dauth-md-node 0.1.0 → 0.1.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/dauth-md-node.cjs.development.js +9 -2
- package/dist/dauth-md-node.cjs.development.js.map +1 -1
- package/dist/dauth-md-node.cjs.production.min.js +1 -1
- package/dist/dauth-md-node.cjs.production.min.js.map +1 -1
- package/dist/dauth-md-node.esm.js +7 -3
- package/dist/dauth-md-node.esm.js.map +1 -1
- package/dist/index.d.ts +25 -1
- package/package.json +1 -1
- package/src/index.ts +36 -24
|
@@ -1,5 +1,7 @@
|
|
|
1
1
|
'use strict';
|
|
2
2
|
|
|
3
|
+
Object.defineProperty(exports, '__esModule', { value: true });
|
|
4
|
+
|
|
3
5
|
function _interopDefault (ex) { return (ex && (typeof ex === 'object') && 'default' in ex) ? ex['default'] : ex; }
|
|
4
6
|
|
|
5
7
|
var jwt = _interopDefault(require('jsonwebtoken'));
|
|
@@ -353,7 +355,7 @@ var auth = function auth(_ref) {
|
|
|
353
355
|
mdKey: 'ensure_auth'
|
|
354
356
|
}));
|
|
355
357
|
case 2:
|
|
356
|
-
token = req.headers.authorization.replace(/['"]+/g,
|
|
358
|
+
token = req.headers.authorization.replace(/['"]+/g, '');
|
|
357
359
|
_context.prev = 3;
|
|
358
360
|
payload = jwt.verify(token, ssid);
|
|
359
361
|
req.auth = payload;
|
|
@@ -361,7 +363,7 @@ var auth = function auth(_ref) {
|
|
|
361
363
|
case 9:
|
|
362
364
|
_context.prev = 9;
|
|
363
365
|
_context.t0 = _context["catch"](3);
|
|
364
|
-
if (!(_context.t0 && (_context.t0 == null ? void 0 : _context.t0.message) ===
|
|
366
|
+
if (!(_context.t0 && (_context.t0 == null ? void 0 : _context.t0.message) === 'jwt expired')) {
|
|
365
367
|
_context.next = 13;
|
|
366
368
|
break;
|
|
367
369
|
}
|
|
@@ -389,5 +391,10 @@ var auth = function auth(_ref) {
|
|
|
389
391
|
};
|
|
390
392
|
}();
|
|
391
393
|
};
|
|
394
|
+
var sum = function sum(a, b) {
|
|
395
|
+
return a + b;
|
|
396
|
+
};
|
|
397
|
+
|
|
392
398
|
exports.auth = auth;
|
|
399
|
+
exports.sum = sum;
|
|
393
400
|
//# sourceMappingURL=dauth-md-node.cjs.development.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"dauth-md-node.cjs.development.js","sources":["../src/index.ts"],"sourcesContent":["import { Request, NextFunction, Response as ExpressResponse } from
|
|
1
|
+
{"version":3,"file":"dauth-md-node.cjs.development.js","sources":["../src/index.ts"],"sourcesContent":["import { Request, NextFunction, Response as ExpressResponse } from 'express';\nimport mongoose from 'mongoose';\nimport jwt from 'jsonwebtoken';\n\nexport interface IAccessToken {\n _id: string | mongoose.Types.ObjectId;\n sid: string;\n name: string;\n lastname: string;\n email: string;\n createToken?: number;\n exp?: number;\n iat?: number;\n}\n\ninterface IRequestUser extends Request {\n auth: IAccessToken;\n files: {\n image: { path: string };\n avatar: { path: string };\n };\n headers: {\n authorization: string;\n };\n}\n\ninterface CustomResponse extends ExpressResponse {\n status(code: number): CustomResponse;\n send(body?: any): CustomResponse;\n}\n\nexport const auth = ({ ssid }: { ssid: string }) => {\n return async (req: IRequestUser, res: CustomResponse, next: NextFunction) => {\n if (!req.headers.authorization) {\n return res\n .status(403)\n .send({ status: 'token-not-found', mdKey: 'ensure_auth' });\n }\n const token = req.headers.authorization.replace(/['\"]+/g, '');\n try {\n const payload = jwt.verify(token, ssid as string) as IAccessToken;\n req.auth = payload;\n return next();\n } catch (err) {\n if (err && err?.message === 'jwt expired') {\n return res.status(500).send({\n status: 'token-expired',\n message: 'El token ha expirado',\n error: err,\n mdKey: 'ensure_auth',\n });\n }\n return res.status(500).send({\n status: 'token-invalid',\n message: 'El token no es válido',\n error: err,\n mdKey: 'ensure_auth',\n });\n }\n };\n};\n\nexport const sum = (a: number, b: number) => a + b;\n"],"names":["auth","_ref","ssid","_ref2","_asyncToGenerator","_regeneratorRuntime","mark","_callee","req","res","next","token","payload","wrap","_callee$","_context","prev","headers","authorization","abrupt","status","send","mdKey","replace","jwt","verify","t0","message","error","stop","_x","_x2","_x3","apply","arguments","sum","a","b"],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;IA+BaA,IAAI,GAAG,SAAPA,IAAIA,CAAAC,IAAA;MAAMC,IAAI,GAAAD,IAAA,CAAJC,IAAI;EACzB;IAAA,IAAAC,KAAA,GAAAC,iBAAA,eAAAC,mBAAA,GAAAC,IAAA,CAAO,SAAAC,QAAOC,GAAiB,EAAEC,GAAmB,EAAEC,IAAkB;MAAA,IAAAC,KAAA,EAAAC,OAAA;MAAA,OAAAP,mBAAA,GAAAQ,IAAA,UAAAC,SAAAC,QAAA;QAAA,kBAAAA,QAAA,CAAAC,IAAA,GAAAD,QAAA,CAAAL,IAAA;UAAA;YAAA,IACjEF,GAAG,CAACS,OAAO,CAACC,aAAa;cAAAH,QAAA,CAAAL,IAAA;cAAA;;YAAA,OAAAK,QAAA,CAAAI,MAAA,WACrBV,GAAG,CACPW,MAAM,CAAC,GAAG,CAAC,CACXC,IAAI,CAAC;cAAED,MAAM,EAAE,iBAAiB;cAAEE,KAAK,EAAE;aAAe,CAAC;UAAA;YAExDX,KAAK,GAAGH,GAAG,CAACS,OAAO,CAACC,aAAa,CAACK,OAAO,CAAC,QAAQ,EAAE,EAAE,CAAC;YAAAR,QAAA,CAAAC,IAAA;YAErDJ,OAAO,GAAGY,GAAG,CAACC,MAAM,CAACd,KAAK,EAAET,IAAc,CAAiB;YACjEM,GAAG,CAACR,IAAI,GAAGY,OAAO;YAAC,OAAAG,QAAA,CAAAI,MAAA,WACZT,IAAI,EAAE;UAAA;YAAAK,QAAA,CAAAC,IAAA;YAAAD,QAAA,CAAAW,EAAA,GAAAX,QAAA;YAAA,MAETA,QAAA,CAAAW,EAAA,IAAO,CAAAX,QAAA,CAAAW,EAAA,oBAAAX,QAAA,CAAAW,EAAA,CAAKC,OAAO,MAAK,aAAa;cAAAZ,QAAA,CAAAL,IAAA;cAAA;;YAAA,OAAAK,QAAA,CAAAI,MAAA,WAChCV,GAAG,CAACW,MAAM,CAAC,GAAG,CAAC,CAACC,IAAI,CAAC;cAC1BD,MAAM,EAAE,eAAe;cACvBO,OAAO,EAAE,sBAAsB;cAC/BC,KAAK,EAAAb,QAAA,CAAAW,EAAK;cACVJ,KAAK,EAAE;aACR,CAAC;UAAA;YAAA,OAAAP,QAAA,CAAAI,MAAA,WAEGV,GAAG,CAACW,MAAM,CAAC,GAAG,CAAC,CAACC,IAAI,CAAC;cAC1BD,MAAM,EAAE,eAAe;cACvBO,OAAO,EAAE,uBAAuB;cAChCC,KAAK,EAAAb,QAAA,CAAAW,EAAK;cACVJ,KAAK,EAAE;aACR,CAAC;UAAA;UAAA;YAAA,OAAAP,QAAA,CAAAc,IAAA;;SAAAtB,OAAA;KAEL;IAAA,iBAAAuB,EAAA,EAAAC,GAAA,EAAAC,GAAA;MAAA,OAAA7B,KAAA,CAAA8B,KAAA,OAAAC,SAAA;;;AACH;IAEaC,GAAG,GAAG,SAANA,GAAGA,CAAIC,CAAS,EAAEC,CAAS;EAAA,OAAKD,CAAC,GAAGC,CAAC;AAAA;;;;;"}
|
|
@@ -1,2 +1,2 @@
|
|
|
1
|
-
"use strict";var t,r=(t=require("jsonwebtoken"))&&"object"==typeof t&&"default"in t?t.default:t;function e(){e=function(){return r};var t,r={},n=Object.prototype,o=n.hasOwnProperty,i=Object.defineProperty||function(t,r,e){t[r]=e.value},a="function"==typeof Symbol?Symbol:{},u=a.iterator||"@@iterator",c=a.asyncIterator||"@@asyncIterator",s=a.toStringTag||"@@toStringTag";function h(t,r,e){return Object.defineProperty(t,r,{value:e,enumerable:!0,configurable:!0,writable:!0}),t[r]}try{h({},"")}catch(t){h=function(t,r,e){return t[r]=e}}function f(t,r,e,n){var o=Object.create((r&&r.prototype instanceof g?r:g).prototype),a=new N(n||[]);return i(o,"_invoke",{value:
|
|
1
|
+
"use strict";Object.defineProperty(exports,"__esModule",{value:!0});var t,r=(t=require("jsonwebtoken"))&&"object"==typeof t&&"default"in t?t.default:t;function e(){e=function(){return r};var t,r={},n=Object.prototype,o=n.hasOwnProperty,i=Object.defineProperty||function(t,r,e){t[r]=e.value},a="function"==typeof Symbol?Symbol:{},u=a.iterator||"@@iterator",c=a.asyncIterator||"@@asyncIterator",s=a.toStringTag||"@@toStringTag";function h(t,r,e){return Object.defineProperty(t,r,{value:e,enumerable:!0,configurable:!0,writable:!0}),t[r]}try{h({},"")}catch(t){h=function(t,r,e){return t[r]=e}}function f(t,r,e,n){var o=Object.create((r&&r.prototype instanceof g?r:g).prototype),a=new N(n||[]);return i(o,"_invoke",{value:k(t,e,a)}),o}function l(t,r,e){try{return{type:"normal",arg:t.call(r,e)}}catch(t){return{type:"throw",arg:t}}}r.wrap=f;var p="suspendedStart",v="executing",y="completed",d={};function g(){}function m(){}function w(){}var b={};h(b,u,(function(){return this}));var x=Object.getPrototypeOf,L=x&&x(x(S([])));L&&L!==n&&o.call(L,u)&&(b=L);var E=w.prototype=g.prototype=Object.create(b);function _(t){["next","throw","return"].forEach((function(r){h(t,r,(function(t){return this._invoke(r,t)}))}))}function j(t,r){function e(n,i,a,u){var c=l(t[n],t,i);if("throw"!==c.type){var s=c.arg,h=s.value;return h&&"object"==typeof h&&o.call(h,"__await")?r.resolve(h.__await).then((function(t){e("next",t,a,u)}),(function(t){e("throw",t,a,u)})):r.resolve(h).then((function(t){s.value=t,a(s)}),(function(t){return e("throw",t,a,u)}))}u(c.arg)}var n;i(this,"_invoke",{value:function(t,o){function i(){return new r((function(r,n){e(t,o,r,n)}))}return n=n?n.then(i,i):i()}})}function k(r,e,n){var o=p;return function(i,a){if(o===v)throw new Error("Generator is already running");if(o===y){if("throw"===i)throw a;return{value:t,done:!0}}for(n.method=i,n.arg=a;;){var u=n.delegate;if(u){var c=O(u,n);if(c){if(c===d)continue;return c}}if("next"===n.method)n.sent=n._sent=n.arg;else if("throw"===n.method){if(o===p)throw o=y,n.arg;n.dispatchException(n.arg)}else"return"===n.method&&n.abrupt("return",n.arg);o=v;var s=l(r,e,n);if("normal"===s.type){if(o=n.done?y:"suspendedYield",s.arg===d)continue;return{value:s.arg,done:n.done}}"throw"===s.type&&(o=y,n.method="throw",n.arg=s.arg)}}}function O(r,e){var n=e.method,o=r.iterator[n];if(o===t)return e.delegate=null,"throw"===n&&r.iterator.return&&(e.method="return",e.arg=t,O(r,e),"throw"===e.method)||"return"!==n&&(e.method="throw",e.arg=new TypeError("The iterator does not provide a '"+n+"' method")),d;var i=l(o,r.iterator,e.arg);if("throw"===i.type)return e.method="throw",e.arg=i.arg,e.delegate=null,d;var a=i.arg;return a?a.done?(e[r.resultName]=a.value,e.next=r.nextLoc,"return"!==e.method&&(e.method="next",e.arg=t),e.delegate=null,d):a:(e.method="throw",e.arg=new TypeError("iterator result is not an object"),e.delegate=null,d)}function P(t){var r={tryLoc:t[0]};1 in t&&(r.catchLoc=t[1]),2 in t&&(r.finallyLoc=t[2],r.afterLoc=t[3]),this.tryEntries.push(r)}function G(t){var r=t.completion||{};r.type="normal",delete r.arg,t.completion=r}function N(t){this.tryEntries=[{tryLoc:"root"}],t.forEach(P,this),this.reset(!0)}function S(r){if(r||""===r){var e=r[u];if(e)return e.call(r);if("function"==typeof r.next)return r;if(!isNaN(r.length)){var n=-1,i=function e(){for(;++n<r.length;)if(o.call(r,n))return e.value=r[n],e.done=!1,e;return e.value=t,e.done=!0,e};return i.next=i}}throw new TypeError(typeof r+" is not iterable")}return m.prototype=w,i(E,"constructor",{value:w,configurable:!0}),i(w,"constructor",{value:m,configurable:!0}),m.displayName=h(w,s,"GeneratorFunction"),r.isGeneratorFunction=function(t){var r="function"==typeof t&&t.constructor;return!!r&&(r===m||"GeneratorFunction"===(r.displayName||r.name))},r.mark=function(t){return Object.setPrototypeOf?Object.setPrototypeOf(t,w):(t.__proto__=w,h(t,s,"GeneratorFunction")),t.prototype=Object.create(E),t},r.awrap=function(t){return{__await:t}},_(j.prototype),h(j.prototype,c,(function(){return this})),r.AsyncIterator=j,r.async=function(t,e,n,o,i){void 0===i&&(i=Promise);var a=new j(f(t,e,n,o),i);return r.isGeneratorFunction(e)?a:a.next().then((function(t){return t.done?t.value:a.next()}))},_(E),h(E,s,"Generator"),h(E,u,(function(){return this})),h(E,"toString",(function(){return"[object Generator]"})),r.keys=function(t){var r=Object(t),e=[];for(var n in r)e.push(n);return e.reverse(),function t(){for(;e.length;){var n=e.pop();if(n in r)return t.value=n,t.done=!1,t}return t.done=!0,t}},r.values=S,N.prototype={constructor:N,reset:function(r){if(this.prev=0,this.next=0,this.sent=this._sent=t,this.done=!1,this.delegate=null,this.method="next",this.arg=t,this.tryEntries.forEach(G),!r)for(var e in this)"t"===e.charAt(0)&&o.call(this,e)&&!isNaN(+e.slice(1))&&(this[e]=t)},stop:function(){this.done=!0;var t=this.tryEntries[0].completion;if("throw"===t.type)throw t.arg;return this.rval},dispatchException:function(r){if(this.done)throw r;var e=this;function n(n,o){return u.type="throw",u.arg=r,e.next=n,o&&(e.method="next",e.arg=t),!!o}for(var i=this.tryEntries.length-1;i>=0;--i){var a=this.tryEntries[i],u=a.completion;if("root"===a.tryLoc)return n("end");if(a.tryLoc<=this.prev){var c=o.call(a,"catchLoc"),s=o.call(a,"finallyLoc");if(c&&s){if(this.prev<a.catchLoc)return n(a.catchLoc,!0);if(this.prev<a.finallyLoc)return n(a.finallyLoc)}else if(c){if(this.prev<a.catchLoc)return n(a.catchLoc,!0)}else{if(!s)throw new Error("try statement without catch or finally");if(this.prev<a.finallyLoc)return n(a.finallyLoc)}}}},abrupt:function(t,r){for(var e=this.tryEntries.length-1;e>=0;--e){var n=this.tryEntries[e];if(n.tryLoc<=this.prev&&o.call(n,"finallyLoc")&&this.prev<n.finallyLoc){var i=n;break}}i&&("break"===t||"continue"===t)&&i.tryLoc<=r&&r<=i.finallyLoc&&(i=null);var a=i?i.completion:{};return a.type=t,a.arg=r,i?(this.method="next",this.next=i.finallyLoc,d):this.complete(a)},complete:function(t,r){if("throw"===t.type)throw t.arg;return"break"===t.type||"continue"===t.type?this.next=t.arg:"return"===t.type?(this.rval=this.arg=t.arg,this.method="return",this.next="end"):"normal"===t.type&&r&&(this.next=r),d},finish:function(t){for(var r=this.tryEntries.length-1;r>=0;--r){var e=this.tryEntries[r];if(e.finallyLoc===t)return this.complete(e.completion,e.afterLoc),G(e),d}},catch:function(t){for(var r=this.tryEntries.length-1;r>=0;--r){var e=this.tryEntries[r];if(e.tryLoc===t){var n=e.completion;if("throw"===n.type){var o=n.arg;G(e)}return o}}throw new Error("illegal catch attempt")},delegateYield:function(r,e,n){return this.delegate={iterator:S(r),resultName:e,nextLoc:n},"next"===this.method&&(this.arg=t),d}},r}function n(t,r,e,n,o,i,a){try{var u=t[i](a),c=u.value}catch(t){return void e(t)}u.done?r(c):Promise.resolve(c).then(n,o)}exports.auth=function(t){var o=t.ssid;return function(){var t,i=(t=e().mark((function t(n,i,a){var u,c;return e().wrap((function(t){for(;;)switch(t.prev=t.next){case 0:if(n.headers.authorization){t.next=2;break}return t.abrupt("return",i.status(403).send({status:"token-not-found",mdKey:"ensure_auth"}));case 2:return u=n.headers.authorization.replace(/['"]+/g,""),t.prev=3,c=r.verify(u,o),n.auth=c,t.abrupt("return",a());case 9:if(t.prev=9,t.t0=t.catch(3),!t.t0||"jwt expired"!==(null==t.t0?void 0:t.t0.message)){t.next=13;break}return t.abrupt("return",i.status(500).send({status:"token-expired",message:"El token ha expirado",error:t.t0,mdKey:"ensure_auth"}));case 13:return t.abrupt("return",i.status(500).send({status:"token-invalid",message:"El token no es válido",error:t.t0,mdKey:"ensure_auth"}));case 14:case"end":return t.stop()}}),t,null,[[3,9]])})),function(){var r=this,e=arguments;return new Promise((function(o,i){var a=t.apply(r,e);function u(t){n(a,o,i,u,c,"next",t)}function c(t){n(a,o,i,u,c,"throw",t)}u(void 0)}))});return function(t,r,e){return i.apply(this,arguments)}}()},exports.sum=function(t,r){return t+r};
|
|
2
2
|
//# sourceMappingURL=dauth-md-node.cjs.production.min.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"dauth-md-node.cjs.production.min.js","sources":["../src/index.ts"],"sourcesContent":["import { Request, NextFunction, Response as ExpressResponse } from
|
|
1
|
+
{"version":3,"file":"dauth-md-node.cjs.production.min.js","sources":["../src/index.ts"],"sourcesContent":["import { Request, NextFunction, Response as ExpressResponse } from 'express';\nimport mongoose from 'mongoose';\nimport jwt from 'jsonwebtoken';\n\nexport interface IAccessToken {\n _id: string | mongoose.Types.ObjectId;\n sid: string;\n name: string;\n lastname: string;\n email: string;\n createToken?: number;\n exp?: number;\n iat?: number;\n}\n\ninterface IRequestUser extends Request {\n auth: IAccessToken;\n files: {\n image: { path: string };\n avatar: { path: string };\n };\n headers: {\n authorization: string;\n };\n}\n\ninterface CustomResponse extends ExpressResponse {\n status(code: number): CustomResponse;\n send(body?: any): CustomResponse;\n}\n\nexport const auth = ({ ssid }: { ssid: string }) => {\n return async (req: IRequestUser, res: CustomResponse, next: NextFunction) => {\n if (!req.headers.authorization) {\n return res\n .status(403)\n .send({ status: 'token-not-found', mdKey: 'ensure_auth' });\n }\n const token = req.headers.authorization.replace(/['\"]+/g, '');\n try {\n const payload = jwt.verify(token, ssid as string) as IAccessToken;\n req.auth = payload;\n return next();\n } catch (err) {\n if (err && err?.message === 'jwt expired') {\n return res.status(500).send({\n status: 'token-expired',\n message: 'El token ha expirado',\n error: err,\n mdKey: 'ensure_auth',\n });\n }\n return res.status(500).send({\n status: 'token-invalid',\n message: 'El token no es válido',\n error: err,\n mdKey: 'ensure_auth',\n });\n }\n };\n};\n\nexport const sum = (a: number, b: number) => a + b;\n"],"names":["_ref","ssid","_ref2","_regeneratorRuntime","mark","_callee","req","res","next","token","payload","wrap","_context","prev","headers","authorization","abrupt","status","send","mdKey","replace","jwt","verify","auth","t0","message","error","stop","_x","_x2","_x3","apply","arguments","a","b"],"mappings":"yoNA+BoB,SAAHA,OAAMC,EAAID,EAAJC,KACrB,kBAAA,MAAAC,KAAAC,IAAAC,MAAO,SAAAC,EAAOC,EAAmBC,EAAqBC,GAAkB,IAAAC,EAAAC,EAAA,OAAAP,IAAAQ,eAAAC,GAAA,cAAAA,EAAAC,KAAAD,EAAAJ,MAAA,OAAA,GACjEF,EAAIQ,QAAQC,eAAaH,EAAAJ,OAAA,MAAA,OAAAI,EAAAI,gBACrBT,EACJU,OAAO,KACPC,KAAK,CAAED,OAAQ,kBAAmBE,MAAO,iBAAgB,OAKzC,OAHfV,EAAQH,EAAIQ,QAAQC,cAAcK,QAAQ,SAAU,IAAGR,EAAAC,OAErDH,EAAUW,EAAIC,OAAOb,EAAOR,GAClCK,EAAIiB,KAAOb,EAAQE,EAAAI,gBACZR,KAAM,OAAA,GAAAI,EAAAC,OAAAD,EAAAY,GAAAZ,YAETA,EAAAY,IAAwB,uBAAjBZ,EAAAY,UAAAZ,EAAAY,GAAKC,UAAyBb,EAAAJ,QAAA,MAAA,OAAAI,EAAAI,gBAChCT,EAAIU,OAAO,KAAKC,KAAK,CAC1BD,OAAQ,gBACRQ,QAAS,uBACTC,MAAKd,EAAAY,GACLL,MAAO,iBACP,QAAA,OAAAP,EAAAI,gBAEGT,EAAIU,OAAO,KAAKC,KAAK,CAC1BD,OAAQ,gBACRQ,QAAS,wBACTC,MAAKd,EAAAY,GACLL,MAAO,iBACP,QAAA,UAAA,OAAAP,EAAAe,UAAAtB,kMAEL,gBAAAuB,EAAAC,EAAAC,GAAA,OAAA5B,EAAA6B,WAAAC,4BAGgB,SAACC,EAAWC,GAAS,OAAKD,EAAIC"}
|
|
@@ -349,7 +349,7 @@ var auth = function auth(_ref) {
|
|
|
349
349
|
mdKey: 'ensure_auth'
|
|
350
350
|
}));
|
|
351
351
|
case 2:
|
|
352
|
-
token = req.headers.authorization.replace(/['"]+/g,
|
|
352
|
+
token = req.headers.authorization.replace(/['"]+/g, '');
|
|
353
353
|
_context.prev = 3;
|
|
354
354
|
payload = jwt.verify(token, ssid);
|
|
355
355
|
req.auth = payload;
|
|
@@ -357,7 +357,7 @@ var auth = function auth(_ref) {
|
|
|
357
357
|
case 9:
|
|
358
358
|
_context.prev = 9;
|
|
359
359
|
_context.t0 = _context["catch"](3);
|
|
360
|
-
if (!(_context.t0 && (_context.t0 == null ? void 0 : _context.t0.message) ===
|
|
360
|
+
if (!(_context.t0 && (_context.t0 == null ? void 0 : _context.t0.message) === 'jwt expired')) {
|
|
361
361
|
_context.next = 13;
|
|
362
362
|
break;
|
|
363
363
|
}
|
|
@@ -385,5 +385,9 @@ var auth = function auth(_ref) {
|
|
|
385
385
|
};
|
|
386
386
|
}();
|
|
387
387
|
};
|
|
388
|
-
|
|
388
|
+
var sum = function sum(a, b) {
|
|
389
|
+
return a + b;
|
|
390
|
+
};
|
|
391
|
+
|
|
392
|
+
export { auth, sum };
|
|
389
393
|
//# sourceMappingURL=dauth-md-node.esm.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"dauth-md-node.esm.js","sources":["../src/index.ts"],"sourcesContent":["import { Request, NextFunction, Response as ExpressResponse } from
|
|
1
|
+
{"version":3,"file":"dauth-md-node.esm.js","sources":["../src/index.ts"],"sourcesContent":["import { Request, NextFunction, Response as ExpressResponse } from 'express';\nimport mongoose from 'mongoose';\nimport jwt from 'jsonwebtoken';\n\nexport interface IAccessToken {\n _id: string | mongoose.Types.ObjectId;\n sid: string;\n name: string;\n lastname: string;\n email: string;\n createToken?: number;\n exp?: number;\n iat?: number;\n}\n\ninterface IRequestUser extends Request {\n auth: IAccessToken;\n files: {\n image: { path: string };\n avatar: { path: string };\n };\n headers: {\n authorization: string;\n };\n}\n\ninterface CustomResponse extends ExpressResponse {\n status(code: number): CustomResponse;\n send(body?: any): CustomResponse;\n}\n\nexport const auth = ({ ssid }: { ssid: string }) => {\n return async (req: IRequestUser, res: CustomResponse, next: NextFunction) => {\n if (!req.headers.authorization) {\n return res\n .status(403)\n .send({ status: 'token-not-found', mdKey: 'ensure_auth' });\n }\n const token = req.headers.authorization.replace(/['\"]+/g, '');\n try {\n const payload = jwt.verify(token, ssid as string) as IAccessToken;\n req.auth = payload;\n return next();\n } catch (err) {\n if (err && err?.message === 'jwt expired') {\n return res.status(500).send({\n status: 'token-expired',\n message: 'El token ha expirado',\n error: err,\n mdKey: 'ensure_auth',\n });\n }\n return res.status(500).send({\n status: 'token-invalid',\n message: 'El token no es válido',\n error: err,\n mdKey: 'ensure_auth',\n });\n }\n };\n};\n\nexport const sum = (a: number, b: number) => a + b;\n"],"names":["auth","_ref","ssid","_ref2","_asyncToGenerator","_regeneratorRuntime","mark","_callee","req","res","next","token","payload","wrap","_callee$","_context","prev","headers","authorization","abrupt","status","send","mdKey","replace","jwt","verify","t0","message","error","stop","_x","_x2","_x3","apply","arguments","sum","a","b"],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;IA+BaA,IAAI,GAAG,SAAPA,IAAIA,CAAAC,IAAA;MAAMC,IAAI,GAAAD,IAAA,CAAJC,IAAI;EACzB;IAAA,IAAAC,KAAA,GAAAC,iBAAA,eAAAC,mBAAA,GAAAC,IAAA,CAAO,SAAAC,QAAOC,GAAiB,EAAEC,GAAmB,EAAEC,IAAkB;MAAA,IAAAC,KAAA,EAAAC,OAAA;MAAA,OAAAP,mBAAA,GAAAQ,IAAA,UAAAC,SAAAC,QAAA;QAAA,kBAAAA,QAAA,CAAAC,IAAA,GAAAD,QAAA,CAAAL,IAAA;UAAA;YAAA,IACjEF,GAAG,CAACS,OAAO,CAACC,aAAa;cAAAH,QAAA,CAAAL,IAAA;cAAA;;YAAA,OAAAK,QAAA,CAAAI,MAAA,WACrBV,GAAG,CACPW,MAAM,CAAC,GAAG,CAAC,CACXC,IAAI,CAAC;cAAED,MAAM,EAAE,iBAAiB;cAAEE,KAAK,EAAE;aAAe,CAAC;UAAA;YAExDX,KAAK,GAAGH,GAAG,CAACS,OAAO,CAACC,aAAa,CAACK,OAAO,CAAC,QAAQ,EAAE,EAAE,CAAC;YAAAR,QAAA,CAAAC,IAAA;YAErDJ,OAAO,GAAGY,GAAG,CAACC,MAAM,CAACd,KAAK,EAAET,IAAc,CAAiB;YACjEM,GAAG,CAACR,IAAI,GAAGY,OAAO;YAAC,OAAAG,QAAA,CAAAI,MAAA,WACZT,IAAI,EAAE;UAAA;YAAAK,QAAA,CAAAC,IAAA;YAAAD,QAAA,CAAAW,EAAA,GAAAX,QAAA;YAAA,MAETA,QAAA,CAAAW,EAAA,IAAO,CAAAX,QAAA,CAAAW,EAAA,oBAAAX,QAAA,CAAAW,EAAA,CAAKC,OAAO,MAAK,aAAa;cAAAZ,QAAA,CAAAL,IAAA;cAAA;;YAAA,OAAAK,QAAA,CAAAI,MAAA,WAChCV,GAAG,CAACW,MAAM,CAAC,GAAG,CAAC,CAACC,IAAI,CAAC;cAC1BD,MAAM,EAAE,eAAe;cACvBO,OAAO,EAAE,sBAAsB;cAC/BC,KAAK,EAAAb,QAAA,CAAAW,EAAK;cACVJ,KAAK,EAAE;aACR,CAAC;UAAA;YAAA,OAAAP,QAAA,CAAAI,MAAA,WAEGV,GAAG,CAACW,MAAM,CAAC,GAAG,CAAC,CAACC,IAAI,CAAC;cAC1BD,MAAM,EAAE,eAAe;cACvBO,OAAO,EAAE,uBAAuB;cAChCC,KAAK,EAAAb,QAAA,CAAAW,EAAK;cACVJ,KAAK,EAAE;aACR,CAAC;UAAA;UAAA;YAAA,OAAAP,QAAA,CAAAc,IAAA;;SAAAtB,OAAA;KAEL;IAAA,iBAAAuB,EAAA,EAAAC,GAAA,EAAAC,GAAA;MAAA,OAAA7B,KAAA,CAAA8B,KAAA,OAAAC,SAAA;;;AACH;IAEaC,GAAG,GAAG,SAANA,GAAGA,CAAIC,CAAS,EAAEC,CAAS;EAAA,OAAKD,CAAC,GAAGC,CAAC;AAAA;;;;"}
|
package/dist/index.d.ts
CHANGED
|
@@ -1,4 +1,5 @@
|
|
|
1
|
-
import
|
|
1
|
+
import { Request, NextFunction, Response as ExpressResponse } from 'express';
|
|
2
|
+
import mongoose from 'mongoose';
|
|
2
3
|
export interface IAccessToken {
|
|
3
4
|
_id: string | mongoose.Types.ObjectId;
|
|
4
5
|
sid: string;
|
|
@@ -9,3 +10,26 @@ export interface IAccessToken {
|
|
|
9
10
|
exp?: number;
|
|
10
11
|
iat?: number;
|
|
11
12
|
}
|
|
13
|
+
interface IRequestUser extends Request {
|
|
14
|
+
auth: IAccessToken;
|
|
15
|
+
files: {
|
|
16
|
+
image: {
|
|
17
|
+
path: string;
|
|
18
|
+
};
|
|
19
|
+
avatar: {
|
|
20
|
+
path: string;
|
|
21
|
+
};
|
|
22
|
+
};
|
|
23
|
+
headers: {
|
|
24
|
+
authorization: string;
|
|
25
|
+
};
|
|
26
|
+
}
|
|
27
|
+
interface CustomResponse extends ExpressResponse {
|
|
28
|
+
status(code: number): CustomResponse;
|
|
29
|
+
send(body?: any): CustomResponse;
|
|
30
|
+
}
|
|
31
|
+
export declare const auth: ({ ssid }: {
|
|
32
|
+
ssid: string;
|
|
33
|
+
}) => (req: IRequestUser, res: CustomResponse, next: NextFunction) => Promise<void | CustomResponse>;
|
|
34
|
+
export declare const sum: (a: number, b: number) => number;
|
|
35
|
+
export {};
|
package/package.json
CHANGED
package/src/index.ts
CHANGED
|
@@ -1,27 +1,27 @@
|
|
|
1
|
-
import { Request, NextFunction, Response as ExpressResponse } from
|
|
2
|
-
import mongoose from
|
|
3
|
-
import jwt from
|
|
1
|
+
import { Request, NextFunction, Response as ExpressResponse } from 'express';
|
|
2
|
+
import mongoose from 'mongoose';
|
|
3
|
+
import jwt from 'jsonwebtoken';
|
|
4
4
|
|
|
5
5
|
export interface IAccessToken {
|
|
6
|
-
_id: string | mongoose.Types.ObjectId
|
|
7
|
-
sid: string
|
|
8
|
-
name: string
|
|
9
|
-
lastname: string
|
|
10
|
-
email: string
|
|
11
|
-
createToken?: number
|
|
12
|
-
exp?: number
|
|
13
|
-
iat?: number
|
|
6
|
+
_id: string | mongoose.Types.ObjectId;
|
|
7
|
+
sid: string;
|
|
8
|
+
name: string;
|
|
9
|
+
lastname: string;
|
|
10
|
+
email: string;
|
|
11
|
+
createToken?: number;
|
|
12
|
+
exp?: number;
|
|
13
|
+
iat?: number;
|
|
14
14
|
}
|
|
15
15
|
|
|
16
16
|
interface IRequestUser extends Request {
|
|
17
|
-
auth: IAccessToken
|
|
17
|
+
auth: IAccessToken;
|
|
18
18
|
files: {
|
|
19
|
-
image: { path: string }
|
|
20
|
-
avatar: { path: string }
|
|
21
|
-
}
|
|
19
|
+
image: { path: string };
|
|
20
|
+
avatar: { path: string };
|
|
21
|
+
};
|
|
22
22
|
headers: {
|
|
23
|
-
authorization: string
|
|
24
|
-
}
|
|
23
|
+
authorization: string;
|
|
24
|
+
};
|
|
25
25
|
}
|
|
26
26
|
|
|
27
27
|
interface CustomResponse extends ExpressResponse {
|
|
@@ -29,23 +29,35 @@ interface CustomResponse extends ExpressResponse {
|
|
|
29
29
|
send(body?: any): CustomResponse;
|
|
30
30
|
}
|
|
31
31
|
|
|
32
|
-
const auth = ({ ssid }: { ssid: string }) => {
|
|
32
|
+
export const auth = ({ ssid }: { ssid: string }) => {
|
|
33
33
|
return async (req: IRequestUser, res: CustomResponse, next: NextFunction) => {
|
|
34
34
|
if (!req.headers.authorization) {
|
|
35
|
-
return res
|
|
35
|
+
return res
|
|
36
|
+
.status(403)
|
|
37
|
+
.send({ status: 'token-not-found', mdKey: 'ensure_auth' });
|
|
36
38
|
}
|
|
37
|
-
const token = req.headers.authorization.replace(/['"]+/g,
|
|
39
|
+
const token = req.headers.authorization.replace(/['"]+/g, '');
|
|
38
40
|
try {
|
|
39
41
|
const payload = jwt.verify(token, ssid as string) as IAccessToken;
|
|
40
42
|
req.auth = payload;
|
|
41
43
|
return next();
|
|
42
44
|
} catch (err) {
|
|
43
|
-
if (err && err?.message ===
|
|
44
|
-
return res.status(500).send({
|
|
45
|
+
if (err && err?.message === 'jwt expired') {
|
|
46
|
+
return res.status(500).send({
|
|
47
|
+
status: 'token-expired',
|
|
48
|
+
message: 'El token ha expirado',
|
|
49
|
+
error: err,
|
|
50
|
+
mdKey: 'ensure_auth',
|
|
51
|
+
});
|
|
45
52
|
}
|
|
46
|
-
return res.status(500).send({
|
|
53
|
+
return res.status(500).send({
|
|
54
|
+
status: 'token-invalid',
|
|
55
|
+
message: 'El token no es válido',
|
|
56
|
+
error: err,
|
|
57
|
+
mdKey: 'ensure_auth',
|
|
58
|
+
});
|
|
47
59
|
}
|
|
48
60
|
};
|
|
49
61
|
};
|
|
50
62
|
|
|
51
|
-
|
|
63
|
+
export const sum = (a: number, b: number) => a + b;
|