Update CSRF protection and modify database types
The CSRF protection in middleware has been re-implemented with `@edge-csrf/nextjs`, to catch and handle CSRF errors more effectively. Additionally, some parameters are renamed and functions are added in `database.types.ts` for better role management. The dependency in `package.json` has also been updated to reflect the changes.
This commit is contained in:
@@ -667,7 +667,7 @@ export type Database = {
|
||||
can_action_account_member: {
|
||||
Args: {
|
||||
target_team_account_id: string
|
||||
user_id: string
|
||||
target_user_id: string
|
||||
}
|
||||
Returns: boolean
|
||||
}
|
||||
@@ -747,6 +747,10 @@ export type Database = {
|
||||
Args: Record<PropertyKey, never>
|
||||
Returns: Json
|
||||
}
|
||||
get_upper_system_role: {
|
||||
Args: Record<PropertyKey, never>
|
||||
Returns: string
|
||||
}
|
||||
has_more_elevated_role: {
|
||||
Args: {
|
||||
target_user_id: string
|
||||
@@ -770,6 +774,14 @@ export type Database = {
|
||||
}
|
||||
Returns: boolean
|
||||
}
|
||||
has_same_role_hierarchy_level: {
|
||||
Args: {
|
||||
target_user_id: string
|
||||
target_account_id: string
|
||||
role_name: string
|
||||
}
|
||||
Returns: boolean
|
||||
}
|
||||
is_account_owner: {
|
||||
Args: {
|
||||
account_id: string
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
import type { NextRequest } from 'next/server';
|
||||
import { NextResponse, URLPattern } from 'next/server';
|
||||
|
||||
import csrf from 'edge-csrf';
|
||||
import { CsrfError, createCsrfProtect } from '@edge-csrf/nextjs';
|
||||
|
||||
import { checkRequiresMultiFactorAuthentication } from '@kit/supabase/check-requires-mfa';
|
||||
import { createMiddlewareClient } from '@kit/supabase/middleware-client';
|
||||
@@ -46,7 +46,7 @@ async function withCsrfMiddleware(
|
||||
response = new NextResponse(),
|
||||
) {
|
||||
// set up CSRF protection
|
||||
const csrfMiddleware = csrf({
|
||||
const csrfProtect = createCsrfProtect({
|
||||
cookie: {
|
||||
secure: appConfig.production,
|
||||
name: CSRF_SECRET_COOKIE,
|
||||
@@ -58,17 +58,20 @@ async function withCsrfMiddleware(
|
||||
['GET', 'HEAD', 'OPTIONS'],
|
||||
});
|
||||
|
||||
const csrfError = await csrfMiddleware(request, response);
|
||||
try {
|
||||
await csrfProtect(request, response);
|
||||
|
||||
// if there is a CSRF error, return a 403 response
|
||||
if (csrfError) {
|
||||
return NextResponse.json('Invalid CSRF token', {
|
||||
status: 401,
|
||||
});
|
||||
return response;
|
||||
} catch (error) {
|
||||
// if there is a CSRF error, return a 403 response
|
||||
if (error instanceof CsrfError) {
|
||||
return NextResponse.json('Invalid CSRF token', {
|
||||
status: 401,
|
||||
});
|
||||
}
|
||||
|
||||
throw error;
|
||||
}
|
||||
|
||||
// otherwise, return the response
|
||||
return response;
|
||||
}
|
||||
|
||||
function isServerAction(request: NextRequest) {
|
||||
|
||||
@@ -57,7 +57,7 @@
|
||||
"@tanstack/react-query-next-experimental": "^5.29.2",
|
||||
"@tanstack/react-table": "^8.16.0",
|
||||
"date-fns": "^3.6.0",
|
||||
"edge-csrf": "1.0.12-sveltekit-1",
|
||||
"@edge-csrf/nextjs": "2.0.0",
|
||||
"i18next": "^23.11.2",
|
||||
"i18next-resources-to-backend": "^1.2.1",
|
||||
"lucide-react": "^0.368.0",
|
||||
|
||||
Reference in New Issue
Block a user