How to Install and Uninstall perl-Mojo-JWT Package on openSuSE Tumbleweed
Last updated: December 27,2024
1. Install "perl-Mojo-JWT" package
Please follow the steps below to install perl-Mojo-JWT on openSuSE Tumbleweed
$
sudo zypper refresh
Copied
$
sudo zypper install
perl-Mojo-JWT
Copied
2. Uninstall "perl-Mojo-JWT" package
This guide let you learn how to uninstall perl-Mojo-JWT on openSuSE Tumbleweed:
$
sudo zypper remove
perl-Mojo-JWT
Copied
3. Information about the perl-Mojo-JWT package on openSuSE Tumbleweed
Information for package perl-Mojo-JWT:
--------------------------------------
Repository : openSUSE-Tumbleweed-Oss
Name : perl-Mojo-JWT
Version : 0.09-1.5
Arch : noarch
Vendor : openSUSE
Installed Size : 42.6 KiB
Installed : No
Status : not installed
Source package : perl-Mojo-JWT-0.09-1.5.src
Upstream URL : https://metacpan.org/release/Mojo-JWT
Summary : JSON Web Token the Mojo way
Description :
JSON Web Token is described in https://tools.ietf.org/html/rfc7519.
Mojo::JWT implements that standard with an API that should feel familiar to
Mojolicious users (though of course it is useful elsewhere). Indeed, JWT is
much like Mojolicious::Sessions except that the result is a url-safe text
string rather than a cookie.
In JWT, the primary payload is called the 'claims', and a few claims are
reserved, as seen in the IETF document. The header and the claims are
signed when stringified to guard against tampering. Note that while signed,
the data is not encrypted, so don't use it to send secrets over clear
channels.
--------------------------------------
Repository : openSUSE-Tumbleweed-Oss
Name : perl-Mojo-JWT
Version : 0.09-1.5
Arch : noarch
Vendor : openSUSE
Installed Size : 42.6 KiB
Installed : No
Status : not installed
Source package : perl-Mojo-JWT-0.09-1.5.src
Upstream URL : https://metacpan.org/release/Mojo-JWT
Summary : JSON Web Token the Mojo way
Description :
JSON Web Token is described in https://tools.ietf.org/html/rfc7519.
Mojo::JWT implements that standard with an API that should feel familiar to
Mojolicious users (though of course it is useful elsewhere). Indeed, JWT is
much like Mojolicious::Sessions except that the result is a url-safe text
string rather than a cookie.
In JWT, the primary payload is called the 'claims', and a few claims are
reserved, as seen in the IETF document. The header and the claims are
signed when stringified to guard against tampering. Note that while signed,
the data is not encrypted, so don't use it to send secrets over clear
channels.