-
In #3598 I added a new IO test showing how many JWT errors we currently expose by just showing internal errors via `show`. Those are not very user friendly:
https://github.com/PostgREST/postgrest/b…
-
**TL;DR**
We kept `Legacy:: tables` for JWT in https://github.com/microsoft/CCF/pull/6175, for reasons explained [here](https://github.com/microsoft/CCF/pull/6175#discussion_r1620308872). This can …
-
The inline documentation is wrong.
Please update line 9 in SystemTextSerializer.cs
to say:
` /// JSON serializer using System.Text implementation.`
instead of incorrectly saying it uses `Newton…
-
see the electric `deployment.yaml`
currently it's `AUTH_MODE`: insecure
-
#173 setup our JWT implementation support both JWTs as JWS and JWE, but only implemented the JWT as a JWS. Use this ticket to implement JWT as JWE; see the file `crates/jwt/src/jwe.rs`.
JWE spec: h…
-
I'm getting
```bash
`ImportError: cannot import name 'ugettext' from 'django.utils.translation' (C:\realtime-projects\python-django\.venv\Lib\site-packages\django\utils\translation\__init__.py). …
-
The endpoint [`/raw/jwt/sign`](https://issuer.portal.walt.id/swagger/index.html#/Credential%20Issuance/post_raw_jwt_sign) requires 2 parameters `walt-key` and `walt-subjectDid`
If passed incorrectl…
-
Add Auth layer of JWT token and cookie support
- All routes should be jwt protected
- opening web socket should only from an authorised client / user .
- Only few routes
-
at least for the exchange protocol
see https://tools.ietf.org/html/rfc7516
-
Add support to verify jwt strings. For example
```ts
const jwtSchema = zod.string().jwt()
jwtSchema.parse()
```