2020-07-05 01:02:57 +02:00
|
|
|
package route
|
2020-04-10 04:40:22 +02:00
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"net/http"
|
|
|
|
|
2020-04-20 05:02:55 +02:00
|
|
|
"github.com/google/uuid"
|
2021-04-29 04:32:19 +02:00
|
|
|
"github.com/jordanknott/taskcafe/internal/db"
|
2020-08-22 06:08:30 +02:00
|
|
|
"github.com/jordanknott/taskcafe/internal/utils"
|
2020-04-10 04:40:22 +02:00
|
|
|
log "github.com/sirupsen/logrus"
|
|
|
|
)
|
|
|
|
|
2020-08-21 01:11:24 +02:00
|
|
|
// AuthenticationMiddleware is a middleware that requires a valid JWT token to be passed via the Authorization header
|
2020-09-13 01:03:17 +02:00
|
|
|
type AuthenticationMiddleware struct {
|
2021-04-29 04:32:19 +02:00
|
|
|
repo db.Repository
|
2020-09-13 01:03:17 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// Middleware returns the middleware handler
|
|
|
|
func (m *AuthenticationMiddleware) Middleware(next http.Handler) http.Handler {
|
2020-04-10 04:40:22 +02:00
|
|
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
2020-10-21 01:52:09 +02:00
|
|
|
requestID := uuid.New()
|
2021-04-29 04:32:19 +02:00
|
|
|
foundToken := true
|
|
|
|
tokenRaw := ""
|
|
|
|
c, err := r.Cookie("authToken")
|
|
|
|
if err != nil {
|
|
|
|
if err == http.ErrNoCookie {
|
|
|
|
foundToken = false
|
|
|
|
} else {
|
|
|
|
log.WithError(err).Error("unknown error")
|
|
|
|
w.WriteHeader(http.StatusBadRequest)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if !foundToken {
|
|
|
|
token := r.Header.Get("Authorization")
|
|
|
|
if token == "" {
|
|
|
|
log.WithError(err).Error("no auth token found in cookie or authorization header")
|
|
|
|
w.WriteHeader(http.StatusBadRequest)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
tokenRaw = token
|
|
|
|
} else {
|
|
|
|
tokenRaw = c.Value
|
2020-04-10 04:40:22 +02:00
|
|
|
}
|
2021-04-29 04:32:19 +02:00
|
|
|
authTokenID := uuid.MustParse(tokenRaw)
|
|
|
|
token, err := m.repo.GetAuthTokenByID(r.Context(), authTokenID)
|
|
|
|
|
2020-04-10 04:40:22 +02:00
|
|
|
if err != nil {
|
2021-04-29 04:32:19 +02:00
|
|
|
w.WriteHeader(http.StatusUnauthorized)
|
|
|
|
w.Write([]byte(`{
|
2020-04-10 05:27:57 +02:00
|
|
|
"data": {},
|
2020-04-10 04:40:22 +02:00
|
|
|
"errors": [
|
|
|
|
{
|
|
|
|
"extensions": {
|
|
|
|
"code": "UNAUTHENTICATED"
|
|
|
|
}
|
|
|
|
}
|
|
|
|
]
|
|
|
|
}`))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2021-04-29 04:32:19 +02:00
|
|
|
ctx := context.WithValue(r.Context(), utils.UserIDKey, token.UserID)
|
|
|
|
// ctx = context.WithValue(ctx, utils.RestrictedModeKey, accessClaims.Restricted)
|
|
|
|
// ctx = context.WithValue(ctx, utils.OrgRoleKey, accessClaims.OrgRole)
|
2020-10-21 01:52:09 +02:00
|
|
|
ctx = context.WithValue(ctx, utils.ReqIDKey, requestID)
|
2020-04-10 04:40:22 +02:00
|
|
|
|
|
|
|
next.ServeHTTP(w, r.WithContext(ctx))
|
|
|
|
})
|
|
|
|
}
|