2024-06-13 01:16:48 +00:00
|
|
|
package interceptor
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
2024-06-13 07:36:51 +00:00
|
|
|
"framework_v2/internal/consts"
|
2024-06-13 01:16:48 +00:00
|
|
|
"framework_v2/internal/providers"
|
|
|
|
"github.com/grpc-ecosystem/go-grpc-middleware/v2/interceptors/auth"
|
|
|
|
"github.com/grpc-ecosystem/go-grpc-middleware/v2/interceptors/logging"
|
|
|
|
"github.com/mitchellh/mapstructure"
|
|
|
|
"google.golang.org/grpc/codes"
|
|
|
|
"google.golang.org/grpc/status"
|
|
|
|
)
|
|
|
|
|
|
|
|
func JwtAuth(ctx context.Context) (context.Context, error) {
|
|
|
|
tokenString, err := auth.AuthFromMD(ctx, "bearer")
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
sub := "anonymous"
|
2024-06-13 07:36:51 +00:00
|
|
|
var jwtIdToken *consts.UserTokenInfo
|
2024-06-13 01:16:48 +00:00
|
|
|
|
|
|
|
if providers.Config.DebugMode.Enable {
|
2024-06-13 07:36:51 +00:00
|
|
|
jwtIdToken = &consts.UserTokenInfo{
|
2024-06-13 01:16:48 +00:00
|
|
|
Sub: sub,
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
token, err := providers.ParseJWT(tokenString)
|
|
|
|
if err != nil {
|
|
|
|
return nil, status.Errorf(codes.Unauthenticated, "invalid auth token: %v", err)
|
|
|
|
}
|
|
|
|
sub, err = token.Claims.GetSubject()
|
|
|
|
if err != nil {
|
|
|
|
return nil, status.Errorf(codes.Unauthenticated, "unable get token sub: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
err = mapstructure.Decode(token.Claims, &jwtIdToken)
|
|
|
|
if err != nil {
|
|
|
|
providers.Logger.Error("Failed to map token claims to JwtIDToken struct.\nError: " + err.Error())
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
ctx = logging.InjectFields(ctx, logging.Fields{"auth.sub", sub})
|
|
|
|
|
|
|
|
return context.WithValue(ctx, "auth", jwtIdToken), nil
|
|
|
|
}
|