You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* Introduction of the secret callback
Without the more contentious 'none'-changes
* Removed some spaces...
I should really add a editor.config and eslint to this project ;-)
* Removed xtend as a dependency, as the native Object.Assign can do this as well
* Removed xtend as a dependency, as the native Object.Assign can do this as well
* Resolve feedback from review
* Added extra test and fixed the associated bug
* The return of the header
* Forgot to change this one as well... Sorry bout that
* Updated the readme and made the if-statements consistent
* Space; The final frontier
Copy file name to clipboardexpand all lines: README.md
+18
Original file line number
Diff line number
Diff line change
@@ -122,6 +122,7 @@ jwt.sign({
122
122
123
123
`secretOrPublicKey` is a string or buffer containing either the secret for HMAC algorithms, or the PEM
124
124
encoded public key for RSA and ECDSA.
125
+
If `jwt.verify` is called asynchronous, `secretOrPublicKey` can be a function that should fetch the secret or public key. See below for a detailed example
125
126
126
127
As mentioned in [this comment](https://github.com/auth0/node-jsonwebtoken/issues/208#issuecomment-231861138), there are other libraries that expect base64 encoded secrets (random bytes encoded using base64), if that is your case you can pass `Buffer.from(secret, 'base64')`, by doing this the secret will be decoded using base64 and the token verification will use the original random bytes.
0 commit comments