dauth-md-node 0.1.5 → 0.1.61

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -6,7 +6,6 @@ function _interopDefault (ex) { return (ex && (typeof ex === 'object') && 'defau
6
6
 
7
7
  var jwt = _interopDefault(require('jsonwebtoken'));
8
8
 
9
- // declare const dauth: (opts?: { ssid: string }) => Handler;
10
9
  var dauth = function dauth(_ref) {
11
10
  var ssid = _ref.ssid;
12
11
  return function (req, res, next) {
@@ -21,28 +20,24 @@ var dauth = function dauth(_ref) {
21
20
  var payload = jwt.verify(token, ssid);
22
21
  req.auth = payload;
23
22
  return next();
24
- } catch (err) {
25
- if (err && (err == null ? void 0 : err.message) === 'jwt expired') {
23
+ } catch (error) {
24
+ if (error && (error == null ? void 0 : error.message) === 'jwt expired') {
26
25
  return res.status(500).send({
27
26
  status: 'token-expired',
28
27
  message: 'El token ha expirado',
29
- error: err,
28
+ error: error,
30
29
  mdKey: 'ensure_auth'
31
30
  });
32
31
  }
33
32
  return res.status(500).send({
34
33
  status: 'token-invalid',
35
34
  message: 'El token no es válido',
36
- error: err,
35
+ error: error,
37
36
  mdKey: 'ensure_auth'
38
37
  });
39
38
  }
40
39
  };
41
40
  };
42
- var sum = function sum(a, b) {
43
- return a + b;
44
- };
45
41
 
46
42
  exports.dauth = dauth;
47
- exports.sum = sum;
48
43
  //# sourceMappingURL=dauth-md-node.cjs.development.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"dauth-md-node.cjs.development.js","sources":["../src/index.ts"],"sourcesContent":["import { Request, NextFunction, Response as ExpressResponse, Handler } from 'express';\nimport mongoose from 'mongoose';\nimport jwt from 'jsonwebtoken';\n\nexport interface IAccessToken {\n _id: string | mongoose.Types.ObjectId;\n sid: string;\n name: string;\n lastname: string;\n email: string;\n createToken?: number;\n exp?: number;\n iat?: number;\n}\n\ninterface IRequestUser extends Request {\n auth: IAccessToken;\n files: {\n image: { path: string };\n avatar: { path: string };\n };\n headers: {\n authorization: string;\n };\n}\n\ninterface TCustomResponse extends ExpressResponse {\n status(code: number): any;\n send(body?: any): any;\n}\n\n// declare const dauth: (opts?: { ssid: string }) => Handler;\n\nexport const dauth = ({ ssid }: { ssid: string }) => {\n return (req: IRequestUser, res: TCustomResponse, next: NextFunction): Handler | void => {\n if (!req.headers.authorization) {\n return res\n .status(403)\n .send({ status: 'token-not-found', mdKey: 'ensure_auth' });\n }\n const token = req.headers.authorization.replace(/['\"]+/g, '');\n try {\n const payload = jwt.verify(token, ssid as string) as IAccessToken;\n req.auth = payload;\n return next();\n } catch (err) {\n if (err && err?.message === 'jwt expired') {\n return res.status(500).send({\n status: 'token-expired',\n message: 'El token ha expirado',\n error: err,\n mdKey: 'ensure_auth',\n });\n }\n return res.status(500).send({\n status: 'token-invalid',\n message: 'El token no es válido',\n error: err,\n mdKey: 'ensure_auth',\n });\n }\n };\n};\n\nexport const sum = (a: number, b: number) => a + b;\n"],"names":["dauth","_ref","ssid","req","res","next","headers","authorization","status","send","mdKey","token","replace","payload","jwt","verify","auth","err","message","error","sum","a","b"],"mappings":";;;;;;;;AA+BA;IAEaA,KAAK,GAAG,SAARA,KAAKA,CAAAC,IAAA;MAAMC,IAAI,GAAAD,IAAA,CAAJC,IAAI;EAC1B,OAAO,UAACC,GAAiB,EAAEC,GAAoB,EAAEC,IAAkB;IACjE,IAAI,CAACF,GAAG,CAACG,OAAO,CAACC,aAAa,EAAE;MAC9B,OAAOH,GAAG,CACPI,MAAM,CAAC,GAAG,CAAC,CACXC,IAAI,CAAC;QAAED,MAAM,EAAE,iBAAiB;QAAEE,KAAK,EAAE;OAAe,CAAC;;IAE9D,IAAMC,KAAK,GAAGR,GAAG,CAACG,OAAO,CAACC,aAAa,CAACK,OAAO,CAAC,QAAQ,EAAE,EAAE,CAAC;IAC7D,IAAI;MACF,IAAMC,OAAO,GAAGC,GAAG,CAACC,MAAM,CAACJ,KAAK,EAAET,IAAc,CAAiB;MACjEC,GAAG,CAACa,IAAI,GAAGH,OAAO;MAClB,OAAOR,IAAI,EAAE;KACd,CAAC,OAAOY,GAAG,EAAE;MACZ,IAAIA,GAAG,IAAI,CAAAA,GAAG,oBAAHA,GAAG,CAAEC,OAAO,MAAK,aAAa,EAAE;QACzC,OAAOd,GAAG,CAACI,MAAM,CAAC,GAAG,CAAC,CAACC,IAAI,CAAC;UAC1BD,MAAM,EAAE,eAAe;UACvBU,OAAO,EAAE,sBAAsB;UAC/BC,KAAK,EAAEF,GAAG;UACVP,KAAK,EAAE;SACR,CAAC;;MAEJ,OAAON,GAAG,CAACI,MAAM,CAAC,GAAG,CAAC,CAACC,IAAI,CAAC;QAC1BD,MAAM,EAAE,eAAe;QACvBU,OAAO,EAAE,uBAAuB;QAChCC,KAAK,EAAEF,GAAG;QACVP,KAAK,EAAE;OACR,CAAC;;GAEL;AACH;IAEaU,GAAG,GAAG,SAANA,GAAGA,CAAIC,CAAS,EAAEC,CAAS;EAAA,OAAKD,CAAC,GAAGC,CAAC;AAAA;;;;;"}
1
+ {"version":3,"file":"dauth-md-node.cjs.development.js","sources":["../src/index.ts"],"sourcesContent":["import {\n Request,\n NextFunction,\n Response as ExpressResponse,\n Handler,\n} from 'express';\nimport mongoose from 'mongoose';\nimport jwt from 'jsonwebtoken';\n\nexport interface IAccessToken {\n _id: string | mongoose.Types.ObjectId;\n sid: string;\n name: string;\n lastname: string;\n email: string;\n createToken?: number;\n exp?: number;\n iat?: number;\n}\n\ninterface IRequestUser extends Request {\n auth: IAccessToken;\n files: {\n image: { path: string };\n avatar: { path: string };\n };\n headers: {\n authorization: string;\n };\n}\n\ninterface TCustomResponse extends ExpressResponse {\n status(code: number): any;\n send(body?: any): any;\n}\n\nexport const dauth = ({ ssid }: { ssid: string }) => {\n return (\n req: IRequestUser,\n res: TCustomResponse,\n next: NextFunction\n ): Handler | void => {\n if (!req.headers.authorization) {\n return res\n .status(403)\n .send({ status: 'token-not-found', mdKey: 'ensure_auth' });\n }\n const token = req.headers.authorization.replace(/['\"]+/g, '');\n try {\n const payload = jwt.verify(token, ssid as string) as IAccessToken;\n req.auth = payload;\n return next();\n } catch (error) {\n if (error && error?.message === 'jwt expired') {\n return res.status(500).send({\n status: 'token-expired',\n message: 'El token ha expirado',\n error: error,\n mdKey: 'ensure_auth',\n });\n }\n return res.status(500).send({\n status: 'token-invalid',\n message: 'El token no es válido',\n error: error,\n mdKey: 'ensure_auth',\n });\n }\n };\n};\n"],"names":["dauth","_ref","ssid","req","res","next","headers","authorization","status","send","mdKey","token","replace","payload","jwt","verify","auth","error","message"],"mappings":";;;;;;;;IAoCaA,KAAK,GAAG,SAARA,KAAKA,CAAAC,IAAA;MAAMC,IAAI,GAAAD,IAAA,CAAJC,IAAI;EAC1B,OAAO,UACLC,GAAiB,EACjBC,GAAoB,EACpBC,IAAkB;IAElB,IAAI,CAACF,GAAG,CAACG,OAAO,CAACC,aAAa,EAAE;MAC9B,OAAOH,GAAG,CACPI,MAAM,CAAC,GAAG,CAAC,CACXC,IAAI,CAAC;QAAED,MAAM,EAAE,iBAAiB;QAAEE,KAAK,EAAE;OAAe,CAAC;;IAE9D,IAAMC,KAAK,GAAGR,GAAG,CAACG,OAAO,CAACC,aAAa,CAACK,OAAO,CAAC,QAAQ,EAAE,EAAE,CAAC;IAC7D,IAAI;MACF,IAAMC,OAAO,GAAGC,GAAG,CAACC,MAAM,CAACJ,KAAK,EAAET,IAAc,CAAiB;MACjEC,GAAG,CAACa,IAAI,GAAGH,OAAO;MAClB,OAAOR,IAAI,EAAE;KACd,CAAC,OAAOY,KAAK,EAAE;MACd,IAAIA,KAAK,IAAI,CAAAA,KAAK,oBAALA,KAAK,CAAEC,OAAO,MAAK,aAAa,EAAE;QAC7C,OAAOd,GAAG,CAACI,MAAM,CAAC,GAAG,CAAC,CAACC,IAAI,CAAC;UAC1BD,MAAM,EAAE,eAAe;UACvBU,OAAO,EAAE,sBAAsB;UAC/BD,KAAK,EAAEA,KAAK;UACZP,KAAK,EAAE;SACR,CAAC;;MAEJ,OAAON,GAAG,CAACI,MAAM,CAAC,GAAG,CAAC,CAACC,IAAI,CAAC;QAC1BD,MAAM,EAAE,eAAe;QACvBU,OAAO,EAAE,uBAAuB;QAChCD,KAAK,EAAEA,KAAK;QACZP,KAAK,EAAE;OACR,CAAC;;GAEL;AACH;;;;"}
@@ -1,2 +1,2 @@
1
- "use strict";Object.defineProperty(exports,"__esModule",{value:!0});var e,t=(e=require("jsonwebtoken"))&&"object"==typeof e&&"default"in e?e.default:e;exports.dauth=function(e){var r=e.ssid;return function(e,s,n){if(!e.headers.authorization)return s.status(403).send({status:"token-not-found",mdKey:"ensure_auth"});var u=e.headers.authorization.replace(/['"]+/g,"");try{var a=t.verify(u,r);return e.auth=a,n()}catch(e){return e&&"jwt expired"===(null==e?void 0:e.message)?s.status(500).send({status:"token-expired",message:"El token ha expirado",error:e,mdKey:"ensure_auth"}):s.status(500).send({status:"token-invalid",message:"El token no es válido",error:e,mdKey:"ensure_auth"})}}},exports.sum=function(e,t){return e+t};
1
+ "use strict";Object.defineProperty(exports,"__esModule",{value:!0});var e,t=(e=require("jsonwebtoken"))&&"object"==typeof e&&"default"in e?e.default:e;exports.dauth=function(e){var r=e.ssid;return function(e,s,a){if(!e.headers.authorization)return s.status(403).send({status:"token-not-found",mdKey:"ensure_auth"});var n=e.headers.authorization.replace(/['"]+/g,"");try{var u=t.verify(n,r);return e.auth=u,a()}catch(e){return e&&"jwt expired"===(null==e?void 0:e.message)?s.status(500).send({status:"token-expired",message:"El token ha expirado",error:e,mdKey:"ensure_auth"}):s.status(500).send({status:"token-invalid",message:"El token no es válido",error:e,mdKey:"ensure_auth"})}}};
2
2
  //# sourceMappingURL=dauth-md-node.cjs.production.min.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"dauth-md-node.cjs.production.min.js","sources":["../src/index.ts"],"sourcesContent":["import { Request, NextFunction, Response as ExpressResponse, Handler } from 'express';\nimport mongoose from 'mongoose';\nimport jwt from 'jsonwebtoken';\n\nexport interface IAccessToken {\n _id: string | mongoose.Types.ObjectId;\n sid: string;\n name: string;\n lastname: string;\n email: string;\n createToken?: number;\n exp?: number;\n iat?: number;\n}\n\ninterface IRequestUser extends Request {\n auth: IAccessToken;\n files: {\n image: { path: string };\n avatar: { path: string };\n };\n headers: {\n authorization: string;\n };\n}\n\ninterface TCustomResponse extends ExpressResponse {\n status(code: number): any;\n send(body?: any): any;\n}\n\n// declare const dauth: (opts?: { ssid: string }) => Handler;\n\nexport const dauth = ({ ssid }: { ssid: string }) => {\n return (req: IRequestUser, res: TCustomResponse, next: NextFunction): Handler | void => {\n if (!req.headers.authorization) {\n return res\n .status(403)\n .send({ status: 'token-not-found', mdKey: 'ensure_auth' });\n }\n const token = req.headers.authorization.replace(/['\"]+/g, '');\n try {\n const payload = jwt.verify(token, ssid as string) as IAccessToken;\n req.auth = payload;\n return next();\n } catch (err) {\n if (err && err?.message === 'jwt expired') {\n return res.status(500).send({\n status: 'token-expired',\n message: 'El token ha expirado',\n error: err,\n mdKey: 'ensure_auth',\n });\n }\n return res.status(500).send({\n status: 'token-invalid',\n message: 'El token no es válido',\n error: err,\n mdKey: 'ensure_auth',\n });\n }\n };\n};\n\nexport const sum = (a: number, b: number) => a + b;\n"],"names":["_ref","ssid","req","res","next","headers","authorization","status","send","mdKey","token","replace","payload","jwt","verify","auth","err","message","error","a","b"],"mappings":"qKAiCqB,SAAHA,OAAMC,EAAID,EAAJC,KACtB,OAAO,SAACC,EAAmBC,EAAsBC,GAC/C,IAAKF,EAAIG,QAAQC,cACf,OAAOH,EACJI,OAAO,KACPC,KAAK,CAAED,OAAQ,kBAAmBE,MAAO,gBAE9C,IAAMC,EAAQR,EAAIG,QAAQC,cAAcK,QAAQ,SAAU,IAC1D,IACE,IAAMC,EAAUC,EAAIC,OAAOJ,EAAOT,GAElC,OADAC,EAAIa,KAAOH,EACJR,IACP,MAAOY,GACP,OAAIA,GAAwB,uBAAjBA,SAAAA,EAAKC,SACPd,EAAII,OAAO,KAAKC,KAAK,CAC1BD,OAAQ,gBACRU,QAAS,uBACTC,MAAOF,EACPP,MAAO,gBAGJN,EAAII,OAAO,KAAKC,KAAK,CAC1BD,OAAQ,gBACRU,QAAS,wBACTC,MAAOF,EACPP,MAAO,+BAMI,SAACU,EAAWC,GAAS,OAAKD,EAAIC"}
1
+ {"version":3,"file":"dauth-md-node.cjs.production.min.js","sources":["../src/index.ts"],"sourcesContent":["import {\n Request,\n NextFunction,\n Response as ExpressResponse,\n Handler,\n} from 'express';\nimport mongoose from 'mongoose';\nimport jwt from 'jsonwebtoken';\n\nexport interface IAccessToken {\n _id: string | mongoose.Types.ObjectId;\n sid: string;\n name: string;\n lastname: string;\n email: string;\n createToken?: number;\n exp?: number;\n iat?: number;\n}\n\ninterface IRequestUser extends Request {\n auth: IAccessToken;\n files: {\n image: { path: string };\n avatar: { path: string };\n };\n headers: {\n authorization: string;\n };\n}\n\ninterface TCustomResponse extends ExpressResponse {\n status(code: number): any;\n send(body?: any): any;\n}\n\nexport const dauth = ({ ssid }: { ssid: string }) => {\n return (\n req: IRequestUser,\n res: TCustomResponse,\n next: NextFunction\n ): Handler | void => {\n if (!req.headers.authorization) {\n return res\n .status(403)\n .send({ status: 'token-not-found', mdKey: 'ensure_auth' });\n }\n const token = req.headers.authorization.replace(/['\"]+/g, '');\n try {\n const payload = jwt.verify(token, ssid as string) as IAccessToken;\n req.auth = payload;\n return next();\n } catch (error) {\n if (error && error?.message === 'jwt expired') {\n return res.status(500).send({\n status: 'token-expired',\n message: 'El token ha expirado',\n error: error,\n mdKey: 'ensure_auth',\n });\n }\n return res.status(500).send({\n status: 'token-invalid',\n message: 'El token no es válido',\n error: error,\n mdKey: 'ensure_auth',\n });\n }\n };\n};\n"],"names":["_ref","ssid","req","res","next","headers","authorization","status","send","mdKey","token","replace","payload","jwt","verify","auth","error","message"],"mappings":"qKAoCqB,SAAHA,OAAMC,EAAID,EAAJC,KACtB,OAAO,SACLC,EACAC,EACAC,GAEA,IAAKF,EAAIG,QAAQC,cACf,OAAOH,EACJI,OAAO,KACPC,KAAK,CAAED,OAAQ,kBAAmBE,MAAO,gBAE9C,IAAMC,EAAQR,EAAIG,QAAQC,cAAcK,QAAQ,SAAU,IAC1D,IACE,IAAMC,EAAUC,EAAIC,OAAOJ,EAAOT,GAElC,OADAC,EAAIa,KAAOH,EACJR,IACP,MAAOY,GACP,OAAIA,GAA4B,uBAAnBA,SAAAA,EAAOC,SACXd,EAAII,OAAO,KAAKC,KAAK,CAC1BD,OAAQ,gBACRU,QAAS,uBACTD,MAAOA,EACPP,MAAO,gBAGJN,EAAII,OAAO,KAAKC,KAAK,CAC1BD,OAAQ,gBACRU,QAAS,wBACTD,MAAOA,EACPP,MAAO"}
@@ -1,6 +1,5 @@
1
1
  import jwt from 'jsonwebtoken';
2
2
 
3
- // declare const dauth: (opts?: { ssid: string }) => Handler;
4
3
  var dauth = function dauth(_ref) {
5
4
  var ssid = _ref.ssid;
6
5
  return function (req, res, next) {
@@ -15,27 +14,24 @@ var dauth = function dauth(_ref) {
15
14
  var payload = jwt.verify(token, ssid);
16
15
  req.auth = payload;
17
16
  return next();
18
- } catch (err) {
19
- if (err && (err == null ? void 0 : err.message) === 'jwt expired') {
17
+ } catch (error) {
18
+ if (error && (error == null ? void 0 : error.message) === 'jwt expired') {
20
19
  return res.status(500).send({
21
20
  status: 'token-expired',
22
21
  message: 'El token ha expirado',
23
- error: err,
22
+ error: error,
24
23
  mdKey: 'ensure_auth'
25
24
  });
26
25
  }
27
26
  return res.status(500).send({
28
27
  status: 'token-invalid',
29
28
  message: 'El token no es válido',
30
- error: err,
29
+ error: error,
31
30
  mdKey: 'ensure_auth'
32
31
  });
33
32
  }
34
33
  };
35
34
  };
36
- var sum = function sum(a, b) {
37
- return a + b;
38
- };
39
35
 
40
- export { dauth, sum };
36
+ export { dauth };
41
37
  //# sourceMappingURL=dauth-md-node.esm.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"dauth-md-node.esm.js","sources":["../src/index.ts"],"sourcesContent":["import { Request, NextFunction, Response as ExpressResponse, Handler } from 'express';\nimport mongoose from 'mongoose';\nimport jwt from 'jsonwebtoken';\n\nexport interface IAccessToken {\n _id: string | mongoose.Types.ObjectId;\n sid: string;\n name: string;\n lastname: string;\n email: string;\n createToken?: number;\n exp?: number;\n iat?: number;\n}\n\ninterface IRequestUser extends Request {\n auth: IAccessToken;\n files: {\n image: { path: string };\n avatar: { path: string };\n };\n headers: {\n authorization: string;\n };\n}\n\ninterface TCustomResponse extends ExpressResponse {\n status(code: number): any;\n send(body?: any): any;\n}\n\n// declare const dauth: (opts?: { ssid: string }) => Handler;\n\nexport const dauth = ({ ssid }: { ssid: string }) => {\n return (req: IRequestUser, res: TCustomResponse, next: NextFunction): Handler | void => {\n if (!req.headers.authorization) {\n return res\n .status(403)\n .send({ status: 'token-not-found', mdKey: 'ensure_auth' });\n }\n const token = req.headers.authorization.replace(/['\"]+/g, '');\n try {\n const payload = jwt.verify(token, ssid as string) as IAccessToken;\n req.auth = payload;\n return next();\n } catch (err) {\n if (err && err?.message === 'jwt expired') {\n return res.status(500).send({\n status: 'token-expired',\n message: 'El token ha expirado',\n error: err,\n mdKey: 'ensure_auth',\n });\n }\n return res.status(500).send({\n status: 'token-invalid',\n message: 'El token no es válido',\n error: err,\n mdKey: 'ensure_auth',\n });\n }\n };\n};\n\nexport const sum = (a: number, b: number) => a + b;\n"],"names":["dauth","_ref","ssid","req","res","next","headers","authorization","status","send","mdKey","token","replace","payload","jwt","verify","auth","err","message","error","sum","a","b"],"mappings":";;AA+BA;IAEaA,KAAK,GAAG,SAARA,KAAKA,CAAAC,IAAA;MAAMC,IAAI,GAAAD,IAAA,CAAJC,IAAI;EAC1B,OAAO,UAACC,GAAiB,EAAEC,GAAoB,EAAEC,IAAkB;IACjE,IAAI,CAACF,GAAG,CAACG,OAAO,CAACC,aAAa,EAAE;MAC9B,OAAOH,GAAG,CACPI,MAAM,CAAC,GAAG,CAAC,CACXC,IAAI,CAAC;QAAED,MAAM,EAAE,iBAAiB;QAAEE,KAAK,EAAE;OAAe,CAAC;;IAE9D,IAAMC,KAAK,GAAGR,GAAG,CAACG,OAAO,CAACC,aAAa,CAACK,OAAO,CAAC,QAAQ,EAAE,EAAE,CAAC;IAC7D,IAAI;MACF,IAAMC,OAAO,GAAGC,GAAG,CAACC,MAAM,CAACJ,KAAK,EAAET,IAAc,CAAiB;MACjEC,GAAG,CAACa,IAAI,GAAGH,OAAO;MAClB,OAAOR,IAAI,EAAE;KACd,CAAC,OAAOY,GAAG,EAAE;MACZ,IAAIA,GAAG,IAAI,CAAAA,GAAG,oBAAHA,GAAG,CAAEC,OAAO,MAAK,aAAa,EAAE;QACzC,OAAOd,GAAG,CAACI,MAAM,CAAC,GAAG,CAAC,CAACC,IAAI,CAAC;UAC1BD,MAAM,EAAE,eAAe;UACvBU,OAAO,EAAE,sBAAsB;UAC/BC,KAAK,EAAEF,GAAG;UACVP,KAAK,EAAE;SACR,CAAC;;MAEJ,OAAON,GAAG,CAACI,MAAM,CAAC,GAAG,CAAC,CAACC,IAAI,CAAC;QAC1BD,MAAM,EAAE,eAAe;QACvBU,OAAO,EAAE,uBAAuB;QAChCC,KAAK,EAAEF,GAAG;QACVP,KAAK,EAAE;OACR,CAAC;;GAEL;AACH;IAEaU,GAAG,GAAG,SAANA,GAAGA,CAAIC,CAAS,EAAEC,CAAS;EAAA,OAAKD,CAAC,GAAGC,CAAC;AAAA;;;;"}
1
+ {"version":3,"file":"dauth-md-node.esm.js","sources":["../src/index.ts"],"sourcesContent":["import {\n Request,\n NextFunction,\n Response as ExpressResponse,\n Handler,\n} from 'express';\nimport mongoose from 'mongoose';\nimport jwt from 'jsonwebtoken';\n\nexport interface IAccessToken {\n _id: string | mongoose.Types.ObjectId;\n sid: string;\n name: string;\n lastname: string;\n email: string;\n createToken?: number;\n exp?: number;\n iat?: number;\n}\n\ninterface IRequestUser extends Request {\n auth: IAccessToken;\n files: {\n image: { path: string };\n avatar: { path: string };\n };\n headers: {\n authorization: string;\n };\n}\n\ninterface TCustomResponse extends ExpressResponse {\n status(code: number): any;\n send(body?: any): any;\n}\n\nexport const dauth = ({ ssid }: { ssid: string }) => {\n return (\n req: IRequestUser,\n res: TCustomResponse,\n next: NextFunction\n ): Handler | void => {\n if (!req.headers.authorization) {\n return res\n .status(403)\n .send({ status: 'token-not-found', mdKey: 'ensure_auth' });\n }\n const token = req.headers.authorization.replace(/['\"]+/g, '');\n try {\n const payload = jwt.verify(token, ssid as string) as IAccessToken;\n req.auth = payload;\n return next();\n } catch (error) {\n if (error && error?.message === 'jwt expired') {\n return res.status(500).send({\n status: 'token-expired',\n message: 'El token ha expirado',\n error: error,\n mdKey: 'ensure_auth',\n });\n }\n return res.status(500).send({\n status: 'token-invalid',\n message: 'El token no es válido',\n error: error,\n mdKey: 'ensure_auth',\n });\n }\n };\n};\n"],"names":["dauth","_ref","ssid","req","res","next","headers","authorization","status","send","mdKey","token","replace","payload","jwt","verify","auth","error","message"],"mappings":";;IAoCaA,KAAK,GAAG,SAARA,KAAKA,CAAAC,IAAA;MAAMC,IAAI,GAAAD,IAAA,CAAJC,IAAI;EAC1B,OAAO,UACLC,GAAiB,EACjBC,GAAoB,EACpBC,IAAkB;IAElB,IAAI,CAACF,GAAG,CAACG,OAAO,CAACC,aAAa,EAAE;MAC9B,OAAOH,GAAG,CACPI,MAAM,CAAC,GAAG,CAAC,CACXC,IAAI,CAAC;QAAED,MAAM,EAAE,iBAAiB;QAAEE,KAAK,EAAE;OAAe,CAAC;;IAE9D,IAAMC,KAAK,GAAGR,GAAG,CAACG,OAAO,CAACC,aAAa,CAACK,OAAO,CAAC,QAAQ,EAAE,EAAE,CAAC;IAC7D,IAAI;MACF,IAAMC,OAAO,GAAGC,GAAG,CAACC,MAAM,CAACJ,KAAK,EAAET,IAAc,CAAiB;MACjEC,GAAG,CAACa,IAAI,GAAGH,OAAO;MAClB,OAAOR,IAAI,EAAE;KACd,CAAC,OAAOY,KAAK,EAAE;MACd,IAAIA,KAAK,IAAI,CAAAA,KAAK,oBAALA,KAAK,CAAEC,OAAO,MAAK,aAAa,EAAE;QAC7C,OAAOd,GAAG,CAACI,MAAM,CAAC,GAAG,CAAC,CAACC,IAAI,CAAC;UAC1BD,MAAM,EAAE,eAAe;UACvBU,OAAO,EAAE,sBAAsB;UAC/BD,KAAK,EAAEA,KAAK;UACZP,KAAK,EAAE;SACR,CAAC;;MAEJ,OAAON,GAAG,CAACI,MAAM,CAAC,GAAG,CAAC,CAACC,IAAI,CAAC;QAC1BD,MAAM,EAAE,eAAe;QACvBU,OAAO,EAAE,uBAAuB;QAChCD,KAAK,EAAEA,KAAK;QACZP,KAAK,EAAE;OACR,CAAC;;GAEL;AACH;;;;"}
package/dist/index.d.ts CHANGED
@@ -31,5 +31,4 @@ interface TCustomResponse extends ExpressResponse {
31
31
  export declare const dauth: ({ ssid }: {
32
32
  ssid: string;
33
33
  }) => (req: IRequestUser, res: TCustomResponse, next: NextFunction) => Handler | void;
34
- export declare const sum: (a: number, b: number) => number;
35
34
  export {};
package/package.json CHANGED
@@ -1,5 +1,5 @@
1
1
  {
2
- "version": "0.1.5",
2
+ "version": "0.1.61",
3
3
  "license": "MIT",
4
4
  "main": "dist/index.js",
5
5
  "typings": "dist/index.d.ts",
package/src/index.ts CHANGED
@@ -1,4 +1,9 @@
1
- import { Request, NextFunction, Response as ExpressResponse, Handler } from 'express';
1
+ import {
2
+ Request,
3
+ NextFunction,
4
+ Response as ExpressResponse,
5
+ Handler,
6
+ } from 'express';
2
7
  import mongoose from 'mongoose';
3
8
  import jwt from 'jsonwebtoken';
4
9
 
@@ -29,10 +34,12 @@ interface TCustomResponse extends ExpressResponse {
29
34
  send(body?: any): any;
30
35
  }
31
36
 
32
- // declare const dauth: (opts?: { ssid: string }) => Handler;
33
-
34
37
  export const dauth = ({ ssid }: { ssid: string }) => {
35
- return (req: IRequestUser, res: TCustomResponse, next: NextFunction): Handler | void => {
38
+ return (
39
+ req: IRequestUser,
40
+ res: TCustomResponse,
41
+ next: NextFunction
42
+ ): Handler | void => {
36
43
  if (!req.headers.authorization) {
37
44
  return res
38
45
  .status(403)
@@ -43,23 +50,21 @@ export const dauth = ({ ssid }: { ssid: string }) => {
43
50
  const payload = jwt.verify(token, ssid as string) as IAccessToken;
44
51
  req.auth = payload;
45
52
  return next();
46
- } catch (err) {
47
- if (err && err?.message === 'jwt expired') {
53
+ } catch (error) {
54
+ if (error && error?.message === 'jwt expired') {
48
55
  return res.status(500).send({
49
56
  status: 'token-expired',
50
57
  message: 'El token ha expirado',
51
- error: err,
58
+ error: error,
52
59
  mdKey: 'ensure_auth',
53
60
  });
54
61
  }
55
62
  return res.status(500).send({
56
63
  status: 'token-invalid',
57
64
  message: 'El token no es válido',
58
- error: err,
65
+ error: error,
59
66
  mdKey: 'ensure_auth',
60
67
  });
61
68
  }
62
69
  };
63
70
  };
64
-
65
- export const sum = (a: number, b: number) => a + b;