Using Auth0
Let’s start by going to our Auth0 dashboard where we can see the application which we have already created and used in our frontend-application.
Now we want to use the JWT that Auth0 generates, but we also need to add custom claims to that token which will be used by our auth rules. So we can use something known as “Rules” (left sidebar on dashboard page under “Auth Pipeline”) to add custom claims to a token. Let’s create a new empty rule.
Replace the content with the the following -
function (user, context, callback) {
const namespace = "https://dgraph.io/jwt/claims";
context.idToken[namespace] =
{
'USER': user.email,
};
return callback(null, user, context);
}
In the above function, we are only just adding the custom claim to the token with a field as USER
which if you recall from the last step is used in our auth rules, so it needs to match exactly with that name.
Now let’s go to Settings
of our Auth0 application and then go down to view the Advanced Settings
to check the JWT signature algorithm (OAuth tab) and then get the certificate (Certificates tab). We will be using RS256
in this example so let’s make sure it’s set to that and then copy the certificate which we will use to get the public key. Use the download certificate button there to get the certificate in PEM
.
Now let’s run a command to get the public key from it, which we will add to our schema. Just change the file_name
and run the command.
openssl x509 -pubkey -noout -in file_name.pem
Copy the public key and now let’s add it to our schema. For doing that we will add something like this, to the bottom of our schema file -
# Dgraph.Authorization {"VerificationKey":"<AUTH0-APP-PUBLIC-KEY>","Header":"X-Auth-Token","Namespace":"https://dgraph.io/jwt/claims","Algo":"RS256","Audience":["<AUTH0-APP-CLIENT-ID>"]}
Let me just quickly explain what each thing means in that, so firstly we start the line with a # Dgraph.Authorization
. Next is the VerificationKey
, so update <AUTH0-APP-PUBLIC-KEY>
with your public key within the quotes and make sure to have it in a single line and add \n
where ever needed. Then set Header
to the name of the header X-Auth-Token
(can be anything) which will be used to send the value of the JWT. Next is the Namespace
name https://dgraph.io/jwt/claims
(again can be anything, just needs to match with the name specified in Auth0). Then next is the Algo
which is RS256
, the JWT signature algorithm (another option is HS256
but remember to use the same algorithm in Auth0). Then for the Audience
, add your application’s Auth0 client ID.
The updated schema will look something like this (update the public key with your key) -
type Task @auth(
query: { rule: """
query($USER: String!) {
queryTask {
user(filter: { username: { eq: $USER } }) {
__typename
}
}
}"""}), {
id: ID!
title: String! @search(by: [fulltext])
completed: Boolean! @search
user: User!
}
type User {
username: String! @id @search(by: [hash])
name: String
tasks: [Task] @hasInverse(field: user)
}
# Dgraph.Authorization {"VerificationKey":"<AUTH0-APP-PUBLIC-KEY>","Header":"X-Auth-Token","Namespace":"https://dgraph.io/jwt/claims","Algo":"RS256","Audience":["<AUTH0-APP-CLIENT-ID>"]}
Resubmit the updated schema -
curl -X POST localhost:8080/admin/schema --data-binary '@schema.graphql'
Let’s get that token and see what all it contains, then update the frontend accordingly. For doing this, let’s start our app again.
npm start
Now open a browser window, navigate to http://localhost:3000 and open the developer tools, go to the network
tab and find a call called token
to get your JWT from its response JSON (field id_token
).
Now go to jwt.io and paste your token there.
The token also includes our custom claim like below.
{
"https://dgraph.io/jwt/claims": {
"USER": "vardhanapoorv"
},
...
}
Now, you can check if the auth rule that we added is working as expected or not. Open the GraphQL tool (Insomnia, GraphQL Playground) add the URL along with the header X-Auth0-Token
and its value as the JWT. Let’s try the query to see the todos and only the todos the logged-in user created should be visible.
query {
queryTask {
title
completed
user {
username
}
}
}
The above should give you only your todos and verifies that our auth rule worked!
Now let’s update our frontend application to include the X-Auth0-Token
header with value as JWT from Auth0 when sending a request.
To do this, we need to update the Apollo client setup to include the header while sending the request, and we need to get the JWT from Auth0.
The value we want is in the field idToken
from Auth0. We get that by quickly updating react-auth0-spa.js
to get idToken
and pass it as a prop to our App
.
...
const [popupOpen, setPopupOpen] = useState(false);
const [idToken, setIdToken] = useState("");
...
if (isAuthenticated) {
const user = await auth0FromHook.getUser();
setUser(user);
const idTokenClaims = await auth0FromHook.getIdTokenClaims();
setIdToken(idTokenClaims.__raw);
}
...
const user = await auth0Client.getUser();
const idTokenClaims = await auth0Client.getIdTokenClaims();
setIdToken(idTokenClaims.__raw);
...
{children}
<App idToken={idToken} />
</Auth0Context.Provider>
...
Check the updated file here
Now let’s use that token while creating an Apollo client instance and give it to a header X-Auth0-Token
in our case. Let’s update our src/App.js
file.
...
import { useAuth0 } from "./react-auth0-spa";
import { setContext } from "apollo-link-context";
// Updated to take token
const createApolloClient = token => {
const httpLink = createHttpLink({
uri: config.graphqlUrl,
options: {
reconnect: true,
},
});
// Add header
const authLink = setContext((_, { headers }) => {
// return the headers to the context so httpLink can read them
return {
headers: {
...headers,
"X-Auth-Token": token,
},
};
});
// Include header
return new ApolloClient({
link: httpLink,
link: authLink.concat(httpLink),
cache: new InMemoryCache()
});
// Get token from props and pass to function
const App = ({idToken}) => {
const { loading } = useAuth0();
if (loading) {
return <div>Loading...</div>;
}
const client = createApolloClient(idToken);
...
Check the updated file here.
Refer this step in GitHub.
Let’s now start the app.
npm start
Now you should have an app running with Auth0!