The author’s native language is Chinese. This document is translated using AI.
This service is not a necessary part of RTIO but demonstrates how to issue JWTs for RTIO to validate HTTP requests. JWTs can also be issued through other services; see Issuing via Other Services for reference.
JWT Certificate Issuance Interface
URL
http://$HOST/jwtissuer
Request Parameters
The parameters are encoded as a JSON string.
Parameter | Type | Length | Required | Description |
---|---|---|---|---|
method | string | 1-10 | Yes | The method is jwtissuer |
id | uint32 | - | Yes | Request identifier, must be unique for each request; this field will match in the response |
deviceid | string | 30-40 | Yes | Device ID |
expires | uint32 | 1-604800 | No | Expiration time in seconds, maximum of 7 days; default is 7 days |
Response Parameters
The response is also encoded as a JSON string.
Parameter | Type | Length | Required | Description |
---|---|---|---|---|
code | string | 0-64 | Yes | Error code |
id | uint32 | - | Yes | Response identifier, matches the request |
jwt | string | 0-160 | No | JWT string |
Certificate Generation
Currently, only the Ed25519 signing algorithm is supported for generating Ed25519 key pairs.
$ openssl version
OpenSSL 3.0.13 30 Jan 2024 (Library: OpenSSL 3.0.13 30 Jan 2024)
$ openssl genpkey -algorithm Ed25519 -out private.pem
$ openssl pkey -in private.pem -pubout -out public.pem
Example certificates have been generated and can be found in the ./out/examples/certificates/
directory.
Issuance Service
Start the issuance service.
./out/examples/jwtissuer -private.ed25519 ./out/examples/certificates/ed25519.private
Requesting the Issuance Service via curl
The following example issues a JWT for the device ID “cfa09baa-4913-4ad7-a936-3e26f9671b09” with a validity of 1 day (86400 seconds).
$ curl http://localhost:17019/jwtissuer -d '{"method":"jwtissuer", "id":12667,"deviceid":"cfa09baa-4913-4ad7-a936-3e26f9671b09", "expires": 86400}'
{"id":12667,"code":"OK","jwt":"eyJhbGciOiJFZERTQSIsInR5cCI6IkpXVCJ9.eyJleHAiOjE3MjY0NjQ1MzAsImlzcyI6InJ0aW8iLCJzdWIiOiJjZmEwOWJhYS00OTEzLTRhZDctYTkzNi0zZTI2Zjk2NzFiMDkifQ.sM80Zu3nMsmahzmLpmSC4GlsI8G0xKbnIk8kZIJvLH9IbadEc3sOM3tSb7m_L_ZY2eWy4Ipl8EiYS7t9y_NmCA"}
Issuing via Other Services
When RTIO performs HTTP JWT verification, the subject (sub
) must match the device ID and be a valid JWT. The main claims are as follows (in Golang code). The algorithm only supports ed25519
.
claims := jwt.NewWithClaims(&jwt.SigningMethodEd25519{},
jwt.MapClaims{
"iss": "rtio", // not checked
"sub": req.DeviceID,
"exp": time.Now().Unix() + int64(req.Expires),
})