diff --git a/multifile/javascript/DefEnsureJwtAlgo.js b/multifile/javascript/DefEnsureJwtAlgo.js new file mode 100644 index 0000000..2bcdcfe --- /dev/null +++ b/multifile/javascript/DefEnsureJwtAlgo.js @@ -0,0 +1,15 @@ +import jwt from 'jsonwebtoken'; + +const SECRET = process.env.JWT_SECRET_KEY + +function GenerateJWT(algo) { + const payload = { + Issuer: "server", + Subject: "Paz", + } + const token = jwt.sign(payload, SECRET, algo); + return token +} + + +export default GenerateJWT; \ No newline at end of file diff --git a/multifile/javascript/DefLoggingSensitiveInformation.js b/multifile/javascript/DefLoggingSensitiveInformation.js new file mode 100644 index 0000000..1d27ab5 --- /dev/null +++ b/multifile/javascript/DefLoggingSensitiveInformation.js @@ -0,0 +1,12 @@ +const AWS = require('aws-sdk'); +const { Pool } = require('pg'); +const sm = new AWS.SecretsManager({ region: 'us-west-2' }); + +function GetSecrets() { + const params = { + SecretId: process.env.DB_SECRET_NAME || 'aurora-pg-secret/bc-aurora-rdsv2-secret-rotation' + }; + return sm.getSecretValue(params); +} + +export default GetSecrets; \ No newline at end of file diff --git a/multifile/javascript/UseEnsureJwtAlgo.js b/multifile/javascript/UseEnsureJwtAlgo.js new file mode 100644 index 0000000..1d85723 --- /dev/null +++ b/multifile/javascript/UseEnsureJwtAlgo.js @@ -0,0 +1,7 @@ +import GenerateJWT from './DefEnsureJwtAlgo.js'; + +let myInSecureAlgo = { algorithm: 'none' } +let mySecureAlgo = { algorithm: 'sha254' } + +GenerateJWT(myInSecureAlgo); +GenerateJWT(mySecureAlgo); diff --git a/multifile/javascript/UseLoggingSensitiveInformation.js b/multifile/javascript/UseLoggingSensitiveInformation.js new file mode 100644 index 0000000..6a378d3 --- /dev/null +++ b/multifile/javascript/UseLoggingSensitiveInformation.js @@ -0,0 +1,4 @@ +import GetSecrets from './DefLoggingSensitiveInformation.js'; + +let retValue := GetSecrets(); +console.log(retValue)