Refactor example

This commit is contained in:
Matthew Dillon 2015-04-30 16:19:14 -08:00
parent f3672c9a0c
commit 1d3c39bb49
2 changed files with 70 additions and 81 deletions

103
README.md
View file

@ -9,73 +9,62 @@ your application:
package main package main
import ( import (
"errors" "errors"
"fmt" "fmt"
"net/http" "net/http"
"time" "time"
"github.com/thermokarst/jwt" "github.com/thermokarst/jwt"
) )
func protectMe(w http.ResponseWriter, r *http.Request) { func protectMe(w http.ResponseWriter, r *http.Request) {
fmt.Fprintf(w, "secured") fmt.Fprintf(w, "secured")
}
func dontProtectMe(w http.ResponseWriter, r *http.Request) {
fmt.Fprintf(w, "not secured")
}
func auth(email string, password string) error {
// Hard-code a user
if email != "test" || password != "test" {
return errors.New("invalid credentials")
}
return nil
}
func setClaims(id string) (map[string]interface{}, error) {
currentTime := time.Now()
return map[string]interface{}{
"iat": currentTime.Unix(),
"exp": currentTime.Add(time.Minute * 60 * 24).Unix(),
}, nil
}
func verifyClaims([]byte) error {
// We don't really care about the claims, just approve as-is
return nil
} }
func main() { func main() {
authFunc := func(email string, password string) error { config := &jwt.Config{
// Hard-code a user --- this could easily be a database call, etc. Secret: "password",
if email != "test" || password != "test" { Auth: auth,
return errors.New("invalid credentials") Claims: setClaims,
} }
return nil
}
claimsFunc := func(userId string) (map[string]interface{}, error) { j, err := jwt.New(config)
currentTime := time.Now() if err != nil {
return map[string]interface{}{ panic(err)
"iat": currentTime.Unix(), }
"exp": currentTime.Add(time.Minute * 60 * 24).Unix(),
"sub": userId,
}, nil
}
verifyClaimsFunc := func(claims []byte) error { protect := http.HandlerFunc(protectMe)
currentTime := time.Now() dontProtect := http.HandlerFunc(dontProtectMe)
var c struct {
Exp int64
Iat int64
Sub string
}
err := json.Unmarshal(claims, &c)
if err != nil {
return err
}
if currentTime.After(time.Unix(c.Exp, 0)) {
return errors.New("this token has expired!")
}
if c.Sub != "test" {
return errors.New("who are you??!")
}
return nil
}
config := &jwt.Config{ http.Handle("/authenticate", j.GenerateToken())
Secret: "password", http.Handle("/secure", j.Secure(protect, verifyClaims))
Auth: authFunc, http.Handle("/insecure", dontProtect)
Claims: claimsFunc, http.ListenAndServe(":8080", nil)
}
j, err := jwt.New(config)
if err != nil {
panic(err)
}
protect := http.HandlerFunc(protectMe)
http.Handle("/authenticate", j.GenerateToken())
http.Handle("/secure", j.Secure(protect, verifyClaimsFunc))
http.ListenAndServe(":8080", nil)
} }
``` ```

View file

@ -17,32 +17,32 @@ func dontProtectMe(w http.ResponseWriter, r *http.Request) {
fmt.Fprintf(w, "not secured") fmt.Fprintf(w, "not secured")
} }
func auth(email string, password string) error {
// Hard-code a user
if email != "test" || password != "test" {
return errors.New("invalid credentials")
}
return nil
}
func setClaims(id string) (map[string]interface{}, error) {
currentTime := time.Now()
return map[string]interface{}{
"iat": currentTime.Unix(),
"exp": currentTime.Add(time.Minute * 60 * 24).Unix(),
}, nil
}
func verifyClaims([]byte) error {
// We don't really care about the claims, just approve as-is
return nil
}
func main() { func main() {
authFunc := func(email string, password string) error {
// Hard-code a user
if email != "test" || password != "test" {
return errors.New("invalid credentials")
}
return nil
}
claimsFunc := func(string) (map[string]interface{}, error) {
currentTime := time.Now()
return map[string]interface{}{
"iat": currentTime.Unix(),
"exp": currentTime.Add(time.Minute * 60 * 24).Unix(),
}, nil
}
verifyClaimsFunc := func([]byte) error {
// We don't really care about the claims, just approve as-is
return nil
}
config := &jwt.Config{ config := &jwt.Config{
Secret: "password", Secret: "password",
Auth: authFunc, Auth: auth,
Claims: claimsFunc, Claims: setClaims,
} }
j, err := jwt.New(config) j, err := jwt.New(config)
@ -54,7 +54,7 @@ func main() {
dontProtect := http.HandlerFunc(dontProtectMe) dontProtect := http.HandlerFunc(dontProtectMe)
http.Handle("/authenticate", j.GenerateToken()) http.Handle("/authenticate", j.GenerateToken())
http.Handle("/secure", j.Secure(protect, verifyClaimsFunc)) http.Handle("/secure", j.Secure(protect, verifyClaims))
http.Handle("/insecure", dontProtect) http.Handle("/insecure", dontProtect)
http.ListenAndServe(":8080", nil) http.ListenAndServe(":8080", nil)
} }