I'm using PyJWT==1.4.2 to generate tokens that I intend to use for Firebase authentication.
Unfortunately I'm not able to use any of the third-party Python Firebase libraries, and even if I could I had the same difficulty when I tried with FirebaseTokenGenerator.
Inside of my API, I have a function for generating a token for a username.
118 def generate_token(self, username):
119 payload = {
120 'something': 'Here',
121 }
122 secret = "TESTSECRET"
123 token = jwt.encode(
124 payload,
125 secret,
126 algorithm='HS256')
127 return token
An example of a token I get from this function is:
eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJzb21ldGhpbmciOiJIZXJlIn0.fpIMSRJ3AAL30LIDwHJM9ZOumdRzS7yooiiUgMPms2Y
Unfortunately, this is not a valid token. Online resource such as https://jwt.io/ are telling me that the signature portion is invalid.
Not sure if this is further helpful info, but when I try decoding the token I get the following:
b'{"alg":"HS256","typ":"JWT"}{"something"[83 chars]\x88'
Any thoughts on what I might be doing wrong?
For Invalid JWT Signature, check if your service account key has expired. Go to your APIs & Services to add a new key if it has.
By design, anyone can decode a JWT and read the contents of the header and payload sections. But we need access to the secret key used to create the signature to verify a token's integrity.
You should use jwt. verify it will check if the token is expired. jwt. decode should not be used if the source is not trusted as it doesn't check if the token is valid.
That is indeed a valid token, if you go to jwt.io and paste that token and then update the secret used to verify it to be the same you used to generate the token then the tool will indicate that the signature is valid.
By default, jwt.io tries to validate the signature using the HS256 algorithm and the default secret of secret
. You're indeed creating a JWT using the HS256 algorithm so the only thing you need to do to check if it's valid is to update the secret input box to use TESTSECRET
.
Also, the signature component of JWT is raw binary data that may not display correctly if you try to decode it to text. For a bit more on how JWT's work you can check Get Started with JSON Web Tokens.
If you love us? You can donate to us via Paypal or buy me a coffee so we can maintain and grow! Thank you!
Donate Us With