oauth.do 0.2.0 → 0.2.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +16 -5
- package/dist/cli.js +5 -1
- package/dist/cli.js.map +1 -1
- package/dist/hono.d.ts +3 -16
- package/dist/hono.js +403 -2
- package/dist/hono.js.map +1 -1
- package/dist/session-hono.d.ts +143 -0
- package/dist/session-hono.js +406 -0
- package/dist/session-hono.js.map +1 -0
- package/dist/session.d.ts +83 -0
- package/dist/session.js +114 -0
- package/dist/session.js.map +1 -0
- package/package.json +5 -1
|
@@ -0,0 +1,83 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* oauth.do/session - Cookie-based session management with AES-GCM encryption
|
|
3
|
+
*
|
|
4
|
+
* Secure session encoding/decoding using Web Crypto API.
|
|
5
|
+
* Zero dependencies - works in all environments that support Web Crypto.
|
|
6
|
+
*
|
|
7
|
+
* @example
|
|
8
|
+
* ```ts
|
|
9
|
+
* import { encodeSession, decodeSession } from 'oauth.do/session'
|
|
10
|
+
*
|
|
11
|
+
* const session = { userId: 'user_123', accessToken: 'tok_abc' }
|
|
12
|
+
* const encoded = await encodeSession(session, 'my-secret-key')
|
|
13
|
+
* const decoded = await decodeSession(encoded, 'my-secret-key')
|
|
14
|
+
* ```
|
|
15
|
+
*/
|
|
16
|
+
/**
|
|
17
|
+
* Session data stored in encrypted cookie
|
|
18
|
+
*/
|
|
19
|
+
interface SessionData {
|
|
20
|
+
userId: string;
|
|
21
|
+
organizationId?: string;
|
|
22
|
+
email?: string;
|
|
23
|
+
name?: string;
|
|
24
|
+
accessToken: string;
|
|
25
|
+
refreshToken?: string;
|
|
26
|
+
expiresAt?: number;
|
|
27
|
+
/** Extensible: apps can add custom fields */
|
|
28
|
+
[key: string]: unknown;
|
|
29
|
+
}
|
|
30
|
+
/**
|
|
31
|
+
* Configuration for session management
|
|
32
|
+
*/
|
|
33
|
+
interface SessionConfig {
|
|
34
|
+
/** Cookie name (default: 'session') */
|
|
35
|
+
cookieName: string;
|
|
36
|
+
/** Cookie max age in seconds (default: 604800 = 7 days) */
|
|
37
|
+
cookieMaxAge: number;
|
|
38
|
+
/** Cookie secure flag (default: true) */
|
|
39
|
+
cookieSecure: boolean;
|
|
40
|
+
/** Cookie SameSite attribute (default: 'lax') */
|
|
41
|
+
cookieSameSite: 'strict' | 'lax' | 'none';
|
|
42
|
+
/** Encryption secret (required in production) */
|
|
43
|
+
secret: string;
|
|
44
|
+
}
|
|
45
|
+
/**
|
|
46
|
+
* Default session configuration
|
|
47
|
+
*/
|
|
48
|
+
declare const defaultSessionConfig: SessionConfig;
|
|
49
|
+
/**
|
|
50
|
+
* Encode session data with AES-GCM encryption.
|
|
51
|
+
* Format: base64(IV || ciphertext || auth tag)
|
|
52
|
+
*
|
|
53
|
+
* @param session - Session data to encrypt
|
|
54
|
+
* @param secret - Encryption secret (min 16 chars recommended)
|
|
55
|
+
* @returns Base64-encoded encrypted session string
|
|
56
|
+
*/
|
|
57
|
+
declare function encodeSession(session: SessionData, secret?: string): Promise<string>;
|
|
58
|
+
/**
|
|
59
|
+
* Decode session data with AES-GCM decryption.
|
|
60
|
+
* Returns null if decryption fails or data is invalid.
|
|
61
|
+
*
|
|
62
|
+
* @param encoded - Base64-encoded encrypted session string
|
|
63
|
+
* @param secret - Encryption secret (must match the one used for encoding)
|
|
64
|
+
* @returns Decoded session data or null
|
|
65
|
+
*/
|
|
66
|
+
declare function decodeSession(encoded: string, secret?: string): Promise<SessionData | null>;
|
|
67
|
+
/**
|
|
68
|
+
* Validate that session data has the required structure
|
|
69
|
+
*/
|
|
70
|
+
declare function isValidSessionData(data: unknown): data is SessionData;
|
|
71
|
+
/**
|
|
72
|
+
* Get session config from environment variables with defaults.
|
|
73
|
+
*
|
|
74
|
+
* Environment variables:
|
|
75
|
+
* - SESSION_SECRET: Encryption secret
|
|
76
|
+
* - SESSION_COOKIE_NAME: Cookie name
|
|
77
|
+
* - SESSION_COOKIE_MAX_AGE: Cookie max age in seconds
|
|
78
|
+
* - SESSION_COOKIE_SECURE: 'true' or 'false'
|
|
79
|
+
* - SESSION_COOKIE_SAME_SITE: 'strict', 'lax', or 'none'
|
|
80
|
+
*/
|
|
81
|
+
declare function getSessionConfig(env?: Record<string, string | undefined>): SessionConfig;
|
|
82
|
+
|
|
83
|
+
export { type SessionConfig, type SessionData, decodeSession, defaultSessionConfig, encodeSession, getSessionConfig, isValidSessionData };
|
package/dist/session.js
ADDED
|
@@ -0,0 +1,114 @@
|
|
|
1
|
+
// src/session.ts
|
|
2
|
+
var defaultSessionConfig = {
|
|
3
|
+
cookieName: "session",
|
|
4
|
+
cookieMaxAge: 60 * 60 * 24 * 7,
|
|
5
|
+
// 7 days
|
|
6
|
+
cookieSecure: true,
|
|
7
|
+
cookieSameSite: "lax",
|
|
8
|
+
secret: "oauth-do-dev-secret-change-in-production"
|
|
9
|
+
};
|
|
10
|
+
var ALGORITHM = "AES-GCM";
|
|
11
|
+
var IV_LENGTH = 12;
|
|
12
|
+
var TAG_LENGTH = 128;
|
|
13
|
+
async function getEncryptionKey(secret) {
|
|
14
|
+
const encoder = new TextEncoder();
|
|
15
|
+
return crypto.subtle.importKey(
|
|
16
|
+
"raw",
|
|
17
|
+
encoder.encode(secret.padEnd(32, "0").slice(0, 32)),
|
|
18
|
+
{ name: ALGORITHM },
|
|
19
|
+
false,
|
|
20
|
+
["encrypt", "decrypt"]
|
|
21
|
+
);
|
|
22
|
+
}
|
|
23
|
+
async function encodeSession(session, secret) {
|
|
24
|
+
const key = await getEncryptionKey(secret ?? defaultSessionConfig.secret);
|
|
25
|
+
const iv = crypto.getRandomValues(new Uint8Array(IV_LENGTH));
|
|
26
|
+
const encoder = new TextEncoder();
|
|
27
|
+
const data = encoder.encode(JSON.stringify(session));
|
|
28
|
+
const ciphertext = await crypto.subtle.encrypt(
|
|
29
|
+
{ name: ALGORITHM, iv, tagLength: TAG_LENGTH },
|
|
30
|
+
key,
|
|
31
|
+
data
|
|
32
|
+
);
|
|
33
|
+
const combined = new Uint8Array(iv.length + ciphertext.byteLength);
|
|
34
|
+
combined.set(iv, 0);
|
|
35
|
+
combined.set(new Uint8Array(ciphertext), iv.length);
|
|
36
|
+
return btoa(String.fromCharCode(...combined));
|
|
37
|
+
}
|
|
38
|
+
async function decodeSession(encoded, secret) {
|
|
39
|
+
try {
|
|
40
|
+
const key = await getEncryptionKey(secret ?? defaultSessionConfig.secret);
|
|
41
|
+
const combined = Uint8Array.from(atob(encoded), (c) => c.charCodeAt(0));
|
|
42
|
+
const iv = combined.slice(0, IV_LENGTH);
|
|
43
|
+
const ciphertext = combined.slice(IV_LENGTH);
|
|
44
|
+
const decrypted = await crypto.subtle.decrypt(
|
|
45
|
+
{ name: ALGORITHM, iv, tagLength: TAG_LENGTH },
|
|
46
|
+
key,
|
|
47
|
+
ciphertext
|
|
48
|
+
);
|
|
49
|
+
const decoder = new TextDecoder();
|
|
50
|
+
const parsed = JSON.parse(decoder.decode(decrypted));
|
|
51
|
+
if (!isValidSessionData(parsed)) {
|
|
52
|
+
return null;
|
|
53
|
+
}
|
|
54
|
+
return parsed;
|
|
55
|
+
} catch {
|
|
56
|
+
return null;
|
|
57
|
+
}
|
|
58
|
+
}
|
|
59
|
+
function isValidSessionData(data) {
|
|
60
|
+
if (data === null || typeof data !== "object") {
|
|
61
|
+
return false;
|
|
62
|
+
}
|
|
63
|
+
const session = data;
|
|
64
|
+
if (typeof session.userId !== "string" || session.userId.length === 0) {
|
|
65
|
+
return false;
|
|
66
|
+
}
|
|
67
|
+
if (typeof session.accessToken !== "string" || session.accessToken.length === 0) {
|
|
68
|
+
return false;
|
|
69
|
+
}
|
|
70
|
+
if (session.organizationId !== void 0 && typeof session.organizationId !== "string") {
|
|
71
|
+
return false;
|
|
72
|
+
}
|
|
73
|
+
if (session.email !== void 0 && typeof session.email !== "string") {
|
|
74
|
+
return false;
|
|
75
|
+
}
|
|
76
|
+
if (session.name !== void 0 && typeof session.name !== "string") {
|
|
77
|
+
return false;
|
|
78
|
+
}
|
|
79
|
+
if (session.refreshToken !== void 0 && typeof session.refreshToken !== "string") {
|
|
80
|
+
return false;
|
|
81
|
+
}
|
|
82
|
+
if (session.expiresAt !== void 0 && typeof session.expiresAt !== "number") {
|
|
83
|
+
return false;
|
|
84
|
+
}
|
|
85
|
+
return true;
|
|
86
|
+
}
|
|
87
|
+
function getSessionConfig(env) {
|
|
88
|
+
const validSameSite = ["strict", "lax", "none"];
|
|
89
|
+
let cookieSameSite = defaultSessionConfig.cookieSameSite;
|
|
90
|
+
if (env?.SESSION_COOKIE_SAME_SITE) {
|
|
91
|
+
const value = env.SESSION_COOKIE_SAME_SITE;
|
|
92
|
+
if (validSameSite.includes(value)) {
|
|
93
|
+
cookieSameSite = value;
|
|
94
|
+
}
|
|
95
|
+
}
|
|
96
|
+
let cookieMaxAge = defaultSessionConfig.cookieMaxAge;
|
|
97
|
+
if (env?.SESSION_COOKIE_MAX_AGE) {
|
|
98
|
+
const parsed = parseInt(env.SESSION_COOKIE_MAX_AGE, 10);
|
|
99
|
+
if (!Number.isNaN(parsed) && parsed > 0) {
|
|
100
|
+
cookieMaxAge = parsed;
|
|
101
|
+
}
|
|
102
|
+
}
|
|
103
|
+
return {
|
|
104
|
+
secret: env?.SESSION_SECRET ?? defaultSessionConfig.secret,
|
|
105
|
+
cookieName: env?.SESSION_COOKIE_NAME ?? defaultSessionConfig.cookieName,
|
|
106
|
+
cookieMaxAge,
|
|
107
|
+
cookieSecure: env?.SESSION_COOKIE_SECURE !== "false",
|
|
108
|
+
cookieSameSite
|
|
109
|
+
};
|
|
110
|
+
}
|
|
111
|
+
|
|
112
|
+
export { decodeSession, defaultSessionConfig, encodeSession, getSessionConfig, isValidSessionData };
|
|
113
|
+
//# sourceMappingURL=session.js.map
|
|
114
|
+
//# sourceMappingURL=session.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../src/session.ts"],"names":[],"mappings":";AAsDO,IAAM,oBAAA,GAAsC;AAAA,EACjD,UAAA,EAAY,SAAA;AAAA,EACZ,YAAA,EAAc,EAAA,GAAK,EAAA,GAAK,EAAA,GAAK,CAAA;AAAA;AAAA,EAC7B,YAAA,EAAc,IAAA;AAAA,EACd,cAAA,EAAgB,KAAA;AAAA,EAChB,MAAA,EAAQ;AACV;AAMA,IAAM,SAAA,GAAY,SAAA;AAClB,IAAM,SAAA,GAAY,EAAA;AAClB,IAAM,UAAA,GAAa,GAAA;AAKnB,eAAe,iBAAiB,MAAA,EAAoC;AAClE,EAAA,MAAM,OAAA,GAAU,IAAI,WAAA,EAAY;AAChC,EAAA,OAAO,OAAO,MAAA,CAAO,SAAA;AAAA,IACnB,KAAA;AAAA,IACA,OAAA,CAAQ,MAAA,CAAO,MAAA,CAAO,MAAA,CAAO,EAAA,EAAI,GAAG,CAAA,CAAE,KAAA,CAAM,CAAA,EAAG,EAAE,CAAC,CAAA;AAAA,IAClD,EAAE,MAAM,SAAA,EAAU;AAAA,IAClB,KAAA;AAAA,IACA,CAAC,WAAW,SAAS;AAAA,GACvB;AACF;AAUA,eAAsB,aAAA,CAAc,SAAsB,MAAA,EAAkC;AAC1F,EAAA,MAAM,GAAA,GAAM,MAAM,gBAAA,CAAiB,MAAA,IAAU,qBAAqB,MAAM,CAAA;AACxE,EAAA,MAAM,KAAK,MAAA,CAAO,eAAA,CAAgB,IAAI,UAAA,CAAW,SAAS,CAAC,CAAA;AAC3D,EAAA,MAAM,OAAA,GAAU,IAAI,WAAA,EAAY;AAChC,EAAA,MAAM,OAAO,OAAA,CAAQ,MAAA,CAAO,IAAA,CAAK,SAAA,CAAU,OAAO,CAAC,CAAA;AAEnD,EAAA,MAAM,UAAA,GAAa,MAAM,MAAA,CAAO,MAAA,CAAO,OAAA;AAAA,IACrC,EAAE,IAAA,EAAM,SAAA,EAAW,EAAA,EAAI,WAAW,UAAA,EAAW;AAAA,IAC7C,GAAA;AAAA,IACA;AAAA,GACF;AAGA,EAAA,MAAM,WAAW,IAAI,UAAA,CAAW,EAAA,CAAG,MAAA,GAAS,WAAW,UAAU,CAAA;AACjE,EAAA,QAAA,CAAS,GAAA,CAAI,IAAI,CAAC,CAAA;AAClB,EAAA,QAAA,CAAS,IAAI,IAAI,UAAA,CAAW,UAAU,CAAA,EAAG,GAAG,MAAM,CAAA;AAElD,EAAA,OAAO,IAAA,CAAK,MAAA,CAAO,YAAA,CAAa,GAAG,QAAQ,CAAC,CAAA;AAC9C;AAUA,eAAsB,aAAA,CAAc,SAAiB,MAAA,EAA8C;AACjG,EAAA,IAAI;AACF,IAAA,MAAM,GAAA,GAAM,MAAM,gBAAA,CAAiB,MAAA,IAAU,qBAAqB,MAAM,CAAA;AACxE,IAAA,MAAM,QAAA,GAAW,UAAA,CAAW,IAAA,CAAK,IAAA,CAAK,OAAO,CAAA,EAAG,CAAC,CAAA,KAAM,CAAA,CAAE,UAAA,CAAW,CAAC,CAAC,CAAA;AAEtE,IAAA,MAAM,EAAA,GAAK,QAAA,CAAS,KAAA,CAAM,CAAA,EAAG,SAAS,CAAA;AACtC,IAAA,MAAM,UAAA,GAAa,QAAA,CAAS,KAAA,CAAM,SAAS,CAAA;AAE3C,IAAA,MAAM,SAAA,GAAY,MAAM,MAAA,CAAO,MAAA,CAAO,OAAA;AAAA,MACpC,EAAE,IAAA,EAAM,SAAA,EAAW,EAAA,EAAI,WAAW,UAAA,EAAW;AAAA,MAC7C,GAAA;AAAA,MACA;AAAA,KACF;AAEA,IAAA,MAAM,OAAA,GAAU,IAAI,WAAA,EAAY;AAChC,IAAA,MAAM,SAAkB,IAAA,CAAK,KAAA,CAAM,OAAA,CAAQ,MAAA,CAAO,SAAS,CAAC,CAAA;AAE5D,IAAA,IAAI,CAAC,kBAAA,CAAmB,MAAM,CAAA,EAAG;AAC/B,MAAA,OAAO,IAAA;AAAA,IACT;AAEA,IAAA,OAAO,MAAA;AAAA,EACT,CAAA,CAAA,MAAQ;AACN,IAAA,OAAO,IAAA;AAAA,EACT;AACF;AAKO,SAAS,mBAAmB,IAAA,EAAoC;AACrE,EAAA,IAAI,IAAA,KAAS,IAAA,IAAQ,OAAO,IAAA,KAAS,QAAA,EAAU;AAC7C,IAAA,OAAO,KAAA;AAAA,EACT;AAEA,EAAA,MAAM,OAAA,GAAU,IAAA;AAGhB,EAAA,IAAI,OAAO,OAAA,CAAQ,MAAA,KAAW,YAAY,OAAA,CAAQ,MAAA,CAAO,WAAW,CAAA,EAAG;AACrE,IAAA,OAAO,KAAA;AAAA,EACT;AACA,EAAA,IAAI,OAAO,OAAA,CAAQ,WAAA,KAAgB,YAAY,OAAA,CAAQ,WAAA,CAAY,WAAW,CAAA,EAAG;AAC/E,IAAA,OAAO,KAAA;AAAA,EACT;AAGA,EAAA,IAAI,QAAQ,cAAA,KAAmB,MAAA,IAAa,OAAO,OAAA,CAAQ,mBAAmB,QAAA,EAAU;AACtF,IAAA,OAAO,KAAA;AAAA,EACT;AACA,EAAA,IAAI,QAAQ,KAAA,KAAU,MAAA,IAAa,OAAO,OAAA,CAAQ,UAAU,QAAA,EAAU;AACpE,IAAA,OAAO,KAAA;AAAA,EACT;AACA,EAAA,IAAI,QAAQ,IAAA,KAAS,MAAA,IAAa,OAAO,OAAA,CAAQ,SAAS,QAAA,EAAU;AAClE,IAAA,OAAO,KAAA;AAAA,EACT;AACA,EAAA,IAAI,QAAQ,YAAA,KAAiB,MAAA,IAAa,OAAO,OAAA,CAAQ,iBAAiB,QAAA,EAAU;AAClF,IAAA,OAAO,KAAA;AAAA,EACT;AACA,EAAA,IAAI,QAAQ,SAAA,KAAc,MAAA,IAAa,OAAO,OAAA,CAAQ,cAAc,QAAA,EAAU;AAC5E,IAAA,OAAO,KAAA;AAAA,EACT;AAEA,EAAA,OAAO,IAAA;AACT;AAYO,SAAS,iBAAiB,GAAA,EAAyD;AACxF,EAAA,MAAM,aAAA,GAAgB,CAAC,QAAA,EAAU,KAAA,EAAO,MAAM,CAAA;AAE9C,EAAA,IAAI,iBAAkD,oBAAA,CAAqB,cAAA;AAC3E,EAAA,IAAI,KAAK,wBAAA,EAA0B;AACjC,IAAA,MAAM,QAAQ,GAAA,CAAI,wBAAA;AAClB,IAAA,IAAI,aAAA,CAAc,QAAA,CAAS,KAAqC,CAAA,EAAG;AACjE,MAAA,cAAA,GAAiB,KAAA;AAAA,IACnB;AAAA,EACF;AAEA,EAAA,IAAI,eAAe,oBAAA,CAAqB,YAAA;AACxC,EAAA,IAAI,KAAK,sBAAA,EAAwB;AAC/B,IAAA,MAAM,MAAA,GAAS,QAAA,CAAS,GAAA,CAAI,sBAAA,EAAwB,EAAE,CAAA;AACtD,IAAA,IAAI,CAAC,MAAA,CAAO,KAAA,CAAM,MAAM,CAAA,IAAK,SAAS,CAAA,EAAG;AACvC,MAAA,YAAA,GAAe,MAAA;AAAA,IACjB;AAAA,EACF;AAEA,EAAA,OAAO;AAAA,IACL,MAAA,EAAQ,GAAA,EAAK,cAAA,IAAkB,oBAAA,CAAqB,MAAA;AAAA,IACpD,UAAA,EAAY,GAAA,EAAK,mBAAA,IAAuB,oBAAA,CAAqB,UAAA;AAAA,IAC7D,YAAA;AAAA,IACA,YAAA,EAAc,KAAK,qBAAA,KAA0B,OAAA;AAAA,IAC7C;AAAA,GACF;AACF","file":"session.js","sourcesContent":["/**\n * oauth.do/session - Cookie-based session management with AES-GCM encryption\n *\n * Secure session encoding/decoding using Web Crypto API.\n * Zero dependencies - works in all environments that support Web Crypto.\n *\n * @example\n * ```ts\n * import { encodeSession, decodeSession } from 'oauth.do/session'\n *\n * const session = { userId: 'user_123', accessToken: 'tok_abc' }\n * const encoded = await encodeSession(session, 'my-secret-key')\n * const decoded = await decodeSession(encoded, 'my-secret-key')\n * ```\n */\n\n// ─────────────────────────────────────────────────────────────────\n// Types\n// ─────────────────────────────────────────────────────────────────\n\n/**\n * Session data stored in encrypted cookie\n */\nexport interface SessionData {\n userId: string\n organizationId?: string\n email?: string\n name?: string\n accessToken: string\n refreshToken?: string\n expiresAt?: number\n /** Extensible: apps can add custom fields */\n [key: string]: unknown\n}\n\n/**\n * Configuration for session management\n */\nexport interface SessionConfig {\n /** Cookie name (default: 'session') */\n cookieName: string\n /** Cookie max age in seconds (default: 604800 = 7 days) */\n cookieMaxAge: number\n /** Cookie secure flag (default: true) */\n cookieSecure: boolean\n /** Cookie SameSite attribute (default: 'lax') */\n cookieSameSite: 'strict' | 'lax' | 'none'\n /** Encryption secret (required in production) */\n secret: string\n}\n\n/**\n * Default session configuration\n */\nexport const defaultSessionConfig: SessionConfig = {\n cookieName: 'session',\n cookieMaxAge: 60 * 60 * 24 * 7, // 7 days\n cookieSecure: true,\n cookieSameSite: 'lax',\n secret: 'oauth-do-dev-secret-change-in-production',\n}\n\n// ─────────────────────────────────────────────────────────────────\n// AES-GCM Encryption\n// ─────────────────────────────────────────────────────────────────\n\nconst ALGORITHM = 'AES-GCM'\nconst IV_LENGTH = 12\nconst TAG_LENGTH = 128\n\n/**\n * Derive an AES-GCM encryption key from a secret string\n */\nasync function getEncryptionKey(secret: string): Promise<CryptoKey> {\n const encoder = new TextEncoder()\n return crypto.subtle.importKey(\n 'raw',\n encoder.encode(secret.padEnd(32, '0').slice(0, 32)),\n { name: ALGORITHM },\n false,\n ['encrypt', 'decrypt']\n )\n}\n\n/**\n * Encode session data with AES-GCM encryption.\n * Format: base64(IV || ciphertext || auth tag)\n *\n * @param session - Session data to encrypt\n * @param secret - Encryption secret (min 16 chars recommended)\n * @returns Base64-encoded encrypted session string\n */\nexport async function encodeSession(session: SessionData, secret?: string): Promise<string> {\n const key = await getEncryptionKey(secret ?? defaultSessionConfig.secret)\n const iv = crypto.getRandomValues(new Uint8Array(IV_LENGTH))\n const encoder = new TextEncoder()\n const data = encoder.encode(JSON.stringify(session))\n\n const ciphertext = await crypto.subtle.encrypt(\n { name: ALGORITHM, iv, tagLength: TAG_LENGTH },\n key,\n data\n )\n\n // Combine IV + ciphertext (ciphertext includes auth tag)\n const combined = new Uint8Array(iv.length + ciphertext.byteLength)\n combined.set(iv, 0)\n combined.set(new Uint8Array(ciphertext), iv.length)\n\n return btoa(String.fromCharCode(...combined))\n}\n\n/**\n * Decode session data with AES-GCM decryption.\n * Returns null if decryption fails or data is invalid.\n *\n * @param encoded - Base64-encoded encrypted session string\n * @param secret - Encryption secret (must match the one used for encoding)\n * @returns Decoded session data or null\n */\nexport async function decodeSession(encoded: string, secret?: string): Promise<SessionData | null> {\n try {\n const key = await getEncryptionKey(secret ?? defaultSessionConfig.secret)\n const combined = Uint8Array.from(atob(encoded), (c) => c.charCodeAt(0))\n\n const iv = combined.slice(0, IV_LENGTH)\n const ciphertext = combined.slice(IV_LENGTH)\n\n const decrypted = await crypto.subtle.decrypt(\n { name: ALGORITHM, iv, tagLength: TAG_LENGTH },\n key,\n ciphertext\n )\n\n const decoder = new TextDecoder()\n const parsed: unknown = JSON.parse(decoder.decode(decrypted))\n\n if (!isValidSessionData(parsed)) {\n return null\n }\n\n return parsed\n } catch {\n return null\n }\n}\n\n/**\n * Validate that session data has the required structure\n */\nexport function isValidSessionData(data: unknown): data is SessionData {\n if (data === null || typeof data !== 'object') {\n return false\n }\n\n const session = data as Record<string, unknown>\n\n // Required fields\n if (typeof session.userId !== 'string' || session.userId.length === 0) {\n return false\n }\n if (typeof session.accessToken !== 'string' || session.accessToken.length === 0) {\n return false\n }\n\n // Optional fields type validation\n if (session.organizationId !== undefined && typeof session.organizationId !== 'string') {\n return false\n }\n if (session.email !== undefined && typeof session.email !== 'string') {\n return false\n }\n if (session.name !== undefined && typeof session.name !== 'string') {\n return false\n }\n if (session.refreshToken !== undefined && typeof session.refreshToken !== 'string') {\n return false\n }\n if (session.expiresAt !== undefined && typeof session.expiresAt !== 'number') {\n return false\n }\n\n return true\n}\n\n/**\n * Get session config from environment variables with defaults.\n *\n * Environment variables:\n * - SESSION_SECRET: Encryption secret\n * - SESSION_COOKIE_NAME: Cookie name\n * - SESSION_COOKIE_MAX_AGE: Cookie max age in seconds\n * - SESSION_COOKIE_SECURE: 'true' or 'false'\n * - SESSION_COOKIE_SAME_SITE: 'strict', 'lax', or 'none'\n */\nexport function getSessionConfig(env?: Record<string, string | undefined>): SessionConfig {\n const validSameSite = ['strict', 'lax', 'none'] as const\n\n let cookieSameSite: SessionConfig['cookieSameSite'] = defaultSessionConfig.cookieSameSite\n if (env?.SESSION_COOKIE_SAME_SITE) {\n const value = env.SESSION_COOKIE_SAME_SITE\n if (validSameSite.includes(value as typeof validSameSite[number])) {\n cookieSameSite = value as SessionConfig['cookieSameSite']\n }\n }\n\n let cookieMaxAge = defaultSessionConfig.cookieMaxAge\n if (env?.SESSION_COOKIE_MAX_AGE) {\n const parsed = parseInt(env.SESSION_COOKIE_MAX_AGE, 10)\n if (!Number.isNaN(parsed) && parsed > 0) {\n cookieMaxAge = parsed\n }\n }\n\n return {\n secret: env?.SESSION_SECRET ?? defaultSessionConfig.secret,\n cookieName: env?.SESSION_COOKIE_NAME ?? defaultSessionConfig.cookieName,\n cookieMaxAge,\n cookieSecure: env?.SESSION_COOKIE_SECURE !== 'false',\n cookieSameSite,\n }\n}\n"]}
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "oauth.do",
|
|
3
|
-
"version": "0.2.
|
|
3
|
+
"version": "0.2.1",
|
|
4
4
|
"description": "OAuth authentication SDK, React components, and Hono middleware for org.ai identity",
|
|
5
5
|
"type": "module",
|
|
6
6
|
"main": "./dist/index.js",
|
|
@@ -38,6 +38,10 @@
|
|
|
38
38
|
"types": "./dist/types-export.d.ts",
|
|
39
39
|
"import": "./dist/types-export.js"
|
|
40
40
|
},
|
|
41
|
+
"./session": {
|
|
42
|
+
"types": "./dist/session.d.ts",
|
|
43
|
+
"import": "./dist/session.js"
|
|
44
|
+
},
|
|
41
45
|
"./mdx/*": "./src/mdx/*"
|
|
42
46
|
},
|
|
43
47
|
"files": [
|