devise_auth0_jwt_strategy 0.0.7 → 0.0.8

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: d6c855f7077ea79e7c9d7f85817482c85a1c8343
4
- data.tar.gz: cdf83e1cd0165cce13511fe1e71b1fa3ff255e2b
3
+ metadata.gz: c01c55319208b5bb5d6227b3f3b334c48b01ac40
4
+ data.tar.gz: 90e13af83f35c905abbfd04748a52c928d903bac
5
5
  SHA512:
6
- metadata.gz: 36cba5729c339eff358f6ba61fd4386e5d178bc32141c90f77100bea8368081991274a186348316f3f3599dc82372b8d1a981614421cfff4796342afbe423167
7
- data.tar.gz: 5ebeba694bd287cc1ab33f2ce911e7d32e8bcae3f86a1ed9bf4b5a1b54e131e1814671d8e26e6b42f6ff5aa7969539010a026835be615046e79ce4fd62756a3d
6
+ metadata.gz: 757a5fe8c59ca18af99bffab0558f0c95383db01687dbd34fce61e1c2ac31ae8d5818a3904908badee2aef08859e8caea219ccba4460eaa58ed50e9b698ac1f4
7
+ data.tar.gz: 83170eaaf96dfb417d593be674e85886b05b71b24b1cf243f07c208a5d18b0315d8d045e42274dbcd18f8591c0155da6e604537c8e0fa0bfff1f9a26a6993465
@@ -69,7 +69,7 @@ module Devise
69
69
  raise ClaimInvalid.new('JWT has the wrong client id') unless payload['aud'] == auth0_client_id
70
70
  raise ClaimInvalid.new('JWT has expired') unless payload['exp'].to_i > Time.now.to_i
71
71
 
72
- u = ::User.find_by_email(payload['email'])
72
+ u = ::User.find_for_devise_auth0_jwt_strategy(payload['email'])
73
73
 
74
74
  if u.nil?
75
75
  fail!("Could not log in")
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: devise_auth0_jwt_strategy
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.0.7
4
+ version: 0.0.8
5
5
  platform: ruby
6
6
  authors:
7
7
  - Patrick McGraw
@@ -95,7 +95,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
95
95
  version: '0'
96
96
  requirements: []
97
97
  rubyforge_project:
98
- rubygems_version: 2.5.1
98
+ rubygems_version: 2.6.13
99
99
  signing_key:
100
100
  specification_version: 4
101
101
  summary: Authenticate requests using an Auth0 JWT passed by HTTP header