saleor-app-sdk-REDIS_APL/src/middleware.ts

109 lines
2.8 KiB
TypeScript
Raw Normal View History

import crypto from "crypto";
import * as jose from "jose";
import type { Middleware } from "retes";
import { Response } from "retes/response";
2022-05-26 12:14:13 +00:00
import { SALEOR_DOMAIN_HEADER, SALEOR_EVENT_HEADER } from "./const";
import { jwksUrl } from "./urls";
2022-05-26 12:14:13 +00:00
export const withBaseURL: Middleware = (handler) => async (request) => {
const { host, "x-forwarded-proto": protocol = "http" } = request.headers;
request.context.baseURL = `${protocol}://${host}`;
const response = await handler(request);
return response;
};
2022-05-26 12:14:13 +00:00
2022-07-20 14:04:38 +00:00
export const withSaleorDomainPresent: Middleware = (handler) => async (request) => {
const saleorDomain = request.headers[SALEOR_DOMAIN_HEADER];
2022-05-26 12:14:13 +00:00
2022-07-20 14:04:38 +00:00
if (!saleorDomain) {
return Response.BadRequest({
success: false,
message: "Missing Saleor domain header.",
});
}
2022-05-26 12:14:13 +00:00
2022-07-20 14:04:38 +00:00
return handler(request);
};
2022-05-26 12:14:13 +00:00
export const withSaleorEventMatch =
(expectedEvent: string): Middleware =>
(handler) =>
async (request) => {
const receivedEvent = request.headers[SALEOR_EVENT_HEADER];
2022-05-26 12:14:13 +00:00
if (receivedEvent !== expectedEvent) {
return Response.BadRequest({
success: false,
message: "Invalid Saleor Event",
});
}
2022-05-26 12:14:13 +00:00
return handler(request);
};
2022-07-20 14:04:38 +00:00
export const withAuthTokenRequired: Middleware = (handler) => async (request) => {
const authToken = request.params.auth_token;
if (!authToken) {
return Response.BadRequest({
success: false,
message: "Missing auth token.",
});
}
2022-07-20 14:04:38 +00:00
return handler(request);
};
2022-05-26 12:14:13 +00:00
2022-07-20 14:04:38 +00:00
export const withWebhookSignatureVerified =
(secretKey: string | undefined = undefined): Middleware =>
(handler) =>
async (request) => {
if (request.rawBody === undefined) {
return Response.InternalServerError({
success: false,
message: "Request payload already parsed.",
});
}
2022-05-26 12:14:13 +00:00
2022-07-20 14:04:38 +00:00
const { [SALEOR_DOMAIN_HEADER]: saleorDomain, "saleor-signature": payloadSignature } =
request.headers;
if (secretKey !== undefined) {
const calculatedSignature = crypto
.createHmac("sha256", secretKey)
.update(request.rawBody)
.digest("hex");
if (calculatedSignature !== payloadSignature) {
return Response.BadRequest({
success: false,
message: "Invalid signature.",
});
}
} else {
const [header, _, signature] = payloadSignature.split(".");
const jws = {
protected: header,
payload: request.rawBody,
signature,
};
const jwks = jose.createRemoteJWKSet(
new URL(jwksUrl(saleorDomain))
) as jose.FlattenedVerifyGetKey;
try {
await jose.flattenedVerify(jws, jwks);
} catch {
return Response.BadRequest({
success: false,
message: "Invalid signature.",
});
}
}
return handler(request);
};