json-jwt 0.7.1 → 0.8.0

Sign up to get free protection for your applications and to get access to all the features.

Potentially problematic release.


This version of json-jwt might be problematic. Click here for more details.

checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: 59ada74491a32877d68647b1de5ce0ff3331362c
4
- data.tar.gz: 23bc7bef812043123c2b44eee67d18c45d0309c4
3
+ metadata.gz: 9c915d6a8de83f170d97ca50cb41ce59daf27109
4
+ data.tar.gz: e07327aad3ed0772746939176c4941011cf53301
5
5
  SHA512:
6
- metadata.gz: 20185284fe6e2fbc096d8de68eb3f8feb18c6efd67dac63b019dd6cdc5a22ee7ecd00b242f777a1b606c9fbaf720df40ecfeac610519c1e958b260d5d1a94e11
7
- data.tar.gz: 8b89292996f79c0ad39a68279b1eab78d44e6b8b3dfac4d1fbe76a563aba9dd5debeb88a163a725603c386d562d27072c578c61ebd5b1c33f4f383963250554c
6
+ metadata.gz: 1e45a3641dacb886fc1b4984f9fe53d5b0189e66225bb05957ab60cc932075bf94e651d96387fdad26dec8fa4f99d7ed5c085706625f14d5043c5e9f1862a2e8
7
+ data.tar.gz: f49791f3062639f6cbd0bf09e24d4720566c012f4a81c122903d8b4432735d2efe83d647693acfe6ceb797a515696d7a60220b3fcd46f3081791ccf5c177f17d
data/VERSION CHANGED
@@ -1 +1 @@
1
- 0.7.1
1
+ 0.8.0
data/lib/json/jwt.rb CHANGED
@@ -102,8 +102,12 @@ module JSON
102
102
  jwe.header = MultiJson.load(
103
103
  UrlSafeBase64.decode64 jwt_string.split('.').first
104
104
  ).with_indifferent_access
105
- jwe.decrypt! key_or_secret unless key_or_secret == :skip_decryption
106
- jwe
105
+ if key_or_secret == :skip_decryption
106
+ jwe
107
+ else
108
+ jwe.decrypt! key_or_secret
109
+ JSON::JWT.decode jwe.plain_text, :skip_verification
110
+ end
107
111
  else
108
112
  raise InvalidFormat.new("Invalid JWT Format. JWT should include #{JWS::NUM_OF_SEGMENTS} or #{JWE::NUM_OF_SEGMENTS} segments.")
109
113
  end
@@ -160,13 +160,14 @@ describe JSON::JWT do
160
160
  let(:shared_key) { SecureRandom.hex 16 } # default shared key is too short
161
161
 
162
162
  it 'should decryptable' do
163
- JSON::JWT.decode(input, private_key).should be_a JSON::JWE
163
+ JSON::JWT.decode(input, private_key).should be_instance_of JSON::JWT
164
164
  end
165
165
 
166
166
  context 'when :skip_decryption given as secret/key' do
167
167
  it 'should skip verification' do
168
168
  expect do
169
169
  jwe = JSON::JWT.decode input, :skip_decryption
170
+ jwe.should be_instance_of JSON::JWE
170
171
  jwe.header.should == {'alg' => 'RSA1_5', 'enc' => 'A128CBC-HS256'}
171
172
  end.not_to raise_error
172
173
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: json-jwt
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.7.1
4
+ version: 0.8.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - nov matake
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2014-12-22 00:00:00.000000000 Z
11
+ date: 2015-02-28 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: multi_json
@@ -197,7 +197,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
197
197
  version: '0'
198
198
  requirements: []
199
199
  rubyforge_project:
200
- rubygems_version: 2.2.2
200
+ rubygems_version: 2.4.5
201
201
  signing_key:
202
202
  specification_version: 4
203
203
  summary: JSON Web Token and its family (JSON Web Signature, JSON Web Encryption and