JSON Web Tokens
Project description
jot is a Python implementation of the draft [JSON Web Token (JWT)](http://tools.ietf.org/html/draft-jones-json-web-token-07) specification.
It supports signing through the draft [JWS](http://tools.ietf.org/html/draft-jones-json-web-signature-04) specification. Only HMAC SHA-256/384/512 are supported as of yet.
It will eventually support encryption through JWE, following a similar API.
Plaintext JWT
Plaintext JWTs are neither signed nor encrypted and take a JSON-compatible object as the sole argument.
>>> from jot import jwt >>> msg = jwt.encode({'status': 'ready'}) >>> msg 'eyJhbGciOiJub25lIiwidHlwIjoiSldUIn0.eyJzdGF0dXMiOiJyZWFkeSJ9.' >>> jwt.decode(msg) {'headers': {u'alg': u'none', u'typ': u'JWT'}, 'valid': True, 'payload': {u'status': u'ready'}}
Signed JWT (JWS)
For encoding, you need to provide an object representing your desired algorithm along with a key and, optionally, a key id for the header.
>>> from jot import jwt, jws >>> msg = jwt.encode({'status': 'ready'}, signer=jws.HmacSha( bits=256, key='verysecret', key_id='client1')) >>> msg 'eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCIsImtpZCI6ImNsaWVudDEifQ.eyJzdGF0dXM iOiJyZWFkeSJ9.DcKKQXXUjGP7pape8BgQ3AcQSPH8toWFLY2woIVUZ-w'
To decode and verify, you must pass a signer object for every possible expected algorithm. This may only be one. You can pass a key directly to the signer object if you expect only a particular one:
>>> jwt.decode(msg, signers=[jws.HmacSha(bits=256, key='verysecret')]) {'headers': {u'alg': u'HS256', u'typ': u'JWT', u'kid': u'client1'}, 'valid': True, 'payload': {u'status': u'ready'}}
If you expect any of several keys, you can pass a dictionary of key_id -> key mappings. decode() will use the ‘kid’ (key id) header to choose the correct one.
>>> jwt.decode(msg, signers=[jws.HmacSha(bits=256, keydict={'client1': 'verysecret', 'client2': 'evensecreter'})]) {'headers': {u'alg': u'HS256', u'typ': u'JWT', u'kid': u'client1'}, 'valid': True, 'payload': {u'status': u'ready'}}
An invalid key, or a key id not being found in the key dictionary, will flip the ‘valid’ attribute to False:
>>> jwt.decode(msg, signers=[jws.HmacSha(bits=256, keydict={'client1': 'notverysecret', 'client2': 'evensecreter'})]) {'headers': {u'alg': u'HS256', u'typ': u'JWT', u'kid': u'client1'}, 'valid': False, 'payload': {u'status': u'ready'}} >>> jwt.decode(msg, signers=[jws.HmacSha(bits=256, keydict={'client10': 'verysecret', 'client2': 'evensecreter'})]) {'headers': {u'alg': u'HS256', u'typ': u'JWT', u'kid': u'client1'}, 'valid': False, 'payload': {u'status': u'ready'}}
The headers and payload should not be trusted if valid is False, but they are provided for informational purposes.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
File details
Details for the file jot-0.2.tar.gz
.
File metadata
- Download URL: jot-0.2.tar.gz
- Upload date:
- Size: 5.2 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 6a433c5d9337c47967df441db4b54d3cec6f1a0456887d2258572fcf86e7136c |
|
MD5 | 2b471d61915d01388f2a055081edec20 |
|
BLAKE2b-256 | a6f3e514043df7898ce60dcf3b35c2a4bbf7b53b40673cf3910701a950e3ff86 |