Skip to content

Commit d6d7c5e

Browse files
jonduboisziluvatar
authored andcommitted
Add a new mutatePayload option (#446)
This option allows you to keep a reference to the raw token payload after claims have been applied to it but before it has been encoded.
1 parent 7b0a010 commit d6d7c5e

File tree

3 files changed

+30
-2
lines changed

3 files changed

+30
-2
lines changed

README.md

+1
Original file line numberDiff line numberDiff line change
@@ -42,6 +42,7 @@ encoded private key for RSA and ECDSA. In case of a private key with passphrase
4242
* `noTimestamp`
4343
* `header`
4444
* `keyid`
45+
* `mutatePayload`: if true, the sign function will modify the payload object directly. This is useful if you need a raw reference to the payload after claims have been applied to it but before it has been encoded into a token.
4546

4647
If `payload` is not a buffer or a string, it will be coerced into a string using `JSON.stringify`.
4748

sign.js

+5-2
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,8 @@ var sign_options_schema = {
2020
subject: { isValid: isString, message: '"subject" must be a string' },
2121
jwtid: { isValid: isString, message: '"jwtid" must be a string' },
2222
noTimestamp: { isValid: isBoolean, message: '"noTimestamp" must be a boolean' },
23-
keyid: { isValid: isString, message: '"keyid" must be a string' }
23+
keyid: { isValid: isString, message: '"keyid" must be a string' },
24+
mutatePayload: { isValid: isBoolean, message: '"mutatePayload" must be a boolean' }
2425
};
2526

2627
var registered_claims_schema = {
@@ -110,7 +111,9 @@ module.exports = function (payload, secretOrPrivateKey, options, callback) {
110111
catch (error) {
111112
return failure(error);
112113
}
113-
payload = xtend(payload);
114+
if (!options.mutatePayload) {
115+
payload = xtend(payload);
116+
}
114117
} else {
115118
var invalid_options = options_for_objects.filter(function (opt) {
116119
return typeof options[opt] !== 'undefined';

test/async_sign.tests.js

+24
Original file line numberDiff line numberDiff line change
@@ -82,6 +82,30 @@ describe('signing a token asynchronously', function() {
8282
});
8383
});
8484

85+
describe('when mutatePayload is not set', function() {
86+
it('should not apply claims to the original payload object (mutatePayload defaults to false)', function(done) {
87+
var originalPayload = { foo: 'bar' };
88+
jwt.sign(originalPayload, 'secret', { notBefore: 60, expiresIn: 600 }, function (err) {
89+
if (err) { return done(err); }
90+
expect(originalPayload).to.not.have.property('nbf');
91+
expect(originalPayload).to.not.have.property('exp');
92+
done();
93+
});
94+
});
95+
});
96+
97+
describe('when mutatePayload is set to true', function() {
98+
it('should apply claims directly to the original payload object', function(done) {
99+
var originalPayload = { foo: 'bar' };
100+
jwt.sign(originalPayload, 'secret', { notBefore: 60, expiresIn: 600, mutatePayload: true }, function (err) {
101+
if (err) { return done(err); }
102+
expect(originalPayload).to.have.property('nbf').that.is.a('number');
103+
expect(originalPayload).to.have.property('exp').that.is.a('number');
104+
done();
105+
});
106+
});
107+
});
108+
85109
describe('secret must have a value', function(){
86110
[undefined, '', 0].forEach(function(secret){
87111
it('should return an error if the secret is falsy and algorithm is not set to none: ' + (typeof secret === 'string' ? '(empty string)' : secret), function(done) {

0 commit comments

Comments
 (0)