auth.go 1.3 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950
  1. package middleware
  2. import (
  3. "context"
  4. "net/http"
  5. "strings"
  6. "cmr-backend/internal/apperr"
  7. "cmr-backend/internal/httpx"
  8. "cmr-backend/internal/platform/jwtx"
  9. )
  10. type authContextKey string
  11. const authKey authContextKey = "auth"
  12. type AuthContext struct {
  13. UserID string
  14. UserPublicID string
  15. }
  16. func NewAuthMiddleware(jwtManager *jwtx.Manager) func(http.Handler) http.Handler {
  17. return func(next http.Handler) http.Handler {
  18. return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  19. authHeader := strings.TrimSpace(r.Header.Get("Authorization"))
  20. if authHeader == "" || !strings.HasPrefix(authHeader, "Bearer ") {
  21. httpx.WriteError(w, apperr.New(http.StatusUnauthorized, "unauthorized", "missing bearer token"))
  22. return
  23. }
  24. token := strings.TrimSpace(strings.TrimPrefix(authHeader, "Bearer "))
  25. claims, err := jwtManager.ParseAccessToken(token)
  26. if err != nil {
  27. httpx.WriteError(w, apperr.New(http.StatusUnauthorized, "invalid_token", "invalid access token"))
  28. return
  29. }
  30. ctx := context.WithValue(r.Context(), authKey, &AuthContext{
  31. UserID: claims.UserID,
  32. UserPublicID: claims.UserPublicID,
  33. })
  34. next.ServeHTTP(w, r.WithContext(ctx))
  35. })
  36. }
  37. }
  38. func GetAuthContext(ctx context.Context) *AuthContext {
  39. auth, _ := ctx.Value(authKey).(*AuthContext)
  40. return auth
  41. }