Files
httpauth-jwt/CHANGELOG.md
Rene Nochebuena b9a5cc2f92 fix(httpauth-jwt)!: rename package httpauthjwt, bump httpauth and rbac to v1.0.0
Rename package from jwtauth to httpauthjwt to follow ecosystem convention
(repo name = package name, hyphens removed). Bump httpauth dependency from
v0.1.0 to v1.0.0 and rbac indirect dependency from v0.9.0 to v1.0.0.

BREAKING CHANGE: import path unchanged (code.nochebuena.dev/go/httpauth-jwt)
but package identifier changes from jwtauth to httpauthjwt — update all usages
accordingly.
2026-05-07 23:51:16 -06:00

3.1 KiB

Changelog

All notable changes to code.nochebuena.dev/go/httpauth-jwt are documented here. Format follows Keep a Changelog.

[1.0.0] — 2026-05-08

Changed

  • Package renamed from jwtauth to httpauthjwt — follows ecosystem convention (repo name = package name, hyphens removed); import path is unchanged (code.nochebuena.dev/go/httpauth-jwt); update all usages from jwtauth.X to httpauthjwt.X
  • Dependency code.nochebuena.dev/go/httpauth bumped to v1.0.0
  • Dependency code.nochebuena.dev/go/rbac bumped to v1.0.0 (indirect)

Added

Verifier interface — validates JWT strings. Narrowest interface; AuthMiddleware accepts this so services that only verify (not issue) tokens pass a public-key verifier.

Signer interface — embeds Verifier and adds Sign(jwt.Claims). Used by IssueTokenPair and RefreshTokenPair.

NewHMACSigner(secret []byte) Signer — HMAC-SHA256. For single-service or monolith deployments where one process both issues and verifies tokens.

NewRSASigner(privateKey *rsa.PrivateKey) Signer — RSA-SHA256 signer + verifier backed by the private key (public key derived automatically).

NewRSASignerFromPEM(pemKey []byte) (Signer, error) — loads a PKCS#8 or PKCS#1 PEM-encoded RSA private key. Suitable for loading from environment variables or files.

NewRSAPublicKeyVerifier(publicKey *rsa.PublicKey) Verifier — RSA-SHA256 verifier backed by a public key only. For microservices that receive tokens from a central issuer but never sign them.

NewRSAPublicKeyVerifierFromPEM(pemKey []byte) (Verifier, error) — loads a PKIX or PKCS#1 PEM-encoded RSA public key.

TokenConfigAccessTTL, RefreshTTL, Issuer.

TokenPairAccessToken, RefreshToken, ExpiresIn (seconds).

IssueTokenPair(signer, uid, customClaims, cfg) (TokenPair, error) — issues access + refresh tokens. customClaims are merged at the top level of the access token (compatible with httpauth.ClaimsPermissionProvider). Refresh token carries only sub, iss, iat, exp, jti, and fam (token family for rotation).

Blacklist interfaceIsRevoked(ctx, jti) and Revoke(ctx, jti, ttl). Implementations are typically backed by Valkey or Redis.

ErrTokenRevoked — sentinel returned by RefreshTokenPair when the JTI is on the blacklist. Callers should respond with 401 and prompt re-authentication.

RefreshTokenPair(ctx, signer, refreshToken, blacklist, cfg, customClaims) (TokenPair, error) — validates the refresh token, checks the blacklist, revokes the old JTI with the token's remaining TTL, and issues a new pair. customClaims in the new access token allow callers to embed fresh permission masks reflecting any role changes since the previous issue.

AuthMiddleware(verifier, publicPaths) func(http.Handler) http.Handler — verifies the Bearer access token and calls httpauth.SetTokenData(ctx, uid, claims). Accepts Verifier so services with only the public key can participate. Public paths bypass token verification via path.Match glob patterns.