Skip to content

Commit 8d4da27

Browse files
committed
Conflicts: README.md index.js test/jwt.hs.tests.js
2 parents 6448ce3 + 002cce1 commit 8d4da27

File tree

4 files changed

+50
-2
lines changed

4 files changed

+50
-2
lines changed

README.md

+9
Original file line numberDiff line numberDiff line change
@@ -41,6 +41,8 @@ Additional headers can be provided via the `headers` object.
4141

4242
Generated jwts will include an `iat` claim by default unless `noTimestamp` is specified.
4343

44+
Setting `ignoreExpiration` to `true` will prevent expired tokens from generating an error.
45+
4446
Example
4547

4648
```js
@@ -55,6 +57,13 @@ var token = jwt.sign({ foo: 'bar' }, cert, { algorithm: 'RS256'});
5557

5658
### jwt.verify(token, secretOrPublicKey, [options, callback])
5759

60+
`options`:
61+
62+
* `ignoreExpiration`
63+
* `audience`
64+
* `issuer`
65+
66+
5867
(Asynchronous) If a callback is supplied, function acts asynchronously. Callback passed the payload decoded if the signature (and optionally expiration, audience, issuer) are valid. If not, it will be passed the error.
5968

6069
(Synchronous) If a callback is not supplied, function acts synchronously. Returns the payload decoded if the signature (and optionally expiration, audience, issuer) are valid. If not, it will throw the error.

index.js

+1-1
Original file line numberDiff line numberDiff line change
@@ -111,7 +111,7 @@ module.exports.verify = function(jwtString, secretOrPublicKey, options, callback
111111
return done(err);
112112
}
113113

114-
if (typeof payload.exp !== 'undefined') {
114+
if (typeof payload.exp !== 'undefined' && !options.ignoreExpiration) {
115115
if (typeof payload.exp !== 'number') {
116116
return done(new JsonWebTokenError('invalid exp value'));
117117
}

test/jwt.hs.tests.js

+29-1
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ describe('HS256', function() {
1717

1818
it('should without options', function(done) {
1919
var callback = function(err, decoded) {
20-
assert.ok(decoded.foo);
20+
assert.ok(decoded.foo);
2121
assert.equal('bar', decoded.foo);
2222
done();
2323
};
@@ -59,5 +59,33 @@ describe('HS256', function() {
5959
});
6060
});
6161

62+
it('should throw when the payload is not json', function(done) {
63+
var token = jwt.sign('bar', 'secret', { algorithm: 'HS256' });
64+
jwt.verify(token, 'secret', function(err, decoded) {
65+
assert.isUndefined(decoded);
66+
assert.isNotNull(err);
67+
done();
68+
});
69+
});
70+
71+
it('should return an error when the token is expired', function(done) {
72+
var token = jwt.sign({ exp: 1 }, secret, { algorithm: 'HS256' });
73+
jwt.verify(token, secret, { algorithm: 'HS256' }, function(err, decoded) {
74+
assert.isUndefined(decoded);
75+
assert.isNotNull(err);
76+
done();
77+
});
78+
});
79+
80+
it('should NOT return an error when the token is expired with "ignoreExpiration"', function(done) {
81+
var token = jwt.sign({ exp: 1, foo: 'bar' }, secret, { algorithm: 'HS256' });
82+
jwt.verify(token, secret, { algorithm: 'HS256', ignoreExpiration: true }, function(err, decoded) {
83+
assert.ok(decoded.foo);
84+
assert.equal('bar', decoded.foo);
85+
assert.isNull(err);
86+
done();
87+
});
88+
});
89+
6290
});
6391
});

test/jwt.rs.tests.js

+11
Original file line numberDiff line numberDiff line change
@@ -75,6 +75,17 @@ describe('RS256', function() {
7575
done();
7676
});
7777
});
78+
79+
it('should NOT be invalid', function(done) {
80+
// expired token
81+
token = jwt.sign({ foo: 'bar' }, priv, { algorithm: 'RS256', expiresInMinutes: -10 });
82+
83+
jwt.verify(token, pub, { ignoreExpiration: true }, function(err, decoded) {
84+
assert.ok(decoded.foo);
85+
assert.equal('bar', decoded.foo);
86+
done();
87+
});
88+
});
7889
});
7990

8091
describe('when signing a token with audience', function() {

0 commit comments

Comments
 (0)