Sha256: 033a593c4c9b24a465b98ac609dc8f7c56f21cf977cd63624f8d98aff33277f1
Contents?: true
Size: 1.59 KB
Versions: 3
Compression:
Stored size: 1.59 KB
Contents
require 'jwt/json' require 'jwt/verify' # JWT::Decode module module JWT extend JWT::Json # Decoding logic for JWT class Decode attr_reader :header, :payload, :signature def initialize(jwt, key, verify, options, &keyfinder) @jwt = jwt @key = key @verify = verify @options = options @keyfinder = keyfinder end def decode_segments header_segment, payload_segment, crypto_segment = raw_segments(@jwt, @verify) @header, @payload = decode_header_and_payload(header_segment, payload_segment) @signature = Decode.base64url_decode(crypto_segment.to_s) if @verify signing_input = [header_segment, payload_segment].join('.') [@header, @payload, @signature, signing_input] end def raw_segments(jwt, verify) segments = jwt.split('.') required_num_segments = verify ? [3] : [2, 3] fail(JWT::DecodeError, 'Not enough or too many segments') unless required_num_segments.include? segments.length segments end private :raw_segments def decode_header_and_payload(header_segment, payload_segment) header = JWT.decode_json(Decode.base64url_decode(header_segment)) payload = JWT.decode_json(Decode.base64url_decode(payload_segment)) [header, payload] end private :decode_header_and_payload def self.base64url_decode(str) str += '=' * (4 - str.length.modulo(4)) Base64.decode64(str.tr('-_', '+/')) end def verify @options.each do |key, val| next unless key.to_s.match(/verify/) Verify.send(key, payload, @options) if val end end end end
Version data entries
3 entries across 3 versions & 2 rubygems
Version | Path |
---|---|
jwt-1.5.5 | lib/jwt/decode.rb |
ish_lib_manager-0.0.1 | test/dummy/vendor/bundle/ruby/2.3.0/gems/jwt-1.5.4/lib/jwt/decode.rb |
jwt-1.5.4 | lib/jwt/decode.rb |