,EAAE,CAAC,EAAE,EAAE,SAAS,KAAK,OAAO,CAAC,CAAC,CAAC,GAAG,OAAO,CAAC,CAAC,CAAC,CAAC;IACpE,KAAK,CAAC,IAAI,EAAE,MAAM,GAAG,aAAa,CAAC;IACnC,aAAa,CAAC,OAAO,EAAE,CAAC,KAAK,EAAE,MAAM,EAAE,MAAM,EAAE,OAAO,EAAE,KAAK,IAAI,GAAG,IAAI,CAAC;IACzE,YAAY,CAAC,OAAO,EAAE,CAAC,KAAK,EAAE,MAAM,EAAE,MAAM,EAAE,OAAO,EAAE,EAAE,QAAQ,EAAE,MAAM,KAAK,IAAI,GAAG,IAAI,CAAC;IAC1F,cAAc,CAAC,OAAO,EAAE,CAAC,KAAK,EAAE,MAAM,EAAE,MAAM,EAAE,OAAO,EAAE,KAAK,IAAI,GAAG,IAAI,CAAC;IAC1E,aAAa,CAAC,OAAO,EAAE,CAAC,KAAK,EAAE,MAAM,EAAE,MAAM,EAAE,OAAO,EAAE,EAAE,QAAQ,EAAE,MAAM,KAAK,IAAI,GAAG,IAAI,CAAC;IAC3F,kBAAkB,CAAC,MAAM,CAAC,EAAE,OAAO,GAAG,gBAAgB,CAAC;IACvD,OAAO,IAAI,eAAe,CAAC;IAC3B,SAAS,IAAI,cAAc,CAAC;IAC5B,OAAO,IAAI,IAAI,CAAC;CACjB;AAghBD,eAAO,MAAM,QAAQ;IACnB;;OAEG;oBACa,cAAc,GAAG,SAAS;EAI1C,CAAC;AAIH,eAAO,MAAM,oBAAoB,GAC/B,SAAQ,cAAc,GAAG,SAAqB,EAC9C,uBAA0B,KACzB,OAAO,CAAC,UAAU,CAAC,OAAO,WAAW,CAAC,CAMxC,CAAC;AAEF,wBAAgB,WAAW,CAAC,MAAM,CAAC,EAAE,cAAc,EAAE,UAAU,SAAY,GAAG,SAAS,CAoBtF;AAED,wBAAsB,aAAa,IAAI,OAAO,CAAC,IAAI,CAAC,CAWnD"}
|
package/src/orm/Database.js
CHANGED
|
@@ -31,52 +31,64 @@ const resolveMySqlProxyAdapter = (cfg) => {
|
|
|
31
31
|
return null;
|
|
32
32
|
const proxyUrl = Env.get('MYSQL_PROXY_URL', '').trim();
|
|
33
33
|
const useProxy = Env.getBool('USE_MYSQL_PROXY', false);
|
|
34
|
-
if (useProxy
|
|
35
|
-
|
|
34
|
+
if (!useProxy)
|
|
35
|
+
return null;
|
|
36
|
+
if (proxyUrl.length === 0) {
|
|
37
|
+
Logger.warn('[Database] USE_MYSQL_PROXY enabled but MYSQL_PROXY_URL is empty', {
|
|
36
38
|
driver: cfg.driver,
|
|
37
|
-
useMySqlProxy: useProxy,
|
|
38
|
-
mysqlProxyUrlConfigured: proxyUrl.length > 0,
|
|
39
|
-
mysqlProxyUrl: proxyUrl,
|
|
40
39
|
});
|
|
41
|
-
return MySQLProxyAdapter.create(cfg);
|
|
42
40
|
}
|
|
43
|
-
|
|
41
|
+
Logger.info('[Database] Selecting MySQL proxy adapter', {
|
|
42
|
+
driver: cfg.driver,
|
|
43
|
+
useMySqlProxy: useProxy,
|
|
44
|
+
mysqlProxyUrlConfigured: proxyUrl.length > 0,
|
|
45
|
+
mysqlProxyUrl: proxyUrl,
|
|
46
|
+
});
|
|
47
|
+
return MySQLProxyAdapter.create(cfg);
|
|
44
48
|
};
|
|
45
49
|
const resolvePostgresProxyAdapter = (cfg) => {
|
|
46
50
|
if (cfg.driver !== 'postgresql')
|
|
47
51
|
return null;
|
|
48
52
|
const proxyUrl = Env.get('POSTGRES_PROXY_URL', '').trim();
|
|
49
53
|
const useProxy = Env.getBool('USE_POSTGRES_PROXY', false);
|
|
50
|
-
if (useProxy
|
|
51
|
-
|
|
54
|
+
if (!useProxy)
|
|
55
|
+
return null;
|
|
56
|
+
if (proxyUrl.length === 0) {
|
|
57
|
+
Logger.warn('[Database] USE_POSTGRES_PROXY enabled but POSTGRES_PROXY_URL is empty', {
|
|
52
58
|
driver: cfg.driver,
|
|
53
|
-
usePostgresProxy: useProxy,
|
|
54
|
-
postgresProxyUrlConfigured: proxyUrl.length > 0,
|
|
55
|
-
postgresProxyUrl: proxyUrl,
|
|
56
59
|
});
|
|
57
|
-
return PostgreSQLProxyAdapter.create(cfg);
|
|
58
60
|
}
|
|
59
|
-
|
|
61
|
+
Logger.info('[Database] Selecting PostgreSQL proxy adapter', {
|
|
62
|
+
driver: cfg.driver,
|
|
63
|
+
usePostgresProxy: useProxy,
|
|
64
|
+
postgresProxyUrlConfigured: proxyUrl.length > 0,
|
|
65
|
+
postgresProxyUrl: proxyUrl,
|
|
66
|
+
});
|
|
67
|
+
return PostgreSQLProxyAdapter.create(cfg);
|
|
60
68
|
};
|
|
61
69
|
const resolveSqlServerProxyAdapter = (cfg) => {
|
|
62
70
|
if (cfg.driver !== 'sqlserver')
|
|
63
71
|
return null;
|
|
64
72
|
const proxyUrl = Env.get('SQLSERVER_PROXY_URL', '').trim();
|
|
65
73
|
const useProxy = Env.getBool('USE_SQLSERVER_PROXY', false);
|
|
66
|
-
if (useProxy
|
|
67
|
-
|
|
74
|
+
if (!useProxy)
|
|
75
|
+
return null;
|
|
76
|
+
if (proxyUrl.length === 0) {
|
|
77
|
+
Logger.warn('[Database] USE_SQLSERVER_PROXY enabled but SQLSERVER_PROXY_URL is empty', {
|
|
68
78
|
driver: cfg.driver,
|
|
69
|
-
useSqlServerProxy: useProxy,
|
|
70
|
-
sqlServerProxyUrlConfigured: proxyUrl.length > 0,
|
|
71
|
-
sqlServerProxyUrl: proxyUrl,
|
|
72
79
|
});
|
|
73
|
-
return createSqlServerProxyAdapter();
|
|
74
80
|
}
|
|
75
|
-
|
|
81
|
+
Logger.info('[Database] Selecting SQL Server proxy adapter', {
|
|
82
|
+
driver: cfg.driver,
|
|
83
|
+
useSqlServerProxy: useProxy,
|
|
84
|
+
sqlServerProxyUrlConfigured: proxyUrl.length > 0,
|
|
85
|
+
sqlServerProxyUrl: proxyUrl,
|
|
86
|
+
});
|
|
87
|
+
return createSqlServerProxyAdapter();
|
|
76
88
|
};
|
|
77
89
|
const resolveExplicitProxyAdapter = (cfg) => {
|
|
78
90
|
// Allow proxy adapters to be forced in any runtime (Node or Workers) when
|
|
79
|
-
// the feature flags
|
|
91
|
+
// the feature flags are enabled.
|
|
80
92
|
const mysqlProxy = resolveMySqlProxyAdapter(cfg);
|
|
81
93
|
if (mysqlProxy)
|
|
82
94
|
return mysqlProxy;
|
|
@@ -266,45 +278,42 @@ const createConnectionHandlers = (writeAdapter, readAdapters, connected, connect
|
|
|
266
278
|
* Create query handlers
|
|
267
279
|
*/
|
|
268
280
|
const createQueryHandlers = (writeAdapter, _readAdapters, eventEmitter, connected, db, getAdapter) => {
|
|
281
|
+
let registryChecked = false;
|
|
282
|
+
const assertRegistryReady = () => {
|
|
283
|
+
if (registryChecked)
|
|
284
|
+
return;
|
|
285
|
+
registryChecked = true;
|
|
286
|
+
const registry = DatabaseAdapterRegistry.list();
|
|
287
|
+
if (registry.length === 0) {
|
|
288
|
+
throw ErrorFactory.createConfigError('No database adapters are registered. Call DatabaseAdapterRegistry.register() during startup to register database adapters.');
|
|
289
|
+
}
|
|
290
|
+
};
|
|
269
291
|
return {
|
|
270
292
|
async query(sql, parameters = [], isRead = false) {
|
|
271
293
|
if (connected.value === false)
|
|
272
294
|
await db.connect();
|
|
273
295
|
const adapter = getAdapter(isRead);
|
|
274
|
-
|
|
275
|
-
// Validate that database adapters are registered
|
|
276
|
-
if (registry.length === 0) {
|
|
277
|
-
throw ErrorFactory.createConfigError('No database adapters are registered. Call DatabaseAdapterRegistry.register() during startup to register database adapters.');
|
|
278
|
-
}
|
|
296
|
+
assertRegistryReady();
|
|
279
297
|
return executeQuery(adapter, eventEmitter, sql, parameters, 'query');
|
|
280
298
|
},
|
|
281
299
|
async queryOne(sql, parameters = [], isRead = false) {
|
|
282
300
|
if (connected.value === false)
|
|
283
301
|
await db.connect();
|
|
284
302
|
const adapter = getAdapter(isRead);
|
|
285
|
-
|
|
286
|
-
if (DatabaseAdapterRegistry.list().length === 0) {
|
|
287
|
-
throw ErrorFactory.createConfigError('No database adapters are registered. Call DatabaseAdapterRegistry.register() during startup to register database adapters.');
|
|
288
|
-
}
|
|
303
|
+
assertRegistryReady();
|
|
289
304
|
return executeQueryOne(adapter, eventEmitter, sql, parameters);
|
|
290
305
|
},
|
|
291
306
|
async execute(sql, parameters = [], isRead = false) {
|
|
292
307
|
if (connected.value === false)
|
|
293
308
|
await db.connect();
|
|
294
309
|
const adapter = getAdapter(isRead);
|
|
295
|
-
|
|
296
|
-
if (DatabaseAdapterRegistry.list().length === 0) {
|
|
297
|
-
throw ErrorFactory.createConfigError('No database adapters are registered. Call DatabaseAdapterRegistry.register() during startup to register database adapters.');
|
|
298
|
-
}
|
|
310
|
+
assertRegistryReady();
|
|
299
311
|
return executeFullQuery(adapter, eventEmitter, sql, parameters);
|
|
300
312
|
},
|
|
301
313
|
async transaction(callback) {
|
|
302
314
|
if (connected.value === false)
|
|
303
315
|
await db.connect();
|
|
304
|
-
|
|
305
|
-
if (DatabaseAdapterRegistry.list().length === 0) {
|
|
306
|
-
throw ErrorFactory.createConfigError('No database adapters are registered. Call DatabaseAdapterRegistry.register() during startup to register database adapters.');
|
|
307
|
-
}
|
|
316
|
+
assertRegistryReady();
|
|
308
317
|
return writeAdapter.transaction(async () => callback(db));
|
|
309
318
|
},
|
|
310
319
|
};
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"MySQLProxyAdapter.d.ts","sourceRoot":"","sources":["../../../../src/orm/adapters/MySQLProxyAdapter.ts"],"names":[],"mappings":"AACA;;;;GAIG;
|
|
1
|
+
{"version":3,"file":"MySQLProxyAdapter.d.ts","sourceRoot":"","sources":["../../../../src/orm/adapters/MySQLProxyAdapter.ts"],"names":[],"mappings":"AACA;;;;GAIG;AAgBH,OAAO,KAAK,EAAE,cAAc,EAAE,gBAAgB,EAAe,MAAM,sBAAsB,CAAC;AAuO1F,eAAO,MAAM,iBAAiB;oBACZ,cAAc,GAAG,gBAAgB;EAcjD,CAAC;AAEH,eAAe,iBAAiB,CAAC"}
|