kra/pkg/auth/middleware.go

90 lines
2.5 KiB
Go

package auth
import (
"context"
"fmt"
"net/http"
"time"
"github.com/go-kratos/kratos/v2/errors"
"github.com/go-kratos/kratos/v2/transport"
httpm "github.com/go-kratos/kratos/v2/transport/http"
)
var (
// noAuthPaths defines the paths that do not require authentication.
noAuthPaths = map[string]struct{}{
"/v1/admins/login": {},
}
// authSecretKey is the secret key used for signing JWT tokens.
authSecretKey = authSecretFromEnv("KRATOS_AUTH_SECRET")
// cookieName is the name of the cookie that stores the authorization token.
cookieName = cookieNameFromEnv("KRATOS_AUTH_COOKIE")
// ErrUnauthorized indicates that the token is invalid.
ErrUnauthorized = errors.Unauthorized("UNAUTHORIZED", "Token is invalid")
// ErrForbidden indicates that access is denied.
ErrForbidden = errors.Forbidden("FORBIDDEN", "Access denied")
)
// Middleware is an authentication middleware for HTTP servers.
func Middleware() httpm.FilterFunc {
return func(next http.Handler) http.Handler {
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
if _, ok := noAuthPaths[r.URL.Path]; ok {
next.ServeHTTP(w, r)
return
}
cookie, err := r.Cookie(cookieName)
if err != nil {
http.Error(w, "Unauthorized", http.StatusUnauthorized)
return
}
auth, err := ParseToken(cookie.Value, authSecretKey)
if err != nil {
ec := errors.FromError(err)
http.Error(w, ec.Message, int(ec.Code))
return
}
ctx := NewContext(r.Context(), auth)
next.ServeHTTP(w, r.WithContext(ctx))
})
}
}
// SetCookie sets the login cookie in the HTTP response.
func SetCookie(ctx context.Context, userID int64, access string, expiresAt time.Time) error {
tr, ok := transport.FromServerContext(ctx)
if !ok {
return fmt.Errorf("failed to get transport from context")
}
token, err := GenerateToken(userID, access, authSecretKey, expiresAt)
if err != nil {
return err
}
cookie := &http.Cookie{
Name: cookieName,
Value: token,
Path: "/",
Expires: expiresAt,
}
tr.ReplyHeader().Add("Set-Cookie", cookie.String())
return nil
}
// DeleteCookie clears the login cookie in the HTTP response.
func DeleteCookie(ctx context.Context) error {
tr, ok := transport.FromServerContext(ctx)
if !ok {
return fmt.Errorf("failed to get transport from context")
}
expires := time.Now().AddDate(0, 0, -1)
cookie := &http.Cookie{
Name: cookieName,
Value: "",
Path: "/",
Expires: expires,
}
tr.ReplyHeader().Add("Set-Cookie", cookie.String())
return nil
}