Skip to content

Commit 8781d5f

Browse files
committed
style: run check:fix
1 parent 6192cc6 commit 8781d5f

File tree

4 files changed

+30
-25
lines changed

4 files changed

+30
-25
lines changed

src/index.ts

Lines changed: 7 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -8,28 +8,23 @@ import type {
88
CsrfTokenAndHashPairValidator,
99
CsrfTokenCreator,
1010
DoubleCsrfConfig,
11+
DoubleCsrfProtection,
1112
DoubleCsrfUtilities,
1213
GenerateCsrfTokenConfig,
1314
RequestMethod,
1415
ResolvedCSRFCookieOptions,
15-
DoubleCsrfProtection,
1616
} from "./types"
1717

1818
function setSecretCookie<
1919
Request extends CSRFRequest = CSRFRequest,
20-
Response extends CSRFResponse<Request> = CSRFResponse<Request>
21-
>(
22-
req: Request,
23-
res: Response,
24-
secret: string,
25-
{ name, ...options }: ResolvedCSRFCookieOptions,
26-
): void {
20+
Response extends CSRFResponse<Request> = CSRFResponse<Request>,
21+
>(req: Request, res: Response, secret: string, { name, ...options }: ResolvedCSRFCookieOptions): void {
2722
res.cookie(name, secret, options)
2823
}
2924

3025
export function doubleCsrf<
3126
Request extends CSRFRequest = CSRFRequest,
32-
Response extends CSRFResponse<Request> = CSRFResponse<Request>
27+
Response extends CSRFResponse<Request> = CSRFResponse<Request>,
3328
>({
3429
getSecret,
3530
getSessionIdentifier,
@@ -163,11 +158,11 @@ export function doubleCsrf<
163158

164159
return (
165160
csrfTokenFromCookie === csrfTokenFromRequest &&
166-
await validateTokenAndHashPair(req, res, {
161+
(await validateTokenAndHashPair(req, res, {
167162
incomingToken: csrfTokenFromRequest,
168163
incomingHash: csrfTokenHash,
169164
possibleSecrets,
170-
})
165+
}))
171166
)
172167
}
173168

@@ -176,7 +171,7 @@ export function doubleCsrf<
176171
next()
177172
return
178173
}
179-
if (!await validateRequest(req, res)) {
174+
if (!(await validateRequest(req, res))) {
180175
throw invalidCsrfTokenError
181176
}
182177
next()

src/types.ts

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -27,25 +27,25 @@ export type ResolvedCSRFCookieOptions = SerializeOptions & Required<ExtraCookieO
2727

2828
export type TokenRetriever<
2929
Request extends CSRFRequest = CSRFRequest,
30-
Response extends CSRFResponse<Request> = CSRFResponse<Request>
30+
Response extends CSRFResponse<Request> = CSRFResponse<Request>,
3131
> = (req: Request, res: Response) => string | null | undefined | Promise<string | null | undefined>
3232
export type CsrfSecretRetriever<
3333
Request extends CSRFRequest = CSRFRequest,
34-
Response extends CSRFResponse<Request> = CSRFResponse<Request>
34+
Response extends CSRFResponse<Request> = CSRFResponse<Request>,
3535
> = (req: Request, res: Response) => string | Array<string> | Promise<string | Array<string>>
3636
export type DoubleCsrfProtection<
3737
Request extends CSRFRequest = CSRFRequest,
38-
Response extends CSRFResponse<Request> = CSRFResponse<Request>
38+
Response extends CSRFResponse<Request> = CSRFResponse<Request>,
3939
> = (req: Request, res: Response, next: NextFunction) => Promise<void>
4040
export type RequestMethod = "GET" | "HEAD" | "PATCH" | "PUT" | "POST" | "DELETE" | "CONNECT" | "OPTIONS" | "TRACE"
4141
export type CsrfIgnoredMethods = Array<RequestMethod>
4242
export type CsrfRequestValidator<
4343
Request extends CSRFRequest = CSRFRequest,
44-
Response extends CSRFResponse<Request> = CSRFResponse<Request>
44+
Response extends CSRFResponse<Request> = CSRFResponse<Request>,
4545
> = (req: Request, res: Response) => Promise<boolean>
4646
export type CsrfTokenAndHashPairValidator<
4747
Request extends CSRFRequest = CSRFRequest,
48-
Response extends CSRFResponse<Request> = CSRFResponse<Request>
48+
Response extends CSRFResponse<Request> = CSRFResponse<Request>,
4949
> = (
5050
req: Request,
5151
res: Response,
@@ -61,7 +61,7 @@ export type CsrfTokenAndHashPairValidator<
6161
) => Promise<boolean>
6262
export type CsrfTokenCreator<
6363
Request extends CSRFRequest = CSRFRequest,
64-
Response extends CSRFResponse<Request> = CSRFResponse<Request>
64+
Response extends CSRFResponse<Request> = CSRFResponse<Request>,
6565
> = (req: Request, res: Response, options?: GenerateCsrfTokenOptions) => Promise<string>
6666
export type CsrfErrorConfig = {
6767
statusCode: keyof typeof statusMessages
@@ -77,7 +77,7 @@ export type GenerateCsrfTokenConfig = {
7777
export type GenerateCsrfTokenOptions = Partial<GenerateCsrfTokenConfig>
7878
export type DoubleCsrfConfig<
7979
Request extends CSRFRequest = CSRFRequest,
80-
Response extends CSRFResponse<Request> = CSRFResponse<Request>
80+
Response extends CSRFResponse<Request> = CSRFResponse<Request>,
8181
> = {
8282
/**
8383
* A function that returns a secret or an array of secrets.
@@ -158,7 +158,7 @@ export type DoubleCsrfConfig<
158158

159159
export interface DoubleCsrfUtilities<
160160
Request extends CSRFRequest = CSRFRequest,
161-
Response extends CSRFResponse<Request> = CSRFResponse<Request>
161+
Response extends CSRFResponse<Request> = CSRFResponse<Request>,
162162
> {
163163
/**
164164
* The error that will be thrown if a request is invalid.

tests/doublecsrf.test.ts

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -68,11 +68,11 @@ describe("csrf-csrf token-rotation", () => {
6868
})
6969

7070
return {
71-
...await generateMocksWithToken({
71+
...(await generateMocksWithToken({
7272
cookieName,
7373
generateToken,
7474
validateRequest,
75-
}),
75+
})),
7676
validateRequest,
7777
generateToken,
7878
}

tests/testsuite.ts

Lines changed: 13 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,12 @@ export const createTestSuite: CreateTestSuite = (name, doubleCsrfOptions) => {
7373
})
7474

7575
it("should reuse a csrf token if a csrf cookie is already present, and overwrite is set to false", async () => {
76-
const { mockRequest, mockResponse, csrfToken, cookieValue: oldCookieValue } = await generateMocksWithTokenInternal()
76+
const {
77+
mockRequest,
78+
mockResponse,
79+
csrfToken,
80+
cookieValue: oldCookieValue,
81+
} = await generateMocksWithTokenInternal()
7782

7883
// reset the mock response to have no cookies (in reality this would just be a new instance of Response)
7984
mockResponse.setHeader("set-cookie", [])
@@ -87,7 +92,12 @@ export const createTestSuite: CreateTestSuite = (name, doubleCsrfOptions) => {
8792
})
8893

8994
it("should generate a new token even if a csrf cookie is already present, if overwrite is set to true", async () => {
90-
const { mockRequest, mockResponse, csrfToken, cookieValue: oldCookieValue } = await generateMocksWithTokenInternal()
95+
const {
96+
mockRequest,
97+
mockResponse,
98+
csrfToken,
99+
cookieValue: oldCookieValue,
100+
} = await generateMocksWithTokenInternal()
91101

92102
// reset the mock response to have no cookies (in reality this would just be a new instance of Response)
93103
mockResponse.setHeader("set-cookie", [])
@@ -145,7 +155,7 @@ export const createTestSuite: CreateTestSuite = (name, doubleCsrfOptions) => {
145155
async function runGenerateToken() {
146156
generatedToken = await generateToken(mockRequest, mockResponse, {
147157
overwrite: false,
148-
validateOnReuse: false
158+
validateOnReuse: false,
149159
})
150160
}
151161

0 commit comments

Comments
 (0)