golint
This commit is contained in:
parent
dc58eb70a2
commit
83f2908a95
4 changed files with 34 additions and 19 deletions
|
@ -62,7 +62,7 @@ func main() {
|
||||||
Auth: authFunc,
|
Auth: authFunc,
|
||||||
Claims: claimsFunc,
|
Claims: claimsFunc,
|
||||||
}
|
}
|
||||||
j, err := jwt.NewMiddleware(config)
|
j, err := jwt.New(config)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
panic(err)
|
panic(err)
|
||||||
}
|
}
|
||||||
|
@ -93,10 +93,10 @@ config := &jwt.Config{
|
||||||
Auth: authFunc, // func(string, string) error
|
Auth: authFunc, // func(string, string) error
|
||||||
Claims: claimsFunc, // func(string) (map[string]interface{})
|
Claims: claimsFunc, // func(string) (map[string]interface{})
|
||||||
}
|
}
|
||||||
j, err := jwt.NewMiddleware(config)
|
j, err := jwt.New(config)
|
||||||
```
|
```
|
||||||
|
|
||||||
Once the middleware is instanciated, create a route for users to generate a JWT
|
Once the middleware is instantiated, create a route for users to generate a JWT
|
||||||
at.
|
at.
|
||||||
|
|
||||||
```go
|
```go
|
||||||
|
|
|
@ -44,7 +44,7 @@ func main() {
|
||||||
Auth: authFunc,
|
Auth: authFunc,
|
||||||
Claims: claimsFunc,
|
Claims: claimsFunc,
|
||||||
}
|
}
|
||||||
j, err := jwt.NewMiddleware(config)
|
j, err := jwt.New(config)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
panic(err)
|
panic(err)
|
||||||
}
|
}
|
||||||
|
|
29
jwt.go
29
jwt.go
|
@ -17,6 +17,7 @@ const (
|
||||||
alg = "HS256"
|
alg = "HS256"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
// Errors introduced by this package.
|
||||||
var (
|
var (
|
||||||
ErrMissingConfig = errors.New("missing configuration")
|
ErrMissingConfig = errors.New("missing configuration")
|
||||||
ErrMissingSecret = errors.New("please provide a shared secret")
|
ErrMissingSecret = errors.New("please provide a shared secret")
|
||||||
|
@ -30,25 +31,33 @@ var (
|
||||||
ErrParsingCredentials = errors.New("error parsing credentials")
|
ErrParsingCredentials = errors.New("error parsing credentials")
|
||||||
)
|
)
|
||||||
|
|
||||||
|
// Config is a container for setting up the JWT middleware.
|
||||||
type Config struct {
|
type Config struct {
|
||||||
Secret string
|
Secret string
|
||||||
Auth AuthFunc
|
Auth AuthFunc
|
||||||
Claims ClaimsFunc
|
Claims ClaimsFunc
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// AuthFunc is a type for delegating user authentication to the client-code.
|
||||||
type AuthFunc func(string, string) error
|
type AuthFunc func(string, string) error
|
||||||
|
|
||||||
|
// ClaimsFunc is a type for delegating claims generation to the client-code.
|
||||||
type ClaimsFunc func(string) (map[string]interface{}, error)
|
type ClaimsFunc func(string) (map[string]interface{}, error)
|
||||||
|
|
||||||
|
// VerifyClaimsFunc is a type for for processing and validating JWT claims
|
||||||
|
// on one or more route's in the client-code.
|
||||||
type VerifyClaimsFunc func([]byte) error
|
type VerifyClaimsFunc func([]byte) error
|
||||||
|
|
||||||
type JWTMiddleware struct {
|
// Middleware is where we store all the specifics related to the client's
|
||||||
|
// JWT needs.
|
||||||
|
type Middleware struct {
|
||||||
secret string
|
secret string
|
||||||
auth AuthFunc
|
auth AuthFunc
|
||||||
claims ClaimsFunc
|
claims ClaimsFunc
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewMiddleware(c *Config) (*JWTMiddleware, error) {
|
// New creates a new Middleware from a user-specified configuration.
|
||||||
|
func New(c *Config) (*Middleware, error) {
|
||||||
if c == nil {
|
if c == nil {
|
||||||
return nil, ErrMissingConfig
|
return nil, ErrMissingConfig
|
||||||
}
|
}
|
||||||
|
@ -61,7 +70,7 @@ func NewMiddleware(c *Config) (*JWTMiddleware, error) {
|
||||||
if c.Claims == nil {
|
if c.Claims == nil {
|
||||||
return nil, ErrMissingClaimsFunc
|
return nil, ErrMissingClaimsFunc
|
||||||
}
|
}
|
||||||
m := &JWTMiddleware{
|
m := &Middleware{
|
||||||
secret: c.Secret,
|
secret: c.Secret,
|
||||||
auth: c.Auth,
|
auth: c.Auth,
|
||||||
claims: c.Claims,
|
claims: c.Claims,
|
||||||
|
@ -69,7 +78,10 @@ func NewMiddleware(c *Config) (*JWTMiddleware, error) {
|
||||||
return m, nil
|
return m, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (m *JWTMiddleware) Secure(h http.Handler, v VerifyClaimsFunc) http.Handler {
|
// Secure wraps a client-specified http.Handler with a verification function,
|
||||||
|
// as well as-built in parsing of the request's JWT. This allows each handler
|
||||||
|
// to have it's own verification/validation protocol.
|
||||||
|
func (m *Middleware) Secure(h http.Handler, v VerifyClaimsFunc) http.Handler {
|
||||||
secureHandler := func(w http.ResponseWriter, r *http.Request) *jwtError {
|
secureHandler := func(w http.ResponseWriter, r *http.Request) *jwtError {
|
||||||
authHeader := r.Header.Get("Authorization")
|
authHeader := r.Header.Get("Authorization")
|
||||||
if authHeader == "" {
|
if authHeader == "" {
|
||||||
|
@ -144,7 +156,10 @@ func (m *JWTMiddleware) Secure(h http.Handler, v VerifyClaimsFunc) http.Handler
|
||||||
return errorHandler(secureHandler)
|
return errorHandler(secureHandler)
|
||||||
}
|
}
|
||||||
|
|
||||||
func (m *JWTMiddleware) GenerateToken() http.Handler {
|
// GenerateToken returns a middleware that parsing an incoming request for a JWT,
|
||||||
|
// calls the client-supplied auth function, and if successful, returns a JWT to
|
||||||
|
// the requester.
|
||||||
|
func (m *Middleware) GenerateToken() http.Handler {
|
||||||
generateHandler := func(w http.ResponseWriter, r *http.Request) *jwtError {
|
generateHandler := func(w http.ResponseWriter, r *http.Request) *jwtError {
|
||||||
var b map[string]string
|
var b map[string]string
|
||||||
err := json.NewDecoder(r.Body).Decode(&b)
|
err := json.NewDecoder(r.Body).Decode(&b)
|
||||||
|
@ -184,7 +199,7 @@ func (m *JWTMiddleware) GenerateToken() http.Handler {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
claimsJson, err := json.Marshal(claims)
|
claimsJSON, err := json.Marshal(claims)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return &jwtError{
|
return &jwtError{
|
||||||
status: http.StatusInternalServerError,
|
status: http.StatusInternalServerError,
|
||||||
|
@ -193,7 +208,7 @@ func (m *JWTMiddleware) GenerateToken() http.Handler {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
claimsSet, err := encode(claimsJson)
|
claimsSet, err := encode(claimsJSON)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return &jwtError{
|
return &jwtError{
|
||||||
status: http.StatusInternalServerError,
|
status: http.StatusInternalServerError,
|
||||||
|
|
16
jwt_test.go
16
jwt_test.go
|
@ -48,21 +48,21 @@ var verifyClaimsFunc = func(claims []byte) error {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func newJWTMiddlewareOrFatal(t *testing.T) *JWTMiddleware {
|
func newMiddlewareOrFatal(t *testing.T) *Middleware {
|
||||||
config := &Config{
|
config := &Config{
|
||||||
Secret: "password",
|
Secret: "password",
|
||||||
Auth: authFunc,
|
Auth: authFunc,
|
||||||
Claims: claimsFunc,
|
Claims: claimsFunc,
|
||||||
}
|
}
|
||||||
middleware, err := NewMiddleware(config)
|
middleware, err := New(config)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("new middleware: %v", err)
|
t.Fatalf("new middleware: %v", err)
|
||||||
}
|
}
|
||||||
return middleware
|
return middleware
|
||||||
}
|
}
|
||||||
|
|
||||||
func newToken(t *testing.T) (string, *JWTMiddleware) {
|
func newToken(t *testing.T) (string, *Middleware) {
|
||||||
middleware := newJWTMiddlewareOrFatal(t)
|
middleware := newMiddlewareOrFatal(t)
|
||||||
authBody := map[string]interface{}{
|
authBody := map[string]interface{}{
|
||||||
"email": "user@example.com",
|
"email": "user@example.com",
|
||||||
"password": "password",
|
"password": "password",
|
||||||
|
@ -85,7 +85,7 @@ func newToken(t *testing.T) (string, *JWTMiddleware) {
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestNewJWTMiddleware(t *testing.T) {
|
func TestNewJWTMiddleware(t *testing.T) {
|
||||||
middleware := newJWTMiddlewareOrFatal(t)
|
middleware := newMiddlewareOrFatal(t)
|
||||||
if middleware.secret != "password" {
|
if middleware.secret != "password" {
|
||||||
t.Errorf("wanted password, got %v", middleware.secret)
|
t.Errorf("wanted password, got %v", middleware.secret)
|
||||||
}
|
}
|
||||||
|
@ -120,7 +120,7 @@ func TestNewJWTMiddlewareNoConfig(t *testing.T) {
|
||||||
}: ErrMissingClaimsFunc,
|
}: ErrMissingClaimsFunc,
|
||||||
}
|
}
|
||||||
for config, jwtErr := range cases {
|
for config, jwtErr := range cases {
|
||||||
_, err := NewMiddleware(config)
|
_, err := New(config)
|
||||||
if err != jwtErr {
|
if err != jwtErr {
|
||||||
t.Errorf("wanted error: %v, got error: %v using config: %v", jwtErr, err, config)
|
t.Errorf("wanted error: %v, got error: %v using config: %v", jwtErr, err, config)
|
||||||
}
|
}
|
||||||
|
@ -159,7 +159,7 @@ func TestGenerateTokenHandler(t *testing.T) {
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestSecureHandlerNoToken(t *testing.T) {
|
func TestSecureHandlerNoToken(t *testing.T) {
|
||||||
middleware := newJWTMiddlewareOrFatal(t)
|
middleware := newMiddlewareOrFatal(t)
|
||||||
resp := httptest.NewRecorder()
|
resp := httptest.NewRecorder()
|
||||||
req, _ := http.NewRequest("GET", "http://example.com", nil)
|
req, _ := http.NewRequest("GET", "http://example.com", nil)
|
||||||
middleware.Secure(testHandler, verifyClaimsFunc).ServeHTTP(resp, req)
|
middleware.Secure(testHandler, verifyClaimsFunc).ServeHTTP(resp, req)
|
||||||
|
@ -170,7 +170,7 @@ func TestSecureHandlerNoToken(t *testing.T) {
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestSecureHandlerBadToken(t *testing.T) {
|
func TestSecureHandlerBadToken(t *testing.T) {
|
||||||
middleware := newJWTMiddlewareOrFatal(t)
|
middleware := newMiddlewareOrFatal(t)
|
||||||
resp := httptest.NewRecorder()
|
resp := httptest.NewRecorder()
|
||||||
req, _ := http.NewRequest("GET", "http://example.com", nil)
|
req, _ := http.NewRequest("GET", "http://example.com", nil)
|
||||||
req.Header.Set("Authorization", "Bearer abcdefg")
|
req.Header.Set("Authorization", "Bearer abcdefg")
|
||||||
|
|
Loading…
Add table
Reference in a new issue