Files
authorizer/server/handlers/userinfo.go

65 lines
1.5 KiB
Go
Raw Normal View History

2022-03-04 00:36:27 +05:30
package handlers
import (
"encoding/json"
2022-03-04 00:36:27 +05:30
"net/http"
2022-05-23 11:52:51 +05:30
"github.com/gin-gonic/gin"
log "github.com/sirupsen/logrus"
2022-03-04 00:36:27 +05:30
"github.com/authorizerdev/authorizer/server/db"
"github.com/authorizerdev/authorizer/server/token"
)
func UserInfoHandler() gin.HandlerFunc {
return func(gc *gin.Context) {
accessToken, err := token.GetAccessToken(gc)
if err != nil {
2022-05-23 11:52:51 +05:30
log.Debug("Error getting access token: ", err)
2022-03-04 00:36:27 +05:30
gc.JSON(http.StatusUnauthorized, gin.H{
"error": err.Error(),
})
return
}
claims, err := token.ValidateAccessToken(gc, accessToken)
if err != nil {
2022-05-23 11:52:51 +05:30
log.Debug("Error validating access token: ", err)
2022-03-04 00:36:27 +05:30
gc.JSON(http.StatusUnauthorized, gin.H{
"error": err.Error(),
})
return
}
userID := claims["sub"].(string)
2022-07-10 21:49:33 +05:30
user, err := db.Provider.GetUserByID(gc, userID)
2022-03-04 00:36:27 +05:30
if err != nil {
2022-05-23 11:52:51 +05:30
log.Debug("Error getting user: ", err)
2022-03-04 00:36:27 +05:30
gc.JSON(http.StatusUnauthorized, gin.H{
"error": err.Error(),
})
return
}
apiUser := user.AsAPIUser()
userBytes, err := json.Marshal(apiUser)
if err != nil {
log.Debug("Error marshalling user: ", err)
gc.JSON(http.StatusUnauthorized, gin.H{
"error": err.Error(),
})
return
}
res := map[string]interface{}{}
err = json.Unmarshal(userBytes, &res)
if err != nil {
log.Debug("Error un-marshalling user: ", err)
gc.JSON(http.StatusUnauthorized, gin.H{
"error": err.Error(),
})
return
}
// add sub field to user as per openid standards
// https://github.com/authorizerdev/authorizer/issues/327
res["sub"] = userID
gc.JSON(http.StatusOK, res)
2022-03-04 00:36:27 +05:30
}
}