New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Token JWT Decode #174
Comments
Oh I dint know about this. Thank you! |
Hi @aascagarwal - Did you decode the JWT? I seem to be running into InvalidSignatureError |
If you're on Discord, could we have a quick chat sometime? ID: pallupz#5726 |
jwt.decode(token, options={"verify_signature": False}) |
algorithm? |
oh wait.. got it |
decoded = jwt.decode(token, options={"verify_signature": False})
|
when I encode it back, I am not getting the same result |
that's because, you need the signature.. |
yea.. so at the moment, we can at best only predict when this will expire? |
no way to generate the next token, I assum |
I have not tried that, but mostly no |
yea - I tried with different things for keys, but nothing has worked so far. and that'd be a dumb design anyway. was hoping maybe devs made a mistake somewhere. |
Suggestion: The token contains the time stamp for start and end ('iat': 1621506724, 'exp': 1621507624) of token validation, this can help in invalid token check without calling the beneficiary api everytime
use pyjwt
Also this will allow to regenerate the otp automatically just before expiration (if auto is selected)
The text was updated successfully, but these errors were encountered: