taskcafe/internal/route/middleware.go

63 lines
1.6 KiB
Go
Raw Normal View History

package route
2020-04-10 04:40:22 +02:00
import (
"context"
"net/http"
"strings"
2020-04-20 05:02:55 +02:00
"github.com/google/uuid"
2020-08-07 03:50:35 +02:00
"github.com/jordanknott/taskcafe/internal/auth"
"github.com/jordanknott/taskcafe/internal/utils"
2020-04-10 04:40:22 +02:00
log "github.com/sirupsen/logrus"
)
// AuthenticationMiddleware is a middleware that requires a valid JWT token to be passed via the Authorization header
2020-04-10 04:40:22 +02:00
func AuthenticationMiddleware(next http.Handler) http.Handler {
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
bearerTokenRaw := r.Header.Get("Authorization")
splitToken := strings.Split(bearerTokenRaw, "Bearer")
if len(splitToken) != 2 {
w.WriteHeader(http.StatusBadRequest)
return
}
accessTokenString := strings.TrimSpace(splitToken[1])
accessClaims, err := auth.ValidateAccessToken(accessTokenString)
2020-04-10 04:40:22 +02:00
if err != nil {
if _, ok := err.(*auth.ErrExpiredToken); ok {
2020-06-13 00:21:58 +02:00
w.WriteHeader(http.StatusUnauthorized)
2020-04-10 04:40:22 +02:00
w.Write([]byte(`{
"data": {},
2020-04-10 04:40:22 +02:00
"errors": [
{
"extensions": {
"code": "UNAUTHENTICATED"
}
}
]
}`))
return
}
log.Error(err)
w.WriteHeader(http.StatusBadRequest)
return
}
var userID uuid.UUID
if accessClaims.Restricted == auth.InstallOnly {
userID = uuid.New()
} else {
userID, err = uuid.Parse(accessClaims.UserID)
if err != nil {
log.WithError(err).Error("middleware access token userID parse")
w.WriteHeader(http.StatusBadRequest)
return
}
2020-04-20 05:02:55 +02:00
}
ctx := context.WithValue(r.Context(), utils.UserIDKey, userID)
ctx = context.WithValue(ctx, utils.RestrictedModeKey, accessClaims.Restricted)
ctx = context.WithValue(ctx, utils.OrgRoleKey, accessClaims.OrgRole)
2020-04-10 04:40:22 +02:00
next.ServeHTTP(w, r.WithContext(ctx))
})
}