Project

jwtf

0.0
No commit activity in last 3 years
No release in over 3 years
JWTF allows you to configure how your JSON Web Token are generated. With JWT you are free to choose from a few (a lot !) of options like the signing algorithm you crave for, the associated secret key and all the reserved claims you wish to use ! JWTF offers you a way to configure most of it for your application, so you can concentrate on the access and policy logic you want to put inside your token.
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
 Dependencies

Development

~> 1.16
~> 5.0
~> 3.4.0
~> 0.11.3
~> 10.0

Runtime

>= 2.2.0, ~> 2.2.0
 Project Readme

Maintainability Test Coverage

JWT Framer

JWTF allows you to configure how your JSON Web Token are generated. With JWT you are free to choose from a few (a lot !) of options like the signing algorithm you crave for, the associated secret key and all the reserved claims you wish to use ! JWTF offers you a way to configure most of it for your application, so you can concentrate on the access and policy logic you want to put inside your token.

Wow ! Jeez WTF this looks so cool ! See below for the documentation.

Dependencies

The token generation itself is delegated to the ruby JWT gem from its version 2.1.0.

Installation

Add this line to your application's Gemfile:

gem 'jwtf'

And then execute:

$ bundle

Or install it yourself as:

$ gem install jwtf

Usage

Configuration

Everything take place in a classic ruby configuration block :

JWTF.configure do |config|
  # ...
end

In a Rails application you will typicaly use an initializer for this.

Token encryption algorithm

All signing algorithms available within the jwt gem are supported.

JWTF.configure do |config|
  # Specify the algorithm name with an uppercased string as documented in the
  # jwt gem : https://github.com/jwt/ruby-jwt
  # Defaults to 'none'
  config.algorithm = 'HS256'

  # The secret key that will be used to encrypt the generated tokens
  # Required for algorithms different than 'none'
  config.secret = 'much secret'
end

TODO Implement usage and tests for HMAC other than 256, RSASSA, ECDSA

Dynamic payload

To get a JWT you have to call JWTF.generate, that's the only public method available. Thanks to this JWTF is a convenient extension for authentication solution like Doorkeeper.

The JWTF.generate method (which accepts arguments) dispatch the call to the block given to config.token_payload.

For instance, if you want your JWT payload to be a two fields JSON object : the ID of the user and a boolean which acknowledge if he is an admin or not :

{
  "uid": 1234,
  "admin": false
}

Into the configuration file, implement the dynamic payload creation :

JWTF.configure do |config|
  config.token_payload do |params|
    user = User.find(params[:user_id]

    # return the hash that will be converted into the token JSON payload
    {
      uid: params[:user_id],
      admin: user.is_admin?
    }
  end
end

Then just make such a call to get a new JWT :

JWTF.generate(user_id: 1234)

Reserved claims

Issued At (iat)

Ensuring the presence of iat claim into your JWT payload :

JWTF.configure do |config|
  # When this is true, the "iat" field will be added in the token payload on
  # its creation. The value will be the JWT creation date (a UNIX timestamp)
  # Default to false
  config.use_iat_claim = true
end
Expiration time (exp)

You can give a validity time to your JWT :

JWTF.configure do |config|
  # When exp_period is set, the "exp" field will be added to the tokens'
  # payload. The JWT will then be valid for the whole period of time specified in
  # the exp_period hash.
  config.exp_period = { weeks: 5, hours: 3, ... }
end

Period symbols listed below can be used (all singular forms are also available) :

:seconds
:minutes
:hours
:days
:weeks
:months
:years

Development

After checking out the repo, run bin/setup to install dependencies. Then, run rake test to run the tests. You can also run bin/console for an interactive prompt that will allow you to experiment.

To install this gem onto your local machine, run bundle exec rake install. To release a new version, update the version number in version.rb, and then run bundle exec rake release, which will create a git tag for the version, push git commits and tags, and push the .gem file to rubygems.org.

Contributing

Bug reports and pull requests are welcome on GitHub at https://github.com/brindu/jwtf. This project is intended to be a safe, welcoming space for collaboration, and contributors are expected to adhere to the Contributor Covenant code of conduct.

License

The gem is available as open source under the terms of the MIT License.