mp-front-cli 2.3.0 → 2.3.2-next-0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/AuthEngine-CATazTYM.cjs +1 -0
- package/dist/{AuthEngine-Gl4gv5KD.js → AuthEngine-CQfKuww8.js} +175 -172
- package/dist/core/middleware/index.d.ts +1 -1
- package/dist/core/middleware/index.d.ts.map +1 -1
- package/dist/core/services/service-token.d.ts +2 -1
- package/dist/core/services/service-token.d.ts.map +1 -1
- package/dist/core/utils/api-request/fetch-service-parent-be.d.ts +3 -1
- package/dist/core/utils/api-request/fetch-service-parent-be.d.ts.map +1 -1
- package/dist/core/utils/custom-encoder.d.ts.map +1 -1
- package/dist/core/utils/custom-encrypter.d.ts +11 -4
- package/dist/core/utils/custom-encrypter.d.ts.map +1 -1
- package/dist/core/utils/custom-header.d.ts +6 -2
- package/dist/core/utils/custom-header.d.ts.map +1 -1
- package/dist/core/utils/functions/index.d.ts +3 -0
- package/dist/core/utils/functions/index.d.ts.map +1 -0
- package/dist/core/utils/functions/isEmpty.d.ts +2 -0
- package/dist/core/utils/functions/isEmpty.d.ts.map +1 -0
- package/dist/core/utils/functions/isString.d.ts +2 -0
- package/dist/core/utils/functions/isString.d.ts.map +1 -0
- package/dist/mp-front-cli-all.cjs +1 -1
- package/dist/mp-front-cli-all.js +2 -2
- package/dist/mp-front-cli-core.cjs +1 -1
- package/dist/mp-front-cli-core.js +2 -2
- package/dist/mp-front-cli-encoder.cjs +1 -1
- package/dist/mp-front-cli-encoder.js +29 -3
- package/dist/mp-front-cli-encrypter.cjs +1 -1
- package/dist/mp-front-cli-encrypter.js +56 -30
- package/dist/mp-front-cli-header.cjs +1 -1
- package/dist/mp-front-cli-header.js +18 -17
- package/dist/mp-front-cli-services.cjs +1 -1
- package/dist/mp-front-cli-services.js +1 -1
- package/dist/{service-token-DUKgd-pZ.js → service-token-DrUMHiYQ.js} +181 -173
- package/dist/service-token-g-Zt_ctQ.cjs +3 -0
- package/package.json +6 -8
- package/dist/AuthEngine-D65_iNdB.cjs +0 -1
- package/dist/custom-encoder-Cfd7FFMe.js +0 -3705
- package/dist/custom-encoder-d7rw7W8X.cjs +0 -27
- package/dist/service-token-Bv3BAiQd.cjs +0 -3
|
@@ -1,8 +1,8 @@
|
|
|
1
1
|
import { Observable } from 'rxjs';
|
|
2
2
|
import { NextApiRequest, NextApiResponse } from 'next';
|
|
3
|
-
import { IMessage } from '../interfaces/message';
|
|
4
3
|
import { CustomEncrypter } from '../utils/custom-encrypter';
|
|
5
4
|
import { Session } from 'next-auth';
|
|
5
|
+
import { IMessage } from '../interfaces';
|
|
6
6
|
export declare class ApiMiddleware<TRes, TData = object> extends CustomEncrypter {
|
|
7
7
|
protected uuid: string;
|
|
8
8
|
private session;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../src/core/middleware/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAS,UAAU,EAAuC,MAAM,MAAM,CAAA;AAC7E,OAAO,KAAK,EAAE,cAAc,EAAE,eAAe,EAAE,MAAM,MAAM,CAAA;AAC3D,OAAO,
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../src/core/middleware/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAS,UAAU,EAAuC,MAAM,MAAM,CAAA;AAC7E,OAAO,KAAK,EAAE,cAAc,EAAE,eAAe,EAAE,MAAM,MAAM,CAAA;AAC3D,OAAO,EAAE,eAAe,EAAE,MAAM,2BAA2B,CAAA;AAC3D,OAAO,KAAK,EAAE,OAAO,EAAE,MAAM,WAAW,CAAA;AAExC,OAAO,EAAE,QAAQ,EAAE,MAAM,kBAAkB,CAAA;AAE3C,qBAAa,aAAa,CAAC,IAAI,EAAE,KAAK,GAAG,MAAM,CAAE,SAAQ,eAAe;IACtE,SAAS,CAAC,IAAI,EAAE,MAAM,CAAK;IAC3B,OAAO,CAAC,OAAO,CAAuB;IAE/B,UAAU,CAAC,OAAO,EAAE,OAAO;IAI3B,UAAU;IAKjB,SAAS,CAAC,UAAU,CAAC,GAAG,EAAE,eAAe,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,CAAC,EAAE,MAAM;IAKpE,SAAS,CAAC,WAAW,CAAC,GAAG,EAAE,eAAe,EAAE,GAAG,EAAE,QAAQ,GAAG,KAAK;IAKjE,GAAG,CACD,MAAM,EAAE,CACN,MAAM,EAAE,KAAK,EACb,IAAI,EAAE,MAAM,EACZ,OAAO,CAAC,EAAE;QAAE,IAAI,CAAC,EAAE,MAAM,CAAC;QAAC,CAAC,CAAC,EAAE,MAAM,GAAG,MAAM,GAAG,MAAM,EAAE,GAAG,SAAS,CAAA;KAAE,KACpE,UAAU,CAAC,IAAI,CAAC,SAIR,cAAc,OAAO,eAAe;CA0CpD"}
|
|
@@ -1,11 +1,12 @@
|
|
|
1
1
|
import { CustomLogger } from '../utils/custom-logger';
|
|
2
2
|
export declare class ServiceToken extends CustomLogger {
|
|
3
|
+
private customEncrypter;
|
|
3
4
|
private API_AUTH_BACK_URL;
|
|
4
5
|
private API_AUTH_BACK_USERNAME_AUTH;
|
|
5
6
|
private API_AUTH_BACK_PASSWORD_AUTH;
|
|
6
7
|
private headers;
|
|
7
8
|
private ID;
|
|
8
9
|
constructor();
|
|
9
|
-
get(): import('rxjs').Observable<any>;
|
|
10
|
+
get(encrypt?: boolean): import('rxjs').Observable<any>;
|
|
10
11
|
}
|
|
11
12
|
//# sourceMappingURL=service-token.d.ts.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"service-token.d.ts","sourceRoot":"","sources":["../../../src/core/services/service-token.ts"],"names":[],"mappings":"AAEA,OAAO,EAAE,YAAY,EAAE,MAAM,wBAAwB,CAAA;
|
|
1
|
+
{"version":3,"file":"service-token.d.ts","sourceRoot":"","sources":["../../../src/core/services/service-token.ts"],"names":[],"mappings":"AAEA,OAAO,EAAE,YAAY,EAAE,MAAM,wBAAwB,CAAA;AAGrD,qBAAa,YAAa,SAAQ,YAAY;IAC5C,OAAO,CAAC,eAAe,CAA6B;IACpD,OAAO,CAAC,iBAAiB,CAAQ;IACjC,OAAO,CAAC,2BAA2B,CAAQ;IAC3C,OAAO,CAAC,2BAA2B,CAAQ;IAC3C,OAAO,CAAC,OAAO,CAAa;IAC5B,OAAO,CAAC,EAAE,CAA0C;;IAcpD,GAAG,CAAC,OAAO,UAAQ;CA0CpB"}
|
|
@@ -9,7 +9,9 @@ export declare abstract class FetchServiceParentBE<TRes, TData = object, TypeDat
|
|
|
9
9
|
constructor(apiUrl: string, method?: Method, headers?: HeadersInit);
|
|
10
10
|
private errorHandler;
|
|
11
11
|
private formatParams;
|
|
12
|
-
fetchData(params?: TData, uuid?: string
|
|
12
|
+
fetchData(params?: TData, uuid?: string, config?: {
|
|
13
|
+
encryptCredentials?: boolean;
|
|
14
|
+
}): Observable<ApiResponse<TRes, TypeDataResponse, Relationships>>;
|
|
13
15
|
fetchCustomData(params?: TData, uuid?: string, useToken?: boolean): Observable<TRes>;
|
|
14
16
|
protected abstract onInit(): OnInit;
|
|
15
17
|
}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"fetch-service-parent-be.d.ts","sourceRoot":"","sources":["../../../../src/core/utils/api-request/fetch-service-parent-be.ts"],"names":[],"mappings":"AAAA,OAAO,EAAa,UAAU,EAA0B,MAAM,MAAM,CAAA;AAEpE,OAAO,KAAK,EACV,WAAW,EACX,MAAM,EACN,iBAAiB,EAClB,MAAM,+BAA+B,CAAA;AACtC,OAAO,EAAE,MAAM,EAAE,MAAM,yBAAyB,CAAA;AAChD,OAAO,EAAE,YAAY,EAAE,MAAM,kBAAkB,CAAA;AAM/C,8BAAsB,oBAAoB,CACxC,IAAI,EACJ,KAAK,GAAG,MAAM,EACd,gBAAgB,SAAS,iBAAiB,GAAG,QAAQ,EACrD,aAAa,GAAG,MAAM,CACtB,SAAQ,YAAY;IACpB,OAAO,CAAC,QAAQ,CAAC,MAAM,CAAQ;IAC/B,OAAO,CAAC,QAAQ,CAAC,MAAM,CAAQ;IAC/B,OAAO,CAAC,QAAQ,CAAC,YAAY,CAAqB;gBAEtC,MAAM,EAAE,MAAM,EAAE,MAAM,CAAC,EAAE,MAAM,EAAE,OAAO,GAAE,WAAgB;IAMtE,OAAO,CAAC,YAAY;IAUpB,OAAO,CAAC,YAAY;IASpB,SAAS,CACP,MAAM,GAAE,KAAmB,EAC3B,IAAI,CAAC,EAAE,MAAM,
|
|
1
|
+
{"version":3,"file":"fetch-service-parent-be.d.ts","sourceRoot":"","sources":["../../../../src/core/utils/api-request/fetch-service-parent-be.ts"],"names":[],"mappings":"AAAA,OAAO,EAAa,UAAU,EAA0B,MAAM,MAAM,CAAA;AAEpE,OAAO,KAAK,EACV,WAAW,EACX,MAAM,EACN,iBAAiB,EAClB,MAAM,+BAA+B,CAAA;AACtC,OAAO,EAAE,MAAM,EAAE,MAAM,yBAAyB,CAAA;AAChD,OAAO,EAAE,YAAY,EAAE,MAAM,kBAAkB,CAAA;AAM/C,8BAAsB,oBAAoB,CACxC,IAAI,EACJ,KAAK,GAAG,MAAM,EACd,gBAAgB,SAAS,iBAAiB,GAAG,QAAQ,EACrD,aAAa,GAAG,MAAM,CACtB,SAAQ,YAAY;IACpB,OAAO,CAAC,QAAQ,CAAC,MAAM,CAAQ;IAC/B,OAAO,CAAC,QAAQ,CAAC,MAAM,CAAQ;IAC/B,OAAO,CAAC,QAAQ,CAAC,YAAY,CAAqB;gBAEtC,MAAM,EAAE,MAAM,EAAE,MAAM,CAAC,EAAE,MAAM,EAAE,OAAO,GAAE,WAAgB;IAMtE,OAAO,CAAC,YAAY;IAUpB,OAAO,CAAC,YAAY;IASpB,SAAS,CACP,MAAM,GAAE,KAAmB,EAC3B,IAAI,CAAC,EAAE,MAAM,EACb,MAAM,CAAC,EAAE;QAAE,kBAAkB,CAAC,EAAE,OAAO,CAAA;KAAE,GACxC,UAAU,CAAC,WAAW,CAAC,IAAI,EAAE,gBAAgB,EAAE,aAAa,CAAC,CAAC;IAiDjE,eAAe,CACb,MAAM,GAAE,KAAmB,EAC3B,IAAI,CAAC,EAAE,MAAM,EACb,QAAQ,CAAC,EAAE,OAAO,GACjB,UAAU,CAAC,IAAI,CAAC;IAmDnB,SAAS,CAAC,QAAQ,CAAC,MAAM,IAAI,MAAM;CACpC"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"custom-encoder.d.ts","sourceRoot":"","sources":["../../../src/core/utils/custom-encoder.ts"],"names":[],"mappings":"
|
|
1
|
+
{"version":3,"file":"custom-encoder.d.ts","sourceRoot":"","sources":["../../../src/core/utils/custom-encoder.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,YAAY,EAAE,MAAM,iBAAiB,CAAA;AAG9C,qBAAa,aAAc,SAAQ,YAAY;IAC7C,MAAM,CAAC,CAAC,EAAE,IAAI,EAAE,CAAC,EAAE,IAAI,CAAC,EAAE,MAAM;IAahC,MAAM,CAAC,CAAC,EAAE,IAAI,EAAE,MAAM,GAAG,CAAC,GAAG;QAAE,IAAI,EAAE,MAAM,CAAA;KAAE;CAkB9C"}
|
|
@@ -1,10 +1,17 @@
|
|
|
1
1
|
import { CustomEncoder } from './custom-encoder';
|
|
2
|
+
type AlgType = "jwe" | "aes";
|
|
2
3
|
export declare class CustomEncrypter extends CustomEncoder {
|
|
3
|
-
private
|
|
4
|
-
private
|
|
5
|
-
|
|
6
|
-
|
|
4
|
+
private readonly ALGORITHM;
|
|
5
|
+
private readonly IV_LENGTH;
|
|
6
|
+
private readonly AUTH_TAG_LENGTH;
|
|
7
|
+
private algType;
|
|
8
|
+
constructor(alg?: AlgType);
|
|
9
|
+
private generateAESKey;
|
|
10
|
+
private generateJWEKey;
|
|
11
|
+
encrypt<T>(payload: T): Promise<string>;
|
|
12
|
+
decrypt<T>(encrypted: string): Promise<string | T>;
|
|
7
13
|
protected isEncrypted(value: string | null): Promise<boolean>;
|
|
8
14
|
protected generateSHA<T>(value: T): string;
|
|
9
15
|
}
|
|
16
|
+
export {};
|
|
10
17
|
//# sourceMappingURL=custom-encrypter.d.ts.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"custom-encrypter.d.ts","sourceRoot":"","sources":["../../../src/core/utils/custom-encrypter.ts"],"names":[],"mappings":"
|
|
1
|
+
{"version":3,"file":"custom-encrypter.d.ts","sourceRoot":"","sources":["../../../src/core/utils/custom-encrypter.ts"],"names":[],"mappings":"AACA,OAAO,EAAE,aAAa,EAAE,MAAM,kBAAkB,CAAA;AAShD,KAAK,OAAO,GAAG,KAAK,GAAG,KAAK,CAAA;AAC5B,qBAAa,eAAgB,SAAQ,aAAa;IAChD,OAAO,CAAC,QAAQ,CAAC,SAAS,CAAgB;IAC1C,OAAO,CAAC,QAAQ,CAAC,SAAS,CAAK;IAC/B,OAAO,CAAC,QAAQ,CAAC,eAAe,CAAK;IACrC,OAAO,CAAC,OAAO,CAAiB;gBAEpB,GAAG,GAAE,OAAe;IAKhC,OAAO,CAAC,cAAc;YAcR,cAAc;IAcf,OAAO,CAAC,CAAC,EAAE,OAAO,EAAE,CAAC;IA+BrB,OAAO,CAAC,CAAC,EAAE,SAAS,EAAE,MAAM;cA8BzB,WAAW,CAAC,KAAK,EAAE,MAAM,GAAG,IAAI;IAahD,SAAS,CAAC,WAAW,CAAC,CAAC,EAAE,KAAK,EAAE,CAAC;CAIlC"}
|
|
@@ -3,7 +3,11 @@ import { CustomEncrypter } from './custom-encrypter';
|
|
|
3
3
|
export declare class CustomHeader extends CustomEncrypter {
|
|
4
4
|
private headers;
|
|
5
5
|
constructor(headers?: HeadersInit);
|
|
6
|
-
addTokenBackend(headers: HeadersInit): Observable<HeadersInit>;
|
|
7
|
-
getHeaders(
|
|
6
|
+
addTokenBackend(headers: HeadersInit, encrypt: boolean): Observable<HeadersInit>;
|
|
7
|
+
getHeaders(config?: {
|
|
8
|
+
headers?: HeadersInit;
|
|
9
|
+
useToken?: boolean;
|
|
10
|
+
encryptCredentials?: boolean;
|
|
11
|
+
}): Observable<HeadersInit>;
|
|
8
12
|
}
|
|
9
13
|
//# sourceMappingURL=custom-header.d.ts.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"custom-header.d.ts","sourceRoot":"","sources":["../../../src/core/utils/custom-header.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,UAAU,EAAiB,MAAM,MAAM,CAAA;AAChD,OAAO,EAAE,eAAe,EAAE,MAAM,oBAAoB,CAAA;AAGpD,qBAAa,YAAa,SAAQ,eAAe;IAC/C,OAAO,CAAC,OAAO,CAAa;gBAEhB,OAAO,GAAE,WAAgB;IASrC,eAAe,
|
|
1
|
+
{"version":3,"file":"custom-header.d.ts","sourceRoot":"","sources":["../../../src/core/utils/custom-header.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,UAAU,EAAiB,MAAM,MAAM,CAAA;AAChD,OAAO,EAAE,eAAe,EAAE,MAAM,oBAAoB,CAAA;AAGpD,qBAAa,YAAa,SAAQ,eAAe;IAC/C,OAAO,CAAC,OAAO,CAAa;gBAEhB,OAAO,GAAE,WAAgB;IASrC,eAAe,CACb,OAAO,EAAE,WAAW,EACpB,OAAO,EAAE,OAAO,GACf,UAAU,CAAC,WAAW,CAAC;IAS1B,UAAU,CAAC,MAAM,CAAC,EAAE;QAClB,OAAO,CAAC,EAAE,WAAW,CAAA;QACrB,QAAQ,CAAC,EAAE,OAAO,CAAA;QAClB,kBAAkB,CAAC,EAAE,OAAO,CAAA;KAC7B,GAAG,UAAU,CAAC,WAAW,CAAC;CAY5B"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../src/core/utils/functions/index.ts"],"names":[],"mappings":"AAAA,cAAc,WAAW,CAAA;AACzB,cAAc,YAAY,CAAA"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"isEmpty.d.ts","sourceRoot":"","sources":["../../../../src/core/utils/functions/isEmpty.ts"],"names":[],"mappings":"AAAA,eAAO,MAAM,OAAO,GAAI,CAAC,SAAS,CAAC,KAAG,OAgBrC,CAAA"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"isString.d.ts","sourceRoot":"","sources":["../../../../src/core/utils/functions/isString.ts"],"names":[],"mappings":"AAAA,eAAO,MAAM,QAAQ,UAAW,OAAO,KAAG,KAAK,IAAI,MAElD,CAAA"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
"use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const e=require("./AuthEngine-
|
|
1
|
+
"use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const e=require("./AuthEngine-CATazTYM.cjs"),r=require("./loading-handler-CVkAHN_A.cjs"),n=require("./service-token-g-Zt_ctQ.cjs");exports.ApiMiddleware=e.ApiMiddleware;exports.AuthEngine=e.AuthEngine;exports.ErrorCatalog=e.ErrorCatalog;exports.Exception=e.Exception;exports.FetchServiceBE=e.FetchServiceBE;exports.FetchServiceFE=e.FetchServiceFE;exports.FetchServiceParentBE=e.FetchServiceParentBE;exports.LoadingHandler=r.LoadingHandler;exports.MessageHandler=r.MessageHandler;exports.RxSubjectManager=r.RxSubjectManager;exports.ServiceToken=n.ServiceToken;
|
package/dist/mp-front-cli-all.js
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
|
-
import { A as r,
|
|
1
|
+
import { A as r, a as s, E as o, b as t, F as c, c as i, d as n } from "./AuthEngine-CQfKuww8.js";
|
|
2
2
|
import { L as d, M as S, R as g } from "./loading-handler-Br21zGTA.js";
|
|
3
|
-
import { S as x } from "./service-token-
|
|
3
|
+
import { S as x } from "./service-token-DrUMHiYQ.js";
|
|
4
4
|
export {
|
|
5
5
|
r as ApiMiddleware,
|
|
6
6
|
s as AuthEngine,
|
|
@@ -1 +1 @@
|
|
|
1
|
-
"use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const e=require("./AuthEngine-
|
|
1
|
+
"use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const e=require("./AuthEngine-CATazTYM.cjs"),r=require("./loading-handler-CVkAHN_A.cjs"),n=require("./service-token-g-Zt_ctQ.cjs");exports.ApiMiddleware=e.ApiMiddleware;exports.AuthEngine=e.AuthEngine;exports.ErrorCatalog=e.ErrorCatalog;exports.Exception=e.Exception;exports.FetchServiceBE=e.FetchServiceBE;exports.FetchServiceFE=e.FetchServiceFE;exports.FetchServiceParentBE=e.FetchServiceParentBE;exports.LoadingHandler=r.LoadingHandler;exports.MessageHandler=r.MessageHandler;exports.RxSubjectManager=r.RxSubjectManager;exports.ServiceToken=n.ServiceToken;
|
|
@@ -1,6 +1,6 @@
|
|
|
1
|
-
import { A as r,
|
|
1
|
+
import { A as r, a as s, E as o, b as t, F as c, c as i, d as n } from "./AuthEngine-CQfKuww8.js";
|
|
2
2
|
import { L as d, M as S, R as g } from "./loading-handler-Br21zGTA.js";
|
|
3
|
-
import { S as x } from "./service-token-
|
|
3
|
+
import { S as x } from "./service-token-DrUMHiYQ.js";
|
|
4
4
|
export {
|
|
5
5
|
r as ApiMiddleware,
|
|
6
6
|
s as AuthEngine,
|
|
@@ -1 +1 @@
|
|
|
1
|
-
"use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const
|
|
1
|
+
"use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const i=require("./mp-front-cli-logger.cjs"),s=t=>typeof t=="string"||t instanceof String;class c extends i.CustomLogger{encode(r,o){try{this.logDebug("encode CustomEncoder",JSON.stringify(r));const e=JSON.stringify(r),n=Buffer.from(e).toString("base64");return JSON.stringify({info:n,uuid:o})}catch{return this.logError("error convert to base64"),JSON.stringify({info:r,uuid:o})}}decode(r){try{s(r)&&(r=JSON.parse(r));const{info:o}=r;this.logDebug("decode CustomEncoder",JSON.stringify(o));const e=/^([0-9a-zA-Z+/]{4})*(([0-9a-zA-Z+/]{2}==)|([0-9a-zA-Z+/]{3}=))?$/;if(s(o)&&e.test(o)){const n=Buffer.from(o,"base64").toString();return JSON.parse(n)}}catch{this.logError("error convert to base64")}return r}}exports.CustomEncoder=c;
|
|
@@ -1,5 +1,31 @@
|
|
|
1
|
-
import {
|
|
2
|
-
|
|
1
|
+
import { CustomLogger as i } from "./mp-front-cli-logger.js";
|
|
2
|
+
const s = (t) => typeof t == "string" || t instanceof String;
|
|
3
|
+
class g extends i {
|
|
4
|
+
encode(r, o) {
|
|
5
|
+
try {
|
|
6
|
+
this.logDebug("encode CustomEncoder", JSON.stringify(r));
|
|
7
|
+
const e = JSON.stringify(r), n = Buffer.from(e).toString("base64");
|
|
8
|
+
return JSON.stringify({ info: n, uuid: o });
|
|
9
|
+
} catch {
|
|
10
|
+
return this.logError("error convert to base64"), JSON.stringify({ info: r, uuid: o });
|
|
11
|
+
}
|
|
12
|
+
}
|
|
13
|
+
decode(r) {
|
|
14
|
+
try {
|
|
15
|
+
s(r) && (r = JSON.parse(r));
|
|
16
|
+
const { info: o } = r;
|
|
17
|
+
this.logDebug("decode CustomEncoder", JSON.stringify(o));
|
|
18
|
+
const e = /^([0-9a-zA-Z+/]{4})*(([0-9a-zA-Z+/]{2}==)|([0-9a-zA-Z+/]{3}=))?$/;
|
|
19
|
+
if (s(o) && e.test(o)) {
|
|
20
|
+
const n = Buffer.from(o, "base64").toString();
|
|
21
|
+
return JSON.parse(n);
|
|
22
|
+
}
|
|
23
|
+
} catch {
|
|
24
|
+
this.logError("error convert to base64");
|
|
25
|
+
}
|
|
26
|
+
return r;
|
|
27
|
+
}
|
|
28
|
+
}
|
|
3
29
|
export {
|
|
4
|
-
|
|
30
|
+
g as CustomEncoder
|
|
5
31
|
};
|
|
@@ -1 +1 @@
|
|
|
1
|
-
"use strict";var
|
|
1
|
+
"use strict";var g=Object.defineProperty;var f=(s,t,e)=>t in s?g(s,t,{enumerable:!0,configurable:!0,writable:!0,value:e}):s[t]=e;var o=(s,t,e)=>f(s,typeof t!="symbol"?t+"":t,e);Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const E=require("node-jose"),d=require("./mp-front-cli-encoder.cjs"),y=require("node:crypto"),S=s=>s.replace(/[\u00A0-\uffff]/gu,t=>"\\u"+("000"+t.charCodeAt(0).toString(16)).slice(-4));class l extends d.CustomEncoder{constructor(e="jwe"){super();o(this,"ALGORITHM","aes-256-gcm");o(this,"IV_LENGTH",12);o(this,"AUTH_TAG_LENGTH",16);o(this,"algType","jwe");this.algType=e}generateAESKey(){const e=process.env.SECRET_SIGNATURE;if(!e)throw new Error("PLEASE CREATE A KEY TO ENCRYPT 🙂");const r=this.generateSHA(e),n=Buffer.from(r,"hex");if(n.length!==32)throw new Error("KEY MUST BE 32 bytes (64 hex chars)");return n}async generateJWEKey(){const e=process.env.SECRET_SIGNATURE;if(!e)throw new Error("Define a SECRET_SIGNATURE from `.env`");return await E.JWK.asKey({kty:"oct",k:E.util.base64url.encode(e)})}async encrypt(e){const r=JSON.stringify(e),n=S(r);if(this.algType==="jwe"){const h=await this.generateJWEKey();return await E.JWE.createEncrypt({format:"compact"},h).update(n).final()}const u=this.generateAESKey(),i=y.randomBytes(this.IV_LENGTH),c=y.createCipheriv(this.ALGORITHM,u,i),a=Buffer.concat([c.update(n,"utf8"),c.final()]),T=c.getAuthTag();return Buffer.concat([i,T,a]).toString("hex")}async decrypt(e){if(this.algType==="jwe"){const h=await this.generateJWEKey(),{payload:p}=await E.JWE.createDecrypt(h).decrypt(e);return JSON.parse(p.toString())}const r=this.generateAESKey(),n=Buffer.from(e,"hex"),u=n.subarray(0,this.IV_LENGTH),i=n.subarray(this.IV_LENGTH,this.IV_LENGTH+this.AUTH_TAG_LENGTH),c=n.subarray(this.IV_LENGTH+this.AUTH_TAG_LENGTH),a=y.createDecipheriv(this.ALGORITHM,r,u);return a.setAuthTag(i),Buffer.concat([a.update(c),a.final()]).toString("utf8")}async isEncrypted(e){this.logInfo("EncryptionHandler",e);try{return await this.decrypt(e??""),this.logDebug("EncryptionHandler","IS ENCRYPTED 🥵"),!0}catch(r){return this.logWarn("EncryptionHandler",JSON.stringify(r)),this.logDebug("EncryptionHandler","IS NOT ENCRYPTED 🙂"),!1}}generateSHA(e){const r=JSON.stringify(e);return y.createHash("sha256").update(r).digest("hex")}}exports.CustomEncrypter=l;
|
|
@@ -1,52 +1,78 @@
|
|
|
1
|
-
var
|
|
2
|
-
var
|
|
3
|
-
var
|
|
4
|
-
import
|
|
5
|
-
import {
|
|
6
|
-
import {
|
|
7
|
-
const
|
|
8
|
-
class
|
|
9
|
-
constructor() {
|
|
10
|
-
super(
|
|
11
|
-
|
|
1
|
+
var p = Object.defineProperty;
|
|
2
|
+
var f = (s, e, t) => e in s ? p(s, e, { enumerable: !0, configurable: !0, writable: !0, value: t }) : s[e] = t;
|
|
3
|
+
var o = (s, e, t) => f(s, typeof e != "symbol" ? e + "" : e, t);
|
|
4
|
+
import E from "node-jose";
|
|
5
|
+
import { CustomEncoder as g } from "./mp-front-cli-encoder.js";
|
|
6
|
+
import { randomBytes as d, createCipheriv as S, createDecipheriv as A, createHash as l } from "node:crypto";
|
|
7
|
+
const H = (s) => s.replace(/[\u00A0-\uffff]/gu, (e) => "\\u" + ("000" + e.charCodeAt(0).toString(16)).slice(-4));
|
|
8
|
+
class _ extends g {
|
|
9
|
+
constructor(t = "jwe") {
|
|
10
|
+
super();
|
|
11
|
+
o(this, "ALGORITHM", "aes-256-gcm");
|
|
12
|
+
o(this, "IV_LENGTH", 12);
|
|
13
|
+
o(this, "AUTH_TAG_LENGTH", 16);
|
|
14
|
+
o(this, "algType", "jwe");
|
|
15
|
+
this.algType = t;
|
|
12
16
|
}
|
|
13
|
-
|
|
17
|
+
generateAESKey() {
|
|
18
|
+
const t = process.env.SECRET_SIGNATURE;
|
|
19
|
+
if (!t) throw new Error("PLEASE CREATE A KEY TO ENCRYPT 🙂");
|
|
20
|
+
const r = this.generateSHA(t), n = Buffer.from(r, "hex");
|
|
21
|
+
if (n.length !== 32)
|
|
22
|
+
throw new Error("KEY MUST BE 32 bytes (64 hex chars)");
|
|
23
|
+
return n;
|
|
24
|
+
}
|
|
25
|
+
async generateJWEKey() {
|
|
14
26
|
const t = process.env.SECRET_SIGNATURE;
|
|
15
27
|
if (!t)
|
|
16
28
|
throw new Error("Define a SECRET_SIGNATURE from `.env`");
|
|
17
|
-
|
|
29
|
+
return await E.JWK.asKey({
|
|
18
30
|
kty: "oct",
|
|
19
|
-
k:
|
|
31
|
+
k: E.util.base64url.encode(t)
|
|
20
32
|
});
|
|
21
33
|
}
|
|
22
34
|
async encrypt(t) {
|
|
23
|
-
|
|
24
|
-
|
|
25
|
-
|
|
26
|
-
|
|
27
|
-
|
|
28
|
-
|
|
35
|
+
const r = JSON.stringify(t), n = H(r);
|
|
36
|
+
if (this.algType === "jwe") {
|
|
37
|
+
const h = await this.generateJWEKey();
|
|
38
|
+
return await E.JWE.createEncrypt(
|
|
39
|
+
{ format: "compact" },
|
|
40
|
+
h
|
|
41
|
+
).update(n).final();
|
|
42
|
+
}
|
|
43
|
+
const y = this.generateAESKey(), i = d(this.IV_LENGTH), a = S(this.ALGORITHM, y, i), c = Buffer.concat([
|
|
44
|
+
a.update(n, "utf8"),
|
|
45
|
+
a.final()
|
|
46
|
+
]), u = a.getAuthTag();
|
|
47
|
+
return Buffer.concat([i, u, c]).toString("hex");
|
|
29
48
|
}
|
|
30
49
|
async decrypt(t) {
|
|
31
|
-
if (
|
|
32
|
-
|
|
33
|
-
|
|
34
|
-
|
|
35
|
-
|
|
50
|
+
if (this.algType === "jwe") {
|
|
51
|
+
const h = await this.generateJWEKey(), { payload: T } = await E.JWE.createDecrypt(h).decrypt(t);
|
|
52
|
+
return JSON.parse(T.toString());
|
|
53
|
+
}
|
|
54
|
+
const r = this.generateAESKey(), n = Buffer.from(t, "hex"), y = n.subarray(0, this.IV_LENGTH), i = n.subarray(
|
|
55
|
+
this.IV_LENGTH,
|
|
56
|
+
this.IV_LENGTH + this.AUTH_TAG_LENGTH
|
|
57
|
+
), a = n.subarray(this.IV_LENGTH + this.AUTH_TAG_LENGTH), c = A(this.ALGORITHM, r, y);
|
|
58
|
+
return c.setAuthTag(i), Buffer.concat([
|
|
59
|
+
c.update(a),
|
|
60
|
+
c.final()
|
|
61
|
+
]).toString("utf8");
|
|
36
62
|
}
|
|
37
63
|
async isEncrypted(t) {
|
|
38
64
|
this.logInfo("EncryptionHandler", t);
|
|
39
65
|
try {
|
|
40
66
|
return await this.decrypt(t ?? ""), this.logDebug("EncryptionHandler", "IS ENCRYPTED 🥵"), !0;
|
|
41
|
-
} catch (
|
|
42
|
-
return this.logWarn("EncryptionHandler", JSON.stringify(
|
|
67
|
+
} catch (r) {
|
|
68
|
+
return this.logWarn("EncryptionHandler", JSON.stringify(r)), this.logDebug("EncryptionHandler", "IS NOT ENCRYPTED 🙂"), !1;
|
|
43
69
|
}
|
|
44
70
|
}
|
|
45
71
|
generateSHA(t) {
|
|
46
|
-
const
|
|
47
|
-
return
|
|
72
|
+
const r = JSON.stringify(t);
|
|
73
|
+
return l("sha256").update(r).digest("hex");
|
|
48
74
|
}
|
|
49
75
|
}
|
|
50
76
|
export {
|
|
51
|
-
|
|
77
|
+
_ as CustomEncrypter
|
|
52
78
|
};
|
|
@@ -1 +1 @@
|
|
|
1
|
-
"use strict";var
|
|
1
|
+
"use strict";var d=Object.defineProperty;var p=(s,t,e)=>t in s?d(s,t,{enumerable:!0,configurable:!0,writable:!0,value:e}):s[t]=e;var i=(s,t,e)=>p(s,typeof t!="symbol"?t+"":t,e);Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const r=require("rxjs"),u=require("./mp-front-cli-encrypter.cjs"),h=require("./service-token-g-Zt_ctQ.cjs");class g extends u.CustomEncrypter{constructor(e={}){super();i(this,"headers");this.headers={Accept:"application/json","Content-Type":"application/vnd.api+json",...e}}addTokenBackend(e,n){return this.logDebug("addTokenBackend CustomHeader",JSON.stringify(e)),new h.ServiceToken().get(n).pipe(r.switchMap(o=>r.of({...e,Authorization:`Bearer ${o}`})))}getHeaders(e){const{headers:n={},useToken:o=!0,encryptCredentials:c=!1}=e;return this.logDebug("getHeaders CustomHeader"),o?this.addTokenBackend(n,c).pipe(r.switchMap(a=>r.of({...a,...this.headers}))):r.of(n).pipe(r.switchMap(a=>r.of({...a,...this.headers})))}}exports.CustomHeader=g;
|
|
@@ -1,32 +1,33 @@
|
|
|
1
|
-
var
|
|
2
|
-
var
|
|
3
|
-
var
|
|
4
|
-
import { switchMap as
|
|
5
|
-
import { CustomEncrypter as
|
|
6
|
-
import { S as
|
|
7
|
-
class
|
|
1
|
+
var c = Object.defineProperty;
|
|
2
|
+
var u = (r, t, e) => t in r ? c(r, t, { enumerable: !0, configurable: !0, writable: !0, value: e }) : r[t] = e;
|
|
3
|
+
var d = (r, t, e) => u(r, typeof t != "symbol" ? t + "" : t, e);
|
|
4
|
+
import { switchMap as i, of as o } from "rxjs";
|
|
5
|
+
import { CustomEncrypter as h } from "./mp-front-cli-encrypter.js";
|
|
6
|
+
import { S as m } from "./service-token-DrUMHiYQ.js";
|
|
7
|
+
class C extends h {
|
|
8
8
|
constructor(e = {}) {
|
|
9
9
|
super();
|
|
10
|
-
|
|
10
|
+
d(this, "headers");
|
|
11
11
|
this.headers = {
|
|
12
12
|
Accept: "application/json",
|
|
13
13
|
"Content-Type": "application/vnd.api+json",
|
|
14
14
|
...e
|
|
15
15
|
};
|
|
16
16
|
}
|
|
17
|
-
addTokenBackend(e) {
|
|
18
|
-
return this.logDebug("addTokenBackend CustomHeader", JSON.stringify(e)), new
|
|
19
|
-
|
|
17
|
+
addTokenBackend(e, s) {
|
|
18
|
+
return this.logDebug("addTokenBackend CustomHeader", JSON.stringify(e)), new m().get(s).pipe(
|
|
19
|
+
i((a) => o({ ...e, Authorization: `Bearer ${a}` }))
|
|
20
20
|
);
|
|
21
21
|
}
|
|
22
|
-
getHeaders(e
|
|
23
|
-
|
|
24
|
-
|
|
25
|
-
|
|
26
|
-
|
|
22
|
+
getHeaders(e) {
|
|
23
|
+
const { headers: s = {}, useToken: a = !0, encryptCredentials: p = !1 } = e;
|
|
24
|
+
return this.logDebug("getHeaders CustomHeader"), a ? this.addTokenBackend(s, p).pipe(
|
|
25
|
+
i((n) => o({ ...n, ...this.headers }))
|
|
26
|
+
) : o(s).pipe(
|
|
27
|
+
i((n) => o({ ...n, ...this.headers }))
|
|
27
28
|
);
|
|
28
29
|
}
|
|
29
30
|
}
|
|
30
31
|
export {
|
|
31
|
-
|
|
32
|
+
C as CustomHeader
|
|
32
33
|
};
|
|
@@ -1 +1 @@
|
|
|
1
|
-
"use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const e=require("./service-token-
|
|
1
|
+
"use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const e=require("./service-token-g-Zt_ctQ.cjs");exports.ServiceToken=e.ServiceToken;
|