UNPKG

@oraichain/customauth

Version:

CustomAuth login with torus to get user private key

94 lines (86 loc) 3.33 kB
import { get } from "@toruslabs/http-helpers"; import jwtDecode from "jwt-decode"; import deepmerge from "lodash.merge"; import log from "loglevel"; import { LOGIN_TYPE, UX_MODE_TYPE } from "../utils/enums"; import { getVerifierId, loginToConnectionMap, padUrlString, validateAndConstructUrl } from "../utils/helpers"; import AbstractLoginHandler from "./AbstractLoginHandler"; import { Auth0ClientOptions, Auth0UserInfo, LoginWindowResponse, MultifactorsGenericObject, MultifactorsVerifierResponse } from "./interfaces"; export default class JwtHandler extends AbstractLoginHandler { private readonly SCOPE: string = "openid profile email"; private readonly RESPONSE_TYPE: string = "token id_token"; private readonly PROMPT: string = "login"; constructor( readonly clientId: string, readonly redirect_uri: string, readonly typeOfLogin: LOGIN_TYPE, readonly uxMode: UX_MODE_TYPE, readonly redirectToOpener?: boolean, readonly jwtParams?: Auth0ClientOptions, readonly customState?: MultifactorsGenericObject ) { super(clientId, redirect_uri, typeOfLogin, uxMode, redirectToOpener, jwtParams, customState); this.setFinalUrl(); } setFinalUrl(): void { const { domain } = this.jwtParams; const finalUrl = validateAndConstructUrl(domain); finalUrl.pathname += finalUrl.pathname.endsWith("/") ? "authorize" : "/authorize"; const clonedParams = JSON.parse(JSON.stringify(this.jwtParams)); delete clonedParams.domain; const finalJwtParams = deepmerge( { state: this.state, response_type: this.RESPONSE_TYPE, client_id: this.clientId, prompt: this.PROMPT, redirect_uri: this.redirect_uri, scope: this.SCOPE, connection: loginToConnectionMap[this.typeOfLogin], nonce: this.nonce, }, clonedParams ); Object.keys(finalJwtParams).forEach((key) => { if (finalJwtParams[key]) finalUrl.searchParams.append(key, finalJwtParams[key]); }); this.finalURL = finalUrl; } async getUserInfo(params: LoginWindowResponse): Promise<MultifactorsVerifierResponse> { const { idToken, accessToken } = params; const { domain, verifierIdField, isVerifierIdCaseSensitive, user_info_route = "userinfo" } = this.jwtParams; if (accessToken) { try { const domainUrl = new URL(domain); const userInfo = await get<Auth0UserInfo>(`${padUrlString(domainUrl)}${user_info_route}`, { headers: { Authorization: `Bearer ${accessToken}`, }, }); const { picture, name, email } = userInfo; return { email, name, profileImage: picture, verifierId: getVerifierId(userInfo, this.typeOfLogin, verifierIdField, isVerifierIdCaseSensitive), typeOfLogin: this.typeOfLogin, }; } catch (error) { // ignore log.warn(error, "Unable to get userinfo from endpoint"); } } if (idToken) { const decodedToken = jwtDecode<Auth0UserInfo>(idToken); const { name, email, picture } = decodedToken; return { profileImage: picture, name, email, verifierId: email, typeOfLogin: this.typeOfLogin, }; } throw new Error("Access/id token not available"); } }