summaryrefslogtreecommitdiff
path: root/jwt/api_jws.py
Commit message (Collapse)AuthorAgeFilesLines
* Add JWK support for HMAC and RSA keysadd-jwk-for-hmac-rsaMark Adams2016-08-281-6/+8
| | | | | | | - JWKs for RSA and HMAC can be encoded / decoded using the .to_jwk() and .from_jwk() methods on their respective jwt.algorithms instances - Replaced tests.utils ensure_unicode and ensure_bytes with jwt.utils versions
* binary_type verification added to make the code more future-proofMauricio Aizaga2015-10-231-4/+5
|
* Fixed syntax for python 2.6Mauricio Aizaga2015-10-221-1/+1
|
* Fixed #183 AttributeError: 'NoneType' object has no attribute 'rsplit'Mauricio Aizaga2015-10-221-0/+3
| | | | | | The issue also occurs when payload is int raising: AttributeError: 'int' object has no attribute 'rsplit' Test for None and int payload added
* Change TypeError on bad `kid` to InvalidTokenErrorGabriel Gironda2015-07-231-2/+2
|
* Fail on encode and decode of bad JWS header valuesGabriel Gironda2015-07-211-2/+13
| | | | | | | | | | | | | | | The JWS spec: https://tools.ietf.org/html/draft-ietf-jose-json-web-signature-41#section-4.1.4 States that if `kid` is present then it **MUST** be a string. Currently, the library allows silent creation of invalid JWS (and thus, JWT), as it allows any type for `kid`. This commit adds checks to help ensure output meets the spec. * Add jwt.api_jws.PyJWS._validate_headers for validating JWS headers on encode and decode * Add tests
* Fixed #167 throw InvalidAlgorithmError if alg not in headerAlexandru Mihai2015-06-221-1/+1
|
* Added get_unverified_header to public APIMark Adams2015-05-091-0/+1
|
* Added get_unverified_header method so that unverified headers can be ↵Mark Adams2015-05-081-0/+8
| | | | retrieved by the application. Closes #155
* Removed an extra attempt to encode the payload that I missed when I was ↵Mark Adams2015-04-191-4/+1
| | | | refactoring
* Refactored JWS-specific logic out of PyJWT and into PyJWS superclassMark Adams2015-04-191-0/+183