httpsensible 0.1.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (72) hide show
  1. checksums.yaml +7 -0
  2. data/.rubocop.yml +4 -0
  3. data/.ruby-version +1 -0
  4. data/.vscode/settings.json +8 -0
  5. data/CHANGELOG.md +5 -0
  6. data/Gemfile +18 -0
  7. data/LICENSE.txt +21 -0
  8. data/README.md +45 -0
  9. data/Rakefile +20 -0
  10. data/lib/httpsensible/client/response.rb +54 -0
  11. data/lib/httpsensible/client.rb +39 -0
  12. data/lib/httpsensible/jwt.rb +26 -0
  13. data/lib/httpsensible/version.rb +6 -0
  14. data/lib/httpsensible.rb +10 -0
  15. data/sorbet/config +4 -0
  16. data/sorbet/rbi/annotations/rainbow.rbi +269 -0
  17. data/sorbet/rbi/dsl/active_support/callbacks.rbi +22 -0
  18. data/sorbet/rbi/gems/activesupport@7.0.6.rbi +14 -0
  19. data/sorbet/rbi/gems/addressable@2.8.4.rbi +1954 -0
  20. data/sorbet/rbi/gems/amazing_print@1.5.0.rbi +923 -0
  21. data/sorbet/rbi/gems/ast@2.4.2.rbi +584 -0
  22. data/sorbet/rbi/gems/concurrent-ruby@1.2.2.rbi +8 -0
  23. data/sorbet/rbi/gems/crack@0.4.5.rbi +144 -0
  24. data/sorbet/rbi/gems/diff-lcs@1.5.0.rbi +1083 -0
  25. data/sorbet/rbi/gems/erubi@1.12.0.rbi +145 -0
  26. data/sorbet/rbi/gems/hashdiff@1.0.1.rbi +350 -0
  27. data/sorbet/rbi/gems/http-2-next@0.5.1.rbi +1441 -0
  28. data/sorbet/rbi/gems/httpx@0.24.1.rbi +3255 -0
  29. data/sorbet/rbi/gems/i18n@1.14.1.rbi +8 -0
  30. data/sorbet/rbi/gems/io-console@0.6.0.rbi +8 -0
  31. data/sorbet/rbi/gems/irb@1.7.1.rbi +342 -0
  32. data/sorbet/rbi/gems/json@2.6.3.rbi +1533 -0
  33. data/sorbet/rbi/gems/jwt@2.7.1.rbi +1404 -0
  34. data/sorbet/rbi/gems/language_server-protocol@3.17.0.3.rbi +14237 -0
  35. data/sorbet/rbi/gems/minitest-focus@1.3.1.rbi +91 -0
  36. data/sorbet/rbi/gems/minitest@5.18.1.rbi +1503 -0
  37. data/sorbet/rbi/gems/netrc@0.11.0.rbi +158 -0
  38. data/sorbet/rbi/gems/parallel@1.23.0.rbi +273 -0
  39. data/sorbet/rbi/gems/parser@3.2.2.3.rbi +7253 -0
  40. data/sorbet/rbi/gems/prettier_print@1.2.1.rbi +951 -0
  41. data/sorbet/rbi/gems/public_suffix@5.0.1.rbi +935 -0
  42. data/sorbet/rbi/gems/racc@1.7.1.rbi +161 -0
  43. data/sorbet/rbi/gems/rack@3.0.8.rbi +5183 -0
  44. data/sorbet/rbi/gems/rainbow@3.1.1.rbi +402 -0
  45. data/sorbet/rbi/gems/rake@13.0.6.rbi +3024 -0
  46. data/sorbet/rbi/gems/rbi@0.0.16.rbi +2999 -0
  47. data/sorbet/rbi/gems/regexp_parser@2.8.1.rbi +3749 -0
  48. data/sorbet/rbi/gems/reline@0.3.6.rbi +8 -0
  49. data/sorbet/rbi/gems/rexml@3.2.5.rbi +4717 -0
  50. data/sorbet/rbi/gems/rubocop-ast@1.29.0.rbi +6985 -0
  51. data/sorbet/rbi/gems/rubocop-minitest@0.31.0.rbi +8 -0
  52. data/sorbet/rbi/gems/rubocop-performance@1.18.0.rbi +8 -0
  53. data/sorbet/rbi/gems/rubocop-rails@2.20.2.rbi +8 -0
  54. data/sorbet/rbi/gems/rubocop-rake@0.6.0.rbi +8 -0
  55. data/sorbet/rbi/gems/rubocop-shopify@2.14.0.rbi +8 -0
  56. data/sorbet/rbi/gems/rubocop-sorbet@0.7.0.rbi +8 -0
  57. data/sorbet/rbi/gems/rubocop-standard@7.1.0.rbi +8 -0
  58. data/sorbet/rbi/gems/rubocop@1.54.1.rbi +56172 -0
  59. data/sorbet/rbi/gems/ruby-progressbar@1.13.0.rbi +1317 -0
  60. data/sorbet/rbi/gems/spoom@1.2.2.rbi +2994 -0
  61. data/sorbet/rbi/gems/syntax_tree@6.1.1.rbi +22855 -0
  62. data/sorbet/rbi/gems/tapioca@0.11.7.rbi +3347 -0
  63. data/sorbet/rbi/gems/thor@1.2.2.rbi +3965 -0
  64. data/sorbet/rbi/gems/tzinfo@2.0.6.rbi +8 -0
  65. data/sorbet/rbi/gems/unicode-display_width@2.4.2.rbi +65 -0
  66. data/sorbet/rbi/gems/unparser@0.6.8.rbi +4525 -0
  67. data/sorbet/rbi/gems/webmock@3.18.1.rbi +1756 -0
  68. data/sorbet/rbi/gems/yard-sorbet@0.8.1.rbi +428 -0
  69. data/sorbet/rbi/gems/yard@0.9.34.rbi +18219 -0
  70. data/sorbet/tapioca/config.yml +13 -0
  71. data/sorbet/tapioca/require.rb +4 -0
  72. metadata +190 -0
@@ -0,0 +1,1404 @@
1
+ # typed: true
2
+
3
+ # DO NOT EDIT MANUALLY
4
+ # This is an autogenerated file for types exported from the `jwt` gem.
5
+ # Please instead update this file by running `bin/tapioca gem jwt`.
6
+
7
+ # JSON Web Token implementation
8
+ #
9
+ # Should be up to date with the latest spec:
10
+ # https://tools.ietf.org/html/rfc7519
11
+ #
12
+ # source://jwt//lib/jwt/version.rb#4
13
+ module JWT
14
+ extend ::JWT::Configuration
15
+
16
+ private
17
+
18
+ # source://jwt//lib/jwt.rb#28
19
+ def decode(jwt, key = T.unsafe(nil), verify = T.unsafe(nil), options = T.unsafe(nil), &keyfinder); end
20
+
21
+ # source://jwt//lib/jwt.rb#21
22
+ def encode(payload, key, algorithm = T.unsafe(nil), header_fields = T.unsafe(nil)); end
23
+
24
+ class << self
25
+ # source://jwt//lib/jwt.rb#28
26
+ def decode(jwt, key = T.unsafe(nil), verify = T.unsafe(nil), options = T.unsafe(nil), &keyfinder); end
27
+
28
+ # source://jwt//lib/jwt.rb#21
29
+ def encode(payload, key, algorithm = T.unsafe(nil), header_fields = T.unsafe(nil)); end
30
+
31
+ # source://jwt//lib/jwt/version.rb#5
32
+ def gem_version; end
33
+
34
+ # @return [Boolean]
35
+ #
36
+ # source://jwt//lib/jwt/version.rb#24
37
+ def openssl_3?; end
38
+
39
+ # @return [Boolean]
40
+ #
41
+ # source://jwt//lib/jwt/version.rb#37
42
+ def openssl_3_hmac_empty_key_regression?; end
43
+
44
+ # source://jwt//lib/jwt/version.rb#41
45
+ def openssl_version; end
46
+
47
+ # @return [Boolean]
48
+ #
49
+ # source://jwt//lib/jwt/version.rb#29
50
+ def rbnacl?; end
51
+
52
+ # @return [Boolean]
53
+ #
54
+ # source://jwt//lib/jwt/version.rb#33
55
+ def rbnacl_6_or_greater?; end
56
+ end
57
+ end
58
+
59
+ # source://jwt//lib/jwt/algos/hmac.rb#4
60
+ module JWT::Algos
61
+ extend ::JWT::Algos
62
+
63
+ # source://jwt//lib/jwt/algos.rb#44
64
+ def create(algorithm); end
65
+
66
+ # source://jwt//lib/jwt/algos.rb#40
67
+ def find(algorithm); end
68
+
69
+ # @return [Boolean]
70
+ #
71
+ # source://jwt//lib/jwt/algos.rb#48
72
+ def implementation?(algorithm); end
73
+
74
+ private
75
+
76
+ # source://jwt//lib/jwt/algos.rb#55
77
+ def indexed; end
78
+ end
79
+
80
+ # source://jwt//lib/jwt/algos.rb#23
81
+ JWT::Algos::ALGOS = T.let(T.unsafe(nil), Array)
82
+
83
+ # source://jwt//lib/jwt/algos/algo_wrapper.rb#5
84
+ class JWT::Algos::AlgoWrapper
85
+ # @return [AlgoWrapper] a new instance of AlgoWrapper
86
+ #
87
+ # source://jwt//lib/jwt/algos/algo_wrapper.rb#8
88
+ def initialize(alg, cls); end
89
+
90
+ # Returns the value of attribute alg.
91
+ #
92
+ # source://jwt//lib/jwt/algos/algo_wrapper.rb#6
93
+ def alg; end
94
+
95
+ # Returns the value of attribute cls.
96
+ #
97
+ # source://jwt//lib/jwt/algos/algo_wrapper.rb#6
98
+ def cls; end
99
+
100
+ # source://jwt//lib/jwt/algos/algo_wrapper.rb#17
101
+ def sign(data:, signing_key:); end
102
+
103
+ # @return [Boolean]
104
+ #
105
+ # source://jwt//lib/jwt/algos/algo_wrapper.rb#13
106
+ def valid_alg?(alg_to_check); end
107
+
108
+ # source://jwt//lib/jwt/algos/algo_wrapper.rb#21
109
+ def verify(data:, signature:, verification_key:); end
110
+ end
111
+
112
+ # source://jwt//lib/jwt/algos/ecdsa.rb#5
113
+ module JWT::Algos::Ecdsa
114
+ private
115
+
116
+ # source://jwt//lib/jwt/algos/ecdsa.rb#70
117
+ def asn1_to_raw(signature, public_key); end
118
+
119
+ # source://jwt//lib/jwt/algos/ecdsa.rb#57
120
+ def curve_by_name(name); end
121
+
122
+ # source://jwt//lib/jwt/algos/ecdsa.rb#63
123
+ def raw_to_asn1(signature, private_key); end
124
+
125
+ # source://jwt//lib/jwt/algos/ecdsa.rb#33
126
+ def sign(algorithm, msg, key); end
127
+
128
+ # source://jwt//lib/jwt/algos/ecdsa.rb#44
129
+ def verify(algorithm, public_key, signing_input, signature); end
130
+
131
+ class << self
132
+ # source://jwt//lib/jwt/algos/ecdsa.rb#70
133
+ def asn1_to_raw(signature, public_key); end
134
+
135
+ # source://jwt//lib/jwt/algos/ecdsa.rb#57
136
+ def curve_by_name(name); end
137
+
138
+ # source://jwt//lib/jwt/algos/ecdsa.rb#63
139
+ def raw_to_asn1(signature, private_key); end
140
+
141
+ # source://jwt//lib/jwt/algos/ecdsa.rb#33
142
+ def sign(algorithm, msg, key); end
143
+
144
+ # source://jwt//lib/jwt/algos/ecdsa.rb#44
145
+ def verify(algorithm, public_key, signing_input, signature); end
146
+ end
147
+ end
148
+
149
+ # source://jwt//lib/jwt/algos/ecdsa.rb#8
150
+ JWT::Algos::Ecdsa::NAMED_CURVES = T.let(T.unsafe(nil), Hash)
151
+
152
+ # source://jwt//lib/jwt/algos/ecdsa.rb#31
153
+ JWT::Algos::Ecdsa::SUPPORTED = T.let(T.unsafe(nil), Array)
154
+
155
+ # source://jwt//lib/jwt/algos/eddsa.rb#5
156
+ module JWT::Algos::Eddsa
157
+ private
158
+
159
+ # source://jwt//lib/jwt/algos/eddsa.rb#10
160
+ def sign(algorithm, msg, key); end
161
+
162
+ # source://jwt//lib/jwt/algos/eddsa.rb#21
163
+ def verify(algorithm, public_key, signing_input, signature); end
164
+
165
+ class << self
166
+ # source://jwt//lib/jwt/algos/eddsa.rb#10
167
+ def sign(algorithm, msg, key); end
168
+
169
+ # source://jwt//lib/jwt/algos/eddsa.rb#21
170
+ def verify(algorithm, public_key, signing_input, signature); end
171
+ end
172
+ end
173
+
174
+ # source://jwt//lib/jwt/algos/eddsa.rb#8
175
+ JWT::Algos::Eddsa::SUPPORTED = T.let(T.unsafe(nil), Array)
176
+
177
+ # source://jwt//lib/jwt/algos/hmac.rb#5
178
+ module JWT::Algos::Hmac
179
+ private
180
+
181
+ # source://jwt//lib/jwt/algos/hmac.rb#16
182
+ def sign(algorithm, msg, key); end
183
+
184
+ # source://jwt//lib/jwt/algos/hmac.rb#30
185
+ def verify(algorithm, key, signing_input, signature); end
186
+
187
+ class << self
188
+ # source://jwt//lib/jwt/algos/hmac.rb#16
189
+ def sign(algorithm, msg, key); end
190
+
191
+ # source://jwt//lib/jwt/algos/hmac.rb#30
192
+ def verify(algorithm, key, signing_input, signature); end
193
+ end
194
+ end
195
+
196
+ # source://jwt//lib/jwt/algos/hmac.rb#8
197
+ JWT::Algos::Hmac::MAPPING = T.let(T.unsafe(nil), Hash)
198
+
199
+ # source://jwt//lib/jwt/algos/hmac.rb#14
200
+ JWT::Algos::Hmac::SUPPORTED = T.let(T.unsafe(nil), Array)
201
+
202
+ # Copy of https://github.com/rails/rails/blob/v7.0.3.1/activesupport/lib/active_support/security_utils.rb
203
+ #
204
+ # source://jwt//lib/jwt/algos/hmac.rb#36
205
+ module JWT::Algos::Hmac::SecurityUtils
206
+ private
207
+
208
+ # @raise [ArgumentError]
209
+ #
210
+ # source://jwt//lib/jwt/algos/hmac.rb#43
211
+ def fixed_length_secure_compare(a, b); end
212
+
213
+ # Secure string comparison for strings of variable length.
214
+ #
215
+ # While a timing attack would not be able to discern the content of
216
+ # a secret compared via secure_compare, it is possible to determine
217
+ # the secret length. This should be considered when using secure_compare
218
+ # to compare weak, short secrets to user input.
219
+ #
220
+ # source://jwt//lib/jwt/algos/hmac.rb#65
221
+ def secure_compare(a, b); end
222
+
223
+ class << self
224
+ # @raise [ArgumentError]
225
+ #
226
+ # source://jwt//lib/jwt/algos/hmac.rb#43
227
+ def fixed_length_secure_compare(a, b); end
228
+
229
+ # Secure string comparison for strings of variable length.
230
+ #
231
+ # While a timing attack would not be able to discern the content of
232
+ # a secret compared via secure_compare, it is possible to determine
233
+ # the secret length. This should be considered when using secure_compare
234
+ # to compare weak, short secrets to user input.
235
+ #
236
+ # source://jwt//lib/jwt/algos/hmac.rb#65
237
+ def secure_compare(a, b); end
238
+ end
239
+ end
240
+
241
+ # source://jwt//lib/jwt/algos/none.rb#5
242
+ module JWT::Algos::None
243
+ private
244
+
245
+ # source://jwt//lib/jwt/algos/none.rb#10
246
+ def sign(*_arg0); end
247
+
248
+ # source://jwt//lib/jwt/algos/none.rb#14
249
+ def verify(*_arg0); end
250
+
251
+ class << self
252
+ # source://jwt//lib/jwt/algos/none.rb#10
253
+ def sign(*_arg0); end
254
+
255
+ # source://jwt//lib/jwt/algos/none.rb#14
256
+ def verify(*_arg0); end
257
+ end
258
+ end
259
+
260
+ # source://jwt//lib/jwt/algos/none.rb#8
261
+ JWT::Algos::None::SUPPORTED = T.let(T.unsafe(nil), Array)
262
+
263
+ # source://jwt//lib/jwt/algos/ps.rb#5
264
+ module JWT::Algos::Ps
265
+ private
266
+
267
+ # source://jwt//lib/jwt/algos/ps.rb#30
268
+ def require_openssl!; end
269
+
270
+ # source://jwt//lib/jwt/algos/ps.rb#12
271
+ def sign(algorithm, msg, key); end
272
+
273
+ # source://jwt//lib/jwt/algos/ps.rb#22
274
+ def verify(algorithm, public_key, signing_input, signature); end
275
+
276
+ class << self
277
+ # source://jwt//lib/jwt/algos/ps.rb#30
278
+ def require_openssl!; end
279
+
280
+ # @raise [EncodeError]
281
+ #
282
+ # source://jwt//lib/jwt/algos/ps.rb#12
283
+ def sign(algorithm, msg, key); end
284
+
285
+ # source://jwt//lib/jwt/algos/ps.rb#22
286
+ def verify(algorithm, public_key, signing_input, signature); end
287
+ end
288
+ end
289
+
290
+ # source://jwt//lib/jwt/algos/ps.rb#10
291
+ JWT::Algos::Ps::SUPPORTED = T.let(T.unsafe(nil), Array)
292
+
293
+ # source://jwt//lib/jwt/algos/rsa.rb#5
294
+ module JWT::Algos::Rsa
295
+ private
296
+
297
+ # source://jwt//lib/jwt/algos/rsa.rb#10
298
+ def sign(algorithm, msg, key); end
299
+
300
+ # source://jwt//lib/jwt/algos/rsa.rb#16
301
+ def verify(algorithm, public_key, signing_input, signature); end
302
+
303
+ class << self
304
+ # @raise [EncodeError]
305
+ #
306
+ # source://jwt//lib/jwt/algos/rsa.rb#10
307
+ def sign(algorithm, msg, key); end
308
+
309
+ # source://jwt//lib/jwt/algos/rsa.rb#16
310
+ def verify(algorithm, public_key, signing_input, signature); end
311
+ end
312
+ end
313
+
314
+ # source://jwt//lib/jwt/algos/rsa.rb#8
315
+ JWT::Algos::Rsa::SUPPORTED = T.let(T.unsafe(nil), Array)
316
+
317
+ # source://jwt//lib/jwt/algos/unsupported.rb#5
318
+ module JWT::Algos::Unsupported
319
+ private
320
+
321
+ # source://jwt//lib/jwt/algos/unsupported.rb#10
322
+ def sign(*_arg0); end
323
+
324
+ # source://jwt//lib/jwt/algos/unsupported.rb#14
325
+ def verify(*_arg0); end
326
+
327
+ class << self
328
+ # @raise [NotImplementedError]
329
+ #
330
+ # source://jwt//lib/jwt/algos/unsupported.rb#10
331
+ def sign(*_arg0); end
332
+
333
+ # @raise [JWT::VerificationError]
334
+ #
335
+ # source://jwt//lib/jwt/algos/unsupported.rb#14
336
+ def verify(*_arg0); end
337
+ end
338
+ end
339
+
340
+ # source://jwt//lib/jwt/algos/unsupported.rb#8
341
+ JWT::Algos::Unsupported::SUPPORTED = T.let(T.unsafe(nil), Array)
342
+
343
+ # Base64 helpers
344
+ #
345
+ # source://jwt//lib/jwt/base64.rb#7
346
+ class JWT::Base64
347
+ class << self
348
+ # source://jwt//lib/jwt/base64.rb#13
349
+ def url_decode(str); end
350
+
351
+ # source://jwt//lib/jwt/base64.rb#9
352
+ def url_encode(str); end
353
+ end
354
+ end
355
+
356
+ # source://jwt//lib/jwt/claims_validator.rb#6
357
+ class JWT::ClaimsValidator
358
+ # @return [ClaimsValidator] a new instance of ClaimsValidator
359
+ #
360
+ # source://jwt//lib/jwt/claims_validator.rb#13
361
+ def initialize(payload); end
362
+
363
+ # source://jwt//lib/jwt/claims_validator.rb#17
364
+ def validate!; end
365
+
366
+ private
367
+
368
+ # @raise [InvalidPayload]
369
+ #
370
+ # source://jwt//lib/jwt/claims_validator.rb#31
371
+ def validate_is_numeric(claim); end
372
+
373
+ # source://jwt//lib/jwt/claims_validator.rb#25
374
+ def validate_numeric_claims; end
375
+ end
376
+
377
+ # source://jwt//lib/jwt/claims_validator.rb#7
378
+ JWT::ClaimsValidator::NUMERIC_CLAIMS = T.let(T.unsafe(nil), Array)
379
+
380
+ # source://jwt//lib/jwt/configuration/decode_configuration.rb#4
381
+ module JWT::Configuration
382
+ # source://jwt//lib/jwt/configuration.rb#11
383
+ def configuration; end
384
+
385
+ # @yield [configuration]
386
+ #
387
+ # source://jwt//lib/jwt/configuration.rb#7
388
+ def configure; end
389
+ end
390
+
391
+ # source://jwt//lib/jwt/configuration/container.rb#8
392
+ class JWT::Configuration::Container
393
+ # @return [Container] a new instance of Container
394
+ #
395
+ # source://jwt//lib/jwt/configuration/container.rb#11
396
+ def initialize; end
397
+
398
+ # Returns the value of attribute decode.
399
+ #
400
+ # source://jwt//lib/jwt/configuration/container.rb#9
401
+ def decode; end
402
+
403
+ # Sets the attribute decode
404
+ #
405
+ # @param value the value to set the attribute decode to.
406
+ #
407
+ # source://jwt//lib/jwt/configuration/container.rb#9
408
+ def decode=(_arg0); end
409
+
410
+ # Returns the value of attribute jwk.
411
+ #
412
+ # source://jwt//lib/jwt/configuration/container.rb#9
413
+ def jwk; end
414
+
415
+ # Sets the attribute jwk
416
+ #
417
+ # @param value the value to set the attribute jwk to.
418
+ #
419
+ # source://jwt//lib/jwt/configuration/container.rb#9
420
+ def jwk=(_arg0); end
421
+
422
+ # source://jwt//lib/jwt/configuration/container.rb#15
423
+ def reset!; end
424
+ end
425
+
426
+ # source://jwt//lib/jwt/configuration/decode_configuration.rb#5
427
+ class JWT::Configuration::DecodeConfiguration
428
+ # @return [DecodeConfiguration] a new instance of DecodeConfiguration
429
+ #
430
+ # source://jwt//lib/jwt/configuration/decode_configuration.rb#17
431
+ def initialize; end
432
+
433
+ # Returns the value of attribute algorithms.
434
+ #
435
+ # source://jwt//lib/jwt/configuration/decode_configuration.rb#6
436
+ def algorithms; end
437
+
438
+ # Sets the attribute algorithms
439
+ #
440
+ # @param value the value to set the attribute algorithms to.
441
+ #
442
+ # source://jwt//lib/jwt/configuration/decode_configuration.rb#6
443
+ def algorithms=(_arg0); end
444
+
445
+ # Returns the value of attribute leeway.
446
+ #
447
+ # source://jwt//lib/jwt/configuration/decode_configuration.rb#6
448
+ def leeway; end
449
+
450
+ # Sets the attribute leeway
451
+ #
452
+ # @param value the value to set the attribute leeway to.
453
+ #
454
+ # source://jwt//lib/jwt/configuration/decode_configuration.rb#6
455
+ def leeway=(_arg0); end
456
+
457
+ # Returns the value of attribute required_claims.
458
+ #
459
+ # source://jwt//lib/jwt/configuration/decode_configuration.rb#6
460
+ def required_claims; end
461
+
462
+ # Sets the attribute required_claims
463
+ #
464
+ # @param value the value to set the attribute required_claims to.
465
+ #
466
+ # source://jwt//lib/jwt/configuration/decode_configuration.rb#6
467
+ def required_claims=(_arg0); end
468
+
469
+ # source://jwt//lib/jwt/configuration/decode_configuration.rb#30
470
+ def to_h; end
471
+
472
+ # Returns the value of attribute verify_aud.
473
+ #
474
+ # source://jwt//lib/jwt/configuration/decode_configuration.rb#6
475
+ def verify_aud; end
476
+
477
+ # Sets the attribute verify_aud
478
+ #
479
+ # @param value the value to set the attribute verify_aud to.
480
+ #
481
+ # source://jwt//lib/jwt/configuration/decode_configuration.rb#6
482
+ def verify_aud=(_arg0); end
483
+
484
+ # Returns the value of attribute verify_expiration.
485
+ #
486
+ # source://jwt//lib/jwt/configuration/decode_configuration.rb#6
487
+ def verify_expiration; end
488
+
489
+ # Sets the attribute verify_expiration
490
+ #
491
+ # @param value the value to set the attribute verify_expiration to.
492
+ #
493
+ # source://jwt//lib/jwt/configuration/decode_configuration.rb#6
494
+ def verify_expiration=(_arg0); end
495
+
496
+ # Returns the value of attribute verify_iat.
497
+ #
498
+ # source://jwt//lib/jwt/configuration/decode_configuration.rb#6
499
+ def verify_iat; end
500
+
501
+ # Sets the attribute verify_iat
502
+ #
503
+ # @param value the value to set the attribute verify_iat to.
504
+ #
505
+ # source://jwt//lib/jwt/configuration/decode_configuration.rb#6
506
+ def verify_iat=(_arg0); end
507
+
508
+ # Returns the value of attribute verify_iss.
509
+ #
510
+ # source://jwt//lib/jwt/configuration/decode_configuration.rb#6
511
+ def verify_iss; end
512
+
513
+ # Sets the attribute verify_iss
514
+ #
515
+ # @param value the value to set the attribute verify_iss to.
516
+ #
517
+ # source://jwt//lib/jwt/configuration/decode_configuration.rb#6
518
+ def verify_iss=(_arg0); end
519
+
520
+ # Returns the value of attribute verify_jti.
521
+ #
522
+ # source://jwt//lib/jwt/configuration/decode_configuration.rb#6
523
+ def verify_jti; end
524
+
525
+ # Sets the attribute verify_jti
526
+ #
527
+ # @param value the value to set the attribute verify_jti to.
528
+ #
529
+ # source://jwt//lib/jwt/configuration/decode_configuration.rb#6
530
+ def verify_jti=(_arg0); end
531
+
532
+ # Returns the value of attribute verify_not_before.
533
+ #
534
+ # source://jwt//lib/jwt/configuration/decode_configuration.rb#6
535
+ def verify_not_before; end
536
+
537
+ # Sets the attribute verify_not_before
538
+ #
539
+ # @param value the value to set the attribute verify_not_before to.
540
+ #
541
+ # source://jwt//lib/jwt/configuration/decode_configuration.rb#6
542
+ def verify_not_before=(_arg0); end
543
+
544
+ # Returns the value of attribute verify_sub.
545
+ #
546
+ # source://jwt//lib/jwt/configuration/decode_configuration.rb#6
547
+ def verify_sub; end
548
+
549
+ # Sets the attribute verify_sub
550
+ #
551
+ # @param value the value to set the attribute verify_sub to.
552
+ #
553
+ # source://jwt//lib/jwt/configuration/decode_configuration.rb#6
554
+ def verify_sub=(_arg0); end
555
+ end
556
+
557
+ # source://jwt//lib/jwt/configuration/jwk_configuration.rb#8
558
+ class JWT::Configuration::JwkConfiguration
559
+ # @return [JwkConfiguration] a new instance of JwkConfiguration
560
+ #
561
+ # source://jwt//lib/jwt/configuration/jwk_configuration.rb#9
562
+ def initialize; end
563
+
564
+ # Returns the value of attribute kid_generator.
565
+ #
566
+ # source://jwt//lib/jwt/configuration/jwk_configuration.rb#24
567
+ def kid_generator; end
568
+
569
+ # Sets the attribute kid_generator
570
+ #
571
+ # @param value the value to set the attribute kid_generator to.
572
+ #
573
+ # source://jwt//lib/jwt/configuration/jwk_configuration.rb#24
574
+ def kid_generator=(_arg0); end
575
+
576
+ # source://jwt//lib/jwt/configuration/jwk_configuration.rb#13
577
+ def kid_generator_type=(value); end
578
+ end
579
+
580
+ # Decoding logic for JWT
581
+ #
582
+ # source://jwt//lib/jwt/decode.rb#11
583
+ class JWT::Decode
584
+ # @raise [JWT::DecodeError]
585
+ # @return [Decode] a new instance of Decode
586
+ #
587
+ # source://jwt//lib/jwt/decode.rb#12
588
+ def initialize(jwt, key, verify, options, &keyfinder); end
589
+
590
+ # @raise [JWT::DecodeError]
591
+ #
592
+ # source://jwt//lib/jwt/decode.rb#24
593
+ def decode_segments; end
594
+
595
+ private
596
+
597
+ # source://jwt//lib/jwt/decode.rb#146
598
+ def alg_in_header; end
599
+
600
+ # source://jwt//lib/jwt/decode.rb#90
601
+ def allowed_algorithms; end
602
+
603
+ # source://jwt//lib/jwt/decode.rb#72
604
+ def allowed_and_valid_algorithms; end
605
+
606
+ # source://jwt//lib/jwt/decode.rb#142
607
+ def decode_signature; end
608
+
609
+ # @raise [JWT::DecodeError]
610
+ #
611
+ # source://jwt//lib/jwt/decode.rb#113
612
+ def find_key(&keyfinder); end
613
+
614
+ # source://jwt//lib/jwt/decode.rb#82
615
+ def given_algorithms; end
616
+
617
+ # source://jwt//lib/jwt/decode.rb#150
618
+ def header; end
619
+
620
+ # @return [Boolean]
621
+ #
622
+ # source://jwt//lib/jwt/decode.rb#138
623
+ def none_algorithm?; end
624
+
625
+ # source://jwt//lib/jwt/decode.rb#162
626
+ def parse_and_decode(segment); end
627
+
628
+ # source://jwt//lib/jwt/decode.rb#154
629
+ def payload; end
630
+
631
+ # source://jwt//lib/jwt/decode.rb#94
632
+ def resolve_allowed_algorithms; end
633
+
634
+ # source://jwt//lib/jwt/decode.rb#134
635
+ def segment_length; end
636
+
637
+ # source://jwt//lib/jwt/decode.rb#58
638
+ def set_key; end
639
+
640
+ # source://jwt//lib/jwt/decode.rb#158
641
+ def signing_input; end
642
+
643
+ # Move algorithms matching the JWT alg header to the beginning of the list
644
+ #
645
+ # source://jwt//lib/jwt/decode.rb#107
646
+ def sort_by_alg_header(algs); end
647
+
648
+ # @raise [JWT::DecodeError]
649
+ #
650
+ # source://jwt//lib/jwt/decode.rb#126
651
+ def validate_segment_count!; end
652
+
653
+ # @raise [JWT::IncorrectAlgorithm]
654
+ #
655
+ # source://jwt//lib/jwt/decode.rb#52
656
+ def verify_algo; end
657
+
658
+ # source://jwt//lib/jwt/decode.rb#121
659
+ def verify_claims; end
660
+
661
+ # @raise [JWT::DecodeError]
662
+ #
663
+ # source://jwt//lib/jwt/decode.rb#40
664
+ def verify_signature; end
665
+
666
+ # @return [Boolean]
667
+ #
668
+ # source://jwt//lib/jwt/decode.rb#66
669
+ def verify_signature_for?(key); end
670
+ end
671
+
672
+ # Order is very important - first check for string keys, next for symbols
673
+ #
674
+ # source://jwt//lib/jwt/decode.rb#77
675
+ JWT::Decode::ALGORITHM_KEYS = T.let(T.unsafe(nil), Array)
676
+
677
+ # source://jwt//lib/jwt/error.rb#5
678
+ class JWT::DecodeError < ::StandardError; end
679
+
680
+ # Encoding logic for JWT
681
+ #
682
+ # source://jwt//lib/jwt/encode.rb#9
683
+ class JWT::Encode
684
+ # @return [Encode] a new instance of Encode
685
+ #
686
+ # source://jwt//lib/jwt/encode.rb#12
687
+ def initialize(options); end
688
+
689
+ # source://jwt//lib/jwt/encode.rb#20
690
+ def segments; end
691
+
692
+ private
693
+
694
+ # source://jwt//lib/jwt/encode.rb#75
695
+ def combine(*parts); end
696
+
697
+ # source://jwt//lib/jwt/encode.rb#71
698
+ def encode_data(data); end
699
+
700
+ # source://jwt//lib/jwt/encode.rb#49
701
+ def encode_header; end
702
+
703
+ # source://jwt//lib/jwt/encode.rb#53
704
+ def encode_payload; end
705
+
706
+ # source://jwt//lib/jwt/encode.rb#67
707
+ def encode_signature; end
708
+
709
+ # source://jwt//lib/jwt/encode.rb#33
710
+ def encoded_header; end
711
+
712
+ # source://jwt//lib/jwt/encode.rb#45
713
+ def encoded_header_and_payload; end
714
+
715
+ # source://jwt//lib/jwt/encode.rb#37
716
+ def encoded_payload; end
717
+
718
+ # source://jwt//lib/jwt/encode.rb#41
719
+ def encoded_signature; end
720
+
721
+ # source://jwt//lib/jwt/encode.rb#27
722
+ def resolve_algorithm(algorithm); end
723
+
724
+ # source://jwt//lib/jwt/encode.rb#57
725
+ def signature; end
726
+
727
+ # source://jwt//lib/jwt/encode.rb#61
728
+ def validate_claims!; end
729
+ end
730
+
731
+ # source://jwt//lib/jwt/encode.rb#10
732
+ JWT::Encode::ALG_KEY = T.let(T.unsafe(nil), String)
733
+
734
+ # source://jwt//lib/jwt/error.rb#4
735
+ class JWT::EncodeError < ::StandardError; end
736
+
737
+ # source://jwt//lib/jwt/error.rb#9
738
+ class JWT::ExpiredSignature < ::JWT::DecodeError; end
739
+
740
+ # source://jwt//lib/jwt/error.rb#11
741
+ class JWT::ImmatureSignature < ::JWT::DecodeError; end
742
+
743
+ # source://jwt//lib/jwt/error.rb#10
744
+ class JWT::IncorrectAlgorithm < ::JWT::DecodeError; end
745
+
746
+ # source://jwt//lib/jwt/error.rb#15
747
+ class JWT::InvalidAudError < ::JWT::DecodeError; end
748
+
749
+ # source://jwt//lib/jwt/error.rb#14
750
+ class JWT::InvalidIatError < ::JWT::DecodeError; end
751
+
752
+ # source://jwt//lib/jwt/error.rb#12
753
+ class JWT::InvalidIssuerError < ::JWT::DecodeError; end
754
+
755
+ # source://jwt//lib/jwt/error.rb#17
756
+ class JWT::InvalidJtiError < ::JWT::DecodeError; end
757
+
758
+ # source://jwt//lib/jwt/error.rb#18
759
+ class JWT::InvalidPayload < ::JWT::DecodeError; end
760
+
761
+ # source://jwt//lib/jwt/error.rb#16
762
+ class JWT::InvalidSubError < ::JWT::DecodeError; end
763
+
764
+ # JSON wrapper
765
+ #
766
+ # source://jwt//lib/jwt/json.rb#7
767
+ class JWT::JSON
768
+ class << self
769
+ # source://jwt//lib/jwt/json.rb#9
770
+ def generate(data); end
771
+
772
+ # source://jwt//lib/jwt/json.rb#13
773
+ def parse(data); end
774
+ end
775
+ end
776
+
777
+ # source://jwt//lib/jwt/jwk/kid_as_key_digest.rb#4
778
+ module JWT::JWK
779
+ class << self
780
+ # source://jwt//lib/jwt/jwk.rb#24
781
+ def classes; end
782
+
783
+ # source://jwt//lib/jwt/jwk.rb#9
784
+ def create_from(key, params = T.unsafe(nil), options = T.unsafe(nil)); end
785
+
786
+ # source://jwt//lib/jwt/jwk.rb#9
787
+ def import(key, params = T.unsafe(nil), options = T.unsafe(nil)); end
788
+
789
+ # source://jwt//lib/jwt/jwk.rb#9
790
+ def new(key, params = T.unsafe(nil), options = T.unsafe(nil)); end
791
+
792
+ private
793
+
794
+ # source://jwt//lib/jwt/jwk.rb#38
795
+ def generate_mappings; end
796
+
797
+ # source://jwt//lib/jwt/jwk.rb#34
798
+ def mappings; end
799
+ end
800
+ end
801
+
802
+ # source://jwt//lib/jwt/jwk/ec.rb#7
803
+ class JWT::JWK::EC < ::JWT::JWK::KeyBase
804
+ # @return [EC] a new instance of EC
805
+ #
806
+ # source://jwt//lib/jwt/jwk/ec.rb#15
807
+ def initialize(key, params = T.unsafe(nil), options = T.unsafe(nil)); end
808
+
809
+ # source://jwt//lib/jwt/jwk/ec.rb#66
810
+ def []=(key, value); end
811
+
812
+ # source://jwt//lib/jwt/jwk/ec.rb#53
813
+ def export(options = T.unsafe(nil)); end
814
+
815
+ # source://jwt//lib/jwt/jwk/ec.rb#59
816
+ def key_digest; end
817
+
818
+ # source://jwt//lib/jwt/jwk/ec.rb#29
819
+ def keypair; end
820
+
821
+ # source://jwt//lib/jwt/jwk/ec.rb#49
822
+ def members; end
823
+
824
+ # @return [Boolean]
825
+ #
826
+ # source://jwt//lib/jwt/jwk/ec.rb#33
827
+ def private?; end
828
+
829
+ # source://jwt//lib/jwt/jwk/ec.rb#45
830
+ def public_key; end
831
+
832
+ # source://jwt//lib/jwt/jwk/ec.rb#37
833
+ def signing_key; end
834
+
835
+ # source://jwt//lib/jwt/jwk/ec.rb#41
836
+ def verify_key; end
837
+
838
+ private
839
+
840
+ # @raise [ArgumentError]
841
+ #
842
+ # source://jwt//lib/jwt/jwk/ec.rb#94
843
+ def check_jwk_params!(key_params, params); end
844
+
845
+ # source://jwt//lib/jwt/jwk/ec.rb#144
846
+ def create_ec_key(jwk_crv, jwk_x, jwk_y, jwk_d); end
847
+
848
+ # source://jwt//lib/jwt/jwk/ec.rb#208
849
+ def decode_octets(jwk_data); end
850
+
851
+ # source://jwt//lib/jwt/jwk/ec.rb#212
852
+ def decode_open_ssl_bn(jwk_data); end
853
+
854
+ # source://jwt//lib/jwt/jwk/ec.rb#76
855
+ def ec_key; end
856
+
857
+ # source://jwt//lib/jwt/jwk/ec.rb#121
858
+ def encode_octets(octets); end
859
+
860
+ # source://jwt//lib/jwt/jwk/ec.rb#127
861
+ def encode_open_ssl_bn(key_part); end
862
+
863
+ # source://jwt//lib/jwt/jwk/ec.rb#80
864
+ def extract_key_params(key); end
865
+
866
+ # source://jwt//lib/jwt/jwk/ec.rb#100
867
+ def keypair_components(ec_keypair); end
868
+
869
+ # source://jwt//lib/jwt/jwk/ec.rb#131
870
+ def parse_ec_key(key); end
871
+
872
+ class << self
873
+ # source://jwt//lib/jwt/jwk/ec.rb#217
874
+ def import(jwk_data); end
875
+
876
+ # source://jwt//lib/jwt/jwk/ec.rb#221
877
+ def to_openssl_curve(crv); end
878
+ end
879
+ end
880
+
881
+ # source://jwt//lib/jwt/jwk/ec.rb#10
882
+ JWT::JWK::EC::BINARY = T.let(T.unsafe(nil), Integer)
883
+
884
+ # source://jwt//lib/jwt/jwk/ec.rb#13
885
+ JWT::JWK::EC::EC_KEY_ELEMENTS = T.let(T.unsafe(nil), Array)
886
+
887
+ # source://jwt//lib/jwt/jwk/ec.rb#12
888
+ JWT::JWK::EC::EC_PRIVATE_KEY_ELEMENTS = T.let(T.unsafe(nil), Array)
889
+
890
+ # source://jwt//lib/jwt/jwk/ec.rb#11
891
+ JWT::JWK::EC::EC_PUBLIC_KEY_ELEMENTS = T.let(T.unsafe(nil), Array)
892
+
893
+ # source://jwt//lib/jwt/jwk/ec.rb#8
894
+ JWT::JWK::EC::KTY = T.let(T.unsafe(nil), String)
895
+
896
+ # source://jwt//lib/jwt/jwk/ec.rb#9
897
+ JWT::JWK::EC::KTYS = T.let(T.unsafe(nil), Array)
898
+
899
+ # source://jwt//lib/jwt/jwk/hmac.rb#5
900
+ class JWT::JWK::HMAC < ::JWT::JWK::KeyBase
901
+ # @return [HMAC] a new instance of HMAC
902
+ #
903
+ # source://jwt//lib/jwt/jwk/hmac.rb#12
904
+ def initialize(key, params = T.unsafe(nil), options = T.unsafe(nil)); end
905
+
906
+ # source://jwt//lib/jwt/jwk/hmac.rb#63
907
+ def []=(key, value); end
908
+
909
+ # See https://tools.ietf.org/html/rfc7517#appendix-A.3
910
+ #
911
+ # source://jwt//lib/jwt/jwk/hmac.rb#47
912
+ def export(options = T.unsafe(nil)); end
913
+
914
+ # source://jwt//lib/jwt/jwk/hmac.rb#57
915
+ def key_digest; end
916
+
917
+ # source://jwt//lib/jwt/jwk/hmac.rb#26
918
+ def keypair; end
919
+
920
+ # source://jwt//lib/jwt/jwk/hmac.rb#53
921
+ def members; end
922
+
923
+ # @return [Boolean]
924
+ #
925
+ # source://jwt//lib/jwt/jwk/hmac.rb#30
926
+ def private?; end
927
+
928
+ # source://jwt//lib/jwt/jwk/hmac.rb#34
929
+ def public_key; end
930
+
931
+ # source://jwt//lib/jwt/jwk/hmac.rb#42
932
+ def signing_key; end
933
+
934
+ # source://jwt//lib/jwt/jwk/hmac.rb#38
935
+ def verify_key; end
936
+
937
+ private
938
+
939
+ # @raise [ArgumentError]
940
+ #
941
+ # source://jwt//lib/jwt/jwk/hmac.rb#90
942
+ def check_jwk(keypair, params); end
943
+
944
+ # source://jwt//lib/jwt/jwk/hmac.rb#77
945
+ def extract_key_params(key); end
946
+
947
+ # source://jwt//lib/jwt/jwk/hmac.rb#73
948
+ def secret; end
949
+
950
+ class << self
951
+ # source://jwt//lib/jwt/jwk/hmac.rb#97
952
+ def import(jwk_data); end
953
+ end
954
+ end
955
+
956
+ # source://jwt//lib/jwt/jwk/hmac.rb#10
957
+ JWT::JWK::HMAC::HMAC_KEY_ELEMENTS = T.let(T.unsafe(nil), Array)
958
+
959
+ # source://jwt//lib/jwt/jwk/hmac.rb#9
960
+ JWT::JWK::HMAC::HMAC_PRIVATE_KEY_ELEMENTS = T.let(T.unsafe(nil), Array)
961
+
962
+ # source://jwt//lib/jwt/jwk/hmac.rb#8
963
+ JWT::JWK::HMAC::HMAC_PUBLIC_KEY_ELEMENTS = T.let(T.unsafe(nil), Array)
964
+
965
+ # source://jwt//lib/jwt/jwk/hmac.rb#6
966
+ JWT::JWK::HMAC::KTY = T.let(T.unsafe(nil), String)
967
+
968
+ # source://jwt//lib/jwt/jwk/hmac.rb#7
969
+ JWT::JWK::HMAC::KTYS = T.let(T.unsafe(nil), Array)
970
+
971
+ # source://jwt//lib/jwt/jwk/key_base.rb#5
972
+ class JWT::JWK::KeyBase
973
+ # @return [KeyBase] a new instance of KeyBase
974
+ #
975
+ # source://jwt//lib/jwt/jwk/key_base.rb#11
976
+ def initialize(options, params = T.unsafe(nil)); end
977
+
978
+ # source://jwt//lib/jwt/jwk/key_base.rb#46
979
+ def <=>(other); end
980
+
981
+ # source://jwt//lib/jwt/jwk/key_base.rb#40
982
+ def ==(other); end
983
+
984
+ # source://jwt//lib/jwt/jwk/key_base.rb#32
985
+ def [](key); end
986
+
987
+ # source://jwt//lib/jwt/jwk/key_base.rb#36
988
+ def []=(key, value); end
989
+
990
+ # source://jwt//lib/jwt/jwk/key_base.rb#40
991
+ def eql?(other); end
992
+
993
+ # source://jwt//lib/jwt/jwk/key_base.rb#28
994
+ def hash; end
995
+
996
+ # source://jwt//lib/jwt/jwk/key_base.rb#24
997
+ def kid; end
998
+
999
+ private
1000
+
1001
+ # Returns the value of attribute parameters.
1002
+ #
1003
+ # source://jwt//lib/jwt/jwk/key_base.rb#52
1004
+ def parameters; end
1005
+
1006
+ class << self
1007
+ # @private
1008
+ #
1009
+ # source://jwt//lib/jwt/jwk/key_base.rb#6
1010
+ def inherited(klass); end
1011
+ end
1012
+ end
1013
+
1014
+ # source://jwt//lib/jwt/jwk/key_finder.rb#5
1015
+ class JWT::JWK::KeyFinder
1016
+ # @return [KeyFinder] a new instance of KeyFinder
1017
+ #
1018
+ # source://jwt//lib/jwt/jwk/key_finder.rb#6
1019
+ def initialize(options); end
1020
+
1021
+ # @raise [::JWT::DecodeError]
1022
+ #
1023
+ # source://jwt//lib/jwt/jwk/key_finder.rb#17
1024
+ def key_for(kid); end
1025
+
1026
+ private
1027
+
1028
+ # source://jwt//lib/jwt/jwk/key_finder.rb#31
1029
+ def resolve_key(kid); end
1030
+ end
1031
+
1032
+ # source://jwt//lib/jwt/jwk/kid_as_key_digest.rb#5
1033
+ class JWT::JWK::KidAsKeyDigest
1034
+ # @return [KidAsKeyDigest] a new instance of KidAsKeyDigest
1035
+ #
1036
+ # source://jwt//lib/jwt/jwk/kid_as_key_digest.rb#6
1037
+ def initialize(jwk); end
1038
+
1039
+ # source://jwt//lib/jwt/jwk/kid_as_key_digest.rb#10
1040
+ def generate; end
1041
+ end
1042
+
1043
+ # source://jwt//lib/jwt/jwk/rsa.rb#5
1044
+ class JWT::JWK::RSA < ::JWT::JWK::KeyBase
1045
+ # @return [RSA] a new instance of RSA
1046
+ #
1047
+ # source://jwt//lib/jwt/jwk/rsa.rb#16
1048
+ def initialize(key, params = T.unsafe(nil), options = T.unsafe(nil)); end
1049
+
1050
+ # source://jwt//lib/jwt/jwk/rsa.rb#66
1051
+ def []=(key, value); end
1052
+
1053
+ # source://jwt//lib/jwt/jwk/rsa.rb#50
1054
+ def export(options = T.unsafe(nil)); end
1055
+
1056
+ # source://jwt//lib/jwt/jwk/rsa.rb#60
1057
+ def key_digest; end
1058
+
1059
+ # source://jwt//lib/jwt/jwk/rsa.rb#30
1060
+ def keypair; end
1061
+
1062
+ # source://jwt//lib/jwt/jwk/rsa.rb#56
1063
+ def members; end
1064
+
1065
+ # @return [Boolean]
1066
+ #
1067
+ # source://jwt//lib/jwt/jwk/rsa.rb#34
1068
+ def private?; end
1069
+
1070
+ # source://jwt//lib/jwt/jwk/rsa.rb#38
1071
+ def public_key; end
1072
+
1073
+ # source://jwt//lib/jwt/jwk/rsa.rb#42
1074
+ def signing_key; end
1075
+
1076
+ # source://jwt//lib/jwt/jwk/rsa.rb#46
1077
+ def verify_key; end
1078
+
1079
+ private
1080
+
1081
+ # @raise [ArgumentError]
1082
+ #
1083
+ # source://jwt//lib/jwt/jwk/rsa.rb#94
1084
+ def check_jwk_params!(key_params, params); end
1085
+
1086
+ # source://jwt//lib/jwt/jwk/rsa.rb#126
1087
+ def decode_open_ssl_bn(jwk_data); end
1088
+
1089
+ # source://jwt//lib/jwt/jwk/rsa.rb#120
1090
+ def encode_open_ssl_bn(key_part); end
1091
+
1092
+ # source://jwt//lib/jwt/jwk/rsa.rb#80
1093
+ def extract_key_params(key); end
1094
+
1095
+ # source://jwt//lib/jwt/jwk/rsa.rb#114
1096
+ def jwk_attributes(*attributes); end
1097
+
1098
+ # source://jwt//lib/jwt/jwk/rsa.rb#100
1099
+ def parse_rsa_key(key); end
1100
+
1101
+ # source://jwt//lib/jwt/jwk/rsa.rb#76
1102
+ def rsa_key; end
1103
+
1104
+ class << self
1105
+ # source://jwt//lib/jwt/jwk/rsa.rb#141
1106
+ def create_rsa_key(rsa_parameters); end
1107
+
1108
+ # source://jwt//lib/jwt/jwk/rsa.rb#169
1109
+ def create_rsa_key_using_accessors(rsa_parameters); end
1110
+
1111
+ # source://jwt//lib/jwt/jwk/rsa.rb#141
1112
+ def create_rsa_key_using_der(rsa_parameters); end
1113
+
1114
+ # source://jwt//lib/jwt/jwk/rsa.rb#159
1115
+ def create_rsa_key_using_sets(rsa_parameters); end
1116
+
1117
+ # source://jwt//lib/jwt/jwk/rsa.rb#135
1118
+ def decode_open_ssl_bn(jwk_data); end
1119
+
1120
+ # source://jwt//lib/jwt/jwk/rsa.rb#131
1121
+ def import(jwk_data); end
1122
+
1123
+ # @raise [JWT::JWKError]
1124
+ #
1125
+ # source://jwt//lib/jwt/jwk/rsa.rb#184
1126
+ def validate_rsa_parameters!(rsa_parameters); end
1127
+ end
1128
+ end
1129
+
1130
+ # source://jwt//lib/jwt/jwk/rsa.rb#6
1131
+ JWT::JWK::RSA::BINARY = T.let(T.unsafe(nil), Integer)
1132
+
1133
+ # source://jwt//lib/jwt/jwk/rsa.rb#7
1134
+ JWT::JWK::RSA::KTY = T.let(T.unsafe(nil), String)
1135
+
1136
+ # source://jwt//lib/jwt/jwk/rsa.rb#8
1137
+ JWT::JWK::RSA::KTYS = T.let(T.unsafe(nil), Array)
1138
+
1139
+ # https://www.rfc-editor.org/rfc/rfc3447#appendix-A.1.2
1140
+ #
1141
+ # source://jwt//lib/jwt/jwk/rsa.rb#14
1142
+ JWT::JWK::RSA::RSA_ASN1_SEQUENCE = T.let(T.unsafe(nil), Array)
1143
+
1144
+ # source://jwt//lib/jwt/jwk/rsa.rb#11
1145
+ JWT::JWK::RSA::RSA_KEY_ELEMENTS = T.let(T.unsafe(nil), Array)
1146
+
1147
+ # source://jwt//lib/jwt/jwk/rsa.rb#13
1148
+ JWT::JWK::RSA::RSA_OPT_PARAMS = T.let(T.unsafe(nil), Array)
1149
+
1150
+ # source://jwt//lib/jwt/jwk/rsa.rb#10
1151
+ JWT::JWK::RSA::RSA_PRIVATE_KEY_ELEMENTS = T.let(T.unsafe(nil), Array)
1152
+
1153
+ # source://jwt//lib/jwt/jwk/rsa.rb#9
1154
+ JWT::JWK::RSA::RSA_PUBLIC_KEY_ELEMENTS = T.let(T.unsafe(nil), Array)
1155
+
1156
+ # source://jwt//lib/jwt/jwk/set.rb#7
1157
+ class JWT::JWK::Set
1158
+ include ::Enumerable
1159
+ extend ::Forwardable
1160
+
1161
+ # @return [Set] a new instance of Set
1162
+ #
1163
+ # source://jwt//lib/jwt/jwk/set.rb#13
1164
+ def initialize(jwks = T.unsafe(nil), options = T.unsafe(nil)); end
1165
+
1166
+ # source://jwt//lib/jwt/jwk/set.rb#58
1167
+ def +(enum); end
1168
+
1169
+ # source://jwt//lib/jwt/jwk/set.rb#62
1170
+ def <<(key); end
1171
+
1172
+ # source://jwt//lib/jwt/jwk/set.rb#67
1173
+ def ==(other); end
1174
+
1175
+ # source://jwt//lib/jwt/jwk/set.rb#62
1176
+ def add(key); end
1177
+
1178
+ # source://forwardable/1.3.3/forwardable.rb#231
1179
+ def delete(*args, **_arg1, &block); end
1180
+
1181
+ # source://forwardable/1.3.3/forwardable.rb#231
1182
+ def dig(*args, **_arg1, &block); end
1183
+
1184
+ # source://forwardable/1.3.3/forwardable.rb#231
1185
+ def each(*args, **_arg1, &block); end
1186
+
1187
+ # source://jwt//lib/jwt/jwk/set.rb#67
1188
+ def eql?(other); end
1189
+
1190
+ # source://jwt//lib/jwt/jwk/set.rb#31
1191
+ def export(options = T.unsafe(nil)); end
1192
+
1193
+ # source://jwt//lib/jwt/jwk/set.rb#37
1194
+ def filter!(&block); end
1195
+
1196
+ # Returns the value of attribute keys.
1197
+ #
1198
+ # source://jwt//lib/jwt/jwk/set.rb#11
1199
+ def keys; end
1200
+
1201
+ # source://forwardable/1.3.3/forwardable.rb#231
1202
+ def length(*args, **_arg1, &block); end
1203
+
1204
+ # source://jwt//lib/jwt/jwk/set.rb#53
1205
+ def merge(enum); end
1206
+
1207
+ # source://jwt//lib/jwt/jwk/set.rb#43
1208
+ def reject!(&block); end
1209
+
1210
+ # source://jwt//lib/jwt/jwk/set.rb#37
1211
+ def select!(&block); end
1212
+
1213
+ # source://forwardable/1.3.3/forwardable.rb#231
1214
+ def size(*args, **_arg1, &block); end
1215
+
1216
+ # source://jwt//lib/jwt/jwk/set.rb#58
1217
+ def union(enum); end
1218
+
1219
+ # source://jwt//lib/jwt/jwk/set.rb#49
1220
+ def uniq!(&block); end
1221
+
1222
+ # For symbolic manipulation
1223
+ #
1224
+ # source://jwt//lib/jwt/jwk/set.rb#58
1225
+ def |(enum); end
1226
+ end
1227
+
1228
+ # https://tools.ietf.org/html/rfc7638
1229
+ #
1230
+ # source://jwt//lib/jwt/jwk/thumbprint.rb#6
1231
+ class JWT::JWK::Thumbprint
1232
+ # @return [Thumbprint] a new instance of Thumbprint
1233
+ #
1234
+ # source://jwt//lib/jwt/jwk/thumbprint.rb#9
1235
+ def initialize(jwk); end
1236
+
1237
+ # source://jwt//lib/jwt/jwk/thumbprint.rb#13
1238
+ def generate; end
1239
+
1240
+ # Returns the value of attribute jwk.
1241
+ #
1242
+ # source://jwt//lib/jwt/jwk/thumbprint.rb#7
1243
+ def jwk; end
1244
+
1245
+ # source://jwt//lib/jwt/jwk/thumbprint.rb#13
1246
+ def to_s; end
1247
+ end
1248
+
1249
+ # source://jwt//lib/jwt/error.rb#21
1250
+ class JWT::JWKError < ::JWT::DecodeError; end
1251
+
1252
+ # source://jwt//lib/jwt/error.rb#19
1253
+ class JWT::MissingRequiredClaim < ::JWT::DecodeError; end
1254
+
1255
+ # source://jwt//lib/jwt/error.rb#6
1256
+ class JWT::RequiredDependencyError < ::StandardError; end
1257
+
1258
+ # source://jwt//lib/jwt/error.rb#13
1259
+ class JWT::UnsupportedEcdsaCurve < ::JWT::IncorrectAlgorithm; end
1260
+
1261
+ # Moments version builder module
1262
+ #
1263
+ # source://jwt//lib/jwt/version.rb#10
1264
+ module JWT::VERSION; end
1265
+
1266
+ # major version
1267
+ #
1268
+ # source://jwt//lib/jwt/version.rb#12
1269
+ JWT::VERSION::MAJOR = T.let(T.unsafe(nil), Integer)
1270
+
1271
+ # minor version
1272
+ #
1273
+ # source://jwt//lib/jwt/version.rb#14
1274
+ JWT::VERSION::MINOR = T.let(T.unsafe(nil), Integer)
1275
+
1276
+ # alpha, beta, etc. tag
1277
+ #
1278
+ # source://jwt//lib/jwt/version.rb#18
1279
+ JWT::VERSION::PRE = T.let(T.unsafe(nil), T.untyped)
1280
+
1281
+ # Build version string
1282
+ #
1283
+ # source://jwt//lib/jwt/version.rb#21
1284
+ JWT::VERSION::STRING = T.let(T.unsafe(nil), String)
1285
+
1286
+ # tiny version
1287
+ #
1288
+ # source://jwt//lib/jwt/version.rb#16
1289
+ JWT::VERSION::TINY = T.let(T.unsafe(nil), Integer)
1290
+
1291
+ # source://jwt//lib/jwt/error.rb#8
1292
+ class JWT::VerificationError < ::JWT::DecodeError; end
1293
+
1294
+ # JWT verify methods
1295
+ #
1296
+ # source://jwt//lib/jwt/verify.rb#7
1297
+ class JWT::Verify
1298
+ # @return [Verify] a new instance of Verify
1299
+ #
1300
+ # source://jwt//lib/jwt/verify.rb#28
1301
+ def initialize(payload, options); end
1302
+
1303
+ # @raise [JWT::InvalidAudError]
1304
+ #
1305
+ # source://jwt//lib/jwt/verify.rb#33
1306
+ def verify_aud; end
1307
+
1308
+ # @raise [JWT::ExpiredSignature]
1309
+ #
1310
+ # source://jwt//lib/jwt/verify.rb#40
1311
+ def verify_expiration; end
1312
+
1313
+ # @raise [JWT::InvalidIatError]
1314
+ #
1315
+ # source://jwt//lib/jwt/verify.rb#45
1316
+ def verify_iat; end
1317
+
1318
+ # source://jwt//lib/jwt/verify.rb#52
1319
+ def verify_iss; end
1320
+
1321
+ # source://jwt//lib/jwt/verify.rb#67
1322
+ def verify_jti; end
1323
+
1324
+ # @raise [JWT::ImmatureSignature]
1325
+ #
1326
+ # source://jwt//lib/jwt/verify.rb#79
1327
+ def verify_not_before; end
1328
+
1329
+ # source://jwt//lib/jwt/verify.rb#91
1330
+ def verify_required_claims; end
1331
+
1332
+ # @raise [JWT::InvalidSubError]
1333
+ #
1334
+ # source://jwt//lib/jwt/verify.rb#84
1335
+ def verify_sub; end
1336
+
1337
+ private
1338
+
1339
+ # source://jwt//lib/jwt/verify.rb#105
1340
+ def exp_leeway; end
1341
+
1342
+ # source://jwt//lib/jwt/verify.rb#101
1343
+ def global_leeway; end
1344
+
1345
+ # source://jwt//lib/jwt/verify.rb#109
1346
+ def nbf_leeway; end
1347
+
1348
+ class << self
1349
+ # source://jwt//lib/jwt/verify.rb#14
1350
+ def verify_aud(payload, options); end
1351
+
1352
+ # source://jwt//lib/jwt/verify.rb#19
1353
+ def verify_claims(payload, options); end
1354
+
1355
+ # source://jwt//lib/jwt/verify.rb#14
1356
+ def verify_expiration(payload, options); end
1357
+
1358
+ # source://jwt//lib/jwt/verify.rb#14
1359
+ def verify_iat(payload, options); end
1360
+
1361
+ # source://jwt//lib/jwt/verify.rb#14
1362
+ def verify_iss(payload, options); end
1363
+
1364
+ # source://jwt//lib/jwt/verify.rb#14
1365
+ def verify_jti(payload, options); end
1366
+
1367
+ # source://jwt//lib/jwt/verify.rb#14
1368
+ def verify_not_before(payload, options); end
1369
+
1370
+ # source://jwt//lib/jwt/verify.rb#14
1371
+ def verify_required_claims(payload, options); end
1372
+
1373
+ # source://jwt//lib/jwt/verify.rb#14
1374
+ def verify_sub(payload, options); end
1375
+ end
1376
+ end
1377
+
1378
+ # source://jwt//lib/jwt/verify.rb#8
1379
+ JWT::Verify::DEFAULTS = T.let(T.unsafe(nil), Hash)
1380
+
1381
+ # If the x5c header certificate chain can be validated by trusted root
1382
+ # certificates, and none of the certificates are revoked, returns the public
1383
+ # key from the first certificate.
1384
+ # See https://tools.ietf.org/html/rfc7515#section-4.1.6
1385
+ #
1386
+ # source://jwt//lib/jwt/x5c_key_finder.rb#11
1387
+ class JWT::X5cKeyFinder
1388
+ # @raise [ArgumentError]
1389
+ # @return [X5cKeyFinder] a new instance of X5cKeyFinder
1390
+ #
1391
+ # source://jwt//lib/jwt/x5c_key_finder.rb#12
1392
+ def initialize(root_certificates, crls = T.unsafe(nil)); end
1393
+
1394
+ # source://jwt//lib/jwt/x5c_key_finder.rb#18
1395
+ def from(x5c_header_or_certificates); end
1396
+
1397
+ private
1398
+
1399
+ # source://jwt//lib/jwt/x5c_key_finder.rb#36
1400
+ def build_store(root_certificates, crls); end
1401
+
1402
+ # source://jwt//lib/jwt/x5c_key_finder.rb#45
1403
+ def parse_certificates(x5c_header_or_certificates); end
1404
+ end