Documentation ¶
Index ¶
Constants ¶
This section is empty.
Variables ¶
View Source
var JwtAuthentication = func(next http.Handler) http.Handler { return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { notAuth := []string{"/api/v1/login", "/api/v1/district-summary", "/api/v1/ward-details", "/api/v1/news", "/api/v1/district-summary-latest", "/api/v1/patient-summary", "/api/v1/patient-summary-delta"} requestPath := r.URL.Path for _, value := range notAuth { if value == requestPath { next.ServeHTTP(w, r) return } } response := make(map[string]interface{}) tokenHeader := r.Header.Get("Authorization") if tokenHeader == "" { response = u.Message(false, "Missing auth token") w.WriteHeader(http.StatusForbidden) w.Header().Add("Content-Type", "application/json") u.Respond(w, response) return } splitted := strings.Split(tokenHeader, " ") if len(splitted) != 2 { response = u.Message(false, "Invalid/Malformed auth token") w.WriteHeader(http.StatusForbidden) w.Header().Add("Content-Type", "application/json") u.Respond(w, response) return } tokenPart := splitted[1] tk := &domain.Token{} token, err := jwt.ParseWithClaims(tokenPart, tk, func(token *jwt.Token) (interface{}, error) { return []byte(config.GetConfig().MH12Config.Application.Token), nil }) if err != nil { response = u.Message(false, "Malformed authentication token : "+err.Error()) w.WriteHeader(http.StatusForbidden) w.Header().Add("Content-Type", "application/json") u.Respond(w, response) return } if !token.Valid { response = u.Message(false, "Token is not valid.") w.WriteHeader(http.StatusForbidden) w.Header().Add("Content-Type", "application/json") u.Respond(w, response) return } fmt.Sprintln("user : ", tk.UserID) ctx := context.WithValue(r.Context(), keyPrincipalID, tk.UserID) r = r.WithContext(ctx) next.ServeHTTP(w, r) }) }
JwtAuthentication jwt authentication
Functions ¶
This section is empty.
Types ¶
This section is empty.
Click to show internal directories.
Click to hide internal directories.