2020-01-26 20:36:50 +00:00
|
|
|
defmodule Mobilizon.Web.Auth.Guardian do
|
2018-01-14 16:56:50 +00:00
|
|
|
@moduledoc """
|
|
|
|
Handles the JWT tokens encoding and decoding
|
|
|
|
"""
|
2020-01-23 20:59:50 +00:00
|
|
|
|
2018-07-27 08:45:35 +00:00
|
|
|
use Guardian,
|
2018-10-11 15:37:39 +00:00
|
|
|
otp_app: :mobilizon,
|
2018-07-27 08:45:35 +00:00
|
|
|
permissions: %{
|
|
|
|
superuser: [:moderate, :super],
|
|
|
|
user: [:base]
|
|
|
|
}
|
2017-12-09 13:58:37 +00:00
|
|
|
|
2023-02-15 18:31:23 +00:00
|
|
|
alias Mobilizon.{Applications, Users}
|
|
|
|
alias Mobilizon.Applications.ApplicationToken
|
2019-03-05 16:23:05 +00:00
|
|
|
alias Mobilizon.Users.User
|
2020-01-23 20:59:50 +00:00
|
|
|
|
2019-03-06 17:45:26 +00:00
|
|
|
require Logger
|
2017-12-09 13:58:37 +00:00
|
|
|
|
2021-09-28 17:40:37 +00:00
|
|
|
@spec subject_for_token(any(), any()) :: {:ok, String.t()} | {:error, :unknown_resource}
|
2023-02-15 18:31:23 +00:00
|
|
|
def subject_for_token(%User{id: user_id}, _claims) do
|
|
|
|
{:ok, "User:" <> to_string(user_id)}
|
|
|
|
end
|
|
|
|
|
|
|
|
def subject_for_token(%ApplicationToken{id: app_token_id}, _claims) do
|
|
|
|
{:ok, "AppToken:" <> to_string(app_token_id)}
|
2017-12-09 13:58:37 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
def subject_for_token(_, _) do
|
|
|
|
{:error, :unknown_resource}
|
|
|
|
end
|
|
|
|
|
2021-09-24 14:46:42 +00:00
|
|
|
@spec resource_from_claims(any) ::
|
|
|
|
{:error, :invalid_id | :no_result | :no_claims} | {:ok, Mobilizon.Users.User.t()}
|
2017-12-09 13:58:37 +00:00
|
|
|
def resource_from_claims(%{"sub" => "User:" <> uid_str}) do
|
2019-03-06 17:45:26 +00:00
|
|
|
Logger.debug(fn -> "Receiving claim for user #{uid_str}" end)
|
|
|
|
|
2017-12-09 13:58:37 +00:00
|
|
|
try do
|
|
|
|
case Integer.parse(uid_str) do
|
|
|
|
{uid, ""} ->
|
2019-03-05 16:23:05 +00:00
|
|
|
{:ok, Users.get_user_with_actors!(uid)}
|
2018-07-27 08:45:35 +00:00
|
|
|
|
2017-12-09 13:58:37 +00:00
|
|
|
_ ->
|
|
|
|
{:error, :invalid_id}
|
|
|
|
end
|
|
|
|
rescue
|
2023-03-17 17:10:59 +00:00
|
|
|
e in Ecto.NoResultsError ->
|
2023-08-02 07:59:09 +00:00
|
|
|
Logger.warning("Received token claim for non existing user: #{inspect(e)}")
|
2023-03-17 17:10:59 +00:00
|
|
|
{:error, :no_result}
|
2017-12-09 13:58:37 +00:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2023-02-15 18:31:23 +00:00
|
|
|
def resource_from_claims(%{"sub" => "AppToken:" <> id_str}) do
|
|
|
|
Logger.debug(fn -> "Receiving claim for app token #{id_str}" end)
|
|
|
|
|
|
|
|
try do
|
|
|
|
case Integer.parse(id_str) do
|
|
|
|
{id, ""} ->
|
|
|
|
application_token = Applications.get_application_token!(id)
|
|
|
|
user = Users.get_user_with_actors!(application_token.user_id)
|
|
|
|
application = Applications.get_application!(application_token.application_id)
|
|
|
|
{:ok, application_token |> Map.put(:user, user) |> Map.put(:application, application)}
|
|
|
|
|
|
|
|
_ ->
|
|
|
|
{:error, :invalid_id}
|
|
|
|
end
|
|
|
|
rescue
|
2023-03-17 17:10:59 +00:00
|
|
|
e in Ecto.NoResultsError ->
|
|
|
|
Logger.info("Received token claim for non existing app token: #{inspect(e.message)}")
|
|
|
|
{:error, :no_result}
|
2023-02-15 18:31:23 +00:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-01-14 16:56:50 +00:00
|
|
|
def resource_from_claims(_) do
|
2021-09-24 14:46:42 +00:00
|
|
|
{:error, :no_claims}
|
2017-12-09 13:58:37 +00:00
|
|
|
end
|
|
|
|
|
2021-09-28 17:40:37 +00:00
|
|
|
@spec after_encode_and_sign(any(), any(), any(), any()) :: {:ok, String.t()}
|
2018-01-13 22:33:03 +00:00
|
|
|
def after_encode_and_sign(resource, claims, token, _options) do
|
|
|
|
with {:ok, _} <- Guardian.DB.after_encode_and_sign(resource, claims["typ"], claims, token) do
|
|
|
|
{:ok, token}
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2021-10-04 16:59:41 +00:00
|
|
|
@spec on_verify(any(), any(), any()) :: {:ok, map()} | {:error, :token_not_found}
|
2018-01-13 22:33:03 +00:00
|
|
|
def on_verify(claims, token, _options) do
|
2023-03-17 17:10:59 +00:00
|
|
|
Logger.debug("[Guardian] Called on_verify")
|
|
|
|
|
2018-01-13 22:33:03 +00:00
|
|
|
with {:ok, _} <- Guardian.DB.on_verify(claims, token) do
|
|
|
|
{:ok, claims}
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2021-10-04 16:59:41 +00:00
|
|
|
@spec on_revoke(any(), any(), any()) :: {:ok, map()} | {:error, :could_not_revoke_token}
|
2018-01-13 22:33:03 +00:00
|
|
|
def on_revoke(claims, token, _options) do
|
2023-03-17 17:10:59 +00:00
|
|
|
Logger.debug("[Guardian] Called on_revoke")
|
|
|
|
|
2018-01-13 22:33:03 +00:00
|
|
|
with {:ok, _} <- Guardian.DB.on_revoke(claims, token) do
|
|
|
|
{:ok, claims}
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2021-10-04 16:59:41 +00:00
|
|
|
@spec on_refresh({any(), any()}, {any(), any()}, any()) ::
|
|
|
|
{:ok, {String.t(), map()}, {String.t(), map()}} | {:error, any()}
|
2019-08-12 15:41:41 +00:00
|
|
|
def on_refresh({old_token, old_claims}, {new_token, new_claims}, _options) do
|
2023-03-17 17:10:59 +00:00
|
|
|
Logger.debug("[Guardian] Called on_refresh")
|
|
|
|
|
2019-08-12 15:41:41 +00:00
|
|
|
with {:ok, _, _} <- Guardian.DB.on_refresh({old_token, old_claims}, {new_token, new_claims}) do
|
|
|
|
{:ok, {old_token, old_claims}, {new_token, new_claims}}
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2021-10-04 16:59:41 +00:00
|
|
|
@spec on_exchange(any(), any(), any()) ::
|
|
|
|
{:ok, {String.t(), map()}, {String.t(), map()}} | {:error, any()}
|
2023-03-17 17:10:59 +00:00
|
|
|
def on_exchange(old_stuff, new_stuff, options) do
|
|
|
|
Logger.debug("[Guardian] Called on_exchange")
|
|
|
|
on_refresh(old_stuff, new_stuff, options)
|
|
|
|
end
|
2019-08-12 15:41:41 +00:00
|
|
|
|
2018-01-13 22:33:03 +00:00
|
|
|
# def build_claims(claims, _resource, opts) do
|
|
|
|
# claims = claims
|
|
|
|
# |> encode_permissions_into_claims!(Keyword.get(opts, :permissions))
|
|
|
|
# {:ok, claims}
|
|
|
|
# end
|
2018-01-14 16:56:50 +00:00
|
|
|
end
|