mirror of
https://github.com/kataras/iris.git
synced 2025-02-09 02:34:55 +01:00
last touch
This commit is contained in:
parent
d562f09531
commit
f049c51336
|
@ -12,30 +12,34 @@ func main() {
|
||||||
app.ConfigureContainer(register)
|
app.ConfigureContainer(register)
|
||||||
|
|
||||||
// http://localhost:8080/authenticate
|
// http://localhost:8080/authenticate
|
||||||
// http://localhost:8080/restricted
|
// http://localhost:8080/restricted (Header: Authorization = Bearer $token)
|
||||||
app.Listen(":8080")
|
app.Listen(":8080")
|
||||||
}
|
}
|
||||||
|
|
||||||
var (
|
var secret = []byte("secret")
|
||||||
secret = []byte("secret")
|
|
||||||
signer = jwt.NewSigner(jwt.HS256, secret, 15*time.Minute)
|
|
||||||
verify = jwt.NewVerifier(jwt.HS256, secret, jwt.Expected{Issuer: "myapp"}).Verify(func() interface{} {
|
|
||||||
return new(userClaims)
|
|
||||||
})
|
|
||||||
)
|
|
||||||
|
|
||||||
func register(api *iris.APIContainer) {
|
func register(api *iris.APIContainer) {
|
||||||
// To register the middleware in the whole api container:
|
api.RegisterDependency(func(ctx iris.Context) (claims userClaims) {
|
||||||
// api.Use(verify)
|
/* Using the middleware:
|
||||||
// Otherwise, protect routes when userClaims is expected on the functions input
|
if ctx.Proceed(verify) {
|
||||||
// by calling the middleware manually, see below.
|
// ^ the "verify" middleware will stop the execution if it's failed to verify the request.
|
||||||
api.RegisterDependency(func(ctx iris.Context) (claims *userClaims) {
|
|
||||||
if ctx.Proceed(verify) { // the "verify" middleware will stop the execution if it's failed to verify the request.
|
|
||||||
// Map the input parameter of "restricted" function with the claims.
|
// Map the input parameter of "restricted" function with the claims.
|
||||||
return jwt.Get(ctx).(*userClaims)
|
return jwt.Get(ctx).(*userClaims)
|
||||||
|
}*/
|
||||||
|
token := jwt.FromHeader(ctx)
|
||||||
|
if token == "" {
|
||||||
|
ctx.StopWithError(iris.StatusUnauthorized, jwt.ErrMissing)
|
||||||
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
return nil
|
verifiedToken, err := jwt.Verify(jwt.HS256, secret, []byte(token))
|
||||||
|
if err != nil {
|
||||||
|
ctx.StopWithError(iris.StatusUnauthorized, err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
verifiedToken.Claims(&claims)
|
||||||
|
return
|
||||||
})
|
})
|
||||||
|
|
||||||
api.Get("/authenticate", writeToken)
|
api.Get("/authenticate", writeToken)
|
||||||
|
@ -50,11 +54,8 @@ func writeToken(ctx iris.Context) {
|
||||||
claims := userClaims{
|
claims := userClaims{
|
||||||
Username: "kataras",
|
Username: "kataras",
|
||||||
}
|
}
|
||||||
standardClaims := jwt.Claims{
|
|
||||||
Issuer: "myapp",
|
|
||||||
}
|
|
||||||
|
|
||||||
token, err := signer.Sign(claims, standardClaims)
|
token, err := jwt.Sign(jwt.HS256, secret, claims, jwt.MaxAge(1*time.Minute))
|
||||||
if err != nil {
|
if err != nil {
|
||||||
ctx.StopWithError(iris.StatusInternalServerError, err)
|
ctx.StopWithError(iris.StatusInternalServerError, err)
|
||||||
return
|
return
|
||||||
|
@ -63,7 +64,7 @@ func writeToken(ctx iris.Context) {
|
||||||
ctx.Write(token)
|
ctx.Write(token)
|
||||||
}
|
}
|
||||||
|
|
||||||
func restrictedPage(claims *userClaims) string {
|
func restrictedPage(claims userClaims) string {
|
||||||
// userClaims.Username: kataras
|
// userClaims.Username: kataras
|
||||||
return "userClaims.Username: " + claims.Username
|
return "userClaims.Username: " + claims.Username
|
||||||
}
|
}
|
||||||
|
|
|
@ -119,7 +119,7 @@ var (
|
||||||
|
|
||||||
// Shortcuts for Signing and Verifying.
|
// Shortcuts for Signing and Verifying.
|
||||||
var (
|
var (
|
||||||
VerifyToken = jwt.Verify
|
Verify = jwt.Verify
|
||||||
VerifyEncryptedToken = jwt.VerifyEncrypted
|
VerifyEncryptedToken = jwt.VerifyEncrypted
|
||||||
Sign = jwt.Sign
|
Sign = jwt.Sign
|
||||||
SignEncrypted = jwt.SignEncrypted
|
SignEncrypted = jwt.SignEncrypted
|
Loading…
Reference in New Issue
Block a user