Skip to content
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: fastify/fastify-jwt
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: v9.0.0
Choose a base ref
...
head repository: fastify/fastify-jwt
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: master
Choose a head ref
  • 18 commits
  • 11 files changed
  • 7 contributors

Commits on Sep 18, 2024

  1. chore: update fastify to ^5.0.0 (#347)

    Fdawgs authored Sep 18, 2024

    Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature.
    Copy the full SHA
    7c5ef29 View commit details

Commits on Sep 22, 2024

  1. Bumped v9.0.1

    Eomm committed Sep 22, 2024

    Verified

    This commit was signed with the committer’s verified signature.
    Eomm Manuel Spigolon
    Copy the full SHA
    db719f0 View commit details

Commits on Oct 1, 2024

  1. build(deps): bump fastify/workflows from 5.0.0 to 5.0.1 (#349)

    Bumps [fastify/workflows](https://github.com/fastify/workflows) from 5.0.0 to 5.0.1.
    - [Release notes](https://github.com/fastify/workflows/releases)
    - [Commits](fastify/workflows@v5.0.0...v5.0.1)
    
    ---
    updated-dependencies:
    - dependency-name: fastify/workflows
      dependency-type: direct:production
      update-type: version-update:semver-patch
    ...
    
    Signed-off-by: dependabot[bot] <[email protected]>
    Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
    dependabot[bot] authored Oct 1, 2024

    Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature.
    Copy the full SHA
    68b205f View commit details

Commits on Oct 14, 2024

  1. docs: update readme to clarify fastify version compatibility (#350)

    Signed-off-by: Simone Busoli <[email protected]>
    simoneb authored Oct 14, 2024

    Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature.
    Copy the full SHA
    6a380e6 View commit details
  2. build(deps-dev): bump @fastify/cookie from 10.0.1 to 11.0.1 (#351)

    Bumps [@fastify/cookie](https://github.com/fastify/fastify-cookie) from 10.0.1 to 11.0.1.
    - [Release notes](https://github.com/fastify/fastify-cookie/releases)
    - [Commits](fastify/fastify-cookie@v10.0.1...v11.0.1)
    
    ---
    updated-dependencies:
    - dependency-name: "@fastify/cookie"
      dependency-type: direct:development
      update-type: version-update:semver-major
    ...
    
    Signed-off-by: dependabot[bot] <[email protected]>
    Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
    dependabot[bot] authored Oct 14, 2024

    Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature.
    Copy the full SHA
    54be35b View commit details

Commits on Oct 15, 2024

  1. fix: Async key provider and errors should be resolved internally -- d…

    …ynamic JWTs in tests (#338)
    
    * test: Async key provider should be resolved internaly
    
    * test: Async key provider errors should be resolved internaly
    
    * test: Async key provider errors should be resolved internally
    
    * feat: Async key provider
    
    * test: generate JWTs dynamically
    
    ---------
    
    Co-authored-by: NikitaFedorov1 <[email protected]>
    Co-authored-by: NikitaIT <[email protected]>
    3 people authored Oct 15, 2024

    Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature.
    Copy the full SHA
    ad9317b View commit details

Commits on Nov 1, 2024

  1. ci: use major version of workflows

    Fdawgs committed Nov 1, 2024

    Verified

    This commit was signed with the committer’s verified signature.
    Fdawgs Frazer Smith
    Copy the full SHA
    bf1e9bd View commit details

Commits on Nov 3, 2024

  1. style: remove trailing whitespace (#352)

    Fdawgs authored Nov 3, 2024

    Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature.
    Copy the full SHA
    1b3470e View commit details

Commits on Nov 25, 2024

  1. build(deps): bump fast-jwt from 4.0.6 to 5.0.0 (#353)

    Bumps [fast-jwt](https://github.com/nearform/fast-jwt) from 4.0.6 to 5.0.0.
    - [Release notes](https://github.com/nearform/fast-jwt/releases)
    - [Changelog](https://github.com/nearform/fast-jwt/blob/master/CHANGELOG.md)
    - [Commits](nearform/fast-jwt@v4.0.6...v5.0.0)
    
    ---
    updated-dependencies:
    - dependency-name: fast-jwt
      dependency-type: direct:production
      update-type: version-update:semver-major
    ...
    
    Signed-off-by: dependabot[bot] <[email protected]>
    Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
    dependabot[bot] authored Nov 25, 2024

    Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature.
    Copy the full SHA
    bbd9ddd View commit details

Commits on Dec 5, 2024

  1. docs(readme): update ci badge syntax (#354)

    Fdawgs authored Dec 5, 2024

    Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature.
    Copy the full SHA
    4f9facc View commit details

Commits on Dec 14, 2024

  1. Bumped v9.0.2

    Eomm committed Dec 14, 2024

    Verified

    This commit was signed with the committer’s verified signature.
    Eomm Manuel Spigolon
    Copy the full SHA
    6e55f99 View commit details

Commits on Dec 29, 2024

  1. chore(package): add funding and contribs (#357)

    Signed-off-by: Frazer Smith <[email protected]>
    Fdawgs authored Dec 29, 2024

    Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature.
    Copy the full SHA
    c318c86 View commit details

Commits on Jan 7, 2025

  1. perf: use optional chaining (#359)

    Fdawgs authored Jan 7, 2025

    Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature.
    Copy the full SHA
    0d4821e View commit details
  2. refactor: prefix unused params with underscores (#361)

    Fdawgs authored Jan 7, 2025

    Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature.
    Copy the full SHA
    b8e3031 View commit details

Commits on Jan 11, 2025

  1. docs(readme): spelling and grammar fixes (#362)

    Signed-off-by: Frazer Smith <[email protected]>
    Fdawgs authored Jan 11, 2025

    Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature.
    Copy the full SHA
    8453f9c View commit details
  2. 9.0.3

    Fdawgs committed Jan 11, 2025

    Verified

    This commit was signed with the committer’s verified signature.
    Fdawgs Frazer Smith
    Copy the full SHA
    e9ee4b9 View commit details

Commits on Jan 15, 2025

  1. build(dependabot): reduce npm updates to monthly (#363)

    Fdawgs authored Jan 15, 2025

    Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature.
    Copy the full SHA
    cdbb3ed View commit details

Commits on Jan 16, 2025

  1. build(deps-dev): replace standard with neostandard (#355)

    * build(deps-dev): replace standard with neostandard
    
    * chore: add eslint.config.js
    
    * Update package.json
    
    Signed-off-by: Frazer Smith <[email protected]>
    
    * chore: ignore
    
    ---------
    
    Signed-off-by: Frazer Smith <[email protected]>
    Fdawgs authored Jan 16, 2025

    Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature.
    Copy the full SHA
    fdf300d View commit details
Showing with 318 additions and 137 deletions.
  1. +1 −1 .github/dependabot.yml
  2. +1 −1 .github/workflows/ci.yml
  3. +20 −18 README.md
  4. +6 −0 eslint.config.js
  5. +33 −29 jwt.js
  6. +37 −7 package.json
  7. +135 −0 test/jwt-async.test.js
  8. +23 −23 test/jwt.test.js
  9. +3 −3 test/options.test.js
  10. +16 −11 types/jwt.d.ts
  11. +43 −44 types/jwt.test-d.ts
2 changes: 1 addition & 1 deletion .github/dependabot.yml
Original file line number Diff line number Diff line change
@@ -9,5 +9,5 @@ updates:
- package-ecosystem: "npm"
directory: "/"
schedule:
interval: "weekly"
interval: "monthly"
open-pull-requests-limit: 10
2 changes: 1 addition & 1 deletion .github/workflows/ci.yml
Original file line number Diff line number Diff line change
@@ -17,7 +17,7 @@ on:

jobs:
test:
uses: fastify/workflows/.github/workflows/plugins-ci.yml@v5.0.0
uses: fastify/workflows/.github/workflows/plugins-ci.yml@v5
with:
license-check: true
lint: true
38 changes: 20 additions & 18 deletions README.md
Original file line number Diff line number Diff line change
@@ -1,15 +1,17 @@
# @fastify/jwt

![CI](https://github.com/fastify/fastify-jwt/workflows/CI/badge.svg)
[![CI](https://github.com/fastify/fastify-jwt/actions/workflows/ci.yml/badge.svg?branch=master)](https://github.com/fastify/fastify-jwt/actions/workflows/ci.yml)
[![NPM version](https://img.shields.io/npm/v/@fastify/jwt.svg?style=flat)](https://www.npmjs.com/package/@fastify/jwt)
[![js-standard-style](https://img.shields.io/badge/code%20style-standard-brightgreen.svg?style=flat)](https://standardjs.com/)
[![neostandard javascript style](https://img.shields.io/badge/code_style-neostandard-brightgreen?style=flat)](https://github.com/neostandard/neostandard)

JWT utils for Fastify, internally it uses [fast-jwt](https://github.com/nearform/fast-jwt).

**NOTE:** The plugin has been migrated from using `jsonwebtoken` to `fast-jwt`. Even though `fast-jwt` has 1:1 feature implementation with `jsonwebtoken`, some _exotic_ implementations might break. In that case please open an issue with details of your implementation. See [Upgrading notes](UPGRADING.md) for more details about what changes this migration introduced.

`@fastify/jwt` supports Fastify@3.
`@fastify/jwt` [v1.x](https://github.com/fastify/fastify-jwt/tree/1.x)
- `@fastify/jwt` >= v9 supports Fastify@5.
- `@fastify/jwt` < v9 supports Fastify@4.
- `@fastify/jwt` < v6 supports Fastify@3.
- `@fastify/jwt` [v1.x](https://github.com/fastify/fastify-jwt/tree/1.x)
supports both Fastify@2.

## Install
@@ -18,7 +20,7 @@ npm i @fastify/jwt
```

## Usage
Register as a plugin. This will decorate your `fastify` instance with the following methods: `decode`, `sign`, and `verify`; refer to their documentation to find how to use the utilities. It will also register `request.jwtVerify` and `reply.jwtSign`. You must pass a `secret` when registering the plugin.
Register as a plugin. This will decorate your `fastify` instance with the following methods: `decode`, `sign`, and `verify`; refer to their documentation to find out how to use the utilities. It will also register `request.jwtVerify` and `reply.jwtSign`. You must pass a `secret` when registering the plugin.

```js
const fastify = require('fastify')()
@@ -54,7 +56,7 @@ fastify.addHook("onRequest", async (request, reply) => {
})
```

Afterwards, just use `request.user` in order to retrieve the user information:
Afterwards, just use `request.user` to retrieve the user information:

```js
module.exports = async function(fastify, opts) {
@@ -111,7 +113,7 @@ If you need to verify Auth0 issued HS256 or RS256 JWT tokens, you can use [fasti
### `secret` (required)
You must pass a `secret` to the `options` parameter. The `secret` can be a primitive type String, a function that returns a String or an object `{ private, public }`.

In this object `{ private, public }` the `private` key is a string, buffer or object containing either the secret for HMAC algorithms or the PEM encoded private key for RSA and ECDSA. In case of a private key with passphrase an object `{ private: { key, passphrase }, public }` can be used (based on [crypto documentation](https://nodejs.org/api/crypto.html#crypto_sign_sign_private_key_output_format)), in this case be sure you pass the `algorithm` inside the signing options prefixed by the `sign` key of the plugin registering options).
In this object `{ private, public }` the `private` key is a string, buffer, or object containing either the secret for HMAC algorithms or the PEM encoded private key for RSA and ECDSA. In case of a private key with passphrase an object `{ private: { key, passphrase }, public }` can be used (based on [crypto documentation](https://nodejs.org/api/crypto.html#crypto_sign_sign_private_key_output_format)), in this case be sure you pass the `algorithm` inside the signing options prefixed by the `sign` key of the plugin registering options).

In this object `{ private, public }` the `public` key is a string or buffer containing either the secret for HMAC algorithms, or the PEM encoded public key for RSA and ECDSA.

@@ -318,7 +320,7 @@ fastify.listen({ port: 3000 }, err => {

### `onlyCookie`

Setting this options to `true` will decode only the cookie in the request. This is useful for refreshToken implementations where the request typically has two tokens: token and refreshToken. The main authentication token usually has a shorter timeout and the refresh token normally stored in the cookie has a longer timeout. This allows you to check to make sure that the cookie token is still valid, as it could have a different expiring time than the main token. The payloads of the two different tokens could also be different.
Setting this option to `true` will decode only the cookie in the request. This is useful for refreshToken implementations where the request typically has two tokens: token and refreshToken. The main authentication token usually has a shorter timeout and the refresh token normally stored in the cookie has a longer timeout. This allows you to check to make sure that the cookie token is still valid, as it could have a different expiring time than the main token. The payloads of the two different tokens could also be different.

```js
const fastify = require('fastify')()
@@ -505,7 +507,7 @@ To simplify the use of namespaces in TypeScript you can use the `FastifyJwtNames

```typescript
declare module 'fastify' {
interface FastifyInstance extends
interface FastifyInstance extends
FastifyJwtNamespace<{namespace: 'security'}> {
}
}
@@ -515,7 +517,7 @@ Alternatively you can type each key explicitly:

```typescript
declare module 'fastify' {
interface FastifyInstance extends
interface FastifyInstance extends
FastifyJwtNamespace<{
jwtDecode: 'securityJwtDecode',
jwtSign: 'securityJwtSign',
@@ -604,7 +606,7 @@ fastify.register(require('@fastify/jwt'), {

### `decode`

* `complete`: Return an object with the decoded header, payload, signature and input (the token part before the signature), instead of just the content of the payload. Default is `false`.
* `complete`: Return an object with the decoded header, payload, signature, and input (the token part before the signature), instead of just the content of the payload. Default is `false`.
* `checkTyp`: When validating the decoded header, setting this option forces the check of the typ property against this value. Example: `checkTyp: 'JWT'`. Default is `undefined`.

### `sign`
@@ -622,9 +624,9 @@ fastify.register(require('@fastify/jwt'), {
* `key`: A string or a buffer containing the secret for `HS*` algorithms or the PEM encoded public key for `RS*`, `PS*`, `ES*` and `EdDSA` algorithms. The key can also be a function accepting a Node style callback or a function returning a promise. If provided, it will override the value of [secret](#secret-required) provided in the options.
* `algorithms`: List of strings with the names of the allowed algorithms. By default, all algorithms are accepted.
* `complete`: Return an object with the decoded header, payload, signature and input (the token part before the signature), instead of just the content of the payload. Default is `false`.
* `cache`: A positive number specifying the size of the verified tokens cache (using LRU strategy). Setting this to `true` is equivalent to provide the size 1000. When enabled the performance is dramatically improved. By default the cache is disabled.
* `cacheTTL`: The maximum time to live of a cache entry (in milliseconds). If the token has a earlier expiration or the verifier has a shorter `maxAge`, the earlier takes precedence. The default is `600000`, which is 10 minutes.
* `maxAge`: The maximum allowed age for tokens to still be valid. It is expressed in seconds or a string describing a time span (E.g.: `60`, `"2 days"`, `"10h"`, `"7d"`). A numeric value is interpreted as a seconds count. If you use a string be sure you provide the time units (days, hours, etc.), otherwise milliseconds unit is used by default (`"120"` is equal to `"120ms"`). By default this is not checked.
* `cache`: A positive number specifying the size of the verified tokens cache (using LRU strategy). Setting this to `true` is equivalent to provide the size 1000. When enabled the performance is dramatically improved. By default the cache is disabled.
* `cacheTTL`: The maximum time to live of a cache entry (in milliseconds). If the token has an earlier expiration or the verifier has a shorter `maxAge`, the earlier takes precedence. The default is `600000`, which is 10 minutes.
* `maxAge`: The maximum allowed age for tokens to still be valid. It is expressed in seconds or a string describing a time span (E.g.: `60`, `"2 days"`, `"10h"`, `"7d"`). A numeric value is interpreted as a seconds count. If you use a string be sure you provide the time units (days, hours, etc.), otherwise milliseconds unit is used by default (`"120"` is equal to `"120ms"`). By default, this is not checked.
* ... the rest of the **verify** options can be found [here](https://github.com/nearform/fast-jwt#createverifier).

## API Spec
@@ -643,7 +645,7 @@ This method is used to verify provided token. It accepts a `token` (as `Buffer`
const token = fastify.jwt.sign({ foo: 'bar' })
// synchronously
const decoded = fastify.jwt.verify(token)
// asycnhronously
// asynchronously
fastify.jwt.verify(token, (err, decoded) => {
if (err) fastify.log.error(err)
fastify.log.info(`Token verified. Foo is ${decoded.foo}`)
@@ -663,7 +665,7 @@ fastify.log.info(`Decoded JWT: ${decoded}`)
```

### fastify.jwt.options
For your convenience, the `decode`, `sign`, `verify` and `messages` options you specify during `.register` are made available via `fastify.jwt.options` that will return an object `{ decode, sign, verify, messages }` containing your options.
For your convenience, the `decode`, `sign`, `verify`, and `messages` options you specify during `.register` are made available via `fastify.jwt.options` that will return an object `{ decode, sign, verify, messages }` containing your options.

#### Example
```js
@@ -769,7 +771,7 @@ You can find the list [here](https://github.com/nearform/fast-jwt#algorithms-sup

#### Certificates Generation

[Here](./example/UsingCertificates.md) some example on how to generate certificates and use them, with or without passphrase.
[Here](./example/UsingCertificates.md) are some examples of how to generate certificates and use them, with or without passphrase.

#### Signing and verifying (jwtSign, jwtVerify)
```js
@@ -907,7 +909,7 @@ fastify.get('/', async (request, reply) => {

```

## Acknowledgements
## Acknowledgments

This project is kindly sponsored by:
- [LetzDoIt](https://www.letzdoitapp.com/)
6 changes: 6 additions & 0 deletions eslint.config.js
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
'use strict'

module.exports = require('neostandard')({
ignores: require('neostandard').resolveIgnoresFromGitignore(),
ts: true
})
62 changes: 33 additions & 29 deletions jwt.js
Original file line number Diff line number Diff line change
@@ -23,7 +23,7 @@ function isString (x) {
}

function wrapStaticSecretInCallback (secret) {
return function (request, payload, cb) {
return function (_request, _payload, cb) {
return cb(null, secret)
}
}
@@ -67,18 +67,14 @@ function validateOptions (options) {
assert(!options.jwtSign || isString(options.jwtSign), 'Invalid options.jwtSign')

if (
options.sign &&
options.sign.algorithm &&
options.sign.algorithm.includes('RS') &&
options.sign?.algorithm?.includes('RS') &&
(typeof options.secret === 'string' ||
options.secret instanceof Buffer)
) {
throw new Error('RSA Signatures set as Algorithm in the options require a private and public key to be set as the secret')
}
if (
options.sign &&
options.sign.algorithm &&
options.sign.algorithm.includes('ES') &&
options.sign?.algorithm?.includes('ES') &&
(typeof options.secret === 'string' ||
options.secret instanceof Buffer)
) {
@@ -486,34 +482,21 @@ function fastifyJwt (fastify, options, next) {
},
function verify (secretOrPublicKey, callback) {
try {
let verifyResult
if (useLocalVerifier) {
const verifierOptions = mergeOptionsWithKey(options.verify || options, secretOrPublicKey)
const localVerifier = createVerifier(verifierOptions)
const verifyResult = localVerifier(token)
callback(null, verifyResult)
verifyResult = localVerifier(token)
} else {
verifyResult = verifier(token)
}
if (verifyResult && typeof verifyResult.then === 'function') {
verifyResult.then(result => callback(null, result), error => wrapError(error, callback))
} else {
const verifyResult = verifier(token)
callback(null, verifyResult)
}
} catch (error) {
if (error.code === TokenError.codes.expired) {
return callback(new AuthorizationTokenExpiredError())
}

if (error.code === TokenError.codes.invalidKey ||
error.code === TokenError.codes.invalidSignature ||
error.code === TokenError.codes.invalidClaimValue
) {
return callback(typeof messagesOptions.authorizationTokenInvalid === 'function'
? new AuthorizationTokenInvalidError(error.message)
: new AuthorizationTokenInvalidError())
}

if (error.code === TokenError.codes.missingSignature) {
return callback(new AuthorizationTokenUnsignedError())
}

return callback(error)
return wrapError(error, callback)
}
},
function checkIfIsTrusted (result, callback) {
@@ -522,7 +505,7 @@ function fastifyJwt (fastify, options, next) {
} else {
const maybePromise = trusted(request, result)

if (maybePromise && maybePromise.then) {
if (maybePromise?.then) {
maybePromise
.then(trusted => trusted ? callback(null, result) : callback(new AuthorizationTokenUntrustedError()))
} else if (maybePromise) {
@@ -542,6 +525,27 @@ function fastifyJwt (fastify, options, next) {
}
})
}

function wrapError (error, callback) {
if (error.code === TokenError.codes.expired) {
return callback(new AuthorizationTokenExpiredError())
}

if (error.code === TokenError.codes.invalidKey ||
error.code === TokenError.codes.invalidSignature ||
error.code === TokenError.codes.invalidClaimValue
) {
return callback(typeof messagesOptions.authorizationTokenInvalid === 'function'
? new AuthorizationTokenInvalidError(error.message)
: new AuthorizationTokenInvalidError())
}

if (error.code === TokenError.codes.missingSignature) {
return callback(new AuthorizationTokenUnsignedError())
}

return callback(error)
}
}

module.exports = fp(fastifyJwt, {
44 changes: 37 additions & 7 deletions package.json
Original file line number Diff line number Diff line change
@@ -1,13 +1,13 @@
{
"name": "@fastify/jwt",
"version": "9.0.0",
"version": "9.0.3",
"description": "JWT utils for Fastify",
"main": "jwt.js",
"type": "commonjs",
"types": "types/jwt.d.ts",
"scripts": {
"lint": "standard",
"lint:fix": "standard --fix",
"lint": "eslint",
"lint:fix": "eslint --fix",
"test": "npm run lint && npm run test:unit && npm run test:typescript",
"test:typescript": "tsd",
"test:unit": "tap",
@@ -26,24 +26,54 @@
"fastify"
],
"author": "Tomas Della Vedova - @delvedor (http://delved.org)",
"contributors": [
{
"name": "Matteo Collina",
"email": "hello@matteocollina.com"
},
{
"name": "Manuel Spigolon",
"email": "behemoth89@gmail.com"
},
{
"name": "Aras Abbasi",
"email": "aras.abbasi@gmail.com"
},
{
"name": "Frazer Smith",
"email": "frazer.dev@icloud.com",
"url": "https://github.com/fdawgs"
}
],
"license": "MIT",
"bugs": {
"url": "https://github.com/fastify/fastify-jwt/issues"
},
"homepage": "https://github.com/fastify/fastify-jwt#readme",
"funding": [
{
"type": "github",
"url": "https://github.com/sponsors/fastify"
},
{
"type": "opencollective",
"url": "https://opencollective.com/fastify"
}
],
"dependencies": {
"@fastify/error": "^4.0.0",
"@lukeed/ms": "^2.0.2",
"fast-jwt": "^4.0.0",
"fast-jwt": "^5.0.0",
"fastify-plugin": "^5.0.0",
"steed": "^1.1.3"
},
"devDependencies": {
"@fastify/cookie": "^10.0.0",
"@fastify/cookie": "^11.0.1",
"@fastify/pre-commit": "^2.1.0",
"@types/node": "^22.0.0",
"fastify": "^5.0.0-alpha.4",
"standard": "^17.1.0",
"eslint": "^9.17.0",
"fastify": "^5.0.0",
"neostandard": "^0.11.9",
"tap": "^18.7.1",
"tsd": "^0.31.0"
},
Loading