Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Handle non-HMAC signing keys #101

Merged
merged 1 commit into from
Feb 4, 2022
Merged

Handle non-HMAC signing keys #101

merged 1 commit into from
Feb 4, 2022

Conversation

yuriylsh
Copy link
Contributor

@yuriylsh yuriylsh commented Feb 3, 2022

Since we currently strip out from original TokenValidationParameters.ValidAlgorithms the code defaults to HMAC and will throw as soon as we try to use JWT token with this signing key.

This PR makes sure that we propagate the original TokenValidationParameters.ValidAlgorithms so that singing keys based on non-HMAC algorithms do not throw.

Copy link
Collaborator

@Hawxy Hawxy left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good, thanks. I should have a new build out that includes this by the end of the week.

@Hawxy Hawxy merged commit 6c827bf into JasperFx:master Feb 4, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants