Skip to content

Commit f4f37c3

Browse files
committed
check validity of CNAME and TXT records via worker; clean sub-select; middleware slight readability
1 parent 04df5d5 commit f4f37c3

File tree

7 files changed

+119
-10
lines changed

7 files changed

+119
-10
lines changed

components/sub-select.js

-4
Original file line numberDiff line numberDiff line change
@@ -52,8 +52,6 @@ export function useSubs ({ prependSubs = DEFAULT_PREPEND_SUBS, sub, filterSubs =
5252
...appendSubs])
5353
}, [data])
5454

55-
// TODO: can pass custom domain
56-
5755
return subs
5856
}
5957

@@ -81,8 +79,6 @@ export default function SubSelect ({ prependSubs, sub, onChange, size, appendSub
8179
return
8280
}
8381

84-
// TODO: redirect to the custom domain if it has one
85-
8682
let asPath
8783
// are we currently in a sub (ie not home)
8884
if (router.query.sub) {

middleware.js

+5-6
Original file line numberDiff line numberDiff line change
@@ -94,13 +94,12 @@ export async function customDomainMiddleware (request, referrerResp) {
9494
// TODO: dirty of previous iterations, refactor
9595
// UNSAFE UNSAFE UNSAFE tokens are visible in the URL
9696
export function customDomainAuthMiddleware (request, url) {
97-
const pathname = url.pathname
9897
const host = request.headers.get('host')
99-
const authDomain = process.env.NEXT_PUBLIC_URL
100-
const isCustomDomain = host !== process.env.NEXT_PUBLIC_URL.replace(/^https?:\/\//, '')
101-
const secure = process.env.NODE_ENV === 'development'
98+
const mainDomain = process.env.NEXT_PUBLIC_URL
99+
const pathname = url.pathname
102100

103101
// check for session both in session token and in multi_auth cookie
102+
const secure = process.env.NODE_ENV === 'development' // TODO: change this to production
104103
const sessionCookieName = secure ? '__Secure-next-auth.session-token' : 'next-auth.session-token'
105104
const multiAuthUserId = request.cookies.get('multi_auth.user-id')?.value
106105

@@ -112,14 +111,14 @@ export function customDomainAuthMiddleware (request, url) {
112111
const hasSession = hasActiveSession || hasMultiAuthSession
113112
const response = NextResponse.next()
114113

115-
if (!hasSession && isCustomDomain) {
114+
if (!hasSession) {
116115
// TODO: original request url points to localhost, this is a workaround atm
117116
const protocol = secure ? 'https' : 'http'
118117
const originalDomain = `${protocol}://${host}`
119118
const redirectTarget = `${originalDomain}${pathname}`
120119

121120
// Create the auth sync URL with the correct original domain
122-
const syncUrl = new URL(`${authDomain}/api/auth/sync`)
121+
const syncUrl = new URL(`${mainDomain}/api/auth/sync`)
123122
syncUrl.searchParams.set('redirectUrl', redirectTarget)
124123

125124
console.log('AUTH: Redirecting to:', syncUrl.toString())
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,10 @@
1+
/*
2+
Warnings:
3+
4+
- Added the required column `cname` to the `CustomDomain` table without a default value. This is not possible if the table is not empty.
5+
- Added the required column `verificationTxt` to the `CustomDomain` table without a default value. This is not possible if the table is not empty.
6+
7+
*/
8+
-- AlterTable
9+
ALTER TABLE "CustomDomain" ADD COLUMN "cname" TEXT NOT NULL,
10+
ADD COLUMN "verificationTxt" TEXT NOT NULL;
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,17 @@
1+
CREATE OR REPLACE FUNCTION schedule_domain_verification_job()
2+
RETURNS INTEGER
3+
LANGUAGE plpgsql
4+
AS $$
5+
DECLARE
6+
BEGIN
7+
-- every 5 minutes
8+
INSERT INTO pgboss.schedule (name, cron, timezone)
9+
VALUES ('domainVerification', '*/5 * * * *', 'America/Chicago') ON CONFLICT DO NOTHING;
10+
return 0;
11+
EXCEPTION WHEN OTHERS THEN
12+
return 0;
13+
END;
14+
$$;
15+
16+
SELECT schedule_domain_verification_job();
17+
DROP FUNCTION IF EXISTS schedule_domain_verification_job;

prisma/schema.prisma

+2
Original file line numberDiff line numberDiff line change
@@ -1212,6 +1212,8 @@ model CustomDomain {
12121212
sslCertExpiry DateTime?
12131213
verificationState String?
12141214
lastVerifiedAt DateTime?
1215+
cname String
1216+
verificationTxt String
12151217
12161218
@@index([domain])
12171219
@@index([createdAt])

worker/domainVerification.js

+83
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,83 @@
1+
import createPrisma from '@/lib/create-prisma'
2+
import { promises as dnsPromises } from 'node:dns'
3+
4+
// TODO: Add comments
5+
export async function domainVerification () {
6+
const models = createPrisma({ connectionParams: { connection_limit: 1 } })
7+
8+
try {
9+
const domains = await models.customDomain.findMany()
10+
11+
for (const domain of domains) {
12+
const { domain: domainName, verificationTxt, cname, id } = domain
13+
try {
14+
const { txtValid, cnameValid, error } = await verifyDomain(domainName, verificationTxt, cname)
15+
console.log(`${domainName}: TXT ${txtValid ? 'valid' : 'invalid'}, CNAME ${cnameValid ? 'valid' : 'invalid'}`)
16+
17+
// verificationState is based on the results of the TXT and CNAME checks
18+
const verificationState = (txtValid && cnameValid) ? 'VERIFIED' : 'FAILED'
19+
await models.customDomain.update({
20+
where: { id },
21+
data: { verificationState, lastVerifiedAt: new Date() }
22+
})
23+
24+
if (error) {
25+
console.log(`${domainName} verification error:`, error)
26+
}
27+
} catch (error) {
28+
console.error(`Failed to verify domain ${domainName}:`, error)
29+
30+
// Update to FAILED on any error
31+
await models.customDomain.update({
32+
where: { id },
33+
data: { verificationState: 'NOT_VERIFIED', lastVerifiedAt: new Date() }
34+
})
35+
}
36+
}
37+
} catch (error) {
38+
console.error(error)
39+
}
40+
}
41+
42+
async function verifyDomain (domainName, verificationTxt, cname) {
43+
const result = {
44+
txtValid: false,
45+
cnameValid: false,
46+
error: null
47+
}
48+
49+
// TXT Records checking
50+
// TODO: we should give a randomly generated string to the user and check if it's included in the TXT record
51+
try {
52+
const txtRecords = await dnsPromises.resolve(domainName, 'TXT')
53+
const txtText = txtRecords.flat().join(' ')
54+
55+
// the TXT record should include the verificationTxt that we have in the database
56+
result.txtValid = txtText.includes(verificationTxt)
57+
} catch (error) {
58+
if (error.code === 'ENODATA' || error.code === 'ENOTFOUND') {
59+
result.error = `TXT record not found: ${error.code}`
60+
} else {
61+
result.error = `TXT error: ${error.message}`
62+
}
63+
}
64+
65+
// CNAME Records checking
66+
try {
67+
const cnameRecords = await dnsPromises.resolve(domainName, 'CNAME')
68+
69+
// the CNAME record should include the cname that we have in the database
70+
result.cnameValid = cnameRecords.some(record =>
71+
record.includes(cname)
72+
)
73+
} catch (error) {
74+
if (!result.error) { // this is to avoid overriding the error from the TXT check
75+
if (error.code === 'ENODATA' || error.code === 'ENOTFOUND') {
76+
result.error = `CNAME record not found: ${error.code}`
77+
} else {
78+
result.error = `CNAME error: ${error.message}`
79+
}
80+
}
81+
}
82+
return result
83+
}

worker/index.js

+2
Original file line numberDiff line numberDiff line change
@@ -37,6 +37,7 @@ import { payWeeklyPostBounty, weeklyPost } from './weeklyPosts'
3737
import { expireBoost } from './expireBoost'
3838
import { payingActionConfirmed, payingActionFailed } from './payingAction'
3939
import { autoDropBolt11s } from './autoDropBolt11'
40+
import { domainVerification } from './domainVerification'
4041

4142
// WebSocket polyfill
4243
import ws from 'isomorphic-ws'
@@ -122,6 +123,7 @@ async function work () {
122123
await boss.work('imgproxy', jobWrapper(imgproxy))
123124
await boss.work('deleteUnusedImages', jobWrapper(deleteUnusedImages))
124125
}
126+
await boss.work('domainVerification', jobWrapper(domainVerification))
125127
await boss.work('expireBoost', jobWrapper(expireBoost))
126128
await boss.work('weeklyPost-*', jobWrapper(weeklyPost))
127129
await boss.work('payWeeklyPostBounty', jobWrapper(payWeeklyPostBounty))

0 commit comments

Comments
 (0)