= Documentation for JWT Feature
The jwt feature adds support for JSON API access for all other features
that ship with Rodauth, using JWT (JSON Web Tokens) to hold the
session information. It depends on the json feature.
In order to use this feature, you have to set the +jwt_secret+ configuration
option with the secret used to cryptographically protect the token.
To use this JSON API, when processing responses for requests to a Rodauth
endpoint, check for the Authorization header, and use the value of the
response Authorization header as the request Authorization header in
future requests, if the response Authorization header is set. If the
response Authorization header is not set, then continue to use the
previous Authorization header.
When using this feature, consider using the json: :only option when
loading the rodauth plugin, if you want Rodauth to only handle
JSON requests. If you don't use the json: :only option, the jwt feature
will probably result in an error if a request to a Rodauth endpoint comes
in with a Content-Type that isn't application/json, unless you also set
only_json? false in your rodauth configuration.
If you would like to check if a valid JWT was submitted with the current
request in your Roda app, you can call the +rodauth.valid_jwt?+ method. If
+rodauth.valid_jwt?+ returns true, the contents of the jwt can be retrieved
from +rodauth.session+.
Logging the session out does not invalidate the previous JWT token by default.
If you would like this behavior, you can use the active_sessions feature, which
stores session identifiers in the database and deletes them when the session
expires. This provides a whitelist approach of revoking JWT tokens.
== Auth Value Methods
invalid_jwt_format_error_message :: The error message to use when a JWT with an invalid format is submitted in the Authorization header.
jwt_algorithm :: The JWT algorithm to use, +HS256+ by default.
jwt_authorization_ignore :: A regexp matched against the Authorization header, which skips JWT processing if it matches. By default, HTTP Basic and Digest authentication are ignored.
jwt_authorization_remove :: A regexp to remove from the Authorization header before processing the JWT. By default, a Bearer prefix is removed.
jwt_decode_opts :: An optional hash to pass to +JWT.decode+. Can be used to set JWT verifiers.
jwt_old_secret :: The previous JWT secret used, to support JWT secret rotation (only supported when using jwt 2.4+). Access to this should be protected the same as a session secret.
jwt_secret :: The JWT secret to use. Access to this should be protected the same as a session secret.
jwt_session_key :: A key to nest the session hash under in the JWT payload. nil by default, for no nesting.
jwt_symbolize_deeply? :: Whether to symbolize the session hash deeply. false by default.
use_jwt? :: Whether to use the JWT in the Authorization header for authentication information. If false, falls back to using the rack session. By default, the Authorization header is used if it is present, if +only_json?+ is true, or if the request uses a json content type.
== Auth Methods
jwt_session_hash :: The session hash used to create the session_jwt. Can be used to set JWT claims.
jwt_token :: Retrieve the JWT token from the request, by default taking it from the Authorization header.
session_jwt :: An encoded JWT for the current session.
set_jwt_token(token) :: Set the JWT token in the response, by default storing it in the Authorization header.