dauth-md-node 0.1.74 → 0.1.76

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -389,7 +389,6 @@ var dauth = function dauth(_ref) {
389
389
  var token = req.headers.authorization.replace(/['"]+/g, '');
390
390
  try {
391
391
  jwt.verify(token, ssid);
392
- // req.user = payload;
393
392
  getUser(token, domainName).then(function (getUserFetch) {
394
393
  if (getUserFetch.response.status === 404) {
395
394
  return res.status(404).send({
@@ -403,7 +402,6 @@ var dauth = function dauth(_ref) {
403
402
  });
404
403
  } else if (getUserFetch.response.status === 200) {
405
404
  req.user = getUserFetch.data.user;
406
- // console.log('node-fetch npm', req.user);
407
405
  return next();
408
406
  } else {
409
407
  return res.status(501).send({
@@ -420,14 +418,12 @@ var dauth = function dauth(_ref) {
420
418
  return res.status(500).send({
421
419
  status: 'token-expired',
422
420
  message: 'El token ha expirado',
423
- // error: error,
424
421
  mdKey: 'ensure_auth'
425
422
  });
426
423
  }
427
424
  return res.status(500).send({
428
425
  status: 'token-invalid',
429
426
  message: 'El token no es válido',
430
- // error: error,
431
427
  mdKey: 'ensure_auth'
432
428
  });
433
429
  }
@@ -1 +1 @@
1
- {"version":3,"file":"dauth-md-node.cjs.development.js","sources":["../src/api/dauth.api.ts","../src/index.ts"],"sourcesContent":["const fetch = require('node-fetch');\n\nexport async function getUser(token: string, domainName: string) {\n const params = {\n method: 'GET',\n headers: {\n Authorization: token,\n 'Content-Type': 'application/json',\n },\n };\n const response = await fetch(\n `http://localhost:4012/api/v1/get-tenant-user/${domainName}`,\n params\n );\n const data = await response.json();\n return { response, data };\n}","import {\n Request,\n NextFunction,\n Response as ExpressResponse,\n Handler,\n} from 'express';\nimport mongoose from 'mongoose';\nimport jwt from 'jsonwebtoken';\nimport { getUser } from './api/dauth.api';\n\nexport interface IAccessToken {\n _id: string | mongoose.Types.ObjectId;\n sid: string;\n email: string;\n createToken?: number;\n exp?: number;\n iat?: number;\n}\n\nexport interface ITenantUser {\n _id: string\n dauthLicense?: string\n sid: string\n name: string\n lastname: string\n nickname: string\n email: string\n is_verified: boolean\n language: string\n avatar: string\n role: string\n tel_prefix: string\n tel_suffix: string\n createdAt: Date\n updatedAt: Date\n last_login: Date\n __v: string | any\n}\n\ninterface IRequestUser extends Request {\n user: IAccessToken;\n files: {\n image: { path: string };\n avatar: { path: string };\n };\n headers: {\n authorization: string;\n };\n}\n\ninterface TCustomResponse extends ExpressResponse {\n status(code: number): any;\n send(body?: any): any;\n}\n\nexport const dauth = ({ ssid, domainName }: { ssid: string, domainName: string }) => {\n return (\n req: IRequestUser,\n res: TCustomResponse,\n next: NextFunction\n ): Handler | void => {\n if (!req.headers.authorization) {\n return res\n .status(403)\n .send({ status: 'token-not-found', mdKey: 'ensure_auth' });\n }\n const token = req.headers.authorization.replace(/['\"]+/g, '');\n try {\n jwt.verify(token, ssid as string) as IAccessToken;\n // req.user = payload;\n getUser(token, domainName)\n .then((getUserFetch: any) => {\n if (getUserFetch.response.status === 404) {\n return res.status(404).send({\n status: 'domain-not-found',\n message: 'Dauth domain does not exist',\n });\n } else if (getUserFetch.response.status === 500) {\n return res\n .status(500)\n .send({ status: 'error', message: 'Dauth server error' });\n } else if (getUserFetch.response.status === 200) {\n req.user = getUserFetch.data.user;\n // console.log('node-fetch npm', req.user);\n return next();\n } else {\n return res.status(501).send({\n status: 'error',\n message: 'Dauth server error',\n });\n }\n })\n .catch((error: any) => {\n console.log('getDauthUser error', error);\n return next();\n });\n } catch (error) {\n if (error && error?.message === 'jwt expired') {\n return res.status(500).send({\n status: 'token-expired',\n message: 'El token ha expirado',\n // error: error,\n mdKey: 'ensure_auth',\n });\n }\n return res.status(500).send({\n status: 'token-invalid',\n message: 'El token no es válido',\n // error: error,\n mdKey: 'ensure_auth',\n });\n }\n };\n};\n"],"names":["fetch","require","getUser","_x","_x2","_getUser","apply","arguments","_asyncToGenerator","_regeneratorRuntime","mark","_callee","token","domainName","params","response","data","wrap","_callee$","_context","prev","next","method","headers","Authorization","sent","json","abrupt","stop","dauth","_ref","ssid","req","res","authorization","status","send","mdKey","replace","jwt","verify","then","getUserFetch","message","user","error","console","log"],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA,IAAMA,KAAK,gBAAGC,OAAO,CAAC,YAAY,CAAC;SAEbC,OAAOA,CAAAC,EAAA,EAAAC,GAAA;EAAA,OAAAC,QAAA,CAAAC,KAAA,OAAAC,SAAA;AAAA;AAc5B,SAAAF;EAAAA,QAAA,GAAAG,iBAAA,eAAAC,mBAAA,GAAAC,IAAA,CAdM,SAAAC,QAAuBC,KAAa,EAAEC,UAAkB;IAAA,IAAAC,MAAA,EAAAC,QAAA,EAAAC,IAAA;IAAA,OAAAP,mBAAA,GAAAQ,IAAA,UAAAC,SAAAC,QAAA;MAAA,kBAAAA,QAAA,CAAAC,IAAA,GAAAD,QAAA,CAAAE,IAAA;QAAA;UACvDP,MAAM,GAAG;YACbQ,MAAM,EAAE,KAAK;YACbC,OAAO,EAAE;cACPC,aAAa,EAAEZ,KAAK;cACpB,cAAc,EAAE;;WAEnB;UAAAO,QAAA,CAAAE,IAAA;UAAA,OACsBrB,KAAK,mDACsBa,UAAU,EAC1DC,MAAM,CACP;QAAA;UAHKC,QAAQ,GAAAI,QAAA,CAAAM,IAAA;UAAAN,QAAA,CAAAE,IAAA;UAAA,OAIKN,QAAQ,CAACW,IAAI,EAAE;QAAA;UAA5BV,IAAI,GAAAG,QAAA,CAAAM,IAAA;UAAA,OAAAN,QAAA,CAAAQ,MAAA,WACH;YAAEZ,QAAQ,EAARA,QAAQ;YAAEC,IAAI,EAAJA;WAAM;QAAA;QAAA;UAAA,OAAAG,QAAA,CAAAS,IAAA;;OAAAjB,OAAA;GAC1B;EAAA,OAAAN,QAAA,CAAAC,KAAA,OAAAC,SAAA;AAAA;;ICuCYsB,KAAK,GAAG,SAARA,KAAKA,CAAAC,IAAA;MAAMC,IAAI,GAAAD,IAAA,CAAJC,IAAI;IAAElB,UAAU,GAAAiB,IAAA,CAAVjB,UAAU;EACtC,OAAO,UACLmB,GAAiB,EACjBC,GAAoB,EACpBZ,IAAkB;IAElB,IAAI,CAACW,GAAG,CAACT,OAAO,CAACW,aAAa,EAAE;MAC9B,OAAOD,GAAG,CACPE,MAAM,CAAC,GAAG,CAAC,CACXC,IAAI,CAAC;QAAED,MAAM,EAAE,iBAAiB;QAAEE,KAAK,EAAE;OAAe,CAAC;;IAE9D,IAAMzB,KAAK,GAAGoB,GAAG,CAACT,OAAO,CAACW,aAAa,CAACI,OAAO,CAAC,QAAQ,EAAE,EAAE,CAAC;IAC7D,IAAI;MACFC,GAAG,CAACC,MAAM,CAAC5B,KAAK,EAAEmB,IAAc,CAAiB;;MAEjD7B,OAAO,CAACU,KAAK,EAAEC,UAAU,CAAC,CACvB4B,IAAI,CAAC,UAACC,YAAiB;QACtB,IAAIA,YAAY,CAAC3B,QAAQ,CAACoB,MAAM,KAAK,GAAG,EAAE;UACxC,OAAOF,GAAG,CAACE,MAAM,CAAC,GAAG,CAAC,CAACC,IAAI,CAAC;YAC1BD,MAAM,EAAE,kBAAkB;YAC1BQ,OAAO,EAAE;WACV,CAAC;SACH,MAAM,IAAID,YAAY,CAAC3B,QAAQ,CAACoB,MAAM,KAAK,GAAG,EAAE;UAC/C,OAAOF,GAAG,CACPE,MAAM,CAAC,GAAG,CAAC,CACXC,IAAI,CAAC;YAAED,MAAM,EAAE,OAAO;YAAEQ,OAAO,EAAE;WAAsB,CAAC;SAC5D,MAAM,IAAID,YAAY,CAAC3B,QAAQ,CAACoB,MAAM,KAAK,GAAG,EAAE;UAC/CH,GAAG,CAACY,IAAI,GAAGF,YAAY,CAAC1B,IAAI,CAAC4B,IAAI;;UAEjC,OAAOvB,IAAI,EAAE;SACd,MAAM;UACL,OAAOY,GAAG,CAACE,MAAM,CAAC,GAAG,CAAC,CAACC,IAAI,CAAC;YAC1BD,MAAM,EAAE,OAAO;YACfQ,OAAO,EAAE;WACV,CAAC;;OAEL,CAAC,SACI,CAAC,UAACE,KAAU;QAChBC,OAAO,CAACC,GAAG,CAAC,oBAAoB,EAAEF,KAAK,CAAC;QACxC,OAAOxB,IAAI,EAAE;OACd,CAAC;KACL,CAAC,OAAOwB,KAAK,EAAE;MACd,IAAIA,KAAK,IAAI,CAAAA,KAAK,oBAALA,KAAK,CAAEF,OAAO,MAAK,aAAa,EAAE;QAC7C,OAAOV,GAAG,CAACE,MAAM,CAAC,GAAG,CAAC,CAACC,IAAI,CAAC;UAC1BD,MAAM,EAAE,eAAe;UACvBQ,OAAO,EAAE,sBAAsB;;UAE/BN,KAAK,EAAE;SACR,CAAC;;MAEJ,OAAOJ,GAAG,CAACE,MAAM,CAAC,GAAG,CAAC,CAACC,IAAI,CAAC;QAC1BD,MAAM,EAAE,eAAe;QACvBQ,OAAO,EAAE,uBAAuB;;QAEhCN,KAAK,EAAE;OACR,CAAC;;GAEL;AACH,CAAC;;;;"}
1
+ {"version":3,"file":"dauth-md-node.cjs.development.js","sources":["../src/api/dauth.api.ts","../src/index.ts"],"sourcesContent":["const fetch = require('node-fetch');\n\nexport async function getUser(token: string, domainName: string) {\n const params = {\n method: 'GET',\n headers: {\n Authorization: token,\n 'Content-Type': 'application/json',\n },\n };\n const response = await fetch(\n `http://localhost:4012/api/v1/get-tenant-user/${domainName}`,\n params\n );\n const data = await response.json();\n return { response, data };\n}","import {\n Request,\n NextFunction,\n Response as ExpressResponse,\n Handler,\n} from 'express';\nimport mongoose from 'mongoose';\nimport jwt from 'jsonwebtoken';\nimport { getUser } from './api/dauth.api';\n\nexport interface IAccessToken {\n _id: string | mongoose.Types.ObjectId;\n sid: string;\n email: string;\n createToken?: number;\n exp?: number;\n iat?: number;\n}\n\ninterface ITenantUser {\n _id: string\n dauthLicense?: string\n sid: string\n name: string\n lastname: string\n nickname: string\n email: string\n is_verified: boolean\n language: string\n avatar: string\n role: string\n tel_prefix: string\n tel_suffix: string\n createdAt: Date\n updatedAt: Date\n last_login: Date\n __v: string | any\n}\n\ninterface IRequestUser extends Request {\n user: ITenantUser;\n files: {\n image: { path: string };\n avatar: { path: string };\n };\n headers: {\n authorization: string;\n };\n}\n\ninterface TCustomResponse extends ExpressResponse {\n status(code: number): any;\n send(body?: any): any;\n}\n\nexport const dauth = ({ ssid, domainName }: { ssid: string, domainName: string }) => {\n return (\n req: IRequestUser,\n res: TCustomResponse,\n next: NextFunction\n ): Handler | void => {\n if (!req.headers.authorization) {\n return res\n .status(403)\n .send({ status: 'token-not-found', mdKey: 'ensure_auth' });\n }\n const token = req.headers.authorization.replace(/['\"]+/g, '');\n try {\n jwt.verify(token, ssid as string) as IAccessToken;\n getUser(token, domainName)\n .then((getUserFetch: any) => {\n if (getUserFetch.response.status === 404) {\n return res.status(404).send({\n status: 'domain-not-found',\n message: 'Dauth domain does not exist',\n });\n } else if (getUserFetch.response.status === 500) {\n return res\n .status(500)\n .send({ status: 'error', message: 'Dauth server error' });\n } else if (getUserFetch.response.status === 200) {\n req.user = getUserFetch.data.user;\n return next();\n } else {\n return res.status(501).send({\n status: 'error',\n message: 'Dauth server error',\n });\n }\n })\n .catch((error: any) => {\n console.log('getDauthUser error', error);\n return next();\n });\n } catch (error) {\n if (error && error?.message === 'jwt expired') {\n return res.status(500).send({\n status: 'token-expired',\n message: 'El token ha expirado',\n mdKey: 'ensure_auth',\n });\n }\n return res.status(500).send({\n status: 'token-invalid',\n message: 'El token no es válido',\n mdKey: 'ensure_auth',\n });\n }\n };\n};\n"],"names":["fetch","require","getUser","_x","_x2","_getUser","apply","arguments","_asyncToGenerator","_regeneratorRuntime","mark","_callee","token","domainName","params","response","data","wrap","_callee$","_context","prev","next","method","headers","Authorization","sent","json","abrupt","stop","dauth","_ref","ssid","req","res","authorization","status","send","mdKey","replace","jwt","verify","then","getUserFetch","message","user","error","console","log"],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA,IAAMA,KAAK,gBAAGC,OAAO,CAAC,YAAY,CAAC;SAEbC,OAAOA,CAAAC,EAAA,EAAAC,GAAA;EAAA,OAAAC,QAAA,CAAAC,KAAA,OAAAC,SAAA;AAAA;AAc5B,SAAAF;EAAAA,QAAA,GAAAG,iBAAA,eAAAC,mBAAA,GAAAC,IAAA,CAdM,SAAAC,QAAuBC,KAAa,EAAEC,UAAkB;IAAA,IAAAC,MAAA,EAAAC,QAAA,EAAAC,IAAA;IAAA,OAAAP,mBAAA,GAAAQ,IAAA,UAAAC,SAAAC,QAAA;MAAA,kBAAAA,QAAA,CAAAC,IAAA,GAAAD,QAAA,CAAAE,IAAA;QAAA;UACvDP,MAAM,GAAG;YACbQ,MAAM,EAAE,KAAK;YACbC,OAAO,EAAE;cACPC,aAAa,EAAEZ,KAAK;cACpB,cAAc,EAAE;;WAEnB;UAAAO,QAAA,CAAAE,IAAA;UAAA,OACsBrB,KAAK,mDACsBa,UAAU,EAC1DC,MAAM,CACP;QAAA;UAHKC,QAAQ,GAAAI,QAAA,CAAAM,IAAA;UAAAN,QAAA,CAAAE,IAAA;UAAA,OAIKN,QAAQ,CAACW,IAAI,EAAE;QAAA;UAA5BV,IAAI,GAAAG,QAAA,CAAAM,IAAA;UAAA,OAAAN,QAAA,CAAAQ,MAAA,WACH;YAAEZ,QAAQ,EAARA,QAAQ;YAAEC,IAAI,EAAJA;WAAM;QAAA;QAAA;UAAA,OAAAG,QAAA,CAAAS,IAAA;;OAAAjB,OAAA;GAC1B;EAAA,OAAAN,QAAA,CAAAC,KAAA,OAAAC,SAAA;AAAA;;ICuCYsB,KAAK,GAAG,SAARA,KAAKA,CAAAC,IAAA;MAAMC,IAAI,GAAAD,IAAA,CAAJC,IAAI;IAAElB,UAAU,GAAAiB,IAAA,CAAVjB,UAAU;EACtC,OAAO,UACLmB,GAAiB,EACjBC,GAAoB,EACpBZ,IAAkB;IAElB,IAAI,CAACW,GAAG,CAACT,OAAO,CAACW,aAAa,EAAE;MAC9B,OAAOD,GAAG,CACPE,MAAM,CAAC,GAAG,CAAC,CACXC,IAAI,CAAC;QAAED,MAAM,EAAE,iBAAiB;QAAEE,KAAK,EAAE;OAAe,CAAC;;IAE9D,IAAMzB,KAAK,GAAGoB,GAAG,CAACT,OAAO,CAACW,aAAa,CAACI,OAAO,CAAC,QAAQ,EAAE,EAAE,CAAC;IAC7D,IAAI;MACFC,GAAG,CAACC,MAAM,CAAC5B,KAAK,EAAEmB,IAAc,CAAiB;MACjD7B,OAAO,CAACU,KAAK,EAAEC,UAAU,CAAC,CACvB4B,IAAI,CAAC,UAACC,YAAiB;QACtB,IAAIA,YAAY,CAAC3B,QAAQ,CAACoB,MAAM,KAAK,GAAG,EAAE;UACxC,OAAOF,GAAG,CAACE,MAAM,CAAC,GAAG,CAAC,CAACC,IAAI,CAAC;YAC1BD,MAAM,EAAE,kBAAkB;YAC1BQ,OAAO,EAAE;WACV,CAAC;SACH,MAAM,IAAID,YAAY,CAAC3B,QAAQ,CAACoB,MAAM,KAAK,GAAG,EAAE;UAC/C,OAAOF,GAAG,CACPE,MAAM,CAAC,GAAG,CAAC,CACXC,IAAI,CAAC;YAAED,MAAM,EAAE,OAAO;YAAEQ,OAAO,EAAE;WAAsB,CAAC;SAC5D,MAAM,IAAID,YAAY,CAAC3B,QAAQ,CAACoB,MAAM,KAAK,GAAG,EAAE;UAC/CH,GAAG,CAACY,IAAI,GAAGF,YAAY,CAAC1B,IAAI,CAAC4B,IAAI;UACjC,OAAOvB,IAAI,EAAE;SACd,MAAM;UACL,OAAOY,GAAG,CAACE,MAAM,CAAC,GAAG,CAAC,CAACC,IAAI,CAAC;YAC1BD,MAAM,EAAE,OAAO;YACfQ,OAAO,EAAE;WACV,CAAC;;OAEL,CAAC,SACI,CAAC,UAACE,KAAU;QAChBC,OAAO,CAACC,GAAG,CAAC,oBAAoB,EAAEF,KAAK,CAAC;QACxC,OAAOxB,IAAI,EAAE;OACd,CAAC;KACL,CAAC,OAAOwB,KAAK,EAAE;MACd,IAAIA,KAAK,IAAI,CAAAA,KAAK,oBAALA,KAAK,CAAEF,OAAO,MAAK,aAAa,EAAE;QAC7C,OAAOV,GAAG,CAACE,MAAM,CAAC,GAAG,CAAC,CAACC,IAAI,CAAC;UAC1BD,MAAM,EAAE,eAAe;UACvBQ,OAAO,EAAE,sBAAsB;UAC/BN,KAAK,EAAE;SACR,CAAC;;MAEJ,OAAOJ,GAAG,CAACE,MAAM,CAAC,GAAG,CAAC,CAACC,IAAI,CAAC;QAC1BD,MAAM,EAAE,eAAe;QACvBQ,OAAO,EAAE,uBAAuB;QAChCN,KAAK,EAAE;OACR,CAAC;;GAEL;AACH,CAAC;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"dauth-md-node.cjs.production.min.js","sources":["../src/api/dauth.api.ts","../src/index.ts"],"sourcesContent":["const fetch = require('node-fetch');\n\nexport async function getUser(token: string, domainName: string) {\n const params = {\n method: 'GET',\n headers: {\n Authorization: token,\n 'Content-Type': 'application/json',\n },\n };\n const response = await fetch(\n `http://localhost:4012/api/v1/get-tenant-user/${domainName}`,\n params\n );\n const data = await response.json();\n return { response, data };\n}","import {\n Request,\n NextFunction,\n Response as ExpressResponse,\n Handler,\n} from 'express';\nimport mongoose from 'mongoose';\nimport jwt from 'jsonwebtoken';\nimport { getUser } from './api/dauth.api';\n\nexport interface IAccessToken {\n _id: string | mongoose.Types.ObjectId;\n sid: string;\n email: string;\n createToken?: number;\n exp?: number;\n iat?: number;\n}\n\nexport interface ITenantUser {\n _id: string\n dauthLicense?: string\n sid: string\n name: string\n lastname: string\n nickname: string\n email: string\n is_verified: boolean\n language: string\n avatar: string\n role: string\n tel_prefix: string\n tel_suffix: string\n createdAt: Date\n updatedAt: Date\n last_login: Date\n __v: string | any\n}\n\ninterface IRequestUser extends Request {\n user: IAccessToken;\n files: {\n image: { path: string };\n avatar: { path: string };\n };\n headers: {\n authorization: string;\n };\n}\n\ninterface TCustomResponse extends ExpressResponse {\n status(code: number): any;\n send(body?: any): any;\n}\n\nexport const dauth = ({ ssid, domainName }: { ssid: string, domainName: string }) => {\n return (\n req: IRequestUser,\n res: TCustomResponse,\n next: NextFunction\n ): Handler | void => {\n if (!req.headers.authorization) {\n return res\n .status(403)\n .send({ status: 'token-not-found', mdKey: 'ensure_auth' });\n }\n const token = req.headers.authorization.replace(/['\"]+/g, '');\n try {\n jwt.verify(token, ssid as string) as IAccessToken;\n // req.user = payload;\n getUser(token, domainName)\n .then((getUserFetch: any) => {\n if (getUserFetch.response.status === 404) {\n return res.status(404).send({\n status: 'domain-not-found',\n message: 'Dauth domain does not exist',\n });\n } else if (getUserFetch.response.status === 500) {\n return res\n .status(500)\n .send({ status: 'error', message: 'Dauth server error' });\n } else if (getUserFetch.response.status === 200) {\n req.user = getUserFetch.data.user;\n // console.log('node-fetch npm', req.user);\n return next();\n } else {\n return res.status(501).send({\n status: 'error',\n message: 'Dauth server error',\n });\n }\n })\n .catch((error: any) => {\n console.log('getDauthUser error', error);\n return next();\n });\n } catch (error) {\n if (error && error?.message === 'jwt expired') {\n return res.status(500).send({\n status: 'token-expired',\n message: 'El token ha expirado',\n // error: error,\n mdKey: 'ensure_auth',\n });\n }\n return res.status(500).send({\n status: 'token-invalid',\n message: 'El token no es válido',\n // error: error,\n mdKey: 'ensure_auth',\n });\n }\n };\n};\n"],"names":["fetch","require","_getUser","_asyncToGenerator","_regeneratorRuntime","mark","_callee","token","domainName","params","response","wrap","_context","prev","next","method","headers","Authorization","Content-Type","sent","json","abrupt","data","stop","apply","arguments","_ref","ssid","req","res","authorization","status","send","mdKey","replace","jwt","verify","_x","_x2","getUser","then","getUserFetch","message","user","error","console","log"],"mappings":"+zNAAA,IAAMA,EAAQC,QAAQ,cAgBrB,SAAAC,IAAA,OAAAA,EAAAC,EAAAC,IAAAC,MAdM,SAAAC,EAAuBC,EAAeC,GAAkB,IAAAC,EAAAC,EAAA,OAAAN,IAAAO,eAAAC,GAAA,cAAAA,EAAAC,KAAAD,EAAAE,MAAA,OAO5D,OANKL,EAAS,CACbM,OAAQ,MACRC,QAAS,CACPC,cAAeV,EACfW,eAAgB,qBAEnBN,EAAAE,OACsBd,kDAC2BQ,EAChDC,GACD,OAHa,OAARC,EAAQE,EAAAO,KAAAP,EAAAE,OAIKJ,EAASU,OAAM,OAAxB,OAAAR,EAAAS,gBACH,CAAEX,SAAAA,EAAUY,KADTV,EAAAO,OACe,OAAA,UAAA,OAAAP,EAAAW,UAAAjB,QAC1BkB,WAAAC,yBCuCoB,SAAHC,OAAMC,EAAID,EAAJC,KAAMnB,EAAUkB,EAAVlB,WAC5B,OAAO,SACLoB,EACAC,EACAf,GAEA,IAAKc,EAAIZ,QAAQc,cACf,OAAOD,EACJE,OAAO,KACPC,KAAK,CAAED,OAAQ,kBAAmBE,MAAO,gBAE9C,IAAM1B,EAAQqB,EAAIZ,QAAQc,cAAcI,QAAQ,SAAU,IAC1D,IACEC,EAAIC,OAAO7B,EAAOoB,YDlEKU,EAAAC,GAAA,OAAApC,EAAAsB,WAAAC,WCoEvBc,CAAQhC,EAAOC,GACZgC,MAAK,SAACC,GACL,OAAqC,MAAjCA,EAAa/B,SAASqB,OACjBF,EAAIE,OAAO,KAAKC,KAAK,CAC1BD,OAAQ,mBACRW,QAAS,gCAE+B,MAAjCD,EAAa/B,SAASqB,OACxBF,EACJE,OAAO,KACPC,KAAK,CAAED,OAAQ,QAASW,QAAS,uBACM,MAAjCD,EAAa/B,SAASqB,QAC/BH,EAAIe,KAAOF,EAAanB,KAAKqB,KAEtB7B,KAEAe,EAAIE,OAAO,KAAKC,KAAK,CAC1BD,OAAQ,QACRW,QAAS,iCAIR,SAACE,GAEN,OADAC,QAAQC,IAAI,qBAAsBF,GAC3B9B,OAEX,MAAO8B,GACP,OAAIA,GAA4B,uBAAnBA,SAAAA,EAAOF,SACXb,EAAIE,OAAO,KAAKC,KAAK,CAC1BD,OAAQ,gBACRW,QAAS,uBAETT,MAAO,gBAGJJ,EAAIE,OAAO,KAAKC,KAAK,CAC1BD,OAAQ,gBACRW,QAAS,wBAETT,MAAO"}
1
+ {"version":3,"file":"dauth-md-node.cjs.production.min.js","sources":["../src/api/dauth.api.ts","../src/index.ts"],"sourcesContent":["const fetch = require('node-fetch');\n\nexport async function getUser(token: string, domainName: string) {\n const params = {\n method: 'GET',\n headers: {\n Authorization: token,\n 'Content-Type': 'application/json',\n },\n };\n const response = await fetch(\n `http://localhost:4012/api/v1/get-tenant-user/${domainName}`,\n params\n );\n const data = await response.json();\n return { response, data };\n}","import {\n Request,\n NextFunction,\n Response as ExpressResponse,\n Handler,\n} from 'express';\nimport mongoose from 'mongoose';\nimport jwt from 'jsonwebtoken';\nimport { getUser } from './api/dauth.api';\n\nexport interface IAccessToken {\n _id: string | mongoose.Types.ObjectId;\n sid: string;\n email: string;\n createToken?: number;\n exp?: number;\n iat?: number;\n}\n\ninterface ITenantUser {\n _id: string\n dauthLicense?: string\n sid: string\n name: string\n lastname: string\n nickname: string\n email: string\n is_verified: boolean\n language: string\n avatar: string\n role: string\n tel_prefix: string\n tel_suffix: string\n createdAt: Date\n updatedAt: Date\n last_login: Date\n __v: string | any\n}\n\ninterface IRequestUser extends Request {\n user: ITenantUser;\n files: {\n image: { path: string };\n avatar: { path: string };\n };\n headers: {\n authorization: string;\n };\n}\n\ninterface TCustomResponse extends ExpressResponse {\n status(code: number): any;\n send(body?: any): any;\n}\n\nexport const dauth = ({ ssid, domainName }: { ssid: string, domainName: string }) => {\n return (\n req: IRequestUser,\n res: TCustomResponse,\n next: NextFunction\n ): Handler | void => {\n if (!req.headers.authorization) {\n return res\n .status(403)\n .send({ status: 'token-not-found', mdKey: 'ensure_auth' });\n }\n const token = req.headers.authorization.replace(/['\"]+/g, '');\n try {\n jwt.verify(token, ssid as string) as IAccessToken;\n getUser(token, domainName)\n .then((getUserFetch: any) => {\n if (getUserFetch.response.status === 404) {\n return res.status(404).send({\n status: 'domain-not-found',\n message: 'Dauth domain does not exist',\n });\n } else if (getUserFetch.response.status === 500) {\n return res\n .status(500)\n .send({ status: 'error', message: 'Dauth server error' });\n } else if (getUserFetch.response.status === 200) {\n req.user = getUserFetch.data.user;\n return next();\n } else {\n return res.status(501).send({\n status: 'error',\n message: 'Dauth server error',\n });\n }\n })\n .catch((error: any) => {\n console.log('getDauthUser error', error);\n return next();\n });\n } catch (error) {\n if (error && error?.message === 'jwt expired') {\n return res.status(500).send({\n status: 'token-expired',\n message: 'El token ha expirado',\n mdKey: 'ensure_auth',\n });\n }\n return res.status(500).send({\n status: 'token-invalid',\n message: 'El token no es válido',\n mdKey: 'ensure_auth',\n });\n }\n };\n};\n"],"names":["fetch","require","_getUser","_asyncToGenerator","_regeneratorRuntime","mark","_callee","token","domainName","params","response","wrap","_context","prev","next","method","headers","Authorization","Content-Type","sent","json","abrupt","data","stop","apply","arguments","_ref","ssid","req","res","authorization","status","send","mdKey","replace","jwt","verify","_x","_x2","getUser","then","getUserFetch","message","user","error","console","log"],"mappings":"+zNAAA,IAAMA,EAAQC,QAAQ,cAgBrB,SAAAC,IAAA,OAAAA,EAAAC,EAAAC,IAAAC,MAdM,SAAAC,EAAuBC,EAAeC,GAAkB,IAAAC,EAAAC,EAAA,OAAAN,IAAAO,eAAAC,GAAA,cAAAA,EAAAC,KAAAD,EAAAE,MAAA,OAO5D,OANKL,EAAS,CACbM,OAAQ,MACRC,QAAS,CACPC,cAAeV,EACfW,eAAgB,qBAEnBN,EAAAE,OACsBd,kDAC2BQ,EAChDC,GACD,OAHa,OAARC,EAAQE,EAAAO,KAAAP,EAAAE,OAIKJ,EAASU,OAAM,OAAxB,OAAAR,EAAAS,gBACH,CAAEX,SAAAA,EAAUY,KADTV,EAAAO,OACe,OAAA,UAAA,OAAAP,EAAAW,UAAAjB,QAC1BkB,WAAAC,yBCuCoB,SAAHC,OAAMC,EAAID,EAAJC,KAAMnB,EAAUkB,EAAVlB,WAC5B,OAAO,SACLoB,EACAC,EACAf,GAEA,IAAKc,EAAIZ,QAAQc,cACf,OAAOD,EACJE,OAAO,KACPC,KAAK,CAAED,OAAQ,kBAAmBE,MAAO,gBAE9C,IAAM1B,EAAQqB,EAAIZ,QAAQc,cAAcI,QAAQ,SAAU,IAC1D,IACEC,EAAIC,OAAO7B,EAAOoB,YDlEKU,EAAAC,GAAA,OAAApC,EAAAsB,WAAAC,WCmEvBc,CAAQhC,EAAOC,GACZgC,MAAK,SAACC,GACL,OAAqC,MAAjCA,EAAa/B,SAASqB,OACjBF,EAAIE,OAAO,KAAKC,KAAK,CAC1BD,OAAQ,mBACRW,QAAS,gCAE+B,MAAjCD,EAAa/B,SAASqB,OACxBF,EACJE,OAAO,KACPC,KAAK,CAAED,OAAQ,QAASW,QAAS,uBACM,MAAjCD,EAAa/B,SAASqB,QAC/BH,EAAIe,KAAOF,EAAanB,KAAKqB,KACtB7B,KAEAe,EAAIE,OAAO,KAAKC,KAAK,CAC1BD,OAAQ,QACRW,QAAS,iCAIR,SAACE,GAEN,OADAC,QAAQC,IAAI,qBAAsBF,GAC3B9B,OAEX,MAAO8B,GACP,OAAIA,GAA4B,uBAAnBA,SAAAA,EAAOF,SACXb,EAAIE,OAAO,KAAKC,KAAK,CAC1BD,OAAQ,gBACRW,QAAS,uBACTT,MAAO,gBAGJJ,EAAIE,OAAO,KAAKC,KAAK,CAC1BD,OAAQ,gBACRW,QAAS,wBACTT,MAAO"}
@@ -383,7 +383,6 @@ var dauth = function dauth(_ref) {
383
383
  var token = req.headers.authorization.replace(/['"]+/g, '');
384
384
  try {
385
385
  jwt.verify(token, ssid);
386
- // req.user = payload;
387
386
  getUser(token, domainName).then(function (getUserFetch) {
388
387
  if (getUserFetch.response.status === 404) {
389
388
  return res.status(404).send({
@@ -397,7 +396,6 @@ var dauth = function dauth(_ref) {
397
396
  });
398
397
  } else if (getUserFetch.response.status === 200) {
399
398
  req.user = getUserFetch.data.user;
400
- // console.log('node-fetch npm', req.user);
401
399
  return next();
402
400
  } else {
403
401
  return res.status(501).send({
@@ -414,14 +412,12 @@ var dauth = function dauth(_ref) {
414
412
  return res.status(500).send({
415
413
  status: 'token-expired',
416
414
  message: 'El token ha expirado',
417
- // error: error,
418
415
  mdKey: 'ensure_auth'
419
416
  });
420
417
  }
421
418
  return res.status(500).send({
422
419
  status: 'token-invalid',
423
420
  message: 'El token no es válido',
424
- // error: error,
425
421
  mdKey: 'ensure_auth'
426
422
  });
427
423
  }
@@ -1 +1 @@
1
- {"version":3,"file":"dauth-md-node.esm.js","sources":["../src/api/dauth.api.ts","../src/index.ts"],"sourcesContent":["const fetch = require('node-fetch');\n\nexport async function getUser(token: string, domainName: string) {\n const params = {\n method: 'GET',\n headers: {\n Authorization: token,\n 'Content-Type': 'application/json',\n },\n };\n const response = await fetch(\n `http://localhost:4012/api/v1/get-tenant-user/${domainName}`,\n params\n );\n const data = await response.json();\n return { response, data };\n}","import {\n Request,\n NextFunction,\n Response as ExpressResponse,\n Handler,\n} from 'express';\nimport mongoose from 'mongoose';\nimport jwt from 'jsonwebtoken';\nimport { getUser } from './api/dauth.api';\n\nexport interface IAccessToken {\n _id: string | mongoose.Types.ObjectId;\n sid: string;\n email: string;\n createToken?: number;\n exp?: number;\n iat?: number;\n}\n\nexport interface ITenantUser {\n _id: string\n dauthLicense?: string\n sid: string\n name: string\n lastname: string\n nickname: string\n email: string\n is_verified: boolean\n language: string\n avatar: string\n role: string\n tel_prefix: string\n tel_suffix: string\n createdAt: Date\n updatedAt: Date\n last_login: Date\n __v: string | any\n}\n\ninterface IRequestUser extends Request {\n user: IAccessToken;\n files: {\n image: { path: string };\n avatar: { path: string };\n };\n headers: {\n authorization: string;\n };\n}\n\ninterface TCustomResponse extends ExpressResponse {\n status(code: number): any;\n send(body?: any): any;\n}\n\nexport const dauth = ({ ssid, domainName }: { ssid: string, domainName: string }) => {\n return (\n req: IRequestUser,\n res: TCustomResponse,\n next: NextFunction\n ): Handler | void => {\n if (!req.headers.authorization) {\n return res\n .status(403)\n .send({ status: 'token-not-found', mdKey: 'ensure_auth' });\n }\n const token = req.headers.authorization.replace(/['\"]+/g, '');\n try {\n jwt.verify(token, ssid as string) as IAccessToken;\n // req.user = payload;\n getUser(token, domainName)\n .then((getUserFetch: any) => {\n if (getUserFetch.response.status === 404) {\n return res.status(404).send({\n status: 'domain-not-found',\n message: 'Dauth domain does not exist',\n });\n } else if (getUserFetch.response.status === 500) {\n return res\n .status(500)\n .send({ status: 'error', message: 'Dauth server error' });\n } else if (getUserFetch.response.status === 200) {\n req.user = getUserFetch.data.user;\n // console.log('node-fetch npm', req.user);\n return next();\n } else {\n return res.status(501).send({\n status: 'error',\n message: 'Dauth server error',\n });\n }\n })\n .catch((error: any) => {\n console.log('getDauthUser error', error);\n return next();\n });\n } catch (error) {\n if (error && error?.message === 'jwt expired') {\n return res.status(500).send({\n status: 'token-expired',\n message: 'El token ha expirado',\n // error: error,\n mdKey: 'ensure_auth',\n });\n }\n return res.status(500).send({\n status: 'token-invalid',\n message: 'El token no es válido',\n // error: error,\n mdKey: 'ensure_auth',\n });\n }\n };\n};\n"],"names":["fetch","require","getUser","_x","_x2","_getUser","apply","arguments","_asyncToGenerator","_regeneratorRuntime","mark","_callee","token","domainName","params","response","data","wrap","_callee$","_context","prev","next","method","headers","Authorization","sent","json","abrupt","stop","dauth","_ref","ssid","req","res","authorization","status","send","mdKey","replace","jwt","verify","then","getUserFetch","message","user","error","console","log"],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA,IAAMA,KAAK,gBAAGC,OAAO,CAAC,YAAY,CAAC;SAEbC,OAAOA,CAAAC,EAAA,EAAAC,GAAA;EAAA,OAAAC,QAAA,CAAAC,KAAA,OAAAC,SAAA;AAAA;AAc5B,SAAAF;EAAAA,QAAA,GAAAG,iBAAA,eAAAC,mBAAA,GAAAC,IAAA,CAdM,SAAAC,QAAuBC,KAAa,EAAEC,UAAkB;IAAA,IAAAC,MAAA,EAAAC,QAAA,EAAAC,IAAA;IAAA,OAAAP,mBAAA,GAAAQ,IAAA,UAAAC,SAAAC,QAAA;MAAA,kBAAAA,QAAA,CAAAC,IAAA,GAAAD,QAAA,CAAAE,IAAA;QAAA;UACvDP,MAAM,GAAG;YACbQ,MAAM,EAAE,KAAK;YACbC,OAAO,EAAE;cACPC,aAAa,EAAEZ,KAAK;cACpB,cAAc,EAAE;;WAEnB;UAAAO,QAAA,CAAAE,IAAA;UAAA,OACsBrB,KAAK,mDACsBa,UAAU,EAC1DC,MAAM,CACP;QAAA;UAHKC,QAAQ,GAAAI,QAAA,CAAAM,IAAA;UAAAN,QAAA,CAAAE,IAAA;UAAA,OAIKN,QAAQ,CAACW,IAAI,EAAE;QAAA;UAA5BV,IAAI,GAAAG,QAAA,CAAAM,IAAA;UAAA,OAAAN,QAAA,CAAAQ,MAAA,WACH;YAAEZ,QAAQ,EAARA,QAAQ;YAAEC,IAAI,EAAJA;WAAM;QAAA;QAAA;UAAA,OAAAG,QAAA,CAAAS,IAAA;;OAAAjB,OAAA;GAC1B;EAAA,OAAAN,QAAA,CAAAC,KAAA,OAAAC,SAAA;AAAA;;ICuCYsB,KAAK,GAAG,SAARA,KAAKA,CAAAC,IAAA;MAAMC,IAAI,GAAAD,IAAA,CAAJC,IAAI;IAAElB,UAAU,GAAAiB,IAAA,CAAVjB,UAAU;EACtC,OAAO,UACLmB,GAAiB,EACjBC,GAAoB,EACpBZ,IAAkB;IAElB,IAAI,CAACW,GAAG,CAACT,OAAO,CAACW,aAAa,EAAE;MAC9B,OAAOD,GAAG,CACPE,MAAM,CAAC,GAAG,CAAC,CACXC,IAAI,CAAC;QAAED,MAAM,EAAE,iBAAiB;QAAEE,KAAK,EAAE;OAAe,CAAC;;IAE9D,IAAMzB,KAAK,GAAGoB,GAAG,CAACT,OAAO,CAACW,aAAa,CAACI,OAAO,CAAC,QAAQ,EAAE,EAAE,CAAC;IAC7D,IAAI;MACFC,GAAG,CAACC,MAAM,CAAC5B,KAAK,EAAEmB,IAAc,CAAiB;;MAEjD7B,OAAO,CAACU,KAAK,EAAEC,UAAU,CAAC,CACvB4B,IAAI,CAAC,UAACC,YAAiB;QACtB,IAAIA,YAAY,CAAC3B,QAAQ,CAACoB,MAAM,KAAK,GAAG,EAAE;UACxC,OAAOF,GAAG,CAACE,MAAM,CAAC,GAAG,CAAC,CAACC,IAAI,CAAC;YAC1BD,MAAM,EAAE,kBAAkB;YAC1BQ,OAAO,EAAE;WACV,CAAC;SACH,MAAM,IAAID,YAAY,CAAC3B,QAAQ,CAACoB,MAAM,KAAK,GAAG,EAAE;UAC/C,OAAOF,GAAG,CACPE,MAAM,CAAC,GAAG,CAAC,CACXC,IAAI,CAAC;YAAED,MAAM,EAAE,OAAO;YAAEQ,OAAO,EAAE;WAAsB,CAAC;SAC5D,MAAM,IAAID,YAAY,CAAC3B,QAAQ,CAACoB,MAAM,KAAK,GAAG,EAAE;UAC/CH,GAAG,CAACY,IAAI,GAAGF,YAAY,CAAC1B,IAAI,CAAC4B,IAAI;;UAEjC,OAAOvB,IAAI,EAAE;SACd,MAAM;UACL,OAAOY,GAAG,CAACE,MAAM,CAAC,GAAG,CAAC,CAACC,IAAI,CAAC;YAC1BD,MAAM,EAAE,OAAO;YACfQ,OAAO,EAAE;WACV,CAAC;;OAEL,CAAC,SACI,CAAC,UAACE,KAAU;QAChBC,OAAO,CAACC,GAAG,CAAC,oBAAoB,EAAEF,KAAK,CAAC;QACxC,OAAOxB,IAAI,EAAE;OACd,CAAC;KACL,CAAC,OAAOwB,KAAK,EAAE;MACd,IAAIA,KAAK,IAAI,CAAAA,KAAK,oBAALA,KAAK,CAAEF,OAAO,MAAK,aAAa,EAAE;QAC7C,OAAOV,GAAG,CAACE,MAAM,CAAC,GAAG,CAAC,CAACC,IAAI,CAAC;UAC1BD,MAAM,EAAE,eAAe;UACvBQ,OAAO,EAAE,sBAAsB;;UAE/BN,KAAK,EAAE;SACR,CAAC;;MAEJ,OAAOJ,GAAG,CAACE,MAAM,CAAC,GAAG,CAAC,CAACC,IAAI,CAAC;QAC1BD,MAAM,EAAE,eAAe;QACvBQ,OAAO,EAAE,uBAAuB;;QAEhCN,KAAK,EAAE;OACR,CAAC;;GAEL;AACH,CAAC;;;;"}
1
+ {"version":3,"file":"dauth-md-node.esm.js","sources":["../src/api/dauth.api.ts","../src/index.ts"],"sourcesContent":["const fetch = require('node-fetch');\n\nexport async function getUser(token: string, domainName: string) {\n const params = {\n method: 'GET',\n headers: {\n Authorization: token,\n 'Content-Type': 'application/json',\n },\n };\n const response = await fetch(\n `http://localhost:4012/api/v1/get-tenant-user/${domainName}`,\n params\n );\n const data = await response.json();\n return { response, data };\n}","import {\n Request,\n NextFunction,\n Response as ExpressResponse,\n Handler,\n} from 'express';\nimport mongoose from 'mongoose';\nimport jwt from 'jsonwebtoken';\nimport { getUser } from './api/dauth.api';\n\nexport interface IAccessToken {\n _id: string | mongoose.Types.ObjectId;\n sid: string;\n email: string;\n createToken?: number;\n exp?: number;\n iat?: number;\n}\n\ninterface ITenantUser {\n _id: string\n dauthLicense?: string\n sid: string\n name: string\n lastname: string\n nickname: string\n email: string\n is_verified: boolean\n language: string\n avatar: string\n role: string\n tel_prefix: string\n tel_suffix: string\n createdAt: Date\n updatedAt: Date\n last_login: Date\n __v: string | any\n}\n\ninterface IRequestUser extends Request {\n user: ITenantUser;\n files: {\n image: { path: string };\n avatar: { path: string };\n };\n headers: {\n authorization: string;\n };\n}\n\ninterface TCustomResponse extends ExpressResponse {\n status(code: number): any;\n send(body?: any): any;\n}\n\nexport const dauth = ({ ssid, domainName }: { ssid: string, domainName: string }) => {\n return (\n req: IRequestUser,\n res: TCustomResponse,\n next: NextFunction\n ): Handler | void => {\n if (!req.headers.authorization) {\n return res\n .status(403)\n .send({ status: 'token-not-found', mdKey: 'ensure_auth' });\n }\n const token = req.headers.authorization.replace(/['\"]+/g, '');\n try {\n jwt.verify(token, ssid as string) as IAccessToken;\n getUser(token, domainName)\n .then((getUserFetch: any) => {\n if (getUserFetch.response.status === 404) {\n return res.status(404).send({\n status: 'domain-not-found',\n message: 'Dauth domain does not exist',\n });\n } else if (getUserFetch.response.status === 500) {\n return res\n .status(500)\n .send({ status: 'error', message: 'Dauth server error' });\n } else if (getUserFetch.response.status === 200) {\n req.user = getUserFetch.data.user;\n return next();\n } else {\n return res.status(501).send({\n status: 'error',\n message: 'Dauth server error',\n });\n }\n })\n .catch((error: any) => {\n console.log('getDauthUser error', error);\n return next();\n });\n } catch (error) {\n if (error && error?.message === 'jwt expired') {\n return res.status(500).send({\n status: 'token-expired',\n message: 'El token ha expirado',\n mdKey: 'ensure_auth',\n });\n }\n return res.status(500).send({\n status: 'token-invalid',\n message: 'El token no es válido',\n mdKey: 'ensure_auth',\n });\n }\n };\n};\n"],"names":["fetch","require","getUser","_x","_x2","_getUser","apply","arguments","_asyncToGenerator","_regeneratorRuntime","mark","_callee","token","domainName","params","response","data","wrap","_callee$","_context","prev","next","method","headers","Authorization","sent","json","abrupt","stop","dauth","_ref","ssid","req","res","authorization","status","send","mdKey","replace","jwt","verify","then","getUserFetch","message","user","error","console","log"],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA,IAAMA,KAAK,gBAAGC,OAAO,CAAC,YAAY,CAAC;SAEbC,OAAOA,CAAAC,EAAA,EAAAC,GAAA;EAAA,OAAAC,QAAA,CAAAC,KAAA,OAAAC,SAAA;AAAA;AAc5B,SAAAF;EAAAA,QAAA,GAAAG,iBAAA,eAAAC,mBAAA,GAAAC,IAAA,CAdM,SAAAC,QAAuBC,KAAa,EAAEC,UAAkB;IAAA,IAAAC,MAAA,EAAAC,QAAA,EAAAC,IAAA;IAAA,OAAAP,mBAAA,GAAAQ,IAAA,UAAAC,SAAAC,QAAA;MAAA,kBAAAA,QAAA,CAAAC,IAAA,GAAAD,QAAA,CAAAE,IAAA;QAAA;UACvDP,MAAM,GAAG;YACbQ,MAAM,EAAE,KAAK;YACbC,OAAO,EAAE;cACPC,aAAa,EAAEZ,KAAK;cACpB,cAAc,EAAE;;WAEnB;UAAAO,QAAA,CAAAE,IAAA;UAAA,OACsBrB,KAAK,mDACsBa,UAAU,EAC1DC,MAAM,CACP;QAAA;UAHKC,QAAQ,GAAAI,QAAA,CAAAM,IAAA;UAAAN,QAAA,CAAAE,IAAA;UAAA,OAIKN,QAAQ,CAACW,IAAI,EAAE;QAAA;UAA5BV,IAAI,GAAAG,QAAA,CAAAM,IAAA;UAAA,OAAAN,QAAA,CAAAQ,MAAA,WACH;YAAEZ,QAAQ,EAARA,QAAQ;YAAEC,IAAI,EAAJA;WAAM;QAAA;QAAA;UAAA,OAAAG,QAAA,CAAAS,IAAA;;OAAAjB,OAAA;GAC1B;EAAA,OAAAN,QAAA,CAAAC,KAAA,OAAAC,SAAA;AAAA;;ICuCYsB,KAAK,GAAG,SAARA,KAAKA,CAAAC,IAAA;MAAMC,IAAI,GAAAD,IAAA,CAAJC,IAAI;IAAElB,UAAU,GAAAiB,IAAA,CAAVjB,UAAU;EACtC,OAAO,UACLmB,GAAiB,EACjBC,GAAoB,EACpBZ,IAAkB;IAElB,IAAI,CAACW,GAAG,CAACT,OAAO,CAACW,aAAa,EAAE;MAC9B,OAAOD,GAAG,CACPE,MAAM,CAAC,GAAG,CAAC,CACXC,IAAI,CAAC;QAAED,MAAM,EAAE,iBAAiB;QAAEE,KAAK,EAAE;OAAe,CAAC;;IAE9D,IAAMzB,KAAK,GAAGoB,GAAG,CAACT,OAAO,CAACW,aAAa,CAACI,OAAO,CAAC,QAAQ,EAAE,EAAE,CAAC;IAC7D,IAAI;MACFC,GAAG,CAACC,MAAM,CAAC5B,KAAK,EAAEmB,IAAc,CAAiB;MACjD7B,OAAO,CAACU,KAAK,EAAEC,UAAU,CAAC,CACvB4B,IAAI,CAAC,UAACC,YAAiB;QACtB,IAAIA,YAAY,CAAC3B,QAAQ,CAACoB,MAAM,KAAK,GAAG,EAAE;UACxC,OAAOF,GAAG,CAACE,MAAM,CAAC,GAAG,CAAC,CAACC,IAAI,CAAC;YAC1BD,MAAM,EAAE,kBAAkB;YAC1BQ,OAAO,EAAE;WACV,CAAC;SACH,MAAM,IAAID,YAAY,CAAC3B,QAAQ,CAACoB,MAAM,KAAK,GAAG,EAAE;UAC/C,OAAOF,GAAG,CACPE,MAAM,CAAC,GAAG,CAAC,CACXC,IAAI,CAAC;YAAED,MAAM,EAAE,OAAO;YAAEQ,OAAO,EAAE;WAAsB,CAAC;SAC5D,MAAM,IAAID,YAAY,CAAC3B,QAAQ,CAACoB,MAAM,KAAK,GAAG,EAAE;UAC/CH,GAAG,CAACY,IAAI,GAAGF,YAAY,CAAC1B,IAAI,CAAC4B,IAAI;UACjC,OAAOvB,IAAI,EAAE;SACd,MAAM;UACL,OAAOY,GAAG,CAACE,MAAM,CAAC,GAAG,CAAC,CAACC,IAAI,CAAC;YAC1BD,MAAM,EAAE,OAAO;YACfQ,OAAO,EAAE;WACV,CAAC;;OAEL,CAAC,SACI,CAAC,UAACE,KAAU;QAChBC,OAAO,CAACC,GAAG,CAAC,oBAAoB,EAAEF,KAAK,CAAC;QACxC,OAAOxB,IAAI,EAAE;OACd,CAAC;KACL,CAAC,OAAOwB,KAAK,EAAE;MACd,IAAIA,KAAK,IAAI,CAAAA,KAAK,oBAALA,KAAK,CAAEF,OAAO,MAAK,aAAa,EAAE;QAC7C,OAAOV,GAAG,CAACE,MAAM,CAAC,GAAG,CAAC,CAACC,IAAI,CAAC;UAC1BD,MAAM,EAAE,eAAe;UACvBQ,OAAO,EAAE,sBAAsB;UAC/BN,KAAK,EAAE;SACR,CAAC;;MAEJ,OAAOJ,GAAG,CAACE,MAAM,CAAC,GAAG,CAAC,CAACC,IAAI,CAAC;QAC1BD,MAAM,EAAE,eAAe;QACvBQ,OAAO,EAAE,uBAAuB;QAChCN,KAAK,EAAE;OACR,CAAC;;GAEL;AACH,CAAC;;;;"}
package/dist/index.d.ts CHANGED
@@ -8,7 +8,7 @@ export interface IAccessToken {
8
8
  exp?: number;
9
9
  iat?: number;
10
10
  }
11
- export interface ITenantUser {
11
+ interface ITenantUser {
12
12
  _id: string;
13
13
  dauthLicense?: string;
14
14
  sid: string;
@@ -28,7 +28,7 @@ export interface ITenantUser {
28
28
  __v: string | any;
29
29
  }
30
30
  interface IRequestUser extends Request {
31
- user: IAccessToken;
31
+ user: ITenantUser;
32
32
  files: {
33
33
  image: {
34
34
  path: string;
package/package.json CHANGED
@@ -1,5 +1,5 @@
1
1
  {
2
- "version": "0.1.74",
2
+ "version": "0.1.76",
3
3
  "license": "MIT",
4
4
  "main": "dist/index.js",
5
5
  "typings": "dist/index.d.ts",
package/src/index.ts CHANGED
@@ -17,7 +17,7 @@ export interface IAccessToken {
17
17
  iat?: number;
18
18
  }
19
19
 
20
- export interface ITenantUser {
20
+ interface ITenantUser {
21
21
  _id: string
22
22
  dauthLicense?: string
23
23
  sid: string
@@ -38,7 +38,7 @@ export interface ITenantUser {
38
38
  }
39
39
 
40
40
  interface IRequestUser extends Request {
41
- user: IAccessToken;
41
+ user: ITenantUser;
42
42
  files: {
43
43
  image: { path: string };
44
44
  avatar: { path: string };
@@ -67,7 +67,6 @@ export const dauth = ({ ssid, domainName }: { ssid: string, domainName: string }
67
67
  const token = req.headers.authorization.replace(/['"]+/g, '');
68
68
  try {
69
69
  jwt.verify(token, ssid as string) as IAccessToken;
70
- // req.user = payload;
71
70
  getUser(token, domainName)
72
71
  .then((getUserFetch: any) => {
73
72
  if (getUserFetch.response.status === 404) {
@@ -81,7 +80,6 @@ export const dauth = ({ ssid, domainName }: { ssid: string, domainName: string }
81
80
  .send({ status: 'error', message: 'Dauth server error' });
82
81
  } else if (getUserFetch.response.status === 200) {
83
82
  req.user = getUserFetch.data.user;
84
- // console.log('node-fetch npm', req.user);
85
83
  return next();
86
84
  } else {
87
85
  return res.status(501).send({
@@ -99,14 +97,12 @@ export const dauth = ({ ssid, domainName }: { ssid: string, domainName: string }
99
97
  return res.status(500).send({
100
98
  status: 'token-expired',
101
99
  message: 'El token ha expirado',
102
- // error: error,
103
100
  mdKey: 'ensure_auth',
104
101
  });
105
102
  }
106
103
  return res.status(500).send({
107
104
  status: 'token-invalid',
108
105
  message: 'El token no es válido',
109
- // error: error,
110
106
  mdKey: 'ensure_auth',
111
107
  });
112
108
  }