Minor cleanup/formatting

Added brief documentation for fieldname feature
This commit is contained in:
Matthew Dillon 2015-04-28 08:31:12 -08:00
parent e20c94dcaa
commit 03fbde5af3
2 changed files with 17 additions and 6 deletions

View file

@ -22,7 +22,7 @@ func protectMe(w http.ResponseWriter, r *http.Request) {
} }
func main() { func main() {
var authFunc = func(email string, password string) error { authFunc := func(email string, password string) error {
// Hard-code a user --- this could easily be a database call, etc. // Hard-code a user --- this could easily be a database call, etc.
if email != "test" || password != "test" { if email != "test" || password != "test" {
return errors.New("invalid credentials") return errors.New("invalid credentials")
@ -30,7 +30,7 @@ func main() {
return nil return nil
} }
var claimsFunc = func(userId string) (map[string]interface{}, error) { claimsFunc := func(userId string) (map[string]interface{}, error) {
currentTime := time.Now() currentTime := time.Now()
return map[string]interface{}{ return map[string]interface{}{
"iat": currentTime.Unix(), "iat": currentTime.Unix(),
@ -39,7 +39,7 @@ func main() {
}, nil }, nil
} }
var verifyClaimsFunc = func(claims []byte) error { verifyClaimsFunc := func(claims []byte) error {
currentTime := time.Now() currentTime := time.Now()
var c struct { var c struct {
Exp int64 Exp int64
@ -64,13 +64,17 @@ func main() {
Auth: authFunc, Auth: authFunc,
Claims: claimsFunc, Claims: claimsFunc,
} }
j, err := jwt.New(config) j, err := jwt.New(config)
if err != nil { if err != nil {
panic(err) panic(err)
} }
protect := http.HandlerFunc(protectMe) protect := http.HandlerFunc(protectMe)
http.Handle("/authenticate", j.GenerateToken()) http.Handle("/authenticate", j.GenerateToken())
http.Handle("/secure", j.Secure(protect, verifyClaimsFunc)) http.Handle("/secure", j.Secure(protect, verifyClaimsFunc))
http.ListenAndServe(":8080", nil) http.ListenAndServe(":8080", nil)
} }
``` ```
@ -98,6 +102,10 @@ config := &jwt.Config{
j, err := jwt.New(config) j, err := jwt.New(config)
``` ```
You can also customize the field names by specifying `IdentityField` and
`VerifyField` in the `Config` struct, if you want the credentials to be
something other than `"email"` and `"password"`.
Once the middleware is instantiated, create a route for users to generate a JWT Once the middleware is instantiated, create a route for users to generate a JWT
at. at.

View file

@ -18,7 +18,7 @@ func dontProtectMe(w http.ResponseWriter, r *http.Request) {
} }
func main() { func main() {
var authFunc = func(email string, password string) error { authFunc := func(email string, password string) error {
// Hard-code a user // Hard-code a user
if email != "test" || password != "test" { if email != "test" || password != "test" {
return errors.New("invalid credentials") return errors.New("invalid credentials")
@ -26,7 +26,7 @@ func main() {
return nil return nil
} }
var claimsFunc = func(string) (map[string]interface{}, error) { claimsFunc := func(string) (map[string]interface{}, error) {
currentTime := time.Now() currentTime := time.Now()
return map[string]interface{}{ return map[string]interface{}{
"iat": currentTime.Unix(), "iat": currentTime.Unix(),
@ -34,7 +34,7 @@ func main() {
}, nil }, nil
} }
var verifyClaimsFunc = func([]byte) error { verifyClaimsFunc := func([]byte) error {
// We don't really care about the claims, just approve as-is // We don't really care about the claims, just approve as-is
return nil return nil
} }
@ -44,12 +44,15 @@ func main() {
Auth: authFunc, Auth: authFunc,
Claims: claimsFunc, Claims: claimsFunc,
} }
j, err := jwt.New(config) j, err := jwt.New(config)
if err != nil { if err != nil {
panic(err) panic(err)
} }
protect := http.HandlerFunc(protectMe) protect := http.HandlerFunc(protectMe)
dontProtect := http.HandlerFunc(dontProtectMe) dontProtect := http.HandlerFunc(dontProtectMe)
http.Handle("/authenticate", j.GenerateToken()) http.Handle("/authenticate", j.GenerateToken())
http.Handle("/secure", j.Secure(protect, verifyClaimsFunc)) http.Handle("/secure", j.Secure(protect, verifyClaimsFunc))
http.Handle("/insecure", dontProtect) http.Handle("/insecure", dontProtect)