mirror of https://github.com/grpc/grpc-go.git
examples: add an example to illustrate authorization (authz) support (#5920)
This commit is contained in:
parent
8c374f7607
commit
20141c2596
|
@ -52,6 +52,7 @@ EXAMPLES=(
|
||||||
"helloworld"
|
"helloworld"
|
||||||
"route_guide"
|
"route_guide"
|
||||||
"features/authentication"
|
"features/authentication"
|
||||||
|
"features/authz"
|
||||||
"features/cancellation"
|
"features/cancellation"
|
||||||
"features/compression"
|
"features/compression"
|
||||||
"features/deadline"
|
"features/deadline"
|
||||||
|
@ -101,6 +102,7 @@ declare -A EXPECTED_SERVER_OUTPUT=(
|
||||||
["helloworld"]="Received: world"
|
["helloworld"]="Received: world"
|
||||||
["route_guide"]=""
|
["route_guide"]=""
|
||||||
["features/authentication"]="server starting on port 50051..."
|
["features/authentication"]="server starting on port 50051..."
|
||||||
|
["features/authz"]="unary echoing message \"hello world\""
|
||||||
["features/cancellation"]="server: error receiving from stream: rpc error: code = Canceled desc = context canceled"
|
["features/cancellation"]="server: error receiving from stream: rpc error: code = Canceled desc = context canceled"
|
||||||
["features/compression"]="UnaryEcho called with message \"compress\""
|
["features/compression"]="UnaryEcho called with message \"compress\""
|
||||||
["features/deadline"]=""
|
["features/deadline"]=""
|
||||||
|
@ -120,6 +122,7 @@ declare -A EXPECTED_CLIENT_OUTPUT=(
|
||||||
["helloworld"]="Greeting: Hello world"
|
["helloworld"]="Greeting: Hello world"
|
||||||
["route_guide"]="Feature: name: \"\", point:(416851321, -742674555)"
|
["route_guide"]="Feature: name: \"\", point:(416851321, -742674555)"
|
||||||
["features/authentication"]="UnaryEcho: hello world"
|
["features/authentication"]="UnaryEcho: hello world"
|
||||||
|
["features/authz"]="UnaryEcho: hello world"
|
||||||
["features/cancellation"]="cancelling context"
|
["features/cancellation"]="cancelling context"
|
||||||
["features/compression"]="UnaryEcho call returned \"compress\", <nil>"
|
["features/compression"]="UnaryEcho call returned \"compress\", <nil>"
|
||||||
["features/deadline"]="wanted = DeadlineExceeded, got = DeadlineExceeded"
|
["features/deadline"]="wanted = DeadlineExceeded, got = DeadlineExceeded"
|
||||||
|
|
|
@ -0,0 +1,40 @@
|
||||||
|
# RBAC authorization
|
||||||
|
|
||||||
|
This example uses the `StaticInterceptor` from the `google.golang.org/grpc/authz`
|
||||||
|
package. It uses a header based RBAC policy to match each gRPC method to a
|
||||||
|
required role. For simplicity, the context is injected with mock metadata which
|
||||||
|
includes the required roles, but this should be fetched from an appropriate
|
||||||
|
service based on the authenticated context.
|
||||||
|
|
||||||
|
## Try it
|
||||||
|
|
||||||
|
Server requires the following roles on an authenticated user to authorize usage
|
||||||
|
of these methods:
|
||||||
|
|
||||||
|
- `UnaryEcho` requires the role `UNARY_ECHO:W`
|
||||||
|
- `BidirectionalStreamingEcho` requires the role `STREAM_ECHO:RW`
|
||||||
|
|
||||||
|
Upon receiving a request, the server first checks that a token was supplied,
|
||||||
|
decodes it and checks that a secret is correctly set (hardcoded to `super-secret`
|
||||||
|
for simplicity, this should use a proper ID provider in production).
|
||||||
|
|
||||||
|
If the above is successful, it uses the username in the token to set appropriate
|
||||||
|
roles (hardcoded to the 2 required roles above if the username matches `super-user`
|
||||||
|
for simplicity, these roles should be supplied externally as well).
|
||||||
|
|
||||||
|
Start the server with:
|
||||||
|
|
||||||
|
```
|
||||||
|
go run server/main.go
|
||||||
|
```
|
||||||
|
|
||||||
|
The client implementation shows how using a valid token (setting username and
|
||||||
|
secret) with each of the endpoints will return successfully. It also exemplifies
|
||||||
|
how using a bad token will result in `codes.PermissionDenied` being returned
|
||||||
|
from the service.
|
||||||
|
|
||||||
|
Start the client with:
|
||||||
|
|
||||||
|
```
|
||||||
|
go run client/main.go
|
||||||
|
```
|
|
@ -0,0 +1,132 @@
|
||||||
|
/*
|
||||||
|
*
|
||||||
|
* Copyright 2023 gRPC authors.
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*
|
||||||
|
*/
|
||||||
|
|
||||||
|
// Binary client is an example client.
|
||||||
|
package main
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"flag"
|
||||||
|
"fmt"
|
||||||
|
"io"
|
||||||
|
"log"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"golang.org/x/oauth2"
|
||||||
|
"google.golang.org/grpc"
|
||||||
|
"google.golang.org/grpc/codes"
|
||||||
|
"google.golang.org/grpc/credentials"
|
||||||
|
"google.golang.org/grpc/credentials/oauth"
|
||||||
|
"google.golang.org/grpc/examples/data"
|
||||||
|
"google.golang.org/grpc/examples/features/authz/token"
|
||||||
|
ecpb "google.golang.org/grpc/examples/features/proto/echo"
|
||||||
|
"google.golang.org/grpc/status"
|
||||||
|
)
|
||||||
|
|
||||||
|
var addr = flag.String("addr", "localhost:50051", "the address to connect to")
|
||||||
|
|
||||||
|
func callUnaryEcho(ctx context.Context, client ecpb.EchoClient, message string, opts ...grpc.CallOption) error {
|
||||||
|
resp, err := client.UnaryEcho(ctx, &ecpb.EchoRequest{Message: message}, opts...)
|
||||||
|
if err != nil {
|
||||||
|
return status.Errorf(status.Code(err), "UnaryEcho RPC failed: %v", err)
|
||||||
|
}
|
||||||
|
fmt.Println("UnaryEcho: ", resp.Message)
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func callBidiStreamingEcho(ctx context.Context, client ecpb.EchoClient, opts ...grpc.CallOption) error {
|
||||||
|
c, err := client.BidirectionalStreamingEcho(ctx, opts...)
|
||||||
|
if err != nil {
|
||||||
|
return status.Errorf(status.Code(err), "BidirectionalStreamingEcho RPC failed: %v", err)
|
||||||
|
}
|
||||||
|
for i := 0; i < 5; i++ {
|
||||||
|
if err := c.Send(&ecpb.EchoRequest{Message: fmt.Sprintf("Request %d", i+1)}); err != nil {
|
||||||
|
return status.Errorf(status.Code(err), "sending StreamingEcho message: %v", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
c.CloseSend()
|
||||||
|
for {
|
||||||
|
resp, err := c.Recv()
|
||||||
|
if err == io.EOF {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
if err != nil {
|
||||||
|
return status.Errorf(status.Code(err), "receiving StreamingEcho message: %v", err)
|
||||||
|
}
|
||||||
|
fmt.Println("BidiStreaming Echo: ", resp.Message)
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func newCredentialsCallOption(t token.Token) grpc.CallOption {
|
||||||
|
tokenBase64, err := t.Encode()
|
||||||
|
if err != nil {
|
||||||
|
log.Fatalf("encoding token: %v", err)
|
||||||
|
}
|
||||||
|
oath2Token := oauth2.Token{AccessToken: tokenBase64}
|
||||||
|
return grpc.PerRPCCredentials(oauth.TokenSource{TokenSource: oauth2.StaticTokenSource(&oath2Token)})
|
||||||
|
}
|
||||||
|
|
||||||
|
func main() {
|
||||||
|
flag.Parse()
|
||||||
|
|
||||||
|
// Create tls based credential.
|
||||||
|
creds, err := credentials.NewClientTLSFromFile(data.Path("x509/ca_cert.pem"), "x.test.example.com")
|
||||||
|
if err != nil {
|
||||||
|
log.Fatalf("failed to load credentials: %v", err)
|
||||||
|
}
|
||||||
|
// Set up a connection to the server.
|
||||||
|
conn, err := grpc.Dial(*addr, grpc.WithTransportCredentials(creds))
|
||||||
|
if err != nil {
|
||||||
|
log.Fatalf("grpc.Dial(%q): %v", *addr, err)
|
||||||
|
}
|
||||||
|
defer conn.Close()
|
||||||
|
|
||||||
|
// Make an echo client and send RPCs.
|
||||||
|
ctx, cancel := context.WithTimeout(context.Background(), 10*time.Second)
|
||||||
|
defer cancel()
|
||||||
|
client := ecpb.NewEchoClient(conn)
|
||||||
|
|
||||||
|
// Make RPCs as an authorized user and expect them to succeed.
|
||||||
|
authorisedUserTokenCallOption := newCredentialsCallOption(token.Token{Username: "super-user", Secret: "super-secret"})
|
||||||
|
if err := callUnaryEcho(ctx, client, "hello world", authorisedUserTokenCallOption); err != nil {
|
||||||
|
log.Fatalf("Unary RPC by authorized user failed: %v", err)
|
||||||
|
}
|
||||||
|
if err := callBidiStreamingEcho(ctx, client, authorisedUserTokenCallOption); err != nil {
|
||||||
|
log.Fatalf("Bidirectional RPC by authorized user failed: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Make RPCs as an unauthorized user and expect them to fail with status code PermissionDenied.
|
||||||
|
unauthorisedUserTokenCallOption := newCredentialsCallOption(token.Token{Username: "bad-actor", Secret: "super-secret"})
|
||||||
|
if err := callUnaryEcho(ctx, client, "hello world", unauthorisedUserTokenCallOption); err != nil {
|
||||||
|
switch c := status.Code(err); c {
|
||||||
|
case codes.PermissionDenied:
|
||||||
|
log.Printf("Unary RPC by unauthorized user failed as expected: %v", err)
|
||||||
|
default:
|
||||||
|
log.Fatalf("Unary RPC by unauthorized user failed unexpectedly: %v, %v", c, err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if err := callBidiStreamingEcho(ctx, client, unauthorisedUserTokenCallOption); err != nil {
|
||||||
|
switch c := status.Code(err); c {
|
||||||
|
case codes.PermissionDenied:
|
||||||
|
log.Printf("Bidirectional RPC by unauthorized user failed as expected: %v", err)
|
||||||
|
default:
|
||||||
|
log.Fatalf("Bidirectional RPC by unauthorized user failed unexpectedly: %v", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,215 @@
|
||||||
|
/*
|
||||||
|
*
|
||||||
|
* Copyright 2023 gRPC authors.
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*
|
||||||
|
*/
|
||||||
|
|
||||||
|
// Binary server is an example server.
|
||||||
|
package main
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"errors"
|
||||||
|
"flag"
|
||||||
|
"fmt"
|
||||||
|
"io"
|
||||||
|
"log"
|
||||||
|
"net"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"google.golang.org/grpc"
|
||||||
|
"google.golang.org/grpc/authz"
|
||||||
|
"google.golang.org/grpc/codes"
|
||||||
|
"google.golang.org/grpc/credentials"
|
||||||
|
"google.golang.org/grpc/examples/data"
|
||||||
|
"google.golang.org/grpc/metadata"
|
||||||
|
"google.golang.org/grpc/status"
|
||||||
|
|
||||||
|
"google.golang.org/grpc/examples/features/authz/token"
|
||||||
|
pb "google.golang.org/grpc/examples/features/proto/echo"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
unaryEchoWriterRole = "UNARY_ECHO:W"
|
||||||
|
streamEchoReadWriterRole = "STREAM_ECHO:RW"
|
||||||
|
authzPolicy = `
|
||||||
|
{
|
||||||
|
"name": "authz",
|
||||||
|
"allow_rules": [
|
||||||
|
{
|
||||||
|
"name": "allow_UnaryEcho",
|
||||||
|
"request": {
|
||||||
|
"paths": ["/grpc.examples.echo.Echo/UnaryEcho"],
|
||||||
|
"headers": [
|
||||||
|
{
|
||||||
|
"key": "UNARY_ECHO:W",
|
||||||
|
"values": ["true"]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "allow_BidirectionalStreamingEcho",
|
||||||
|
"request": {
|
||||||
|
"paths": ["/grpc.examples.echo.Echo/BidirectionalStreamingEcho"],
|
||||||
|
"headers": [
|
||||||
|
{
|
||||||
|
"key": "STREAM_ECHO:RW",
|
||||||
|
"values": ["true"]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"deny_rules": []
|
||||||
|
}
|
||||||
|
`
|
||||||
|
)
|
||||||
|
|
||||||
|
var (
|
||||||
|
port = flag.Int("port", 50051, "the port to serve on")
|
||||||
|
|
||||||
|
errMissingMetadata = status.Errorf(codes.InvalidArgument, "missing metadata")
|
||||||
|
)
|
||||||
|
|
||||||
|
func newContextWithRoles(ctx context.Context, username string) context.Context {
|
||||||
|
md := metadata.MD{}
|
||||||
|
if username == "super-user" {
|
||||||
|
md.Set(unaryEchoWriterRole, "true")
|
||||||
|
md.Set(streamEchoReadWriterRole, "true")
|
||||||
|
}
|
||||||
|
return metadata.NewIncomingContext(ctx, md)
|
||||||
|
}
|
||||||
|
|
||||||
|
type server struct {
|
||||||
|
pb.UnimplementedEchoServer
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *server) UnaryEcho(ctx context.Context, in *pb.EchoRequest) (*pb.EchoResponse, error) {
|
||||||
|
fmt.Printf("unary echoing message %q\n", in.Message)
|
||||||
|
return &pb.EchoResponse{Message: in.Message}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *server) BidirectionalStreamingEcho(stream pb.Echo_BidirectionalStreamingEchoServer) error {
|
||||||
|
for {
|
||||||
|
in, err := stream.Recv()
|
||||||
|
if err != nil {
|
||||||
|
if err == io.EOF {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
fmt.Printf("Receiving message from stream: %v\n", err)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
fmt.Printf("bidi echoing message %q\n", in.Message)
|
||||||
|
stream.Send(&pb.EchoResponse{Message: in.Message})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// isAuthenticated validates the authorization.
|
||||||
|
func isAuthenticated(authorization []string) (username string, err error) {
|
||||||
|
if len(authorization) < 1 {
|
||||||
|
return "", errors.New("received empty authorization token from client")
|
||||||
|
}
|
||||||
|
tokenBase64 := strings.TrimPrefix(authorization[0], "Bearer ")
|
||||||
|
// Perform the token validation here. For the sake of this example, the code
|
||||||
|
// here forgoes any of the usual OAuth2 token validation and instead checks
|
||||||
|
// for a token matching an arbitrary string.
|
||||||
|
var token token.Token
|
||||||
|
err = token.Decode(tokenBase64)
|
||||||
|
if err != nil {
|
||||||
|
return "", fmt.Errorf("base64 decoding of received token %q: %v", tokenBase64, err)
|
||||||
|
}
|
||||||
|
if token.Secret != "super-secret" {
|
||||||
|
return "", fmt.Errorf("received token %q does not match expected %q", token.Secret, "super-secret")
|
||||||
|
}
|
||||||
|
return token.Username, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// authUnaryInterceptor looks up the authorization header from the incoming RPC context,
|
||||||
|
// retrieves the username from it and creates a new context with the username before invoking
|
||||||
|
// the provided handler.
|
||||||
|
func authUnaryInterceptor(ctx context.Context, req interface{}, info *grpc.UnaryServerInfo, handler grpc.UnaryHandler) (interface{}, error) {
|
||||||
|
md, ok := metadata.FromIncomingContext(ctx)
|
||||||
|
if !ok {
|
||||||
|
return nil, errMissingMetadata
|
||||||
|
}
|
||||||
|
username, err := isAuthenticated(md["authorization"])
|
||||||
|
if err != nil {
|
||||||
|
return nil, status.Error(codes.Unauthenticated, err.Error())
|
||||||
|
}
|
||||||
|
return handler(newContextWithRoles(ctx, username), req)
|
||||||
|
}
|
||||||
|
|
||||||
|
// wrappedStream wraps a grpc.ServerStream associated with an incoming RPC, and
|
||||||
|
// a custom context containing the username derived from the authorization header
|
||||||
|
// specified in the incoming RPC metadata
|
||||||
|
type wrappedStream struct {
|
||||||
|
grpc.ServerStream
|
||||||
|
ctx context.Context
|
||||||
|
}
|
||||||
|
|
||||||
|
func (w *wrappedStream) Context() context.Context {
|
||||||
|
return w.ctx
|
||||||
|
}
|
||||||
|
|
||||||
|
func newWrappedStream(ctx context.Context, s grpc.ServerStream) grpc.ServerStream {
|
||||||
|
return &wrappedStream{s, ctx}
|
||||||
|
}
|
||||||
|
|
||||||
|
// authStreamInterceptor looks up the authorization header from the incoming RPC context,
|
||||||
|
// retrieves the username from it and creates a new context with the username before invoking
|
||||||
|
// the provided handler.
|
||||||
|
func authStreamInterceptor(srv interface{}, ss grpc.ServerStream, info *grpc.StreamServerInfo, handler grpc.StreamHandler) error {
|
||||||
|
md, ok := metadata.FromIncomingContext(ss.Context())
|
||||||
|
if !ok {
|
||||||
|
return errMissingMetadata
|
||||||
|
}
|
||||||
|
username, err := isAuthenticated(md["authorization"])
|
||||||
|
if err != nil {
|
||||||
|
return status.Error(codes.Unauthenticated, err.Error())
|
||||||
|
}
|
||||||
|
return handler(srv, newWrappedStream(newContextWithRoles(ss.Context(), username), ss))
|
||||||
|
}
|
||||||
|
|
||||||
|
func main() {
|
||||||
|
flag.Parse()
|
||||||
|
|
||||||
|
lis, err := net.Listen("tcp", fmt.Sprintf(":%d", *port))
|
||||||
|
if err != nil {
|
||||||
|
log.Fatalf("Listening on local port %q: %v", *port, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Create tls based credential.
|
||||||
|
creds, err := credentials.NewServerTLSFromFile(data.Path("x509/server_cert.pem"), data.Path("x509/server_key.pem"))
|
||||||
|
if err != nil {
|
||||||
|
log.Fatalf("Loading credentials: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Create an authorization interceptor using a static policy.
|
||||||
|
staticInteceptor, err := authz.NewStatic(authzPolicy)
|
||||||
|
if err != nil {
|
||||||
|
log.Fatalf("Creating a static authz interceptor: %v", err)
|
||||||
|
}
|
||||||
|
unaryInts := grpc.ChainUnaryInterceptor(authUnaryInterceptor, staticInteceptor.UnaryInterceptor)
|
||||||
|
streamInts := grpc.ChainStreamInterceptor(authStreamInterceptor, staticInteceptor.StreamInterceptor)
|
||||||
|
s := grpc.NewServer(grpc.Creds(creds), unaryInts, streamInts)
|
||||||
|
|
||||||
|
// Register EchoServer on the server.
|
||||||
|
pb.RegisterEchoServer(s, &server{})
|
||||||
|
|
||||||
|
if err := s.Serve(lis); err != nil {
|
||||||
|
log.Fatalf("Serving Echo service on local port: %v", err)
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,53 @@
|
||||||
|
/*
|
||||||
|
*
|
||||||
|
* Copyright 2023 gRPC authors.
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*
|
||||||
|
*/
|
||||||
|
|
||||||
|
package token
|
||||||
|
|
||||||
|
import (
|
||||||
|
"encoding/base64"
|
||||||
|
"encoding/json"
|
||||||
|
)
|
||||||
|
|
||||||
|
// Token is a mock authorization token sent by the client as part of the RPC headers,
|
||||||
|
// and used by the server for authorization against a predefined policy.
|
||||||
|
type Token struct {
|
||||||
|
// Secret is used by the server to authenticate the user
|
||||||
|
Secret string `json:"secret"`
|
||||||
|
// Username is used by the server to assign roles in the metadata for authorization
|
||||||
|
Username string `json:"username"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// Encode returns a base64 encoded version of the JSON representation of token.
|
||||||
|
func (t *Token) Encode() (string, error) {
|
||||||
|
barr, err := json.Marshal(t)
|
||||||
|
if err != nil {
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
s := base64.StdEncoding.EncodeToString(barr)
|
||||||
|
return s, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Decode updates the internals of Token using the passed in base64
|
||||||
|
// encoded version of the JSON representation of token.
|
||||||
|
func (t *Token) Decode(s string) error {
|
||||||
|
barr, err := base64.StdEncoding.DecodeString(s)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
return json.Unmarshal(barr, t)
|
||||||
|
}
|
Loading…
Reference in New Issue