**Motivations:** - Ensure all application directories have systemd services enabled at boot - Complete service installation for api-relay, filigrane-api, and clamav-api - Fix dependencies and import issues preventing clamav-api from starting **Root causes:** - Three services (api-relay, filigrane-api, clamav-api) had service files but were not installed in systemd - api-clamav had incorrect node-clamav version (0.12.1) that doesn't exist - api-clamav dependencies were not installed (node_modules missing) - ES module import syntax incompatible with CommonJS node-clamav package **Correctifs:** - Installed api-relay.service, filigrane-api.service, and clamav-api.service in /etc/systemd/system/ - Enabled all three services for automatic startup at boot - Updated api-clamav/package.json: changed node-clamav version from ^0.12.1 to ^1.0.11 - Installed npm dependencies for api-clamav - Fixed ES module import in api-clamav/src/routes/scan.js to use CommonJS-compatible syntax **Evolutions:** - All 7 application services now have systemd services enabled at boot - Complete service coverage: anchorage-api, faucet-api, signet-dashboard, userwallet, api-relay, filigrane-api, clamav-api - All services verified active and listening on their respective ports **Pages affectées:** - api-clamav/package.json - api-clamav/src/routes/scan.js - api-clamav/node_modules/ (new) - api-clamav/package-lock.json (new) - /etc/systemd/system/api-relay.service (new) - /etc/systemd/system/filigrane-api.service (new) - /etc/systemd/system/clamav-api.service (new)
52 lines
1.3 KiB
JavaScript
52 lines
1.3 KiB
JavaScript
/**
|
|
* Module dependencies.
|
|
*/
|
|
|
|
var crypto = require('crypto');
|
|
|
|
/**
|
|
* Sign the given `val` with `secret`.
|
|
*
|
|
* @param {String} val
|
|
* @param {String|NodeJS.ArrayBufferView|crypto.KeyObject} secret
|
|
* @return {String}
|
|
* @api private
|
|
*/
|
|
|
|
exports.sign = function(val, secret){
|
|
if ('string' !== typeof val) throw new TypeError("Cookie value must be provided as a string.");
|
|
if (null == secret) throw new TypeError("Secret key must be provided.");
|
|
return val + '.' + crypto
|
|
.createHmac('sha256', secret)
|
|
.update(val)
|
|
.digest('base64')
|
|
.replace(/\=+$/, '');
|
|
};
|
|
|
|
/**
|
|
* Unsign and decode the given `val` with `secret`,
|
|
* returning `false` if the signature is invalid.
|
|
*
|
|
* @param {String} val
|
|
* @param {String|NodeJS.ArrayBufferView|crypto.KeyObject} secret
|
|
* @return {String|Boolean}
|
|
* @api private
|
|
*/
|
|
|
|
exports.unsign = function(val, secret){
|
|
if ('string' !== typeof val) throw new TypeError("Signed cookie string must be provided.");
|
|
if (null == secret) throw new TypeError("Secret key must be provided.");
|
|
var str = val.slice(0, val.lastIndexOf('.'))
|
|
, mac = exports.sign(str, secret);
|
|
|
|
return sha1(mac) == sha1(val) ? str : false;
|
|
};
|
|
|
|
/**
|
|
* Private
|
|
*/
|
|
|
|
function sha1(str){
|
|
return crypto.createHash('sha1').update(str).digest('hex');
|
|
}
|