Catalyst-Plugin-OIDC
view release on metacpan or search on metacpan
t/auth-code-flow-IT/MyCatalystApp/lib/MyCatalystApp/Controller/Root.pm view on Meta::CPAN
package MyCatalystApp::Controller::Root;
use utf8;
use Moose;
use namespace::autoclean;
use Try::Tiny;
BEGIN { extends 'Catalyst::Controller' }
__PACKAGE__->config(namespace => '');
sub index :Path :Args(0) {
my ( $self, $c ) = @_;
$c->response->body( $c->welcome_message );
}
sub protected : Global {
my ( $self, $c ) = @_;
if (my $identity = $c->oidc->get_valid_identity()) {
$c->response->body($identity->subject . ' is authenticated');
}
else {
$c->oidc->redirect_to_authorize();
}
}
sub error : Chained('/') : PathPart('error') : Args(1) {
my ( $self, $c, $http_code ) = @_;
$c->log->warn("OIDC error : " . $c->flash->{error_message});
$c->response->body( 'Authentication Error' );
$c->response->status($http_code);
}
# ----------------------
# resource server routes
# ----------------------
sub my_resource :Path('my-resource') :Args(0) {
my ( $self, $c ) = @_;
my $user = try {
my $access_token = $c->oidc->verify_token();
return $c->oidc->build_user_from_claims($access_token->claims);
}
catch {
$c->log->warn("Token/User validation : $_");
$c->stash->{expose_stash}{error} = 'Unauthorized';
$c->forward('View::JSON');
$c->response->status(401);
return;
} or return;
unless ($user->has_role('role2')) {
$c->log->warn("Insufficient roles");
$c->stash->{expose_stash}{error} = 'Forbidden';
$c->forward('View::JSON');
$c->response->status(403);
return;
}
$c->stash->{expose_stash}{user_login} = $user->login;
$c->forward('View::JSON');
}
# ----------------------
( run in 1.121 second using v1.01-cache-2.11-cpan-39bf76dae61 )