xypriss 3.2.0 → 3.2.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (34) hide show
  1. package/dist/cjs/src/middleware/built-in/BuiltInMiddleware.js +51 -8
  2. package/dist/cjs/src/middleware/built-in/BuiltInMiddleware.js.map +1 -1
  3. package/dist/cjs/src/middleware/built-in/security/RequestSignatureProtector.js +20 -4
  4. package/dist/cjs/src/middleware/built-in/security/RequestSignatureProtector.js.map +1 -1
  5. package/dist/cjs/src/server/const/default.js +38 -5
  6. package/dist/cjs/src/server/const/default.js.map +1 -1
  7. package/dist/esm/src/middleware/built-in/BuiltInMiddleware.js +51 -8
  8. package/dist/esm/src/middleware/built-in/BuiltInMiddleware.js.map +1 -1
  9. package/dist/esm/src/middleware/built-in/security/RequestSignatureProtector.js +20 -4
  10. package/dist/esm/src/middleware/built-in/security/RequestSignatureProtector.js.map +1 -1
  11. package/dist/esm/src/server/const/default.js +38 -5
  12. package/dist/esm/src/server/const/default.js.map +1 -1
  13. package/dist/index.d.ts +16 -0
  14. package/package.json +1 -1
  15. package/dist/cjs/mods/security/src/core/crypt.js +0 -56
  16. package/dist/cjs/mods/security/src/core/crypt.js.map +0 -1
  17. package/dist/cjs/src/middleware/built-in/index.js +0 -325
  18. package/dist/cjs/src/middleware/built-in/index.js.map +0 -1
  19. package/dist/cjs/src/middleware/built-in/sqlInjection.js +0 -335
  20. package/dist/cjs/src/middleware/built-in/sqlInjection.js.map +0 -1
  21. package/dist/cjs/src/server/conf/rateLimitConfig.js +0 -35
  22. package/dist/cjs/src/server/conf/rateLimitConfig.js.map +0 -1
  23. package/dist/cjs/src/server/utils/wildcardMatcher.js +0 -92
  24. package/dist/cjs/src/server/utils/wildcardMatcher.js.map +0 -1
  25. package/dist/esm/mods/security/src/core/crypt.js +0 -54
  26. package/dist/esm/mods/security/src/core/crypt.js.map +0 -1
  27. package/dist/esm/src/middleware/built-in/index.js +0 -323
  28. package/dist/esm/src/middleware/built-in/index.js.map +0 -1
  29. package/dist/esm/src/middleware/built-in/sqlInjection.js +0 -333
  30. package/dist/esm/src/middleware/built-in/sqlInjection.js.map +0 -1
  31. package/dist/esm/src/server/conf/rateLimitConfig.js +0 -33
  32. package/dist/esm/src/server/conf/rateLimitConfig.js.map +0 -1
  33. package/dist/esm/src/server/utils/wildcardMatcher.js +0 -88
  34. package/dist/esm/src/server/utils/wildcardMatcher.js.map +0 -1
@@ -1,335 +0,0 @@
1
- 'use strict';
2
-
3
- class SQLInjectionDetector {
4
- constructor(config = {}) {
5
- // High-confidence SQL injection patterns (more specific to reduce false positives)
6
- this.highRiskPatterns = [
7
- // Union attacks with SELECT
8
- /(\s|^)(union|UNION)(\s)+(all\s+)?(select|SELECT)/gi,
9
- // SQL comments at end of input or before SQL keywords
10
- /(--|#|\/\*).*?(select|union|drop|delete|insert|update|create|alter)/gi,
11
- /;(\s)*--.*/gi,
12
- // Enhanced boolean injections (more comprehensive)
13
- /(\s|^)(or|OR)(\s)+('?\d+'?\s*=\s*'?\d+'?|'[^']*'\s*=\s*'[^']*'|true|false)/gi,
14
- /(\s|^)(and|AND)(\s)+('?\d+'?\s*=\s*'?\d+'?|'[^']*'\s*=\s*'[^']*'|true|false)/gi,
15
- // Quote-based boolean injections
16
- /'(\s)+(or|OR|and|AND)(\s)+'/gi,
17
- // Comment-obfuscated patterns
18
- /\/\*.*?\*\/(or|OR|and|AND)\/\*.*?\*\//gi,
19
- // Time-based with specific syntax (enhanced)
20
- /(sleep|SLEEP|waitfor|WAITFOR|delay|DELAY)\s*\(.*?\)/gi,
21
- /(waitfor|WAITFOR)\s+(delay|DELAY)\s+'/gi,
22
- // System stored procedures
23
- /(exec|EXEC|execute|EXECUTE)\s+(sp_|xp_)\w+/gi,
24
- // Information schema with specific queries
25
- /(information_schema|INFORMATION_SCHEMA)\.(tables|columns|schemata)/gi,
26
- // Dangerous DDL operations with semicolons
27
- /;(\s)*(drop|DROP|delete|DELETE|truncate|TRUNCATE)\s+(table|database)/gi,
28
- // Hex encoding of common injection strings
29
- /0x(27|22|5C|2D|2D)/gi, // ', ", \, --
30
- // Multiple quotes for quote breaking
31
- /('{3,}|"{3,})/g,
32
- // Stacked queries with dangerous operations
33
- /;(\s)*(drop|delete|insert|update|create|alter)(\s)+/gi,
34
- ];
35
- // Medium risk patterns (require context analysis)
36
- this.mediumRiskPatterns = [
37
- // Single SQL keywords (common in legitimate text)
38
- /\b(select|union|drop|delete|insert|update|create|alter)\b/gi,
39
- // Simple OR/AND conditions
40
- /\b(or|and)\s+\w+\s*=\s*\w+/gi,
41
- // Single quotes or double quotes
42
- /'/g,
43
- /"/g,
44
- // Basic SQL comments
45
- /(--|#)/g,
46
- // Wildcards
47
- /[%_]/g,
48
- ];
49
- // Characters that are suspicious in certain contexts
50
- this.contextSensitiveChars = /[';\"\\%_]/g;
51
- this.config = {
52
- strictMode: config.strictMode ?? false,
53
- allowedChars: config.allowedChars ?? /^[a-zA-Z0-9\s\-@.!?,()]+$/,
54
- maxLength: config.maxLength ?? 1000,
55
- logAttempts: config.logAttempts ?? true,
56
- contextualAnalysis: config.contextualAnalysis ?? true,
57
- falsePositiveThreshold: config.falsePositiveThreshold ?? 0.6,
58
- };
59
- }
60
- /**
61
- * Main detection method with improved false positive handling
62
- */
63
- detect(input, context) {
64
- if (!input || typeof input !== "string") {
65
- return {
66
- isMalicious: false,
67
- confidence: 0,
68
- detectedPatterns: [],
69
- riskLevel: "LOW",
70
- };
71
- }
72
- const result = {
73
- isMalicious: false,
74
- confidence: 0,
75
- detectedPatterns: [],
76
- sanitizedInput: input,
77
- riskLevel: "LOW",
78
- };
79
- // Check input length (very long inputs are suspicious)
80
- if (input.length > this.config.maxLength) {
81
- result.confidence += 0.2; // Reduced penalty for length
82
- result.detectedPatterns.push("Excessive length");
83
- }
84
- // High-risk pattern analysis (strong indicators)
85
- let highRiskScore = 0;
86
- this.highRiskPatterns.forEach((pattern, index) => {
87
- const matches = input.match(pattern);
88
- if (matches) {
89
- const patternName = this.getHighRiskPatternName(index);
90
- result.detectedPatterns.push(`${patternName}: ${matches.join(", ")}`);
91
- highRiskScore += this.getHighRiskPatternWeight(index);
92
- }
93
- });
94
- // Medium-risk pattern analysis (context-dependent)
95
- let mediumRiskScore = 0;
96
- if (this.config.contextualAnalysis) {
97
- mediumRiskScore = this.analyzeContext(input, context || "");
98
- }
99
- else {
100
- // Basic medium risk analysis without context
101
- this.mediumRiskPatterns.forEach((pattern, index) => {
102
- const matches = input.match(pattern);
103
- if (matches) {
104
- mediumRiskScore += 0.1 * matches.length; // Lower weight for medium risk
105
- }
106
- });
107
- }
108
- // Contextual analysis for legitimate use cases
109
- const legitimacyScore = this.calculateLegitimacyScore(input);
110
- // Calculate confidence with false positive mitigation
111
- const rawScore = highRiskScore + mediumRiskScore * 0.3;
112
- result.confidence = Math.max(0, rawScore - legitimacyScore);
113
- result.confidence = Math.min(result.confidence, 1.0);
114
- // Determine risk level and malicious status
115
- if (result.confidence >= 0.8) {
116
- result.riskLevel = "CRITICAL";
117
- result.isMalicious = true;
118
- }
119
- else if (result.confidence >= this.config.falsePositiveThreshold) {
120
- result.riskLevel = "HIGH";
121
- result.isMalicious = true;
122
- }
123
- else if (result.confidence >= 0.3) {
124
- result.riskLevel = "MEDIUM";
125
- result.isMalicious = false; // Don't block medium risk by default
126
- }
127
- else {
128
- result.riskLevel = "LOW";
129
- result.isMalicious = false;
130
- }
131
- // Log only high confidence attempts
132
- if (this.config.logAttempts && result.confidence >= 0.7) {
133
- this.logAttempt(input, result);
134
- }
135
- // Provide sanitized version only for high-risk inputs
136
- if (result.confidence >= 0.4) {
137
- result.sanitizedInput = this.smartSanitize(input);
138
- }
139
- return result;
140
- }
141
- /**
142
- * Analyze context to reduce false positives
143
- */
144
- analyzeContext(input, context) {
145
- let score = 0;
146
- // Check for legitimate business contexts
147
- const businessContexts = [
148
- "search",
149
- "filter",
150
- "name",
151
- "description",
152
- "comment",
153
- "review",
154
- "address",
155
- "title",
156
- "content",
157
- "message",
158
- "email",
159
- ];
160
- const isBusinessContext = businessContexts.some((ctx) => context.toLowerCase().includes(ctx));
161
- this.mediumRiskPatterns.forEach((pattern, index) => {
162
- const matches = input.match(pattern);
163
- if (matches) {
164
- let patternScore = 0.1 * matches.length;
165
- // Reduce score for legitimate contexts
166
- if (isBusinessContext) {
167
- patternScore *= 0.3; // Reduce by 70%
168
- }
169
- // Special handling for common false positives
170
- if (index === 0 && isBusinessContext) {
171
- // SQL keywords in business text
172
- patternScore *= 0.1; // Very low weight for SQL keywords in business context
173
- }
174
- if (index === 2 || index === 3) {
175
- // Single quotes in names, descriptions
176
- if (context.includes("name") ||
177
- context.includes("description")) {
178
- patternScore *= 0.2;
179
- }
180
- }
181
- score += patternScore;
182
- }
183
- });
184
- return score;
185
- }
186
- /**
187
- * Calculate legitimacy score to offset false positives
188
- */
189
- calculateLegitimacyScore(input) {
190
- let legitimacyScore = 0;
191
- // Natural language indicators
192
- const naturalWords = input.match(/\b[a-zA-Z]{3,}\b/g);
193
- if (naturalWords && naturalWords.length > 2) {
194
- legitimacyScore += 0.2; // Looks like natural text
195
- }
196
- // Check for common legitimate patterns
197
- const legitimatePatterns = [
198
- /^[A-Z][a-z]+\s[A-Z][a-z]+$/, // First Last name
199
- /^[\w\.-]+@[\w\.-]+\.\w+$/, // Email
200
- /^\d{1,5}\s\w+(\s\w+)*$/, // Address format
201
- /^[A-Za-z0-9\s\-.,!?()]+$/, // Normal text with punctuation
202
- ];
203
- legitimatePatterns.forEach((pattern) => {
204
- if (pattern.test(input)) {
205
- legitimacyScore += 0.15;
206
- }
207
- });
208
- // Length-based legitimacy (very short or very specific lengths are more suspicious)
209
- if (input.length > 10 && input.length < 200) {
210
- legitimacyScore += 0.1;
211
- }
212
- // Check for balanced quotes (legitimate text often has balanced quotes)
213
- const singleQuotes = (input.match(/'/g) || []).length;
214
- const doubleQuotes = (input.match(/"/g) || []).length;
215
- if (singleQuotes % 2 === 0 && doubleQuotes % 2 === 0) {
216
- legitimacyScore += 0.1;
217
- }
218
- return Math.min(legitimacyScore, 0.5); // Cap legitimacy score
219
- }
220
- /**
221
- * Smart sanitization that preserves legitimate content
222
- */
223
- smartSanitize(input) {
224
- if (!input)
225
- return input;
226
- let sanitized = input;
227
- // Only remove obvious SQL injection patterns, not all SQL keywords
228
- sanitized = sanitized.replace(/(--|#).*$/gm, ""); // Remove comment tails
229
- sanitized = sanitized.replace(/\/\*.*?\*\//g, ""); // Remove /* */ comments
230
- // Only escape quotes if they appear to be part of injection attempts
231
- const suspiciousQuotes = /'(\s*(or|and|union|select)\s|;|\s*--)/gi;
232
- sanitized = sanitized.replace(suspiciousQuotes, "''$1");
233
- // Remove only dangerous control characters
234
- sanitized = sanitized.replace(/[\x00\x1a]/g, "");
235
- // Only remove semicolons if followed by SQL keywords
236
- sanitized = sanitized.replace(/;(\s)*(drop|delete|insert|update|create|alter|union|select)/gi, " $2");
237
- return sanitized.trim();
238
- }
239
- /**
240
- * Validate and sanitize input, throwing error if malicious
241
- */
242
- validateAndSanitize(input, throwOnDetection = false) {
243
- const result = this.detect(input);
244
- if (result.isMalicious && throwOnDetection) {
245
- throw new Error(`SQL injection attempt detected. Confidence: ${(result.confidence * 100).toFixed(1)}%. ` +
246
- `Patterns: ${result.detectedPatterns.join(", ")}`);
247
- }
248
- return result.sanitizedInput || "";
249
- }
250
- /**
251
- * Create parameterized query helper
252
- */
253
- createParameterizedQuery(query, params) {
254
- // Simple parameterization helper
255
- let parameterizedQuery = query;
256
- const safeParams = [];
257
- params.forEach((param, index) => {
258
- if (typeof param === "string") {
259
- const result = this.detect(param);
260
- if (result.isMalicious) {
261
- throw new Error(`Parameter ${index} contains potential SQL injection`);
262
- }
263
- safeParams.push(result.sanitizedInput);
264
- }
265
- else {
266
- safeParams.push(param);
267
- }
268
- });
269
- return { query: parameterizedQuery, params: safeParams };
270
- }
271
- getHighRiskPatternName(index) {
272
- const names = [
273
- "Union-Select attack",
274
- "Commented injection",
275
- "Comment with semicolon",
276
- "Enhanced boolean OR",
277
- "Enhanced boolean AND",
278
- "Quote-based boolean",
279
- "Comment-obfuscated injection",
280
- "Time-based delay",
281
- "WAITFOR delay attack",
282
- "System procedure call",
283
- "Information schema query",
284
- "DDL with semicolon",
285
- "Hex-encoded injection",
286
- "Quote sequence attack",
287
- "Stacked query attack",
288
- ];
289
- return names[index] || `High-risk pattern ${index}`;
290
- }
291
- getHighRiskPatternWeight(index) {
292
- // Higher weights for more definitive attack patterns
293
- const weights = [
294
- 0.9, // Union-Select attack
295
- 0.8, // Commented injection
296
- 0.7, // Comment with semicolon
297
- 0.8, // Enhanced boolean OR
298
- 0.8, // Enhanced boolean AND
299
- 0.7, // Quote-based boolean
300
- 0.8, // Comment-obfuscated injection
301
- 0.9, // Time-based delay
302
- 0.8, // WAITFOR delay attack
303
- 0.8, // System procedure call
304
- 0.7, // Information schema query
305
- 0.9, // DDL with semicolon
306
- 0.6, // Hex-encoded injection
307
- 0.5, // Quote sequence attack
308
- 0.8, // Stacked query attack
309
- ];
310
- return weights[index] || 0.7;
311
- }
312
- logAttempt(input, result) {
313
- console.warn(`SQL Injection Attempt Detected:`, {
314
- timestamp: new Date().toISOString(),
315
- input: input.substring(0, 100) + (input.length > 100 ? "..." : ""),
316
- confidence: result.confidence,
317
- patterns: result.detectedPatterns,
318
- });
319
- }
320
- /**
321
- * Update configuration
322
- */
323
- updateConfig(newConfig) {
324
- this.config = { ...this.config, ...newConfig };
325
- }
326
- /**
327
- * Get current configuration
328
- */
329
- getConfig() {
330
- return { ...this.config };
331
- }
332
- }
333
-
334
- module.exports = SQLInjectionDetector;
335
- //# sourceMappingURL=sqlInjection.js.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"sqlInjection.js","sources":["../../../../../src/middleware/built-in/sqlInjection.ts"],"sourcesContent":[null],"names":[],"mappings":";;AAiBA,MAAM,oBAAoB,CAAA;AAmEtB,IAAA,WAAA,CAAY,SAA6B,EAAE,EAAA;;AA/D1B,QAAA,IAAA,CAAA,gBAAgB,GAAG;;YAEhC,oDAAoD;;YAGpD,uEAAuE;YACvE,cAAc;;YAGd,8EAA8E;YAC9E,gFAAgF;;YAGhF,+BAA+B;;YAG/B,yCAAyC;;YAGzC,uDAAuD;YACvD,yCAAyC;;YAGzC,8CAA8C;;YAG9C,sEAAsE;;YAGtE,wEAAwE;;AAGxE,YAAA,sBAAsB;;YAGtB,gBAAgB;;YAGhB,uDAAuD;SAC1D,CAAC;;AAGe,QAAA,IAAA,CAAA,kBAAkB,GAAG;;YAElC,6DAA6D;;YAG7D,8BAA8B;;YAG9B,IAAI;YACJ,IAAI;;YAGJ,SAAS;;YAGT,OAAO;SACV,CAAC;;QAGe,IAAqB,CAAA,qBAAA,GAAG,aAAa,CAAC;QAGnD,IAAI,CAAC,MAAM,GAAG;AACV,YAAA,UAAU,EAAE,MAAM,CAAC,UAAU,IAAI,KAAK;AACtC,YAAA,YAAY,EAAE,MAAM,CAAC,YAAY,IAAI,2BAA2B;AAChE,YAAA,SAAS,EAAE,MAAM,CAAC,SAAS,IAAI,IAAI;AACnC,YAAA,WAAW,EAAE,MAAM,CAAC,WAAW,IAAI,IAAI;AACvC,YAAA,kBAAkB,EAAE,MAAM,CAAC,kBAAkB,IAAI,IAAI;AACrD,YAAA,sBAAsB,EAAE,MAAM,CAAC,sBAAsB,IAAI,GAAG;SAC/D,CAAC;KACL;AAED;;AAEG;IACH,MAAM,CACF,KAAgC,EAChC,OAAgB,EAAA;QAEhB,IAAI,CAAC,KAAK,IAAI,OAAO,KAAK,KAAK,QAAQ,EAAE;YACrC,OAAO;AACH,gBAAA,WAAW,EAAE,KAAK;AAClB,gBAAA,UAAU,EAAE,CAAC;AACb,gBAAA,gBAAgB,EAAE,EAAE;AACpB,gBAAA,SAAS,EAAE,KAAK;aACnB,CAAC;SACL;AAED,QAAA,MAAM,MAAM,GAAoB;AAC5B,YAAA,WAAW,EAAE,KAAK;AAClB,YAAA,UAAU,EAAE,CAAC;AACb,YAAA,gBAAgB,EAAE,EAAE;AACpB,YAAA,cAAc,EAAE,KAAK;AACrB,YAAA,SAAS,EAAE,KAAK;SACnB,CAAC;;QAGF,IAAI,KAAK,CAAC,MAAM,GAAG,IAAI,CAAC,MAAM,CAAC,SAAS,EAAE;AACtC,YAAA,MAAM,CAAC,UAAU,IAAI,GAAG,CAAC;AACzB,YAAA,MAAM,CAAC,gBAAgB,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC;SACpD;;QAGD,IAAI,aAAa,GAAG,CAAC,CAAC;QACtB,IAAI,CAAC,gBAAgB,CAAC,OAAO,CAAC,CAAC,OAAO,EAAE,KAAK,KAAI;YAC7C,MAAM,OAAO,GAAG,KAAK,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC;YACrC,IAAI,OAAO,EAAE;gBACT,MAAM,WAAW,GAAG,IAAI,CAAC,sBAAsB,CAAC,KAAK,CAAC,CAAC;AACvD,gBAAA,MAAM,CAAC,gBAAgB,CAAC,IAAI,CACxB,GAAG,WAAW,CAAA,EAAA,EAAK,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,CAAA,CAAE,CAC1C,CAAC;AACF,gBAAA,aAAa,IAAI,IAAI,CAAC,wBAAwB,CAAC,KAAK,CAAC,CAAC;aACzD;AACL,SAAC,CAAC,CAAC;;QAGH,IAAI,eAAe,GAAG,CAAC,CAAC;AACxB,QAAA,IAAI,IAAI,CAAC,MAAM,CAAC,kBAAkB,EAAE;YAChC,eAAe,GAAG,IAAI,CAAC,cAAc,CAAC,KAAK,EAAE,OAAO,IAAI,EAAE,CAAC,CAAC;SAC/D;aAAM;;YAEH,IAAI,CAAC,kBAAkB,CAAC,OAAO,CAAC,CAAC,OAAO,EAAE,KAAK,KAAI;gBAC/C,MAAM,OAAO,GAAG,KAAK,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC;gBACrC,IAAI,OAAO,EAAE;oBACT,eAAe,IAAI,GAAG,GAAG,OAAO,CAAC,MAAM,CAAC;iBAC3C;AACL,aAAC,CAAC,CAAC;SACN;;QAGD,MAAM,eAAe,GAAG,IAAI,CAAC,wBAAwB,CAAC,KAAK,CAAC,CAAC;;AAG7D,QAAA,MAAM,QAAQ,GAAG,aAAa,GAAG,eAAe,GAAG,GAAG,CAAC;AACvD,QAAA,MAAM,CAAC,UAAU,GAAG,IAAI,CAAC,GAAG,CAAC,CAAC,EAAE,QAAQ,GAAG,eAAe,CAAC,CAAC;AAC5D,QAAA,MAAM,CAAC,UAAU,GAAG,IAAI,CAAC,GAAG,CAAC,MAAM,CAAC,UAAU,EAAE,GAAG,CAAC,CAAC;;AAGrD,QAAA,IAAI,MAAM,CAAC,UAAU,IAAI,GAAG,EAAE;AAC1B,YAAA,MAAM,CAAC,SAAS,GAAG,UAAU,CAAC;AAC9B,YAAA,MAAM,CAAC,WAAW,GAAG,IAAI,CAAC;SAC7B;aAAM,IAAI,MAAM,CAAC,UAAU,IAAI,IAAI,CAAC,MAAM,CAAC,sBAAsB,EAAE;AAChE,YAAA,MAAM,CAAC,SAAS,GAAG,MAAM,CAAC;AAC1B,YAAA,MAAM,CAAC,WAAW,GAAG,IAAI,CAAC;SAC7B;AAAM,aAAA,IAAI,MAAM,CAAC,UAAU,IAAI,GAAG,EAAE;AACjC,YAAA,MAAM,CAAC,SAAS,GAAG,QAAQ,CAAC;AAC5B,YAAA,MAAM,CAAC,WAAW,GAAG,KAAK,CAAC;SAC9B;aAAM;AACH,YAAA,MAAM,CAAC,SAAS,GAAG,KAAK,CAAC;AACzB,YAAA,MAAM,CAAC,WAAW,GAAG,KAAK,CAAC;SAC9B;;AAGD,QAAA,IAAI,IAAI,CAAC,MAAM,CAAC,WAAW,IAAI,MAAM,CAAC,UAAU,IAAI,GAAG,EAAE;AACrD,YAAA,IAAI,CAAC,UAAU,CAAC,KAAK,EAAE,MAAM,CAAC,CAAC;SAClC;;AAGD,QAAA,IAAI,MAAM,CAAC,UAAU,IAAI,GAAG,EAAE;YAC1B,MAAM,CAAC,cAAc,GAAG,IAAI,CAAC,aAAa,CAAC,KAAK,CAAC,CAAC;SACrD;AAED,QAAA,OAAO,MAAM,CAAC;KACjB;AAED;;AAEG;IACK,cAAc,CAAC,KAAa,EAAE,OAAe,EAAA;QACjD,IAAI,KAAK,GAAG,CAAC,CAAC;;AAGd,QAAA,MAAM,gBAAgB,GAAG;YACrB,QAAQ;YACR,QAAQ;YACR,MAAM;YACN,aAAa;YACb,SAAS;YACT,QAAQ;YACR,SAAS;YACT,OAAO;YACP,SAAS;YACT,SAAS;YACT,OAAO;SACV,CAAC;QAEF,MAAM,iBAAiB,GAAG,gBAAgB,CAAC,IAAI,CAAC,CAAC,GAAG,KAChD,OAAO,CAAC,WAAW,EAAE,CAAC,QAAQ,CAAC,GAAG,CAAC,CACtC,CAAC;QAEF,IAAI,CAAC,kBAAkB,CAAC,OAAO,CAAC,CAAC,OAAO,EAAE,KAAK,KAAI;YAC/C,MAAM,OAAO,GAAG,KAAK,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC;YACrC,IAAI,OAAO,EAAE;AACT,gBAAA,IAAI,YAAY,GAAG,GAAG,GAAG,OAAO,CAAC,MAAM,CAAC;;gBAGxC,IAAI,iBAAiB,EAAE;AACnB,oBAAA,YAAY,IAAI,GAAG,CAAC;iBACvB;;AAGD,gBAAA,IAAI,KAAK,KAAK,CAAC,IAAI,iBAAiB,EAAE;;AAElC,oBAAA,YAAY,IAAI,GAAG,CAAC;iBACvB;gBAED,IAAI,KAAK,KAAK,CAAC,IAAI,KAAK,KAAK,CAAC,EAAE;;AAE5B,oBAAA,IACI,OAAO,CAAC,QAAQ,CAAC,MAAM,CAAC;AACxB,wBAAA,OAAO,CAAC,QAAQ,CAAC,aAAa,CAAC,EACjC;wBACE,YAAY,IAAI,GAAG,CAAC;qBACvB;iBACJ;gBAED,KAAK,IAAI,YAAY,CAAC;aACzB;AACL,SAAC,CAAC,CAAC;AAEH,QAAA,OAAO,KAAK,CAAC;KAChB;AAED;;AAEG;AACK,IAAA,wBAAwB,CAAC,KAAa,EAAA;QAC1C,IAAI,eAAe,GAAG,CAAC,CAAC;;QAGxB,MAAM,YAAY,GAAG,KAAK,CAAC,KAAK,CAAC,mBAAmB,CAAC,CAAC;QACtD,IAAI,YAAY,IAAI,YAAY,CAAC,MAAM,GAAG,CAAC,EAAE;AACzC,YAAA,eAAe,IAAI,GAAG,CAAC;SAC1B;;AAGD,QAAA,MAAM,kBAAkB,GAAG;AACvB,YAAA,4BAA4B;AAC5B,YAAA,0BAA0B;AAC1B,YAAA,wBAAwB;AACxB,YAAA,0BAA0B;SAC7B,CAAC;AAEF,QAAA,kBAAkB,CAAC,OAAO,CAAC,CAAC,OAAO,KAAI;AACnC,YAAA,IAAI,OAAO,CAAC,IAAI,CAAC,KAAK,CAAC,EAAE;gBACrB,eAAe,IAAI,IAAI,CAAC;aAC3B;AACL,SAAC,CAAC,CAAC;;AAGH,QAAA,IAAI,KAAK,CAAC,MAAM,GAAG,EAAE,IAAI,KAAK,CAAC,MAAM,GAAG,GAAG,EAAE;YACzC,eAAe,IAAI,GAAG,CAAC;SAC1B;;AAGD,QAAA,MAAM,YAAY,GAAG,CAAC,KAAK,CAAC,KAAK,CAAC,IAAI,CAAC,IAAI,EAAE,EAAE,MAAM,CAAC;AACtD,QAAA,MAAM,YAAY,GAAG,CAAC,KAAK,CAAC,KAAK,CAAC,IAAI,CAAC,IAAI,EAAE,EAAE,MAAM,CAAC;AACtD,QAAA,IAAI,YAAY,GAAG,CAAC,KAAK,CAAC,IAAI,YAAY,GAAG,CAAC,KAAK,CAAC,EAAE;YAClD,eAAe,IAAI,GAAG,CAAC;SAC1B;QAED,OAAO,IAAI,CAAC,GAAG,CAAC,eAAe,EAAE,GAAG,CAAC,CAAC;KACzC;AAED;;AAEG;AACH,IAAA,aAAa,CAAC,KAAa,EAAA;AACvB,QAAA,IAAI,CAAC,KAAK;AAAE,YAAA,OAAO,KAAK,CAAC;QAEzB,IAAI,SAAS,GAAG,KAAK,CAAC;;QAGtB,SAAS,GAAG,SAAS,CAAC,OAAO,CAAC,aAAa,EAAE,EAAE,CAAC,CAAC;QACjD,SAAS,GAAG,SAAS,CAAC,OAAO,CAAC,cAAc,EAAE,EAAE,CAAC,CAAC;;QAGlD,MAAM,gBAAgB,GAAG,yCAAyC,CAAC;QACnE,SAAS,GAAG,SAAS,CAAC,OAAO,CAAC,gBAAgB,EAAE,MAAM,CAAC,CAAC;;QAGxD,SAAS,GAAG,SAAS,CAAC,OAAO,CAAC,aAAa,EAAE,EAAE,CAAC,CAAC;;QAGjD,SAAS,GAAG,SAAS,CAAC,OAAO,CACzB,+DAA+D,EAC/D,KAAK,CACR,CAAC;AAEF,QAAA,OAAO,SAAS,CAAC,IAAI,EAAE,CAAC;KAC3B;AAED;;AAEG;AACH,IAAA,mBAAmB,CACf,KAAa,EACb,gBAAA,GAA4B,KAAK,EAAA;QAEjC,MAAM,MAAM,GAAG,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC;AAElC,QAAA,IAAI,MAAM,CAAC,WAAW,IAAI,gBAAgB,EAAE;AACxC,YAAA,MAAM,IAAI,KAAK,CACX,CAA+C,4CAAA,EAAA,CAC3C,MAAM,CAAC,UAAU,GAAG,GAAG,EACzB,OAAO,CAAC,CAAC,CAAC,CAAK,GAAA,CAAA;gBACb,CAAa,UAAA,EAAA,MAAM,CAAC,gBAAgB,CAAC,IAAI,CAAC,IAAI,CAAC,CAAE,CAAA,CACxD,CAAC;SACL;AAED,QAAA,OAAO,MAAM,CAAC,cAAc,IAAI,EAAE,CAAC;KACtC;AAED;;AAEG;IACH,wBAAwB,CACpB,KAAa,EACb,MAAa,EAAA;;QAGb,IAAI,kBAAkB,GAAG,KAAK,CAAC;QAC/B,MAAM,UAAU,GAAU,EAAE,CAAC;QAE7B,MAAM,CAAC,OAAO,CAAC,CAAC,KAAK,EAAE,KAAK,KAAI;AAC5B,YAAA,IAAI,OAAO,KAAK,KAAK,QAAQ,EAAE;gBAC3B,MAAM,MAAM,GAAG,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC;AAClC,gBAAA,IAAI,MAAM,CAAC,WAAW,EAAE;AACpB,oBAAA,MAAM,IAAI,KAAK,CACX,aAAa,KAAK,CAAA,iCAAA,CAAmC,CACxD,CAAC;iBACL;AACD,gBAAA,UAAU,CAAC,IAAI,CAAC,MAAM,CAAC,cAAc,CAAC,CAAC;aAC1C;iBAAM;AACH,gBAAA,UAAU,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;aAC1B;AACL,SAAC,CAAC,CAAC;QAEH,OAAO,EAAE,KAAK,EAAE,kBAAkB,EAAE,MAAM,EAAE,UAAU,EAAE,CAAC;KAC5D;AAEO,IAAA,sBAAsB,CAAC,KAAa,EAAA;AACxC,QAAA,MAAM,KAAK,GAAG;YACV,qBAAqB;YACrB,qBAAqB;YACrB,wBAAwB;YACxB,qBAAqB;YACrB,sBAAsB;YACtB,qBAAqB;YACrB,8BAA8B;YAC9B,kBAAkB;YAClB,sBAAsB;YACtB,uBAAuB;YACvB,0BAA0B;YAC1B,oBAAoB;YACpB,uBAAuB;YACvB,uBAAuB;YACvB,sBAAsB;SACzB,CAAC;QACF,OAAO,KAAK,CAAC,KAAK,CAAC,IAAI,CAAqB,kBAAA,EAAA,KAAK,EAAE,CAAC;KACvD;AAEO,IAAA,wBAAwB,CAAC,KAAa,EAAA;;AAE1C,QAAA,MAAM,OAAO,GAAG;AACZ,YAAA,GAAG;AACH,YAAA,GAAG;AACH,YAAA,GAAG;AACH,YAAA,GAAG;AACH,YAAA,GAAG;AACH,YAAA,GAAG;AACH,YAAA,GAAG;AACH,YAAA,GAAG;AACH,YAAA,GAAG;AACH,YAAA,GAAG;AACH,YAAA,GAAG;AACH,YAAA,GAAG;AACH,YAAA,GAAG;AACH,YAAA,GAAG;AACH,YAAA,GAAG;SACN,CAAC;AACF,QAAA,OAAO,OAAO,CAAC,KAAK,CAAC,IAAI,GAAG,CAAC;KAChC;IAEO,UAAU,CAAC,KAAa,EAAE,MAAuB,EAAA;AACrD,QAAA,OAAO,CAAC,IAAI,CAAC,CAAA,+BAAA,CAAiC,EAAE;AAC5C,YAAA,SAAS,EAAE,IAAI,IAAI,EAAE,CAAC,WAAW,EAAE;YACnC,KAAK,EAAE,KAAK,CAAC,SAAS,CAAC,CAAC,EAAE,GAAG,CAAC,IAAI,KAAK,CAAC,MAAM,GAAG,GAAG,GAAG,KAAK,GAAG,EAAE,CAAC;YAClE,UAAU,EAAE,MAAM,CAAC,UAAU;YAC7B,QAAQ,EAAE,MAAM,CAAC,gBAAgB;AACpC,SAAA,CAAC,CAAC;KACN;AAED;;AAEG;AACH,IAAA,YAAY,CAAC,SAAsC,EAAA;AAC/C,QAAA,IAAI,CAAC,MAAM,GAAG,EAAE,GAAG,IAAI,CAAC,MAAM,EAAE,GAAG,SAAS,EAAE,CAAC;KAClD;AAED;;AAEG;IACH,SAAS,GAAA;AACL,QAAA,OAAO,EAAE,GAAG,IAAI,CAAC,MAAM,EAAE,CAAC;KAC7B;AACJ;;;;"}
@@ -1,35 +0,0 @@
1
- 'use strict';
2
-
3
- const rateLimitConfig = (cf) => {
4
- return {
5
- enabled: cf?.rateLimit?.enabled ?? true,
6
- strategy: cf?.rateLimit?.strategy ?? "sliding-window",
7
- global: {
8
- requests: cf?.rateLimit?.global?.requests ?? 1000,
9
- window: cf?.rateLimit?.global?.window ?? "1h",
10
- },
11
- perIP: {
12
- requests: cf?.rateLimit?.perIP?.requests ?? 100,
13
- window: cf?.rateLimit?.perIP?.window ?? "1m",
14
- },
15
- perUser: cf?.rateLimit?.perUser
16
- ? {
17
- requests: cf?.rateLimit.perUser.requests ?? 50,
18
- window: cf?.rateLimit.perUser.window ?? "1m",
19
- }
20
- : undefined,
21
- headers: cf?.rateLimit?.headers,
22
- redis: cf?.rateLimit?.redis
23
- ? {
24
- host: cf?.rateLimit.redis.host ?? "localhost",
25
- port: cf?.rateLimit.redis.port ?? 6379,
26
- password: cf?.rateLimit.redis.password,
27
- db: cf?.rateLimit.redis.db ?? 0,
28
- keyPrefix: cf?.rateLimit.redis.keyPrefix ?? "xypriss:ratelimit:",
29
- }
30
- : undefined,
31
- };
32
- };
33
-
34
- exports.rateLimitConfig = rateLimitConfig;
35
- //# sourceMappingURL=rateLimitConfig.js.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"rateLimitConfig.js","sources":["../../../../../src/server/conf/rateLimitConfig.ts"],"sourcesContent":[null],"names":[],"mappings":";;AAEa,MAAA,eAAe,GAAG,CAAC,EAA4B,KAAI;IAC5D,OAAO;AACH,QAAA,OAAO,EAAE,EAAE,EAAE,SAAS,EAAE,OAAO,IAAI,IAAI;AACvC,QAAA,QAAQ,EAAE,EAAE,EAAE,SAAS,EAAE,QAAQ,IAAI,gBAAgB;AACrD,QAAA,MAAM,EAAE;YACJ,QAAQ,EAAE,EAAE,EAAE,SAAS,EAAE,MAAM,EAAE,QAAQ,IAAI,IAAI;YACjD,MAAM,EAAE,EAAE,EAAE,SAAS,EAAE,MAAM,EAAE,MAAM,IAAI,IAAI;AAChD,SAAA;AACD,QAAA,KAAK,EAAE;YACH,QAAQ,EAAE,EAAE,EAAE,SAAS,EAAE,KAAK,EAAE,QAAQ,IAAI,GAAG;YAC/C,MAAM,EAAE,EAAE,EAAE,SAAS,EAAE,KAAK,EAAE,MAAM,IAAI,IAAI;AAC/C,SAAA;AACD,QAAA,OAAO,EAAE,EAAE,EAAE,SAAS,EAAE,OAAO;AAC3B,cAAE;gBACI,QAAQ,EAAE,EAAE,EAAE,SAAS,CAAC,OAAO,CAAC,QAAQ,IAAI,EAAE;gBAC9C,MAAM,EAAE,EAAE,EAAE,SAAS,CAAC,OAAO,CAAC,MAAM,IAAI,IAAI;AAC/C,aAAA;AACH,cAAE,SAAS;AACf,QAAA,OAAO,EAAE,EAAE,EAAE,SAAS,EAAE,OAAO;AAC/B,QAAA,KAAK,EAAE,EAAE,EAAE,SAAS,EAAE,KAAK;AACvB,cAAE;gBACI,IAAI,EAAE,EAAE,EAAE,SAAS,CAAC,KAAK,CAAC,IAAI,IAAI,WAAW;gBAC7C,IAAI,EAAE,EAAE,EAAE,SAAS,CAAC,KAAK,CAAC,IAAI,IAAI,IAAI;AACtC,gBAAA,QAAQ,EAAE,EAAE,EAAE,SAAS,CAAC,KAAK,CAAC,QAAQ;gBACtC,EAAE,EAAE,EAAE,EAAE,SAAS,CAAC,KAAK,CAAC,EAAE,IAAI,CAAC;gBAC/B,SAAS,EACL,EAAE,EAAE,SAAS,CAAC,KAAK,CAAC,SAAS,IAAI,oBAAoB;AAC5D,aAAA;AACH,cAAE,SAAS;KAClB,CAAC;AACN;;;;"}
@@ -1,92 +0,0 @@
1
- 'use strict';
2
-
3
- /**
4
- * Wildcard pattern matching utility for CORS origins
5
- *
6
- * Supports patterns like:
7
- * - "localhost:*" matches "localhost:3000", "localhost:8080", etc.
8
- * - "*.example.com" matches "api.example.com", "app.example.com", etc.
9
- * - "127.0.0.1:*" matches "127.0.0.1:3000", "127.0.0.1:8080", etc.
10
- * - "::1:*" matches "::1:3000", "::1:8080", etc.
11
- */
12
- /**
13
- * Converts a wildcard pattern to a regular expression
14
- * @param pattern - The wildcard pattern (e.g., "localhost:*", "*.example.com")
15
- * @returns RegExp object for matching
16
- */
17
- function patternToRegex(pattern) {
18
- // Escape special regex characters except for *
19
- const escaped = pattern
20
- .replace(/[.+?^${}()|[\]\\]/g, '\\$&') // Escape special chars
21
- .replace(/\*/g, '.*'); // Replace * with .*
22
- // Ensure exact match with ^ and $
23
- return new RegExp(`^${escaped}$`, 'i'); // Case insensitive
24
- }
25
- /**
26
- * Checks if an origin matches a wildcard pattern
27
- * @param origin - The origin to check (e.g., "http://localhost:3000")
28
- * @param pattern - The wildcard pattern (e.g., "localhost:*")
29
- * @returns true if the origin matches the pattern
30
- */
31
- function matchesWildcardPattern(origin, pattern) {
32
- // Handle exact matches first (no wildcards)
33
- if (!pattern.includes('*')) {
34
- return origin === pattern || origin.includes(pattern);
35
- }
36
- // Extract the host:port part from the origin URL
37
- let originHost;
38
- try {
39
- const url = new URL(origin);
40
- originHost = url.host; // This includes both hostname and port
41
- // Special handling for default ports
42
- if (url.protocol === 'https:' && url.port === '' && url.hostname === 'localhost') {
43
- originHost = 'localhost:443';
44
- }
45
- else if (url.protocol === 'http:' && url.port === '' && url.hostname === 'localhost') {
46
- originHost = 'localhost:80';
47
- }
48
- // Handle IPv6 addresses - remove brackets for pattern matching
49
- if (url.hostname.startsWith('[') && url.hostname.endsWith(']')) {
50
- const ipv6Host = url.hostname.slice(1, -1); // Remove brackets
51
- originHost = url.port ? `${ipv6Host}:${url.port}` : ipv6Host;
52
- }
53
- }
54
- catch {
55
- // If it's not a valid URL, treat it as a host:port string
56
- originHost = origin;
57
- }
58
- const regex = patternToRegex(pattern);
59
- return regex.test(originHost);
60
- }
61
- /**
62
- * Checks if an origin is allowed based on an array of patterns
63
- * @param origin - The origin to check
64
- * @param allowedOrigins - Array of allowed origins (can include wildcards)
65
- * @returns true if the origin is allowed
66
- */
67
- function isOriginAllowed(origin, allowedOrigins) {
68
- if (!origin || !allowedOrigins || allowedOrigins.length === 0) {
69
- return false;
70
- }
71
- return allowedOrigins.some(pattern => matchesWildcardPattern(origin, pattern));
72
- }
73
- /**
74
- * Creates a CORS origin function that supports wildcard patterns
75
- * @param allowedOrigins - Array of allowed origins (can include wildcards)
76
- * @returns Function compatible with cors middleware
77
- */
78
- function createWildcardOriginFunction(allowedOrigins) {
79
- return (origin, callback) => {
80
- // Allow requests with no origin (like mobile apps or curl requests)
81
- if (!origin) {
82
- return callback(null, true);
83
- }
84
- const allowed = isOriginAllowed(origin, allowedOrigins);
85
- callback(null, allowed);
86
- };
87
- }
88
-
89
- exports.createWildcardOriginFunction = createWildcardOriginFunction;
90
- exports.isOriginAllowed = isOriginAllowed;
91
- exports.matchesWildcardPattern = matchesWildcardPattern;
92
- //# sourceMappingURL=wildcardMatcher.js.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"wildcardMatcher.js","sources":["../../../../../src/server/utils/wildcardMatcher.ts"],"sourcesContent":[null],"names":[],"mappings":";;AAAA;;;;;;;;AAQG;AAEH;;;;AAIG;AACH,SAAS,cAAc,CAAC,OAAe,EAAA;;IAEnC,MAAM,OAAO,GAAG,OAAO;AAClB,SAAA,OAAO,CAAC,oBAAoB,EAAE,MAAM,CAAC;AACrC,SAAA,OAAO,CAAC,KAAK,EAAE,IAAI,CAAC,CAAC;;IAG1B,OAAO,IAAI,MAAM,CAAC,CAAI,CAAA,EAAA,OAAO,CAAG,CAAA,CAAA,EAAE,GAAG,CAAC,CAAC;AAC3C,CAAC;AAED;;;;;AAKG;AACa,SAAA,sBAAsB,CAAC,MAAc,EAAE,OAAe,EAAA;;IAElE,IAAI,CAAC,OAAO,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE;QACxB,OAAO,MAAM,KAAK,OAAO,IAAI,MAAM,CAAC,QAAQ,CAAC,OAAO,CAAC,CAAC;KACzD;;AAGD,IAAA,IAAI,UAAkB,CAAC;AACvB,IAAA,IAAI;AACA,QAAA,MAAM,GAAG,GAAG,IAAI,GAAG,CAAC,MAAM,CAAC,CAAC;AAC5B,QAAA,UAAU,GAAG,GAAG,CAAC,IAAI,CAAC;;AAGtB,QAAA,IAAI,GAAG,CAAC,QAAQ,KAAK,QAAQ,IAAI,GAAG,CAAC,IAAI,KAAK,EAAE,IAAI,GAAG,CAAC,QAAQ,KAAK,WAAW,EAAE;YAC9E,UAAU,GAAG,eAAe,CAAC;SAChC;AAAM,aAAA,IAAI,GAAG,CAAC,QAAQ,KAAK,OAAO,IAAI,GAAG,CAAC,IAAI,KAAK,EAAE,IAAI,GAAG,CAAC,QAAQ,KAAK,WAAW,EAAE;YACpF,UAAU,GAAG,cAAc,CAAC;SAC/B;;AAGD,QAAA,IAAI,GAAG,CAAC,QAAQ,CAAC,UAAU,CAAC,GAAG,CAAC,IAAI,GAAG,CAAC,QAAQ,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE;AAC5D,YAAA,MAAM,QAAQ,GAAG,GAAG,CAAC,QAAQ,CAAC,KAAK,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC;AAC3C,YAAA,UAAU,GAAG,GAAG,CAAC,IAAI,GAAG,CAAG,EAAA,QAAQ,CAAI,CAAA,EAAA,GAAG,CAAC,IAAI,CAAA,CAAE,GAAG,QAAQ,CAAC;SAChE;KACJ;AAAC,IAAA,MAAM;;QAEJ,UAAU,GAAG,MAAM,CAAC;KACvB;AAED,IAAA,MAAM,KAAK,GAAG,cAAc,CAAC,OAAO,CAAC,CAAC;AACtC,IAAA,OAAO,KAAK,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC;AAClC,CAAC;AAED;;;;;AAKG;AACa,SAAA,eAAe,CAAC,MAAc,EAAE,cAAwB,EAAA;AACpE,IAAA,IAAI,CAAC,MAAM,IAAI,CAAC,cAAc,IAAI,cAAc,CAAC,MAAM,KAAK,CAAC,EAAE;AAC3D,QAAA,OAAO,KAAK,CAAC;KAChB;AAED,IAAA,OAAO,cAAc,CAAC,IAAI,CAAC,OAAO,IAAI,sBAAsB,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC,CAAC;AACnF,CAAC;AAED;;;;AAIG;AACG,SAAU,4BAA4B,CAAC,cAAwB,EAAA;AACjE,IAAA,OAAO,CAAC,MAA0B,EAAE,QAAsD,KAAI;;QAE1F,IAAI,CAAC,MAAM,EAAE;AACT,YAAA,OAAO,QAAQ,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;SAC/B;QAED,MAAM,OAAO,GAAG,eAAe,CAAC,MAAM,EAAE,cAAc,CAAC,CAAC;AACxD,QAAA,QAAQ,CAAC,IAAI,EAAE,OAAO,CAAC,CAAC;AAC5B,KAAC,CAAC;AACN;;;;;;"}
@@ -1,54 +0,0 @@
1
- import { Hash } from './hash/hash-core.js';
2
- import './hash/hash-types.js';
3
- import 'crypto';
4
- import './hash/hash-security.js';
5
- import './hash/hash-advanced.js';
6
- import '../algorithms/hash-algorithms.js';
7
- import { XyPrissSecurity } from './crypto.js';
8
- import { SecureRandom } from './random/random-core.js';
9
- import './random/random-types.js';
10
- import './random/random-sources.js';
11
- import 'nehonix-uri-processor';
12
- import '../utils/memory/index.js';
13
- import '../types.js';
14
-
15
- class Cryptog {
16
- constructor() {
17
- this.hash = Hash;
18
- this.crypto = XyPrissSecurity;
19
- this.random = SecureRandom.getInstance();
20
- }
21
- static getInstance() {
22
- if (!Cryptog.instance) {
23
- Cryptog.instance = new Cryptog();
24
- }
25
- return Cryptog.instance;
26
- }
27
- }
28
- /**
29
- * ### Cryptographic Core
30
- *
31
- * Primary cryptographic classes and utilities for secure random generation,
32
- * key management, validation, and buffer operations.
33
- *
34
- * @example
35
- * ```typescript
36
- * import { Cipher } from "xypriss-security";
37
- *
38
- * // Generate secure random bytes
39
- * const randomBytes = Cipher.random.getRandomBytes(32);
40
- *
41
- * // Generate secure UUID
42
- * const uuid = Cipher.random.generateSecureUUID();
43
- *
44
- * // Generate random integers
45
- * const randomInt = Cipher.random.getSecureRandomInt(1, 100);
46
- * ```
47
- * @author Seth Eleazar <https://github.com/iDevo-ll>
48
- * @version 1.1.6
49
- * @license MIT
50
- * @see {@link https://lab.nehonix.space/nehonix_viewer/_doc/Nehonix%20XyPrissSecurity} Official Documentation
51
- *
52
- */
53
- Cryptog.getInstance();
54
- //# sourceMappingURL=crypt.js.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"crypt.js","sources":["../../../../../../mods/security/src/core/crypt.ts"],"sourcesContent":[null],"names":[],"mappings":";;;;;;;;;;;;;;AAIA,MAAM,OAAO,CAAA;AAOT,IAAA,WAAA,GAAA;QANgB,IAAI,CAAA,IAAA,GAAgB,IAAI,CAAC;QACzB,IAAM,CAAA,MAAA,GAA2B,eAAe,CAAC;AACjD,QAAA,IAAA,CAAA,MAAM,GAAiB,YAAY,CAAC,WAAW,EAAE,CAAC;KAI1C;AAEjB,IAAA,OAAO,WAAW,GAAA;AACrB,QAAA,IAAI,CAAC,OAAO,CAAC,QAAQ,EAAE;AACnB,YAAA,OAAO,CAAC,QAAQ,GAAG,IAAI,OAAO,EAAE,CAAC;SACpC;QACD,OAAO,OAAO,CAAC,QAAQ,CAAC;KAC3B;AACJ,CAAA;AAED;;;;;;;;;;;;;;;;;;;;;;;;AAwBG;AACmB,OAAO,CAAC,WAAW"}