Refactor example
This commit is contained in:
parent
f3672c9a0c
commit
1d3c39bb49
2 changed files with 70 additions and 81 deletions
41
README.md
41
README.md
|
@ -21,48 +21,36 @@ func protectMe(w http.ResponseWriter, r *http.Request) {
|
||||||
fmt.Fprintf(w, "secured")
|
fmt.Fprintf(w, "secured")
|
||||||
}
|
}
|
||||||
|
|
||||||
func main() {
|
func dontProtectMe(w http.ResponseWriter, r *http.Request) {
|
||||||
authFunc := func(email string, password string) error {
|
fmt.Fprintf(w, "not secured")
|
||||||
// Hard-code a user --- this could easily be a database call, etc.
|
}
|
||||||
|
|
||||||
|
func auth(email string, password string) error {
|
||||||
|
// Hard-code a user
|
||||||
if email != "test" || password != "test" {
|
if email != "test" || password != "test" {
|
||||||
return errors.New("invalid credentials")
|
return errors.New("invalid credentials")
|
||||||
}
|
}
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
claimsFunc := func(userId string) (map[string]interface{}, error) {
|
func setClaims(id string) (map[string]interface{}, error) {
|
||||||
currentTime := time.Now()
|
currentTime := time.Now()
|
||||||
return map[string]interface{}{
|
return map[string]interface{}{
|
||||||
"iat": currentTime.Unix(),
|
"iat": currentTime.Unix(),
|
||||||
"exp": currentTime.Add(time.Minute * 60 * 24).Unix(),
|
"exp": currentTime.Add(time.Minute * 60 * 24).Unix(),
|
||||||
"sub": userId,
|
|
||||||
}, nil
|
}, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
verifyClaimsFunc := func(claims []byte) error {
|
func verifyClaims([]byte) error {
|
||||||
currentTime := time.Now()
|
// We don't really care about the claims, just approve as-is
|
||||||
var c struct {
|
|
||||||
Exp int64
|
|
||||||
Iat int64
|
|
||||||
Sub string
|
|
||||||
}
|
|
||||||
err := json.Unmarshal(claims, &c)
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
if currentTime.After(time.Unix(c.Exp, 0)) {
|
|
||||||
return errors.New("this token has expired!")
|
|
||||||
}
|
|
||||||
if c.Sub != "test" {
|
|
||||||
return errors.New("who are you??!")
|
|
||||||
}
|
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func main() {
|
||||||
config := &jwt.Config{
|
config := &jwt.Config{
|
||||||
Secret: "password",
|
Secret: "password",
|
||||||
Auth: authFunc,
|
Auth: auth,
|
||||||
Claims: claimsFunc,
|
Claims: setClaims,
|
||||||
}
|
}
|
||||||
|
|
||||||
j, err := jwt.New(config)
|
j, err := jwt.New(config)
|
||||||
|
@ -71,10 +59,11 @@ func main() {
|
||||||
}
|
}
|
||||||
|
|
||||||
protect := http.HandlerFunc(protectMe)
|
protect := http.HandlerFunc(protectMe)
|
||||||
|
dontProtect := http.HandlerFunc(dontProtectMe)
|
||||||
|
|
||||||
http.Handle("/authenticate", j.GenerateToken())
|
http.Handle("/authenticate", j.GenerateToken())
|
||||||
http.Handle("/secure", j.Secure(protect, verifyClaimsFunc))
|
http.Handle("/secure", j.Secure(protect, verifyClaims))
|
||||||
|
http.Handle("/insecure", dontProtect)
|
||||||
http.ListenAndServe(":8080", nil)
|
http.ListenAndServe(":8080", nil)
|
||||||
}
|
}
|
||||||
```
|
```
|
||||||
|
|
|
@ -17,8 +17,7 @@ func dontProtectMe(w http.ResponseWriter, r *http.Request) {
|
||||||
fmt.Fprintf(w, "not secured")
|
fmt.Fprintf(w, "not secured")
|
||||||
}
|
}
|
||||||
|
|
||||||
func main() {
|
func auth(email string, password string) error {
|
||||||
authFunc := func(email string, password string) error {
|
|
||||||
// Hard-code a user
|
// Hard-code a user
|
||||||
if email != "test" || password != "test" {
|
if email != "test" || password != "test" {
|
||||||
return errors.New("invalid credentials")
|
return errors.New("invalid credentials")
|
||||||
|
@ -26,7 +25,7 @@ func main() {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
claimsFunc := func(string) (map[string]interface{}, error) {
|
func setClaims(id string) (map[string]interface{}, error) {
|
||||||
currentTime := time.Now()
|
currentTime := time.Now()
|
||||||
return map[string]interface{}{
|
return map[string]interface{}{
|
||||||
"iat": currentTime.Unix(),
|
"iat": currentTime.Unix(),
|
||||||
|
@ -34,15 +33,16 @@ func main() {
|
||||||
}, nil
|
}, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
verifyClaimsFunc := func([]byte) error {
|
func verifyClaims([]byte) error {
|
||||||
// We don't really care about the claims, just approve as-is
|
// We don't really care about the claims, just approve as-is
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func main() {
|
||||||
config := &jwt.Config{
|
config := &jwt.Config{
|
||||||
Secret: "password",
|
Secret: "password",
|
||||||
Auth: authFunc,
|
Auth: auth,
|
||||||
Claims: claimsFunc,
|
Claims: setClaims,
|
||||||
}
|
}
|
||||||
|
|
||||||
j, err := jwt.New(config)
|
j, err := jwt.New(config)
|
||||||
|
@ -54,7 +54,7 @@ func main() {
|
||||||
dontProtect := http.HandlerFunc(dontProtectMe)
|
dontProtect := http.HandlerFunc(dontProtectMe)
|
||||||
|
|
||||||
http.Handle("/authenticate", j.GenerateToken())
|
http.Handle("/authenticate", j.GenerateToken())
|
||||||
http.Handle("/secure", j.Secure(protect, verifyClaimsFunc))
|
http.Handle("/secure", j.Secure(protect, verifyClaims))
|
||||||
http.Handle("/insecure", dontProtect)
|
http.Handle("/insecure", dontProtect)
|
||||||
http.ListenAndServe(":8080", nil)
|
http.ListenAndServe(":8080", nil)
|
||||||
}
|
}
|
||||||
|
|
Loading…
Add table
Reference in a new issue