Add new token method

Rename `GenerateToken` to `Authenticate`, add `CreateToken` method
This commit is contained in:
Matthew Dillon 2015-07-16 18:44:31 -08:00
parent 66ca404d84
commit e04139dd78
3 changed files with 45 additions and 53 deletions

View file

@ -70,7 +70,7 @@ func main() {
protect := http.HandlerFunc(protectMe) protect := http.HandlerFunc(protectMe)
dontProtect := http.HandlerFunc(dontProtectMe) dontProtect := http.HandlerFunc(dontProtectMe)
http.Handle("/authenticate", j.GenerateToken()) http.Handle("/authenticate", j.Authenticate())
http.Handle("/secure", j.Secure(protect, verifyClaims)) http.Handle("/secure", j.Secure(protect, verifyClaims))
http.Handle("/insecure", dontProtect) http.Handle("/insecure", dontProtect)
http.ListenAndServe(":8080", nil) http.ListenAndServe(":8080", nil)
@ -137,7 +137,7 @@ Once the middleware is instantiated, create a route for users to generate a JWT
at. at.
```go ```go
http.Handle("/authenticate", j.GenerateToken()) http.Handle("/authenticate", j.Authenticate())
``` ```
The auth function takes two arguments (the identity, and the authorization The auth function takes two arguments (the identity, and the authorization

64
jwt.go
View file

@ -171,10 +171,10 @@ func (m *Middleware) Secure(h http.Handler, v VerifyClaimsFunc) http.Handler {
return errorHandler(secureHandler) return errorHandler(secureHandler)
} }
// GenerateToken returns a middleware that parsing an incoming request for a JWT, // Authenticate returns a middleware that parsing an incoming request for a JWT,
// calls the client-supplied auth function, and if successful, returns a JWT to // calls the client-supplied auth function, and if successful, returns a JWT to
// the requester. // the requester.
func (m *Middleware) GenerateToken() http.Handler { func (m *Middleware) Authenticate() http.Handler {
generateHandler := func(w http.ResponseWriter, r *http.Request) *jwtError { generateHandler := func(w http.ResponseWriter, r *http.Request) *jwtError {
if r.Method != "POST" { if r.Method != "POST" {
return &jwtError{ return &jwtError{
@ -215,43 +215,43 @@ func (m *Middleware) GenerateToken() http.Handler {
message: "performing authorization", message: "performing authorization",
} }
} }
response, err := m.CreateToken(b[m.identityField])
// For now, the header will be static
header, err := encode(fmt.Sprintf(`{"typ":%q,"alg":%q}`, typ, alg))
if err != nil {
return &jwtError{
status: http.StatusInternalServerError,
err: ErrEncoding,
message: "encoding header",
}
}
// Generate claims for user
claims, err := m.claims(b[m.identityField])
if err != nil { if err != nil {
return &jwtError{ return &jwtError{
status: http.StatusInternalServerError, status: http.StatusInternalServerError,
err: err, err: err,
message: "generating claims", message: response,
} }
} }
w.Write([]byte(response))
return nil
}
return errorHandler(generateHandler)
}
// CreateToken generates a token from a user's identity
func (m *Middleware) CreateToken(identity string) (string, error) {
// For now, the header will be static
header, err := encode(fmt.Sprintf(`{"typ":%q,"alg":%q}`, typ, alg))
if err != nil {
return "encoding header", ErrEncoding
}
// Generate claims for user
claims, err := m.claims(identity)
if err != nil {
return "generating claims", err
}
claimsJSON, err := json.Marshal(claims) claimsJSON, err := json.Marshal(claims)
if err != nil { if err != nil {
return &jwtError{ return "mashalling claims", ErrEncoding
status: http.StatusInternalServerError,
err: ErrEncoding,
message: "marshalling claims",
}
} }
claimsSet, err := encode(claimsJSON) claimsSet, err := encode(claimsJSON)
if err != nil { if err != nil {
return &jwtError{ return "encoding claims", ErrEncoding
status: http.StatusInternalServerError,
err: ErrEncoding,
message: "encoding claims",
}
} }
toSig := strings.Join([]string{header, claimsSet}, ".") toSig := strings.Join([]string{header, claimsSet}, ".")
@ -260,19 +260,11 @@ func (m *Middleware) GenerateToken() http.Handler {
h.Write([]byte(toSig)) h.Write([]byte(toSig))
sig, err := encode(h.Sum(nil)) sig, err := encode(h.Sum(nil))
if err != nil { if err != nil {
return &jwtError{ return "encoding signature", ErrEncoding
status: http.StatusInternalServerError,
err: ErrEncoding,
message: "encoding signature",
}
} }
response := strings.Join([]string{toSig, sig}, ".") response := strings.Join([]string{toSig, sig}, ".")
w.Write([]byte(response)) return response, nil
return nil
}
return errorHandler(generateHandler)
} }
type jwtError struct { type jwtError struct {

View file

@ -72,7 +72,7 @@ func newToken(t *testing.T) (string, *Middleware) {
t.Error(err) t.Error(err)
} }
ts := httptest.NewServer(middleware.GenerateToken()) ts := httptest.NewServer(middleware.Authenticate())
defer ts.Close() defer ts.Close()
resp, err := http.Post(ts.URL, "application/json", bytes.NewReader(body)) resp, err := http.Post(ts.URL, "application/json", bytes.NewReader(body))
@ -226,7 +226,7 @@ func TestGenerateTokenHandlerNotPOST(t *testing.T) {
middleware := newMiddlewareOrFatal(t) middleware := newMiddlewareOrFatal(t)
resp := httptest.NewRecorder() resp := httptest.NewRecorder()
req, _ := http.NewRequest("PUT", "http://example.com", nil) req, _ := http.NewRequest("PUT", "http://example.com", nil)
middleware.GenerateToken().ServeHTTP(resp, req) middleware.Authenticate().ServeHTTP(resp, req)
body := strings.TrimSpace(resp.Body.String()) body := strings.TrimSpace(resp.Body.String())
if body != ErrInvalidMethod.Error() { if body != ErrInvalidMethod.Error() {
t.Errorf("wanted %q, got %q", ErrInvalidMethod.Error(), body) t.Errorf("wanted %q, got %q", ErrInvalidMethod.Error(), body)