@workos-inc/node 7.31.0-beta.actions1 → 7.31.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/lib/index.d.ts +0 -3
- package/lib/index.js +0 -12
- package/lib/index.worker.d.ts +0 -3
- package/lib/index.worker.js +0 -6
- package/lib/user-management/interfaces/authentication-response.interface.d.ts +3 -0
- package/lib/user-management/interfaces/index.d.ts +2 -3
- package/lib/user-management/interfaces/index.js +2 -3
- package/lib/user-management/interfaces/oauth-tokens.interface.d.ts +12 -0
- package/lib/user-management/serializers/authentication-response.serializer.js +3 -2
- package/lib/user-management/serializers/oauth-tokens.serializer.d.ts +2 -0
- package/lib/user-management/serializers/oauth-tokens.serializer.js +12 -0
- package/lib/user-management/user-management.spec.js +28 -0
- package/lib/webhooks/webhooks.d.ts +9 -9
- package/lib/webhooks/webhooks.js +36 -11
- package/lib/webhooks/webhooks.spec.js +46 -23
- package/lib/workos.d.ts +0 -3
- package/lib/workos.js +1 -6
- package/lib/workos.spec.js +1 -5
- package/package.json +1 -1
- package/lib/actions/actions.d.ts +0 -19
- package/lib/actions/actions.js +0 -53
- package/lib/actions/actions.spec.d.ts +0 -1
- package/lib/actions/actions.spec.js +0 -78
- package/lib/actions/fixtures/action-context.json +0 -39
- package/lib/actions/interfaces/response-payload.d.ts +0 -23
- package/lib/common/crypto/CryptoProvider.d.ts +0 -32
- package/lib/common/crypto/CryptoProvider.js +0 -13
- package/lib/common/crypto/CryptoProvider.spec.d.ts +0 -1
- package/lib/common/crypto/CryptoProvider.spec.js +0 -57
- package/lib/common/crypto/NodeCryptoProvider.d.ts +0 -12
- package/lib/common/crypto/NodeCryptoProvider.js +0 -73
- package/lib/common/crypto/SignatureProvider.d.ts +0 -13
- package/lib/common/crypto/SignatureProvider.js +0 -53
- package/lib/common/crypto/SignatureProvider.spec.d.ts +0 -1
- package/lib/common/crypto/SignatureProvider.spec.js +0 -66
- package/lib/common/crypto/SubtleCryptoProvider.d.ts +0 -15
- package/lib/common/crypto/SubtleCryptoProvider.js +0 -75
- package/lib/common/crypto/index.d.ts +0 -4
- package/lib/common/crypto/index.js +0 -20
- package/lib/common/net/index.d.ts +0 -5
- package/lib/common/net/index.js +0 -31
- package/lib/common/utils/unreachable.d.ts +0 -10
- package/lib/common/utils/unreachable.js +0 -18
- /package/lib/{actions/interfaces/response-payload.js → user-management/interfaces/oauth-tokens.interface.js} +0 -0
|
@@ -1,39 +0,0 @@
|
|
|
1
|
-
{
|
|
2
|
-
"user": {
|
|
3
|
-
"object": "user",
|
|
4
|
-
"id": "01JATCHZVEC5EPANDPEZVM68Y9",
|
|
5
|
-
"email": "jane@foocorp.com",
|
|
6
|
-
"first_name": "Jane",
|
|
7
|
-
"last_name": "Doe",
|
|
8
|
-
"email_verified": true,
|
|
9
|
-
"profile_picture_url": "https://example.com/jane.jpg",
|
|
10
|
-
"created_at": "2024-10-22T17:12:50.746Z",
|
|
11
|
-
"updated_at": "2024-10-22T17:12:50.746Z"
|
|
12
|
-
},
|
|
13
|
-
"ip_address": "50.141.123.10",
|
|
14
|
-
"user_agent": "Mozilla/5.0",
|
|
15
|
-
"issuer": "test",
|
|
16
|
-
"object": "authentication_action_context",
|
|
17
|
-
"organization": {
|
|
18
|
-
"object": "organization",
|
|
19
|
-
"id": "01JATCMZJY26PQ59XT9BNT0FNN",
|
|
20
|
-
"name": "Foo Corp",
|
|
21
|
-
"allow_profiles_outside_organization": false,
|
|
22
|
-
"domains": [],
|
|
23
|
-
"lookup_key": "my-key",
|
|
24
|
-
"created_at": "2024-10-22T17:12:50.746Z",
|
|
25
|
-
"updated_at": "2024-10-22T17:12:50.746Z"
|
|
26
|
-
},
|
|
27
|
-
"organization_membership": {
|
|
28
|
-
"object": "organization_membership",
|
|
29
|
-
"id": "01JATCNVYCHT1SZGENR4QTXKRK",
|
|
30
|
-
"user_id": "01JATCHZVEC5EPANDPEZVM68Y9",
|
|
31
|
-
"organization_id": "01JATCMZJY26PQ59XT9BNT0FNN",
|
|
32
|
-
"role": {
|
|
33
|
-
"slug": "member"
|
|
34
|
-
},
|
|
35
|
-
"status": "active",
|
|
36
|
-
"created_at": "2024-10-22T17:12:50.746Z",
|
|
37
|
-
"updated_at": "2024-10-22T17:12:50.746Z"
|
|
38
|
-
}
|
|
39
|
-
}
|
|
@@ -1,23 +0,0 @@
|
|
|
1
|
-
export interface ResponsePayload {
|
|
2
|
-
timestamp: number;
|
|
3
|
-
verdict?: 'Allow' | 'Deny';
|
|
4
|
-
errorMessage?: string;
|
|
5
|
-
}
|
|
6
|
-
interface AllowResponseData {
|
|
7
|
-
verdict: 'Allow';
|
|
8
|
-
}
|
|
9
|
-
interface DenyResponseData {
|
|
10
|
-
verdict: 'Deny';
|
|
11
|
-
errorMessage?: string;
|
|
12
|
-
}
|
|
13
|
-
export type AuthenticationActionResponseData = (AllowResponseData & {
|
|
14
|
-
type: 'authentication';
|
|
15
|
-
}) | (DenyResponseData & {
|
|
16
|
-
type: 'authentication';
|
|
17
|
-
});
|
|
18
|
-
export type UserRegistrationActionResponseData = (AllowResponseData & {
|
|
19
|
-
type: 'user_registration';
|
|
20
|
-
}) | (DenyResponseData & {
|
|
21
|
-
type: 'user_registration';
|
|
22
|
-
});
|
|
23
|
-
export {};
|
|
@@ -1,32 +0,0 @@
|
|
|
1
|
-
/**
|
|
2
|
-
* Interface encapsulating the various crypto computations used by the library,
|
|
3
|
-
* allowing pluggable underlying crypto implementations.
|
|
4
|
-
*/
|
|
5
|
-
export declare abstract class CryptoProvider {
|
|
6
|
-
encoder: TextEncoder;
|
|
7
|
-
/**
|
|
8
|
-
* Computes a SHA-256 HMAC given a secret and a payload (encoded in UTF-8).
|
|
9
|
-
* The output HMAC should be encoded in hexadecimal.
|
|
10
|
-
*
|
|
11
|
-
* Sample values for implementations:
|
|
12
|
-
* - computeHMACSignature('', 'test_secret') => 'f7f9bd47fb987337b5796fdc1fdb9ba221d0d5396814bfcaf9521f43fd8927fd'
|
|
13
|
-
* - computeHMACSignature('\ud83d\ude00', 'test_secret') => '837da296d05c4fe31f61d5d7ead035099d9585a5bcde87de952012a78f0b0c43
|
|
14
|
-
*/
|
|
15
|
-
abstract computeHMACSignature(payload: string, secret: string): string;
|
|
16
|
-
/**
|
|
17
|
-
* Asynchronous version of `computeHMACSignature`. Some implementations may
|
|
18
|
-
* only allow support async signature computation.
|
|
19
|
-
*
|
|
20
|
-
* Computes a SHA-256 HMAC given a secret and a payload (encoded in UTF-8).
|
|
21
|
-
* The output HMAC should be encoded in hexadecimal.
|
|
22
|
-
*
|
|
23
|
-
* Sample values for implementations:
|
|
24
|
-
* - computeHMACSignature('', 'test_secret') => 'f7f9bd47fb987337b5796fdc1fdb9ba221d0d5396814bfcaf9521f43fd8927fd'
|
|
25
|
-
* - computeHMACSignature('\ud83d\ude00', 'test_secret') => '837da296d05c4fe31f61d5d7ead035099d9585a5bcde87de952012a78f0b0c43
|
|
26
|
-
*/
|
|
27
|
-
abstract computeHMACSignatureAsync(payload: string, secret: string): Promise<string>;
|
|
28
|
-
/**
|
|
29
|
-
* Cryptographically determine whether two signatures are equal
|
|
30
|
-
*/
|
|
31
|
-
abstract secureCompare(stringA: string, stringB: string): Promise<boolean>;
|
|
32
|
-
}
|
|
@@ -1,13 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
exports.CryptoProvider = void 0;
|
|
4
|
-
/**
|
|
5
|
-
* Interface encapsulating the various crypto computations used by the library,
|
|
6
|
-
* allowing pluggable underlying crypto implementations.
|
|
7
|
-
*/
|
|
8
|
-
class CryptoProvider {
|
|
9
|
-
constructor() {
|
|
10
|
-
this.encoder = new TextEncoder();
|
|
11
|
-
}
|
|
12
|
-
}
|
|
13
|
-
exports.CryptoProvider = CryptoProvider;
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
export {};
|
|
@@ -1,57 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {
|
|
3
|
-
function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); }
|
|
4
|
-
return new (P || (P = Promise))(function (resolve, reject) {
|
|
5
|
-
function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }
|
|
6
|
-
function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } }
|
|
7
|
-
function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); }
|
|
8
|
-
step((generator = generator.apply(thisArg, _arguments || [])).next());
|
|
9
|
-
});
|
|
10
|
-
};
|
|
11
|
-
var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
12
|
-
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
13
|
-
};
|
|
14
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
15
|
-
const crypto_1 = __importDefault(require("crypto"));
|
|
16
|
-
const NodeCryptoProvider_1 = require("./NodeCryptoProvider");
|
|
17
|
-
const SubtleCryptoProvider_1 = require("./SubtleCryptoProvider");
|
|
18
|
-
const webhook_json_1 = __importDefault(require("../../webhooks/fixtures/webhook.json"));
|
|
19
|
-
const SignatureProvider_1 = require("./SignatureProvider");
|
|
20
|
-
describe('CryptoProvider', () => {
|
|
21
|
-
let payload;
|
|
22
|
-
let secret;
|
|
23
|
-
let timestamp;
|
|
24
|
-
let signatureHash;
|
|
25
|
-
beforeEach(() => {
|
|
26
|
-
payload = webhook_json_1.default;
|
|
27
|
-
secret = 'secret';
|
|
28
|
-
timestamp = Date.now() * 1000;
|
|
29
|
-
const unhashedString = `${timestamp}.${JSON.stringify(payload)}`;
|
|
30
|
-
signatureHash = crypto_1.default
|
|
31
|
-
.createHmac('sha256', secret)
|
|
32
|
-
.update(unhashedString)
|
|
33
|
-
.digest()
|
|
34
|
-
.toString('hex');
|
|
35
|
-
});
|
|
36
|
-
describe('when computing HMAC signature', () => {
|
|
37
|
-
it('returns the same for the Node crypto and Web Crypto versions', () => __awaiter(void 0, void 0, void 0, function* () {
|
|
38
|
-
const nodeCryptoProvider = new NodeCryptoProvider_1.NodeCryptoProvider();
|
|
39
|
-
const subtleCryptoProvider = new SubtleCryptoProvider_1.SubtleCryptoProvider();
|
|
40
|
-
const stringifiedPayload = JSON.stringify(payload);
|
|
41
|
-
const payloadHMAC = `${timestamp}.${stringifiedPayload}`;
|
|
42
|
-
const nodeCompare = yield nodeCryptoProvider.computeHMACSignatureAsync(payloadHMAC, secret);
|
|
43
|
-
const subtleCompare = yield subtleCryptoProvider.computeHMACSignatureAsync(payloadHMAC, secret);
|
|
44
|
-
expect(nodeCompare).toEqual(subtleCompare);
|
|
45
|
-
}));
|
|
46
|
-
});
|
|
47
|
-
describe('when securely comparing', () => {
|
|
48
|
-
it('returns the same for the Node crypto and Web Crypto versions', () => __awaiter(void 0, void 0, void 0, function* () {
|
|
49
|
-
const nodeCryptoProvider = new NodeCryptoProvider_1.NodeCryptoProvider();
|
|
50
|
-
const subtleCryptoProvider = new SubtleCryptoProvider_1.SubtleCryptoProvider();
|
|
51
|
-
const signatureProvider = new SignatureProvider_1.SignatureProvider(subtleCryptoProvider);
|
|
52
|
-
const signature = yield signatureProvider.computeSignature(timestamp, payload, secret);
|
|
53
|
-
expect(nodeCryptoProvider.secureCompare(signature, signatureHash)).toEqual(subtleCryptoProvider.secureCompare(signature, signatureHash));
|
|
54
|
-
expect(nodeCryptoProvider.secureCompare(signature, 'foo')).toEqual(subtleCryptoProvider.secureCompare(signature, 'foo'));
|
|
55
|
-
}));
|
|
56
|
-
});
|
|
57
|
-
});
|
|
@@ -1,12 +0,0 @@
|
|
|
1
|
-
import { CryptoProvider } from './CryptoProvider';
|
|
2
|
-
/**
|
|
3
|
-
* `CryptoProvider which uses the Node `crypto` package for its computations.
|
|
4
|
-
*/
|
|
5
|
-
export declare class NodeCryptoProvider extends CryptoProvider {
|
|
6
|
-
/** @override */
|
|
7
|
-
computeHMACSignature(payload: string, secret: string): string;
|
|
8
|
-
/** @override */
|
|
9
|
-
computeHMACSignatureAsync(payload: string, secret: string): Promise<string>;
|
|
10
|
-
/** @override */
|
|
11
|
-
secureCompare(stringA: string, stringB: string): Promise<boolean>;
|
|
12
|
-
}
|
|
@@ -1,73 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
3
|
-
if (k2 === undefined) k2 = k;
|
|
4
|
-
var desc = Object.getOwnPropertyDescriptor(m, k);
|
|
5
|
-
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
|
|
6
|
-
desc = { enumerable: true, get: function() { return m[k]; } };
|
|
7
|
-
}
|
|
8
|
-
Object.defineProperty(o, k2, desc);
|
|
9
|
-
}) : (function(o, m, k, k2) {
|
|
10
|
-
if (k2 === undefined) k2 = k;
|
|
11
|
-
o[k2] = m[k];
|
|
12
|
-
}));
|
|
13
|
-
var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
|
|
14
|
-
Object.defineProperty(o, "default", { enumerable: true, value: v });
|
|
15
|
-
}) : function(o, v) {
|
|
16
|
-
o["default"] = v;
|
|
17
|
-
});
|
|
18
|
-
var __importStar = (this && this.__importStar) || function (mod) {
|
|
19
|
-
if (mod && mod.__esModule) return mod;
|
|
20
|
-
var result = {};
|
|
21
|
-
if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
|
|
22
|
-
__setModuleDefault(result, mod);
|
|
23
|
-
return result;
|
|
24
|
-
};
|
|
25
|
-
var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {
|
|
26
|
-
function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); }
|
|
27
|
-
return new (P || (P = Promise))(function (resolve, reject) {
|
|
28
|
-
function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }
|
|
29
|
-
function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } }
|
|
30
|
-
function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); }
|
|
31
|
-
step((generator = generator.apply(thisArg, _arguments || [])).next());
|
|
32
|
-
});
|
|
33
|
-
};
|
|
34
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
35
|
-
exports.NodeCryptoProvider = void 0;
|
|
36
|
-
const crypto = __importStar(require("crypto"));
|
|
37
|
-
const CryptoProvider_1 = require("./CryptoProvider");
|
|
38
|
-
/**
|
|
39
|
-
* `CryptoProvider which uses the Node `crypto` package for its computations.
|
|
40
|
-
*/
|
|
41
|
-
class NodeCryptoProvider extends CryptoProvider_1.CryptoProvider {
|
|
42
|
-
/** @override */
|
|
43
|
-
computeHMACSignature(payload, secret) {
|
|
44
|
-
return crypto
|
|
45
|
-
.createHmac('sha256', secret)
|
|
46
|
-
.update(payload, 'utf8')
|
|
47
|
-
.digest('hex');
|
|
48
|
-
}
|
|
49
|
-
/** @override */
|
|
50
|
-
computeHMACSignatureAsync(payload, secret) {
|
|
51
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
52
|
-
const signature = yield this.computeHMACSignature(payload, secret);
|
|
53
|
-
return signature;
|
|
54
|
-
});
|
|
55
|
-
}
|
|
56
|
-
/** @override */
|
|
57
|
-
secureCompare(stringA, stringB) {
|
|
58
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
59
|
-
const bufferA = this.encoder.encode(stringA);
|
|
60
|
-
const bufferB = this.encoder.encode(stringB);
|
|
61
|
-
if (bufferA.length !== bufferB.length) {
|
|
62
|
-
return false;
|
|
63
|
-
}
|
|
64
|
-
// Generate a random key for HMAC
|
|
65
|
-
const key = crypto.randomBytes(32); // Generates a 256-bit key
|
|
66
|
-
const hmacA = crypto.createHmac('sha256', key).update(bufferA).digest();
|
|
67
|
-
const hmacB = crypto.createHmac('sha256', key).update(bufferB).digest();
|
|
68
|
-
// Perform a constant time comparison
|
|
69
|
-
return crypto.timingSafeEqual(hmacA, hmacB);
|
|
70
|
-
});
|
|
71
|
-
}
|
|
72
|
-
}
|
|
73
|
-
exports.NodeCryptoProvider = NodeCryptoProvider;
|
|
@@ -1,13 +0,0 @@
|
|
|
1
|
-
import { CryptoProvider } from './CryptoProvider';
|
|
2
|
-
export declare class SignatureProvider {
|
|
3
|
-
private cryptoProvider;
|
|
4
|
-
constructor(cryptoProvider: CryptoProvider);
|
|
5
|
-
verifyHeader({ payload, sigHeader, secret, tolerance, }: {
|
|
6
|
-
payload: any;
|
|
7
|
-
sigHeader: string;
|
|
8
|
-
secret: string;
|
|
9
|
-
tolerance?: number;
|
|
10
|
-
}): Promise<boolean>;
|
|
11
|
-
getTimestampAndSignatureHash(sigHeader: string): [string, string];
|
|
12
|
-
computeSignature(timestamp: any, payload: any, secret: string): Promise<string>;
|
|
13
|
-
}
|
|
@@ -1,53 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {
|
|
3
|
-
function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); }
|
|
4
|
-
return new (P || (P = Promise))(function (resolve, reject) {
|
|
5
|
-
function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }
|
|
6
|
-
function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } }
|
|
7
|
-
function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); }
|
|
8
|
-
step((generator = generator.apply(thisArg, _arguments || [])).next());
|
|
9
|
-
});
|
|
10
|
-
};
|
|
11
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
12
|
-
exports.SignatureProvider = void 0;
|
|
13
|
-
const exceptions_1 = require("../exceptions");
|
|
14
|
-
class SignatureProvider {
|
|
15
|
-
constructor(cryptoProvider) {
|
|
16
|
-
this.cryptoProvider = cryptoProvider;
|
|
17
|
-
}
|
|
18
|
-
verifyHeader({ payload, sigHeader, secret, tolerance = 180000, }) {
|
|
19
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
20
|
-
const [timestamp, signatureHash] = this.getTimestampAndSignatureHash(sigHeader);
|
|
21
|
-
if (!signatureHash || Object.keys(signatureHash).length === 0) {
|
|
22
|
-
throw new exceptions_1.SignatureVerificationException('No signature hash found with expected scheme v1');
|
|
23
|
-
}
|
|
24
|
-
if (parseInt(timestamp, 10) < Date.now() - tolerance) {
|
|
25
|
-
throw new exceptions_1.SignatureVerificationException('Timestamp outside the tolerance zone');
|
|
26
|
-
}
|
|
27
|
-
const expectedSig = yield this.computeSignature(timestamp, payload, secret);
|
|
28
|
-
if ((yield this.cryptoProvider.secureCompare(expectedSig, signatureHash)) ===
|
|
29
|
-
false) {
|
|
30
|
-
throw new exceptions_1.SignatureVerificationException('Signature hash does not match the expected signature hash for payload');
|
|
31
|
-
}
|
|
32
|
-
return true;
|
|
33
|
-
});
|
|
34
|
-
}
|
|
35
|
-
getTimestampAndSignatureHash(sigHeader) {
|
|
36
|
-
const signature = sigHeader;
|
|
37
|
-
const [t, v1] = signature.split(',');
|
|
38
|
-
if (typeof t === 'undefined' || typeof v1 === 'undefined') {
|
|
39
|
-
throw new exceptions_1.SignatureVerificationException('Signature or timestamp missing');
|
|
40
|
-
}
|
|
41
|
-
const { 1: timestamp } = t.split('=');
|
|
42
|
-
const { 1: signatureHash } = v1.split('=');
|
|
43
|
-
return [timestamp, signatureHash];
|
|
44
|
-
}
|
|
45
|
-
computeSignature(timestamp, payload, secret) {
|
|
46
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
47
|
-
payload = JSON.stringify(payload);
|
|
48
|
-
const signedPayload = `${timestamp}.${payload}`;
|
|
49
|
-
return yield this.cryptoProvider.computeHMACSignatureAsync(signedPayload, secret);
|
|
50
|
-
});
|
|
51
|
-
}
|
|
52
|
-
}
|
|
53
|
-
exports.SignatureProvider = SignatureProvider;
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
export {};
|
|
@@ -1,66 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {
|
|
3
|
-
function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); }
|
|
4
|
-
return new (P || (P = Promise))(function (resolve, reject) {
|
|
5
|
-
function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }
|
|
6
|
-
function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } }
|
|
7
|
-
function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); }
|
|
8
|
-
step((generator = generator.apply(thisArg, _arguments || [])).next());
|
|
9
|
-
});
|
|
10
|
-
};
|
|
11
|
-
var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
12
|
-
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
13
|
-
};
|
|
14
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
15
|
-
const crypto_1 = __importDefault(require("crypto"));
|
|
16
|
-
const SubtleCryptoProvider_1 = require("./SubtleCryptoProvider");
|
|
17
|
-
const webhook_json_1 = __importDefault(require("../../webhooks/fixtures/webhook.json"));
|
|
18
|
-
const SignatureProvider_1 = require("./SignatureProvider");
|
|
19
|
-
describe('SignatureProvider', () => {
|
|
20
|
-
let payload;
|
|
21
|
-
let secret;
|
|
22
|
-
let timestamp;
|
|
23
|
-
let signatureHash;
|
|
24
|
-
const signatureProvider = new SignatureProvider_1.SignatureProvider(new SubtleCryptoProvider_1.SubtleCryptoProvider());
|
|
25
|
-
beforeEach(() => {
|
|
26
|
-
payload = webhook_json_1.default;
|
|
27
|
-
secret = 'secret';
|
|
28
|
-
timestamp = Date.now() * 1000;
|
|
29
|
-
const unhashedString = `${timestamp}.${JSON.stringify(payload)}`;
|
|
30
|
-
signatureHash = crypto_1.default
|
|
31
|
-
.createHmac('sha256', secret)
|
|
32
|
-
.update(unhashedString)
|
|
33
|
-
.digest()
|
|
34
|
-
.toString('hex');
|
|
35
|
-
});
|
|
36
|
-
describe('verifyHeader', () => {
|
|
37
|
-
it('returns true when the signature is valid', () => __awaiter(void 0, void 0, void 0, function* () {
|
|
38
|
-
const sigHeader = `t=${timestamp}, v1=${signatureHash}`;
|
|
39
|
-
const options = { payload, sigHeader, secret };
|
|
40
|
-
const result = yield signatureProvider.verifyHeader(options);
|
|
41
|
-
expect(result).toBeTruthy();
|
|
42
|
-
}));
|
|
43
|
-
});
|
|
44
|
-
describe('getTimestampAndSignatureHash', () => {
|
|
45
|
-
it('returns the timestamp and signature when the signature is valid', () => {
|
|
46
|
-
const sigHeader = `t=${timestamp}, v1=${signatureHash}`;
|
|
47
|
-
const timestampAndSignature = signatureProvider.getTimestampAndSignatureHash(sigHeader);
|
|
48
|
-
expect(timestampAndSignature).toEqual([
|
|
49
|
-
timestamp.toString(),
|
|
50
|
-
signatureHash,
|
|
51
|
-
]);
|
|
52
|
-
});
|
|
53
|
-
});
|
|
54
|
-
describe('computeSignature', () => {
|
|
55
|
-
it('returns the computed signature', () => __awaiter(void 0, void 0, void 0, function* () {
|
|
56
|
-
const signature = yield signatureProvider.computeSignature(timestamp, payload, secret);
|
|
57
|
-
expect(signature).toEqual(signatureHash);
|
|
58
|
-
}));
|
|
59
|
-
});
|
|
60
|
-
describe('when in an environment that supports SubtleCrypto', () => {
|
|
61
|
-
it('automatically uses the subtle crypto library', () => {
|
|
62
|
-
// tslint:disable-next-line
|
|
63
|
-
expect(signatureProvider['cryptoProvider']).toBeInstanceOf(SubtleCryptoProvider_1.SubtleCryptoProvider);
|
|
64
|
-
});
|
|
65
|
-
});
|
|
66
|
-
});
|
|
@@ -1,15 +0,0 @@
|
|
|
1
|
-
import { CryptoProvider } from './CryptoProvider';
|
|
2
|
-
/**
|
|
3
|
-
* `CryptoProvider which uses the SubtleCrypto interface of the Web Crypto API.
|
|
4
|
-
*
|
|
5
|
-
* This only supports asynchronous operations.
|
|
6
|
-
*/
|
|
7
|
-
export declare class SubtleCryptoProvider extends CryptoProvider {
|
|
8
|
-
subtleCrypto: SubtleCrypto;
|
|
9
|
-
constructor(subtleCrypto?: SubtleCrypto);
|
|
10
|
-
computeHMACSignature(_payload: string, _secret: string): string;
|
|
11
|
-
/** @override */
|
|
12
|
-
computeHMACSignatureAsync(payload: string, secret: string): Promise<string>;
|
|
13
|
-
/** @override */
|
|
14
|
-
secureCompare(stringA: string, stringB: string): Promise<boolean>;
|
|
15
|
-
}
|
|
@@ -1,75 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {
|
|
3
|
-
function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); }
|
|
4
|
-
return new (P || (P = Promise))(function (resolve, reject) {
|
|
5
|
-
function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }
|
|
6
|
-
function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } }
|
|
7
|
-
function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); }
|
|
8
|
-
step((generator = generator.apply(thisArg, _arguments || [])).next());
|
|
9
|
-
});
|
|
10
|
-
};
|
|
11
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
12
|
-
exports.SubtleCryptoProvider = void 0;
|
|
13
|
-
const CryptoProvider_1 = require("./CryptoProvider");
|
|
14
|
-
/**
|
|
15
|
-
* `CryptoProvider which uses the SubtleCrypto interface of the Web Crypto API.
|
|
16
|
-
*
|
|
17
|
-
* This only supports asynchronous operations.
|
|
18
|
-
*/
|
|
19
|
-
class SubtleCryptoProvider extends CryptoProvider_1.CryptoProvider {
|
|
20
|
-
constructor(subtleCrypto) {
|
|
21
|
-
super();
|
|
22
|
-
// If no subtle crypto is interface, default to the global namespace. This
|
|
23
|
-
// is to allow custom interfaces (eg. using the Node webcrypto interface in
|
|
24
|
-
// tests).
|
|
25
|
-
this.subtleCrypto = subtleCrypto || crypto.subtle;
|
|
26
|
-
}
|
|
27
|
-
computeHMACSignature(_payload, _secret) {
|
|
28
|
-
throw new Error('SubleCryptoProvider cannot be used in a synchronous context.');
|
|
29
|
-
}
|
|
30
|
-
/** @override */
|
|
31
|
-
computeHMACSignatureAsync(payload, secret) {
|
|
32
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
33
|
-
const encoder = new TextEncoder();
|
|
34
|
-
const key = yield this.subtleCrypto.importKey('raw', encoder.encode(secret), {
|
|
35
|
-
name: 'HMAC',
|
|
36
|
-
hash: { name: 'SHA-256' },
|
|
37
|
-
}, false, ['sign']);
|
|
38
|
-
const signatureBuffer = yield this.subtleCrypto.sign('hmac', key, encoder.encode(payload));
|
|
39
|
-
// crypto.subtle returns the signature in base64 format. This must be
|
|
40
|
-
// encoded in hex to match the CryptoProvider contract. We map each byte in
|
|
41
|
-
// the buffer to its corresponding hex octet and then combine into a string.
|
|
42
|
-
const signatureBytes = new Uint8Array(signatureBuffer);
|
|
43
|
-
const signatureHexCodes = new Array(signatureBytes.length);
|
|
44
|
-
for (let i = 0; i < signatureBytes.length; i++) {
|
|
45
|
-
signatureHexCodes[i] = byteHexMapping[signatureBytes[i]];
|
|
46
|
-
}
|
|
47
|
-
return signatureHexCodes.join('');
|
|
48
|
-
});
|
|
49
|
-
}
|
|
50
|
-
/** @override */
|
|
51
|
-
secureCompare(stringA, stringB) {
|
|
52
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
53
|
-
const bufferA = this.encoder.encode(stringA);
|
|
54
|
-
const bufferB = this.encoder.encode(stringB);
|
|
55
|
-
if (bufferA.length !== bufferB.length) {
|
|
56
|
-
return false;
|
|
57
|
-
}
|
|
58
|
-
const algorithm = { name: 'HMAC', hash: 'SHA-256' };
|
|
59
|
-
const key = (yield crypto.subtle.generateKey(algorithm, false, [
|
|
60
|
-
'sign',
|
|
61
|
-
'verify',
|
|
62
|
-
]));
|
|
63
|
-
const hmac = yield crypto.subtle.sign(algorithm, key, bufferA);
|
|
64
|
-
const equal = yield crypto.subtle.verify(algorithm, key, hmac, bufferB);
|
|
65
|
-
return equal;
|
|
66
|
-
});
|
|
67
|
-
}
|
|
68
|
-
}
|
|
69
|
-
exports.SubtleCryptoProvider = SubtleCryptoProvider;
|
|
70
|
-
// Cached mapping of byte to hex representation. We do this once to avoid re-
|
|
71
|
-
// computing every time we need to convert the result of a signature to hex.
|
|
72
|
-
const byteHexMapping = new Array(256);
|
|
73
|
-
for (let i = 0; i < byteHexMapping.length; i++) {
|
|
74
|
-
byteHexMapping[i] = i.toString(16).padStart(2, '0');
|
|
75
|
-
}
|
|
@@ -1,20 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
3
|
-
if (k2 === undefined) k2 = k;
|
|
4
|
-
var desc = Object.getOwnPropertyDescriptor(m, k);
|
|
5
|
-
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
|
|
6
|
-
desc = { enumerable: true, get: function() { return m[k]; } };
|
|
7
|
-
}
|
|
8
|
-
Object.defineProperty(o, k2, desc);
|
|
9
|
-
}) : (function(o, m, k, k2) {
|
|
10
|
-
if (k2 === undefined) k2 = k;
|
|
11
|
-
o[k2] = m[k];
|
|
12
|
-
}));
|
|
13
|
-
var __exportStar = (this && this.__exportStar) || function(m, exports) {
|
|
14
|
-
for (var p in m) if (p !== "default" && !Object.prototype.hasOwnProperty.call(exports, p)) __createBinding(exports, m, p);
|
|
15
|
-
};
|
|
16
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
17
|
-
__exportStar(require("./NodeCryptoProvider"), exports);
|
|
18
|
-
__exportStar(require("./SubtleCryptoProvider"), exports);
|
|
19
|
-
__exportStar(require("./CryptoProvider"), exports);
|
|
20
|
-
__exportStar(require("./SignatureProvider"), exports);
|
package/lib/common/net/index.js
DELETED
|
@@ -1,31 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
3
|
-
if (k2 === undefined) k2 = k;
|
|
4
|
-
var desc = Object.getOwnPropertyDescriptor(m, k);
|
|
5
|
-
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
|
|
6
|
-
desc = { enumerable: true, get: function() { return m[k]; } };
|
|
7
|
-
}
|
|
8
|
-
Object.defineProperty(o, k2, desc);
|
|
9
|
-
}) : (function(o, m, k, k2) {
|
|
10
|
-
if (k2 === undefined) k2 = k;
|
|
11
|
-
o[k2] = m[k];
|
|
12
|
-
}));
|
|
13
|
-
var __exportStar = (this && this.__exportStar) || function(m, exports) {
|
|
14
|
-
for (var p in m) if (p !== "default" && !Object.prototype.hasOwnProperty.call(exports, p)) __createBinding(exports, m, p);
|
|
15
|
-
};
|
|
16
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
17
|
-
exports.createHttpClient = void 0;
|
|
18
|
-
const fetch_client_1 = require("./fetch-client");
|
|
19
|
-
const node_client_1 = require("./node-client");
|
|
20
|
-
function createHttpClient(baseURL, options, fetchFn) {
|
|
21
|
-
if (typeof fetch !== 'undefined' || typeof fetchFn !== 'undefined') {
|
|
22
|
-
return new fetch_client_1.FetchHttpClient(baseURL, options, fetchFn);
|
|
23
|
-
}
|
|
24
|
-
else {
|
|
25
|
-
return new node_client_1.NodeHttpClient(baseURL, options);
|
|
26
|
-
}
|
|
27
|
-
}
|
|
28
|
-
exports.createHttpClient = createHttpClient;
|
|
29
|
-
__exportStar(require("./fetch-client"), exports);
|
|
30
|
-
__exportStar(require("./node-client"), exports);
|
|
31
|
-
__exportStar(require("./http-client"), exports);
|
|
@@ -1,10 +0,0 @@
|
|
|
1
|
-
/**
|
|
2
|
-
* Indicates that code is unreachable.
|
|
3
|
-
*
|
|
4
|
-
* This can be used for exhaustiveness checks in situations where the compiler
|
|
5
|
-
* would not otherwise check for exhaustiveness.
|
|
6
|
-
*
|
|
7
|
-
* If the determination that the code is unreachable proves incorrect, an
|
|
8
|
-
* exception is thrown.
|
|
9
|
-
*/
|
|
10
|
-
export declare const unreachable: (condition: never, message?: string) => never;
|
|
@@ -1,18 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
exports.unreachable = void 0;
|
|
4
|
-
/**
|
|
5
|
-
* Indicates that code is unreachable.
|
|
6
|
-
*
|
|
7
|
-
* This can be used for exhaustiveness checks in situations where the compiler
|
|
8
|
-
* would not otherwise check for exhaustiveness.
|
|
9
|
-
*
|
|
10
|
-
* If the determination that the code is unreachable proves incorrect, an
|
|
11
|
-
* exception is thrown.
|
|
12
|
-
*/
|
|
13
|
-
const unreachable = (condition,
|
|
14
|
-
// eslint-disable-next-line @typescript-eslint/restrict-template-expressions
|
|
15
|
-
message = `Entered unreachable code. Received '${condition}'.`) => {
|
|
16
|
-
throw new TypeError(message);
|
|
17
|
-
};
|
|
18
|
-
exports.unreachable = unreachable;
|
|
File without changes
|