feat: token based authentication, authenticate route, token storage
This commit is contained in:
@@ -1,13 +1,17 @@
|
||||
package main
|
||||
|
||||
import (
|
||||
"errors"
|
||||
"fmt"
|
||||
"net"
|
||||
"net/http"
|
||||
"strings"
|
||||
"sync"
|
||||
"time"
|
||||
|
||||
"golang.org/x/time/rate"
|
||||
"greenlight.debuggingjon.dev/internal/data"
|
||||
"greenlight.debuggingjon.dev/internal/validator"
|
||||
)
|
||||
|
||||
func (app *application) recoverPanic(next http.Handler) http.Handler {
|
||||
@@ -107,3 +111,73 @@ func (app *application) rateLimit(next http.Handler) http.Handler {
|
||||
next.ServeHTTP(w, r)
|
||||
})
|
||||
}
|
||||
|
||||
func (app *application) authenticate(next http.Handler) http.Handler {
|
||||
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||
// Add the "Vary: Authorization" header to the response. This indicates to any
|
||||
// caches that the response may vary based on the value of the Authorization
|
||||
// header in the request.
|
||||
w.Header().Add("Vary", "Authorization")
|
||||
|
||||
// Retrieve the value of the Authorization header from the request. This will
|
||||
// return the empty string "" if there is no such header found.
|
||||
authorizationHeader := r.Header.Get("Authorization")
|
||||
|
||||
// If there is no Authorization header found, use the contextSetUser() helper
|
||||
// that we just made to add the AnonymousUser to the request context. Then we
|
||||
// call the next handler in the chain and return without executing any of the
|
||||
// code below.
|
||||
if authorizationHeader == "" {
|
||||
r = app.contextSetUser(r, data.AnonymousUser)
|
||||
next.ServeHTTP(w, r)
|
||||
return
|
||||
}
|
||||
|
||||
// Otherwise, we expect the value of the Authorization header to be in the format
|
||||
// "Bearer <token>". We try to split this into its constituent parts, and if the
|
||||
// header isn't in the expected format we return a 401 Unauthorized response
|
||||
// using the invalidAuthenticationTokenResponse() helper (which we will create
|
||||
// in a moment).
|
||||
headerParts := strings.Split(authorizationHeader, " ")
|
||||
if len(headerParts) != 2 || headerParts[0] != "Bearer" {
|
||||
app.invalidAuthenticationTokenResponse(w, r)
|
||||
return
|
||||
}
|
||||
|
||||
// Extract the actual authentication token from the header parts.
|
||||
token := headerParts[1]
|
||||
|
||||
// Validate the token to make sure it is in a sensible format.
|
||||
v := validator.New()
|
||||
|
||||
// If the token isn't valid, use the invalidAuthenticationTokenResponse()
|
||||
// helper to send a response, rather than the failedValidationResponse() helper
|
||||
// that we'd normally use.
|
||||
if data.ValidateTokenPlaintext(v, token); !v.Valid() {
|
||||
app.invalidAuthenticationTokenResponse(w, r)
|
||||
return
|
||||
}
|
||||
|
||||
// Retrieve the details of the user associated with the authentication token,
|
||||
// again calling the invalidAuthenticationTokenResponse() helper if no
|
||||
// matching record was found. IMPORTANT: Notice that we are using
|
||||
// ScopeAuthentication as the first parameter here.
|
||||
user, err := app.models.Users.GetForToken(data.ScopeAuthentication, token)
|
||||
if err != nil {
|
||||
switch {
|
||||
case errors.Is(err, data.ErrRecordNotFound):
|
||||
app.invalidAuthenticationTokenResponse(w, r)
|
||||
default:
|
||||
app.serverErrorResponse(w, r, err)
|
||||
}
|
||||
return
|
||||
}
|
||||
|
||||
// Call the contextSetUser() helper to add the user information to the request
|
||||
// context.
|
||||
r = app.contextSetUser(r, user)
|
||||
|
||||
// Call the next handler in the chain.
|
||||
next.ServeHTTP(w, r)
|
||||
})
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user