@redmix/api 9.0.0-canary.581 → 9.0.0-canary.583

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (130) hide show
  1. package/dist/auth/index.js +10 -49
  2. package/dist/auth/parseJWT.js +3 -26
  3. package/dist/auth/verifiers/base64Sha1Verifier.js +18 -37
  4. package/dist/auth/verifiers/base64Sha256Verifier.js +18 -37
  5. package/dist/auth/verifiers/common.js +19 -58
  6. package/dist/auth/verifiers/index.js +8 -33
  7. package/dist/auth/verifiers/jwtVerifier.js +17 -47
  8. package/dist/auth/verifiers/secretKeyVerifier.js +7 -26
  9. package/dist/auth/verifiers/sha1Verifier.js +18 -37
  10. package/dist/auth/verifiers/sha256Verifier.js +18 -37
  11. package/dist/auth/verifiers/skipVerifier.js +4 -23
  12. package/dist/auth/verifiers/timestampSchemeVerifier.js +18 -33
  13. package/dist/cache/clients/BaseClient.js +4 -23
  14. package/dist/cache/clients/InMemoryClient.js +6 -35
  15. package/dist/cache/clients/MemcachedClient.js +6 -35
  16. package/dist/cache/clients/RedisClient.js +6 -35
  17. package/dist/cache/errors.js +3 -26
  18. package/dist/cache/index.js +14 -52
  19. package/dist/cjs/auth/index.d.ts +51 -0
  20. package/dist/cjs/auth/index.d.ts.map +1 -0
  21. package/dist/cjs/auth/index.js +129 -0
  22. package/dist/cjs/auth/parseJWT.d.ts +6 -0
  23. package/dist/cjs/auth/parseJWT.d.ts.map +1 -0
  24. package/dist/cjs/auth/parseJWT.js +57 -0
  25. package/dist/cjs/auth/verifiers/base64Sha1Verifier.d.ts +19 -0
  26. package/dist/cjs/auth/verifiers/base64Sha1Verifier.d.ts.map +1 -0
  27. package/dist/cjs/auth/verifiers/base64Sha1Verifier.js +77 -0
  28. package/dist/cjs/auth/verifiers/base64Sha256Verifier.d.ts +19 -0
  29. package/dist/cjs/auth/verifiers/base64Sha256Verifier.d.ts.map +1 -0
  30. package/dist/cjs/auth/verifiers/base64Sha256Verifier.js +77 -0
  31. package/dist/cjs/auth/verifiers/common.d.ts +104 -0
  32. package/dist/cjs/auth/verifiers/common.d.ts.map +1 -0
  33. package/dist/cjs/auth/verifiers/common.js +99 -0
  34. package/dist/cjs/auth/verifiers/index.d.ts +8 -0
  35. package/dist/cjs/auth/verifiers/index.d.ts.map +1 -0
  36. package/dist/cjs/auth/verifiers/index.js +38 -0
  37. package/dist/cjs/auth/verifiers/jwtVerifier.d.ts +26 -0
  38. package/dist/cjs/auth/verifiers/jwtVerifier.d.ts.map +1 -0
  39. package/dist/cjs/auth/verifiers/jwtVerifier.js +86 -0
  40. package/dist/cjs/auth/verifiers/secretKeyVerifier.d.ts +14 -0
  41. package/dist/cjs/auth/verifiers/secretKeyVerifier.d.ts.map +1 -0
  42. package/dist/cjs/auth/verifiers/secretKeyVerifier.js +40 -0
  43. package/dist/cjs/auth/verifiers/sha1Verifier.d.ts +25 -0
  44. package/dist/cjs/auth/verifiers/sha1Verifier.d.ts.map +1 -0
  45. package/dist/cjs/auth/verifiers/sha1Verifier.js +85 -0
  46. package/dist/cjs/auth/verifiers/sha256Verifier.d.ts +25 -0
  47. package/dist/cjs/auth/verifiers/sha256Verifier.d.ts.map +1 -0
  48. package/dist/cjs/auth/verifiers/sha256Verifier.js +85 -0
  49. package/dist/cjs/auth/verifiers/skipVerifier.d.ts +13 -0
  50. package/dist/cjs/auth/verifiers/skipVerifier.d.ts.map +1 -0
  51. package/dist/cjs/auth/verifiers/skipVerifier.js +37 -0
  52. package/dist/cjs/auth/verifiers/timestampSchemeVerifier.d.ts +16 -0
  53. package/dist/cjs/auth/verifiers/timestampSchemeVerifier.d.ts.map +1 -0
  54. package/dist/cjs/auth/verifiers/timestampSchemeVerifier.js +81 -0
  55. package/dist/cjs/bins/redwood.d.ts +9 -0
  56. package/dist/cjs/bins/redwood.d.ts.map +1 -0
  57. package/dist/cjs/bins/rwfw.d.ts +3 -0
  58. package/dist/cjs/bins/rwfw.d.ts.map +1 -0
  59. package/dist/cjs/bins/tsc.d.ts +3 -0
  60. package/dist/cjs/bins/tsc.d.ts.map +1 -0
  61. package/dist/{bins → cjs/bins}/tsc.js +2 -2
  62. package/dist/cjs/cache/clients/BaseClient.d.ts +11 -0
  63. package/dist/cjs/cache/clients/BaseClient.d.ts.map +1 -0
  64. package/dist/cjs/cache/clients/BaseClient.js +27 -0
  65. package/dist/cjs/cache/clients/InMemoryClient.d.ts +31 -0
  66. package/dist/cjs/cache/clients/InMemoryClient.d.ts.map +1 -0
  67. package/dist/cjs/cache/clients/InMemoryClient.js +100 -0
  68. package/dist/cjs/cache/clients/MemcachedClient.d.ts +16 -0
  69. package/dist/cjs/cache/clients/MemcachedClient.d.ts.map +1 -0
  70. package/dist/cjs/cache/clients/MemcachedClient.js +75 -0
  71. package/dist/cjs/cache/clients/RedisClient.d.ts +20 -0
  72. package/dist/cjs/cache/clients/RedisClient.d.ts.map +1 -0
  73. package/dist/cjs/cache/clients/RedisClient.js +79 -0
  74. package/dist/cjs/cache/errors.d.ts +4 -0
  75. package/dist/cjs/cache/errors.d.ts.map +1 -0
  76. package/dist/cjs/cache/errors.js +33 -0
  77. package/dist/cjs/cache/index.d.ts +35 -0
  78. package/dist/cjs/cache/index.d.ts.map +1 -0
  79. package/dist/cjs/cache/index.js +171 -0
  80. package/dist/cjs/cors.d.ts +16 -0
  81. package/dist/cjs/cors.d.ts.map +1 -0
  82. package/dist/cjs/cors.js +93 -0
  83. package/dist/cjs/errors.d.ts +5 -0
  84. package/dist/cjs/errors.d.ts.map +1 -0
  85. package/dist/cjs/errors.js +38 -0
  86. package/dist/cjs/event.d.ts +3 -0
  87. package/dist/cjs/event.d.ts.map +1 -0
  88. package/dist/cjs/event.js +34 -0
  89. package/dist/cjs/functions/fixtures/apiGatewayProxyEvent.fixture.d.ts +4 -0
  90. package/dist/cjs/functions/fixtures/apiGatewayProxyEvent.fixture.d.ts.map +1 -0
  91. package/dist/cjs/functions/fixtures/apiGatewayProxyEvent.fixture.js +72 -0
  92. package/dist/cjs/index.d.ts +11 -0
  93. package/dist/cjs/index.d.ts.map +1 -0
  94. package/dist/cjs/index.js +63 -0
  95. package/dist/cjs/logger/index.d.ts +179 -0
  96. package/dist/cjs/logger/index.d.ts.map +1 -0
  97. package/dist/cjs/logger/index.js +195 -0
  98. package/dist/cjs/package.json +1 -0
  99. package/dist/cjs/transforms.d.ts +35 -0
  100. package/dist/cjs/transforms.d.ts.map +1 -0
  101. package/dist/cjs/transforms.js +98 -0
  102. package/dist/cjs/types.d.ts +25 -0
  103. package/dist/cjs/types.d.ts.map +1 -0
  104. package/dist/cjs/types.js +16 -0
  105. package/dist/cjs/validations/errors.d.ts +101 -0
  106. package/dist/cjs/validations/errors.d.ts.map +1 -0
  107. package/dist/cjs/validations/errors.js +298 -0
  108. package/dist/cjs/validations/validations.d.ts +222 -0
  109. package/dist/cjs/validations/validations.d.ts.map +1 -0
  110. package/dist/cjs/validations/validations.js +351 -0
  111. package/dist/cjs/webhooks/index.d.ts +76 -0
  112. package/dist/cjs/webhooks/index.d.ts.map +1 -0
  113. package/dist/cjs/webhooks/index.js +107 -0
  114. package/dist/cors.js +7 -30
  115. package/dist/errors.js +3 -26
  116. package/dist/event.js +5 -28
  117. package/dist/functions/fixtures/apiGatewayProxyEvent.fixture.js +4 -27
  118. package/dist/index.d.ts.map +1 -1
  119. package/dist/index.js +17 -46
  120. package/dist/logger/index.d.ts.map +1 -1
  121. package/dist/logger/index.js +6 -48
  122. package/dist/package.json +1 -0
  123. package/dist/transforms.js +6 -33
  124. package/dist/types.js +1 -16
  125. package/dist/validations/errors.js +8 -66
  126. package/dist/validations/validations.js +8 -44
  127. package/dist/webhooks/index.js +25 -46
  128. package/package.json +53 -18
  129. /package/dist/{bins → cjs/bins}/redwood.js +0 -0
  130. /package/dist/{bins → cjs/bins}/rwfw.js +0 -0
@@ -0,0 +1,51 @@
1
+ export * from './parseJWT.js';
2
+ import type { APIGatewayProxyEvent, Context as LambdaContext } from 'aws-lambda';
3
+ import type { Decoded } from './parseJWT.js';
4
+ export type { Decoded };
5
+ export declare const AUTH_PROVIDER_HEADER = "auth-provider";
6
+ export declare const getAuthProviderHeader: (event: APIGatewayProxyEvent | Request) => string | null | undefined;
7
+ export interface AuthorizationHeader {
8
+ schema: 'Bearer' | 'Basic' | string;
9
+ token: string;
10
+ }
11
+ export type AuthorizationCookies = {
12
+ parsedCookie: Record<string, string | undefined>;
13
+ rawCookie: string;
14
+ type: string | undefined;
15
+ } | null;
16
+ export declare const parseAuthorizationCookie: (event: APIGatewayProxyEvent | Request) => AuthorizationCookies;
17
+ /**
18
+ * Split the `Authorization` header into a schema and token part.
19
+ */
20
+ export declare const parseAuthorizationHeader: (event: APIGatewayProxyEvent | Request) => AuthorizationHeader;
21
+ /** @MARK Note that we do not send LambdaContext when making fetch requests
22
+ *
23
+ * This part is incomplete, as we need to decide how we will make the breaking change to
24
+ * 1. getCurrentUser
25
+ * 2. authDecoders
26
+
27
+ */
28
+ export type AuthContextPayload = [
29
+ Decoded,
30
+ {
31
+ type: string;
32
+ } & AuthorizationHeader,
33
+ {
34
+ event: APIGatewayProxyEvent | Request;
35
+ context?: LambdaContext;
36
+ }
37
+ ];
38
+ export type Decoder = (token: string, type: string, req: {
39
+ event: APIGatewayProxyEvent | Request;
40
+ context?: LambdaContext;
41
+ }) => Promise<Decoded>;
42
+ /**
43
+ * Get the authorization information from the request headers and request context.
44
+ * @returns [decoded, { type, schema, token }, { event, context }]
45
+ **/
46
+ export declare const getAuthenticationContext: ({ authDecoder, event, context, }: {
47
+ authDecoder?: Decoder | Decoder[];
48
+ event: APIGatewayProxyEvent | Request;
49
+ context: LambdaContext;
50
+ }) => Promise<undefined | AuthContextPayload>;
51
+ //# sourceMappingURL=index.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../src/auth/index.ts"],"names":[],"mappings":"AAAA,cAAc,eAAe,CAAA;AAE7B,OAAO,KAAK,EAAE,oBAAoB,EAAE,OAAO,IAAI,aAAa,EAAE,MAAM,YAAY,CAAA;AAKhF,OAAO,KAAK,EAAE,OAAO,EAAE,MAAM,eAAe,CAAA;AAC5C,YAAY,EAAE,OAAO,EAAE,CAAA;AAGvB,eAAO,MAAM,oBAAoB,kBAAkB,CAAA;AAEnD,eAAO,MAAM,qBAAqB,UACzB,oBAAoB,GAAG,OAAO,8BAStC,CAAA;AAED,MAAM,WAAW,mBAAmB;IAClC,MAAM,EAAE,QAAQ,GAAG,OAAO,GAAG,MAAM,CAAA;IACnC,KAAK,EAAE,MAAM,CAAA;CACd;AAED,MAAM,MAAM,oBAAoB,GAAG;IACjC,YAAY,EAAE,MAAM,CAAC,MAAM,EAAE,MAAM,GAAG,SAAS,CAAC,CAAA;IAChD,SAAS,EAAE,MAAM,CAAA;IACjB,IAAI,EAAE,MAAM,GAAG,SAAS,CAAA;CACzB,GAAG,IAAI,CAAA;AAER,eAAO,MAAM,wBAAwB,UAC5B,oBAAoB,GAAG,OAAO,KACpC,oBAiBF,CAAA;AAED;;GAEG;AACH,eAAO,MAAM,wBAAwB,UAC5B,oBAAoB,GAAG,OAAO,KACpC,mBAUF,CAAA;AAED;;;;;;GAMG;AAEH,MAAM,MAAM,kBAAkB,GAAG;IAC/B,OAAO;IACP;QAAE,IAAI,EAAE,MAAM,CAAA;KAAE,GAAG,mBAAmB;IAEtC;QACE,KAAK,EAAE,oBAAoB,GAAG,OAAO,CAAA;QACrC,OAAO,CAAC,EAAE,aAAa,CAAA;KACxB;CACF,CAAA;AAED,MAAM,MAAM,OAAO,GAAG,CACpB,KAAK,EAAE,MAAM,EACb,IAAI,EAAE,MAAM,EACZ,GAAG,EAAE;IACH,KAAK,EAAE,oBAAoB,GAAG,OAAO,CAAA;IACrC,OAAO,CAAC,EAAE,aAAa,CAAA;CACxB,KACE,OAAO,CAAC,OAAO,CAAC,CAAA;AAErB;;;IAGI;AACJ,eAAO,MAAM,wBAAwB,qCAIlC;IACD,WAAW,CAAC,EAAE,OAAO,GAAG,OAAO,EAAE,CAAA;IACjC,KAAK,EAAE,oBAAoB,GAAG,OAAO,CAAA;IACrC,OAAO,EAAE,aAAa,CAAA;CACvB,KAAG,OAAO,CAAC,SAAS,GAAG,kBAAkB,CA6DzC,CAAA"}
@@ -0,0 +1,129 @@
1
+ "use strict";
2
+ var __create = Object.create;
3
+ var __defProp = Object.defineProperty;
4
+ var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
5
+ var __getOwnPropNames = Object.getOwnPropertyNames;
6
+ var __getProtoOf = Object.getPrototypeOf;
7
+ var __hasOwnProp = Object.prototype.hasOwnProperty;
8
+ var __export = (target, all) => {
9
+ for (var name in all)
10
+ __defProp(target, name, { get: all[name], enumerable: true });
11
+ };
12
+ var __copyProps = (to, from, except, desc) => {
13
+ if (from && typeof from === "object" || typeof from === "function") {
14
+ for (let key of __getOwnPropNames(from))
15
+ if (!__hasOwnProp.call(to, key) && key !== except)
16
+ __defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });
17
+ }
18
+ return to;
19
+ };
20
+ var __reExport = (target, mod, secondTarget) => (__copyProps(target, mod, "default"), secondTarget && __copyProps(secondTarget, mod, "default"));
21
+ var __toESM = (mod, isNodeMode, target) => (target = mod != null ? __create(__getProtoOf(mod)) : {}, __copyProps(
22
+ // If the importer is in node compatibility mode or this is not an ESM
23
+ // file that has been converted to a CommonJS file using a Babel-
24
+ // compatible transform (i.e. "__esModule" has not been set), then set
25
+ // "default" to the CommonJS "module.exports" for node compatibility.
26
+ isNodeMode || !mod || !mod.__esModule ? __defProp(target, "default", { value: mod, enumerable: true }) : target,
27
+ mod
28
+ ));
29
+ var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
30
+ var auth_exports = {};
31
+ __export(auth_exports, {
32
+ AUTH_PROVIDER_HEADER: () => AUTH_PROVIDER_HEADER,
33
+ getAuthProviderHeader: () => getAuthProviderHeader,
34
+ getAuthenticationContext: () => getAuthenticationContext,
35
+ parseAuthorizationCookie: () => parseAuthorizationCookie,
36
+ parseAuthorizationHeader: () => parseAuthorizationHeader
37
+ });
38
+ module.exports = __toCommonJS(auth_exports);
39
+ __reExport(auth_exports, require("./parseJWT.js"), module.exports);
40
+ var cookie = __toESM(require("cookie"), 1);
41
+ var import_event = require("../event.js");
42
+ const AUTH_PROVIDER_HEADER = "auth-provider";
43
+ const getAuthProviderHeader = (event) => {
44
+ const authProviderKey = Object.keys(event?.headers ?? {}).find(
45
+ (key) => key.toLowerCase() === AUTH_PROVIDER_HEADER
46
+ );
47
+ if (authProviderKey) {
48
+ return (0, import_event.getEventHeader)(event, authProviderKey);
49
+ }
50
+ return void 0;
51
+ };
52
+ const parseAuthorizationCookie = (event) => {
53
+ const cookieHeader = (0, import_event.getEventHeader)(event, "Cookie");
54
+ if (!cookieHeader) {
55
+ return null;
56
+ }
57
+ const parsedCookie = cookie.parse(cookieHeader);
58
+ return {
59
+ parsedCookie,
60
+ rawCookie: cookieHeader,
61
+ // When not unauthenticated, this will be null/undefined
62
+ // Remember that the cookie header could contain other (unrelated) values!
63
+ type: parsedCookie[AUTH_PROVIDER_HEADER]
64
+ };
65
+ };
66
+ const parseAuthorizationHeader = (event) => {
67
+ const parts = (0, import_event.getEventHeader)(event, "Authorization")?.split(" ");
68
+ if (parts?.length !== 2) {
69
+ throw new Error("The `Authorization` header is not valid.");
70
+ }
71
+ const [schema, token] = parts;
72
+ if (!schema.length || !token.length) {
73
+ throw new Error("The `Authorization` header is not valid.");
74
+ }
75
+ return { schema, token };
76
+ };
77
+ const getAuthenticationContext = async ({
78
+ authDecoder,
79
+ event,
80
+ context
81
+ }) => {
82
+ const cookieHeader = parseAuthorizationCookie(event);
83
+ const typeFromHeader = getAuthProviderHeader(event);
84
+ if (!typeFromHeader && !cookieHeader) {
85
+ return void 0;
86
+ }
87
+ let token;
88
+ let type;
89
+ let schema;
90
+ if (cookieHeader?.type) {
91
+ token = cookieHeader.rawCookie;
92
+ type = cookieHeader.type;
93
+ schema = "cookie";
94
+ } else if (typeFromHeader) {
95
+ const parsedAuthHeader = parseAuthorizationHeader(event);
96
+ token = parsedAuthHeader.token;
97
+ type = typeFromHeader;
98
+ schema = parsedAuthHeader.schema;
99
+ }
100
+ if (!token || !type || !schema) {
101
+ return void 0;
102
+ }
103
+ let authDecoders = [];
104
+ if (Array.isArray(authDecoder)) {
105
+ authDecoders = authDecoder;
106
+ } else if (authDecoder) {
107
+ authDecoders = [authDecoder];
108
+ }
109
+ let decoded = null;
110
+ let i = 0;
111
+ while (!decoded && i < authDecoders.length) {
112
+ decoded = await authDecoders[i](token, type, {
113
+ // @MARK: When called from middleware, the decoder will pass Request, not Lambda event
114
+ event,
115
+ context
116
+ });
117
+ i++;
118
+ }
119
+ return [decoded, { type, schema, token }, { event, context }];
120
+ };
121
+ // Annotate the CommonJS export names for ESM import in node:
122
+ 0 && (module.exports = {
123
+ AUTH_PROVIDER_HEADER,
124
+ getAuthProviderHeader,
125
+ getAuthenticationContext,
126
+ parseAuthorizationCookie,
127
+ parseAuthorizationHeader,
128
+ ...require("./parseJWT.js")
129
+ });
@@ -0,0 +1,6 @@
1
+ export type Decoded = Record<string, unknown> | null;
2
+ export declare const parseJWT: (token: {
3
+ decoded: Decoded;
4
+ namespace?: string;
5
+ }) => any;
6
+ //# sourceMappingURL=parseJWT.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"parseJWT.d.ts","sourceRoot":"","sources":["../../../src/auth/parseJWT.ts"],"names":[],"mappings":"AAAA,MAAM,MAAM,OAAO,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,GAAG,IAAI,CAAA;AA8DpD,eAAO,MAAM,QAAQ,UAAW;IAC9B,OAAO,EAAE,OAAO,CAAA;IAChB,SAAS,CAAC,EAAE,MAAM,CAAA;CACnB,KAAG,GAKH,CAAA"}
@@ -0,0 +1,57 @@
1
+ "use strict";
2
+ var __defProp = Object.defineProperty;
3
+ var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
4
+ var __getOwnPropNames = Object.getOwnPropertyNames;
5
+ var __hasOwnProp = Object.prototype.hasOwnProperty;
6
+ var __export = (target, all) => {
7
+ for (var name in all)
8
+ __defProp(target, name, { get: all[name], enumerable: true });
9
+ };
10
+ var __copyProps = (to, from, except, desc) => {
11
+ if (from && typeof from === "object" || typeof from === "function") {
12
+ for (let key of __getOwnPropNames(from))
13
+ if (!__hasOwnProp.call(to, key) && key !== except)
14
+ __defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });
15
+ }
16
+ return to;
17
+ };
18
+ var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
19
+ var parseJWT_exports = {};
20
+ __export(parseJWT_exports, {
21
+ parseJWT: () => parseJWT
22
+ });
23
+ module.exports = __toCommonJS(parseJWT_exports);
24
+ function isTokenWithRoles(token) {
25
+ return !!token.decoded?.roles;
26
+ }
27
+ function isTokenWithMetadata(token) {
28
+ const claim = token.namespace ? `${token.namespace}/app_metadata` : "app_metadata";
29
+ return !!token.decoded?.[claim];
30
+ }
31
+ const appMetadata = (token) => {
32
+ if (typeof token.decoded === "string") {
33
+ return {};
34
+ }
35
+ if (isTokenWithMetadata(token)) {
36
+ const claim = token.namespace ? `${token.namespace}/app_metadata` : "app_metadata";
37
+ return token.decoded?.[claim];
38
+ }
39
+ return {};
40
+ };
41
+ const roles = (token) => {
42
+ if (isTokenWithRoles(token)) {
43
+ return token.decoded.roles;
44
+ }
45
+ const metadata = appMetadata(token);
46
+ return metadata?.roles || metadata.authorization?.roles || [];
47
+ };
48
+ const parseJWT = (token) => {
49
+ return {
50
+ appMetadata: appMetadata(token),
51
+ roles: roles(token)
52
+ };
53
+ };
54
+ // Annotate the CommonJS export names for ESM import in node:
55
+ 0 && (module.exports = {
56
+ parseJWT
57
+ });
@@ -0,0 +1,19 @@
1
+ import type { WebhookVerifier, VerifyOptions } from './common.js';
2
+ export interface Base64Sha1Verifier extends WebhookVerifier {
3
+ type: 'base64Sha1Verifier';
4
+ }
5
+ export declare const verifySignature: ({ payload, secret, signature, }: {
6
+ payload: string | Record<string, unknown>;
7
+ secret: string;
8
+ signature: string;
9
+ }) => boolean;
10
+ /**
11
+ * Base64 SHA1 HMAC Payload Verifier
12
+ *
13
+ * Based on Svix's webhook payload verification, but using SHA1 instead
14
+ * @see https://docs.svix.com/receiving/verifying-payloads/how-manual
15
+ * @see https://github.com/svix/svix-webhooks/blob/main/javascript/src/index.ts
16
+ */
17
+ declare const base64Sha1Verifier: (_options?: VerifyOptions) => Base64Sha1Verifier;
18
+ export default base64Sha1Verifier;
19
+ //# sourceMappingURL=base64Sha1Verifier.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"base64Sha1Verifier.d.ts","sourceRoot":"","sources":["../../../../src/auth/verifiers/base64Sha1Verifier.ts"],"names":[],"mappings":"AAOA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,kBAAmB,SAAQ,eAAe;IACzD,IAAI,EAAE,oBAAoB,CAAA;CAC3B;AA0BD,eAAO,MAAM,eAAe,oCAIzB;IACD,OAAO,EAAE,MAAM,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAA;IACzC,MAAM,EAAE,MAAM,CAAA;IACd,SAAS,EAAE,MAAM,CAAA;CAClB,KAAG,OA0BH,CAAA;AAED;;;;;;GAMG;AACH,QAAA,MAAM,kBAAkB,cAAe,aAAa,KAAG,kBAUtD,CAAA;AAED,eAAe,kBAAkB,CAAA"}
@@ -0,0 +1,77 @@
1
+ "use strict";
2
+ var __defProp = Object.defineProperty;
3
+ var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
4
+ var __getOwnPropNames = Object.getOwnPropertyNames;
5
+ var __hasOwnProp = Object.prototype.hasOwnProperty;
6
+ var __export = (target, all) => {
7
+ for (var name in all)
8
+ __defProp(target, name, { get: all[name], enumerable: true });
9
+ };
10
+ var __copyProps = (to, from, except, desc) => {
11
+ if (from && typeof from === "object" || typeof from === "function") {
12
+ for (let key of __getOwnPropNames(from))
13
+ if (!__hasOwnProp.call(to, key) && key !== except)
14
+ __defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });
15
+ }
16
+ return to;
17
+ };
18
+ var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
19
+ var base64Sha1Verifier_exports = {};
20
+ __export(base64Sha1Verifier_exports, {
21
+ default: () => base64Sha1Verifier_default,
22
+ verifySignature: () => verifySignature
23
+ });
24
+ module.exports = __toCommonJS(base64Sha1Verifier_exports);
25
+ var import_crypto = require("crypto");
26
+ var import_common = require("./common.js");
27
+ function toNormalizedJsonString(payload) {
28
+ return JSON.stringify(payload).replace(/[^\\]\\u[\da-f]{4}/g, (s) => {
29
+ return s.slice(0, 3) + s.slice(3).toUpperCase();
30
+ });
31
+ }
32
+ const createSignature = ({
33
+ payload,
34
+ secret = import_common.DEFAULT_WEBHOOK_SECRET
35
+ }) => {
36
+ const algorithm = "sha1";
37
+ const hmac = (0, import_crypto.createHmac)(algorithm, Buffer.from(secret, "base64"));
38
+ payload = typeof payload === "string" ? payload : toNormalizedJsonString(payload);
39
+ const digest = hmac.update(payload).digest();
40
+ return digest.toString("base64");
41
+ };
42
+ const verifySignature = ({
43
+ payload,
44
+ secret = import_common.DEFAULT_WEBHOOK_SECRET,
45
+ signature
46
+ }) => {
47
+ try {
48
+ const webhookSignature = Buffer.from(signature || "", "base64");
49
+ const hmac = (0, import_crypto.createHmac)("sha1", Buffer.from(secret, "base64"));
50
+ payload = typeof payload === "string" ? payload : toNormalizedJsonString(payload);
51
+ const digest = hmac.update(payload).digest();
52
+ if (webhookSignature.length === digest.length && (0, import_crypto.timingSafeEqual)(digest, webhookSignature)) {
53
+ return true;
54
+ }
55
+ throw new import_common.WebhookVerificationError();
56
+ } catch (error) {
57
+ throw new import_common.WebhookVerificationError(
58
+ `${import_common.VERIFICATION_ERROR_MESSAGE}: ${error.message}`
59
+ );
60
+ }
61
+ };
62
+ const base64Sha1Verifier = (_options) => {
63
+ return {
64
+ sign: ({ payload, secret }) => {
65
+ return createSignature({ payload, secret });
66
+ },
67
+ verify: ({ payload, secret, signature }) => {
68
+ return verifySignature({ payload, secret, signature });
69
+ },
70
+ type: "base64Sha1Verifier"
71
+ };
72
+ };
73
+ var base64Sha1Verifier_default = base64Sha1Verifier;
74
+ // Annotate the CommonJS export names for ESM import in node:
75
+ 0 && (module.exports = {
76
+ verifySignature
77
+ });
@@ -0,0 +1,19 @@
1
+ import type { WebhookVerifier, VerifyOptions } from './common.js';
2
+ export interface Base64Sha256Verifier extends WebhookVerifier {
3
+ type: 'base64Sha256Verifier';
4
+ }
5
+ export declare const verifySignature: ({ payload, secret, signature, }: {
6
+ payload: string | Record<string, unknown>;
7
+ secret: string;
8
+ signature: string;
9
+ }) => boolean;
10
+ /**
11
+ * Base64 SHA256 HMAC Payload Verifier
12
+ *
13
+ * Based on Svix's webhook payload verification
14
+ * @see https://docs.svix.com/receiving/verifying-payloads/how-manual
15
+ * @see https://github.com/svix/svix-webhooks/blob/main/javascript/src/index.ts
16
+ */
17
+ declare const base64Sha256Verifier: (_options?: VerifyOptions) => Base64Sha256Verifier;
18
+ export default base64Sha256Verifier;
19
+ //# sourceMappingURL=base64Sha256Verifier.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"base64Sha256Verifier.d.ts","sourceRoot":"","sources":["../../../../src/auth/verifiers/base64Sha256Verifier.ts"],"names":[],"mappings":"AAOA,OAAO,KAAK,EAAE,eAAe,EAAE,aAAa,EAAE,MAAM,aAAa,CAAA;AAEjE,MAAM,WAAW,oBAAqB,SAAQ,eAAe;IAC3D,IAAI,EAAE,sBAAsB,CAAA;CAC7B;AA0BD,eAAO,MAAM,eAAe,oCAIzB;IACD,OAAO,EAAE,MAAM,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAA;IACzC,MAAM,EAAE,MAAM,CAAA;IACd,SAAS,EAAE,MAAM,CAAA;CAClB,KAAG,OA0BH,CAAA;AAED;;;;;;GAMG;AACH,QAAA,MAAM,oBAAoB,cACb,aAAa,KACvB,oBAUF,CAAA;AAED,eAAe,oBAAoB,CAAA"}
@@ -0,0 +1,77 @@
1
+ "use strict";
2
+ var __defProp = Object.defineProperty;
3
+ var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
4
+ var __getOwnPropNames = Object.getOwnPropertyNames;
5
+ var __hasOwnProp = Object.prototype.hasOwnProperty;
6
+ var __export = (target, all) => {
7
+ for (var name in all)
8
+ __defProp(target, name, { get: all[name], enumerable: true });
9
+ };
10
+ var __copyProps = (to, from, except, desc) => {
11
+ if (from && typeof from === "object" || typeof from === "function") {
12
+ for (let key of __getOwnPropNames(from))
13
+ if (!__hasOwnProp.call(to, key) && key !== except)
14
+ __defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });
15
+ }
16
+ return to;
17
+ };
18
+ var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
19
+ var base64Sha256Verifier_exports = {};
20
+ __export(base64Sha256Verifier_exports, {
21
+ default: () => base64Sha256Verifier_default,
22
+ verifySignature: () => verifySignature
23
+ });
24
+ module.exports = __toCommonJS(base64Sha256Verifier_exports);
25
+ var import_crypto = require("crypto");
26
+ var import_common = require("./common.js");
27
+ function toNormalizedJsonString(payload) {
28
+ return JSON.stringify(payload).replace(/[^\\]\\u[\da-f]{4}/g, (s) => {
29
+ return s.slice(0, 3) + s.slice(3).toUpperCase();
30
+ });
31
+ }
32
+ const createSignature = ({
33
+ payload,
34
+ secret = import_common.DEFAULT_WEBHOOK_SECRET
35
+ }) => {
36
+ const algorithm = "sha256";
37
+ const hmac = (0, import_crypto.createHmac)(algorithm, Buffer.from(secret, "base64"));
38
+ payload = typeof payload === "string" ? payload : toNormalizedJsonString(payload);
39
+ const digest = hmac.update(payload).digest();
40
+ return digest.toString("base64");
41
+ };
42
+ const verifySignature = ({
43
+ payload,
44
+ secret = import_common.DEFAULT_WEBHOOK_SECRET,
45
+ signature
46
+ }) => {
47
+ try {
48
+ const webhookSignature = Buffer.from(signature || "", "base64");
49
+ const hmac = (0, import_crypto.createHmac)("sha256", Buffer.from(secret, "base64"));
50
+ payload = typeof payload === "string" ? payload : toNormalizedJsonString(payload);
51
+ const digest = hmac.update(payload).digest();
52
+ if (webhookSignature.length === digest.length && (0, import_crypto.timingSafeEqual)(digest, webhookSignature)) {
53
+ return true;
54
+ }
55
+ throw new import_common.WebhookVerificationError();
56
+ } catch (error) {
57
+ throw new import_common.WebhookVerificationError(
58
+ `${import_common.VERIFICATION_ERROR_MESSAGE}: ${error.message}`
59
+ );
60
+ }
61
+ };
62
+ const base64Sha256Verifier = (_options) => {
63
+ return {
64
+ sign: ({ payload, secret }) => {
65
+ return createSignature({ payload, secret });
66
+ },
67
+ verify: ({ payload, secret, signature }) => {
68
+ return verifySignature({ payload, secret, signature });
69
+ },
70
+ type: "base64Sha256Verifier"
71
+ };
72
+ };
73
+ var base64Sha256Verifier_default = base64Sha256Verifier;
74
+ // Annotate the CommonJS export names for ESM import in node:
75
+ 0 && (module.exports = {
76
+ verifySignature
77
+ });
@@ -0,0 +1,104 @@
1
+ import type { Base64Sha1Verifier } from './base64Sha1Verifier.js';
2
+ import type { Base64Sha256Verifier } from './base64Sha256Verifier.js';
3
+ import type { JwtVerifier } from './jwtVerifier.js';
4
+ import type { SecretKeyVerifier } from './secretKeyVerifier.js';
5
+ import type { Sha1Verifier } from './sha1Verifier.js';
6
+ import type { Sha256Verifier } from './sha256Verifier.js';
7
+ import type { SkipVerifier } from './skipVerifier.js';
8
+ import type { TimestampSchemeVerifier } from './timestampSchemeVerifier.js';
9
+ export declare const verifierLookup: {
10
+ skipVerifier: (_options?: VerifyOptions) => SkipVerifier;
11
+ secretKeyVerifier: (_options?: VerifyOptions) => SecretKeyVerifier;
12
+ sha1Verifier: (_options?: VerifyOptions) => Sha1Verifier;
13
+ sha256Verifier: (_options?: VerifyOptions) => Sha256Verifier;
14
+ base64Sha1Verifier: (_options?: VerifyOptions) => Base64Sha1Verifier;
15
+ base64Sha256Verifier: (_options?: VerifyOptions) => Base64Sha256Verifier;
16
+ timestampSchemeVerifier: (options?: VerifyOptions) => TimestampSchemeVerifier;
17
+ jwtVerifier: (options?: VerifyOptions) => JwtVerifier;
18
+ };
19
+ export type SupportedVerifiers = SkipVerifier | SecretKeyVerifier | Sha1Verifier | Sha256Verifier | Base64Sha1Verifier | Base64Sha256Verifier | TimestampSchemeVerifier | JwtVerifier;
20
+ export type SupportedVerifierTypes = keyof typeof verifierLookup;
21
+ export declare const DEFAULT_WEBHOOK_SECRET: string;
22
+ export declare const VERIFICATION_ERROR_MESSAGE = "You don't have access to invoke this function.";
23
+ export declare const VERIFICATION_SIGN_MESSAGE = "Unable to sign payload";
24
+ /**
25
+ * @const {number} DEFAULT_TOLERANCE - Five minutes
26
+ */
27
+ export declare const DEFAULT_TOLERANCE: number;
28
+ /**
29
+ * Class representing a WebhookError
30
+ * @extends Error
31
+ */
32
+ declare class WebhookError extends Error {
33
+ /**
34
+ * Create a WebhookError.
35
+ * @param {string} message - The error message
36
+ * */
37
+ constructor(message: string);
38
+ }
39
+ /**
40
+ * Class representing a WebhookVerificationError
41
+ * @extends WebhookError
42
+ */
43
+ export declare class WebhookVerificationError extends WebhookError {
44
+ /**
45
+ * Create a WebhookVerificationError.
46
+ * @param {string} message - The error message
47
+ * */
48
+ constructor(message?: string);
49
+ }
50
+ /**
51
+ * Class representing a WebhookSignError
52
+ * @extends WebhookError
53
+ */
54
+ export declare class WebhookSignError extends WebhookError {
55
+ /**
56
+ * Create a WebhookSignError.
57
+ * @param {string} message - The error message
58
+ * */
59
+ constructor(message?: string);
60
+ }
61
+ /**
62
+ * VerifyOptions
63
+ *
64
+ * Used when verifying a signature based on the verifier's requirements
65
+ *
66
+ * @param {string} signatureHeader - Optional Header that contains the signature
67
+ * to verify. Will default to DEFAULT_WEBHOOK_SIGNATURE_HEADER
68
+ * @param {(signature: string) => string} signatureTransformer - Optional
69
+ * function that receives the signature from the headers and returns a new
70
+ * signature to use in the Verifier
71
+ * @param {number} currentTimestampOverride - Optional timestamp to use as the
72
+ * "current" timestamp, in msec
73
+ * @param {number} eventTimestamp - Optional timestamp to use as the event
74
+ * timestamp, in msec. If this is provided the webhook verification will fail
75
+ * if the eventTimestamp is too far from the current time (or the time passed
76
+ * as the `currentTimestampOverride` option)
77
+ * @param {number} tolerance - Optional tolerance in msec
78
+ * @param {string} issuer - Options JWT issuer for JWTVerifier
79
+ */
80
+ export interface VerifyOptions {
81
+ signatureHeader?: string;
82
+ signatureTransformer?: (signature: string) => string;
83
+ currentTimestampOverride?: number;
84
+ eventTimestamp?: number;
85
+ tolerance?: number;
86
+ issuer?: string;
87
+ }
88
+ /**
89
+ * WebhookVerifier is the interface for all verifiers
90
+ */
91
+ export interface WebhookVerifier {
92
+ sign({ payload, secret, }: {
93
+ payload: string | Record<string, unknown>;
94
+ secret: string;
95
+ }): string;
96
+ verify({ payload, secret, signature, }: {
97
+ payload: string | Record<string, unknown>;
98
+ secret: string;
99
+ signature: string;
100
+ }): boolean | WebhookVerificationError;
101
+ type: SupportedVerifierTypes;
102
+ }
103
+ export {};
104
+ //# sourceMappingURL=common.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"common.d.ts","sourceRoot":"","sources":["../../../../src/auth/verifiers/common.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,EAAE,kBAAkB,EAAE,MAAM,yBAAyB,CAAA;AAEjE,OAAO,KAAK,EAAE,oBAAoB,EAAE,MAAM,2BAA2B,CAAA;AAErE,OAAO,KAAK,EAAE,WAAW,EAAE,MAAM,kBAAkB,CAAA;AAEnD,OAAO,KAAK,EAAE,iBAAiB,EAAE,MAAM,wBAAwB,CAAA;AAE/D,OAAO,KAAK,EAAE,YAAY,EAAE,MAAM,mBAAmB,CAAA;AAErD,OAAO,KAAK,EAAE,cAAc,EAAE,MAAM,qBAAqB,CAAA;AAEzD,OAAO,KAAK,EAAE,YAAY,EAAE,MAAM,mBAAmB,CAAA;AAErD,OAAO,KAAK,EAAE,uBAAuB,EAAE,MAAM,8BAA8B,CAAA;AAE3E,eAAO,MAAM,cAAc;;;;;;;;;CAS1B,CAAA;AAED,MAAM,MAAM,kBAAkB,GAC1B,YAAY,GACZ,iBAAiB,GACjB,YAAY,GACZ,cAAc,GACd,kBAAkB,GAClB,oBAAoB,GACpB,uBAAuB,GACvB,WAAW,CAAA;AAEf,MAAM,MAAM,sBAAsB,GAAG,MAAM,OAAO,cAAc,CAAA;AAEhE,eAAO,MAAM,sBAAsB,QAAmC,CAAA;AAEtE,eAAO,MAAM,0BAA0B,mDACW,CAAA;AAElD,eAAO,MAAM,yBAAyB,2BAA2B,CAAA;AAIjE;;GAEG;AACH,eAAO,MAAM,iBAAiB,QAAe,CAAA;AAE7C;;;GAGG;AACH,cAAM,YAAa,SAAQ,KAAK;IAC9B;;;SAGK;gBACO,OAAO,EAAE,MAAM;CAG5B;AAED;;;GAGG;AACH,qBAAa,wBAAyB,SAAQ,YAAY;IACxD;;;SAGK;gBACO,OAAO,CAAC,EAAE,MAAM;CAG7B;AAED;;;GAGG;AACH,qBAAa,gBAAiB,SAAQ,YAAY;IAChD;;;SAGK;gBACO,OAAO,CAAC,EAAE,MAAM;CAG7B;AAED;;;;;;;;;;;;;;;;;;GAkBG;AACH,MAAM,WAAW,aAAa;IAC5B,eAAe,CAAC,EAAE,MAAM,CAAA;IACxB,oBAAoB,CAAC,EAAE,CAAC,SAAS,EAAE,MAAM,KAAK,MAAM,CAAA;IACpD,wBAAwB,CAAC,EAAE,MAAM,CAAA;IACjC,cAAc,CAAC,EAAE,MAAM,CAAA;IACvB,SAAS,CAAC,EAAE,MAAM,CAAA;IAClB,MAAM,CAAC,EAAE,MAAM,CAAA;CAChB;AAED;;GAEG;AACH,MAAM,WAAW,eAAe;IAC9B,IAAI,CAAC,EACH,OAAO,EACP,MAAM,GACP,EAAE;QACD,OAAO,EAAE,MAAM,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAA;QACzC,MAAM,EAAE,MAAM,CAAA;KACf,GAAG,MAAM,CAAA;IACV,MAAM,CAAC,EACL,OAAO,EACP,MAAM,EACN,SAAS,GACV,EAAE;QACD,OAAO,EAAE,MAAM,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAA;QACzC,MAAM,EAAE,MAAM,CAAA;QACd,SAAS,EAAE,MAAM,CAAA;KAClB,GAAG,OAAO,GAAG,wBAAwB,CAAA;IACtC,IAAI,EAAE,sBAAsB,CAAA;CAC7B"}
@@ -0,0 +1,99 @@
1
+ "use strict";
2
+ var __create = Object.create;
3
+ var __defProp = Object.defineProperty;
4
+ var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
5
+ var __getOwnPropNames = Object.getOwnPropertyNames;
6
+ var __getProtoOf = Object.getPrototypeOf;
7
+ var __hasOwnProp = Object.prototype.hasOwnProperty;
8
+ var __export = (target, all) => {
9
+ for (var name in all)
10
+ __defProp(target, name, { get: all[name], enumerable: true });
11
+ };
12
+ var __copyProps = (to, from, except, desc) => {
13
+ if (from && typeof from === "object" || typeof from === "function") {
14
+ for (let key of __getOwnPropNames(from))
15
+ if (!__hasOwnProp.call(to, key) && key !== except)
16
+ __defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });
17
+ }
18
+ return to;
19
+ };
20
+ var __toESM = (mod, isNodeMode, target) => (target = mod != null ? __create(__getProtoOf(mod)) : {}, __copyProps(
21
+ // If the importer is in node compatibility mode or this is not an ESM
22
+ // file that has been converted to a CommonJS file using a Babel-
23
+ // compatible transform (i.e. "__esModule" has not been set), then set
24
+ // "default" to the CommonJS "module.exports" for node compatibility.
25
+ isNodeMode || !mod || !mod.__esModule ? __defProp(target, "default", { value: mod, enumerable: true }) : target,
26
+ mod
27
+ ));
28
+ var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
29
+ var common_exports = {};
30
+ __export(common_exports, {
31
+ DEFAULT_TOLERANCE: () => DEFAULT_TOLERANCE,
32
+ DEFAULT_WEBHOOK_SECRET: () => DEFAULT_WEBHOOK_SECRET,
33
+ VERIFICATION_ERROR_MESSAGE: () => VERIFICATION_ERROR_MESSAGE,
34
+ VERIFICATION_SIGN_MESSAGE: () => VERIFICATION_SIGN_MESSAGE,
35
+ WebhookSignError: () => WebhookSignError,
36
+ WebhookVerificationError: () => WebhookVerificationError,
37
+ verifierLookup: () => verifierLookup
38
+ });
39
+ module.exports = __toCommonJS(common_exports);
40
+ var import_base64Sha1Verifier = __toESM(require("./base64Sha1Verifier.js"), 1);
41
+ var import_base64Sha256Verifier = __toESM(require("./base64Sha256Verifier.js"), 1);
42
+ var import_jwtVerifier = __toESM(require("./jwtVerifier.js"), 1);
43
+ var import_secretKeyVerifier = __toESM(require("./secretKeyVerifier.js"), 1);
44
+ var import_sha1Verifier = __toESM(require("./sha1Verifier.js"), 1);
45
+ var import_sha256Verifier = __toESM(require("./sha256Verifier.js"), 1);
46
+ var import_skipVerifier = __toESM(require("./skipVerifier.js"), 1);
47
+ var import_timestampSchemeVerifier = __toESM(require("./timestampSchemeVerifier.js"), 1);
48
+ const verifierLookup = {
49
+ skipVerifier: import_skipVerifier.default,
50
+ secretKeyVerifier: import_secretKeyVerifier.default,
51
+ sha1Verifier: import_sha1Verifier.default,
52
+ sha256Verifier: import_sha256Verifier.default,
53
+ base64Sha1Verifier: import_base64Sha1Verifier.default,
54
+ base64Sha256Verifier: import_base64Sha256Verifier.default,
55
+ timestampSchemeVerifier: import_timestampSchemeVerifier.default,
56
+ jwtVerifier: import_jwtVerifier.default
57
+ };
58
+ const DEFAULT_WEBHOOK_SECRET = process.env.WEBHOOK_SECRET ?? "";
59
+ const VERIFICATION_ERROR_MESSAGE = "You don't have access to invoke this function.";
60
+ const VERIFICATION_SIGN_MESSAGE = "Unable to sign payload";
61
+ const FIVE_MINUTES = 5 * 6e4;
62
+ const DEFAULT_TOLERANCE = FIVE_MINUTES;
63
+ class WebhookError extends Error {
64
+ /**
65
+ * Create a WebhookError.
66
+ * @param {string} message - The error message
67
+ * */
68
+ constructor(message) {
69
+ super(message);
70
+ }
71
+ }
72
+ class WebhookVerificationError extends WebhookError {
73
+ /**
74
+ * Create a WebhookVerificationError.
75
+ * @param {string} message - The error message
76
+ * */
77
+ constructor(message) {
78
+ super(message || VERIFICATION_ERROR_MESSAGE);
79
+ }
80
+ }
81
+ class WebhookSignError extends WebhookError {
82
+ /**
83
+ * Create a WebhookSignError.
84
+ * @param {string} message - The error message
85
+ * */
86
+ constructor(message) {
87
+ super(message || VERIFICATION_SIGN_MESSAGE);
88
+ }
89
+ }
90
+ // Annotate the CommonJS export names for ESM import in node:
91
+ 0 && (module.exports = {
92
+ DEFAULT_TOLERANCE,
93
+ DEFAULT_WEBHOOK_SECRET,
94
+ VERIFICATION_ERROR_MESSAGE,
95
+ VERIFICATION_SIGN_MESSAGE,
96
+ WebhookSignError,
97
+ WebhookVerificationError,
98
+ verifierLookup
99
+ });