@workos-inc/node 7.31.0-beta.actions1 → 7.31.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (44) hide show
  1. package/lib/index.d.ts +0 -3
  2. package/lib/index.js +0 -12
  3. package/lib/index.worker.d.ts +0 -3
  4. package/lib/index.worker.js +0 -6
  5. package/lib/user-management/interfaces/authentication-response.interface.d.ts +3 -0
  6. package/lib/user-management/interfaces/index.d.ts +2 -3
  7. package/lib/user-management/interfaces/index.js +2 -3
  8. package/lib/user-management/interfaces/oauth-tokens.interface.d.ts +12 -0
  9. package/lib/user-management/serializers/authentication-response.serializer.js +3 -2
  10. package/lib/user-management/serializers/oauth-tokens.serializer.d.ts +2 -0
  11. package/lib/user-management/serializers/oauth-tokens.serializer.js +12 -0
  12. package/lib/user-management/user-management.spec.js +28 -0
  13. package/lib/webhooks/webhooks.d.ts +9 -9
  14. package/lib/webhooks/webhooks.js +36 -11
  15. package/lib/webhooks/webhooks.spec.js +46 -23
  16. package/lib/workos.d.ts +0 -3
  17. package/lib/workos.js +1 -6
  18. package/lib/workos.spec.js +1 -5
  19. package/package.json +1 -1
  20. package/lib/actions/actions.d.ts +0 -19
  21. package/lib/actions/actions.js +0 -53
  22. package/lib/actions/actions.spec.d.ts +0 -1
  23. package/lib/actions/actions.spec.js +0 -78
  24. package/lib/actions/fixtures/action-context.json +0 -39
  25. package/lib/actions/interfaces/response-payload.d.ts +0 -23
  26. package/lib/common/crypto/CryptoProvider.d.ts +0 -32
  27. package/lib/common/crypto/CryptoProvider.js +0 -13
  28. package/lib/common/crypto/CryptoProvider.spec.d.ts +0 -1
  29. package/lib/common/crypto/CryptoProvider.spec.js +0 -57
  30. package/lib/common/crypto/NodeCryptoProvider.d.ts +0 -12
  31. package/lib/common/crypto/NodeCryptoProvider.js +0 -73
  32. package/lib/common/crypto/SignatureProvider.d.ts +0 -13
  33. package/lib/common/crypto/SignatureProvider.js +0 -53
  34. package/lib/common/crypto/SignatureProvider.spec.d.ts +0 -1
  35. package/lib/common/crypto/SignatureProvider.spec.js +0 -66
  36. package/lib/common/crypto/SubtleCryptoProvider.d.ts +0 -15
  37. package/lib/common/crypto/SubtleCryptoProvider.js +0 -75
  38. package/lib/common/crypto/index.d.ts +0 -4
  39. package/lib/common/crypto/index.js +0 -20
  40. package/lib/common/net/index.d.ts +0 -5
  41. package/lib/common/net/index.js +0 -31
  42. package/lib/common/utils/unreachable.d.ts +0 -10
  43. package/lib/common/utils/unreachable.js +0 -18
  44. /package/lib/{actions/interfaces/response-payload.js → user-management/interfaces/oauth-tokens.interface.js} +0 -0
@@ -1,39 +0,0 @@
1
- {
2
- "user": {
3
- "object": "user",
4
- "id": "01JATCHZVEC5EPANDPEZVM68Y9",
5
- "email": "jane@foocorp.com",
6
- "first_name": "Jane",
7
- "last_name": "Doe",
8
- "email_verified": true,
9
- "profile_picture_url": "https://example.com/jane.jpg",
10
- "created_at": "2024-10-22T17:12:50.746Z",
11
- "updated_at": "2024-10-22T17:12:50.746Z"
12
- },
13
- "ip_address": "50.141.123.10",
14
- "user_agent": "Mozilla/5.0",
15
- "issuer": "test",
16
- "object": "authentication_action_context",
17
- "organization": {
18
- "object": "organization",
19
- "id": "01JATCMZJY26PQ59XT9BNT0FNN",
20
- "name": "Foo Corp",
21
- "allow_profiles_outside_organization": false,
22
- "domains": [],
23
- "lookup_key": "my-key",
24
- "created_at": "2024-10-22T17:12:50.746Z",
25
- "updated_at": "2024-10-22T17:12:50.746Z"
26
- },
27
- "organization_membership": {
28
- "object": "organization_membership",
29
- "id": "01JATCNVYCHT1SZGENR4QTXKRK",
30
- "user_id": "01JATCHZVEC5EPANDPEZVM68Y9",
31
- "organization_id": "01JATCMZJY26PQ59XT9BNT0FNN",
32
- "role": {
33
- "slug": "member"
34
- },
35
- "status": "active",
36
- "created_at": "2024-10-22T17:12:50.746Z",
37
- "updated_at": "2024-10-22T17:12:50.746Z"
38
- }
39
- }
@@ -1,23 +0,0 @@
1
- export interface ResponsePayload {
2
- timestamp: number;
3
- verdict?: 'Allow' | 'Deny';
4
- errorMessage?: string;
5
- }
6
- interface AllowResponseData {
7
- verdict: 'Allow';
8
- }
9
- interface DenyResponseData {
10
- verdict: 'Deny';
11
- errorMessage?: string;
12
- }
13
- export type AuthenticationActionResponseData = (AllowResponseData & {
14
- type: 'authentication';
15
- }) | (DenyResponseData & {
16
- type: 'authentication';
17
- });
18
- export type UserRegistrationActionResponseData = (AllowResponseData & {
19
- type: 'user_registration';
20
- }) | (DenyResponseData & {
21
- type: 'user_registration';
22
- });
23
- export {};
@@ -1,32 +0,0 @@
1
- /**
2
- * Interface encapsulating the various crypto computations used by the library,
3
- * allowing pluggable underlying crypto implementations.
4
- */
5
- export declare abstract class CryptoProvider {
6
- encoder: TextEncoder;
7
- /**
8
- * Computes a SHA-256 HMAC given a secret and a payload (encoded in UTF-8).
9
- * The output HMAC should be encoded in hexadecimal.
10
- *
11
- * Sample values for implementations:
12
- * - computeHMACSignature('', 'test_secret') => 'f7f9bd47fb987337b5796fdc1fdb9ba221d0d5396814bfcaf9521f43fd8927fd'
13
- * - computeHMACSignature('\ud83d\ude00', 'test_secret') => '837da296d05c4fe31f61d5d7ead035099d9585a5bcde87de952012a78f0b0c43
14
- */
15
- abstract computeHMACSignature(payload: string, secret: string): string;
16
- /**
17
- * Asynchronous version of `computeHMACSignature`. Some implementations may
18
- * only allow support async signature computation.
19
- *
20
- * Computes a SHA-256 HMAC given a secret and a payload (encoded in UTF-8).
21
- * The output HMAC should be encoded in hexadecimal.
22
- *
23
- * Sample values for implementations:
24
- * - computeHMACSignature('', 'test_secret') => 'f7f9bd47fb987337b5796fdc1fdb9ba221d0d5396814bfcaf9521f43fd8927fd'
25
- * - computeHMACSignature('\ud83d\ude00', 'test_secret') => '837da296d05c4fe31f61d5d7ead035099d9585a5bcde87de952012a78f0b0c43
26
- */
27
- abstract computeHMACSignatureAsync(payload: string, secret: string): Promise<string>;
28
- /**
29
- * Cryptographically determine whether two signatures are equal
30
- */
31
- abstract secureCompare(stringA: string, stringB: string): Promise<boolean>;
32
- }
@@ -1,13 +0,0 @@
1
- "use strict";
2
- Object.defineProperty(exports, "__esModule", { value: true });
3
- exports.CryptoProvider = void 0;
4
- /**
5
- * Interface encapsulating the various crypto computations used by the library,
6
- * allowing pluggable underlying crypto implementations.
7
- */
8
- class CryptoProvider {
9
- constructor() {
10
- this.encoder = new TextEncoder();
11
- }
12
- }
13
- exports.CryptoProvider = CryptoProvider;
@@ -1 +0,0 @@
1
- export {};
@@ -1,57 +0,0 @@
1
- "use strict";
2
- var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {
3
- function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); }
4
- return new (P || (P = Promise))(function (resolve, reject) {
5
- function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }
6
- function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } }
7
- function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); }
8
- step((generator = generator.apply(thisArg, _arguments || [])).next());
9
- });
10
- };
11
- var __importDefault = (this && this.__importDefault) || function (mod) {
12
- return (mod && mod.__esModule) ? mod : { "default": mod };
13
- };
14
- Object.defineProperty(exports, "__esModule", { value: true });
15
- const crypto_1 = __importDefault(require("crypto"));
16
- const NodeCryptoProvider_1 = require("./NodeCryptoProvider");
17
- const SubtleCryptoProvider_1 = require("./SubtleCryptoProvider");
18
- const webhook_json_1 = __importDefault(require("../../webhooks/fixtures/webhook.json"));
19
- const SignatureProvider_1 = require("./SignatureProvider");
20
- describe('CryptoProvider', () => {
21
- let payload;
22
- let secret;
23
- let timestamp;
24
- let signatureHash;
25
- beforeEach(() => {
26
- payload = webhook_json_1.default;
27
- secret = 'secret';
28
- timestamp = Date.now() * 1000;
29
- const unhashedString = `${timestamp}.${JSON.stringify(payload)}`;
30
- signatureHash = crypto_1.default
31
- .createHmac('sha256', secret)
32
- .update(unhashedString)
33
- .digest()
34
- .toString('hex');
35
- });
36
- describe('when computing HMAC signature', () => {
37
- it('returns the same for the Node crypto and Web Crypto versions', () => __awaiter(void 0, void 0, void 0, function* () {
38
- const nodeCryptoProvider = new NodeCryptoProvider_1.NodeCryptoProvider();
39
- const subtleCryptoProvider = new SubtleCryptoProvider_1.SubtleCryptoProvider();
40
- const stringifiedPayload = JSON.stringify(payload);
41
- const payloadHMAC = `${timestamp}.${stringifiedPayload}`;
42
- const nodeCompare = yield nodeCryptoProvider.computeHMACSignatureAsync(payloadHMAC, secret);
43
- const subtleCompare = yield subtleCryptoProvider.computeHMACSignatureAsync(payloadHMAC, secret);
44
- expect(nodeCompare).toEqual(subtleCompare);
45
- }));
46
- });
47
- describe('when securely comparing', () => {
48
- it('returns the same for the Node crypto and Web Crypto versions', () => __awaiter(void 0, void 0, void 0, function* () {
49
- const nodeCryptoProvider = new NodeCryptoProvider_1.NodeCryptoProvider();
50
- const subtleCryptoProvider = new SubtleCryptoProvider_1.SubtleCryptoProvider();
51
- const signatureProvider = new SignatureProvider_1.SignatureProvider(subtleCryptoProvider);
52
- const signature = yield signatureProvider.computeSignature(timestamp, payload, secret);
53
- expect(nodeCryptoProvider.secureCompare(signature, signatureHash)).toEqual(subtleCryptoProvider.secureCompare(signature, signatureHash));
54
- expect(nodeCryptoProvider.secureCompare(signature, 'foo')).toEqual(subtleCryptoProvider.secureCompare(signature, 'foo'));
55
- }));
56
- });
57
- });
@@ -1,12 +0,0 @@
1
- import { CryptoProvider } from './CryptoProvider';
2
- /**
3
- * `CryptoProvider which uses the Node `crypto` package for its computations.
4
- */
5
- export declare class NodeCryptoProvider extends CryptoProvider {
6
- /** @override */
7
- computeHMACSignature(payload: string, secret: string): string;
8
- /** @override */
9
- computeHMACSignatureAsync(payload: string, secret: string): Promise<string>;
10
- /** @override */
11
- secureCompare(stringA: string, stringB: string): Promise<boolean>;
12
- }
@@ -1,73 +0,0 @@
1
- "use strict";
2
- var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
3
- if (k2 === undefined) k2 = k;
4
- var desc = Object.getOwnPropertyDescriptor(m, k);
5
- if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
6
- desc = { enumerable: true, get: function() { return m[k]; } };
7
- }
8
- Object.defineProperty(o, k2, desc);
9
- }) : (function(o, m, k, k2) {
10
- if (k2 === undefined) k2 = k;
11
- o[k2] = m[k];
12
- }));
13
- var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
14
- Object.defineProperty(o, "default", { enumerable: true, value: v });
15
- }) : function(o, v) {
16
- o["default"] = v;
17
- });
18
- var __importStar = (this && this.__importStar) || function (mod) {
19
- if (mod && mod.__esModule) return mod;
20
- var result = {};
21
- if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
22
- __setModuleDefault(result, mod);
23
- return result;
24
- };
25
- var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {
26
- function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); }
27
- return new (P || (P = Promise))(function (resolve, reject) {
28
- function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }
29
- function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } }
30
- function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); }
31
- step((generator = generator.apply(thisArg, _arguments || [])).next());
32
- });
33
- };
34
- Object.defineProperty(exports, "__esModule", { value: true });
35
- exports.NodeCryptoProvider = void 0;
36
- const crypto = __importStar(require("crypto"));
37
- const CryptoProvider_1 = require("./CryptoProvider");
38
- /**
39
- * `CryptoProvider which uses the Node `crypto` package for its computations.
40
- */
41
- class NodeCryptoProvider extends CryptoProvider_1.CryptoProvider {
42
- /** @override */
43
- computeHMACSignature(payload, secret) {
44
- return crypto
45
- .createHmac('sha256', secret)
46
- .update(payload, 'utf8')
47
- .digest('hex');
48
- }
49
- /** @override */
50
- computeHMACSignatureAsync(payload, secret) {
51
- return __awaiter(this, void 0, void 0, function* () {
52
- const signature = yield this.computeHMACSignature(payload, secret);
53
- return signature;
54
- });
55
- }
56
- /** @override */
57
- secureCompare(stringA, stringB) {
58
- return __awaiter(this, void 0, void 0, function* () {
59
- const bufferA = this.encoder.encode(stringA);
60
- const bufferB = this.encoder.encode(stringB);
61
- if (bufferA.length !== bufferB.length) {
62
- return false;
63
- }
64
- // Generate a random key for HMAC
65
- const key = crypto.randomBytes(32); // Generates a 256-bit key
66
- const hmacA = crypto.createHmac('sha256', key).update(bufferA).digest();
67
- const hmacB = crypto.createHmac('sha256', key).update(bufferB).digest();
68
- // Perform a constant time comparison
69
- return crypto.timingSafeEqual(hmacA, hmacB);
70
- });
71
- }
72
- }
73
- exports.NodeCryptoProvider = NodeCryptoProvider;
@@ -1,13 +0,0 @@
1
- import { CryptoProvider } from './CryptoProvider';
2
- export declare class SignatureProvider {
3
- private cryptoProvider;
4
- constructor(cryptoProvider: CryptoProvider);
5
- verifyHeader({ payload, sigHeader, secret, tolerance, }: {
6
- payload: any;
7
- sigHeader: string;
8
- secret: string;
9
- tolerance?: number;
10
- }): Promise<boolean>;
11
- getTimestampAndSignatureHash(sigHeader: string): [string, string];
12
- computeSignature(timestamp: any, payload: any, secret: string): Promise<string>;
13
- }
@@ -1,53 +0,0 @@
1
- "use strict";
2
- var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {
3
- function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); }
4
- return new (P || (P = Promise))(function (resolve, reject) {
5
- function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }
6
- function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } }
7
- function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); }
8
- step((generator = generator.apply(thisArg, _arguments || [])).next());
9
- });
10
- };
11
- Object.defineProperty(exports, "__esModule", { value: true });
12
- exports.SignatureProvider = void 0;
13
- const exceptions_1 = require("../exceptions");
14
- class SignatureProvider {
15
- constructor(cryptoProvider) {
16
- this.cryptoProvider = cryptoProvider;
17
- }
18
- verifyHeader({ payload, sigHeader, secret, tolerance = 180000, }) {
19
- return __awaiter(this, void 0, void 0, function* () {
20
- const [timestamp, signatureHash] = this.getTimestampAndSignatureHash(sigHeader);
21
- if (!signatureHash || Object.keys(signatureHash).length === 0) {
22
- throw new exceptions_1.SignatureVerificationException('No signature hash found with expected scheme v1');
23
- }
24
- if (parseInt(timestamp, 10) < Date.now() - tolerance) {
25
- throw new exceptions_1.SignatureVerificationException('Timestamp outside the tolerance zone');
26
- }
27
- const expectedSig = yield this.computeSignature(timestamp, payload, secret);
28
- if ((yield this.cryptoProvider.secureCompare(expectedSig, signatureHash)) ===
29
- false) {
30
- throw new exceptions_1.SignatureVerificationException('Signature hash does not match the expected signature hash for payload');
31
- }
32
- return true;
33
- });
34
- }
35
- getTimestampAndSignatureHash(sigHeader) {
36
- const signature = sigHeader;
37
- const [t, v1] = signature.split(',');
38
- if (typeof t === 'undefined' || typeof v1 === 'undefined') {
39
- throw new exceptions_1.SignatureVerificationException('Signature or timestamp missing');
40
- }
41
- const { 1: timestamp } = t.split('=');
42
- const { 1: signatureHash } = v1.split('=');
43
- return [timestamp, signatureHash];
44
- }
45
- computeSignature(timestamp, payload, secret) {
46
- return __awaiter(this, void 0, void 0, function* () {
47
- payload = JSON.stringify(payload);
48
- const signedPayload = `${timestamp}.${payload}`;
49
- return yield this.cryptoProvider.computeHMACSignatureAsync(signedPayload, secret);
50
- });
51
- }
52
- }
53
- exports.SignatureProvider = SignatureProvider;
@@ -1 +0,0 @@
1
- export {};
@@ -1,66 +0,0 @@
1
- "use strict";
2
- var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {
3
- function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); }
4
- return new (P || (P = Promise))(function (resolve, reject) {
5
- function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }
6
- function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } }
7
- function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); }
8
- step((generator = generator.apply(thisArg, _arguments || [])).next());
9
- });
10
- };
11
- var __importDefault = (this && this.__importDefault) || function (mod) {
12
- return (mod && mod.__esModule) ? mod : { "default": mod };
13
- };
14
- Object.defineProperty(exports, "__esModule", { value: true });
15
- const crypto_1 = __importDefault(require("crypto"));
16
- const SubtleCryptoProvider_1 = require("./SubtleCryptoProvider");
17
- const webhook_json_1 = __importDefault(require("../../webhooks/fixtures/webhook.json"));
18
- const SignatureProvider_1 = require("./SignatureProvider");
19
- describe('SignatureProvider', () => {
20
- let payload;
21
- let secret;
22
- let timestamp;
23
- let signatureHash;
24
- const signatureProvider = new SignatureProvider_1.SignatureProvider(new SubtleCryptoProvider_1.SubtleCryptoProvider());
25
- beforeEach(() => {
26
- payload = webhook_json_1.default;
27
- secret = 'secret';
28
- timestamp = Date.now() * 1000;
29
- const unhashedString = `${timestamp}.${JSON.stringify(payload)}`;
30
- signatureHash = crypto_1.default
31
- .createHmac('sha256', secret)
32
- .update(unhashedString)
33
- .digest()
34
- .toString('hex');
35
- });
36
- describe('verifyHeader', () => {
37
- it('returns true when the signature is valid', () => __awaiter(void 0, void 0, void 0, function* () {
38
- const sigHeader = `t=${timestamp}, v1=${signatureHash}`;
39
- const options = { payload, sigHeader, secret };
40
- const result = yield signatureProvider.verifyHeader(options);
41
- expect(result).toBeTruthy();
42
- }));
43
- });
44
- describe('getTimestampAndSignatureHash', () => {
45
- it('returns the timestamp and signature when the signature is valid', () => {
46
- const sigHeader = `t=${timestamp}, v1=${signatureHash}`;
47
- const timestampAndSignature = signatureProvider.getTimestampAndSignatureHash(sigHeader);
48
- expect(timestampAndSignature).toEqual([
49
- timestamp.toString(),
50
- signatureHash,
51
- ]);
52
- });
53
- });
54
- describe('computeSignature', () => {
55
- it('returns the computed signature', () => __awaiter(void 0, void 0, void 0, function* () {
56
- const signature = yield signatureProvider.computeSignature(timestamp, payload, secret);
57
- expect(signature).toEqual(signatureHash);
58
- }));
59
- });
60
- describe('when in an environment that supports SubtleCrypto', () => {
61
- it('automatically uses the subtle crypto library', () => {
62
- // tslint:disable-next-line
63
- expect(signatureProvider['cryptoProvider']).toBeInstanceOf(SubtleCryptoProvider_1.SubtleCryptoProvider);
64
- });
65
- });
66
- });
@@ -1,15 +0,0 @@
1
- import { CryptoProvider } from './CryptoProvider';
2
- /**
3
- * `CryptoProvider which uses the SubtleCrypto interface of the Web Crypto API.
4
- *
5
- * This only supports asynchronous operations.
6
- */
7
- export declare class SubtleCryptoProvider extends CryptoProvider {
8
- subtleCrypto: SubtleCrypto;
9
- constructor(subtleCrypto?: SubtleCrypto);
10
- computeHMACSignature(_payload: string, _secret: string): string;
11
- /** @override */
12
- computeHMACSignatureAsync(payload: string, secret: string): Promise<string>;
13
- /** @override */
14
- secureCompare(stringA: string, stringB: string): Promise<boolean>;
15
- }
@@ -1,75 +0,0 @@
1
- "use strict";
2
- var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {
3
- function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); }
4
- return new (P || (P = Promise))(function (resolve, reject) {
5
- function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }
6
- function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } }
7
- function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); }
8
- step((generator = generator.apply(thisArg, _arguments || [])).next());
9
- });
10
- };
11
- Object.defineProperty(exports, "__esModule", { value: true });
12
- exports.SubtleCryptoProvider = void 0;
13
- const CryptoProvider_1 = require("./CryptoProvider");
14
- /**
15
- * `CryptoProvider which uses the SubtleCrypto interface of the Web Crypto API.
16
- *
17
- * This only supports asynchronous operations.
18
- */
19
- class SubtleCryptoProvider extends CryptoProvider_1.CryptoProvider {
20
- constructor(subtleCrypto) {
21
- super();
22
- // If no subtle crypto is interface, default to the global namespace. This
23
- // is to allow custom interfaces (eg. using the Node webcrypto interface in
24
- // tests).
25
- this.subtleCrypto = subtleCrypto || crypto.subtle;
26
- }
27
- computeHMACSignature(_payload, _secret) {
28
- throw new Error('SubleCryptoProvider cannot be used in a synchronous context.');
29
- }
30
- /** @override */
31
- computeHMACSignatureAsync(payload, secret) {
32
- return __awaiter(this, void 0, void 0, function* () {
33
- const encoder = new TextEncoder();
34
- const key = yield this.subtleCrypto.importKey('raw', encoder.encode(secret), {
35
- name: 'HMAC',
36
- hash: { name: 'SHA-256' },
37
- }, false, ['sign']);
38
- const signatureBuffer = yield this.subtleCrypto.sign('hmac', key, encoder.encode(payload));
39
- // crypto.subtle returns the signature in base64 format. This must be
40
- // encoded in hex to match the CryptoProvider contract. We map each byte in
41
- // the buffer to its corresponding hex octet and then combine into a string.
42
- const signatureBytes = new Uint8Array(signatureBuffer);
43
- const signatureHexCodes = new Array(signatureBytes.length);
44
- for (let i = 0; i < signatureBytes.length; i++) {
45
- signatureHexCodes[i] = byteHexMapping[signatureBytes[i]];
46
- }
47
- return signatureHexCodes.join('');
48
- });
49
- }
50
- /** @override */
51
- secureCompare(stringA, stringB) {
52
- return __awaiter(this, void 0, void 0, function* () {
53
- const bufferA = this.encoder.encode(stringA);
54
- const bufferB = this.encoder.encode(stringB);
55
- if (bufferA.length !== bufferB.length) {
56
- return false;
57
- }
58
- const algorithm = { name: 'HMAC', hash: 'SHA-256' };
59
- const key = (yield crypto.subtle.generateKey(algorithm, false, [
60
- 'sign',
61
- 'verify',
62
- ]));
63
- const hmac = yield crypto.subtle.sign(algorithm, key, bufferA);
64
- const equal = yield crypto.subtle.verify(algorithm, key, hmac, bufferB);
65
- return equal;
66
- });
67
- }
68
- }
69
- exports.SubtleCryptoProvider = SubtleCryptoProvider;
70
- // Cached mapping of byte to hex representation. We do this once to avoid re-
71
- // computing every time we need to convert the result of a signature to hex.
72
- const byteHexMapping = new Array(256);
73
- for (let i = 0; i < byteHexMapping.length; i++) {
74
- byteHexMapping[i] = i.toString(16).padStart(2, '0');
75
- }
@@ -1,4 +0,0 @@
1
- export * from './NodeCryptoProvider';
2
- export * from './SubtleCryptoProvider';
3
- export * from './CryptoProvider';
4
- export * from './SignatureProvider';
@@ -1,20 +0,0 @@
1
- "use strict";
2
- var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
3
- if (k2 === undefined) k2 = k;
4
- var desc = Object.getOwnPropertyDescriptor(m, k);
5
- if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
6
- desc = { enumerable: true, get: function() { return m[k]; } };
7
- }
8
- Object.defineProperty(o, k2, desc);
9
- }) : (function(o, m, k, k2) {
10
- if (k2 === undefined) k2 = k;
11
- o[k2] = m[k];
12
- }));
13
- var __exportStar = (this && this.__exportStar) || function(m, exports) {
14
- for (var p in m) if (p !== "default" && !Object.prototype.hasOwnProperty.call(exports, p)) __createBinding(exports, m, p);
15
- };
16
- Object.defineProperty(exports, "__esModule", { value: true });
17
- __exportStar(require("./NodeCryptoProvider"), exports);
18
- __exportStar(require("./SubtleCryptoProvider"), exports);
19
- __exportStar(require("./CryptoProvider"), exports);
20
- __exportStar(require("./SignatureProvider"), exports);
@@ -1,5 +0,0 @@
1
- import { HttpClient } from './http-client';
2
- export declare function createHttpClient(baseURL: string, options: RequestInit, fetchFn?: typeof fetch): HttpClient;
3
- export * from './fetch-client';
4
- export * from './node-client';
5
- export * from './http-client';
@@ -1,31 +0,0 @@
1
- "use strict";
2
- var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
3
- if (k2 === undefined) k2 = k;
4
- var desc = Object.getOwnPropertyDescriptor(m, k);
5
- if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
6
- desc = { enumerable: true, get: function() { return m[k]; } };
7
- }
8
- Object.defineProperty(o, k2, desc);
9
- }) : (function(o, m, k, k2) {
10
- if (k2 === undefined) k2 = k;
11
- o[k2] = m[k];
12
- }));
13
- var __exportStar = (this && this.__exportStar) || function(m, exports) {
14
- for (var p in m) if (p !== "default" && !Object.prototype.hasOwnProperty.call(exports, p)) __createBinding(exports, m, p);
15
- };
16
- Object.defineProperty(exports, "__esModule", { value: true });
17
- exports.createHttpClient = void 0;
18
- const fetch_client_1 = require("./fetch-client");
19
- const node_client_1 = require("./node-client");
20
- function createHttpClient(baseURL, options, fetchFn) {
21
- if (typeof fetch !== 'undefined' || typeof fetchFn !== 'undefined') {
22
- return new fetch_client_1.FetchHttpClient(baseURL, options, fetchFn);
23
- }
24
- else {
25
- return new node_client_1.NodeHttpClient(baseURL, options);
26
- }
27
- }
28
- exports.createHttpClient = createHttpClient;
29
- __exportStar(require("./fetch-client"), exports);
30
- __exportStar(require("./node-client"), exports);
31
- __exportStar(require("./http-client"), exports);
@@ -1,10 +0,0 @@
1
- /**
2
- * Indicates that code is unreachable.
3
- *
4
- * This can be used for exhaustiveness checks in situations where the compiler
5
- * would not otherwise check for exhaustiveness.
6
- *
7
- * If the determination that the code is unreachable proves incorrect, an
8
- * exception is thrown.
9
- */
10
- export declare const unreachable: (condition: never, message?: string) => never;
@@ -1,18 +0,0 @@
1
- "use strict";
2
- Object.defineProperty(exports, "__esModule", { value: true });
3
- exports.unreachable = void 0;
4
- /**
5
- * Indicates that code is unreachable.
6
- *
7
- * This can be used for exhaustiveness checks in situations where the compiler
8
- * would not otherwise check for exhaustiveness.
9
- *
10
- * If the determination that the code is unreachable proves incorrect, an
11
- * exception is thrown.
12
- */
13
- const unreachable = (condition,
14
- // eslint-disable-next-line @typescript-eslint/restrict-template-expressions
15
- message = `Entered unreachable code. Received '${condition}'.`) => {
16
- throw new TypeError(message);
17
- };
18
- exports.unreachable = unreachable;