authentic-rb 1.4.0 → 1.5.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/lib/authentic/validator.rb +2 -0
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: cb2f7b5ad8a00dff35d176f3da8bcb7d8064d5f843eeda674f3fdd09be1a8e62
|
4
|
+
data.tar.gz: '0468d1f9e132b58ece69b58b024ae44bd537194a5071f32142cec77388a04d2c'
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 86f68149c8764e0f38f284c336711eb12804c6d0b51515c2ed69df4d141bc36955e5ece42ba065d47177ed7a30129a522e9c6f449ed2e777298ba146883e06c2
|
7
|
+
data.tar.gz: bf9cbced07b3c33500d6b491b49763ef9c93225b5a48fc0d18390cd96142030b44482753b9b5f19d05665b0e7c32b9b35edb196200b897ed57b28befe6c2b2ab
|
data/lib/authentic/validator.rb
CHANGED
@@ -43,6 +43,8 @@ module Authentic
|
|
43
43
|
# rather then verify raising an error that would lead to InvalidToken
|
44
44
|
raise InvalidKey, 'invalid JWK' if key.nil?
|
45
45
|
|
46
|
+
raise InvalidToken, 'expired JWT' unless Time.at(jwt[:exp]) > Time.now
|
47
|
+
|
46
48
|
jwt.verify!(key)
|
47
49
|
end
|
48
50
|
rescue JSON::JWT::UnexpectedAlgorithm, JSON::JWT::VerificationFailed
|
metadata
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: authentic-rb
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.5.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Articulate
|
@@ -9,7 +9,7 @@ authors:
|
|
9
9
|
autorequire:
|
10
10
|
bindir: bin
|
11
11
|
cert_chain: []
|
12
|
-
date: 2019-01-
|
12
|
+
date: 2019-01-25 00:00:00.000000000 Z
|
13
13
|
dependencies:
|
14
14
|
- !ruby/object:Gem::Dependency
|
15
15
|
name: json-jwt
|