The payload argument passed to #verify_nonce! comes directly from JWT.decode which responds with a hash using string keys and not symbols. Other uses of id_info all correctly use string keys.
Without this change, the #verify_nonce! method always handles the payload as if 'nonce_supported' is falsy.
The
payload
argument passed to #verify_nonce! comes directly from JWT.decode which responds with a hash using string keys and not symbols. Other uses ofid_info
all correctly use string keys.Without this change, the #verify_nonce! method always handles the payload as if 'nonce_supported' is falsy.