Book Image

Learning Redux

By : Bugl
Book Image

Learning Redux

By: Bugl

Overview of this book

The book starts with a short introduction to the principles and the ecosystem of Redux, then moves on to show how to implement the basic elements of Redux and put them together. Afterward, you are going to learn how to integrate Redux with other frameworks, such as React and Angular. Along the way, you are going to develop a blog application. To practice developing growing applications with Redux, we are going to start from nothing and keep adding features to our application throughout the book. You are going to learn how to integrate and use Redux DevTools to debug applications, and access external APIs with Redux. You are also going to get acquainted with writing tests for all elements of a Redux application. Furthermore, we are going to cover important concepts in web development, such as routing, user authentication, and communication with a backend server After explaining how to use Redux and how powerful its ecosystem can be, the book teaches you how to make your own abstractions on top of Redux, such as higher-order reducers and middleware. By the end of the book, you are going to be able to develop and maintain Redux applications with ease. In addition to learning about Redux, you are going be familiar with its ecosystem, and learn a lot about JavaScript itself, including best practices and patterns.
Table of Contents (13 chapters)

JSON Web Tokens (JWT)

To authenticate users, we need to store something on the client that identifies the user. Often, this is implemented through a session ID, which is sent via the cookie header. JWT (pronounced jot) works similar—it is also a string that can be sent via a header (or through a URL or POST parameter). However, since JWT does not make use of cookies, it can be easily used across multiple domains.

JWT are JSON objects, which can be signed using a secret key pair (with the HMAC algorithm) or a public/private key pair using RSA. This signature ensures that the tokens do not get forged.

In addition to authentication, JWT also allows for information exchange. For example, we could store information on user roles (is the user an admin or not?) in the token. Since the tokens are signed, we can be sure that this information is correct. As a result, we do not need...