Skip to main content

JSON Web Token implementation in Python

Project description

PyJWT [![Build Status](https://travis-ci.org/progrium/pyjwt.png?branch=master)](https://travis-ci.org/progrium/pyjwt)
=====
A Python implementation of [JSON Web Token draft 01](http://self-issued.info/docs/draft-jones-json-web-token-01.html).

Installing
----------

sudo easy_install PyJWT

**Note**: The RSASSA-PKCS1-v1_5 algorithms depend on PyCrypto. If you plan on
using any of those algorithms you'll need to install it as well.

sudo easy_install PyCrypto

Usage
-----

import jwt
jwt.encode({"some": "payload"}, "secret")

Additional headers may also be specified.

jwt.encode({"some": "payload"}, "secret", headers={"kid": "230498151c214b788dd97f22b85410a5"})

Note the resulting JWT will not be encrypted, but verifiable with a secret key.

jwt.decode("someJWTstring", "secret")

If the secret is wrong, it will raise a `jwt.DecodeError` telling you as such.
You can still get the payload by setting the `verify` argument to `False`.

jwt.decode("someJWTstring", verify=False)

Algorithms
----------

The JWT spec supports several algorithms for cryptographic signing. This library
currently supports:

* HS256 - HMAC using SHA-256 hash algorithm (default)
* HS384 - HMAC using SHA-384 hash algorithm
* HS512 - HMAC using SHA-512 hash algorithm
* RS256 - RSASSA-PKCS1-v1_5 signature algorithm using SHA-256 hash algorithm
* RS384 - RSASSA-PKCS1-v1_5 signature algorithm using SHA-384 hash algorithm
* RS512 - RSASSA-PKCS1-v1_5 signature algorithm using SHA-512 hash algorithm

Change the algorithm with by setting it in encode:

jwt.encode({"some": "payload"}, "secret", "HS512")

When using the RSASSA-PKCS1-v1_5 algorithms, the `key` argument in both
`jwt.encode()` and `jwt.decode()` (`"secret"` in the examples) is expected to
be an RSA private key as imported with `Crypto.PublicKey.RSA.importKey()`.

Tests
-----

You can run tests from the project root after cloning with:

python tests/test_jwt.py

Support of reserved claim names
-------------------------------

JSON Web Token defines some reserved claim names and defines how they should be
used. PyJWT supports these reserved claim names:

- "exp" (Expiration Time) Claim

Expiration Time Claim
=====================

From [draft 01 of the JWT spec](http://self-issued.info/docs/draft-jones-json-web-token-01.html#ReservedClaimName):

> The exp (expiration time) claim identifies the expiration time on or after
> which the JWT MUST NOT be accepted for processing. The processing of the exp
> claim requires that the current date/time MUST be before the expiration
> date/time listed in the exp claim. Implementers MAY provide for some small
> leeway, usually no more than a few minutes, to account for clock skew. Its
> value MUST be a number containing an IntDate value. Use of this claim is
> OPTIONAL.

You can pass the expiration time as a UTC UNIX timestamp (an int) or as a
datetime, which will be converted into an int. For example:

jwt.encode({"exp": 1371720939}, "secret")

jwt.encode({"exp": datetime.utcnow()}, "secret")

Expiration time is automatically verified in `jwt.decode()` and raises
`jwt.ExpiredSignature` if the expiration time is in the past:

import jwt
try:
jwt.decode('JWT_STRING', "secret")
except jwt.ExpiredSignature:
# Signature has expired

Expiration time will be compared to the current UTC time (as given by
`timegm(datetime.utcnow().utctimetuple())`), so be sure to use a UTC timestamp
or datetime in encoding.

You can turn off expiration time verification with the `verify_expiration` argument.

PyJWT also supports the leeway part of the expiration time definition, which
means you can validate a expiration time which is in the past but not very far.
For example, if you have a JWT payload with a expiration time set to 30 seconds
after creation but you know that sometimes you will process it after 30 seconds,
you can set a leeway of 10 seconds in order to have some margin:

import jwt, time
jwt_payload = jwt.encode({'exp': datetime.utcnow() + datetime.timedelta(seconds=30)}, 'secret')
time.sleep(32)
# Jwt payload is now expired
# But with some leeway, it will still validate
jwt.decode(jwt_payload, 'secret', leeway=10)


License
-------

MIT

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

PyJWT-0.2.1.tar.gz (6.3 kB view details)

Uploaded Source

Built Distributions

If you're not sure about the file name format, learn more about wheel file names.

PyJWT-0.2.1-py3.3.egg (10.2 kB view details)

Uploaded Egg

PyJWT-0.2.1-py2.7.egg (10.1 kB view details)

Uploaded Egg

PyJWT-0.2.1-py2.6.egg (10.0 kB view details)

Uploaded Egg

File details

Details for the file PyJWT-0.2.1.tar.gz.

File metadata

  • Download URL: PyJWT-0.2.1.tar.gz
  • Upload date:
  • Size: 6.3 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No

File hashes

Hashes for PyJWT-0.2.1.tar.gz
Algorithm Hash digest
SHA256 cfd0fad01a9a57fb4b24e59a82ffd50ddc9c2c4344694ec6ef436ae11d5d18aa
MD5 500fdbdd4c7b60404063f7d9c2717108
BLAKE2b-256 87625b4c0a01692dece7fe9a7403f0fc357852537275f2bd24871bf166b348e4

See more details on using hashes here.

File details

Details for the file PyJWT-0.2.1-py3.3.egg.

File metadata

  • Download URL: PyJWT-0.2.1-py3.3.egg
  • Upload date:
  • Size: 10.2 kB
  • Tags: Egg
  • Uploaded using Trusted Publishing? No

File hashes

Hashes for PyJWT-0.2.1-py3.3.egg
Algorithm Hash digest
SHA256 0d3d78c99748b02ddf3e3c68f076ccf9cf12674a9d63e7f6f417fc3ec99d7f6c
MD5 37b8d5531cc1430b58b7dbfc0bdd92bd
BLAKE2b-256 20ed8e053f743c494aaa189a3a155eba4db250459eba0c1a6f73a73b4377293d

See more details on using hashes here.

File details

Details for the file PyJWT-0.2.1-py2.7.egg.

File metadata

  • Download URL: PyJWT-0.2.1-py2.7.egg
  • Upload date:
  • Size: 10.1 kB
  • Tags: Egg
  • Uploaded using Trusted Publishing? No

File hashes

Hashes for PyJWT-0.2.1-py2.7.egg
Algorithm Hash digest
SHA256 06bdddbb1b817aea9083a2fc005ccf64c03239acf19e93e94ed319f31529f344
MD5 81348527e1adde10df7d25137119ba03
BLAKE2b-256 108c97ddc125d3b19fa4aadc94e24a7937c19f08afe6ebffcea1fe4026f2477a

See more details on using hashes here.

File details

Details for the file PyJWT-0.2.1-py2.6.egg.

File metadata

  • Download URL: PyJWT-0.2.1-py2.6.egg
  • Upload date:
  • Size: 10.0 kB
  • Tags: Egg
  • Uploaded using Trusted Publishing? No

File hashes

Hashes for PyJWT-0.2.1-py2.6.egg
Algorithm Hash digest
SHA256 a84c5af3cb8eda206ea3faa5dae9ed31eebcdf6b779254f22362e5bd0a8c85bd
MD5 56f35a90c050f291ccc208c7b27d0671
BLAKE2b-256 f387a2df3dd148d5d982dc6806628299a7e4f21acb6744fc12b54ee2fe420b58

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page