1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
use tonic::{
    metadata::{Ascii, MetadataValue},
    service::Interceptor,
    Request, Status,
};

use crate::{provider::VerificationOptions, Error, Jwt, RedapProvider};

use super::{AUTHORIZATION_KEY, TOKEN_PREFIX};

#[derive(Debug, Clone)]
pub struct UserContext {
    pub user_id: String,
}

impl TryFrom<&MetadataValue<Ascii>> for Jwt {
    type Error = Error;

    fn try_from(value: &MetadataValue<Ascii>) -> Result<Self, Self::Error> {
        let token = value.to_str().map_err(|_err| Error::MalformedToken)?;
        let token = token
            .strip_prefix(TOKEN_PREFIX)
            .ok_or(Error::MalformedToken)?;
        Ok(Self(token.to_owned()))
    }
}

/// A basic authenticator that checks for a valid auth token.
#[derive(Clone)]
pub struct Authenticator {
    secret_key: RedapProvider,
}

impl Authenticator {
    /// Creates a new [`Authenticator`] with the given secret key and scope.
    pub fn new(secret_key: RedapProvider) -> Self {
        Self { secret_key }
    }
}

impl Interceptor for Authenticator {
    fn call(&mut self, req: Request<()>) -> Result<Request<()>, Status> {
        let mut req = req;

        if let Some(token_metadata) = req.metadata().get(AUTHORIZATION_KEY) {
            let token = Jwt::try_from(token_metadata)
                .map_err(|_err| Status::unauthenticated("malformed auth token"))?;

            let claims = self
                .secret_key
                .verify(&token, VerificationOptions::default())
                .map_err(|_err| Status::unauthenticated("invalid credentials"))?;

            req.extensions_mut().insert(UserContext {
                user_id: claims.sub,
            });
        }

        Ok(req)
    }
}