Ring middleware for parsing, decoding and verifying a JWS-signed JWT token from the incoming request.
Built on top of the excellent auth0 JWT library.
Once wired into to your ring server, the middleware will:
:claims
key on the incoming request.:claims
map to the request if no token is found.401
if the JWS signature in the token cannot be verified.401
if the token has expired (i.e. the exp claim indicates a time
in the past)401
if the token will only be active in the future (i.e. the nbf claim indicates
a time in the future)Note that there is the option to specify a leeway for the exp
/nbf
checks - see usage below.
[ovotech/ring-jwt "1.3.0"]
(require '[ring.middleware.jwt :as jwt])
(defn handler [request]
(response {:foo "bar"}))
(jwt/wrap-jwt handler {:issuers {"https://some/issuer" {:alg :HS256
:secret "asecret"}
"https://another/issuer" {:alg :RS256
:jwks-endpoint "https://some/jwks/endpoint"}}})
Options:
:issuers
(mandatory): A map of issuer->cryptographic algorithm configuration. When receiving a JWT token, the middleware
will pull the issuer from the iss
claim and use it to lookup the appropriate algorithm in the middleware configuration to verify
the JWT. (So, the iss
claim is implicitly only "trusted" if verification succeeds.):find-token-fn
(optional): A single-argument function that will be used to pull the (encoded) token from the request map. If unspecified
the token will be sought from the bearer token given in the Authorization
header (i.e. an Authorization
HTTP header of the form "Bearer TOKEN")Depending upon the cryptographic algorithm, a different map of options will be required. Note that, at the point your ring middleware is wired up, ring-jwt will throw an error if it detects that the given options are invalid.
Currently the following JWA algorithms are supported for the purposes of JWS:
Algorithm | Options |
---|---|
ECDSA using P-256 and SHA-256 | {:alg :ES256 :public-key public-key} [1] |
RSASSA-PKCS-v1_5 using SHA-256 | {:alg :RS256 :public-key public-key} [1] |
{:alg :RS256 :jwk-endpoint "https://your/jwk/endpoint"} | |
HMAC using SHA-256 | {:alg :HS256 :secret "your-secret"} |
[1] public-key
is of type java.security.PublicKey
.
Additionally, the following options are supported for all issuers:
leeway-seconds
: The number of seconds leeway to give when verifying the expiry/active from claims
of the token (i.e. the exp
and nbf
claims).Keys for use with Integrant or Duct are available in ovotech/duct.middleware.ring-jwt.
Copyright © 2018 Ovo Energy Ltd.
Distributed under the Eclipse Public License, the same as Clojure.
Can you improve this documentation? These fine people already did:
Alistair Dutton, Oliver Boyle, Jacek Schæ & Newton BeckEdit on GitHub
cljdoc is a website building & hosting documentation for Clojure/Script libraries
× close