Next.js middleware integration for the x402 Payment Protocol. This package allows you to easily add paywall functionality to your Next.js applications using the x402 protocol.
npm install x402-next
Create a middleware file in your Next.js project (e.g., middleware.ts
):
import { paymentMiddleware, Network } from 'x402-next';
export const middleware = paymentMiddleware(
"0xYourAddress",
{
'/protected': {
price: '$0.01',
network: "base-sepolia",
config: {
description: 'Access to protected content'
}
},
}
);
// Configure which paths the middleware should run on
export const config = {
matcher: [
'/protected/:path*',
]
};
The paymentMiddleware
function accepts three parameters:
-
payTo
: Your receiving address (0x${string}
) -
routes
: Route configurations for protected endpoints -
facilitator
: (Optional) Configuration for the x402 facilitator service -
paywall
: (Optional) Configuration for the built-in paywall
See the Middleware Options section below for detailed configuration options.
The middleware supports various configuration options:
type RoutesConfig = Record<string, Price | RouteConfig>;
interface RouteConfig {
price: Price; // Price in USD or token amount
network: Network; // "base" or "base-sepolia"
config?: PaymentMiddlewareConfig;
}
interface PaymentMiddlewareConfig {
description?: string; // Description of the payment
mimeType?: string; // MIME type of the resource
maxTimeoutSeconds?: number; // Maximum time for payment (default: 60)
outputSchema?: Record<string, any>; // JSON schema for the response
customPaywallHtml?: string; // Custom HTML for the paywall
resource?: string; // Resource URL (defaults to request URL)
}
type FacilitatorConfig = {
url: string; // URL of the x402 facilitator service
createAuthHeaders?: CreateHeaders; // Optional function to create authentication headers
};
For more on paywall configuration options, refer to the paywall README.
type PaywallConfig = {
cdpClientKey?: string; // Your CDP Client API Key
appName?: string; // Name displayed in the paywall wallet selection modal
appLogo?: string; // Logo for the paywall wallet selection modal
sessionTokenEndpoint?: string; // API endpoint for Coinbase Onramp session authentication
};
TEMPORARY WORKAROUND: The following configuration changes are only required until the @coinbase/x402
package adds support for Edge runtime. Coinbase is actively working on making the package Edge-compatible, which will eliminate the need for these workarounds in the near future.
To use the official Coinbase facilitator package (@coinbase/x402
) in your Next.js project, you'll need to make the following temporary changes to your project configuration:
- Install the Coinbase facilitator package:
npm install @coinbase/x402
- Enable Node.js middleware as an experimental feature in your Next.js config:
// next.config.ts
const nextConfig: NextConfig = {
// rest of your next config setup
experimental: {
nodeMiddleware: true, // TEMPORARY: Only needed until Edge runtime support is added
}
};
export default nextConfig;
- Specify the Node.js runtime in your middleware file:
// middleware.ts
import { paymentMiddleware } from "x402-next";
import { facilitator } from "@coinbase/x402";
export const middleware = paymentMiddleware(
"0xYourAddress",
{
"/protected": {
price: "$0.01",
network: "base",
// other config options
},
},
facilitator // Use the Coinbase facilitator
);
export const config = {
matcher: ["/protected/:path*"],
runtime: 'nodejs', // TEMPORARY: Only needed until Edge runtime support is added
};
- Update your Next.js dependency to the canary version to access experimental features:
// package.json
{
"dependencies": {
"next": "canary", // TEMPORARY: Only needed until Edge runtime support is added
"x402-next": "^1.0.0",
"@coinbase/x402": "^1.0.0"
// other dependencies
}
}
- Set up your CDP API keys as environment variables:
# .env
CDP_API_KEY_ID=your-cdp-api-key-id
CDP_API_KEY_SECRET=your-cdp-api-key-secret
Important Note: Once the @coinbase/x402
package adds support for Edge runtime, you'll be able to use it directly without enforcing the nodejs runtime or requiring the canary version of next.
Note: Onramp integration is completely optional. Your x402 paywall will work perfectly without it. This feature is for users who want to provide an easy way for their customers to fund their wallets directly from the paywall.
When configured, a "Get more USDC" button will appear in your paywall, allowing users to purchase USDC directly through Coinbase Onramp.
Add sessionTokenEndpoint
to your middleware configuration. This tells the paywall where to find your session token API:
export const middleware = paymentMiddleware(
payTo,
routes,
facilitator,
{
sessionTokenEndpoint: "/api/x402/session-token", // Enable onramp functionality
cdpClientKey: "your-cdp-client-key",
appName: "My App",
}
);
Important: The sessionTokenEndpoint
can be any path you choose - just make sure it matches where you create your API route in the next step. Without this configuration, the "Get more USDC" button will be hidden.
Create an API route that matches the path you configured above:
// app/api/x402/session-token/route.ts
export { POST } from "x402-next";
That's it! The x402-next
package provides the complete session token implementation.
- Go to CDP Portal
- Navigate to your project's API Keys
- Click Create API key
- Download and securely store your API key
- Go to CDP Portal
- Navigate to Payments → Onramp & Offramp
- Toggle "Enforce secure initialization" to Enabled
Add your CDP API keys to your environment:
# .env
CDP_API_KEY_ID=your_secret_api_key_id_here
CDP_API_KEY_SECRET=your_secret_api_key_secret_here
Once set up, your x402 paywall will automatically show a "Get more USDC" button when users need to fund their wallets.
- Generates session token: Your backend securely creates a session token using CDP's API
- Opens secure onramp: User is redirected to Coinbase Onramp with the session token
- No exposed data: Wallet addresses and app IDs are never exposed in URLs
-
"Missing CDP API credentials"
- Ensure
CDP_API_KEY_ID
andCDP_API_KEY_SECRET
are set - Verify you're using Secret API Keys, not Client API Keys
- Ensure
-
"Failed to generate session token"
- Check your CDP Secret API key has proper permissions
- Verify your project has Onramp enabled
-
API route not found
- Ensure you've created your session token API route at the path you configured
- Check that your API route path matches your
sessionTokenEndpoint
configuration - Verify the export:
export { POST } from "x402-next";
- Example: If you configured
sessionTokenEndpoint: "/api/custom/onramp"
, createapp/api/custom/onramp/route.ts