Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

New API, tests! #1

Merged
merged 31 commits into from
Jun 18, 2015
Merged

New API, tests! #1

merged 31 commits into from
Jun 18, 2015

Conversation

robertjd
Copy link
Contributor

This will become v1.0.0

robertjd added a commit that referenced this pull request Jun 18, 2015
@robertjd robertjd merged commit 1829438 into master Jun 18, 2015
@lhazlewood
Copy link
Contributor

Shouldn't we hold off on 1.0.0 until it has feature parity w/ jjwt (signingKeyResolver, etc)? jjwt is just on 0.5...

RS256: 'RSA-SHA256',
RS384: 'RSA-SHA384',
RS512: 'RSA-SHA512',
ES256: 'RSA-SHA256',
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think ES256-ES512 are not correct as they reflect RSA-SHA*

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Node's crytpo library has strange names for things, hence this map. There are tests with ES keypairs that assert the correct behavior.

@lhazlewood
Copy link
Contributor

I should also mention that JWT as a specification has finally been finalized - it is no longer in 'draft' status. All jwtk libraries should reflect all capabilities defined here:

http://www.rfc-editor.org/rfc/rfc7519.txt

(or at least not yet be called 1.0 final until they support all features of the spec)

@lhazlewood
Copy link
Contributor

(side note: I'm checking if the final spec removed the capability for plaintext bodies in favor of only a claims one - I haven't seen the spec changes in ~ 2 months).

@robertjd
Copy link
Contributor Author

I'm bumping to 1.0.0 because i'm breaking the api from 0.0.1

@lhazlewood
Copy link
Contributor

We don't need to support semantic versioning until 1.0.0 final. Releasing 0.1 is safer unless you're positive that the library is feature complete and stable.

@robertjd robertjd mentioned this pull request Jun 18, 2015
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants