Skip to main content

JWTAuth plugin for HTTPie.

Project description

JWTAuth (JSON Web Tokens) auth plugin for HTTPie.

Installation

  • Latest stable version:

$ pip install -U httpie-jwt-auth
  • Latest developing version:

$ pip install -U https://github.com/teracyhq/httpie-jwt-auth/archive/develop.zip

Docker Image

Usage

  • Normal:

    $ http --auth-type=jwt --auth="<token>" example.org -h
    
    GET / HTTP/1.1
    Accept: */*
    Accept-Encoding: gzip, deflate
    Authorization: Token_Prefix abc
    Connection: keep-alive
    Host: example.org
    User-Agent: HTTPie/0.9.7
  • By default, the Bearer prefix auth token is used, you can choose another prefix:

    $ JWT_AUTH_PREFIX=JWT && http --auth-type=jwt --auth="<token>" example.org -h
  • Sometimes you don’t need to expose the JWT token on the command line, you can use the environment variable:

    $ export JWT_AUTH_TOKEN=secret

    And it should work:

    $ http teracy.com --auth-type=jwt -v
    
    GET / HTTP/1.1
    Accept: */*
    Accept-Encoding: gzip, deflate
    Authorization: Bearer secret
    Connection: keep-alive
    Host: teracy.com
    User-Agent: HTTPie/0.9.7

You can combine the usage whatever you like for your cases.

Contributing

Please create pull requests to the develop branch by following http://dev.teracy.org/docs/workflow.html

Developing

We use Docker workflow for development now. To start developing:

$ cd ~/teracy-dev/workspace
$ git clone <your_forked_repo>
$ cd httpie-jwt-auth
$ git remote add upstream git@github.com:teracyhq/httpie-jwt-auth.git
  • SSH into the VM to run commands as following:

$ cd ~/teracy-dev
$ vagrant ssh
$ ws
$ cd httpie-jwt-auth
$ docker-compose up # to test all the supported httpie versions with the most used Python version
$ docker-compose up httpie_latest # to test with the latest httpie version with the most used Python version
$ docker-compose -f docker-compose.yml -f docker-compose.py36.yml up # to test all the supported httpie versions with Python 3.6
  • Register your account at https://travis-ci.org and enable httpie-jwt-auth repo

  • Add the following settings to the travis-ci repo:

    • DOCKER_USER for the user or organization Docker namespace

    • DOCKER_USERNAME for the username of the Docker Hub

    • DOCKER_PASSWORD for the password of the Docker Hub

    • IMG_REPO for the docker repo on your DOCKER_USER account

    • IMG_REPO_PREFIX is optional

    See .travis.yml for details

  • Start creating new Docker images to be shared within our community

FAQs

  1. How to load JWT token from a file?

    $ http --auth-type=jwt --auth="$(cat mytoken.txt)" example.org

    See: https://github.com/teracyhq/httpie-jwt-auth/issues/4

  2. How to use auth prefix other than default Bearer, for example Token_Prefix instead?

    You could use environment variable to specify JWT_AUTH_PREFIX for permanent prefix usage:

    $ export JWT_AUTH_PREFIX=Token_Prefix

    and it should work:

    $ http teracy.com --auth-type=jwt --auth="abc" -v
    
    GET / HTTP/1.1
    Accept: */*
    Accept-Encoding: gzip, deflate
    Authorization: Token_Prefix abc
    Connection: keep-alive
    Host: teracy.com
    User-Agent: HTTPie/0.9.7

    or for one time usage only with the specified jwt auth prefix:

    $ JWT_AUTH_PREFIX=Token_Prefix && http teracy.com --auth-type=jwt --auth="abc" -v
    
    GET / HTTP/1.1
    Accept: */*
    Accept-Encoding: gzip, deflate
    Authorization: Token_Prefix abc
    Connection: keep-alive
    Host: teracy.com
    User-Agent: HTTPie/0.9.7

Discussions

Join us:

Get our news:

Author and contributors

See more details at AUTHORS.md and CONTRIBUTORS.md files.

License

BSD License

Copyright (c) Teracy, Inc. and individual contributors.
All rights reserved.

Redistribution and use in source and binary forms, with or without modification,
are permitted provided that the following conditions are met:

    1. Redistributions of source code must retain the above copyright notice,
       this list of conditions and the following disclaimer.

    2. Redistributions in binary form must reproduce the above copyright
       notice, this list of conditions and the following disclaimer in the
       documentation and/or other materials provided with the distribution.

    3. Neither the name of Teracy, Inc. nor the names of its contributors may be used
       to endorse or promote products derived from this software without
       specific prior written permission.

THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

httpie-jwt-auth-0.3.0.tar.gz (5.0 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

httpie_jwt_auth-0.3.0-py2.py3-none-any.whl (8.3 kB view details)

Uploaded Python 2Python 3

File details

Details for the file httpie-jwt-auth-0.3.0.tar.gz.

File metadata

File hashes

Hashes for httpie-jwt-auth-0.3.0.tar.gz
Algorithm Hash digest
SHA256 49a03ce2285905c21485d2df48b6fa18c990cb4bca1c38a96920e8d35300e5e1
MD5 a68b7ecabb566f425786643742500c11
BLAKE2b-256 f271f94183fe6df24cd4f93d85c431af803af5c8837657c9b0da328d34b422cc

See more details on using hashes here.

File details

Details for the file httpie_jwt_auth-0.3.0-py2.py3-none-any.whl.

File metadata

File hashes

Hashes for httpie_jwt_auth-0.3.0-py2.py3-none-any.whl
Algorithm Hash digest
SHA256 41c38d4c9febae049ca55bc15b926143f8bdfd0815813d14786a5beb3b5fffd1
MD5 b3d3b66ba4badeeebbf1283730f9edfb
BLAKE2b-256 7146a2c3dc6744c8da1922994e56a5e8c8021be4987737d8ec50bbde7e03f057

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page