xypriss 3.2.0 → 3.2.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/cjs/src/middleware/built-in/BuiltInMiddleware.js +51 -8
- package/dist/cjs/src/middleware/built-in/BuiltInMiddleware.js.map +1 -1
- package/dist/cjs/src/middleware/built-in/security/RequestSignatureProtector.js +20 -4
- package/dist/cjs/src/middleware/built-in/security/RequestSignatureProtector.js.map +1 -1
- package/dist/cjs/src/server/const/default.js +38 -5
- package/dist/cjs/src/server/const/default.js.map +1 -1
- package/dist/esm/src/middleware/built-in/BuiltInMiddleware.js +51 -8
- package/dist/esm/src/middleware/built-in/BuiltInMiddleware.js.map +1 -1
- package/dist/esm/src/middleware/built-in/security/RequestSignatureProtector.js +20 -4
- package/dist/esm/src/middleware/built-in/security/RequestSignatureProtector.js.map +1 -1
- package/dist/esm/src/server/const/default.js +38 -5
- package/dist/esm/src/server/const/default.js.map +1 -1
- package/dist/index.d.ts +16 -0
- package/package.json +1 -1
- package/dist/cjs/mods/security/src/core/crypt.js +0 -56
- package/dist/cjs/mods/security/src/core/crypt.js.map +0 -1
- package/dist/cjs/src/middleware/built-in/index.js +0 -325
- package/dist/cjs/src/middleware/built-in/index.js.map +0 -1
- package/dist/cjs/src/middleware/built-in/sqlInjection.js +0 -335
- package/dist/cjs/src/middleware/built-in/sqlInjection.js.map +0 -1
- package/dist/cjs/src/server/conf/rateLimitConfig.js +0 -35
- package/dist/cjs/src/server/conf/rateLimitConfig.js.map +0 -1
- package/dist/cjs/src/server/utils/wildcardMatcher.js +0 -92
- package/dist/cjs/src/server/utils/wildcardMatcher.js.map +0 -1
- package/dist/esm/mods/security/src/core/crypt.js +0 -54
- package/dist/esm/mods/security/src/core/crypt.js.map +0 -1
- package/dist/esm/src/middleware/built-in/index.js +0 -323
- package/dist/esm/src/middleware/built-in/index.js.map +0 -1
- package/dist/esm/src/middleware/built-in/sqlInjection.js +0 -333
- package/dist/esm/src/middleware/built-in/sqlInjection.js.map +0 -1
- package/dist/esm/src/server/conf/rateLimitConfig.js +0 -33
- package/dist/esm/src/server/conf/rateLimitConfig.js.map +0 -1
- package/dist/esm/src/server/utils/wildcardMatcher.js +0 -88
- package/dist/esm/src/server/utils/wildcardMatcher.js.map +0 -1
|
@@ -1,335 +0,0 @@
|
|
|
1
|
-
'use strict';
|
|
2
|
-
|
|
3
|
-
class SQLInjectionDetector {
|
|
4
|
-
constructor(config = {}) {
|
|
5
|
-
// High-confidence SQL injection patterns (more specific to reduce false positives)
|
|
6
|
-
this.highRiskPatterns = [
|
|
7
|
-
// Union attacks with SELECT
|
|
8
|
-
/(\s|^)(union|UNION)(\s)+(all\s+)?(select|SELECT)/gi,
|
|
9
|
-
// SQL comments at end of input or before SQL keywords
|
|
10
|
-
/(--|#|\/\*).*?(select|union|drop|delete|insert|update|create|alter)/gi,
|
|
11
|
-
/;(\s)*--.*/gi,
|
|
12
|
-
// Enhanced boolean injections (more comprehensive)
|
|
13
|
-
/(\s|^)(or|OR)(\s)+('?\d+'?\s*=\s*'?\d+'?|'[^']*'\s*=\s*'[^']*'|true|false)/gi,
|
|
14
|
-
/(\s|^)(and|AND)(\s)+('?\d+'?\s*=\s*'?\d+'?|'[^']*'\s*=\s*'[^']*'|true|false)/gi,
|
|
15
|
-
// Quote-based boolean injections
|
|
16
|
-
/'(\s)+(or|OR|and|AND)(\s)+'/gi,
|
|
17
|
-
// Comment-obfuscated patterns
|
|
18
|
-
/\/\*.*?\*\/(or|OR|and|AND)\/\*.*?\*\//gi,
|
|
19
|
-
// Time-based with specific syntax (enhanced)
|
|
20
|
-
/(sleep|SLEEP|waitfor|WAITFOR|delay|DELAY)\s*\(.*?\)/gi,
|
|
21
|
-
/(waitfor|WAITFOR)\s+(delay|DELAY)\s+'/gi,
|
|
22
|
-
// System stored procedures
|
|
23
|
-
/(exec|EXEC|execute|EXECUTE)\s+(sp_|xp_)\w+/gi,
|
|
24
|
-
// Information schema with specific queries
|
|
25
|
-
/(information_schema|INFORMATION_SCHEMA)\.(tables|columns|schemata)/gi,
|
|
26
|
-
// Dangerous DDL operations with semicolons
|
|
27
|
-
/;(\s)*(drop|DROP|delete|DELETE|truncate|TRUNCATE)\s+(table|database)/gi,
|
|
28
|
-
// Hex encoding of common injection strings
|
|
29
|
-
/0x(27|22|5C|2D|2D)/gi, // ', ", \, --
|
|
30
|
-
// Multiple quotes for quote breaking
|
|
31
|
-
/('{3,}|"{3,})/g,
|
|
32
|
-
// Stacked queries with dangerous operations
|
|
33
|
-
/;(\s)*(drop|delete|insert|update|create|alter)(\s)+/gi,
|
|
34
|
-
];
|
|
35
|
-
// Medium risk patterns (require context analysis)
|
|
36
|
-
this.mediumRiskPatterns = [
|
|
37
|
-
// Single SQL keywords (common in legitimate text)
|
|
38
|
-
/\b(select|union|drop|delete|insert|update|create|alter)\b/gi,
|
|
39
|
-
// Simple OR/AND conditions
|
|
40
|
-
/\b(or|and)\s+\w+\s*=\s*\w+/gi,
|
|
41
|
-
// Single quotes or double quotes
|
|
42
|
-
/'/g,
|
|
43
|
-
/"/g,
|
|
44
|
-
// Basic SQL comments
|
|
45
|
-
/(--|#)/g,
|
|
46
|
-
// Wildcards
|
|
47
|
-
/[%_]/g,
|
|
48
|
-
];
|
|
49
|
-
// Characters that are suspicious in certain contexts
|
|
50
|
-
this.contextSensitiveChars = /[';\"\\%_]/g;
|
|
51
|
-
this.config = {
|
|
52
|
-
strictMode: config.strictMode ?? false,
|
|
53
|
-
allowedChars: config.allowedChars ?? /^[a-zA-Z0-9\s\-@.!?,()]+$/,
|
|
54
|
-
maxLength: config.maxLength ?? 1000,
|
|
55
|
-
logAttempts: config.logAttempts ?? true,
|
|
56
|
-
contextualAnalysis: config.contextualAnalysis ?? true,
|
|
57
|
-
falsePositiveThreshold: config.falsePositiveThreshold ?? 0.6,
|
|
58
|
-
};
|
|
59
|
-
}
|
|
60
|
-
/**
|
|
61
|
-
* Main detection method with improved false positive handling
|
|
62
|
-
*/
|
|
63
|
-
detect(input, context) {
|
|
64
|
-
if (!input || typeof input !== "string") {
|
|
65
|
-
return {
|
|
66
|
-
isMalicious: false,
|
|
67
|
-
confidence: 0,
|
|
68
|
-
detectedPatterns: [],
|
|
69
|
-
riskLevel: "LOW",
|
|
70
|
-
};
|
|
71
|
-
}
|
|
72
|
-
const result = {
|
|
73
|
-
isMalicious: false,
|
|
74
|
-
confidence: 0,
|
|
75
|
-
detectedPatterns: [],
|
|
76
|
-
sanitizedInput: input,
|
|
77
|
-
riskLevel: "LOW",
|
|
78
|
-
};
|
|
79
|
-
// Check input length (very long inputs are suspicious)
|
|
80
|
-
if (input.length > this.config.maxLength) {
|
|
81
|
-
result.confidence += 0.2; // Reduced penalty for length
|
|
82
|
-
result.detectedPatterns.push("Excessive length");
|
|
83
|
-
}
|
|
84
|
-
// High-risk pattern analysis (strong indicators)
|
|
85
|
-
let highRiskScore = 0;
|
|
86
|
-
this.highRiskPatterns.forEach((pattern, index) => {
|
|
87
|
-
const matches = input.match(pattern);
|
|
88
|
-
if (matches) {
|
|
89
|
-
const patternName = this.getHighRiskPatternName(index);
|
|
90
|
-
result.detectedPatterns.push(`${patternName}: ${matches.join(", ")}`);
|
|
91
|
-
highRiskScore += this.getHighRiskPatternWeight(index);
|
|
92
|
-
}
|
|
93
|
-
});
|
|
94
|
-
// Medium-risk pattern analysis (context-dependent)
|
|
95
|
-
let mediumRiskScore = 0;
|
|
96
|
-
if (this.config.contextualAnalysis) {
|
|
97
|
-
mediumRiskScore = this.analyzeContext(input, context || "");
|
|
98
|
-
}
|
|
99
|
-
else {
|
|
100
|
-
// Basic medium risk analysis without context
|
|
101
|
-
this.mediumRiskPatterns.forEach((pattern, index) => {
|
|
102
|
-
const matches = input.match(pattern);
|
|
103
|
-
if (matches) {
|
|
104
|
-
mediumRiskScore += 0.1 * matches.length; // Lower weight for medium risk
|
|
105
|
-
}
|
|
106
|
-
});
|
|
107
|
-
}
|
|
108
|
-
// Contextual analysis for legitimate use cases
|
|
109
|
-
const legitimacyScore = this.calculateLegitimacyScore(input);
|
|
110
|
-
// Calculate confidence with false positive mitigation
|
|
111
|
-
const rawScore = highRiskScore + mediumRiskScore * 0.3;
|
|
112
|
-
result.confidence = Math.max(0, rawScore - legitimacyScore);
|
|
113
|
-
result.confidence = Math.min(result.confidence, 1.0);
|
|
114
|
-
// Determine risk level and malicious status
|
|
115
|
-
if (result.confidence >= 0.8) {
|
|
116
|
-
result.riskLevel = "CRITICAL";
|
|
117
|
-
result.isMalicious = true;
|
|
118
|
-
}
|
|
119
|
-
else if (result.confidence >= this.config.falsePositiveThreshold) {
|
|
120
|
-
result.riskLevel = "HIGH";
|
|
121
|
-
result.isMalicious = true;
|
|
122
|
-
}
|
|
123
|
-
else if (result.confidence >= 0.3) {
|
|
124
|
-
result.riskLevel = "MEDIUM";
|
|
125
|
-
result.isMalicious = false; // Don't block medium risk by default
|
|
126
|
-
}
|
|
127
|
-
else {
|
|
128
|
-
result.riskLevel = "LOW";
|
|
129
|
-
result.isMalicious = false;
|
|
130
|
-
}
|
|
131
|
-
// Log only high confidence attempts
|
|
132
|
-
if (this.config.logAttempts && result.confidence >= 0.7) {
|
|
133
|
-
this.logAttempt(input, result);
|
|
134
|
-
}
|
|
135
|
-
// Provide sanitized version only for high-risk inputs
|
|
136
|
-
if (result.confidence >= 0.4) {
|
|
137
|
-
result.sanitizedInput = this.smartSanitize(input);
|
|
138
|
-
}
|
|
139
|
-
return result;
|
|
140
|
-
}
|
|
141
|
-
/**
|
|
142
|
-
* Analyze context to reduce false positives
|
|
143
|
-
*/
|
|
144
|
-
analyzeContext(input, context) {
|
|
145
|
-
let score = 0;
|
|
146
|
-
// Check for legitimate business contexts
|
|
147
|
-
const businessContexts = [
|
|
148
|
-
"search",
|
|
149
|
-
"filter",
|
|
150
|
-
"name",
|
|
151
|
-
"description",
|
|
152
|
-
"comment",
|
|
153
|
-
"review",
|
|
154
|
-
"address",
|
|
155
|
-
"title",
|
|
156
|
-
"content",
|
|
157
|
-
"message",
|
|
158
|
-
"email",
|
|
159
|
-
];
|
|
160
|
-
const isBusinessContext = businessContexts.some((ctx) => context.toLowerCase().includes(ctx));
|
|
161
|
-
this.mediumRiskPatterns.forEach((pattern, index) => {
|
|
162
|
-
const matches = input.match(pattern);
|
|
163
|
-
if (matches) {
|
|
164
|
-
let patternScore = 0.1 * matches.length;
|
|
165
|
-
// Reduce score for legitimate contexts
|
|
166
|
-
if (isBusinessContext) {
|
|
167
|
-
patternScore *= 0.3; // Reduce by 70%
|
|
168
|
-
}
|
|
169
|
-
// Special handling for common false positives
|
|
170
|
-
if (index === 0 && isBusinessContext) {
|
|
171
|
-
// SQL keywords in business text
|
|
172
|
-
patternScore *= 0.1; // Very low weight for SQL keywords in business context
|
|
173
|
-
}
|
|
174
|
-
if (index === 2 || index === 3) {
|
|
175
|
-
// Single quotes in names, descriptions
|
|
176
|
-
if (context.includes("name") ||
|
|
177
|
-
context.includes("description")) {
|
|
178
|
-
patternScore *= 0.2;
|
|
179
|
-
}
|
|
180
|
-
}
|
|
181
|
-
score += patternScore;
|
|
182
|
-
}
|
|
183
|
-
});
|
|
184
|
-
return score;
|
|
185
|
-
}
|
|
186
|
-
/**
|
|
187
|
-
* Calculate legitimacy score to offset false positives
|
|
188
|
-
*/
|
|
189
|
-
calculateLegitimacyScore(input) {
|
|
190
|
-
let legitimacyScore = 0;
|
|
191
|
-
// Natural language indicators
|
|
192
|
-
const naturalWords = input.match(/\b[a-zA-Z]{3,}\b/g);
|
|
193
|
-
if (naturalWords && naturalWords.length > 2) {
|
|
194
|
-
legitimacyScore += 0.2; // Looks like natural text
|
|
195
|
-
}
|
|
196
|
-
// Check for common legitimate patterns
|
|
197
|
-
const legitimatePatterns = [
|
|
198
|
-
/^[A-Z][a-z]+\s[A-Z][a-z]+$/, // First Last name
|
|
199
|
-
/^[\w\.-]+@[\w\.-]+\.\w+$/, // Email
|
|
200
|
-
/^\d{1,5}\s\w+(\s\w+)*$/, // Address format
|
|
201
|
-
/^[A-Za-z0-9\s\-.,!?()]+$/, // Normal text with punctuation
|
|
202
|
-
];
|
|
203
|
-
legitimatePatterns.forEach((pattern) => {
|
|
204
|
-
if (pattern.test(input)) {
|
|
205
|
-
legitimacyScore += 0.15;
|
|
206
|
-
}
|
|
207
|
-
});
|
|
208
|
-
// Length-based legitimacy (very short or very specific lengths are more suspicious)
|
|
209
|
-
if (input.length > 10 && input.length < 200) {
|
|
210
|
-
legitimacyScore += 0.1;
|
|
211
|
-
}
|
|
212
|
-
// Check for balanced quotes (legitimate text often has balanced quotes)
|
|
213
|
-
const singleQuotes = (input.match(/'/g) || []).length;
|
|
214
|
-
const doubleQuotes = (input.match(/"/g) || []).length;
|
|
215
|
-
if (singleQuotes % 2 === 0 && doubleQuotes % 2 === 0) {
|
|
216
|
-
legitimacyScore += 0.1;
|
|
217
|
-
}
|
|
218
|
-
return Math.min(legitimacyScore, 0.5); // Cap legitimacy score
|
|
219
|
-
}
|
|
220
|
-
/**
|
|
221
|
-
* Smart sanitization that preserves legitimate content
|
|
222
|
-
*/
|
|
223
|
-
smartSanitize(input) {
|
|
224
|
-
if (!input)
|
|
225
|
-
return input;
|
|
226
|
-
let sanitized = input;
|
|
227
|
-
// Only remove obvious SQL injection patterns, not all SQL keywords
|
|
228
|
-
sanitized = sanitized.replace(/(--|#).*$/gm, ""); // Remove comment tails
|
|
229
|
-
sanitized = sanitized.replace(/\/\*.*?\*\//g, ""); // Remove /* */ comments
|
|
230
|
-
// Only escape quotes if they appear to be part of injection attempts
|
|
231
|
-
const suspiciousQuotes = /'(\s*(or|and|union|select)\s|;|\s*--)/gi;
|
|
232
|
-
sanitized = sanitized.replace(suspiciousQuotes, "''$1");
|
|
233
|
-
// Remove only dangerous control characters
|
|
234
|
-
sanitized = sanitized.replace(/[\x00\x1a]/g, "");
|
|
235
|
-
// Only remove semicolons if followed by SQL keywords
|
|
236
|
-
sanitized = sanitized.replace(/;(\s)*(drop|delete|insert|update|create|alter|union|select)/gi, " $2");
|
|
237
|
-
return sanitized.trim();
|
|
238
|
-
}
|
|
239
|
-
/**
|
|
240
|
-
* Validate and sanitize input, throwing error if malicious
|
|
241
|
-
*/
|
|
242
|
-
validateAndSanitize(input, throwOnDetection = false) {
|
|
243
|
-
const result = this.detect(input);
|
|
244
|
-
if (result.isMalicious && throwOnDetection) {
|
|
245
|
-
throw new Error(`SQL injection attempt detected. Confidence: ${(result.confidence * 100).toFixed(1)}%. ` +
|
|
246
|
-
`Patterns: ${result.detectedPatterns.join(", ")}`);
|
|
247
|
-
}
|
|
248
|
-
return result.sanitizedInput || "";
|
|
249
|
-
}
|
|
250
|
-
/**
|
|
251
|
-
* Create parameterized query helper
|
|
252
|
-
*/
|
|
253
|
-
createParameterizedQuery(query, params) {
|
|
254
|
-
// Simple parameterization helper
|
|
255
|
-
let parameterizedQuery = query;
|
|
256
|
-
const safeParams = [];
|
|
257
|
-
params.forEach((param, index) => {
|
|
258
|
-
if (typeof param === "string") {
|
|
259
|
-
const result = this.detect(param);
|
|
260
|
-
if (result.isMalicious) {
|
|
261
|
-
throw new Error(`Parameter ${index} contains potential SQL injection`);
|
|
262
|
-
}
|
|
263
|
-
safeParams.push(result.sanitizedInput);
|
|
264
|
-
}
|
|
265
|
-
else {
|
|
266
|
-
safeParams.push(param);
|
|
267
|
-
}
|
|
268
|
-
});
|
|
269
|
-
return { query: parameterizedQuery, params: safeParams };
|
|
270
|
-
}
|
|
271
|
-
getHighRiskPatternName(index) {
|
|
272
|
-
const names = [
|
|
273
|
-
"Union-Select attack",
|
|
274
|
-
"Commented injection",
|
|
275
|
-
"Comment with semicolon",
|
|
276
|
-
"Enhanced boolean OR",
|
|
277
|
-
"Enhanced boolean AND",
|
|
278
|
-
"Quote-based boolean",
|
|
279
|
-
"Comment-obfuscated injection",
|
|
280
|
-
"Time-based delay",
|
|
281
|
-
"WAITFOR delay attack",
|
|
282
|
-
"System procedure call",
|
|
283
|
-
"Information schema query",
|
|
284
|
-
"DDL with semicolon",
|
|
285
|
-
"Hex-encoded injection",
|
|
286
|
-
"Quote sequence attack",
|
|
287
|
-
"Stacked query attack",
|
|
288
|
-
];
|
|
289
|
-
return names[index] || `High-risk pattern ${index}`;
|
|
290
|
-
}
|
|
291
|
-
getHighRiskPatternWeight(index) {
|
|
292
|
-
// Higher weights for more definitive attack patterns
|
|
293
|
-
const weights = [
|
|
294
|
-
0.9, // Union-Select attack
|
|
295
|
-
0.8, // Commented injection
|
|
296
|
-
0.7, // Comment with semicolon
|
|
297
|
-
0.8, // Enhanced boolean OR
|
|
298
|
-
0.8, // Enhanced boolean AND
|
|
299
|
-
0.7, // Quote-based boolean
|
|
300
|
-
0.8, // Comment-obfuscated injection
|
|
301
|
-
0.9, // Time-based delay
|
|
302
|
-
0.8, // WAITFOR delay attack
|
|
303
|
-
0.8, // System procedure call
|
|
304
|
-
0.7, // Information schema query
|
|
305
|
-
0.9, // DDL with semicolon
|
|
306
|
-
0.6, // Hex-encoded injection
|
|
307
|
-
0.5, // Quote sequence attack
|
|
308
|
-
0.8, // Stacked query attack
|
|
309
|
-
];
|
|
310
|
-
return weights[index] || 0.7;
|
|
311
|
-
}
|
|
312
|
-
logAttempt(input, result) {
|
|
313
|
-
console.warn(`SQL Injection Attempt Detected:`, {
|
|
314
|
-
timestamp: new Date().toISOString(),
|
|
315
|
-
input: input.substring(0, 100) + (input.length > 100 ? "..." : ""),
|
|
316
|
-
confidence: result.confidence,
|
|
317
|
-
patterns: result.detectedPatterns,
|
|
318
|
-
});
|
|
319
|
-
}
|
|
320
|
-
/**
|
|
321
|
-
* Update configuration
|
|
322
|
-
*/
|
|
323
|
-
updateConfig(newConfig) {
|
|
324
|
-
this.config = { ...this.config, ...newConfig };
|
|
325
|
-
}
|
|
326
|
-
/**
|
|
327
|
-
* Get current configuration
|
|
328
|
-
*/
|
|
329
|
-
getConfig() {
|
|
330
|
-
return { ...this.config };
|
|
331
|
-
}
|
|
332
|
-
}
|
|
333
|
-
|
|
334
|
-
module.exports = SQLInjectionDetector;
|
|
335
|
-
//# sourceMappingURL=sqlInjection.js.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"sqlInjection.js","sources":["../../../../../src/middleware/built-in/sqlInjection.ts"],"sourcesContent":[null],"names":[],"mappings":";;AAiBA,MAAM,oBAAoB,CAAA;AAmEtB,IAAA,WAAA,CAAY,SAA6B,EAAE,EAAA;;AA/D1B,QAAA,IAAA,CAAA,gBAAgB,GAAG;;YAEhC,oDAAoD;;YAGpD,uEAAuE;YACvE,cAAc;;YAGd,8EAA8E;YAC9E,gFAAgF;;YAGhF,+BAA+B;;YAG/B,yCAAyC;;YAGzC,uDAAuD;YACvD,yCAAyC;;YAGzC,8CAA8C;;YAG9C,sEAAsE;;YAGtE,wEAAwE;;AAGxE,YAAA,sBAAsB;;YAGtB,gBAAgB;;YAGhB,uDAAuD;SAC1D,CAAC;;AAGe,QAAA,IAAA,CAAA,kBAAkB,GAAG;;YAElC,6DAA6D;;YAG7D,8BAA8B;;YAG9B,IAAI;YACJ,IAAI;;YAGJ,SAAS;;YAGT,OAAO;SACV,CAAC;;QAGe,IAAqB,CAAA,qBAAA,GAAG,aAAa,CAAC;QAGnD,IAAI,CAAC,MAAM,GAAG;AACV,YAAA,UAAU,EAAE,MAAM,CAAC,UAAU,IAAI,KAAK;AACtC,YAAA,YAAY,EAAE,MAAM,CAAC,YAAY,IAAI,2BAA2B;AAChE,YAAA,SAAS,EAAE,MAAM,CAAC,SAAS,IAAI,IAAI;AACnC,YAAA,WAAW,EAAE,MAAM,CAAC,WAAW,IAAI,IAAI;AACvC,YAAA,kBAAkB,EAAE,MAAM,CAAC,kBAAkB,IAAI,IAAI;AACrD,YAAA,sBAAsB,EAAE,MAAM,CAAC,sBAAsB,IAAI,GAAG;SAC/D,CAAC;KACL;AAED;;AAEG;IACH,MAAM,CACF,KAAgC,EAChC,OAAgB,EAAA;QAEhB,IAAI,CAAC,KAAK,IAAI,OAAO,KAAK,KAAK,QAAQ,EAAE;YACrC,OAAO;AACH,gBAAA,WAAW,EAAE,KAAK;AAClB,gBAAA,UAAU,EAAE,CAAC;AACb,gBAAA,gBAAgB,EAAE,EAAE;AACpB,gBAAA,SAAS,EAAE,KAAK;aACnB,CAAC;SACL;AAED,QAAA,MAAM,MAAM,GAAoB;AAC5B,YAAA,WAAW,EAAE,KAAK;AAClB,YAAA,UAAU,EAAE,CAAC;AACb,YAAA,gBAAgB,EAAE,EAAE;AACpB,YAAA,cAAc,EAAE,KAAK;AACrB,YAAA,SAAS,EAAE,KAAK;SACnB,CAAC;;QAGF,IAAI,KAAK,CAAC,MAAM,GAAG,IAAI,CAAC,MAAM,CAAC,SAAS,EAAE;AACtC,YAAA,MAAM,CAAC,UAAU,IAAI,GAAG,CAAC;AACzB,YAAA,MAAM,CAAC,gBAAgB,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC;SACpD;;QAGD,IAAI,aAAa,GAAG,CAAC,CAAC;QACtB,IAAI,CAAC,gBAAgB,CAAC,OAAO,CAAC,CAAC,OAAO,EAAE,KAAK,KAAI;YAC7C,MAAM,OAAO,GAAG,KAAK,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC;YACrC,IAAI,OAAO,EAAE;gBACT,MAAM,WAAW,GAAG,IAAI,CAAC,sBAAsB,CAAC,KAAK,CAAC,CAAC;AACvD,gBAAA,MAAM,CAAC,gBAAgB,CAAC,IAAI,CACxB,GAAG,WAAW,CAAA,EAAA,EAAK,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,CAAA,CAAE,CAC1C,CAAC;AACF,gBAAA,aAAa,IAAI,IAAI,CAAC,wBAAwB,CAAC,KAAK,CAAC,CAAC;aACzD;AACL,SAAC,CAAC,CAAC;;QAGH,IAAI,eAAe,GAAG,CAAC,CAAC;AACxB,QAAA,IAAI,IAAI,CAAC,MAAM,CAAC,kBAAkB,EAAE;YAChC,eAAe,GAAG,IAAI,CAAC,cAAc,CAAC,KAAK,EAAE,OAAO,IAAI,EAAE,CAAC,CAAC;SAC/D;aAAM;;YAEH,IAAI,CAAC,kBAAkB,CAAC,OAAO,CAAC,CAAC,OAAO,EAAE,KAAK,KAAI;gBAC/C,MAAM,OAAO,GAAG,KAAK,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC;gBACrC,IAAI,OAAO,EAAE;oBACT,eAAe,IAAI,GAAG,GAAG,OAAO,CAAC,MAAM,CAAC;iBAC3C;AACL,aAAC,CAAC,CAAC;SACN;;QAGD,MAAM,eAAe,GAAG,IAAI,CAAC,wBAAwB,CAAC,KAAK,CAAC,CAAC;;AAG7D,QAAA,MAAM,QAAQ,GAAG,aAAa,GAAG,eAAe,GAAG,GAAG,CAAC;AACvD,QAAA,MAAM,CAAC,UAAU,GAAG,IAAI,CAAC,GAAG,CAAC,CAAC,EAAE,QAAQ,GAAG,eAAe,CAAC,CAAC;AAC5D,QAAA,MAAM,CAAC,UAAU,GAAG,IAAI,CAAC,GAAG,CAAC,MAAM,CAAC,UAAU,EAAE,GAAG,CAAC,CAAC;;AAGrD,QAAA,IAAI,MAAM,CAAC,UAAU,IAAI,GAAG,EAAE;AAC1B,YAAA,MAAM,CAAC,SAAS,GAAG,UAAU,CAAC;AAC9B,YAAA,MAAM,CAAC,WAAW,GAAG,IAAI,CAAC;SAC7B;aAAM,IAAI,MAAM,CAAC,UAAU,IAAI,IAAI,CAAC,MAAM,CAAC,sBAAsB,EAAE;AAChE,YAAA,MAAM,CAAC,SAAS,GAAG,MAAM,CAAC;AAC1B,YAAA,MAAM,CAAC,WAAW,GAAG,IAAI,CAAC;SAC7B;AAAM,aAAA,IAAI,MAAM,CAAC,UAAU,IAAI,GAAG,EAAE;AACjC,YAAA,MAAM,CAAC,SAAS,GAAG,QAAQ,CAAC;AAC5B,YAAA,MAAM,CAAC,WAAW,GAAG,KAAK,CAAC;SAC9B;aAAM;AACH,YAAA,MAAM,CAAC,SAAS,GAAG,KAAK,CAAC;AACzB,YAAA,MAAM,CAAC,WAAW,GAAG,KAAK,CAAC;SAC9B;;AAGD,QAAA,IAAI,IAAI,CAAC,MAAM,CAAC,WAAW,IAAI,MAAM,CAAC,UAAU,IAAI,GAAG,EAAE;AACrD,YAAA,IAAI,CAAC,UAAU,CAAC,KAAK,EAAE,MAAM,CAAC,CAAC;SAClC;;AAGD,QAAA,IAAI,MAAM,CAAC,UAAU,IAAI,GAAG,EAAE;YAC1B,MAAM,CAAC,cAAc,GAAG,IAAI,CAAC,aAAa,CAAC,KAAK,CAAC,CAAC;SACrD;AAED,QAAA,OAAO,MAAM,CAAC;KACjB;AAED;;AAEG;IACK,cAAc,CAAC,KAAa,EAAE,OAAe,EAAA;QACjD,IAAI,KAAK,GAAG,CAAC,CAAC;;AAGd,QAAA,MAAM,gBAAgB,GAAG;YACrB,QAAQ;YACR,QAAQ;YACR,MAAM;YACN,aAAa;YACb,SAAS;YACT,QAAQ;YACR,SAAS;YACT,OAAO;YACP,SAAS;YACT,SAAS;YACT,OAAO;SACV,CAAC;QAEF,MAAM,iBAAiB,GAAG,gBAAgB,CAAC,IAAI,CAAC,CAAC,GAAG,KAChD,OAAO,CAAC,WAAW,EAAE,CAAC,QAAQ,CAAC,GAAG,CAAC,CACtC,CAAC;QAEF,IAAI,CAAC,kBAAkB,CAAC,OAAO,CAAC,CAAC,OAAO,EAAE,KAAK,KAAI;YAC/C,MAAM,OAAO,GAAG,KAAK,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC;YACrC,IAAI,OAAO,EAAE;AACT,gBAAA,IAAI,YAAY,GAAG,GAAG,GAAG,OAAO,CAAC,MAAM,CAAC;;gBAGxC,IAAI,iBAAiB,EAAE;AACnB,oBAAA,YAAY,IAAI,GAAG,CAAC;iBACvB;;AAGD,gBAAA,IAAI,KAAK,KAAK,CAAC,IAAI,iBAAiB,EAAE;;AAElC,oBAAA,YAAY,IAAI,GAAG,CAAC;iBACvB;gBAED,IAAI,KAAK,KAAK,CAAC,IAAI,KAAK,KAAK,CAAC,EAAE;;AAE5B,oBAAA,IACI,OAAO,CAAC,QAAQ,CAAC,MAAM,CAAC;AACxB,wBAAA,OAAO,CAAC,QAAQ,CAAC,aAAa,CAAC,EACjC;wBACE,YAAY,IAAI,GAAG,CAAC;qBACvB;iBACJ;gBAED,KAAK,IAAI,YAAY,CAAC;aACzB;AACL,SAAC,CAAC,CAAC;AAEH,QAAA,OAAO,KAAK,CAAC;KAChB;AAED;;AAEG;AACK,IAAA,wBAAwB,CAAC,KAAa,EAAA;QAC1C,IAAI,eAAe,GAAG,CAAC,CAAC;;QAGxB,MAAM,YAAY,GAAG,KAAK,CAAC,KAAK,CAAC,mBAAmB,CAAC,CAAC;QACtD,IAAI,YAAY,IAAI,YAAY,CAAC,MAAM,GAAG,CAAC,EAAE;AACzC,YAAA,eAAe,IAAI,GAAG,CAAC;SAC1B;;AAGD,QAAA,MAAM,kBAAkB,GAAG;AACvB,YAAA,4BAA4B;AAC5B,YAAA,0BAA0B;AAC1B,YAAA,wBAAwB;AACxB,YAAA,0BAA0B;SAC7B,CAAC;AAEF,QAAA,kBAAkB,CAAC,OAAO,CAAC,CAAC,OAAO,KAAI;AACnC,YAAA,IAAI,OAAO,CAAC,IAAI,CAAC,KAAK,CAAC,EAAE;gBACrB,eAAe,IAAI,IAAI,CAAC;aAC3B;AACL,SAAC,CAAC,CAAC;;AAGH,QAAA,IAAI,KAAK,CAAC,MAAM,GAAG,EAAE,IAAI,KAAK,CAAC,MAAM,GAAG,GAAG,EAAE;YACzC,eAAe,IAAI,GAAG,CAAC;SAC1B;;AAGD,QAAA,MAAM,YAAY,GAAG,CAAC,KAAK,CAAC,KAAK,CAAC,IAAI,CAAC,IAAI,EAAE,EAAE,MAAM,CAAC;AACtD,QAAA,MAAM,YAAY,GAAG,CAAC,KAAK,CAAC,KAAK,CAAC,IAAI,CAAC,IAAI,EAAE,EAAE,MAAM,CAAC;AACtD,QAAA,IAAI,YAAY,GAAG,CAAC,KAAK,CAAC,IAAI,YAAY,GAAG,CAAC,KAAK,CAAC,EAAE;YAClD,eAAe,IAAI,GAAG,CAAC;SAC1B;QAED,OAAO,IAAI,CAAC,GAAG,CAAC,eAAe,EAAE,GAAG,CAAC,CAAC;KACzC;AAED;;AAEG;AACH,IAAA,aAAa,CAAC,KAAa,EAAA;AACvB,QAAA,IAAI,CAAC,KAAK;AAAE,YAAA,OAAO,KAAK,CAAC;QAEzB,IAAI,SAAS,GAAG,KAAK,CAAC;;QAGtB,SAAS,GAAG,SAAS,CAAC,OAAO,CAAC,aAAa,EAAE,EAAE,CAAC,CAAC;QACjD,SAAS,GAAG,SAAS,CAAC,OAAO,CAAC,cAAc,EAAE,EAAE,CAAC,CAAC;;QAGlD,MAAM,gBAAgB,GAAG,yCAAyC,CAAC;QACnE,SAAS,GAAG,SAAS,CAAC,OAAO,CAAC,gBAAgB,EAAE,MAAM,CAAC,CAAC;;QAGxD,SAAS,GAAG,SAAS,CAAC,OAAO,CAAC,aAAa,EAAE,EAAE,CAAC,CAAC;;QAGjD,SAAS,GAAG,SAAS,CAAC,OAAO,CACzB,+DAA+D,EAC/D,KAAK,CACR,CAAC;AAEF,QAAA,OAAO,SAAS,CAAC,IAAI,EAAE,CAAC;KAC3B;AAED;;AAEG;AACH,IAAA,mBAAmB,CACf,KAAa,EACb,gBAAA,GAA4B,KAAK,EAAA;QAEjC,MAAM,MAAM,GAAG,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC;AAElC,QAAA,IAAI,MAAM,CAAC,WAAW,IAAI,gBAAgB,EAAE;AACxC,YAAA,MAAM,IAAI,KAAK,CACX,CAA+C,4CAAA,EAAA,CAC3C,MAAM,CAAC,UAAU,GAAG,GAAG,EACzB,OAAO,CAAC,CAAC,CAAC,CAAK,GAAA,CAAA;gBACb,CAAa,UAAA,EAAA,MAAM,CAAC,gBAAgB,CAAC,IAAI,CAAC,IAAI,CAAC,CAAE,CAAA,CACxD,CAAC;SACL;AAED,QAAA,OAAO,MAAM,CAAC,cAAc,IAAI,EAAE,CAAC;KACtC;AAED;;AAEG;IACH,wBAAwB,CACpB,KAAa,EACb,MAAa,EAAA;;QAGb,IAAI,kBAAkB,GAAG,KAAK,CAAC;QAC/B,MAAM,UAAU,GAAU,EAAE,CAAC;QAE7B,MAAM,CAAC,OAAO,CAAC,CAAC,KAAK,EAAE,KAAK,KAAI;AAC5B,YAAA,IAAI,OAAO,KAAK,KAAK,QAAQ,EAAE;gBAC3B,MAAM,MAAM,GAAG,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC;AAClC,gBAAA,IAAI,MAAM,CAAC,WAAW,EAAE;AACpB,oBAAA,MAAM,IAAI,KAAK,CACX,aAAa,KAAK,CAAA,iCAAA,CAAmC,CACxD,CAAC;iBACL;AACD,gBAAA,UAAU,CAAC,IAAI,CAAC,MAAM,CAAC,cAAc,CAAC,CAAC;aAC1C;iBAAM;AACH,gBAAA,UAAU,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;aAC1B;AACL,SAAC,CAAC,CAAC;QAEH,OAAO,EAAE,KAAK,EAAE,kBAAkB,EAAE,MAAM,EAAE,UAAU,EAAE,CAAC;KAC5D;AAEO,IAAA,sBAAsB,CAAC,KAAa,EAAA;AACxC,QAAA,MAAM,KAAK,GAAG;YACV,qBAAqB;YACrB,qBAAqB;YACrB,wBAAwB;YACxB,qBAAqB;YACrB,sBAAsB;YACtB,qBAAqB;YACrB,8BAA8B;YAC9B,kBAAkB;YAClB,sBAAsB;YACtB,uBAAuB;YACvB,0BAA0B;YAC1B,oBAAoB;YACpB,uBAAuB;YACvB,uBAAuB;YACvB,sBAAsB;SACzB,CAAC;QACF,OAAO,KAAK,CAAC,KAAK,CAAC,IAAI,CAAqB,kBAAA,EAAA,KAAK,EAAE,CAAC;KACvD;AAEO,IAAA,wBAAwB,CAAC,KAAa,EAAA;;AAE1C,QAAA,MAAM,OAAO,GAAG;AACZ,YAAA,GAAG;AACH,YAAA,GAAG;AACH,YAAA,GAAG;AACH,YAAA,GAAG;AACH,YAAA,GAAG;AACH,YAAA,GAAG;AACH,YAAA,GAAG;AACH,YAAA,GAAG;AACH,YAAA,GAAG;AACH,YAAA,GAAG;AACH,YAAA,GAAG;AACH,YAAA,GAAG;AACH,YAAA,GAAG;AACH,YAAA,GAAG;AACH,YAAA,GAAG;SACN,CAAC;AACF,QAAA,OAAO,OAAO,CAAC,KAAK,CAAC,IAAI,GAAG,CAAC;KAChC;IAEO,UAAU,CAAC,KAAa,EAAE,MAAuB,EAAA;AACrD,QAAA,OAAO,CAAC,IAAI,CAAC,CAAA,+BAAA,CAAiC,EAAE;AAC5C,YAAA,SAAS,EAAE,IAAI,IAAI,EAAE,CAAC,WAAW,EAAE;YACnC,KAAK,EAAE,KAAK,CAAC,SAAS,CAAC,CAAC,EAAE,GAAG,CAAC,IAAI,KAAK,CAAC,MAAM,GAAG,GAAG,GAAG,KAAK,GAAG,EAAE,CAAC;YAClE,UAAU,EAAE,MAAM,CAAC,UAAU;YAC7B,QAAQ,EAAE,MAAM,CAAC,gBAAgB;AACpC,SAAA,CAAC,CAAC;KACN;AAED;;AAEG;AACH,IAAA,YAAY,CAAC,SAAsC,EAAA;AAC/C,QAAA,IAAI,CAAC,MAAM,GAAG,EAAE,GAAG,IAAI,CAAC,MAAM,EAAE,GAAG,SAAS,EAAE,CAAC;KAClD;AAED;;AAEG;IACH,SAAS,GAAA;AACL,QAAA,OAAO,EAAE,GAAG,IAAI,CAAC,MAAM,EAAE,CAAC;KAC7B;AACJ;;;;"}
|
|
@@ -1,35 +0,0 @@
|
|
|
1
|
-
'use strict';
|
|
2
|
-
|
|
3
|
-
const rateLimitConfig = (cf) => {
|
|
4
|
-
return {
|
|
5
|
-
enabled: cf?.rateLimit?.enabled ?? true,
|
|
6
|
-
strategy: cf?.rateLimit?.strategy ?? "sliding-window",
|
|
7
|
-
global: {
|
|
8
|
-
requests: cf?.rateLimit?.global?.requests ?? 1000,
|
|
9
|
-
window: cf?.rateLimit?.global?.window ?? "1h",
|
|
10
|
-
},
|
|
11
|
-
perIP: {
|
|
12
|
-
requests: cf?.rateLimit?.perIP?.requests ?? 100,
|
|
13
|
-
window: cf?.rateLimit?.perIP?.window ?? "1m",
|
|
14
|
-
},
|
|
15
|
-
perUser: cf?.rateLimit?.perUser
|
|
16
|
-
? {
|
|
17
|
-
requests: cf?.rateLimit.perUser.requests ?? 50,
|
|
18
|
-
window: cf?.rateLimit.perUser.window ?? "1m",
|
|
19
|
-
}
|
|
20
|
-
: undefined,
|
|
21
|
-
headers: cf?.rateLimit?.headers,
|
|
22
|
-
redis: cf?.rateLimit?.redis
|
|
23
|
-
? {
|
|
24
|
-
host: cf?.rateLimit.redis.host ?? "localhost",
|
|
25
|
-
port: cf?.rateLimit.redis.port ?? 6379,
|
|
26
|
-
password: cf?.rateLimit.redis.password,
|
|
27
|
-
db: cf?.rateLimit.redis.db ?? 0,
|
|
28
|
-
keyPrefix: cf?.rateLimit.redis.keyPrefix ?? "xypriss:ratelimit:",
|
|
29
|
-
}
|
|
30
|
-
: undefined,
|
|
31
|
-
};
|
|
32
|
-
};
|
|
33
|
-
|
|
34
|
-
exports.rateLimitConfig = rateLimitConfig;
|
|
35
|
-
//# sourceMappingURL=rateLimitConfig.js.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"rateLimitConfig.js","sources":["../../../../../src/server/conf/rateLimitConfig.ts"],"sourcesContent":[null],"names":[],"mappings":";;AAEa,MAAA,eAAe,GAAG,CAAC,EAA4B,KAAI;IAC5D,OAAO;AACH,QAAA,OAAO,EAAE,EAAE,EAAE,SAAS,EAAE,OAAO,IAAI,IAAI;AACvC,QAAA,QAAQ,EAAE,EAAE,EAAE,SAAS,EAAE,QAAQ,IAAI,gBAAgB;AACrD,QAAA,MAAM,EAAE;YACJ,QAAQ,EAAE,EAAE,EAAE,SAAS,EAAE,MAAM,EAAE,QAAQ,IAAI,IAAI;YACjD,MAAM,EAAE,EAAE,EAAE,SAAS,EAAE,MAAM,EAAE,MAAM,IAAI,IAAI;AAChD,SAAA;AACD,QAAA,KAAK,EAAE;YACH,QAAQ,EAAE,EAAE,EAAE,SAAS,EAAE,KAAK,EAAE,QAAQ,IAAI,GAAG;YAC/C,MAAM,EAAE,EAAE,EAAE,SAAS,EAAE,KAAK,EAAE,MAAM,IAAI,IAAI;AAC/C,SAAA;AACD,QAAA,OAAO,EAAE,EAAE,EAAE,SAAS,EAAE,OAAO;AAC3B,cAAE;gBACI,QAAQ,EAAE,EAAE,EAAE,SAAS,CAAC,OAAO,CAAC,QAAQ,IAAI,EAAE;gBAC9C,MAAM,EAAE,EAAE,EAAE,SAAS,CAAC,OAAO,CAAC,MAAM,IAAI,IAAI;AAC/C,aAAA;AACH,cAAE,SAAS;AACf,QAAA,OAAO,EAAE,EAAE,EAAE,SAAS,EAAE,OAAO;AAC/B,QAAA,KAAK,EAAE,EAAE,EAAE,SAAS,EAAE,KAAK;AACvB,cAAE;gBACI,IAAI,EAAE,EAAE,EAAE,SAAS,CAAC,KAAK,CAAC,IAAI,IAAI,WAAW;gBAC7C,IAAI,EAAE,EAAE,EAAE,SAAS,CAAC,KAAK,CAAC,IAAI,IAAI,IAAI;AACtC,gBAAA,QAAQ,EAAE,EAAE,EAAE,SAAS,CAAC,KAAK,CAAC,QAAQ;gBACtC,EAAE,EAAE,EAAE,EAAE,SAAS,CAAC,KAAK,CAAC,EAAE,IAAI,CAAC;gBAC/B,SAAS,EACL,EAAE,EAAE,SAAS,CAAC,KAAK,CAAC,SAAS,IAAI,oBAAoB;AAC5D,aAAA;AACH,cAAE,SAAS;KAClB,CAAC;AACN;;;;"}
|
|
@@ -1,92 +0,0 @@
|
|
|
1
|
-
'use strict';
|
|
2
|
-
|
|
3
|
-
/**
|
|
4
|
-
* Wildcard pattern matching utility for CORS origins
|
|
5
|
-
*
|
|
6
|
-
* Supports patterns like:
|
|
7
|
-
* - "localhost:*" matches "localhost:3000", "localhost:8080", etc.
|
|
8
|
-
* - "*.example.com" matches "api.example.com", "app.example.com", etc.
|
|
9
|
-
* - "127.0.0.1:*" matches "127.0.0.1:3000", "127.0.0.1:8080", etc.
|
|
10
|
-
* - "::1:*" matches "::1:3000", "::1:8080", etc.
|
|
11
|
-
*/
|
|
12
|
-
/**
|
|
13
|
-
* Converts a wildcard pattern to a regular expression
|
|
14
|
-
* @param pattern - The wildcard pattern (e.g., "localhost:*", "*.example.com")
|
|
15
|
-
* @returns RegExp object for matching
|
|
16
|
-
*/
|
|
17
|
-
function patternToRegex(pattern) {
|
|
18
|
-
// Escape special regex characters except for *
|
|
19
|
-
const escaped = pattern
|
|
20
|
-
.replace(/[.+?^${}()|[\]\\]/g, '\\$&') // Escape special chars
|
|
21
|
-
.replace(/\*/g, '.*'); // Replace * with .*
|
|
22
|
-
// Ensure exact match with ^ and $
|
|
23
|
-
return new RegExp(`^${escaped}$`, 'i'); // Case insensitive
|
|
24
|
-
}
|
|
25
|
-
/**
|
|
26
|
-
* Checks if an origin matches a wildcard pattern
|
|
27
|
-
* @param origin - The origin to check (e.g., "http://localhost:3000")
|
|
28
|
-
* @param pattern - The wildcard pattern (e.g., "localhost:*")
|
|
29
|
-
* @returns true if the origin matches the pattern
|
|
30
|
-
*/
|
|
31
|
-
function matchesWildcardPattern(origin, pattern) {
|
|
32
|
-
// Handle exact matches first (no wildcards)
|
|
33
|
-
if (!pattern.includes('*')) {
|
|
34
|
-
return origin === pattern || origin.includes(pattern);
|
|
35
|
-
}
|
|
36
|
-
// Extract the host:port part from the origin URL
|
|
37
|
-
let originHost;
|
|
38
|
-
try {
|
|
39
|
-
const url = new URL(origin);
|
|
40
|
-
originHost = url.host; // This includes both hostname and port
|
|
41
|
-
// Special handling for default ports
|
|
42
|
-
if (url.protocol === 'https:' && url.port === '' && url.hostname === 'localhost') {
|
|
43
|
-
originHost = 'localhost:443';
|
|
44
|
-
}
|
|
45
|
-
else if (url.protocol === 'http:' && url.port === '' && url.hostname === 'localhost') {
|
|
46
|
-
originHost = 'localhost:80';
|
|
47
|
-
}
|
|
48
|
-
// Handle IPv6 addresses - remove brackets for pattern matching
|
|
49
|
-
if (url.hostname.startsWith('[') && url.hostname.endsWith(']')) {
|
|
50
|
-
const ipv6Host = url.hostname.slice(1, -1); // Remove brackets
|
|
51
|
-
originHost = url.port ? `${ipv6Host}:${url.port}` : ipv6Host;
|
|
52
|
-
}
|
|
53
|
-
}
|
|
54
|
-
catch {
|
|
55
|
-
// If it's not a valid URL, treat it as a host:port string
|
|
56
|
-
originHost = origin;
|
|
57
|
-
}
|
|
58
|
-
const regex = patternToRegex(pattern);
|
|
59
|
-
return regex.test(originHost);
|
|
60
|
-
}
|
|
61
|
-
/**
|
|
62
|
-
* Checks if an origin is allowed based on an array of patterns
|
|
63
|
-
* @param origin - The origin to check
|
|
64
|
-
* @param allowedOrigins - Array of allowed origins (can include wildcards)
|
|
65
|
-
* @returns true if the origin is allowed
|
|
66
|
-
*/
|
|
67
|
-
function isOriginAllowed(origin, allowedOrigins) {
|
|
68
|
-
if (!origin || !allowedOrigins || allowedOrigins.length === 0) {
|
|
69
|
-
return false;
|
|
70
|
-
}
|
|
71
|
-
return allowedOrigins.some(pattern => matchesWildcardPattern(origin, pattern));
|
|
72
|
-
}
|
|
73
|
-
/**
|
|
74
|
-
* Creates a CORS origin function that supports wildcard patterns
|
|
75
|
-
* @param allowedOrigins - Array of allowed origins (can include wildcards)
|
|
76
|
-
* @returns Function compatible with cors middleware
|
|
77
|
-
*/
|
|
78
|
-
function createWildcardOriginFunction(allowedOrigins) {
|
|
79
|
-
return (origin, callback) => {
|
|
80
|
-
// Allow requests with no origin (like mobile apps or curl requests)
|
|
81
|
-
if (!origin) {
|
|
82
|
-
return callback(null, true);
|
|
83
|
-
}
|
|
84
|
-
const allowed = isOriginAllowed(origin, allowedOrigins);
|
|
85
|
-
callback(null, allowed);
|
|
86
|
-
};
|
|
87
|
-
}
|
|
88
|
-
|
|
89
|
-
exports.createWildcardOriginFunction = createWildcardOriginFunction;
|
|
90
|
-
exports.isOriginAllowed = isOriginAllowed;
|
|
91
|
-
exports.matchesWildcardPattern = matchesWildcardPattern;
|
|
92
|
-
//# sourceMappingURL=wildcardMatcher.js.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"wildcardMatcher.js","sources":["../../../../../src/server/utils/wildcardMatcher.ts"],"sourcesContent":[null],"names":[],"mappings":";;AAAA;;;;;;;;AAQG;AAEH;;;;AAIG;AACH,SAAS,cAAc,CAAC,OAAe,EAAA;;IAEnC,MAAM,OAAO,GAAG,OAAO;AAClB,SAAA,OAAO,CAAC,oBAAoB,EAAE,MAAM,CAAC;AACrC,SAAA,OAAO,CAAC,KAAK,EAAE,IAAI,CAAC,CAAC;;IAG1B,OAAO,IAAI,MAAM,CAAC,CAAI,CAAA,EAAA,OAAO,CAAG,CAAA,CAAA,EAAE,GAAG,CAAC,CAAC;AAC3C,CAAC;AAED;;;;;AAKG;AACa,SAAA,sBAAsB,CAAC,MAAc,EAAE,OAAe,EAAA;;IAElE,IAAI,CAAC,OAAO,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE;QACxB,OAAO,MAAM,KAAK,OAAO,IAAI,MAAM,CAAC,QAAQ,CAAC,OAAO,CAAC,CAAC;KACzD;;AAGD,IAAA,IAAI,UAAkB,CAAC;AACvB,IAAA,IAAI;AACA,QAAA,MAAM,GAAG,GAAG,IAAI,GAAG,CAAC,MAAM,CAAC,CAAC;AAC5B,QAAA,UAAU,GAAG,GAAG,CAAC,IAAI,CAAC;;AAGtB,QAAA,IAAI,GAAG,CAAC,QAAQ,KAAK,QAAQ,IAAI,GAAG,CAAC,IAAI,KAAK,EAAE,IAAI,GAAG,CAAC,QAAQ,KAAK,WAAW,EAAE;YAC9E,UAAU,GAAG,eAAe,CAAC;SAChC;AAAM,aAAA,IAAI,GAAG,CAAC,QAAQ,KAAK,OAAO,IAAI,GAAG,CAAC,IAAI,KAAK,EAAE,IAAI,GAAG,CAAC,QAAQ,KAAK,WAAW,EAAE;YACpF,UAAU,GAAG,cAAc,CAAC;SAC/B;;AAGD,QAAA,IAAI,GAAG,CAAC,QAAQ,CAAC,UAAU,CAAC,GAAG,CAAC,IAAI,GAAG,CAAC,QAAQ,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE;AAC5D,YAAA,MAAM,QAAQ,GAAG,GAAG,CAAC,QAAQ,CAAC,KAAK,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC;AAC3C,YAAA,UAAU,GAAG,GAAG,CAAC,IAAI,GAAG,CAAG,EAAA,QAAQ,CAAI,CAAA,EAAA,GAAG,CAAC,IAAI,CAAA,CAAE,GAAG,QAAQ,CAAC;SAChE;KACJ;AAAC,IAAA,MAAM;;QAEJ,UAAU,GAAG,MAAM,CAAC;KACvB;AAED,IAAA,MAAM,KAAK,GAAG,cAAc,CAAC,OAAO,CAAC,CAAC;AACtC,IAAA,OAAO,KAAK,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC;AAClC,CAAC;AAED;;;;;AAKG;AACa,SAAA,eAAe,CAAC,MAAc,EAAE,cAAwB,EAAA;AACpE,IAAA,IAAI,CAAC,MAAM,IAAI,CAAC,cAAc,IAAI,cAAc,CAAC,MAAM,KAAK,CAAC,EAAE;AAC3D,QAAA,OAAO,KAAK,CAAC;KAChB;AAED,IAAA,OAAO,cAAc,CAAC,IAAI,CAAC,OAAO,IAAI,sBAAsB,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC,CAAC;AACnF,CAAC;AAED;;;;AAIG;AACG,SAAU,4BAA4B,CAAC,cAAwB,EAAA;AACjE,IAAA,OAAO,CAAC,MAA0B,EAAE,QAAsD,KAAI;;QAE1F,IAAI,CAAC,MAAM,EAAE;AACT,YAAA,OAAO,QAAQ,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;SAC/B;QAED,MAAM,OAAO,GAAG,eAAe,CAAC,MAAM,EAAE,cAAc,CAAC,CAAC;AACxD,QAAA,QAAQ,CAAC,IAAI,EAAE,OAAO,CAAC,CAAC;AAC5B,KAAC,CAAC;AACN;;;;;;"}
|
|
@@ -1,54 +0,0 @@
|
|
|
1
|
-
import { Hash } from './hash/hash-core.js';
|
|
2
|
-
import './hash/hash-types.js';
|
|
3
|
-
import 'crypto';
|
|
4
|
-
import './hash/hash-security.js';
|
|
5
|
-
import './hash/hash-advanced.js';
|
|
6
|
-
import '../algorithms/hash-algorithms.js';
|
|
7
|
-
import { XyPrissSecurity } from './crypto.js';
|
|
8
|
-
import { SecureRandom } from './random/random-core.js';
|
|
9
|
-
import './random/random-types.js';
|
|
10
|
-
import './random/random-sources.js';
|
|
11
|
-
import 'nehonix-uri-processor';
|
|
12
|
-
import '../utils/memory/index.js';
|
|
13
|
-
import '../types.js';
|
|
14
|
-
|
|
15
|
-
class Cryptog {
|
|
16
|
-
constructor() {
|
|
17
|
-
this.hash = Hash;
|
|
18
|
-
this.crypto = XyPrissSecurity;
|
|
19
|
-
this.random = SecureRandom.getInstance();
|
|
20
|
-
}
|
|
21
|
-
static getInstance() {
|
|
22
|
-
if (!Cryptog.instance) {
|
|
23
|
-
Cryptog.instance = new Cryptog();
|
|
24
|
-
}
|
|
25
|
-
return Cryptog.instance;
|
|
26
|
-
}
|
|
27
|
-
}
|
|
28
|
-
/**
|
|
29
|
-
* ### Cryptographic Core
|
|
30
|
-
*
|
|
31
|
-
* Primary cryptographic classes and utilities for secure random generation,
|
|
32
|
-
* key management, validation, and buffer operations.
|
|
33
|
-
*
|
|
34
|
-
* @example
|
|
35
|
-
* ```typescript
|
|
36
|
-
* import { Cipher } from "xypriss-security";
|
|
37
|
-
*
|
|
38
|
-
* // Generate secure random bytes
|
|
39
|
-
* const randomBytes = Cipher.random.getRandomBytes(32);
|
|
40
|
-
*
|
|
41
|
-
* // Generate secure UUID
|
|
42
|
-
* const uuid = Cipher.random.generateSecureUUID();
|
|
43
|
-
*
|
|
44
|
-
* // Generate random integers
|
|
45
|
-
* const randomInt = Cipher.random.getSecureRandomInt(1, 100);
|
|
46
|
-
* ```
|
|
47
|
-
* @author Seth Eleazar <https://github.com/iDevo-ll>
|
|
48
|
-
* @version 1.1.6
|
|
49
|
-
* @license MIT
|
|
50
|
-
* @see {@link https://lab.nehonix.space/nehonix_viewer/_doc/Nehonix%20XyPrissSecurity} Official Documentation
|
|
51
|
-
*
|
|
52
|
-
*/
|
|
53
|
-
Cryptog.getInstance();
|
|
54
|
-
//# sourceMappingURL=crypt.js.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"crypt.js","sources":["../../../../../../mods/security/src/core/crypt.ts"],"sourcesContent":[null],"names":[],"mappings":";;;;;;;;;;;;;;AAIA,MAAM,OAAO,CAAA;AAOT,IAAA,WAAA,GAAA;QANgB,IAAI,CAAA,IAAA,GAAgB,IAAI,CAAC;QACzB,IAAM,CAAA,MAAA,GAA2B,eAAe,CAAC;AACjD,QAAA,IAAA,CAAA,MAAM,GAAiB,YAAY,CAAC,WAAW,EAAE,CAAC;KAI1C;AAEjB,IAAA,OAAO,WAAW,GAAA;AACrB,QAAA,IAAI,CAAC,OAAO,CAAC,QAAQ,EAAE;AACnB,YAAA,OAAO,CAAC,QAAQ,GAAG,IAAI,OAAO,EAAE,CAAC;SACpC;QACD,OAAO,OAAO,CAAC,QAAQ,CAAC;KAC3B;AACJ,CAAA;AAED;;;;;;;;;;;;;;;;;;;;;;;;AAwBG;AACmB,OAAO,CAAC,WAAW"}
|