跳转至

JWT

启动 JWT 中间件。

安装#

go get github.com/rookie-ninja/rk-boot/v2
go get github.com/rookie-ninja/rk-zero

选项#

名字 描述 类型 默认值
zero.middleware.jwt.enabled 启动 JWT 中间件 boolean false
zero.middleware.jwt.ignore 局部选项,忽略 API 路径 []string []
zero.middleware.jwt.skipVerify 忽略 JWT 验证 boolean false
zero.middleware.jwt.signerEntry SignerEntry 名称 string ""
zero.middleware.jwt.symmetric.algorithm 对称加密算法, 选项:HS256, HS384, HS512 string ""
zero.middleware.jwt.symmetric.token 对称加密密钥 string ""
zero.middleware.jwt.symmetric.tokenPath 对称加密密钥本地路径 string ""
zero.middleware.jwt.asymmetric.algorithm 非对称加密算法, 选项:RS256, RS384, RS512, ES256, ES384, ES512 string ""
zero.middleware.jwt.tokenLookup 寻找 JWT Token 的格式,参考下面的例子 string "header:Authorization"
zero.middleware.jwt.authScheme 提供 Auth Scheme string Bearer

tokenLookup 格式

// Optional. Default value "header:Authorization".
// Possible values:
// - "header:<name>"
// - "query:<name>"
// Multiply sources example:
// - "header: Authorization,cookie: myowncookie"

快速开始#

1.创建 boot.yaml#

---
zero:
  - name: greeter
    port: 8080
    enabled: true
    middleware:
      jwt:
        enabled: true
        symmetric:
          algorithm: HS256
          token: "my-secret"
#          tokenPath: ""
#        signerEntry: ""
#        ignore: [ "" ]
#        skipVerify: false
#        asymmetric:
#          algorithm: ""
#          privateKey: ""
#          privateKeyPath: ""
#          publicKey: ""
#          publicKeyPath: ""
#        tokenLookup: "header:<name>"
#        authScheme: "Bearer"

2.创建 main.go#

package main

import (
  "context"
  "encoding/json"
  "fmt"
  "github.com/rookie-ninja/rk-boot/v2"
  "github.com/rookie-ninja/rk-zero/boot"
  "github.com/zeromicro/go-zero/rest"
  "net/http"
)

// @title Swagger Example API
// @version 1.0
// @description This is a sample rk-demo server.
// @termsOfService http://swagger.io/terms/

// @securityDefinitions.basic BasicAuth

// @contact.name API Support
// @contact.url http://www.swagger.io/support
// @contact.email support@swagger.io

// @license.name Apache 2.0
// @license.url http://www.apache.org/licenses/LICENSE-2.0.html

func main() {
  // Create a new boot instance.
  boot := rkboot.NewBoot()

  // Register handler
  zeroEntry := rkzero.GetZeroEntry("greeter")
  zeroEntry.Server.AddRoute(rest.Route{
    Method:  http.MethodGet,
    Path:    "/v1/greeter",
    Handler: Greeter,
  })

  // Bootstrap
  boot.Bootstrap(context.TODO())

  boot.WaitForShutdownSig(context.TODO())
}

// Greeter handler
// @Summary Greeter
// @Id 1
// @Tags Hello
// @version 1.0
// @Param name query string true "name"
// @produce application/json
// @Success 200 {object} GreeterResponse
// @Router /v1/greeter [get]
func Greeter(writer http.ResponseWriter, request *http.Request) {
  writer.WriteHeader(http.StatusOK)
  resp := &GreeterResponse{
    Message: fmt.Sprintf("Hello %s!", request.URL.Query().Get("name")),
  }
  bytes, _ := json.Marshal(resp)
  writer.Write(bytes)
}

type GreeterResponse struct {
  Message string
}

3.验证#

  • 正确的 JWT Token
$ curl "localhost:8080/v1/greeter?name=rk-dev" -H "Authorization: Bearer eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiaWF0IjoxNTE2MjM5MDIyfQ.EpM5XBzTJZ4J8AfoJEcJrjth8pfH28LWdjLo90sYb9g"
{"Message":"Hello rk-dev!"}
  • 非法 JWT Token
    $ curl localhost:8080/rk/v1/healthy -H "Authorization: Bearer invalid-jwt-token"
    {
        "error":{
            "code":401,
            "status":"Unauthorized",
            "message":"Invalid or expired jwt",
            "details":[]
        }
    }
    

Cheers#