KevinStephenson
Adding in weaviate code
b110593
raw
history blame
1.98 kB
// _ _
// __ _____ __ ___ ___ __ _| |_ ___
// \ \ /\ / / _ \/ _` \ \ / / |/ _` | __/ _ \
// \ V V / __/ (_| |\ V /| | (_| | || __/
// \_/\_/ \___|\__,_| \_/ |_|\__,_|\__\___|
//
// Copyright © 2016 - 2024 Weaviate B.V. All rights reserved.
//
// CONTACT: [email protected]
//
package composer
import (
"github.com/golang-jwt/jwt/v4"
"github.com/pkg/errors"
"github.com/weaviate/weaviate/entities/models"
"github.com/weaviate/weaviate/usecases/config"
)
type TokenFunc func(token string, scopes []string) (*models.Principal, error)
// New provides an OpenAPI compatible token validation
// function that validates the token either as OIDC or as an APIKey token
// depending on which is configured. If both are configured, the scheme is
// figured out at runtime.
func New(config config.Authentication,
apikey apiKeyValidator, oidc oidcValidator,
) TokenFunc {
if config.APIKey.Enabled && config.OIDC.Enabled {
return pickAuthSchemeDynamically(apikey, oidc)
}
if config.APIKey.Enabled {
return apikey.ValidateAndExtract
}
// default to OIDC, even if no scheme is enabled, then it can deal with this
// scenario itself. This is the backward-compatible scenario.
return oidc.ValidateAndExtract
}
func pickAuthSchemeDynamically(
apiKey apiKeyValidator, oidc oidcValidator,
) TokenFunc {
return func(token string, scopes []string) (*models.Principal, error) {
_, err := jwt.Parse(token, func(t *jwt.Token) (interface{}, error) {
return nil, nil
})
if err != nil && errors.Is(err, jwt.ErrTokenMalformed) {
return apiKey.ValidateAndExtract(token, scopes)
}
return oidc.ValidateAndExtract(token, scopes)
}
}
type oidcValidator interface {
ValidateAndExtract(token string, scopes []string) (*models.Principal, error)
}
type apiKeyValidator interface {
ValidateAndExtract(token string, scopes []string) (*models.Principal, error)
}