Metadata-Version: 2.1
Name: Flask-JWT-Extended
Version: 3.25.0
Summary: Extended JWT integration with Flask
Home-page: https://github.com/vimalloc/flask-jwt-extended
Author: Landon Gilbert-Bland
Author-email: landogbland@gmail.com
License: MIT
Description: # Flask-JWT-Extended
        [![Build Status](https://travis-ci.org/vimalloc/flask-jwt-extended.svg?branch=master)](https://travis-ci.org/vimalloc/flask-jwt-extended)
        [![Coverage Status](https://coveralls.io/repos/github/vimalloc/flask-jwt-extended/badge.svg?branch=master)](https://coveralls.io/github/vimalloc/flask-jwt-extended?branch=master)
        [![PyPI version](https://badge.fury.io/py/Flask-JWT-Extended.svg)](https://badge.fury.io/py/Flask-JWT-Extended)
        [![Documentation Status](https://readthedocs.org/projects/flask-jwt-extended/badge/)](http://flask-jwt-extended.readthedocs.io/en/latest/)
        
        ### Features
        Flask-JWT-Extended not only adds support for using JSON Web Tokens (JWT) to Flask for protecting views,
        but also many helpful (and **optional**) features  built in to make working with JSON Web Tokens
        easier. These include:
        
        * Support for adding custom claims to JSON Web Tokens
        * Custom claims validation on received tokens
        * Creating tokens from complex objects or complex object from received tokens
        * [Refresh tokens](https://auth0.com/blog/refresh-tokens-what-are-they-and-when-to-use-them/)
        * Token freshness and separate view decorators to only allow fresh tokens
        * Token revoking/blacklisting
        * Storing tokens in cookies and CSRF protection
        
        ### Usage
        [View the documentation online](https://flask-jwt-extended.readthedocs.io/en/stable/)
        
        ### Changelog
        You can view the changelog [here](https://github.com/vimalloc/flask-jwt-extended/releases).
        This project follows [semantic versioning](https://semver.org/).
        
        ### Chatting
        Come chat with the community or ask questions at https://discord.gg/EJBsbFd
        
        ### Local Development
        We require 100% code coverage in our unit tests. You can run the tests locally
        with `tox` which will print out a code coverage report. Creating a pull request
        will run the tests against python 2.7, 3.5, 3.6, 3.7, 3.8 and PyPy.
        ```
        $ tox
        ```
        
        We also require features to be well documented. After installing the requirements,
        you can generate a local copy of documentation by going to the `docs` directory
        and running:
        ```
        $ make clean && make html
        ```
        
Keywords: flask,jwt,json web token
Platform: any
Classifier: Development Status :: 5 - Production/Stable
Classifier: Environment :: Web Environment
Classifier: Intended Audience :: Developers
Classifier: License :: OSI Approved :: MIT License
Classifier: Operating System :: OS Independent
Classifier: Programming Language :: Python
Classifier: Programming Language :: Python :: 2.7
Classifier: Programming Language :: Python :: 3
Classifier: Programming Language :: Python :: 3.5
Classifier: Programming Language :: Python :: 3.6
Classifier: Programming Language :: Python :: 3.7
Classifier: Programming Language :: Python :: 3.8
Classifier: Topic :: Internet :: WWW/HTTP :: Dynamic Content
Classifier: Topic :: Software Development :: Libraries :: Python Modules
Description-Content-Type: text/markdown
Provides-Extra: asymmetric_crypto
