Benji Brown
Benji Brown
I found that doing: `export GO111MODULE=auto ` then `go get github.com/ava-labs/avash cd $GOPATH/src/github.com/ava-labs/avash go build ` resolved this all
Hi all check out this little test project I made: It could be a nice example? I added famous.js too... because overkill but awesome. https://github.com/theprojectabot/polymer-meteor-famous-views/tree/master
http://stackoverflow.com/questions/37408684/is-it-still-possible-to-do-server-side-verification-of-tokens-in-firebase-3?noredirect=1#comment62518682_37408684 does fireauth not support firebase 3?
looks like the library needs to be changed to support a private key from a Firebase spawned service JSON file https://firebase.google.com/docs/auth/server#use_a_jwt_library Then the fireauth library could use that private key,...
I tried this: ``` ... now := time.Now().Unix() jwtToken := jwt.NewWithClaims(jwt.SigningMethodRS256, jwt.MapClaims{ "iss": serviceAccountEmail, "sub": serviceAccountEmail, "aud": "https://identitytoolkit.googleapis.com/google.identity.identitytoolkit.v1.IdentityToolkit", "iat": now, "exp": now + (60 * 60), // Maximum expiration time...
https://godoc.org/github.com/dgrijalva/jwt-go#example-New--Hmac
I got it to work! ``` signKey, err := jwt.ParseRSAPrivateKeyFromPEM(privateKey) if err != nil { log.Print(err) } token, err = jwtToken.SignedString(signKey) ``` had to make sure that the key I...
@zabawaba99 I didnt need to include the 'kid' in my code. Though I did comment out the claims array in the payload I handed to jwt.NewWithClaims(jwt.SigningMethodRS256, jwt.MapClaims{