2022-01-23 19:02:06 +00:00
|
|
|
package resolvers
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
2022-01-24 04:26:12 +00:00
|
|
|
"errors"
|
2022-01-23 19:02:06 +00:00
|
|
|
"fmt"
|
|
|
|
|
|
|
|
"github.com/authorizerdev/authorizer/server/constants"
|
|
|
|
"github.com/authorizerdev/authorizer/server/envstore"
|
|
|
|
"github.com/authorizerdev/authorizer/server/graph/model"
|
2022-01-24 04:26:12 +00:00
|
|
|
"github.com/authorizerdev/authorizer/server/token"
|
2022-01-23 19:02:06 +00:00
|
|
|
tokenHelper "github.com/authorizerdev/authorizer/server/token"
|
|
|
|
"github.com/authorizerdev/authorizer/server/utils"
|
|
|
|
)
|
|
|
|
|
|
|
|
// IsValidJwtResolver resolver to return if given jwt is valid
|
|
|
|
func IsValidJwtResolver(ctx context.Context, params *model.IsValidJWTQueryInput) (*model.ValidJWTResponse, error) {
|
2022-01-24 04:26:12 +00:00
|
|
|
gc, err := utils.GinContextFromContext(ctx)
|
|
|
|
token, err := token.GetAccessToken(gc)
|
|
|
|
|
|
|
|
if token == "" || err != nil {
|
|
|
|
if params != nil && *params.Jwt != "" {
|
|
|
|
token = *params.Jwt
|
|
|
|
} else {
|
|
|
|
return nil, errors.New("no jwt provided via cookie / header / params")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-02-12 10:24:23 +00:00
|
|
|
claims, err := tokenHelper.ParseJWTToken(token)
|
2022-01-23 19:02:06 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
claimRoleInterface := claims[envstore.EnvInMemoryStoreObj.GetStringStoreEnvVariable(constants.EnvKeyJwtRoleClaim)].([]interface{})
|
|
|
|
claimRoles := []string{}
|
|
|
|
for _, v := range claimRoleInterface {
|
|
|
|
claimRoles = append(claimRoles, v.(string))
|
|
|
|
}
|
|
|
|
|
|
|
|
if params != nil && params.Roles != nil && len(params.Roles) > 0 {
|
|
|
|
for _, v := range params.Roles {
|
|
|
|
if !utils.StringSliceContains(claimRoles, v) {
|
|
|
|
return nil, fmt.Errorf(`unauthorized`)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return &model.ValidJWTResponse{
|
|
|
|
Valid: true,
|
|
|
|
Message: "Valid JWT",
|
|
|
|
}, nil
|
|
|
|
}
|