Files
backend/middlewares/checkAccessToken.go
Yi-Ting Shih 1cf3a9ef0b
All checks were successful
Go test / run-go-vet (push) Successful in 6s
Go test / check-swagger-up-to-date (push) Successful in 10s
Go test / run-go-test (push) Successful in 36s
Go test / cleanup-go-test (push) Successful in 14s
Go test / release-image (push) Successful in 3m20s
Fix: cookie timeout
2025-12-12 02:09:46 +08:00

118 lines
3.0 KiB
Go

package middlewares
import (
"context"
"net/http"
"time"
"gitea.konchin.com/go2025/backend/interfaces"
"gitea.konchin.com/go2025/backend/models"
"gitea.konchin.com/go2025/backend/tracing"
"gitea.konchin.com/go2025/backend/types"
"github.com/golang-jwt/jwt/v5"
"github.com/spf13/viper"
"github.com/uptrace/bunrouter"
"go.opentelemetry.io/otel/attribute"
"go.opentelemetry.io/otel/trace"
"go.uber.org/zap"
)
func refreshAccessToken(
ctx context.Context,
db interfaces.Database,
w http.ResponseWriter,
req bunrouter.Request,
) (string, error) {
refreshTokenClaim, ok := req.Context().
Value(types.RefreshToken("")).(models.RefreshTokenClaim)
if !ok {
tracing.Logger.Ctx(ctx).
Warn("refresh token not exist")
return "", types.ContextNotExistError
}
session, err := db.GetSessionByUserId(ctx,
refreshTokenClaim.UserId)
if err != nil {
tracing.Logger.Ctx(ctx).
Warn("session not exist", zap.Error(err))
return "", err
}
ret, err := session.ToAccessToken()
if err != nil {
tracing.Logger.Ctx(ctx).
Warn("access token generate failed", zap.Error(err))
return "", err
}
http.SetCookie(w, &http.Cookie{
Name: "access_token",
Value: ret,
Path: "/",
Secure: viper.GetBool("https"),
Expires: time.Now().Add(time.Duration(
viper.GetInt64("access-token-timeout")) * time.Second),
HttpOnly: true,
SameSite: http.SameSiteLaxMode,
})
return ret, nil
}
func (self *Handlers) CheckAccessToken(
next bunrouter.HandlerFunc,
) bunrouter.HandlerFunc {
return func(w http.ResponseWriter, req bunrouter.Request) error {
ctx := req.Context()
var accessTokenString string
accessTokenCookie, err := req.Cookie("access_token")
if err != nil {
accessTokenString, err = refreshAccessToken(ctx, self.db, w, req)
if err != nil {
return HTTPError{
StatusCode: http.StatusUnauthorized,
Message: "failed to refresh access token",
OriginError: err,
}
}
} else {
accessTokenString = accessTokenCookie.Value
}
var claim models.AccessTokenClaim
token, err := jwt.ParseWithClaims(accessTokenString, &claim,
func(*jwt.Token) (interface{}, error) {
return []byte(viper.GetString("access-token-secret")), nil
})
if err != nil || !token.Valid {
accessTokenString, err = refreshAccessToken(ctx, self.db, w, req)
if err != nil {
return HTTPError{
StatusCode: http.StatusUnauthorized,
Message: "failed to refresh access token",
OriginError: err,
}
}
token, err := jwt.ParseWithClaims(accessTokenString, &claim,
func(*jwt.Token) (interface{}, error) {
return []byte(viper.GetString("access-token-secret")), nil
})
if err != nil || !token.Valid {
return HTTPError{
StatusCode: http.StatusUnauthorized,
Message: "access token jwt cannot parse or invalid",
OriginError: err,
}
}
}
span := trace.SpanFromContext(ctx)
span.SetAttributes(
attribute.String("owner.UserId", claim.UserId))
ctx = context.WithValue(ctx, types.AccessToken(""), claim)
return next(w, req.WithContext(ctx))
}
}