UNPKG

next

Version:

The React Framework

188 lines (187 loc) • 9.7 kB
/* eslint-disable import/no-extraneous-dependencies */ "use strict"; Object.defineProperty(exports, "__esModule", { value: true }); 0 && (module.exports = { decryptActionBoundArgs: null, encryptActionBoundArgs: null }); function _export(target, all) { for(var name in all)Object.defineProperty(target, name, { enumerable: true, get: all[name] }); } _export(exports, { decryptActionBoundArgs: function() { return decryptActionBoundArgs; }, encryptActionBoundArgs: function() { return encryptActionBoundArgs; } }); require("server-only"); const _serveredge = require("react-server-dom-webpack/server.edge"); const _clientedge = require("react-server-dom-webpack/client.edge"); const _nodewebstreamshelper = require("../stream-utils/node-web-streams-helper"); const _encryptionutils = require("./encryption-utils"); const _workunitasyncstorageexternal = require("./work-unit-async-storage.external"); const _dynamicrendering = require("./dynamic-rendering"); const _react = /*#__PURE__*/ _interop_require_default(require("react")); function _interop_require_default(obj) { return obj && obj.__esModule ? obj : { default: obj }; } const isEdgeRuntime = process.env.NEXT_RUNTIME === 'edge'; const textEncoder = new TextEncoder(); const textDecoder = new TextDecoder(); /** * Decrypt the serialized string with the action id as the salt. */ async function decodeActionBoundArg(actionId, arg) { const key = await (0, _encryptionutils.getActionEncryptionKey)(); if (typeof key === 'undefined') { throw Object.defineProperty(new Error(`Missing encryption key for Server Action. This is a bug in Next.js`), "__NEXT_ERROR_CODE", { value: "E65", enumerable: false, configurable: true }); } // Get the iv (16 bytes) and the payload from the arg. const originalPayload = atob(arg); const ivValue = originalPayload.slice(0, 16); const payload = originalPayload.slice(16); const decrypted = textDecoder.decode(await (0, _encryptionutils.decrypt)(key, (0, _encryptionutils.stringToUint8Array)(ivValue), (0, _encryptionutils.stringToUint8Array)(payload))); if (!decrypted.startsWith(actionId)) { throw Object.defineProperty(new Error('Invalid Server Action payload: failed to decrypt.'), "__NEXT_ERROR_CODE", { value: "E191", enumerable: false, configurable: true }); } return decrypted.slice(actionId.length); } /** * Encrypt the serialized string with the action id as the salt. Add a prefix to * later ensure that the payload is correctly decrypted, similar to a checksum. */ async function encodeActionBoundArg(actionId, arg) { const key = await (0, _encryptionutils.getActionEncryptionKey)(); if (key === undefined) { throw Object.defineProperty(new Error(`Missing encryption key for Server Action. This is a bug in Next.js`), "__NEXT_ERROR_CODE", { value: "E65", enumerable: false, configurable: true }); } // Get 16 random bytes as iv. const randomBytes = new Uint8Array(16); _workunitasyncstorageexternal.workUnitAsyncStorage.exit(()=>crypto.getRandomValues(randomBytes)); const ivValue = (0, _encryptionutils.arrayBufferToString)(randomBytes.buffer); const encrypted = await (0, _encryptionutils.encrypt)(key, randomBytes, textEncoder.encode(actionId + arg)); return btoa(ivValue + (0, _encryptionutils.arrayBufferToString)(encrypted)); } const encryptActionBoundArgs = _react.default.cache(async function encryptActionBoundArgs(actionId, ...args) { const { clientModules } = (0, _encryptionutils.getClientReferenceManifestForRsc)(); // Create an error before any asynchronous calls, to capture the original // call stack in case we need it when the serialization errors. const error = new Error(); Error.captureStackTrace(error, encryptActionBoundArgs); let didCatchError = false; const workUnitStore = _workunitasyncstorageexternal.workUnitAsyncStorage.getStore(); const hangingInputAbortSignal = (workUnitStore == null ? void 0 : workUnitStore.type) === 'prerender' ? (0, _dynamicrendering.createHangingInputAbortSignal)(workUnitStore) : undefined; // Using Flight to serialize the args into a string. const serialized = await (0, _nodewebstreamshelper.streamToString)((0, _serveredge.renderToReadableStream)(args, clientModules, { signal: hangingInputAbortSignal, onError (err) { if (hangingInputAbortSignal == null ? void 0 : hangingInputAbortSignal.aborted) { return; } // We're only reporting one error at a time, starting with the first. if (didCatchError) { return; } didCatchError = true; // Use the original error message together with the previously created // stack, because err.stack is a useless Flight Server call stack. error.message = err instanceof Error ? err.message : String(err); } }), // We pass the abort signal to `streamToString` so that no chunks are // included that are emitted after the signal was already aborted. This // ensures that we can encode hanging promises. hangingInputAbortSignal); if (didCatchError) { if (process.env.NODE_ENV === 'development') { // Logging the error is needed for server functions that are passed to the // client where the decryption is not done during rendering. Console // replaying allows us to still show the error dev overlay in this case. console.error(error); } throw error; } if (!workUnitStore) { return encodeActionBoundArg(actionId, serialized); } const prerenderResumeDataCache = (0, _workunitasyncstorageexternal.getPrerenderResumeDataCache)(workUnitStore); const renderResumeDataCache = (0, _workunitasyncstorageexternal.getRenderResumeDataCache)(workUnitStore); const cacheKey = actionId + serialized; const cachedEncrypted = (prerenderResumeDataCache == null ? void 0 : prerenderResumeDataCache.encryptedBoundArgs.get(cacheKey)) ?? (renderResumeDataCache == null ? void 0 : renderResumeDataCache.encryptedBoundArgs.get(cacheKey)); if (cachedEncrypted) { return cachedEncrypted; } const cacheSignal = workUnitStore.type === 'prerender' ? workUnitStore.cacheSignal : undefined; cacheSignal == null ? void 0 : cacheSignal.beginRead(); const encrypted = await encodeActionBoundArg(actionId, serialized); cacheSignal == null ? void 0 : cacheSignal.endRead(); prerenderResumeDataCache == null ? void 0 : prerenderResumeDataCache.encryptedBoundArgs.set(cacheKey, encrypted); return encrypted; }); async function decryptActionBoundArgs(actionId, encryptedPromise) { const encrypted = await encryptedPromise; const workUnitStore = _workunitasyncstorageexternal.workUnitAsyncStorage.getStore(); let decrypted; if (workUnitStore) { const cacheSignal = workUnitStore.type === 'prerender' ? workUnitStore.cacheSignal : undefined; const prerenderResumeDataCache = (0, _workunitasyncstorageexternal.getPrerenderResumeDataCache)(workUnitStore); const renderResumeDataCache = (0, _workunitasyncstorageexternal.getRenderResumeDataCache)(workUnitStore); decrypted = (prerenderResumeDataCache == null ? void 0 : prerenderResumeDataCache.decryptedBoundArgs.get(encrypted)) ?? (renderResumeDataCache == null ? void 0 : renderResumeDataCache.decryptedBoundArgs.get(encrypted)); if (!decrypted) { cacheSignal == null ? void 0 : cacheSignal.beginRead(); decrypted = await decodeActionBoundArg(actionId, encrypted); cacheSignal == null ? void 0 : cacheSignal.endRead(); prerenderResumeDataCache == null ? void 0 : prerenderResumeDataCache.decryptedBoundArgs.set(encrypted, decrypted); } } else { decrypted = await decodeActionBoundArg(actionId, encrypted); } const { edgeRscModuleMapping, rscModuleMapping } = (0, _encryptionutils.getClientReferenceManifestForRsc)(); // Using Flight to deserialize the args from the string. const deserialized = await (0, _clientedge.createFromReadableStream)(new ReadableStream({ start (controller) { controller.enqueue(textEncoder.encode(decrypted)); if ((workUnitStore == null ? void 0 : workUnitStore.type) === 'prerender') { // Explicitly don't close the stream here (until prerendering is // complete) so that hanging promises are not rejected. if (workUnitStore.renderSignal.aborted) { controller.close(); } else { workUnitStore.renderSignal.addEventListener('abort', ()=>controller.close(), { once: true }); } } else { controller.close(); } } }), { serverConsumerManifest: { // moduleLoading must be null because we don't want to trigger preloads of ClientReferences // to be added to the current execution. Instead, we'll wait for any ClientReference // to be emitted which themselves will handle the preloading. moduleLoading: null, moduleMap: isEdgeRuntime ? edgeRscModuleMapping : rscModuleMapping, serverModuleMap: (0, _encryptionutils.getServerModuleMap)() } }); return deserialized; } //# sourceMappingURL=encryption.js.map