Home > Article > Backend Development > Basic Authentication Middleware for Iris
The Basic Authentication middleware provides a robust and flexible way to secure your Iris web applications. It supports various user storage methods, including in-memory lists, files, and databases, and offers advanced features such as password encryption, custom error handling, and session expiration.
To use the basicauth middleware, you need to import it in your Iris application:
import "github.com/kataras/iris/v12/middleware/basicauth"
The core of the middleware is the Allow field, which is a function with the following signature:
func(ctx iris.Context, username, password string) (any, bool)
This function is responsible for validating the username and password. It returns a user object (or any other type) and a boolean indicating whether the authentication was successful.
While the middleware does not require a specific user structure, you can use a helper structure to manage user data more conveniently. Here is an example of a user structure:
type User struct { Username string `json:"username"` Password string `json:"password"` Roles []string `json:"roles"` }
You can store users in memory using a slice of user structures. This is useful for small applications or testing purposes.
var users = []User{ {"admin", "admin", []string{"admin"}}, {"kataras", "kataras_pass", []string{"manager", "author"}}, {"george", "george_pass", []string{"member"}}, {"john", "john_pass", []string{}}, }
To set up the middleware, create an instance of basicauth.Options and pass it to basicauth.New.
opts := basicauth.Options{ Realm: basicauth.DefaultRealm, MaxAge: 10 * time.Minute, GC: basicauth.GC{ Every: 2 * time.Hour, }, Allow: basicauth.AllowUsers(users), } auth := basicauth.New(opts)
You can load users from a file (JSON or YAML). This is useful for applications where user data changes frequently.
auth := basicauth.Load("users.yml")
The BCRYPT option allows you to use bcrypt for password hashing. Bcrypt is a password hashing function designed to be computationally intensive to resist brute-force attacks. It is widely used for securely storing passwords.
auth := basicauth.Load("users.yml", basicauth.BCRYPT)
You can also use the BCRYPT option with other user fetching methods, such as in-memory or database storage.
For more dynamic user management, you can validate users against a database. Here is an example of how to set up the middleware using a MySQL database:
package main import ( "context" "database/sql" "fmt" "os" "github.com/kataras/iris/v12" "github.com/kataras/iris/v12/middleware/basicauth" _ "github.com/go-sql-driver/mysql" ) type User struct { ID int64 `db:"id" json:"id"` Username string `db:"username" json:"username"` Password string `db:"password" json:"password"` Email string `db:"email" json:"email"` } func (u User) GetUsername() string { return u.Username } func (u User) GetPassword() string { return u.Password } func main() { dsn := fmt.Sprintf("%s:%s@tcp(%s:3306)/%s?parseTime=true&charset=utf8mb4&collation=utf8mb4_unicode_ci", getenv("MYSQL_USER", "user_myapp"), getenv("MYSQL_PASSWORD", "dbpassword"), get env("MYSQL_HOST", "localhost"), getenv("MYSQL_DATABASE", "myapp"), ) db, err := connect(dsn) if err != nil { panic(err) } // Validate a user from database. allowFunc := func(ctx iris.Context, username, password string) (any, bool) { user, err := db.getUserByUsernameAndPassword(context.Background(), username, password) return user, err == nil } opts := basicauth.Options{ Realm: basicauth.DefaultRealm, ErrorHandler: basicauth.DefaultErrorHandler, Allow: allowFunc, } auth := basicauth.New(opts) app := iris.New() app.Use(auth) app.Get("/", index) app.Listen(":8080") } func index(ctx iris.Context) { user, _ := ctx.User().GetRaw() // user is a type of main.User ctx.JSON(user) }
You can customize the error handling behavior by setting the ErrorHandler field in the basicauth.Options.
opts := basicauth.Options{ ErrorHandler: func(ctx iris.Context, err error) { ctx.StatusCode(iris.StatusUnauthorized) ctx.JSON(iris.Map{"error": "Unauthorized"}) }, }
The middleware supports session expiration. You can set the MaxAge field to specify the duration after which the user must re-authenticate.
opts := basicauth.Options{ MaxAge: 10 * time.Minute, }
To clear expired users from memory, you can set the GC field.
import "github.com/kataras/iris/v12/middleware/basicauth"
To test handlers that use the BasicAuth middleware, you can use the
httptest
package provided by Iris. Here is an example of how to test a handler:
func(ctx iris.Context, username, password string) (any, bool)
Here is a complete example that demonstrates how to set up the middleware with in-memory user storage:
type User struct { Username string `json:"username"` Password string `json:"password"` Roles []string `json:"roles"` }
The Basic Authentication middleware provides a comprehensive solution for securing your Iris web applications. With support for various user storage methods, advanced features like password encryption and custom error handling, and easy integration, it is a powerful tool for developers.
The above is the detailed content of Basic Authentication Middleware for Iris. For more information, please follow other related articles on the PHP Chinese website!