framework_v2/internal/middleware/grpc/auth.go

48 lines
1.3 KiB
Go
Raw Normal View History

2024-06-15 16:55:25 +00:00
package grpc
2024-06-13 01:16:48 +00:00
import (
"context"
2024-06-22 11:15:41 +00:00
auth2 "framework_v2/internal/providers/auth"
"framework_v2/internal/providers/config"
"framework_v2/internal/providers/jwks"
"framework_v2/internal/providers/logger"
2024-06-13 01:16:48 +00:00
"github.com/grpc-ecosystem/go-grpc-middleware/v2/interceptors/auth"
"github.com/grpc-ecosystem/go-grpc-middleware/v2/interceptors/logging"
"github.com/mitchellh/mapstructure"
"google.golang.org/grpc/codes"
"google.golang.org/grpc/status"
)
func JwtAuth(ctx context.Context) (context.Context, error) {
tokenString, err := auth.AuthFromMD(ctx, "bearer")
if err != nil {
return nil, err
}
sub := "anonymous"
2024-06-16 06:00:31 +00:00
var jwtIdToken *auth2.User
2024-06-13 01:16:48 +00:00
2024-06-15 16:55:25 +00:00
if config.Config.DebugMode.Enable {
2024-06-16 06:00:31 +00:00
jwtIdToken.Token.Sub = sub
2024-06-13 01:16:48 +00:00
} else {
2024-06-15 16:55:25 +00:00
token, err := jwks.ParseJWT(tokenString)
2024-06-13 01:16:48 +00:00
if err != nil {
return nil, status.Errorf(codes.Unauthenticated, "invalid auth token: %v", err)
}
sub, err = token.Claims.GetSubject()
if err != nil {
return nil, status.Errorf(codes.Unauthenticated, "unable get token sub: %v", err)
}
err = mapstructure.Decode(token.Claims, &jwtIdToken)
if err != nil {
2024-06-15 16:55:25 +00:00
logger.Logger.Error("Failed to map token claims to JwtIDToken struct.\nError: " + err.Error())
2024-06-13 01:16:48 +00:00
return nil, err
}
}
ctx = logging.InjectFields(ctx, logging.Fields{"auth.sub", sub})
return context.WithValue(ctx, "auth", jwtIdToken), nil
}