Aktueller Stand
This commit is contained in:
78
backend/node_modules/hono/dist/cjs/middleware/csrf/index.js
generated
vendored
Normal file
78
backend/node_modules/hono/dist/cjs/middleware/csrf/index.js
generated
vendored
Normal file
@@ -0,0 +1,78 @@
|
||||
"use strict";
|
||||
var __defProp = Object.defineProperty;
|
||||
var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
|
||||
var __getOwnPropNames = Object.getOwnPropertyNames;
|
||||
var __hasOwnProp = Object.prototype.hasOwnProperty;
|
||||
var __export = (target, all) => {
|
||||
for (var name in all)
|
||||
__defProp(target, name, { get: all[name], enumerable: true });
|
||||
};
|
||||
var __copyProps = (to, from, except, desc) => {
|
||||
if (from && typeof from === "object" || typeof from === "function") {
|
||||
for (let key of __getOwnPropNames(from))
|
||||
if (!__hasOwnProp.call(to, key) && key !== except)
|
||||
__defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });
|
||||
}
|
||||
return to;
|
||||
};
|
||||
var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
|
||||
var csrf_exports = {};
|
||||
__export(csrf_exports, {
|
||||
csrf: () => csrf
|
||||
});
|
||||
module.exports = __toCommonJS(csrf_exports);
|
||||
var import_http_exception = require("../../http-exception");
|
||||
const secFetchSiteValues = ["same-origin", "same-site", "none", "cross-site"];
|
||||
const isSecFetchSite = (value) => secFetchSiteValues.includes(value);
|
||||
const isSafeMethodRe = /^(GET|HEAD)$/;
|
||||
const isRequestedByFormElementRe = /^\b(application\/x-www-form-urlencoded|multipart\/form-data|text\/plain)\b/i;
|
||||
const csrf = (options) => {
|
||||
const originHandler = ((optsOrigin) => {
|
||||
if (!optsOrigin) {
|
||||
return (origin, c) => origin === new URL(c.req.url).origin;
|
||||
} else if (typeof optsOrigin === "string") {
|
||||
return (origin) => origin === optsOrigin;
|
||||
} else if (typeof optsOrigin === "function") {
|
||||
return optsOrigin;
|
||||
} else {
|
||||
return (origin) => optsOrigin.includes(origin);
|
||||
}
|
||||
})(options?.origin);
|
||||
const isAllowedOrigin = async (origin, c) => {
|
||||
if (origin === void 0) {
|
||||
return false;
|
||||
}
|
||||
return await originHandler(origin, c);
|
||||
};
|
||||
const secFetchSiteHandler = ((optsSecFetchSite) => {
|
||||
if (!optsSecFetchSite) {
|
||||
return (secFetchSite) => secFetchSite === "same-origin";
|
||||
} else if (typeof optsSecFetchSite === "string") {
|
||||
return (secFetchSite) => secFetchSite === optsSecFetchSite;
|
||||
} else if (typeof optsSecFetchSite === "function") {
|
||||
return optsSecFetchSite;
|
||||
} else {
|
||||
return (secFetchSite) => optsSecFetchSite.includes(secFetchSite);
|
||||
}
|
||||
})(options?.secFetchSite);
|
||||
const isAllowedSecFetchSite = async (secFetchSite, c) => {
|
||||
if (secFetchSite === void 0) {
|
||||
return false;
|
||||
}
|
||||
if (!isSecFetchSite(secFetchSite)) {
|
||||
return false;
|
||||
}
|
||||
return await secFetchSiteHandler(secFetchSite, c);
|
||||
};
|
||||
return async function csrf2(c, next) {
|
||||
if (!isSafeMethodRe.test(c.req.method) && isRequestedByFormElementRe.test(c.req.header("content-type") || "text/plain") && !await isAllowedSecFetchSite(c.req.header("sec-fetch-site"), c) && !await isAllowedOrigin(c.req.header("origin"), c)) {
|
||||
const res = new Response("Forbidden", { status: 403 });
|
||||
throw new import_http_exception.HTTPException(403, { res });
|
||||
}
|
||||
await next();
|
||||
};
|
||||
};
|
||||
// Annotate the CommonJS export names for ESM import in node:
|
||||
0 && (module.exports = {
|
||||
csrf
|
||||
});
|
||||
Reference in New Issue
Block a user