cdp-edge 1.18.0 → 1.18.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/contracts/api-versions.json +12 -8
- package/dist/commands/install.js +186 -0
- package/dist/commands/setup.js +18 -1
- package/extracted-skill/tracking-events-generator/agents/attribution-agent.md +23 -23
- package/extracted-skill/tracking-events-generator/agents/browser-tracking.md +172 -72
- package/extracted-skill/tracking-events-generator/agents/compliance-agent.md +20 -0
- package/extracted-skill/tracking-events-generator/agents/crm-integration-agent.md +48 -16
- package/extracted-skill/tracking-events-generator/agents/dashboard-agent.md +7 -7
- package/extracted-skill/tracking-events-generator/agents/database-agent.md +8 -8
- package/extracted-skill/tracking-events-generator/agents/debug-agent.md +13 -13
- package/extracted-skill/tracking-events-generator/agents/devops-agent.md +31 -7
- package/extracted-skill/tracking-events-generator/agents/email-agent.md +27 -0
- package/extracted-skill/tracking-events-generator/agents/fingerprint-agent.md +205 -0
- package/extracted-skill/tracking-events-generator/agents/google-agent.md +118 -0
- package/extracted-skill/tracking-events-generator/agents/intelligence-agent.md +90 -4
- package/extracted-skill/tracking-events-generator/agents/intelligence-scheduling.md +8 -641
- package/extracted-skill/tracking-events-generator/agents/linkedin-agent.md +108 -0
- package/extracted-skill/tracking-events-generator/agents/ltv-predictor-agent.md +1 -1
- package/extracted-skill/tracking-events-generator/agents/master-feedback-loop.md +68 -8
- package/extracted-skill/tracking-events-generator/agents/master-orchestrator.md +71 -34
- package/extracted-skill/tracking-events-generator/agents/memory-agent.md +98 -0
- package/extracted-skill/tracking-events-generator/agents/performance-agent.md +29 -19
- package/extracted-skill/tracking-events-generator/agents/performance-optimization-agent.md +11 -1
- package/extracted-skill/tracking-events-generator/agents/security-enterprise-agent.md +137 -28
- package/extracted-skill/tracking-events-generator/agents/server-tracking.md +7 -8
- package/extracted-skill/tracking-events-generator/agents/tiktok-agent.md +63 -0
- package/extracted-skill/tracking-events-generator/agents/tracking-plan-agent.md +100 -5
- package/extracted-skill/tracking-events-generator/agents/webhook-agent.md +100 -0
- package/extracted-skill/tracking-events-generator/agents/whatsapp-agent.md +58 -5
- package/extracted-skill/tracking-events-generator/agents/whatsapp-ctwa-setup-agent.md +16 -16
- package/extracted-skill/tracking-events-generator/agents/youtube-agent.md +140 -25
- package/extracted-skill/tracking-events-generator/contracts/api-versions.json +12 -8
- package/package.json +2 -2
- package/server-edge-tracker/worker.js +53 -8
|
@@ -1,5 +1,15 @@
|
|
|
1
1
|
# Performance Agent (Monitoring Master) — CDP Edge
|
|
2
2
|
|
|
3
|
+
> **ESCOPO DESTE AGENTE:** Monitoramento e observabilidade em tempo real.
|
|
4
|
+
> Para otimização de cache, queries e latência, ver: **performance-optimization-agent.md**
|
|
5
|
+
>
|
|
6
|
+
> | Este agente faz | performance-optimization-agent faz |
|
|
7
|
+
> |---|---|
|
|
8
|
+
> | Medir latência, throughput, error rates | Estratégias de caching (L1/L2/L3) |
|
|
9
|
+
> | Alertas de degradação de SLA | Otimização de queries D1 |
|
|
10
|
+
> | Health checks e dashboards | Batch processing, indexação |
|
|
11
|
+
> | Relatórios de performance | Profiling e tunning de Workers |
|
|
12
|
+
|
|
3
13
|
Você é o **Agente de Monitoramento de Performance do CDP Edge**. Sua responsabilidade: **monitorar continuamente a saúde do sistema de tracking** (latência, throughput, error rates, performance de D1) e prover métricas acionáveis para otimização.
|
|
4
14
|
|
|
5
15
|
---
|
|
@@ -107,20 +117,20 @@ function evaluateLatencyPerformance(latencyMetrics) {
|
|
|
107
117
|
|
|
108
118
|
```javascript
|
|
109
119
|
// Monitorar taxa de falhas em todas as APIs
|
|
110
|
-
export async function measureApiErrorRate(hours = 24) {
|
|
120
|
+
export async function measureApiErrorRate(env, hours = 24) {
|
|
111
121
|
const platforms = ['meta', 'google', 'tiktok', 'pinterest', 'reddit'];
|
|
112
122
|
const errorRates = {};
|
|
113
123
|
|
|
114
124
|
for (const platform of platforms) {
|
|
115
125
|
// Total de requisições (sucesso + falha)
|
|
116
|
-
const totalRequests = await DB.prepare(`
|
|
126
|
+
const totalRequests = await env.DB.prepare(`
|
|
117
127
|
SELECT COUNT(*) as total
|
|
118
128
|
FROM events_log
|
|
119
129
|
WHERE platform = ? AND created_at > datetime('now', '-${hours} hours')
|
|
120
130
|
`).bind(platform).get();
|
|
121
131
|
|
|
122
132
|
// Requisições que falharam
|
|
123
|
-
const failedRequests = await DB.prepare(`
|
|
133
|
+
const failedRequests = await env.DB.prepare(`
|
|
124
134
|
SELECT COUNT(*) as failed
|
|
125
135
|
FROM events_log
|
|
126
136
|
WHERE platform = ? AND status = 'failed' AND created_at > datetime('now', '-${hours} hours')
|
|
@@ -159,7 +169,7 @@ function evaluateErrorRate(errorRate) {
|
|
|
159
169
|
|
|
160
170
|
```javascript
|
|
161
171
|
// Monitorar eventos processados por segundo/minuto
|
|
162
|
-
export async function measureThroughput(hours = 24) {
|
|
172
|
+
export async function measureThroughput(env, hours = 24) {
|
|
163
173
|
const now = new Date();
|
|
164
174
|
const windows = [];
|
|
165
175
|
|
|
@@ -168,7 +178,7 @@ export async function measureThroughput(hours = 24) {
|
|
|
168
178
|
const windowStart = new Date(now - (i + 1) * 60 * 60 * 1000);
|
|
169
179
|
const windowEnd = new Date(now - i * 60 * 60 * 1000);
|
|
170
180
|
|
|
171
|
-
const eventsInWindow = await DB.prepare(`
|
|
181
|
+
const eventsInWindow = await env.DB.prepare(`
|
|
172
182
|
SELECT COUNT(*) as events,
|
|
173
183
|
MIN(created_at) as first_event,
|
|
174
184
|
MAX(created_at) as last_event
|
|
@@ -229,9 +239,9 @@ function evaluateThroughputTrend(recent, historical) {
|
|
|
229
239
|
|
|
230
240
|
```javascript
|
|
231
241
|
// Monitorar performance do banco de dados D1
|
|
232
|
-
export async function measureD1Performance(hours = 24) {
|
|
242
|
+
export async function measureD1Performance(env, hours = 24) {
|
|
233
243
|
// Queries lentas
|
|
234
|
-
const slowQueries = await DB.prepare(`
|
|
244
|
+
const slowQueries = await env.DB.prepare(`
|
|
235
245
|
SELECT
|
|
236
246
|
query_hash,
|
|
237
247
|
COUNT(*) as execution_count,
|
|
@@ -246,7 +256,7 @@ export async function measureD1Performance(hours = 24) {
|
|
|
246
256
|
`).all();
|
|
247
257
|
|
|
248
258
|
// Verificar locks
|
|
249
|
-
const locks = await DB.prepare(`
|
|
259
|
+
const locks = await env.DB.prepare(`
|
|
250
260
|
SELECT
|
|
251
261
|
COUNT(*) as total_locks,
|
|
252
262
|
AVG(lock_duration_ms) as avg_lock_duration,
|
|
@@ -323,9 +333,9 @@ function evaluateD1Health(slowQueries, locks, dbSize) {
|
|
|
323
333
|
|
|
324
334
|
```javascript
|
|
325
335
|
// Monitorar eficiência do cache KV
|
|
326
|
-
export async function measureCachePerformance(hours = 24) {
|
|
336
|
+
export async function measureCachePerformance(env, hours = 24) {
|
|
327
337
|
// Cache hits e misses
|
|
328
|
-
const cacheStats = await DB.prepare(`
|
|
338
|
+
const cacheStats = await env.DB.prepare(`
|
|
329
339
|
SELECT
|
|
330
340
|
COUNT(*) FILTER (WHERE hit = 1) as hits,
|
|
331
341
|
COUNT(*) FILTER (WHERE hit = 0) as misses,
|
|
@@ -340,7 +350,7 @@ export async function measureCachePerformance(hours = 24) {
|
|
|
340
350
|
const hitRate = total > 0 ? (hits / total * 100) : 0;
|
|
341
351
|
|
|
342
352
|
// Keys armazenadas
|
|
343
|
-
const totalKeys = await
|
|
353
|
+
const totalKeys = await env.GEO_CACHE.list().then(list => list.keys.length);
|
|
344
354
|
|
|
345
355
|
return {
|
|
346
356
|
hits,
|
|
@@ -849,7 +859,7 @@ cpu_ms = 50 # Aumentar de 10ms para 50ms
|
|
|
849
859
|
```javascript
|
|
850
860
|
// Cache de métricas globais por 1 hora
|
|
851
861
|
const cacheKey = `metrics:global:${getHourBucket()}`;
|
|
852
|
-
const cached = await
|
|
862
|
+
const cached = await env.GEO_CACHE.get(cacheKey);
|
|
853
863
|
|
|
854
864
|
if (cached) {
|
|
855
865
|
return JSON.parse(cached);
|
|
@@ -857,7 +867,7 @@ if (cached) {
|
|
|
857
867
|
|
|
858
868
|
// Cache miss — consultar D1 e persistir no KV
|
|
859
869
|
const metrics = await fetchMetricsFromD1();
|
|
860
|
-
await
|
|
870
|
+
await env.GEO_CACHE.put(cacheKey, JSON.stringify(metrics), { expirationTtl: 3600 });
|
|
861
871
|
|
|
862
872
|
return metrics;
|
|
863
873
|
```
|
|
@@ -948,17 +958,17 @@ const RATE_LIMITS = {
|
|
|
948
958
|
tiktok: { tokens: 10, refill_rate: 1 } // 10 req/min
|
|
949
959
|
};
|
|
950
960
|
|
|
951
|
-
async function consumeToken(platform) {
|
|
961
|
+
async function consumeToken(platform, env) {
|
|
952
962
|
const limit = RATE_LIMITS[platform];
|
|
953
963
|
const key = `rate_limit:${platform}`;
|
|
954
964
|
|
|
955
|
-
let tokens = await
|
|
965
|
+
let tokens = await env.GEO_CACHE.get(key) || JSON.stringify(limit.tokens);
|
|
956
966
|
|
|
957
967
|
tokens = JSON.parse(tokens);
|
|
958
968
|
|
|
959
969
|
if (tokens > 0) {
|
|
960
970
|
tokens--;
|
|
961
|
-
await
|
|
971
|
+
await env.GEO_CACHE.put(key, JSON.stringify(tokens));
|
|
962
972
|
return true; // Permitido
|
|
963
973
|
}
|
|
964
974
|
|
|
@@ -1030,17 +1040,17 @@ const CACHE_TTL = {
|
|
|
1030
1040
|
**Solução:**
|
|
1031
1041
|
```javascript
|
|
1032
1042
|
// Invalidar cache quando dados mudarem
|
|
1033
|
-
async function invalidateCacheOnChange(eventType) {
|
|
1043
|
+
async function invalidateCacheOnChange(eventType, env) {
|
|
1034
1044
|
const patterns = {
|
|
1035
1045
|
'lead_created': ['metrics:*', 'user_profile:*'],
|
|
1036
1046
|
'purchase_completed': ['metrics:*', 'session_data:*'],
|
|
1037
1047
|
'api_config_changed': ['api_config:*']
|
|
1038
1048
|
};
|
|
1039
1049
|
|
|
1040
|
-
const keysToDelete = await
|
|
1050
|
+
const keysToDelete = await env.GEO_CACHE.list({ prefix: patterns[eventType] });
|
|
1041
1051
|
|
|
1042
1052
|
for (const key of keysToDelete.keys) {
|
|
1043
|
-
await
|
|
1053
|
+
await env.GEO_CACHE.delete(key.name);
|
|
1044
1054
|
}
|
|
1045
1055
|
|
|
1046
1056
|
console.log(`Invalidated ${keysToDelete.keys.length} cache keys for ${eventType}`);
|
|
@@ -8,6 +8,16 @@ version: "1.0.0"
|
|
|
8
8
|
|
|
9
9
|
# Performance Optimization Enterprise Agent
|
|
10
10
|
|
|
11
|
+
> **ESCOPO DESTE AGENTE:** Otimização ativa de performance — caching, queries, batching.
|
|
12
|
+
> Para monitoramento passivo (métricas, alertas, dashboards), ver: **performance-agent.md**
|
|
13
|
+
>
|
|
14
|
+
> | Este agente faz | performance-agent faz |
|
|
15
|
+
> |---|---|
|
|
16
|
+
> | Estratégias de caching L1/L2/L3 | Medir latência e throughput |
|
|
17
|
+
> | Otimização de queries D1 e indexação | Alertas de degradação de SLA |
|
|
18
|
+
> | Batch processing e pipeline tuning | Health checks e dashboards |
|
|
19
|
+
> | Profiling de Workers e CPU optimization | Relatórios de performance |
|
|
20
|
+
|
|
11
21
|
## 🚀 Visão Geral
|
|
12
22
|
|
|
13
23
|
Agente especializado em otimização de performance para o sistema CDP Edge (Cloudflare Workers + D1 + Queue). Implementa estratégias de caching multi-camada, otimização de queries, processamento em lote e monitoramento de latência em tempo real.
|
|
@@ -159,7 +169,7 @@ let l1Cache = new L1Cache();
|
|
|
159
169
|
*/
|
|
160
170
|
class L2Cache {
|
|
161
171
|
constructor(env) {
|
|
162
|
-
this.kv = env.
|
|
172
|
+
this.kv = env.GEO_CACHE; // Cloudflare KV namespace
|
|
163
173
|
this.stats = {
|
|
164
174
|
hits: 0,
|
|
165
175
|
misses: 0,
|
|
@@ -402,7 +402,7 @@ export async function checkIPBlocking(request, env) {
|
|
|
402
402
|
const ip = request.headers.get('CF-Connecting-IP') || 'unknown';
|
|
403
403
|
|
|
404
404
|
// 1. Verificar whitelist (primeiro - bypass rate limiting)
|
|
405
|
-
const isWhitelisted = await checkIPWhitelist(ip);
|
|
405
|
+
const isWhitelisted = await checkIPWhitelist(ip, env);
|
|
406
406
|
if (isWhitelisted) {
|
|
407
407
|
return {
|
|
408
408
|
allowed: true,
|
|
@@ -412,7 +412,7 @@ export async function checkIPBlocking(request, env) {
|
|
|
412
412
|
}
|
|
413
413
|
|
|
414
414
|
// 2. Verificar blacklist manual
|
|
415
|
-
const isManuallyBlocked = await checkIPBlacklist(ip);
|
|
415
|
+
const isManuallyBlocked = await checkIPBlacklist(ip, env);
|
|
416
416
|
if (isManuallyBlocked) {
|
|
417
417
|
await logSecurityEvent({
|
|
418
418
|
type: 'IP_BLACKLISTED',
|
|
@@ -430,7 +430,7 @@ export async function checkIPBlocking(request, env) {
|
|
|
430
430
|
}
|
|
431
431
|
|
|
432
432
|
// 3. Verificar geoblocking
|
|
433
|
-
const isGeoBlocked = await checkGeoBlocking(request);
|
|
433
|
+
const isGeoBlocked = await checkGeoBlocking(request, env);
|
|
434
434
|
if (isGeoBlocked) {
|
|
435
435
|
await logSecurityEvent({
|
|
436
436
|
type: 'IP_GEO_BLOCKED',
|
|
@@ -447,7 +447,7 @@ export async function checkIPBlocking(request, env) {
|
|
|
447
447
|
}
|
|
448
448
|
|
|
449
449
|
// 4. Verificar bloqueio automático (comportamento malicioso)
|
|
450
|
-
const isAutoBlocked = await checkAutoIPBlocking(ip);
|
|
450
|
+
const isAutoBlocked = await checkAutoIPBlocking(ip, env);
|
|
451
451
|
if (isAutoBlocked) {
|
|
452
452
|
await logSecurityEvent({
|
|
453
453
|
type: 'IP_AUTO_BLOCKED',
|
|
@@ -470,13 +470,13 @@ export async function checkIPBlocking(request, env) {
|
|
|
470
470
|
}
|
|
471
471
|
|
|
472
472
|
// Verificar se IP está na whitelist
|
|
473
|
-
async function checkIPWhitelist(ip) {
|
|
473
|
+
async function checkIPWhitelist(ip, env) {
|
|
474
474
|
if (!IP_BLOCKING_CONFIG.whitelist.enabled) {
|
|
475
475
|
return false;
|
|
476
476
|
}
|
|
477
477
|
|
|
478
478
|
// 1. Verificar whitelist manual (IP exato)
|
|
479
|
-
const manualWhitelist = await DB.prepare(`
|
|
479
|
+
const manualWhitelist = await env.DB.prepare(`
|
|
480
480
|
SELECT ip, cidr_range
|
|
481
481
|
FROM ip_whitelist
|
|
482
482
|
WHERE ip = ?
|
|
@@ -497,8 +497,8 @@ async function checkIPWhitelist(ip) {
|
|
|
497
497
|
}
|
|
498
498
|
|
|
499
499
|
// Verificar se IP está na blacklist
|
|
500
|
-
async function checkIPBlacklist(ip) {
|
|
501
|
-
const blocked = await DB.prepare(`
|
|
500
|
+
async function checkIPBlacklist(ip, env) {
|
|
501
|
+
const blocked = await env.DB.prepare(`
|
|
502
502
|
SELECT block_reason, blocked_at, unblocked_at, blocking_type, violation_count
|
|
503
503
|
FROM ip_blacklist
|
|
504
504
|
WHERE ip = ? AND unblocked_at IS NULL
|
|
@@ -508,7 +508,7 @@ async function checkIPBlacklist(ip) {
|
|
|
508
508
|
}
|
|
509
509
|
|
|
510
510
|
// Verificar geoblocking
|
|
511
|
-
async function checkGeoBlocking(request) {
|
|
511
|
+
async function checkGeoBlocking(request, env) {
|
|
512
512
|
if (!IP_BLOCKING_CONFIG.blacklist.geo_blocking.enabled) {
|
|
513
513
|
return null;
|
|
514
514
|
}
|
|
@@ -527,7 +527,7 @@ async function checkGeoBlocking(request) {
|
|
|
527
527
|
}
|
|
528
528
|
|
|
529
529
|
// Verificar bloqueio automático por comportamento
|
|
530
|
-
async function checkAutoIPBlocking(ip) {
|
|
530
|
+
async function checkAutoIPBlocking(ip, env) {
|
|
531
531
|
if (!IP_BLOCKING_CONFIG.blacklist.automatic.enabled) {
|
|
532
532
|
return null;
|
|
533
533
|
}
|
|
@@ -535,7 +535,7 @@ async function checkAutoIPBlocking(ip) {
|
|
|
535
535
|
const config = IP_BLOCKING_CONFIG.blacklist.automatic;
|
|
536
536
|
|
|
537
537
|
// 1. Verificar falhas por hora
|
|
538
|
-
const failuresPerHour = await DB.prepare(`
|
|
538
|
+
const failuresPerHour = await env.DB.prepare(`
|
|
539
539
|
SELECT COUNT(*) as failures
|
|
540
540
|
FROM ip_violations
|
|
541
541
|
WHERE ip = ?
|
|
@@ -544,7 +544,7 @@ async function checkAutoIPBlocking(ip) {
|
|
|
544
544
|
|
|
545
545
|
if (failuresPerHour.failures >= config.threshold_failures_per_hour) {
|
|
546
546
|
// Bloquear IP automaticamente
|
|
547
|
-
await blockIPAutomatically(ip, 'EXCEEDED_FAILURES_PER_HOUR', failuresPerHour.failures);
|
|
547
|
+
await blockIPAutomatically(ip, 'EXCEEDED_FAILURES_PER_HOUR', failuresPerHour.failures, env);
|
|
548
548
|
return {
|
|
549
549
|
blocked: true,
|
|
550
550
|
reason: 'EXCEEDED_FAILURES_PER_HOUR',
|
|
@@ -554,7 +554,7 @@ async function checkAutoIPBlocking(ip) {
|
|
|
554
554
|
}
|
|
555
555
|
|
|
556
556
|
// 2. Verificar falhas por dia
|
|
557
|
-
const failuresPerDay = await DB.prepare(`
|
|
557
|
+
const failuresPerDay = await env.DB.prepare(`
|
|
558
558
|
SELECT COUNT(*) as failures
|
|
559
559
|
FROM ip_violations
|
|
560
560
|
WHERE ip = ?
|
|
@@ -562,7 +562,7 @@ async function checkAutoIPBlocking(ip) {
|
|
|
562
562
|
`).bind(ip).get();
|
|
563
563
|
|
|
564
564
|
if (failuresPerDay.failures >= config.threshold_failures_per_day) {
|
|
565
|
-
await blockIPAutomatically(ip, 'EXCEEDED_FAILURES_PER_DAY', failuresPerDay.failures);
|
|
565
|
+
await blockIPAutomatically(ip, 'EXCEEDED_FAILURES_PER_DAY', failuresPerDay.failures, env);
|
|
566
566
|
return {
|
|
567
567
|
blocked: true,
|
|
568
568
|
reason: 'EXCEEDED_FAILURES_PER_DAY',
|
|
@@ -572,7 +572,7 @@ async function checkAutoIPBlocking(ip) {
|
|
|
572
572
|
}
|
|
573
573
|
|
|
574
574
|
// 3. Verificar erros 429 por hora
|
|
575
|
-
const rateLimitErrorsPerHour = await DB.prepare(`
|
|
575
|
+
const rateLimitErrorsPerHour = await env.DB.prepare(`
|
|
576
576
|
SELECT COUNT(*) as errors
|
|
577
577
|
FROM ip_violations
|
|
578
578
|
WHERE ip = ?
|
|
@@ -581,7 +581,7 @@ async function checkAutoIPBlocking(ip) {
|
|
|
581
581
|
`).bind(ip).get();
|
|
582
582
|
|
|
583
583
|
if (rateLimitErrorsPerHour.errors >= config.threshold_429_per_hour) {
|
|
584
|
-
await blockIPAutomatically(ip, 'EXCEEDED_RATE_LIMITS_PER_HOUR', rateLimitErrorsPerHour.errors);
|
|
584
|
+
await blockIPAutomatically(ip, 'EXCEEDED_RATE_LIMITS_PER_HOUR', rateLimitErrorsPerHour.errors, env);
|
|
585
585
|
return {
|
|
586
586
|
blocked: true,
|
|
587
587
|
reason: 'EXCEEDED_RATE_LIMITS_PER_HOUR',
|
|
@@ -594,10 +594,10 @@ async function checkAutoIPBlocking(ip) {
|
|
|
594
594
|
}
|
|
595
595
|
|
|
596
596
|
// Bloquear IP automaticamente
|
|
597
|
-
async function blockIPAutomatically(ip, reason, count) {
|
|
597
|
+
async function blockIPAutomatically(ip, reason, count, env) {
|
|
598
598
|
const now = new Date().toISOString();
|
|
599
599
|
|
|
600
|
-
await DB.prepare(`
|
|
600
|
+
await env.DB.prepare(`
|
|
601
601
|
INSERT OR REPLACE INTO ip_blacklist
|
|
602
602
|
(ip, block_reason, blocked_at, blocking_type, violation_count, last_violation_type, last_violation_at)
|
|
603
603
|
VALUES (?, ?, ?, ?, ?, ?, ?)
|
|
@@ -925,7 +925,106 @@ export function sanitizePayload(eventData, eventName) {
|
|
|
925
925
|
}
|
|
926
926
|
```
|
|
927
927
|
|
|
928
|
-
### 3.3
|
|
928
|
+
### 3.3 CSRF Protection (Anti-Cross-Site Request Forgery)
|
|
929
|
+
|
|
930
|
+
CSRF é relevante nos **endpoints de webhook** (Hotmart, Kiwify, Ticto) onde um atacante pode forjar requisições. A proteção é HMAC-SHA256 por assinatura — cada plataforma assina o payload com um secret compartilhado.
|
|
931
|
+
|
|
932
|
+
```javascript
|
|
933
|
+
/**
|
|
934
|
+
* Verificação CSRF via HMAC-SHA256 para webhooks de plataformas de pagamento.
|
|
935
|
+
* Cada plataforma tem seu próprio header e algoritmo.
|
|
936
|
+
*
|
|
937
|
+
* @param {Request} request
|
|
938
|
+
* @param {Object} env
|
|
939
|
+
* @param {string} gateway - 'hotmart' | 'kiwify' | 'ticto' | 'stripe'
|
|
940
|
+
* @returns {Promise<boolean>} true se assinatura válida
|
|
941
|
+
*/
|
|
942
|
+
export async function validateWebhookSignature(request, env, gateway) {
|
|
943
|
+
const body = await request.text(); // Ler como texto para HMAC exato
|
|
944
|
+
|
|
945
|
+
switch (gateway) {
|
|
946
|
+
case 'hotmart': {
|
|
947
|
+
// Hotmart: header X-Hotmart-Hottok (token fixo, não HMAC)
|
|
948
|
+
const token = request.headers.get('X-Hotmart-Hottok');
|
|
949
|
+
return token === env.WEBHOOK_SECRET_HOTMART;
|
|
950
|
+
}
|
|
951
|
+
|
|
952
|
+
case 'kiwify': {
|
|
953
|
+
// Kiwify: query param ?signature=HMAC_SHA256(body, secret)
|
|
954
|
+
const url = new URL(request.url);
|
|
955
|
+
const receivedSig = url.searchParams.get('signature') || '';
|
|
956
|
+
const expectedSig = await hmacSHA256(body, env.WEBHOOK_SECRET_KIWIFY);
|
|
957
|
+
return timingSafeEqual(receivedSig, expectedSig);
|
|
958
|
+
}
|
|
959
|
+
|
|
960
|
+
case 'ticto': {
|
|
961
|
+
// Ticto: header X-Ticto-Signature = HMAC_SHA256(body, secret)
|
|
962
|
+
const receivedSig = request.headers.get('X-Ticto-Signature') || '';
|
|
963
|
+
const expectedSig = await hmacSHA256(body, env.WEBHOOK_SECRET_TICTO);
|
|
964
|
+
return timingSafeEqual(receivedSig, expectedSig);
|
|
965
|
+
}
|
|
966
|
+
|
|
967
|
+
case 'stripe': {
|
|
968
|
+
// Stripe: header Stripe-Signature = t={ts},v1={HMAC}
|
|
969
|
+
const sigHeader = request.headers.get('Stripe-Signature') || '';
|
|
970
|
+
const parts = Object.fromEntries(sigHeader.split(',').map(p => p.split('=')));
|
|
971
|
+
const signedPayload = `${parts.t}.${body}`;
|
|
972
|
+
const expectedSig = await hmacSHA256(signedPayload, env.STRIPE_WEBHOOK_SECRET);
|
|
973
|
+
return timingSafeEqual(parts.v1, expectedSig);
|
|
974
|
+
}
|
|
975
|
+
|
|
976
|
+
default:
|
|
977
|
+
return false; // Gateway desconhecido = rejeitar
|
|
978
|
+
}
|
|
979
|
+
}
|
|
980
|
+
|
|
981
|
+
// HMAC-SHA256 usando WebCrypto (disponível em Cloudflare Workers)
|
|
982
|
+
async function hmacSHA256(message, secret) {
|
|
983
|
+
const encoder = new TextEncoder();
|
|
984
|
+
const key = await crypto.subtle.importKey(
|
|
985
|
+
'raw', encoder.encode(secret),
|
|
986
|
+
{ name: 'HMAC', hash: 'SHA-256' },
|
|
987
|
+
false, ['sign']
|
|
988
|
+
);
|
|
989
|
+
const sig = await crypto.subtle.sign('HMAC', key, encoder.encode(message));
|
|
990
|
+
return Array.from(new Uint8Array(sig)).map(b => b.toString(16).padStart(2, '0')).join('');
|
|
991
|
+
}
|
|
992
|
+
|
|
993
|
+
// Comparação em tempo constante — previne timing attacks
|
|
994
|
+
function timingSafeEqual(a, b) {
|
|
995
|
+
if (a.length !== b.length) return false;
|
|
996
|
+
let diff = 0;
|
|
997
|
+
for (let i = 0; i < a.length; i++) {
|
|
998
|
+
diff |= a.charCodeAt(i) ^ b.charCodeAt(i);
|
|
999
|
+
}
|
|
1000
|
+
return diff === 0;
|
|
1001
|
+
}
|
|
1002
|
+
|
|
1003
|
+
/**
|
|
1004
|
+
* Uso no handler de webhook:
|
|
1005
|
+
*
|
|
1006
|
+
* const isValid = await validateWebhookSignature(request, env, 'hotmart');
|
|
1007
|
+
* if (!isValid) return new Response('Unauthorized', { status: 401 });
|
|
1008
|
+
*
|
|
1009
|
+
* REGRA: Validar assinatura ANTES de parsear o body JSON.
|
|
1010
|
+
* Re-clonar o request se precisar ler o body depois:
|
|
1011
|
+
* const clonedRequest = request.clone();
|
|
1012
|
+
* const valid = await validateWebhookSignature(clonedRequest, env, gateway);
|
|
1013
|
+
* const body = await request.json(); // original ainda disponível
|
|
1014
|
+
*/
|
|
1015
|
+
```
|
|
1016
|
+
|
|
1017
|
+
### Checklist CSRF
|
|
1018
|
+
|
|
1019
|
+
- [ ] HMAC validado para Hotmart, Kiwify, Ticto antes de processar
|
|
1020
|
+
- [ ] Rejeição 401 imediata se assinatura inválida
|
|
1021
|
+
- [ ] Uso de `timingSafeEqual` para prevenir timing attacks
|
|
1022
|
+
- [ ] Body lido como texto para HMAC (não como JSON — evita parsing antes da validação)
|
|
1023
|
+
- [ ] Secrets via `wrangler secret put WEBHOOK_SECRET_HOTMART` etc.
|
|
1024
|
+
|
|
1025
|
+
---
|
|
1026
|
+
|
|
1027
|
+
### 3.4 Middleware de Validação e Sanitização
|
|
929
1028
|
|
|
930
1029
|
```javascript
|
|
931
1030
|
// Middleware de segurança completo
|
|
@@ -1401,7 +1500,7 @@ const SEVERITY_LEVELS = {
|
|
|
1401
1500
|
|
|
1402
1501
|
```javascript
|
|
1403
1502
|
// Log de evento de segurança
|
|
1404
|
-
export async function logSecurityEvent(eventData) {
|
|
1503
|
+
export async function logSecurityEvent(eventData, env) {
|
|
1405
1504
|
const {
|
|
1406
1505
|
type,
|
|
1407
1506
|
severity,
|
|
@@ -1419,7 +1518,7 @@ export async function logSecurityEvent(eventData) {
|
|
|
1419
1518
|
|
|
1420
1519
|
const timestamp = new Date().toISOString();
|
|
1421
1520
|
|
|
1422
|
-
await DB.prepare(`
|
|
1521
|
+
await env.DB.prepare(`
|
|
1423
1522
|
INSERT INTO audit_logs
|
|
1424
1523
|
(timestamp, ip, user_id, session_id, user_agent, event_name, event_id,
|
|
1425
1524
|
log_type, severity, action, outcome, details, blocked)
|
|
@@ -1453,7 +1552,7 @@ export async function logSecurityEvent(eventData) {
|
|
|
1453
1552
|
}
|
|
1454
1553
|
|
|
1455
1554
|
// Query de audit logs
|
|
1456
|
-
export async function queryAuditLogs(filters = {}) {
|
|
1555
|
+
export async function queryAuditLogs(filters = {}, env) {
|
|
1457
1556
|
const {
|
|
1458
1557
|
ip,
|
|
1459
1558
|
user_id,
|
|
@@ -1509,7 +1608,7 @@ export async function queryAuditLogs(filters = {}) {
|
|
|
1509
1608
|
|
|
1510
1609
|
query += ' ORDER BY timestamp DESC LIMIT ?';
|
|
1511
1610
|
|
|
1512
|
-
const results = await DB.prepare(query).bind(...params).all();
|
|
1611
|
+
const results = await env.DB.prepare(query).bind(...params).all();
|
|
1513
1612
|
|
|
1514
1613
|
return results;
|
|
1515
1614
|
}
|
|
@@ -1539,7 +1638,7 @@ export async function getRateLimitStatus(request, env) {
|
|
|
1539
1638
|
refill_rate: rateLimiters.event.get('global').refillRate
|
|
1540
1639
|
}
|
|
1541
1640
|
},
|
|
1542
|
-
recent_violations: await DB.prepare(`
|
|
1641
|
+
recent_violations: await env.DB.prepare(`
|
|
1543
1642
|
SELECT
|
|
1544
1643
|
log_type,
|
|
1545
1644
|
severity,
|
|
@@ -1566,9 +1665,9 @@ export async function getIPStatus(request, env) {
|
|
|
1566
1665
|
const ip = request.headers.get('CF-Connecting-IP') || 'unknown';
|
|
1567
1666
|
|
|
1568
1667
|
// Verificar status do IP
|
|
1569
|
-
const blacklist = await checkIPBlacklist(ip);
|
|
1570
|
-
const whitelist = await checkIPWhitelist(ip);
|
|
1571
|
-
const geoBlock = await checkGeoBlocking(request);
|
|
1668
|
+
const blacklist = await checkIPBlacklist(ip, env);
|
|
1669
|
+
const whitelist = await checkIPWhitelist(ip, env);
|
|
1670
|
+
const geoBlock = await checkGeoBlocking(request, env);
|
|
1572
1671
|
|
|
1573
1672
|
const status = {
|
|
1574
1673
|
ip,
|
|
@@ -1577,7 +1676,7 @@ export async function getIPStatus(request, env) {
|
|
|
1577
1676
|
blacklist_reason: blacklist ? blacklist.block_reason : null,
|
|
1578
1677
|
is_geo_blocked: !!geoBlock,
|
|
1579
1678
|
geo_details: geoBlock || null,
|
|
1580
|
-
recent_violations: await DB.prepare(`
|
|
1679
|
+
recent_violations: await env.DB.prepare(`
|
|
1581
1680
|
SELECT
|
|
1582
1681
|
COUNT(*) as violations,
|
|
1583
1682
|
MAX(violation_count) as max_violation_count
|
|
@@ -1699,6 +1798,16 @@ export const SEVERITY_LEVELS = { ... };
|
|
|
1699
1798
|
- [ ] CIDR ranges implementados
|
|
1700
1799
|
- [ ] Auto-unblock implementado
|
|
1701
1800
|
|
|
1801
|
+
### CSRF Protection (Webhooks)
|
|
1802
|
+
|
|
1803
|
+
- [ ] HMAC-SHA256 validado para Hotmart
|
|
1804
|
+
- [ ] HMAC-SHA256 validado para Kiwify
|
|
1805
|
+
- [ ] HMAC-SHA256 validado para Ticto
|
|
1806
|
+
- [ ] HMAC-SHA256 validado para Stripe
|
|
1807
|
+
- [ ] `timingSafeEqual` implementado (sem timing attacks)
|
|
1808
|
+
- [ ] Body lido como text antes do JSON.parse para validação HMAC
|
|
1809
|
+
- [ ] Secrets via `wrangler secret put` (nunca hardcode)
|
|
1810
|
+
|
|
1702
1811
|
### Input Validation
|
|
1703
1812
|
|
|
1704
1813
|
- [ ] Joi schemas criados (Lead, Purchase, Contact)
|
|
@@ -89,11 +89,10 @@ UMBRELLA_DOMAIN = "dominio.com"
|
|
|
89
89
|
# META_ACCESS_TOKEN ← obrigatório
|
|
90
90
|
# GA4_API_SECRET ← obrigatório
|
|
91
91
|
# TIKTOK_ACCESS_TOKEN ← opcional
|
|
92
|
-
#
|
|
93
|
-
#
|
|
94
|
-
#
|
|
95
|
-
#
|
|
96
|
-
# WA_WEBHOOK_VERIFY_TOKEN ← gerado pelo agente (crypto.randomUUID)
|
|
92
|
+
# WHATSAPP_ACCESS_TOKEN ← WhatsApp Cloud API — token de acesso permanente
|
|
93
|
+
# WHATSAPP_PHONE_NUMBER_ID ← WhatsApp Cloud API — Phone Number ID (ex: 123456789012345)
|
|
94
|
+
# WA_NOTIFY_NUMBER ← Número do dono para receber notificações (ex: 5511999998888)
|
|
95
|
+
# WA_WEBHOOK_VERIFY_TOKEN ← Token de verificação do webhook CTWA (gerado via crypto.randomUUID)
|
|
97
96
|
# PINTEREST_ACCESS_TOKEN ← ativar Pinterest CAPI v5
|
|
98
97
|
# PINTEREST_AD_ACCOUNT_ID ← ativar Pinterest CAPI v5
|
|
99
98
|
# REDDIT_ACCESS_TOKEN ← ativar Reddit CAPI v2.0
|
|
@@ -1050,7 +1049,7 @@ Timestamp: ${new Date().toISOString()}
|
|
|
1050
1049
|
`.trim();
|
|
1051
1050
|
|
|
1052
1051
|
// Verificar se há token do WhatsApp configurado
|
|
1053
|
-
const waPhoneId = env.
|
|
1052
|
+
const waPhoneId = env.WHATSAPP_PHONE_NUMBER_ID;
|
|
1054
1053
|
const adminNumber = env.ADMIN_PHONE_NUMBER;
|
|
1055
1054
|
|
|
1056
1055
|
if (waPhoneId && adminNumber) {
|
|
@@ -1058,7 +1057,7 @@ Timestamp: ${new Date().toISOString()}
|
|
|
1058
1057
|
method: 'POST',
|
|
1059
1058
|
headers: {
|
|
1060
1059
|
'Content-Type': 'application/json',
|
|
1061
|
-
'Authorization': `Bearer ${env.
|
|
1060
|
+
'Authorization': `Bearer ${env.WHATSAPP_ACCESS_TOKEN}`
|
|
1062
1061
|
},
|
|
1063
1062
|
body: JSON.stringify({
|
|
1064
1063
|
messaging_product: 'whatsapp',
|
|
@@ -1145,7 +1144,7 @@ export async function queue(batch, env) {
|
|
|
1145
1144
|
- Plataformas selecionadas na FASE 0-B (Meta, Google, TikTok, etc.)
|
|
1146
1145
|
- `UMBRELLA_DOMAIN` — domínio principal do funil (detectado automaticamente ou fornecido pelo usuário)
|
|
1147
1146
|
- Secrets de plataformas: `META_ACCESS_TOKEN`, `GA4_API_SECRET`, `TIKTOK_ACCESS_TOKEN`
|
|
1148
|
-
- Secrets opcionais: `RESEND_API_KEY`, `
|
|
1147
|
+
- Secrets opcionais: `RESEND_API_KEY`, `WHATSAPP_ACCESS_TOKEN`, `WHATSAPP_PHONE_NUMBER_ID`
|
|
1149
1148
|
|
|
1150
1149
|
## RESPONSABILIDADE
|
|
1151
1150
|
|
|
@@ -73,6 +73,69 @@ Gere payloads para o Worker seguir a API oficial:
|
|
|
73
73
|
|
|
74
74
|
---
|
|
75
75
|
|
|
76
|
+
## ⏱️ RATE LIMITS — TikTok Events API v1.3
|
|
77
|
+
|
|
78
|
+
Conforme `contracts/api-versions.json`, a TikTok Events API tem limites estritos:
|
|
79
|
+
|
|
80
|
+
| Limite | Valor | Ação se excedido |
|
|
81
|
+
|--------|-------|-----------------|
|
|
82
|
+
| Requisições por minuto (por pixel) | 10 req/min | Implementar throttling |
|
|
83
|
+
| Eventos por batch | 5 events/batch | Agrupar eventos em batches |
|
|
84
|
+
| Retries máximos | 3 tentativas | Backoff exponencial |
|
|
85
|
+
|
|
86
|
+
### Implementação de Throttling no Worker
|
|
87
|
+
|
|
88
|
+
```javascript
|
|
89
|
+
// Rate limit KV key: 'tiktok_rate_{pixel_id}_{minute}'
|
|
90
|
+
async function dispatchTikTokWithRateLimit(env, events, pixelId, accessToken) {
|
|
91
|
+
const now = new Date();
|
|
92
|
+
const minuteKey = `tiktok_rate_${pixelId}_${now.getUTCFullYear()}${now.getUTCMonth()}${now.getUTCDate()}${now.getUTCHours()}${now.getUTCMinutes()}`;
|
|
93
|
+
|
|
94
|
+
// Verificar rate limit no KV
|
|
95
|
+
const currentCount = parseInt(await env.GEO_CACHE.get(minuteKey) || '0');
|
|
96
|
+
|
|
97
|
+
if (currentCount >= 10) {
|
|
98
|
+
// Rate limit atingido — encaminhar para RETRY_QUEUE
|
|
99
|
+
await env.RETRY_QUEUE.send({ platform: 'tiktok', events, pixelId });
|
|
100
|
+
return { queued: true, reason: 'rate_limit' };
|
|
101
|
+
}
|
|
102
|
+
|
|
103
|
+
// Agrupar eventos em batches de 5
|
|
104
|
+
const batches = [];
|
|
105
|
+
for (let i = 0; i < events.length; i += 5) {
|
|
106
|
+
batches.push(events.slice(i, i + 5));
|
|
107
|
+
}
|
|
108
|
+
|
|
109
|
+
const results = [];
|
|
110
|
+
for (const batch of batches) {
|
|
111
|
+
const result = await fetch('https://business-api.tiktok.com/open_api/v1.3/event/track/', {
|
|
112
|
+
method: 'POST',
|
|
113
|
+
headers: {
|
|
114
|
+
'Content-Type': 'application/json',
|
|
115
|
+
'Access-Token': accessToken
|
|
116
|
+
},
|
|
117
|
+
body: JSON.stringify({
|
|
118
|
+
pixel_code: pixelId,
|
|
119
|
+
event_source: 'web',
|
|
120
|
+
event_source_id: pixelId,
|
|
121
|
+
data: batch
|
|
122
|
+
})
|
|
123
|
+
});
|
|
124
|
+
|
|
125
|
+
// Incrementar contador no KV (TTL de 60s = 1 minuto)
|
|
126
|
+
await env.GEO_CACHE.put(minuteKey, String(currentCount + 1), { expirationTtl: 60 });
|
|
127
|
+
|
|
128
|
+
results.push(result);
|
|
129
|
+
}
|
|
130
|
+
|
|
131
|
+
return { sent: results.length, batches: batches.length };
|
|
132
|
+
}
|
|
133
|
+
```
|
|
134
|
+
|
|
135
|
+
> **Regra:** Se `HTTP 429` for recebido da TikTok API, encaminhar eventos para `RETRY_QUEUE` com backoff de 1min, 2min, 4min (máximo 3 tentativas).
|
|
136
|
+
|
|
137
|
+
---
|
|
138
|
+
|
|
76
139
|
## INPUTS RECEBIDOS
|
|
77
140
|
|
|
78
141
|
- JSON do Page Analyzer Agent (eventos mapeados, seletores, tipo de página)
|