UNPKG

@envelop/auth0

Version:

This plugin validates an JWT token created by [Auth0](https://auth0.com/), and injects the Auth0 user properties into your GraphQL context. With this plugin, you can implement authentication and authorization in a simple way.

94 lines (93 loc) 3.86 kB
/* eslint-disable no-console */ /* eslint-disable dot-notation */ import jwtPkg from 'jsonwebtoken'; import * as JwksRsa from 'jwks-rsa'; import { handleMaybePromise } from '@whatwg-node/promise-helpers'; const { decode, verify } = jwtPkg; export class UnauthenticatedError extends Error { } export const useAuth0 = (options) => { const jkwsClient = new JwksRsa.JwksClient({ cache: true, rateLimit: true, jwksRequestsPerMinute: 5, jwksUri: `https://${options.domain}/.well-known/jwks.json`, ...options.jwksClientOptions, }); const contextField = options.extendContextField || '_auth0'; const tokenType = options.tokenType || 'Bearer'; const headerName = options.headerName || 'authorization'; const extractFn = options.extractTokenFn || ((ctx = {}) => { const req = ctx['req'] || ctx['request'] || {}; const headers = req.headers || ctx['headers'] || null; if (!headers) { console.warn(`useAuth0 plugin unable to locate your request or headers on the execution context. Please make sure to pass that, or provide custom "extractTokenFn" function.`); } else { let authHeader = null; if (headers[headerName] && typeof headers[headerName] === 'string') { authHeader = headers[headerName] || null; } else if (headers.get && headers.has && headers.has(headerName)) { authHeader = headers.get(headerName) || null; } if (authHeader === null) { return null; } const split = authHeader.split(' '); if (split.length !== 2) { throw new Error(`Invalid value provided for header "${headerName}"!`); } else { const [type, value] = split; if (type !== tokenType) { throw new Error(`Unsupported token type provided: "${type}"!`); } else { return value; } } } return null; }); const verifyToken = (token) => { const decodedToken = decode(token, { complete: true, ...options.jwtDecodeOptions }) || {}; if (decodedToken && decodedToken.header && decodedToken.header.kid) { return handleMaybePromise(() => jkwsClient.getSigningKey(decodedToken.header.kid), secret => { const signingKey = secret.getPublicKey(); const decoded = verify(token, signingKey, { algorithms: ['RS256'], audience: options.audience, issuer: `https://${options.domain}/`, ...options.jwtVerifyOptions, }); return decoded; }); } throw new Error(`Failed to decode authentication token!`); }; return { onContextBuilding({ context, extendContext }) { return handleMaybePromise(() => extractFn(context), token => { if (token) { return handleMaybePromise(() => verifyToken(token), decodedPayload => { extendContext({ [contextField]: decodedPayload, }); }); } else if (options.preventUnauthenticatedAccess) { throw new UnauthenticatedError(`Unauthenticated!`); } }, e => { if (options.onError) { options.onError(e); } else { throw e; } }); }, }; };