@oraichain/customauth
Version:
CustomAuth login with torus to get user private key
94 lines (86 loc) • 3.33 kB
text/typescript
import { get } from "@toruslabs/http-helpers";
import jwtDecode from "jwt-decode";
import deepmerge from "lodash.merge";
import log from "loglevel";
import { LOGIN_TYPE, UX_MODE_TYPE } from "../utils/enums";
import { getVerifierId, loginToConnectionMap, padUrlString, validateAndConstructUrl } from "../utils/helpers";
import AbstractLoginHandler from "./AbstractLoginHandler";
import { Auth0ClientOptions, Auth0UserInfo, LoginWindowResponse, MultifactorsGenericObject, MultifactorsVerifierResponse } from "./interfaces";
export default class JwtHandler extends AbstractLoginHandler {
private readonly SCOPE: string = "openid profile email";
private readonly RESPONSE_TYPE: string = "token id_token";
private readonly PROMPT: string = "login";
constructor(
readonly clientId: string,
readonly redirect_uri: string,
readonly typeOfLogin: LOGIN_TYPE,
readonly uxMode: UX_MODE_TYPE,
readonly redirectToOpener?: boolean,
readonly jwtParams?: Auth0ClientOptions,
readonly customState?: MultifactorsGenericObject
) {
super(clientId, redirect_uri, typeOfLogin, uxMode, redirectToOpener, jwtParams, customState);
this.setFinalUrl();
}
setFinalUrl(): void {
const { domain } = this.jwtParams;
const finalUrl = validateAndConstructUrl(domain);
finalUrl.pathname += finalUrl.pathname.endsWith("/") ? "authorize" : "/authorize";
const clonedParams = JSON.parse(JSON.stringify(this.jwtParams));
delete clonedParams.domain;
const finalJwtParams = deepmerge(
{
state: this.state,
response_type: this.RESPONSE_TYPE,
client_id: this.clientId,
prompt: this.PROMPT,
redirect_uri: this.redirect_uri,
scope: this.SCOPE,
connection: loginToConnectionMap[this.typeOfLogin],
nonce: this.nonce,
},
clonedParams
);
Object.keys(finalJwtParams).forEach((key) => {
if (finalJwtParams[key]) finalUrl.searchParams.append(key, finalJwtParams[key]);
});
this.finalURL = finalUrl;
}
async getUserInfo(params: LoginWindowResponse): Promise<MultifactorsVerifierResponse> {
const { idToken, accessToken } = params;
const { domain, verifierIdField, isVerifierIdCaseSensitive, user_info_route = "userinfo" } = this.jwtParams;
if (accessToken) {
try {
const domainUrl = new URL(domain);
const userInfo = await get<Auth0UserInfo>(`${padUrlString(domainUrl)}${user_info_route}`, {
headers: {
Authorization: `Bearer ${accessToken}`,
},
});
const { picture, name, email } = userInfo;
return {
email,
name,
profileImage: picture,
verifierId: getVerifierId(userInfo, this.typeOfLogin, verifierIdField, isVerifierIdCaseSensitive),
typeOfLogin: this.typeOfLogin,
};
} catch (error) {
// ignore
log.warn(error, "Unable to get userinfo from endpoint");
}
}
if (idToken) {
const decodedToken = jwtDecode<Auth0UserInfo>(idToken);
const { name, email, picture } = decodedToken;
return {
profileImage: picture,
name,
email,
verifierId: email,
typeOfLogin: this.typeOfLogin,
};
}
throw new Error("Access/id token not available");
}
}