jasonmccallister / hasura
Use your Craft CMS credentials to authenticate with a GraphQL API powered by Hasura.io
Installs: 57
Dependents: 0
Suggesters: 0
Security: 0
Stars: 7
Watchers: 2
Forks: 2
Open Issues: 7
Type:craft-plugin
Requires
- craftcms/cms: ^3.5.0
- firebase/php-jwt: ^5.0
This package is auto-updated.
Last update: 2024-10-30 01:48:21 UTC
README
Use your Craft CMS credentials to authenticate with a GraphQL API powered by Hasura.io
Requirements
This plugin requires Craft CMS 3.5.0 or later.
Installation
To install the plugin, follow these instructions.
-
Open your terminal and go to your Craft project:
cd /path/to/project
-
Then tell Composer to load the plugin:
composer require jasonmccallister/hasura
-
In the Control Panel, go to Settings → Plugins and click the “Install” button for Hasura.
Hasura Overview
Hasura.io is an open-source tool that makes building APIs with real-time GraphQL APIs without writing any code. Hasura lets you connect to a new, or existing, PostgreSQL database and automatically build a GraphQL schema with real-time subscriptions; all with out writing any code!
This allows you to build GraphQL APIs at scale, with no code, using only a database and Docker image!
Watch this video as the Hasura team takes a complex applications database (in the example it uses the Gitlab database) and drops it into GraphQL in under 4 minutes
Out of the box, Hasura comes with:
- Automatic Schema generation including nested relationships
- GraphQL queries & mutations based on your database
- Subscription support allowing realtime UI updates
- Remote schemas allowing you to combine multiple GraphQL APIs
- Migrations for new projects
- Event trigger based on database actions (insert, updates, and deletes)
- Dynamic access roles and authentication
However, Hasura can be configured to accept JWTs that are signed in a specific format. This is where the Hasura plugin helps. This plugin allows you to use your Craft CMS users and groups to generate the JWT to send to your Hasura API.
Configuring Hasura
After installation, you need to set a few items in the plugins settings:
- Enable or disable CSRF (if external applications will use this endpoint for JWTs you need to disable CSRF)
- Set the signing method on the JWT that the Hasura API expects (RS256 or etc)
- Enter the key (string or private token)
Using Craft CMS as Authentication for Hasura
Users will authenticate with their username (or email if Craft is configured for email) and password to
https://yourdomain.com/hasura/auth
Example Response
{ "token": "eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJzdWIiOiIwNGZjNDM5Mi0wMmNlLTQ3MTgtYmQ5My03ODhjMWI1ZTU1ZjQiLCJhZG1pbiI6dHJ1ZSwiaWF0IjoxNTUzMDc5MjY5LCJleHAiOjE1NTMwODI4NjksImh0dHBzOlwvXC9oYXN1cmEuaW9cL2p3dFwvY2xhaW1zIjp7IngtaGFzdXJhLWFsbG93ZWQtcm9sZXMiOlsidXNlciIsImFkbWluIl0sIngtaGFzdXJhLWRlZmF1bHQtcm9sZSI6ImFkbWluIiwieC1oYXN1cmEtdXNlci1pZCI6IjA0ZmM0MzkyLTAyY2UtNDcxOC1iZDkzLTc4OGMxYjVlNTVmNCJ9fQ.WEAFZYon5arnCTN9ecAEiG4dKl-jkyk3em8EpJ9N0Vs" }
Example JWT
{ "sub": "04fc4392-02ce-4718-bd93-788c1b5e55f4", "admin": true, "iat": 1553079269, "exp": 1553082869, "https://hasura.io/jwt/claims": { "x-hasura-allowed-roles": ["user", "admin"], "x-hasura-default-role": "admin", "x-hasura-user-id": "04fc4392-02ce-4718-bd93-788c1b5e55f4" } }
Configuring Craft CMS to Handle Event Trigger Webhooks from Hasura
Hasura allows you to tie events to table actions like insert, update, and delete. These are known as Event Triggers. This plugin allows you to receive those event triggers by configuring Hasura to send to your Craft CMS.
https://yourdomain.com/hasura/webhook
You can configure the header that Hasura will send in the plugin settings as well as a key. When the event trigger payload is received, the plugin will fire the hasuraEventTrigger
event and allow you to listen for the event and take action.
The event contains the following:
- table: The name of the table the event came from (e.g.
todos
) - trigger: The name of the trigger (e.g.
send_updated_todo_to_craft
) - payload: The payload of the event, which is contains the new and old data (based on the trigger type)
Brought to you by Jason McCallister
Add Custom Claims via Twig field in Plugin Settings
You can add custom claims (for example the users name or a custom field) to the JWT token via the new Custom Claims field in the Plugin settings.
You can add any additional information as well as user specific details as he field accepts the user
variable. In Hasura you are then able to write rules based on the x-hasura-custom-claim
object.
Example twig query
{{user.fullName}}
Example JWT
{ "sub": "04fc4392-02ce-4718-bd93-788c1b5e55f4", "admin": true, "iat": 1553079269, "exp": 1553082869, "https://hasura.io/jwt/claims": { "x-hasura-allowed-roles": ["user", "admin"], "x-hasura-default-role": "admin", "x-hasura-user-id": "04fc4392-02ce-4718-bd93-788c1b5e55f4", "x-hasura-custom-claim": "John Doe" } }
Current limitation for custom claim arrays
As Hasura only accepts custom claims to be strings we need to unwrap arrays and add them as single claims. The plugin does this for you but only on the first level. Recursive mapping will be added later. More infos can be found here: hasura/graphql-engine#1902
Example twig query returning an object/array
{% set customCategory = user.customCategory.one() %} {% if customCategory %} {% set jsonObject = { "user-name": user.fullName, "category-uid": customCategory, "category-title": customCategory, "category-slug": customCategory } %} {{ jsonObject | json_encode() }} {% endif %}
Example JWT
{ "sub": "04fc4392-02ce-4718-bd93-788c1b5e55f4", "admin": true, "iat": 1553079269, "exp": 1553082869, "https://hasura.io/jwt/claims": { "x-hasura-allowed-roles": ["user", "admin"], "x-hasura-default-role": "admin", "x-hasura-user-id": "04fc4392-02ce-4718-bd93-788c1b5e55f4", "x-hasura-custom-user-name": "John Doe", "x-hasura-custom-category-uid": "071cd618-e675-4bcc-b362-0311b43333c9", "x-hasura-custom-category-title": "Category Name", "x-hasura-custom-category-slug": "category-name" } }