devise_auth0_jwt_strategy 0.0.7 → 0.0.8
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/lib/devise_auth0_jwt_strategy/strategy.rb +1 -1
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA1:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: c01c55319208b5bb5d6227b3f3b334c48b01ac40
|
4
|
+
data.tar.gz: 90e13af83f35c905abbfd04748a52c928d903bac
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 757a5fe8c59ca18af99bffab0558f0c95383db01687dbd34fce61e1c2ac31ae8d5818a3904908badee2aef08859e8caea219ccba4460eaa58ed50e9b698ac1f4
|
7
|
+
data.tar.gz: 83170eaaf96dfb417d593be674e85886b05b71b24b1cf243f07c208a5d18b0315d8d045e42274dbcd18f8591c0155da6e604537c8e0fa0bfff1f9a26a6993465
|
@@ -69,7 +69,7 @@ module Devise
|
|
69
69
|
raise ClaimInvalid.new('JWT has the wrong client id') unless payload['aud'] == auth0_client_id
|
70
70
|
raise ClaimInvalid.new('JWT has expired') unless payload['exp'].to_i > Time.now.to_i
|
71
71
|
|
72
|
-
u = ::User.
|
72
|
+
u = ::User.find_for_devise_auth0_jwt_strategy(payload['email'])
|
73
73
|
|
74
74
|
if u.nil?
|
75
75
|
fail!("Could not log in")
|
metadata
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: devise_auth0_jwt_strategy
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 0.0.
|
4
|
+
version: 0.0.8
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Patrick McGraw
|
@@ -95,7 +95,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
|
|
95
95
|
version: '0'
|
96
96
|
requirements: []
|
97
97
|
rubyforge_project:
|
98
|
-
rubygems_version: 2.
|
98
|
+
rubygems_version: 2.6.13
|
99
99
|
signing_key:
|
100
100
|
specification_version: 4
|
101
101
|
summary: Authenticate requests using an Auth0 JWT passed by HTTP header
|