We are going to simulate user verification when making a protected request. To simulate the database we are just going to use a simple array.
We verify the user by grabbing the JWT off of the authorization header in the request. We then look for a user in the database with a matching JWT. If the verification is successful we can give the user the data they requested.