auth.go 1.5 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556
  1. package middleware
  2. import (
  3. "context"
  4. "net/http"
  5. "strings"
  6. "cmr-backend/internal/apperr"
  7. "cmr-backend/internal/httpx"
  8. "cmr-backend/internal/platform/jwtx"
  9. )
  10. type authContextKey string
  11. const authKey authContextKey = "auth"
  12. type AuthContext struct {
  13. UserID string
  14. UserPublicID string
  15. RoleCode string
  16. }
  17. func NewAuthMiddleware(jwtManager *jwtx.Manager) func(http.Handler) http.Handler {
  18. return func(next http.Handler) http.Handler {
  19. return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  20. authHeader := strings.TrimSpace(r.Header.Get("Authorization"))
  21. if authHeader == "" || !strings.HasPrefix(authHeader, "Bearer ") {
  22. httpx.WriteError(w, apperr.New(http.StatusUnauthorized, "unauthorized", "missing bearer token"))
  23. return
  24. }
  25. token := strings.TrimSpace(strings.TrimPrefix(authHeader, "Bearer "))
  26. claims, err := jwtManager.ParseAccessToken(token)
  27. if err != nil {
  28. httpx.WriteError(w, apperr.New(http.StatusUnauthorized, "invalid_token", "invalid access token"))
  29. return
  30. }
  31. if claims.ActorType != "" && claims.ActorType != "user" {
  32. httpx.WriteError(w, apperr.New(http.StatusUnauthorized, "invalid_token", "invalid access token"))
  33. return
  34. }
  35. ctx := context.WithValue(r.Context(), authKey, &AuthContext{
  36. UserID: claims.UserID,
  37. UserPublicID: claims.UserPublicID,
  38. RoleCode: claims.RoleCode,
  39. })
  40. next.ServeHTTP(w, r.WithContext(ctx))
  41. })
  42. }
  43. }
  44. func GetAuthContext(ctx context.Context) *AuthContext {
  45. auth, _ := ctx.Value(authKey).(*AuthContext)
  46. return auth
  47. }