UNPKG

@envelop/auth0

Version:

This plugin validates an JWT token created by [Auth0](https://auth0.com/), and injects the Auth0 user properties into your GraphQL context. With this plugin, you can implement authentication and authorization in a simple way.

100 lines (99 loc) 4.25 kB
"use strict"; /* eslint-disable no-console */ Object.defineProperty(exports, "__esModule", { value: true }); exports.useAuth0 = exports.UnauthenticatedError = void 0; const tslib_1 = require("tslib"); /* eslint-disable dot-notation */ const jsonwebtoken_1 = tslib_1.__importDefault(require("jsonwebtoken")); const JwksRsa = tslib_1.__importStar(require("jwks-rsa")); const promise_helpers_1 = require("@whatwg-node/promise-helpers"); const { decode, verify } = jsonwebtoken_1.default; class UnauthenticatedError extends Error { } exports.UnauthenticatedError = UnauthenticatedError; const useAuth0 = (options) => { const jkwsClient = new JwksRsa.JwksClient({ cache: true, rateLimit: true, jwksRequestsPerMinute: 5, jwksUri: `https://${options.domain}/.well-known/jwks.json`, ...options.jwksClientOptions, }); const contextField = options.extendContextField || '_auth0'; const tokenType = options.tokenType || 'Bearer'; const headerName = options.headerName || 'authorization'; const extractFn = options.extractTokenFn || ((ctx = {}) => { const req = ctx['req'] || ctx['request'] || {}; const headers = req.headers || ctx['headers'] || null; if (!headers) { console.warn(`useAuth0 plugin unable to locate your request or headers on the execution context. Please make sure to pass that, or provide custom "extractTokenFn" function.`); } else { let authHeader = null; if (headers[headerName] && typeof headers[headerName] === 'string') { authHeader = headers[headerName] || null; } else if (headers.get && headers.has && headers.has(headerName)) { authHeader = headers.get(headerName) || null; } if (authHeader === null) { return null; } const split = authHeader.split(' '); if (split.length !== 2) { throw new Error(`Invalid value provided for header "${headerName}"!`); } else { const [type, value] = split; if (type !== tokenType) { throw new Error(`Unsupported token type provided: "${type}"!`); } else { return value; } } } return null; }); const verifyToken = (token) => { const decodedToken = decode(token, { complete: true, ...options.jwtDecodeOptions }) || {}; if (decodedToken && decodedToken.header && decodedToken.header.kid) { return (0, promise_helpers_1.handleMaybePromise)(() => jkwsClient.getSigningKey(decodedToken.header.kid), secret => { const signingKey = secret.getPublicKey(); const decoded = verify(token, signingKey, { algorithms: ['RS256'], audience: options.audience, issuer: `https://${options.domain}/`, ...options.jwtVerifyOptions, }); return decoded; }); } throw new Error(`Failed to decode authentication token!`); }; return { onContextBuilding({ context, extendContext }) { return (0, promise_helpers_1.handleMaybePromise)(() => extractFn(context), token => { if (token) { return (0, promise_helpers_1.handleMaybePromise)(() => verifyToken(token), decodedPayload => { extendContext({ [contextField]: decodedPayload, }); }); } else if (options.preventUnauthenticatedAccess) { throw new UnauthenticatedError(`Unauthenticated!`); } }, e => { if (options.onError) { options.onError(e); } else { throw e; } }); }, }; }; exports.useAuth0 = useAuth0;