chyz 1.0.13-rc.19 → 1.0.13-rc.4

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (211) hide show
  1. package/{dist/BaseChyz.js → BaseChyz.js} +8 -46
  2. package/BaseChyz.js.map +1 -0
  3. package/{dist/Chyz.js → Chyz.js} +0 -0
  4. package/{dist/Chyz.js.map → Chyz.js.map} +0 -0
  5. package/README.md +16 -267
  6. package/{dist/base → base}/ActionFilter.js +1 -1
  7. package/{dist/base → base}/ActionFilter.js.map +1 -1
  8. package/{dist/base → base}/BaseError.js +1 -5
  9. package/base/BaseError.js.map +1 -0
  10. package/{dist/base → base}/BaseObject.js +0 -0
  11. package/{dist/base → base}/BaseObject.js.map +0 -0
  12. package/{dist/base → base}/Behavior.js +0 -0
  13. package/{dist/base → base}/Behavior.js.map +0 -0
  14. package/{dist/base → base}/Component.js +0 -0
  15. package/{dist/base → base}/Component.js.map +0 -0
  16. package/{dist/base → base}/Configurable.js +0 -0
  17. package/{dist/base → base}/Configurable.js.map +0 -0
  18. package/{dist/base → base}/Controller.js +0 -0
  19. package/{dist/base → base}/Controller.js.map +0 -0
  20. package/{dist/base → base}/DataErrorDbException.js +0 -0
  21. package/{dist/base → base}/DataErrorDbException.js.map +0 -0
  22. package/{dist/base → base}/DbConnection.js +0 -0
  23. package/{dist/base → base}/DbConnection.js.map +0 -0
  24. package/{dist/base → base}/ForbiddenHttpException.js +0 -0
  25. package/{dist/base → base}/ForbiddenHttpException.js.map +0 -0
  26. package/{dist/base → base}/InvalidConfigException.js +0 -0
  27. package/{dist/base → base}/InvalidConfigException.js.map +0 -0
  28. package/{dist/base → base}/Model.js +30 -37
  29. package/base/Model.js.map +1 -0
  30. package/{dist/base → base}/NotFoundHttpException.js +0 -0
  31. package/{dist/base → base}/NotFoundHttpException.js.map +0 -0
  32. package/{dist/base → base}/RestClient.js +4 -4
  33. package/base/RestClient.js.map +1 -0
  34. package/{dist/base → base}/UnauthorizedHttpException.js +0 -0
  35. package/{dist/base → base}/UnauthorizedHttpException.js.map +0 -0
  36. package/{dist/base → base}/ValidationHttpException.js +1 -1
  37. package/{dist/base → base}/ValidationHttpException.js.map +0 -0
  38. package/{dist/base → base}/db/Exception.js +0 -0
  39. package/{dist/base → base}/db/Exception.js.map +0 -0
  40. package/{dist/base → base}/index.js +0 -2
  41. package/{dist/base → base}/index.js.map +1 -1
  42. package/{dist/decorator → decorator}/Middleware.js +0 -0
  43. package/{dist/decorator → decorator}/Middleware.js.map +0 -0
  44. package/{dist/decorator → decorator}/controller.js +0 -0
  45. package/{dist/decorator → decorator}/controller.js.map +0 -0
  46. package/{dist/decorator → decorator}/enums/ControllerDecoratorParams.js +0 -0
  47. package/{dist/decorator → decorator}/enums/ControllerDecoratorParams.js.map +0 -0
  48. package/{dist/decorator → decorator}/get.js +0 -0
  49. package/{dist/decorator → decorator}/get.js.map +0 -0
  50. package/{dist/decorator → decorator}/index.js +0 -0
  51. package/{dist/decorator → decorator}/index.js.map +0 -0
  52. package/{dist/decorator → decorator}/post.js +0 -0
  53. package/{dist/decorator → decorator}/post.js.map +0 -0
  54. package/{dist/filters → filters}/AccessControl.js +3 -15
  55. package/filters/AccessControl.js.map +1 -0
  56. package/filters/AccessRule.js +79 -0
  57. package/filters/AccessRule.js.map +1 -0
  58. package/{dist/filters → filters}/auth/AuthInterface.js +0 -0
  59. package/{dist/filters → filters}/auth/AuthInterface.js.map +0 -0
  60. package/{dist/filters → filters}/auth/AuthMethod.js +0 -0
  61. package/{dist/filters → filters}/auth/AuthMethod.js.map +0 -0
  62. package/{requiments/Glob.ts → filters/auth/HttpBasicAuth.js} +2 -3
  63. package/filters/auth/HttpBasicAuth.js.map +1 -0
  64. package/{dist/filters → filters}/auth/HttpBearerAuth.js +0 -0
  65. package/{dist/filters → filters}/auth/HttpBearerAuth.js.map +0 -0
  66. package/{dist/filters → filters}/auth/HttpHeaderAuth.js +0 -0
  67. package/{dist/filters → filters}/auth/HttpHeaderAuth.js.map +0 -0
  68. package/{dist/filters → filters}/auth/JwtHttpBearerAuth.js +1 -1
  69. package/filters/auth/JwtHttpBearerAuth.js.map +1 -0
  70. package/{dist/filters → filters}/auth/KeyCloakHttpBearerAuth.js +0 -0
  71. package/{dist/filters → filters}/auth/KeyCloakHttpBearerAuth.js.map +0 -0
  72. package/{dist/filters → filters}/auth/index.js +0 -1
  73. package/{dist/filters → filters}/auth/index.js.map +1 -1
  74. package/{dist/filters → filters}/index.js +0 -0
  75. package/{dist/filters → filters}/index.js.map +0 -0
  76. package/{dist/index.js → index.js} +0 -0
  77. package/{dist/index.js.map → index.js.map} +0 -0
  78. package/{dist/model → model}/RouteDefinition.js +0 -0
  79. package/{dist/model → model}/RouteDefinition.js.map +0 -0
  80. package/package.json +7 -6
  81. package/{dist/requiments → requiments}/Glob.js +0 -0
  82. package/{dist/requiments → requiments}/Glob.js.map +0 -0
  83. package/{dist/requiments → requiments}/ReflectUtil.js +0 -0
  84. package/{dist/requiments → requiments}/ReflectUtil.js.map +0 -0
  85. package/{dist/requiments → requiments}/Utils.js +0 -0
  86. package/{dist/requiments → requiments}/Utils.js.map +0 -0
  87. package/{dist/validators → validators}/BooleanValidator.js +0 -0
  88. package/{dist/validators → validators}/BooleanValidator.js.map +0 -0
  89. package/{dist/validators → validators}/CompareValidator.js +0 -0
  90. package/{dist/validators → validators}/CompareValidator.js.map +0 -0
  91. package/{dist/validators → validators}/DateValidator.js +0 -0
  92. package/{dist/validators → validators}/DateValidator.js.map +0 -0
  93. package/{dist/validators → validators}/EmailValidator.js +0 -0
  94. package/{dist/validators → validators}/EmailValidator.js.map +0 -0
  95. package/{dist/validators → validators}/Validator.js +0 -0
  96. package/{dist/validators → validators}/Validator.js.map +0 -0
  97. package/{dist/web → web}/IdentityInterface.js +0 -0
  98. package/{dist/web → web}/IdentityInterface.js.map +0 -0
  99. package/web/WebUser.js +88 -0
  100. package/web/WebUser.js.map +1 -0
  101. package/BaseChyz.ts +0 -399
  102. package/Chyz.ts +0 -11
  103. package/Doc/Moel kullanma.md +0 -13
  104. package/Examples/Controllers/ApiController.ts +0 -140
  105. package/Examples/Controllers/BasicApiController.ts +0 -121
  106. package/Examples/Controllers/KeyCloakController.ts +0 -100
  107. package/Examples/Controllers/PublicController.ts +0 -42
  108. package/Examples/Controllers/SiteController.ts +0 -149
  109. package/Examples/Models/AuthAssignment.ts +0 -50
  110. package/Examples/Models/AuthItem.ts +0 -59
  111. package/Examples/Models/AuthItemChild.ts +0 -49
  112. package/Examples/Models/Categories.ts +0 -47
  113. package/Examples/Models/Customer.ts +0 -115
  114. package/Examples/Models/KeycloakUser.ts +0 -70
  115. package/Examples/Models/Order.ts +0 -64
  116. package/Examples/Models/OrderItem.ts +0 -27
  117. package/Examples/Models/ProductModels.ts +0 -49
  118. package/Examples/Models/ProductToCategories.ts +0 -46
  119. package/Examples/Models/Products.ts +0 -50
  120. package/Examples/Models/Stocks.ts +0 -60
  121. package/Examples/Models/User.ts +0 -107
  122. package/Examples/Models/UserPermission.ts +0 -37
  123. package/Examples/Models/index.ts +0 -19
  124. package/Examples/index-keycloack.ts +0 -78
  125. package/Examples/index.ts +0 -45
  126. package/Examples/keycloak.json +0 -7
  127. package/Examples/log/access.log +0 -0
  128. package/Examples/log/app.log +0 -10379
  129. package/Examples/log/errors.log +0 -1984
  130. package/Examples/package.json +0 -46
  131. package/Examples/tsconfig.json +0 -21
  132. package/base/ActionFilter.ts +0 -71
  133. package/base/BaseError.ts +0 -28
  134. package/base/BaseObject.ts +0 -19
  135. package/base/Behavior.ts +0 -6
  136. package/base/Component.ts +0 -66
  137. package/base/Configurable.ts +0 -10
  138. package/base/Controller.ts +0 -84
  139. package/base/DataErrorDbException.ts +0 -16
  140. package/base/DbConnection.ts +0 -51
  141. package/base/ForbiddenHttpException.ts +0 -15
  142. package/base/InvalidArgumentException.ts +0 -16
  143. package/base/InvalidConfigException.ts +0 -16
  144. package/base/Model.ts +0 -363
  145. package/base/ModelManager.ts +0 -19
  146. package/base/NotFoundHttpException.ts +0 -14
  147. package/base/RestClient.ts +0 -28
  148. package/base/UnauthorizedHttpException.ts +0 -17
  149. package/base/ValidationHttpException.ts +0 -14
  150. package/base/db/Exception.ts +0 -14
  151. package/base/index.ts +0 -18
  152. package/decorator/Middleware.ts +0 -9
  153. package/decorator/controller.ts +0 -22
  154. package/decorator/enums/ControllerDecoratorParams.ts +0 -5
  155. package/decorator/get.ts +0 -37
  156. package/decorator/index.ts +0 -3
  157. package/decorator/post.ts +0 -36
  158. package/dist/BaseChyz.js.map +0 -1
  159. package/dist/base/BaseError.js.map +0 -1
  160. package/dist/base/InvalidArgumentException.js +0 -18
  161. package/dist/base/InvalidArgumentException.js.map +0 -1
  162. package/dist/base/Model.js.map +0 -1
  163. package/dist/base/ModelManager.js +0 -9
  164. package/dist/base/ModelManager.js.map +0 -1
  165. package/dist/base/RestClient.js.map +0 -1
  166. package/dist/filters/AccessControl.js.map +0 -1
  167. package/dist/filters/AccessRule.js +0 -140
  168. package/dist/filters/AccessRule.js.map +0 -1
  169. package/dist/filters/auth/HttpBasicAuth.js +0 -73
  170. package/dist/filters/auth/HttpBasicAuth.js.map +0 -1
  171. package/dist/filters/auth/JwtHttpBearerAuth.js.map +0 -1
  172. package/dist/log/config/log4js.json +0 -55
  173. package/dist/package.json +0 -55
  174. package/dist/rbac/AuthAssignment.js +0 -45
  175. package/dist/rbac/AuthAssignment.js.map +0 -1
  176. package/dist/rbac/AuthItem.js +0 -52
  177. package/dist/rbac/AuthItem.js.map +0 -1
  178. package/dist/rbac/AuthItemChild.js +0 -44
  179. package/dist/rbac/AuthItemChild.js.map +0 -1
  180. package/dist/rbac/AuthManager.js +0 -359
  181. package/dist/rbac/AuthManager.js.map +0 -1
  182. package/dist/web/WebUser.js +0 -166
  183. package/dist/web/WebUser.js.map +0 -1
  184. package/filters/AccessControl.ts +0 -77
  185. package/filters/AccessRule.ts +0 -182
  186. package/filters/auth/AuthInterface.ts +0 -34
  187. package/filters/auth/AuthMethod.ts +0 -88
  188. package/filters/auth/HttpBasicAuth.ts +0 -75
  189. package/filters/auth/HttpBearerAuth.ts +0 -31
  190. package/filters/auth/HttpHeaderAuth.ts +0 -53
  191. package/filters/auth/JwtHttpBearerAuth.ts +0 -80
  192. package/filters/auth/KeyCloakHttpBearerAuth.ts +0 -115
  193. package/filters/auth/index.ts +0 -4
  194. package/filters/index.ts +0 -2
  195. package/index.ts +0 -14
  196. package/model/RouteDefinition.ts +0 -18
  197. package/package-lock.json +0 -5259
  198. package/rbac/AuthAssignment.ts +0 -50
  199. package/rbac/AuthItem.ts +0 -57
  200. package/rbac/AuthItemChild.ts +0 -50
  201. package/rbac/AuthManager.ts +0 -398
  202. package/requiments/ReflectUtil.ts +0 -26
  203. package/requiments/Utils.ts +0 -57
  204. package/tsconfig.json +0 -18
  205. package/validators/BooleanValidator.ts +0 -0
  206. package/validators/CompareValidator.ts +0 -0
  207. package/validators/DateValidator.ts +0 -0
  208. package/validators/EmailValidator.ts +0 -0
  209. package/validators/Validator.ts +0 -27
  210. package/web/IdentityInterface.ts +0 -68
  211. package/web/WebUser.ts +0 -187
@@ -1,182 +0,0 @@
1
- /*
2
- * Copyright (c) 2021. Chy Bilgisayar Bilisim
3
- * Author: Cihan Ozturk
4
- * E-mail: cihan@chy.com.tr
5
- * Github:https://github.com/cihan53/
6
- */
7
- import {WebUser} from "../web/WebUser";
8
-
9
- var _ = require('lodash');
10
- import {Component} from "../base/Component";
11
- import {InvalidConfigException} from "../base/InvalidConfigException";
12
- import {Request, Response} from "express";
13
- import Utils from "../requiments/Utils";
14
-
15
- export class AccessRule extends Component {
16
-
17
- /**
18
- * @var bool whether this is an 'allow' rule or 'deny' rule.
19
- */
20
- public allow: any;
21
- /**
22
- * @var array list of action IDs that this rule applies to. The comparison is case-sensitive.
23
- * If not set or empty, it means this rule applies to all actions.
24
- */
25
- public actions: any;
26
-
27
- /**
28
- * @var array list of the controller IDs that this rule applies to.
29
- */
30
- public controllers: any;
31
-
32
- /**
33
- * - `?`: matches a guest user (not authenticated yet)
34
- * - `@`: matches an authenticated user
35
- */
36
-
37
- public roles: any;
38
-
39
- /**
40
- * @var array list of RBAC (Role-Based Access Control) permissions that this rules applies to.
41
- */
42
- public permissions: any;
43
-
44
- /**
45
- * @var array|Closure parameters to pass to the [[User::can()]] function for evaluating
46
- * user permissions in [[$roles]].
47
- *
48
- * If this is an array, it will be passed directly to [[User::can()]]. For example for passing an
49
- * ID from the current request, you may use the following:
50
- *
51
- * ```php
52
- * ['postId' => Yii::$app->request->get('id')]
53
- * ```
54
- *
55
- * You may also specify a closure that returns an array. This can be used to
56
- * evaluate the array values only if they are needed, for example when a model needs to be
57
- * loaded like in the following code:
58
- *
59
- * ```php
60
- * 'rules' => [
61
- * [
62
- * 'allow' => true,
63
- * 'actions' => ['update'],
64
- * 'roles' => ['updatePost'],
65
- * 'roleParams' => function($rule) {
66
- * return ['post' => Post::findOne(Yii::$app->request->get('id'))];
67
- * },
68
- * ],
69
- * ],
70
- * ```
71
- *
72
- * A reference to the [[AccessRule]] instance will be passed to the closure as the first parameter.
73
- *
74
- * @see roles
75
- * @since 2.0.12
76
- */
77
- public roleParams: any = [];
78
-
79
-
80
- /**
81
- * @var array list of user IP addresses that this rule applies to. An IP address
82
- * can contain the wildcard `*` at the end so that it matches IP addresses with the same prefix.
83
- * For example, '192.168.*' matches all IP addresses in the segment '192.168.'.
84
- * It may also contain a pattern/mask like '172.16.0.0/12' which would match all IPs from the
85
- * 20-bit private network block in RFC1918.
86
- * If not set or empty, it means this rule applies to all IP addresses.
87
- */
88
- public ips: any;
89
-
90
-
91
- public async allows(action: any, user: WebUser, request: Request) {
92
- if (
93
- this.matchAction(action)
94
- && await this.matchRole(user)
95
- ) {
96
- return this.allow
97
- }
98
- // if (this.matchAction($action)
99
- // && this.matchRole($user)
100
- // && this.matchIP($request->getUserIP())
101
- // && this.matchVerb($request->getMethod())
102
- // && this.matchController($action->controller)
103
- // && this.matchCustom($action)
104
- // ) {
105
- // return $this->allow ? true : false;
106
- // }
107
-
108
- return null;
109
- }
110
-
111
- /**
112
- * @param Action $action the action
113
- * @return bool whether the rule applies to the action
114
- */
115
- protected matchAction(action: any) {
116
- return _.isEmpty(this.actions) || this.actions.includes(action.id);
117
- }
118
-
119
- /**
120
- * @param Controller $controller the controller
121
- * @return bool whether the rule applies to the controller
122
- */
123
- protected matchController(controller: any) {
124
- // if (empty($this->controllers)) {
125
- // return true;
126
- // }
127
- //
128
- // $id = $controller->getUniqueId();
129
- // foreach ($this->controllers as $pattern) {
130
- // if (StringHelper::matchWildcard($pattern, $id)) {
131
- // return true;
132
- // }
133
- // }
134
-
135
- return false;
136
- }
137
-
138
- protected async matchRole(user: WebUser) {
139
- let items = Utils.isEmpty(this.roles) ? [] : this.roles;
140
-
141
- if (!Utils.isEmpty(this.permissions)) {
142
- items = Utils.merge(items, this.permissions);
143
- }
144
-
145
- if (Utils.isEmpty(items)) {
146
- return true;
147
- }
148
-
149
-
150
- if (!user) {
151
- throw new InvalidConfigException('The user application component must be available to specify roles in AccessRule.');
152
- }
153
-
154
- let roleParams: any = [];
155
- for (const itemsKey in items) {
156
- let item = items[itemsKey];
157
- if (item === '?') {
158
- if (user.getIsGuest()) {
159
- return true;
160
- }
161
- } else if (item === '@') {
162
- if (!user.getIsGuest()) {
163
- return true;
164
- }
165
- } else {
166
- //roleparams
167
- if (!Utils.isEmpty(this.roleParams)) {
168
- roleParams = !Utils.isArray(this.roleParams) ? this.roleParams.apply(this) : this.roleParams;
169
- }
170
-
171
- if (await user.can(item, this.roleParams)) {
172
- return true;
173
- }
174
- }
175
- }
176
-
177
-
178
- return false;
179
- }
180
-
181
-
182
- }
@@ -1,34 +0,0 @@
1
- /*
2
- * Copyright (c) 2021. Chy Bilgisayar Bilisim
3
- * Author: Cihan Ozturk
4
- * E-mail: cihan@chy.com.tr
5
- * Github:https://github.com/cihan53/
6
- */
7
- import {Request, Response} from "express";
8
-
9
- export interface AuthInterface{
10
- /**
11
- * Authenticates the current user.
12
- * @param User $user
13
- * @param Request $request
14
- * @param Response $response
15
- * @return IdentityInterface the authenticated user identity. If authentication information is not provided, null will be returned.
16
- * @throws UnauthorizedHttpException if authentication information is provided but is invalid.
17
- */
18
- authenticate(user:any, request:Request, response:Response):any;
19
-
20
- /**
21
- * Generates challenges upon authentication failure.
22
- * For example, some appropriate HTTP headers may be generated.
23
- * @param Response $response
24
- */
25
- challenge(response:Response):Response;
26
-
27
- /**
28
- * Handles authentication failure.
29
- * The implementation should normally throw UnauthorizedHttpException to indicate authentication failure.
30
- * @param Response $response
31
- * @throws UnauthorizedHttpException
32
- */
33
- handleFailure(response:Response):Response;
34
- }
@@ -1,88 +0,0 @@
1
- /*
2
- * Copyright (c) 2021. Chy Bilgisayar Bilisim
3
- * Author: Cihan Ozturk
4
- * E-mail: cihan@chy.com.tr
5
- * Github:https://github.com/cihan53/
6
- */
7
-
8
- import {ActionFilter} from "../../base/ActionFilter";
9
- import {AuthInterface} from "./AuthInterface";
10
- import {UnauthorizedHttpException} from "../../base/UnauthorizedHttpException";
11
- import {WebUser} from "../../web/WebUser";
12
- import {Request, Response} from "express";
13
-
14
- export abstract class AuthMethod extends ActionFilter implements AuthInterface {
15
-
16
- /**
17
- * @var User the user object representing the user authentication status. If not set, the `user` application component will be used.
18
- */
19
- public user: WebUser | undefined;
20
-
21
- /**
22
- * @var Request the current request. If not set, the `request` application component will be used.
23
- */
24
- public request: Request | undefined;
25
-
26
- /**
27
- * @var Response the response to be sent. If not set, the `response` application component will be used.
28
- */
29
- public response: Response | undefined;
30
-
31
-
32
- public optional = [];
33
-
34
- public async beforeAction(action: any, request: Request, response: Response) {
35
- let identity = await this.authenticate(
36
- this.user ?? new WebUser(),
37
- request,
38
- response
39
- )
40
-
41
-
42
- // @ts-ignore
43
- request.identity = identity;
44
-
45
- if (identity !== null) {
46
- return true;
47
- }
48
-
49
- this.challenge(response);
50
- this.handleFailure(response);
51
- return false;
52
- }
53
-
54
- authenticate(user: WebUser, request: Request, response: Response) {
55
-
56
- }
57
-
58
- // @ts-ignore
59
- challenge(response: Response): void {
60
- }
61
-
62
- // @ts-ignore
63
- handleFailure(response: Response) {
64
- throw new UnauthorizedHttpException('Your request was made with invalid credentials.');
65
- }
66
-
67
- getHeaderByKey(headers: any, findKey: any) {
68
- let key = Object.keys(headers).find(key => key.toLowerCase() === findKey.toLowerCase())
69
- if (key) {
70
- return headers[key];
71
- }
72
-
73
- return null
74
- }
75
-
76
- patternCheck(headerText:any, pattern:RegExp) {
77
- if (pattern) {
78
- let matches = headerText.match(pattern)
79
- if (matches && matches.length > 0) {
80
- return matches;
81
- } else {
82
- return null
83
- }
84
- }
85
-
86
- return null
87
- }
88
- }
@@ -1,75 +0,0 @@
1
- /*
2
- * Copyright (c) 2021. Chy Bilgisayar Bilisim
3
- * Author: Cihan Ozturk
4
- * E-mail: cihan@chy.com.tr
5
- * Github:https://github.com/cihan53/
6
- */
7
-
8
- import {HttpHeaderAuth} from "./HttpHeaderAuth";
9
- import {Request, Response} from "express";
10
- import {WebUser} from "../../web/WebUser";
11
- import Utils from "../../requiments/Utils";
12
- import {AuthMethod} from "./AuthMethod";
13
- import {InvalidConfigException} from "../../base";
14
- import BaseChyz from "../../BaseChyz";
15
-
16
- export class HttpBasicAuth extends AuthMethod {
17
-
18
- /**
19
- * @var string the HTTP header name
20
- */
21
- public header = 'Authorization';
22
-
23
-
24
- /**
25
- * @var string a pattern to use to extract the HTTP authentication value
26
- */
27
-
28
- public pattern = /^Basic\s+(.*?)$/;
29
-
30
-
31
- /**
32
- * @throws InvalidConfigException
33
- */
34
- public init(): void {
35
- super.init();
36
-
37
- if (!this.pattern) {
38
- throw new InvalidConfigException('You must provide pattern to use to extract the HTTP authentication value!');
39
- }
40
-
41
- this.user = BaseChyz.getComponent("user") ?? null;
42
- }
43
-
44
-
45
- async authenticate(user: WebUser, request:Request, response:Response) {
46
-
47
-
48
- let autHeader = this.getHeaderByKey(request.headers, this.header)
49
- if (autHeader == null || (autHeader = this.patternCheck(autHeader, this.pattern)) == null) {
50
- return null;
51
- }
52
-
53
- let basicauth = autHeader[1].split(":")
54
-
55
- let identity = await user.loginByAccessToken(basicauth, "HttpBasicAuth");
56
- if (identity === null) {
57
- this.challenge(response);
58
- this.handleFailure(response);
59
- }
60
-
61
- return identity;
62
-
63
-
64
- return null;
65
- }
66
-
67
-
68
- /**
69
- * @throws UnauthorizedHttpException
70
- */
71
- public fail(response:Response): void {
72
- this.challenge(response)
73
- this.handleFailure(response);
74
- }
75
- }
@@ -1,31 +0,0 @@
1
- /*
2
- * Copyright (c) 2021. Chy Bilgisayar Bilisim
3
- * Author: Cihan Ozturk
4
- * E-mail: cihan@chy.com.tr
5
- * Github:https://github.com/cihan53/
6
- */
7
-
8
- import {HttpHeaderAuth} from "./HttpHeaderAuth";
9
- import {Request, Response} from "express";
10
-
11
- export class HttpBearerAuth extends HttpHeaderAuth {
12
-
13
- /**
14
- * {@inheritdoc}
15
- */
16
- public header = 'Authorization';
17
- // @ts-ignore
18
- public pattern = /^Bearer\s+(.*?)$/;
19
- /**
20
- * @var string the HTTP authentication realm
21
- */
22
- public realm = 'api';
23
-
24
-
25
- /**
26
- * {@inheritdoc}
27
- */
28
- public challenge(response:Response) {
29
- response.set('WWW-Authenticate', `Bearer realm="${this.realm}"`);
30
- }
31
- }
@@ -1,53 +0,0 @@
1
- /*
2
- * Copyright (c) 2021. Chy Bilgisayar Bilisim
3
- * Author: Cihan Ozturk
4
- * E-mail: cihan@chy.com.tr
5
- * Github:https://github.com/cihan53/
6
- */
7
-
8
- import {AuthMethod} from "./AuthMethod";
9
- import {WebUser} from "../../web/WebUser";
10
- import Utils from "../../requiments/Utils";
11
- import {Request, Response} from "express";
12
-
13
- export class HttpHeaderAuth extends AuthMethod {
14
- /**
15
- * @var string the HTTP header name
16
- */
17
- public header = 'X-Api-Key';
18
-
19
-
20
- /**
21
- * @var string a pattern to use to extract the HTTP authentication value
22
- */
23
-
24
- public pattern!: string;
25
-
26
-
27
- async authenticate(user: WebUser, request:Request, response:Response) {
28
- let key = Object.keys(request.headers).find(key => key.toLowerCase() === this.header.toLowerCase())
29
- if (key) {
30
- let authHeader:any = request.headers[key];
31
- if (!Utils.isEmpty(authHeader)) {
32
- if (this.pattern) {
33
- //preg_match
34
- let matches = authHeader.match(this.pattern)
35
- if (matches && matches.length > 0) {
36
- authHeader = matches[1];
37
- } else {
38
- return null;
39
- }
40
- }
41
-
42
- let identity = await user.loginByAccessToken(authHeader, "HttpHeaderAuth");
43
- if (identity === null) {
44
- this.challenge(response);
45
- this.handleFailure(response);
46
- }
47
-
48
- return identity;
49
- }
50
- }
51
- return null;
52
- }
53
- }
@@ -1,80 +0,0 @@
1
- /*
2
- * Copyright (c) 2021. Chy Bilgisayar Bilisim
3
- * Author: Cihan Ozturk
4
- * E-mail: cihan@chy.com.tr
5
- * Github:https://github.com/cihan53/
6
- */
7
- import BaseChyz from "../../BaseChyz";
8
- import {HttpBearerAuth} from "./HttpBearerAuth";
9
- import {InvalidConfigException} from "../../base/InvalidConfigException";
10
- import {UnauthorizedHttpException} from "../../base/UnauthorizedHttpException";
11
- import {Response,Request} from "express";
12
- import {WebUser} from "../../web/WebUser";
13
-
14
- const JsonWebToken = require("jsonwebtoken");
15
-
16
- export class JwtHttpBearerAuth extends HttpBearerAuth {
17
- /**
18
- * @var string|array<string, mixed>|Jwt application component ID of the JWT handler, configuration array, or JWT handler object
19
- * itself. By default it's assumes that component of ID "jwt" has been configured.
20
- */
21
- public jwt = 'jwt'
22
- public auth:any = null;
23
-
24
-
25
- /**
26
- * @throws InvalidConfigException
27
- */
28
- public init(): void {
29
- super.init();
30
-
31
- if (!this.pattern) {
32
- throw new InvalidConfigException('You must provide pattern to use to extract the HTTP authentication value!');
33
- }
34
-
35
- this.user = BaseChyz.getComponent("user") ?? null;
36
- }
37
-
38
-
39
- public async authenticate(user:WebUser, request:Request, response:Response) // BC signature
40
- {
41
-
42
- let autHeader = this.getHeaderByKey(request.headers, this.header)
43
- if (autHeader == null || (autHeader = this.patternCheck(autHeader, this.pattern)) == null) {
44
- return null;
45
- }
46
-
47
- // BaseChyz.debug("JSON Web Token.",autHeader);
48
- let identity = null;
49
- let token = null;
50
-
51
- token = JsonWebToken.decode(autHeader[1], {complete: true})
52
- if (!token) {
53
- BaseChyz.warning("Your request was made with invalid or expired JSON Web Token.");
54
- this.fail(response);
55
- }
56
-
57
- if (token !== null) {
58
- if (this.auth != null) {
59
- identity = await this.auth(autHeader[1])
60
- } else {
61
- identity = await user.loginByAccessToken(autHeader[1], "JwtHttpBearerAuth")
62
- }
63
- }
64
-
65
- if (identity == null) this.fail(response)
66
-
67
-
68
- return identity;
69
- }
70
-
71
-
72
- /**
73
- * @throws UnauthorizedHttpException
74
- */
75
- public fail(response:Response): void {
76
- this.challenge(response)
77
- this.handleFailure(response);
78
- }
79
-
80
- }
@@ -1,115 +0,0 @@
1
- /*
2
- * Copyright (c) 2021. Chy Bilgisayar Bilisim
3
- * Author: Cihan Ozturk
4
- * E-mail: cihan@chy.com.tr
5
- * Github:https://github.com/cihan53/
6
- */
7
- import BaseChyz from "../../BaseChyz";
8
- import {HttpBearerAuth} from "./HttpBearerAuth";
9
- import {InvalidConfigException} from "../../base/InvalidConfigException";
10
- import {UnauthorizedHttpException} from "../../base/UnauthorizedHttpException";
11
- import {Response, Request} from "express";
12
- import {WebUser} from "../../web/WebUser";
13
-
14
- const JsonWebToken = require("jsonwebtoken");
15
-
16
- export class KeyCloakHttpBearerAuth extends HttpBearerAuth {
17
- /**
18
- * @var string|array<string, mixed>|Jwt application component ID of the JWT handler, configuration array, or JWT handler object
19
- * itself. By default it's assumes that component of ID "jwt" has been configured.
20
- */
21
- public jwt = 'jwt'
22
- public auth: any = null;
23
- public keycloak: any = null;
24
-
25
-
26
- /**
27
- * @throws InvalidConfigException
28
- */
29
- public init(): void {
30
- super.init();
31
-
32
- if (!this.pattern) {
33
- throw new InvalidConfigException('You must provide pattern to use to extract the HTTP authentication value!');
34
- }
35
-
36
- this.keycloak = BaseChyz.getMiddlewares("keycloak").keycloak ?? null;
37
- this.user = BaseChyz.getComponent("user") ?? null;
38
- this.auth = this.KeyCloakCheck;
39
-
40
-
41
- }
42
-
43
- public async KeyCloakCheck(token: string, request: Request, response: Response,) {
44
- if (this.keycloak == null) return false;
45
- // return await this.keycloak.protect('realm:user')(request, response, () => true /*next*/)
46
- return await this.keycloak.protect()(request, response, () => true /*next*/);
47
- }
48
-
49
-
50
- public async authenticate(user: WebUser, request: Request, response: Response) // BC signature
51
- {
52
-
53
- let identity = null;
54
- let token = null;
55
-
56
- let autHeader = this.getHeaderByKey(request.headers, this.header)
57
- if (autHeader == null || (autHeader = this.patternCheck(autHeader, this.pattern)) == null) {
58
- return null;
59
- }
60
-
61
- token = JsonWebToken.decode(autHeader[1], {complete: true})
62
- if (!token) {
63
- BaseChyz.warning("Your request was made with invalid or expired JSON Web Token.");
64
- this.fail(response);
65
- }
66
-
67
- if (token !== null) {
68
- identity = await this.KeyCloakCheck(autHeader[1], request, response)
69
- BaseChyz.debug("KeyCloakCheck Result:", identity)
70
- }
71
-
72
- if (identity == null || identity == false) this.fail(response)
73
-
74
- return identity;
75
-
76
- /* let autHeader = this.getHeaderByKey(request.headers, this.header)
77
- if (autHeader == null || (autHeader = this.patternCheck(autHeader, this.pattern)) == null) {
78
- return null;
79
- }
80
-
81
- BaseChyz.debug("JSON Web Token.",autHeader);
82
- let identity = null;
83
- let token = null;
84
-
85
- token = JsonWebToken.decode(autHeader[1], {complete: true})
86
- if (!token) {
87
- BaseChyz.warning("Your request was made with invalid or expired JSON Web Token.");
88
- this.fail(response);
89
- }
90
-
91
- if (token !== null) {
92
- if (this.auth != null) {
93
- identity = await this.auth(autHeader[1])
94
- } else {
95
- identity = await user.loginByAccessToken(autHeader[1], "JwtHttpBearerAuth")
96
- }
97
- }
98
-
99
- if (identity == null) this.fail(response)
100
-
101
-
102
-
103
- return identity;*/
104
- }
105
-
106
-
107
- /**
108
- * @throws UnauthorizedHttpException
109
- */
110
- public fail(response: Response): void {
111
- // this.challenge(response)
112
- // this.handleFailure(response);
113
- }
114
-
115
- }
@@ -1,4 +0,0 @@
1
- export * from "./JwtHttpBearerAuth"
2
- export * from "./HttpBearerAuth"
3
- export * from "./HttpHeaderAuth"
4
- export * from "./HttpBasicAuth"
package/filters/index.ts DELETED
@@ -1,2 +0,0 @@
1
- export * from "./AccessControl"
2
- export * from "./AccessRule"
package/index.ts DELETED
@@ -1,14 +0,0 @@
1
- export {Request, Response, NextFunction} from "express";
2
- export * from "./base";
3
- export * from "./filters";
4
- export * from "./filters/auth";
5
- export * from "./decorator";
6
- export * from "./requiments/Utils";
7
- export {RouteDefinition} from "./model/RouteDefinition";
8
- export {WebUser} from "./web/WebUser";
9
-
10
- import BaseChyz from "./BaseChyz";
11
- export {BaseChyz}
12
-
13
- const Chyz = new BaseChyz();
14
- export default Chyz;