g8, pronounced gate, is a simple Go library for protecting HTTP handlers.
Tired of constantly re-implementing a security layer for each application? Me too, that's why I made g8.
go get -u github.com/TwiN/g8/v3
Because the entire purpose of g8 is to NOT waste time configuring the layer of security, the primary emphasis is to keep it as simple as possible.
Just want a simple layer of security without the need for advanced permissions? This configuration is what you're looking for.
authorizationService := g8.NewAuthorizationService().WithToken("mytoken")
gate := g8.New().WithAuthorizationService(authorizationService)
router := http.NewServeMux()
router.Handle("/unprotected", yourHandler)
router.Handle("/protected", gate.Protect(yourHandler))
http.ListenAndServe(":8080", router)
The endpoint /protected
is now only accessible if you pass the header Authorization: Bearer mytoken
.
If you use http.HandleFunc
instead of http.Handle
, you may use gate.ProtectFunc(yourHandler)
instead.
If you're not using the Authorization
header, you can specify a custom token extractor.
This enables use cases like Protecting a handler using session cookie
If you have tokens with more permissions than others, g8's permission system will make managing authorization a breeze.
Rather than registering tokens, think of it as registering clients, the only difference being that clients may be configured with permissions while tokens cannot.
authorizationService := g8.NewAuthorizationService().WithClient(g8.NewClient("mytoken").WithPermission("admin"))
gate := g8.New().WithAuthorizationService(authorizationService)
router := http.NewServeMux()
router.Handle("/unprotected", yourHandler)
router.Handle("/protected-with-admin", gate.ProtectWithPermissions(yourHandler, []string{"admin"}))
http.ListenAndServe(":8080", router)
The endpoint /protected-with-admin
is now only accessible if you pass the header Authorization: Bearer mytoken
,
because the client with the token mytoken
has the permission admin
. Note that the following handler would also be
accessible with that token:
router.Handle("/protected", gate.Protect(yourHandler))
To clarify, both clients and tokens have access to handlers that aren't protected with extra permissions, and essentially, tokens are registered as clients with no extra permissions in the background.
Creating a token like so:
authorizationService := g8.NewAuthorizationService().WithToken("mytoken")
is the equivalent of creating the following client:
authorizationService := g8.NewAuthorizationService().WithClient(g8.NewClient("mytoken"))
A client provider's task is to retrieve a Client from an external source (e.g. a database) when provided with a token.
You should use a client provider when you have a lot of tokens and it wouldn't make sense to register all of them using
AuthorizationService
's WithToken
/WithTokens
/WithClient
/WithClients
.
Note that the provider is used as a fallback source. As such, if a token is explicitly registered using one of the 4 aforementioned functions, the client provider will not be used.
clientProvider := g8.NewClientProvider(func(token string) *g8.Client {
// We'll assume that the following function calls your database and returns a struct "User" that
// has the user's token as well as the permissions granted to said user
user := database.GetUserByToken(token)
if user != nil {
return g8.NewClient(user.Token).WithPermissions(user.Permissions)
}
return nil
})
authorizationService := g8.NewAuthorizationService().WithClientProvider(clientProvider)
gate := g8.New().WithAuthorizationService(authorizationService)
You can also configure the client provider to cache the output of the function you provide to retrieve clients by token:
clientProvider := g8.NewClientProvider(...).WithCache(ttl, maxSize)
Since g8 leverages TwiN/gocache (unless you're using WithCustomCache
),
you can also use gocache's constants for configuring the TTL and the maximum size:
- Setting the TTL to
gocache.NoExpiration
(-1) will disable the TTL. - Setting the maximum size to
gocache.NoMaxSize
(0) will disable the maximum cache size
To avoid any misunderstandings, using a client provider is not mandatory. If you only have a few tokens and you can load
them on application start, you can just leverage AuthorizationService
's WithToken
/WithTokens
/WithClient
/WithClients
.
As the previous examples may have hinted, there are several ways to create clients. The one thing they have in common is that they all go through AuthorizationService, which is in charge of both managing clients and determining whether a request should be blocked or allowed through.
Function | Description |
---|---|
WithToken | Creates a single static client with no extra permissions |
WithTokens | Creates a slice of static clients with no extra permissions |
WithClient | Creates a single static client |
WithClients | Creates a slice of static clients |
WithClientProvider | Creates a client provider which will allow a fallback to a dynamic source (e.g. to a database) when a static client is not found |
Except for WithClientProvider
, every functions listed above can be called more than once.
As a result, you may safely perform actions like this:
authorizationService := g8.NewAuthorizationService().
WithToken("123").
WithToken("456").
WithClient(g8.NewClient("789").WithPermission("admin"))
gate := g8.New().WithAuthorizationService(authorizationService)
Be aware that g8.Client supports a list of permissions as well. You may call WithPermission
several times, or call
WithPermissions
with a slice of permissions instead.
Unlike client permissions, handler permissions are requirements.
A client may have as many permissions as you want, but for said client to have access to a handler protected by permissions, the client must have all permissions defined by said handler in order to have access to it.
In other words, a client with the permissions create
, read
, update
and delete
would have access to all of these handlers:
gate := g8.New().WithAuthorizationService(g8.NewAuthorizationService().WithClient(g8.NewClient("mytoken").WithPermissions([]string{"create", "read", "update", "delete"})))
router := http.NewServeMux()
router.Handle("/", gate.Protect(homeHandler)) // equivalent of gate.ProtectWithPermissions(homeHandler, []string{})
router.Handle("/create", gate.ProtectWithPermissions(createHandler, []string{"create"}))
router.Handle("/read", gate.ProtectWithPermissions(readHandler, []string{"read"}))
router.Handle("/update", gate.ProtectWithPermissions(updateHandler, []string{"update"}))
router.Handle("/delete", gate.ProtectWithPermissions(deleteHandler, []string{"delete"}))
router.Handle("/crud", gate.ProtectWithPermissions(crudHandler, []string{"create", "read", "update", "delete"}))
But it would not have access to the following handler, because while mytoken
has the read
permission, it does not
have the backup
permission:
router.Handle("/backup", gate.ProtectWithPermissions(&testHandler{}, []string{"read", "backup"}))
If you're using an HTTP library that supports middlewares like mux, you can protect
an entire group of handlers instead using gate.Protect
or gate.PermissionMiddleware()
:
router := mux.NewRouter()
userRouter := router.PathPrefix("/").Subrouter()
userRouter.Use(gate.Protect)
userRouter.HandleFunc("/api/v1/users/me", getUserProfile).Methods("GET")
userRouter.HandleFunc("/api/v1/users/me/friends", getUserFriends).Methods("GET")
userRouter.HandleFunc("/api/v1/users/me/email", updateUserEmail).Methods("PATCH")
adminRouter := router.PathPrefix("/").Subrouter()
adminRouter.Use(gate.PermissionMiddleware("admin"))
adminRouter.HandleFunc("/api/v1/users/{id}/ban", banUserByID).Methods("POST")
adminRouter.HandleFunc("/api/v1/users/{id}/delete", deleteUserByID).Methods("DELETE")
To add a rate limit of 100 requests per second:
gate := g8.New().WithRateLimit(100)
If you need to access the token from the handlers you are protecting with g8, you can retrieve it from the
request context by using the key g8.TokenContextKey
:
http.Handle("/handle", gate.ProtectFunc(func(w http.ResponseWriter, r *http.Request) {
token, _ := r.Context().Value(g8.TokenContextKey).(string)
// ...
}))
If you want to only allow authenticated users to access a handler, you can use a custom token extractor function combined with a client provider.
First, we'll create a function to extract the session ID from the session cookie. While a session ID does not
theoretically refer to a token, g8 uses the term token
as a blanket term to refer to any string that can be used to
identify a client.
customTokenExtractorFunc := func(request *http.Request) string {
sessionCookie, err := request.Cookie("session")
if err != nil {
return ""
}
return sessionCookie.Value
}
Next, we need to create a client provider that will validate our token, which refers to the session ID in this case.
clientProvider := g8.NewClientProvider(func(token string) *g8.Client {
// We'll assume that the following function calls your database and validates whether the session is valid.
isSessionValid := database.CheckIfSessionIsValid(token)
if !isSessionValid {
return nil // Returning nil will cause the gate to return a 401 Unauthorized.
}
// You could also retrieve the user and their permissions if you wanted instead, but for this example,
// all we care about is confirming whether the session is valid or not.
return g8.NewClient(token)
})
Keep in mind that you can get really creative with the client provider above. For instance, you could refresh the session's expiration time, which will allow the user to stay logged in for as long as they're active.
You're also not limited to using something stateful like the example above. You could use a JWT and have your client provider validate said JWT.
Finally, we can create the authorization service and the gate:
authorizationService := g8.NewAuthorizationService().WithClientProvider(clientProvider)
gate := g8.New().WithAuthorizationService(authorizationService).WithCustomTokenExtractor(customTokenExtractorFunc)
If you need to access the token (session ID in this case) from the protected handlers, you can retrieve it from the
request context by using the key g8.TokenContextKey
:
http.Handle("/handle", gate.ProtectFunc(func(w http.ResponseWriter, r *http.Request) {
sessionID, _ := r.Context().Value(g8.TokenContextKey).(string)
// ...
}))
The logic is the same as the example above:
customTokenExtractorFunc := func(request *http.Request) string {
return request.Header.Get("X-API-Token")
}
clientProvider := g8.NewClientProvider(func(token string) *g8.Client {
// We'll assume that the following function calls your database and returns a struct "User" that
// has the user's token as well as the permissions granted to said user
user := database.GetUserByToken(token)
if user != nil {
return g8.NewClient(user.Token).WithPermissions(user.Permissions)
}
return nil
})
authorizationService := g8.NewAuthorizationService().WithClientProvider(clientProvider)
gate := g8.New().WithAuthorizationService(authorizationService).WithCustomTokenExtractor(customTokenExtractorFunc)
package main
import (
g8 "github.com/TwiN/g8/v3"
)
type customCache struct {
entries map[string]any
sync.Mutex
}
func (c *customCache) Get(key string) (value any, exists bool) {
return nil, false
}
func (c *customCache) Set(key string, value any) {
// ...
}
// To verify the implementation
var _ g8.Cache = (*customCache)(nil)
func main() {
getClientByTokenFunc := func(token string) *g8.Client {
// We'll assume that the following function calls your database and returns a struct "User" that
// has the user's token as well as the permissions granted to said user
user := database.GetUserByToken(token)
if user != nil {
return g8.NewClient(user.Token).WithPermissions(user.Permissions).WithData(user.Data)
}
return nil
}
// Create the provider with the custom cache
provider := g8.NewClientProvider(getClientByTokenFunc).WithCustomCache(&customCache{})
}
Here's a complete example showing how to build a REST API server using standard net/http:
package main
import (
"encoding/json"
"fmt"
"log"
"net/http"
"github.com/TwiN/g8/v3"
)
func main() {
// Create authorization service with different clients and permissions
authService := g8.NewAuthorizationService().
WithToken("public-token"). // Basic token with no special permissions
WithClient(g8.NewClient("admin-token").WithPermission("admin")). // Admin token
WithClient(g8.NewClient("user-token").WithPermissions([]string{"read", "write"})) // User token with specific permissions
// Create gate with authorization and rate limiting
gate := g8.New().
WithAuthorizationService(authService).
WithRateLimit(100) // 100 requests per second
// Set up routes
mux := http.NewServeMux()
// Public endpoints (no protection)
mux.HandleFunc("/", homeHandler)
mux.HandleFunc("/health", healthHandler)
// Protected endpoints using gate.ProtectFunc
mux.HandleFunc("/api/profile", gate.ProtectFunc(profileHandler))
mux.HandleFunc("/api/data", gate.ProtectFunc(dataHandler))
// Admin-only endpoints using gate.ProtectFuncWithPermission
mux.HandleFunc("/api/admin/users", gate.ProtectFuncWithPermission(adminUsersHandler, "admin"))
mux.HandleFunc("/api/admin/stats", gate.ProtectFuncWithPermission(adminStatsHandler, "admin"))
// Endpoints requiring specific permissions
mux.HandleFunc("/api/read-data", gate.ProtectFuncWithPermissions(readDataHandler, []string{"read"}))
mux.HandleFunc("/api/write-data", gate.ProtectFuncWithPermissions(writeDataHandler, []string{"write"}))
mux.HandleFunc("/api/manage-data", gate.ProtectFuncWithPermissions(manageDataHandler, []string{"read", "write"}))
fmt.Println("Server starting on :8080")
fmt.Println("Try these endpoints:")
fmt.Println(" curl http://localhost:8080/")
fmt.Println(" curl -H 'Authorization: Bearer public-token' http://localhost:8080/api/profile")
fmt.Println(" curl -H 'Authorization: Bearer admin-token' http://localhost:8080/api/admin/users")
fmt.Println(" curl -H 'Authorization: Bearer user-token' http://localhost:8080/api/read-data")
log.Fatal(http.ListenAndServe(":8080", mux))
}
func homeHandler(w http.ResponseWriter, r *http.Request) {
json.NewEncoder(w).Encode(map[string]string{
"message": "Welcome to the API",
"status": "public",
})
}
func healthHandler(w http.ResponseWriter, r *http.Request) {
w.Header().Set("Content-Type", "application/json")
json.NewEncoder(w).Encode(map[string]string{"status": "healthy"})
}
func profileHandler(w http.ResponseWriter, r *http.Request) {
// Extract token from context (added by g8)
token, _ := r.Context().Value(g8.TokenContextKey).(string)
w.Header().Set("Content-Type", "application/json")
json.NewEncoder(w).Encode(map[string]interface{}{
"message": "Profile data",
"token": token,
"user": "authenticated user",
})
}
func dataHandler(w http.ResponseWriter, r *http.Request) {
w.Header().Set("Content-Type", "application/json")
json.NewEncoder(w).Encode(map[string]interface{}{
"data": []string{"item1", "item2", "item3"},
})
}
func adminUsersHandler(w http.ResponseWriter, r *http.Request) {
w.Header().Set("Content-Type", "application/json")
json.NewEncoder(w).Encode(map[string]interface{}{
"users": []map[string]interface{}{
{"id": 1, "name": "Alice", "role": "admin"},
{"id": 2, "name": "Bob", "role": "user"},
},
})
}
func adminStatsHandler(w http.ResponseWriter, r *http.Request) {
w.Header().Set("Content-Type", "application/json")
json.NewEncoder(w).Encode(map[string]interface{}{
"stats": map[string]int{
"total_users": 1000,
"active_users": 750,
"requests_today": 15000,
},
})
}
func readDataHandler(w http.ResponseWriter, r *http.Request) {
w.Header().Set("Content-Type", "application/json")
json.NewEncoder(w).Encode(map[string]interface{}{
"message": "Reading data...",
"data": "sensitive read-only data",
})
}
func writeDataHandler(w http.ResponseWriter, r *http.Request) {
w.Header().Set("Content-Type", "application/json")
json.NewEncoder(w).Encode(map[string]interface{}{
"message": "Data written successfully",
"action": "write",
})
}
func manageDataHandler(w http.ResponseWriter, r *http.Request) {
w.Header().Set("Content-Type", "application/json")
json.NewEncoder(w).Encode(map[string]interface{}{
"message": "Full data management access",
"actions": []string{"read", "write", "delete", "modify"},
})
}
g8 supports both http.Handle
and http.HandleFunc
patterns:
package main
import (
"net/http"
"github.com/TwiN/g8/v3"
)
// Custom handler implementing http.Handler interface
type CustomHandler struct {
message string
}
func (h *CustomHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
w.Write([]byte(h.message))
}
func main() {
gate := g8.New().WithAuthorizationService(
g8.NewAuthorizationService().WithToken("my-token"),
)
mux := http.NewServeMux()
// Using http.Handle with gate.Protect
customHandler := &CustomHandler{message: "Hello from custom handler"}
mux.Handle("/custom", gate.Protect(customHandler))
// Using http.HandleFunc with gate.ProtectFunc
mux.HandleFunc("/function", gate.ProtectFunc(func(w http.ResponseWriter, r *http.Request) {
w.Write([]byte("Hello from handler function"))
}))
// Multiple protection levels
mux.Handle("/admin", gate.ProtectWithPermissions(customHandler, []string{"admin"}))
mux.HandleFunc("/user", gate.ProtectFuncWithPermission(func(w http.ResponseWriter, r *http.Request) {
w.Write([]byte("User area"))
}, "user"))
http.ListenAndServe(":8080", mux)
}