madipo2611 eae5cd2997
All checks were successful
continuous-integration/drone/push Build is passing
v0.0.23 исправлен cors и ws_auth
2025-08-19 23:05:55 +03:00

60 lines
1.8 KiB
Go
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

package middleware
import (
"context"
"net/http"
"strings"
"tailly_back_v2/pkg/auth"
"time"
)
func WSAuthMiddleware(tokenAuth *auth.TokenAuth) func(http.Handler) http.Handler {
return func(next http.Handler) http.Handler {
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
if r.Header.Get("Upgrade") == "websocket" {
ctx, cancel := context.WithTimeout(r.Context(), 30*time.Minute)
defer cancel()
token := extractTokenFromWSRequest(r) // ← Исправленная функция
if token != "" {
if userID, err := tokenAuth.ValidateAccessToken(token); err == nil {
ctx = context.WithValue(ctx, userIDKey, userID)
r = r.WithContext(ctx)
} else {
// Отклоняем соединение при невалидном токене
http.Error(w, "Invalid token", http.StatusUnauthorized)
return
}
} else {
// Отклоняем соединение без токена
http.Error(w, "Authentication required", http.StatusUnauthorized)
return
}
}
next.ServeHTTP(w, r)
})
}
}
func extractTokenFromWSRequest(r *http.Request) string {
// 1. Проверяем заголовок Authorization (WebSocket использует его)
if authHeader := r.Header.Get("Authorization"); authHeader != "" {
if strings.HasPrefix(authHeader, "Bearer ") {
return strings.TrimPrefix(authHeader, "Bearer ")
}
return authHeader // На случай если без Bearer prefix
}
// 2. Проверяем query parameter (альтернативный способ)
if token := r.URL.Query().Get("token"); token != "" {
return token
}
// 3. Проверяем куки (последний вариант)
if cookie, err := r.Cookie("accessToken"); err == nil {
return cookie.Value
}
return ""
}