Renamed imports to match with go module name.

Signed-off-by: sadmansakib <ssadman8@gmail.com>
This commit is contained in:
sadmansakib 2021-05-27 00:15:57 +06:00
parent fbb4be196a
commit e5d8c0657e
16 changed files with 39 additions and 31 deletions

View File

@ -1,7 +1,7 @@
# jwt-go # jwt-go
[![Build Status](https://travis-ci.org/dgrijalva/jwt-go.svg?branch=master)](https://travis-ci.org/dgrijalva/jwt-go) [![Build Status](https://travis-ci.org/dgrijalva/jwt-go.svg?branch=master)](https://travis-ci.org/dgrijalva/jwt-go)
[![GoDoc](https://godoc.org/github.com/dgrijalva/jwt-go?status.svg)](https://godoc.org/github.com/dgrijalva/jwt-go) [![GoDoc](https://godoc.org/github.com/golang-jwt/jwt?status.svg)](https://godoc.org/github.com/golang-jwt/jwt)
A [go](http://www.golang.org) (or 'golang' for search engine friendliness) implementation of [JSON Web Tokens](http://self-issued.info/docs/draft-ietf-oauth-json-web-token.html) A [go](http://www.golang.org) (or 'golang' for search engine friendliness) implementation of [JSON Web Tokens](http://self-issued.info/docs/draft-ietf-oauth-json-web-token.html)
@ -27,11 +27,11 @@ This library supports the parsing and verification as well as the generation and
## Examples ## Examples
See [the project documentation](https://godoc.org/github.com/dgrijalva/jwt-go) for examples of usage: See [the project documentation](https://godoc.org/github.com/golang-jwt/jwt) for examples of usage:
* [Simple example of parsing and validating a token](https://godoc.org/github.com/dgrijalva/jwt-go#example-Parse--Hmac) * [Simple example of parsing and validating a token](https://godoc.org/github.com/golang-jwt/jwt#example-Parse--Hmac)
* [Simple example of building and signing a token](https://godoc.org/github.com/dgrijalva/jwt-go#example-New--Hmac) * [Simple example of building and signing a token](https://godoc.org/github.com/golang-jwt/jwt#example-New--Hmac)
* [Directory of Examples](https://godoc.org/github.com/dgrijalva/jwt-go#pkg-examples) * [Directory of Examples](https://godoc.org/github.com/golang-jwt/jwt#pkg-examples)
## Extensions ## Extensions
@ -49,7 +49,7 @@ This library was last reviewed to comply with [RTF 7519](http://www.rfc-editor.o
This library is considered production ready. Feedback and feature requests are appreciated. The API should be considered stable. There should be very few backwards-incompatible changes outside of major version updates (and only with good reason). This library is considered production ready. Feedback and feature requests are appreciated. The API should be considered stable. There should be very few backwards-incompatible changes outside of major version updates (and only with good reason).
This project uses [Semantic Versioning 2.0.0](http://semver.org). Accepted pull requests will land on `master`. Periodically, versions will be tagged from `master`. You can find all the releases on [the project releases page](https://github.com/dgrijalva/jwt-go/releases). This project uses [Semantic Versioning 2.0.0](http://semver.org). Accepted pull requests will land on `master`. Periodically, versions will be tagged from `master`. You can find all the releases on [the project releases page](https://github.com/golang-jwt/jwt/releases).
While we try to make it obvious when we make breaking changes, there isn't a great mechanism for pushing announcements out to users. You may want to use this alternative package include: `gopkg.in/dgrijalva/jwt-go.v3`. It will do the right thing WRT semantic versioning. While we try to make it obvious when we make breaking changes, there isn't a great mechanism for pushing announcements out to users. You may want to use this alternative package include: `gopkg.in/dgrijalva/jwt-go.v3`. It will do the right thing WRT semantic versioning.
@ -79,9 +79,9 @@ Asymmetric signing methods, such as RSA, use different keys for signing and veri
Each signing method expects a different object type for its signing keys. See the package documentation for details. Here are the most common ones: Each signing method expects a different object type for its signing keys. See the package documentation for details. Here are the most common ones:
* The [HMAC signing method](https://godoc.org/github.com/dgrijalva/jwt-go#SigningMethodHMAC) (`HS256`,`HS384`,`HS512`) expect `[]byte` values for signing and validation * The [HMAC signing method](https://godoc.org/github.com/golang-jwt/jwt#SigningMethodHMAC) (`HS256`,`HS384`,`HS512`) expect `[]byte` values for signing and validation
* The [RSA signing method](https://godoc.org/github.com/dgrijalva/jwt-go#SigningMethodRSA) (`RS256`,`RS384`,`RS512`) expect `*rsa.PrivateKey` for signing and `*rsa.PublicKey` for validation * The [RSA signing method](https://godoc.org/github.com/golang-jwt/jwt#SigningMethodRSA) (`RS256`,`RS384`,`RS512`) expect `*rsa.PrivateKey` for signing and `*rsa.PublicKey` for validation
* The [ECDSA signing method](https://godoc.org/github.com/dgrijalva/jwt-go#SigningMethodECDSA) (`ES256`,`ES384`,`ES512`) expect `*ecdsa.PrivateKey` for signing and `*ecdsa.PublicKey` for validation * The [ECDSA signing method](https://godoc.org/github.com/golang-jwt/jwt#SigningMethodECDSA) (`ES256`,`ES384`,`ES512`) expect `*ecdsa.PrivateKey` for signing and `*ecdsa.PublicKey` for validation
### JWT and OAuth ### JWT and OAuth
@ -99,6 +99,6 @@ This library uses descriptive error messages whenever possible. If you are not g
## More ## More
Documentation can be found [on godoc.org](http://godoc.org/github.com/dgrijalva/jwt-go). Documentation can be found [on godoc.org](http://godoc.org/github.com/golang-jwt/jwt).
The command line utility included in this project (cmd/jwt) provides a straightforward example of token creation and parsing as well as a useful tool for debugging your own integration. You'll also find several implementation examples in the documentation. The command line utility included in this project (cmd/jwt) provides a straightforward example of token creation and parsing as well as a useful tool for debugging your own integration. You'll also find several implementation examples in the documentation.

View File

@ -16,5 +16,5 @@ To simply display a token, use:
You can install this tool with the following command: You can install this tool with the following command:
go install github.com/dgrijalva/jwt-go/cmd/jwt go install github.com/golang-jwt/jwt/cmd/jwt

View File

@ -16,7 +16,7 @@ import (
"regexp" "regexp"
"strings" "strings"
jwt "github.com/dgrijalva/jwt-go" "github.com/golang-jwt/jwt"
) )
var ( var (

View File

@ -6,7 +6,7 @@ import (
"strings" "strings"
"testing" "testing"
"github.com/dgrijalva/jwt-go" "github.com/golang-jwt/jwt"
) )
var ecdsaTestData = []struct { var ecdsaTestData = []struct {

View File

@ -2,8 +2,9 @@ package jwt_test
import ( import (
"fmt" "fmt"
"github.com/dgrijalva/jwt-go"
"time" "time"
"github.com/golang-jwt/jwt"
) )
// Example (atypical) using the StandardClaims type by itself to parse a token. // Example (atypical) using the StandardClaims type by itself to parse a token.

View File

@ -2,9 +2,10 @@ package jwt_test
import ( import (
"fmt" "fmt"
"github.com/dgrijalva/jwt-go"
"io/ioutil" "io/ioutil"
"time" "time"
"github.com/golang-jwt/jwt"
) )
// For HMAC signing method, the key can be any []byte. It is recommended to generate // For HMAC signing method, the key can be any []byte. It is recommended to generate

View File

@ -1,10 +1,11 @@
package jwt_test package jwt_test
import ( import (
"github.com/dgrijalva/jwt-go"
"io/ioutil" "io/ioutil"
"strings" "strings"
"testing" "testing"
"github.com/golang-jwt/jwt"
) )
var hmacTestData = []struct { var hmacTestData = []struct {

View File

@ -16,8 +16,8 @@ import (
"strings" "strings"
"time" "time"
"github.com/dgrijalva/jwt-go" "github.com/golang-jwt/jwt"
"github.com/dgrijalva/jwt-go/request" "github.com/golang-jwt/jwt/request"
) )
// location of the files used for signing and verification // location of the files used for signing and verification

View File

@ -1,9 +1,10 @@
package jwt_test package jwt_test
import ( import (
"github.com/dgrijalva/jwt-go"
"strings" "strings"
"testing" "testing"
"github.com/golang-jwt/jwt"
) )
var noneTestData = []struct { var noneTestData = []struct {

View File

@ -8,8 +8,8 @@ import (
"testing" "testing"
"time" "time"
"github.com/dgrijalva/jwt-go" "github.com/golang-jwt/jwt"
"github.com/dgrijalva/jwt-go/test" "github.com/golang-jwt/jwt/test"
) )
var keyFuncError error = fmt.Errorf("error loading key") var keyFuncError error = fmt.Errorf("error loading key")

View File

@ -1,8 +1,9 @@
package request package request
import ( import (
"github.com/dgrijalva/jwt-go"
"net/http" "net/http"
"github.com/golang-jwt/jwt"
) )
// Extract and parse a JWT token from an HTTP request. // Extract and parse a JWT token from an HTTP request.

View File

@ -2,13 +2,14 @@ package request
import ( import (
"fmt" "fmt"
"github.com/dgrijalva/jwt-go"
"github.com/dgrijalva/jwt-go/test"
"net/http" "net/http"
"net/url" "net/url"
"reflect" "reflect"
"strings" "strings"
"testing" "testing"
"github.com/golang-jwt/jwt"
"github.com/golang-jwt/jwt/test"
) )
var requestTestData = []struct { var requestTestData = []struct {

View File

@ -15,7 +15,7 @@ type SigningMethodRSAPSS struct {
// VerifyOptions is optional. If set overrides Options for rsa.VerifyPPS. // VerifyOptions is optional. If set overrides Options for rsa.VerifyPPS.
// Used to accept tokens signed with rsa.PSSSaltLengthAuto, what doesn't follow // Used to accept tokens signed with rsa.PSSSaltLengthAuto, what doesn't follow
// https://tools.ietf.org/html/rfc7518#section-3.5 but was used previously. // https://tools.ietf.org/html/rfc7518#section-3.5 but was used previously.
// See https://github.com/dgrijalva/jwt-go/issues/285#issuecomment-437451244 for details. // See https://github.com/golang-jwt/jwt/issues/285#issuecomment-437451244 for details.
VerifyOptions *rsa.PSSOptions VerifyOptions *rsa.PSSOptions
} }

View File

@ -9,8 +9,8 @@ import (
"testing" "testing"
"time" "time"
"github.com/dgrijalva/jwt-go" "github.com/golang-jwt/jwt"
"github.com/dgrijalva/jwt-go/test" "github.com/golang-jwt/jwt/test"
) )
var rsaPSSTestData = []struct { var rsaPSSTestData = []struct {
@ -106,7 +106,7 @@ func TestRSAPSSSaltLengthCompatibility(t *testing.T) {
}, },
} }
// Behaves as before https://github.com/dgrijalva/jwt-go/issues/285 fix. // Behaves as before https://github.com/golang-jwt/jwt/issues/285 fix.
ps256SaltLengthAuto := &jwt.SigningMethodRSAPSS{ ps256SaltLengthAuto := &jwt.SigningMethodRSAPSS{
SigningMethodRSA: jwt.SigningMethodPS256.SigningMethodRSA, SigningMethodRSA: jwt.SigningMethodPS256.SigningMethodRSA,
Options: &rsa.PSSOptions{ Options: &rsa.PSSOptions{

View File

@ -1,10 +1,11 @@
package jwt_test package jwt_test
import ( import (
"github.com/dgrijalva/jwt-go"
"io/ioutil" "io/ioutil"
"strings" "strings"
"testing" "testing"
"github.com/golang-jwt/jwt"
) )
var rsaTestData = []struct { var rsaTestData = []struct {

View File

@ -2,8 +2,9 @@ package test
import ( import (
"crypto/rsa" "crypto/rsa"
"github.com/dgrijalva/jwt-go"
"io/ioutil" "io/ioutil"
"github.com/golang-jwt/jwt"
) )
func LoadRSAPrivateKeyFromDisk(location string) *rsa.PrivateKey { func LoadRSAPrivateKeyFromDisk(location string) *rsa.PrivateKey {