rag/internal/providers/interceptor/auth.go

48 lines
1.3 KiB
Go
Raw Normal View History

2024-06-13 01:16:48 +00:00
package interceptor
import (
"context"
2024-06-13 07:36:51 +00:00
"framework_v2/internal/consts"
2024-06-13 01:16:48 +00:00
"framework_v2/internal/providers"
"github.com/grpc-ecosystem/go-grpc-middleware/v2/interceptors/auth"
"github.com/grpc-ecosystem/go-grpc-middleware/v2/interceptors/logging"
"github.com/mitchellh/mapstructure"
"google.golang.org/grpc/codes"
"google.golang.org/grpc/status"
)
func JwtAuth(ctx context.Context) (context.Context, error) {
tokenString, err := auth.AuthFromMD(ctx, "bearer")
if err != nil {
return nil, err
}
sub := "anonymous"
2024-06-13 07:36:51 +00:00
var jwtIdToken *consts.UserTokenInfo
2024-06-13 01:16:48 +00:00
if providers.Config.DebugMode.Enable {
2024-06-13 07:36:51 +00:00
jwtIdToken = &consts.UserTokenInfo{
2024-06-13 01:16:48 +00:00
Sub: sub,
}
} else {
token, err := providers.ParseJWT(tokenString)
if err != nil {
return nil, status.Errorf(codes.Unauthenticated, "invalid auth token: %v", err)
}
sub, err = token.Claims.GetSubject()
if err != nil {
return nil, status.Errorf(codes.Unauthenticated, "unable get token sub: %v", err)
}
err = mapstructure.Decode(token.Claims, &jwtIdToken)
if err != nil {
providers.Logger.Error("Failed to map token claims to JwtIDToken struct.\nError: " + err.Error())
return nil, err
}
}
ctx = logging.InjectFields(ctx, logging.Fields{"auth.sub", sub})
return context.WithValue(ctx, "auth", jwtIdToken), nil
}