@netacea/vercel 0.1.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/README.md ADDED
@@ -0,0 +1,62 @@
1
+ # Netacea Vercel
2
+
3
+ ![Netacea Header](https://assets.ntcacdn.net/header.jpg)
4
+
5
+ [![TypeScript](https://img.shields.io/badge/%3C%2F%3E-TypeScript-%230074c1.svg)](http://www.typescriptlang.org/)
6
+
7
+ `@netacea/vercel` is a package designed to add [Netacea](https://netacea.com) functionality to [Vercel edge middleware](https://vercel.com/docs/edge-middleware).
8
+
9
+ This package has been released for Beta testing and interfaces may change without warning.
10
+
11
+ ## Installation
12
+
13
+ Within your Vercel project, run:
14
+
15
+ `npm i @netacea/vercel`
16
+
17
+ ## Netacea Config
18
+
19
+ A NetaceaConfig.json file will need to be created within your project,
20
+ alongside the middleware described below. The Netacea Solutions Engineering team
21
+ can assist in providing this config.
22
+
23
+ ## Middleware Setup
24
+
25
+ The following code should be placed in the `middleware.ts` file within your project:
26
+
27
+ ```TypeScript
28
+ import { NextRequest, NextResponse } from 'next/server'
29
+ import { waitUntil } from '@vercel/functions'
30
+ import * as netaceaConfig from './NetaceaConfig.json'
31
+ import NetaceaVercelIntegration from '@netacea/vercel'
32
+ import type { NetaceaVercelIntegrationArgs } from '@netacea/vercel'
33
+
34
+ let netaceaWorker: NetaceaVercelIntegration | undefined = undefined
35
+
36
+ export default async function middleware(req: NextRequest) {
37
+ try {
38
+ // Initialize Netacea worker
39
+ if (netaceaWorker === undefined) {
40
+ netaceaWorker = new NetaceaVercelIntegration(netaceaConfig as NetaceaVercelIntegrationArgs)
41
+ }
42
+
43
+ // Run Netacea integration
44
+ const event = { request: req }
45
+ const netaceaResult = await netaceaWorker.run(event, originRequest)
46
+
47
+ // Asynchronously ingest the Netacea result, without adding latency to the request
48
+ waitUntil(netaceaWorker.ingest(req, netaceaResult))
49
+
50
+ return netaceaResult.response
51
+ } catch (error) {
52
+ console.error("Netacea Middleware Error:", error)
53
+ return NextResponse.next()
54
+ }
55
+ }
56
+
57
+ async function originRequest(request: Request): Promise<NextResponse> {
58
+ return NextResponse.next({
59
+ headers: request.headers
60
+ })
61
+ }
62
+ ```
@@ -0,0 +1,489 @@
1
+ import { AwsClient } from 'aws4fetch';
2
+ import { Buffer } from 'buffer/';
3
+
4
+ interface KinesisIngestConfigArgs$1 {
5
+ kinesisStreamName: string;
6
+ kinesisAccessKey?: string;
7
+ kinesisSecretKey?: string;
8
+ logBatchSize?: number;
9
+ maxLogAgeSeconds?: number;
10
+ }
11
+
12
+ declare enum NetaceaIngestType {
13
+ /**
14
+ * ORIGIN Ingest mode; data to be ingested is set by headers, so it can be forwarded via a seperate mechanism
15
+ */
16
+ ORIGIN = "ORIGIN",
17
+ /**
18
+ * HTTP Ingest mode, this is the standard implementation
19
+ */
20
+ HTTP = "HTTP",
21
+ /**
22
+ * Ingest over Kinesis, Netacea will inform you if this is required
23
+ * and will provide you with kinesis credentials.
24
+ */
25
+ KINESIS = "KINESIS",
26
+ /**
27
+ * Data to be Ingest via some mechanism native to the host/CDN, e.g. log shipping.
28
+ */
29
+ NATIVE = "NATIVE"
30
+ }
31
+ declare enum NetaceaMitigationType {
32
+ /**
33
+ * Run Netacea with mitigation mode enabled.
34
+ * This will serve Captcha pages and Forbidden pages when instructed to do so
35
+ */
36
+ MITIGATE = "MITIGATE",
37
+ /**
38
+ * Run Netacea with Inject mode enabled.
39
+ * The end-user will only receive a cookie.
40
+ * The origin server will receive 3-4 headers,
41
+ *
42
+ * 'x-netacea-match' indicating what was matched (nothing(0), ua(1), ip(2), etc...)
43
+ *
44
+ * 'x-netacea-mitigate' indicating what action would've be taken (nothing (0), block(1), allow(2), etc...)
45
+ *
46
+ * 'x-netacea-captcha' indicating what captcha action would've been taken
47
+ *
48
+ * 'x-netacea-event-id' event id value that should be injected to the captcha
49
+ * page if using `@netacea/captchafeedback` module on the origin server
50
+ */
51
+ INJECT = "INJECT",
52
+ /**
53
+ * Run Netacea with Ingest only mode
54
+ * No cookies will be set for the end user.
55
+ * No mitigations will be applied.
56
+ *
57
+ * **It's recommended to start in this mode!**
58
+ */
59
+ INGEST = "INGEST"
60
+ }
61
+ declare enum NetaceaCookieV3IssueReason {
62
+ CAPTCHA_GET = "captcha_get",
63
+ CAPTCHA_POST = "captcha_post",
64
+ EXPIRED_SESSION = "expired_session",
65
+ FORCED_REVALIDATION = "forced_revalidation",
66
+ INVALID_SESSION = "invalid_session",
67
+ IP_CHANGE = "ip_change",
68
+ NO_SESSION = "no_session"
69
+ }
70
+ interface MakeRequestResponse {
71
+ /**
72
+ * Numerical status code of the response
73
+ */
74
+ status: number;
75
+ /**
76
+ * Key value collection of the response headers
77
+ */
78
+ headers: Record<string, string>;
79
+ /**
80
+ * Response body value
81
+ */
82
+ body?: string;
83
+ }
84
+ interface NetaceaBaseArgs {
85
+ /**
86
+ * Netacea APIKey
87
+ */
88
+ apiKey: string;
89
+ /**
90
+ * Netacea Secret Key
91
+ */
92
+ secretKey: string;
93
+ /**
94
+ * Google RECaptcha Site Key.
95
+ * This is used for providing your own captcha values without updating these in the Netacea console.
96
+ */
97
+ captchaSiteKey?: string;
98
+ /**
99
+ * Google RECaptcha Secret Key.
100
+ * This is used for providing your own captcha values without updating these in the Netacea console.
101
+ */
102
+ captchaSecretKey?: string;
103
+ /**
104
+ * Request timeout in ms
105
+ */
106
+ timeout?: number;
107
+ /**
108
+ * URL of the Netacea ingest service.
109
+ * DEFAULT: https://ingest.netacea.net
110
+ */
111
+ ingestServiceUrl?: string;
112
+ /**
113
+ * URL of the Netacea mitigation service.
114
+ * DEFAULT: https://mitigations.netacea.net
115
+ */
116
+ mitigationServiceUrl?: string;
117
+ /**
118
+ * Type of mitigation applied, see the `NetaceaMitigationType` ENUM
119
+ * - INGEST - Ingest only mode, no mitigations applied
120
+ * - MITIGATION - Mitigation mode, active blocking/captcha rules will be applied.
121
+ * - INJECT - Inject mode, headers will be sent to your origin server
122
+ * indicating what actions Netacea would have taken.
123
+ * DEFAULT: NetaceaMitigationType.INGEST
124
+ */
125
+ mitigationType?: NetaceaMitigationType;
126
+ /**
127
+ * Type of ingest, see the `NetaceaIngestType` ENUM
128
+ * - HTTP - Ingest via HTTP.
129
+ * - KINESIS - Ingest via KINESIS
130
+ * DEFAULT: NetaceaIngestType.HTTP
131
+ */
132
+ ingestType?: NetaceaIngestType;
133
+ /**
134
+ * Kinesis ingest definition, see the `KinesisIngestConfigArgs` type.
135
+ * Only to be provided if ingestType is set to KINESIS.
136
+ * Netacea will provide you with the details for this stream.
137
+ */
138
+ kinesis?: KinesisIngestConfigArgs$1;
139
+ /**
140
+ * Deprecated: alias for netaceaCookieExpirySeconds.
141
+ * If both are set, netaceaCookieExpirySeconds is prefered.
142
+ * Seconds for the netacea cookie to be revalidated after.
143
+ */
144
+ mitataCookieExpirySeconds?: number;
145
+ /**
146
+ * Seconds for the netacea cookie to be revalidated after.
147
+ */
148
+ netaceaCookieExpirySeconds?: number;
149
+ /**
150
+ * The name of the netacea cookie. Defaults to _mitata.
151
+ */
152
+ netaceaCookieName?: string;
153
+ /**
154
+ * The name of the netacea captcha cookie. Defaults to _mitatacaptcha.
155
+ */
156
+ netaceaCaptchaCookieName?: string;
157
+ }
158
+ interface InjectHeaders {
159
+ 'x-netacea-match': string;
160
+ 'x-netacea-mitigate': string;
161
+ 'x-netacea-captcha': string;
162
+ 'x-netacea-event-id'?: string;
163
+ }
164
+ interface IngestArgs {
165
+ /**
166
+ * Client IP Address
167
+ */
168
+ ip: string;
169
+ /**
170
+ * Client User-Agent header value
171
+ */
172
+ userAgent: string;
173
+ /**
174
+ * Response status code
175
+ * Should be 403 if Netacea mitigated
176
+ */
177
+ status: string;
178
+ /**
179
+ * Request method
180
+ */
181
+ method: string;
182
+ /**
183
+ * Request path
184
+ */
185
+ path: string;
186
+ /**
187
+ * Request protocol
188
+ */
189
+ protocol: string | null;
190
+ /**
191
+ * Request referer header value
192
+ */
193
+ referer: string;
194
+ /**
195
+ * Request content-length header, or body size
196
+ */
197
+ bytesSent: string | number;
198
+ /**
199
+ * Time taken to serve request
200
+ */
201
+ requestTime: string | number;
202
+ /**
203
+ * Netacea mitata cookie value.
204
+ * Should be request's cookie value if Netacea was not called.
205
+ */
206
+ mitataCookie?: string;
207
+ /**
208
+ * Session status from `ComposeResultResponse`
209
+ */
210
+ sessionStatus?: string;
211
+ /**
212
+ * Type of the integration, for example "Cloudflare" or "Cloudfront"
213
+ */
214
+ integrationType?: string;
215
+ /**
216
+ * SEMVER string indicating the version of the integration
217
+ * Example: 1.2.3
218
+ */
219
+ integrationVersion?: string;
220
+ /**
221
+ * IP values set by a CDN under "x-fowarded-for" header
222
+ */
223
+ xForwardedFor?: string;
224
+ headerFingerprint?: string;
225
+ cookieFingerprint?: string;
226
+ integrationMode?: string;
227
+ requestHost?: string;
228
+ mitigationLatency?: number;
229
+ mitigationStatus?: number;
230
+ netaceaCookieStatus?: number;
231
+ workerInstanceId?: string;
232
+ }
233
+ interface NetaceaResponseBase {
234
+ /**
235
+ * Cookies that should be set back to the user.
236
+ */
237
+ setCookie?: string[];
238
+ /**
239
+ * Netacea session status string
240
+ */
241
+ sessionStatus: string;
242
+ apiCallLatency?: number;
243
+ apiCallStatus?: number;
244
+ cookieSessionStatus?: string | undefined;
245
+ }
246
+ interface MitigateResponse<T = any> extends NetaceaResponseBase {
247
+ /**
248
+ * Response value, using Response generic
249
+ */
250
+ response?: T;
251
+ }
252
+ interface InjectResponse<T = any> extends MitigateResponse<T> {
253
+ /**
254
+ * Headers to be sent to the origin server
255
+ * X-Netacea-Match
256
+ * X-Netacea-Mitigate
257
+ * X-Netacea-Captcha
258
+ * X-Netacea-Event-ID (Only sent when CAPTCHA is served)
259
+ */
260
+ injectHeaders: InjectHeaders | undefined;
261
+ /**
262
+ * Response value, using Response generic
263
+ */
264
+ response?: T | undefined;
265
+ }
266
+ type NetaceaMitigationResponse<T> = MitigateResponse<T> | InjectResponse<T> | undefined;
267
+
268
+ interface NetaceaVercelResult {
269
+ response: Response;
270
+ sessionStatus: string;
271
+ protectorLatencyMs?: number;
272
+ protectorStatus?: number;
273
+ }
274
+ interface NetaceaSessionCookieDetails {
275
+ userId: string | undefined;
276
+ requiresReissue: boolean;
277
+ isExpired: boolean;
278
+ shouldExpire: boolean;
279
+ isSameIP: boolean;
280
+ isPrimaryHashValid: boolean;
281
+ protectorCheckCodes: ProtectorCheckCodes;
282
+ issueReason?: NetaceaCookieV3IssueReason;
283
+ }
284
+ declare enum NetaceaSessionCookieStatus {
285
+ NEW_SESSION = 1,
286
+ EXISTING_SESSION = 2,
287
+ RENEW_SESSION = 3
288
+ }
289
+ interface ProtectorCheckCodes {
290
+ match: string;
291
+ mitigate: string;
292
+ captcha: string;
293
+ }
294
+ interface NetaceaSessionDetails {
295
+ captchaToken: string | undefined;
296
+ sessionStatus: string;
297
+ sessionCookieDetails: NetaceaSessionCookieDetails | undefined;
298
+ sessionCookieStatus: NetaceaSessionCookieStatus;
299
+ userId: string;
300
+ }
301
+ interface NetaceaRequestDetails {
302
+ clientIp: string;
303
+ method: string;
304
+ protocol: string | undefined;
305
+ sessionDetails: NetaceaSessionDetails;
306
+ url: URL;
307
+ userAgent: string;
308
+ fingerprints: {
309
+ headerFingerprint: string;
310
+ cookieFingerprint: string;
311
+ };
312
+ }
313
+
314
+ type NetaceaVercelIntegrationArgs$1 = NetaceaBaseArgs & {
315
+ cookieEncryptionKey?: string;
316
+ enableDynamicCaptchaContentType?: boolean | string;
317
+ netaceaCaptchaPath?: string;
318
+ captchaHeader?: CustomHeader$1 | undefined;
319
+ netaceaCookieAttributes?: string;
320
+ netaceaCaptchaCookieAttributes?: string;
321
+ mitigationServiceTimeoutMs?: number | string;
322
+ };
323
+ interface CustomHeader$1 {
324
+ name: string;
325
+ value: string;
326
+ }
327
+ declare class VercelConfig {
328
+ readonly mitataCookieExpirySeconds: number;
329
+ readonly apiKey: string;
330
+ readonly secretKey: string;
331
+ readonly mitigationServiceUrl: string;
332
+ readonly ingestServiceUrl: string;
333
+ readonly kinesisConfigArgs?: KinesisIngestConfigArgs$1;
334
+ readonly timeout: number;
335
+ readonly mitigationServiceTimeoutMs: number;
336
+ readonly captchaSiteKey?: string;
337
+ readonly captchaSecretKey?: string;
338
+ readonly ingestType: NetaceaIngestType;
339
+ readonly mitigationType: NetaceaMitigationType;
340
+ readonly encryptedCookies: string[];
341
+ readonly netaceaCookieName: string;
342
+ readonly netaceaCaptchaCookieName: string;
343
+ readonly cookieEncryptionKey: string | undefined;
344
+ readonly enableDynamicCaptchaContentType: boolean;
345
+ readonly netaceaCaptchaPath: string | undefined;
346
+ readonly captchaHeader: CustomHeader$1 | undefined;
347
+ readonly netaceaCookieAttributes: string;
348
+ readonly netaceaCaptchaCookieAttributes: string;
349
+ constructor(args: NetaceaVercelIntegrationArgs$1);
350
+ }
351
+
352
+ type KinesisMakeRequest = (args: {
353
+ headers: Record<string, string>;
354
+ method: 'POST' | 'GET';
355
+ host: string;
356
+ path: string;
357
+ body?: any;
358
+ }) => Promise<any>;
359
+ interface KinesisIngestWebLog {
360
+ apiKey: string;
361
+ }
362
+ interface KinesisIngestConfigArgs {
363
+ kinesisStreamName: string;
364
+ kinesisAccessKey?: string;
365
+ kinesisSecretKey?: string;
366
+ logBatchSize?: number;
367
+ maxLogAgeSeconds?: number;
368
+ }
369
+ interface KinesisIngestArgs extends KinesisIngestConfigArgs {
370
+ apiKey: string;
371
+ rampUpBatchSize?: boolean;
372
+ maxAwaitTimePerIngestCallMs?: number;
373
+ }
374
+ interface WebStandardKinesisDependencies {
375
+ AwsClient: typeof AwsClient;
376
+ Buffer: typeof Buffer;
377
+ makeRequest: KinesisMakeRequest;
378
+ }
379
+ declare class WebStandardKinesis {
380
+ private readonly deps;
381
+ protected readonly kinesisStreamName: string;
382
+ protected readonly kinesisAccessKey: string;
383
+ protected readonly kinesisSecretKey: string;
384
+ protected readonly maxLogBatchSize: number;
385
+ protected readonly maxLogAgeSeconds: number;
386
+ protected logBatchSize: number;
387
+ protected maxAwaitTimePerIngestCallMs: undefined | number;
388
+ protected logCache: KinesisIngestWebLog[];
389
+ private intervalSet;
390
+ constructor({ deps, kinesisIngestArgs }: {
391
+ deps: WebStandardKinesisDependencies;
392
+ kinesisIngestArgs: KinesisIngestArgs;
393
+ });
394
+ putToKinesis(): Promise<void>;
395
+ ingest<LogFormat extends KinesisIngestWebLog>(log: LogFormat): Promise<void>;
396
+ private batchArrayForKinesis;
397
+ private signRequest;
398
+ }
399
+
400
+ type NetaceaVercelIntegrationArgs = NetaceaBaseArgs & {
401
+ cookieEncryptionKey?: string;
402
+ enableDynamicCaptchaContentType?: boolean | string;
403
+ netaceaCaptchaPath?: string;
404
+ captchaHeader?: CustomHeader | undefined;
405
+ netaceaCookieAttributes?: string;
406
+ netaceaCaptchaCookieAttributes?: string;
407
+ };
408
+ interface CustomHeader {
409
+ name: string;
410
+ value: string;
411
+ }
412
+ interface ComposeResultResponse {
413
+ body?: string | ReadableStream<Uint8Array>;
414
+ apiCallStatus?: number;
415
+ apiCallLatency?: number;
416
+ setCookie: string[];
417
+ sessionStatus: string;
418
+ mitigation: string;
419
+ mitigated: boolean;
420
+ injectHeaders?: InjectHeaders;
421
+ }
422
+ interface MakeRequestArgs {
423
+ host: string;
424
+ path: string;
425
+ headers: Record<string, string>;
426
+ method: 'GET' | 'POST' | 'PUT' | 'DELETE';
427
+ body?: string | ReadableStream<Uint8Array> | undefined;
428
+ timeout?: number;
429
+ }
430
+ declare class Vercel {
431
+ protected readonly config: VercelConfig;
432
+ protected readonly kinesis?: WebStandardKinesis;
433
+ private readonly requestAnalyser;
434
+ private workerInstanceId;
435
+ constructor(args: NetaceaVercelIntegrationArgs);
436
+ /**
437
+ *
438
+ * @param event Vercel's FetchEvent
439
+ * @param responsePredicate Promise that takes a request, and returns a response using the Fetch API
440
+ *
441
+ * Runs Netacea. Calling the correct services depending on the mitigationType passed in the constructor
442
+ */
443
+ run(event: FetchEvent, responsePredicate: (request: Request) => Promise<Response>): Promise<NetaceaVercelResult>;
444
+ inject(request: Request, requestDetails: NetaceaRequestDetails): Promise<InjectResponse>;
445
+ protected mitigate(request: Request, requestDetails: NetaceaRequestDetails): Promise<NetaceaMitigationResponse<Response>>;
446
+ getNetaceaSession(request: Request, response?: Response | NetaceaMitigationResponse<Response>): Promise<{
447
+ userId: string;
448
+ sessionStatus: string;
449
+ netaceaCookie: string | undefined;
450
+ }>;
451
+ private getResponseDetails;
452
+ ingest(request: Request, responseOrResult: Response | NetaceaVercelResult): Promise<void>;
453
+ protected handleGetCaptchaRequest(requestDetails: NetaceaRequestDetails, captchaPageContentType: string, trackingId: string | null): Promise<ComposeResultResponse>;
454
+ protected makeRequest({ host, method, path, headers, body }: MakeRequestArgs): Promise<MakeRequestResponse>;
455
+ private handleResponse;
456
+ private getMitigationResponse;
457
+ runMitigation(request: Request, requestDetails: NetaceaRequestDetails): Promise<NetaceaMitigationResponse<Response>>;
458
+ /**
459
+ * Returns the value of the cookie with the given name from a string or list of cookies.
460
+ * If the cookie name is included in the encryptedCookies class property,
461
+ * then the cookie value will be decrypted automatically.
462
+ * The method may operate of either the HTTP Cookie or Set-Cookie headers.
463
+ * @param cookieName the name of the cookie to find.
464
+ * @param cookies the full list of cookies, either as a string or an array of strings.
465
+ * @returns the value of the cookie, if found.
466
+ */
467
+ protected readCookie(cookieName: string, cookies: string | string[] | null | undefined): Promise<string | undefined>;
468
+ private getNetaceaCookieFromResponse;
469
+ private getNetaceaCookieFromRequest;
470
+ protected callIngest(args: IngestArgs): Promise<void>;
471
+ private makeIngestApiCall;
472
+ protected check(requestDetails: NetaceaRequestDetails, captchaPageContentType: string): Promise<ComposeResultResponse>;
473
+ protected createMitata(clientIP: string, userId: string, match: string, mitigate: string, captcha: string, maxAge?: number, expiry?: number | undefined): Promise<string>;
474
+ private processCaptcha;
475
+ private getMitataCaptchaFromHeaders;
476
+ private makeCaptchaAPICall;
477
+ private getApiCallResponseFromResponse;
478
+ private makeMitigateAPICall;
479
+ private composeResult;
480
+ protected processMitigateRequest(args: {
481
+ captchaPageContentType: string;
482
+ getBodyFn: () => Promise<string | ReadableStream<Uint8Array> | undefined>;
483
+ requestDetails: NetaceaRequestDetails;
484
+ }): Promise<ComposeResultResponse>;
485
+ protected setIngestOnlyMitataCookie(userId: string): Promise<NetaceaResponseBase>;
486
+ protected processIngest(requestDetails: NetaceaRequestDetails): Promise<NetaceaResponseBase>;
487
+ }
488
+
489
+ export { NetaceaMitigationType, type NetaceaVercelIntegrationArgs, type NetaceaVercelResult, Vercel as default };
package/dist/index.js ADDED
@@ -0,0 +1,2 @@
1
+ "use strict";Object.defineProperty(exports,"__esModule",{value:!0});var e=require("aws4fetch"),t=require("buffer/"),i=require("jose"),a=require("uuid");function n(e){var t=Object.create(null);return e&&Object.keys(e).forEach((function(i){if("default"!==i){var a=Object.getOwnPropertyDescriptor(e,i);Object.defineProperty(t,i,a.get?a:{enumerable:!0,get:function(){return e[i]}})}})),t.default=e,Object.freeze(t)}var s,o,r,c=n(i),u=n(a);!function(e){e.ORIGIN="ORIGIN",e.HTTP="HTTP",e.KINESIS="KINESIS",e.NATIVE="NATIVE"}(s||(s={})),exports.NetaceaMitigationType=void 0,(o=exports.NetaceaMitigationType||(exports.NetaceaMitigationType={})).MITIGATE="MITIGATE",o.INJECT="INJECT",o.INGEST="INGEST",function(e){e.CAPTCHA_GET="captcha_get",e.CAPTCHA_POST="captcha_post",e.EXPIRED_SESSION="expired_session",e.FORCED_REVALIDATION="forced_revalidation",e.INVALID_SESSION="invalid_session",e.IP_CHANGE="ip_change",e.NO_SESSION="no_session"}(r||(r={}));const h=3e3;function p(e,t){const i=e.split(";").map((e=>e.trim())).filter((e=>e.toLowerCase().startsWith(t.toLowerCase())))[0];return void 0!==i&&i.length>0?i?.replace(`${t}=`,""):void 0}function l(e,t=!1){return"string"!=typeof e&&(e=e.join("; ")),""===e?"":d(e.split(";"),t).join("; ")}function d(e,t=!1){if(t)return d(e.reverse()).reverse();const i=new Set,a=[];for(let t of e){if(t=t.trimStart(),""===t.trim())continue;const e=t.split("=")[0].toUpperCase();i.has(e)||(i.add(e),a.push(t))}return a}var f=Object.freeze({__proto__:null,configureCookiesDomain:function(e,t){let i=e=l(e??"",!0),a=t=l(t??"",!0);if(void 0!==e&&void 0!==t){const n=p(e,"Domain"),s=p(t,"Domain");void 0!==n&&void 0!==s?a=t.replace(s,n):void 0!==n&&void 0===s?a=t+(""!==t?`; Domain=${n}`:`Domain=${n}`):void 0===n&&void 0!==s&&(i=e+(""!==e?`; Domain=${s}`:`Domain=${s}`))}else if(void 0!==e&&void 0===t){const t=p(e,"Domain");void 0!==t&&(a=`Domain=${t}`)}else if(void 0===e&&void 0!==t){const e=p(t,"Domain");void 0!==e&&(i=`Domain=${e}`)}return{cookieAttributes:""!==i?i:void 0,captchaCookieAttributes:""!==a?a:void 0}},extractAndRemoveCookieAttr:function(e,t){const i=p(e,t);if(void 0!==i){return{extractedAttribute:i,cookieAttributes:e.replace(/ /g,"").replace(`${t}=${i}`,"").split(";").filter((e=>e.length>0)).join("; ")}}return{extractedAttribute:void 0,cookieAttributes:e}},extractCookieAttr:p,removeDuplicateAttrs:l});function g(e){const t=l([e.otherAttributes??"",`Max-Age=${e.maxAgeAttribute??86400}`,"Path=/"].join("; "));return`${e.cookieName}=${e.cookieValue}; ${t}`}var y=Object.freeze({__proto__:null,createNetaceaCaptchaSetCookieString:function(e){return g({...e,cookieName:e.cookieName??"_mitatacaptcha"})},createNetaceaSetCookieString:function(e){return g({...e,cookieName:e.cookieName??"_mitata"})},createSetCookieString:g});var m=Object.freeze({__proto__:null,parseSetCookie:function(e){const t=e.indexOf("=");if(t<0)throw new Error("Could not parse the given set-cookie value.");const i=e.slice(0,t),a=e.slice(t+1),n=a.indexOf(";");return{name:i,value:a.slice(0,n),attributes:a.slice(n).trimStart()}}});const S={cookie:{parse:m,attributes:f,netaceaSession:y}};var C="@netacea/vercel",k="0.1.1";const w=globalThis.fetch.bind(globalThis),I={none:"",block:"block",captcha:"captcha",allow:"allow",captchaPass:"captchapass"},v="x-netacea-match",b="x-netacea-mitigate",N="x-netacea-captcha",A="x-netacea-mitata-expiry",E="x-netacea-mitatacaptcha-value",T="x-netacea-mitatacaptcha-expiry",_="x-netacea-event-id",O={0:"",1:"ua_",2:"ip_",3:"visitor_",4:"datacenter_",5:"sev_",6:"organisation_",7:"asn_",8:"country_",9:"combination_",b:"headerFP_"},x={0:"",1:"blocked",2:"allow",3:"hardblocked",4:"block"},P={0:"",1:"captcha_serve",2:"captcha_pass",3:"captcha_fail",4:"captcha_cookiepass",5:"captcha_cookiefail"},M={0:I.none,1:I.block,2:I.none,3:I.block,4:I.block},R={1:I.captcha,2:I.captchaPass,3:I.captcha,4:I.allow,5:I.captcha},K="_/@#/",D="1234567890abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ".split(""),j=/^(.*)_\/@#\/(.*)_\/@#\/(.*)_\/@#\/(.*)_\/@#\/(([a-zA-Z\d])(\d)(\d))$/;function L(e){if(void 0===e)return;const t=e.match(j);if(null!=t){const[,e,i,a,n,s,o,r,c]=t;return{signature:e,expiry:i,userId:a,ipHash:n,mitigationType:s,protectorCheckCodes:{match:o,mitigate:r,captcha:c}}}}function H(e=16,t=D){const i=new Uint16Array(e-1);crypto.getRandomValues(i);return`c${Array.from(i).map((e=>t[e%t.length])).join("")}`}async function q(e,t){const i=await async function(e){return await crypto.subtle.importKey("raw",e,{name:"HMAC",hash:"SHA-256"},!1,["sign","verify"])}(function(e){return"string"==typeof e?(new TextEncoder).encode(e):e}(t));return new Uint8Array(await crypto.subtle.sign("HMAC",i,e))}async function F(e,i){const a=await q(t.Buffer.from(e),i),n=t.Buffer.from(a).toString("hex");return t.Buffer.from(n).toString("base64")}var $;async function U(e,t){const i=c.base64url.decode(t),a=(new TextEncoder).encode(e);return await new c.CompactEncrypt(a).setProtectedHeader({alg:"dir",enc:"A256GCM"}).encrypt(i)}async function V(e,t){const i=c.base64url.decode(t),{plaintext:a}=await c.compactDecrypt(e,i,{keyManagementAlgorithms:["dir"],contentEncryptionAlgorithms:["A256GCM"]});return(new TextDecoder).decode(a)}function G(e){if(void 0===e)return"text/html";const t=e.toLowerCase(),i=t.includes("application/html")||t.includes("text/html"),a=t.includes("application/json");return!i&&a?"application/json":"text/html"}async function B(e,t,i){if(void 0===i||""===i)return!1;i.startsWith("/")||(i="/"+i);const{pathname:a,search:n}=e;return a.includes(i)&&n.includes("trackingId")&&"get"===t.toLowerCase()}function W(e,t){return"/AtaVerifyCaptcha"===e.pathname&&"post"===t.toLowerCase()}function z(e,t){if(void 0===t)return e;const i=e.headers.get("set-cookie")??"",a=new Headers(e.headers);if(void 0!==t.setCookie)for(const e of t.setCookie)i.includes(e.split("=")[0])||a.append("set-cookie",e);return new Response(e.body,{headers:a,status:e.status,statusText:e.statusText})}function X(e,t,i=""){return e.get(t)??i}function J(e){let t="",i="";for(const a in e){const n=e[a];void 0!==n&&(t=`${t}${i}${a}=${n}`,i="; ")}return t}!function(e){e[e.NEW_SESSION=1]="NEW_SESSION",e[e.EXISTING_SESSION=2]="EXISTING_SESSION",e[e.RENEW_SESSION=3]="RENEW_SESSION"}($||($={}));class Y extends Error{protectorApiResponse;latencyMs;constructor(e,t){super(`Got status ${e.status} when calling protector API with ${t}ms latency.`),this.protectorApiResponse=e,this.latencyMs=t}}function Z(e){return e.bytesSent=""===e.bytesSent?"0":e.bytesSent,function({ip:e,userAgent:t,status:i,method:a,path:n,protocol:s,referer:o,bytesSent:r,requestTime:c,mitataCookie:u,sessionStatus:h,integrationType:p,integrationVersion:l,integrationMode:d,xForwardedFor:f,headerFingerprint:g,cookieFingerprint:y,requestHost:m,mitigationLatency:S,mitigationStatus:C,netaceaCookieStatus:k,workerInstanceId:w}){return{Request:`${a} ${n}`,TimeLocal:(new Date).toUTCString(),RealIp:e,UserAgent:t,Status:i,RequestTime:c?.toString(),BytesSent:r?.toString(),Referer:""===o?"-":o,NetaceaUserIdCookie:u??"",NetaceaMitigationApplied:h??"",ProtectorLatencyMs:S,ProtectorStatus:C,IntegrationType:p??"",IntegrationVersion:l??"",ProtectionMode:d??"",RequestHost:m,XForwardedFor:f,WorkerInstanceId:w,NetaceaUserIdCookieStatus:k,optional:{headerFingerprint:g,cookieFingerprint:y}}}(e)}const Q="unknown";function ee(e,t,i){let{match:a,mitigate:n,captcha:s}=t;i||("2"===s?s="4":"3"===s&&(s="5"));let o=O[a]??Q+"_";o+=x[n]??Q;let r=M[n];if("0"!==s){o+=","+(P[s]??Q);const e=R[s];void 0!==e&&(r=e)}return e===exports.NetaceaMitigationType.INJECT&&(r=I.none),{sessionStatus:o,mitigation:r,parts:{match:a,mitigate:n,captcha:s}}}async function te(e){let t="";try{t=await async function(e,t){const i=(new TextEncoder).encode(t),a=await crypto.subtle.digest(e,i);return Array.from(new Uint8Array(a)).map((e=>e.toString(16).padStart(2,"0"))).join("")}("SHA-256",e)}catch(e){t=""}return t}class ie{config;constructor(e){this.config=e}async getNetaceaRequestDetails(e){const t=new URL(e.url),i=e.method,a=await this.readCookie(e,this.config.sessionCookieName),n=await this.readCookie(e,this.config.captchaCookieName),s=(e.headers.get("x-forwarded-for")??"").split(/, ?/)[0],{sessionCookieDetails:o,sessionCookieStatus:r,sessionStatus:c,userId:u}=await async function(e,t,i,a,n){const s=await async function(e,t,i){const a={userId:void 0,requiresReissue:!1,isExpired:!1,shouldExpire:!1,isSameIP:!1,isPrimaryHashValid:!1,protectorCheckCodes:{captcha:"0",match:"0",mitigate:"0"}};if("string"!=typeof e||""===e)return a;const n=L(e);if(void 0!==n){const e=[n.expiry,n.userId,n.ipHash,n.mitigationType].join(K),a=Math.floor(Date.now()/1e3),s=parseInt(n.expiry)<a,o=["1","3","5"].includes(n.protectorCheckCodes.captcha),r="3"===n.protectorCheckCodes.mitigate,c=o||r,u=await F(t+"|"+n.expiry,i),h=n.ipHash===u,p=n.signature===await F(e,i);return{userId:n.userId,requiresReissue:s||!h,isExpired:s,shouldExpire:c,isSameIP:h,isPrimaryHashValid:p,protectorCheckCodes:n.protectorCheckCodes}}return a}(a,n,e.secretKey);if(void 0!==s.userId&&s.isPrimaryHashValid){const a=s.userId,{isExpired:n,shouldExpire:o,isSameIP:r}=s,c=n||o||!r&&e.mitigationType!==exports.NetaceaMitigationType.INGEST?$.RENEW_SESSION:$.EXISTING_SESSION,{sessionStatus:u}=ee(e.mitigationType,s.protectorCheckCodes,W(t,i));return{userId:a,sessionCookieStatus:c,sessionStatus:u,sessionCookieDetails:s}}return{sessionStatus:"",userId:H(),sessionCookieStatus:$.NEW_SESSION,sessionCookieDetails:void 0}}(this.config,t,i,a,s);return{clientIp:s,fingerprints:await ae(e),method:i,protocol:void 0,url:t,userAgent:e.headers.get("user-agent")??"",sessionDetails:{sessionStatus:c,captchaToken:n,sessionCookieDetails:o,sessionCookieStatus:r,userId:u}}}async readCookie(e,t){const i=e.headers.get("Cookie");if(null==i)return;const a=i.split(/; ?/g),n=`${t}=`;for(const e of a)if(e.startsWith(n)){const i=e.slice(n.length),a=this.config.encryptedCookies??[];if(void 0!==this.config.cookieEncryptionKey&&a.includes(t))try{return await V(i,this.config.cookieEncryptionKey)}catch(e){return}return i}}}async function ae(e){const{headers:t}=e,i=await async function(e){const t=function(e){const t=[];return e.forEach(((e,i)=>{const a=i.toLowerCase();"cookie"===a||"referer"===a||a.startsWith("x-netacea-")||t.push(i)})),t.join(",")}(e);return await te(t)}(t),a=function(e,t){return e.get(t)?.split(/; ?/)??[]}(t,"cookie").map((e=>e.split("=")[0])).flat(),n=await async function(e){const t=e.join(",");return await te(t)}(a);return{headerFingerprint:""===i?i:`h_${i.substring(1,15)}`,cookieFingerprint:""===n?n:`c_${n.substring(1,15)}`}}var ne="undefined"!=typeof globalThis?globalThis:"undefined"!=typeof window?window:"undefined"!=typeof global?global:"undefined"!=typeof self?self:{},se={},oe={},re={},ce=ne&&ne.__createBinding||(Object.create?function(e,t,i,a){void 0===a&&(a=i);var n=Object.getOwnPropertyDescriptor(t,i);n&&!("get"in n?!t.__esModule:n.writable||n.configurable)||(n={enumerable:!0,get:function(){return t[i]}}),Object.defineProperty(e,a,n)}:function(e,t,i,a){void 0===a&&(a=i),e[a]=t[i]}),ue=ne&&ne.__setModuleDefault||(Object.create?function(e,t){Object.defineProperty(e,"default",{enumerable:!0,value:t})}:function(e,t){e.default=t}),he=ne&&ne.__importStar||function(e){if(e&&e.__esModule)return e;var t={};if(null!=e)for(var i in e)"default"!==i&&Object.prototype.hasOwnProperty.call(e,i)&&ce(t,e,i);return ue(t,e),t};Object.defineProperty(re,"__esModule",{value:!0}),re.isJweEncrypted=re.decrypt=re.encrypt=void 0;const pe=he(i);re.encrypt=async function(e,t){const i=pe.base64url.decode(t),a=(new TextEncoder).encode(e);return await new pe.CompactEncrypt(a).setProtectedHeader({alg:"dir",enc:"A128CBC-HS256"}).encrypt(i)},re.decrypt=async function(e,t){const i=pe.base64url.decode(t),{plaintext:a}=await pe.compactDecrypt(e,i,{keyManagementAlgorithms:["dir"],contentEncryptionAlgorithms:["A256GCM","A128CBC-HS256"]});return(new TextDecoder).decode(a)},re.isJweEncrypted=function(e){return 5===e.split(".").length&&e.includes("..")};var le=ne&&ne.__createBinding||(Object.create?function(e,t,i,a){void 0===a&&(a=i);var n=Object.getOwnPropertyDescriptor(t,i);n&&!("get"in n?!t.__esModule:n.writable||n.configurable)||(n={enumerable:!0,get:function(){return t[i]}}),Object.defineProperty(e,a,n)}:function(e,t,i,a){void 0===a&&(a=i),e[a]=t[i]}),de=ne&&ne.__setModuleDefault||(Object.create?function(e,t){Object.defineProperty(e,"default",{enumerable:!0,value:t})}:function(e,t){e.default=t}),fe=ne&&ne.__importStar||function(e){if(e&&e.__esModule)return e;var t={};if(null!=e)for(var i in e)"default"!==i&&Object.prototype.hasOwnProperty.call(e,i)&&le(t,e,i);return de(t,e),t};Object.defineProperty(oe,"__esModule",{value:!0}),oe.jwe=void 0,oe.jwe=fe(re);var ge={},ye={};function me(e,t){for(const i of Object.keys(e)){if("cookie"!==i&&"Cookie"!==i)continue;const a=e[i]??"",n=Ce("string"==typeof a?a:a.join("; "),t);if(void 0!==n)return n}}function Se(e,t){const i=[];for(const a of Object.keys(e)){if("cookie"!==a&&"Cookie"!==a)continue;const n=e[a]??"",s="string"==typeof n?n:n.join("; ");i.push(...ke(s,t))}return i}function Ce(e,t){const i=t+"=";return e.split(";").map((e=>e.trimStart())).find((e=>e.startsWith(i)))}function ke(e,t){const i=t+"=";return e.split(";").map((e=>e.trimStart())).filter((e=>e.startsWith(i)))}Object.defineProperty(ye,"__esModule",{value:!0}),ye.findAllInCookieString=ye.findFirstInCookieString=ye.findAllInHeaders=ye.findFirstInHeaders=ye.findOnlyValueInHeaders=ye.findAllValuesInHeaders=ye.findFirstValueInHeaders=void 0,ye.findFirstValueInHeaders=function(e,t){const i=me(e,t);if(void 0!==i)return i.slice(t.length+1)},ye.findAllValuesInHeaders=function(e,t){return Se(e,t).map((e=>e.slice(t.length+1)))},ye.findOnlyValueInHeaders=function(e,t){const i=Se(e,t);if(i.length>1)throw new Error(`Found more than one cookie with name ${t}`);return i[0]?.slice(t.length+1)},ye.findFirstInHeaders=me,ye.findAllInHeaders=Se,ye.findFirstInCookieString=Ce,ye.findAllInCookieString=ke;var we={};function Ie(e){return"set-cookie"===e||"Set-Cookie"===e}function ve(e,t){const i=t+"=";return e.startsWith(i)}function be(e,t){const i=e[t]??[];return"string"==typeof i?[i]:i}function Ne(e,t){for(const i of Object.keys(e)){if(!Ie(i))continue;const a=Ae(be(e,i),t);if(void 0!==a)return a}}function Ae(e,t){return e.map((e=>e.trimStart())).find((e=>ve(e,t)))}function Ee(e,t){const i=[];for(const a of Object.keys(e)){if(!Ie(a))continue;const n=be(e,a);i.push(...Te(n,t))}return i}function Te(e,t){return e.map((e=>e.trimStart())).filter((e=>ve(e,t)))}Object.defineProperty(we,"__esModule",{value:!0}),we.findAllInSetCookieStrings=we.findAllInHeaders=we.findFirstInSetCookieStrings=we.findFirstInHeaders=we.findOnlyValueInHeaders=we.findFirstValueInHeaders=void 0,we.findFirstValueInHeaders=function(e,t){const i=Ne(e,t);return i?.slice(t.length+1)?.split(";")[0]},we.findOnlyValueInHeaders=function(e,t){const i=Ee(e,t);if(i.length>1)throw new Error(`Found more than one set-cookie with name ${t}`);return i[0]?.slice(t.length+1)?.split(";")[0]},we.findFirstInHeaders=Ne,we.findFirstInSetCookieStrings=Ae,we.findAllInHeaders=Ee,we.findAllInSetCookieStrings=Te;var _e=ne&&ne.__createBinding||(Object.create?function(e,t,i,a){void 0===a&&(a=i);var n=Object.getOwnPropertyDescriptor(t,i);n&&!("get"in n?!t.__esModule:n.writable||n.configurable)||(n={enumerable:!0,get:function(){return t[i]}}),Object.defineProperty(e,a,n)}:function(e,t,i,a){void 0===a&&(a=i),e[a]=t[i]}),Oe=ne&&ne.__setModuleDefault||(Object.create?function(e,t){Object.defineProperty(e,"default",{enumerable:!0,value:t})}:function(e,t){e.default=t}),xe=ne&&ne.__importStar||function(e){if(e&&e.__esModule)return e;var t={};if(null!=e)for(var i in e)"default"!==i&&Object.prototype.hasOwnProperty.call(e,i)&&_e(t,e,i);return Oe(t,e),t};Object.defineProperty(ge,"__esModule",{value:!0}),ge.setCookie=ge.cookie=void 0,ge.cookie=xe(ye),ge.setCookie=xe(we);var Pe={},Me={},Re={};Object.defineProperty(Re,"__esModule",{value:!0}),Re.KINESIS_URL=Re.API_VERSION=Re.REGION=Re.PAYLOAD_TYPE=Re.STATE=void 0,Re.STATE={ACTIVE:"ACTIVE",UPDATING:"UPDATING",CREATING:"CREATING",DELETING:"DELETING"},Re.PAYLOAD_TYPE="string",Re.REGION="eu-west-1",Re.API_VERSION="2013-12-02",Re.KINESIS_URL="https://kinesis.eu-west-1.amazonaws.com",Object.defineProperty(Me,"__esModule",{value:!0}),Me.WebStandardKinesis=void 0;const Ke=Re;async function De(e){await new Promise((t=>{setTimeout(t,e)}))}function je(e){const t={};return e.forEach(((e,i)=>{t[i]=e})),t}Me.WebStandardKinesis=class{constructor({deps:e,kinesisIngestArgs:t}){this.maxLogBatchSize=20,this.maxLogAgeSeconds=10,this.logBatchSize=20,this.logCache=[],this.intervalSet=!1,this.deps=e;const{kinesisStreamName:i,kinesisAccessKey:a,kinesisSecretKey:n,maxLogAgeSeconds:s,logBatchSize:o,rampUpBatchSize:r,maxAwaitTimePerIngestCallMs:c}=t;if(void 0===a)throw new Error("kinesisAccessKey is required for kinesis ingest");if(void 0===n)throw new Error("kinesisSecretKey is required for kinesis ingest");this.kinesisStreamName=i,this.kinesisAccessKey=a,this.kinesisSecretKey=n,this.maxAwaitTimePerIngestCallMs=c,void 0!==s&&s<this.maxLogAgeSeconds&&s>0&&(this.maxLogAgeSeconds=s),void 0!==o&&(this.maxLogBatchSize=o),this.logBatchSize=!0===r?1:this.maxLogBatchSize}async putToKinesis(){if(0===this.logCache.length)return;const e=[...this.logCache];this.logCache=[];try{const t=new this.deps.AwsClient({accessKeyId:this.kinesisAccessKey,secretAccessKey:this.kinesisSecretKey}),i=await this.signRequest(t,{streamName:this.kinesisStreamName,accessKeyId:this.kinesisAccessKey,secretAccessKey:this.kinesisSecretKey},e,this.logBatchSize);await this.deps.makeRequest({headers:je(i.headers),host:Ke.KINESIS_URL,method:"POST",path:"/",body:i.body}),this.logBatchSize!==this.maxLogBatchSize&&(this.logBatchSize=Math.min(this.maxLogBatchSize,2*this.logBatchSize))}catch(t){this.logCache.push(...e),console.error(t)}}async ingest(e){if(this.logCache.push(e),this.logCache.length>=this.logBatchSize){const e=[];e.push(this.putToKinesis()),void 0!==this.maxAwaitTimePerIngestCallMs&&e.push(De(this.maxAwaitTimePerIngestCallMs)),await Promise.race(e)}else if(!this.intervalSet){this.intervalSet=!0;const e=De(1e3*this.maxLogAgeSeconds).then((async()=>{await this.putToKinesis(),this.intervalSet=!1})).catch((()=>{}));void 0===this.maxAwaitTimePerIngestCallMs&&await e}}batchArrayForKinesis(e,t){const i=[];for(let a=0;a<e.length;a+=t){const n=e.slice(a,a+t);i.push({Data:this.deps.Buffer.from(JSON.stringify(n)).toString("base64"),PartitionKey:Date.now().toString()})}return i}async signRequest(e,t,i,a){const n={Records:this.batchArrayForKinesis(i,a),PartitionKey:Date.now().toString(),StreamName:t.streamName};return await e.sign(Ke.KINESIS_URL,{body:JSON.stringify(n),method:"POST",headers:{"Content-Type":"application/x-amz-json-1.1","X-Amz-Target":"Kinesis_20131202.PutRecords"}})}},function(e){Object.defineProperty(e,"__esModule",{value:!0}),e.WebStandardKinesis=void 0;var t=Me;Object.defineProperty(e,"WebStandardKinesis",{enumerable:!0,get:function(){return t.WebStandardKinesis}})}(Pe);var Le={};function He(e,t){let i=null;if("number"==typeof e)i=e;else if("string"==typeof e){const t=parseFloat(e);isNaN(t)||(i=t)}return null===i&&(i=t.defaultValue),void 0!==t.minValue&&(i=Math.max(t.minValue,i)),void 0!==t.maxValue&&(i=Math.min(t.maxValue,i)),i}Object.defineProperty(Le,"__esModule",{value:!0}),Le.parseIntOrDefault=Le.parseNumberOrDefault=void 0,Le.parseNumberOrDefault=He,Le.parseIntOrDefault=function(e,t){return Math.floor(He(e,t))};var qe=ne&&ne.__createBinding||(Object.create?function(e,t,i,a){void 0===a&&(a=i);var n=Object.getOwnPropertyDescriptor(t,i);n&&!("get"in n?!t.__esModule:n.writable||n.configurable)||(n={enumerable:!0,get:function(){return t[i]}}),Object.defineProperty(e,a,n)}:function(e,t,i,a){void 0===a&&(a=i),e[a]=t[i]}),Fe=ne&&ne.__setModuleDefault||(Object.create?function(e,t){Object.defineProperty(e,"default",{enumerable:!0,value:t})}:function(e,t){e.default=t}),$e=ne&&ne.__importStar||function(e){if(e&&e.__esModule)return e;var t={};if(null!=e)for(var i in e)"default"!==i&&Object.prototype.hasOwnProperty.call(e,i)&&qe(t,e,i);return Fe(t,e),t};Object.defineProperty(se,"__esModule",{value:!0});var Ue=se.parsing=Ve=se.ingest=se.headers=se.webcrypto=void 0;se.webcrypto=$e(oe),se.headers=$e(ge);var Ve=se.ingest=$e(Pe);Ue=se.parsing=$e(Le);const{configureCookiesDomain:Ge}=S.cookie.attributes;class Be{mitataCookieExpirySeconds;apiKey;secretKey;mitigationServiceUrl;ingestServiceUrl;kinesisConfigArgs;timeout;mitigationServiceTimeoutMs;captchaSiteKey;captchaSecretKey;ingestType;mitigationType;encryptedCookies=[];netaceaCookieName;netaceaCaptchaCookieName;cookieEncryptionKey;enableDynamicCaptchaContentType=!1;netaceaCaptchaPath;captchaHeader;netaceaCookieAttributes;netaceaCaptchaCookieAttributes;constructor(e){const{apiKey:t,secretKey:i,timeout:a=3e3,mitigationServiceTimeoutMs:n=1e3,mitigationServiceUrl:o="https://mitigations.netacea.net",ingestServiceUrl:r="https://ingest.netacea.net",mitigationType:c=exports.NetaceaMitigationType.INGEST,captchaSiteKey:u,captchaSecretKey:p,ingestType:l=s.HTTP,kinesis:d,mitataCookieExpirySeconds:f,netaceaCookieExpirySeconds:g,netaceaCookieName:y,netaceaCaptchaCookieName:m,enableDynamicCaptchaContentType:S=!1,captchaHeader:C,netaceaCaptchaPath:k}=e;if(null==t)throw new Error("apiKey is a required parameter");this.apiKey=t,this.secretKey=i,this.mitigationServiceUrl=o.endsWith("/")?o.slice(0,-1):o,this.ingestServiceUrl=r,this.mitigationType=c,this.ingestType=l??s.HTTP,this.kinesisConfigArgs=d,void 0===u&&void 0===p||(this.captchaSiteKey=u,this.captchaSecretKey=p),this.timeout=function(e){return e<=0?h:e}(a),this.mitigationServiceTimeoutMs=Ue.parseIntOrDefault(n,{defaultValue:1e3,minValue:100,maxValue:1e4}),this.netaceaCookieName=y??"_mitata",this.netaceaCaptchaCookieName=m??"_mitatacaptcha";const{cookieAttributes:w,captchaCookieAttributes:I}=Ge(e.netaceaCookieAttributes,e.netaceaCaptchaCookieAttributes);this.netaceaCookieAttributes=w??"",this.netaceaCaptchaCookieAttributes=I??"",this.encryptedCookies=[this.netaceaCookieName,this.netaceaCaptchaCookieName],this.mitataCookieExpirySeconds=function(e,t){return void 0===t?e===exports.NetaceaMitigationType.INGEST?3600:60:t}(c,g??f),this.cookieEncryptionKey=e.cookieEncryptionKey,Boolean(k)&&"string"==typeof k&&(this.netaceaCaptchaPath=k.startsWith("/")?k:`/${k}`),void 0!==this.netaceaCaptchaPath&&(this.enableDynamicCaptchaContentType="boolean"==typeof S?S:"true"===S),this.captchaHeader=C}}exports.default=class{config;kinesis;requestAnalyser;workerInstanceId;constructor(i){this.config=new Be(i),this.config.ingestType===s.KINESIS&&(void 0===this.config.kinesisConfigArgs?console.warn(`NETACEA WARN: no kinesis args provided, when ingestType is ${this.config.ingestType}`):this.kinesis=new Ve.WebStandardKinesis({deps:{AwsClient:e.AwsClient,Buffer:t.Buffer,makeRequest:this.makeRequest.bind(this)},kinesisIngestArgs:{...this.config.kinesisConfigArgs,apiKey:this.config.apiKey}})),this.requestAnalyser=new ie({cookieEncryptionKey:this.config.cookieEncryptionKey,encryptedCookies:this.config.encryptedCookies,mitigationType:this.config.mitigationType,secretKey:this.config.secretKey,sessionCookieName:this.config.netaceaCookieName,captchaCookieName:this.config.netaceaCaptchaCookieName}),this.workerInstanceId=""}async run(e,t){""===this.workerInstanceId&&(this.workerInstanceId=u.v4());const i=new Request(e.request),a=await this.requestAnalyser.getNetaceaRequestDetails(i);let n=await async function(e,t){const i=new Promise(((e,i)=>{const a=Date.now();setTimeout((()=>{const t=Date.now()-a;e(t)}),t)}));return await Promise.race([e,i])}(this.runMitigation(i,a),this.config.mitigationServiceTimeoutMs);return"number"==typeof n&&(n={sessionStatus:"error_open",apiCallLatency:n}),await this.handleResponse(i,n,t)}async inject(e,t){const i=await this.getMitigationResponse(e,t);return{injectHeaders:i.injectHeaders,sessionStatus:i.sessionStatus,setCookie:i.setCookie,apiCallLatency:i.apiCallLatency,apiCallStatus:i.apiCallStatus}}async mitigate(e,t){const i=await this.getMitigationResponse(e,t);if(i.mitigated){const a=new Headers;if(!await B(t.url,e.method,this.config.netaceaCaptchaPath))for(const e of i.setCookie)a.append("set-cookie",e);let n="Forbidden";return"captcha"===i.mitigation&&(void 0!==this.config.captchaHeader&&a.append(this.config.captchaHeader.name,this.config.captchaHeader.value),a.append("content-type","text/html; charset=UTF-8"),n=i.body),{response:new Response(n,{status:403,statusText:"Forbidden",headers:a}),setCookie:i.setCookie,sessionStatus:i.sessionStatus,apiCallLatency:i.apiCallLatency,apiCallStatus:i.apiCallStatus}}if(W(t.url,e.method)){const e=new Headers;for(const t of i.setCookie)e.append("set-cookie",t);return{response:new Response(i.body,{status:200,statusText:"OK",headers:e}),setCookie:i.setCookie,sessionStatus:i.sessionStatus,apiCallLatency:i.apiCallLatency,apiCallStatus:i.apiCallStatus}}return{setCookie:i.setCookie,sessionStatus:i.sessionStatus,apiCallLatency:i.apiCallLatency,apiCallStatus:i.apiCallStatus}}async getNetaceaSession(e,t){const i=(void 0!==t?await this.getNetaceaCookieFromResponse(t):void 0)??await this.getNetaceaCookieFromRequest(e),{protectorCheckCodes:a,userId:n}=L(i??"")??{userId:"",protectorCheckCodes:{match:"0",mitigate:"0",captcha:"0"}},{sessionStatus:s}=ee(this.config.mitigationType,a,W(new URL(e.url),e.method));return{userId:n,sessionStatus:s,netaceaCookie:i}}getResponseDetails(e){return e instanceof Response?{rawResponse:e}:{rawResponse:e.response,mitigationLatency:e.protectorLatencyMs,mitigationStatus:e.protectorStatus,sessionStatus:e.sessionStatus}}async ingest(e,t){""===this.workerInstanceId&&(this.workerInstanceId=u.v4());const i=this.getResponseDetails(t),{netaceaCookie:a}=await this.getNetaceaSession(e,i.rawResponse),n=await this.requestAnalyser.getNetaceaRequestDetails(e);await this.callIngest({bytesSent:X(i.rawResponse.headers,"content-length","0"),ip:n.clientIp,method:e.method,path:new URL(e.url).pathname,protocol:null,referer:X(e.headers,"referer"),requestTime:"0",sessionStatus:i.sessionStatus??n.sessionDetails.sessionStatus,status:i.rawResponse.status.toString(),userAgent:X(e.headers,"user-agent","-"),mitataCookie:a,integrationType:C.replace("@netacea/",""),integrationVersion:k,xForwardedFor:X(e.headers,"x-forwarded-for"),headerFingerprint:n.fingerprints.headerFingerprint,cookieFingerprint:n.fingerprints.cookieFingerprint,integrationMode:this.config.mitigationType,requestHost:new URL(e.url).hostname,mitigationLatency:i.mitigationLatency,mitigationStatus:i.mitigationStatus,netaceaCookieStatus:n.sessionDetails.sessionCookieStatus,workerInstanceId:this.workerInstanceId})}async handleGetCaptchaRequest(e,t,i){if(void 0===this.config.secretKey)throw new Error("Secret key is required to mitigate");const a=await this.makeMitigateAPICall(e,t,!0,i);return{body:a.body,apiCallStatus:a.status,apiCallLatency:a.latency,setCookie:[],sessionStatus:"",mitigation:"captcha",mitigated:!0}}async makeRequest({host:e,method:t,path:i,headers:a,body:n}){const s=`${e}${i}`,o=new Request(s,{...{method:t,body:n,headers:a},duplex:"half"}),r=await w(s,o),c={};return r.headers.forEach(((e,t)=>{null!==e&&(c[t]=e)})),{status:r.status,body:await r.text(),headers:c}}async handleResponse(e,t,i){if(this.config.mitigationType===exports.NetaceaMitigationType.MITIGATE&&void 0!==t?.response)return{sessionStatus:t?.sessionStatus??"",response:t.response,protectorLatencyMs:t?.apiCallLatency,protectorStatus:t?.apiCallStatus};if(this.config.mitigationType===exports.NetaceaMitigationType.INJECT&&(e=function(e,t){if(void 0===t.injectHeaders)return e;const i=new Headers(e.headers);for(const[e,a]of Object.entries(t.injectHeaders))i.set(e,a);return new Request(e,{headers:i})}(e,t)),this.config.ingestType===s.ORIGIN){const{sessionStatus:i,userId:a}=await this.getNetaceaSession(e,t);!function(e,t,i){e.headers.set("x-netacea-integration-type",C.replace("@netacea/","")),e.headers.set("x-netacea-integration-version",k),e.headers.set("x-netacea-userid",i),e.headers.set("x-netacea-bc-type",t)}(e,i,a)}const a=await i(e);return{sessionStatus:t?.sessionStatus??"",response:z(a,t),protectorLatencyMs:t?.apiCallLatency,protectorStatus:t?.apiCallStatus}}async getMitigationResponse(e,t){const i=this.config.enableDynamicCaptchaContentType?G(e.headers.get("Accept")??void 0):G();return await this.processMitigateRequest({getBodyFn:async()=>await Promise.resolve(e.body)??void 0,requestDetails:t,captchaPageContentType:i})}async runMitigation(e,t){try{switch(this.config.mitigationType){case exports.NetaceaMitigationType.MITIGATE:return await this.mitigate(e,t);case exports.NetaceaMitigationType.INJECT:return await this.inject(e,t);case exports.NetaceaMitigationType.INGEST:return await this.processIngest(t);default:throw new Error(`Netacea Error: Mitigation type ${String(this.config.mitigationType)} not recognised`)}}catch(i){let a,n;i instanceof Error&&console.error("Netacea FAILOPEN Error:",i,i.stack),i instanceof Y&&(n=i.latencyMs,a=i.protectorApiResponse?.status);return{response:W(t.url,e.method)?new Response("",{status:500,statusText:"Internal Server Error",headers:{}}):void 0,injectHeaders:{"x-netacea-captcha":"0","x-netacea-match":"0","x-netacea-mitigate":"0"},sessionStatus:"error_open",apiCallLatency:n,apiCallStatus:a}}}async readCookie(e,t){if(null==t)return;if("string"==typeof t)return await this.readCookie(e,t.split(";"));const i=`${e}=`;for(const a of t){const t=a.split(";")[0].trimStart();if(t.startsWith(i)){const a=t.slice(i.length);if(void 0!==this.config.cookieEncryptionKey&&this.config.encryptedCookies.includes(e))try{return await V(a,this.config.cookieEncryptionKey)}catch(e){return}return a}}}async getNetaceaCookieFromResponse(e){if(void 0===e)return;const t=e instanceof Response?e.headers.getSetCookie():e.setCookie;if(void 0!==t){const e=`${this.config.netaceaCookieName}=`;for(const i of t)if(i.startsWith(e))return await this.readCookie(this.config.netaceaCookieName,i)}}async getNetaceaCookieFromRequest(e){const t=X(e.headers,"cookie");return await this.readCookie(this.config.netaceaCookieName,t)??""}async callIngest(e){const t=Z(e);if(this.config.ingestType===s.KINESIS){if(void 0===this.kinesis)return void console.error("Netacea Error: Unable to log as Kinesis has not been defined.");try{await this.kinesis.ingest({...t,apiKey:this.config.apiKey})}catch(e){console.error("NETACEA Error: ",e.message)}}else{const e={"X-Netacea-API-Key":this.config.apiKey,"content-type":"application/json"},i=await this.makeIngestApiCall(e,t);if(200!==i.status)throw function(e){let t="Unknown error";switch(e.status){case 403:t="Invalid credentials";break;case 500:t="Server error";break;case 502:t="Bad Gateway";break;case 503:t="Service Unavailable";break;case 400:t="Invalid request"}return new Error(`Error reaching Netacea API (${t}), status: ${e.status}`)}(i)}}async makeIngestApiCall(e,t){return await this.makeRequest({host:this.config.ingestServiceUrl,method:"POST",path:"/",headers:e,body:JSON.stringify(t),timeout:this.config.timeout})}async check(e,t){let i,a,n,s,o,r,c,u;if(void 0===this.config.secretKey)throw new Error("Secret key is required to mitigate");if([$.NEW_SESSION,$.RENEW_SESSION].includes(e.sessionDetails.sessionCookieStatus)){const h=e.sessionDetails.userId,p=await this.makeMitigateAPICall(e,t,!1,null);i=p.status,a=p.match,n=p.mitigate,s=p.captcha,o=p.body,u=p.latency,r=[await this.createMitata(e.clientIp,h,a,n,s,p.mitataMaxAge)],c=p.eventId}else{const t=e.sessionDetails.sessionCookieDetails?.protectorCheckCodes;a=t?.match??"0",n=t?.mitigate??"0",s=t?.captcha??"0",o=void 0,r=[]}const h={match:a,mitigate:n,captcha:s};return this.composeResult(o,r,i,h,!1,u,c)}async createMitata(e,t,i,a,n,s=86400,o=void 0){const r=["1","3","5"].includes(n)||"3"===a?-60:this.config.mitataCookieExpirySeconds,c=o??Math.floor(Date.now()/1e3)+r;if(void 0===this.config.secretKey)throw new Error("Cannot build cookie without secret key.");const u=[i,a,n].join("");let h=await async function(e,t,i,a,n="000"){const s=[i,t,await F(e+"|"+String(i),a),n].join(K);return`${await F(s,a)}${K}${s}`}(e,t,c,this.config.secretKey,u);return void 0!==this.config.cookieEncryptionKey&&this.config.encryptedCookies.includes(this.config.netaceaCookieName)&&(h=await U(h,this.config.cookieEncryptionKey)),S.cookie.netaceaSession.createNetaceaSetCookieString({cookieName:this.config.netaceaCookieName,cookieValue:h,otherAttributes:this.config.netaceaCookieAttributes})}async processCaptcha(e,t){const{status:i,match:a,mitigate:n,captcha:s,body:o,setCookie:r,latency:c}=await this.makeCaptchaAPICall(e,t),u={match:a,mitigate:n,captcha:s};return this.composeResult(o,r,i,u,!0,c)}async getMitataCaptchaFromHeaders(e){let t=e[E];const i=parseInt(e[T]);if(void 0!==t)return void 0!==this.config.cookieEncryptionKey&&this.config.encryptedCookies.includes(this.config.netaceaCaptchaCookieName)&&(t=await U(t,this.config.cookieEncryptionKey)),S.cookie.netaceaSession.createNetaceaCaptchaSetCookieString({cookieName:this.config.netaceaCaptchaCookieName,cookieValue:t,maxAgeAttribute:String(i),otherAttributes:this.config.netaceaCaptchaCookieAttributes})}async makeCaptchaAPICall(e,t){const i={"X-Netacea-API-Key":this.config.apiKey,"X-Netacea-Client-IP":e.clientIp,"user-agent":e.userAgent,"Content-Type":"application/x-www-form-urlencoded; charset=UTF-8"},a=e.sessionDetails.userId;e.sessionDetails.sessionCookieStatus!==$.NEW_SESSION&&(i["X-Netacea-UserId"]=a),void 0!==this.config.captchaSiteKey&&void 0!==this.config.captchaSecretKey&&(i["X-Netacea-Captcha-Site-Key"]=this.config.captchaSiteKey,i["X-Netacea-Captcha-Secret-Key"]=this.config.captchaSecretKey);const n=new URLSearchParams;n.append("headerFP",e.fingerprints.headerFingerprint);const s=Date.now(),o=await this.makeRequest({host:this.config.mitigationServiceUrl,path:`/AtaVerifyCaptcha?${n.toString()}`,headers:i,method:"POST",body:t,timeout:this.config.mitigationServiceTimeoutMs}),r=Date.now()-s;return await this.getApiCallResponseFromResponse(o,e,r)}async getApiCallResponseFromResponse(e,t,i){if(200!==e.status)throw new Y(e,i);const a=e.headers[v],n=e.headers[b],s=e.headers[N];let o=parseInt(e.headers[A]);isNaN(o)&&(o=86400);const r=t.sessionDetails.userId,c=[await this.createMitata(t.clientIp,r,a,n,s,o),await this.getMitataCaptchaFromHeaders(e.headers)].filter((e=>void 0!==e)),u=e.headers[_];if("application/json"===e.headers["content-type"]?.toLowerCase()){if(void 0===this.config.netaceaCaptchaPath)throw new Error("netaceaCaptchaPath and URL must be defined to handle JSON captcha");e.body=await async function(e,t,i){const a=e.length>0?JSON.parse(e).trackingId:void 0,{hostname:n}=new URL(i);return t.length<2||void 0===a?"":JSON.stringify({captchaRelativeURL:`${t}?trackingId=${a}`,captchaAbsoluteURL:`https://${n}${t}?trackingId=${a}`})}(e.body??"",this.config.netaceaCaptchaPath,t.url.toString())}return{status:e.status,match:a,mitigate:n,captcha:s,setCookie:c,body:e.body,eventId:u,mitataMaxAge:o,latency:i}}async makeMitigateAPICall(e,t,i,a){const n={"X-Netacea-API-Key":this.config.apiKey,"X-Netacea-Client-IP":e.clientIp,"user-agent":e.userAgent,cookie:J({_mitatacaptcha:e.sessionDetails.captchaToken})};e.sessionDetails.sessionCookieStatus!==$.NEW_SESSION&&(n["X-Netacea-UserId"]=e.sessionDetails.userId),void 0!==this.config.captchaSiteKey&&void 0!==this.config.captchaSecretKey&&(n["X-Netacea-Captcha-Site-Key"]=this.config.captchaSiteKey,n["X-Netacea-Captcha-Secret-Key"]=this.config.captchaSecretKey),n["X-Netacea-Captcha-Content-Type"]=t;let s="/";const o=new URLSearchParams;o.append("headerFP",e.fingerprints.headerFingerprint),i&&(s="/captcha",null!==a&&o.append("trackingId",a));const r=Date.now(),c=await this.makeRequest({host:this.config.mitigationServiceUrl,path:`${s}?${o.toString()}`,headers:n,method:"GET",timeout:this.config.mitigationServiceTimeoutMs}),u=Date.now()-r;return await this.getApiCallResponseFromResponse(c,e,u)}composeResult(e,t,i,a,n,s,o){const r=ee(this.config.mitigationType,a,n),c={body:e,apiCallStatus:i,apiCallLatency:s,setCookie:t,sessionStatus:r.sessionStatus,mitigation:r.mitigation,mitigated:[I.block,I.captcha].includes(r.mitigation)};if(this.config.mitigationType===exports.NetaceaMitigationType.INJECT){const e={"x-netacea-match":r.parts.match.toString(),"x-netacea-mitigate":r.parts.mitigate.toString(),"x-netacea-captcha":r.parts.captcha.toString()};void 0!==o&&(e["x-netacea-event-id"]=o),c.injectHeaders=e}return c}async processMitigateRequest(e){if(await B(e.requestDetails.url,e.requestDetails.method,this.config.netaceaCaptchaPath)){const t=await async function(e){try{const{searchParams:t}=e;return t.get("trackingId")}catch(e){return null}}(e.requestDetails.url);return await this.handleGetCaptchaRequest(e.requestDetails,e.captchaPageContentType,t)}if(W(e.requestDetails.url,e.requestDetails.method)){const t=await e.getBodyFn()??"";return await this.processCaptcha(e.requestDetails,t)}return await this.check(e.requestDetails,e.captchaPageContentType)}async setIngestOnlyMitataCookie(e){return{sessionStatus:"",setCookie:[await this.createMitata("ignored",e,"0","0","0",86400)]}}async processIngest(e){if(void 0===this.config.secretKey)throw new Error("Secret key is required for ingest");const t=e.sessionDetails.sessionCookieStatus,i=t===$.NEW_SESSION,a=t===$.RENEW_SESSION;return i||a?await this.setIngestOnlyMitataCookie(e.sessionDetails.userId):{sessionStatus:"",setCookie:[]}}};
2
+ //# sourceMappingURL=index.js.map
package/package.json ADDED
@@ -0,0 +1,26 @@
1
+ {
2
+ "name": "@netacea/vercel",
3
+ "version": "0.1.1",
4
+ "description": "Netacea Vercel CDN Integration",
5
+ "publishConfig": {
6
+ "access": "public"
7
+ },
8
+ "main": "dist/index.js",
9
+ "types": "dist/index.d.ts",
10
+ "files": [
11
+ "dist/index.js",
12
+ "dist/index.d.ts"
13
+ ],
14
+ "scripts": {
15
+ "prepack": "npx netacea-bundler prepack",
16
+ "postpack": "npx netacea-bundler postpack"
17
+ },
18
+ "author": "Netacea <npm@netacea.com> (https://netacea.com)",
19
+ "license": "ISC",
20
+ "dependencies": {
21
+ "aws4fetch": "^1.0.20",
22
+ "jose": "^4.11.2",
23
+ "uuid": "^10.0.0"
24
+ },
25
+ "gitHead": "6a2bc565d6b9caeda6e929300cf83896a08ec3c2"
26
+ }