minor: update jwt example to match the wiki's one

Former-commit-id: 72e3a05a670665631c97a098d5d9d446ab29cee0
This commit is contained in:
Gerasimos (Makis) Maropoulos 2019-08-16 17:02:20 +03:00
parent a7635afe62
commit 8d188817a6

View File

@ -7,40 +7,50 @@
// (because it used "context" to define the user but we don't need that so a simple iris.FromStd wouldn't work as expected.) // (because it used "context" to define the user but we don't need that so a simple iris.FromStd wouldn't work as expected.)
package main package main
// $ go get -u github.com/dgrijalva/jwt-go
// $ go run main.go
import ( import (
"github.com/kataras/iris" "github.com/kataras/iris"
"github.com/dgrijalva/jwt-go" "github.com/iris-contrib/middleware/jwt"
jwtmiddleware "github.com/iris-contrib/middleware/jwt"
) )
func myHandler(ctx iris.Context) { func getTokenHandler(ctx iris.Context) {
token := jwt.NewTokenWithClaims(jwt.SigningMethodHS256, jwt.MapClaims{
"foo": "bar",
})
// Sign and get the complete encoded token as a string using the secret
tokenString, _ := token.SignedString([]byte("My Secret"))
ctx.HTML(`Token: ` + tokenString + `<br/><br/>
<a href="/secured?token=` + tokenString + `">/secured?token=` + tokenString + `</a>`)
}
func myAuthenticatedHandler(ctx iris.Context) {
user := ctx.Values().Get("jwt").(*jwt.Token) user := ctx.Values().Get("jwt").(*jwt.Token)
ctx.Writef("This is an authenticated request\n") ctx.Writef("This is an authenticated request\n")
ctx.Writef("Claim content:\n") ctx.Writef("Claim content:\n")
ctx.Writef("%s", user.Signature) foobar := user.Claims.(jwt.MapClaims)
for key, value := range foobar {
ctx.Writef("%s = %s", key, value)
}
} }
func main() { func main() {
app := iris.New() app := iris.New()
jwtHandler := jwtmiddleware.New(jwtmiddleware.Config{ j := jwt.New(jwt.Config{
// Extract by "token" url parameter.
Extractor: jwt.FromParameter("token"),
ValidationKeyGetter: func(token *jwt.Token) (interface{}, error) { ValidationKeyGetter: func(token *jwt.Token) (interface{}, error) {
return []byte("My Secret"), nil return []byte("My Secret"), nil
}, },
// When set, the middleware verifies that tokens are signed with the specific signing algorithm
// If the signing method is not constant the ValidationKeyGetter callback can be used to implement additional checks
// Important to avoid security issues described here: https://auth0.com/blog/2015/03/31/critical-vulnerabilities-in-json-web-token-libraries/
SigningMethod: jwt.SigningMethodHS256, SigningMethod: jwt.SigningMethodHS256,
}) })
app.Use(jwtHandler.Serve) app.Get("/", getTokenHandler)
app.Get("/secured", j.Serve, myAuthenticatedHandler)
app.Get("/ping", myHandler) app.Run(iris.Addr(":8080"))
app.Run(iris.Addr("localhost:3001")) }
} // don't forget to look ../jwt_test.go to see how to set your own custom claims