You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: README.md
+18-11
Original file line number
Diff line number
Diff line change
@@ -27,16 +27,21 @@ $ npm install jsonwebtoken
27
27
28
28
(Synchronous) Returns the JsonWebToken as string
29
29
30
-
`payload` could be an object literal, buffer or string representing valid JSON. *Please note that*`exp` or any other claim is only set if the payload is an object literal. Buffer or string payloads are not checked for JSON validity.
30
+
`payload` could be an object literal, buffer or string representing valid JSON.
31
+
> **Please _note_ that**`exp` or any other claim is only set if the payload is an object literal. Buffer or string payloads are not checked for JSON validity.
32
+
33
+
> If `payload` is not a buffer or a string, it will be coerced into a string using `JSON.stringify`.
31
34
32
35
`secretOrPrivateKey` is a string, buffer, or object containing either the secret for HMAC algorithms or the PEM
33
36
encoded private key for RSA and ECDSA. In case of a private key with passphrase an object `{ key, passphrase }` can be used (based on [crypto documentation](https://nodejs.org/api/crypto.html#crypto_sign_sign_private_key_output_format)), in this case be sure you pass the `algorithm` option.
34
37
35
38
`options`:
36
39
37
40
*`algorithm` (default: `HS256`)
38
-
*`expiresIn`: expressed in seconds or a string describing a time span [zeit/ms](https://github.com/zeit/ms). Eg: `60`, `"2 days"`, `"10h"`, `"7d"`. A numeric value is interpreted as a seconds count. If you use a string be sure you provide the time units (days, hours, etc), otherwise milliseconds unit is used by default (`"120"` is equal to `"120ms"`).
39
-
*`notBefore`: expressed in seconds or a string describing a time span [zeit/ms](https://github.com/zeit/ms). Eg: `60`, `"2 days"`, `"10h"`, `"7d"`. A numeric value is interpreted as a seconds count. If you use a string be sure you provide the time units (days, hours, etc), otherwise milliseconds unit is used by default (`"120"` is equal to `"120ms"`).
41
+
*`expiresIn`: expressed in seconds or a string describing a time span [zeit/ms](https://github.com/zeit/ms).
42
+
> Eg: `60`, `"2 days"`, `"10h"`, `"7d"`. A numeric value is interpreted as a seconds count. If you use a string be sure you provide the time units (days, hours, etc), otherwise milliseconds unit is used by default (`"120"` is equal to `"120ms"`).
43
+
*`notBefore`: expressed in seconds or a string describing a time span [zeit/ms](https://github.com/zeit/ms).
44
+
> Eg: `60`, `"2 days"`, `"10h"`, `"7d"`. A numeric value is interpreted as a seconds count. If you use a string be sure you provide the time units (days, hours, etc), otherwise milliseconds unit is used by default (`"120"` is equal to `"120ms"`).
40
45
*`audience`
41
46
*`issuer`
42
47
*`jwtid`
@@ -46,9 +51,9 @@ encoded private key for RSA and ECDSA. In case of a private key with passphrase
46
51
*`keyid`
47
52
*`mutatePayload`: if true, the sign function will modify the payload object directly. This is useful if you need a raw reference to the payload after claims have been applied to it but before it has been encoded into a token.
48
53
49
-
If `payload` is not a buffer or a string, it will be coerced into a string using `JSON.stringify`.
50
54
51
-
There are no default values for `expiresIn`, `notBefore`, `audience`, `subject`, `issuer`. These claims can also be provided in the payload directly with `exp`, `nbf`, `aud`, `sub` and `iss` respectively, but you can't include in both places.
55
+
56
+
> There are no default values for `expiresIn`, `notBefore`, `audience`, `subject`, `issuer`. These claims can also be provided in the payload directly with `exp`, `nbf`, `aud`, `sub` and `iss` respectively, but you **_can't_** include in both places.
52
57
53
58
Remember that `exp`, `nbf` and `iat` are **NumericDate**, see related [Token Expiration (exp claim)](#token-expiration-exp-claim)
54
59
@@ -57,14 +62,14 @@ The header can be customized via the `options.header` object.
57
62
58
63
Generated jwts will include an `iat` (issued at) claim by default unless `noTimestamp` is specified. If `iat` is inserted in the payload, it will be used instead of the real timestamp for calculating other things like `exp` given a timespan in `options.expiresIn`.
59
64
60
-
Sign with default (HMAC SHA256)
65
+
Synchronous Sign with default (HMAC SHA256)
61
66
62
67
```js
63
68
var jwt =require('jsonwebtoken');
64
69
var token =jwt.sign({ foo:'bar' }, 'shhhhh');
65
70
```
66
71
67
-
Sign with RSA SHA256
72
+
Synchronous Sign with RSA SHA256
68
73
```js
69
74
// sign with RSA SHA256
70
75
var cert =fs.readFileSync('private.key');
@@ -131,13 +136,15 @@ As mentioned in [this comment](https://github.com/auth0/node-jsonwebtoken/issues
131
136
`options`
132
137
133
138
*`algorithms`: List of strings with the names of the allowed algorithms. For instance, `["HS256", "HS384"]`.
134
-
*`audience`: if you want to check audience (`aud`), provide a value here. The audience can be checked against a string, a regular expression or a list of strings and/or regular expressions. Eg: `"urn:foo"`, `/urn:f[o]{2}/`, `[/urn:f[o]{2}/, "urn:bar"]`
139
+
*`audience`: if you want to check audience (`aud`), provide a value here. The audience can be checked against a string, a regular expression or a list of strings and/or regular expressions.
*`issuer` (optional): string or array of strings of valid values for the `iss` field.
136
142
*`ignoreExpiration`: if `true` do not validate the expiration of the token.
137
143
*`ignoreNotBefore`...
138
144
*`subject`: if you want to check subject (`sub`), provide a value here
139
145
*`clockTolerance`: number of seconds to tolerate when checking the `nbf` and `exp` claims, to deal with small clock differences among different servers
140
-
*`maxAge`: the maximum allowed age for tokens to still be valid. It is expressed in seconds or a string describing a time span [zeit/ms](https://github.com/zeit/ms). Eg: `1000`, `"2 days"`, `"10h"`, `"7d"`. A numeric value is interpreted as a seconds count. If you use a string be sure you provide the time units (days, hours, etc), otherwise milliseconds unit is used by default (`"120"` is equal to `"120ms"`).
146
+
*`maxAge`: the maximum allowed age for tokens to still be valid. It is expressed in seconds or a string describing a time span [zeit/ms](https://github.com/zeit/ms).
147
+
> Eg: `1000`, `"2 days"`, `"10h"`, `"7d"`. A numeric value is interpreted as a seconds count. If you use a string be sure you provide the time units (days, hours, etc), otherwise milliseconds unit is used by default (`"120"` is equal to `"120ms"`).
141
148
*`clockTimestamp`: the time in seconds that should be used as the current time for all necessary comparisons.
(Synchronous) Returns the decoded payload without verifying if the signature is valid.
225
232
226
-
__Warning:__ This will __not__ verify whether the signature is valid. You should __not__ use this for untrusted messages. You most likely want to use `jwt.verify` instead.
233
+
> __Warning:__ This will __not__ verify whether the signature is valid. You should __not__ use this for untrusted messages. You most likely want to use `jwt.verify` instead.
227
234
228
235
`token` is the JsonWebToken string
229
236
@@ -341,7 +348,7 @@ none | No digital signature or MAC value included
341
348
342
349
## Refreshing JWTs
343
350
344
-
First of all, we recommend to think carefully if auto-refreshing a JWT will not introduce any vulnerability in your system.
351
+
First of all, we recommend you to think carefully if auto-refreshing a JWT will not introduce any vulnerability in your system.
345
352
346
353
We are not comfortable including this as part of the library, however, you can take a look at [this example](https://gist.github.com/ziluvatar/a3feb505c4c0ec37059054537b38fc48) to show how this could be accomplished.
347
354
Apart from that example there are [an issue](https://github.com/auth0/node-jsonwebtoken/issues/122) and [a pull request](https://github.com/auth0/node-jsonwebtoken/pull/172) to get more knowledge about this topic.
0 commit comments