defmodule Oidcc.Plug.LoadUserinfo do
@moduledoc """
Validate extracted authorization token using userinfo retrieval.
See: https://openid.net/specs/openid-connect-core-1_0.html#UserInfo
This module should be used together with `Oidcc.Plug.ExtractAuthorization`.
This plug will send a userinfo request for every request. To avoid this,
provide a `cache` to `t:opts/0`.
```elixir
defmodule SampleAppWeb.Endpoint do
use Phoenix.Endpoint, otp_app: :sample_app
# ...
plug Oidcc.Plug.ExtractAuthorization
plug Oidcc.Plug.LoadUserinfo,
provider: SampleApp.GoogleOpenIdConfigurationProvider,
client_id: Application.compile_env!(:sample_app, [Oidcc.Plug.LoadUserinfo, :client_id]),
client_secret: Application.compile_env!(:sample_app, [Oidcc.Plug.LoadUserinfo, :client_secret])
plug SampleAppWeb.Router
end
```
"""
@moduledoc since: "0.1.0"
@behaviour Plug
import Plug.Conn, only: [put_private: 3, halt: 1, send_resp: 3]
import Oidcc.Plug.Config, only: [evaluate_config: 1]
alias Oidcc.Plug.ExtractAuthorization
@typedoc """
Plug Configuration Options
## Options
* `provider` - name of the `Oidcc.ProviderConfiguration.Worker`
* `client_id` - OAuth Client ID to use for the userinfo retrieval
* `client_secret` - OAuth Client Secret to use for the userinfo retrieval
* `userinfo_retrieve_opts` - Options to pass to userinfo loading
* `send_inactive_token_response` - Customize Error Response for inactive token
* `cache` - Cache userinfo response - See `Oidcc.Plug.Cache`
"""
@typedoc since: "0.1.0"
@type opts :: [
provider: GenServer.name(),
client_id: String.t() | (-> String.t()),
client_secret: String.t() | (-> String.t()),
userinfo_retrieve_opts: :oidcc_userinfo.retrieve_opts(),
send_inactive_token_response: (conn :: Plug.Conn.t() -> Plug.Conn.t()),
cache: Oidcc.Plug.Cache.t()
]
defmodule Error do
@moduledoc """
Retrieve Userinfo Failed
Check the `reason` field for ther exact reason
"""
@moduledoc since: "0.1.0"
defexception [:reason]
@impl Exception
def message(_exception), do: "Retrieve Userinfo Load Failed"
end
@impl Plug
def init(opts),
do:
Keyword.validate!(opts, [
:provider,
:client_id,
:client_secret,
userinfo_retrieve_opts: %{},
send_inactive_token_response: &__MODULE__.send_inactive_token_response/1,
cache: Oidcc.Plug.Cache.Noop
])
@impl Plug
def call(%Plug.Conn{private: %{ExtractAuthorization => nil}} = conn, _opts), do: conn
def call(%Plug.Conn{private: %{ExtractAuthorization => access_token}} = conn, opts) do
provider = Keyword.fetch!(opts, :provider)
client_id = opts |> Keyword.fetch!(:client_id) |> evaluate_config()
client_secret = opts |> Keyword.fetch!(:client_secret) |> evaluate_config()
userinfo_retrieve_opts =
opts
|> Keyword.fetch!(:userinfo_retrieve_opts)
|> Map.put_new(:expected_subject, :any)
send_inactive_token_response = Keyword.fetch!(opts, :send_inactive_token_response)
cache = Keyword.fetch!(opts, :cache)
case cache.get(:userinfo, access_token, conn) do
{:ok, %{} = claims} ->
put_private(conn, __MODULE__, claims)
:miss ->
case Oidcc.retrieve_userinfo(
access_token,
provider,
client_id,
client_secret,
userinfo_retrieve_opts
) do
{:ok, claims} ->
:ok = cache.put(:userinfo, access_token, claims, conn)
put_private(conn, __MODULE__, claims)
{:error, {:http_error, 401, _body}} ->
conn
|> put_private(__MODULE__, nil)
|> send_inactive_token_response.()
{:error, reason} ->
raise Error, reason: reason
end
end
end
def call(%Plug.Conn{} = _conn, _opts) do
raise """
The plug Oidcc.Plug.ExtractAuthorization must be run before this plug
"""
end
@doc false
@spec send_inactive_token_response(conn :: Plug.Conn.t()) :: Plug.Conn.t()
def send_inactive_token_response(conn) do
conn
|> halt()
|> send_resp(:unauthorized, "The provided token is inactive")
end
end