/
api_token_access_client.go
110 lines (96 loc) · 3 KB
/
api_token_access_client.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
package api
import (
"fmt"
"github.com/lestrrat-go/jwx/jwt"
"time"
)
type TokenAccessClientModel struct {
apiClientAuthorize TokenAuthorizeClientModel
clientId string
tokenType string
expiresIn string
accessToken string
refreshToken string
apiUri string
user *UserModel
}
func TokenAccessClient(apiClientAuthorize TokenAuthorizeClientModel) TokenAccessClientModel {
return TokenAccessClientModel{
apiClientAuthorize: apiClientAuthorize,
clientId: apiClientAuthorize.clientId,
user: User(nil),
}
}
func (a *TokenAccessClientModel) Token() string {
apiConnection, _ := Connection(a.apiClientAuthorize.nonceToken, a.apiClientAuthorize.apiUri)
const params = `
mutation aclToken($input: TokenInput!) {
aclToken(input: $input) {
result {
accessToken
expiresIn
refreshToken
tokenType
}
success
error {
code
createdAt
messages
module
path
variables
}
elapsedTime
}
}
`
variables := map[string]interface{}{
"input": map[string]interface{}{
"clientId": a.apiClientAuthorize.clientId,
"clientSecret": a.apiClientAuthorize.clientSecret,
"code": a.apiClientAuthorize.code,
"codeVerifier": a.apiClientAuthorize.codeVerifier64,
"grantType": "authorization_code",
},
}
apiResponse := apiConnection.Mutation(params, variables)
var response AclTokenResponse
apiResponse.Endpoint(&response)
if response.Data.AclToken.Success {
tokenResult := response.Data.AclToken.Result
a.tokenType = tokenResult.TokenType
a.expiresIn = tokenResult.ExpiresIn
a.accessToken = tokenResult.AccessToken
a.refreshToken = tokenResult.RefreshToken
a.user.AccessToken(a.accessToken)
a.user.RefreshToken(a.refreshToken)
}
return a.accessToken
}
func (a *TokenAccessClientModel) IsValid() (bool, error) {
token := a.user.GetAccessToken()
if token == "" {
apiError := ApiError([]string{"Nenhum token de 'autorização' foi definido na inicialização da aplicação."},
"TokenAuthorizeUser", "TokenAuthorizeUser", "AUTHORIZE_TOKEN_NOT_FOUND", time.Now(), nil)
E(apiError.ToString(), apiError.Code, nil)
panic(apiError.Code)
}
jwToken, errJwt := jwt.Parse([]byte(token))
if errJwt != nil {
apiError := ApiError([]string{"Token de autorização de usuário 'user' inválido.", errJwt.Error()},
"TokenAuthorizeUser", "TokenAuthorizeUser", "AUTHORIZE_TOKEN_FAIL", time.Now(), token)
E(apiError.ToString(), apiError.Code, nil)
panic(apiError.Code)
}
isValid := false
iss := jwToken.Issuer()
sub := jwToken.Subject()
fmt.Println("iss: ", iss)
if iss != "" && sub == "access_token" {
a.apiUri = iss
isValid = true
a.user.ServerUri(iss)
}
return isValid, nil
}