ag-common 0.0.89 → 0.0.93

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,7 +1,11 @@
1
1
  import { error } from '../../common/helpers/log';
2
2
  import { User } from '../../ui/helpers/jwt';
3
3
  import { APIGatewayProxyResult } from '../types';
4
- export declare const getAndValidateToken: ({ tokenRaw, COGNITO_USER_POOL_ID, }: {
4
+ export declare const getAndValidateToken: ({ tokenRaw, jwksRegion, COGNITO_USER_POOL_ID, }: {
5
+ /**
6
+ * default ap-southeast-2
7
+ */
8
+ jwksRegion?: string | undefined;
5
9
  tokenRaw?: string | undefined;
6
10
  COGNITO_USER_POOL_ID: string;
7
11
  }) => Promise<{
@@ -19,9 +19,7 @@ const jsonwebtoken_1 = require("jsonwebtoken");
19
19
  const log_1 = require("../../common/helpers/log");
20
20
  const api_1 = require("./api");
21
21
  let jwksClient;
22
- const jwtVerify = ({ COGNITO_USER_POOL_ID, token, }) => __awaiter(void 0, void 0, void 0, function* () {
23
- const jwksUri = `https://cognito-idp.ap-southeast-2.amazonaws.com/${COGNITO_USER_POOL_ID}/.well-known/jwks.json`;
24
- const issuer = `https://cognito-idp.ap-southeast-2.amazonaws.com/${COGNITO_USER_POOL_ID}`;
22
+ const jwtVerify = ({ token, jwksUri, issuer, }) => __awaiter(void 0, void 0, void 0, function* () {
25
23
  return new Promise((resolve, reject) => {
26
24
  (0, jsonwebtoken_1.verify)(token, (header, callback) => {
27
25
  if (!jwksClient) {
@@ -60,22 +58,39 @@ const jwtVerify = ({ COGNITO_USER_POOL_ID, token, }) => __awaiter(void 0, void 0
60
58
  });
61
59
  });
62
60
  });
63
- const getAndValidateToken = ({ tokenRaw, COGNITO_USER_POOL_ID, }) => __awaiter(void 0, void 0, void 0, function* () {
61
+ const getAndValidateToken = ({ tokenRaw, jwksRegion = 'ap-southeast-2', COGNITO_USER_POOL_ID, }) => __awaiter(void 0, void 0, void 0, function* () {
64
62
  var _a, _b;
63
+ const jwksUri = `https://cognito-idp.${jwksRegion}.amazonaws.com/${COGNITO_USER_POOL_ID}/.well-known/jwks.json`;
64
+ const issuer = `https://cognito-idp.${jwksRegion}.amazonaws.com/${COGNITO_USER_POOL_ID}`;
65
65
  let token = '';
66
66
  try {
67
67
  if (!tokenRaw) {
68
- (0, log_1.error)('no auth headers');
68
+ const m = 'auth error: no auth headers';
69
+ (0, log_1.error)(m);
69
70
  return {
70
- error: (0, api_1.returnCode)(403, 'auth failed'),
71
+ error: (0, api_1.returnCode)(403, m),
71
72
  };
72
73
  }
73
74
  token = tokenRaw.substring(tokenRaw.indexOf(' ') + 1);
75
+ if (!token) {
76
+ const m = 'auth error: no token';
77
+ (0, log_1.error)(m);
78
+ return {
79
+ error: (0, api_1.returnCode)(403, m),
80
+ };
81
+ }
74
82
  let subject;
75
83
  try {
76
- yield jwtVerify({ token, COGNITO_USER_POOL_ID });
84
+ yield jwtVerify({ token, jwksUri, issuer });
77
85
  const decoded = (0, jsonwebtoken_1.decode)(token);
78
86
  (0, log_1.debug)(`decoded=${JSON.stringify(decoded, null, 2)}`);
87
+ if (!decoded.email) {
88
+ const m = 'auth error, no email';
89
+ (0, log_1.error)(m);
90
+ return {
91
+ error: (0, api_1.returnCode)(403, m),
92
+ };
93
+ }
79
94
  subject = decoded === null || decoded === void 0 ? void 0 : decoded.sub;
80
95
  if (!subject) {
81
96
  const mess = 'user should have responded with subject (sub) field';
@@ -96,12 +111,6 @@ const getAndValidateToken = ({ tokenRaw, COGNITO_USER_POOL_ID, }) => __awaiter(v
96
111
  picture,
97
112
  updatedAt: parseInt(`${decoded.auth_time}000`, 10),
98
113
  };
99
- if (!userProfile || !token || !userProfile.userId) {
100
- (0, log_1.error)('auth fail');
101
- return {
102
- error: (0, api_1.returnCode)(403, 'auth fail'),
103
- };
104
- }
105
114
  return { token, userProfile };
106
115
  }
107
116
  catch (e) {
@@ -114,9 +123,10 @@ const getAndValidateToken = ({ tokenRaw, COGNITO_USER_POOL_ID, }) => __awaiter(v
114
123
  }
115
124
  }
116
125
  catch (e) {
117
- (0, log_1.error)('auth error', e);
126
+ const m = 'auth error:' + JSON.stringify(e, null, 2);
127
+ (0, log_1.error)(m);
118
128
  return {
119
- error: (0, api_1.returnCode)(403, 'auth fail'),
129
+ error: (0, api_1.returnCode)(403, m),
120
130
  };
121
131
  }
122
132
  });
@@ -1,4 +1,3 @@
1
- /// <reference types="react" />
2
1
  export declare type TOnMessage = (m: string, options?: {
3
2
  appearance: 'error' | 'success';
4
3
  }) => void;
@@ -12,20 +11,3 @@ export interface ICognitoAuth {
12
11
  cognitoRefresh: string;
13
12
  vendToken: string;
14
13
  }
15
- export interface ICognitoAuthProviderProps {
16
- redirectUrl?: string;
17
- location: {
18
- pathname: string;
19
- hash: string;
20
- search: string;
21
- origin: string;
22
- };
23
- goToPageUrl: ({ url, state, login, }: {
24
- url: string;
25
- state?: any;
26
- login: boolean;
27
- }) => Promise<void>;
28
- children: JSX.Element | JSX.Element[];
29
- config: ICognitoAuth;
30
- onMessage?: TOnMessage;
31
- }
@@ -1,7 +1,5 @@
1
- /// <reference types="react" />
2
1
  import { TLang } from '../..';
3
- import { ICognitoAuth, ICognitoAuthProviderProps } from './cognito';
4
- import { AuthedUserContext } from './jwt';
2
+ import { ICognitoAuth } from './cognito';
5
3
  export interface LocationSubset {
6
4
  pathname: string;
7
5
  hash: string;
@@ -30,7 +28,5 @@ export interface IRequestCommon {
30
28
  export interface IStateCommon<TRequest extends IRequestCommon> extends IInitialStateCommon {
31
29
  request: TRequest;
32
30
  auth: ICognitoAuth;
33
- CognitoAuthContext: React.Context<AuthedUserContext>;
34
- CognitoAuthProvider: (p: ICognitoAuthProviderProps) => JSX.Element;
35
31
  pushPath: (path: string) => Promise<void>;
36
32
  }
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "ag-common",
3
- "version": "0.0.89",
3
+ "version": "0.0.93",
4
4
  "main": "./dist/index.js",
5
5
  "types": "./dist/index.d.ts",
6
6
  "author": "Andrei Gec <@andreigec> (https://gec.dev/)",