Verb (Finnish): secure, safeguard, ensure, assure, defend, indemnify, insure, cover
Minimal, explicit authentication helpers for Clojure Ring applications.
turvata provides a small set of primitives for:
- API token authentication (via
Authorization: Bearer <token>) - Browser session authentication (via signed cookies + server-side session store)
- A simple runtime-based configuration model
- Safe defaults, explicit failure modes, and minimal abstraction
It is designed for internal tools and admin portals, not consumer-facing auth.
-
Explicit: Authentication behavior should be easy to read in code.
-
Deny by default: Missing or invalid credentials never authenticate.
-
High-entropy secrets: Tokens are assumed to be random secrets, not user-chosen passwords.
-
Minimal dependencies and configuration
turvata does not provide:
- OAuth / OpenID Connect
- Password hashing or password login
- User management, signup, or recovery
- CSRF protection (delegate to your app)
- Distributed session replication (pluggable store only)
Add to deps.edn:
{:deps {com.sturdystats/turvata {:mvn/version "VERSION"}}}- Tokens are high-entropy random strings.
- The server stores only hashes of tokens.
- Clients present raw tokens.
- Token lookup is
token → user-id.
Generate tokens using turvata.keys/generate-token:
(require '[turvata.keys :as keys])
(keys/generate-token)
;; => {:token "...", :hashed "..."}Store :hashed in your catalog; give :token to the client.
A TokenCatalog maps a bearer token to a user identifier.
Tokens are hashed before lookup; catalogs should store hashes, not raw tokens (except in tests).
Provided implementations:
(require '[turvata.catalog :as cat])
(cat/hashed-map-catalog
{"<hashed-token>" "alice"})
(cat/plain-map-catalog
{"raw-token" "alice"})
(cat/edn-file-catalog "tokens.edn")
(cat/composite [catalog-a catalog-b])Browser sessions are stored server-side via a SessionStore.
Provided implementation:
(require '[turvata.session :as sess])
(sess/in-memory-store)turvata uses an explicit runtime to avoid hidden globals and make configuration obvious.
(require
'[turvata.runtime :as rt]
'[turvata.session :as sess]
'[turvata.catalog :as cat])
(rt/init!
{:settings {:cookie-name "myapp-session"
:session-ttl-ms (* 4 60 60 1000)
:login-url "/login"}
:catalog my-token-catalog
:store (sess/in-memory-store)})(require '[turvata.ring.middleware :as mw])
(mw/require-api-auth handler)- Expects
Authorization: Bearer <token> - On success: associates
:user-idin the request - On failure: returns
401 Unauthorized
(mw/require-web-auth handler)- On success: associates
:user-idin the request - Refreshes the cookie when nearing expiry
- On failure: redirects to
:login-urlwith?next=...
(require '[turvata.ring.handlers :as h])
(h/login-handler request)Expected form params:
usernametokennext(optional, relative path)
(h/logout-handler request)See the directory example_app for a small, runnable Ring application demonstrating a complete login + admin flow using turvata.
The README file in that directory explains how to run and use the app.
These notes describe the intended security model and assumptions of turvata.
- Tokens must be high-entropy random secrets
- Token hashes use SHA-256
- Open redirects are prevented
- Forwarded HTTPS headers should only be trusted behind a proxy
Apache License 2.0
Copyright © Sturdy Statistics
A note to Finnish speakers: We chose the name turvata in homage to metosin and out of admiration for the expressiveness of the Finnish language. We’re not Finnish speakers, so if we’ve misused the term, we apologize.