Documentation
¶
Index ¶
Constants ¶
This section is empty.
Variables ¶
View Source
var JwtAuthentication = func(next http.Handler) http.Handler { return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { noAuth := []string{"/api/user/new", "/api/user/login"} requestPath := r.URL.Path for _, value := range noAuth { if value == requestPath { next.ServeHTTP(w, r) return } } response := make(map[string]interface{}) tokenHeader := r.Header.Get("Authorization") if tokenHeader == "" { response = u.Message(false, "missing auth token") w.WriteHeader(http.StatusUnauthorized) w.Header().Add("Content-Type", "application/json") w.Header().Add("WWW-Authenticate", "Newauth realm=\"apps\", type=1, title=\"Login to \"\"apps\"\", Basic realm=\"simple\"") u.Respond(w, response) return } tokenSplit := strings.Split(tokenHeader, " ") if len(tokenSplit) != 2 { response = u.Message(false, "Invalid/Malformed auth token") w.WriteHeader(http.StatusUnauthorized) w.Header().Add("Content-Type", "application/json") w.Header().Add("WWW-Authenticate", "Unrecognized token format") u.Respond(w, response) return } tokenValue := tokenSplit[1] tk := &models.Token{} token, err := jwt.ParseWithClaims(tokenValue, tk, func(token *jwt.Token) (interface{}, error) { return []byte(os.Getenv("token_password")), nil }) if err != nil { response = u.Message(false, "Invalid/Malformed auth token") w.WriteHeader(http.StatusUnauthorized) w.Header().Add("Content-Type", "application/json") w.Header().Add("WWW-Authenticate", "Unrecognized token format") u.Respond(w, response) return } if !token.Valid { response = u.Message(false, "Token is not valid") w.WriteHeader(http.StatusForbidden) w.Header().Add("Content-Type", "application/json") u.Respond(w, response) return } fmt.Sprintf("User %", tk.UserId) ctx := context.WithValue(r.Context(), "user", tk.UserId) r = r.WithContext(ctx) next.ServeHTTP(w, r) }) }
Functions ¶
This section is empty.
Types ¶
This section is empty.
Click to show internal directories.
Click to hide internal directories.