2024-06-15 16:55:25 +00:00
|
|
|
package grpc
|
2024-06-13 01:16:48 +00:00
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
2024-06-22 11:15:41 +00:00
|
|
|
auth2 "framework_v2/internal/providers/auth"
|
|
|
|
"framework_v2/internal/providers/config"
|
|
|
|
"framework_v2/internal/providers/jwks"
|
|
|
|
"framework_v2/internal/providers/logger"
|
2024-06-13 01:16:48 +00:00
|
|
|
"github.com/grpc-ecosystem/go-grpc-middleware/v2/interceptors/auth"
|
|
|
|
"github.com/grpc-ecosystem/go-grpc-middleware/v2/interceptors/logging"
|
|
|
|
"github.com/mitchellh/mapstructure"
|
|
|
|
"google.golang.org/grpc/codes"
|
|
|
|
"google.golang.org/grpc/status"
|
|
|
|
)
|
|
|
|
|
|
|
|
func JwtAuth(ctx context.Context) (context.Context, error) {
|
|
|
|
tokenString, err := auth.AuthFromMD(ctx, "bearer")
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
sub := "anonymous"
|
2024-06-16 06:00:31 +00:00
|
|
|
var jwtIdToken *auth2.User
|
2024-06-13 01:16:48 +00:00
|
|
|
|
2024-06-15 16:55:25 +00:00
|
|
|
if config.Config.DebugMode.Enable {
|
2024-06-16 06:00:31 +00:00
|
|
|
jwtIdToken.Token.Sub = sub
|
2024-06-13 01:16:48 +00:00
|
|
|
} else {
|
2024-06-15 16:55:25 +00:00
|
|
|
token, err := jwks.ParseJWT(tokenString)
|
2024-06-13 01:16:48 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, status.Errorf(codes.Unauthenticated, "invalid auth token: %v", err)
|
|
|
|
}
|
|
|
|
sub, err = token.Claims.GetSubject()
|
|
|
|
if err != nil {
|
|
|
|
return nil, status.Errorf(codes.Unauthenticated, "unable get token sub: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
err = mapstructure.Decode(token.Claims, &jwtIdToken)
|
|
|
|
if err != nil {
|
2024-06-15 16:55:25 +00:00
|
|
|
logger.Logger.Error("Failed to map token claims to JwtIDToken struct.\nError: " + err.Error())
|
2024-06-13 01:16:48 +00:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
ctx = logging.InjectFields(ctx, logging.Fields{"auth.sub", sub})
|
|
|
|
|
|
|
|
return context.WithValue(ctx, "auth", jwtIdToken), nil
|
|
|
|
}
|