@@ -8,9 +8,9 @@ import Config from '../../Config';
8
8
import Parse from 'parse/node' ;
9
9
10
10
/**
11
- * The security checks group for Parse Server configuration.
12
- * Checks common Parse Server parameters such as access keys.
13
- */
11
+ * The security checks group for Parse Server configuration.
12
+ * Checks common Parse Server parameters such as access keys.
13
+ */
14
14
class CheckGroupServerConfig extends CheckGroup {
15
15
setName ( ) {
16
16
return 'Parse Server Configuration' ;
@@ -21,7 +21,8 @@ class CheckGroupServerConfig extends CheckGroup {
21
21
new Check ( {
22
22
title : 'Secure master key' ,
23
23
warning : 'The Parse Server master key is insecure and vulnerable to brute force attacks.' ,
24
- solution : 'Choose a longer and/or more complex master key with a combination of upper- and lowercase characters, numbers and special characters.' ,
24
+ solution :
25
+ 'Choose a longer and/or more complex master key with a combination of upper- and lowercase characters, numbers and special characters.' ,
25
26
check : ( ) => {
26
27
const masterKey = config . masterKey ;
27
28
const hasUpperCase = / [ A - Z ] / . test ( masterKey ) ;
@@ -41,7 +42,7 @@ class CheckGroupServerConfig extends CheckGroup {
41
42
new Check ( {
42
43
title : 'Security log disabled' ,
43
44
warning : 'Security checks in logs may expose vulnerabilities to anyone access to logs.' ,
44
- solution : ' Change Parse Server configuration to \ 'security.enableCheckLog: false\'.' ,
45
+ solution : " Change Parse Server configuration to 'security.enableCheckLog: false'." ,
45
46
check : ( ) => {
46
47
if ( config . security && config . security . enableCheckLog ) {
47
48
throw 1 ;
@@ -50,8 +51,9 @@ class CheckGroupServerConfig extends CheckGroup {
50
51
} ) ,
51
52
new Check ( {
52
53
title : 'Client class creation disabled' ,
53
- warning : 'Attackers are allowed to create new classes without restriction and flood the database.' ,
54
- solution : 'Change Parse Server configuration to \'allowClientClassCreation: false\'.' ,
54
+ warning :
55
+ 'Attackers are allowed to create new classes without restriction and flood the database.' ,
56
+ solution : "Change Parse Server configuration to 'allowClientClassCreation: false'." ,
55
57
check : ( ) => {
56
58
if ( config . allowClientClassCreation || config . allowClientClassCreation == null ) {
57
59
throw 1 ;
0 commit comments