Created
March 6, 2014 20:02
-
-
Save mschoebel/9398202 to your computer and use it in GitHub Desktop.
Snippet: login/logout (Golang)
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
package main | |
import ( | |
"fmt" | |
"github.com/gorilla/mux" | |
"github.com/gorilla/securecookie" | |
"net/http" | |
) | |
// cookie handling | |
var cookieHandler = securecookie.New( | |
securecookie.GenerateRandomKey(64), | |
securecookie.GenerateRandomKey(32)) | |
func getUserName(request *http.Request) (userName string) { | |
if cookie, err := request.Cookie("session"); err == nil { | |
cookieValue := make(map[string]string) | |
if err = cookieHandler.Decode("session", cookie.Value, &cookieValue); err == nil { | |
userName = cookieValue["name"] | |
} | |
} | |
return userName | |
} | |
func setSession(userName string, response http.ResponseWriter) { | |
value := map[string]string{ | |
"name": userName, | |
} | |
if encoded, err := cookieHandler.Encode("session", value); err == nil { | |
cookie := &http.Cookie{ | |
Name: "session", | |
Value: encoded, | |
Path: "/", | |
} | |
http.SetCookie(response, cookie) | |
} | |
} | |
func clearSession(response http.ResponseWriter) { | |
cookie := &http.Cookie{ | |
Name: "session", | |
Value: "", | |
Path: "/", | |
MaxAge: -1, | |
} | |
http.SetCookie(response, cookie) | |
} | |
// login handler | |
func loginHandler(response http.ResponseWriter, request *http.Request) { | |
name := request.FormValue("name") | |
pass := request.FormValue("password") | |
redirectTarget := "/" | |
if name != "" && pass != "" { | |
// .. check credentials .. | |
setSession(name, response) | |
redirectTarget = "/internal" | |
} | |
http.Redirect(response, request, redirectTarget, 302) | |
} | |
// logout handler | |
func logoutHandler(response http.ResponseWriter, request *http.Request) { | |
clearSession(response) | |
http.Redirect(response, request, "/", 302) | |
} | |
// index page | |
const indexPage = ` | |
<h1>Login</h1> | |
<form method="post" action="/login"> | |
<label for="name">User name</label> | |
<input type="text" id="name" name="name"> | |
<label for="password">Password</label> | |
<input type="password" id="password" name="password"> | |
<button type="submit">Login</button> | |
</form> | |
` | |
func indexPageHandler(response http.ResponseWriter, request *http.Request) { | |
fmt.Fprintf(response, indexPage) | |
} | |
// internal page | |
const internalPage = ` | |
<h1>Internal</h1> | |
<hr> | |
<small>User: %s</small> | |
<form method="post" action="/logout"> | |
<button type="submit">Logout</button> | |
</form> | |
` | |
func internalPageHandler(response http.ResponseWriter, request *http.Request) { | |
userName := getUserName(request) | |
if userName != "" { | |
fmt.Fprintf(response, internalPage, userName) | |
} else { | |
http.Redirect(response, request, "/", 302) | |
} | |
} | |
// server main method | |
var router = mux.NewRouter() | |
func main() { | |
router.HandleFunc("/", indexPageHandler) | |
router.HandleFunc("/internal", internalPageHandler) | |
router.HandleFunc("/login", loginHandler).Methods("POST") | |
router.HandleFunc("/logout", logoutHandler).Methods("POST") | |
http.Handle("/", router) | |
http.ListenAndServe(":8000", nil) | |
} |
Great! Awesome for there should be database integration, anyone can log with any pass!
Saves me time coding... I'll modify it according to my need. Thanks!
Thanks man.
Thanks for this
excellent !!!
Great, thank you a lot for this.
Great!
Thanks! :)
That's saves me time coding... I'll modify it according to my need. Thank you very much!
Beautiful. Thanks!
Saved a lot of time, thanx!
so when i create a random cookie with the browser dev tools ... i am in. nice.
@TorbenMartin ... if your random cookie can be successfully decoded (line 19).
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
@therealssj The example generates a new secret key (lines 13 / 14) every time at startup - you have to save/read these keys from a file (for example).