Enable go module support for the project (#3)

* initial go module file

Signed-off-by: sadmansakib <ssadman8@gmail.com>

* fix linting issues

Signed-off-by: sadmansakib <ssadman8@gmail.com>

* rename module to golang-jwt/jwt

Signed-off-by: sadmansakib <ssadman8@gmail.com>

* Renamed imports to match with go module name.

Signed-off-by: sadmansakib <ssadman8@gmail.com>

* update travis for latest go versions

Signed-off-by: sadmansakib <ssadman8@gmail.com>

* Set go version to 1.14

lowered the go version to make it consistent with matrix build

* revert accidental changes while renaming

Signed-off-by: sadmansakib <ssadman8@gmail.com>

* remove travis CI

no longer needed since github actions workflow was created for the
project

Signed-off-by: sadmansakib <ssadman8@gmail.com>

* Revert "remove travis CI"

This reverts commit b3ae57f710.

* update travis for older go versions
This commit is contained in:
Sadman Sakib 2021-05-29 07:26:41 +06:00 committed by GitHub
parent fb1de35795
commit 6a07921e68
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
17 changed files with 40 additions and 31 deletions

View File

@ -9,4 +9,3 @@ go:
- 1.8 - 1.8
- 1.9 - 1.9
- 1.10 - 1.10
- tip

View File

@ -1,7 +1,7 @@
# jwt-go # jwt-go
[![Build Status](https://travis-ci.org/dgrijalva/jwt-go.svg?branch=master)](https://travis-ci.org/dgrijalva/jwt-go) [![Build Status](https://travis-ci.org/dgrijalva/jwt-go.svg?branch=master)](https://travis-ci.org/dgrijalva/jwt-go)
[![GoDoc](https://godoc.org/github.com/dgrijalva/jwt-go?status.svg)](https://godoc.org/github.com/dgrijalva/jwt-go) [![GoDoc](https://godoc.org/github.com/golang-jwt/jwt?status.svg)](https://godoc.org/github.com/golang-jwt/jwt)
A [go](http://www.golang.org) (or 'golang' for search engine friendliness) implementation of [JSON Web Tokens](http://self-issued.info/docs/draft-ietf-oauth-json-web-token.html) A [go](http://www.golang.org) (or 'golang' for search engine friendliness) implementation of [JSON Web Tokens](http://self-issued.info/docs/draft-ietf-oauth-json-web-token.html)
@ -27,11 +27,11 @@ This library supports the parsing and verification as well as the generation and
## Examples ## Examples
See [the project documentation](https://godoc.org/github.com/dgrijalva/jwt-go) for examples of usage: See [the project documentation](https://godoc.org/github.com/golang-jwt/jwt) for examples of usage:
* [Simple example of parsing and validating a token](https://godoc.org/github.com/dgrijalva/jwt-go#example-Parse--Hmac) * [Simple example of parsing and validating a token](https://godoc.org/github.com/golang-jwt/jwt#example-Parse--Hmac)
* [Simple example of building and signing a token](https://godoc.org/github.com/dgrijalva/jwt-go#example-New--Hmac) * [Simple example of building and signing a token](https://godoc.org/github.com/golang-jwt/jwt#example-New--Hmac)
* [Directory of Examples](https://godoc.org/github.com/dgrijalva/jwt-go#pkg-examples) * [Directory of Examples](https://godoc.org/github.com/golang-jwt/jwt#pkg-examples)
## Extensions ## Extensions
@ -49,7 +49,7 @@ This library was last reviewed to comply with [RTF 7519](http://www.rfc-editor.o
This library is considered production ready. Feedback and feature requests are appreciated. The API should be considered stable. There should be very few backwards-incompatible changes outside of major version updates (and only with good reason). This library is considered production ready. Feedback and feature requests are appreciated. The API should be considered stable. There should be very few backwards-incompatible changes outside of major version updates (and only with good reason).
This project uses [Semantic Versioning 2.0.0](http://semver.org). Accepted pull requests will land on `master`. Periodically, versions will be tagged from `master`. You can find all the releases on [the project releases page](https://github.com/dgrijalva/jwt-go/releases). This project uses [Semantic Versioning 2.0.0](http://semver.org). Accepted pull requests will land on `master`. Periodically, versions will be tagged from `master`. You can find all the releases on [the project releases page](https://github.com/golang-jwt/jwt/releases).
While we try to make it obvious when we make breaking changes, there isn't a great mechanism for pushing announcements out to users. You may want to use this alternative package include: `gopkg.in/dgrijalva/jwt-go.v3`. It will do the right thing WRT semantic versioning. While we try to make it obvious when we make breaking changes, there isn't a great mechanism for pushing announcements out to users. You may want to use this alternative package include: `gopkg.in/dgrijalva/jwt-go.v3`. It will do the right thing WRT semantic versioning.
@ -79,9 +79,9 @@ Asymmetric signing methods, such as RSA, use different keys for signing and veri
Each signing method expects a different object type for its signing keys. See the package documentation for details. Here are the most common ones: Each signing method expects a different object type for its signing keys. See the package documentation for details. Here are the most common ones:
* The [HMAC signing method](https://godoc.org/github.com/dgrijalva/jwt-go#SigningMethodHMAC) (`HS256`,`HS384`,`HS512`) expect `[]byte` values for signing and validation * The [HMAC signing method](https://godoc.org/github.com/golang-jwt/jwt#SigningMethodHMAC) (`HS256`,`HS384`,`HS512`) expect `[]byte` values for signing and validation
* The [RSA signing method](https://godoc.org/github.com/dgrijalva/jwt-go#SigningMethodRSA) (`RS256`,`RS384`,`RS512`) expect `*rsa.PrivateKey` for signing and `*rsa.PublicKey` for validation * The [RSA signing method](https://godoc.org/github.com/golang-jwt/jwt#SigningMethodRSA) (`RS256`,`RS384`,`RS512`) expect `*rsa.PrivateKey` for signing and `*rsa.PublicKey` for validation
* The [ECDSA signing method](https://godoc.org/github.com/dgrijalva/jwt-go#SigningMethodECDSA) (`ES256`,`ES384`,`ES512`) expect `*ecdsa.PrivateKey` for signing and `*ecdsa.PublicKey` for validation * The [ECDSA signing method](https://godoc.org/github.com/golang-jwt/jwt#SigningMethodECDSA) (`ES256`,`ES384`,`ES512`) expect `*ecdsa.PrivateKey` for signing and `*ecdsa.PublicKey` for validation
### JWT and OAuth ### JWT and OAuth
@ -99,6 +99,6 @@ This library uses descriptive error messages whenever possible. If you are not g
## More ## More
Documentation can be found [on godoc.org](http://godoc.org/github.com/dgrijalva/jwt-go). Documentation can be found [on godoc.org](http://godoc.org/github.com/golang-jwt/jwt).
The command line utility included in this project (cmd/jwt) provides a straightforward example of token creation and parsing as well as a useful tool for debugging your own integration. You'll also find several implementation examples in the documentation. The command line utility included in this project (cmd/jwt) provides a straightforward example of token creation and parsing as well as a useful tool for debugging your own integration. You'll also find several implementation examples in the documentation.

View File

@ -16,5 +16,5 @@ To simply display a token, use:
You can install this tool with the following command: You can install this tool with the following command:
go install github.com/dgrijalva/jwt-go/cmd/jwt go install github.com/golang-jwt/jwt/cmd/jwt

View File

@ -16,7 +16,7 @@ import (
"regexp" "regexp"
"strings" "strings"
jwt "github.com/dgrijalva/jwt-go" "github.com/golang-jwt/jwt"
) )
var ( var (

View File

@ -6,7 +6,7 @@ import (
"strings" "strings"
"testing" "testing"
"github.com/dgrijalva/jwt-go" "github.com/golang-jwt/jwt"
) )
var ecdsaTestData = []struct { var ecdsaTestData = []struct {

View File

@ -2,8 +2,9 @@ package jwt_test
import ( import (
"fmt" "fmt"
"github.com/dgrijalva/jwt-go"
"time" "time"
"github.com/golang-jwt/jwt"
) )
// Example (atypical) using the StandardClaims type by itself to parse a token. // Example (atypical) using the StandardClaims type by itself to parse a token.

2
go.mod
View File

@ -1,4 +1,4 @@
module github.com/dgrijalva/jwt-go module github.com/golang-jwt/jwt
go 1.14 go 1.14

View File

@ -2,9 +2,10 @@ package jwt_test
import ( import (
"fmt" "fmt"
"github.com/dgrijalva/jwt-go"
"io/ioutil" "io/ioutil"
"time" "time"
"github.com/golang-jwt/jwt"
) )
// For HMAC signing method, the key can be any []byte. It is recommended to generate // For HMAC signing method, the key can be any []byte. It is recommended to generate
@ -51,7 +52,7 @@ func ExampleParse_hmac() {
if _, ok := token.Method.(*jwt.SigningMethodHMAC); !ok { if _, ok := token.Method.(*jwt.SigningMethodHMAC); !ok {
return nil, fmt.Errorf("Unexpected signing method: %v", token.Header["alg"]) return nil, fmt.Errorf("Unexpected signing method: %v", token.Header["alg"])
} }
// hmacSampleSecret is a []byte containing your secret, e.g. []byte("my_secret_key") // hmacSampleSecret is a []byte containing your secret, e.g. []byte("my_secret_key")
return hmacSampleSecret, nil return hmacSampleSecret, nil
}) })

View File

@ -1,10 +1,11 @@
package jwt_test package jwt_test
import ( import (
"github.com/dgrijalva/jwt-go"
"io/ioutil" "io/ioutil"
"strings" "strings"
"testing" "testing"
"github.com/golang-jwt/jwt"
) )
var hmacTestData = []struct { var hmacTestData = []struct {

View File

@ -7,8 +7,6 @@ import (
"bytes" "bytes"
"crypto/rsa" "crypto/rsa"
"fmt" "fmt"
"github.com/dgrijalva/jwt-go"
"github.com/dgrijalva/jwt-go/request"
"io" "io"
"io/ioutil" "io/ioutil"
"log" "log"
@ -17,6 +15,9 @@ import (
"net/url" "net/url"
"strings" "strings"
"time" "time"
"github.com/golang-jwt/jwt"
"github.com/golang-jwt/jwt/request"
) )
// location of the files used for signing and verification // location of the files used for signing and verification
@ -55,6 +56,7 @@ func init() {
// Setup listener // Setup listener
listener, err := net.ListenTCP("tcp", &net.TCPAddr{}) listener, err := net.ListenTCP("tcp", &net.TCPAddr{})
fatal(err)
serverPort = listener.Addr().(*net.TCPAddr).Port serverPort = listener.Addr().(*net.TCPAddr).Port
log.Println("Listening...") log.Println("Listening...")

View File

@ -1,9 +1,10 @@
package jwt_test package jwt_test
import ( import (
"github.com/dgrijalva/jwt-go"
"strings" "strings"
"testing" "testing"
"github.com/golang-jwt/jwt"
) )
var noneTestData = []struct { var noneTestData = []struct {

View File

@ -8,8 +8,8 @@ import (
"testing" "testing"
"time" "time"
"github.com/dgrijalva/jwt-go" "github.com/golang-jwt/jwt"
"github.com/dgrijalva/jwt-go/test" "github.com/golang-jwt/jwt/test"
) )
var keyFuncError error = fmt.Errorf("error loading key") var keyFuncError error = fmt.Errorf("error loading key")

View File

@ -1,8 +1,9 @@
package request package request
import ( import (
"github.com/dgrijalva/jwt-go"
"net/http" "net/http"
"github.com/golang-jwt/jwt"
) )
// Extract and parse a JWT token from an HTTP request. // Extract and parse a JWT token from an HTTP request.

View File

@ -2,13 +2,14 @@ package request
import ( import (
"fmt" "fmt"
"github.com/dgrijalva/jwt-go"
"github.com/dgrijalva/jwt-go/test"
"net/http" "net/http"
"net/url" "net/url"
"reflect" "reflect"
"strings" "strings"
"testing" "testing"
"github.com/golang-jwt/jwt"
"github.com/golang-jwt/jwt/test"
) )
var requestTestData = []struct { var requestTestData = []struct {

View File

@ -9,8 +9,8 @@ import (
"testing" "testing"
"time" "time"
"github.com/dgrijalva/jwt-go" "github.com/golang-jwt/jwt"
"github.com/dgrijalva/jwt-go/test" "github.com/golang-jwt/jwt/test"
) )
var rsaPSSTestData = []struct { var rsaPSSTestData = []struct {

View File

@ -1,10 +1,11 @@
package jwt_test package jwt_test
import ( import (
"github.com/dgrijalva/jwt-go"
"io/ioutil" "io/ioutil"
"strings" "strings"
"testing" "testing"
"github.com/golang-jwt/jwt"
) )
var rsaTestData = []struct { var rsaTestData = []struct {

View File

@ -2,8 +2,9 @@ package test
import ( import (
"crypto/rsa" "crypto/rsa"
"github.com/dgrijalva/jwt-go"
"io/ioutil" "io/ioutil"
"github.com/golang-jwt/jwt"
) )
func LoadRSAPrivateKeyFromDisk(location string) *rsa.PrivateKey { func LoadRSAPrivateKeyFromDisk(location string) *rsa.PrivateKey {