jwt: JSON Web Token (JWT) decoding and encoding

[ library, mit, web ] [ Propose Tags ]

JSON Web Token (JWT) is a compact URL-safe means of representing claims to be transferred between two parties.

To get started, see the documentation for the Web.JWT module.


[Skip to Readme]
Versions [RSS] [faq] 0.1.0, 0.1.1, 0.2.0, 0.2.1, 0.3.0, 0.4.0, 0.4.1, 0.4.2, 0.4.3, 0.4.4, 0.5.0, 0.5.1, 0.5.2, 0.5.3, 0.6.0, 0.7.0, 0.7.1, 0.7.2, 0.8.0, 0.9.0, 0.10.0
Change log CHANGELOG.md
Dependencies aeson (>=0.7), base (>=4.8 && <4.11), bytestring (>=0.10), containers (>=0.5), cryptonite (>=0.6), HsOpenSSL, http-types (>=0.8), memory (>=0.8), network-uri, RSA, scientific (>=0.2), semigroups (>=0.15.4), text (>=0.11), time (>=1.1), unordered-containers (>=0.2), vector (>=0.7.1) [details]
License MIT
Author Stefan Saasen
Maintainer stefan@saasen.me
Revised Revision 1 made by GeorgeWilson at 2018-05-08T01:38:24Z
Category Web
Home page https://bitbucket.org/ssaasen/haskell-jwt
Bug tracker https://bitbucket.org/ssaasen/haskell-jwt/issues
Source repo head: git clone https://ssaasen@bitbucket.org/ssaasen/haskell-jwt.git
Uploaded by StefanSaasen at 2018-04-16T07:52:56Z
Distributions Debian:0.7.2, LTSHaskell:0.10.0, NixOS:0.10.0, Stackage:0.10.0
Downloads 19591 total (182 in the last 30 days)
Rating 1.25 (votes: 1) [estimated by Bayesian average]
Your Rating
  • λ
  • λ
  • λ
Status Hackage Matrix CI
Docs available [build log]
Last success reported on 2018-04-16 [all 1 reports]

Modules

[Index]

Downloads

Note: This package has metadata revisions in the cabal description newer than included in the tarball. To unpack the package including the revisions, use 'cabal get'.

Maintainer's Corner

For package maintainers and hackage trustees

Candidates


Readme for jwt-0.8.0

[back to package description]

Haskell JSON Web Token (JWT)

JSON Web Token (JWT) is a compact URL-safe means of representing claims to be transferred between two parties.

From http://self-issued.info/docs/draft-ietf-oauth-json-web-token.html

JSON Web Token (JWT) is a compact URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JavaScript Object Notation (JSON) object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or MACed and/or encrypted.

See the Web.JWT module documentation to get started.

BuildStatus