@whatalo/plugin-sdk 1.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/adapters/express.cjs +87 -0
- package/dist/adapters/express.cjs.map +1 -0
- package/dist/adapters/express.d.cts +17 -0
- package/dist/adapters/express.d.ts +17 -0
- package/dist/adapters/express.mjs +60 -0
- package/dist/adapters/express.mjs.map +1 -0
- package/dist/adapters/hono.cjs +79 -0
- package/dist/adapters/hono.cjs.map +1 -0
- package/dist/adapters/hono.d.cts +15 -0
- package/dist/adapters/hono.d.ts +15 -0
- package/dist/adapters/hono.mjs +52 -0
- package/dist/adapters/hono.mjs.map +1 -0
- package/dist/adapters/nextjs.cjs +79 -0
- package/dist/adapters/nextjs.cjs.map +1 -0
- package/dist/adapters/nextjs.d.cts +7 -0
- package/dist/adapters/nextjs.d.ts +7 -0
- package/dist/adapters/nextjs.mjs +52 -0
- package/dist/adapters/nextjs.mjs.map +1 -0
- package/dist/bridge/index.cjs +290 -0
- package/dist/bridge/index.cjs.map +1 -0
- package/dist/bridge/index.d.cts +236 -0
- package/dist/bridge/index.d.ts +236 -0
- package/dist/bridge/index.mjs +260 -0
- package/dist/bridge/index.mjs.map +1 -0
- package/dist/client/index.cjs +423 -0
- package/dist/client/index.cjs.map +1 -0
- package/dist/client/index.d.cts +131 -0
- package/dist/client/index.d.ts +131 -0
- package/dist/client/index.mjs +396 -0
- package/dist/client/index.mjs.map +1 -0
- package/dist/index.cjs +843 -0
- package/dist/index.cjs.map +1 -0
- package/dist/index.d.cts +57 -0
- package/dist/index.d.ts +57 -0
- package/dist/index.mjs +801 -0
- package/dist/index.mjs.map +1 -0
- package/dist/manifest/index.cjs +145 -0
- package/dist/manifest/index.cjs.map +1 -0
- package/dist/manifest/index.d.cts +78 -0
- package/dist/manifest/index.d.ts +78 -0
- package/dist/manifest/index.mjs +117 -0
- package/dist/manifest/index.mjs.map +1 -0
- package/dist/types-D2Efg3EG.d.ts +19 -0
- package/dist/types-DZ659i6f.d.ts +68 -0
- package/dist/types-Db_BeRCj.d.cts +19 -0
- package/dist/types-DdqKKyqX.d.cts +68 -0
- package/dist/types-M1eLMz6w.d.cts +279 -0
- package/dist/types-M1eLMz6w.d.ts +279 -0
- package/dist/webhooks/index.cjs +50 -0
- package/dist/webhooks/index.cjs.map +1 -0
- package/dist/webhooks/index.d.cts +18 -0
- package/dist/webhooks/index.d.ts +18 -0
- package/dist/webhooks/index.mjs +23 -0
- package/dist/webhooks/index.mjs.map +1 -0
- package/package.json +94 -0
|
@@ -0,0 +1,87 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __defProp = Object.defineProperty;
|
|
3
|
+
var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
|
|
4
|
+
var __getOwnPropNames = Object.getOwnPropertyNames;
|
|
5
|
+
var __hasOwnProp = Object.prototype.hasOwnProperty;
|
|
6
|
+
var __export = (target, all) => {
|
|
7
|
+
for (var name in all)
|
|
8
|
+
__defProp(target, name, { get: all[name], enumerable: true });
|
|
9
|
+
};
|
|
10
|
+
var __copyProps = (to, from, except, desc) => {
|
|
11
|
+
if (from && typeof from === "object" || typeof from === "function") {
|
|
12
|
+
for (let key of __getOwnPropNames(from))
|
|
13
|
+
if (!__hasOwnProp.call(to, key) && key !== except)
|
|
14
|
+
__defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });
|
|
15
|
+
}
|
|
16
|
+
return to;
|
|
17
|
+
};
|
|
18
|
+
var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
|
|
19
|
+
|
|
20
|
+
// src/adapters/express.ts
|
|
21
|
+
var express_exports = {};
|
|
22
|
+
__export(express_exports, {
|
|
23
|
+
createWebhookHandler: () => createWebhookHandler
|
|
24
|
+
});
|
|
25
|
+
module.exports = __toCommonJS(express_exports);
|
|
26
|
+
|
|
27
|
+
// src/webhooks/verify.ts
|
|
28
|
+
var import_node_crypto = require("crypto");
|
|
29
|
+
function verifyWebhook({
|
|
30
|
+
payload,
|
|
31
|
+
signature,
|
|
32
|
+
secret
|
|
33
|
+
}) {
|
|
34
|
+
if (!payload || !signature || !secret) return false;
|
|
35
|
+
const expected = (0, import_node_crypto.createHmac)("sha256", secret).update(payload, "utf8").digest("hex");
|
|
36
|
+
if (expected.length !== signature.length) return false;
|
|
37
|
+
try {
|
|
38
|
+
return (0, import_node_crypto.timingSafeEqual)(
|
|
39
|
+
Buffer.from(expected, "hex"),
|
|
40
|
+
Buffer.from(signature, "hex")
|
|
41
|
+
);
|
|
42
|
+
} catch {
|
|
43
|
+
return false;
|
|
44
|
+
}
|
|
45
|
+
}
|
|
46
|
+
|
|
47
|
+
// src/adapters/express.ts
|
|
48
|
+
function getSignature(headers) {
|
|
49
|
+
const value = headers["x-webhook-signature"];
|
|
50
|
+
if (Array.isArray(value)) {
|
|
51
|
+
return value[0] ?? "";
|
|
52
|
+
}
|
|
53
|
+
return value ?? "";
|
|
54
|
+
}
|
|
55
|
+
function createWebhookHandler(options) {
|
|
56
|
+
return async function webhookHandler(req, res) {
|
|
57
|
+
try {
|
|
58
|
+
const rawPayload = typeof req.body === "string" ? req.body : req.body.toString("utf8");
|
|
59
|
+
const signature = getSignature(req.headers);
|
|
60
|
+
const isValid = verifyWebhook({
|
|
61
|
+
payload: rawPayload,
|
|
62
|
+
signature,
|
|
63
|
+
secret: options.secret
|
|
64
|
+
});
|
|
65
|
+
if (!isValid) {
|
|
66
|
+
res.status(401).json({ error: "Invalid signature" });
|
|
67
|
+
return;
|
|
68
|
+
}
|
|
69
|
+
const payload = JSON.parse(rawPayload);
|
|
70
|
+
const event = payload.event;
|
|
71
|
+
const handler = options.handlers[event];
|
|
72
|
+
if (handler) {
|
|
73
|
+
await handler(payload);
|
|
74
|
+
} else if (options.onUnhandledEvent) {
|
|
75
|
+
await options.onUnhandledEvent(event, payload);
|
|
76
|
+
}
|
|
77
|
+
res.status(200).send("OK");
|
|
78
|
+
} catch {
|
|
79
|
+
res.status(500).json({ error: "Internal error" });
|
|
80
|
+
}
|
|
81
|
+
};
|
|
82
|
+
}
|
|
83
|
+
// Annotate the CommonJS export names for ESM import in node:
|
|
84
|
+
0 && (module.exports = {
|
|
85
|
+
createWebhookHandler
|
|
86
|
+
});
|
|
87
|
+
//# sourceMappingURL=express.cjs.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../../src/adapters/express.ts","../../src/webhooks/verify.ts"],"sourcesContent":["import { verifyWebhook } from \"../webhooks/verify.js\";\nimport type { WebhookPayload } from \"../webhooks/types.js\";\nimport type { WebhookEventHandler, WebhookHandlerOptions } from \"./types.js\";\n\ntype ExpressLikeRequest = {\n body: Buffer | string;\n headers: Record<string, string | string[] | undefined>;\n};\n\ntype ExpressLikeResponse = {\n status: (code: number) => {\n json: (body: unknown) => void;\n send: (body: string) => void;\n };\n};\n\nfunction getSignature(\n headers: Record<string, string | string[] | undefined>\n): string {\n const value = headers[\"x-webhook-signature\"];\n\n if (Array.isArray(value)) {\n return value[0] ?? \"\";\n }\n\n return value ?? \"\";\n}\n\nexport function createWebhookHandler(\n options: WebhookHandlerOptions\n): (req: ExpressLikeRequest, res: ExpressLikeResponse) => Promise<void> {\n return async function webhookHandler(\n req: ExpressLikeRequest,\n res: ExpressLikeResponse\n ): Promise<void> {\n try {\n const rawPayload =\n typeof req.body === \"string\" ? req.body : req.body.toString(\"utf8\");\n const signature = getSignature(req.headers);\n\n const isValid = verifyWebhook({\n payload: rawPayload,\n signature,\n secret: options.secret,\n });\n\n if (!isValid) {\n res.status(401).json({ error: \"Invalid signature\" });\n return;\n }\n\n const payload = JSON.parse(rawPayload) as WebhookPayload;\n const event = payload.event;\n const handler = options.handlers[event] as\n | WebhookEventHandler<typeof event>\n | undefined;\n\n if (handler) {\n await handler(payload);\n } else if (options.onUnhandledEvent) {\n await options.onUnhandledEvent(event, payload);\n }\n\n res.status(200).send(\"OK\");\n } catch {\n res.status(500).json({ error: \"Internal error\" });\n }\n };\n}\n","import { createHmac, timingSafeEqual } from \"node:crypto\";\n\nexport interface VerifyWebhookParams {\n /** Raw request body as a string (NOT parsed JSON) */\n payload: string;\n /** Value of the X-Webhook-Signature header */\n signature: string;\n /** App's webhook secret (provided during app installation) */\n secret: string;\n}\n\n/**\n * Verify webhook signature using HMAC-SHA256.\n * Uses timing-safe comparison to prevent timing attacks.\n */\nexport function verifyWebhook({\n payload,\n signature,\n secret,\n}: VerifyWebhookParams): boolean {\n if (!payload || !signature || !secret) return false;\n\n const expected = createHmac(\"sha256\", secret)\n .update(payload, \"utf8\")\n .digest(\"hex\");\n\n if (expected.length !== signature.length) return false;\n\n try {\n return timingSafeEqual(\n Buffer.from(expected, \"hex\"),\n Buffer.from(signature, \"hex\")\n );\n } catch {\n return false;\n }\n}\n"],"mappings":";;;;;;;;;;;;;;;;;;;;AAAA;AAAA;AAAA;AAAA;AAAA;;;ACAA,yBAA4C;AAerC,SAAS,cAAc;AAAA,EAC5B;AAAA,EACA;AAAA,EACA;AACF,GAAiC;AAC/B,MAAI,CAAC,WAAW,CAAC,aAAa,CAAC,OAAQ,QAAO;AAE9C,QAAM,eAAW,+BAAW,UAAU,MAAM,EACzC,OAAO,SAAS,MAAM,EACtB,OAAO,KAAK;AAEf,MAAI,SAAS,WAAW,UAAU,OAAQ,QAAO;AAEjD,MAAI;AACF,eAAO;AAAA,MACL,OAAO,KAAK,UAAU,KAAK;AAAA,MAC3B,OAAO,KAAK,WAAW,KAAK;AAAA,IAC9B;AAAA,EACF,QAAQ;AACN,WAAO;AAAA,EACT;AACF;;;ADpBA,SAAS,aACP,SACQ;AACR,QAAM,QAAQ,QAAQ,qBAAqB;AAE3C,MAAI,MAAM,QAAQ,KAAK,GAAG;AACxB,WAAO,MAAM,CAAC,KAAK;AAAA,EACrB;AAEA,SAAO,SAAS;AAClB;AAEO,SAAS,qBACd,SACsE;AACtE,SAAO,eAAe,eACpB,KACA,KACe;AACf,QAAI;AACF,YAAM,aACJ,OAAO,IAAI,SAAS,WAAW,IAAI,OAAO,IAAI,KAAK,SAAS,MAAM;AACpE,YAAM,YAAY,aAAa,IAAI,OAAO;AAE1C,YAAM,UAAU,cAAc;AAAA,QAC5B,SAAS;AAAA,QACT;AAAA,QACA,QAAQ,QAAQ;AAAA,MAClB,CAAC;AAED,UAAI,CAAC,SAAS;AACZ,YAAI,OAAO,GAAG,EAAE,KAAK,EAAE,OAAO,oBAAoB,CAAC;AACnD;AAAA,MACF;AAEA,YAAM,UAAU,KAAK,MAAM,UAAU;AACrC,YAAM,QAAQ,QAAQ;AACtB,YAAM,UAAU,QAAQ,SAAS,KAAK;AAItC,UAAI,SAAS;AACX,cAAM,QAAQ,OAAO;AAAA,MACvB,WAAW,QAAQ,kBAAkB;AACnC,cAAM,QAAQ,iBAAiB,OAAO,OAAO;AAAA,MAC/C;AAEA,UAAI,OAAO,GAAG,EAAE,KAAK,IAAI;AAAA,IAC3B,QAAQ;AACN,UAAI,OAAO,GAAG,EAAE,KAAK,EAAE,OAAO,iBAAiB,CAAC;AAAA,IAClD;AAAA,EACF;AACF;","names":[]}
|
|
@@ -0,0 +1,17 @@
|
|
|
1
|
+
import { W as WebhookHandlerOptions } from '../types-Db_BeRCj.cjs';
|
|
2
|
+
import '../types-DdqKKyqX.cjs';
|
|
3
|
+
import '../types-M1eLMz6w.cjs';
|
|
4
|
+
|
|
5
|
+
type ExpressLikeRequest = {
|
|
6
|
+
body: Buffer | string;
|
|
7
|
+
headers: Record<string, string | string[] | undefined>;
|
|
8
|
+
};
|
|
9
|
+
type ExpressLikeResponse = {
|
|
10
|
+
status: (code: number) => {
|
|
11
|
+
json: (body: unknown) => void;
|
|
12
|
+
send: (body: string) => void;
|
|
13
|
+
};
|
|
14
|
+
};
|
|
15
|
+
declare function createWebhookHandler(options: WebhookHandlerOptions): (req: ExpressLikeRequest, res: ExpressLikeResponse) => Promise<void>;
|
|
16
|
+
|
|
17
|
+
export { createWebhookHandler };
|
|
@@ -0,0 +1,17 @@
|
|
|
1
|
+
import { W as WebhookHandlerOptions } from '../types-D2Efg3EG.js';
|
|
2
|
+
import '../types-DZ659i6f.js';
|
|
3
|
+
import '../types-M1eLMz6w.js';
|
|
4
|
+
|
|
5
|
+
type ExpressLikeRequest = {
|
|
6
|
+
body: Buffer | string;
|
|
7
|
+
headers: Record<string, string | string[] | undefined>;
|
|
8
|
+
};
|
|
9
|
+
type ExpressLikeResponse = {
|
|
10
|
+
status: (code: number) => {
|
|
11
|
+
json: (body: unknown) => void;
|
|
12
|
+
send: (body: string) => void;
|
|
13
|
+
};
|
|
14
|
+
};
|
|
15
|
+
declare function createWebhookHandler(options: WebhookHandlerOptions): (req: ExpressLikeRequest, res: ExpressLikeResponse) => Promise<void>;
|
|
16
|
+
|
|
17
|
+
export { createWebhookHandler };
|
|
@@ -0,0 +1,60 @@
|
|
|
1
|
+
// src/webhooks/verify.ts
|
|
2
|
+
import { createHmac, timingSafeEqual } from "crypto";
|
|
3
|
+
function verifyWebhook({
|
|
4
|
+
payload,
|
|
5
|
+
signature,
|
|
6
|
+
secret
|
|
7
|
+
}) {
|
|
8
|
+
if (!payload || !signature || !secret) return false;
|
|
9
|
+
const expected = createHmac("sha256", secret).update(payload, "utf8").digest("hex");
|
|
10
|
+
if (expected.length !== signature.length) return false;
|
|
11
|
+
try {
|
|
12
|
+
return timingSafeEqual(
|
|
13
|
+
Buffer.from(expected, "hex"),
|
|
14
|
+
Buffer.from(signature, "hex")
|
|
15
|
+
);
|
|
16
|
+
} catch {
|
|
17
|
+
return false;
|
|
18
|
+
}
|
|
19
|
+
}
|
|
20
|
+
|
|
21
|
+
// src/adapters/express.ts
|
|
22
|
+
function getSignature(headers) {
|
|
23
|
+
const value = headers["x-webhook-signature"];
|
|
24
|
+
if (Array.isArray(value)) {
|
|
25
|
+
return value[0] ?? "";
|
|
26
|
+
}
|
|
27
|
+
return value ?? "";
|
|
28
|
+
}
|
|
29
|
+
function createWebhookHandler(options) {
|
|
30
|
+
return async function webhookHandler(req, res) {
|
|
31
|
+
try {
|
|
32
|
+
const rawPayload = typeof req.body === "string" ? req.body : req.body.toString("utf8");
|
|
33
|
+
const signature = getSignature(req.headers);
|
|
34
|
+
const isValid = verifyWebhook({
|
|
35
|
+
payload: rawPayload,
|
|
36
|
+
signature,
|
|
37
|
+
secret: options.secret
|
|
38
|
+
});
|
|
39
|
+
if (!isValid) {
|
|
40
|
+
res.status(401).json({ error: "Invalid signature" });
|
|
41
|
+
return;
|
|
42
|
+
}
|
|
43
|
+
const payload = JSON.parse(rawPayload);
|
|
44
|
+
const event = payload.event;
|
|
45
|
+
const handler = options.handlers[event];
|
|
46
|
+
if (handler) {
|
|
47
|
+
await handler(payload);
|
|
48
|
+
} else if (options.onUnhandledEvent) {
|
|
49
|
+
await options.onUnhandledEvent(event, payload);
|
|
50
|
+
}
|
|
51
|
+
res.status(200).send("OK");
|
|
52
|
+
} catch {
|
|
53
|
+
res.status(500).json({ error: "Internal error" });
|
|
54
|
+
}
|
|
55
|
+
};
|
|
56
|
+
}
|
|
57
|
+
export {
|
|
58
|
+
createWebhookHandler
|
|
59
|
+
};
|
|
60
|
+
//# sourceMappingURL=express.mjs.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../../src/webhooks/verify.ts","../../src/adapters/express.ts"],"sourcesContent":["import { createHmac, timingSafeEqual } from \"node:crypto\";\n\nexport interface VerifyWebhookParams {\n /** Raw request body as a string (NOT parsed JSON) */\n payload: string;\n /** Value of the X-Webhook-Signature header */\n signature: string;\n /** App's webhook secret (provided during app installation) */\n secret: string;\n}\n\n/**\n * Verify webhook signature using HMAC-SHA256.\n * Uses timing-safe comparison to prevent timing attacks.\n */\nexport function verifyWebhook({\n payload,\n signature,\n secret,\n}: VerifyWebhookParams): boolean {\n if (!payload || !signature || !secret) return false;\n\n const expected = createHmac(\"sha256\", secret)\n .update(payload, \"utf8\")\n .digest(\"hex\");\n\n if (expected.length !== signature.length) return false;\n\n try {\n return timingSafeEqual(\n Buffer.from(expected, \"hex\"),\n Buffer.from(signature, \"hex\")\n );\n } catch {\n return false;\n }\n}\n","import { verifyWebhook } from \"../webhooks/verify.js\";\nimport type { WebhookPayload } from \"../webhooks/types.js\";\nimport type { WebhookEventHandler, WebhookHandlerOptions } from \"./types.js\";\n\ntype ExpressLikeRequest = {\n body: Buffer | string;\n headers: Record<string, string | string[] | undefined>;\n};\n\ntype ExpressLikeResponse = {\n status: (code: number) => {\n json: (body: unknown) => void;\n send: (body: string) => void;\n };\n};\n\nfunction getSignature(\n headers: Record<string, string | string[] | undefined>\n): string {\n const value = headers[\"x-webhook-signature\"];\n\n if (Array.isArray(value)) {\n return value[0] ?? \"\";\n }\n\n return value ?? \"\";\n}\n\nexport function createWebhookHandler(\n options: WebhookHandlerOptions\n): (req: ExpressLikeRequest, res: ExpressLikeResponse) => Promise<void> {\n return async function webhookHandler(\n req: ExpressLikeRequest,\n res: ExpressLikeResponse\n ): Promise<void> {\n try {\n const rawPayload =\n typeof req.body === \"string\" ? req.body : req.body.toString(\"utf8\");\n const signature = getSignature(req.headers);\n\n const isValid = verifyWebhook({\n payload: rawPayload,\n signature,\n secret: options.secret,\n });\n\n if (!isValid) {\n res.status(401).json({ error: \"Invalid signature\" });\n return;\n }\n\n const payload = JSON.parse(rawPayload) as WebhookPayload;\n const event = payload.event;\n const handler = options.handlers[event] as\n | WebhookEventHandler<typeof event>\n | undefined;\n\n if (handler) {\n await handler(payload);\n } else if (options.onUnhandledEvent) {\n await options.onUnhandledEvent(event, payload);\n }\n\n res.status(200).send(\"OK\");\n } catch {\n res.status(500).json({ error: \"Internal error\" });\n }\n };\n}\n"],"mappings":";AAAA,SAAS,YAAY,uBAAuB;AAerC,SAAS,cAAc;AAAA,EAC5B;AAAA,EACA;AAAA,EACA;AACF,GAAiC;AAC/B,MAAI,CAAC,WAAW,CAAC,aAAa,CAAC,OAAQ,QAAO;AAE9C,QAAM,WAAW,WAAW,UAAU,MAAM,EACzC,OAAO,SAAS,MAAM,EACtB,OAAO,KAAK;AAEf,MAAI,SAAS,WAAW,UAAU,OAAQ,QAAO;AAEjD,MAAI;AACF,WAAO;AAAA,MACL,OAAO,KAAK,UAAU,KAAK;AAAA,MAC3B,OAAO,KAAK,WAAW,KAAK;AAAA,IAC9B;AAAA,EACF,QAAQ;AACN,WAAO;AAAA,EACT;AACF;;;ACpBA,SAAS,aACP,SACQ;AACR,QAAM,QAAQ,QAAQ,qBAAqB;AAE3C,MAAI,MAAM,QAAQ,KAAK,GAAG;AACxB,WAAO,MAAM,CAAC,KAAK;AAAA,EACrB;AAEA,SAAO,SAAS;AAClB;AAEO,SAAS,qBACd,SACsE;AACtE,SAAO,eAAe,eACpB,KACA,KACe;AACf,QAAI;AACF,YAAM,aACJ,OAAO,IAAI,SAAS,WAAW,IAAI,OAAO,IAAI,KAAK,SAAS,MAAM;AACpE,YAAM,YAAY,aAAa,IAAI,OAAO;AAE1C,YAAM,UAAU,cAAc;AAAA,QAC5B,SAAS;AAAA,QACT;AAAA,QACA,QAAQ,QAAQ;AAAA,MAClB,CAAC;AAED,UAAI,CAAC,SAAS;AACZ,YAAI,OAAO,GAAG,EAAE,KAAK,EAAE,OAAO,oBAAoB,CAAC;AACnD;AAAA,MACF;AAEA,YAAM,UAAU,KAAK,MAAM,UAAU;AACrC,YAAM,QAAQ,QAAQ;AACtB,YAAM,UAAU,QAAQ,SAAS,KAAK;AAItC,UAAI,SAAS;AACX,cAAM,QAAQ,OAAO;AAAA,MACvB,WAAW,QAAQ,kBAAkB;AACnC,cAAM,QAAQ,iBAAiB,OAAO,OAAO;AAAA,MAC/C;AAEA,UAAI,OAAO,GAAG,EAAE,KAAK,IAAI;AAAA,IAC3B,QAAQ;AACN,UAAI,OAAO,GAAG,EAAE,KAAK,EAAE,OAAO,iBAAiB,CAAC;AAAA,IAClD;AAAA,EACF;AACF;","names":[]}
|
|
@@ -0,0 +1,79 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __defProp = Object.defineProperty;
|
|
3
|
+
var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
|
|
4
|
+
var __getOwnPropNames = Object.getOwnPropertyNames;
|
|
5
|
+
var __hasOwnProp = Object.prototype.hasOwnProperty;
|
|
6
|
+
var __export = (target, all) => {
|
|
7
|
+
for (var name in all)
|
|
8
|
+
__defProp(target, name, { get: all[name], enumerable: true });
|
|
9
|
+
};
|
|
10
|
+
var __copyProps = (to, from, except, desc) => {
|
|
11
|
+
if (from && typeof from === "object" || typeof from === "function") {
|
|
12
|
+
for (let key of __getOwnPropNames(from))
|
|
13
|
+
if (!__hasOwnProp.call(to, key) && key !== except)
|
|
14
|
+
__defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });
|
|
15
|
+
}
|
|
16
|
+
return to;
|
|
17
|
+
};
|
|
18
|
+
var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
|
|
19
|
+
|
|
20
|
+
// src/adapters/hono.ts
|
|
21
|
+
var hono_exports = {};
|
|
22
|
+
__export(hono_exports, {
|
|
23
|
+
createWebhookHandler: () => createWebhookHandler
|
|
24
|
+
});
|
|
25
|
+
module.exports = __toCommonJS(hono_exports);
|
|
26
|
+
|
|
27
|
+
// src/webhooks/verify.ts
|
|
28
|
+
var import_node_crypto = require("crypto");
|
|
29
|
+
function verifyWebhook({
|
|
30
|
+
payload,
|
|
31
|
+
signature,
|
|
32
|
+
secret
|
|
33
|
+
}) {
|
|
34
|
+
if (!payload || !signature || !secret) return false;
|
|
35
|
+
const expected = (0, import_node_crypto.createHmac)("sha256", secret).update(payload, "utf8").digest("hex");
|
|
36
|
+
if (expected.length !== signature.length) return false;
|
|
37
|
+
try {
|
|
38
|
+
return (0, import_node_crypto.timingSafeEqual)(
|
|
39
|
+
Buffer.from(expected, "hex"),
|
|
40
|
+
Buffer.from(signature, "hex")
|
|
41
|
+
);
|
|
42
|
+
} catch {
|
|
43
|
+
return false;
|
|
44
|
+
}
|
|
45
|
+
}
|
|
46
|
+
|
|
47
|
+
// src/adapters/hono.ts
|
|
48
|
+
function createWebhookHandler(options) {
|
|
49
|
+
return async function webhookHandler(c) {
|
|
50
|
+
try {
|
|
51
|
+
const rawPayload = await c.req.text();
|
|
52
|
+
const signature = c.req.header("X-Webhook-Signature") ?? "";
|
|
53
|
+
const isValid = verifyWebhook({
|
|
54
|
+
payload: rawPayload,
|
|
55
|
+
signature,
|
|
56
|
+
secret: options.secret
|
|
57
|
+
});
|
|
58
|
+
if (!isValid) {
|
|
59
|
+
return c.json({ error: "Invalid signature" }, 401);
|
|
60
|
+
}
|
|
61
|
+
const payload = JSON.parse(rawPayload);
|
|
62
|
+
const event = payload.event;
|
|
63
|
+
const handler = options.handlers[event];
|
|
64
|
+
if (handler) {
|
|
65
|
+
await handler(payload);
|
|
66
|
+
} else if (options.onUnhandledEvent) {
|
|
67
|
+
await options.onUnhandledEvent(event, payload);
|
|
68
|
+
}
|
|
69
|
+
return c.text("OK", 200);
|
|
70
|
+
} catch {
|
|
71
|
+
return c.json({ error: "Internal error" }, 500);
|
|
72
|
+
}
|
|
73
|
+
};
|
|
74
|
+
}
|
|
75
|
+
// Annotate the CommonJS export names for ESM import in node:
|
|
76
|
+
0 && (module.exports = {
|
|
77
|
+
createWebhookHandler
|
|
78
|
+
});
|
|
79
|
+
//# sourceMappingURL=hono.cjs.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../../src/adapters/hono.ts","../../src/webhooks/verify.ts"],"sourcesContent":["import { verifyWebhook } from \"../webhooks/verify.js\";\nimport type { WebhookPayload } from \"../webhooks/types.js\";\nimport type { WebhookEventHandler, WebhookHandlerOptions } from \"./types.js\";\n\nexport type HonoContextLike = {\n req: {\n text: () => Promise<string>;\n header: (name: string) => string | undefined;\n };\n json: (body: unknown, status?: number) => unknown;\n text: (body: string, status?: number) => unknown;\n};\n\nexport function createWebhookHandler(\n options: WebhookHandlerOptions\n): (c: HonoContextLike) => Promise<unknown> {\n return async function webhookHandler(c: HonoContextLike): Promise<unknown> {\n try {\n const rawPayload = await c.req.text();\n const signature = c.req.header(\"X-Webhook-Signature\") ?? \"\";\n\n const isValid = verifyWebhook({\n payload: rawPayload,\n signature,\n secret: options.secret,\n });\n\n if (!isValid) {\n return c.json({ error: \"Invalid signature\" }, 401);\n }\n\n const payload = JSON.parse(rawPayload) as WebhookPayload;\n const event = payload.event;\n const handler = options.handlers[event] as\n | WebhookEventHandler<typeof event>\n | undefined;\n\n if (handler) {\n await handler(payload);\n } else if (options.onUnhandledEvent) {\n await options.onUnhandledEvent(event, payload);\n }\n\n return c.text(\"OK\", 200);\n } catch {\n return c.json({ error: \"Internal error\" }, 500);\n }\n };\n}\n","import { createHmac, timingSafeEqual } from \"node:crypto\";\n\nexport interface VerifyWebhookParams {\n /** Raw request body as a string (NOT parsed JSON) */\n payload: string;\n /** Value of the X-Webhook-Signature header */\n signature: string;\n /** App's webhook secret (provided during app installation) */\n secret: string;\n}\n\n/**\n * Verify webhook signature using HMAC-SHA256.\n * Uses timing-safe comparison to prevent timing attacks.\n */\nexport function verifyWebhook({\n payload,\n signature,\n secret,\n}: VerifyWebhookParams): boolean {\n if (!payload || !signature || !secret) return false;\n\n const expected = createHmac(\"sha256\", secret)\n .update(payload, \"utf8\")\n .digest(\"hex\");\n\n if (expected.length !== signature.length) return false;\n\n try {\n return timingSafeEqual(\n Buffer.from(expected, \"hex\"),\n Buffer.from(signature, \"hex\")\n );\n } catch {\n return false;\n }\n}\n"],"mappings":";;;;;;;;;;;;;;;;;;;;AAAA;AAAA;AAAA;AAAA;AAAA;;;ACAA,yBAA4C;AAerC,SAAS,cAAc;AAAA,EAC5B;AAAA,EACA;AAAA,EACA;AACF,GAAiC;AAC/B,MAAI,CAAC,WAAW,CAAC,aAAa,CAAC,OAAQ,QAAO;AAE9C,QAAM,eAAW,+BAAW,UAAU,MAAM,EACzC,OAAO,SAAS,MAAM,EACtB,OAAO,KAAK;AAEf,MAAI,SAAS,WAAW,UAAU,OAAQ,QAAO;AAEjD,MAAI;AACF,eAAO;AAAA,MACL,OAAO,KAAK,UAAU,KAAK;AAAA,MAC3B,OAAO,KAAK,WAAW,KAAK;AAAA,IAC9B;AAAA,EACF,QAAQ;AACN,WAAO;AAAA,EACT;AACF;;;ADvBO,SAAS,qBACd,SAC0C;AAC1C,SAAO,eAAe,eAAe,GAAsC;AACzE,QAAI;AACF,YAAM,aAAa,MAAM,EAAE,IAAI,KAAK;AACpC,YAAM,YAAY,EAAE,IAAI,OAAO,qBAAqB,KAAK;AAEzD,YAAM,UAAU,cAAc;AAAA,QAC5B,SAAS;AAAA,QACT;AAAA,QACA,QAAQ,QAAQ;AAAA,MAClB,CAAC;AAED,UAAI,CAAC,SAAS;AACZ,eAAO,EAAE,KAAK,EAAE,OAAO,oBAAoB,GAAG,GAAG;AAAA,MACnD;AAEA,YAAM,UAAU,KAAK,MAAM,UAAU;AACrC,YAAM,QAAQ,QAAQ;AACtB,YAAM,UAAU,QAAQ,SAAS,KAAK;AAItC,UAAI,SAAS;AACX,cAAM,QAAQ,OAAO;AAAA,MACvB,WAAW,QAAQ,kBAAkB;AACnC,cAAM,QAAQ,iBAAiB,OAAO,OAAO;AAAA,MAC/C;AAEA,aAAO,EAAE,KAAK,MAAM,GAAG;AAAA,IACzB,QAAQ;AACN,aAAO,EAAE,KAAK,EAAE,OAAO,iBAAiB,GAAG,GAAG;AAAA,IAChD;AAAA,EACF;AACF;","names":[]}
|
|
@@ -0,0 +1,15 @@
|
|
|
1
|
+
import { W as WebhookHandlerOptions } from '../types-Db_BeRCj.cjs';
|
|
2
|
+
import '../types-DdqKKyqX.cjs';
|
|
3
|
+
import '../types-M1eLMz6w.cjs';
|
|
4
|
+
|
|
5
|
+
type HonoContextLike = {
|
|
6
|
+
req: {
|
|
7
|
+
text: () => Promise<string>;
|
|
8
|
+
header: (name: string) => string | undefined;
|
|
9
|
+
};
|
|
10
|
+
json: (body: unknown, status?: number) => unknown;
|
|
11
|
+
text: (body: string, status?: number) => unknown;
|
|
12
|
+
};
|
|
13
|
+
declare function createWebhookHandler(options: WebhookHandlerOptions): (c: HonoContextLike) => Promise<unknown>;
|
|
14
|
+
|
|
15
|
+
export { type HonoContextLike, createWebhookHandler };
|
|
@@ -0,0 +1,15 @@
|
|
|
1
|
+
import { W as WebhookHandlerOptions } from '../types-D2Efg3EG.js';
|
|
2
|
+
import '../types-DZ659i6f.js';
|
|
3
|
+
import '../types-M1eLMz6w.js';
|
|
4
|
+
|
|
5
|
+
type HonoContextLike = {
|
|
6
|
+
req: {
|
|
7
|
+
text: () => Promise<string>;
|
|
8
|
+
header: (name: string) => string | undefined;
|
|
9
|
+
};
|
|
10
|
+
json: (body: unknown, status?: number) => unknown;
|
|
11
|
+
text: (body: string, status?: number) => unknown;
|
|
12
|
+
};
|
|
13
|
+
declare function createWebhookHandler(options: WebhookHandlerOptions): (c: HonoContextLike) => Promise<unknown>;
|
|
14
|
+
|
|
15
|
+
export { type HonoContextLike, createWebhookHandler };
|
|
@@ -0,0 +1,52 @@
|
|
|
1
|
+
// src/webhooks/verify.ts
|
|
2
|
+
import { createHmac, timingSafeEqual } from "crypto";
|
|
3
|
+
function verifyWebhook({
|
|
4
|
+
payload,
|
|
5
|
+
signature,
|
|
6
|
+
secret
|
|
7
|
+
}) {
|
|
8
|
+
if (!payload || !signature || !secret) return false;
|
|
9
|
+
const expected = createHmac("sha256", secret).update(payload, "utf8").digest("hex");
|
|
10
|
+
if (expected.length !== signature.length) return false;
|
|
11
|
+
try {
|
|
12
|
+
return timingSafeEqual(
|
|
13
|
+
Buffer.from(expected, "hex"),
|
|
14
|
+
Buffer.from(signature, "hex")
|
|
15
|
+
);
|
|
16
|
+
} catch {
|
|
17
|
+
return false;
|
|
18
|
+
}
|
|
19
|
+
}
|
|
20
|
+
|
|
21
|
+
// src/adapters/hono.ts
|
|
22
|
+
function createWebhookHandler(options) {
|
|
23
|
+
return async function webhookHandler(c) {
|
|
24
|
+
try {
|
|
25
|
+
const rawPayload = await c.req.text();
|
|
26
|
+
const signature = c.req.header("X-Webhook-Signature") ?? "";
|
|
27
|
+
const isValid = verifyWebhook({
|
|
28
|
+
payload: rawPayload,
|
|
29
|
+
signature,
|
|
30
|
+
secret: options.secret
|
|
31
|
+
});
|
|
32
|
+
if (!isValid) {
|
|
33
|
+
return c.json({ error: "Invalid signature" }, 401);
|
|
34
|
+
}
|
|
35
|
+
const payload = JSON.parse(rawPayload);
|
|
36
|
+
const event = payload.event;
|
|
37
|
+
const handler = options.handlers[event];
|
|
38
|
+
if (handler) {
|
|
39
|
+
await handler(payload);
|
|
40
|
+
} else if (options.onUnhandledEvent) {
|
|
41
|
+
await options.onUnhandledEvent(event, payload);
|
|
42
|
+
}
|
|
43
|
+
return c.text("OK", 200);
|
|
44
|
+
} catch {
|
|
45
|
+
return c.json({ error: "Internal error" }, 500);
|
|
46
|
+
}
|
|
47
|
+
};
|
|
48
|
+
}
|
|
49
|
+
export {
|
|
50
|
+
createWebhookHandler
|
|
51
|
+
};
|
|
52
|
+
//# sourceMappingURL=hono.mjs.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../../src/webhooks/verify.ts","../../src/adapters/hono.ts"],"sourcesContent":["import { createHmac, timingSafeEqual } from \"node:crypto\";\n\nexport interface VerifyWebhookParams {\n /** Raw request body as a string (NOT parsed JSON) */\n payload: string;\n /** Value of the X-Webhook-Signature header */\n signature: string;\n /** App's webhook secret (provided during app installation) */\n secret: string;\n}\n\n/**\n * Verify webhook signature using HMAC-SHA256.\n * Uses timing-safe comparison to prevent timing attacks.\n */\nexport function verifyWebhook({\n payload,\n signature,\n secret,\n}: VerifyWebhookParams): boolean {\n if (!payload || !signature || !secret) return false;\n\n const expected = createHmac(\"sha256\", secret)\n .update(payload, \"utf8\")\n .digest(\"hex\");\n\n if (expected.length !== signature.length) return false;\n\n try {\n return timingSafeEqual(\n Buffer.from(expected, \"hex\"),\n Buffer.from(signature, \"hex\")\n );\n } catch {\n return false;\n }\n}\n","import { verifyWebhook } from \"../webhooks/verify.js\";\nimport type { WebhookPayload } from \"../webhooks/types.js\";\nimport type { WebhookEventHandler, WebhookHandlerOptions } from \"./types.js\";\n\nexport type HonoContextLike = {\n req: {\n text: () => Promise<string>;\n header: (name: string) => string | undefined;\n };\n json: (body: unknown, status?: number) => unknown;\n text: (body: string, status?: number) => unknown;\n};\n\nexport function createWebhookHandler(\n options: WebhookHandlerOptions\n): (c: HonoContextLike) => Promise<unknown> {\n return async function webhookHandler(c: HonoContextLike): Promise<unknown> {\n try {\n const rawPayload = await c.req.text();\n const signature = c.req.header(\"X-Webhook-Signature\") ?? \"\";\n\n const isValid = verifyWebhook({\n payload: rawPayload,\n signature,\n secret: options.secret,\n });\n\n if (!isValid) {\n return c.json({ error: \"Invalid signature\" }, 401);\n }\n\n const payload = JSON.parse(rawPayload) as WebhookPayload;\n const event = payload.event;\n const handler = options.handlers[event] as\n | WebhookEventHandler<typeof event>\n | undefined;\n\n if (handler) {\n await handler(payload);\n } else if (options.onUnhandledEvent) {\n await options.onUnhandledEvent(event, payload);\n }\n\n return c.text(\"OK\", 200);\n } catch {\n return c.json({ error: \"Internal error\" }, 500);\n }\n };\n}\n"],"mappings":";AAAA,SAAS,YAAY,uBAAuB;AAerC,SAAS,cAAc;AAAA,EAC5B;AAAA,EACA;AAAA,EACA;AACF,GAAiC;AAC/B,MAAI,CAAC,WAAW,CAAC,aAAa,CAAC,OAAQ,QAAO;AAE9C,QAAM,WAAW,WAAW,UAAU,MAAM,EACzC,OAAO,SAAS,MAAM,EACtB,OAAO,KAAK;AAEf,MAAI,SAAS,WAAW,UAAU,OAAQ,QAAO;AAEjD,MAAI;AACF,WAAO;AAAA,MACL,OAAO,KAAK,UAAU,KAAK;AAAA,MAC3B,OAAO,KAAK,WAAW,KAAK;AAAA,IAC9B;AAAA,EACF,QAAQ;AACN,WAAO;AAAA,EACT;AACF;;;ACvBO,SAAS,qBACd,SAC0C;AAC1C,SAAO,eAAe,eAAe,GAAsC;AACzE,QAAI;AACF,YAAM,aAAa,MAAM,EAAE,IAAI,KAAK;AACpC,YAAM,YAAY,EAAE,IAAI,OAAO,qBAAqB,KAAK;AAEzD,YAAM,UAAU,cAAc;AAAA,QAC5B,SAAS;AAAA,QACT;AAAA,QACA,QAAQ,QAAQ;AAAA,MAClB,CAAC;AAED,UAAI,CAAC,SAAS;AACZ,eAAO,EAAE,KAAK,EAAE,OAAO,oBAAoB,GAAG,GAAG;AAAA,MACnD;AAEA,YAAM,UAAU,KAAK,MAAM,UAAU;AACrC,YAAM,QAAQ,QAAQ;AACtB,YAAM,UAAU,QAAQ,SAAS,KAAK;AAItC,UAAI,SAAS;AACX,cAAM,QAAQ,OAAO;AAAA,MACvB,WAAW,QAAQ,kBAAkB;AACnC,cAAM,QAAQ,iBAAiB,OAAO,OAAO;AAAA,MAC/C;AAEA,aAAO,EAAE,KAAK,MAAM,GAAG;AAAA,IACzB,QAAQ;AACN,aAAO,EAAE,KAAK,EAAE,OAAO,iBAAiB,GAAG,GAAG;AAAA,IAChD;AAAA,EACF;AACF;","names":[]}
|
|
@@ -0,0 +1,79 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __defProp = Object.defineProperty;
|
|
3
|
+
var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
|
|
4
|
+
var __getOwnPropNames = Object.getOwnPropertyNames;
|
|
5
|
+
var __hasOwnProp = Object.prototype.hasOwnProperty;
|
|
6
|
+
var __export = (target, all) => {
|
|
7
|
+
for (var name in all)
|
|
8
|
+
__defProp(target, name, { get: all[name], enumerable: true });
|
|
9
|
+
};
|
|
10
|
+
var __copyProps = (to, from, except, desc) => {
|
|
11
|
+
if (from && typeof from === "object" || typeof from === "function") {
|
|
12
|
+
for (let key of __getOwnPropNames(from))
|
|
13
|
+
if (!__hasOwnProp.call(to, key) && key !== except)
|
|
14
|
+
__defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });
|
|
15
|
+
}
|
|
16
|
+
return to;
|
|
17
|
+
};
|
|
18
|
+
var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
|
|
19
|
+
|
|
20
|
+
// src/adapters/nextjs.ts
|
|
21
|
+
var nextjs_exports = {};
|
|
22
|
+
__export(nextjs_exports, {
|
|
23
|
+
createWebhookHandler: () => createWebhookHandler
|
|
24
|
+
});
|
|
25
|
+
module.exports = __toCommonJS(nextjs_exports);
|
|
26
|
+
|
|
27
|
+
// src/webhooks/verify.ts
|
|
28
|
+
var import_node_crypto = require("crypto");
|
|
29
|
+
function verifyWebhook({
|
|
30
|
+
payload,
|
|
31
|
+
signature,
|
|
32
|
+
secret
|
|
33
|
+
}) {
|
|
34
|
+
if (!payload || !signature || !secret) return false;
|
|
35
|
+
const expected = (0, import_node_crypto.createHmac)("sha256", secret).update(payload, "utf8").digest("hex");
|
|
36
|
+
if (expected.length !== signature.length) return false;
|
|
37
|
+
try {
|
|
38
|
+
return (0, import_node_crypto.timingSafeEqual)(
|
|
39
|
+
Buffer.from(expected, "hex"),
|
|
40
|
+
Buffer.from(signature, "hex")
|
|
41
|
+
);
|
|
42
|
+
} catch {
|
|
43
|
+
return false;
|
|
44
|
+
}
|
|
45
|
+
}
|
|
46
|
+
|
|
47
|
+
// src/adapters/nextjs.ts
|
|
48
|
+
function createWebhookHandler(options) {
|
|
49
|
+
return async function webhookHandler(request) {
|
|
50
|
+
try {
|
|
51
|
+
const rawPayload = await request.text();
|
|
52
|
+
const signature = request.headers.get("X-Webhook-Signature") ?? "";
|
|
53
|
+
const isValid = verifyWebhook({
|
|
54
|
+
payload: rawPayload,
|
|
55
|
+
signature,
|
|
56
|
+
secret: options.secret
|
|
57
|
+
});
|
|
58
|
+
if (!isValid) {
|
|
59
|
+
return new Response("Invalid signature", { status: 401 });
|
|
60
|
+
}
|
|
61
|
+
const payload = JSON.parse(rawPayload);
|
|
62
|
+
const event = payload.event;
|
|
63
|
+
const handler = options.handlers[event];
|
|
64
|
+
if (handler) {
|
|
65
|
+
await handler(payload);
|
|
66
|
+
} else if (options.onUnhandledEvent) {
|
|
67
|
+
await options.onUnhandledEvent(event, payload);
|
|
68
|
+
}
|
|
69
|
+
return new Response("OK", { status: 200 });
|
|
70
|
+
} catch {
|
|
71
|
+
return new Response("Internal error", { status: 500 });
|
|
72
|
+
}
|
|
73
|
+
};
|
|
74
|
+
}
|
|
75
|
+
// Annotate the CommonJS export names for ESM import in node:
|
|
76
|
+
0 && (module.exports = {
|
|
77
|
+
createWebhookHandler
|
|
78
|
+
});
|
|
79
|
+
//# sourceMappingURL=nextjs.cjs.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../../src/adapters/nextjs.ts","../../src/webhooks/verify.ts"],"sourcesContent":["import { verifyWebhook } from \"../webhooks/verify.js\";\nimport type { WebhookPayload } from \"../webhooks/types.js\";\nimport type { WebhookEventHandler, WebhookHandlerOptions } from \"./types.js\";\n\nexport function createWebhookHandler(\n options: WebhookHandlerOptions\n): (request: Request) => Promise<Response> {\n return async function webhookHandler(request: Request): Promise<Response> {\n try {\n const rawPayload = await request.text();\n const signature = request.headers.get(\"X-Webhook-Signature\") ?? \"\";\n\n const isValid = verifyWebhook({\n payload: rawPayload,\n signature,\n secret: options.secret,\n });\n\n if (!isValid) {\n return new Response(\"Invalid signature\", { status: 401 });\n }\n\n const payload = JSON.parse(rawPayload) as WebhookPayload;\n const event = payload.event;\n const handler = options.handlers[event] as\n | WebhookEventHandler<typeof event>\n | undefined;\n\n if (handler) {\n await handler(payload);\n } else if (options.onUnhandledEvent) {\n await options.onUnhandledEvent(event, payload);\n }\n\n return new Response(\"OK\", { status: 200 });\n } catch {\n return new Response(\"Internal error\", { status: 500 });\n }\n };\n}\n","import { createHmac, timingSafeEqual } from \"node:crypto\";\n\nexport interface VerifyWebhookParams {\n /** Raw request body as a string (NOT parsed JSON) */\n payload: string;\n /** Value of the X-Webhook-Signature header */\n signature: string;\n /** App's webhook secret (provided during app installation) */\n secret: string;\n}\n\n/**\n * Verify webhook signature using HMAC-SHA256.\n * Uses timing-safe comparison to prevent timing attacks.\n */\nexport function verifyWebhook({\n payload,\n signature,\n secret,\n}: VerifyWebhookParams): boolean {\n if (!payload || !signature || !secret) return false;\n\n const expected = createHmac(\"sha256\", secret)\n .update(payload, \"utf8\")\n .digest(\"hex\");\n\n if (expected.length !== signature.length) return false;\n\n try {\n return timingSafeEqual(\n Buffer.from(expected, \"hex\"),\n Buffer.from(signature, \"hex\")\n );\n } catch {\n return false;\n }\n}\n"],"mappings":";;;;;;;;;;;;;;;;;;;;AAAA;AAAA;AAAA;AAAA;AAAA;;;ACAA,yBAA4C;AAerC,SAAS,cAAc;AAAA,EAC5B;AAAA,EACA;AAAA,EACA;AACF,GAAiC;AAC/B,MAAI,CAAC,WAAW,CAAC,aAAa,CAAC,OAAQ,QAAO;AAE9C,QAAM,eAAW,+BAAW,UAAU,MAAM,EACzC,OAAO,SAAS,MAAM,EACtB,OAAO,KAAK;AAEf,MAAI,SAAS,WAAW,UAAU,OAAQ,QAAO;AAEjD,MAAI;AACF,eAAO;AAAA,MACL,OAAO,KAAK,UAAU,KAAK;AAAA,MAC3B,OAAO,KAAK,WAAW,KAAK;AAAA,IAC9B;AAAA,EACF,QAAQ;AACN,WAAO;AAAA,EACT;AACF;;;ADhCO,SAAS,qBACd,SACyC;AACzC,SAAO,eAAe,eAAe,SAAqC;AACxE,QAAI;AACF,YAAM,aAAa,MAAM,QAAQ,KAAK;AACtC,YAAM,YAAY,QAAQ,QAAQ,IAAI,qBAAqB,KAAK;AAEhE,YAAM,UAAU,cAAc;AAAA,QAC5B,SAAS;AAAA,QACT;AAAA,QACA,QAAQ,QAAQ;AAAA,MAClB,CAAC;AAED,UAAI,CAAC,SAAS;AACZ,eAAO,IAAI,SAAS,qBAAqB,EAAE,QAAQ,IAAI,CAAC;AAAA,MAC1D;AAEA,YAAM,UAAU,KAAK,MAAM,UAAU;AACrC,YAAM,QAAQ,QAAQ;AACtB,YAAM,UAAU,QAAQ,SAAS,KAAK;AAItC,UAAI,SAAS;AACX,cAAM,QAAQ,OAAO;AAAA,MACvB,WAAW,QAAQ,kBAAkB;AACnC,cAAM,QAAQ,iBAAiB,OAAO,OAAO;AAAA,MAC/C;AAEA,aAAO,IAAI,SAAS,MAAM,EAAE,QAAQ,IAAI,CAAC;AAAA,IAC3C,QAAQ;AACN,aAAO,IAAI,SAAS,kBAAkB,EAAE,QAAQ,IAAI,CAAC;AAAA,IACvD;AAAA,EACF;AACF;","names":[]}
|
|
@@ -0,0 +1,7 @@
|
|
|
1
|
+
import { W as WebhookHandlerOptions } from '../types-Db_BeRCj.cjs';
|
|
2
|
+
import '../types-DdqKKyqX.cjs';
|
|
3
|
+
import '../types-M1eLMz6w.cjs';
|
|
4
|
+
|
|
5
|
+
declare function createWebhookHandler(options: WebhookHandlerOptions): (request: Request) => Promise<Response>;
|
|
6
|
+
|
|
7
|
+
export { createWebhookHandler };
|
|
@@ -0,0 +1,7 @@
|
|
|
1
|
+
import { W as WebhookHandlerOptions } from '../types-D2Efg3EG.js';
|
|
2
|
+
import '../types-DZ659i6f.js';
|
|
3
|
+
import '../types-M1eLMz6w.js';
|
|
4
|
+
|
|
5
|
+
declare function createWebhookHandler(options: WebhookHandlerOptions): (request: Request) => Promise<Response>;
|
|
6
|
+
|
|
7
|
+
export { createWebhookHandler };
|
|
@@ -0,0 +1,52 @@
|
|
|
1
|
+
// src/webhooks/verify.ts
|
|
2
|
+
import { createHmac, timingSafeEqual } from "crypto";
|
|
3
|
+
function verifyWebhook({
|
|
4
|
+
payload,
|
|
5
|
+
signature,
|
|
6
|
+
secret
|
|
7
|
+
}) {
|
|
8
|
+
if (!payload || !signature || !secret) return false;
|
|
9
|
+
const expected = createHmac("sha256", secret).update(payload, "utf8").digest("hex");
|
|
10
|
+
if (expected.length !== signature.length) return false;
|
|
11
|
+
try {
|
|
12
|
+
return timingSafeEqual(
|
|
13
|
+
Buffer.from(expected, "hex"),
|
|
14
|
+
Buffer.from(signature, "hex")
|
|
15
|
+
);
|
|
16
|
+
} catch {
|
|
17
|
+
return false;
|
|
18
|
+
}
|
|
19
|
+
}
|
|
20
|
+
|
|
21
|
+
// src/adapters/nextjs.ts
|
|
22
|
+
function createWebhookHandler(options) {
|
|
23
|
+
return async function webhookHandler(request) {
|
|
24
|
+
try {
|
|
25
|
+
const rawPayload = await request.text();
|
|
26
|
+
const signature = request.headers.get("X-Webhook-Signature") ?? "";
|
|
27
|
+
const isValid = verifyWebhook({
|
|
28
|
+
payload: rawPayload,
|
|
29
|
+
signature,
|
|
30
|
+
secret: options.secret
|
|
31
|
+
});
|
|
32
|
+
if (!isValid) {
|
|
33
|
+
return new Response("Invalid signature", { status: 401 });
|
|
34
|
+
}
|
|
35
|
+
const payload = JSON.parse(rawPayload);
|
|
36
|
+
const event = payload.event;
|
|
37
|
+
const handler = options.handlers[event];
|
|
38
|
+
if (handler) {
|
|
39
|
+
await handler(payload);
|
|
40
|
+
} else if (options.onUnhandledEvent) {
|
|
41
|
+
await options.onUnhandledEvent(event, payload);
|
|
42
|
+
}
|
|
43
|
+
return new Response("OK", { status: 200 });
|
|
44
|
+
} catch {
|
|
45
|
+
return new Response("Internal error", { status: 500 });
|
|
46
|
+
}
|
|
47
|
+
};
|
|
48
|
+
}
|
|
49
|
+
export {
|
|
50
|
+
createWebhookHandler
|
|
51
|
+
};
|
|
52
|
+
//# sourceMappingURL=nextjs.mjs.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../../src/webhooks/verify.ts","../../src/adapters/nextjs.ts"],"sourcesContent":["import { createHmac, timingSafeEqual } from \"node:crypto\";\n\nexport interface VerifyWebhookParams {\n /** Raw request body as a string (NOT parsed JSON) */\n payload: string;\n /** Value of the X-Webhook-Signature header */\n signature: string;\n /** App's webhook secret (provided during app installation) */\n secret: string;\n}\n\n/**\n * Verify webhook signature using HMAC-SHA256.\n * Uses timing-safe comparison to prevent timing attacks.\n */\nexport function verifyWebhook({\n payload,\n signature,\n secret,\n}: VerifyWebhookParams): boolean {\n if (!payload || !signature || !secret) return false;\n\n const expected = createHmac(\"sha256\", secret)\n .update(payload, \"utf8\")\n .digest(\"hex\");\n\n if (expected.length !== signature.length) return false;\n\n try {\n return timingSafeEqual(\n Buffer.from(expected, \"hex\"),\n Buffer.from(signature, \"hex\")\n );\n } catch {\n return false;\n }\n}\n","import { verifyWebhook } from \"../webhooks/verify.js\";\nimport type { WebhookPayload } from \"../webhooks/types.js\";\nimport type { WebhookEventHandler, WebhookHandlerOptions } from \"./types.js\";\n\nexport function createWebhookHandler(\n options: WebhookHandlerOptions\n): (request: Request) => Promise<Response> {\n return async function webhookHandler(request: Request): Promise<Response> {\n try {\n const rawPayload = await request.text();\n const signature = request.headers.get(\"X-Webhook-Signature\") ?? \"\";\n\n const isValid = verifyWebhook({\n payload: rawPayload,\n signature,\n secret: options.secret,\n });\n\n if (!isValid) {\n return new Response(\"Invalid signature\", { status: 401 });\n }\n\n const payload = JSON.parse(rawPayload) as WebhookPayload;\n const event = payload.event;\n const handler = options.handlers[event] as\n | WebhookEventHandler<typeof event>\n | undefined;\n\n if (handler) {\n await handler(payload);\n } else if (options.onUnhandledEvent) {\n await options.onUnhandledEvent(event, payload);\n }\n\n return new Response(\"OK\", { status: 200 });\n } catch {\n return new Response(\"Internal error\", { status: 500 });\n }\n };\n}\n"],"mappings":";AAAA,SAAS,YAAY,uBAAuB;AAerC,SAAS,cAAc;AAAA,EAC5B;AAAA,EACA;AAAA,EACA;AACF,GAAiC;AAC/B,MAAI,CAAC,WAAW,CAAC,aAAa,CAAC,OAAQ,QAAO;AAE9C,QAAM,WAAW,WAAW,UAAU,MAAM,EACzC,OAAO,SAAS,MAAM,EACtB,OAAO,KAAK;AAEf,MAAI,SAAS,WAAW,UAAU,OAAQ,QAAO;AAEjD,MAAI;AACF,WAAO;AAAA,MACL,OAAO,KAAK,UAAU,KAAK;AAAA,MAC3B,OAAO,KAAK,WAAW,KAAK;AAAA,IAC9B;AAAA,EACF,QAAQ;AACN,WAAO;AAAA,EACT;AACF;;;AChCO,SAAS,qBACd,SACyC;AACzC,SAAO,eAAe,eAAe,SAAqC;AACxE,QAAI;AACF,YAAM,aAAa,MAAM,QAAQ,KAAK;AACtC,YAAM,YAAY,QAAQ,QAAQ,IAAI,qBAAqB,KAAK;AAEhE,YAAM,UAAU,cAAc;AAAA,QAC5B,SAAS;AAAA,QACT;AAAA,QACA,QAAQ,QAAQ;AAAA,MAClB,CAAC;AAED,UAAI,CAAC,SAAS;AACZ,eAAO,IAAI,SAAS,qBAAqB,EAAE,QAAQ,IAAI,CAAC;AAAA,MAC1D;AAEA,YAAM,UAAU,KAAK,MAAM,UAAU;AACrC,YAAM,QAAQ,QAAQ;AACtB,YAAM,UAAU,QAAQ,SAAS,KAAK;AAItC,UAAI,SAAS;AACX,cAAM,QAAQ,OAAO;AAAA,MACvB,WAAW,QAAQ,kBAAkB;AACnC,cAAM,QAAQ,iBAAiB,OAAO,OAAO;AAAA,MAC/C;AAEA,aAAO,IAAI,SAAS,MAAM,EAAE,QAAQ,IAAI,CAAC;AAAA,IAC3C,QAAQ;AACN,aAAO,IAAI,SAAS,kBAAkB,EAAE,QAAQ,IAAI,CAAC;AAAA,IACvD;AAAA,EACF;AACF;","names":[]}
|