create-brainerce-store 1.27.5 → 1.28.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (35) hide show
  1. package/dist/index.js +95 -22
  2. package/messages/en.json +12 -1
  3. package/messages/he.json +12 -1
  4. package/package.json +1 -1
  5. package/templates/nextjs/base/.env.local.ejs +3 -3
  6. package/templates/nextjs/base/next.config.ts +13 -12
  7. package/templates/nextjs/base/package.json.ejs +2 -1
  8. package/templates/nextjs/base/src/app/api/auth/logout/route.ts +15 -14
  9. package/templates/nextjs/base/src/app/api/auth/oauth-callback/route.ts +66 -59
  10. package/templates/nextjs/base/src/app/api/auth/reset-password/route.ts +76 -77
  11. package/templates/nextjs/base/src/app/api/store/[...path]/route.ts +229 -198
  12. package/templates/nextjs/base/src/app/checkout/page.tsx +975 -972
  13. package/templates/nextjs/base/src/app/layout.tsx.ejs +29 -13
  14. package/templates/nextjs/base/src/app/order-confirmation/page.tsx +271 -271
  15. package/templates/nextjs/base/src/app/payment-complete/page.tsx +59 -59
  16. package/templates/nextjs/base/src/app/products/[slug]/product-client-section.tsx +501 -486
  17. package/templates/nextjs/base/src/app/products/page.tsx +475 -475
  18. package/templates/nextjs/base/src/app/reset-password/page.tsx +138 -131
  19. package/templates/nextjs/base/src/components/auth/register-form.tsx +245 -232
  20. package/templates/nextjs/base/src/components/checkout/checkout-form.tsx +416 -415
  21. package/templates/nextjs/base/src/components/checkout/custom-fields-step.tsx +258 -184
  22. package/templates/nextjs/base/src/components/checkout/payment-step.tsx +84 -20
  23. package/templates/nextjs/base/src/components/seo/product-json-ld.tsx +86 -72
  24. package/templates/nextjs/base/src/lib/csrf.ts +11 -0
  25. package/templates/nextjs/base/src/lib/navigation.tsx.ejs +60 -60
  26. package/templates/nextjs/base/src/lib/nonce.ts +10 -0
  27. package/templates/nextjs/base/src/lib/safe-redirect.ts +45 -0
  28. package/templates/nextjs/base/src/lib/sanitize-html.ts +93 -0
  29. package/templates/nextjs/base/src/lib/validation.ts +37 -0
  30. package/templates/nextjs/base/src/middleware.ts.ejs +91 -8
  31. package/templates/nextjs/base/tsconfig.tsbuildinfo +1 -0
  32. package/templates/nextjs/themes/luxury/globals.css +399 -399
  33. package/templates/nextjs/themes/luxury/theme.json +23 -23
  34. package/templates/nextjs/themes/playful/globals.css +400 -400
  35. package/templates/nextjs/themes/playful/theme.json +23 -23
@@ -1,77 +1,76 @@
1
- import { NextRequest, NextResponse } from 'next/server';
2
- import { cookies, headers } from 'next/headers';
3
-
4
- const BACKEND_URL = (process.env.BRAINERCE_API_URL || 'https://api.brainerce.com').replace(
5
- /\/$/,
6
- ''
7
- );
8
-
9
- const CONNECTION_ID = process.env.NEXT_PUBLIC_BRAINERCE_CONNECTION_ID || '';
10
-
11
- const RESET_TOKEN_COOKIE = 'brainerce_reset_token';
12
- const CSRF_HEADER = 'x-requested-with';
13
- const CSRF_VALUE = 'brainerce';
14
-
15
- /**
16
- * BFF endpoint for password reset.
17
- * Reads the reset token from the httpOnly cookie (set by /api/auth/reset-callback)
18
- * and proxies the request to the backend. The token never touches client JS.
19
- */
20
- export async function POST(request: NextRequest) {
21
- // CSRF check
22
- const csrfHeader = request.headers.get(CSRF_HEADER);
23
- if (csrfHeader !== CSRF_VALUE) {
24
- return NextResponse.json({ error: 'CSRF validation failed' }, { status: 403 });
25
- }
26
-
27
- // Read reset token from httpOnly cookie
28
- const cookieStore = await cookies();
29
- const resetTokenCookie = cookieStore.get(RESET_TOKEN_COOKIE);
30
-
31
- if (!resetTokenCookie?.value) {
32
- return NextResponse.json(
33
- { error: 'No reset token found. Please request a new password reset link.' },
34
- { status: 400 }
35
- );
36
- }
37
-
38
- // Parse request body
39
- const body = await request.json();
40
- const { newPassword } = body;
41
-
42
- if (!newPassword) {
43
- return NextResponse.json({ error: 'New password is required' }, { status: 400 });
44
- }
45
-
46
- // Derive Origin from the incoming request so the backend's BrowserOriginGuard accepts it
47
- const requestHeaders = await headers();
48
- const host = requestHeaders.get('host') || 'localhost:3000';
49
- const proto = requestHeaders.get('x-forwarded-proto') || 'http';
50
- const origin = requestHeaders.get('origin') || `${proto}://${host}`;
51
-
52
- // Proxy to backend
53
- const backendUrl = `${BACKEND_URL}/api/vc/${CONNECTION_ID}/customers/reset-password`;
54
-
55
- const backendResponse = await fetch(backendUrl, {
56
- method: 'POST',
57
- headers: {
58
- 'Content-Type': 'application/json',
59
- Origin: origin,
60
- },
61
- body: JSON.stringify({
62
- token: resetTokenCookie.value,
63
- newPassword,
64
- }),
65
- });
66
-
67
- const data = await backendResponse.json();
68
-
69
- const response = NextResponse.json(data, {
70
- status: backendResponse.status,
71
- });
72
-
73
- // Always clear the reset token cookie after use (success or failure)
74
- response.cookies.delete(RESET_TOKEN_COOKIE);
75
-
76
- return response;
77
- }
1
+ import { NextRequest, NextResponse } from 'next/server';
2
+ import { cookies } from 'next/headers';
3
+ import { validatePassword } from '@/lib/validation';
4
+ import { checkCsrf } from '@/lib/csrf';
5
+
6
+ const BACKEND_URL = (process.env.BRAINERCE_API_URL || 'https://api.brainerce.com').replace(
7
+ /\/$/,
8
+ ''
9
+ );
10
+
11
+ const CONNECTION_ID = process.env.NEXT_PUBLIC_BRAINERCE_CONNECTION_ID || '';
12
+
13
+ const RESET_TOKEN_COOKIE = 'brainerce_reset_token';
14
+
15
+ /**
16
+ * BFF endpoint for password reset.
17
+ * Reads the reset token from the httpOnly cookie (set by /api/auth/reset-callback)
18
+ * and proxies the request to the backend. The token never touches client JS.
19
+ */
20
+ export async function POST(request: NextRequest) {
21
+ const csrfError = checkCsrf(request);
22
+ if (csrfError) return csrfError;
23
+
24
+ // Read reset token from httpOnly cookie
25
+ const cookieStore = await cookies();
26
+ const resetTokenCookie = cookieStore.get(RESET_TOKEN_COOKIE);
27
+
28
+ if (!resetTokenCookie?.value) {
29
+ return NextResponse.json(
30
+ { error: 'No reset token found. Please request a new password reset link.' },
31
+ { status: 400 }
32
+ );
33
+ }
34
+
35
+ // Parse request body
36
+ const body = await request.json();
37
+ const { newPassword } = body;
38
+
39
+ const passwordError = validatePassword(newPassword);
40
+ if (passwordError) {
41
+ return NextResponse.json({ error: passwordError }, { status: 400 });
42
+ }
43
+
44
+ // Proxy to backend
45
+ const backendUrl = `${BACKEND_URL}/api/vc/${CONNECTION_ID}/customers/reset-password`;
46
+
47
+ const backendResponse = await fetch(backendUrl, {
48
+ method: 'POST',
49
+ headers: {
50
+ 'Content-Type': 'application/json',
51
+ Origin: request.nextUrl.origin,
52
+ },
53
+ body: JSON.stringify({
54
+ token: resetTokenCookie.value,
55
+ newPassword,
56
+ }),
57
+ });
58
+
59
+ let data: unknown;
60
+ try {
61
+ data = await backendResponse.json();
62
+ } catch {
63
+ const response = NextResponse.json({ error: 'Invalid response from backend' }, { status: 502 });
64
+ response.cookies.delete(RESET_TOKEN_COOKIE);
65
+ return response;
66
+ }
67
+
68
+ const response = NextResponse.json(data, {
69
+ status: backendResponse.status,
70
+ });
71
+
72
+ // Always clear the reset token cookie after use (success or failure)
73
+ response.cookies.delete(RESET_TOKEN_COOKIE);
74
+
75
+ return response;
76
+ }
@@ -1,198 +1,229 @@
1
- import { NextRequest, NextResponse } from 'next/server';
2
- import { cookies } from 'next/headers';
3
-
4
- const BACKEND_URL = (process.env.BRAINERCE_API_URL || 'https://api.brainerce.com').replace(
5
- /\/$/,
6
- ''
7
- );
8
-
9
- const TOKEN_COOKIE = 'brainerce_customer_token';
10
- const LOGGED_IN_COOKIE = 'brainerce_logged_in';
11
- const CSRF_HEADER = 'x-requested-with';
12
- const CSRF_VALUE = 'brainerce';
13
-
14
- const COOKIE_MAX_AGE = 7 * 24 * 60 * 60; // 7 days
15
-
16
- /** Auth endpoints whose responses contain tokens to intercept */
17
- const AUTH_ENDPOINTS = ['customers/login', 'customers/register', 'customers/verify-email'];
18
-
19
- function isAuthEndpoint(path: string): boolean {
20
- return AUTH_ENDPOINTS.some((ep) => path.endsWith(ep));
21
- }
22
-
23
- function isSecure(): boolean {
24
- return process.env.NODE_ENV === 'production';
25
- }
26
-
27
- function setAuthCookies(response: NextResponse, token: string): void {
28
- response.cookies.set(TOKEN_COOKIE, token, {
29
- httpOnly: true,
30
- secure: isSecure(),
31
- sameSite: 'lax',
32
- path: '/',
33
- maxAge: COOKIE_MAX_AGE,
34
- });
35
- response.cookies.set(LOGGED_IN_COOKIE, '1', {
36
- httpOnly: false,
37
- secure: isSecure(),
38
- sameSite: 'lax',
39
- path: '/',
40
- maxAge: COOKIE_MAX_AGE,
41
- });
42
- }
43
-
44
- function clearAuthCookies(response: NextResponse): void {
45
- response.cookies.delete(TOKEN_COOKIE);
46
- response.cookies.delete(LOGGED_IN_COOKIE);
47
- }
48
-
49
- async function proxyRequest(
50
- request: NextRequest,
51
- params: { path: string[] }
52
- ): Promise<NextResponse> {
53
- const method = request.method;
54
-
55
- // CSRF protection for mutating requests
56
- if (['POST', 'PUT', 'PATCH', 'DELETE'].includes(method)) {
57
- const csrfHeader = request.headers.get(CSRF_HEADER);
58
- if (csrfHeader !== CSRF_VALUE) {
59
- return NextResponse.json({ error: 'CSRF validation failed' }, { status: 403 });
60
- }
61
- }
62
-
63
- // Build backend URL from path segments
64
- const pathSegments = params.path.join('/');
65
- const backendUrl = new URL(`${BACKEND_URL}/${pathSegments}`);
66
-
67
- // Forward query parameters
68
- request.nextUrl.searchParams.forEach((value, key) => {
69
- backendUrl.searchParams.set(key, value);
70
- });
71
-
72
- // Build headers for backend request
73
- const headers: Record<string, string> = {
74
- 'Content-Type': 'application/json',
75
- };
76
-
77
- // Forward Origin/Referer so backend BrowserOriginGuard accepts proxied requests
78
- // Always send Origin — same-origin GET requests may not include it, but the backend
79
- // uses its presence to distinguish fetch() calls from direct browser navigation
80
- const origin = request.headers.get('origin') || request.nextUrl.origin;
81
- const referer = request.headers.get('referer');
82
- headers['Origin'] = origin;
83
- if (referer) headers['Referer'] = referer;
84
-
85
- // Forward SDK version header if present
86
- const sdkVersion = request.headers.get('x-sdk-version');
87
- if (sdkVersion) {
88
- headers['X-SDK-Version'] = sdkVersion;
89
- }
90
-
91
- // Add auth token from httpOnly cookie
92
- const cookieStore = await cookies();
93
- const tokenCookie = cookieStore.get(TOKEN_COOKIE);
94
- if (tokenCookie?.value) {
95
- headers['Authorization'] = `Bearer ${tokenCookie.value}`;
96
- }
97
-
98
- // Forward request body for non-GET requests
99
- let body: string | undefined;
100
- if (method !== 'GET' && method !== 'HEAD') {
101
- try {
102
- body = await request.text();
103
- } catch {
104
- // No body
105
- }
106
- }
107
-
108
- // Proxy the request to backend
109
- let backendResponse: Response;
110
- try {
111
- backendResponse = await fetch(backendUrl.toString(), {
112
- method,
113
- headers,
114
- body,
115
- });
116
- } catch (error) {
117
- return NextResponse.json({ error: 'Backend service unavailable' }, { status: 502 });
118
- }
119
-
120
- // Read response body
121
- const responseText = await backendResponse.text();
122
-
123
- // For auth endpoints: intercept token, set cookie, strip token from response
124
- if (backendResponse.ok && method === 'POST' && isAuthEndpoint(pathSegments)) {
125
- try {
126
- const data = JSON.parse(responseText);
127
- if (data.token) {
128
- const token = data.token;
129
-
130
- // Strip token from client response
131
- const { token: _stripped, ...safeData } = data;
132
-
133
- const response = NextResponse.json(safeData, {
134
- status: backendResponse.status,
135
- });
136
- setAuthCookies(response, token);
137
- return response;
138
- }
139
- } catch {
140
- // Not JSON or no token field — pass through
141
- }
142
- }
143
-
144
- // Handle 401 responses: clear auth cookies
145
- if (backendResponse.status === 401 && tokenCookie?.value) {
146
- const response = new NextResponse(responseText, {
147
- status: backendResponse.status,
148
- headers: {
149
- 'Content-Type': backendResponse.headers.get('Content-Type') || 'application/json',
150
- },
151
- });
152
- clearAuthCookies(response);
153
- return response;
154
- }
155
-
156
- // Pass through response as-is
157
- return new NextResponse(responseText, {
158
- status: backendResponse.status,
159
- headers: {
160
- 'Content-Type': backendResponse.headers.get('Content-Type') || 'application/json',
161
- },
162
- });
163
- }
164
-
165
- export async function GET(
166
- request: NextRequest,
167
- { params }: { params: Promise<{ path: string[] }> }
168
- ) {
169
- return proxyRequest(request, await params);
170
- }
171
-
172
- export async function POST(
173
- request: NextRequest,
174
- { params }: { params: Promise<{ path: string[] }> }
175
- ) {
176
- return proxyRequest(request, await params);
177
- }
178
-
179
- export async function PUT(
180
- request: NextRequest,
181
- { params }: { params: Promise<{ path: string[] }> }
182
- ) {
183
- return proxyRequest(request, await params);
184
- }
185
-
186
- export async function PATCH(
187
- request: NextRequest,
188
- { params }: { params: Promise<{ path: string[] }> }
189
- ) {
190
- return proxyRequest(request, await params);
191
- }
192
-
193
- export async function DELETE(
194
- request: NextRequest,
195
- { params }: { params: Promise<{ path: string[] }> }
196
- ) {
197
- return proxyRequest(request, await params);
198
- }
1
+ // SECURITY: This BFF proxy intentionally has no application-level rate limiting.
2
+ // Rate limiting is the deployer's responsibility — configure it at the platform
3
+ // edge (Vercel Firewall, Cloudflare, nginx) or add a Redis-backed limiter
4
+ // (e.g. @upstash/ratelimit) here before going to production. Auth endpoints
5
+ // like customers/login and customers/register are the most important to cover.
6
+ import { NextRequest, NextResponse } from 'next/server';
7
+ import { cookies } from 'next/headers';
8
+ import { checkCsrf } from '@/lib/csrf';
9
+
10
+ const BACKEND_URL = (process.env.BRAINERCE_API_URL || 'https://api.brainerce.com').replace(
11
+ /\/$/,
12
+ ''
13
+ );
14
+
15
+ const TOKEN_COOKIE = 'brainerce_customer_token';
16
+ const LOGGED_IN_COOKIE = 'brainerce_logged_in';
17
+
18
+ const COOKIE_MAX_AGE = 7 * 24 * 60 * 60; // 7 days
19
+ const BACKEND_TIMEOUT_MS = 15_000;
20
+
21
+ /** Auth endpoints whose responses contain tokens to intercept */
22
+ const AUTH_ENDPOINTS = ['customers/login', 'customers/register', 'customers/verify-email'];
23
+
24
+ function isAuthEndpoint(path: string): boolean {
25
+ return AUTH_ENDPOINTS.some((ep) => path.endsWith(ep));
26
+ }
27
+
28
+ function isSafePathSegment(segment: string): boolean {
29
+ if (!segment) return false;
30
+ if (segment === '.' || segment === '..') return false;
31
+ if (segment.includes('/') || segment.includes('\\')) return false;
32
+ if (segment.includes('\0')) return false;
33
+ return true;
34
+ }
35
+
36
+ function isSecure(): boolean {
37
+ return process.env.NODE_ENV === 'production';
38
+ }
39
+
40
+ function setAuthCookies(response: NextResponse, token: string): void {
41
+ response.cookies.set(TOKEN_COOKIE, token, {
42
+ httpOnly: true,
43
+ secure: isSecure(),
44
+ sameSite: 'lax',
45
+ path: '/',
46
+ maxAge: COOKIE_MAX_AGE,
47
+ });
48
+ response.cookies.set(LOGGED_IN_COOKIE, '1', {
49
+ httpOnly: false,
50
+ secure: isSecure(),
51
+ sameSite: 'lax',
52
+ path: '/',
53
+ maxAge: COOKIE_MAX_AGE,
54
+ });
55
+ }
56
+
57
+ function clearAuthCookies(response: NextResponse): void {
58
+ response.cookies.delete(TOKEN_COOKIE);
59
+ response.cookies.delete(LOGGED_IN_COOKIE);
60
+ }
61
+
62
+ async function proxyRequest(
63
+ request: NextRequest,
64
+ params: { path: string[] }
65
+ ): Promise<NextResponse> {
66
+ const method = request.method;
67
+
68
+ // Reject path-traversal attempts before constructing the backend URL
69
+ if (!params.path.every(isSafePathSegment)) {
70
+ return NextResponse.json({ error: 'Invalid path' }, { status: 400 });
71
+ }
72
+
73
+ // CSRF protection for mutating requests
74
+ if (['POST', 'PUT', 'PATCH', 'DELETE'].includes(method)) {
75
+ const csrfError = checkCsrf(request);
76
+ if (csrfError) return csrfError;
77
+ }
78
+
79
+ // Build backend URL from path segments
80
+ const pathSegments = params.path.join('/');
81
+ const backendUrl = new URL(`${BACKEND_URL}/${pathSegments}`);
82
+
83
+ // Forward query parameters
84
+ request.nextUrl.searchParams.forEach((value, key) => {
85
+ backendUrl.searchParams.set(key, value);
86
+ });
87
+
88
+ // Build headers for backend request
89
+ const headers: Record<string, string> = {
90
+ 'Content-Type': 'application/json',
91
+ };
92
+
93
+ // Send the proxy's own origin (not the client-supplied Origin header).
94
+ // The backend's BrowserOriginGuard only checks for presence of Origin/Referer,
95
+ // so forwarding a client-controlled value adds spoofing surface for nothing.
96
+ headers['Origin'] = request.nextUrl.origin;
97
+
98
+ // Forward SDK version header if present
99
+ const sdkVersion = request.headers.get('x-sdk-version');
100
+ if (sdkVersion) {
101
+ headers['X-SDK-Version'] = sdkVersion;
102
+ }
103
+
104
+ // Add auth token from httpOnly cookie
105
+ const cookieStore = await cookies();
106
+ const tokenCookie = cookieStore.get(TOKEN_COOKIE);
107
+ if (tokenCookie?.value) {
108
+ headers['Authorization'] = `Bearer ${tokenCookie.value}`;
109
+ }
110
+
111
+ // Forward request body for non-GET requests
112
+ let body: string | undefined;
113
+ if (method !== 'GET' && method !== 'HEAD') {
114
+ try {
115
+ body = await request.text();
116
+ } catch {
117
+ // No body
118
+ }
119
+ }
120
+
121
+ // Proxy the request to backend
122
+ let backendResponse: Response;
123
+ const abortController = new AbortController();
124
+ const timeoutId = setTimeout(() => abortController.abort(), BACKEND_TIMEOUT_MS);
125
+ try {
126
+ backendResponse = await fetch(backendUrl.toString(), {
127
+ method,
128
+ headers,
129
+ body,
130
+ signal: abortController.signal,
131
+ });
132
+ } catch (error) {
133
+ const isTimeout = (error as Error)?.name === 'AbortError';
134
+ return NextResponse.json(
135
+ { error: isTimeout ? 'Backend request timed out' : 'Backend service unavailable' },
136
+ { status: isTimeout ? 504 : 502 }
137
+ );
138
+ } finally {
139
+ clearTimeout(timeoutId);
140
+ }
141
+
142
+ // Read response body
143
+ const responseText = await backendResponse.text();
144
+
145
+ // For auth endpoints: intercept token, set cookie, strip token from response
146
+ if (backendResponse.ok && method === 'POST' && isAuthEndpoint(pathSegments)) {
147
+ try {
148
+ const data = JSON.parse(responseText);
149
+ if (data.token) {
150
+ const token = data.token;
151
+
152
+ // Strip token from client response
153
+ const { token: _stripped, ...safeData } = data;
154
+
155
+ const response = NextResponse.json(safeData, {
156
+ status: backendResponse.status,
157
+ });
158
+ setAuthCookies(response, token);
159
+ return response;
160
+ }
161
+ } catch {
162
+ // Not JSON or no token field — pass through
163
+ }
164
+ }
165
+
166
+ // Handle 401 responses: clear auth cookies
167
+ if (backendResponse.status === 401 && tokenCookie?.value) {
168
+ const response = new NextResponse(responseText, {
169
+ status: backendResponse.status,
170
+ headers: {
171
+ 'Content-Type': backendResponse.headers.get('Content-Type') || 'application/json',
172
+ },
173
+ });
174
+ clearAuthCookies(response);
175
+ return response;
176
+ }
177
+
178
+ // Sanitize 5xx responses so backend internals don't leak to the client
179
+ if (backendResponse.status >= 500) {
180
+ console.error(`[proxy] backend ${backendResponse.status} on ${pathSegments}:`, responseText);
181
+ return NextResponse.json(
182
+ { error: 'Backend service error' },
183
+ { status: backendResponse.status }
184
+ );
185
+ }
186
+
187
+ // Pass through response as-is
188
+ return new NextResponse(responseText, {
189
+ status: backendResponse.status,
190
+ headers: {
191
+ 'Content-Type': backendResponse.headers.get('Content-Type') || 'application/json',
192
+ },
193
+ });
194
+ }
195
+
196
+ export async function GET(
197
+ request: NextRequest,
198
+ { params }: { params: Promise<{ path: string[] }> }
199
+ ) {
200
+ return proxyRequest(request, await params);
201
+ }
202
+
203
+ export async function POST(
204
+ request: NextRequest,
205
+ { params }: { params: Promise<{ path: string[] }> }
206
+ ) {
207
+ return proxyRequest(request, await params);
208
+ }
209
+
210
+ export async function PUT(
211
+ request: NextRequest,
212
+ { params }: { params: Promise<{ path: string[] }> }
213
+ ) {
214
+ return proxyRequest(request, await params);
215
+ }
216
+
217
+ export async function PATCH(
218
+ request: NextRequest,
219
+ { params }: { params: Promise<{ path: string[] }> }
220
+ ) {
221
+ return proxyRequest(request, await params);
222
+ }
223
+
224
+ export async function DELETE(
225
+ request: NextRequest,
226
+ { params }: { params: Promise<{ path: string[] }> }
227
+ ) {
228
+ return proxyRequest(request, await params);
229
+ }