Split middleware into separate files
This commit is contained in:
parent
43f81f1af6
commit
158a40203e
11 changed files with 269 additions and 232 deletions
|
@ -1,206 +0,0 @@
|
|||
import crypto from "crypto";
|
||||
import * as jose from "jose";
|
||||
import type { Middleware, Request } from "retes";
|
||||
import { Response } from "retes/response";
|
||||
|
||||
import { APL } from "./APL";
|
||||
import { SALEOR_AUTHORIZATION_BEARER_HEADER, SALEOR_SIGNATURE_HEADER } from "./const";
|
||||
import { getSaleorHeaders } from "./headers";
|
||||
import { getJwksUrl } from "./urls";
|
||||
|
||||
export const withBaseURL: Middleware = (handler) => async (request) => {
|
||||
const { host, "x-forwarded-proto": protocol = "http" } = request.headers;
|
||||
|
||||
request.context.baseURL = `${protocol}://${host}`;
|
||||
|
||||
return handler(request);
|
||||
};
|
||||
|
||||
export const withSaleorDomainPresent: Middleware = (handler) => async (request) => {
|
||||
const { domain } = getSaleorHeaders(request.headers);
|
||||
|
||||
if (!domain) {
|
||||
return Response.BadRequest({
|
||||
success: false,
|
||||
message: "Missing Saleor domain header.",
|
||||
});
|
||||
}
|
||||
|
||||
return handler(request);
|
||||
};
|
||||
|
||||
export const withSaleorEventMatch =
|
||||
<E extends string>(expectedEvent: `${Lowercase<E>}`): Middleware =>
|
||||
(handler) =>
|
||||
async (request) => {
|
||||
const { event } = getSaleorHeaders(request.headers);
|
||||
|
||||
if (event !== expectedEvent) {
|
||||
return Response.BadRequest({
|
||||
success: false,
|
||||
message: `Invalid Saleor event. Expecting ${expectedEvent}.`,
|
||||
});
|
||||
}
|
||||
|
||||
return handler(request);
|
||||
};
|
||||
|
||||
export const withAuthTokenRequired: Middleware = (handler) => async (request) => {
|
||||
const authToken = request.params.auth_token;
|
||||
if (!authToken) {
|
||||
return Response.BadRequest({
|
||||
success: false,
|
||||
message: "Missing auth token.",
|
||||
});
|
||||
}
|
||||
|
||||
return handler(request);
|
||||
};
|
||||
|
||||
export const withWebhookSignatureVerified =
|
||||
(secretKey: string | undefined = undefined): Middleware =>
|
||||
(handler) =>
|
||||
async (request) => {
|
||||
const ERROR_MESSAGE = "Webhook signature verification failed:";
|
||||
|
||||
if (request.rawBody === undefined) {
|
||||
return Response.InternalServerError({
|
||||
success: false,
|
||||
message: `${ERROR_MESSAGE} Request payload already parsed.`,
|
||||
});
|
||||
}
|
||||
|
||||
const { domain: saleorDomain, signature: payloadSignature } = getSaleorHeaders(request.headers);
|
||||
|
||||
if (!payloadSignature) {
|
||||
return Response.BadRequest({
|
||||
success: false,
|
||||
message: `${ERROR_MESSAGE} Missing ${SALEOR_SIGNATURE_HEADER} header.`,
|
||||
});
|
||||
}
|
||||
|
||||
if (secretKey !== undefined) {
|
||||
const calculatedSignature = crypto
|
||||
.createHmac("sha256", secretKey)
|
||||
.update(request.rawBody)
|
||||
.digest("hex");
|
||||
|
||||
if (calculatedSignature !== payloadSignature) {
|
||||
return Response.BadRequest({
|
||||
success: false,
|
||||
message: `${ERROR_MESSAGE} Verification using secret key has failed.`,
|
||||
});
|
||||
}
|
||||
} else {
|
||||
const [header, , signature] = payloadSignature.split(".");
|
||||
const jws = {
|
||||
protected: header,
|
||||
payload: request.rawBody,
|
||||
signature,
|
||||
};
|
||||
|
||||
const remoteJwks = jose.createRemoteJWKSet(
|
||||
new URL(getJwksUrl(saleorDomain))
|
||||
) as jose.FlattenedVerifyGetKey;
|
||||
|
||||
try {
|
||||
await jose.flattenedVerify(jws, remoteJwks);
|
||||
} catch {
|
||||
return Response.BadRequest({
|
||||
success: false,
|
||||
message: `${ERROR_MESSAGE} Verification using public key has failed.`,
|
||||
});
|
||||
}
|
||||
}
|
||||
|
||||
return handler(request);
|
||||
};
|
||||
|
||||
export interface DashboardTokenPayload extends jose.JWTPayload {
|
||||
app: string;
|
||||
}
|
||||
|
||||
export const withJWTVerified =
|
||||
(getAppId: (request: Request) => Promise<string | undefined>): Middleware =>
|
||||
(handler) =>
|
||||
async (request) => {
|
||||
const { domain, authorizationBearer: token } = getSaleorHeaders(request.headers);
|
||||
const ERROR_MESSAGE = "JWT verification failed:";
|
||||
|
||||
if (token === undefined) {
|
||||
return Response.BadRequest({
|
||||
success: false,
|
||||
message: `${ERROR_MESSAGE} Missing ${SALEOR_AUTHORIZATION_BEARER_HEADER} header.`,
|
||||
});
|
||||
}
|
||||
|
||||
let tokenClaims: DashboardTokenPayload;
|
||||
try {
|
||||
tokenClaims = jose.decodeJwt(token as string) as DashboardTokenPayload;
|
||||
} catch (e) {
|
||||
return Response.BadRequest({
|
||||
success: false,
|
||||
message: `${ERROR_MESSAGE} Could not decode authorization token.`,
|
||||
});
|
||||
}
|
||||
|
||||
if (tokenClaims.iss !== domain) {
|
||||
return Response.BadRequest({
|
||||
success: false,
|
||||
message: `${ERROR_MESSAGE} Token iss property is different than domain header.`,
|
||||
});
|
||||
}
|
||||
|
||||
let appId: string | undefined;
|
||||
try {
|
||||
appId = await getAppId(request);
|
||||
} catch (error) {
|
||||
return Response.InternalServerError({
|
||||
success: false,
|
||||
message: `${ERROR_MESSAGE} Could not obtain the app ID.`,
|
||||
});
|
||||
}
|
||||
|
||||
if (!appId) {
|
||||
return Response.InternalServerError({
|
||||
success: false,
|
||||
message: `${ERROR_MESSAGE} No value for app ID.`,
|
||||
});
|
||||
}
|
||||
|
||||
if (tokenClaims.app !== appId) {
|
||||
return Response.BadRequest({
|
||||
success: false,
|
||||
message: `${ERROR_MESSAGE} Token's app property is different than app ID.`,
|
||||
});
|
||||
}
|
||||
|
||||
try {
|
||||
const JWKS = jose.createRemoteJWKSet(new URL(getJwksUrl(domain)));
|
||||
await jose.jwtVerify(token, JWKS);
|
||||
} catch (e) {
|
||||
console.error(e);
|
||||
return Response.BadRequest({
|
||||
success: false,
|
||||
message: `${ERROR_MESSAGE} JWT signature verification failed.`,
|
||||
});
|
||||
}
|
||||
|
||||
return handler(request);
|
||||
};
|
||||
|
||||
export const withRegisteredSaleorDomainHeader =
|
||||
({ apl }: { apl: APL }): Middleware =>
|
||||
(handler) =>
|
||||
async (request) => {
|
||||
const { domain: saleorDomain } = getSaleorHeaders(request.headers);
|
||||
const authData = await apl.get(saleorDomain);
|
||||
if (!authData) {
|
||||
return Response.Forbidden({
|
||||
success: false,
|
||||
message: `Domain ${saleorDomain} not registered.`,
|
||||
});
|
||||
}
|
||||
|
||||
return handler(request);
|
||||
};
|
6
src/middleware/index.ts
Normal file
6
src/middleware/index.ts
Normal file
|
@ -0,0 +1,6 @@
|
|||
export * from "./with-auth-token-required";
|
||||
export * from "./with-base-url";
|
||||
export * from "./with-registered-saleor-domain-header";
|
||||
export * from "./with-saleor-domain-present";
|
||||
export * from "./with-saleor-event-match";
|
||||
export * from "./with-webhook-signature-verified";
|
14
src/middleware/with-auth-token-required.ts
Normal file
14
src/middleware/with-auth-token-required.ts
Normal file
|
@ -0,0 +1,14 @@
|
|||
import { Middleware } from "retes";
|
||||
import { Response } from "retes/response";
|
||||
|
||||
export const withAuthTokenRequired: Middleware = (handler) => async (request) => {
|
||||
const authToken = request.params.auth_token;
|
||||
if (!authToken) {
|
||||
return Response.BadRequest({
|
||||
success: false,
|
||||
message: "Missing auth token.",
|
||||
});
|
||||
}
|
||||
|
||||
return handler(request);
|
||||
};
|
32
src/middleware/with-base-url.test.ts
Normal file
32
src/middleware/with-base-url.test.ts
Normal file
|
@ -0,0 +1,32 @@
|
|||
import { Handler, Request } from "retes";
|
||||
import { Response } from "retes/response";
|
||||
import { beforeEach, describe, expect, it, vi } from "vitest";
|
||||
|
||||
import { withBaseURL } from "./with-base-url";
|
||||
|
||||
const getMockEmptyResponse = async () => ({} as Response);
|
||||
|
||||
describe("middleware.test.ts", () => {
|
||||
describe("withBaseURL", () => {
|
||||
let mockHandlerFn: Handler = vi.fn(getMockEmptyResponse);
|
||||
|
||||
beforeEach(() => {
|
||||
mockHandlerFn = vi.fn();
|
||||
});
|
||||
|
||||
it("Adds base URL from request header to context and calls handler", async () => {
|
||||
const mockRequest = {
|
||||
context: {},
|
||||
headers: {
|
||||
host: "my-saleor-env.saleor.cloud",
|
||||
"x-forwarded-proto": "https",
|
||||
},
|
||||
} as unknown as Request;
|
||||
|
||||
await withBaseURL(mockHandlerFn)(mockRequest);
|
||||
|
||||
expect(mockRequest.context.baseURL).toBe("https://my-saleor-env.saleor.cloud");
|
||||
expect(mockHandlerFn).toHaveBeenCalledOnce();
|
||||
});
|
||||
});
|
||||
});
|
9
src/middleware/with-base-url.ts
Normal file
9
src/middleware/with-base-url.ts
Normal file
|
@ -0,0 +1,9 @@
|
|||
import { Middleware } from "retes";
|
||||
|
||||
export const withBaseURL: Middleware = (handler) => async (request) => {
|
||||
const { host, "x-forwarded-proto": protocol = "http" } = request.headers;
|
||||
|
||||
request.context.baseURL = `${protocol}://${host}`;
|
||||
|
||||
return handler(request);
|
||||
};
|
80
src/middleware/with-jwt-verified.ts
Normal file
80
src/middleware/with-jwt-verified.ts
Normal file
|
@ -0,0 +1,80 @@
|
|||
import * as jose from "jose";
|
||||
import type { Middleware, Request } from "retes";
|
||||
import { Response } from "retes/response";
|
||||
|
||||
import { SALEOR_AUTHORIZATION_BEARER_HEADER } from "../const";
|
||||
import { getSaleorHeaders } from "../headers";
|
||||
import { getJwksUrl } from "../urls";
|
||||
|
||||
export interface DashboardTokenPayload extends jose.JWTPayload {
|
||||
app: string;
|
||||
}
|
||||
|
||||
export const withJWTVerified =
|
||||
(getAppId: (request: Request) => Promise<string | undefined>): Middleware =>
|
||||
(handler) =>
|
||||
async (request) => {
|
||||
const { domain, authorizationBearer: token } = getSaleorHeaders(request.headers);
|
||||
const ERROR_MESSAGE = "JWT verification failed:";
|
||||
|
||||
if (token === undefined) {
|
||||
return Response.BadRequest({
|
||||
success: false,
|
||||
message: `${ERROR_MESSAGE} Missing ${SALEOR_AUTHORIZATION_BEARER_HEADER} header.`,
|
||||
});
|
||||
}
|
||||
|
||||
let tokenClaims: DashboardTokenPayload;
|
||||
try {
|
||||
tokenClaims = jose.decodeJwt(token as string) as DashboardTokenPayload;
|
||||
} catch (e) {
|
||||
return Response.BadRequest({
|
||||
success: false,
|
||||
message: `${ERROR_MESSAGE} Could not decode authorization token.`,
|
||||
});
|
||||
}
|
||||
|
||||
if (tokenClaims.iss !== domain) {
|
||||
return Response.BadRequest({
|
||||
success: false,
|
||||
message: `${ERROR_MESSAGE} Token iss property is different than domain header.`,
|
||||
});
|
||||
}
|
||||
|
||||
let appId: string | undefined;
|
||||
try {
|
||||
appId = await getAppId(request);
|
||||
} catch (error) {
|
||||
return Response.InternalServerError({
|
||||
success: false,
|
||||
message: `${ERROR_MESSAGE} Could not obtain the app ID.`,
|
||||
});
|
||||
}
|
||||
|
||||
if (!appId) {
|
||||
return Response.InternalServerError({
|
||||
success: false,
|
||||
message: `${ERROR_MESSAGE} No value for app ID.`,
|
||||
});
|
||||
}
|
||||
|
||||
if (tokenClaims.app !== appId) {
|
||||
return Response.BadRequest({
|
||||
success: false,
|
||||
message: `${ERROR_MESSAGE} Token's app property is different than app ID.`,
|
||||
});
|
||||
}
|
||||
|
||||
try {
|
||||
const JWKS = jose.createRemoteJWKSet(new URL(getJwksUrl(domain)));
|
||||
await jose.jwtVerify(token, JWKS);
|
||||
} catch (e) {
|
||||
console.error(e);
|
||||
return Response.BadRequest({
|
||||
success: false,
|
||||
message: `${ERROR_MESSAGE} JWT signature verification failed.`,
|
||||
});
|
||||
}
|
||||
|
||||
return handler(request);
|
||||
};
|
|
@ -2,36 +2,13 @@ import { Handler, Request } from "retes";
|
|||
import { Response } from "retes/response";
|
||||
import { beforeEach, describe, expect, it, vi } from "vitest";
|
||||
|
||||
import { APL } from "./APL";
|
||||
import { SALEOR_DOMAIN_HEADER } from "./const";
|
||||
import { withBaseURL, withRegisteredSaleorDomainHeader } from "./middleware";
|
||||
import { APL } from "../APL";
|
||||
import { SALEOR_DOMAIN_HEADER } from "../const";
|
||||
import { withRegisteredSaleorDomainHeader } from "./with-registered-saleor-domain-header";
|
||||
|
||||
const getMockSuccessResponse = async () => Response.OK({});
|
||||
|
||||
describe("middleware.test.ts", () => {
|
||||
describe("withBaseURL", () => {
|
||||
let mockHandlerFn: Handler = vi.fn(getMockSuccessResponse);
|
||||
|
||||
beforeEach(() => {
|
||||
mockHandlerFn = vi.fn(getMockSuccessResponse);
|
||||
});
|
||||
|
||||
it("Adds base URL from request header to context and calls handler", async () => {
|
||||
const mockRequest = {
|
||||
context: {},
|
||||
headers: {
|
||||
host: "my-saleor-env.saleor.cloud",
|
||||
"x-forwarded-proto": "https",
|
||||
},
|
||||
} as unknown as Request;
|
||||
|
||||
await withBaseURL(mockHandlerFn)(mockRequest);
|
||||
|
||||
expect(mockRequest.context.baseURL).toBe("https://my-saleor-env.saleor.cloud");
|
||||
expect(mockHandlerFn).toHaveBeenCalledOnce();
|
||||
});
|
||||
});
|
||||
|
||||
describe("withRegisteredSaleorDomainHeader", () => {
|
||||
let mockHandlerFn: Handler = vi.fn(getMockSuccessResponse);
|
||||
|
21
src/middleware/with-registered-saleor-domain-header.ts
Normal file
21
src/middleware/with-registered-saleor-domain-header.ts
Normal file
|
@ -0,0 +1,21 @@
|
|||
import { Middleware } from "retes";
|
||||
import { Response } from "retes/response";
|
||||
|
||||
import { APL } from "../APL";
|
||||
import { getSaleorHeaders } from "../headers";
|
||||
|
||||
export const withRegisteredSaleorDomainHeader =
|
||||
({ apl }: { apl: APL }): Middleware =>
|
||||
(handler) =>
|
||||
async (request) => {
|
||||
const { domain: saleorDomain } = getSaleorHeaders(request.headers);
|
||||
const authData = await apl.get(saleorDomain);
|
||||
if (!authData) {
|
||||
return Response.Forbidden({
|
||||
success: false,
|
||||
message: `Domain ${saleorDomain} not registered.`,
|
||||
});
|
||||
}
|
||||
|
||||
return handler(request);
|
||||
};
|
17
src/middleware/with-saleor-domain-present.ts
Normal file
17
src/middleware/with-saleor-domain-present.ts
Normal file
|
@ -0,0 +1,17 @@
|
|||
import { Middleware } from "retes";
|
||||
import { Response } from "retes/response";
|
||||
|
||||
import { getSaleorHeaders } from "../headers";
|
||||
|
||||
export const withSaleorDomainPresent: Middleware = (handler) => async (request) => {
|
||||
const { domain } = getSaleorHeaders(request.headers);
|
||||
|
||||
if (!domain) {
|
||||
return Response.BadRequest({
|
||||
success: false,
|
||||
message: "Missing Saleor domain header.",
|
||||
});
|
||||
}
|
||||
|
||||
return handler(request);
|
||||
};
|
20
src/middleware/with-saleor-event-match.ts
Normal file
20
src/middleware/with-saleor-event-match.ts
Normal file
|
@ -0,0 +1,20 @@
|
|||
import { Middleware } from "retes";
|
||||
import { Response } from "retes/response";
|
||||
|
||||
import { getSaleorHeaders } from "../headers";
|
||||
|
||||
export const withSaleorEventMatch =
|
||||
<E extends string>(expectedEvent: `${Lowercase<E>}`): Middleware =>
|
||||
(handler) =>
|
||||
async (request) => {
|
||||
const { event } = getSaleorHeaders(request.headers);
|
||||
|
||||
if (event !== expectedEvent) {
|
||||
return Response.BadRequest({
|
||||
success: false,
|
||||
message: `Invalid Saleor event. Expecting ${expectedEvent}.`,
|
||||
});
|
||||
}
|
||||
|
||||
return handler(request);
|
||||
};
|
67
src/middleware/with-webhook-signature-verified.ts
Normal file
67
src/middleware/with-webhook-signature-verified.ts
Normal file
|
@ -0,0 +1,67 @@
|
|||
import crypto from "crypto";
|
||||
import * as jose from "jose";
|
||||
import { Middleware } from "retes";
|
||||
import { Response } from "retes/response";
|
||||
|
||||
import { SALEOR_SIGNATURE_HEADER } from "../const";
|
||||
import { getSaleorHeaders } from "../headers";
|
||||
import { getJwksUrl } from "../urls";
|
||||
|
||||
export const withWebhookSignatureVerified =
|
||||
(secretKey: string | undefined = undefined): Middleware =>
|
||||
(handler) =>
|
||||
async (request) => {
|
||||
const ERROR_MESSAGE = "Webhook signature verification failed:";
|
||||
|
||||
if (request.rawBody === undefined) {
|
||||
return Response.InternalServerError({
|
||||
success: false,
|
||||
message: `${ERROR_MESSAGE} Request payload already parsed.`,
|
||||
});
|
||||
}
|
||||
|
||||
const { domain: saleorDomain, signature: payloadSignature } = getSaleorHeaders(request.headers);
|
||||
|
||||
if (!payloadSignature) {
|
||||
return Response.BadRequest({
|
||||
success: false,
|
||||
message: `${ERROR_MESSAGE} Missing ${SALEOR_SIGNATURE_HEADER} header.`,
|
||||
});
|
||||
}
|
||||
|
||||
if (secretKey !== undefined) {
|
||||
const calculatedSignature = crypto
|
||||
.createHmac("sha256", secretKey)
|
||||
.update(request.rawBody)
|
||||
.digest("hex");
|
||||
|
||||
if (calculatedSignature !== payloadSignature) {
|
||||
return Response.BadRequest({
|
||||
success: false,
|
||||
message: `${ERROR_MESSAGE} Verification using secret key has failed.`,
|
||||
});
|
||||
}
|
||||
} else {
|
||||
const [header, , signature] = payloadSignature.split(".");
|
||||
const jws = {
|
||||
protected: header,
|
||||
payload: request.rawBody,
|
||||
signature,
|
||||
};
|
||||
|
||||
const remoteJwks = jose.createRemoteJWKSet(
|
||||
new URL(getJwksUrl(saleorDomain))
|
||||
) as jose.FlattenedVerifyGetKey;
|
||||
|
||||
try {
|
||||
await jose.flattenedVerify(jws, remoteJwks);
|
||||
} catch {
|
||||
return Response.BadRequest({
|
||||
success: false,
|
||||
message: `${ERROR_MESSAGE} Verification using public key has failed.`,
|
||||
});
|
||||
}
|
||||
}
|
||||
|
||||
return handler(request);
|
||||
};
|
Loading…
Reference in a new issue