httpsensible 0.1.1

Sign up to get free protection for your applications and to get access to all the features.
Files changed (72) hide show
  1. checksums.yaml +7 -0
  2. data/.rubocop.yml +4 -0
  3. data/.ruby-version +1 -0
  4. data/.vscode/settings.json +8 -0
  5. data/CHANGELOG.md +5 -0
  6. data/Gemfile +18 -0
  7. data/LICENSE.txt +21 -0
  8. data/README.md +45 -0
  9. data/Rakefile +20 -0
  10. data/lib/httpsensible/client/response.rb +54 -0
  11. data/lib/httpsensible/client.rb +39 -0
  12. data/lib/httpsensible/jwt.rb +26 -0
  13. data/lib/httpsensible/version.rb +6 -0
  14. data/lib/httpsensible.rb +10 -0
  15. data/sorbet/config +4 -0
  16. data/sorbet/rbi/annotations/rainbow.rbi +269 -0
  17. data/sorbet/rbi/dsl/active_support/callbacks.rbi +22 -0
  18. data/sorbet/rbi/gems/activesupport@7.0.6.rbi +14 -0
  19. data/sorbet/rbi/gems/addressable@2.8.4.rbi +1954 -0
  20. data/sorbet/rbi/gems/amazing_print@1.5.0.rbi +923 -0
  21. data/sorbet/rbi/gems/ast@2.4.2.rbi +584 -0
  22. data/sorbet/rbi/gems/concurrent-ruby@1.2.2.rbi +8 -0
  23. data/sorbet/rbi/gems/crack@0.4.5.rbi +144 -0
  24. data/sorbet/rbi/gems/diff-lcs@1.5.0.rbi +1083 -0
  25. data/sorbet/rbi/gems/erubi@1.12.0.rbi +145 -0
  26. data/sorbet/rbi/gems/hashdiff@1.0.1.rbi +350 -0
  27. data/sorbet/rbi/gems/http-2-next@0.5.1.rbi +1441 -0
  28. data/sorbet/rbi/gems/httpx@0.24.1.rbi +3255 -0
  29. data/sorbet/rbi/gems/i18n@1.14.1.rbi +8 -0
  30. data/sorbet/rbi/gems/io-console@0.6.0.rbi +8 -0
  31. data/sorbet/rbi/gems/irb@1.7.1.rbi +342 -0
  32. data/sorbet/rbi/gems/json@2.6.3.rbi +1533 -0
  33. data/sorbet/rbi/gems/jwt@2.7.1.rbi +1404 -0
  34. data/sorbet/rbi/gems/language_server-protocol@3.17.0.3.rbi +14237 -0
  35. data/sorbet/rbi/gems/minitest-focus@1.3.1.rbi +91 -0
  36. data/sorbet/rbi/gems/minitest@5.18.1.rbi +1503 -0
  37. data/sorbet/rbi/gems/netrc@0.11.0.rbi +158 -0
  38. data/sorbet/rbi/gems/parallel@1.23.0.rbi +273 -0
  39. data/sorbet/rbi/gems/parser@3.2.2.3.rbi +7253 -0
  40. data/sorbet/rbi/gems/prettier_print@1.2.1.rbi +951 -0
  41. data/sorbet/rbi/gems/public_suffix@5.0.1.rbi +935 -0
  42. data/sorbet/rbi/gems/racc@1.7.1.rbi +161 -0
  43. data/sorbet/rbi/gems/rack@3.0.8.rbi +5183 -0
  44. data/sorbet/rbi/gems/rainbow@3.1.1.rbi +402 -0
  45. data/sorbet/rbi/gems/rake@13.0.6.rbi +3024 -0
  46. data/sorbet/rbi/gems/rbi@0.0.16.rbi +2999 -0
  47. data/sorbet/rbi/gems/regexp_parser@2.8.1.rbi +3749 -0
  48. data/sorbet/rbi/gems/reline@0.3.6.rbi +8 -0
  49. data/sorbet/rbi/gems/rexml@3.2.5.rbi +4717 -0
  50. data/sorbet/rbi/gems/rubocop-ast@1.29.0.rbi +6985 -0
  51. data/sorbet/rbi/gems/rubocop-minitest@0.31.0.rbi +8 -0
  52. data/sorbet/rbi/gems/rubocop-performance@1.18.0.rbi +8 -0
  53. data/sorbet/rbi/gems/rubocop-rails@2.20.2.rbi +8 -0
  54. data/sorbet/rbi/gems/rubocop-rake@0.6.0.rbi +8 -0
  55. data/sorbet/rbi/gems/rubocop-shopify@2.14.0.rbi +8 -0
  56. data/sorbet/rbi/gems/rubocop-sorbet@0.7.0.rbi +8 -0
  57. data/sorbet/rbi/gems/rubocop-standard@7.1.0.rbi +8 -0
  58. data/sorbet/rbi/gems/rubocop@1.54.1.rbi +56172 -0
  59. data/sorbet/rbi/gems/ruby-progressbar@1.13.0.rbi +1317 -0
  60. data/sorbet/rbi/gems/spoom@1.2.2.rbi +2994 -0
  61. data/sorbet/rbi/gems/syntax_tree@6.1.1.rbi +22855 -0
  62. data/sorbet/rbi/gems/tapioca@0.11.7.rbi +3347 -0
  63. data/sorbet/rbi/gems/thor@1.2.2.rbi +3965 -0
  64. data/sorbet/rbi/gems/tzinfo@2.0.6.rbi +8 -0
  65. data/sorbet/rbi/gems/unicode-display_width@2.4.2.rbi +65 -0
  66. data/sorbet/rbi/gems/unparser@0.6.8.rbi +4525 -0
  67. data/sorbet/rbi/gems/webmock@3.18.1.rbi +1756 -0
  68. data/sorbet/rbi/gems/yard-sorbet@0.8.1.rbi +428 -0
  69. data/sorbet/rbi/gems/yard@0.9.34.rbi +18219 -0
  70. data/sorbet/tapioca/config.yml +13 -0
  71. data/sorbet/tapioca/require.rb +4 -0
  72. metadata +190 -0
@@ -0,0 +1,1404 @@
1
+ # typed: true
2
+
3
+ # DO NOT EDIT MANUALLY
4
+ # This is an autogenerated file for types exported from the `jwt` gem.
5
+ # Please instead update this file by running `bin/tapioca gem jwt`.
6
+
7
+ # JSON Web Token implementation
8
+ #
9
+ # Should be up to date with the latest spec:
10
+ # https://tools.ietf.org/html/rfc7519
11
+ #
12
+ # source://jwt//lib/jwt/version.rb#4
13
+ module JWT
14
+ extend ::JWT::Configuration
15
+
16
+ private
17
+
18
+ # source://jwt//lib/jwt.rb#28
19
+ def decode(jwt, key = T.unsafe(nil), verify = T.unsafe(nil), options = T.unsafe(nil), &keyfinder); end
20
+
21
+ # source://jwt//lib/jwt.rb#21
22
+ def encode(payload, key, algorithm = T.unsafe(nil), header_fields = T.unsafe(nil)); end
23
+
24
+ class << self
25
+ # source://jwt//lib/jwt.rb#28
26
+ def decode(jwt, key = T.unsafe(nil), verify = T.unsafe(nil), options = T.unsafe(nil), &keyfinder); end
27
+
28
+ # source://jwt//lib/jwt.rb#21
29
+ def encode(payload, key, algorithm = T.unsafe(nil), header_fields = T.unsafe(nil)); end
30
+
31
+ # source://jwt//lib/jwt/version.rb#5
32
+ def gem_version; end
33
+
34
+ # @return [Boolean]
35
+ #
36
+ # source://jwt//lib/jwt/version.rb#24
37
+ def openssl_3?; end
38
+
39
+ # @return [Boolean]
40
+ #
41
+ # source://jwt//lib/jwt/version.rb#37
42
+ def openssl_3_hmac_empty_key_regression?; end
43
+
44
+ # source://jwt//lib/jwt/version.rb#41
45
+ def openssl_version; end
46
+
47
+ # @return [Boolean]
48
+ #
49
+ # source://jwt//lib/jwt/version.rb#29
50
+ def rbnacl?; end
51
+
52
+ # @return [Boolean]
53
+ #
54
+ # source://jwt//lib/jwt/version.rb#33
55
+ def rbnacl_6_or_greater?; end
56
+ end
57
+ end
58
+
59
+ # source://jwt//lib/jwt/algos/hmac.rb#4
60
+ module JWT::Algos
61
+ extend ::JWT::Algos
62
+
63
+ # source://jwt//lib/jwt/algos.rb#44
64
+ def create(algorithm); end
65
+
66
+ # source://jwt//lib/jwt/algos.rb#40
67
+ def find(algorithm); end
68
+
69
+ # @return [Boolean]
70
+ #
71
+ # source://jwt//lib/jwt/algos.rb#48
72
+ def implementation?(algorithm); end
73
+
74
+ private
75
+
76
+ # source://jwt//lib/jwt/algos.rb#55
77
+ def indexed; end
78
+ end
79
+
80
+ # source://jwt//lib/jwt/algos.rb#23
81
+ JWT::Algos::ALGOS = T.let(T.unsafe(nil), Array)
82
+
83
+ # source://jwt//lib/jwt/algos/algo_wrapper.rb#5
84
+ class JWT::Algos::AlgoWrapper
85
+ # @return [AlgoWrapper] a new instance of AlgoWrapper
86
+ #
87
+ # source://jwt//lib/jwt/algos/algo_wrapper.rb#8
88
+ def initialize(alg, cls); end
89
+
90
+ # Returns the value of attribute alg.
91
+ #
92
+ # source://jwt//lib/jwt/algos/algo_wrapper.rb#6
93
+ def alg; end
94
+
95
+ # Returns the value of attribute cls.
96
+ #
97
+ # source://jwt//lib/jwt/algos/algo_wrapper.rb#6
98
+ def cls; end
99
+
100
+ # source://jwt//lib/jwt/algos/algo_wrapper.rb#17
101
+ def sign(data:, signing_key:); end
102
+
103
+ # @return [Boolean]
104
+ #
105
+ # source://jwt//lib/jwt/algos/algo_wrapper.rb#13
106
+ def valid_alg?(alg_to_check); end
107
+
108
+ # source://jwt//lib/jwt/algos/algo_wrapper.rb#21
109
+ def verify(data:, signature:, verification_key:); end
110
+ end
111
+
112
+ # source://jwt//lib/jwt/algos/ecdsa.rb#5
113
+ module JWT::Algos::Ecdsa
114
+ private
115
+
116
+ # source://jwt//lib/jwt/algos/ecdsa.rb#70
117
+ def asn1_to_raw(signature, public_key); end
118
+
119
+ # source://jwt//lib/jwt/algos/ecdsa.rb#57
120
+ def curve_by_name(name); end
121
+
122
+ # source://jwt//lib/jwt/algos/ecdsa.rb#63
123
+ def raw_to_asn1(signature, private_key); end
124
+
125
+ # source://jwt//lib/jwt/algos/ecdsa.rb#33
126
+ def sign(algorithm, msg, key); end
127
+
128
+ # source://jwt//lib/jwt/algos/ecdsa.rb#44
129
+ def verify(algorithm, public_key, signing_input, signature); end
130
+
131
+ class << self
132
+ # source://jwt//lib/jwt/algos/ecdsa.rb#70
133
+ def asn1_to_raw(signature, public_key); end
134
+
135
+ # source://jwt//lib/jwt/algos/ecdsa.rb#57
136
+ def curve_by_name(name); end
137
+
138
+ # source://jwt//lib/jwt/algos/ecdsa.rb#63
139
+ def raw_to_asn1(signature, private_key); end
140
+
141
+ # source://jwt//lib/jwt/algos/ecdsa.rb#33
142
+ def sign(algorithm, msg, key); end
143
+
144
+ # source://jwt//lib/jwt/algos/ecdsa.rb#44
145
+ def verify(algorithm, public_key, signing_input, signature); end
146
+ end
147
+ end
148
+
149
+ # source://jwt//lib/jwt/algos/ecdsa.rb#8
150
+ JWT::Algos::Ecdsa::NAMED_CURVES = T.let(T.unsafe(nil), Hash)
151
+
152
+ # source://jwt//lib/jwt/algos/ecdsa.rb#31
153
+ JWT::Algos::Ecdsa::SUPPORTED = T.let(T.unsafe(nil), Array)
154
+
155
+ # source://jwt//lib/jwt/algos/eddsa.rb#5
156
+ module JWT::Algos::Eddsa
157
+ private
158
+
159
+ # source://jwt//lib/jwt/algos/eddsa.rb#10
160
+ def sign(algorithm, msg, key); end
161
+
162
+ # source://jwt//lib/jwt/algos/eddsa.rb#21
163
+ def verify(algorithm, public_key, signing_input, signature); end
164
+
165
+ class << self
166
+ # source://jwt//lib/jwt/algos/eddsa.rb#10
167
+ def sign(algorithm, msg, key); end
168
+
169
+ # source://jwt//lib/jwt/algos/eddsa.rb#21
170
+ def verify(algorithm, public_key, signing_input, signature); end
171
+ end
172
+ end
173
+
174
+ # source://jwt//lib/jwt/algos/eddsa.rb#8
175
+ JWT::Algos::Eddsa::SUPPORTED = T.let(T.unsafe(nil), Array)
176
+
177
+ # source://jwt//lib/jwt/algos/hmac.rb#5
178
+ module JWT::Algos::Hmac
179
+ private
180
+
181
+ # source://jwt//lib/jwt/algos/hmac.rb#16
182
+ def sign(algorithm, msg, key); end
183
+
184
+ # source://jwt//lib/jwt/algos/hmac.rb#30
185
+ def verify(algorithm, key, signing_input, signature); end
186
+
187
+ class << self
188
+ # source://jwt//lib/jwt/algos/hmac.rb#16
189
+ def sign(algorithm, msg, key); end
190
+
191
+ # source://jwt//lib/jwt/algos/hmac.rb#30
192
+ def verify(algorithm, key, signing_input, signature); end
193
+ end
194
+ end
195
+
196
+ # source://jwt//lib/jwt/algos/hmac.rb#8
197
+ JWT::Algos::Hmac::MAPPING = T.let(T.unsafe(nil), Hash)
198
+
199
+ # source://jwt//lib/jwt/algos/hmac.rb#14
200
+ JWT::Algos::Hmac::SUPPORTED = T.let(T.unsafe(nil), Array)
201
+
202
+ # Copy of https://github.com/rails/rails/blob/v7.0.3.1/activesupport/lib/active_support/security_utils.rb
203
+ #
204
+ # source://jwt//lib/jwt/algos/hmac.rb#36
205
+ module JWT::Algos::Hmac::SecurityUtils
206
+ private
207
+
208
+ # @raise [ArgumentError]
209
+ #
210
+ # source://jwt//lib/jwt/algos/hmac.rb#43
211
+ def fixed_length_secure_compare(a, b); end
212
+
213
+ # Secure string comparison for strings of variable length.
214
+ #
215
+ # While a timing attack would not be able to discern the content of
216
+ # a secret compared via secure_compare, it is possible to determine
217
+ # the secret length. This should be considered when using secure_compare
218
+ # to compare weak, short secrets to user input.
219
+ #
220
+ # source://jwt//lib/jwt/algos/hmac.rb#65
221
+ def secure_compare(a, b); end
222
+
223
+ class << self
224
+ # @raise [ArgumentError]
225
+ #
226
+ # source://jwt//lib/jwt/algos/hmac.rb#43
227
+ def fixed_length_secure_compare(a, b); end
228
+
229
+ # Secure string comparison for strings of variable length.
230
+ #
231
+ # While a timing attack would not be able to discern the content of
232
+ # a secret compared via secure_compare, it is possible to determine
233
+ # the secret length. This should be considered when using secure_compare
234
+ # to compare weak, short secrets to user input.
235
+ #
236
+ # source://jwt//lib/jwt/algos/hmac.rb#65
237
+ def secure_compare(a, b); end
238
+ end
239
+ end
240
+
241
+ # source://jwt//lib/jwt/algos/none.rb#5
242
+ module JWT::Algos::None
243
+ private
244
+
245
+ # source://jwt//lib/jwt/algos/none.rb#10
246
+ def sign(*_arg0); end
247
+
248
+ # source://jwt//lib/jwt/algos/none.rb#14
249
+ def verify(*_arg0); end
250
+
251
+ class << self
252
+ # source://jwt//lib/jwt/algos/none.rb#10
253
+ def sign(*_arg0); end
254
+
255
+ # source://jwt//lib/jwt/algos/none.rb#14
256
+ def verify(*_arg0); end
257
+ end
258
+ end
259
+
260
+ # source://jwt//lib/jwt/algos/none.rb#8
261
+ JWT::Algos::None::SUPPORTED = T.let(T.unsafe(nil), Array)
262
+
263
+ # source://jwt//lib/jwt/algos/ps.rb#5
264
+ module JWT::Algos::Ps
265
+ private
266
+
267
+ # source://jwt//lib/jwt/algos/ps.rb#30
268
+ def require_openssl!; end
269
+
270
+ # source://jwt//lib/jwt/algos/ps.rb#12
271
+ def sign(algorithm, msg, key); end
272
+
273
+ # source://jwt//lib/jwt/algos/ps.rb#22
274
+ def verify(algorithm, public_key, signing_input, signature); end
275
+
276
+ class << self
277
+ # source://jwt//lib/jwt/algos/ps.rb#30
278
+ def require_openssl!; end
279
+
280
+ # @raise [EncodeError]
281
+ #
282
+ # source://jwt//lib/jwt/algos/ps.rb#12
283
+ def sign(algorithm, msg, key); end
284
+
285
+ # source://jwt//lib/jwt/algos/ps.rb#22
286
+ def verify(algorithm, public_key, signing_input, signature); end
287
+ end
288
+ end
289
+
290
+ # source://jwt//lib/jwt/algos/ps.rb#10
291
+ JWT::Algos::Ps::SUPPORTED = T.let(T.unsafe(nil), Array)
292
+
293
+ # source://jwt//lib/jwt/algos/rsa.rb#5
294
+ module JWT::Algos::Rsa
295
+ private
296
+
297
+ # source://jwt//lib/jwt/algos/rsa.rb#10
298
+ def sign(algorithm, msg, key); end
299
+
300
+ # source://jwt//lib/jwt/algos/rsa.rb#16
301
+ def verify(algorithm, public_key, signing_input, signature); end
302
+
303
+ class << self
304
+ # @raise [EncodeError]
305
+ #
306
+ # source://jwt//lib/jwt/algos/rsa.rb#10
307
+ def sign(algorithm, msg, key); end
308
+
309
+ # source://jwt//lib/jwt/algos/rsa.rb#16
310
+ def verify(algorithm, public_key, signing_input, signature); end
311
+ end
312
+ end
313
+
314
+ # source://jwt//lib/jwt/algos/rsa.rb#8
315
+ JWT::Algos::Rsa::SUPPORTED = T.let(T.unsafe(nil), Array)
316
+
317
+ # source://jwt//lib/jwt/algos/unsupported.rb#5
318
+ module JWT::Algos::Unsupported
319
+ private
320
+
321
+ # source://jwt//lib/jwt/algos/unsupported.rb#10
322
+ def sign(*_arg0); end
323
+
324
+ # source://jwt//lib/jwt/algos/unsupported.rb#14
325
+ def verify(*_arg0); end
326
+
327
+ class << self
328
+ # @raise [NotImplementedError]
329
+ #
330
+ # source://jwt//lib/jwt/algos/unsupported.rb#10
331
+ def sign(*_arg0); end
332
+
333
+ # @raise [JWT::VerificationError]
334
+ #
335
+ # source://jwt//lib/jwt/algos/unsupported.rb#14
336
+ def verify(*_arg0); end
337
+ end
338
+ end
339
+
340
+ # source://jwt//lib/jwt/algos/unsupported.rb#8
341
+ JWT::Algos::Unsupported::SUPPORTED = T.let(T.unsafe(nil), Array)
342
+
343
+ # Base64 helpers
344
+ #
345
+ # source://jwt//lib/jwt/base64.rb#7
346
+ class JWT::Base64
347
+ class << self
348
+ # source://jwt//lib/jwt/base64.rb#13
349
+ def url_decode(str); end
350
+
351
+ # source://jwt//lib/jwt/base64.rb#9
352
+ def url_encode(str); end
353
+ end
354
+ end
355
+
356
+ # source://jwt//lib/jwt/claims_validator.rb#6
357
+ class JWT::ClaimsValidator
358
+ # @return [ClaimsValidator] a new instance of ClaimsValidator
359
+ #
360
+ # source://jwt//lib/jwt/claims_validator.rb#13
361
+ def initialize(payload); end
362
+
363
+ # source://jwt//lib/jwt/claims_validator.rb#17
364
+ def validate!; end
365
+
366
+ private
367
+
368
+ # @raise [InvalidPayload]
369
+ #
370
+ # source://jwt//lib/jwt/claims_validator.rb#31
371
+ def validate_is_numeric(claim); end
372
+
373
+ # source://jwt//lib/jwt/claims_validator.rb#25
374
+ def validate_numeric_claims; end
375
+ end
376
+
377
+ # source://jwt//lib/jwt/claims_validator.rb#7
378
+ JWT::ClaimsValidator::NUMERIC_CLAIMS = T.let(T.unsafe(nil), Array)
379
+
380
+ # source://jwt//lib/jwt/configuration/decode_configuration.rb#4
381
+ module JWT::Configuration
382
+ # source://jwt//lib/jwt/configuration.rb#11
383
+ def configuration; end
384
+
385
+ # @yield [configuration]
386
+ #
387
+ # source://jwt//lib/jwt/configuration.rb#7
388
+ def configure; end
389
+ end
390
+
391
+ # source://jwt//lib/jwt/configuration/container.rb#8
392
+ class JWT::Configuration::Container
393
+ # @return [Container] a new instance of Container
394
+ #
395
+ # source://jwt//lib/jwt/configuration/container.rb#11
396
+ def initialize; end
397
+
398
+ # Returns the value of attribute decode.
399
+ #
400
+ # source://jwt//lib/jwt/configuration/container.rb#9
401
+ def decode; end
402
+
403
+ # Sets the attribute decode
404
+ #
405
+ # @param value the value to set the attribute decode to.
406
+ #
407
+ # source://jwt//lib/jwt/configuration/container.rb#9
408
+ def decode=(_arg0); end
409
+
410
+ # Returns the value of attribute jwk.
411
+ #
412
+ # source://jwt//lib/jwt/configuration/container.rb#9
413
+ def jwk; end
414
+
415
+ # Sets the attribute jwk
416
+ #
417
+ # @param value the value to set the attribute jwk to.
418
+ #
419
+ # source://jwt//lib/jwt/configuration/container.rb#9
420
+ def jwk=(_arg0); end
421
+
422
+ # source://jwt//lib/jwt/configuration/container.rb#15
423
+ def reset!; end
424
+ end
425
+
426
+ # source://jwt//lib/jwt/configuration/decode_configuration.rb#5
427
+ class JWT::Configuration::DecodeConfiguration
428
+ # @return [DecodeConfiguration] a new instance of DecodeConfiguration
429
+ #
430
+ # source://jwt//lib/jwt/configuration/decode_configuration.rb#17
431
+ def initialize; end
432
+
433
+ # Returns the value of attribute algorithms.
434
+ #
435
+ # source://jwt//lib/jwt/configuration/decode_configuration.rb#6
436
+ def algorithms; end
437
+
438
+ # Sets the attribute algorithms
439
+ #
440
+ # @param value the value to set the attribute algorithms to.
441
+ #
442
+ # source://jwt//lib/jwt/configuration/decode_configuration.rb#6
443
+ def algorithms=(_arg0); end
444
+
445
+ # Returns the value of attribute leeway.
446
+ #
447
+ # source://jwt//lib/jwt/configuration/decode_configuration.rb#6
448
+ def leeway; end
449
+
450
+ # Sets the attribute leeway
451
+ #
452
+ # @param value the value to set the attribute leeway to.
453
+ #
454
+ # source://jwt//lib/jwt/configuration/decode_configuration.rb#6
455
+ def leeway=(_arg0); end
456
+
457
+ # Returns the value of attribute required_claims.
458
+ #
459
+ # source://jwt//lib/jwt/configuration/decode_configuration.rb#6
460
+ def required_claims; end
461
+
462
+ # Sets the attribute required_claims
463
+ #
464
+ # @param value the value to set the attribute required_claims to.
465
+ #
466
+ # source://jwt//lib/jwt/configuration/decode_configuration.rb#6
467
+ def required_claims=(_arg0); end
468
+
469
+ # source://jwt//lib/jwt/configuration/decode_configuration.rb#30
470
+ def to_h; end
471
+
472
+ # Returns the value of attribute verify_aud.
473
+ #
474
+ # source://jwt//lib/jwt/configuration/decode_configuration.rb#6
475
+ def verify_aud; end
476
+
477
+ # Sets the attribute verify_aud
478
+ #
479
+ # @param value the value to set the attribute verify_aud to.
480
+ #
481
+ # source://jwt//lib/jwt/configuration/decode_configuration.rb#6
482
+ def verify_aud=(_arg0); end
483
+
484
+ # Returns the value of attribute verify_expiration.
485
+ #
486
+ # source://jwt//lib/jwt/configuration/decode_configuration.rb#6
487
+ def verify_expiration; end
488
+
489
+ # Sets the attribute verify_expiration
490
+ #
491
+ # @param value the value to set the attribute verify_expiration to.
492
+ #
493
+ # source://jwt//lib/jwt/configuration/decode_configuration.rb#6
494
+ def verify_expiration=(_arg0); end
495
+
496
+ # Returns the value of attribute verify_iat.
497
+ #
498
+ # source://jwt//lib/jwt/configuration/decode_configuration.rb#6
499
+ def verify_iat; end
500
+
501
+ # Sets the attribute verify_iat
502
+ #
503
+ # @param value the value to set the attribute verify_iat to.
504
+ #
505
+ # source://jwt//lib/jwt/configuration/decode_configuration.rb#6
506
+ def verify_iat=(_arg0); end
507
+
508
+ # Returns the value of attribute verify_iss.
509
+ #
510
+ # source://jwt//lib/jwt/configuration/decode_configuration.rb#6
511
+ def verify_iss; end
512
+
513
+ # Sets the attribute verify_iss
514
+ #
515
+ # @param value the value to set the attribute verify_iss to.
516
+ #
517
+ # source://jwt//lib/jwt/configuration/decode_configuration.rb#6
518
+ def verify_iss=(_arg0); end
519
+
520
+ # Returns the value of attribute verify_jti.
521
+ #
522
+ # source://jwt//lib/jwt/configuration/decode_configuration.rb#6
523
+ def verify_jti; end
524
+
525
+ # Sets the attribute verify_jti
526
+ #
527
+ # @param value the value to set the attribute verify_jti to.
528
+ #
529
+ # source://jwt//lib/jwt/configuration/decode_configuration.rb#6
530
+ def verify_jti=(_arg0); end
531
+
532
+ # Returns the value of attribute verify_not_before.
533
+ #
534
+ # source://jwt//lib/jwt/configuration/decode_configuration.rb#6
535
+ def verify_not_before; end
536
+
537
+ # Sets the attribute verify_not_before
538
+ #
539
+ # @param value the value to set the attribute verify_not_before to.
540
+ #
541
+ # source://jwt//lib/jwt/configuration/decode_configuration.rb#6
542
+ def verify_not_before=(_arg0); end
543
+
544
+ # Returns the value of attribute verify_sub.
545
+ #
546
+ # source://jwt//lib/jwt/configuration/decode_configuration.rb#6
547
+ def verify_sub; end
548
+
549
+ # Sets the attribute verify_sub
550
+ #
551
+ # @param value the value to set the attribute verify_sub to.
552
+ #
553
+ # source://jwt//lib/jwt/configuration/decode_configuration.rb#6
554
+ def verify_sub=(_arg0); end
555
+ end
556
+
557
+ # source://jwt//lib/jwt/configuration/jwk_configuration.rb#8
558
+ class JWT::Configuration::JwkConfiguration
559
+ # @return [JwkConfiguration] a new instance of JwkConfiguration
560
+ #
561
+ # source://jwt//lib/jwt/configuration/jwk_configuration.rb#9
562
+ def initialize; end
563
+
564
+ # Returns the value of attribute kid_generator.
565
+ #
566
+ # source://jwt//lib/jwt/configuration/jwk_configuration.rb#24
567
+ def kid_generator; end
568
+
569
+ # Sets the attribute kid_generator
570
+ #
571
+ # @param value the value to set the attribute kid_generator to.
572
+ #
573
+ # source://jwt//lib/jwt/configuration/jwk_configuration.rb#24
574
+ def kid_generator=(_arg0); end
575
+
576
+ # source://jwt//lib/jwt/configuration/jwk_configuration.rb#13
577
+ def kid_generator_type=(value); end
578
+ end
579
+
580
+ # Decoding logic for JWT
581
+ #
582
+ # source://jwt//lib/jwt/decode.rb#11
583
+ class JWT::Decode
584
+ # @raise [JWT::DecodeError]
585
+ # @return [Decode] a new instance of Decode
586
+ #
587
+ # source://jwt//lib/jwt/decode.rb#12
588
+ def initialize(jwt, key, verify, options, &keyfinder); end
589
+
590
+ # @raise [JWT::DecodeError]
591
+ #
592
+ # source://jwt//lib/jwt/decode.rb#24
593
+ def decode_segments; end
594
+
595
+ private
596
+
597
+ # source://jwt//lib/jwt/decode.rb#146
598
+ def alg_in_header; end
599
+
600
+ # source://jwt//lib/jwt/decode.rb#90
601
+ def allowed_algorithms; end
602
+
603
+ # source://jwt//lib/jwt/decode.rb#72
604
+ def allowed_and_valid_algorithms; end
605
+
606
+ # source://jwt//lib/jwt/decode.rb#142
607
+ def decode_signature; end
608
+
609
+ # @raise [JWT::DecodeError]
610
+ #
611
+ # source://jwt//lib/jwt/decode.rb#113
612
+ def find_key(&keyfinder); end
613
+
614
+ # source://jwt//lib/jwt/decode.rb#82
615
+ def given_algorithms; end
616
+
617
+ # source://jwt//lib/jwt/decode.rb#150
618
+ def header; end
619
+
620
+ # @return [Boolean]
621
+ #
622
+ # source://jwt//lib/jwt/decode.rb#138
623
+ def none_algorithm?; end
624
+
625
+ # source://jwt//lib/jwt/decode.rb#162
626
+ def parse_and_decode(segment); end
627
+
628
+ # source://jwt//lib/jwt/decode.rb#154
629
+ def payload; end
630
+
631
+ # source://jwt//lib/jwt/decode.rb#94
632
+ def resolve_allowed_algorithms; end
633
+
634
+ # source://jwt//lib/jwt/decode.rb#134
635
+ def segment_length; end
636
+
637
+ # source://jwt//lib/jwt/decode.rb#58
638
+ def set_key; end
639
+
640
+ # source://jwt//lib/jwt/decode.rb#158
641
+ def signing_input; end
642
+
643
+ # Move algorithms matching the JWT alg header to the beginning of the list
644
+ #
645
+ # source://jwt//lib/jwt/decode.rb#107
646
+ def sort_by_alg_header(algs); end
647
+
648
+ # @raise [JWT::DecodeError]
649
+ #
650
+ # source://jwt//lib/jwt/decode.rb#126
651
+ def validate_segment_count!; end
652
+
653
+ # @raise [JWT::IncorrectAlgorithm]
654
+ #
655
+ # source://jwt//lib/jwt/decode.rb#52
656
+ def verify_algo; end
657
+
658
+ # source://jwt//lib/jwt/decode.rb#121
659
+ def verify_claims; end
660
+
661
+ # @raise [JWT::DecodeError]
662
+ #
663
+ # source://jwt//lib/jwt/decode.rb#40
664
+ def verify_signature; end
665
+
666
+ # @return [Boolean]
667
+ #
668
+ # source://jwt//lib/jwt/decode.rb#66
669
+ def verify_signature_for?(key); end
670
+ end
671
+
672
+ # Order is very important - first check for string keys, next for symbols
673
+ #
674
+ # source://jwt//lib/jwt/decode.rb#77
675
+ JWT::Decode::ALGORITHM_KEYS = T.let(T.unsafe(nil), Array)
676
+
677
+ # source://jwt//lib/jwt/error.rb#5
678
+ class JWT::DecodeError < ::StandardError; end
679
+
680
+ # Encoding logic for JWT
681
+ #
682
+ # source://jwt//lib/jwt/encode.rb#9
683
+ class JWT::Encode
684
+ # @return [Encode] a new instance of Encode
685
+ #
686
+ # source://jwt//lib/jwt/encode.rb#12
687
+ def initialize(options); end
688
+
689
+ # source://jwt//lib/jwt/encode.rb#20
690
+ def segments; end
691
+
692
+ private
693
+
694
+ # source://jwt//lib/jwt/encode.rb#75
695
+ def combine(*parts); end
696
+
697
+ # source://jwt//lib/jwt/encode.rb#71
698
+ def encode_data(data); end
699
+
700
+ # source://jwt//lib/jwt/encode.rb#49
701
+ def encode_header; end
702
+
703
+ # source://jwt//lib/jwt/encode.rb#53
704
+ def encode_payload; end
705
+
706
+ # source://jwt//lib/jwt/encode.rb#67
707
+ def encode_signature; end
708
+
709
+ # source://jwt//lib/jwt/encode.rb#33
710
+ def encoded_header; end
711
+
712
+ # source://jwt//lib/jwt/encode.rb#45
713
+ def encoded_header_and_payload; end
714
+
715
+ # source://jwt//lib/jwt/encode.rb#37
716
+ def encoded_payload; end
717
+
718
+ # source://jwt//lib/jwt/encode.rb#41
719
+ def encoded_signature; end
720
+
721
+ # source://jwt//lib/jwt/encode.rb#27
722
+ def resolve_algorithm(algorithm); end
723
+
724
+ # source://jwt//lib/jwt/encode.rb#57
725
+ def signature; end
726
+
727
+ # source://jwt//lib/jwt/encode.rb#61
728
+ def validate_claims!; end
729
+ end
730
+
731
+ # source://jwt//lib/jwt/encode.rb#10
732
+ JWT::Encode::ALG_KEY = T.let(T.unsafe(nil), String)
733
+
734
+ # source://jwt//lib/jwt/error.rb#4
735
+ class JWT::EncodeError < ::StandardError; end
736
+
737
+ # source://jwt//lib/jwt/error.rb#9
738
+ class JWT::ExpiredSignature < ::JWT::DecodeError; end
739
+
740
+ # source://jwt//lib/jwt/error.rb#11
741
+ class JWT::ImmatureSignature < ::JWT::DecodeError; end
742
+
743
+ # source://jwt//lib/jwt/error.rb#10
744
+ class JWT::IncorrectAlgorithm < ::JWT::DecodeError; end
745
+
746
+ # source://jwt//lib/jwt/error.rb#15
747
+ class JWT::InvalidAudError < ::JWT::DecodeError; end
748
+
749
+ # source://jwt//lib/jwt/error.rb#14
750
+ class JWT::InvalidIatError < ::JWT::DecodeError; end
751
+
752
+ # source://jwt//lib/jwt/error.rb#12
753
+ class JWT::InvalidIssuerError < ::JWT::DecodeError; end
754
+
755
+ # source://jwt//lib/jwt/error.rb#17
756
+ class JWT::InvalidJtiError < ::JWT::DecodeError; end
757
+
758
+ # source://jwt//lib/jwt/error.rb#18
759
+ class JWT::InvalidPayload < ::JWT::DecodeError; end
760
+
761
+ # source://jwt//lib/jwt/error.rb#16
762
+ class JWT::InvalidSubError < ::JWT::DecodeError; end
763
+
764
+ # JSON wrapper
765
+ #
766
+ # source://jwt//lib/jwt/json.rb#7
767
+ class JWT::JSON
768
+ class << self
769
+ # source://jwt//lib/jwt/json.rb#9
770
+ def generate(data); end
771
+
772
+ # source://jwt//lib/jwt/json.rb#13
773
+ def parse(data); end
774
+ end
775
+ end
776
+
777
+ # source://jwt//lib/jwt/jwk/kid_as_key_digest.rb#4
778
+ module JWT::JWK
779
+ class << self
780
+ # source://jwt//lib/jwt/jwk.rb#24
781
+ def classes; end
782
+
783
+ # source://jwt//lib/jwt/jwk.rb#9
784
+ def create_from(key, params = T.unsafe(nil), options = T.unsafe(nil)); end
785
+
786
+ # source://jwt//lib/jwt/jwk.rb#9
787
+ def import(key, params = T.unsafe(nil), options = T.unsafe(nil)); end
788
+
789
+ # source://jwt//lib/jwt/jwk.rb#9
790
+ def new(key, params = T.unsafe(nil), options = T.unsafe(nil)); end
791
+
792
+ private
793
+
794
+ # source://jwt//lib/jwt/jwk.rb#38
795
+ def generate_mappings; end
796
+
797
+ # source://jwt//lib/jwt/jwk.rb#34
798
+ def mappings; end
799
+ end
800
+ end
801
+
802
+ # source://jwt//lib/jwt/jwk/ec.rb#7
803
+ class JWT::JWK::EC < ::JWT::JWK::KeyBase
804
+ # @return [EC] a new instance of EC
805
+ #
806
+ # source://jwt//lib/jwt/jwk/ec.rb#15
807
+ def initialize(key, params = T.unsafe(nil), options = T.unsafe(nil)); end
808
+
809
+ # source://jwt//lib/jwt/jwk/ec.rb#66
810
+ def []=(key, value); end
811
+
812
+ # source://jwt//lib/jwt/jwk/ec.rb#53
813
+ def export(options = T.unsafe(nil)); end
814
+
815
+ # source://jwt//lib/jwt/jwk/ec.rb#59
816
+ def key_digest; end
817
+
818
+ # source://jwt//lib/jwt/jwk/ec.rb#29
819
+ def keypair; end
820
+
821
+ # source://jwt//lib/jwt/jwk/ec.rb#49
822
+ def members; end
823
+
824
+ # @return [Boolean]
825
+ #
826
+ # source://jwt//lib/jwt/jwk/ec.rb#33
827
+ def private?; end
828
+
829
+ # source://jwt//lib/jwt/jwk/ec.rb#45
830
+ def public_key; end
831
+
832
+ # source://jwt//lib/jwt/jwk/ec.rb#37
833
+ def signing_key; end
834
+
835
+ # source://jwt//lib/jwt/jwk/ec.rb#41
836
+ def verify_key; end
837
+
838
+ private
839
+
840
+ # @raise [ArgumentError]
841
+ #
842
+ # source://jwt//lib/jwt/jwk/ec.rb#94
843
+ def check_jwk_params!(key_params, params); end
844
+
845
+ # source://jwt//lib/jwt/jwk/ec.rb#144
846
+ def create_ec_key(jwk_crv, jwk_x, jwk_y, jwk_d); end
847
+
848
+ # source://jwt//lib/jwt/jwk/ec.rb#208
849
+ def decode_octets(jwk_data); end
850
+
851
+ # source://jwt//lib/jwt/jwk/ec.rb#212
852
+ def decode_open_ssl_bn(jwk_data); end
853
+
854
+ # source://jwt//lib/jwt/jwk/ec.rb#76
855
+ def ec_key; end
856
+
857
+ # source://jwt//lib/jwt/jwk/ec.rb#121
858
+ def encode_octets(octets); end
859
+
860
+ # source://jwt//lib/jwt/jwk/ec.rb#127
861
+ def encode_open_ssl_bn(key_part); end
862
+
863
+ # source://jwt//lib/jwt/jwk/ec.rb#80
864
+ def extract_key_params(key); end
865
+
866
+ # source://jwt//lib/jwt/jwk/ec.rb#100
867
+ def keypair_components(ec_keypair); end
868
+
869
+ # source://jwt//lib/jwt/jwk/ec.rb#131
870
+ def parse_ec_key(key); end
871
+
872
+ class << self
873
+ # source://jwt//lib/jwt/jwk/ec.rb#217
874
+ def import(jwk_data); end
875
+
876
+ # source://jwt//lib/jwt/jwk/ec.rb#221
877
+ def to_openssl_curve(crv); end
878
+ end
879
+ end
880
+
881
+ # source://jwt//lib/jwt/jwk/ec.rb#10
882
+ JWT::JWK::EC::BINARY = T.let(T.unsafe(nil), Integer)
883
+
884
+ # source://jwt//lib/jwt/jwk/ec.rb#13
885
+ JWT::JWK::EC::EC_KEY_ELEMENTS = T.let(T.unsafe(nil), Array)
886
+
887
+ # source://jwt//lib/jwt/jwk/ec.rb#12
888
+ JWT::JWK::EC::EC_PRIVATE_KEY_ELEMENTS = T.let(T.unsafe(nil), Array)
889
+
890
+ # source://jwt//lib/jwt/jwk/ec.rb#11
891
+ JWT::JWK::EC::EC_PUBLIC_KEY_ELEMENTS = T.let(T.unsafe(nil), Array)
892
+
893
+ # source://jwt//lib/jwt/jwk/ec.rb#8
894
+ JWT::JWK::EC::KTY = T.let(T.unsafe(nil), String)
895
+
896
+ # source://jwt//lib/jwt/jwk/ec.rb#9
897
+ JWT::JWK::EC::KTYS = T.let(T.unsafe(nil), Array)
898
+
899
+ # source://jwt//lib/jwt/jwk/hmac.rb#5
900
+ class JWT::JWK::HMAC < ::JWT::JWK::KeyBase
901
+ # @return [HMAC] a new instance of HMAC
902
+ #
903
+ # source://jwt//lib/jwt/jwk/hmac.rb#12
904
+ def initialize(key, params = T.unsafe(nil), options = T.unsafe(nil)); end
905
+
906
+ # source://jwt//lib/jwt/jwk/hmac.rb#63
907
+ def []=(key, value); end
908
+
909
+ # See https://tools.ietf.org/html/rfc7517#appendix-A.3
910
+ #
911
+ # source://jwt//lib/jwt/jwk/hmac.rb#47
912
+ def export(options = T.unsafe(nil)); end
913
+
914
+ # source://jwt//lib/jwt/jwk/hmac.rb#57
915
+ def key_digest; end
916
+
917
+ # source://jwt//lib/jwt/jwk/hmac.rb#26
918
+ def keypair; end
919
+
920
+ # source://jwt//lib/jwt/jwk/hmac.rb#53
921
+ def members; end
922
+
923
+ # @return [Boolean]
924
+ #
925
+ # source://jwt//lib/jwt/jwk/hmac.rb#30
926
+ def private?; end
927
+
928
+ # source://jwt//lib/jwt/jwk/hmac.rb#34
929
+ def public_key; end
930
+
931
+ # source://jwt//lib/jwt/jwk/hmac.rb#42
932
+ def signing_key; end
933
+
934
+ # source://jwt//lib/jwt/jwk/hmac.rb#38
935
+ def verify_key; end
936
+
937
+ private
938
+
939
+ # @raise [ArgumentError]
940
+ #
941
+ # source://jwt//lib/jwt/jwk/hmac.rb#90
942
+ def check_jwk(keypair, params); end
943
+
944
+ # source://jwt//lib/jwt/jwk/hmac.rb#77
945
+ def extract_key_params(key); end
946
+
947
+ # source://jwt//lib/jwt/jwk/hmac.rb#73
948
+ def secret; end
949
+
950
+ class << self
951
+ # source://jwt//lib/jwt/jwk/hmac.rb#97
952
+ def import(jwk_data); end
953
+ end
954
+ end
955
+
956
+ # source://jwt//lib/jwt/jwk/hmac.rb#10
957
+ JWT::JWK::HMAC::HMAC_KEY_ELEMENTS = T.let(T.unsafe(nil), Array)
958
+
959
+ # source://jwt//lib/jwt/jwk/hmac.rb#9
960
+ JWT::JWK::HMAC::HMAC_PRIVATE_KEY_ELEMENTS = T.let(T.unsafe(nil), Array)
961
+
962
+ # source://jwt//lib/jwt/jwk/hmac.rb#8
963
+ JWT::JWK::HMAC::HMAC_PUBLIC_KEY_ELEMENTS = T.let(T.unsafe(nil), Array)
964
+
965
+ # source://jwt//lib/jwt/jwk/hmac.rb#6
966
+ JWT::JWK::HMAC::KTY = T.let(T.unsafe(nil), String)
967
+
968
+ # source://jwt//lib/jwt/jwk/hmac.rb#7
969
+ JWT::JWK::HMAC::KTYS = T.let(T.unsafe(nil), Array)
970
+
971
+ # source://jwt//lib/jwt/jwk/key_base.rb#5
972
+ class JWT::JWK::KeyBase
973
+ # @return [KeyBase] a new instance of KeyBase
974
+ #
975
+ # source://jwt//lib/jwt/jwk/key_base.rb#11
976
+ def initialize(options, params = T.unsafe(nil)); end
977
+
978
+ # source://jwt//lib/jwt/jwk/key_base.rb#46
979
+ def <=>(other); end
980
+
981
+ # source://jwt//lib/jwt/jwk/key_base.rb#40
982
+ def ==(other); end
983
+
984
+ # source://jwt//lib/jwt/jwk/key_base.rb#32
985
+ def [](key); end
986
+
987
+ # source://jwt//lib/jwt/jwk/key_base.rb#36
988
+ def []=(key, value); end
989
+
990
+ # source://jwt//lib/jwt/jwk/key_base.rb#40
991
+ def eql?(other); end
992
+
993
+ # source://jwt//lib/jwt/jwk/key_base.rb#28
994
+ def hash; end
995
+
996
+ # source://jwt//lib/jwt/jwk/key_base.rb#24
997
+ def kid; end
998
+
999
+ private
1000
+
1001
+ # Returns the value of attribute parameters.
1002
+ #
1003
+ # source://jwt//lib/jwt/jwk/key_base.rb#52
1004
+ def parameters; end
1005
+
1006
+ class << self
1007
+ # @private
1008
+ #
1009
+ # source://jwt//lib/jwt/jwk/key_base.rb#6
1010
+ def inherited(klass); end
1011
+ end
1012
+ end
1013
+
1014
+ # source://jwt//lib/jwt/jwk/key_finder.rb#5
1015
+ class JWT::JWK::KeyFinder
1016
+ # @return [KeyFinder] a new instance of KeyFinder
1017
+ #
1018
+ # source://jwt//lib/jwt/jwk/key_finder.rb#6
1019
+ def initialize(options); end
1020
+
1021
+ # @raise [::JWT::DecodeError]
1022
+ #
1023
+ # source://jwt//lib/jwt/jwk/key_finder.rb#17
1024
+ def key_for(kid); end
1025
+
1026
+ private
1027
+
1028
+ # source://jwt//lib/jwt/jwk/key_finder.rb#31
1029
+ def resolve_key(kid); end
1030
+ end
1031
+
1032
+ # source://jwt//lib/jwt/jwk/kid_as_key_digest.rb#5
1033
+ class JWT::JWK::KidAsKeyDigest
1034
+ # @return [KidAsKeyDigest] a new instance of KidAsKeyDigest
1035
+ #
1036
+ # source://jwt//lib/jwt/jwk/kid_as_key_digest.rb#6
1037
+ def initialize(jwk); end
1038
+
1039
+ # source://jwt//lib/jwt/jwk/kid_as_key_digest.rb#10
1040
+ def generate; end
1041
+ end
1042
+
1043
+ # source://jwt//lib/jwt/jwk/rsa.rb#5
1044
+ class JWT::JWK::RSA < ::JWT::JWK::KeyBase
1045
+ # @return [RSA] a new instance of RSA
1046
+ #
1047
+ # source://jwt//lib/jwt/jwk/rsa.rb#16
1048
+ def initialize(key, params = T.unsafe(nil), options = T.unsafe(nil)); end
1049
+
1050
+ # source://jwt//lib/jwt/jwk/rsa.rb#66
1051
+ def []=(key, value); end
1052
+
1053
+ # source://jwt//lib/jwt/jwk/rsa.rb#50
1054
+ def export(options = T.unsafe(nil)); end
1055
+
1056
+ # source://jwt//lib/jwt/jwk/rsa.rb#60
1057
+ def key_digest; end
1058
+
1059
+ # source://jwt//lib/jwt/jwk/rsa.rb#30
1060
+ def keypair; end
1061
+
1062
+ # source://jwt//lib/jwt/jwk/rsa.rb#56
1063
+ def members; end
1064
+
1065
+ # @return [Boolean]
1066
+ #
1067
+ # source://jwt//lib/jwt/jwk/rsa.rb#34
1068
+ def private?; end
1069
+
1070
+ # source://jwt//lib/jwt/jwk/rsa.rb#38
1071
+ def public_key; end
1072
+
1073
+ # source://jwt//lib/jwt/jwk/rsa.rb#42
1074
+ def signing_key; end
1075
+
1076
+ # source://jwt//lib/jwt/jwk/rsa.rb#46
1077
+ def verify_key; end
1078
+
1079
+ private
1080
+
1081
+ # @raise [ArgumentError]
1082
+ #
1083
+ # source://jwt//lib/jwt/jwk/rsa.rb#94
1084
+ def check_jwk_params!(key_params, params); end
1085
+
1086
+ # source://jwt//lib/jwt/jwk/rsa.rb#126
1087
+ def decode_open_ssl_bn(jwk_data); end
1088
+
1089
+ # source://jwt//lib/jwt/jwk/rsa.rb#120
1090
+ def encode_open_ssl_bn(key_part); end
1091
+
1092
+ # source://jwt//lib/jwt/jwk/rsa.rb#80
1093
+ def extract_key_params(key); end
1094
+
1095
+ # source://jwt//lib/jwt/jwk/rsa.rb#114
1096
+ def jwk_attributes(*attributes); end
1097
+
1098
+ # source://jwt//lib/jwt/jwk/rsa.rb#100
1099
+ def parse_rsa_key(key); end
1100
+
1101
+ # source://jwt//lib/jwt/jwk/rsa.rb#76
1102
+ def rsa_key; end
1103
+
1104
+ class << self
1105
+ # source://jwt//lib/jwt/jwk/rsa.rb#141
1106
+ def create_rsa_key(rsa_parameters); end
1107
+
1108
+ # source://jwt//lib/jwt/jwk/rsa.rb#169
1109
+ def create_rsa_key_using_accessors(rsa_parameters); end
1110
+
1111
+ # source://jwt//lib/jwt/jwk/rsa.rb#141
1112
+ def create_rsa_key_using_der(rsa_parameters); end
1113
+
1114
+ # source://jwt//lib/jwt/jwk/rsa.rb#159
1115
+ def create_rsa_key_using_sets(rsa_parameters); end
1116
+
1117
+ # source://jwt//lib/jwt/jwk/rsa.rb#135
1118
+ def decode_open_ssl_bn(jwk_data); end
1119
+
1120
+ # source://jwt//lib/jwt/jwk/rsa.rb#131
1121
+ def import(jwk_data); end
1122
+
1123
+ # @raise [JWT::JWKError]
1124
+ #
1125
+ # source://jwt//lib/jwt/jwk/rsa.rb#184
1126
+ def validate_rsa_parameters!(rsa_parameters); end
1127
+ end
1128
+ end
1129
+
1130
+ # source://jwt//lib/jwt/jwk/rsa.rb#6
1131
+ JWT::JWK::RSA::BINARY = T.let(T.unsafe(nil), Integer)
1132
+
1133
+ # source://jwt//lib/jwt/jwk/rsa.rb#7
1134
+ JWT::JWK::RSA::KTY = T.let(T.unsafe(nil), String)
1135
+
1136
+ # source://jwt//lib/jwt/jwk/rsa.rb#8
1137
+ JWT::JWK::RSA::KTYS = T.let(T.unsafe(nil), Array)
1138
+
1139
+ # https://www.rfc-editor.org/rfc/rfc3447#appendix-A.1.2
1140
+ #
1141
+ # source://jwt//lib/jwt/jwk/rsa.rb#14
1142
+ JWT::JWK::RSA::RSA_ASN1_SEQUENCE = T.let(T.unsafe(nil), Array)
1143
+
1144
+ # source://jwt//lib/jwt/jwk/rsa.rb#11
1145
+ JWT::JWK::RSA::RSA_KEY_ELEMENTS = T.let(T.unsafe(nil), Array)
1146
+
1147
+ # source://jwt//lib/jwt/jwk/rsa.rb#13
1148
+ JWT::JWK::RSA::RSA_OPT_PARAMS = T.let(T.unsafe(nil), Array)
1149
+
1150
+ # source://jwt//lib/jwt/jwk/rsa.rb#10
1151
+ JWT::JWK::RSA::RSA_PRIVATE_KEY_ELEMENTS = T.let(T.unsafe(nil), Array)
1152
+
1153
+ # source://jwt//lib/jwt/jwk/rsa.rb#9
1154
+ JWT::JWK::RSA::RSA_PUBLIC_KEY_ELEMENTS = T.let(T.unsafe(nil), Array)
1155
+
1156
+ # source://jwt//lib/jwt/jwk/set.rb#7
1157
+ class JWT::JWK::Set
1158
+ include ::Enumerable
1159
+ extend ::Forwardable
1160
+
1161
+ # @return [Set] a new instance of Set
1162
+ #
1163
+ # source://jwt//lib/jwt/jwk/set.rb#13
1164
+ def initialize(jwks = T.unsafe(nil), options = T.unsafe(nil)); end
1165
+
1166
+ # source://jwt//lib/jwt/jwk/set.rb#58
1167
+ def +(enum); end
1168
+
1169
+ # source://jwt//lib/jwt/jwk/set.rb#62
1170
+ def <<(key); end
1171
+
1172
+ # source://jwt//lib/jwt/jwk/set.rb#67
1173
+ def ==(other); end
1174
+
1175
+ # source://jwt//lib/jwt/jwk/set.rb#62
1176
+ def add(key); end
1177
+
1178
+ # source://forwardable/1.3.3/forwardable.rb#231
1179
+ def delete(*args, **_arg1, &block); end
1180
+
1181
+ # source://forwardable/1.3.3/forwardable.rb#231
1182
+ def dig(*args, **_arg1, &block); end
1183
+
1184
+ # source://forwardable/1.3.3/forwardable.rb#231
1185
+ def each(*args, **_arg1, &block); end
1186
+
1187
+ # source://jwt//lib/jwt/jwk/set.rb#67
1188
+ def eql?(other); end
1189
+
1190
+ # source://jwt//lib/jwt/jwk/set.rb#31
1191
+ def export(options = T.unsafe(nil)); end
1192
+
1193
+ # source://jwt//lib/jwt/jwk/set.rb#37
1194
+ def filter!(&block); end
1195
+
1196
+ # Returns the value of attribute keys.
1197
+ #
1198
+ # source://jwt//lib/jwt/jwk/set.rb#11
1199
+ def keys; end
1200
+
1201
+ # source://forwardable/1.3.3/forwardable.rb#231
1202
+ def length(*args, **_arg1, &block); end
1203
+
1204
+ # source://jwt//lib/jwt/jwk/set.rb#53
1205
+ def merge(enum); end
1206
+
1207
+ # source://jwt//lib/jwt/jwk/set.rb#43
1208
+ def reject!(&block); end
1209
+
1210
+ # source://jwt//lib/jwt/jwk/set.rb#37
1211
+ def select!(&block); end
1212
+
1213
+ # source://forwardable/1.3.3/forwardable.rb#231
1214
+ def size(*args, **_arg1, &block); end
1215
+
1216
+ # source://jwt//lib/jwt/jwk/set.rb#58
1217
+ def union(enum); end
1218
+
1219
+ # source://jwt//lib/jwt/jwk/set.rb#49
1220
+ def uniq!(&block); end
1221
+
1222
+ # For symbolic manipulation
1223
+ #
1224
+ # source://jwt//lib/jwt/jwk/set.rb#58
1225
+ def |(enum); end
1226
+ end
1227
+
1228
+ # https://tools.ietf.org/html/rfc7638
1229
+ #
1230
+ # source://jwt//lib/jwt/jwk/thumbprint.rb#6
1231
+ class JWT::JWK::Thumbprint
1232
+ # @return [Thumbprint] a new instance of Thumbprint
1233
+ #
1234
+ # source://jwt//lib/jwt/jwk/thumbprint.rb#9
1235
+ def initialize(jwk); end
1236
+
1237
+ # source://jwt//lib/jwt/jwk/thumbprint.rb#13
1238
+ def generate; end
1239
+
1240
+ # Returns the value of attribute jwk.
1241
+ #
1242
+ # source://jwt//lib/jwt/jwk/thumbprint.rb#7
1243
+ def jwk; end
1244
+
1245
+ # source://jwt//lib/jwt/jwk/thumbprint.rb#13
1246
+ def to_s; end
1247
+ end
1248
+
1249
+ # source://jwt//lib/jwt/error.rb#21
1250
+ class JWT::JWKError < ::JWT::DecodeError; end
1251
+
1252
+ # source://jwt//lib/jwt/error.rb#19
1253
+ class JWT::MissingRequiredClaim < ::JWT::DecodeError; end
1254
+
1255
+ # source://jwt//lib/jwt/error.rb#6
1256
+ class JWT::RequiredDependencyError < ::StandardError; end
1257
+
1258
+ # source://jwt//lib/jwt/error.rb#13
1259
+ class JWT::UnsupportedEcdsaCurve < ::JWT::IncorrectAlgorithm; end
1260
+
1261
+ # Moments version builder module
1262
+ #
1263
+ # source://jwt//lib/jwt/version.rb#10
1264
+ module JWT::VERSION; end
1265
+
1266
+ # major version
1267
+ #
1268
+ # source://jwt//lib/jwt/version.rb#12
1269
+ JWT::VERSION::MAJOR = T.let(T.unsafe(nil), Integer)
1270
+
1271
+ # minor version
1272
+ #
1273
+ # source://jwt//lib/jwt/version.rb#14
1274
+ JWT::VERSION::MINOR = T.let(T.unsafe(nil), Integer)
1275
+
1276
+ # alpha, beta, etc. tag
1277
+ #
1278
+ # source://jwt//lib/jwt/version.rb#18
1279
+ JWT::VERSION::PRE = T.let(T.unsafe(nil), T.untyped)
1280
+
1281
+ # Build version string
1282
+ #
1283
+ # source://jwt//lib/jwt/version.rb#21
1284
+ JWT::VERSION::STRING = T.let(T.unsafe(nil), String)
1285
+
1286
+ # tiny version
1287
+ #
1288
+ # source://jwt//lib/jwt/version.rb#16
1289
+ JWT::VERSION::TINY = T.let(T.unsafe(nil), Integer)
1290
+
1291
+ # source://jwt//lib/jwt/error.rb#8
1292
+ class JWT::VerificationError < ::JWT::DecodeError; end
1293
+
1294
+ # JWT verify methods
1295
+ #
1296
+ # source://jwt//lib/jwt/verify.rb#7
1297
+ class JWT::Verify
1298
+ # @return [Verify] a new instance of Verify
1299
+ #
1300
+ # source://jwt//lib/jwt/verify.rb#28
1301
+ def initialize(payload, options); end
1302
+
1303
+ # @raise [JWT::InvalidAudError]
1304
+ #
1305
+ # source://jwt//lib/jwt/verify.rb#33
1306
+ def verify_aud; end
1307
+
1308
+ # @raise [JWT::ExpiredSignature]
1309
+ #
1310
+ # source://jwt//lib/jwt/verify.rb#40
1311
+ def verify_expiration; end
1312
+
1313
+ # @raise [JWT::InvalidIatError]
1314
+ #
1315
+ # source://jwt//lib/jwt/verify.rb#45
1316
+ def verify_iat; end
1317
+
1318
+ # source://jwt//lib/jwt/verify.rb#52
1319
+ def verify_iss; end
1320
+
1321
+ # source://jwt//lib/jwt/verify.rb#67
1322
+ def verify_jti; end
1323
+
1324
+ # @raise [JWT::ImmatureSignature]
1325
+ #
1326
+ # source://jwt//lib/jwt/verify.rb#79
1327
+ def verify_not_before; end
1328
+
1329
+ # source://jwt//lib/jwt/verify.rb#91
1330
+ def verify_required_claims; end
1331
+
1332
+ # @raise [JWT::InvalidSubError]
1333
+ #
1334
+ # source://jwt//lib/jwt/verify.rb#84
1335
+ def verify_sub; end
1336
+
1337
+ private
1338
+
1339
+ # source://jwt//lib/jwt/verify.rb#105
1340
+ def exp_leeway; end
1341
+
1342
+ # source://jwt//lib/jwt/verify.rb#101
1343
+ def global_leeway; end
1344
+
1345
+ # source://jwt//lib/jwt/verify.rb#109
1346
+ def nbf_leeway; end
1347
+
1348
+ class << self
1349
+ # source://jwt//lib/jwt/verify.rb#14
1350
+ def verify_aud(payload, options); end
1351
+
1352
+ # source://jwt//lib/jwt/verify.rb#19
1353
+ def verify_claims(payload, options); end
1354
+
1355
+ # source://jwt//lib/jwt/verify.rb#14
1356
+ def verify_expiration(payload, options); end
1357
+
1358
+ # source://jwt//lib/jwt/verify.rb#14
1359
+ def verify_iat(payload, options); end
1360
+
1361
+ # source://jwt//lib/jwt/verify.rb#14
1362
+ def verify_iss(payload, options); end
1363
+
1364
+ # source://jwt//lib/jwt/verify.rb#14
1365
+ def verify_jti(payload, options); end
1366
+
1367
+ # source://jwt//lib/jwt/verify.rb#14
1368
+ def verify_not_before(payload, options); end
1369
+
1370
+ # source://jwt//lib/jwt/verify.rb#14
1371
+ def verify_required_claims(payload, options); end
1372
+
1373
+ # source://jwt//lib/jwt/verify.rb#14
1374
+ def verify_sub(payload, options); end
1375
+ end
1376
+ end
1377
+
1378
+ # source://jwt//lib/jwt/verify.rb#8
1379
+ JWT::Verify::DEFAULTS = T.let(T.unsafe(nil), Hash)
1380
+
1381
+ # If the x5c header certificate chain can be validated by trusted root
1382
+ # certificates, and none of the certificates are revoked, returns the public
1383
+ # key from the first certificate.
1384
+ # See https://tools.ietf.org/html/rfc7515#section-4.1.6
1385
+ #
1386
+ # source://jwt//lib/jwt/x5c_key_finder.rb#11
1387
+ class JWT::X5cKeyFinder
1388
+ # @raise [ArgumentError]
1389
+ # @return [X5cKeyFinder] a new instance of X5cKeyFinder
1390
+ #
1391
+ # source://jwt//lib/jwt/x5c_key_finder.rb#12
1392
+ def initialize(root_certificates, crls = T.unsafe(nil)); end
1393
+
1394
+ # source://jwt//lib/jwt/x5c_key_finder.rb#18
1395
+ def from(x5c_header_or_certificates); end
1396
+
1397
+ private
1398
+
1399
+ # source://jwt//lib/jwt/x5c_key_finder.rb#36
1400
+ def build_store(root_certificates, crls); end
1401
+
1402
+ # source://jwt//lib/jwt/x5c_key_finder.rb#45
1403
+ def parse_certificates(x5c_header_or_certificates); end
1404
+ end