Compare commits
2 commits
35bbdf44b4
...
306a9faa63
Author | SHA1 | Date | |
---|---|---|---|
306a9faa63 | |||
84be7527f2 |
1 changed files with 11 additions and 20 deletions
|
@ -47,28 +47,19 @@ module.exports = function () {
|
||||||
{ error: err },
|
{ error: err },
|
||||||
"Allowing expired JWT for meta.auth-token scope"
|
"Allowing expired JWT for meta.auth-token scope"
|
||||||
)
|
)
|
||||||
// Continue processing with expired JWT
|
|
||||||
} else {
|
|
||||||
logger.error({ error: err }, "jwVerify failed")
|
|
||||||
return false
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// For meta.auth-token scope, check for X-Auth-Token header
|
|
||||||
if (hasMetaAuthToken) {
|
|
||||||
const req = reqCtx.get("req")
|
const req = reqCtx.get("req")
|
||||||
console.log("req?.headers", req?.headers)
|
|
||||||
const authTokenHeader = req?.headers?.["x-auth-token"]
|
const authTokenHeader = req?.headers?.["x-auth-token"]
|
||||||
|
|
||||||
if (!authTokenHeader) {
|
if (!authTokenHeader) {
|
||||||
return false
|
return false
|
||||||
}
|
}
|
||||||
|
|
||||||
// Create a session that indicates auth token processing is needed
|
// Create a session that indicates auth token processing is needed
|
||||||
const session = { isAuthTokenRequest: true, authToken: authTokenHeader }
|
const session = { isAuthTokenRequest: true, authToken: authTokenHeader }
|
||||||
reqCtx.set("session", session)
|
reqCtx.set("session", session)
|
||||||
return true
|
return true
|
||||||
}
|
}
|
||||||
|
logger.error({ error: err }, "jwVerify failed")
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
// Regular user JWT processing
|
// Regular user JWT processing
|
||||||
const claims = getHasuraClaimsFromJWT(jwt, claimsNamespace)
|
const claims = getHasuraClaimsFromJWT(jwt, claimsNamespace)
|
||||||
|
|
Loading…
Add table
Reference in a new issue