package
0.0.0-20241105204840-47fcb773a808
Repository: https://github.com/surahman/mcq-platform.git
Documentation: pkg.go.dev

# README

Authentication

Configuration loading is designed for containerization in mind. The container engine and orchestrator can mount volumes (secret or regular) as well as set the environment variables as outlined below.

You may set configurations through both files and environment variables. Please note that environment variables will override the settings in the configuration files. The configuration files are all expected to be in YAML format.


Table of contents


JSON Web Token API Key

API key based authentication is provided through the use of JWTs that must be included in the message header section of an HTTP request:


File Location(s)

The configuration loader will search for the configurations in the following order:

LocationDetails
/etc/MCQPlatform.conf/The etc directory is the canonical location for configurations.
$HOME/.MCQPlatform/Configurations can be located in the user's home directory.
./configs/The config folder in the root directory where the application is located.
Environment variablesFinally, the configurations will be loaded from environment variables and override configuration files

Configuration File

The expected file name is AuthConfig.yaml. All the configuration items below are required.

NameEnvironment Variable KeyTypeDescription
JWTAUTH_JWTJWT Configurations.Parent key for JSON Web Token configurations.
↳ key.KEYstringThe encryption key used for the JSON Web Token.
↳ issuer.ISSUERstringThe issuer of the JSON Web Token.
↳ expiration_duration.EXPIRATION_DURATIONint64The validity duration in seconds for the JSON Web Token.
↳ refresh_threshold.REFRESH_THRESHOLDint64The seconds before expiration that a JSON Web Token can be refreshed before.
GeneralAUTH_CONFIG General Configurations.Parent key for general authentication configurations.
↳ bcrypt_cost.BCRYPT_COSTintThe cost value that is used for the BCrypt algorithm.
↳ crypto_secret.CRYPTO_SECRETstringA 32 character secret key to be used for AES256 encryption and decryption.

Example Configuration File

jwt:
  key: some-long-random-key
  issuer: issuer of the token
  expiration_duration: 600
  refresh_threshold: 60
general:
  bcrypt_cost: 8

Example Environment Variables

export AUTH_CONFIG.BCRYPT_COST=8
export AUTH_JWT.KEY="some-long-random-key"

# Functions

NewAuth will create a new Authorization configuration by loading it.

# Interfaces

Auth is the interface through which the authorization operations can be accessed.