mirror of
https://github.com/koala73/worldmonitor.git
synced 2026-04-25 17:14:57 +02:00
* feat(checkout): add /relay/create-checkout + internalCreateCheckout Shared _createCheckoutSession helper used by both public createCheckout (Convex auth) and internalCreateCheckout (trusted relay with userId). Relay route in http.ts follows notification-channels pattern. * feat(checkout): add /api/create-checkout edge gateway Thin auth proxy: validates Clerk JWT, relays to Convex /relay/create-checkout. CORS, POST only, no-store, 15s timeout. Same CONVEX_SITE_URL fallback as notification-channels. * feat(pro): add checkout service with Clerk + Dodo overlay Lazy Clerk init, token retry, auto-resume after sign-in, in-flight lock, doCheckout returns boolean for intent preservation. Added @clerk/clerk-js + dodopayments-checkout deps. * feat(pro): in-page checkout via Clerk sign-in + Dodo overlay PricingSection CTA buttons call startCheckout() directly instead of redirecting to dashboard. Dodo overlay initialized at App startup with success banner + redirect to dashboard after payment. * feat(checkout): migrate dashboard to /api/create-checkout edge endpoint Replace ConvexClient.action(createCheckout) with fetch to edge endpoint. Removes getConvexClient/getConvexApi/waitForConvexAuth dependency from checkout. Returns Promise<boolean>. resumePendingCheckout only clears intent on success. Token retry, in-flight lock, Sentry capture. * fix(checkout): restore customer prefill + use origin returnUrl P2-1: Extract email/name from Clerk JWT in validateBearerToken. Edge gateway forwards them to Convex relay. Dodo checkout prefilled again. P2-2: Dashboard returnUrl uses window.location.origin instead of hardcoded canonical URL. Respects variant hosts (app.worldmonitor.app). * fix(pro): guard ensureClerk concurrency, catch initOverlay import error - ensureClerk: promise guard prevents duplicate Clerk instances on concurrent calls - initOverlay: .catch() logs Dodo SDK import failures instead of unhandled rejection * test(auth): add JWT customer prefill extraction tests Verifies email/name are extracted from Clerk JWT payload for checkout prefill. Tests both present and absent cases.
142 lines
5.0 KiB
TypeScript
142 lines
5.0 KiB
TypeScript
/**
|
|
* Server-side session validation for the Vercel edge gateway.
|
|
*
|
|
* Validates Clerk-issued bearer tokens using local JWT verification
|
|
* with jose + cached JWKS. No Convex round-trip needed.
|
|
* Requires CLERK_PUBLISHABLE_KEY (server-side) and CLERK_JWT_ISSUER_DOMAIN.
|
|
*
|
|
* This module must NOT import anything from `src/` -- it runs in the
|
|
* Vercel edge runtime, not the browser.
|
|
*/
|
|
|
|
import { createRemoteJWKSet, jwtVerify } from 'jose';
|
|
|
|
// Clerk JWT issuer domain -- set in Vercel env vars
|
|
const CLERK_JWT_ISSUER_DOMAIN = process.env.CLERK_JWT_ISSUER_DOMAIN ?? '';
|
|
|
|
// Clerk Backend API secret -- used to look up user metadata when the JWT
|
|
// does not include a `plan` claim (i.e. standard session token, no template).
|
|
const CLERK_SECRET_KEY = process.env.CLERK_SECRET_KEY ?? '';
|
|
|
|
// Module-scope JWKS resolver -- cached across warm invocations.
|
|
// jose handles key rotation and caching internally.
|
|
// Exported so server/_shared/auth-session.ts can reuse the same singleton
|
|
// (avoids duplicate JWKS HTTP fetches on cold start).
|
|
// Reads CLERK_JWT_ISSUER_DOMAIN lazily (not from module-scope const) so that
|
|
// tests that set the env var after import still get a valid JWKS.
|
|
let _jwks: ReturnType<typeof createRemoteJWKSet> | null = null;
|
|
export function getJWKS() {
|
|
if (!_jwks) {
|
|
const issuerDomain = process.env.CLERK_JWT_ISSUER_DOMAIN;
|
|
if (issuerDomain) {
|
|
const jwksUrl = new URL('/.well-known/jwks.json', issuerDomain);
|
|
_jwks = createRemoteJWKSet(jwksUrl);
|
|
}
|
|
}
|
|
return _jwks;
|
|
}
|
|
|
|
export interface SessionResult {
|
|
valid: boolean;
|
|
userId?: string;
|
|
role?: 'free' | 'pro';
|
|
email?: string;
|
|
name?: string;
|
|
}
|
|
|
|
function getAllowedAudiences(): string[] {
|
|
const configured = [
|
|
process.env.CLERK_JWT_AUDIENCE,
|
|
process.env.CLERK_PUBLISHABLE_KEY,
|
|
]
|
|
.flatMap((value) => (value ?? '').split(','))
|
|
.map((value) => value.trim())
|
|
.filter(Boolean);
|
|
|
|
return Array.from(new Set(['convex', ...configured]));
|
|
}
|
|
|
|
export function getClerkJwtVerifyOptions() {
|
|
return {
|
|
issuer: CLERK_JWT_ISSUER_DOMAIN,
|
|
audience: getAllowedAudiences(),
|
|
algorithms: ['RS256'],
|
|
};
|
|
}
|
|
|
|
// Short-lived in-memory cache for plan lookups (userId → { role, expiresAt }).
|
|
// Avoids hammering the Clerk API on every premium request. TTL = 5 min.
|
|
const _planCache = new Map<string, { role: 'free' | 'pro'; expiresAt: number }>();
|
|
const PLAN_CACHE_TTL_MS = 5 * 60 * 1_000;
|
|
|
|
async function lookupPlanFromClerk(userId: string): Promise<'free' | 'pro'> {
|
|
const cached = _planCache.get(userId);
|
|
if (cached && Date.now() < cached.expiresAt) return cached.role;
|
|
|
|
if (!CLERK_SECRET_KEY) return 'free';
|
|
try {
|
|
const resp = await fetch(`https://api.clerk.com/v1/users/${userId}`, {
|
|
headers: { Authorization: `Bearer ${CLERK_SECRET_KEY}` },
|
|
});
|
|
if (!resp.ok) return 'free';
|
|
const user = (await resp.json()) as { public_metadata?: Record<string, unknown> };
|
|
const role: 'free' | 'pro' = user.public_metadata?.plan === 'pro' ? 'pro' : 'free';
|
|
_planCache.set(userId, { role, expiresAt: Date.now() + PLAN_CACHE_TTL_MS });
|
|
return role;
|
|
} catch {
|
|
return 'free';
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Validate a Clerk-issued bearer token using local JWKS verification.
|
|
* Accepts both custom-template tokens (with `plan` claim) and standard
|
|
* session tokens (plan looked up via Clerk Backend API).
|
|
* Fails closed: invalid/expired/unverifiable tokens return { valid: false }.
|
|
*/
|
|
export async function validateBearerToken(token: string): Promise<SessionResult> {
|
|
const jwks = getJWKS();
|
|
if (!jwks) return { valid: false };
|
|
|
|
try {
|
|
// Try with audience first (Clerk 'convex' template tokens include aud).
|
|
// Fall back without audience for standard Clerk session tokens (no aud claim).
|
|
let payload: Record<string, unknown>;
|
|
try {
|
|
({ payload } = await jwtVerify(token, jwks, getClerkJwtVerifyOptions()));
|
|
} catch (audErr) {
|
|
if ((audErr as Error).message?.includes('missing required "aud"')) {
|
|
({ payload } = await jwtVerify(token, jwks, {
|
|
issuer: CLERK_JWT_ISSUER_DOMAIN,
|
|
algorithms: ['RS256'],
|
|
}));
|
|
} else {
|
|
throw audErr;
|
|
}
|
|
}
|
|
|
|
const userId = payload.sub as string | undefined;
|
|
if (!userId) return { valid: false };
|
|
|
|
// `plan` claim is present only in 'convex' template tokens. For standard
|
|
// session tokens we fall back to a cached Clerk API lookup.
|
|
const rawPlan = (payload as Record<string, unknown>).plan;
|
|
const role: 'free' | 'pro' =
|
|
rawPlan !== undefined
|
|
? rawPlan === 'pro'
|
|
? 'pro'
|
|
: 'free'
|
|
: await lookupPlanFromClerk(userId);
|
|
|
|
const email = typeof payload.email === 'string' ? payload.email : undefined;
|
|
const givenName = typeof payload.given_name === 'string' ? payload.given_name : undefined;
|
|
const familyName = typeof payload.family_name === 'string' ? payload.family_name : undefined;
|
|
const name = [givenName, familyName].filter(Boolean).join(' ') || undefined;
|
|
|
|
return { valid: true, userId, role, email, name };
|
|
} catch {
|
|
// Signature verification failed, expired, wrong issuer, etc.
|
|
return { valid: false };
|
|
}
|
|
}
|