Skip to content

Commit 116f510

Browse files
committedFeb 24, 2023
Relax the timestamp check for invalid_before
Apply the time tolerance to `invalid_before` the same way we do it for expiration.
1 parent dc3bfd5 commit 116f510

File tree

5 files changed

+14
-10
lines changed

5 files changed

+14
-10
lines changed
 

‎Cargo.toml

+1-1
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ readme = "README.md"
1515
anyhow = "1.0.69"
1616
binstring = "0.1.1"
1717
ciborium = { version = "0.2.0", optional = true }
18-
coarsetime = "0.1.22"
18+
coarsetime = "0.1.23"
1919
ct-codecs = "1.1.1"
2020
ed25519-compact = { version = "2.0.4", features = ["pem"] }
2121
hmac-sha1-compact = "1.1.3"

‎README.md

+6-3
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,8 @@
1414
- [Token verification](#token-verification)
1515
- [Signatures (asymmetric, `RS*`, `PS*`, `ES*` and `EdDSA` algorithms) example](#signatures-asymmetric-rs-ps-es-and-eddsa-algorithms-example)
1616
- [Key pairs and tokens creation](#key-pairs-and-tokens-creation)
17+
- [ES256](#es256)
18+
- [ES384](#es384)
1719
- [Advanced usage](#advanced-usage)
1820
- [Custom claims](#custom-claims)
1921
- [Peeking at metadata before verification](#peeking-at-metadata-before-verification)
@@ -113,11 +115,12 @@ Extra verification steps can optionally be enabled via the `ValidationOptions` s
113115
let mut options = VerificationOptions::default();
114116
// Accept tokens that will only be valid in the future
115117
options.accept_future = true;
116-
// accept tokens even if they have expired up to 15 minutes after the deadline
118+
// Accept tokens even if they have expired up to 15 minutes after the deadline,
119+
// and/or they will be valid within 15 minutes.
117120
options.time_tolerance = Some(Duration::from_mins(15));
118-
// reject tokens if they were issued more than 1 hour ago
121+
// Reject tokens if they were issued more than 1 hour ago
119122
options.max_validity = Some(Duration::from_hours(1));
120-
// reject tokens if they don't include an issuer from that set
123+
// Reject tokens if they don't include an issuer from that set
121124
options.allowed_issuers = Some(HashSet::from_strings(&["example app"]));
122125

123126
// see the documentation for the full list of available options

‎src/claims.rs

+1-1
Original file line numberDiff line numberDiff line change
@@ -190,7 +190,7 @@ impl<CustomClaims> JWTClaims<CustomClaims> {
190190
}
191191
if !options.accept_future {
192192
if let Some(invalid_before) = self.invalid_before {
193-
ensure!(now >= invalid_before, JWTError::TokenNotValidYet);
193+
ensure!(now + time_tolerance >= invalid_before, JWTError::TokenNotValidYet);
194194
}
195195
}
196196
if let Some(expires_at) = self.expires_at {

‎src/common.rs

+1-1
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ pub struct VerificationOptions {
3939
/// Require the audience to be present in the set
4040
pub allowed_audiences: Option<HashSet<String>>,
4141

42-
/// Time tolerance for validating expiration dates
42+
/// How much clock drift to tolerate when verifying token timestamps
4343
pub time_tolerance: Option<Duration>,
4444

4545
/// Reject tokens created more than `max_validity` ago

‎src/lib.rs

+5-4
Original file line numberDiff line numberDiff line change
@@ -119,13 +119,14 @@
119119
//! let mut options = VerificationOptions::default();
120120
//! // Accept tokens that will only be valid in the future
121121
//! options.accept_future = true;
122-
//! // accept tokens even if they have expired up to 15 minutes after the deadline
122+
//! // Accept tokens even if they have expired up to 15 minutes after the deadline
123+
//! // and/or they will be valid within 15 minutes.
123124
//! options.time_tolerance = Some(Duration::from_mins(15));
124-
//! // reject tokens if they were issued more than 1 hour ago
125+
//! // Reject tokens if they were issued more than 1 hour ago
125126
//! options.max_validity = Some(Duration::from_hours(1));
126-
//! // reject tokens if they don't include an issuer from that list
127+
//! // Reject tokens if they don't include an issuer from that list
127128
//! options.allowed_issuers = Some(HashSet::from_strings(&["example app"]));
128-
//! // see the documentation for the full list of available options
129+
//! // See the documentation for the full list of available options
129130
//!
130131
//! let claims = key.verify_token::<NoCustomClaims>(&token, Some(options))?;
131132
//! # Ok(()) }

0 commit comments

Comments
 (0)
Please sign in to comment.