@zintrust/core 0.1.48 → 0.1.49

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (75) hide show
  1. package/README.md +1 -1
  2. package/app/Controllers/AuthController.d.ts.map +1 -1
  3. package/app/Controllers/AuthController.js +26 -4
  4. package/app/Middleware/index.d.ts.map +1 -1
  5. package/app/Middleware/index.js +3 -3
  6. package/app/Types/controller.d.ts +2 -0
  7. package/app/Types/controller.d.ts.map +1 -1
  8. package/app/Types/controller.js +1 -1
  9. package/package.json +1 -1
  10. package/routes/api.js +13 -6
  11. package/src/cli/CLI.d.ts.map +1 -1
  12. package/src/cli/CLI.js +2 -0
  13. package/src/cli/commands/AddCommand.js +2 -2
  14. package/src/cli/commands/BulletproofKeyGenerateCommand.d.ts +10 -0
  15. package/src/cli/commands/BulletproofKeyGenerateCommand.d.ts.map +1 -0
  16. package/src/cli/commands/BulletproofKeyGenerateCommand.js +139 -0
  17. package/src/cli/commands/JwtDevCommand.d.ts.map +1 -1
  18. package/src/cli/commands/JwtDevCommand.js +51 -32
  19. package/src/cli/scaffolding/ControllerGenerator.d.ts +1 -1
  20. package/src/cli/scaffolding/ControllerGenerator.d.ts.map +1 -1
  21. package/src/cli/scaffolding/ControllerGenerator.js +8 -79
  22. package/src/config/SecretsManager.d.ts +0 -1
  23. package/src/config/SecretsManager.d.ts.map +1 -1
  24. package/src/config/SecretsManager.js +0 -1
  25. package/src/config/middleware.d.ts +1 -0
  26. package/src/config/middleware.d.ts.map +1 -1
  27. package/src/config/middleware.js +3 -0
  28. package/src/http/error-pages/ErrorPageRenderer.js +7 -1
  29. package/src/index.d.ts +1 -0
  30. package/src/index.d.ts.map +1 -1
  31. package/src/index.js +4 -3
  32. package/src/middleware/BulletproofAuthMiddleware.d.ts +92 -0
  33. package/src/middleware/BulletproofAuthMiddleware.d.ts.map +1 -0
  34. package/src/middleware/BulletproofAuthMiddleware.js +421 -0
  35. package/src/middleware/CsrfMiddleware.d.ts +0 -1
  36. package/src/middleware/CsrfMiddleware.d.ts.map +1 -1
  37. package/src/middleware/CsrfMiddleware.js +8 -1
  38. package/src/middleware/JwtAuthMiddleware.d.ts.map +1 -1
  39. package/src/middleware/JwtAuthMiddleware.js +11 -5
  40. package/src/orm/Database.d.ts.map +1 -1
  41. package/src/orm/Database.js +48 -39
  42. package/src/orm/adapters/MySQLProxyAdapter.d.ts.map +1 -1
  43. package/src/orm/adapters/MySQLProxyAdapter.js +54 -35
  44. package/src/orm/adapters/PostgreSQLProxyAdapter.d.ts.map +1 -1
  45. package/src/orm/adapters/PostgreSQLProxyAdapter.js +126 -103
  46. package/src/orm/adapters/SqlProxyHttpAdapterShared.d.ts +30 -0
  47. package/src/orm/adapters/SqlProxyHttpAdapterShared.d.ts.map +1 -0
  48. package/src/orm/adapters/SqlProxyHttpAdapterShared.js +64 -0
  49. package/src/orm/adapters/SqlServerProxyAdapter.d.ts.map +1 -1
  50. package/src/orm/adapters/SqlServerProxyAdapter.js +54 -37
  51. package/src/orm/migrations/MigrationStore.d.ts.map +1 -1
  52. package/src/orm/migrations/MigrationStore.js +22 -1
  53. package/src/routes/doc.js +1 -1
  54. package/src/routes/errorPages.d.ts.map +1 -1
  55. package/src/routes/errorPages.js +9 -2
  56. package/src/security/CsrfTokenManager.d.ts.map +1 -1
  57. package/src/security/CsrfTokenManager.js +57 -23
  58. package/src/security/JwtManager.d.ts +4 -1
  59. package/src/security/JwtManager.d.ts.map +1 -1
  60. package/src/security/JwtManager.js +24 -10
  61. package/src/security/JwtSessions.d.ts +12 -0
  62. package/src/security/JwtSessions.d.ts.map +1 -0
  63. package/src/security/JwtSessions.js +556 -0
  64. package/src/security/NonceReplay.d.ts +24 -0
  65. package/src/security/NonceReplay.d.ts.map +1 -0
  66. package/src/security/NonceReplay.js +42 -0
  67. package/src/security/TokenRevocation.d.ts.map +1 -1
  68. package/src/security/TokenRevocation.js +1 -0
  69. package/src/tools/http/Http.d.ts +5 -0
  70. package/src/tools/http/Http.d.ts.map +1 -1
  71. package/src/tools/http/Http.js +25 -9
  72. package/src/tools/queue/QueueReliabilityOrchestrator.d.ts.map +1 -1
  73. package/src/tools/queue/QueueReliabilityOrchestrator.js +18 -6
  74. package/src/validation/Validator.d.ts.map +1 -1
  75. package/src/validation/Validator.js +4 -2
@@ -0,0 +1,421 @@
1
+ import { Env } from '../config/env.js';
2
+ import { Logger } from '../config/logger.js';
3
+ import { securityConfig } from '../config/security.js';
4
+ import { isMaxLength, isMinLength, isNonEmptyString } from '../helper/index.js';
5
+ import { RequestContext } from '../http/RequestContext.js';
6
+ import { JwtManager } from '../security/JwtManager.js';
7
+ import { JwtSessions } from '../security/JwtSessions.js';
8
+ import { NonceReplay } from '../security/NonceReplay.js';
9
+ import { SignedRequest } from '../security/SignedRequest.js';
10
+ const getHeaderString = (req, name) => {
11
+ const header = req.getHeader(name);
12
+ if (Array.isArray(header))
13
+ return typeof header[0] === 'string' ? header[0] : '';
14
+ return typeof header === 'string' ? header : '';
15
+ };
16
+ const getBearerToken = (authorizationHeader) => {
17
+ const trimmed = authorizationHeader.trim();
18
+ if (trimmed === '')
19
+ return null;
20
+ const [scheme, ...rest] = trimmed.split(/\s+/);
21
+ if (typeof scheme !== 'string' || scheme.toLowerCase() !== 'bearer')
22
+ return null;
23
+ const token = rest.join(' ').trim();
24
+ return token === '' ? null : token;
25
+ };
26
+ const pickOptionalStringClaim = (payload, keys) => {
27
+ const record = payload;
28
+ for (const key of keys) {
29
+ const value = record[key];
30
+ if (typeof value === 'string' && value.trim() !== '')
31
+ return value.trim();
32
+ }
33
+ return undefined;
34
+ };
35
+ const toBodyForSigning = (req) => {
36
+ const rawText = req.context?.['rawBodyText'];
37
+ if (typeof rawText === 'string')
38
+ return rawText;
39
+ const rawBytes = req.context?.['rawBodyBytes'];
40
+ if (rawBytes instanceof Uint8Array)
41
+ return rawBytes;
42
+ if (rawBytes instanceof ArrayBuffer)
43
+ return new Uint8Array(rawBytes);
44
+ return '';
45
+ };
46
+ const toUrlForSigning = (req) => {
47
+ const raw = req.getRaw?.();
48
+ const rawUrl = typeof raw?.url === 'string' ? raw.url : undefined;
49
+ const path = rawUrl ?? req.getPath?.() ?? '/';
50
+ try {
51
+ return new URL(path);
52
+ }
53
+ catch {
54
+ return new URL(path.startsWith('/') ? path : `/${path}`, 'http://localhost');
55
+ }
56
+ };
57
+ const markAuthContext = (req, ctx) => {
58
+ req.context ??= {};
59
+ req.context['auth'] = ctx;
60
+ req.context['authStrategy'] = 'bulletproof';
61
+ };
62
+ const respond401 = (res, message) => {
63
+ res.setStatus(401).json({ error: message });
64
+ };
65
+ const parseBulletproofHeaders = (params) => {
66
+ const deviceId = getHeaderString(params.req, params.deviceIdHeader).trim();
67
+ if (params.requireDeviceId) {
68
+ const ok = isNonEmptyString(deviceId) && isMaxLength(deviceId, 128);
69
+ if (!ok)
70
+ return { ok: false, message: 'Missing or invalid device id' };
71
+ }
72
+ const timezone = getHeaderString(params.req, params.timezoneHeader).trim();
73
+ if (params.requireTimezone) {
74
+ const ok = isNonEmptyString(timezone) && isMaxLength(timezone, 64);
75
+ if (!ok)
76
+ return { ok: false, message: 'Missing or invalid timezone' };
77
+ }
78
+ const signingHeaders = {
79
+ 'x-zt-key-id': getHeaderString(params.req, 'x-zt-key-id').trim() || undefined,
80
+ 'x-zt-timestamp': getHeaderString(params.req, 'x-zt-timestamp').trim() || undefined,
81
+ 'x-zt-nonce': getHeaderString(params.req, 'x-zt-nonce').trim() || undefined,
82
+ 'x-zt-body-sha256': getHeaderString(params.req, 'x-zt-body-sha256').trim() || undefined,
83
+ 'x-zt-signature': getHeaderString(params.req, 'x-zt-signature').trim() || undefined,
84
+ };
85
+ return { ok: true, deviceId, timezone, signingHeaders };
86
+ };
87
+ const verifySignedRequest = async (params) => {
88
+ const baseParams = {
89
+ method: params.req.getMethod?.() ?? 'GET',
90
+ url: toUrlForSigning(params.req),
91
+ body: toBodyForSigning(params.req),
92
+ headers: params.signingHeaders,
93
+ nowMs: Date.now(),
94
+ windowMs: params.windowMs,
95
+ verifyNonce: async (keyId, nonce, ttlMs) => {
96
+ const ok = isNonEmptyString(nonce) && isMinLength(nonce, 8) && isMaxLength(nonce, 128);
97
+ if (!ok)
98
+ return false;
99
+ return params.verifyNonce(keyId, nonce, ttlMs);
100
+ },
101
+ };
102
+ const staticSecrets = params.staticSecrets
103
+ ?.map((s) => (typeof s === 'string' ? s.trim() : ''))
104
+ .filter((s) => s !== '');
105
+ const signed = staticSecrets !== undefined && staticSecrets.length > 0
106
+ ? await (async () => {
107
+ const attempts = await Promise.all(staticSecrets.map(async (secret) => SignedRequest.verify({
108
+ ...baseParams,
109
+ getSecretForKeyId: () => secret,
110
+ })));
111
+ // Preserve preference order based on provided secret list.
112
+ for (const attempt of attempts) {
113
+ if (attempt.ok === true)
114
+ return attempt;
115
+ }
116
+ // If any attempt failed for a reason other than signature mismatch, return that.
117
+ for (const attempt of attempts) {
118
+ if (attempt.ok === false && attempt.code !== 'INVALID_SIGNATURE')
119
+ return attempt;
120
+ }
121
+ return { ok: false, code: 'INVALID_SIGNATURE', message: 'Invalid signature' };
122
+ })()
123
+ : await SignedRequest.verify({
124
+ ...baseParams,
125
+ getSecretForKeyId: async (keyId) => {
126
+ const secretForKey = await params.getSecretForKeyId(keyId, params.req);
127
+ const normalized = typeof secretForKey === 'string' ? secretForKey.trim() : '';
128
+ return normalized === '' ? undefined : normalized;
129
+ },
130
+ });
131
+ if (!signed.ok) {
132
+ Logger.debug('Bulletproof auth signed-request verification failed', {
133
+ code: signed.code,
134
+ message: signed.message,
135
+ });
136
+ return { ok: false, message: 'Unauthorized' };
137
+ }
138
+ return {
139
+ ok: true,
140
+ keyId: signed.keyId,
141
+ timestampMs: signed.timestampMs,
142
+ nonce: signed.nonce,
143
+ };
144
+ };
145
+ const verifyJwtPayload = (params) => {
146
+ try {
147
+ return { ok: true, payload: params.jwt.verify(params.token, params.algorithm) };
148
+ }
149
+ catch (error) {
150
+ Logger.debug('Bulletproof auth JWT verification failed', {
151
+ algorithm: params.algorithm,
152
+ error: error instanceof Error ? error.message : String(error),
153
+ });
154
+ return { ok: false };
155
+ }
156
+ };
157
+ const enforceDeviceBindings = (params) => {
158
+ if (params.requireDeviceId && params.deviceId !== '' && params.deviceId !== params.keyId) {
159
+ return { ok: false, message: 'Device mismatch' };
160
+ }
161
+ if (params.requireDeviceClaimMatch) {
162
+ const claimedDevice = pickOptionalStringClaim(params.payload, params.deviceClaimKeys);
163
+ const mismatch = claimedDevice === undefined || (params.deviceId !== '' && claimedDevice !== params.deviceId);
164
+ if (mismatch)
165
+ return { ok: false, message: 'Device mismatch' };
166
+ }
167
+ return { ok: true };
168
+ };
169
+ const enforceTimezoneBindings = (params) => {
170
+ if (!params.requireTimezoneClaimMatch || params.timezone === '') {
171
+ return { ok: true };
172
+ }
173
+ const claimedTimezone = pickOptionalStringClaim(params.payload, params.timezoneClaimKeys);
174
+ if (claimedTimezone !== undefined && claimedTimezone !== params.timezone) {
175
+ return { ok: false, message: 'Timezone mismatch' };
176
+ }
177
+ return { ok: true };
178
+ };
179
+ const enforceUserAgentBindings = async (params) => {
180
+ if (!params.requireUserAgentHashMatch)
181
+ return { ok: true };
182
+ const claimedUaHash = pickOptionalStringClaim(params.payload, params.userAgentHashClaimKeys);
183
+ if (claimedUaHash === undefined)
184
+ return { ok: true };
185
+ const userAgent = getHeaderString(params.req, 'user-agent').trim();
186
+ const uaHash = await SignedRequest.sha256Hex(userAgent);
187
+ if (uaHash !== claimedUaHash) {
188
+ return { ok: false, message: 'User agent mismatch' };
189
+ }
190
+ return { ok: true };
191
+ };
192
+ const enforceJwtBindings = async (params) => {
193
+ const device = enforceDeviceBindings({
194
+ payload: params.payload,
195
+ deviceId: params.deviceId,
196
+ keyId: params.keyId,
197
+ requireDeviceId: params.requireDeviceId,
198
+ requireDeviceClaimMatch: params.requireDeviceClaimMatch,
199
+ deviceClaimKeys: params.deviceClaimKeys,
200
+ });
201
+ if (!device.ok)
202
+ return device;
203
+ const tz = enforceTimezoneBindings({
204
+ payload: params.payload,
205
+ timezone: params.timezone,
206
+ requireTimezoneClaimMatch: params.requireTimezoneClaimMatch,
207
+ timezoneClaimKeys: params.timezoneClaimKeys,
208
+ });
209
+ if (!tz.ok)
210
+ return tz;
211
+ return enforceUserAgentBindings({
212
+ req: params.req,
213
+ payload: params.payload,
214
+ requireUserAgentHashMatch: params.requireUserAgentHashMatch,
215
+ userAgentHashClaimKeys: params.userAgentHashClaimKeys,
216
+ });
217
+ };
218
+ const resolveJwtVerifier = (options) => {
219
+ const algorithm = options.algorithm ?? securityConfig.jwt.algorithm;
220
+ const secret = options.secret ?? securityConfig.jwt.secret;
221
+ const windowMs = options.windowMs ?? 60_000;
222
+ const jwt = JwtManager.create();
223
+ if (algorithm === 'HS256' || algorithm === 'HS512') {
224
+ jwt.setHmacSecret(secret);
225
+ }
226
+ return { algorithm, jwt, windowMs };
227
+ };
228
+ const resolveHeaderConfig = (options) => {
229
+ return {
230
+ deviceIdHeader: (options.deviceIdHeader ?? 'x-zt-device-id').toLowerCase(),
231
+ timezoneHeader: (options.timezoneHeader ?? 'x-zt-timezone').toLowerCase(),
232
+ requireDeviceId: options.requireDeviceId ?? true,
233
+ requireTimezone: options.requireTimezone ?? false,
234
+ };
235
+ };
236
+ const resolveClaimConfig = (options) => {
237
+ return {
238
+ requireDeviceClaimMatch: options.requireDeviceClaimMatch ?? true,
239
+ deviceClaimKeys: options.deviceClaimKeys ?? ['deviceId', 'device_id', 'did'],
240
+ requireTimezoneClaimMatch: options.requireTimezoneClaimMatch ?? true,
241
+ timezoneClaimKeys: options.timezoneClaimKeys ?? ['tz', 'timezone', 'timeZone'],
242
+ requireUserAgentHashMatch: options.requireUserAgentHashMatch ?? true,
243
+ userAgentHashClaimKeys: options.userAgentHashClaimKeys ?? ['uaHash', 'uah', 'userAgentHash'],
244
+ };
245
+ };
246
+ const parseBackupSecrets = (raw) => {
247
+ const value = raw.trim();
248
+ if (value === '')
249
+ return [];
250
+ // JSON array support: ["a","b"]
251
+ if (value.startsWith('[')) {
252
+ try {
253
+ const parsed = JSON.parse(value);
254
+ if (!Array.isArray(parsed))
255
+ return [];
256
+ return parsed
257
+ .filter((v) => typeof v === 'string')
258
+ .map((s) => s.trim())
259
+ .filter((s) => s !== '');
260
+ }
261
+ catch {
262
+ return [];
263
+ }
264
+ }
265
+ // Comma-separated support: a,b,c
266
+ return value
267
+ .split(',')
268
+ .map((s) => s.trim())
269
+ .filter((s) => s !== '');
270
+ };
271
+ const dedupeSecrets = (secrets) => {
272
+ const out = [];
273
+ const seen = new Set();
274
+ for (const secret of secrets) {
275
+ const trimmed = typeof secret === 'string' ? secret.trim() : '';
276
+ if (trimmed === '')
277
+ continue;
278
+ if (seen.has(trimmed))
279
+ continue;
280
+ seen.add(trimmed);
281
+ out.push(trimmed);
282
+ }
283
+ return out;
284
+ };
285
+ const resolveSigningConfig = (options) => {
286
+ const appKeyFallback = (Env.get('AUTH_KEY', '') || Env.get('APP_KEY', '')).trim();
287
+ const signingSecretFromEnv = Env.get('BULLETPROOF_SIGNING_SECRET', appKeyFallback).trim();
288
+ const signingSecret = (options.signingSecret ?? signingSecretFromEnv).trim();
289
+ const backupSecrets = parseBackupSecrets(Env.get('BULLETPROOF_SIGNING_SECRET_BK', ''));
290
+ const hasCustomResolver = typeof options.getSecretForKeyId === 'function';
291
+ const getSecretForKeyId = hasCustomResolver
292
+ ? options.getSecretForKeyId
293
+ : (_keyId) => (signingSecret === '' ? undefined : signingSecret);
294
+ const verifyNonce = options.verifyNonce ?? NonceReplay.createMemoryVerifier();
295
+ const staticSigningSecrets = hasCustomResolver
296
+ ? undefined
297
+ : dedupeSecrets([signingSecret, ...backupSecrets]);
298
+ return { getSecretForKeyId, verifyNonce, staticSigningSecrets };
299
+ };
300
+ const resolveBulletproof = (options) => {
301
+ return {
302
+ ...resolveJwtVerifier(options),
303
+ ...resolveHeaderConfig(options),
304
+ ...resolveClaimConfig(options),
305
+ ...resolveSigningConfig(options),
306
+ };
307
+ };
308
+ const getTokenOrFail = (req) => {
309
+ const authorizationHeader = getHeaderString(req, 'authorization');
310
+ if (authorizationHeader === '')
311
+ return { ok: false, message: 'Missing authorization header' };
312
+ const token = getBearerToken(authorizationHeader);
313
+ if (token === null)
314
+ return { ok: false, message: 'Invalid authorization header format' };
315
+ return { ok: true, token };
316
+ };
317
+ const authenticate = async (params) => {
318
+ const tokenResult = getTokenOrFail(params.req);
319
+ if (!tokenResult.ok)
320
+ return tokenResult;
321
+ const parsed = parseBulletproofHeaders({
322
+ req: params.req,
323
+ deviceIdHeader: params.resolved.deviceIdHeader,
324
+ timezoneHeader: params.resolved.timezoneHeader,
325
+ requireDeviceId: params.resolved.requireDeviceId,
326
+ requireTimezone: params.resolved.requireTimezone,
327
+ });
328
+ if (!parsed.ok)
329
+ return { ok: false, message: parsed.message };
330
+ const signed = await verifySignedRequest({
331
+ req: params.req,
332
+ signingHeaders: parsed.signingHeaders,
333
+ windowMs: params.resolved.windowMs,
334
+ verifyNonce: params.resolved.verifyNonce,
335
+ getSecretForKeyId: params.resolved.getSecretForKeyId,
336
+ staticSecrets: params.resolved.staticSigningSecrets,
337
+ });
338
+ if (!signed.ok)
339
+ return { ok: false, message: signed.message };
340
+ const jwtResult = verifyJwtPayload({
341
+ jwt: params.resolved.jwt,
342
+ token: tokenResult.token,
343
+ algorithm: params.resolved.algorithm,
344
+ });
345
+ if (!jwtResult.ok)
346
+ return { ok: false, message: 'Invalid or expired token' };
347
+ // Session allowlist: token must exist in the sessions store to be accepted.
348
+ if (!(await JwtSessions.isActive(tokenResult.token))) {
349
+ return { ok: false, message: 'Invalid or expired token' };
350
+ }
351
+ const binding = await enforceJwtBindings({
352
+ req: params.req,
353
+ payload: jwtResult.payload,
354
+ deviceId: parsed.deviceId,
355
+ timezone: parsed.timezone,
356
+ keyId: signed.keyId,
357
+ requireDeviceId: params.resolved.requireDeviceId,
358
+ requireDeviceClaimMatch: params.resolved.requireDeviceClaimMatch,
359
+ deviceClaimKeys: params.resolved.deviceClaimKeys,
360
+ requireTimezoneClaimMatch: params.resolved.requireTimezoneClaimMatch,
361
+ timezoneClaimKeys: params.resolved.timezoneClaimKeys,
362
+ requireUserAgentHashMatch: params.resolved.requireUserAgentHashMatch,
363
+ userAgentHashClaimKeys: params.resolved.userAgentHashClaimKeys,
364
+ });
365
+ if (!binding.ok)
366
+ return { ok: false, message: binding.message };
367
+ return {
368
+ ok: true,
369
+ token: tokenResult.token,
370
+ payload: jwtResult.payload,
371
+ parsed,
372
+ signed,
373
+ };
374
+ };
375
+ const attachAuth = (req, result) => {
376
+ req.user = result.payload;
377
+ if (typeof result.payload.sub === 'string' && result.payload.sub.trim() !== '') {
378
+ RequestContext.setUserId(req, result.payload.sub);
379
+ }
380
+ const anyPayload = result.payload;
381
+ const tenantId = anyPayload['tenantId'] ?? anyPayload['tenant_id'];
382
+ if ((typeof tenantId === 'string' && tenantId.trim() !== '') ||
383
+ (typeof tenantId === 'number' && Number.isFinite(tenantId))) {
384
+ RequestContext.setTenantId(req, String(tenantId));
385
+ }
386
+ markAuthContext(req, {
387
+ strategy: 'bulletproof',
388
+ deviceId: result.parsed.deviceId === '' ? result.signed.keyId : result.parsed.deviceId,
389
+ keyId: result.signed.keyId,
390
+ signedRequest: {
391
+ timestampMs: result.signed.timestampMs,
392
+ nonce: result.signed.nonce,
393
+ },
394
+ });
395
+ if (result.parsed.timezone !== '') {
396
+ req.context ??= {};
397
+ req.context['timezone'] = result.parsed.timezone;
398
+ }
399
+ };
400
+ const createHandler = (resolved) => {
401
+ return async (req, res, next) => {
402
+ if (req.context?.['authStrategy'] === 'bulletproof' && req.user !== undefined) {
403
+ await next();
404
+ return;
405
+ }
406
+ const result = await authenticate({ req, resolved });
407
+ if (!result.ok) {
408
+ respond401(res, result.message);
409
+ return;
410
+ }
411
+ attachAuth(req, result);
412
+ await next();
413
+ };
414
+ };
415
+ export const BulletproofAuthMiddleware = Object.freeze({
416
+ create(options = {}) {
417
+ const resolved = resolveBulletproof(options);
418
+ return createHandler(resolved);
419
+ },
420
+ });
421
+ export default BulletproofAuthMiddleware;
@@ -15,7 +15,6 @@ export interface CsrfOptions {
15
15
  * Supports simple glob-style matching where `*` matches any characters.
16
16
  * Examples:
17
17
  * - `/api/*`
18
- * - `/webhooks/*`
19
18
  * - `/api/v1/auth/login`
20
19
  */
21
20
  skipPaths?: string[];
@@ -1 +1 @@
1
- {"version":3,"file":"CsrfMiddleware.d.ts","sourceRoot":"","sources":["../../../src/middleware/CsrfMiddleware.ts"],"names":[],"mappings":"AAAA;;;;GAIG;AAKH,OAAO,KAAK,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AAK9D,MAAM,WAAW,WAAW;IAC1B,UAAU,CAAC,EAAE,MAAM,CAAC;IACpB,UAAU,CAAC,EAAE,MAAM,CAAC;IACpB,OAAO,CAAC,EAAE,MAAM,CAAC;IACjB,aAAa,CAAC,EAAE,MAAM,EAAE,CAAC;IACzB;;;;;;;;OAQG;IACH,SAAS,CAAC,EAAE,MAAM,EAAE,CAAC;CACtB;AA0CD,eAAO,MAAM,cAAc;IACzB;;OAEG;qBACa,WAAW,GAAQ,UAAU;EA6D7C,CAAC"}
1
+ {"version":3,"file":"CsrfMiddleware.d.ts","sourceRoot":"","sources":["../../../src/middleware/CsrfMiddleware.ts"],"names":[],"mappings":"AAAA;;;;GAIG;AAKH,OAAO,KAAK,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AAK9D,MAAM,WAAW,WAAW;IAC1B,UAAU,CAAC,EAAE,MAAM,CAAC;IACpB,UAAU,CAAC,EAAE,MAAM,CAAC;IACpB,OAAO,CAAC,EAAE,MAAM,CAAC;IACjB,aAAa,CAAC,EAAE,MAAM,EAAE,CAAC;IACzB;;;;;;;OAOG;IACH,SAAS,CAAC,EAAE,MAAM,EAAE,CAAC;CACtB;AAkDD,eAAO,MAAM,cAAc;IACzB;;OAEG;qBACa,WAAW,GAAQ,UAAU;EA6D7C,CAAC"}
@@ -18,6 +18,13 @@ const DEFAULT_OPTIONS = {
18
18
  const canUseWeakRef = typeof WeakRef === 'function';
19
19
  const managerRegistry = new Set();
20
20
  let globalCleanupTimer = null;
21
+ let sharedSessionManager = null;
22
+ const getSharedSessionManager = () => {
23
+ if (sharedSessionManager !== null)
24
+ return sharedSessionManager;
25
+ sharedSessionManager = SessionManager.create();
26
+ return sharedSessionManager;
27
+ };
21
28
  const ensureCleanupTimer = () => {
22
29
  if (globalCleanupTimer !== null)
23
30
  return;
@@ -52,7 +59,7 @@ export const CsrfMiddleware = Object.freeze({
52
59
  create(options = {}) {
53
60
  const config = { ...DEFAULT_OPTIONS, ...options };
54
61
  const manager = CsrfTokenManager.create();
55
- const sessions = SessionManager.create();
62
+ const sessions = getSharedSessionManager();
56
63
  ensureCleanupTimer();
57
64
  // Register for global cleanup instead of creating a local timer
58
65
  if (canUseWeakRef) {
@@ -1 +1 @@
1
- {"version":3,"file":"JwtAuthMiddleware.d.ts","sourceRoot":"","sources":["../../../src/middleware/JwtAuthMiddleware.ts"],"names":[],"mappings":"AAKA,OAAO,KAAK,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AAC9D,OAAO,KAAK,EAAe,YAAY,EAAE,MAAM,sBAAsB,CAAC;AAItE,MAAM,WAAW,cAAc;IAC7B,SAAS,CAAC,EAAE,YAAY,CAAC;IACzB,MAAM,CAAC,EAAE,MAAM,CAAC;CACjB;AA4BD,eAAO,MAAM,iBAAiB;qBACZ,cAAc,GAAQ,UAAU;EA4DhD,CAAC;AAEH,eAAe,iBAAiB,CAAC"}
1
+ {"version":3,"file":"JwtAuthMiddleware.d.ts","sourceRoot":"","sources":["../../../src/middleware/JwtAuthMiddleware.ts"],"names":[],"mappings":"AAKA,OAAO,KAAK,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AAC9D,OAAO,KAAK,EAAe,YAAY,EAAE,MAAM,sBAAsB,CAAC;AAItE,MAAM,WAAW,cAAc;IAC7B,SAAS,CAAC,EAAE,YAAY,CAAC;IACzB,MAAM,CAAC,EAAE,MAAM,CAAC;CACjB;AA4BD,eAAO,MAAM,iBAAiB;qBACZ,cAAc,GAAQ,UAAU;EAoEhD,CAAC;AAEH,eAAe,iBAAiB,CAAC"}
@@ -2,7 +2,7 @@ import { Logger } from '../config/logger.js';
2
2
  import { securityConfig } from '../config/security.js';
3
3
  import { RequestContext } from '../http/RequestContext.js';
4
4
  import { JwtManager } from '../security/JwtManager.js';
5
- import { TokenRevocation } from '../security/TokenRevocation.js';
5
+ import { JwtSessions } from '../security/JwtSessions.js';
6
6
  const getHeaderValue = (value) => {
7
7
  if (Array.isArray(value))
8
8
  return typeof value[0] === 'string' ? value[0] : '';
@@ -37,6 +37,11 @@ export const JwtAuthMiddleware = Object.freeze({
37
37
  jwt.setHmacSecret(secret);
38
38
  }
39
39
  return async (req, res, next) => {
40
+ // If a stronger auth strategy already authenticated this request, do not re-verify.
41
+ if (req.context?.['authStrategy'] === 'bulletproof' && req.user !== undefined) {
42
+ await next();
43
+ return;
44
+ }
40
45
  const authorizationHeader = getHeaderValue(req.getHeader('authorization'));
41
46
  if (authorizationHeader === '') {
42
47
  res.setStatus(401).json({ error: 'Missing authorization header' });
@@ -47,12 +52,13 @@ export const JwtAuthMiddleware = Object.freeze({
47
52
  res.setStatus(401).json({ error: 'Invalid authorization header format' });
48
53
  return;
49
54
  }
50
- if (await TokenRevocation.isRevoked(token)) {
51
- res.setStatus(401).json({ error: 'Invalid or expired token' });
52
- return;
53
- }
54
55
  try {
55
56
  const payload = jwt.verify(token, algorithm);
57
+ // Session allowlist: token must exist in the session store to be accepted.
58
+ if (!(await JwtSessions.isActive(token))) {
59
+ res.setStatus(401).json({ error: 'Invalid or expired token' });
60
+ return;
61
+ }
56
62
  req.user = payload;
57
63
  // Standardize request-scoped context fields.
58
64
  if (typeof payload.sub === 'string' && payload.sub.trim() !== '') {
@@ -1 +1 @@
1
- {"version":3,"file":"Database.d.ts","sourceRoot":"","sources":["../../../src/orm/Database.ts"],"names":[],"mappings":"AAAA;;;GAGG;AAOH,OAAO,KAAK,EAAE,eAAe,EAAE,MAAM,kBAAkB,CAAC;AAWxD,OAAO,KAAK,EAAE,cAAc,EAAE,gBAAgB,EAAE,WAAW,EAAE,MAAM,sBAAsB,CAAC;AAE1F,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,mBAAmB,CAAC;AAGvD,MAAM,MAAM,QAAQ,GAAG;IAAE,KAAK,EAAE,MAAM,CAAA;CAAE,CAAC;AAEzC,MAAM,WAAW,SAAS;IACxB,OAAO,IAAI,OAAO,CAAC,IAAI,CAAC,CAAC;IACzB,UAAU,IAAI,OAAO,CAAC,IAAI,CAAC,CAAC;IAC5B,WAAW,IAAI,OAAO,CAAC;IACvB,KAAK,CAAC,GAAG,EAAE,MAAM,EAAE,UAAU,CAAC,EAAE,OAAO,EAAE,EAAE,MAAM,CAAC,EAAE,OAAO,GAAG,OAAO,CAAC,OAAO,EAAE,CAAC,CAAC;IACjF,QAAQ,CAAC,GAAG,EAAE,MAAM,EAAE,UAAU,CAAC,EAAE,OAAO,EAAE,EAAE,MAAM,CAAC,EAAE,OAAO,GAAG,OAAO,CAAC,OAAO,CAAC,CAAC;IAClF,OAAO,CAAC,GAAG,EAAE,MAAM,EAAE,UAAU,CAAC,EAAE,OAAO,EAAE,EAAE,MAAM,CAAC,EAAE,OAAO,GAAG,OAAO,CAAC,WAAW,CAAC,CAAC;IACrF,GAAG,CAAC,KAAK,EAAE,MAAM,GAAG,QAAQ,CAAC;IAC7B,WAAW,CAAC,CAAC,EAAE,QAAQ,EAAE,CAAC,EAAE,EAAE,SAAS,KAAK,OAAO,CAAC,CAAC,CAAC,GAAG,OAAO,CAAC,CAAC,CAAC,CAAC;IACpE,KAAK,CAAC,IAAI,EAAE,MAAM,GAAG,aAAa,CAAC;IACnC,aAAa,CAAC,OAAO,EAAE,CAAC,KAAK,EAAE,MAAM,EAAE,MAAM,EAAE,OAAO,EAAE,KAAK,IAAI,GAAG,IAAI,CAAC;IACzE,YAAY,CAAC,OAAO,EAAE,CAAC,KAAK,EAAE,MAAM,EAAE,MAAM,EAAE,OAAO,EAAE,EAAE,QAAQ,EAAE,MAAM,KAAK,IAAI,GAAG,IAAI,CAAC;IAC1F,cAAc,CAAC,OAAO,EAAE,CAAC,KAAK,EAAE,MAAM,EAAE,MAAM,EAAE,OAAO,EAAE,KAAK,IAAI,GAAG,IAAI,CAAC;IAC1E,aAAa,CAAC,OAAO,EAAE,CAAC,KAAK,EAAE,MAAM,EAAE,MAAM,EAAE,OAAO,EAAE,EAAE,QAAQ,EAAE,MAAM,KAAK,IAAI,GAAG,IAAI,CAAC;IAC3F,kBAAkB,CAAC,MAAM,CAAC,EAAE,OAAO,GAAG,gBAAgB,CAAC;IACvD,OAAO,IAAI,eAAe,CAAC;IAC3B,SAAS,IAAI,cAAc,CAAC;IAC5B,OAAO,IAAI,IAAI,CAAC;CACjB;AA4gBD,eAAO,MAAM,QAAQ;IACnB;;OAEG;oBACa,cAAc,GAAG,SAAS;EAI1C,CAAC;AAIH,eAAO,MAAM,oBAAoB,GAC/B,SAAQ,cAAc,GAAG,SAAqB,EAC9C,uBAA0B,KACzB,OAAO,CAAC,UAAU,CAAC,OAAO,WAAW,CAAC,CAMxC,CAAC;AAEF,wBAAgB,WAAW,CAAC,MAAM,CAAC,EAAE,cAAc,EAAE,UAAU,SAAY,GAAG,SAAS,CAoBtF;AAED,wBAAsB,aAAa,IAAI,OAAO,CAAC,IAAI,CAAC,CAWnD"}
1
+ {"version":3,"file":"Database.d.ts","sourceRoot":"","sources":["../../../src/orm/Database.ts"],"names":[],"mappings":"AAAA;;;GAGG;AAOH,OAAO,KAAK,EAAE,eAAe,EAAE,MAAM,kBAAkB,CAAC;AAWxD,OAAO,KAAK,EAAE,cAAc,EAAE,gBAAgB,EAAE,WAAW,EAAE,MAAM,sBAAsB,CAAC;AAE1F,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,mBAAmB,CAAC;AAGvD,MAAM,MAAM,QAAQ,GAAG;IAAE,KAAK,EAAE,MAAM,CAAA;CAAE,CAAC;AAEzC,MAAM,WAAW,SAAS;IACxB,OAAO,IAAI,OAAO,CAAC,IAAI,CAAC,CAAC;IACzB,UAAU,IAAI,OAAO,CAAC,IAAI,CAAC,CAAC;IAC5B,WAAW,IAAI,OAAO,CAAC;IACvB,KAAK,CAAC,GAAG,EAAE,MAAM,EAAE,UAAU,CAAC,EAAE,OAAO,EAAE,EAAE,MAAM,CAAC,EAAE,OAAO,GAAG,OAAO,CAAC,OAAO,EAAE,CAAC,CAAC;IACjF,QAAQ,CAAC,GAAG,EAAE,MAAM,EAAE,UAAU,CAAC,EAAE,OAAO,EAAE,EAAE,MAAM,CAAC,EAAE,OAAO,GAAG,OAAO,CAAC,OAAO,CAAC,CAAC;IAClF,OAAO,CAAC,GAAG,EAAE,MAAM,EAAE,UAAU,CAAC,EAAE,OAAO,EAAE,EAAE,MAAM,CAAC,EAAE,OAAO,GAAG,OAAO,CAAC,WAAW,CAAC,CAAC;IACrF,GAAG,CAAC,KAAK,EAAE,MAAM,GAAG,QAAQ,CAAC;IAC7B,WAAW,CAAC,CAAC,EAAE,QAAQ,EAAE,CAAC,EAAE,EAAE,SAAS,KAAK,OAAO,CAAC,CAAC,CAAC,GAAG,OAAO,CAAC,CAAC,CAAC,CAAC;IACpE,KAAK,CAAC,IAAI,EAAE,MAAM,GAAG,aAAa,CAAC;IACnC,aAAa,CAAC,OAAO,EAAE,CAAC,KAAK,EAAE,MAAM,EAAE,MAAM,EAAE,OAAO,EAAE,KAAK,IAAI,GAAG,IAAI,CAAC;IACzE,YAAY,CAAC,OAAO,EAAE,CAAC,KAAK,EAAE,MAAM,EAAE,MAAM,EAAE,OAAO,EAAE,EAAE,QAAQ,EAAE,MAAM,KAAK,IAAI,GAAG,IAAI,CAAC;IAC1F,cAAc,CAAC,OAAO,EAAE,CAAC,KAAK,EAAE,MAAM,EAAE,MAAM,EAAE,OAAO,EAAE,KAAK,IAAI,GAAG,IAAI,CAAC;IAC1E,aAAa,CAAC,OAAO,EAAE,CAAC,KAAK,EAAE,MAAM,EAAE,MAAM,EAAE,OAAO,EAAE,EAAE,QAAQ,EAAE,MAAM,KAAK,IAAI,GAAG,IAAI,CAAC;IAC3F,kBAAkB,CAAC,MAAM,CAAC,EAAE,OAAO,GAAG,gBAAgB,CAAC;IACvD,OAAO,IAAI,eAAe,CAAC;IAC3B,SAAS,IAAI,cAAc,CAAC;IAC5B,OAAO,IAAI,IAAI,CAAC;CACjB;AAghBD,eAAO,MAAM,QAAQ;IACnB;;OAEG;oBACa,cAAc,GAAG,SAAS;EAI1C,CAAC;AAIH,eAAO,MAAM,oBAAoB,GAC/B,SAAQ,cAAc,GAAG,SAAqB,EAC9C,uBAA0B,KACzB,OAAO,CAAC,UAAU,CAAC,OAAO,WAAW,CAAC,CAMxC,CAAC;AAEF,wBAAgB,WAAW,CAAC,MAAM,CAAC,EAAE,cAAc,EAAE,UAAU,SAAY,GAAG,SAAS,CAoBtF;AAED,wBAAsB,aAAa,IAAI,OAAO,CAAC,IAAI,CAAC,CAWnD"}
@@ -31,52 +31,64 @@ const resolveMySqlProxyAdapter = (cfg) => {
31
31
  return null;
32
32
  const proxyUrl = Env.get('MYSQL_PROXY_URL', '').trim();
33
33
  const useProxy = Env.getBool('USE_MYSQL_PROXY', false);
34
- if (useProxy || proxyUrl.length > 0) {
35
- Logger.info('[Database] Selecting MySQL proxy adapter', {
34
+ if (!useProxy)
35
+ return null;
36
+ if (proxyUrl.length === 0) {
37
+ Logger.warn('[Database] USE_MYSQL_PROXY enabled but MYSQL_PROXY_URL is empty', {
36
38
  driver: cfg.driver,
37
- useMySqlProxy: useProxy,
38
- mysqlProxyUrlConfigured: proxyUrl.length > 0,
39
- mysqlProxyUrl: proxyUrl,
40
39
  });
41
- return MySQLProxyAdapter.create(cfg);
42
40
  }
43
- return null;
41
+ Logger.info('[Database] Selecting MySQL proxy adapter', {
42
+ driver: cfg.driver,
43
+ useMySqlProxy: useProxy,
44
+ mysqlProxyUrlConfigured: proxyUrl.length > 0,
45
+ mysqlProxyUrl: proxyUrl,
46
+ });
47
+ return MySQLProxyAdapter.create(cfg);
44
48
  };
45
49
  const resolvePostgresProxyAdapter = (cfg) => {
46
50
  if (cfg.driver !== 'postgresql')
47
51
  return null;
48
52
  const proxyUrl = Env.get('POSTGRES_PROXY_URL', '').trim();
49
53
  const useProxy = Env.getBool('USE_POSTGRES_PROXY', false);
50
- if (useProxy || proxyUrl.length > 0) {
51
- Logger.info('[Database] Selecting PostgreSQL proxy adapter', {
54
+ if (!useProxy)
55
+ return null;
56
+ if (proxyUrl.length === 0) {
57
+ Logger.warn('[Database] USE_POSTGRES_PROXY enabled but POSTGRES_PROXY_URL is empty', {
52
58
  driver: cfg.driver,
53
- usePostgresProxy: useProxy,
54
- postgresProxyUrlConfigured: proxyUrl.length > 0,
55
- postgresProxyUrl: proxyUrl,
56
59
  });
57
- return PostgreSQLProxyAdapter.create(cfg);
58
60
  }
59
- return null;
61
+ Logger.info('[Database] Selecting PostgreSQL proxy adapter', {
62
+ driver: cfg.driver,
63
+ usePostgresProxy: useProxy,
64
+ postgresProxyUrlConfigured: proxyUrl.length > 0,
65
+ postgresProxyUrl: proxyUrl,
66
+ });
67
+ return PostgreSQLProxyAdapter.create(cfg);
60
68
  };
61
69
  const resolveSqlServerProxyAdapter = (cfg) => {
62
70
  if (cfg.driver !== 'sqlserver')
63
71
  return null;
64
72
  const proxyUrl = Env.get('SQLSERVER_PROXY_URL', '').trim();
65
73
  const useProxy = Env.getBool('USE_SQLSERVER_PROXY', false);
66
- if (useProxy || proxyUrl.length > 0) {
67
- Logger.info('[Database] Selecting SQL Server proxy adapter', {
74
+ if (!useProxy)
75
+ return null;
76
+ if (proxyUrl.length === 0) {
77
+ Logger.warn('[Database] USE_SQLSERVER_PROXY enabled but SQLSERVER_PROXY_URL is empty', {
68
78
  driver: cfg.driver,
69
- useSqlServerProxy: useProxy,
70
- sqlServerProxyUrlConfigured: proxyUrl.length > 0,
71
- sqlServerProxyUrl: proxyUrl,
72
79
  });
73
- return createSqlServerProxyAdapter();
74
80
  }
75
- return null;
81
+ Logger.info('[Database] Selecting SQL Server proxy adapter', {
82
+ driver: cfg.driver,
83
+ useSqlServerProxy: useProxy,
84
+ sqlServerProxyUrlConfigured: proxyUrl.length > 0,
85
+ sqlServerProxyUrl: proxyUrl,
86
+ });
87
+ return createSqlServerProxyAdapter();
76
88
  };
77
89
  const resolveExplicitProxyAdapter = (cfg) => {
78
90
  // Allow proxy adapters to be forced in any runtime (Node or Workers) when
79
- // the feature flags or proxy URLs are configured.
91
+ // the feature flags are enabled.
80
92
  const mysqlProxy = resolveMySqlProxyAdapter(cfg);
81
93
  if (mysqlProxy)
82
94
  return mysqlProxy;
@@ -266,45 +278,42 @@ const createConnectionHandlers = (writeAdapter, readAdapters, connected, connect
266
278
  * Create query handlers
267
279
  */
268
280
  const createQueryHandlers = (writeAdapter, _readAdapters, eventEmitter, connected, db, getAdapter) => {
281
+ let registryChecked = false;
282
+ const assertRegistryReady = () => {
283
+ if (registryChecked)
284
+ return;
285
+ registryChecked = true;
286
+ const registry = DatabaseAdapterRegistry.list();
287
+ if (registry.length === 0) {
288
+ throw ErrorFactory.createConfigError('No database adapters are registered. Call DatabaseAdapterRegistry.register() during startup to register database adapters.');
289
+ }
290
+ };
269
291
  return {
270
292
  async query(sql, parameters = [], isRead = false) {
271
293
  if (connected.value === false)
272
294
  await db.connect();
273
295
  const adapter = getAdapter(isRead);
274
- const registry = DatabaseAdapterRegistry.list();
275
- // Validate that database adapters are registered
276
- if (registry.length === 0) {
277
- throw ErrorFactory.createConfigError('No database adapters are registered. Call DatabaseAdapterRegistry.register() during startup to register database adapters.');
278
- }
296
+ assertRegistryReady();
279
297
  return executeQuery(adapter, eventEmitter, sql, parameters, 'query');
280
298
  },
281
299
  async queryOne(sql, parameters = [], isRead = false) {
282
300
  if (connected.value === false)
283
301
  await db.connect();
284
302
  const adapter = getAdapter(isRead);
285
- // Validate that database adapters are registered
286
- if (DatabaseAdapterRegistry.list().length === 0) {
287
- throw ErrorFactory.createConfigError('No database adapters are registered. Call DatabaseAdapterRegistry.register() during startup to register database adapters.');
288
- }
303
+ assertRegistryReady();
289
304
  return executeQueryOne(adapter, eventEmitter, sql, parameters);
290
305
  },
291
306
  async execute(sql, parameters = [], isRead = false) {
292
307
  if (connected.value === false)
293
308
  await db.connect();
294
309
  const adapter = getAdapter(isRead);
295
- // Validate that database adapters are registered
296
- if (DatabaseAdapterRegistry.list().length === 0) {
297
- throw ErrorFactory.createConfigError('No database adapters are registered. Call DatabaseAdapterRegistry.register() during startup to register database adapters.');
298
- }
310
+ assertRegistryReady();
299
311
  return executeFullQuery(adapter, eventEmitter, sql, parameters);
300
312
  },
301
313
  async transaction(callback) {
302
314
  if (connected.value === false)
303
315
  await db.connect();
304
- // Validate that database adapters are registered
305
- if (DatabaseAdapterRegistry.list().length === 0) {
306
- throw ErrorFactory.createConfigError('No database adapters are registered. Call DatabaseAdapterRegistry.register() during startup to register database adapters.');
307
- }
316
+ assertRegistryReady();
308
317
  return writeAdapter.transaction(async () => callback(db));
309
318
  },
310
319
  };
@@ -1 +1 @@
1
- {"version":3,"file":"MySQLProxyAdapter.d.ts","sourceRoot":"","sources":["../../../../src/orm/adapters/MySQLProxyAdapter.ts"],"names":[],"mappings":"AACA;;;;GAIG;AAkBH,OAAO,KAAK,EAAE,cAAc,EAAE,gBAAgB,EAAe,MAAM,sBAAsB,CAAC;AAiN1F,eAAO,MAAM,iBAAiB;oBACZ,cAAc,GAAG,gBAAgB;EAajD,CAAC;AAEH,eAAe,iBAAiB,CAAC"}
1
+ {"version":3,"file":"MySQLProxyAdapter.d.ts","sourceRoot":"","sources":["../../../../src/orm/adapters/MySQLProxyAdapter.ts"],"names":[],"mappings":"AACA;;;;GAIG;AAgBH,OAAO,KAAK,EAAE,cAAc,EAAE,gBAAgB,EAAe,MAAM,sBAAsB,CAAC;AAuO1F,eAAO,MAAM,iBAAiB;oBACZ,cAAc,GAAG,gBAAgB;EAcjD,CAAC;AAEH,eAAe,iBAAiB,CAAC"}