taskcafe/internal/route/middleware.go

56 lines
1.4 KiB
Go
Raw Normal View History

package route
2020-04-10 04:40:22 +02:00
import (
"context"
"net/http"
2020-04-20 05:02:55 +02:00
"github.com/google/uuid"
"github.com/jordanknott/taskcafe/internal/db"
"github.com/jordanknott/taskcafe/internal/utils"
2020-04-10 04:40:22 +02:00
log "github.com/sirupsen/logrus"
)
// AuthenticationMiddleware is a middleware that requires a valid JWT token to be passed via the Authorization header
type AuthenticationMiddleware struct {
repo db.Repository
}
// Middleware returns the middleware handler
func (m *AuthenticationMiddleware) Middleware(next http.Handler) http.Handler {
2020-04-10 04:40:22 +02:00
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
2021-05-01 05:55:37 +02:00
log.Info("middleware")
requestID := uuid.New()
foundToken := true
tokenRaw := ""
c, err := r.Cookie("authToken")
if err != nil {
if err == http.ErrNoCookie {
foundToken = false
}
}
if !foundToken {
token := r.Header.Get("Authorization")
2021-05-01 05:55:37 +02:00
if token != "" {
tokenRaw = token
}
} else {
tokenRaw = c.Value
2020-04-10 04:40:22 +02:00
}
2021-05-01 05:55:37 +02:00
authTokenID, err := uuid.Parse(tokenRaw)
log.Info("checking if logged in")
ctx := r.Context()
if err == nil {
token, err := m.repo.GetAuthTokenByID(r.Context(), authTokenID)
if err == nil {
ctx = context.WithValue(ctx, utils.UserIDKey, token.UserID)
}
2020-04-10 04:40:22 +02:00
}
// ctx = context.WithValue(ctx, utils.RestrictedModeKey, accessClaims.Restricted)
// ctx = context.WithValue(ctx, utils.OrgRoleKey, accessClaims.OrgRole)
ctx = context.WithValue(ctx, utils.ReqIDKey, requestID)
2020-04-10 04:40:22 +02:00
next.ServeHTTP(w, r.WithContext(ctx))
})
}