@cedarjs/api 0.15.1-next.0 → 0.15.1-next.23
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/auth/verifiers/base64Sha1Verifier.d.ts +1 -2
- package/dist/auth/verifiers/base64Sha1Verifier.d.ts.map +1 -1
- package/dist/auth/verifiers/base64Sha1Verifier.js +3 -4
- package/dist/auth/verifiers/base64Sha256Verifier.d.ts +1 -2
- package/dist/auth/verifiers/base64Sha256Verifier.d.ts.map +1 -1
- package/dist/auth/verifiers/base64Sha256Verifier.js +3 -4
- package/dist/auth/verifiers/common.d.ts +16 -8
- package/dist/auth/verifiers/common.d.ts.map +1 -1
- package/dist/auth/verifiers/common.js +8 -8
- package/dist/auth/verifiers/index.d.ts.map +1 -1
- package/dist/auth/verifiers/index.js +3 -2
- package/dist/auth/verifiers/jwtVerifier.d.ts +1 -9
- package/dist/auth/verifiers/jwtVerifier.d.ts.map +1 -1
- package/dist/auth/verifiers/jwtVerifier.js +2 -4
- package/dist/auth/verifiers/secretKeyVerifier.d.ts +1 -4
- package/dist/auth/verifiers/secretKeyVerifier.d.ts.map +1 -1
- package/dist/auth/verifiers/secretKeyVerifier.js +3 -4
- package/dist/auth/verifiers/sha1Verifier.d.ts +1 -9
- package/dist/auth/verifiers/sha1Verifier.d.ts.map +1 -1
- package/dist/auth/verifiers/sha1Verifier.js +3 -4
- package/dist/auth/verifiers/sha256Verifier.d.ts +1 -9
- package/dist/auth/verifiers/sha256Verifier.d.ts.map +1 -1
- package/dist/auth/verifiers/sha256Verifier.js +3 -4
- package/dist/auth/verifiers/skipVerifier.d.ts +1 -3
- package/dist/auth/verifiers/skipVerifier.d.ts.map +1 -1
- package/dist/auth/verifiers/skipVerifier.js +3 -4
- package/dist/auth/verifiers/timestampSchemeVerifier.d.ts +1 -3
- package/dist/auth/verifiers/timestampSchemeVerifier.d.ts.map +1 -1
- package/dist/auth/verifiers/timestampSchemeVerifier.js +4 -3
- package/dist/cjs/auth/verifiers/base64Sha1Verifier.d.ts +1 -2
- package/dist/cjs/auth/verifiers/base64Sha1Verifier.d.ts.map +1 -1
- package/dist/cjs/auth/verifiers/base64Sha1Verifier.js +4 -4
- package/dist/cjs/auth/verifiers/base64Sha256Verifier.d.ts +1 -2
- package/dist/cjs/auth/verifiers/base64Sha256Verifier.d.ts.map +1 -1
- package/dist/cjs/auth/verifiers/base64Sha256Verifier.js +4 -4
- package/dist/cjs/auth/verifiers/common.d.ts +16 -8
- package/dist/cjs/auth/verifiers/common.d.ts.map +1 -1
- package/dist/cjs/auth/verifiers/common.js +16 -26
- package/dist/cjs/auth/verifiers/index.d.ts.map +1 -1
- package/dist/cjs/auth/verifiers/index.js +3 -2
- package/dist/cjs/auth/verifiers/jwtVerifier.d.ts +1 -9
- package/dist/cjs/auth/verifiers/jwtVerifier.d.ts.map +1 -1
- package/dist/cjs/auth/verifiers/jwtVerifier.js +2 -4
- package/dist/cjs/auth/verifiers/secretKeyVerifier.d.ts +1 -4
- package/dist/cjs/auth/verifiers/secretKeyVerifier.d.ts.map +1 -1
- package/dist/cjs/auth/verifiers/secretKeyVerifier.js +7 -4
- package/dist/cjs/auth/verifiers/sha1Verifier.d.ts +1 -9
- package/dist/cjs/auth/verifiers/sha1Verifier.d.ts.map +1 -1
- package/dist/cjs/auth/verifiers/sha1Verifier.js +4 -4
- package/dist/cjs/auth/verifiers/sha256Verifier.d.ts +1 -9
- package/dist/cjs/auth/verifiers/sha256Verifier.d.ts.map +1 -1
- package/dist/cjs/auth/verifiers/sha256Verifier.js +4 -4
- package/dist/cjs/auth/verifiers/skipVerifier.d.ts +1 -3
- package/dist/cjs/auth/verifiers/skipVerifier.d.ts.map +1 -1
- package/dist/cjs/auth/verifiers/skipVerifier.js +7 -4
- package/dist/cjs/auth/verifiers/timestampSchemeVerifier.d.ts +1 -3
- package/dist/cjs/auth/verifiers/timestampSchemeVerifier.d.ts.map +1 -1
- package/dist/cjs/auth/verifiers/timestampSchemeVerifier.js +8 -3
- package/package.json +3 -4
|
@@ -14,6 +14,5 @@ export declare const verifySignature: ({ payload, secret, signature, }: {
|
|
|
14
14
|
* @see https://docs.svix.com/receiving/verifying-payloads/how-manual
|
|
15
15
|
* @see https://github.com/svix/svix-webhooks/blob/main/javascript/src/index.ts
|
|
16
16
|
*/
|
|
17
|
-
declare
|
|
18
|
-
export default base64Sha1Verifier;
|
|
17
|
+
export declare function base64Sha1Verifier(_options?: VerifyOptions): Base64Sha1Verifier;
|
|
19
18
|
//# sourceMappingURL=base64Sha1Verifier.d.ts.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"base64Sha1Verifier.d.ts","sourceRoot":"","sources":["../../../src/auth/verifiers/base64Sha1Verifier.ts"],"names":[],"mappings":"AAOA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,kBAAmB,SAAQ,eAAe;IACzD,IAAI,EAAE,oBAAoB,CAAA;CAC3B;AA0BD,eAAO,MAAM,eAAe,GAAI,iCAI7B;IACD,OAAO,EAAE,MAAM,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAA;IACzC,MAAM,EAAE,MAAM,CAAA;IACd,SAAS,EAAE,MAAM,CAAA;CAClB,KAAG,OA0BH,CAAA;AAED;;;;;;GAMG;AACH,
|
|
1
|
+
{"version":3,"file":"base64Sha1Verifier.d.ts","sourceRoot":"","sources":["../../../src/auth/verifiers/base64Sha1Verifier.ts"],"names":[],"mappings":"AAOA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,kBAAmB,SAAQ,eAAe;IACzD,IAAI,EAAE,oBAAoB,CAAA;CAC3B;AA0BD,eAAO,MAAM,eAAe,GAAI,iCAI7B;IACD,OAAO,EAAE,MAAM,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAA;IACzC,MAAM,EAAE,MAAM,CAAA;IACd,SAAS,EAAE,MAAM,CAAA;CAClB,KAAG,OA0BH,CAAA;AAED;;;;;;GAMG;AACH,wBAAgB,kBAAkB,CAChC,QAAQ,CAAC,EAAE,aAAa,GACvB,kBAAkB,CAUpB"}
|
|
@@ -39,7 +39,7 @@ const verifySignature = ({
|
|
|
39
39
|
);
|
|
40
40
|
}
|
|
41
41
|
};
|
|
42
|
-
|
|
42
|
+
function base64Sha1Verifier(_options) {
|
|
43
43
|
return {
|
|
44
44
|
sign: ({ payload, secret }) => {
|
|
45
45
|
return createSignature({ payload, secret });
|
|
@@ -49,9 +49,8 @@ const base64Sha1Verifier = (_options) => {
|
|
|
49
49
|
},
|
|
50
50
|
type: "base64Sha1Verifier"
|
|
51
51
|
};
|
|
52
|
-
}
|
|
53
|
-
var base64Sha1Verifier_default = base64Sha1Verifier;
|
|
52
|
+
}
|
|
54
53
|
export {
|
|
55
|
-
|
|
54
|
+
base64Sha1Verifier,
|
|
56
55
|
verifySignature
|
|
57
56
|
};
|
|
@@ -14,6 +14,5 @@ export declare const verifySignature: ({ payload, secret, signature, }: {
|
|
|
14
14
|
* @see https://docs.svix.com/receiving/verifying-payloads/how-manual
|
|
15
15
|
* @see https://github.com/svix/svix-webhooks/blob/main/javascript/src/index.ts
|
|
16
16
|
*/
|
|
17
|
-
declare
|
|
18
|
-
export default base64Sha256Verifier;
|
|
17
|
+
export declare function base64Sha256Verifier(_options?: VerifyOptions): Base64Sha256Verifier;
|
|
19
18
|
//# sourceMappingURL=base64Sha256Verifier.d.ts.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"base64Sha256Verifier.d.ts","sourceRoot":"","sources":["../../../src/auth/verifiers/base64Sha256Verifier.ts"],"names":[],"mappings":"AAOA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,oBAAqB,SAAQ,eAAe;IAC3D,IAAI,EAAE,sBAAsB,CAAA;CAC7B;AA0BD,eAAO,MAAM,eAAe,GAAI,iCAI7B;IACD,OAAO,EAAE,MAAM,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAA;IACzC,MAAM,EAAE,MAAM,CAAA;IACd,SAAS,EAAE,MAAM,CAAA;CAClB,KAAG,OA0BH,CAAA;AAED;;;;;;GAMG;AACH,
|
|
1
|
+
{"version":3,"file":"base64Sha256Verifier.d.ts","sourceRoot":"","sources":["../../../src/auth/verifiers/base64Sha256Verifier.ts"],"names":[],"mappings":"AAOA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,oBAAqB,SAAQ,eAAe;IAC3D,IAAI,EAAE,sBAAsB,CAAA;CAC7B;AA0BD,eAAO,MAAM,eAAe,GAAI,iCAI7B;IACD,OAAO,EAAE,MAAM,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAA;IACzC,MAAM,EAAE,MAAM,CAAA;IACd,SAAS,EAAE,MAAM,CAAA;CAClB,KAAG,OA0BH,CAAA;AAED;;;;;;GAMG;AACH,wBAAgB,oBAAoB,CAClC,QAAQ,CAAC,EAAE,aAAa,GACvB,oBAAoB,CAUtB"}
|
|
@@ -39,7 +39,7 @@ const verifySignature = ({
|
|
|
39
39
|
);
|
|
40
40
|
}
|
|
41
41
|
};
|
|
42
|
-
|
|
42
|
+
function base64Sha256Verifier(_options) {
|
|
43
43
|
return {
|
|
44
44
|
sign: ({ payload, secret }) => {
|
|
45
45
|
return createSignature({ payload, secret });
|
|
@@ -49,9 +49,8 @@ const base64Sha256Verifier = (_options) => {
|
|
|
49
49
|
},
|
|
50
50
|
type: "base64Sha256Verifier"
|
|
51
51
|
};
|
|
52
|
-
}
|
|
53
|
-
var base64Sha256Verifier_default = base64Sha256Verifier;
|
|
52
|
+
}
|
|
54
53
|
export {
|
|
55
|
-
|
|
54
|
+
base64Sha256Verifier,
|
|
56
55
|
verifySignature
|
|
57
56
|
};
|
|
@@ -1,20 +1,28 @@
|
|
|
1
|
+
import { base64Sha1Verifier } from './base64Sha1Verifier.js';
|
|
1
2
|
import type { Base64Sha1Verifier } from './base64Sha1Verifier.js';
|
|
3
|
+
import { base64Sha256Verifier } from './base64Sha256Verifier.js';
|
|
2
4
|
import type { Base64Sha256Verifier } from './base64Sha256Verifier.js';
|
|
5
|
+
import { jwtVerifier } from './jwtVerifier.js';
|
|
3
6
|
import type { JwtVerifier } from './jwtVerifier.js';
|
|
7
|
+
import { secretKeyVerifier } from './secretKeyVerifier.js';
|
|
4
8
|
import type { SecretKeyVerifier } from './secretKeyVerifier.js';
|
|
9
|
+
import { sha1Verifier } from './sha1Verifier.js';
|
|
5
10
|
import type { Sha1Verifier } from './sha1Verifier.js';
|
|
11
|
+
import { sha256Verifier } from './sha256Verifier.js';
|
|
6
12
|
import type { Sha256Verifier } from './sha256Verifier.js';
|
|
13
|
+
import { skipVerifier } from './skipVerifier.js';
|
|
7
14
|
import type { SkipVerifier } from './skipVerifier.js';
|
|
15
|
+
import { timestampSchemeVerifier } from './timestampSchemeVerifier.js';
|
|
8
16
|
import type { TimestampSchemeVerifier } from './timestampSchemeVerifier.js';
|
|
9
17
|
export declare const verifierLookup: {
|
|
10
|
-
skipVerifier:
|
|
11
|
-
secretKeyVerifier:
|
|
12
|
-
sha1Verifier:
|
|
13
|
-
sha256Verifier:
|
|
14
|
-
base64Sha1Verifier:
|
|
15
|
-
base64Sha256Verifier:
|
|
16
|
-
timestampSchemeVerifier:
|
|
17
|
-
jwtVerifier:
|
|
18
|
+
skipVerifier: typeof skipVerifier;
|
|
19
|
+
secretKeyVerifier: typeof secretKeyVerifier;
|
|
20
|
+
sha1Verifier: typeof sha1Verifier;
|
|
21
|
+
sha256Verifier: typeof sha256Verifier;
|
|
22
|
+
base64Sha1Verifier: typeof base64Sha1Verifier;
|
|
23
|
+
base64Sha256Verifier: typeof base64Sha256Verifier;
|
|
24
|
+
timestampSchemeVerifier: typeof timestampSchemeVerifier;
|
|
25
|
+
jwtVerifier: typeof jwtVerifier;
|
|
18
26
|
};
|
|
19
27
|
export type SupportedVerifiers = SkipVerifier | SecretKeyVerifier | Sha1Verifier | Sha256Verifier | Base64Sha1Verifier | Base64Sha256Verifier | TimestampSchemeVerifier | JwtVerifier;
|
|
20
28
|
export type SupportedVerifierTypes = keyof typeof verifierLookup;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"common.d.ts","sourceRoot":"","sources":["../../../src/auth/verifiers/common.ts"],"names":[],"mappings":"
|
|
1
|
+
{"version":3,"file":"common.d.ts","sourceRoot":"","sources":["../../../src/auth/verifiers/common.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,kBAAkB,EAAE,MAAM,yBAAyB,CAAA;AAC5D,OAAO,KAAK,EAAE,kBAAkB,EAAE,MAAM,yBAAyB,CAAA;AACjE,OAAO,EAAE,oBAAoB,EAAE,MAAM,2BAA2B,CAAA;AAChE,OAAO,KAAK,EAAE,oBAAoB,EAAE,MAAM,2BAA2B,CAAA;AACrE,OAAO,EAAE,WAAW,EAAE,MAAM,kBAAkB,CAAA;AAC9C,OAAO,KAAK,EAAE,WAAW,EAAE,MAAM,kBAAkB,CAAA;AACnD,OAAO,EAAE,iBAAiB,EAAE,MAAM,wBAAwB,CAAA;AAC1D,OAAO,KAAK,EAAE,iBAAiB,EAAE,MAAM,wBAAwB,CAAA;AAC/D,OAAO,EAAE,YAAY,EAAE,MAAM,mBAAmB,CAAA;AAChD,OAAO,KAAK,EAAE,YAAY,EAAE,MAAM,mBAAmB,CAAA;AACrD,OAAO,EAAE,cAAc,EAAE,MAAM,qBAAqB,CAAA;AACpD,OAAO,KAAK,EAAE,cAAc,EAAE,MAAM,qBAAqB,CAAA;AACzD,OAAO,EAAE,YAAY,EAAE,MAAM,mBAAmB,CAAA;AAChD,OAAO,KAAK,EAAE,YAAY,EAAE,MAAM,mBAAmB,CAAA;AACrD,OAAO,EAAE,uBAAuB,EAAE,MAAM,8BAA8B,CAAA;AACtE,OAAO,KAAK,EAAE,uBAAuB,EAAE,MAAM,8BAA8B,CAAA;AAE3E,eAAO,MAAM,cAAc;;;;;;;;;CAS1B,CAAA;AAED,MAAM,MAAM,kBAAkB,GAC1B,YAAY,GACZ,iBAAiB,GACjB,YAAY,GACZ,cAAc,GACd,kBAAkB,GAClB,oBAAoB,GACpB,uBAAuB,GACvB,WAAW,CAAA;AAEf,MAAM,MAAM,sBAAsB,GAAG,MAAM,OAAO,cAAc,CAAA;AAEhE,eAAO,MAAM,sBAAsB,QAAmC,CAAA;AAEtE,eAAO,MAAM,0BAA0B,mDACW,CAAA;AAElD,eAAO,MAAM,yBAAyB,2BAA2B,CAAA;AAIjE;;GAEG;AACH,eAAO,MAAM,iBAAiB,QAAe,CAAA;AAE7C;;;GAGG;AACH,cAAM,YAAa,SAAQ,KAAK;IAC9B;;;SAGK;gBACO,OAAO,EAAE,MAAM;CAG5B;AAED;;;GAGG;AACH,qBAAa,wBAAyB,SAAQ,YAAY;IACxD;;;SAGK;gBACO,OAAO,CAAC,EAAE,MAAM;CAG7B;AAED;;;GAGG;AACH,qBAAa,gBAAiB,SAAQ,YAAY;IAChD;;;SAGK;gBACO,OAAO,CAAC,EAAE,MAAM;CAG7B;AAED;;;;;;;;;;;;;;;;;;GAkBG;AACH,MAAM,WAAW,aAAa;IAC5B,eAAe,CAAC,EAAE,MAAM,CAAA;IACxB,oBAAoB,CAAC,EAAE,CAAC,SAAS,EAAE,MAAM,KAAK,MAAM,CAAA;IACpD,wBAAwB,CAAC,EAAE,MAAM,CAAA;IACjC,cAAc,CAAC,EAAE,MAAM,CAAA;IACvB,SAAS,CAAC,EAAE,MAAM,CAAA;IAClB,MAAM,CAAC,EAAE,MAAM,CAAA;CAChB;AAED;;GAEG;AACH,MAAM,WAAW,eAAe;IAC9B,IAAI,CAAC,EACH,OAAO,EACP,MAAM,GACP,EAAE;QACD,OAAO,EAAE,MAAM,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAA;QACzC,MAAM,EAAE,MAAM,CAAA;KACf,GAAG,MAAM,CAAA;IACV,MAAM,CAAC,EACL,OAAO,EACP,MAAM,EACN,SAAS,GACV,EAAE;QACD,OAAO,EAAE,MAAM,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAA;QACzC,MAAM,EAAE,MAAM,CAAA;QACd,SAAS,EAAE,MAAM,CAAA;KAClB,GAAG,OAAO,GAAG,wBAAwB,CAAA;IACtC,IAAI,EAAE,sBAAsB,CAAA;CAC7B"}
|
|
@@ -1,11 +1,11 @@
|
|
|
1
|
-
import base64Sha1Verifier from "./base64Sha1Verifier.js";
|
|
2
|
-
import base64Sha256Verifier from "./base64Sha256Verifier.js";
|
|
3
|
-
import jwtVerifier from "./jwtVerifier.js";
|
|
4
|
-
import secretKeyVerifier from "./secretKeyVerifier.js";
|
|
5
|
-
import sha1Verifier from "./sha1Verifier.js";
|
|
6
|
-
import sha256Verifier from "./sha256Verifier.js";
|
|
7
|
-
import skipVerifier from "./skipVerifier.js";
|
|
8
|
-
import timestampSchemeVerifier from "./timestampSchemeVerifier.js";
|
|
1
|
+
import { base64Sha1Verifier } from "./base64Sha1Verifier.js";
|
|
2
|
+
import { base64Sha256Verifier } from "./base64Sha256Verifier.js";
|
|
3
|
+
import { jwtVerifier } from "./jwtVerifier.js";
|
|
4
|
+
import { secretKeyVerifier } from "./secretKeyVerifier.js";
|
|
5
|
+
import { sha1Verifier } from "./sha1Verifier.js";
|
|
6
|
+
import { sha256Verifier } from "./sha256Verifier.js";
|
|
7
|
+
import { skipVerifier } from "./skipVerifier.js";
|
|
8
|
+
import { timestampSchemeVerifier } from "./timestampSchemeVerifier.js";
|
|
9
9
|
const verifierLookup = {
|
|
10
10
|
skipVerifier,
|
|
11
11
|
secretKeyVerifier,
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../src/auth/verifiers/index.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,EACV,sBAAsB,EACtB,aAAa,EACb,eAAe,EAChB,MAAM,aAAa,CAAA;AAEpB;;;GAGG;AACH,eAAO,MAAM,cAAc,GACzB,MAAM,sBAAsB,EAC5B,UAAU,aAAa,KACtB,
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../src/auth/verifiers/index.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,EACV,sBAAsB,EACtB,aAAa,EACb,eAAe,EAChB,MAAM,aAAa,CAAA;AAEpB;;;GAGG;AACH,eAAO,MAAM,cAAc,GACzB,MAAM,sBAAsB,EAC5B,UAAU,aAAa,KACtB,eAQF,CAAA;AAED,cAAc,aAAa,CAAA"}
|
|
@@ -1,9 +1,10 @@
|
|
|
1
1
|
import { verifierLookup } from "./common.js";
|
|
2
2
|
const createVerifier = (type, options) => {
|
|
3
|
+
const verifierFactory = verifierLookup[type];
|
|
3
4
|
if (options) {
|
|
4
|
-
return
|
|
5
|
+
return verifierFactory(options);
|
|
5
6
|
} else {
|
|
6
|
-
return
|
|
7
|
+
return verifierFactory();
|
|
7
8
|
}
|
|
8
9
|
};
|
|
9
10
|
export * from "./common.js";
|
|
@@ -2,11 +2,6 @@ import type { WebhookVerifier, VerifyOptions } from './common.js';
|
|
|
2
2
|
export interface JwtVerifier extends WebhookVerifier {
|
|
3
3
|
type: 'jwtVerifier';
|
|
4
4
|
}
|
|
5
|
-
/**
|
|
6
|
-
*
|
|
7
|
-
* verifySignature
|
|
8
|
-
*
|
|
9
|
-
*/
|
|
10
5
|
export declare const verifySignature: ({ payload, secret, signature, options, }: {
|
|
11
6
|
payload: string | Record<string, unknown>;
|
|
12
7
|
secret: string;
|
|
@@ -14,13 +9,10 @@ export declare const verifySignature: ({ payload, secret, signature, options, }:
|
|
|
14
9
|
options: VerifyOptions | undefined;
|
|
15
10
|
}) => boolean;
|
|
16
11
|
/**
|
|
17
|
-
*
|
|
18
12
|
* JWT Payload Verifier
|
|
19
13
|
*
|
|
20
14
|
* Based on Netlify's webhook payload verification
|
|
21
15
|
* @see: https://docs.netlify.com/site-deploys/notifications/#payload-signature
|
|
22
|
-
*
|
|
23
16
|
*/
|
|
24
|
-
export declare
|
|
25
|
-
export default jwtVerifier;
|
|
17
|
+
export declare function jwtVerifier(options?: VerifyOptions): JwtVerifier;
|
|
26
18
|
//# sourceMappingURL=jwtVerifier.d.ts.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"jwtVerifier.d.ts","sourceRoot":"","sources":["../../../src/auth/verifiers/jwtVerifier.ts"],"names":[],"mappings":"AAOA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,WAAY,SAAQ,eAAe;IAClD,IAAI,EAAE,aAAa,CAAA;CACpB;
|
|
1
|
+
{"version":3,"file":"jwtVerifier.d.ts","sourceRoot":"","sources":["../../../src/auth/verifiers/jwtVerifier.ts"],"names":[],"mappings":"AAOA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,WAAY,SAAQ,eAAe;IAClD,IAAI,EAAE,aAAa,CAAA;CACpB;AAsBD,eAAO,MAAM,eAAe,GAAI,0CAK7B;IACD,OAAO,EAAE,MAAM,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAA;IACzC,MAAM,EAAE,MAAM,CAAA;IACd,SAAS,EAAE,MAAM,CAAA;IACjB,OAAO,EAAE,aAAa,GAAG,SAAS,CAAA;CACnC,KAAG,OAmBH,CAAA;AAED;;;;;GAKG;AACH,wBAAgB,WAAW,CAAC,OAAO,CAAC,EAAE,aAAa,GAAG,WAAW,CAUhE"}
|
|
@@ -36,7 +36,7 @@ const verifySignature = ({
|
|
|
36
36
|
throw new WebhookVerificationError();
|
|
37
37
|
}
|
|
38
38
|
};
|
|
39
|
-
|
|
39
|
+
function jwtVerifier(options) {
|
|
40
40
|
return {
|
|
41
41
|
sign: ({ payload, secret }) => {
|
|
42
42
|
return createSignature({ payload, secret, options });
|
|
@@ -46,10 +46,8 @@ const jwtVerifier = (options) => {
|
|
|
46
46
|
},
|
|
47
47
|
type: "jwtVerifier"
|
|
48
48
|
};
|
|
49
|
-
}
|
|
50
|
-
var jwtVerifier_default = jwtVerifier;
|
|
49
|
+
}
|
|
51
50
|
export {
|
|
52
|
-
jwtVerifier_default as default,
|
|
53
51
|
jwtVerifier,
|
|
54
52
|
verifySignature
|
|
55
53
|
};
|
|
@@ -3,12 +3,9 @@ export interface SecretKeyVerifier extends WebhookVerifier {
|
|
|
3
3
|
type: 'secretKeyVerifier';
|
|
4
4
|
}
|
|
5
5
|
/**
|
|
6
|
-
*
|
|
7
6
|
* Secret Key Verifier
|
|
8
7
|
*
|
|
9
8
|
* Use when the payload is not signed, but rather authorized via a known secret key
|
|
10
|
-
*
|
|
11
9
|
*/
|
|
12
|
-
declare
|
|
13
|
-
export default secretKeyVerifier;
|
|
10
|
+
export declare function secretKeyVerifier(_options?: VerifyOptions): SecretKeyVerifier;
|
|
14
11
|
//# sourceMappingURL=secretKeyVerifier.d.ts.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"secretKeyVerifier.d.ts","sourceRoot":"","sources":["../../../src/auth/verifiers/secretKeyVerifier.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,iBAAkB,SAAQ,eAAe;IACxD,IAAI,EAAE,mBAAmB,CAAA;CAC1B;AAED
|
|
1
|
+
{"version":3,"file":"secretKeyVerifier.d.ts","sourceRoot":"","sources":["../../../src/auth/verifiers/secretKeyVerifier.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,iBAAkB,SAAQ,eAAe;IACxD,IAAI,EAAE,mBAAmB,CAAA;CAC1B;AAED;;;;GAIG;AACH,wBAAgB,iBAAiB,CAAC,QAAQ,CAAC,EAAE,aAAa,GAAG,iBAAiB,CAgB7E"}
|
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
import { WebhookVerificationError, DEFAULT_WEBHOOK_SECRET } from "./common.js";
|
|
2
|
-
|
|
2
|
+
function secretKeyVerifier(_options) {
|
|
3
3
|
return {
|
|
4
4
|
sign: ({ secret }) => {
|
|
5
5
|
return secret;
|
|
@@ -13,8 +13,7 @@ const secretKeyVerifier = (_options) => {
|
|
|
13
13
|
},
|
|
14
14
|
type: "secretKeyVerifier"
|
|
15
15
|
};
|
|
16
|
-
}
|
|
17
|
-
var secretKeyVerifier_default = secretKeyVerifier;
|
|
16
|
+
}
|
|
18
17
|
export {
|
|
19
|
-
|
|
18
|
+
secretKeyVerifier
|
|
20
19
|
};
|
|
@@ -2,24 +2,16 @@ import type { WebhookVerifier, VerifyOptions } from './common.js';
|
|
|
2
2
|
export interface Sha1Verifier extends WebhookVerifier {
|
|
3
3
|
type: 'sha1Verifier';
|
|
4
4
|
}
|
|
5
|
-
/**
|
|
6
|
-
*
|
|
7
|
-
* verifySignature
|
|
8
|
-
*
|
|
9
|
-
*/
|
|
10
5
|
export declare const verifySignature: ({ payload, secret, signature, }: {
|
|
11
6
|
payload: string | Record<string, unknown>;
|
|
12
7
|
secret: string;
|
|
13
8
|
signature: string;
|
|
14
9
|
}) => boolean;
|
|
15
10
|
/**
|
|
16
|
-
*
|
|
17
11
|
* SHA1 HMAC Payload Verifier
|
|
18
12
|
*
|
|
19
13
|
* Based on Vercel's webhook payload verification
|
|
20
14
|
* @see https://vercel.com/docs/api#integrations/webhooks/securing-webhooks
|
|
21
|
-
*
|
|
22
15
|
*/
|
|
23
|
-
declare
|
|
24
|
-
export default sha1Verifier;
|
|
16
|
+
export declare function sha1Verifier(_options?: VerifyOptions): Sha1Verifier;
|
|
25
17
|
//# sourceMappingURL=sha1Verifier.d.ts.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"sha1Verifier.d.ts","sourceRoot":"","sources":["../../../src/auth/verifiers/sha1Verifier.ts"],"names":[],"mappings":"AAOA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,YAAa,SAAQ,eAAe;IACnD,IAAI,EAAE,cAAc,CAAA;CACrB;
|
|
1
|
+
{"version":3,"file":"sha1Verifier.d.ts","sourceRoot":"","sources":["../../../src/auth/verifiers/sha1Verifier.ts"],"names":[],"mappings":"AAOA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,YAAa,SAAQ,eAAe;IACnD,IAAI,EAAE,cAAc,CAAA;CACrB;AA6BD,eAAO,MAAM,eAAe,GAAI,iCAI7B;IACD,OAAO,EAAE,MAAM,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAA;IACzC,MAAM,EAAE,MAAM,CAAA;IACd,SAAS,EAAE,MAAM,CAAA;CAClB,KAAG,OA+BH,CAAA;AAED;;;;;GAKG;AACH,wBAAgB,YAAY,CAAC,QAAQ,CAAC,EAAE,aAAa,GAAG,YAAY,CAUnE"}
|
|
@@ -47,7 +47,7 @@ const verifySignature = ({
|
|
|
47
47
|
);
|
|
48
48
|
}
|
|
49
49
|
};
|
|
50
|
-
|
|
50
|
+
function sha1Verifier(_options) {
|
|
51
51
|
return {
|
|
52
52
|
sign: ({ payload, secret }) => {
|
|
53
53
|
return createSignature({ payload, secret });
|
|
@@ -57,9 +57,8 @@ const sha1Verifier = (_options) => {
|
|
|
57
57
|
},
|
|
58
58
|
type: "sha1Verifier"
|
|
59
59
|
};
|
|
60
|
-
}
|
|
61
|
-
var sha1Verifier_default = sha1Verifier;
|
|
60
|
+
}
|
|
62
61
|
export {
|
|
63
|
-
|
|
62
|
+
sha1Verifier,
|
|
64
63
|
verifySignature
|
|
65
64
|
};
|
|
@@ -2,24 +2,16 @@ import type { WebhookVerifier, VerifyOptions } from './common.js';
|
|
|
2
2
|
export interface Sha256Verifier extends WebhookVerifier {
|
|
3
3
|
type: 'sha256Verifier';
|
|
4
4
|
}
|
|
5
|
-
/**
|
|
6
|
-
*
|
|
7
|
-
* verifySignature
|
|
8
|
-
*
|
|
9
|
-
*/
|
|
10
5
|
export declare const verifySignature: ({ payload, secret, signature, }: {
|
|
11
6
|
payload: string | Record<string, unknown>;
|
|
12
7
|
secret: string;
|
|
13
8
|
signature: string;
|
|
14
9
|
}) => boolean;
|
|
15
10
|
/**
|
|
16
|
-
*
|
|
17
11
|
* SHA256 HMAC Payload Verifier
|
|
18
12
|
*
|
|
19
13
|
* Based on GitHub's webhook payload verification
|
|
20
14
|
* @see https://docs.github.com/en/developers/webhooks-and-events/securing-your-webhooks
|
|
21
|
-
*
|
|
22
15
|
*/
|
|
23
|
-
declare
|
|
24
|
-
export default sha256Verifier;
|
|
16
|
+
export declare function sha256Verifier(_options?: VerifyOptions): Sha256Verifier;
|
|
25
17
|
//# sourceMappingURL=sha256Verifier.d.ts.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"sha256Verifier.d.ts","sourceRoot":"","sources":["../../../src/auth/verifiers/sha256Verifier.ts"],"names":[],"mappings":"AAOA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,cAAe,SAAQ,eAAe;IACrD,IAAI,EAAE,gBAAgB,CAAA;CACvB;
|
|
1
|
+
{"version":3,"file":"sha256Verifier.d.ts","sourceRoot":"","sources":["../../../src/auth/verifiers/sha256Verifier.ts"],"names":[],"mappings":"AAOA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,cAAe,SAAQ,eAAe;IACrD,IAAI,EAAE,gBAAgB,CAAA;CACvB;AA6BD,eAAO,MAAM,eAAe,GAAI,iCAI7B;IACD,OAAO,EAAE,MAAM,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAA;IACzC,MAAM,EAAE,MAAM,CAAA;IACd,SAAS,EAAE,MAAM,CAAA;CAClB,KAAG,OA+BH,CAAA;AAED;;;;;GAKG;AACH,wBAAgB,cAAc,CAAC,QAAQ,CAAC,EAAE,aAAa,GAAG,cAAc,CAUvE"}
|
|
@@ -47,7 +47,7 @@ const verifySignature = ({
|
|
|
47
47
|
);
|
|
48
48
|
}
|
|
49
49
|
};
|
|
50
|
-
|
|
50
|
+
function sha256Verifier(_options) {
|
|
51
51
|
return {
|
|
52
52
|
sign: ({ payload, secret }) => {
|
|
53
53
|
return createSignature({ payload, secret });
|
|
@@ -57,9 +57,8 @@ const sha256Verifier = (_options) => {
|
|
|
57
57
|
},
|
|
58
58
|
type: "sha256Verifier"
|
|
59
59
|
};
|
|
60
|
-
}
|
|
61
|
-
var sha256Verifier_default = sha256Verifier;
|
|
60
|
+
}
|
|
62
61
|
export {
|
|
63
|
-
|
|
62
|
+
sha256Verifier,
|
|
64
63
|
verifySignature
|
|
65
64
|
};
|
|
@@ -6,8 +6,6 @@ export interface SkipVerifier extends WebhookVerifier {
|
|
|
6
6
|
* skipVerifier skips webhook signature verification.
|
|
7
7
|
* Use when there is no signature provided or the webhook is
|
|
8
8
|
* entirely public.
|
|
9
|
-
*
|
|
10
9
|
*/
|
|
11
|
-
declare
|
|
12
|
-
export default skipVerifier;
|
|
10
|
+
export declare function skipVerifier(_options?: VerifyOptions): SkipVerifier;
|
|
13
11
|
//# sourceMappingURL=skipVerifier.d.ts.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"skipVerifier.d.ts","sourceRoot":"","sources":["../../../src/auth/verifiers/skipVerifier.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,aAAa,EAAE,eAAe,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,YAAa,SAAQ,eAAe;IACnD,IAAI,EAAE,cAAc,CAAA;CACrB;
|
|
1
|
+
{"version":3,"file":"skipVerifier.d.ts","sourceRoot":"","sources":["../../../src/auth/verifiers/skipVerifier.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,aAAa,EAAE,eAAe,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,YAAa,SAAQ,eAAe;IACnD,IAAI,EAAE,cAAc,CAAA;CACrB;AAED;;;;GAIG;AACH,wBAAgB,YAAY,CAAC,QAAQ,CAAC,EAAE,aAAa,GAAG,YAAY,CAYnE"}
|
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
|
|
1
|
+
function skipVerifier(_options) {
|
|
2
2
|
return {
|
|
3
3
|
sign: () => {
|
|
4
4
|
console.warn(`No signature is created for the skipVerifier verifier`);
|
|
@@ -10,8 +10,7 @@ const skipVerifier = (_options) => {
|
|
|
10
10
|
},
|
|
11
11
|
type: "skipVerifier"
|
|
12
12
|
};
|
|
13
|
-
}
|
|
14
|
-
var skipVerifier_default = skipVerifier;
|
|
13
|
+
}
|
|
15
14
|
export {
|
|
16
|
-
|
|
15
|
+
skipVerifier
|
|
17
16
|
};
|
|
@@ -3,14 +3,12 @@ export interface TimestampSchemeVerifier extends WebhookVerifier {
|
|
|
3
3
|
type: 'timestampSchemeVerifier';
|
|
4
4
|
}
|
|
5
5
|
/**
|
|
6
|
-
*
|
|
7
6
|
* Timestamp & Scheme Verifier
|
|
8
7
|
*
|
|
9
8
|
* Based on Stripe's secure webhook implementation
|
|
10
9
|
*
|
|
11
10
|
* @see https://stripe.com/docs/webhooks/signatures
|
|
12
|
-
*
|
|
13
11
|
*/
|
|
14
|
-
declare
|
|
12
|
+
export declare function timestampSchemeVerifier(options?: VerifyOptions): TimestampSchemeVerifier;
|
|
15
13
|
export default timestampSchemeVerifier;
|
|
16
14
|
//# sourceMappingURL=timestampSchemeVerifier.d.ts.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"timestampSchemeVerifier.d.ts","sourceRoot":"","sources":["../../../src/auth/verifiers/timestampSchemeVerifier.ts"],"names":[],"mappings":"AAOA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,uBAAwB,SAAQ,eAAe;IAC9D,IAAI,EAAE,yBAAyB,CAAA;CAChC;AAwHD
|
|
1
|
+
{"version":3,"file":"timestampSchemeVerifier.d.ts","sourceRoot":"","sources":["../../../src/auth/verifiers/timestampSchemeVerifier.ts"],"names":[],"mappings":"AAOA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,uBAAwB,SAAQ,eAAe;IAC9D,IAAI,EAAE,yBAAyB,CAAA;CAChC;AAwHD;;;;;;GAMG;AACH,wBAAgB,uBAAuB,CACrC,OAAO,CAAC,EAAE,aAAa,GACtB,uBAAuB,CAczB;AAED,eAAe,uBAAuB,CAAA"}
|
|
@@ -44,7 +44,7 @@ const verifySignature = ({
|
|
|
44
44
|
}
|
|
45
45
|
throw new WebhookVerificationError();
|
|
46
46
|
};
|
|
47
|
-
|
|
47
|
+
function timestampSchemeVerifier(options) {
|
|
48
48
|
return {
|
|
49
49
|
sign: ({ payload, secret }) => {
|
|
50
50
|
return createSignature({
|
|
@@ -58,8 +58,9 @@ const timestampSchemeVerifier = (options) => {
|
|
|
58
58
|
},
|
|
59
59
|
type: "timestampSchemeVerifier"
|
|
60
60
|
};
|
|
61
|
-
}
|
|
61
|
+
}
|
|
62
62
|
var timestampSchemeVerifier_default = timestampSchemeVerifier;
|
|
63
63
|
export {
|
|
64
|
-
timestampSchemeVerifier_default as default
|
|
64
|
+
timestampSchemeVerifier_default as default,
|
|
65
|
+
timestampSchemeVerifier
|
|
65
66
|
};
|
|
@@ -14,6 +14,5 @@ export declare const verifySignature: ({ payload, secret, signature, }: {
|
|
|
14
14
|
* @see https://docs.svix.com/receiving/verifying-payloads/how-manual
|
|
15
15
|
* @see https://github.com/svix/svix-webhooks/blob/main/javascript/src/index.ts
|
|
16
16
|
*/
|
|
17
|
-
declare
|
|
18
|
-
export default base64Sha1Verifier;
|
|
17
|
+
export declare function base64Sha1Verifier(_options?: VerifyOptions): Base64Sha1Verifier;
|
|
19
18
|
//# sourceMappingURL=base64Sha1Verifier.d.ts.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"base64Sha1Verifier.d.ts","sourceRoot":"","sources":["../../../../src/auth/verifiers/base64Sha1Verifier.ts"],"names":[],"mappings":"AAOA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,kBAAmB,SAAQ,eAAe;IACzD,IAAI,EAAE,oBAAoB,CAAA;CAC3B;AA0BD,eAAO,MAAM,eAAe,GAAI,iCAI7B;IACD,OAAO,EAAE,MAAM,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAA;IACzC,MAAM,EAAE,MAAM,CAAA;IACd,SAAS,EAAE,MAAM,CAAA;CAClB,KAAG,OA0BH,CAAA;AAED;;;;;;GAMG;AACH,
|
|
1
|
+
{"version":3,"file":"base64Sha1Verifier.d.ts","sourceRoot":"","sources":["../../../../src/auth/verifiers/base64Sha1Verifier.ts"],"names":[],"mappings":"AAOA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,kBAAmB,SAAQ,eAAe;IACzD,IAAI,EAAE,oBAAoB,CAAA;CAC3B;AA0BD,eAAO,MAAM,eAAe,GAAI,iCAI7B;IACD,OAAO,EAAE,MAAM,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAA;IACzC,MAAM,EAAE,MAAM,CAAA;IACd,SAAS,EAAE,MAAM,CAAA;CAClB,KAAG,OA0BH,CAAA;AAED;;;;;;GAMG;AACH,wBAAgB,kBAAkB,CAChC,QAAQ,CAAC,EAAE,aAAa,GACvB,kBAAkB,CAUpB"}
|
|
@@ -18,7 +18,7 @@ var __copyProps = (to, from, except, desc) => {
|
|
|
18
18
|
var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
|
|
19
19
|
var base64Sha1Verifier_exports = {};
|
|
20
20
|
__export(base64Sha1Verifier_exports, {
|
|
21
|
-
|
|
21
|
+
base64Sha1Verifier: () => base64Sha1Verifier,
|
|
22
22
|
verifySignature: () => verifySignature
|
|
23
23
|
});
|
|
24
24
|
module.exports = __toCommonJS(base64Sha1Verifier_exports);
|
|
@@ -59,7 +59,7 @@ const verifySignature = ({
|
|
|
59
59
|
);
|
|
60
60
|
}
|
|
61
61
|
};
|
|
62
|
-
|
|
62
|
+
function base64Sha1Verifier(_options) {
|
|
63
63
|
return {
|
|
64
64
|
sign: ({ payload, secret }) => {
|
|
65
65
|
return createSignature({ payload, secret });
|
|
@@ -69,9 +69,9 @@ const base64Sha1Verifier = (_options) => {
|
|
|
69
69
|
},
|
|
70
70
|
type: "base64Sha1Verifier"
|
|
71
71
|
};
|
|
72
|
-
}
|
|
73
|
-
var base64Sha1Verifier_default = base64Sha1Verifier;
|
|
72
|
+
}
|
|
74
73
|
// Annotate the CommonJS export names for ESM import in node:
|
|
75
74
|
0 && (module.exports = {
|
|
75
|
+
base64Sha1Verifier,
|
|
76
76
|
verifySignature
|
|
77
77
|
});
|
|
@@ -14,6 +14,5 @@ export declare const verifySignature: ({ payload, secret, signature, }: {
|
|
|
14
14
|
* @see https://docs.svix.com/receiving/verifying-payloads/how-manual
|
|
15
15
|
* @see https://github.com/svix/svix-webhooks/blob/main/javascript/src/index.ts
|
|
16
16
|
*/
|
|
17
|
-
declare
|
|
18
|
-
export default base64Sha256Verifier;
|
|
17
|
+
export declare function base64Sha256Verifier(_options?: VerifyOptions): Base64Sha256Verifier;
|
|
19
18
|
//# sourceMappingURL=base64Sha256Verifier.d.ts.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"base64Sha256Verifier.d.ts","sourceRoot":"","sources":["../../../../src/auth/verifiers/base64Sha256Verifier.ts"],"names":[],"mappings":"AAOA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,oBAAqB,SAAQ,eAAe;IAC3D,IAAI,EAAE,sBAAsB,CAAA;CAC7B;AA0BD,eAAO,MAAM,eAAe,GAAI,iCAI7B;IACD,OAAO,EAAE,MAAM,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAA;IACzC,MAAM,EAAE,MAAM,CAAA;IACd,SAAS,EAAE,MAAM,CAAA;CAClB,KAAG,OA0BH,CAAA;AAED;;;;;;GAMG;AACH,
|
|
1
|
+
{"version":3,"file":"base64Sha256Verifier.d.ts","sourceRoot":"","sources":["../../../../src/auth/verifiers/base64Sha256Verifier.ts"],"names":[],"mappings":"AAOA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,oBAAqB,SAAQ,eAAe;IAC3D,IAAI,EAAE,sBAAsB,CAAA;CAC7B;AA0BD,eAAO,MAAM,eAAe,GAAI,iCAI7B;IACD,OAAO,EAAE,MAAM,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAA;IACzC,MAAM,EAAE,MAAM,CAAA;IACd,SAAS,EAAE,MAAM,CAAA;CAClB,KAAG,OA0BH,CAAA;AAED;;;;;;GAMG;AACH,wBAAgB,oBAAoB,CAClC,QAAQ,CAAC,EAAE,aAAa,GACvB,oBAAoB,CAUtB"}
|
|
@@ -18,7 +18,7 @@ var __copyProps = (to, from, except, desc) => {
|
|
|
18
18
|
var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
|
|
19
19
|
var base64Sha256Verifier_exports = {};
|
|
20
20
|
__export(base64Sha256Verifier_exports, {
|
|
21
|
-
|
|
21
|
+
base64Sha256Verifier: () => base64Sha256Verifier,
|
|
22
22
|
verifySignature: () => verifySignature
|
|
23
23
|
});
|
|
24
24
|
module.exports = __toCommonJS(base64Sha256Verifier_exports);
|
|
@@ -59,7 +59,7 @@ const verifySignature = ({
|
|
|
59
59
|
);
|
|
60
60
|
}
|
|
61
61
|
};
|
|
62
|
-
|
|
62
|
+
function base64Sha256Verifier(_options) {
|
|
63
63
|
return {
|
|
64
64
|
sign: ({ payload, secret }) => {
|
|
65
65
|
return createSignature({ payload, secret });
|
|
@@ -69,9 +69,9 @@ const base64Sha256Verifier = (_options) => {
|
|
|
69
69
|
},
|
|
70
70
|
type: "base64Sha256Verifier"
|
|
71
71
|
};
|
|
72
|
-
}
|
|
73
|
-
var base64Sha256Verifier_default = base64Sha256Verifier;
|
|
72
|
+
}
|
|
74
73
|
// Annotate the CommonJS export names for ESM import in node:
|
|
75
74
|
0 && (module.exports = {
|
|
75
|
+
base64Sha256Verifier,
|
|
76
76
|
verifySignature
|
|
77
77
|
});
|
|
@@ -1,20 +1,28 @@
|
|
|
1
|
+
import { base64Sha1Verifier } from './base64Sha1Verifier.js';
|
|
1
2
|
import type { Base64Sha1Verifier } from './base64Sha1Verifier.js';
|
|
3
|
+
import { base64Sha256Verifier } from './base64Sha256Verifier.js';
|
|
2
4
|
import type { Base64Sha256Verifier } from './base64Sha256Verifier.js';
|
|
5
|
+
import { jwtVerifier } from './jwtVerifier.js';
|
|
3
6
|
import type { JwtVerifier } from './jwtVerifier.js';
|
|
7
|
+
import { secretKeyVerifier } from './secretKeyVerifier.js';
|
|
4
8
|
import type { SecretKeyVerifier } from './secretKeyVerifier.js';
|
|
9
|
+
import { sha1Verifier } from './sha1Verifier.js';
|
|
5
10
|
import type { Sha1Verifier } from './sha1Verifier.js';
|
|
11
|
+
import { sha256Verifier } from './sha256Verifier.js';
|
|
6
12
|
import type { Sha256Verifier } from './sha256Verifier.js';
|
|
13
|
+
import { skipVerifier } from './skipVerifier.js';
|
|
7
14
|
import type { SkipVerifier } from './skipVerifier.js';
|
|
15
|
+
import { timestampSchemeVerifier } from './timestampSchemeVerifier.js';
|
|
8
16
|
import type { TimestampSchemeVerifier } from './timestampSchemeVerifier.js';
|
|
9
17
|
export declare const verifierLookup: {
|
|
10
|
-
skipVerifier:
|
|
11
|
-
secretKeyVerifier:
|
|
12
|
-
sha1Verifier:
|
|
13
|
-
sha256Verifier:
|
|
14
|
-
base64Sha1Verifier:
|
|
15
|
-
base64Sha256Verifier:
|
|
16
|
-
timestampSchemeVerifier:
|
|
17
|
-
jwtVerifier:
|
|
18
|
+
skipVerifier: typeof skipVerifier;
|
|
19
|
+
secretKeyVerifier: typeof secretKeyVerifier;
|
|
20
|
+
sha1Verifier: typeof sha1Verifier;
|
|
21
|
+
sha256Verifier: typeof sha256Verifier;
|
|
22
|
+
base64Sha1Verifier: typeof base64Sha1Verifier;
|
|
23
|
+
base64Sha256Verifier: typeof base64Sha256Verifier;
|
|
24
|
+
timestampSchemeVerifier: typeof timestampSchemeVerifier;
|
|
25
|
+
jwtVerifier: typeof jwtVerifier;
|
|
18
26
|
};
|
|
19
27
|
export type SupportedVerifiers = SkipVerifier | SecretKeyVerifier | Sha1Verifier | Sha256Verifier | Base64Sha1Verifier | Base64Sha256Verifier | TimestampSchemeVerifier | JwtVerifier;
|
|
20
28
|
export type SupportedVerifierTypes = keyof typeof verifierLookup;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"common.d.ts","sourceRoot":"","sources":["../../../../src/auth/verifiers/common.ts"],"names":[],"mappings":"
|
|
1
|
+
{"version":3,"file":"common.d.ts","sourceRoot":"","sources":["../../../../src/auth/verifiers/common.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,kBAAkB,EAAE,MAAM,yBAAyB,CAAA;AAC5D,OAAO,KAAK,EAAE,kBAAkB,EAAE,MAAM,yBAAyB,CAAA;AACjE,OAAO,EAAE,oBAAoB,EAAE,MAAM,2BAA2B,CAAA;AAChE,OAAO,KAAK,EAAE,oBAAoB,EAAE,MAAM,2BAA2B,CAAA;AACrE,OAAO,EAAE,WAAW,EAAE,MAAM,kBAAkB,CAAA;AAC9C,OAAO,KAAK,EAAE,WAAW,EAAE,MAAM,kBAAkB,CAAA;AACnD,OAAO,EAAE,iBAAiB,EAAE,MAAM,wBAAwB,CAAA;AAC1D,OAAO,KAAK,EAAE,iBAAiB,EAAE,MAAM,wBAAwB,CAAA;AAC/D,OAAO,EAAE,YAAY,EAAE,MAAM,mBAAmB,CAAA;AAChD,OAAO,KAAK,EAAE,YAAY,EAAE,MAAM,mBAAmB,CAAA;AACrD,OAAO,EAAE,cAAc,EAAE,MAAM,qBAAqB,CAAA;AACpD,OAAO,KAAK,EAAE,cAAc,EAAE,MAAM,qBAAqB,CAAA;AACzD,OAAO,EAAE,YAAY,EAAE,MAAM,mBAAmB,CAAA;AAChD,OAAO,KAAK,EAAE,YAAY,EAAE,MAAM,mBAAmB,CAAA;AACrD,OAAO,EAAE,uBAAuB,EAAE,MAAM,8BAA8B,CAAA;AACtE,OAAO,KAAK,EAAE,uBAAuB,EAAE,MAAM,8BAA8B,CAAA;AAE3E,eAAO,MAAM,cAAc;;;;;;;;;CAS1B,CAAA;AAED,MAAM,MAAM,kBAAkB,GAC1B,YAAY,GACZ,iBAAiB,GACjB,YAAY,GACZ,cAAc,GACd,kBAAkB,GAClB,oBAAoB,GACpB,uBAAuB,GACvB,WAAW,CAAA;AAEf,MAAM,MAAM,sBAAsB,GAAG,MAAM,OAAO,cAAc,CAAA;AAEhE,eAAO,MAAM,sBAAsB,QAAmC,CAAA;AAEtE,eAAO,MAAM,0BAA0B,mDACW,CAAA;AAElD,eAAO,MAAM,yBAAyB,2BAA2B,CAAA;AAIjE;;GAEG;AACH,eAAO,MAAM,iBAAiB,QAAe,CAAA;AAE7C;;;GAGG;AACH,cAAM,YAAa,SAAQ,KAAK;IAC9B;;;SAGK;gBACO,OAAO,EAAE,MAAM;CAG5B;AAED;;;GAGG;AACH,qBAAa,wBAAyB,SAAQ,YAAY;IACxD;;;SAGK;gBACO,OAAO,CAAC,EAAE,MAAM;CAG7B;AAED;;;GAGG;AACH,qBAAa,gBAAiB,SAAQ,YAAY;IAChD;;;SAGK;gBACO,OAAO,CAAC,EAAE,MAAM;CAG7B;AAED;;;;;;;;;;;;;;;;;;GAkBG;AACH,MAAM,WAAW,aAAa;IAC5B,eAAe,CAAC,EAAE,MAAM,CAAA;IACxB,oBAAoB,CAAC,EAAE,CAAC,SAAS,EAAE,MAAM,KAAK,MAAM,CAAA;IACpD,wBAAwB,CAAC,EAAE,MAAM,CAAA;IACjC,cAAc,CAAC,EAAE,MAAM,CAAA;IACvB,SAAS,CAAC,EAAE,MAAM,CAAA;IAClB,MAAM,CAAC,EAAE,MAAM,CAAA;CAChB;AAED;;GAEG;AACH,MAAM,WAAW,eAAe;IAC9B,IAAI,CAAC,EACH,OAAO,EACP,MAAM,GACP,EAAE;QACD,OAAO,EAAE,MAAM,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAA;QACzC,MAAM,EAAE,MAAM,CAAA;KACf,GAAG,MAAM,CAAA;IACV,MAAM,CAAC,EACL,OAAO,EACP,MAAM,EACN,SAAS,GACV,EAAE;QACD,OAAO,EAAE,MAAM,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAA;QACzC,MAAM,EAAE,MAAM,CAAA;QACd,SAAS,EAAE,MAAM,CAAA;KAClB,GAAG,OAAO,GAAG,wBAAwB,CAAA;IACtC,IAAI,EAAE,sBAAsB,CAAA;CAC7B"}
|
|
@@ -1,9 +1,7 @@
|
|
|
1
1
|
"use strict";
|
|
2
|
-
var __create = Object.create;
|
|
3
2
|
var __defProp = Object.defineProperty;
|
|
4
3
|
var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
|
|
5
4
|
var __getOwnPropNames = Object.getOwnPropertyNames;
|
|
6
|
-
var __getProtoOf = Object.getPrototypeOf;
|
|
7
5
|
var __hasOwnProp = Object.prototype.hasOwnProperty;
|
|
8
6
|
var __export = (target, all) => {
|
|
9
7
|
for (var name in all)
|
|
@@ -17,14 +15,6 @@ var __copyProps = (to, from, except, desc) => {
|
|
|
17
15
|
}
|
|
18
16
|
return to;
|
|
19
17
|
};
|
|
20
|
-
var __toESM = (mod, isNodeMode, target) => (target = mod != null ? __create(__getProtoOf(mod)) : {}, __copyProps(
|
|
21
|
-
// If the importer is in node compatibility mode or this is not an ESM
|
|
22
|
-
// file that has been converted to a CommonJS file using a Babel-
|
|
23
|
-
// compatible transform (i.e. "__esModule" has not been set), then set
|
|
24
|
-
// "default" to the CommonJS "module.exports" for node compatibility.
|
|
25
|
-
isNodeMode || !mod || !mod.__esModule ? __defProp(target, "default", { value: mod, enumerable: true }) : target,
|
|
26
|
-
mod
|
|
27
|
-
));
|
|
28
18
|
var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
|
|
29
19
|
var common_exports = {};
|
|
30
20
|
__export(common_exports, {
|
|
@@ -37,23 +27,23 @@ __export(common_exports, {
|
|
|
37
27
|
verifierLookup: () => verifierLookup
|
|
38
28
|
});
|
|
39
29
|
module.exports = __toCommonJS(common_exports);
|
|
40
|
-
var import_base64Sha1Verifier =
|
|
41
|
-
var import_base64Sha256Verifier =
|
|
42
|
-
var import_jwtVerifier =
|
|
43
|
-
var import_secretKeyVerifier =
|
|
44
|
-
var import_sha1Verifier =
|
|
45
|
-
var import_sha256Verifier =
|
|
46
|
-
var import_skipVerifier =
|
|
47
|
-
var import_timestampSchemeVerifier =
|
|
30
|
+
var import_base64Sha1Verifier = require("./base64Sha1Verifier.js");
|
|
31
|
+
var import_base64Sha256Verifier = require("./base64Sha256Verifier.js");
|
|
32
|
+
var import_jwtVerifier = require("./jwtVerifier.js");
|
|
33
|
+
var import_secretKeyVerifier = require("./secretKeyVerifier.js");
|
|
34
|
+
var import_sha1Verifier = require("./sha1Verifier.js");
|
|
35
|
+
var import_sha256Verifier = require("./sha256Verifier.js");
|
|
36
|
+
var import_skipVerifier = require("./skipVerifier.js");
|
|
37
|
+
var import_timestampSchemeVerifier = require("./timestampSchemeVerifier.js");
|
|
48
38
|
const verifierLookup = {
|
|
49
|
-
skipVerifier: import_skipVerifier.
|
|
50
|
-
secretKeyVerifier: import_secretKeyVerifier.
|
|
51
|
-
sha1Verifier: import_sha1Verifier.
|
|
52
|
-
sha256Verifier: import_sha256Verifier.
|
|
53
|
-
base64Sha1Verifier: import_base64Sha1Verifier.
|
|
54
|
-
base64Sha256Verifier: import_base64Sha256Verifier.
|
|
55
|
-
timestampSchemeVerifier: import_timestampSchemeVerifier.
|
|
56
|
-
jwtVerifier: import_jwtVerifier.
|
|
39
|
+
skipVerifier: import_skipVerifier.skipVerifier,
|
|
40
|
+
secretKeyVerifier: import_secretKeyVerifier.secretKeyVerifier,
|
|
41
|
+
sha1Verifier: import_sha1Verifier.sha1Verifier,
|
|
42
|
+
sha256Verifier: import_sha256Verifier.sha256Verifier,
|
|
43
|
+
base64Sha1Verifier: import_base64Sha1Verifier.base64Sha1Verifier,
|
|
44
|
+
base64Sha256Verifier: import_base64Sha256Verifier.base64Sha256Verifier,
|
|
45
|
+
timestampSchemeVerifier: import_timestampSchemeVerifier.timestampSchemeVerifier,
|
|
46
|
+
jwtVerifier: import_jwtVerifier.jwtVerifier
|
|
57
47
|
};
|
|
58
48
|
const DEFAULT_WEBHOOK_SECRET = process.env.WEBHOOK_SECRET ?? "";
|
|
59
49
|
const VERIFICATION_ERROR_MESSAGE = "You don't have access to invoke this function.";
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../src/auth/verifiers/index.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,EACV,sBAAsB,EACtB,aAAa,EACb,eAAe,EAChB,MAAM,aAAa,CAAA;AAEpB;;;GAGG;AACH,eAAO,MAAM,cAAc,GACzB,MAAM,sBAAsB,EAC5B,UAAU,aAAa,KACtB,
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../src/auth/verifiers/index.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,EACV,sBAAsB,EACtB,aAAa,EACb,eAAe,EAChB,MAAM,aAAa,CAAA;AAEpB;;;GAGG;AACH,eAAO,MAAM,cAAc,GACzB,MAAM,sBAAsB,EAC5B,UAAU,aAAa,KACtB,eAQF,CAAA;AAED,cAAc,aAAa,CAAA"}
|
|
@@ -25,10 +25,11 @@ module.exports = __toCommonJS(verifiers_exports);
|
|
|
25
25
|
var import_common = require("./common.js");
|
|
26
26
|
__reExport(verifiers_exports, require("./common.js"), module.exports);
|
|
27
27
|
const createVerifier = (type, options) => {
|
|
28
|
+
const verifierFactory = import_common.verifierLookup[type];
|
|
28
29
|
if (options) {
|
|
29
|
-
return
|
|
30
|
+
return verifierFactory(options);
|
|
30
31
|
} else {
|
|
31
|
-
return
|
|
32
|
+
return verifierFactory();
|
|
32
33
|
}
|
|
33
34
|
};
|
|
34
35
|
// Annotate the CommonJS export names for ESM import in node:
|
|
@@ -2,11 +2,6 @@ import type { WebhookVerifier, VerifyOptions } from './common.js';
|
|
|
2
2
|
export interface JwtVerifier extends WebhookVerifier {
|
|
3
3
|
type: 'jwtVerifier';
|
|
4
4
|
}
|
|
5
|
-
/**
|
|
6
|
-
*
|
|
7
|
-
* verifySignature
|
|
8
|
-
*
|
|
9
|
-
*/
|
|
10
5
|
export declare const verifySignature: ({ payload, secret, signature, options, }: {
|
|
11
6
|
payload: string | Record<string, unknown>;
|
|
12
7
|
secret: string;
|
|
@@ -14,13 +9,10 @@ export declare const verifySignature: ({ payload, secret, signature, options, }:
|
|
|
14
9
|
options: VerifyOptions | undefined;
|
|
15
10
|
}) => boolean;
|
|
16
11
|
/**
|
|
17
|
-
*
|
|
18
12
|
* JWT Payload Verifier
|
|
19
13
|
*
|
|
20
14
|
* Based on Netlify's webhook payload verification
|
|
21
15
|
* @see: https://docs.netlify.com/site-deploys/notifications/#payload-signature
|
|
22
|
-
*
|
|
23
16
|
*/
|
|
24
|
-
export declare
|
|
25
|
-
export default jwtVerifier;
|
|
17
|
+
export declare function jwtVerifier(options?: VerifyOptions): JwtVerifier;
|
|
26
18
|
//# sourceMappingURL=jwtVerifier.d.ts.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"jwtVerifier.d.ts","sourceRoot":"","sources":["../../../../src/auth/verifiers/jwtVerifier.ts"],"names":[],"mappings":"AAOA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,WAAY,SAAQ,eAAe;IAClD,IAAI,EAAE,aAAa,CAAA;CACpB;
|
|
1
|
+
{"version":3,"file":"jwtVerifier.d.ts","sourceRoot":"","sources":["../../../../src/auth/verifiers/jwtVerifier.ts"],"names":[],"mappings":"AAOA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,WAAY,SAAQ,eAAe;IAClD,IAAI,EAAE,aAAa,CAAA;CACpB;AAsBD,eAAO,MAAM,eAAe,GAAI,0CAK7B;IACD,OAAO,EAAE,MAAM,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAA;IACzC,MAAM,EAAE,MAAM,CAAA;IACd,SAAS,EAAE,MAAM,CAAA;IACjB,OAAO,EAAE,aAAa,GAAG,SAAS,CAAA;CACnC,KAAG,OAmBH,CAAA;AAED;;;;;GAKG;AACH,wBAAgB,WAAW,CAAC,OAAO,CAAC,EAAE,aAAa,GAAG,WAAW,CAUhE"}
|
|
@@ -28,7 +28,6 @@ var __toESM = (mod, isNodeMode, target) => (target = mod != null ? __create(__ge
|
|
|
28
28
|
var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
|
|
29
29
|
var jwtVerifier_exports = {};
|
|
30
30
|
__export(jwtVerifier_exports, {
|
|
31
|
-
default: () => jwtVerifier_default,
|
|
32
31
|
jwtVerifier: () => jwtVerifier,
|
|
33
32
|
verifySignature: () => verifySignature
|
|
34
33
|
});
|
|
@@ -67,7 +66,7 @@ const verifySignature = ({
|
|
|
67
66
|
throw new import_common.WebhookVerificationError();
|
|
68
67
|
}
|
|
69
68
|
};
|
|
70
|
-
|
|
69
|
+
function jwtVerifier(options) {
|
|
71
70
|
return {
|
|
72
71
|
sign: ({ payload, secret }) => {
|
|
73
72
|
return createSignature({ payload, secret, options });
|
|
@@ -77,8 +76,7 @@ const jwtVerifier = (options) => {
|
|
|
77
76
|
},
|
|
78
77
|
type: "jwtVerifier"
|
|
79
78
|
};
|
|
80
|
-
}
|
|
81
|
-
var jwtVerifier_default = jwtVerifier;
|
|
79
|
+
}
|
|
82
80
|
// Annotate the CommonJS export names for ESM import in node:
|
|
83
81
|
0 && (module.exports = {
|
|
84
82
|
jwtVerifier,
|
|
@@ -3,12 +3,9 @@ export interface SecretKeyVerifier extends WebhookVerifier {
|
|
|
3
3
|
type: 'secretKeyVerifier';
|
|
4
4
|
}
|
|
5
5
|
/**
|
|
6
|
-
*
|
|
7
6
|
* Secret Key Verifier
|
|
8
7
|
*
|
|
9
8
|
* Use when the payload is not signed, but rather authorized via a known secret key
|
|
10
|
-
*
|
|
11
9
|
*/
|
|
12
|
-
declare
|
|
13
|
-
export default secretKeyVerifier;
|
|
10
|
+
export declare function secretKeyVerifier(_options?: VerifyOptions): SecretKeyVerifier;
|
|
14
11
|
//# sourceMappingURL=secretKeyVerifier.d.ts.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"secretKeyVerifier.d.ts","sourceRoot":"","sources":["../../../../src/auth/verifiers/secretKeyVerifier.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,iBAAkB,SAAQ,eAAe;IACxD,IAAI,EAAE,mBAAmB,CAAA;CAC1B;AAED
|
|
1
|
+
{"version":3,"file":"secretKeyVerifier.d.ts","sourceRoot":"","sources":["../../../../src/auth/verifiers/secretKeyVerifier.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,iBAAkB,SAAQ,eAAe;IACxD,IAAI,EAAE,mBAAmB,CAAA;CAC1B;AAED;;;;GAIG;AACH,wBAAgB,iBAAiB,CAAC,QAAQ,CAAC,EAAE,aAAa,GAAG,iBAAiB,CAgB7E"}
|
|
@@ -18,11 +18,11 @@ var __copyProps = (to, from, except, desc) => {
|
|
|
18
18
|
var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
|
|
19
19
|
var secretKeyVerifier_exports = {};
|
|
20
20
|
__export(secretKeyVerifier_exports, {
|
|
21
|
-
|
|
21
|
+
secretKeyVerifier: () => secretKeyVerifier
|
|
22
22
|
});
|
|
23
23
|
module.exports = __toCommonJS(secretKeyVerifier_exports);
|
|
24
24
|
var import_common = require("./common.js");
|
|
25
|
-
|
|
25
|
+
function secretKeyVerifier(_options) {
|
|
26
26
|
return {
|
|
27
27
|
sign: ({ secret }) => {
|
|
28
28
|
return secret;
|
|
@@ -36,5 +36,8 @@ const secretKeyVerifier = (_options) => {
|
|
|
36
36
|
},
|
|
37
37
|
type: "secretKeyVerifier"
|
|
38
38
|
};
|
|
39
|
-
}
|
|
40
|
-
|
|
39
|
+
}
|
|
40
|
+
// Annotate the CommonJS export names for ESM import in node:
|
|
41
|
+
0 && (module.exports = {
|
|
42
|
+
secretKeyVerifier
|
|
43
|
+
});
|
|
@@ -2,24 +2,16 @@ import type { WebhookVerifier, VerifyOptions } from './common.js';
|
|
|
2
2
|
export interface Sha1Verifier extends WebhookVerifier {
|
|
3
3
|
type: 'sha1Verifier';
|
|
4
4
|
}
|
|
5
|
-
/**
|
|
6
|
-
*
|
|
7
|
-
* verifySignature
|
|
8
|
-
*
|
|
9
|
-
*/
|
|
10
5
|
export declare const verifySignature: ({ payload, secret, signature, }: {
|
|
11
6
|
payload: string | Record<string, unknown>;
|
|
12
7
|
secret: string;
|
|
13
8
|
signature: string;
|
|
14
9
|
}) => boolean;
|
|
15
10
|
/**
|
|
16
|
-
*
|
|
17
11
|
* SHA1 HMAC Payload Verifier
|
|
18
12
|
*
|
|
19
13
|
* Based on Vercel's webhook payload verification
|
|
20
14
|
* @see https://vercel.com/docs/api#integrations/webhooks/securing-webhooks
|
|
21
|
-
*
|
|
22
15
|
*/
|
|
23
|
-
declare
|
|
24
|
-
export default sha1Verifier;
|
|
16
|
+
export declare function sha1Verifier(_options?: VerifyOptions): Sha1Verifier;
|
|
25
17
|
//# sourceMappingURL=sha1Verifier.d.ts.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"sha1Verifier.d.ts","sourceRoot":"","sources":["../../../../src/auth/verifiers/sha1Verifier.ts"],"names":[],"mappings":"AAOA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,YAAa,SAAQ,eAAe;IACnD,IAAI,EAAE,cAAc,CAAA;CACrB;
|
|
1
|
+
{"version":3,"file":"sha1Verifier.d.ts","sourceRoot":"","sources":["../../../../src/auth/verifiers/sha1Verifier.ts"],"names":[],"mappings":"AAOA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,YAAa,SAAQ,eAAe;IACnD,IAAI,EAAE,cAAc,CAAA;CACrB;AA6BD,eAAO,MAAM,eAAe,GAAI,iCAI7B;IACD,OAAO,EAAE,MAAM,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAA;IACzC,MAAM,EAAE,MAAM,CAAA;IACd,SAAS,EAAE,MAAM,CAAA;CAClB,KAAG,OA+BH,CAAA;AAED;;;;;GAKG;AACH,wBAAgB,YAAY,CAAC,QAAQ,CAAC,EAAE,aAAa,GAAG,YAAY,CAUnE"}
|
|
@@ -18,7 +18,7 @@ var __copyProps = (to, from, except, desc) => {
|
|
|
18
18
|
var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
|
|
19
19
|
var sha1Verifier_exports = {};
|
|
20
20
|
__export(sha1Verifier_exports, {
|
|
21
|
-
|
|
21
|
+
sha1Verifier: () => sha1Verifier,
|
|
22
22
|
verifySignature: () => verifySignature
|
|
23
23
|
});
|
|
24
24
|
module.exports = __toCommonJS(sha1Verifier_exports);
|
|
@@ -67,7 +67,7 @@ const verifySignature = ({
|
|
|
67
67
|
);
|
|
68
68
|
}
|
|
69
69
|
};
|
|
70
|
-
|
|
70
|
+
function sha1Verifier(_options) {
|
|
71
71
|
return {
|
|
72
72
|
sign: ({ payload, secret }) => {
|
|
73
73
|
return createSignature({ payload, secret });
|
|
@@ -77,9 +77,9 @@ const sha1Verifier = (_options) => {
|
|
|
77
77
|
},
|
|
78
78
|
type: "sha1Verifier"
|
|
79
79
|
};
|
|
80
|
-
}
|
|
81
|
-
var sha1Verifier_default = sha1Verifier;
|
|
80
|
+
}
|
|
82
81
|
// Annotate the CommonJS export names for ESM import in node:
|
|
83
82
|
0 && (module.exports = {
|
|
83
|
+
sha1Verifier,
|
|
84
84
|
verifySignature
|
|
85
85
|
});
|
|
@@ -2,24 +2,16 @@ import type { WebhookVerifier, VerifyOptions } from './common.js';
|
|
|
2
2
|
export interface Sha256Verifier extends WebhookVerifier {
|
|
3
3
|
type: 'sha256Verifier';
|
|
4
4
|
}
|
|
5
|
-
/**
|
|
6
|
-
*
|
|
7
|
-
* verifySignature
|
|
8
|
-
*
|
|
9
|
-
*/
|
|
10
5
|
export declare const verifySignature: ({ payload, secret, signature, }: {
|
|
11
6
|
payload: string | Record<string, unknown>;
|
|
12
7
|
secret: string;
|
|
13
8
|
signature: string;
|
|
14
9
|
}) => boolean;
|
|
15
10
|
/**
|
|
16
|
-
*
|
|
17
11
|
* SHA256 HMAC Payload Verifier
|
|
18
12
|
*
|
|
19
13
|
* Based on GitHub's webhook payload verification
|
|
20
14
|
* @see https://docs.github.com/en/developers/webhooks-and-events/securing-your-webhooks
|
|
21
|
-
*
|
|
22
15
|
*/
|
|
23
|
-
declare
|
|
24
|
-
export default sha256Verifier;
|
|
16
|
+
export declare function sha256Verifier(_options?: VerifyOptions): Sha256Verifier;
|
|
25
17
|
//# sourceMappingURL=sha256Verifier.d.ts.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"sha256Verifier.d.ts","sourceRoot":"","sources":["../../../../src/auth/verifiers/sha256Verifier.ts"],"names":[],"mappings":"AAOA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,cAAe,SAAQ,eAAe;IACrD,IAAI,EAAE,gBAAgB,CAAA;CACvB;
|
|
1
|
+
{"version":3,"file":"sha256Verifier.d.ts","sourceRoot":"","sources":["../../../../src/auth/verifiers/sha256Verifier.ts"],"names":[],"mappings":"AAOA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,cAAe,SAAQ,eAAe;IACrD,IAAI,EAAE,gBAAgB,CAAA;CACvB;AA6BD,eAAO,MAAM,eAAe,GAAI,iCAI7B;IACD,OAAO,EAAE,MAAM,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAA;IACzC,MAAM,EAAE,MAAM,CAAA;IACd,SAAS,EAAE,MAAM,CAAA;CAClB,KAAG,OA+BH,CAAA;AAED;;;;;GAKG;AACH,wBAAgB,cAAc,CAAC,QAAQ,CAAC,EAAE,aAAa,GAAG,cAAc,CAUvE"}
|
|
@@ -18,7 +18,7 @@ var __copyProps = (to, from, except, desc) => {
|
|
|
18
18
|
var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
|
|
19
19
|
var sha256Verifier_exports = {};
|
|
20
20
|
__export(sha256Verifier_exports, {
|
|
21
|
-
|
|
21
|
+
sha256Verifier: () => sha256Verifier,
|
|
22
22
|
verifySignature: () => verifySignature
|
|
23
23
|
});
|
|
24
24
|
module.exports = __toCommonJS(sha256Verifier_exports);
|
|
@@ -67,7 +67,7 @@ const verifySignature = ({
|
|
|
67
67
|
);
|
|
68
68
|
}
|
|
69
69
|
};
|
|
70
|
-
|
|
70
|
+
function sha256Verifier(_options) {
|
|
71
71
|
return {
|
|
72
72
|
sign: ({ payload, secret }) => {
|
|
73
73
|
return createSignature({ payload, secret });
|
|
@@ -77,9 +77,9 @@ const sha256Verifier = (_options) => {
|
|
|
77
77
|
},
|
|
78
78
|
type: "sha256Verifier"
|
|
79
79
|
};
|
|
80
|
-
}
|
|
81
|
-
var sha256Verifier_default = sha256Verifier;
|
|
80
|
+
}
|
|
82
81
|
// Annotate the CommonJS export names for ESM import in node:
|
|
83
82
|
0 && (module.exports = {
|
|
83
|
+
sha256Verifier,
|
|
84
84
|
verifySignature
|
|
85
85
|
});
|
|
@@ -6,8 +6,6 @@ export interface SkipVerifier extends WebhookVerifier {
|
|
|
6
6
|
* skipVerifier skips webhook signature verification.
|
|
7
7
|
* Use when there is no signature provided or the webhook is
|
|
8
8
|
* entirely public.
|
|
9
|
-
*
|
|
10
9
|
*/
|
|
11
|
-
declare
|
|
12
|
-
export default skipVerifier;
|
|
10
|
+
export declare function skipVerifier(_options?: VerifyOptions): SkipVerifier;
|
|
13
11
|
//# sourceMappingURL=skipVerifier.d.ts.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"skipVerifier.d.ts","sourceRoot":"","sources":["../../../../src/auth/verifiers/skipVerifier.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,aAAa,EAAE,eAAe,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,YAAa,SAAQ,eAAe;IACnD,IAAI,EAAE,cAAc,CAAA;CACrB;
|
|
1
|
+
{"version":3,"file":"skipVerifier.d.ts","sourceRoot":"","sources":["../../../../src/auth/verifiers/skipVerifier.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,aAAa,EAAE,eAAe,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,YAAa,SAAQ,eAAe;IACnD,IAAI,EAAE,cAAc,CAAA;CACrB;AAED;;;;GAIG;AACH,wBAAgB,YAAY,CAAC,QAAQ,CAAC,EAAE,aAAa,GAAG,YAAY,CAYnE"}
|
|
@@ -18,10 +18,10 @@ var __copyProps = (to, from, except, desc) => {
|
|
|
18
18
|
var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
|
|
19
19
|
var skipVerifier_exports = {};
|
|
20
20
|
__export(skipVerifier_exports, {
|
|
21
|
-
|
|
21
|
+
skipVerifier: () => skipVerifier
|
|
22
22
|
});
|
|
23
23
|
module.exports = __toCommonJS(skipVerifier_exports);
|
|
24
|
-
|
|
24
|
+
function skipVerifier(_options) {
|
|
25
25
|
return {
|
|
26
26
|
sign: () => {
|
|
27
27
|
console.warn(`No signature is created for the skipVerifier verifier`);
|
|
@@ -33,5 +33,8 @@ const skipVerifier = (_options) => {
|
|
|
33
33
|
},
|
|
34
34
|
type: "skipVerifier"
|
|
35
35
|
};
|
|
36
|
-
}
|
|
37
|
-
|
|
36
|
+
}
|
|
37
|
+
// Annotate the CommonJS export names for ESM import in node:
|
|
38
|
+
0 && (module.exports = {
|
|
39
|
+
skipVerifier
|
|
40
|
+
});
|
|
@@ -3,14 +3,12 @@ export interface TimestampSchemeVerifier extends WebhookVerifier {
|
|
|
3
3
|
type: 'timestampSchemeVerifier';
|
|
4
4
|
}
|
|
5
5
|
/**
|
|
6
|
-
*
|
|
7
6
|
* Timestamp & Scheme Verifier
|
|
8
7
|
*
|
|
9
8
|
* Based on Stripe's secure webhook implementation
|
|
10
9
|
*
|
|
11
10
|
* @see https://stripe.com/docs/webhooks/signatures
|
|
12
|
-
*
|
|
13
11
|
*/
|
|
14
|
-
declare
|
|
12
|
+
export declare function timestampSchemeVerifier(options?: VerifyOptions): TimestampSchemeVerifier;
|
|
15
13
|
export default timestampSchemeVerifier;
|
|
16
14
|
//# sourceMappingURL=timestampSchemeVerifier.d.ts.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"timestampSchemeVerifier.d.ts","sourceRoot":"","sources":["../../../../src/auth/verifiers/timestampSchemeVerifier.ts"],"names":[],"mappings":"AAOA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,uBAAwB,SAAQ,eAAe;IAC9D,IAAI,EAAE,yBAAyB,CAAA;CAChC;AAwHD
|
|
1
|
+
{"version":3,"file":"timestampSchemeVerifier.d.ts","sourceRoot":"","sources":["../../../../src/auth/verifiers/timestampSchemeVerifier.ts"],"names":[],"mappings":"AAOA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,uBAAwB,SAAQ,eAAe;IAC9D,IAAI,EAAE,yBAAyB,CAAA;CAChC;AAwHD;;;;;;GAMG;AACH,wBAAgB,uBAAuB,CACrC,OAAO,CAAC,EAAE,aAAa,GACtB,uBAAuB,CAczB;AAED,eAAe,uBAAuB,CAAA"}
|
|
@@ -18,7 +18,8 @@ var __copyProps = (to, from, except, desc) => {
|
|
|
18
18
|
var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
|
|
19
19
|
var timestampSchemeVerifier_exports = {};
|
|
20
20
|
__export(timestampSchemeVerifier_exports, {
|
|
21
|
-
default: () => timestampSchemeVerifier_default
|
|
21
|
+
default: () => timestampSchemeVerifier_default,
|
|
22
|
+
timestampSchemeVerifier: () => timestampSchemeVerifier
|
|
22
23
|
});
|
|
23
24
|
module.exports = __toCommonJS(timestampSchemeVerifier_exports);
|
|
24
25
|
var import_crypto = require("crypto");
|
|
@@ -63,7 +64,7 @@ const verifySignature = ({
|
|
|
63
64
|
}
|
|
64
65
|
throw new import_common.WebhookVerificationError();
|
|
65
66
|
};
|
|
66
|
-
|
|
67
|
+
function timestampSchemeVerifier(options) {
|
|
67
68
|
return {
|
|
68
69
|
sign: ({ payload, secret }) => {
|
|
69
70
|
return createSignature({
|
|
@@ -77,5 +78,9 @@ const timestampSchemeVerifier = (options) => {
|
|
|
77
78
|
},
|
|
78
79
|
type: "timestampSchemeVerifier"
|
|
79
80
|
};
|
|
80
|
-
}
|
|
81
|
+
}
|
|
81
82
|
var timestampSchemeVerifier_default = timestampSchemeVerifier;
|
|
83
|
+
// Annotate the CommonJS export names for ESM import in node:
|
|
84
|
+
0 && (module.exports = {
|
|
85
|
+
timestampSchemeVerifier
|
|
86
|
+
});
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@cedarjs/api",
|
|
3
|
-
"version": "0.15.1-next.
|
|
3
|
+
"version": "0.15.1-next.23+0753a9ca2",
|
|
4
4
|
"repository": {
|
|
5
5
|
"type": "git",
|
|
6
6
|
"url": "git+https://github.com/cedarjs/cedar.git",
|
|
@@ -64,7 +64,6 @@
|
|
|
64
64
|
"main": "./dist/index.js",
|
|
65
65
|
"types": "./dist/index.d.ts",
|
|
66
66
|
"bin": {
|
|
67
|
-
"cdr": "./dist/cjs/bins/cedar.js",
|
|
68
67
|
"cedar": "./dist/cjs/bins/cedar.js",
|
|
69
68
|
"cedarjs": "./dist/cjs/bins/cedar.js",
|
|
70
69
|
"redwood": "./dist/cjs/bins/redwood.js",
|
|
@@ -98,7 +97,7 @@
|
|
|
98
97
|
"title-case": "3.0.3"
|
|
99
98
|
},
|
|
100
99
|
"devDependencies": {
|
|
101
|
-
"@cedarjs/framework-tools": "0.15.1-next.
|
|
100
|
+
"@cedarjs/framework-tools": "0.15.1-next.23",
|
|
102
101
|
"@types/aws-lambda": "8.10.152",
|
|
103
102
|
"@types/jsonwebtoken": "9.0.10",
|
|
104
103
|
"@types/memjs": "1",
|
|
@@ -129,5 +128,5 @@
|
|
|
129
128
|
"publishConfig": {
|
|
130
129
|
"access": "public"
|
|
131
130
|
},
|
|
132
|
-
"gitHead": "
|
|
131
|
+
"gitHead": "0753a9ca25ba21702aed57f7f5e8b49db9957984"
|
|
133
132
|
}
|