portal/api/s5/middleware.go

74 lines
1.7 KiB
Go
Raw Normal View History

2024-01-17 13:16:03 +00:00
package s5
import (
"context"
2024-01-17 13:16:03 +00:00
"fmt"
"git.lumeweb.com/LumeWeb/portal/interfaces"
"github.com/golang-jwt/jwt/v5"
"go.sia.tech/jape"
"net/http"
"strconv"
2024-01-17 13:16:03 +00:00
"strings"
)
const (
AuthUserIDKey = "userID"
)
2024-01-17 13:16:03 +00:00
func AuthMiddleware(handler jape.Handler, portal interfaces.Portal) jape.Handler {
return jape.Adapt(func(h http.Handler) http.Handler {
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
authHeader := r.Header.Get("Authorization")
if authHeader == "" {
http.Error(w, "Authorization header is required", http.StatusBadRequest)
return
}
tokenString := strings.TrimPrefix(authHeader, "Bearer ")
token, err := jwt.Parse(tokenString, func(token *jwt.Token) (interface{}, error) {
if _, ok := token.Method.(*jwt.SigningMethodEd25519); !ok {
return nil, fmt.Errorf("unexpected signing method: %v", token.Header["alg"])
}
2024-01-17 13:53:10 +00:00
publicKey := portal.Identity().Public()
2024-01-17 13:16:03 +00:00
return publicKey, nil
})
if err != nil {
http.Error(w, err.Error(), http.StatusBadRequest)
return
}
if claim, ok := token.Claims.(jwt.MapClaims); ok && token.Valid {
2024-01-17 13:57:45 +00:00
subject, ok := claim["sub"].(string)
if !ok {
http.Error(w, "Invalid User ID", http.StatusBadRequest)
return
}
userID, err := strconv.ParseUint(subject, 10, 64)
if err != nil {
http.Error(w, "Invalid User ID", http.StatusBadRequest)
return
}
exists, _ := portal.Accounts().AccountExists(userID)
if !exists {
http.Error(w, "Invalid User ID", http.StatusBadRequest)
return
}
ctx := context.WithValue(r.Context(), "userId", userID)
r = r.WithContext(ctx)
2024-01-17 13:16:03 +00:00
h.ServeHTTP(w, r)
} else {
http.Error(w, "Invalid JWT", http.StatusUnauthorized)
}
})
})(handler)
}