kleinTodo/common/jwt/verify.go

48 lines
1.1 KiB
Go
Raw Normal View History

2025-07-26 23:31:00 +02:00
package jwt
import (
_ "context"
2025-08-23 19:14:16 +02:00
"errors"
"fmt"
2025-07-26 23:31:00 +02:00
"net/http"
"os"
"strings"
2025-08-23 13:28:48 +02:00
"gitea.kleinsense.nl/DariusKlein/kleinTodo/common"
"github.com/golang-jwt/jwt/v5"
2025-07-26 23:31:00 +02:00
)
func GetVerifiedUser(r *http.Request) (string, error) {
2025-08-23 19:14:16 +02:00
authHeader := r.Header.Get(common.AuthHeader)
if authHeader == "" {
return "", errors.New("authorization header is required")
}
parts := strings.Split(authHeader, " ")
if len(parts) != 2 || strings.ToLower(parts[0]) != "bearer" {
return "", errors.New("authorization header format must be Bearer {token}")
}
verifiedUser, err := VerifyJWT(parts[1])
2025-07-26 23:31:00 +02:00
if err != nil {
2025-08-23 19:14:16 +02:00
return "", fmt.Errorf("invalid token: %w", err)
2025-07-26 23:31:00 +02:00
}
2025-08-23 19:14:16 +02:00
return verifiedUser, nil
2025-07-26 23:31:00 +02:00
}
// VerifyJWT verify JWT token and returns user object
func VerifyJWT(authToken string) (string, error) {
//get jwt secret from environment
secret := os.Getenv("JWT_SECRET")
//parse jwt token
token, err := jwt.ParseWithClaims(authToken, &jwt.RegisteredClaims{}, func(token *jwt.Token) (interface{}, error) {
return []byte(secret), nil
})
if err != nil {
return "", err
}
subject := token.Claims.(*jwt.RegisteredClaims).Subject
return subject, err
}