line |
stmt |
bran |
cond |
sub |
pod |
time |
code |
1
|
5
|
|
|
5
|
|
3857073
|
use strict; |
|
5
|
|
|
|
|
30
|
|
|
5
|
|
|
|
|
137
|
|
2
|
5
|
|
|
5
|
|
24
|
use warnings; |
|
5
|
|
|
|
|
7
|
|
|
5
|
|
|
|
|
209
|
|
3
|
|
|
|
|
|
|
package Dancer2::Plugin::JWT; |
4
|
|
|
|
|
|
|
# ABSTRACT: JSON Web Token made simple for Dancer2 |
5
|
|
|
|
|
|
|
$Dancer2::Plugin::JWT::VERSION = '0.020'; |
6
|
|
|
|
|
|
|
# VERSION: generated by DZP::OurPkgVersion |
7
|
|
|
|
|
|
|
|
8
|
5
|
|
|
5
|
|
2691
|
use Dancer2::Plugin; |
|
5
|
|
|
|
|
59319
|
|
|
5
|
|
|
|
|
35
|
|
9
|
5
|
|
|
5
|
|
15332
|
use Crypt::JWT qw(encode_jwt decode_jwt); |
|
5
|
|
|
|
|
48013
|
|
|
5
|
|
|
|
|
274
|
|
10
|
5
|
|
|
5
|
|
31
|
use URI; |
|
5
|
|
|
|
|
9
|
|
|
5
|
|
|
|
|
133
|
|
11
|
5
|
|
|
5
|
|
2476
|
use URI::QueryParam; |
|
5
|
|
|
|
|
3477
|
|
|
5
|
|
|
|
|
7471
|
|
12
|
|
|
|
|
|
|
|
13
|
|
|
|
|
|
|
register_hook qw(jwt_exception); |
14
|
|
|
|
|
|
|
|
15
|
|
|
|
|
|
|
my $fourWeeks = 4 * 24 * 60 * 60; |
16
|
|
|
|
|
|
|
my $DEFAULT_SET_AUTHORIZATION_HEADER = 1; |
17
|
|
|
|
|
|
|
my $DEFAULT_EXPOSE_AUTHORIZATION_HEADER = 1; |
18
|
|
|
|
|
|
|
my $DEFAULT_SET_COOKIE_HEADER = 1; |
19
|
|
|
|
|
|
|
my $DEFAULT_SET_LOCATION_HEADER = 1; |
20
|
|
|
|
|
|
|
|
21
|
|
|
|
|
|
|
my $secret; |
22
|
|
|
|
|
|
|
my $alg; |
23
|
|
|
|
|
|
|
my $enc; |
24
|
|
|
|
|
|
|
my $need_iat = undef; |
25
|
|
|
|
|
|
|
my $need_nbf = undef; |
26
|
|
|
|
|
|
|
my $need_exp = undef; |
27
|
|
|
|
|
|
|
my $need_leeway = undef; |
28
|
|
|
|
|
|
|
my $cookie_domain = undef; |
29
|
|
|
|
|
|
|
my $set_authorization_header = undef; |
30
|
|
|
|
|
|
|
my $expose_authorization_header = undef; |
31
|
|
|
|
|
|
|
my $set_cookie_header = undef; |
32
|
|
|
|
|
|
|
my $set_location_header = undef; |
33
|
|
|
|
|
|
|
|
34
|
|
|
|
|
|
|
register jwt => sub { |
35
|
14
|
|
|
14
|
|
1584
|
my $dsl = shift; |
36
|
14
|
|
|
|
|
35
|
my @args = @_; |
37
|
|
|
|
|
|
|
|
38
|
14
|
100
|
|
|
|
51
|
if (@args) { |
39
|
8
|
|
|
|
|
88
|
$dsl->app->request->var(jwt => $args[0]); |
40
|
|
|
|
|
|
|
} |
41
|
|
|
|
|
|
|
else { |
42
|
6
|
100
|
|
|
|
53
|
if ($dsl->app->request->var('jwt_status') eq "missing") { |
43
|
3
|
|
|
|
|
83
|
$dsl->app->execute_hook('plugin.jwt.jwt_exception' => 'No JWT is present'); |
44
|
|
|
|
|
|
|
} |
45
|
|
|
|
|
|
|
} |
46
|
14
|
|
100
|
|
|
669
|
return $dsl->app->request->var('jwt') || undef; |
47
|
|
|
|
|
|
|
}; |
48
|
|
|
|
|
|
|
|
49
|
|
|
|
|
|
|
on_plugin_import { |
50
|
|
|
|
|
|
|
my $dsl = shift; |
51
|
|
|
|
|
|
|
|
52
|
|
|
|
|
|
|
my $config = plugin_setting; |
53
|
|
|
|
|
|
|
die "JWT cannot be used without a secret!" unless (exists $config->{secret} && defined $config->{secret}); |
54
|
|
|
|
|
|
|
# For RSA and ES algorithms - path to keyfile or JWK string, others algorithms - just secret string |
55
|
|
|
|
|
|
|
$secret = $config->{secret}; |
56
|
|
|
|
|
|
|
|
57
|
|
|
|
|
|
|
$cookie_domain = $config->{cookie_domain}; |
58
|
|
|
|
|
|
|
$set_authorization_header = defined $config->{set_authorization_header} |
59
|
|
|
|
|
|
|
? $config->{set_authorization_header} : $DEFAULT_SET_AUTHORIZATION_HEADER; |
60
|
|
|
|
|
|
|
$expose_authorization_header = defined $config->{expose_authorization_header} |
61
|
|
|
|
|
|
|
? $config->{expose_authorization_header} : $DEFAULT_EXPOSE_AUTHORIZATION_HEADER; |
62
|
|
|
|
|
|
|
$set_cookie_header = defined $config->{set_cookie_header} |
63
|
|
|
|
|
|
|
? $config->{set_cookie_header} : $DEFAULT_SET_COOKIE_HEADER; |
64
|
|
|
|
|
|
|
$set_location_header = defined $config->{set_location_header} |
65
|
|
|
|
|
|
|
? $config->{set_location_header} : $DEFAULT_SET_LOCATION_HEADER; |
66
|
|
|
|
|
|
|
|
67
|
|
|
|
|
|
|
$alg = 'HS256'; |
68
|
|
|
|
|
|
|
|
69
|
|
|
|
|
|
|
if ( exists $config->{alg} && defined $config->{alg} ) { |
70
|
|
|
|
|
|
|
my $need_enc = undef; |
71
|
|
|
|
|
|
|
my $need_key = undef; |
72
|
|
|
|
|
|
|
|
73
|
|
|
|
|
|
|
if ( $config->{alg} =~ /^([EHPR])S(256|384|512)$/ ) { |
74
|
|
|
|
|
|
|
my $type = $1; |
75
|
|
|
|
|
|
|
|
76
|
|
|
|
|
|
|
if ( $type eq 'P' || $type eq 'R' ) { |
77
|
|
|
|
|
|
|
$need_key = 1; |
78
|
|
|
|
|
|
|
} elsif ( $type eq 'E' ) { |
79
|
|
|
|
|
|
|
$need_key = 2; |
80
|
|
|
|
|
|
|
} |
81
|
|
|
|
|
|
|
|
82
|
|
|
|
|
|
|
$alg = $config->{alg}; |
83
|
|
|
|
|
|
|
} elsif ( $config->{alg} =~ /^A(128|192|256)(GCM)?KW$/ ) { |
84
|
|
|
|
|
|
|
my $len = $1; |
85
|
|
|
|
|
|
|
|
86
|
|
|
|
|
|
|
if ( ( length( unpack( "H*", $secret ) ) * 4 ) != $len ) { |
87
|
|
|
|
|
|
|
die "Secret key length must be equal " . $len / 8 . " bytes for selected algoritm"; |
88
|
|
|
|
|
|
|
} |
89
|
|
|
|
|
|
|
|
90
|
|
|
|
|
|
|
$alg = $config->{alg}; |
91
|
|
|
|
|
|
|
$need_enc = 1; |
92
|
|
|
|
|
|
|
} elsif ( $config->{alg} =~ /^PBES2-HS(256|384|512)\+A(128|192|256)KW$/ ) { |
93
|
|
|
|
|
|
|
my $hs = $1; |
94
|
|
|
|
|
|
|
my $a = $2; |
95
|
|
|
|
|
|
|
|
96
|
|
|
|
|
|
|
if ( ( ( $a * 2 ) - $hs ) != 0 ) { |
97
|
|
|
|
|
|
|
die "Incompatible A and HS values"; |
98
|
|
|
|
|
|
|
} |
99
|
|
|
|
|
|
|
|
100
|
|
|
|
|
|
|
$alg = $config->{alg}; |
101
|
|
|
|
|
|
|
$need_enc = 1; |
102
|
|
|
|
|
|
|
} elsif ( $config->{alg} =~ /^RSA((-OAEP(-265)?)|1_5)$/ ) { |
103
|
|
|
|
|
|
|
$alg = $config->{alg}; |
104
|
|
|
|
|
|
|
$need_enc = 1; |
105
|
|
|
|
|
|
|
$need_key = 1; |
106
|
|
|
|
|
|
|
} elsif ( $config->{alg} =~ /^ECDH-ES(\+A(128|192|256)KW)?$/ ) { |
107
|
|
|
|
|
|
|
$alg = $config->{alg}; |
108
|
|
|
|
|
|
|
$need_enc = 1; |
109
|
|
|
|
|
|
|
$need_key = 2; |
110
|
|
|
|
|
|
|
} else { |
111
|
|
|
|
|
|
|
die "Unknown algoritm"; |
112
|
|
|
|
|
|
|
} |
113
|
|
|
|
|
|
|
|
114
|
|
|
|
|
|
|
if ( $need_enc ) { |
115
|
|
|
|
|
|
|
unless ( exists $config->{enc} && defined $config->{enc} ) { |
116
|
|
|
|
|
|
|
die "JWE cannot be used with empty encryption method"; |
117
|
|
|
|
|
|
|
} |
118
|
|
|
|
|
|
|
|
119
|
|
|
|
|
|
|
if ( $config->{enc} =~ /^A(128|192|256)GCM$/ ) { |
120
|
|
|
|
|
|
|
$enc = $config->{enc}; |
121
|
|
|
|
|
|
|
} elsif ( $config->{enc} =~ /^A(128|192|256)CBC-HS(256|384|512)$/ ) { |
122
|
|
|
|
|
|
|
my $a = $1; |
123
|
|
|
|
|
|
|
my $hs = $2; |
124
|
|
|
|
|
|
|
|
125
|
|
|
|
|
|
|
if ( ( ( $a * 2 ) - $hs ) != 0 ) { |
126
|
|
|
|
|
|
|
die "Incompatible A and HS values"; |
127
|
|
|
|
|
|
|
} |
128
|
|
|
|
|
|
|
|
129
|
|
|
|
|
|
|
$enc = $config->{enc}; |
130
|
|
|
|
|
|
|
} |
131
|
|
|
|
|
|
|
} |
132
|
|
|
|
|
|
|
|
133
|
|
|
|
|
|
|
if ( defined $need_key ) { |
134
|
|
|
|
|
|
|
if ( $need_key eq 1 ) { |
135
|
|
|
|
|
|
|
# TODO: add code to handle RSA keys or parse JWK hash string: |
136
|
|
|
|
|
|
|
##instance of Crypt::PK::RSA |
137
|
|
|
|
|
|
|
#my $data = decode_jwt(token=>$t, key=>Crypt::PK::RSA->new('keyfile.pem')); |
138
|
|
|
|
|
|
|
# |
139
|
|
|
|
|
|
|
##instance of Crypt::X509 (public key only) |
140
|
|
|
|
|
|
|
#my $data = decode_jwt(token=>$t, key=>Crypt::X509->new(cert=>$cert)); |
141
|
|
|
|
|
|
|
# |
142
|
|
|
|
|
|
|
##instance of Crypt::OpenSSL::X509 (public key only) |
143
|
|
|
|
|
|
|
#my $data = decode_jwt(token=>$t, key=>Crypt::OpenSSL::X509->new_from_file('cert.pem')); |
144
|
|
|
|
|
|
|
} elsif ( $need_key eq 2 ) { |
145
|
|
|
|
|
|
|
# TODO: add code to handle ECC keys or parse JWK hash string: |
146
|
|
|
|
|
|
|
#instance of Crypt::PK::ECC |
147
|
|
|
|
|
|
|
#my $data = decode_jwt(token=>$t, key=>Crypt::PK::ECC->new('keyfile.pem')); |
148
|
|
|
|
|
|
|
} |
149
|
|
|
|
|
|
|
} |
150
|
|
|
|
|
|
|
} |
151
|
|
|
|
|
|
|
|
152
|
|
|
|
|
|
|
if ( exists $config->{need_iat} && defined $config->{need_iat} ) { |
153
|
|
|
|
|
|
|
$need_iat = $config->{need_iat}; |
154
|
|
|
|
|
|
|
} |
155
|
|
|
|
|
|
|
|
156
|
|
|
|
|
|
|
if ( exists $config->{need_nbf} && defined $config->{need_nbf} ) { |
157
|
|
|
|
|
|
|
$need_nbf = $config->{need_nbf}; |
158
|
|
|
|
|
|
|
} |
159
|
|
|
|
|
|
|
|
160
|
|
|
|
|
|
|
if ( exists $config->{need_exp} && defined $config->{need_exp} ) { |
161
|
|
|
|
|
|
|
$need_exp = $config->{need_exp}; |
162
|
|
|
|
|
|
|
} |
163
|
|
|
|
|
|
|
|
164
|
|
|
|
|
|
|
if ( exists $config->{need_leeway} && defined $config->{need_leeway} ) { |
165
|
|
|
|
|
|
|
$need_leeway = $config->{need_leeway}; |
166
|
|
|
|
|
|
|
} |
167
|
|
|
|
|
|
|
|
168
|
|
|
|
|
|
|
$dsl->app->add_hook( |
169
|
|
|
|
|
|
|
Dancer2::Core::Hook->new( |
170
|
|
|
|
|
|
|
name => 'before_template_render', |
171
|
|
|
|
|
|
|
code => sub { |
172
|
|
|
|
|
|
|
my $tokens = shift; |
173
|
|
|
|
|
|
|
$tokens->{jwt} = $dsl->app->request->var('jwt'); |
174
|
|
|
|
|
|
|
} |
175
|
|
|
|
|
|
|
) |
176
|
|
|
|
|
|
|
); |
177
|
|
|
|
|
|
|
|
178
|
|
|
|
|
|
|
$dsl->app->add_hook( |
179
|
|
|
|
|
|
|
Dancer2::Core::Hook->new( |
180
|
|
|
|
|
|
|
name => 'after', |
181
|
|
|
|
|
|
|
code => sub { |
182
|
|
|
|
|
|
|
if($expose_authorization_header) { |
183
|
|
|
|
|
|
|
my $response = shift; |
184
|
|
|
|
|
|
|
$response = $response->isa('Dancer2::Core::Response') ? $response : $response->response; |
185
|
|
|
|
|
|
|
$response->push_header('Access-Control-Expose-Headers' => 'Authorization'); |
186
|
|
|
|
|
|
|
} |
187
|
|
|
|
|
|
|
} |
188
|
|
|
|
|
|
|
) |
189
|
|
|
|
|
|
|
); |
190
|
|
|
|
|
|
|
|
191
|
|
|
|
|
|
|
$dsl->app->add_hook( |
192
|
|
|
|
|
|
|
Dancer2::Core::Hook->new( |
193
|
|
|
|
|
|
|
name => 'before', |
194
|
|
|
|
|
|
|
code => sub { |
195
|
|
|
|
|
|
|
my $app = shift; |
196
|
|
|
|
|
|
|
my $encoded = $app->request->headers->authorization; |
197
|
|
|
|
|
|
|
|
198
|
|
|
|
|
|
|
if( defined $encoded ) { |
199
|
|
|
|
|
|
|
# Remove "Bearer " (sic) from the beginning of the Authorization header if present. |
200
|
|
|
|
|
|
|
# "Bearer" signifies the schema and should be present |
201
|
|
|
|
|
|
|
# but due to backwards compatibility we support also without it. |
202
|
|
|
|
|
|
|
# https://jwt.io/introduction/ (How do JSON Web Tokens work?) |
203
|
|
|
|
|
|
|
$encoded =~ m/^ (?: Bearer [[:space:]]{1} | ) (?<token> [^[:space:]]{0,} ) $/msx; |
204
|
|
|
|
|
|
|
$encoded = $+{token}; |
205
|
|
|
|
|
|
|
} |
206
|
|
|
|
|
|
|
|
207
|
|
|
|
|
|
|
if ($app->request->cookies->{_jwt}) { |
208
|
|
|
|
|
|
|
$encoded = $app->request->cookies->{_jwt}->value ; |
209
|
|
|
|
|
|
|
} |
210
|
|
|
|
|
|
|
elsif ($app->request->param('_jwt')) { |
211
|
|
|
|
|
|
|
$encoded = $app->request->param('_jwt'); |
212
|
|
|
|
|
|
|
} |
213
|
|
|
|
|
|
|
|
214
|
|
|
|
|
|
|
if ($encoded) { |
215
|
|
|
|
|
|
|
my $decoded; |
216
|
|
|
|
|
|
|
eval { |
217
|
|
|
|
|
|
|
$decoded = decode_jwt( token => $encoded, |
218
|
|
|
|
|
|
|
key => $secret, |
219
|
|
|
|
|
|
|
verify_iat => $need_iat, |
220
|
|
|
|
|
|
|
verify_nbf => $need_nbf, |
221
|
|
|
|
|
|
|
verify_exp => defined $need_exp ? 1 : 0 , |
222
|
|
|
|
|
|
|
leeway => $need_leeway, |
223
|
|
|
|
|
|
|
accepted_alg => $alg, |
224
|
|
|
|
|
|
|
accepted_enc => $enc ); |
225
|
|
|
|
|
|
|
}; |
226
|
|
|
|
|
|
|
if ($@) { |
227
|
|
|
|
|
|
|
$app->execute_hook('plugin.jwt.jwt_exception' => ($a = $@)); |
228
|
|
|
|
|
|
|
}; |
229
|
|
|
|
|
|
|
$app->request->var('jwt', $decoded); |
230
|
|
|
|
|
|
|
$app->request->var('jwt_status' => 'present'); |
231
|
|
|
|
|
|
|
|
232
|
|
|
|
|
|
|
} |
233
|
|
|
|
|
|
|
else { |
234
|
|
|
|
|
|
|
## no token |
235
|
|
|
|
|
|
|
$app->request->var('jwt_status' => 'missing'); |
236
|
|
|
|
|
|
|
} |
237
|
|
|
|
|
|
|
} |
238
|
|
|
|
|
|
|
) |
239
|
|
|
|
|
|
|
); |
240
|
|
|
|
|
|
|
|
241
|
|
|
|
|
|
|
$dsl->app->add_hook( |
242
|
|
|
|
|
|
|
Dancer2::Core::Hook->new( |
243
|
|
|
|
|
|
|
name => 'after', |
244
|
|
|
|
|
|
|
code => sub { |
245
|
|
|
|
|
|
|
my $response = shift; |
246
|
|
|
|
|
|
|
my $decoded = $dsl->app->request->var('jwt'); |
247
|
|
|
|
|
|
|
if($set_authorization_header || $set_cookie_header || $set_location_header) { |
248
|
|
|
|
|
|
|
# If all are disabled, then skip also encoding! |
249
|
|
|
|
|
|
|
if (defined($decoded)) { |
250
|
|
|
|
|
|
|
my $encoded = encode_jwt( payload => $decoded, |
251
|
|
|
|
|
|
|
key => $secret, |
252
|
|
|
|
|
|
|
alg => $alg, |
253
|
|
|
|
|
|
|
enc => $enc, |
254
|
|
|
|
|
|
|
auto_iat => $need_iat, |
255
|
|
|
|
|
|
|
relative_exp => $need_exp, |
256
|
|
|
|
|
|
|
relative_nbf => $need_nbf ); |
257
|
|
|
|
|
|
|
|
258
|
|
|
|
|
|
|
if($set_authorization_header) { |
259
|
|
|
|
|
|
|
$response->headers->authorization($encoded); |
260
|
|
|
|
|
|
|
} |
261
|
|
|
|
|
|
|
|
262
|
|
|
|
|
|
|
if($set_cookie_header) { |
263
|
|
|
|
|
|
|
my %cookie = ( |
264
|
|
|
|
|
|
|
value => $encoded, |
265
|
|
|
|
|
|
|
name => '_jwt', |
266
|
|
|
|
|
|
|
expires => time + ($need_exp // $fourWeeks), |
267
|
|
|
|
|
|
|
path => '/', |
268
|
|
|
|
|
|
|
http_only => 0); |
269
|
|
|
|
|
|
|
$cookie{domain} = $cookie_domain if defined $cookie_domain; |
270
|
|
|
|
|
|
|
$response->push_header('Set-Cookie' |
271
|
|
|
|
|
|
|
=> Dancer2::Core::Cookie->new(%cookie)->to_header()); |
272
|
|
|
|
|
|
|
} |
273
|
|
|
|
|
|
|
|
274
|
|
|
|
|
|
|
if ($set_location_header && $response->status =~ /^3/) { |
275
|
|
|
|
|
|
|
my $u = URI->new( $response->header("Location") ); |
276
|
|
|
|
|
|
|
$u->query_param( _jwt => $encoded); |
277
|
|
|
|
|
|
|
$response->header(Location => $u); |
278
|
|
|
|
|
|
|
} |
279
|
|
|
|
|
|
|
} |
280
|
|
|
|
|
|
|
} # ! $set_authorization_header && ! $set_cookie_header && ! $set_location_header |
281
|
|
|
|
|
|
|
} |
282
|
|
|
|
|
|
|
) |
283
|
|
|
|
|
|
|
); |
284
|
|
|
|
|
|
|
}; |
285
|
|
|
|
|
|
|
|
286
|
|
|
|
|
|
|
|
287
|
|
|
|
|
|
|
|
288
|
|
|
|
|
|
|
register_plugin; |
289
|
|
|
|
|
|
|
|
290
|
|
|
|
|
|
|
1; |
291
|
|
|
|
|
|
|
|
292
|
|
|
|
|
|
|
=encoding UTF-8 |
293
|
|
|
|
|
|
|
|
294
|
|
|
|
|
|
|
=head1 NAME |
295
|
|
|
|
|
|
|
|
296
|
|
|
|
|
|
|
Dancer2::Plugin::JWT - JSON Web Token made simple for Dancer2 |
297
|
|
|
|
|
|
|
|
298
|
|
|
|
|
|
|
=head1 SYNOPSIS |
299
|
|
|
|
|
|
|
|
300
|
|
|
|
|
|
|
use Dancer2; |
301
|
|
|
|
|
|
|
use Dancer2::Plugin::JWT; |
302
|
|
|
|
|
|
|
|
303
|
|
|
|
|
|
|
post '/login' => sub { |
304
|
|
|
|
|
|
|
if (is_valid(param("username"), param("password"))) { |
305
|
|
|
|
|
|
|
jwt { username => param("username") }; |
306
|
|
|
|
|
|
|
template 'index'; |
307
|
|
|
|
|
|
|
} |
308
|
|
|
|
|
|
|
else { |
309
|
|
|
|
|
|
|
redirect '/'; |
310
|
|
|
|
|
|
|
} |
311
|
|
|
|
|
|
|
}; |
312
|
|
|
|
|
|
|
|
313
|
|
|
|
|
|
|
get '/private' => sub { |
314
|
|
|
|
|
|
|
my $data = jwt; |
315
|
|
|
|
|
|
|
redirect '/ unless exists $data->{username}; |
316
|
|
|
|
|
|
|
|
317
|
|
|
|
|
|
|
... |
318
|
|
|
|
|
|
|
}; |
319
|
|
|
|
|
|
|
|
320
|
|
|
|
|
|
|
hook 'plugin.jwt.jwt_exception' => sub { |
321
|
|
|
|
|
|
|
my $error = shift; |
322
|
|
|
|
|
|
|
# do something |
323
|
|
|
|
|
|
|
}; |
324
|
|
|
|
|
|
|
|
325
|
|
|
|
|
|
|
=head1 DESCRIPTION |
326
|
|
|
|
|
|
|
|
327
|
|
|
|
|
|
|
Registers the C<jwt> keyword that can be used to set or retrieve the payload |
328
|
|
|
|
|
|
|
of a JSON Web Token. |
329
|
|
|
|
|
|
|
|
330
|
|
|
|
|
|
|
To this to work it is required to have a secret defined in your config.yml file: |
331
|
|
|
|
|
|
|
|
332
|
|
|
|
|
|
|
plugins: |
333
|
|
|
|
|
|
|
JWT: |
334
|
|
|
|
|
|
|
secret: "string or path to private RSA/EC key" |
335
|
|
|
|
|
|
|
# default, or others supported by Crypt::JWT |
336
|
|
|
|
|
|
|
alg: HS256 |
337
|
|
|
|
|
|
|
# required only for JWE |
338
|
|
|
|
|
|
|
enc: |
339
|
|
|
|
|
|
|
# add issued at time (iat) field |
340
|
|
|
|
|
|
|
need_iat: 1 |
341
|
|
|
|
|
|
|
# check not before field |
342
|
|
|
|
|
|
|
need_nbf: 1 |
343
|
|
|
|
|
|
|
# in seconds |
344
|
|
|
|
|
|
|
need_exp: 600 |
345
|
|
|
|
|
|
|
# timeshift for expiration |
346
|
|
|
|
|
|
|
need_leeway: 30 |
347
|
|
|
|
|
|
|
# JWT cookie domain, in case you need to override it |
348
|
|
|
|
|
|
|
cookie_domain: my_domain.com |
349
|
|
|
|
|
|
|
# Attach Authorization header to HTTP response |
350
|
|
|
|
|
|
|
set_authorization_header: 0 |
351
|
|
|
|
|
|
|
# Attach 'Access-Control-Expose-Headers: Authorization' header to HTTP response |
352
|
|
|
|
|
|
|
expose_authorization_header: 0 |
353
|
|
|
|
|
|
|
# Attach Set-Cookie header to HTTP response |
354
|
|
|
|
|
|
|
set_cookie_header: 0 |
355
|
|
|
|
|
|
|
# Attach Location header to HTTP response when response is 300-399 |
356
|
|
|
|
|
|
|
# e.g. redirect |
357
|
|
|
|
|
|
|
set_location_header: 0 |
358
|
|
|
|
|
|
|
|
359
|
|
|
|
|
|
|
B<NOTE:> A empty call (without arguments) to jwt will trigger the |
360
|
|
|
|
|
|
|
exception hook if there is no jwt defined. |
361
|
|
|
|
|
|
|
|
362
|
|
|
|
|
|
|
B<NOTE:> If you are using JWT to authenticate an API call to return, e.g. JSON, |
363
|
|
|
|
|
|
|
not a web page to display, be sure to set the config items |
364
|
|
|
|
|
|
|
I<set_authorization_header>, I<expose_authorization_header>, |
365
|
|
|
|
|
|
|
I<set_cookie_header> and I<set_location_header> |
366
|
|
|
|
|
|
|
so you don't return any unnecessary headers. |
367
|
|
|
|
|
|
|
|
368
|
|
|
|
|
|
|
=head1 BUGS |
369
|
|
|
|
|
|
|
|
370
|
|
|
|
|
|
|
I am sure a lot. Please use GitHub issue tracker |
371
|
|
|
|
|
|
|
L<here|https://github.com/ambs/Dancer2-Plugin-JWT/>. |
372
|
|
|
|
|
|
|
|
373
|
|
|
|
|
|
|
=head1 ACKNOWLEDGEMENTS |
374
|
|
|
|
|
|
|
|
375
|
|
|
|
|
|
|
To Lee Johnson for his talk "JWT JWT JWT" in YAPC::EU::2015. |
376
|
|
|
|
|
|
|
|
377
|
|
|
|
|
|
|
To Nuno Carvalho for brainstorming and help with testing. |
378
|
|
|
|
|
|
|
|
379
|
|
|
|
|
|
|
To user2014, thanks for making the module use Crypt::JWT. |
380
|
|
|
|
|
|
|
|
381
|
|
|
|
|
|
|
=head1 COPYRIGHT AND LICENSE |
382
|
|
|
|
|
|
|
|
383
|
|
|
|
|
|
|
Copyright 2015-2018 Alberto Simões, all rights reserved. |
384
|
|
|
|
|
|
|
|
385
|
|
|
|
|
|
|
This module is free software and is published under the same terms as Perl itself. |
386
|
|
|
|
|
|
|
|
387
|
|
|
|
|
|
|
=head1 AUTHOR |
388
|
|
|
|
|
|
|
|
389
|
|
|
|
|
|
|
Alberto Simões C<< <ambs@cpan.org> >> |
390
|
|
|
|
|
|
|
|
391
|
|
|
|
|
|
|
=cut |