Skip to content

Commit

Permalink
Fix requires for x5c_key_finder
Browse files Browse the repository at this point in the history
  • Loading branch information
anakinj committed Dec 30, 2023
1 parent 965ca2b commit ff97ab7
Show file tree
Hide file tree
Showing 3 changed files with 1 addition and 6 deletions.
1 change: 1 addition & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -14,6 +14,7 @@

- Fix signature has expired error if payload is a string [#555](https://github.com/jwt/ruby-jwt/pull/555) - [@GobinathAL](https://github.com/GobinathAL).
- Fix key base equality and spaceship operators [#569](https://github.com/jwt/ruby-jwt/pull/569) - [@magneland](https://github.com/magneland).
- Remove explicit base64 require from x5c_key_finder [#580](https://github.com/jwt/ruby-jwt/pull/580) - [@anakinj](https://github.com/anakinj).
- Your contribution here

## [v2.7.1](https://github.com/jwt/ruby-jwt/tree/v2.8.0) (2023-06-09)
Expand Down
3 changes: 0 additions & 3 deletions lib/jwt/x5c_key_finder.rb
Original file line number Diff line number Diff line change
@@ -1,8 +1,5 @@
# frozen_string_literal: true

require 'base64'
require 'jwt/error'

module JWT
# If the x5c header certificate chain can be validated by trusted root
# certificates, and none of the certificates are revoked, returns the public
Expand Down
3 changes: 0 additions & 3 deletions spec/x5c_key_finder_spec.rb
Original file line number Diff line number Diff line change
@@ -1,8 +1,5 @@
# frozen_string_literal: true

require 'spec_helper'
require 'jwt/x5c_key_finder'

describe JWT::X5cKeyFinder do
let(:root_key) { OpenSSL::PKey.read(File.read(File.join(CERT_PATH, 'rsa-2048-private.pem'))) }
let(:root_dn) { OpenSSL::X509::Name.parse('/DC=org/DC=fake-ca/CN=Fake CA') }
Expand Down

0 comments on commit ff97ab7

Please sign in to comment.