Documentation ¶
Index ¶
- Constants
- func InitJWT()
- type Claims
- type Config
- type IJwt
- type JWT
- func (j *JWT) GenerateToken(user *user.UserDto) (string, error)
- func (j *JWT) ServeHTTP(ctx *context.Context) (err error)
- func (j *JWT) ServeWebsocket(ctx context.Context)
- func (j *JWT) Token2Model(token *jwt.Token) (*user.UserDto, error)
- func (j *JWT) TokenString2Model(tokenString string) (user *user.UserDto, err error)
- type TokenExtractor
Constants ¶
View Source
const (
DEFAULT_TOKEN string = "zihaotoken"
)
View Source
const (
//DefaultContextKey jwt
DefaultContextKey = "iris-jwt"
)
Variables ¶
This section is empty.
Functions ¶
Types ¶
type Config ¶
type Config struct { // The function that will return the Key to validate the JWT. // It can be either a shared secret or a public key. // Default value: nil ValidationKeyGetter jwt.Keyfunc // The name of the property in the request where the user (&token) information // from the JWT will be stored. // Default value: "jwt" ContextKey string // The function that will be called when there's an error validating the token // Default value: ErrorHandler func(context.Context, constants.Code) // A boolean indicating if the credentials are required or not // Default value: false CredentialsOptional bool // A function that extracts the token from the request // Default: FromAuthHeader (i.e., from Authorization header as bearer token) Extractor TokenExtractor // Debug flag turns on debugging output // Default: false Debug bool // When set, all requests with the OPTIONS method will use authentication // if you enable this option you should register your route with iris.Options(...) also // Default: false EnableAuthOnOptions bool // When set, the middelware verifies that tokens are signed with the specific signing algorithm // If the signing method is not constant the ValidationKeyGetter callback can be used to implement additional checks // Important to avoid security issues described here: https://auth0.com/blog/2015/03/31/critical-vulnerabilities-in-json-web-token-libraries/ // Default: nil SigningMethod jwt.SigningMethod // When set, the expiration time of token will be check every time // if the token was expired, expiration error will be returned // Default: false Expiration bool }
Config is a struct for specifying configuration options for the jwt middleware.
type IJwt ¶
type IJwt struct {
Config Config
}
Middleware the middleware for JSON Web tokens authentication method
func (*IJwt) CheckTokenString ¶
func (*IJwt) InitIJwtConfig ¶
---------------------------------------------------------
type JWT ¶
type JWT struct {
*IJwt
}
var G_JWT *JWT
func (*JWT) GenerateToken ¶
在登录成功的时候生成token
func (*JWT) ServeWebsocket ¶
Serve the middleware's action
func (*JWT) Token2Model ¶
解析token的信息为用户
type TokenExtractor ¶
TokenExtractor is a function that takes a context as input and returns either a token or an error. An error should only be returned if an attempt to specify a token was found, but the information was somehow incorrectly formed. In the case where a token is simply not present, this should not be treated as an error. An empty string should be returned in that case.
Click to show internal directories.
Click to hide internal directories.