mirror of
http://git.haproxy.org/git/haproxy.git/
synced 2024-12-15 16:04:37 +00:00
130e142ee2
This new converter takes a JSON Web Token, an algorithm (among the ones specified for JWS tokens in RFC 7518) and a public key or a secret, and it returns a verdict about the signature contained in the token. It does not simply return a boolean because some specific error cases cas be specified by returning an integer instead, such as unmanaged algorithms or invalid tokens. This enables to distinguich malformed tokens from tampered ones, that would be valid format-wise but would have a bad signature. This converter does not perform a full JWT validation as decribed in section 7.2 of RFC 7519. For instance it does not ensure that the header and payload parts of the token are completely valid JSON objects because it would need a complete JSON parser. It only focuses on the signature and checks that it matches the token's contents. |
||
---|---|---|
.. | ||
design-thoughts | ||
internals | ||
lua-api | ||
51Degrees-device-detection.txt | ||
acl.fig | ||
architecture.txt | ||
close-options.txt | ||
coding-style.txt | ||
configuration.txt | ||
cookie-options.txt | ||
DeviceAtlas-device-detection.txt | ||
gpl.txt | ||
haproxy.1 | ||
intro.txt | ||
lgpl.txt | ||
linux-syn-cookies.txt | ||
lua.txt | ||
management.txt | ||
netscaler-client-ip-insertion-protocol.txt | ||
network-namespaces.txt | ||
peers-v2.0.txt | ||
peers.txt | ||
proxy-protocol.txt | ||
queuing.fig | ||
regression-testing.txt | ||
seamless_reload.txt | ||
SOCKS4.protocol.txt | ||
SPOE.txt | ||
WURFL-device-detection.txt |