From e4a56deada5a16d88f6fa9268f6668e7e05e0651 Mon Sep 17 00:00:00 2001 From: Dave Grijalva Date: Tue, 18 Aug 2015 10:58:37 -0700 Subject: [PATCH] don't need that --- jwt.go | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/jwt.go b/jwt.go index 717a44e..ed1b00b 100644 --- a/jwt.go +++ b/jwt.go @@ -87,7 +87,7 @@ func (t *Token) SigningString() (string, error) { // keyFunc will receive the parsed token and should return the key for validating. // If everything is kosher, err will be nil func Parse(tokenString string, keyFunc Keyfunc) (*Token, error) { - return ParseWithClaims(tokenString, keyFunc, &MapClaims{}) + return ParseWithClaims(tokenString, keyFunc, MapClaims{}) } func ParseWithClaims(tokenString string, keyFunc Keyfunc, claims Claims) (*Token, error) { @@ -176,7 +176,7 @@ func ParseWithClaims(tokenString string, keyFunc Keyfunc, claims Claims) (*Token // Currently, it looks in the Authorization header as well as // looking for an 'access_token' request parameter in req.Form. func ParseFromRequest(req *http.Request, keyFunc Keyfunc) (token *Token, err error) { - return ParseFromRequestWithClaims(req, keyFunc, &MapClaims{}) + return ParseFromRequestWithClaims(req, keyFunc, MapClaims{}) } func ParseFromRequestWithClaims(req *http.Request, keyFunc Keyfunc, claims Claims) (token *Token, err error) {