Documentation
¶
Index ¶
Constants ¶
This section is empty.
Variables ¶
This section is empty.
Functions ¶
This section is empty.
Types ¶
type Employee ¶
type Employee struct { ID primitive.ObjectID `bson:"_id"` Email string `bson:"email,omitempty"` Password string `bson:"password,omitempty" json:"-"` Name string `bson:"name,omitempty"` Phone string `bson:"phone,omitempty"` CreatedAt *time.Time `bson:"created_at,omitempty"` UpdatedAt *time.Time `bson:"updated_at,omitempty"` Roles []Role `bson:"roles,omitempty"` }
Employee entity definition.
type Event ¶
type Event struct { EventID string `bson:"event_id"` Channel string Type EventType AggregateID string AggregateType string Data interface{} Originator EventOriginator CreatedAt time.Time }
Event entity definition.
type EventOriginator ¶
type TokenClaimer ¶
type TokenClaimer interface { GetID() primitive.ObjectID GetEntity() string GetLogin() string GetRoles() []Role }
TokenClaimer represents interface of entity that is able to provide auth claims parameters and login into system.
type TokenClaims ¶
type TokenClaims struct { Entity string `json:"entity"` EntityID primitive.ObjectID `json:"entity_id"` Login string `json:"login"` Roles []string `json:"roles"` jwt.StandardClaims `bson:"-"` }
TokenClaims repesents JWT authentication claims.
func NewTokenClaims ¶
func NewTokenClaims(expiration time.Duration, entity TokenClaimer) *TokenClaims
NewTokenClaims returns JWT claims for specified entity.
func (*TokenClaims) HasRole ¶
func (claims *TokenClaims) HasRole(authorizedRoles []string) bool
HasRole verifies that claims has at least one of given roles.
Click to show internal directories.
Click to hide internal directories.