diff --git a/README.md b/README.md index c39c2cf..7069959 100644 --- a/README.md +++ b/README.md @@ -41,14 +41,16 @@ Note how the verification process is self-contained with just a public key. // verify a JWT claims, err := jwt.EdDSACheck(token, JWTPublicKey) if err != nil { - log.Print("credentials denied with ", err) + log.Print("credentials rejected: ", err) return } -if !claims.Valid(time.Now()) { - log.Print("credential time constraints exceeded") +err = claims.AcceptTemporal(time.Now(), time.Second) +if err != nil { + log.Print("credential constraints violated: ", err) return } +// ready for use log.Print("hello ", claims.Subject) if verified, _ := claims.Set["email_verified"].(bool); !verified { log.Print("e-mail confirmation pending") diff --git a/examples_test.go b/examples_test.go index 55257fd..3f53c96 100644 --- a/examples_test.go +++ b/examples_test.go @@ -44,15 +44,16 @@ func ExampleClaims() { // verify a JWT claims, err := jwt.RSACheck(token, &RSAKey.PublicKey) if err != nil { - fmt.Println("credentials denied on", err) + fmt.Println("credentials rejected:", err) return } - if !claims.Valid(time.Now()) { - fmt.Println("time constraints exceeded") + err = claims.AcceptTemporal(time.Now(), time.Second) + if err != nil { + fmt.Println("credential constraints violated:", err) return } if !claims.AcceptAudience("armory") { - fmt.Println("reject on audience", claims.Audiences) + fmt.Println("credentials not for armory:", claims.Audiences) return } fmt.Println(string(claims.Raw))