Skip to content

Commit ad0811d

Browse files
committed
fix(middleware): enhance AuthMiddleware to check for active tokens and handle unauthorized access
1 parent 23a1a64 commit ad0811d

File tree

1 file changed

+18
-9
lines changed

1 file changed

+18
-9
lines changed

app/middlewares/auth_middleware.go

Lines changed: 18 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -31,15 +31,24 @@ func (m *Middleware) AuthMiddleware(allowedRole string) domain.MiddlewareFunc {
3131
return
3232
}
3333

34-
// tokenLogoutErr := m.UserRepo.ExpiredToken(request.Context(), *token)
35-
// if tokenLogoutErr == nil {
36-
// utils.Response(domain.HttpResponse{
37-
// Code: 401,
38-
// Message: "Token expired",
39-
// Data: nil,
40-
// }, writer)
41-
// return
42-
// }
34+
logoutToken, err := m.UserRepo.CheckActiveToken(request.Context(), *token)
35+
if err != nil {
36+
utils.Response(domain.HttpResponse{
37+
Code: 401,
38+
Message: "Unauthorized",
39+
Data: nil,
40+
}, writer)
41+
return
42+
}
43+
if logoutToken.Status == 0 {
44+
utils.Response(domain.HttpResponse{
45+
Code: 401,
46+
Message: "Unauthorized",
47+
Data: nil,
48+
}, writer)
49+
return
50+
}
51+
4352

4453
user, err := m.UserRepo.FindByEmail(request.Context(), verifyToken.Email)
4554
if err != nil {

0 commit comments

Comments
 (0)