mirror of
https://github.com/logto-io/logto.git
synced 2025-03-31 22:51:25 -05:00
Merge pull request #5745 from logto-io/yemq-update-cloud-client-calls
refactor(core): update cloud dependency, cloud client calls
This commit is contained in:
commit
bb4382e0a8
14 changed files with 457 additions and 89 deletions
|
@ -52,7 +52,7 @@
|
|||
"access": "public"
|
||||
},
|
||||
"devDependencies": {
|
||||
"@logto/cloud": "0.2.5-821690c",
|
||||
"@logto/cloud": "0.2.5-e5d8200",
|
||||
"@rollup/plugin-commonjs": "^25.0.7",
|
||||
"@rollup/plugin-json": "^6.1.0",
|
||||
"@rollup/plugin-node-resolve": "^15.2.3",
|
||||
|
|
|
@ -27,7 +27,7 @@
|
|||
"devDependencies": {
|
||||
"@fontsource/roboto-mono": "^5.0.0",
|
||||
"@jest/types": "^29.5.0",
|
||||
"@logto/cloud": "0.2.5-821690c",
|
||||
"@logto/cloud": "0.2.5-e5d8200",
|
||||
"@logto/connector-kit": "workspace:^3.0.0",
|
||||
"@logto/core-kit": "workspace:^2.4.0",
|
||||
"@logto/language-kit": "workspace:^1.1.0",
|
||||
|
|
|
@ -111,6 +111,7 @@ function InstructionTab({ isActive }: Props) {
|
|||
language="typescript"
|
||||
className={styles.sampleCode}
|
||||
value={environmentVariablesCodeExample}
|
||||
path="file:///env-variables-sample.js"
|
||||
height="400px"
|
||||
theme="logto-dark"
|
||||
options={sampleCodeEditorOptions}
|
||||
|
|
|
@ -20,70 +20,43 @@ import {
|
|||
* JWT token code editor configuration
|
||||
*/
|
||||
const accessTokenJwtCustomizerDefinition = `
|
||||
declare global {
|
||||
export interface CustomJwtClaims extends Record<string, any> {}
|
||||
declare interface CustomJwtClaims extends Record<string, any> {}
|
||||
|
||||
/** Logto internal data that can be used to pass additional information
|
||||
* @param {${JwtCustomizerTypeDefinitionKey.JwtCustomizerUserContext}} user - The user info associated with the token.
|
||||
*/
|
||||
export type Data = {
|
||||
user: ${JwtCustomizerTypeDefinitionKey.JwtCustomizerUserContext};
|
||||
}
|
||||
|
||||
export interface Exports {
|
||||
/**
|
||||
* This function is called during the access token generation process to get custom claims for the JWT token.
|
||||
*
|
||||
* @param {${JwtCustomizerTypeDefinitionKey.AccessTokenPayload}} token -The JWT token.
|
||||
* @param {Data} data - Logto internal data that can be used to pass additional information
|
||||
* @param {${JwtCustomizerTypeDefinitionKey.JwtCustomizerUserContext}} data.user - The user info associated with the token.
|
||||
* @param {${JwtCustomizerTypeDefinitionKey.EnvironmentVariables}} envVariables - The environment variables.
|
||||
*
|
||||
* @returns The custom claims.
|
||||
*/
|
||||
getCustomJwtClaims: (token: ${JwtCustomizerTypeDefinitionKey.AccessTokenPayload}, data: Data, envVariables: ${JwtCustomizerTypeDefinitionKey.EnvironmentVariables}) => Promise<CustomJwtClaims>;
|
||||
}
|
||||
|
||||
const exports: Exports;
|
||||
/** Logto internal data that can be used to pass additional information
|
||||
* @param {${JwtCustomizerTypeDefinitionKey.JwtCustomizerUserContext}} user - The user info associated with the token.
|
||||
*/
|
||||
declare type Context = {
|
||||
user: ${JwtCustomizerTypeDefinitionKey.JwtCustomizerUserContext};
|
||||
}
|
||||
|
||||
export { exports as default };
|
||||
`;
|
||||
declare type Payload = {
|
||||
token: ${JwtCustomizerTypeDefinitionKey.AccessTokenPayload};
|
||||
context: Context;
|
||||
environmentVariables: ${JwtCustomizerTypeDefinitionKey.EnvironmentVariables};
|
||||
};`;
|
||||
|
||||
const clientCredentialsJwtCustomizerDefinition = `
|
||||
declare global {
|
||||
export interface CustomJwtClaims extends Record<string, any> {}
|
||||
declare interface CustomJwtClaims extends Record<string, any> {}
|
||||
|
||||
export interface Exports {
|
||||
/**
|
||||
* This function is called during the access token generation process to get custom claims for the JWT token.
|
||||
*
|
||||
* @param {${JwtCustomizerTypeDefinitionKey.ClientCredentialsPayload}} token -The JWT token.
|
||||
*
|
||||
* @returns The custom claims.
|
||||
*/
|
||||
getCustomJwtClaims: (token: ${JwtCustomizerTypeDefinitionKey.ClientCredentialsPayload}, envVariables: ${JwtCustomizerTypeDefinitionKey.EnvironmentVariables}) => Promise<CustomJwtClaims>;
|
||||
}
|
||||
|
||||
const exports: Exports;
|
||||
}
|
||||
|
||||
export { exports as default };
|
||||
`;
|
||||
declare type Payload = {
|
||||
token: ${JwtCustomizerTypeDefinitionKey.AccessTokenPayload};
|
||||
environmentVariables: ${JwtCustomizerTypeDefinitionKey.EnvironmentVariables};
|
||||
};`;
|
||||
|
||||
export const defaultAccessTokenJwtCustomizerCode = `/**
|
||||
* This function is called during the access token generation process to get custom claims for the JWT token.
|
||||
* Limit custom claims to under 50KB.
|
||||
*
|
||||
* @param {${JwtCustomizerTypeDefinitionKey.AccessTokenPayload}} token -The JWT token.
|
||||
* @param {Data} data - Logto internal data that can be used to pass additional information
|
||||
* @param {${JwtCustomizerTypeDefinitionKey.JwtCustomizerUserContext}} data.user - The user info associated with the token.
|
||||
* @param {${JwtCustomizerTypeDefinitionKey.EnvironmentVariables}} [envVariables] - The environment variables.
|
||||
*
|
||||
* @param {Payload} payload - The input payload of the function.
|
||||
* @param {${JwtCustomizerTypeDefinitionKey.AccessTokenPayload}} payload.token -The JWT token.
|
||||
* @param {Context} payload.context - Logto internal data that can be used to pass additional information
|
||||
* @param {${JwtCustomizerTypeDefinitionKey.JwtCustomizerUserContext}} payload.context.user - The user info associated with the token.
|
||||
* @param {${JwtCustomizerTypeDefinitionKey.EnvironmentVariables}} [payload.environmentVariables] - The environment variables.
|
||||
*
|
||||
* @returns The custom claims.
|
||||
*/
|
||||
|
||||
exports.getCustomJwtClaims = async (token, data, envVariables) => {
|
||||
const getCustomJwtClaims = async ({ token, context, environmentVariables }) => {
|
||||
return {};
|
||||
}`;
|
||||
|
||||
|
@ -91,13 +64,14 @@ export const defaultClientCredentialsJwtCustomizerCode = `/**
|
|||
* This function is called during the access token generation process to get custom claims for the JWT token.
|
||||
* Limit custom claims to under 50KB.
|
||||
*
|
||||
* @param {${JwtCustomizerTypeDefinitionKey.ClientCredentialsPayload}} token -The JWT token.
|
||||
* @param {${JwtCustomizerTypeDefinitionKey.EnvironmentVariables}} [envVariables] - The environment variables.
|
||||
* @param {Payload} payload - The input payload of the function.
|
||||
* @param {${JwtCustomizerTypeDefinitionKey.ClientCredentialsPayload}} payload.token -The JWT token.
|
||||
* @param {${JwtCustomizerTypeDefinitionKey.EnvironmentVariables}} [payload.environmentVariables] - The environment variables.
|
||||
*
|
||||
* @returns The custom claims.
|
||||
*/
|
||||
|
||||
exports.getCustomJwtClaims = async (token, envVariables) => {
|
||||
const getCustomJwtClaims = async ({ token, environmentVariables }) => {
|
||||
return {};
|
||||
}`;
|
||||
|
||||
|
@ -170,15 +144,15 @@ return {
|
|||
externalData: data,
|
||||
};`;
|
||||
|
||||
export const environmentVariablesCodeExample = `exports.getCustomJwtClaims = async (token, data, envVariables) => {
|
||||
const { apiKey } = envVariables;
|
||||
export const environmentVariablesCodeExample = `const getCustomJwtClaimsSample = async ({ environmentVariables }) => {
|
||||
const { apiKey } = environmentVariables;
|
||||
|
||||
const response = await fetch('https://api.example.com/data', {
|
||||
headers: {
|
||||
Authorization: apiKey,
|
||||
}
|
||||
});
|
||||
|
||||
|
||||
const data = await response.json();
|
||||
|
||||
return {
|
||||
|
|
|
@ -92,7 +92,7 @@
|
|||
"zod": "^3.22.4"
|
||||
},
|
||||
"devDependencies": {
|
||||
"@logto/cloud": "0.2.5-821690c",
|
||||
"@logto/cloud": "0.2.5-e5d8200",
|
||||
"@silverhand/eslint-config": "6.0.1",
|
||||
"@silverhand/ts-config": "6.0.0",
|
||||
"@types/debug": "^4.1.7",
|
||||
|
|
357
packages/core/src/libraries/logto-config.script-merging.test.ts
Normal file
357
packages/core/src/libraries/logto-config.script-merging.test.ts
Normal file
|
@ -0,0 +1,357 @@
|
|||
import { LogtoJwtTokenKey } from '@logto/schemas';
|
||||
import { cond } from '@silverhand/essentials';
|
||||
import deepmerge from 'deepmerge';
|
||||
|
||||
describe('Test the deploy custom JWT script', () => {
|
||||
describe('Test script when both AccessToken & ClientCredentials scripts are existing', () => {
|
||||
it.each(Object.values(LogtoJwtTokenKey))('test %s script', (key) => {
|
||||
expect(
|
||||
deepmerge(
|
||||
{
|
||||
[LogtoJwtTokenKey.AccessToken]: {
|
||||
production: `${LogtoJwtTokenKey.AccessToken}-production`,
|
||||
},
|
||||
[LogtoJwtTokenKey.ClientCredentials]: {
|
||||
production: `${LogtoJwtTokenKey.ClientCredentials}-production`,
|
||||
},
|
||||
},
|
||||
{
|
||||
[key]: {
|
||||
test: `${key}-test`,
|
||||
},
|
||||
}
|
||||
)
|
||||
).toEqual({
|
||||
[LogtoJwtTokenKey.AccessToken]: {
|
||||
production: `${LogtoJwtTokenKey.AccessToken}-production`,
|
||||
...cond(key === LogtoJwtTokenKey.AccessToken && { test: `${key}-test` }),
|
||||
},
|
||||
[LogtoJwtTokenKey.ClientCredentials]: {
|
||||
production: `${LogtoJwtTokenKey.ClientCredentials}-production`,
|
||||
...cond(key === LogtoJwtTokenKey.ClientCredentials && { test: `${key}-test` }),
|
||||
},
|
||||
});
|
||||
});
|
||||
});
|
||||
|
||||
describe('Test script:', () => {
|
||||
// Test it.each() can not be nested, so we have to test each key separately.
|
||||
it.each(Object.values(LogtoJwtTokenKey))(
|
||||
`when ${LogtoJwtTokenKey.AccessToken} script is existing, test $s script`,
|
||||
(testingKey) => {
|
||||
const existingKey = LogtoJwtTokenKey.AccessToken;
|
||||
const existingScript = {
|
||||
[existingKey]: {
|
||||
production: `${existingKey}-production`,
|
||||
},
|
||||
};
|
||||
expect(
|
||||
deepmerge(existingScript, {
|
||||
[testingKey]: {
|
||||
test: `${testingKey}-test`,
|
||||
},
|
||||
})
|
||||
).toEqual(
|
||||
existingKey === testingKey
|
||||
? {
|
||||
[existingKey]: {
|
||||
production: `${existingKey}-production`,
|
||||
test: `${existingKey}-test`,
|
||||
},
|
||||
}
|
||||
: {
|
||||
[existingKey]: {
|
||||
production: `${existingKey}-production`,
|
||||
},
|
||||
[testingKey]: {
|
||||
test: `${testingKey}-test`,
|
||||
},
|
||||
}
|
||||
);
|
||||
}
|
||||
);
|
||||
|
||||
it.each(Object.values(LogtoJwtTokenKey))(
|
||||
`when ${LogtoJwtTokenKey.ClientCredentials} script is existing, test $s script`,
|
||||
(testingKey) => {
|
||||
const existingKey = LogtoJwtTokenKey.ClientCredentials;
|
||||
const existingScript = {
|
||||
[existingKey]: {
|
||||
production: `${existingKey}-production`,
|
||||
},
|
||||
};
|
||||
expect(
|
||||
deepmerge(existingScript, {
|
||||
[testingKey]: {
|
||||
test: `${testingKey}-test`,
|
||||
},
|
||||
})
|
||||
).toEqual(
|
||||
existingKey === testingKey
|
||||
? {
|
||||
[existingKey]: {
|
||||
production: `${existingKey}-production`,
|
||||
test: `${existingKey}-test`,
|
||||
},
|
||||
}
|
||||
: {
|
||||
[existingKey]: {
|
||||
production: `${existingKey}-production`,
|
||||
},
|
||||
[testingKey]: {
|
||||
test: `${testingKey}-test`,
|
||||
},
|
||||
}
|
||||
);
|
||||
}
|
||||
);
|
||||
});
|
||||
|
||||
describe('Test script when both AccessToken & ClientCredentials scripts are not existing', () => {
|
||||
it.each(Object.values(LogtoJwtTokenKey))('test %s script', (key) => {
|
||||
expect(
|
||||
deepmerge(
|
||||
{},
|
||||
{
|
||||
[key]: `${key}-test`,
|
||||
}
|
||||
)
|
||||
).toEqual({
|
||||
[key]: `${key}-test`,
|
||||
});
|
||||
});
|
||||
});
|
||||
});
|
||||
|
||||
describe('Test deploy custom JWT script', () => {
|
||||
describe('Deploy script when both AccessToken & ClientCredentials scripts are existing', () => {
|
||||
it.each(Object.values(LogtoJwtTokenKey))('deploy %s script', (key) => {
|
||||
expect(
|
||||
deepmerge(
|
||||
{
|
||||
[LogtoJwtTokenKey.AccessToken]: {
|
||||
production: `${LogtoJwtTokenKey.AccessToken}-production`,
|
||||
},
|
||||
[LogtoJwtTokenKey.ClientCredentials]: {
|
||||
production: `${LogtoJwtTokenKey.ClientCredentials}-production`,
|
||||
},
|
||||
},
|
||||
{
|
||||
[key]: {
|
||||
production: `${key}-production-new`,
|
||||
},
|
||||
}
|
||||
)
|
||||
).toEqual({
|
||||
[LogtoJwtTokenKey.AccessToken]: {
|
||||
production: `${LogtoJwtTokenKey.AccessToken}-production${
|
||||
key === LogtoJwtTokenKey.AccessToken ? '-new' : ''
|
||||
}`,
|
||||
},
|
||||
[LogtoJwtTokenKey.ClientCredentials]: {
|
||||
production: `${LogtoJwtTokenKey.ClientCredentials}-production${
|
||||
key === LogtoJwtTokenKey.ClientCredentials ? '-new' : ''
|
||||
}`,
|
||||
},
|
||||
});
|
||||
});
|
||||
});
|
||||
|
||||
describe('Deploy script:', () => {
|
||||
// Test it.each() can not be nested, so we have to test each key separately.
|
||||
it.each(Object.values(LogtoJwtTokenKey))(
|
||||
`when ${LogtoJwtTokenKey.AccessToken} script is existing, deploy $s script`,
|
||||
(deployingKey) => {
|
||||
const existingKey = LogtoJwtTokenKey.AccessToken;
|
||||
const existingScript = {
|
||||
[existingKey]: {
|
||||
production: `${existingKey}-production`,
|
||||
},
|
||||
};
|
||||
expect(
|
||||
deepmerge(existingScript, {
|
||||
[deployingKey]: {
|
||||
production: `${deployingKey}-production-new`,
|
||||
},
|
||||
})
|
||||
).toEqual(
|
||||
existingKey === deployingKey
|
||||
? {
|
||||
[existingKey]: {
|
||||
production: `${existingKey}-production-new`,
|
||||
},
|
||||
}
|
||||
: {
|
||||
[existingKey]: {
|
||||
production: `${existingKey}-production`,
|
||||
},
|
||||
[deployingKey]: {
|
||||
production: `${deployingKey}-production-new`,
|
||||
},
|
||||
}
|
||||
);
|
||||
}
|
||||
);
|
||||
|
||||
it.each(Object.values(LogtoJwtTokenKey))(
|
||||
`when ${LogtoJwtTokenKey.ClientCredentials} script is existing, deploy $s script`,
|
||||
(deployingKey) => {
|
||||
const existingKey = LogtoJwtTokenKey.ClientCredentials;
|
||||
const existingScript = {
|
||||
[existingKey]: {
|
||||
production: `${existingKey}-production`,
|
||||
},
|
||||
};
|
||||
expect(
|
||||
deepmerge(existingScript, {
|
||||
[deployingKey]: {
|
||||
production: `${deployingKey}-production-new`,
|
||||
},
|
||||
})
|
||||
).toEqual(
|
||||
existingKey === deployingKey
|
||||
? {
|
||||
[existingKey]: {
|
||||
production: `${existingKey}-production-new`,
|
||||
},
|
||||
}
|
||||
: {
|
||||
[existingKey]: {
|
||||
production: `${existingKey}-production`,
|
||||
},
|
||||
[deployingKey]: {
|
||||
production: `${deployingKey}-production-new`,
|
||||
},
|
||||
}
|
||||
);
|
||||
}
|
||||
);
|
||||
});
|
||||
|
||||
describe('Deploy script when both AccessToken & ClientCredentials scripts are not existing', () => {
|
||||
it.each(Object.values(LogtoJwtTokenKey))('deploy %s script', (key) => {
|
||||
expect(
|
||||
deepmerge(
|
||||
{},
|
||||
{
|
||||
[key]: {
|
||||
production: `${key}-production-new`,
|
||||
},
|
||||
}
|
||||
)
|
||||
).toEqual({
|
||||
[key]: {
|
||||
production: `${key}-production-new`,
|
||||
},
|
||||
});
|
||||
});
|
||||
});
|
||||
});
|
||||
|
||||
describe('Test undeploy custom JWT script', () => {
|
||||
describe('Undeploy script when both AccessToken & ClientCredentials scripts are existing', () => {
|
||||
it.each(Object.values(LogtoJwtTokenKey))('undeploy %s script', (key) => {
|
||||
expect(
|
||||
deepmerge(
|
||||
{
|
||||
[LogtoJwtTokenKey.AccessToken]: {
|
||||
production: `${LogtoJwtTokenKey.AccessToken}-production`,
|
||||
},
|
||||
[LogtoJwtTokenKey.ClientCredentials]: {
|
||||
production: `${LogtoJwtTokenKey.ClientCredentials}-production`,
|
||||
},
|
||||
},
|
||||
{
|
||||
[key]: {
|
||||
production: undefined,
|
||||
},
|
||||
}
|
||||
)
|
||||
).toEqual({
|
||||
[LogtoJwtTokenKey.AccessToken]: {
|
||||
production:
|
||||
key === LogtoJwtTokenKey.AccessToken
|
||||
? undefined
|
||||
: `${LogtoJwtTokenKey.AccessToken}-production`,
|
||||
},
|
||||
[LogtoJwtTokenKey.ClientCredentials]: {
|
||||
production:
|
||||
key === LogtoJwtTokenKey.ClientCredentials
|
||||
? undefined
|
||||
: `${LogtoJwtTokenKey.ClientCredentials}-production`,
|
||||
},
|
||||
});
|
||||
});
|
||||
});
|
||||
|
||||
describe('Undeploy script:', () => {
|
||||
// Test it.each() can not be nested, so we have to test each key separately.
|
||||
it.each(Object.values(LogtoJwtTokenKey))(
|
||||
`when ${LogtoJwtTokenKey.AccessToken} script is existing, undeploy $s script`,
|
||||
(undeployingKey) => {
|
||||
const existingKey = LogtoJwtTokenKey.AccessToken;
|
||||
const existingScript = {
|
||||
[existingKey]: {
|
||||
production: `${existingKey}-production`,
|
||||
},
|
||||
};
|
||||
expect(
|
||||
deepmerge(existingScript, {
|
||||
[undeployingKey]: {
|
||||
production: undefined,
|
||||
},
|
||||
})
|
||||
).toEqual(
|
||||
existingKey === undeployingKey
|
||||
? {
|
||||
[existingKey]: {
|
||||
production: undefined,
|
||||
},
|
||||
}
|
||||
: {
|
||||
[existingKey]: {
|
||||
production: `${existingKey}-production`,
|
||||
},
|
||||
[undeployingKey]: {
|
||||
production: undefined,
|
||||
},
|
||||
}
|
||||
);
|
||||
}
|
||||
);
|
||||
|
||||
it.each(Object.values(LogtoJwtTokenKey))(
|
||||
`when ${LogtoJwtTokenKey.ClientCredentials} script is existing, undeploy $s script`,
|
||||
(undeployingKey) => {
|
||||
const existingKey = LogtoJwtTokenKey.ClientCredentials;
|
||||
const existingScript = {
|
||||
[existingKey]: {
|
||||
production: `${existingKey}-production`,
|
||||
},
|
||||
};
|
||||
expect(
|
||||
deepmerge(existingScript, {
|
||||
[undeployingKey]: {
|
||||
production: undefined,
|
||||
},
|
||||
})
|
||||
).toEqual(
|
||||
existingKey === undeployingKey
|
||||
? {
|
||||
[existingKey]: {
|
||||
production: undefined,
|
||||
},
|
||||
}
|
||||
: {
|
||||
[existingKey]: {
|
||||
production: `${existingKey}-production`,
|
||||
},
|
||||
[undeployingKey]: {
|
||||
production: undefined,
|
||||
},
|
||||
}
|
||||
);
|
||||
}
|
||||
);
|
||||
});
|
||||
});
|
|
@ -10,12 +10,16 @@ import {
|
|||
} from '@logto/schemas';
|
||||
import { assert } from '@silverhand/essentials';
|
||||
import chalk from 'chalk';
|
||||
import deepmerge from 'deepmerge';
|
||||
import { ZodError, z } from 'zod';
|
||||
|
||||
import RequestError from '#src/errors/RequestError/index.js';
|
||||
import type Queries from '#src/tenants/Queries.js';
|
||||
import { consoleLog } from '#src/utils/console.js';
|
||||
import { getJwtCustomizerScripts } from '#src/utils/custom-jwt.js';
|
||||
import {
|
||||
getJwtCustomizerScripts,
|
||||
type CustomJwtDeployRequestBody,
|
||||
} from '#src/utils/custom-jwt/index.js';
|
||||
|
||||
import { type CloudConnectionLibrary } from './cloud-connection.js';
|
||||
|
||||
|
@ -143,14 +147,14 @@ export const createLogtoConfigLibrary = ({
|
|||
* @params payload - The latest JWT customizer payload needs to be deployed.
|
||||
* @params payload.key - The tokenType of the JWT customizer.
|
||||
* @params payload.value - JWT customizer value
|
||||
* @params payload.isTest - Whether the JWT customizer is for test environment.
|
||||
* @params payload.useCase - The use case of JWT customizer script, can be either `test` or `production`.
|
||||
*/
|
||||
const deployJwtCustomizerScript = async <T extends LogtoJwtTokenKey>(
|
||||
cloudConnection: CloudConnectionLibrary,
|
||||
payload: {
|
||||
key: T;
|
||||
value: JwtCustomizerType[T];
|
||||
isTest?: boolean;
|
||||
useCase: 'test' | 'production';
|
||||
}
|
||||
) => {
|
||||
const [client, jwtCustomizers] = await Promise.all([
|
||||
|
@ -160,17 +164,24 @@ export const createLogtoConfigLibrary = ({
|
|||
|
||||
const customizerScriptsFromDatabase = getJwtCustomizerScripts(jwtCustomizers);
|
||||
|
||||
const newCustomizerScripts: { [key in LogtoJwtTokenKey]?: string } = {
|
||||
[payload.key]: payload.value.script,
|
||||
const newCustomizerScripts: CustomJwtDeployRequestBody = {
|
||||
/**
|
||||
* There are at most 4 custom JWT scripts in the `CustomJwtDeployRequestBody`-typed object,
|
||||
* and can be indexed by `data[CustomJwtType][UseCase]`.
|
||||
*
|
||||
* Per our design, each script will be deployed as a API endpoint in the Cloudflare
|
||||
* worker service. A production script will be deployed to `/api/custom-jwt`
|
||||
* endpoint and a test script will be deployed to `/api/custom-jwt/test` endpoint.
|
||||
*
|
||||
* If the current use case is `test`, then the script should be deployed to a `/test` endpoint;
|
||||
* otherwise, the script should be deployed to the `/api/custom-jwt` endpoint and overwrite
|
||||
* previous handler of the API endpoint.
|
||||
*/
|
||||
[payload.key]: { [payload.useCase]: payload.value.script },
|
||||
};
|
||||
|
||||
await client.put(`/api/services/custom-jwt/worker`, {
|
||||
body: {
|
||||
production: payload.isTest
|
||||
? customizerScriptsFromDatabase
|
||||
: { ...customizerScriptsFromDatabase, ...newCustomizerScripts },
|
||||
test: payload.isTest ? newCustomizerScripts : undefined,
|
||||
},
|
||||
body: deepmerge(customizerScriptsFromDatabase, newCustomizerScripts),
|
||||
});
|
||||
};
|
||||
|
||||
|
@ -191,16 +202,17 @@ export const createLogtoConfigLibrary = ({
|
|||
return;
|
||||
}
|
||||
|
||||
// Remove the JWT customizer script from the existing JWT customizer scripts and redeploy.
|
||||
// Remove the JWT customizer script (of given `key`) from the existing JWT customizer scripts and redeploy.
|
||||
const customizerScriptsFromDatabase = getJwtCustomizerScripts(jwtCustomizers);
|
||||
const newCustomizerScripts: CustomJwtDeployRequestBody = {
|
||||
[key]: {
|
||||
production: undefined,
|
||||
test: undefined,
|
||||
},
|
||||
};
|
||||
|
||||
await client.put(`/api/services/custom-jwt/worker`, {
|
||||
body: {
|
||||
production: {
|
||||
...customizerScriptsFromDatabase,
|
||||
[key]: undefined,
|
||||
},
|
||||
},
|
||||
body: deepmerge(customizerScriptsFromDatabase, newCustomizerScripts),
|
||||
});
|
||||
};
|
||||
|
||||
|
|
|
@ -139,6 +139,7 @@ export const getExtraTokenClaimsForJwtCustomization = async (
|
|||
// eslint-disable-next-line no-restricted-syntax
|
||||
context: { user: logtoUserInfo as Record<string, Json> },
|
||||
},
|
||||
search: {},
|
||||
});
|
||||
} catch (error: unknown) {
|
||||
const entry = new LogEntry(
|
||||
|
|
|
@ -60,6 +60,7 @@ describe('configs JWT customizer routes', () => {
|
|||
{
|
||||
key: LogtoJwtTokenKey.AccessToken,
|
||||
value: mockJwtCustomizerConfigForAccessToken.value,
|
||||
useCase: 'production',
|
||||
}
|
||||
);
|
||||
|
||||
|
@ -104,6 +105,7 @@ describe('configs JWT customizer routes', () => {
|
|||
{
|
||||
key: LogtoJwtTokenKey.AccessToken,
|
||||
value: mockJwtCustomizerConfigForAccessToken.value,
|
||||
useCase: 'production',
|
||||
}
|
||||
);
|
||||
|
||||
|
@ -168,12 +170,15 @@ describe('configs JWT customizer routes', () => {
|
|||
{
|
||||
key: LogtoJwtTokenKey.ClientCredentials,
|
||||
value: payload,
|
||||
isTest: true,
|
||||
useCase: 'test',
|
||||
}
|
||||
);
|
||||
|
||||
expect(mockCloudClient.post).toHaveBeenCalledWith('/api/services/custom-jwt', {
|
||||
body: payload,
|
||||
search: {
|
||||
isTest: 'true',
|
||||
},
|
||||
});
|
||||
|
||||
expect(response.status).toEqual(200);
|
||||
|
|
|
@ -86,6 +86,7 @@ export default function logtoConfigJwtCustomizerRoutes<T extends AuthedRouter>(
|
|||
await deployJwtCustomizerScript(cloudConnection, {
|
||||
key,
|
||||
value: body,
|
||||
useCase: 'production',
|
||||
});
|
||||
}
|
||||
|
||||
|
@ -129,6 +130,7 @@ export default function logtoConfigJwtCustomizerRoutes<T extends AuthedRouter>(
|
|||
await deployJwtCustomizerScript(cloudConnection, {
|
||||
key,
|
||||
value: body,
|
||||
useCase: 'production',
|
||||
});
|
||||
}
|
||||
|
||||
|
@ -228,7 +230,7 @@ export default function logtoConfigJwtCustomizerRoutes<T extends AuthedRouter>(
|
|||
? LogtoJwtTokenKey.AccessToken
|
||||
: LogtoJwtTokenKey.ClientCredentials,
|
||||
value: body,
|
||||
isTest: true,
|
||||
useCase: 'test',
|
||||
});
|
||||
|
||||
const client = await cloudConnection.getClient();
|
||||
|
@ -236,6 +238,7 @@ export default function logtoConfigJwtCustomizerRoutes<T extends AuthedRouter>(
|
|||
try {
|
||||
ctx.body = await client.post(`/api/services/custom-jwt`, {
|
||||
body,
|
||||
search: { isTest: 'true' },
|
||||
});
|
||||
} catch (error: unknown) {
|
||||
/**
|
||||
|
|
|
@ -1,8 +1,10 @@
|
|||
import { LogtoJwtTokenKey, type JwtCustomizerType } from '@logto/schemas';
|
||||
|
||||
import { type CustomJwtDeployRequestBody } from './types.js';
|
||||
|
||||
export const getJwtCustomizerScripts = (jwtCustomizers: Partial<JwtCustomizerType>) => {
|
||||
// eslint-disable-next-line no-restricted-syntax -- enable to infer the type using `Object.fromEntries`
|
||||
return Object.fromEntries(
|
||||
Object.values(LogtoJwtTokenKey).map((key) => [key, jwtCustomizers[key]?.script])
|
||||
) as { [key in LogtoJwtTokenKey]?: string };
|
||||
Object.values(LogtoJwtTokenKey).map((key) => [key, { production: jwtCustomizers[key]?.script }])
|
||||
) as CustomJwtDeployRequestBody;
|
||||
};
|
2
packages/core/src/utils/custom-jwt/index.ts
Normal file
2
packages/core/src/utils/custom-jwt/index.ts
Normal file
|
@ -0,0 +1,2 @@
|
|||
export * from './custom-jwt.js';
|
||||
export * from './types.js';
|
8
packages/core/src/utils/custom-jwt/types.ts
Normal file
8
packages/core/src/utils/custom-jwt/types.ts
Normal file
|
@ -0,0 +1,8 @@
|
|||
import type router from '@logto/cloud/routes';
|
||||
import { type GuardedPayload, type RouterRoutes } from '@withtyped/client';
|
||||
|
||||
type PutRoutes = RouterRoutes<typeof router>['put'];
|
||||
|
||||
export type CustomJwtDeployRequestBody = GuardedPayload<
|
||||
PutRoutes['/api/services/custom-jwt/worker']
|
||||
>['body'];
|
19
pnpm-lock.yaml
generated
19
pnpm-lock.yaml
generated
|
@ -1211,8 +1211,8 @@ importers:
|
|||
version: 3.22.4
|
||||
devDependencies:
|
||||
'@logto/cloud':
|
||||
specifier: 0.2.5-821690c
|
||||
version: 0.2.5-821690c(zod@3.22.4)
|
||||
specifier: 0.2.5-e5d8200
|
||||
version: 0.2.5-e5d8200(zod@3.22.4)
|
||||
'@rollup/plugin-commonjs':
|
||||
specifier: ^25.0.7
|
||||
version: 25.0.7(rollup@4.12.0)
|
||||
|
@ -2688,8 +2688,8 @@ importers:
|
|||
specifier: ^29.5.0
|
||||
version: 29.5.0
|
||||
'@logto/cloud':
|
||||
specifier: 0.2.5-821690c
|
||||
version: 0.2.5-821690c(zod@3.22.4)
|
||||
specifier: 0.2.5-e5d8200
|
||||
version: 0.2.5-e5d8200(zod@3.22.4)
|
||||
'@logto/connector-kit':
|
||||
specifier: workspace:^3.0.0
|
||||
version: link:../toolkit/connector-kit
|
||||
|
@ -3184,8 +3184,8 @@ importers:
|
|||
version: 3.22.4
|
||||
devDependencies:
|
||||
'@logto/cloud':
|
||||
specifier: 0.2.5-821690c
|
||||
version: 0.2.5-821690c(zod@3.22.4)
|
||||
specifier: 0.2.5-e5d8200
|
||||
version: 0.2.5-e5d8200(zod@3.22.4)
|
||||
'@silverhand/eslint-config':
|
||||
specifier: 6.0.1
|
||||
version: 6.0.1(eslint@8.57.0)(prettier@3.0.0)(typescript@5.3.3)
|
||||
|
@ -6690,8 +6690,8 @@ packages:
|
|||
jose: 5.2.2
|
||||
dev: true
|
||||
|
||||
/@logto/cloud@0.2.5-821690c(zod@3.22.4):
|
||||
resolution: {integrity: sha512-eVTlJxknWbvmaeaitKzPPMTx6C4GK4TLTb97hFr91E2u6SwKP+csE3oMBgL7ZdoDLOGG+nY+j08JpVMQ8QdOWw==}
|
||||
/@logto/cloud@0.2.5-e5d8200(zod@3.22.4):
|
||||
resolution: {integrity: sha512-/ZPaiIU7ORfKtNqsopVg4jxDt/sM6CGAGny06ppv/2FNsL7h8rX6JXOUyyKmT6ffCh/K/5s2HZe7v86zx5gENQ==}
|
||||
engines: {node: ^20.9.0}
|
||||
dependencies:
|
||||
'@silverhand/essentials': 2.9.0
|
||||
|
@ -17833,6 +17833,9 @@ packages:
|
|||
resolution: {integrity: sha512-2GTVocFkwblV/TIg9AmT7TI2fO4xdWkyN8aFUEVtiVNWt96GTR3FgQyHFValfCbcj1k9Xf962Ws2hYXYUr9k1Q==}
|
||||
engines: {node: '>= 12.0.0'}
|
||||
hasBin: true
|
||||
peerDependenciesMeta:
|
||||
'@parcel/core':
|
||||
optional: true
|
||||
dependencies:
|
||||
'@parcel/config-default': 2.9.3(@parcel/core@2.9.3)(postcss@8.4.31)
|
||||
'@parcel/core': 2.9.3
|
||||
|
|
Loading…
Add table
Reference in a new issue