fiberx-backend-toolkit 0.1.6 → 0.1.8

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -431,7 +431,7 @@ ${attributes}
431
431
  ${schema_model_name}Schema.columns,
432
432
  {
433
433
  sequelize,
434
- table_name: ${schema_model_name}Schema.table_name,
434
+ tableName: ${schema_model_name}Schema.table_name,
435
435
  modelName: ${schema_model_name}Schema.model_name,
436
436
  timestamps: ${schema_model_name}Schema.timestamps,
437
437
  indexes: ${schema_model_name}Schema.indexes,
@@ -19,5 +19,6 @@ declare class AuthenicationMiddleWare<TRequestInfo extends DefaultRequestInfo =
19
19
  requireNoAuth(req: Request, res: Response, next: NextFunction): Promise<void | Response>;
20
20
  requirePartialAuth(req: Request, res: Response, next: NextFunction): Promise<void | Response>;
21
21
  requireFullAuth(req: Request, res: Response, next: NextFunction): Promise<void | Response>;
22
+ requireAppAuthMiddleWareMethod(req: Request, res: Response, next: NextFunction): Promise<void | Response>;
22
23
  }
23
24
  export default AuthenicationMiddleWare;
@@ -112,6 +112,13 @@ class AuthenicationMiddleWare {
112
112
  return this.options?.requireFullAuthMiddleWareMethod(req, res, next);
113
113
  }
114
114
  ;
115
+ async requireAppAuthMiddleWareMethod(req, res, next) {
116
+ if (!this.options?.requireAppAuthMiddleWareMethod) {
117
+ return next();
118
+ }
119
+ return this.options?.requireAppAuthMiddleWareMethod(req, res, next);
120
+ }
121
+ ;
115
122
  }
116
123
  __decorate([
117
124
  main_1.SafeExecuteUtil.safeExecuteReturn("authentication_middle_ware", null),
@@ -179,4 +186,10 @@ __decorate([
179
186
  __metadata("design:paramtypes", [Object, Object, Function]),
180
187
  __metadata("design:returntype", Promise)
181
188
  ], AuthenicationMiddleWare.prototype, "requireFullAuth", null);
189
+ __decorate([
190
+ main_1.SafeExecuteUtil.safeExecuteThrow("authentication_middle_ware"),
191
+ __metadata("design:type", Function),
192
+ __metadata("design:paramtypes", [Object, Object, Function]),
193
+ __metadata("design:returntype", Promise)
194
+ ], AuthenicationMiddleWare.prototype, "requireAppAuthMiddleWareMethod", null);
182
195
  exports.default = AuthenicationMiddleWare;
@@ -90,4 +90,5 @@ export interface AuthenticatorOptions<TRequestInfo extends DefaultRequestInfo =
90
90
  requireNoAuthMiddleWareMethod(req: Request, res: Response, next: NextFunction): Promise<void | Response>;
91
91
  requirePartialAuthMiddleWareMethod(req: Request, res: Response, next: NextFunction): Promise<void | Response>;
92
92
  requireFullAuthMiddleWareMethod(req: Request, res: Response, next: NextFunction): Promise<void | Response>;
93
+ requireAppAuthMiddleWareMethod(req: Request, res: Response, next: NextFunction): Promise<void | Response>;
93
94
  }
@@ -74,3 +74,14 @@ export interface CachedContentInterface {
74
74
  app?: Record<string, any>;
75
75
  email?: Record<string, any>;
76
76
  }
77
+ export type RSAKeySizeType = 2048 | 3072 | 4096;
78
+ export type HashAlgorithmType = "sha256" | "sha384" | "sha512";
79
+ export type EncodingType = "base64" | "hex";
80
+ export interface RSAKeyPairResultInterface {
81
+ public_key: string;
82
+ private_key: string;
83
+ }
84
+ export interface ECKeyPairResultInterface {
85
+ public_key: string;
86
+ private_key: string;
87
+ }
@@ -0,0 +1,14 @@
1
+ import { RSAKeySizeType, HashAlgorithmType, EncodingType, RSAKeyPairResultInterface, ECKeyPairResultInterface } from "../types/util_type";
2
+ declare class CryptoKeyUtil {
3
+ private constructor();
4
+ static generateRSAKeyPair(modulus_length?: RSAKeySizeType): RSAKeyPairResultInterface;
5
+ static generateECKeyPair(named_curve?: "prime256v1" | "secp384r1" | "secp521r1"): ECKeyPairResultInterface;
6
+ static sign(payload: string, private_key: string, algorithm?: HashAlgorithmType, output_encoding?: EncodingType): string;
7
+ static verify(payload: string, signature: string, public_key: string, algorithm?: HashAlgorithmType, input_encoding?: EncodingType): boolean;
8
+ static encryptWithPublicKey(payload: string, public_key: string, output_encoding?: EncodingType): string;
9
+ static decryptWithPrivateKey(encrypted_payload: string, private_key: string, input_encoding?: EncodingType): string;
10
+ static hash(value: string, algorithm?: HashAlgorithmType, encoding?: EncodingType): string;
11
+ static generateRandomSecret(length?: number, encoding?: EncodingType): string;
12
+ static isValidPEM(key: string): boolean;
13
+ }
14
+ export default CryptoKeyUtil;
@@ -0,0 +1,127 @@
1
+ "use strict";
2
+ var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
3
+ if (k2 === undefined) k2 = k;
4
+ var desc = Object.getOwnPropertyDescriptor(m, k);
5
+ if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
6
+ desc = { enumerable: true, get: function() { return m[k]; } };
7
+ }
8
+ Object.defineProperty(o, k2, desc);
9
+ }) : (function(o, m, k, k2) {
10
+ if (k2 === undefined) k2 = k;
11
+ o[k2] = m[k];
12
+ }));
13
+ var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
14
+ Object.defineProperty(o, "default", { enumerable: true, value: v });
15
+ }) : function(o, v) {
16
+ o["default"] = v;
17
+ });
18
+ var __importStar = (this && this.__importStar) || (function () {
19
+ var ownKeys = function(o) {
20
+ ownKeys = Object.getOwnPropertyNames || function (o) {
21
+ var ar = [];
22
+ for (var k in o) if (Object.prototype.hasOwnProperty.call(o, k)) ar[ar.length] = k;
23
+ return ar;
24
+ };
25
+ return ownKeys(o);
26
+ };
27
+ return function (mod) {
28
+ if (mod && mod.__esModule) return mod;
29
+ var result = {};
30
+ if (mod != null) for (var k = ownKeys(mod), i = 0; i < k.length; i++) if (k[i] !== "default") __createBinding(result, mod, k[i]);
31
+ __setModuleDefault(result, mod);
32
+ return result;
33
+ };
34
+ })();
35
+ Object.defineProperty(exports, "__esModule", { value: true });
36
+ const crypto_1 = __importStar(require("crypto"));
37
+ class CryptoKeyUtil {
38
+ constructor() { }
39
+ /* ============================================================
40
+ RSA KEY GENERATION
41
+ ============================================================ */
42
+ static generateRSAKeyPair(modulus_length = 2048) {
43
+ const { publicKey: public_key, privateKey: private_key } = (0, crypto_1.generateKeyPairSync)("rsa", {
44
+ modulusLength: modulus_length,
45
+ publicKeyEncoding: {
46
+ type: "spki",
47
+ format: "pem"
48
+ },
49
+ privateKeyEncoding: {
50
+ type: "pkcs8",
51
+ format: "pem"
52
+ }
53
+ });
54
+ return { public_key, private_key };
55
+ }
56
+ /* ============================================================
57
+ EC KEY GENERATION (ES256 / ES384 etc)
58
+ ============================================================ */
59
+ static generateECKeyPair(named_curve = "prime256v1") {
60
+ const { publicKey: public_key, privateKey: private_key } = (0, crypto_1.generateKeyPairSync)("ec", {
61
+ namedCurve: named_curve,
62
+ publicKeyEncoding: {
63
+ type: "spki",
64
+ format: "pem"
65
+ },
66
+ privateKeyEncoding: {
67
+ type: "pkcs8",
68
+ format: "pem"
69
+ }
70
+ });
71
+ return { public_key, private_key };
72
+ }
73
+ /* ============================================================
74
+ SIGNING
75
+ ============================================================ */
76
+ static sign(payload, private_key, algorithm = "sha256", output_encoding = "base64") {
77
+ const signer = (0, crypto_1.createSign)(algorithm);
78
+ signer.update(payload);
79
+ signer.end();
80
+ return signer.sign(private_key, output_encoding);
81
+ }
82
+ static verify(payload, signature, public_key, algorithm = "sha256", input_encoding = "base64") {
83
+ const verifier = (0, crypto_1.createVerify)(algorithm);
84
+ verifier.update(payload);
85
+ verifier.end();
86
+ return verifier.verify(public_key, signature, input_encoding);
87
+ }
88
+ /* ============================================================
89
+ RSA ENCRYPTION / DECRYPTION
90
+ ============================================================ */
91
+ static encryptWithPublicKey(payload, public_key, output_encoding = "base64") {
92
+ const buffer = Buffer.from(payload, "utf8");
93
+ const encrypted = (0, crypto_1.publicEncrypt)({
94
+ key: public_key,
95
+ padding: crypto_1.default.constants.RSA_PKCS1_OAEP_PADDING
96
+ }, buffer);
97
+ return encrypted.toString(output_encoding);
98
+ }
99
+ static decryptWithPrivateKey(encrypted_payload, private_key, input_encoding = "base64") {
100
+ const buffer = Buffer.from(encrypted_payload, input_encoding);
101
+ const decrypted = (0, crypto_1.privateDecrypt)({
102
+ key: private_key,
103
+ padding: crypto_1.default.constants.RSA_PKCS1_OAEP_PADDING
104
+ }, buffer);
105
+ return decrypted.toString("utf8");
106
+ }
107
+ /* ============================================================
108
+ HASHING
109
+ ============================================================ */
110
+ static hash(value, algorithm = "sha256", encoding = "hex") {
111
+ return (0, crypto_1.createHash)(algorithm).update(value).digest(encoding);
112
+ }
113
+ /* ============================================================
114
+ RANDOM SECRET GENERATION
115
+ ============================================================ */
116
+ static generateRandomSecret(length = 32, encoding = "hex") {
117
+ return (0, crypto_1.randomBytes)(length).toString(encoding);
118
+ }
119
+ /* ============================================================
120
+ HELPER: PEM VALIDATION
121
+ ============================================================ */
122
+ static isValidPEM(key) {
123
+ return (key.includes("-----BEGIN") &&
124
+ key.includes("-----END"));
125
+ }
126
+ }
127
+ exports.default = CryptoKeyUtil;
@@ -13,4 +13,5 @@ import ContentManagerUtil from "./content_manager_util";
13
13
  import FsActionsUtil from "./fs_actions_util";
14
14
  import EJSRenderUtil from "./ejs_render_util";
15
15
  import PLimitUtil from "./p_limit_util";
16
- export { LoggerUtil, InputTransformerUtil, InputValidatorUtil, EnvManagerUtil, SqlFormatterUtil, ServerUtil, SafeExecuteUtil, InMemoryCacheUtil, UUIDGeneratorUtil, EncryptorDecryptorUtil, TOTPServiceUtil, ContentManagerUtil, FsActionsUtil, EJSRenderUtil, PLimitUtil };
16
+ import CryptoKeyUtil from "./crypto_key_util";
17
+ export { LoggerUtil, InputTransformerUtil, InputValidatorUtil, EnvManagerUtil, SqlFormatterUtil, ServerUtil, SafeExecuteUtil, InMemoryCacheUtil, UUIDGeneratorUtil, EncryptorDecryptorUtil, TOTPServiceUtil, ContentManagerUtil, FsActionsUtil, EJSRenderUtil, PLimitUtil, CryptoKeyUtil };
@@ -3,7 +3,7 @@ var __importDefault = (this && this.__importDefault) || function (mod) {
3
3
  return (mod && mod.__esModule) ? mod : { "default": mod };
4
4
  };
5
5
  Object.defineProperty(exports, "__esModule", { value: true });
6
- exports.PLimitUtil = exports.EJSRenderUtil = exports.FsActionsUtil = exports.ContentManagerUtil = exports.TOTPServiceUtil = exports.EncryptorDecryptorUtil = exports.UUIDGeneratorUtil = exports.InMemoryCacheUtil = exports.SafeExecuteUtil = exports.ServerUtil = exports.SqlFormatterUtil = exports.EnvManagerUtil = exports.InputValidatorUtil = exports.InputTransformerUtil = exports.LoggerUtil = void 0;
6
+ exports.CryptoKeyUtil = exports.PLimitUtil = exports.EJSRenderUtil = exports.FsActionsUtil = exports.ContentManagerUtil = exports.TOTPServiceUtil = exports.EncryptorDecryptorUtil = exports.UUIDGeneratorUtil = exports.InMemoryCacheUtil = exports.SafeExecuteUtil = exports.ServerUtil = exports.SqlFormatterUtil = exports.EnvManagerUtil = exports.InputValidatorUtil = exports.InputTransformerUtil = exports.LoggerUtil = void 0;
7
7
  const logger_util_1 = __importDefault(require("./logger_util"));
8
8
  exports.LoggerUtil = logger_util_1.default;
9
9
  const input_transformer_util_1 = __importDefault(require("./input_transformer_util"));
@@ -34,3 +34,5 @@ const ejs_render_util_1 = __importDefault(require("./ejs_render_util"));
34
34
  exports.EJSRenderUtil = ejs_render_util_1.default;
35
35
  const p_limit_util_1 = __importDefault(require("./p_limit_util"));
36
36
  exports.PLimitUtil = p_limit_util_1.default;
37
+ const crypto_key_util_1 = __importDefault(require("./crypto_key_util"));
38
+ exports.CryptoKeyUtil = crypto_key_util_1.default;
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "fiberx-backend-toolkit",
3
- "version": "0.1.6",
3
+ "version": "0.1.8",
4
4
  "description": "A TypeScript backend toolkit providing shared domain logic, infrastructure helpers, and utilities for FiberX server-side applications and services.",
5
5
  "type": "commonjs",
6
6
  "main": "./dist/index.js",