JWT
启动 JWT 中间件。
安装#
go get github.com/rookie-ninja/rk-boot/v2
go get github.com/rookie-ninja/rk-zero
选项#
名字 | 描述 | 类型 | 默认值 |
---|---|---|---|
zero.middleware.jwt.enabled | 启动 JWT 中间件 | boolean | false |
zero.middleware.jwt.ignore | 局部选项,忽略 API 路径 | []string | [] |
zero.middleware.jwt.skipVerify | 忽略 JWT 验证 | boolean | false |
zero.middleware.jwt.signerEntry | SignerEntry 名称 | string | "" |
zero.middleware.jwt.symmetric.algorithm | 对称加密算法, 选项:HS256, HS384, HS512 | string | "" |
zero.middleware.jwt.symmetric.token | 对称加密密钥 | string | "" |
zero.middleware.jwt.symmetric.tokenPath | 对称加密密钥本地路径 | string | "" |
zero.middleware.jwt.asymmetric.algorithm | 非对称加密算法, 选项:RS256, RS384, RS512, ES256, ES384, ES512 | string | "" |
zero.middleware.jwt.tokenLookup | 寻找 JWT Token 的格式,参考下面的例子 | string | "header:Authorization" |
zero.middleware.jwt.authScheme | 提供 Auth Scheme | string | Bearer |
tokenLookup 格式
// Optional. Default value "header:Authorization".
// Possible values:
// - "header:<name>"
// - "query:<name>"
// Multiply sources example:
// - "header: Authorization,cookie: myowncookie"
快速开始#
1.创建 boot.yaml#
---
zero:
- name: greeter
port: 8080
enabled: true
middleware:
jwt:
enabled: true
symmetric:
algorithm: HS256
token: "my-secret"
# tokenPath: ""
# signerEntry: ""
# ignore: [ "" ]
# skipVerify: false
# asymmetric:
# algorithm: ""
# privateKey: ""
# privateKeyPath: ""
# publicKey: ""
# publicKeyPath: ""
# tokenLookup: "header:<name>"
# authScheme: "Bearer"
2.创建 main.go#
package main
import (
"context"
"encoding/json"
"fmt"
"github.com/rookie-ninja/rk-boot/v2"
"github.com/rookie-ninja/rk-zero/boot"
"github.com/zeromicro/go-zero/rest"
"net/http"
)
// @title Swagger Example API
// @version 1.0
// @description This is a sample rk-demo server.
// @termsOfService http://swagger.io/terms/
// @securityDefinitions.basic BasicAuth
// @contact.name API Support
// @contact.url http://www.swagger.io/support
// @contact.email support@swagger.io
// @license.name Apache 2.0
// @license.url http://www.apache.org/licenses/LICENSE-2.0.html
func main() {
// Create a new boot instance.
boot := rkboot.NewBoot()
// Register handler
zeroEntry := rkzero.GetZeroEntry("greeter")
zeroEntry.Server.AddRoute(rest.Route{
Method: http.MethodGet,
Path: "/v1/greeter",
Handler: Greeter,
})
// Bootstrap
boot.Bootstrap(context.TODO())
boot.WaitForShutdownSig(context.TODO())
}
// Greeter handler
// @Summary Greeter
// @Id 1
// @Tags Hello
// @version 1.0
// @Param name query string true "name"
// @produce application/json
// @Success 200 {object} GreeterResponse
// @Router /v1/greeter [get]
func Greeter(writer http.ResponseWriter, request *http.Request) {
writer.WriteHeader(http.StatusOK)
resp := &GreeterResponse{
Message: fmt.Sprintf("Hello %s!", request.URL.Query().Get("name")),
}
bytes, _ := json.Marshal(resp)
writer.Write(bytes)
}
type GreeterResponse struct {
Message string
}
3.验证#
- 正确的 JWT Token
$ curl "localhost:8080/v1/greeter?name=rk-dev" -H "Authorization: Bearer eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiaWF0IjoxNTE2MjM5MDIyfQ.EpM5XBzTJZ4J8AfoJEcJrjth8pfH28LWdjLo90sYb9g"
{"Message":"Hello rk-dev!"}
- 非法 JWT Token
$ curl localhost:8080/rk/v1/healthy -H "Authorization: Bearer invalid-jwt-token" { "error":{ "code":401, "status":"Unauthorized", "message":"Invalid or expired jwt", "details":[] } }