-
-
Save mschoebel/9398202 to your computer and use it in GitHub Desktop.
package main | |
import ( | |
"fmt" | |
"github.com/gorilla/mux" | |
"github.com/gorilla/securecookie" | |
"net/http" | |
) | |
// cookie handling | |
var cookieHandler = securecookie.New( | |
securecookie.GenerateRandomKey(64), | |
securecookie.GenerateRandomKey(32)) | |
func getUserName(request *http.Request) (userName string) { | |
if cookie, err := request.Cookie("session"); err == nil { | |
cookieValue := make(map[string]string) | |
if err = cookieHandler.Decode("session", cookie.Value, &cookieValue); err == nil { | |
userName = cookieValue["name"] | |
} | |
} | |
return userName | |
} | |
func setSession(userName string, response http.ResponseWriter) { | |
value := map[string]string{ | |
"name": userName, | |
} | |
if encoded, err := cookieHandler.Encode("session", value); err == nil { | |
cookie := &http.Cookie{ | |
Name: "session", | |
Value: encoded, | |
Path: "/", | |
} | |
http.SetCookie(response, cookie) | |
} | |
} | |
func clearSession(response http.ResponseWriter) { | |
cookie := &http.Cookie{ | |
Name: "session", | |
Value: "", | |
Path: "/", | |
MaxAge: -1, | |
} | |
http.SetCookie(response, cookie) | |
} | |
// login handler | |
func loginHandler(response http.ResponseWriter, request *http.Request) { | |
name := request.FormValue("name") | |
pass := request.FormValue("password") | |
redirectTarget := "/" | |
if name != "" && pass != "" { | |
// .. check credentials .. | |
setSession(name, response) | |
redirectTarget = "/internal" | |
} | |
http.Redirect(response, request, redirectTarget, 302) | |
} | |
// logout handler | |
func logoutHandler(response http.ResponseWriter, request *http.Request) { | |
clearSession(response) | |
http.Redirect(response, request, "/", 302) | |
} | |
// index page | |
const indexPage = ` | |
<h1>Login</h1> | |
<form method="post" action="/login"> | |
<label for="name">User name</label> | |
<input type="text" id="name" name="name"> | |
<label for="password">Password</label> | |
<input type="password" id="password" name="password"> | |
<button type="submit">Login</button> | |
</form> | |
` | |
func indexPageHandler(response http.ResponseWriter, request *http.Request) { | |
fmt.Fprintf(response, indexPage) | |
} | |
// internal page | |
const internalPage = ` | |
<h1>Internal</h1> | |
<hr> | |
<small>User: %s</small> | |
<form method="post" action="/logout"> | |
<button type="submit">Logout</button> | |
</form> | |
` | |
func internalPageHandler(response http.ResponseWriter, request *http.Request) { | |
userName := getUserName(request) | |
if userName != "" { | |
fmt.Fprintf(response, internalPage, userName) | |
} else { | |
http.Redirect(response, request, "/", 302) | |
} | |
} | |
// server main method | |
var router = mux.NewRouter() | |
func main() { | |
router.HandleFunc("/", indexPageHandler) | |
router.HandleFunc("/internal", internalPageHandler) | |
router.HandleFunc("/login", loginHandler).Methods("POST") | |
router.HandleFunc("/logout", logoutHandler).Methods("POST") | |
http.Handle("/", router) | |
http.ListenAndServe(":8000", nil) | |
} |
What if add an callback to check each request that want to access the path /internal in the route ?
That's would save a lot of code to check in each processing function.
Awesome. Thanks.
Please make a similar jwt authentication tutorial if you can.
the cookie expires everytime I restart the golang instance. any way around this?
@therealssj The example generates a new secret key (lines 13 / 14) every time at startup - you have to save/read these keys from a file (for example).
Great! Awesome for there should be database integration, anyone can log with any pass!
Saves me time coding... I'll modify it according to my need. Thanks!
Thanks man.
Thanks for this
excellent !!!
Great, thank you a lot for this.
Great!
Thanks! :)
That's saves me time coding... I'll modify it according to my need. Thank you very much!
Beautiful. Thanks!
Saved a lot of time, thanx!
so when i create a random cookie with the browser dev tools ... i am in. nice.
@TorbenMartin ... if your random cookie can be successfully decoded (line 19).
Very useful. thx