ruby_jwt 1.0.8 → 1.0.9
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/lib/ruby_jwt/version.rb +1 -1
- data/lib/ruby_jwt.rb +5 -7
- data/test/dummy/log/test.log +260 -0
- data/test/ruby_jwt_test.rb +4 -4
- metadata +1 -1
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA1:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: c4cbb15c0565682d76db4fe78a7fe3319880f18c
|
4
|
+
data.tar.gz: f5048fdf0dc03828571897565c1b04f430eefe74
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: cba160295a71a7c82d1c05f1f8989cff38e738092e4dd1d56b240a27342e134051f64c50e68b08a756960518bdfe3a54be8f36b854d99a0c61c8312b0669d7d5
|
7
|
+
data.tar.gz: 5febbbe81750d6837c1187673d67ca0c2fc531701a0b2af28ed4d2feee1f3f5d17dd32584cd7f58c7ae7d4f2bb7fb414734c53191716cb17526ff8be064ee1a7
|
data/lib/ruby_jwt/version.rb
CHANGED
data/lib/ruby_jwt.rb
CHANGED
@@ -15,11 +15,12 @@ module JWT
|
|
15
15
|
end
|
16
16
|
end
|
17
17
|
class VerificationResponse
|
18
|
-
attr_accessor :success, :message
|
18
|
+
attr_accessor :success, :message, :decoded_token
|
19
19
|
|
20
|
-
def initialize(success,message)
|
20
|
+
def initialize(success,message, decoded = nil)
|
21
21
|
@success = success
|
22
22
|
@message = message
|
23
|
+
@decoded_token = decoded
|
23
24
|
end
|
24
25
|
end
|
25
26
|
|
@@ -28,10 +29,7 @@ module JWT
|
|
28
29
|
# end
|
29
30
|
|
30
31
|
SIGNATURES = {"256" => OpenSSL::Digest::SHA256.new(), "384" => OpenSSL::Digest::SHA384.new(), "512" => OpenSSL::Digest::SHA512.new()}
|
31
|
-
|
32
|
-
# "HS256" => OpenSSL::Digest::SHA256.new(), "HS384" => OpenSSL::Digest::SHA384.new(), "HS512" => OpenSSL::Digest::SHA512.new(),
|
33
|
-
# "RS256" => OpenSSL::Digest::SHA256.new(), "RS384" => OpenSSL::Digest::SHA384.new(), "RS512" => OpenSSL::Digest::SHA512.new()
|
34
|
-
# }
|
32
|
+
|
35
33
|
module_function
|
36
34
|
|
37
35
|
def sign(payload,key,payload_options,header_options)
|
@@ -91,7 +89,7 @@ module JWT
|
|
91
89
|
|
92
90
|
return VerificationResponse.new(false,"JWT signature is invalid.") if !verify_signature(alg,secret,jwt_parts[0..1].join("."),signature)
|
93
91
|
|
94
|
-
return VerificationResponse.new(true,"JWT is valid.")
|
92
|
+
return VerificationResponse.new(true,"JWT is valid.",decode(token))
|
95
93
|
end
|
96
94
|
|
97
95
|
|
data/test/dummy/log/test.log
CHANGED
@@ -3676,5 +3676,265 @@ RubyJwtTest: test_should_encode_and_decode_and_verify_hmac
|
|
3676
3676
|
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
3677
3677
|
-----------------------------------------------
|
3678
3678
|
RubyJwtTest: test_should_encode_and_decode_none
|
3679
|
+
-----------------------------------------------
|
3680
|
+
[1m[35m (0.0ms)[0m rollback transaction
|
3681
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
3682
|
+
-----------------------------------------------------
|
3683
|
+
RubyJwtTest: test_decodes_and_verifies_existing_token
|
3684
|
+
-----------------------------------------------------
|
3685
|
+
[1m[35m (0.0ms)[0m rollback transaction
|
3686
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
3687
|
+
---------------------------------------------------------
|
3688
|
+
RubyJwtTest: test_returns_decode_error_for_invalid_base64
|
3689
|
+
---------------------------------------------------------
|
3690
|
+
[1m[35m (0.0ms)[0m rollback transaction
|
3691
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
3692
|
+
---------------------------------------------
|
3693
|
+
RubyJwtTest: test_returns_false_if_before_nbf
|
3694
|
+
---------------------------------------------
|
3695
|
+
[1m[35m (0.0ms)[0m rollback transaction
|
3696
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
3697
|
+
------------------------------------------
|
3698
|
+
RubyJwtTest: test_returns_false_if_expired
|
3699
|
+
------------------------------------------
|
3700
|
+
[1m[35m (0.0ms)[0m rollback transaction
|
3701
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
3702
|
+
----------------------------------------------------
|
3703
|
+
RubyJwtTest: test_returns_false_if_invalid_signature
|
3704
|
+
----------------------------------------------------
|
3705
|
+
[1m[35m (0.0ms)[0m rollback transaction
|
3706
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
3707
|
+
-------------------------------------------------
|
3708
|
+
RubyJwtTest: test_returns_false_if_wrong_audience
|
3709
|
+
-------------------------------------------------
|
3710
|
+
[1m[35m (0.0ms)[0m rollback transaction
|
3711
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
3712
|
+
-----------------------------------------------
|
3713
|
+
RubyJwtTest: test_returns_false_if_wrong_issuer
|
3714
|
+
-----------------------------------------------
|
3715
|
+
[1m[35m (0.0ms)[0m rollback transaction
|
3716
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
3717
|
+
-------------------------------------------------------------------------
|
3718
|
+
RubyJwtTest: test_returns_not_implemented_error_for_unsupported_algorithm
|
3719
|
+
-------------------------------------------------------------------------
|
3720
|
+
[1m[35m (0.0ms)[0m rollback transaction
|
3721
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
3722
|
+
-----------------------------------------------
|
3723
|
+
RubyJwtTest: test_returns_sign_error_for_no_key
|
3724
|
+
-----------------------------------------------
|
3725
|
+
[1m[35m (0.0ms)[0m rollback transaction
|
3726
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
3727
|
+
------------------------------------------------
|
3728
|
+
RubyJwtTest: test_should_encode_and_decode_ECDSA
|
3729
|
+
------------------------------------------------
|
3730
|
+
[1m[35m (0.0ms)[0m rollback transaction
|
3731
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
3732
|
+
----------------------------------------------
|
3733
|
+
RubyJwtTest: test_should_encode_and_decode_RSA
|
3734
|
+
----------------------------------------------
|
3735
|
+
[1m[35m (0.0ms)[0m rollback transaction
|
3736
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
3737
|
+
----------------------------------------------------------
|
3738
|
+
RubyJwtTest: test_should_encode_and_decode_and_verify_hmac
|
3739
|
+
----------------------------------------------------------
|
3740
|
+
[1m[35m (0.0ms)[0m rollback transaction
|
3741
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
3742
|
+
-----------------------------------------------
|
3743
|
+
RubyJwtTest: test_should_encode_and_decode_none
|
3744
|
+
-----------------------------------------------
|
3745
|
+
[1m[35m (0.0ms)[0m rollback transaction
|
3746
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
3747
|
+
-----------------------------------------------------
|
3748
|
+
RubyJwtTest: test_decodes_and_verifies_existing_token
|
3749
|
+
-----------------------------------------------------
|
3750
|
+
[1m[35m (0.0ms)[0m rollback transaction
|
3751
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
3752
|
+
---------------------------------------------------------
|
3753
|
+
RubyJwtTest: test_returns_decode_error_for_invalid_base64
|
3754
|
+
---------------------------------------------------------
|
3755
|
+
[1m[35m (0.0ms)[0m rollback transaction
|
3756
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
3757
|
+
---------------------------------------------
|
3758
|
+
RubyJwtTest: test_returns_false_if_before_nbf
|
3759
|
+
---------------------------------------------
|
3760
|
+
[1m[35m (0.1ms)[0m rollback transaction
|
3761
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
3762
|
+
------------------------------------------
|
3763
|
+
RubyJwtTest: test_returns_false_if_expired
|
3764
|
+
------------------------------------------
|
3765
|
+
[1m[35m (0.0ms)[0m rollback transaction
|
3766
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
3767
|
+
----------------------------------------------------
|
3768
|
+
RubyJwtTest: test_returns_false_if_invalid_signature
|
3769
|
+
----------------------------------------------------
|
3770
|
+
[1m[35m (0.0ms)[0m rollback transaction
|
3771
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
3772
|
+
-------------------------------------------------
|
3773
|
+
RubyJwtTest: test_returns_false_if_wrong_audience
|
3774
|
+
-------------------------------------------------
|
3775
|
+
[1m[35m (0.0ms)[0m rollback transaction
|
3776
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
3777
|
+
-----------------------------------------------
|
3778
|
+
RubyJwtTest: test_returns_false_if_wrong_issuer
|
3779
|
+
-----------------------------------------------
|
3780
|
+
[1m[35m (0.1ms)[0m rollback transaction
|
3781
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
3782
|
+
-------------------------------------------------------------------------
|
3783
|
+
RubyJwtTest: test_returns_not_implemented_error_for_unsupported_algorithm
|
3784
|
+
-------------------------------------------------------------------------
|
3785
|
+
[1m[35m (0.0ms)[0m rollback transaction
|
3786
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
3787
|
+
-----------------------------------------------
|
3788
|
+
RubyJwtTest: test_returns_sign_error_for_no_key
|
3789
|
+
-----------------------------------------------
|
3790
|
+
[1m[35m (0.0ms)[0m rollback transaction
|
3791
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
3792
|
+
------------------------------------------------
|
3793
|
+
RubyJwtTest: test_should_encode_and_decode_ECDSA
|
3794
|
+
------------------------------------------------
|
3795
|
+
[1m[35m (0.0ms)[0m rollback transaction
|
3796
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
3797
|
+
----------------------------------------------
|
3798
|
+
RubyJwtTest: test_should_encode_and_decode_RSA
|
3799
|
+
----------------------------------------------
|
3800
|
+
[1m[35m (0.0ms)[0m rollback transaction
|
3801
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
3802
|
+
----------------------------------------------------------
|
3803
|
+
RubyJwtTest: test_should_encode_and_decode_and_verify_hmac
|
3804
|
+
----------------------------------------------------------
|
3805
|
+
[1m[35m (0.0ms)[0m rollback transaction
|
3806
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
3807
|
+
-----------------------------------------------
|
3808
|
+
RubyJwtTest: test_should_encode_and_decode_none
|
3809
|
+
-----------------------------------------------
|
3810
|
+
[1m[35m (0.0ms)[0m rollback transaction
|
3811
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
3812
|
+
-----------------------------------------------------
|
3813
|
+
RubyJwtTest: test_decodes_and_verifies_existing_token
|
3814
|
+
-----------------------------------------------------
|
3815
|
+
[1m[35m (0.0ms)[0m rollback transaction
|
3816
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
3817
|
+
---------------------------------------------------------
|
3818
|
+
RubyJwtTest: test_returns_decode_error_for_invalid_base64
|
3819
|
+
---------------------------------------------------------
|
3820
|
+
[1m[35m (0.0ms)[0m rollback transaction
|
3821
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
3822
|
+
---------------------------------------------
|
3823
|
+
RubyJwtTest: test_returns_false_if_before_nbf
|
3824
|
+
---------------------------------------------
|
3825
|
+
[1m[35m (0.0ms)[0m rollback transaction
|
3826
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
3827
|
+
------------------------------------------
|
3828
|
+
RubyJwtTest: test_returns_false_if_expired
|
3829
|
+
------------------------------------------
|
3830
|
+
[1m[35m (0.0ms)[0m rollback transaction
|
3831
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
3832
|
+
----------------------------------------------------
|
3833
|
+
RubyJwtTest: test_returns_false_if_invalid_signature
|
3834
|
+
----------------------------------------------------
|
3835
|
+
[1m[35m (0.0ms)[0m rollback transaction
|
3836
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
3837
|
+
-------------------------------------------------
|
3838
|
+
RubyJwtTest: test_returns_false_if_wrong_audience
|
3839
|
+
-------------------------------------------------
|
3840
|
+
[1m[35m (0.0ms)[0m rollback transaction
|
3841
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
3842
|
+
-----------------------------------------------
|
3843
|
+
RubyJwtTest: test_returns_false_if_wrong_issuer
|
3844
|
+
-----------------------------------------------
|
3845
|
+
[1m[35m (0.0ms)[0m rollback transaction
|
3846
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
3847
|
+
-------------------------------------------------------------------------
|
3848
|
+
RubyJwtTest: test_returns_not_implemented_error_for_unsupported_algorithm
|
3849
|
+
-------------------------------------------------------------------------
|
3850
|
+
[1m[35m (0.0ms)[0m rollback transaction
|
3851
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
3852
|
+
-----------------------------------------------
|
3853
|
+
RubyJwtTest: test_returns_sign_error_for_no_key
|
3854
|
+
-----------------------------------------------
|
3855
|
+
[1m[35m (0.0ms)[0m rollback transaction
|
3856
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
3857
|
+
------------------------------------------------
|
3858
|
+
RubyJwtTest: test_should_encode_and_decode_ECDSA
|
3859
|
+
------------------------------------------------
|
3860
|
+
[1m[35m (0.0ms)[0m rollback transaction
|
3861
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
3862
|
+
----------------------------------------------
|
3863
|
+
RubyJwtTest: test_should_encode_and_decode_RSA
|
3864
|
+
----------------------------------------------
|
3865
|
+
[1m[35m (0.0ms)[0m rollback transaction
|
3866
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
3867
|
+
----------------------------------------------------------
|
3868
|
+
RubyJwtTest: test_should_encode_and_decode_and_verify_hmac
|
3869
|
+
----------------------------------------------------------
|
3870
|
+
[1m[35m (0.0ms)[0m rollback transaction
|
3871
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
3872
|
+
-----------------------------------------------
|
3873
|
+
RubyJwtTest: test_should_encode_and_decode_none
|
3874
|
+
-----------------------------------------------
|
3875
|
+
[1m[35m (0.0ms)[0m rollback transaction
|
3876
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
3877
|
+
-----------------------------------------------------
|
3878
|
+
RubyJwtTest: test_decodes_and_verifies_existing_token
|
3879
|
+
-----------------------------------------------------
|
3880
|
+
[1m[35m (0.0ms)[0m rollback transaction
|
3881
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
3882
|
+
---------------------------------------------------------
|
3883
|
+
RubyJwtTest: test_returns_decode_error_for_invalid_base64
|
3884
|
+
---------------------------------------------------------
|
3885
|
+
[1m[35m (0.0ms)[0m rollback transaction
|
3886
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
3887
|
+
---------------------------------------------
|
3888
|
+
RubyJwtTest: test_returns_false_if_before_nbf
|
3889
|
+
---------------------------------------------
|
3890
|
+
[1m[35m (0.0ms)[0m rollback transaction
|
3891
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
3892
|
+
------------------------------------------
|
3893
|
+
RubyJwtTest: test_returns_false_if_expired
|
3894
|
+
------------------------------------------
|
3895
|
+
[1m[35m (0.0ms)[0m rollback transaction
|
3896
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
3897
|
+
----------------------------------------------------
|
3898
|
+
RubyJwtTest: test_returns_false_if_invalid_signature
|
3899
|
+
----------------------------------------------------
|
3900
|
+
[1m[35m (0.0ms)[0m rollback transaction
|
3901
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
3902
|
+
-------------------------------------------------
|
3903
|
+
RubyJwtTest: test_returns_false_if_wrong_audience
|
3904
|
+
-------------------------------------------------
|
3905
|
+
[1m[35m (0.0ms)[0m rollback transaction
|
3906
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
3907
|
+
-----------------------------------------------
|
3908
|
+
RubyJwtTest: test_returns_false_if_wrong_issuer
|
3909
|
+
-----------------------------------------------
|
3910
|
+
[1m[35m (0.0ms)[0m rollback transaction
|
3911
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
3912
|
+
-------------------------------------------------------------------------
|
3913
|
+
RubyJwtTest: test_returns_not_implemented_error_for_unsupported_algorithm
|
3914
|
+
-------------------------------------------------------------------------
|
3915
|
+
[1m[35m (0.0ms)[0m rollback transaction
|
3916
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
3917
|
+
-----------------------------------------------
|
3918
|
+
RubyJwtTest: test_returns_sign_error_for_no_key
|
3919
|
+
-----------------------------------------------
|
3920
|
+
[1m[35m (0.0ms)[0m rollback transaction
|
3921
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
3922
|
+
------------------------------------------------
|
3923
|
+
RubyJwtTest: test_should_encode_and_decode_ECDSA
|
3924
|
+
------------------------------------------------
|
3925
|
+
[1m[35m (0.1ms)[0m rollback transaction
|
3926
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
3927
|
+
----------------------------------------------
|
3928
|
+
RubyJwtTest: test_should_encode_and_decode_RSA
|
3929
|
+
----------------------------------------------
|
3930
|
+
[1m[35m (0.0ms)[0m rollback transaction
|
3931
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
3932
|
+
----------------------------------------------------------
|
3933
|
+
RubyJwtTest: test_should_encode_and_decode_and_verify_hmac
|
3934
|
+
----------------------------------------------------------
|
3935
|
+
[1m[35m (0.0ms)[0m rollback transaction
|
3936
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
3937
|
+
-----------------------------------------------
|
3938
|
+
RubyJwtTest: test_should_encode_and_decode_none
|
3679
3939
|
-----------------------------------------------
|
3680
3940
|
[1m[35m (0.0ms)[0m rollback transaction
|
data/test/ruby_jwt_test.rb
CHANGED
@@ -14,7 +14,7 @@ class RubyJwtTest < ActiveSupport::TestCase
|
|
14
14
|
jwt = JWT.sign(@payload,@secret,@payload_options,nil)
|
15
15
|
decoded = JWT.decode(jwt)
|
16
16
|
verified_jwt = JWT.verify(jwt,@secret,@payload_options)
|
17
|
-
assert_equal(@header,decoded.header, "header is invalid") and assert_equal(@payload,decoded.payload,"payload is invalid") and assert_equal(true,verified_jwt.success)
|
17
|
+
assert_equal(@header,decoded.header, "header is invalid") and assert_equal(@payload,decoded.payload,"payload is invalid") and assert_equal(true,verified_jwt.success) and assert_equal(@header,verified_jwt.decoded_token.header, "header is invalid") and assert_equal(@payload,verified_jwt.decoded_token.payload,"payload is invalid")
|
18
18
|
end
|
19
19
|
|
20
20
|
test "should encode and decode none" do
|
@@ -22,7 +22,7 @@ class RubyJwtTest < ActiveSupport::TestCase
|
|
22
22
|
jwt = JWT.sign(@payload,nil,@payload_options,@header)
|
23
23
|
decoded = JWT.decode(jwt)
|
24
24
|
verified_jwt = JWT.verify(jwt,nil,@payload_options)
|
25
|
-
assert_equal(@header,decoded.header, "header is invalid") and assert_equal(@payload,decoded.payload,"payload is invalid") and assert_equal(true,verified_jwt.success)
|
25
|
+
assert_equal(@header,decoded.header, "header is invalid") and assert_equal(@payload,decoded.payload,"payload is invalid") and assert_equal(true,verified_jwt.success) and assert_equal(@header,verified_jwt.decoded_token.header, "header is invalid") and assert_equal(@payload,verified_jwt.decoded_token.payload,"payload is invalid")
|
26
26
|
end
|
27
27
|
|
28
28
|
test "should encode and decode RSA" do
|
@@ -30,7 +30,7 @@ class RubyJwtTest < ActiveSupport::TestCase
|
|
30
30
|
jwt = JWT.sign(@payload,@key,@payload_options,@header)
|
31
31
|
decoded = JWT.decode(jwt)
|
32
32
|
verified_jwt = JWT.verify(jwt,@key,@payload_options)
|
33
|
-
assert_equal(@header,decoded.header, "header is invalid") and assert_equal(@payload,decoded.payload,"payload is invalid") and assert_equal(true,verified_jwt.success)
|
33
|
+
assert_equal(@header,decoded.header, "header is invalid") and assert_equal(@payload,decoded.payload,"payload is invalid") and assert_equal(true,verified_jwt.success) and assert_equal(@header,verified_jwt.decoded_token.header, "header is invalid") and assert_equal(@payload,verified_jwt.decoded_token.payload,"payload is invalid")
|
34
34
|
end
|
35
35
|
|
36
36
|
test "should encode and decode ECDSA" do
|
@@ -40,7 +40,7 @@ class RubyJwtTest < ActiveSupport::TestCase
|
|
40
40
|
jwt = JWT.sign(@payload,pk,@payload_options,@header)
|
41
41
|
decoded = JWT.decode(jwt)
|
42
42
|
verified_jwt = JWT.verify(jwt,pk,@payload_options)
|
43
|
-
assert_equal(@header,decoded.header, "header is invalid") and assert_equal(@payload,decoded.payload,"payload is invalid") and assert_equal(true,verified_jwt.success)
|
43
|
+
assert_equal(@header,decoded.header, "header is invalid") and assert_equal(@payload,decoded.payload,"payload is invalid") and assert_equal(true,verified_jwt.success) and assert_equal(@header,verified_jwt.decoded_token.header, "header is invalid") and assert_equal(@payload,verified_jwt.decoded_token.payload,"payload is invalid")
|
44
44
|
end
|
45
45
|
|
46
46
|
test "decodes and verifies existing token" do
|