mirror of
https://github.com/kataras/iris.git
synced 2025-01-23 18:51:03 +01:00
85666da682
as requested a long time ago at: https://github.com/kataras/iris/issues/1229#issuecomment-484791181 Former-commit-id: 17259069bc5decc022bf3b706b0654c8f473d3c8
105 lines
3.3 KiB
Go
105 lines
3.3 KiB
Go
package main
|
|
|
|
import (
|
|
"log"
|
|
|
|
"github.com/kataras/iris"
|
|
"github.com/kataras/iris/websocket"
|
|
|
|
"github.com/kataras/neffos"
|
|
|
|
// Used when "enableJWT" constant is true:
|
|
"github.com/dgrijalva/jwt-go"
|
|
jwtmiddleware "github.com/iris-contrib/middleware/jwt"
|
|
)
|
|
|
|
// values should match with the client sides as well.
|
|
const enableJWT = true
|
|
const namespace = "default"
|
|
|
|
// if namespace is empty then simply neffos.Events{...} can be used instead.
|
|
var serverEvents = neffos.Namespaces{
|
|
namespace: neffos.Events{
|
|
neffos.OnNamespaceConnected: func(nsConn *neffos.NSConn, msg neffos.Message) error {
|
|
// with `websocket.GetContext` you can retrieve the Iris' `Context`.
|
|
ctx := websocket.GetContext(nsConn.Conn)
|
|
|
|
log.Printf("[%s] connected to namespace [%s] with IP [%s]",
|
|
nsConn, msg.Namespace,
|
|
ctx.RemoteAddr())
|
|
return nil
|
|
},
|
|
neffos.OnNamespaceDisconnect: func(nsConn *neffos.NSConn, msg neffos.Message) error {
|
|
log.Printf("[%s] disconnected from namespace [%s]", nsConn, msg.Namespace)
|
|
return nil
|
|
},
|
|
"chat": func(nsConn *neffos.NSConn, msg neffos.Message) error {
|
|
// room.String() returns -> NSConn.String() returns -> Conn.String() returns -> Conn.ID()
|
|
log.Printf("[%s] sent: %s", nsConn, string(msg.Body))
|
|
|
|
// Write message back to the client message owner with:
|
|
// nsConn.Emit("chat", msg)
|
|
// Write message to all except this client with:
|
|
nsConn.Conn.Server().Broadcast(nsConn, msg)
|
|
return nil
|
|
},
|
|
},
|
|
}
|
|
|
|
func main() {
|
|
app := iris.New()
|
|
websocketServer := neffos.New(
|
|
websocket.DefaultGorillaUpgrader, /* DefaultGobwasUpgrader can be used too. */
|
|
serverEvents)
|
|
|
|
j := jwtmiddleware.New(jwtmiddleware.Config{
|
|
// Extract by the "token" url,
|
|
// so the client should dial with ws://localhost:8080/echo?token=$token
|
|
Extractor: jwtmiddleware.FromParameter("token"),
|
|
|
|
ValidationKeyGetter: func(token *jwt.Token) (interface{}, error) {
|
|
return []byte("My Secret"), nil
|
|
},
|
|
// When set, the middleware verifies that tokens are signed with the specific signing algorithm
|
|
// If the signing method is not constant the ValidationKeyGetter callback can be used to implement additional checks
|
|
// Important to avoid security issues described here: https://auth0.com/blog/2015/03/31/critical-vulnerabilities-in-json-web-token-libraries/
|
|
SigningMethod: jwt.SigningMethodHS256,
|
|
})
|
|
|
|
// serves the endpoint of ws://localhost:8080/echo
|
|
websocketRoute := app.Get("/echo", websocket.Handler(websocketServer))
|
|
|
|
if enableJWT {
|
|
// Register the jwt middleware (on handshake):
|
|
websocketRoute.Use(j.Serve)
|
|
// OR
|
|
//
|
|
// Check for token through the jwt middleware
|
|
// on websocket connection or on any event:
|
|
/*
|
|
websocketServer.OnConnect = func(c *neffos.Conn) error {
|
|
ctx := websocket.GetContext(c)
|
|
if err := j.CheckJWT(ctx); err != nil {
|
|
// will send the above error on the client
|
|
// and will not allow it to connect to the websocket server at all.
|
|
return err
|
|
}
|
|
|
|
log.Printf("[%s] connected to the server", c.ID())
|
|
|
|
return nil
|
|
}
|
|
*/
|
|
}
|
|
|
|
// serves the browser-based websocket client.
|
|
app.Get("/", func(ctx iris.Context) {
|
|
ctx.ServeFile("./browser/index.html", false)
|
|
})
|
|
|
|
// serves the npm browser websocket client usage example.
|
|
app.HandleDir("/browserify", "./browserify")
|
|
|
|
app.Run(iris.Addr(":8080"), iris.WithoutServerError(iris.ErrServerClosed))
|
|
}
|