mp-front-cli 2.3.0 → 2.3.2-next-0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (38) hide show
  1. package/dist/AuthEngine-CATazTYM.cjs +1 -0
  2. package/dist/{AuthEngine-Gl4gv5KD.js → AuthEngine-CQfKuww8.js} +175 -172
  3. package/dist/core/middleware/index.d.ts +1 -1
  4. package/dist/core/middleware/index.d.ts.map +1 -1
  5. package/dist/core/services/service-token.d.ts +2 -1
  6. package/dist/core/services/service-token.d.ts.map +1 -1
  7. package/dist/core/utils/api-request/fetch-service-parent-be.d.ts +3 -1
  8. package/dist/core/utils/api-request/fetch-service-parent-be.d.ts.map +1 -1
  9. package/dist/core/utils/custom-encoder.d.ts.map +1 -1
  10. package/dist/core/utils/custom-encrypter.d.ts +11 -4
  11. package/dist/core/utils/custom-encrypter.d.ts.map +1 -1
  12. package/dist/core/utils/custom-header.d.ts +6 -2
  13. package/dist/core/utils/custom-header.d.ts.map +1 -1
  14. package/dist/core/utils/functions/index.d.ts +3 -0
  15. package/dist/core/utils/functions/index.d.ts.map +1 -0
  16. package/dist/core/utils/functions/isEmpty.d.ts +2 -0
  17. package/dist/core/utils/functions/isEmpty.d.ts.map +1 -0
  18. package/dist/core/utils/functions/isString.d.ts +2 -0
  19. package/dist/core/utils/functions/isString.d.ts.map +1 -0
  20. package/dist/mp-front-cli-all.cjs +1 -1
  21. package/dist/mp-front-cli-all.js +2 -2
  22. package/dist/mp-front-cli-core.cjs +1 -1
  23. package/dist/mp-front-cli-core.js +2 -2
  24. package/dist/mp-front-cli-encoder.cjs +1 -1
  25. package/dist/mp-front-cli-encoder.js +29 -3
  26. package/dist/mp-front-cli-encrypter.cjs +1 -1
  27. package/dist/mp-front-cli-encrypter.js +56 -30
  28. package/dist/mp-front-cli-header.cjs +1 -1
  29. package/dist/mp-front-cli-header.js +18 -17
  30. package/dist/mp-front-cli-services.cjs +1 -1
  31. package/dist/mp-front-cli-services.js +1 -1
  32. package/dist/{service-token-DUKgd-pZ.js → service-token-DrUMHiYQ.js} +181 -173
  33. package/dist/service-token-g-Zt_ctQ.cjs +3 -0
  34. package/package.json +6 -8
  35. package/dist/AuthEngine-D65_iNdB.cjs +0 -1
  36. package/dist/custom-encoder-Cfd7FFMe.js +0 -3705
  37. package/dist/custom-encoder-d7rw7W8X.cjs +0 -27
  38. package/dist/service-token-Bv3BAiQd.cjs +0 -3
@@ -1,8 +1,8 @@
1
1
  import { Observable } from 'rxjs';
2
2
  import { NextApiRequest, NextApiResponse } from 'next';
3
- import { IMessage } from '../interfaces/message';
4
3
  import { CustomEncrypter } from '../utils/custom-encrypter';
5
4
  import { Session } from 'next-auth';
5
+ import { IMessage } from '../interfaces';
6
6
  export declare class ApiMiddleware<TRes, TData = object> extends CustomEncrypter {
7
7
  protected uuid: string;
8
8
  private session;
@@ -1 +1 @@
1
- {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../src/core/middleware/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAS,UAAU,EAAuC,MAAM,MAAM,CAAA;AAC7E,OAAO,KAAK,EAAE,cAAc,EAAE,eAAe,EAAE,MAAM,MAAM,CAAA;AAC3D,OAAO,KAAK,EAAE,QAAQ,EAAE,MAAM,uBAAuB,CAAA;AACrD,OAAO,EAAE,eAAe,EAAE,MAAM,2BAA2B,CAAA;AAC3D,OAAO,KAAK,EAAE,OAAO,EAAE,MAAM,WAAW,CAAA;AAGxC,qBAAa,aAAa,CAAC,IAAI,EAAE,KAAK,GAAG,MAAM,CAAE,SAAQ,eAAe;IACtE,SAAS,CAAC,IAAI,EAAE,MAAM,CAAK;IAC3B,OAAO,CAAC,OAAO,CAAuB;IAE/B,UAAU,CAAC,OAAO,EAAE,OAAO;IAI3B,UAAU;IAKjB,SAAS,CAAC,UAAU,CAAC,GAAG,EAAE,eAAe,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,CAAC,EAAE,MAAM;IAKpE,SAAS,CAAC,WAAW,CAAC,GAAG,EAAE,eAAe,EAAE,GAAG,EAAE,QAAQ,GAAG,KAAK;IAKjE,GAAG,CACD,MAAM,EAAE,CACN,MAAM,EAAE,KAAK,EACb,IAAI,EAAE,MAAM,EACZ,OAAO,CAAC,EAAE;QAAE,IAAI,CAAC,EAAE,MAAM,CAAC;QAAC,CAAC,CAAC,EAAE,MAAM,GAAG,MAAM,GAAG,MAAM,EAAE,GAAG,SAAS,CAAA;KAAE,KACpE,UAAU,CAAC,IAAI,CAAC,SAIR,cAAc,OAAO,eAAe;CA0CpD"}
1
+ {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../src/core/middleware/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAS,UAAU,EAAuC,MAAM,MAAM,CAAA;AAC7E,OAAO,KAAK,EAAE,cAAc,EAAE,eAAe,EAAE,MAAM,MAAM,CAAA;AAC3D,OAAO,EAAE,eAAe,EAAE,MAAM,2BAA2B,CAAA;AAC3D,OAAO,KAAK,EAAE,OAAO,EAAE,MAAM,WAAW,CAAA;AAExC,OAAO,EAAE,QAAQ,EAAE,MAAM,kBAAkB,CAAA;AAE3C,qBAAa,aAAa,CAAC,IAAI,EAAE,KAAK,GAAG,MAAM,CAAE,SAAQ,eAAe;IACtE,SAAS,CAAC,IAAI,EAAE,MAAM,CAAK;IAC3B,OAAO,CAAC,OAAO,CAAuB;IAE/B,UAAU,CAAC,OAAO,EAAE,OAAO;IAI3B,UAAU;IAKjB,SAAS,CAAC,UAAU,CAAC,GAAG,EAAE,eAAe,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,CAAC,EAAE,MAAM;IAKpE,SAAS,CAAC,WAAW,CAAC,GAAG,EAAE,eAAe,EAAE,GAAG,EAAE,QAAQ,GAAG,KAAK;IAKjE,GAAG,CACD,MAAM,EAAE,CACN,MAAM,EAAE,KAAK,EACb,IAAI,EAAE,MAAM,EACZ,OAAO,CAAC,EAAE;QAAE,IAAI,CAAC,EAAE,MAAM,CAAC;QAAC,CAAC,CAAC,EAAE,MAAM,GAAG,MAAM,GAAG,MAAM,EAAE,GAAG,SAAS,CAAA;KAAE,KACpE,UAAU,CAAC,IAAI,CAAC,SAIR,cAAc,OAAO,eAAe;CA0CpD"}
@@ -1,11 +1,12 @@
1
1
  import { CustomLogger } from '../utils/custom-logger';
2
2
  export declare class ServiceToken extends CustomLogger {
3
+ private customEncrypter;
3
4
  private API_AUTH_BACK_URL;
4
5
  private API_AUTH_BACK_USERNAME_AUTH;
5
6
  private API_AUTH_BACK_PASSWORD_AUTH;
6
7
  private headers;
7
8
  private ID;
8
9
  constructor();
9
- get(): import('rxjs').Observable<any>;
10
+ get(encrypt?: boolean): import('rxjs').Observable<any>;
10
11
  }
11
12
  //# sourceMappingURL=service-token.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"service-token.d.ts","sourceRoot":"","sources":["../../../src/core/services/service-token.ts"],"names":[],"mappings":"AAEA,OAAO,EAAE,YAAY,EAAE,MAAM,wBAAwB,CAAA;AAErD,qBAAa,YAAa,SAAQ,YAAY;IAC5C,OAAO,CAAC,iBAAiB,CAAQ;IACjC,OAAO,CAAC,2BAA2B,CAAQ;IAC3C,OAAO,CAAC,2BAA2B,CAAQ;IAC3C,OAAO,CAAC,OAAO,CAAa;IAC5B,OAAO,CAAC,EAAE,CAA0C;;IAcpD,GAAG;CA6BJ"}
1
+ {"version":3,"file":"service-token.d.ts","sourceRoot":"","sources":["../../../src/core/services/service-token.ts"],"names":[],"mappings":"AAEA,OAAO,EAAE,YAAY,EAAE,MAAM,wBAAwB,CAAA;AAGrD,qBAAa,YAAa,SAAQ,YAAY;IAC5C,OAAO,CAAC,eAAe,CAA6B;IACpD,OAAO,CAAC,iBAAiB,CAAQ;IACjC,OAAO,CAAC,2BAA2B,CAAQ;IAC3C,OAAO,CAAC,2BAA2B,CAAQ;IAC3C,OAAO,CAAC,OAAO,CAAa;IAC5B,OAAO,CAAC,EAAE,CAA0C;;IAcpD,GAAG,CAAC,OAAO,UAAQ;CA0CpB"}
@@ -9,7 +9,9 @@ export declare abstract class FetchServiceParentBE<TRes, TData = object, TypeDat
9
9
  constructor(apiUrl: string, method?: Method, headers?: HeadersInit);
10
10
  private errorHandler;
11
11
  private formatParams;
12
- fetchData(params?: TData, uuid?: string): Observable<ApiResponse<TRes, TypeDataResponse, Relationships>>;
12
+ fetchData(params?: TData, uuid?: string, config?: {
13
+ encryptCredentials?: boolean;
14
+ }): Observable<ApiResponse<TRes, TypeDataResponse, Relationships>>;
13
15
  fetchCustomData(params?: TData, uuid?: string, useToken?: boolean): Observable<TRes>;
14
16
  protected abstract onInit(): OnInit;
15
17
  }
@@ -1 +1 @@
1
- {"version":3,"file":"fetch-service-parent-be.d.ts","sourceRoot":"","sources":["../../../../src/core/utils/api-request/fetch-service-parent-be.ts"],"names":[],"mappings":"AAAA,OAAO,EAAa,UAAU,EAA0B,MAAM,MAAM,CAAA;AAEpE,OAAO,KAAK,EACV,WAAW,EACX,MAAM,EACN,iBAAiB,EAClB,MAAM,+BAA+B,CAAA;AACtC,OAAO,EAAE,MAAM,EAAE,MAAM,yBAAyB,CAAA;AAChD,OAAO,EAAE,YAAY,EAAE,MAAM,kBAAkB,CAAA;AAM/C,8BAAsB,oBAAoB,CACxC,IAAI,EACJ,KAAK,GAAG,MAAM,EACd,gBAAgB,SAAS,iBAAiB,GAAG,QAAQ,EACrD,aAAa,GAAG,MAAM,CACtB,SAAQ,YAAY;IACpB,OAAO,CAAC,QAAQ,CAAC,MAAM,CAAQ;IAC/B,OAAO,CAAC,QAAQ,CAAC,MAAM,CAAQ;IAC/B,OAAO,CAAC,QAAQ,CAAC,YAAY,CAAqB;gBAEtC,MAAM,EAAE,MAAM,EAAE,MAAM,CAAC,EAAE,MAAM,EAAE,OAAO,GAAE,WAAgB;IAMtE,OAAO,CAAC,YAAY;IAUpB,OAAO,CAAC,YAAY;IASpB,SAAS,CACP,MAAM,GAAE,KAAmB,EAC3B,IAAI,CAAC,EAAE,MAAM,GACZ,UAAU,CAAC,WAAW,CAAC,IAAI,EAAE,gBAAgB,EAAE,aAAa,CAAC,CAAC;IA+CjE,eAAe,CACb,MAAM,GAAE,KAAmB,EAC3B,IAAI,CAAC,EAAE,MAAM,EACb,QAAQ,CAAC,EAAE,OAAO,GACjB,UAAU,CAAC,IAAI,CAAC;IAmDnB,SAAS,CAAC,QAAQ,CAAC,MAAM,IAAI,MAAM;CACpC"}
1
+ {"version":3,"file":"fetch-service-parent-be.d.ts","sourceRoot":"","sources":["../../../../src/core/utils/api-request/fetch-service-parent-be.ts"],"names":[],"mappings":"AAAA,OAAO,EAAa,UAAU,EAA0B,MAAM,MAAM,CAAA;AAEpE,OAAO,KAAK,EACV,WAAW,EACX,MAAM,EACN,iBAAiB,EAClB,MAAM,+BAA+B,CAAA;AACtC,OAAO,EAAE,MAAM,EAAE,MAAM,yBAAyB,CAAA;AAChD,OAAO,EAAE,YAAY,EAAE,MAAM,kBAAkB,CAAA;AAM/C,8BAAsB,oBAAoB,CACxC,IAAI,EACJ,KAAK,GAAG,MAAM,EACd,gBAAgB,SAAS,iBAAiB,GAAG,QAAQ,EACrD,aAAa,GAAG,MAAM,CACtB,SAAQ,YAAY;IACpB,OAAO,CAAC,QAAQ,CAAC,MAAM,CAAQ;IAC/B,OAAO,CAAC,QAAQ,CAAC,MAAM,CAAQ;IAC/B,OAAO,CAAC,QAAQ,CAAC,YAAY,CAAqB;gBAEtC,MAAM,EAAE,MAAM,EAAE,MAAM,CAAC,EAAE,MAAM,EAAE,OAAO,GAAE,WAAgB;IAMtE,OAAO,CAAC,YAAY;IAUpB,OAAO,CAAC,YAAY;IASpB,SAAS,CACP,MAAM,GAAE,KAAmB,EAC3B,IAAI,CAAC,EAAE,MAAM,EACb,MAAM,CAAC,EAAE;QAAE,kBAAkB,CAAC,EAAE,OAAO,CAAA;KAAE,GACxC,UAAU,CAAC,WAAW,CAAC,IAAI,EAAE,gBAAgB,EAAE,aAAa,CAAC,CAAC;IAiDjE,eAAe,CACb,MAAM,GAAE,KAAmB,EAC3B,IAAI,CAAC,EAAE,MAAM,EACb,QAAQ,CAAC,EAAE,OAAO,GACjB,UAAU,CAAC,IAAI,CAAC;IAmDnB,SAAS,CAAC,QAAQ,CAAC,MAAM,IAAI,MAAM;CACpC"}
@@ -1 +1 @@
1
- {"version":3,"file":"custom-encoder.d.ts","sourceRoot":"","sources":["../../../src/core/utils/custom-encoder.ts"],"names":[],"mappings":"AACA,OAAO,EAAE,YAAY,EAAE,MAAM,iBAAiB,CAAA;AAE9C,qBAAa,aAAc,SAAQ,YAAY;IAC7C,MAAM,CAAC,CAAC,EAAE,IAAI,EAAE,CAAC,EAAE,IAAI,CAAC,EAAE,MAAM;IAahC,MAAM,CAAC,CAAC,EAAE,IAAI,EAAE,MAAM,GAAG,CAAC,GAAG;QAAE,IAAI,EAAE,MAAM,CAAA;KAAE;CAkB9C"}
1
+ {"version":3,"file":"custom-encoder.d.ts","sourceRoot":"","sources":["../../../src/core/utils/custom-encoder.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,YAAY,EAAE,MAAM,iBAAiB,CAAA;AAG9C,qBAAa,aAAc,SAAQ,YAAY;IAC7C,MAAM,CAAC,CAAC,EAAE,IAAI,EAAE,CAAC,EAAE,IAAI,CAAC,EAAE,MAAM;IAahC,MAAM,CAAC,CAAC,EAAE,IAAI,EAAE,MAAM,GAAG,CAAC,GAAG;QAAE,IAAI,EAAE,MAAM,CAAA;KAAE;CAkB9C"}
@@ -1,10 +1,17 @@
1
1
  import { CustomEncoder } from './custom-encoder';
2
+ type AlgType = "jwe" | "aes";
2
3
  export declare class CustomEncrypter extends CustomEncoder {
3
- private signatureKey;
4
- private generateKey;
5
- protected encrypt<T>(payload: T): Promise<string>;
6
- protected decrypt<T>(encrypted: string): Promise<T>;
4
+ private readonly ALGORITHM;
5
+ private readonly IV_LENGTH;
6
+ private readonly AUTH_TAG_LENGTH;
7
+ private algType;
8
+ constructor(alg?: AlgType);
9
+ private generateAESKey;
10
+ private generateJWEKey;
11
+ encrypt<T>(payload: T): Promise<string>;
12
+ decrypt<T>(encrypted: string): Promise<string | T>;
7
13
  protected isEncrypted(value: string | null): Promise<boolean>;
8
14
  protected generateSHA<T>(value: T): string;
9
15
  }
16
+ export {};
10
17
  //# sourceMappingURL=custom-encrypter.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"custom-encrypter.d.ts","sourceRoot":"","sources":["../../../src/core/utils/custom-encrypter.ts"],"names":[],"mappings":"AAEA,OAAO,EAAE,aAAa,EAAE,MAAM,kBAAkB,CAAA;AAGhD,qBAAa,eAAgB,SAAQ,aAAa;IAChD,OAAO,CAAC,YAAY,CAA8B;YAEpC,WAAW;cAgBT,OAAO,CAAC,CAAC,EAAE,OAAO,EAAE,CAAC;cAgBrB,OAAO,CAAC,CAAC,EAAE,SAAS,EAAE,MAAM;cAU5B,WAAW,CAAC,KAAK,EAAE,MAAM,GAAG,IAAI;IAahD,SAAS,CAAC,WAAW,CAAC,CAAC,EAAE,KAAK,EAAE,CAAC;CAIlC"}
1
+ {"version":3,"file":"custom-encrypter.d.ts","sourceRoot":"","sources":["../../../src/core/utils/custom-encrypter.ts"],"names":[],"mappings":"AACA,OAAO,EAAE,aAAa,EAAE,MAAM,kBAAkB,CAAA;AAShD,KAAK,OAAO,GAAG,KAAK,GAAG,KAAK,CAAA;AAC5B,qBAAa,eAAgB,SAAQ,aAAa;IAChD,OAAO,CAAC,QAAQ,CAAC,SAAS,CAAgB;IAC1C,OAAO,CAAC,QAAQ,CAAC,SAAS,CAAK;IAC/B,OAAO,CAAC,QAAQ,CAAC,eAAe,CAAK;IACrC,OAAO,CAAC,OAAO,CAAiB;gBAEpB,GAAG,GAAE,OAAe;IAKhC,OAAO,CAAC,cAAc;YAcR,cAAc;IAcf,OAAO,CAAC,CAAC,EAAE,OAAO,EAAE,CAAC;IA+BrB,OAAO,CAAC,CAAC,EAAE,SAAS,EAAE,MAAM;cA8BzB,WAAW,CAAC,KAAK,EAAE,MAAM,GAAG,IAAI;IAahD,SAAS,CAAC,WAAW,CAAC,CAAC,EAAE,KAAK,EAAE,CAAC;CAIlC"}
@@ -3,7 +3,11 @@ import { CustomEncrypter } from './custom-encrypter';
3
3
  export declare class CustomHeader extends CustomEncrypter {
4
4
  private headers;
5
5
  constructor(headers?: HeadersInit);
6
- addTokenBackend(headers: HeadersInit): Observable<HeadersInit>;
7
- getHeaders(headers?: HeadersInit, useToken?: boolean): Observable<HeadersInit>;
6
+ addTokenBackend(headers: HeadersInit, encrypt: boolean): Observable<HeadersInit>;
7
+ getHeaders(config?: {
8
+ headers?: HeadersInit;
9
+ useToken?: boolean;
10
+ encryptCredentials?: boolean;
11
+ }): Observable<HeadersInit>;
8
12
  }
9
13
  //# sourceMappingURL=custom-header.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"custom-header.d.ts","sourceRoot":"","sources":["../../../src/core/utils/custom-header.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,UAAU,EAAiB,MAAM,MAAM,CAAA;AAChD,OAAO,EAAE,eAAe,EAAE,MAAM,oBAAoB,CAAA;AAGpD,qBAAa,YAAa,SAAQ,eAAe;IAC/C,OAAO,CAAC,OAAO,CAAa;gBAEhB,OAAO,GAAE,WAAgB;IASrC,eAAe,CAAC,OAAO,EAAE,WAAW,GAAG,UAAU,CAAC,WAAW,CAAC;IAS9D,UAAU,CACR,OAAO,GAAE,WAAgB,EACzB,QAAQ,UAAO,GACd,UAAU,CAAC,WAAW,CAAC;CAW3B"}
1
+ {"version":3,"file":"custom-header.d.ts","sourceRoot":"","sources":["../../../src/core/utils/custom-header.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,UAAU,EAAiB,MAAM,MAAM,CAAA;AAChD,OAAO,EAAE,eAAe,EAAE,MAAM,oBAAoB,CAAA;AAGpD,qBAAa,YAAa,SAAQ,eAAe;IAC/C,OAAO,CAAC,OAAO,CAAa;gBAEhB,OAAO,GAAE,WAAgB;IASrC,eAAe,CACb,OAAO,EAAE,WAAW,EACpB,OAAO,EAAE,OAAO,GACf,UAAU,CAAC,WAAW,CAAC;IAS1B,UAAU,CAAC,MAAM,CAAC,EAAE;QAClB,OAAO,CAAC,EAAE,WAAW,CAAA;QACrB,QAAQ,CAAC,EAAE,OAAO,CAAA;QAClB,kBAAkB,CAAC,EAAE,OAAO,CAAA;KAC7B,GAAG,UAAU,CAAC,WAAW,CAAC;CAY5B"}
@@ -0,0 +1,3 @@
1
+ export * from './isEmpty';
2
+ export * from './isString';
3
+ //# sourceMappingURL=index.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../src/core/utils/functions/index.ts"],"names":[],"mappings":"AAAA,cAAc,WAAW,CAAA;AACzB,cAAc,YAAY,CAAA"}
@@ -0,0 +1,2 @@
1
+ export declare const isEmpty: <T>(value: T) => boolean;
2
+ //# sourceMappingURL=isEmpty.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"isEmpty.d.ts","sourceRoot":"","sources":["../../../../src/core/utils/functions/isEmpty.ts"],"names":[],"mappings":"AAAA,eAAO,MAAM,OAAO,GAAI,CAAC,SAAS,CAAC,KAAG,OAgBrC,CAAA"}
@@ -0,0 +1,2 @@
1
+ export declare const isString: (value: unknown) => value is string;
2
+ //# sourceMappingURL=isString.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"isString.d.ts","sourceRoot":"","sources":["../../../../src/core/utils/functions/isString.ts"],"names":[],"mappings":"AAAA,eAAO,MAAM,QAAQ,UAAW,OAAO,KAAG,KAAK,IAAI,MAElD,CAAA"}
@@ -1 +1 @@
1
- "use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const e=require("./AuthEngine-D65_iNdB.cjs"),r=require("./loading-handler-CVkAHN_A.cjs"),n=require("./service-token-Bv3BAiQd.cjs");exports.ApiMiddleware=e.ApiMiddleware;exports.AuthEngine=e.AuthEngine;exports.ErrorCatalog=e.ErrorCatalog;exports.Exception=e.Exception;exports.FetchServiceBE=e.FetchServiceBE;exports.FetchServiceFE=e.FetchServiceFE;exports.FetchServiceParentBE=e.FetchServiceParentBE;exports.LoadingHandler=r.LoadingHandler;exports.MessageHandler=r.MessageHandler;exports.RxSubjectManager=r.RxSubjectManager;exports.ServiceToken=n.ServiceToken;
1
+ "use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const e=require("./AuthEngine-CATazTYM.cjs"),r=require("./loading-handler-CVkAHN_A.cjs"),n=require("./service-token-g-Zt_ctQ.cjs");exports.ApiMiddleware=e.ApiMiddleware;exports.AuthEngine=e.AuthEngine;exports.ErrorCatalog=e.ErrorCatalog;exports.Exception=e.Exception;exports.FetchServiceBE=e.FetchServiceBE;exports.FetchServiceFE=e.FetchServiceFE;exports.FetchServiceParentBE=e.FetchServiceParentBE;exports.LoadingHandler=r.LoadingHandler;exports.MessageHandler=r.MessageHandler;exports.RxSubjectManager=r.RxSubjectManager;exports.ServiceToken=n.ServiceToken;
@@ -1,6 +1,6 @@
1
- import { A as r, d as s, E as o, a as t, F as c, b as i, c as n } from "./AuthEngine-Gl4gv5KD.js";
1
+ import { A as r, a as s, E as o, b as t, F as c, c as i, d as n } from "./AuthEngine-CQfKuww8.js";
2
2
  import { L as d, M as S, R as g } from "./loading-handler-Br21zGTA.js";
3
- import { S as x } from "./service-token-DUKgd-pZ.js";
3
+ import { S as x } from "./service-token-DrUMHiYQ.js";
4
4
  export {
5
5
  r as ApiMiddleware,
6
6
  s as AuthEngine,
@@ -1 +1 @@
1
- "use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const e=require("./AuthEngine-D65_iNdB.cjs"),r=require("./loading-handler-CVkAHN_A.cjs"),n=require("./service-token-Bv3BAiQd.cjs");exports.ApiMiddleware=e.ApiMiddleware;exports.AuthEngine=e.AuthEngine;exports.ErrorCatalog=e.ErrorCatalog;exports.Exception=e.Exception;exports.FetchServiceBE=e.FetchServiceBE;exports.FetchServiceFE=e.FetchServiceFE;exports.FetchServiceParentBE=e.FetchServiceParentBE;exports.LoadingHandler=r.LoadingHandler;exports.MessageHandler=r.MessageHandler;exports.RxSubjectManager=r.RxSubjectManager;exports.ServiceToken=n.ServiceToken;
1
+ "use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const e=require("./AuthEngine-CATazTYM.cjs"),r=require("./loading-handler-CVkAHN_A.cjs"),n=require("./service-token-g-Zt_ctQ.cjs");exports.ApiMiddleware=e.ApiMiddleware;exports.AuthEngine=e.AuthEngine;exports.ErrorCatalog=e.ErrorCatalog;exports.Exception=e.Exception;exports.FetchServiceBE=e.FetchServiceBE;exports.FetchServiceFE=e.FetchServiceFE;exports.FetchServiceParentBE=e.FetchServiceParentBE;exports.LoadingHandler=r.LoadingHandler;exports.MessageHandler=r.MessageHandler;exports.RxSubjectManager=r.RxSubjectManager;exports.ServiceToken=n.ServiceToken;
@@ -1,6 +1,6 @@
1
- import { A as r, d as s, E as o, a as t, F as c, b as i, c as n } from "./AuthEngine-Gl4gv5KD.js";
1
+ import { A as r, a as s, E as o, b as t, F as c, c as i, d as n } from "./AuthEngine-CQfKuww8.js";
2
2
  import { L as d, M as S, R as g } from "./loading-handler-Br21zGTA.js";
3
- import { S as x } from "./service-token-DUKgd-pZ.js";
3
+ import { S as x } from "./service-token-DrUMHiYQ.js";
4
4
  export {
5
5
  r as ApiMiddleware,
6
6
  s as AuthEngine,
@@ -1 +1 @@
1
- "use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const e=require("./custom-encoder-d7rw7W8X.cjs");require("./mp-front-cli-logger.cjs");exports.CustomEncoder=e.CustomEncoder;
1
+ "use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const i=require("./mp-front-cli-logger.cjs"),s=t=>typeof t=="string"||t instanceof String;class c extends i.CustomLogger{encode(r,o){try{this.logDebug("encode CustomEncoder",JSON.stringify(r));const e=JSON.stringify(r),n=Buffer.from(e).toString("base64");return JSON.stringify({info:n,uuid:o})}catch{return this.logError("error convert to base64"),JSON.stringify({info:r,uuid:o})}}decode(r){try{s(r)&&(r=JSON.parse(r));const{info:o}=r;this.logDebug("decode CustomEncoder",JSON.stringify(o));const e=/^([0-9a-zA-Z+/]{4})*(([0-9a-zA-Z+/]{2}==)|([0-9a-zA-Z+/]{3}=))?$/;if(s(o)&&e.test(o)){const n=Buffer.from(o,"base64").toString();return JSON.parse(n)}}catch{this.logError("error convert to base64")}return r}}exports.CustomEncoder=c;
@@ -1,5 +1,31 @@
1
- import { C as t } from "./custom-encoder-Cfd7FFMe.js";
2
- import "./mp-front-cli-logger.js";
1
+ import { CustomLogger as i } from "./mp-front-cli-logger.js";
2
+ const s = (t) => typeof t == "string" || t instanceof String;
3
+ class g extends i {
4
+ encode(r, o) {
5
+ try {
6
+ this.logDebug("encode CustomEncoder", JSON.stringify(r));
7
+ const e = JSON.stringify(r), n = Buffer.from(e).toString("base64");
8
+ return JSON.stringify({ info: n, uuid: o });
9
+ } catch {
10
+ return this.logError("error convert to base64"), JSON.stringify({ info: r, uuid: o });
11
+ }
12
+ }
13
+ decode(r) {
14
+ try {
15
+ s(r) && (r = JSON.parse(r));
16
+ const { info: o } = r;
17
+ this.logDebug("decode CustomEncoder", JSON.stringify(o));
18
+ const e = /^([0-9a-zA-Z+/]{4})*(([0-9a-zA-Z+/]{2}==)|([0-9a-zA-Z+/]{3}=))?$/;
19
+ if (s(o) && e.test(o)) {
20
+ const n = Buffer.from(o, "base64").toString();
21
+ return JSON.parse(n);
22
+ }
23
+ } catch {
24
+ this.logError("error convert to base64");
25
+ }
26
+ return r;
27
+ }
28
+ }
3
29
  export {
4
- t as CustomEncoder
30
+ g as CustomEncoder
5
31
  };
@@ -1 +1 @@
1
- "use strict";var c=Object.defineProperty;var o=(r,t,e)=>t in r?c(r,t,{enumerable:!0,configurable:!0,writable:!0,value:e}):r[t]=e;var i=(r,t,e)=>o(r,typeof t!="symbol"?t+"":t,e);Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const s=require("node-jose"),y=require("crypto"),E=require("./custom-encoder-d7rw7W8X.cjs"),u=r=>r.replace(/[\u00A0-\uffff]/gu,t=>"\\u"+("000"+t.charCodeAt(0).toString(16)).slice(-4));class g extends E.CustomEncoder{constructor(){super(...arguments);i(this,"signatureKey")}async generateKey(){const e=process.env.SECRET_SIGNATURE;if(!e)throw new Error("Define a SECRET_SIGNATURE from `.env`");this.signatureKey=await s.JWK.asKey({kty:"oct",k:s.util.base64url.encode(e)})}async encrypt(e){if(await this.generateKey(),!this.signatureKey)throw new Error("PLEASE CREATE A KEY TO ENCRYPT 🙂");const n=JSON.stringify(e),a=u(n);return await s.JWE.createEncrypt({format:"compact"},this.signatureKey).update(a).final()}async decrypt(e){if(await this.generateKey(),!this.signatureKey)throw new Error("PLEASE CREATE A KEY TO DECRYPT 🙂");const{payload:n}=await s.JWE.createDecrypt(this.signatureKey).decrypt(e);return JSON.parse(n.toString())}async isEncrypted(e){this.logInfo("EncryptionHandler",e);try{return await this.decrypt(e??""),this.logDebug("EncryptionHandler","IS ENCRYPTED 🥵"),!0}catch(n){return this.logWarn("EncryptionHandler",JSON.stringify(n)),this.logDebug("EncryptionHandler","IS NOT ENCRYPTED 🙂"),!1}}generateSHA(e){const n=JSON.stringify(e);return y.createHash("sha256").update(n).digest("hex")}}exports.CustomEncrypter=g;
1
+ "use strict";var g=Object.defineProperty;var f=(s,t,e)=>t in s?g(s,t,{enumerable:!0,configurable:!0,writable:!0,value:e}):s[t]=e;var o=(s,t,e)=>f(s,typeof t!="symbol"?t+"":t,e);Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const E=require("node-jose"),d=require("./mp-front-cli-encoder.cjs"),y=require("node:crypto"),S=s=>s.replace(/[\u00A0-\uffff]/gu,t=>"\\u"+("000"+t.charCodeAt(0).toString(16)).slice(-4));class l extends d.CustomEncoder{constructor(e="jwe"){super();o(this,"ALGORITHM","aes-256-gcm");o(this,"IV_LENGTH",12);o(this,"AUTH_TAG_LENGTH",16);o(this,"algType","jwe");this.algType=e}generateAESKey(){const e=process.env.SECRET_SIGNATURE;if(!e)throw new Error("PLEASE CREATE A KEY TO ENCRYPT 🙂");const r=this.generateSHA(e),n=Buffer.from(r,"hex");if(n.length!==32)throw new Error("KEY MUST BE 32 bytes (64 hex chars)");return n}async generateJWEKey(){const e=process.env.SECRET_SIGNATURE;if(!e)throw new Error("Define a SECRET_SIGNATURE from `.env`");return await E.JWK.asKey({kty:"oct",k:E.util.base64url.encode(e)})}async encrypt(e){const r=JSON.stringify(e),n=S(r);if(this.algType==="jwe"){const h=await this.generateJWEKey();return await E.JWE.createEncrypt({format:"compact"},h).update(n).final()}const u=this.generateAESKey(),i=y.randomBytes(this.IV_LENGTH),c=y.createCipheriv(this.ALGORITHM,u,i),a=Buffer.concat([c.update(n,"utf8"),c.final()]),T=c.getAuthTag();return Buffer.concat([i,T,a]).toString("hex")}async decrypt(e){if(this.algType==="jwe"){const h=await this.generateJWEKey(),{payload:p}=await E.JWE.createDecrypt(h).decrypt(e);return JSON.parse(p.toString())}const r=this.generateAESKey(),n=Buffer.from(e,"hex"),u=n.subarray(0,this.IV_LENGTH),i=n.subarray(this.IV_LENGTH,this.IV_LENGTH+this.AUTH_TAG_LENGTH),c=n.subarray(this.IV_LENGTH+this.AUTH_TAG_LENGTH),a=y.createDecipheriv(this.ALGORITHM,r,u);return a.setAuthTag(i),Buffer.concat([a.update(c),a.final()]).toString("utf8")}async isEncrypted(e){this.logInfo("EncryptionHandler",e);try{return await this.decrypt(e??""),this.logDebug("EncryptionHandler","IS ENCRYPTED 🥵"),!0}catch(r){return this.logWarn("EncryptionHandler",JSON.stringify(r)),this.logDebug("EncryptionHandler","IS NOT ENCRYPTED 🙂"),!1}}generateSHA(e){const r=JSON.stringify(e);return y.createHash("sha256").update(r).digest("hex")}}exports.CustomEncrypter=l;
@@ -1,52 +1,78 @@
1
- var o = Object.defineProperty;
2
- var c = (r, e, t) => e in r ? o(r, e, { enumerable: !0, configurable: !0, writable: !0, value: t }) : r[e] = t;
3
- var i = (r, e, t) => c(r, typeof e != "symbol" ? e + "" : e, t);
4
- import a from "node-jose";
5
- import { createHash as E } from "crypto";
6
- import { C as y } from "./custom-encoder-Cfd7FFMe.js";
7
- const p = (r) => r.replace(/[\u00A0-\uffff]/gu, (e) => "\\u" + ("000" + e.charCodeAt(0).toString(16)).slice(-4));
8
- class S extends y {
9
- constructor() {
10
- super(...arguments);
11
- i(this, "signatureKey");
1
+ var p = Object.defineProperty;
2
+ var f = (s, e, t) => e in s ? p(s, e, { enumerable: !0, configurable: !0, writable: !0, value: t }) : s[e] = t;
3
+ var o = (s, e, t) => f(s, typeof e != "symbol" ? e + "" : e, t);
4
+ import E from "node-jose";
5
+ import { CustomEncoder as g } from "./mp-front-cli-encoder.js";
6
+ import { randomBytes as d, createCipheriv as S, createDecipheriv as A, createHash as l } from "node:crypto";
7
+ const H = (s) => s.replace(/[\u00A0-\uffff]/gu, (e) => "\\u" + ("000" + e.charCodeAt(0).toString(16)).slice(-4));
8
+ class _ extends g {
9
+ constructor(t = "jwe") {
10
+ super();
11
+ o(this, "ALGORITHM", "aes-256-gcm");
12
+ o(this, "IV_LENGTH", 12);
13
+ o(this, "AUTH_TAG_LENGTH", 16);
14
+ o(this, "algType", "jwe");
15
+ this.algType = t;
12
16
  }
13
- async generateKey() {
17
+ generateAESKey() {
18
+ const t = process.env.SECRET_SIGNATURE;
19
+ if (!t) throw new Error("PLEASE CREATE A KEY TO ENCRYPT 🙂");
20
+ const r = this.generateSHA(t), n = Buffer.from(r, "hex");
21
+ if (n.length !== 32)
22
+ throw new Error("KEY MUST BE 32 bytes (64 hex chars)");
23
+ return n;
24
+ }
25
+ async generateJWEKey() {
14
26
  const t = process.env.SECRET_SIGNATURE;
15
27
  if (!t)
16
28
  throw new Error("Define a SECRET_SIGNATURE from `.env`");
17
- this.signatureKey = await a.JWK.asKey({
29
+ return await E.JWK.asKey({
18
30
  kty: "oct",
19
- k: a.util.base64url.encode(t)
31
+ k: E.util.base64url.encode(t)
20
32
  });
21
33
  }
22
34
  async encrypt(t) {
23
- if (await this.generateKey(), !this.signatureKey) throw new Error("PLEASE CREATE A KEY TO ENCRYPT 🙂");
24
- const n = JSON.stringify(t), s = p(n);
25
- return await a.JWE.createEncrypt(
26
- { format: "compact" },
27
- this.signatureKey
28
- ).update(s).final();
35
+ const r = JSON.stringify(t), n = H(r);
36
+ if (this.algType === "jwe") {
37
+ const h = await this.generateJWEKey();
38
+ return await E.JWE.createEncrypt(
39
+ { format: "compact" },
40
+ h
41
+ ).update(n).final();
42
+ }
43
+ const y = this.generateAESKey(), i = d(this.IV_LENGTH), a = S(this.ALGORITHM, y, i), c = Buffer.concat([
44
+ a.update(n, "utf8"),
45
+ a.final()
46
+ ]), u = a.getAuthTag();
47
+ return Buffer.concat([i, u, c]).toString("hex");
29
48
  }
30
49
  async decrypt(t) {
31
- if (await this.generateKey(), !this.signatureKey) throw new Error("PLEASE CREATE A KEY TO DECRYPT 🙂");
32
- const { payload: n } = await a.JWE.createDecrypt(
33
- this.signatureKey
34
- ).decrypt(t);
35
- return JSON.parse(n.toString());
50
+ if (this.algType === "jwe") {
51
+ const h = await this.generateJWEKey(), { payload: T } = await E.JWE.createDecrypt(h).decrypt(t);
52
+ return JSON.parse(T.toString());
53
+ }
54
+ const r = this.generateAESKey(), n = Buffer.from(t, "hex"), y = n.subarray(0, this.IV_LENGTH), i = n.subarray(
55
+ this.IV_LENGTH,
56
+ this.IV_LENGTH + this.AUTH_TAG_LENGTH
57
+ ), a = n.subarray(this.IV_LENGTH + this.AUTH_TAG_LENGTH), c = A(this.ALGORITHM, r, y);
58
+ return c.setAuthTag(i), Buffer.concat([
59
+ c.update(a),
60
+ c.final()
61
+ ]).toString("utf8");
36
62
  }
37
63
  async isEncrypted(t) {
38
64
  this.logInfo("EncryptionHandler", t);
39
65
  try {
40
66
  return await this.decrypt(t ?? ""), this.logDebug("EncryptionHandler", "IS ENCRYPTED 🥵"), !0;
41
- } catch (n) {
42
- return this.logWarn("EncryptionHandler", JSON.stringify(n)), this.logDebug("EncryptionHandler", "IS NOT ENCRYPTED 🙂"), !1;
67
+ } catch (r) {
68
+ return this.logWarn("EncryptionHandler", JSON.stringify(r)), this.logDebug("EncryptionHandler", "IS NOT ENCRYPTED 🙂"), !1;
43
69
  }
44
70
  }
45
71
  generateSHA(t) {
46
- const n = JSON.stringify(t);
47
- return E("sha256").update(n).digest("hex");
72
+ const r = JSON.stringify(t);
73
+ return l("sha256").update(r).digest("hex");
48
74
  }
49
75
  }
50
76
  export {
51
- S as CustomEncrypter
77
+ _ as CustomEncrypter
52
78
  };
@@ -1 +1 @@
1
- "use strict";var a=Object.defineProperty;var c=(s,t,e)=>t in s?a(s,t,{enumerable:!0,configurable:!0,writable:!0,value:e}):s[t]=e;var n=(s,t,e)=>c(s,typeof t!="symbol"?t+"":t,e);Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const r=require("rxjs"),d=require("./mp-front-cli-encrypter.cjs"),p=require("./service-token-Bv3BAiQd.cjs");class u extends d.CustomEncrypter{constructor(e={}){super();n(this,"headers");this.headers={Accept:"application/json","Content-Type":"application/vnd.api+json",...e}}addTokenBackend(e){return this.logDebug("addTokenBackend CustomHeader",JSON.stringify(e)),new p.ServiceToken().get().pipe(r.switchMap(o=>r.of({...e,Authorization:`Bearer ${o}`})))}getHeaders(e={},o=!0){return this.logDebug("getHeaders CustomHeader"),o?this.addTokenBackend(e).pipe(r.switchMap(i=>r.of({...i,...this.headers}))):r.of(e).pipe(r.switchMap(i=>r.of({...i,...this.headers})))}}exports.CustomHeader=u;
1
+ "use strict";var d=Object.defineProperty;var p=(s,t,e)=>t in s?d(s,t,{enumerable:!0,configurable:!0,writable:!0,value:e}):s[t]=e;var i=(s,t,e)=>p(s,typeof t!="symbol"?t+"":t,e);Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const r=require("rxjs"),u=require("./mp-front-cli-encrypter.cjs"),h=require("./service-token-g-Zt_ctQ.cjs");class g extends u.CustomEncrypter{constructor(e={}){super();i(this,"headers");this.headers={Accept:"application/json","Content-Type":"application/vnd.api+json",...e}}addTokenBackend(e,n){return this.logDebug("addTokenBackend CustomHeader",JSON.stringify(e)),new h.ServiceToken().get(n).pipe(r.switchMap(o=>r.of({...e,Authorization:`Bearer ${o}`})))}getHeaders(e){const{headers:n={},useToken:o=!0,encryptCredentials:c=!1}=e;return this.logDebug("getHeaders CustomHeader"),o?this.addTokenBackend(n,c).pipe(r.switchMap(a=>r.of({...a,...this.headers}))):r.of(n).pipe(r.switchMap(a=>r.of({...a,...this.headers})))}}exports.CustomHeader=g;
@@ -1,32 +1,33 @@
1
- var p = Object.defineProperty;
2
- var d = (r, t, e) => t in r ? p(r, t, { enumerable: !0, configurable: !0, writable: !0, value: e }) : r[t] = e;
3
- var n = (r, t, e) => d(r, typeof t != "symbol" ? t + "" : t, e);
4
- import { switchMap as a, of as o } from "rxjs";
5
- import { CustomEncrypter as c } from "./mp-front-cli-encrypter.js";
6
- import { S as u } from "./service-token-DUKgd-pZ.js";
7
- class f extends c {
1
+ var c = Object.defineProperty;
2
+ var u = (r, t, e) => t in r ? c(r, t, { enumerable: !0, configurable: !0, writable: !0, value: e }) : r[t] = e;
3
+ var d = (r, t, e) => u(r, typeof t != "symbol" ? t + "" : t, e);
4
+ import { switchMap as i, of as o } from "rxjs";
5
+ import { CustomEncrypter as h } from "./mp-front-cli-encrypter.js";
6
+ import { S as m } from "./service-token-DrUMHiYQ.js";
7
+ class C extends h {
8
8
  constructor(e = {}) {
9
9
  super();
10
- n(this, "headers");
10
+ d(this, "headers");
11
11
  this.headers = {
12
12
  Accept: "application/json",
13
13
  "Content-Type": "application/vnd.api+json",
14
14
  ...e
15
15
  };
16
16
  }
17
- addTokenBackend(e) {
18
- return this.logDebug("addTokenBackend CustomHeader", JSON.stringify(e)), new u().get().pipe(
19
- a((i) => o({ ...e, Authorization: `Bearer ${i}` }))
17
+ addTokenBackend(e, s) {
18
+ return this.logDebug("addTokenBackend CustomHeader", JSON.stringify(e)), new m().get(s).pipe(
19
+ i((a) => o({ ...e, Authorization: `Bearer ${a}` }))
20
20
  );
21
21
  }
22
- getHeaders(e = {}, i = !0) {
23
- return this.logDebug("getHeaders CustomHeader"), i ? this.addTokenBackend(e).pipe(
24
- a((s) => o({ ...s, ...this.headers }))
25
- ) : o(e).pipe(
26
- a((s) => o({ ...s, ...this.headers }))
22
+ getHeaders(e) {
23
+ const { headers: s = {}, useToken: a = !0, encryptCredentials: p = !1 } = e;
24
+ return this.logDebug("getHeaders CustomHeader"), a ? this.addTokenBackend(s, p).pipe(
25
+ i((n) => o({ ...n, ...this.headers }))
26
+ ) : o(s).pipe(
27
+ i((n) => o({ ...n, ...this.headers }))
27
28
  );
28
29
  }
29
30
  }
30
31
  export {
31
- f as CustomHeader
32
+ C as CustomHeader
32
33
  };
@@ -1 +1 @@
1
- "use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const e=require("./service-token-Bv3BAiQd.cjs");exports.ServiceToken=e.ServiceToken;
1
+ "use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const e=require("./service-token-g-Zt_ctQ.cjs");exports.ServiceToken=e.ServiceToken;
@@ -1,4 +1,4 @@
1
- import { S as r } from "./service-token-DUKgd-pZ.js";
1
+ import { S as r } from "./service-token-DrUMHiYQ.js";
2
2
  export {
3
3
  r as ServiceToken
4
4
  };