@shware/http 0.2.21 → 0.2.23

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist/index.cjs CHANGED
@@ -21,33 +21,21 @@ var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: tru
21
21
  // src/index.ts
22
22
  var index_exports = {};
23
23
  __export(index_exports, {
24
- AppErrorReason: () => import_reason.AppErrorReason,
25
- AuthenticationErrorReason: () => import_reason.AuthenticationErrorReason,
26
- ErrorReason: () => import_reason.ErrorReason,
27
- ModerationErrorReason: () => import_reason.ModerationErrorReason,
28
- MultipartErrorReason: () => import_reason.MultipartErrorReason,
29
- NetworkErrorReason: () => import_reason.NetworkErrorReason,
30
- StatusErrorReason: () => import_reason.StatusErrorReason,
31
- hasText: () => import_string.hasText
24
+ hasText: () => import_string.hasText,
25
+ verifyStandardWebhook: () => import_webhook.verifyStandardWebhook
32
26
  });
33
27
  module.exports = __toCommonJS(index_exports);
34
- var import_reason = require("./reason.cjs");
35
28
  __reExport(index_exports, require("./detail.cjs"), module.exports);
36
29
  __reExport(index_exports, require("./status.cjs"), module.exports);
37
30
  __reExport(index_exports, require("./vaild.cjs"), module.exports);
38
31
  __reExport(index_exports, require("./snowflake.cjs"), module.exports);
39
32
  __reExport(index_exports, require("./response.cjs"), module.exports);
40
33
  var import_string = require("./utils/string.cjs");
34
+ var import_webhook = require("./webhook.cjs");
41
35
  // Annotate the CommonJS export names for ESM import in node:
42
36
  0 && (module.exports = {
43
- AppErrorReason,
44
- AuthenticationErrorReason,
45
- ErrorReason,
46
- ModerationErrorReason,
47
- MultipartErrorReason,
48
- NetworkErrorReason,
49
- StatusErrorReason,
50
37
  hasText,
38
+ verifyStandardWebhook,
51
39
  ...require("./detail.cjs"),
52
40
  ...require("./status.cjs"),
53
41
  ...require("./vaild.cjs"),
@@ -1 +1 @@
1
- {"version":3,"sources":["../src/index.ts"],"sourcesContent":["/**\n * @example\n * import { Details, Status } from '@repo/error';\n *\n * Status.adapter = () => new Error('Error');\n *\n * const details = Details.new()\n * .requestInfo({ requestId: '1234567890', servingData: '/v1/tests' })\n * .errorInfo({ reason: 'ACCOUNT_LOCKED' });\n *\n * throw Status.alreadyExists('xxx').error(details);\n */\n\nexport {\n NetworkErrorReason,\n StatusErrorReason,\n AuthenticationErrorReason,\n ModerationErrorReason,\n MultipartErrorReason,\n AppErrorReason,\n ErrorReason,\n} from './reason';\n\nexport * from './detail';\nexport * from './status';\nexport * from './vaild';\nexport * from './snowflake';\nexport * from './response';\nexport { hasText } from './utils/string';\n"],"mappings":";;;;;;;;;;;;;;;;;;;;;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAaA,oBAQO;AAEP,0BAAc,yBAvBd;AAwBA,0BAAc,yBAxBd;AAyBA,0BAAc,wBAzBd;AA0BA,0BAAc,4BA1Bd;AA2BA,0BAAc,2BA3Bd;AA4BA,oBAAwB;","names":[]}
1
+ {"version":3,"sources":["../src/index.ts"],"sourcesContent":["/**\n * @example\n * import { Details, Status } from '@repo/error';\n *\n * Status.adapter = () => new Error('Error');\n *\n * const details = Details.new()\n * .requestInfo({ requestId: '1234567890', servingData: '/v1/tests' })\n * .errorInfo({ reason: 'ACCOUNT_LOCKED' });\n *\n * throw Status.alreadyExists('xxx').error(details);\n */\n\nexport type {\n NetworkErrorReason,\n StatusErrorReason,\n AuthenticationErrorReason,\n ModerationErrorReason,\n MultipartErrorReason,\n AppErrorReason,\n ErrorReason,\n} from './reason';\n\nexport * from './detail';\nexport * from './status';\nexport * from './vaild';\nexport * from './snowflake';\nexport * from './response';\nexport { hasText } from './utils/string';\nexport { verifyStandardWebhook } from './webhook';\n"],"mappings":";;;;;;;;;;;;;;;;;;;;;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAuBA,0BAAc,yBAvBd;AAwBA,0BAAc,yBAxBd;AAyBA,0BAAc,wBAzBd;AA0BA,0BAAc,4BA1Bd;AA2BA,0BAAc,2BA3Bd;AA4BA,oBAAwB;AACxB,qBAAsC;","names":[]}
package/dist/index.d.cts CHANGED
@@ -5,4 +5,5 @@ export { Result, valid } from './vaild.cjs';
5
5
  export { UidGenerator, uid } from './snowflake.cjs';
6
6
  export { Cursor, Empty, Entity, EntityId, InitParams, NextParams, PageParams, PagedResponse, ParentPageParams, PrevParams, Response, pageParamsSchema } from './response.cjs';
7
7
  export { hasText } from './utils/string.cjs';
8
+ export { verifyStandardWebhook } from './webhook.cjs';
8
9
  import 'zod';
package/dist/index.d.ts CHANGED
@@ -5,4 +5,5 @@ export { Result, valid } from './vaild.js';
5
5
  export { UidGenerator, uid } from './snowflake.js';
6
6
  export { Cursor, Empty, Entity, EntityId, InitParams, NextParams, PageParams, PagedResponse, ParentPageParams, PrevParams, Response, pageParamsSchema } from './response.js';
7
7
  export { hasText } from './utils/string.js';
8
+ export { verifyStandardWebhook } from './webhook.js';
8
9
  import 'zod';
package/dist/index.mjs CHANGED
@@ -1,27 +1,13 @@
1
1
  // src/index.ts
2
- import {
3
- NetworkErrorReason,
4
- StatusErrorReason,
5
- AuthenticationErrorReason,
6
- ModerationErrorReason,
7
- MultipartErrorReason,
8
- AppErrorReason,
9
- ErrorReason
10
- } from "./reason.mjs";
11
2
  export * from "./detail.mjs";
12
3
  export * from "./status.mjs";
13
4
  export * from "./vaild.mjs";
14
5
  export * from "./snowflake.mjs";
15
6
  export * from "./response.mjs";
16
7
  import { hasText } from "./utils/string.mjs";
8
+ import { verifyStandardWebhook } from "./webhook.mjs";
17
9
  export {
18
- AppErrorReason,
19
- AuthenticationErrorReason,
20
- ErrorReason,
21
- ModerationErrorReason,
22
- MultipartErrorReason,
23
- NetworkErrorReason,
24
- StatusErrorReason,
25
- hasText
10
+ hasText,
11
+ verifyStandardWebhook
26
12
  };
27
13
  //# sourceMappingURL=index.mjs.map
@@ -1 +1 @@
1
- {"version":3,"sources":["../src/index.ts"],"sourcesContent":["/**\n * @example\n * import { Details, Status } from '@repo/error';\n *\n * Status.adapter = () => new Error('Error');\n *\n * const details = Details.new()\n * .requestInfo({ requestId: '1234567890', servingData: '/v1/tests' })\n * .errorInfo({ reason: 'ACCOUNT_LOCKED' });\n *\n * throw Status.alreadyExists('xxx').error(details);\n */\n\nexport {\n NetworkErrorReason,\n StatusErrorReason,\n AuthenticationErrorReason,\n ModerationErrorReason,\n MultipartErrorReason,\n AppErrorReason,\n ErrorReason,\n} from './reason';\n\nexport * from './detail';\nexport * from './status';\nexport * from './vaild';\nexport * from './snowflake';\nexport * from './response';\nexport { hasText } from './utils/string';\n"],"mappings":";AAaA;AAAA,EACE;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,OACK;AAEP,cAAc;AACd,cAAc;AACd,cAAc;AACd,cAAc;AACd,cAAc;AACd,SAAS,eAAe;","names":[]}
1
+ {"version":3,"sources":["../src/index.ts"],"sourcesContent":["/**\n * @example\n * import { Details, Status } from '@repo/error';\n *\n * Status.adapter = () => new Error('Error');\n *\n * const details = Details.new()\n * .requestInfo({ requestId: '1234567890', servingData: '/v1/tests' })\n * .errorInfo({ reason: 'ACCOUNT_LOCKED' });\n *\n * throw Status.alreadyExists('xxx').error(details);\n */\n\nexport type {\n NetworkErrorReason,\n StatusErrorReason,\n AuthenticationErrorReason,\n ModerationErrorReason,\n MultipartErrorReason,\n AppErrorReason,\n ErrorReason,\n} from './reason';\n\nexport * from './detail';\nexport * from './status';\nexport * from './vaild';\nexport * from './snowflake';\nexport * from './response';\nexport { hasText } from './utils/string';\nexport { verifyStandardWebhook } from './webhook';\n"],"mappings":";AAuBA,cAAc;AACd,cAAc;AACd,cAAc;AACd,cAAc;AACd,cAAc;AACd,SAAS,eAAe;AACxB,SAAS,6BAA6B;","names":[]}
@@ -0,0 +1,77 @@
1
+ "use strict";
2
+ var __defProp = Object.defineProperty;
3
+ var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
4
+ var __getOwnPropNames = Object.getOwnPropertyNames;
5
+ var __hasOwnProp = Object.prototype.hasOwnProperty;
6
+ var __export = (target, all) => {
7
+ for (var name in all)
8
+ __defProp(target, name, { get: all[name], enumerable: true });
9
+ };
10
+ var __copyProps = (to, from, except, desc) => {
11
+ if (from && typeof from === "object" || typeof from === "function") {
12
+ for (let key of __getOwnPropNames(from))
13
+ if (!__hasOwnProp.call(to, key) && key !== except)
14
+ __defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });
15
+ }
16
+ return to;
17
+ };
18
+ var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
19
+
20
+ // src/webhook.ts
21
+ var webhook_exports = {};
22
+ __export(webhook_exports, {
23
+ verifyStandardWebhook: () => verifyStandardWebhook
24
+ });
25
+ module.exports = __toCommonJS(webhook_exports);
26
+ var import_crypto = require("crypto");
27
+ var import_status = require("./status.cjs");
28
+ var WEBHOOK_TOLERANCE_IN_SECONDS = 5 * 60;
29
+ function verifyTimestamp(webhookTimestamp) {
30
+ const now = Math.floor(Date.now() / 1e3);
31
+ const timestamp = parseInt(webhookTimestamp, 10);
32
+ if (isNaN(timestamp)) {
33
+ throw import_status.Status.invalidArgument("invalid webhook timestamp").error();
34
+ }
35
+ if (timestamp < now - WEBHOOK_TOLERANCE_IN_SECONDS) {
36
+ throw import_status.Status.invalidArgument("webhook timestamp is too old").error();
37
+ }
38
+ if (timestamp > now + WEBHOOK_TOLERANCE_IN_SECONDS) {
39
+ throw import_status.Status.invalidArgument("webhook timestamp is too new").error();
40
+ }
41
+ return timestamp;
42
+ }
43
+ async function verifyStandardWebhook(headers, payload, secret) {
44
+ const webhookId = headers["webhook-id"];
45
+ const webhookTimestamp = headers["webhook-timestamp"];
46
+ const webhookSignature = headers["webhook-signature"];
47
+ if (!webhookId || !webhookTimestamp || !webhookSignature) {
48
+ throw import_status.Status.invalidArgument("invalid webhook").error();
49
+ }
50
+ const timestamp = verifyTimestamp(webhookTimestamp);
51
+ const encoder = new TextEncoder();
52
+ const toSign = encoder.encode(`${webhookId}.${timestamp}.${payload}`);
53
+ const hmac = (0, import_crypto.createHmac)("sha256", Buffer.from(secret, "base64"));
54
+ const digest = hmac.update(toSign).digest();
55
+ const computedSignature = `v1,${Buffer.from(digest).toString("base64")}`;
56
+ const expectedSignature = computedSignature.split(",")[1];
57
+ const passedSignatures = webhookSignature.split(" ");
58
+ for (const versionedSignature of passedSignatures) {
59
+ const [version, signature] = versionedSignature.split(",");
60
+ if (version !== "v1") continue;
61
+ if ((0, import_crypto.timingSafeEqual)(encoder.encode(signature), encoder.encode(expectedSignature))) {
62
+ try {
63
+ return JSON.parse(payload);
64
+ } catch (_) {
65
+ console.error("invalid payload", payload);
66
+ throw import_status.Status.invalidArgument("invalid webhook payload").error();
67
+ }
68
+ }
69
+ }
70
+ console.error("webhook verification failed");
71
+ throw import_status.Status.invalidArgument("invalid webhook signature").error();
72
+ }
73
+ // Annotate the CommonJS export names for ESM import in node:
74
+ 0 && (module.exports = {
75
+ verifyStandardWebhook
76
+ });
77
+ //# sourceMappingURL=webhook.cjs.map
@@ -0,0 +1 @@
1
+ {"version":3,"sources":["../src/webhook.ts"],"sourcesContent":["import { createHmac, timingSafeEqual } from 'crypto';\nimport { Status } from './status';\n\nconst WEBHOOK_TOLERANCE_IN_SECONDS = 5 * 60; // 5 minutes\n\nfunction verifyTimestamp(webhookTimestamp: string) {\n const now = Math.floor(Date.now() / 1000);\n const timestamp = parseInt(webhookTimestamp, 10);\n if (isNaN(timestamp)) {\n throw Status.invalidArgument('invalid webhook timestamp').error();\n }\n if (timestamp < now - WEBHOOK_TOLERANCE_IN_SECONDS) {\n throw Status.invalidArgument('webhook timestamp is too old').error();\n }\n if (timestamp > now + WEBHOOK_TOLERANCE_IN_SECONDS) {\n throw Status.invalidArgument('webhook timestamp is too new').error();\n }\n return timestamp;\n}\n\n/**\n * reference: https://github.com/standard-webhooks/standard-webhooks/tree/main/libraries/javascript\n * hono usage:\n * ```ts\n * const webhook = await verifyStandardWebhook(c.req.header(), await c.req.text(), 'secret');\n * ```\n */\nexport async function verifyStandardWebhook(\n headers: Record<string, string>,\n payload: string,\n secret: string\n) {\n const webhookId = headers['webhook-id'];\n const webhookTimestamp = headers['webhook-timestamp'];\n const webhookSignature = headers['webhook-signature'];\n if (!webhookId || !webhookTimestamp || !webhookSignature) {\n throw Status.invalidArgument('invalid webhook').error();\n }\n const timestamp = verifyTimestamp(webhookTimestamp);\n\n const encoder = new TextEncoder();\n const toSign = encoder.encode(`${webhookId}.${timestamp}.${payload}`);\n const hmac = createHmac('sha256', Buffer.from(secret, 'base64'));\n const digest = hmac.update(toSign).digest();\n\n const computedSignature = `v1,${Buffer.from(digest).toString('base64')}`;\n const expectedSignature = computedSignature.split(',')[1];\n const passedSignatures = webhookSignature.split(' ');\n\n for (const versionedSignature of passedSignatures) {\n const [version, signature] = versionedSignature.split(',');\n if (version !== 'v1') continue;\n if (timingSafeEqual(encoder.encode(signature), encoder.encode(expectedSignature))) {\n try {\n return JSON.parse(payload);\n } catch (_) {\n console.error('invalid payload', payload);\n throw Status.invalidArgument('invalid webhook payload').error();\n }\n }\n }\n console.error('webhook verification failed');\n throw Status.invalidArgument('invalid webhook signature').error();\n}\n"],"mappings":";;;;;;;;;;;;;;;;;;;;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,oBAA4C;AAC5C,oBAAuB;AAEvB,IAAM,+BAA+B,IAAI;AAEzC,SAAS,gBAAgB,kBAA0B;AACjD,QAAM,MAAM,KAAK,MAAM,KAAK,IAAI,IAAI,GAAI;AACxC,QAAM,YAAY,SAAS,kBAAkB,EAAE;AAC/C,MAAI,MAAM,SAAS,GAAG;AACpB,UAAM,qBAAO,gBAAgB,2BAA2B,EAAE,MAAM;AAAA,EAClE;AACA,MAAI,YAAY,MAAM,8BAA8B;AAClD,UAAM,qBAAO,gBAAgB,8BAA8B,EAAE,MAAM;AAAA,EACrE;AACA,MAAI,YAAY,MAAM,8BAA8B;AAClD,UAAM,qBAAO,gBAAgB,8BAA8B,EAAE,MAAM;AAAA,EACrE;AACA,SAAO;AACT;AASA,eAAsB,sBACpB,SACA,SACA,QACA;AACA,QAAM,YAAY,QAAQ,YAAY;AACtC,QAAM,mBAAmB,QAAQ,mBAAmB;AACpD,QAAM,mBAAmB,QAAQ,mBAAmB;AACpD,MAAI,CAAC,aAAa,CAAC,oBAAoB,CAAC,kBAAkB;AACxD,UAAM,qBAAO,gBAAgB,iBAAiB,EAAE,MAAM;AAAA,EACxD;AACA,QAAM,YAAY,gBAAgB,gBAAgB;AAElD,QAAM,UAAU,IAAI,YAAY;AAChC,QAAM,SAAS,QAAQ,OAAO,GAAG,SAAS,IAAI,SAAS,IAAI,OAAO,EAAE;AACpE,QAAM,WAAO,0BAAW,UAAU,OAAO,KAAK,QAAQ,QAAQ,CAAC;AAC/D,QAAM,SAAS,KAAK,OAAO,MAAM,EAAE,OAAO;AAE1C,QAAM,oBAAoB,MAAM,OAAO,KAAK,MAAM,EAAE,SAAS,QAAQ,CAAC;AACtE,QAAM,oBAAoB,kBAAkB,MAAM,GAAG,EAAE,CAAC;AACxD,QAAM,mBAAmB,iBAAiB,MAAM,GAAG;AAEnD,aAAW,sBAAsB,kBAAkB;AACjD,UAAM,CAAC,SAAS,SAAS,IAAI,mBAAmB,MAAM,GAAG;AACzD,QAAI,YAAY,KAAM;AACtB,YAAI,+BAAgB,QAAQ,OAAO,SAAS,GAAG,QAAQ,OAAO,iBAAiB,CAAC,GAAG;AACjF,UAAI;AACF,eAAO,KAAK,MAAM,OAAO;AAAA,MAC3B,SAAS,GAAG;AACV,gBAAQ,MAAM,mBAAmB,OAAO;AACxC,cAAM,qBAAO,gBAAgB,yBAAyB,EAAE,MAAM;AAAA,MAChE;AAAA,IACF;AAAA,EACF;AACA,UAAQ,MAAM,6BAA6B;AAC3C,QAAM,qBAAO,gBAAgB,2BAA2B,EAAE,MAAM;AAClE;","names":[]}
@@ -0,0 +1,10 @@
1
+ /**
2
+ * reference: https://github.com/standard-webhooks/standard-webhooks/tree/main/libraries/javascript
3
+ * hono usage:
4
+ * ```ts
5
+ * const webhook = await verifyStandardWebhook(c.req.header(), await c.req.text(), 'secret');
6
+ * ```
7
+ */
8
+ declare function verifyStandardWebhook(headers: Record<string, string>, payload: string, secret: string): Promise<any>;
9
+
10
+ export { verifyStandardWebhook };
@@ -0,0 +1,10 @@
1
+ /**
2
+ * reference: https://github.com/standard-webhooks/standard-webhooks/tree/main/libraries/javascript
3
+ * hono usage:
4
+ * ```ts
5
+ * const webhook = await verifyStandardWebhook(c.req.header(), await c.req.text(), 'secret');
6
+ * ```
7
+ */
8
+ declare function verifyStandardWebhook(headers: Record<string, string>, payload: string, secret: string): Promise<any>;
9
+
10
+ export { verifyStandardWebhook };
@@ -0,0 +1,52 @@
1
+ // src/webhook.ts
2
+ import { createHmac, timingSafeEqual } from "crypto";
3
+ import { Status } from "./status.mjs";
4
+ var WEBHOOK_TOLERANCE_IN_SECONDS = 5 * 60;
5
+ function verifyTimestamp(webhookTimestamp) {
6
+ const now = Math.floor(Date.now() / 1e3);
7
+ const timestamp = parseInt(webhookTimestamp, 10);
8
+ if (isNaN(timestamp)) {
9
+ throw Status.invalidArgument("invalid webhook timestamp").error();
10
+ }
11
+ if (timestamp < now - WEBHOOK_TOLERANCE_IN_SECONDS) {
12
+ throw Status.invalidArgument("webhook timestamp is too old").error();
13
+ }
14
+ if (timestamp > now + WEBHOOK_TOLERANCE_IN_SECONDS) {
15
+ throw Status.invalidArgument("webhook timestamp is too new").error();
16
+ }
17
+ return timestamp;
18
+ }
19
+ async function verifyStandardWebhook(headers, payload, secret) {
20
+ const webhookId = headers["webhook-id"];
21
+ const webhookTimestamp = headers["webhook-timestamp"];
22
+ const webhookSignature = headers["webhook-signature"];
23
+ if (!webhookId || !webhookTimestamp || !webhookSignature) {
24
+ throw Status.invalidArgument("invalid webhook").error();
25
+ }
26
+ const timestamp = verifyTimestamp(webhookTimestamp);
27
+ const encoder = new TextEncoder();
28
+ const toSign = encoder.encode(`${webhookId}.${timestamp}.${payload}`);
29
+ const hmac = createHmac("sha256", Buffer.from(secret, "base64"));
30
+ const digest = hmac.update(toSign).digest();
31
+ const computedSignature = `v1,${Buffer.from(digest).toString("base64")}`;
32
+ const expectedSignature = computedSignature.split(",")[1];
33
+ const passedSignatures = webhookSignature.split(" ");
34
+ for (const versionedSignature of passedSignatures) {
35
+ const [version, signature] = versionedSignature.split(",");
36
+ if (version !== "v1") continue;
37
+ if (timingSafeEqual(encoder.encode(signature), encoder.encode(expectedSignature))) {
38
+ try {
39
+ return JSON.parse(payload);
40
+ } catch (_) {
41
+ console.error("invalid payload", payload);
42
+ throw Status.invalidArgument("invalid webhook payload").error();
43
+ }
44
+ }
45
+ }
46
+ console.error("webhook verification failed");
47
+ throw Status.invalidArgument("invalid webhook signature").error();
48
+ }
49
+ export {
50
+ verifyStandardWebhook
51
+ };
52
+ //# sourceMappingURL=webhook.mjs.map
@@ -0,0 +1 @@
1
+ {"version":3,"sources":["../src/webhook.ts"],"sourcesContent":["import { createHmac, timingSafeEqual } from 'crypto';\nimport { Status } from './status';\n\nconst WEBHOOK_TOLERANCE_IN_SECONDS = 5 * 60; // 5 minutes\n\nfunction verifyTimestamp(webhookTimestamp: string) {\n const now = Math.floor(Date.now() / 1000);\n const timestamp = parseInt(webhookTimestamp, 10);\n if (isNaN(timestamp)) {\n throw Status.invalidArgument('invalid webhook timestamp').error();\n }\n if (timestamp < now - WEBHOOK_TOLERANCE_IN_SECONDS) {\n throw Status.invalidArgument('webhook timestamp is too old').error();\n }\n if (timestamp > now + WEBHOOK_TOLERANCE_IN_SECONDS) {\n throw Status.invalidArgument('webhook timestamp is too new').error();\n }\n return timestamp;\n}\n\n/**\n * reference: https://github.com/standard-webhooks/standard-webhooks/tree/main/libraries/javascript\n * hono usage:\n * ```ts\n * const webhook = await verifyStandardWebhook(c.req.header(), await c.req.text(), 'secret');\n * ```\n */\nexport async function verifyStandardWebhook(\n headers: Record<string, string>,\n payload: string,\n secret: string\n) {\n const webhookId = headers['webhook-id'];\n const webhookTimestamp = headers['webhook-timestamp'];\n const webhookSignature = headers['webhook-signature'];\n if (!webhookId || !webhookTimestamp || !webhookSignature) {\n throw Status.invalidArgument('invalid webhook').error();\n }\n const timestamp = verifyTimestamp(webhookTimestamp);\n\n const encoder = new TextEncoder();\n const toSign = encoder.encode(`${webhookId}.${timestamp}.${payload}`);\n const hmac = createHmac('sha256', Buffer.from(secret, 'base64'));\n const digest = hmac.update(toSign).digest();\n\n const computedSignature = `v1,${Buffer.from(digest).toString('base64')}`;\n const expectedSignature = computedSignature.split(',')[1];\n const passedSignatures = webhookSignature.split(' ');\n\n for (const versionedSignature of passedSignatures) {\n const [version, signature] = versionedSignature.split(',');\n if (version !== 'v1') continue;\n if (timingSafeEqual(encoder.encode(signature), encoder.encode(expectedSignature))) {\n try {\n return JSON.parse(payload);\n } catch (_) {\n console.error('invalid payload', payload);\n throw Status.invalidArgument('invalid webhook payload').error();\n }\n }\n }\n console.error('webhook verification failed');\n throw Status.invalidArgument('invalid webhook signature').error();\n}\n"],"mappings":";AAAA,SAAS,YAAY,uBAAuB;AAC5C,SAAS,cAAc;AAEvB,IAAM,+BAA+B,IAAI;AAEzC,SAAS,gBAAgB,kBAA0B;AACjD,QAAM,MAAM,KAAK,MAAM,KAAK,IAAI,IAAI,GAAI;AACxC,QAAM,YAAY,SAAS,kBAAkB,EAAE;AAC/C,MAAI,MAAM,SAAS,GAAG;AACpB,UAAM,OAAO,gBAAgB,2BAA2B,EAAE,MAAM;AAAA,EAClE;AACA,MAAI,YAAY,MAAM,8BAA8B;AAClD,UAAM,OAAO,gBAAgB,8BAA8B,EAAE,MAAM;AAAA,EACrE;AACA,MAAI,YAAY,MAAM,8BAA8B;AAClD,UAAM,OAAO,gBAAgB,8BAA8B,EAAE,MAAM;AAAA,EACrE;AACA,SAAO;AACT;AASA,eAAsB,sBACpB,SACA,SACA,QACA;AACA,QAAM,YAAY,QAAQ,YAAY;AACtC,QAAM,mBAAmB,QAAQ,mBAAmB;AACpD,QAAM,mBAAmB,QAAQ,mBAAmB;AACpD,MAAI,CAAC,aAAa,CAAC,oBAAoB,CAAC,kBAAkB;AACxD,UAAM,OAAO,gBAAgB,iBAAiB,EAAE,MAAM;AAAA,EACxD;AACA,QAAM,YAAY,gBAAgB,gBAAgB;AAElD,QAAM,UAAU,IAAI,YAAY;AAChC,QAAM,SAAS,QAAQ,OAAO,GAAG,SAAS,IAAI,SAAS,IAAI,OAAO,EAAE;AACpE,QAAM,OAAO,WAAW,UAAU,OAAO,KAAK,QAAQ,QAAQ,CAAC;AAC/D,QAAM,SAAS,KAAK,OAAO,MAAM,EAAE,OAAO;AAE1C,QAAM,oBAAoB,MAAM,OAAO,KAAK,MAAM,EAAE,SAAS,QAAQ,CAAC;AACtE,QAAM,oBAAoB,kBAAkB,MAAM,GAAG,EAAE,CAAC;AACxD,QAAM,mBAAmB,iBAAiB,MAAM,GAAG;AAEnD,aAAW,sBAAsB,kBAAkB;AACjD,UAAM,CAAC,SAAS,SAAS,IAAI,mBAAmB,MAAM,GAAG;AACzD,QAAI,YAAY,KAAM;AACtB,QAAI,gBAAgB,QAAQ,OAAO,SAAS,GAAG,QAAQ,OAAO,iBAAiB,CAAC,GAAG;AACjF,UAAI;AACF,eAAO,KAAK,MAAM,OAAO;AAAA,MAC3B,SAAS,GAAG;AACV,gBAAQ,MAAM,mBAAmB,OAAO;AACxC,cAAM,OAAO,gBAAgB,yBAAyB,EAAE,MAAM;AAAA,MAChE;AAAA,IACF;AAAA,EACF;AACA,UAAQ,MAAM,6BAA6B;AAC3C,QAAM,OAAO,gBAAgB,2BAA2B,EAAE,MAAM;AAClE;","names":[]}
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@shware/http",
3
- "version": "0.2.21",
3
+ "version": "0.2.23",
4
4
  "private": false,
5
5
  "type": "module",
6
6
  "scripts": {
@@ -30,16 +30,16 @@
30
30
  ],
31
31
  "devDependencies": {
32
32
  "@types/jest": "^29.5.14",
33
- "@types/node": "^22.13.13",
33
+ "@types/node": "^22.15.18",
34
34
  "jest": "^29.7.0",
35
- "ts-jest": "^29.3.0",
36
- "typescript": "^5.8.2"
35
+ "ts-jest": "^29.3.4",
36
+ "typescript": "^5.8.3"
37
37
  },
38
38
  "dependencies": {
39
- "zod": "^3.24.2"
39
+ "zod": "^3.24.4"
40
40
  },
41
41
  "peerDependencies": {
42
- "hono": "^4.7.5"
42
+ "hono": "^4.7.9"
43
43
  },
44
44
  "peerDependenciesMeta": {
45
45
  "hono": {