Refactor example

This commit is contained in:
Matthew Dillon 2015-04-30 16:19:14 -08:00
parent f3672c9a0c
commit 1d3c39bb49
2 changed files with 70 additions and 81 deletions

View file

@ -21,48 +21,36 @@ func protectMe(w http.ResponseWriter, r *http.Request) {
fmt.Fprintf(w, "secured") fmt.Fprintf(w, "secured")
} }
func main() { func dontProtectMe(w http.ResponseWriter, r *http.Request) {
authFunc := func(email string, password string) error { fmt.Fprintf(w, "not secured")
// Hard-code a user --- this could easily be a database call, etc. }
func auth(email string, password string) error {
// Hard-code a user
if email != "test" || password != "test" { if email != "test" || password != "test" {
return errors.New("invalid credentials") return errors.New("invalid credentials")
} }
return nil return nil
} }
claimsFunc := func(userId string) (map[string]interface{}, error) { func setClaims(id string) (map[string]interface{}, error) {
currentTime := time.Now() currentTime := time.Now()
return map[string]interface{}{ return map[string]interface{}{
"iat": currentTime.Unix(), "iat": currentTime.Unix(),
"exp": currentTime.Add(time.Minute * 60 * 24).Unix(), "exp": currentTime.Add(time.Minute * 60 * 24).Unix(),
"sub": userId,
}, nil }, nil
} }
verifyClaimsFunc := func(claims []byte) error { func verifyClaims([]byte) error {
currentTime := time.Now() // We don't really care about the claims, just approve as-is
var c struct {
Exp int64
Iat int64
Sub string
}
err := json.Unmarshal(claims, &c)
if err != nil {
return err
}
if currentTime.After(time.Unix(c.Exp, 0)) {
return errors.New("this token has expired!")
}
if c.Sub != "test" {
return errors.New("who are you??!")
}
return nil return nil
} }
func main() {
config := &jwt.Config{ config := &jwt.Config{
Secret: "password", Secret: "password",
Auth: authFunc, Auth: auth,
Claims: claimsFunc, Claims: setClaims,
} }
j, err := jwt.New(config) j, err := jwt.New(config)
@ -71,10 +59,11 @@ func main() {
} }
protect := http.HandlerFunc(protectMe) protect := http.HandlerFunc(protectMe)
dontProtect := http.HandlerFunc(dontProtectMe)
http.Handle("/authenticate", j.GenerateToken()) http.Handle("/authenticate", j.GenerateToken())
http.Handle("/secure", j.Secure(protect, verifyClaimsFunc)) http.Handle("/secure", j.Secure(protect, verifyClaims))
http.Handle("/insecure", dontProtect)
http.ListenAndServe(":8080", nil) http.ListenAndServe(":8080", nil)
} }
``` ```

View file

@ -17,8 +17,7 @@ func dontProtectMe(w http.ResponseWriter, r *http.Request) {
fmt.Fprintf(w, "not secured") fmt.Fprintf(w, "not secured")
} }
func main() { func auth(email string, password string) error {
authFunc := func(email string, password string) error {
// Hard-code a user // Hard-code a user
if email != "test" || password != "test" { if email != "test" || password != "test" {
return errors.New("invalid credentials") return errors.New("invalid credentials")
@ -26,7 +25,7 @@ func main() {
return nil return nil
} }
claimsFunc := func(string) (map[string]interface{}, error) { func setClaims(id string) (map[string]interface{}, error) {
currentTime := time.Now() currentTime := time.Now()
return map[string]interface{}{ return map[string]interface{}{
"iat": currentTime.Unix(), "iat": currentTime.Unix(),
@ -34,15 +33,16 @@ func main() {
}, nil }, nil
} }
verifyClaimsFunc := func([]byte) error { func verifyClaims([]byte) error {
// We don't really care about the claims, just approve as-is // We don't really care about the claims, just approve as-is
return nil return nil
} }
func main() {
config := &jwt.Config{ config := &jwt.Config{
Secret: "password", Secret: "password",
Auth: authFunc, Auth: auth,
Claims: claimsFunc, Claims: setClaims,
} }
j, err := jwt.New(config) j, err := jwt.New(config)
@ -54,7 +54,7 @@ func main() {
dontProtect := http.HandlerFunc(dontProtectMe) dontProtect := http.HandlerFunc(dontProtectMe)
http.Handle("/authenticate", j.GenerateToken()) http.Handle("/authenticate", j.GenerateToken())
http.Handle("/secure", j.Secure(protect, verifyClaimsFunc)) http.Handle("/secure", j.Secure(protect, verifyClaims))
http.Handle("/insecure", dontProtect) http.Handle("/insecure", dontProtect)
http.ListenAndServe(":8080", nil) http.ListenAndServe(":8080", nil)
} }