2020-01-23 21:59:50 +01:00
|
|
|
defmodule MobilizonWeb.Auth.Guardian do
|
2018-01-14 17:56:50 +01:00
|
|
|
@moduledoc """
|
|
|
|
Handles the JWT tokens encoding and decoding
|
|
|
|
"""
|
2020-01-23 21:59:50 +01:00
|
|
|
|
2018-07-27 10:45:35 +02:00
|
|
|
use Guardian,
|
2018-10-11 17:37:39 +02:00
|
|
|
otp_app: :mobilizon,
|
2018-07-27 10:45:35 +02:00
|
|
|
permissions: %{
|
|
|
|
superuser: [:moderate, :super],
|
|
|
|
user: [:base]
|
|
|
|
}
|
2017-12-09 14:58:37 +01:00
|
|
|
|
2019-03-05 17:23:05 +01:00
|
|
|
alias Mobilizon.Users
|
|
|
|
alias Mobilizon.Users.User
|
2020-01-23 21:59:50 +01:00
|
|
|
|
2019-03-06 18:45:26 +01:00
|
|
|
require Logger
|
2017-12-09 14:58:37 +01:00
|
|
|
|
2018-01-14 17:56:50 +01:00
|
|
|
def subject_for_token(%User{} = user, _claims) do
|
2017-12-09 14:58:37 +01:00
|
|
|
{:ok, "User:" <> to_string(user.id)}
|
|
|
|
end
|
|
|
|
|
|
|
|
def subject_for_token(_, _) do
|
|
|
|
{:error, :unknown_resource}
|
|
|
|
end
|
|
|
|
|
|
|
|
def resource_from_claims(%{"sub" => "User:" <> uid_str}) do
|
2019-03-06 18:45:26 +01:00
|
|
|
Logger.debug(fn -> "Receiving claim for user #{uid_str}" end)
|
|
|
|
|
2017-12-09 14:58:37 +01:00
|
|
|
try do
|
|
|
|
case Integer.parse(uid_str) do
|
|
|
|
{uid, ""} ->
|
2019-03-05 17:23:05 +01:00
|
|
|
{:ok, Users.get_user_with_actors!(uid)}
|
2018-07-27 10:45:35 +02:00
|
|
|
|
2017-12-09 14:58:37 +01:00
|
|
|
_ ->
|
|
|
|
{:error, :invalid_id}
|
|
|
|
end
|
|
|
|
rescue
|
|
|
|
Ecto.NoResultsError -> {:error, :no_result}
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-01-14 17:56:50 +01:00
|
|
|
def resource_from_claims(_) do
|
2017-12-09 14:58:37 +01:00
|
|
|
{:error, :reason_for_error}
|
|
|
|
end
|
|
|
|
|
2018-01-13 23:33:03 +01:00
|
|
|
def after_encode_and_sign(resource, claims, token, _options) do
|
2019-03-06 18:45:26 +01:00
|
|
|
Logger.debug(fn -> "after_encode_and_sign #{inspect(claims)}" end)
|
|
|
|
|
2018-01-13 23:33:03 +01:00
|
|
|
with {:ok, _} <- Guardian.DB.after_encode_and_sign(resource, claims["typ"], claims, token) do
|
|
|
|
{:ok, token}
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def on_verify(claims, token, _options) do
|
|
|
|
with {:ok, _} <- Guardian.DB.on_verify(claims, token) do
|
|
|
|
{:ok, claims}
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def on_revoke(claims, token, _options) do
|
|
|
|
with {:ok, _} <- Guardian.DB.on_revoke(claims, token) do
|
|
|
|
{:ok, claims}
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-08-12 17:41:41 +02:00
|
|
|
def on_refresh({old_token, old_claims}, {new_token, new_claims}, _options) do
|
|
|
|
with {:ok, _, _} <- Guardian.DB.on_refresh({old_token, old_claims}, {new_token, new_claims}) do
|
|
|
|
{:ok, {old_token, old_claims}, {new_token, new_claims}}
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def on_exchange(old_stuff, new_stuff, options), do: on_refresh(old_stuff, new_stuff, options)
|
|
|
|
|
2018-01-13 23:33:03 +01:00
|
|
|
# def build_claims(claims, _resource, opts) do
|
|
|
|
# claims = claims
|
|
|
|
# |> encode_permissions_into_claims!(Keyword.get(opts, :permissions))
|
|
|
|
# {:ok, claims}
|
|
|
|
# end
|
2018-01-14 17:56:50 +01:00
|
|
|
end
|