summaryrefslogtreecommitdiff
path: root/internal/handlers/middleware.go
diff options
context:
space:
mode:
authorGrail Finder <wohilas@gmail.com>2025-03-29 11:12:53 +0300
committerGrail Finder <wohilas@gmail.com>2025-03-29 11:12:53 +0300
commit3921db6166e2da895257496bb76dd115556699d3 (patch)
tree1be4f739121761085f69cb7706c60dbbe98a93e9 /internal/handlers/middleware.go
init
Diffstat (limited to 'internal/handlers/middleware.go')
-rw-r--r--internal/handlers/middleware.go75
1 files changed, 75 insertions, 0 deletions
diff --git a/internal/handlers/middleware.go b/internal/handlers/middleware.go
new file mode 100644
index 0000000..8b871a2
--- /dev/null
+++ b/internal/handlers/middleware.go
@@ -0,0 +1,75 @@
+package handlers
+
+import (
+ "context"
+ "crypto/hmac"
+ "crypto/sha256"
+ "encoding/base64"
+ "errors"
+ "net/http"
+)
+
+func (h *Handlers) GetSession(next http.Handler) http.Handler {
+ return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
+ cookieName := "session_token"
+ sessionCookie, err := r.Cookie(cookieName)
+ if err != nil {
+ msg := "auth failed; failed to get session token from cookies"
+ h.log.Debug(msg, "error", err)
+ next.ServeHTTP(w, r)
+ return
+ }
+ cookieValueB, err := base64.URLEncoding.
+ DecodeString(sessionCookie.Value)
+ if err != nil {
+ msg := "auth failed; failed to decode b64 cookie"
+ h.log.Debug(msg, "error", err)
+ next.ServeHTTP(w, r)
+ return
+ }
+ cookieValue := string(cookieValueB)
+ if len(cookieValue) < sha256.Size {
+ h.log.Warn("small cookie", "size", len(cookieValue))
+ next.ServeHTTP(w, r)
+ return
+ }
+ // Split apart the signature and original cookie value.
+ signature := cookieValue[:sha256.Size]
+ sessionToken := cookieValue[sha256.Size:]
+ //verify signature
+ mac := hmac.New(sha256.New, []byte(h.cfg.CookieSecret))
+ mac.Write([]byte(cookieName))
+ mac.Write([]byte(sessionToken))
+ expectedSignature := mac.Sum(nil)
+ if !hmac.Equal([]byte(signature), expectedSignature) {
+ h.log.Debug("cookie with an invalid sign")
+ next.ServeHTTP(w, r)
+ return
+ }
+ userSession, err := h.cacheGetSession(sessionToken)
+ if err != nil {
+ msg := "auth failed; session does not exists"
+ err = errors.New(msg)
+ h.log.Debug(msg, "error", err)
+ next.ServeHTTP(w, r)
+ return
+ }
+ if userSession.IsExpired() {
+ h.mc.RemoveKey(sessionToken)
+ msg := "session is expired"
+ h.log.Debug(msg, "error", err, "token", sessionToken)
+ next.ServeHTTP(w, r)
+ return
+ }
+ ctx := context.WithValue(r.Context(),
+ "username", userSession.Username)
+ if err := h.cacheSetSession(sessionToken,
+ userSession); err != nil {
+ msg := "failed to marshal user session"
+ h.log.Warn(msg, "error", err)
+ next.ServeHTTP(w, r)
+ return
+ }
+ next.ServeHTTP(w, r.WithContext(ctx))
+ })
+}