Refactor example
This commit is contained in:
parent
f3672c9a0c
commit
1d3c39bb49
2 changed files with 70 additions and 81 deletions
103
README.md
103
README.md
|
@ -9,73 +9,62 @@ your application:
|
||||||
package main
|
package main
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"errors"
|
"errors"
|
||||||
"fmt"
|
"fmt"
|
||||||
"net/http"
|
"net/http"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
"github.com/thermokarst/jwt"
|
"github.com/thermokarst/jwt"
|
||||||
)
|
)
|
||||||
|
|
||||||
func protectMe(w http.ResponseWriter, r *http.Request) {
|
func protectMe(w http.ResponseWriter, r *http.Request) {
|
||||||
fmt.Fprintf(w, "secured")
|
fmt.Fprintf(w, "secured")
|
||||||
|
}
|
||||||
|
|
||||||
|
func dontProtectMe(w http.ResponseWriter, r *http.Request) {
|
||||||
|
fmt.Fprintf(w, "not secured")
|
||||||
|
}
|
||||||
|
|
||||||
|
func auth(email string, password string) error {
|
||||||
|
// Hard-code a user
|
||||||
|
if email != "test" || password != "test" {
|
||||||
|
return errors.New("invalid credentials")
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func setClaims(id string) (map[string]interface{}, error) {
|
||||||
|
currentTime := time.Now()
|
||||||
|
return map[string]interface{}{
|
||||||
|
"iat": currentTime.Unix(),
|
||||||
|
"exp": currentTime.Add(time.Minute * 60 * 24).Unix(),
|
||||||
|
}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func verifyClaims([]byte) error {
|
||||||
|
// We don't really care about the claims, just approve as-is
|
||||||
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func main() {
|
func main() {
|
||||||
authFunc := func(email string, password string) error {
|
config := &jwt.Config{
|
||||||
// Hard-code a user --- this could easily be a database call, etc.
|
Secret: "password",
|
||||||
if email != "test" || password != "test" {
|
Auth: auth,
|
||||||
return errors.New("invalid credentials")
|
Claims: setClaims,
|
||||||
}
|
}
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
claimsFunc := func(userId string) (map[string]interface{}, error) {
|
j, err := jwt.New(config)
|
||||||
currentTime := time.Now()
|
if err != nil {
|
||||||
return map[string]interface{}{
|
panic(err)
|
||||||
"iat": currentTime.Unix(),
|
}
|
||||||
"exp": currentTime.Add(time.Minute * 60 * 24).Unix(),
|
|
||||||
"sub": userId,
|
|
||||||
}, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
verifyClaimsFunc := func(claims []byte) error {
|
protect := http.HandlerFunc(protectMe)
|
||||||
currentTime := time.Now()
|
dontProtect := http.HandlerFunc(dontProtectMe)
|
||||||
var c struct {
|
|
||||||
Exp int64
|
|
||||||
Iat int64
|
|
||||||
Sub string
|
|
||||||
}
|
|
||||||
err := json.Unmarshal(claims, &c)
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
if currentTime.After(time.Unix(c.Exp, 0)) {
|
|
||||||
return errors.New("this token has expired!")
|
|
||||||
}
|
|
||||||
if c.Sub != "test" {
|
|
||||||
return errors.New("who are you??!")
|
|
||||||
}
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
config := &jwt.Config{
|
http.Handle("/authenticate", j.GenerateToken())
|
||||||
Secret: "password",
|
http.Handle("/secure", j.Secure(protect, verifyClaims))
|
||||||
Auth: authFunc,
|
http.Handle("/insecure", dontProtect)
|
||||||
Claims: claimsFunc,
|
http.ListenAndServe(":8080", nil)
|
||||||
}
|
|
||||||
|
|
||||||
j, err := jwt.New(config)
|
|
||||||
if err != nil {
|
|
||||||
panic(err)
|
|
||||||
}
|
|
||||||
|
|
||||||
protect := http.HandlerFunc(protectMe)
|
|
||||||
|
|
||||||
http.Handle("/authenticate", j.GenerateToken())
|
|
||||||
http.Handle("/secure", j.Secure(protect, verifyClaimsFunc))
|
|
||||||
|
|
||||||
http.ListenAndServe(":8080", nil)
|
|
||||||
}
|
}
|
||||||
```
|
```
|
||||||
|
|
||||||
|
|
|
@ -17,32 +17,32 @@ func dontProtectMe(w http.ResponseWriter, r *http.Request) {
|
||||||
fmt.Fprintf(w, "not secured")
|
fmt.Fprintf(w, "not secured")
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func auth(email string, password string) error {
|
||||||
|
// Hard-code a user
|
||||||
|
if email != "test" || password != "test" {
|
||||||
|
return errors.New("invalid credentials")
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func setClaims(id string) (map[string]interface{}, error) {
|
||||||
|
currentTime := time.Now()
|
||||||
|
return map[string]interface{}{
|
||||||
|
"iat": currentTime.Unix(),
|
||||||
|
"exp": currentTime.Add(time.Minute * 60 * 24).Unix(),
|
||||||
|
}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func verifyClaims([]byte) error {
|
||||||
|
// We don't really care about the claims, just approve as-is
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
func main() {
|
func main() {
|
||||||
authFunc := func(email string, password string) error {
|
|
||||||
// Hard-code a user
|
|
||||||
if email != "test" || password != "test" {
|
|
||||||
return errors.New("invalid credentials")
|
|
||||||
}
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
claimsFunc := func(string) (map[string]interface{}, error) {
|
|
||||||
currentTime := time.Now()
|
|
||||||
return map[string]interface{}{
|
|
||||||
"iat": currentTime.Unix(),
|
|
||||||
"exp": currentTime.Add(time.Minute * 60 * 24).Unix(),
|
|
||||||
}, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
verifyClaimsFunc := func([]byte) error {
|
|
||||||
// We don't really care about the claims, just approve as-is
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
config := &jwt.Config{
|
config := &jwt.Config{
|
||||||
Secret: "password",
|
Secret: "password",
|
||||||
Auth: authFunc,
|
Auth: auth,
|
||||||
Claims: claimsFunc,
|
Claims: setClaims,
|
||||||
}
|
}
|
||||||
|
|
||||||
j, err := jwt.New(config)
|
j, err := jwt.New(config)
|
||||||
|
@ -54,7 +54,7 @@ func main() {
|
||||||
dontProtect := http.HandlerFunc(dontProtectMe)
|
dontProtect := http.HandlerFunc(dontProtectMe)
|
||||||
|
|
||||||
http.Handle("/authenticate", j.GenerateToken())
|
http.Handle("/authenticate", j.GenerateToken())
|
||||||
http.Handle("/secure", j.Secure(protect, verifyClaimsFunc))
|
http.Handle("/secure", j.Secure(protect, verifyClaims))
|
||||||
http.Handle("/insecure", dontProtect)
|
http.Handle("/insecure", dontProtect)
|
||||||
http.ListenAndServe(":8080", nil)
|
http.ListenAndServe(":8080", nil)
|
||||||
}
|
}
|
||||||
|
|
Loading…
Add table
Reference in a new issue